Dell Remote Access Controller 4 Firmware Version 1.60 User’s Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2007 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Contents 1 DRAC 4 Overview . . . . . . . . . . . . . . . . . . What’s New In This DRAC 4 Release? . . . . . . . . . 15 . . . . . . . . . . . . . . . 16 . . . . . . . . . . . . . . . . 17 DRAC 4 Hardware Features Hardware Specifications . . . . . . . . . . . . . . . 17 . . . . . . . . . . . . . . . . . . . . . 18 Power Requirements . Connectors DRAC 4 Ports . . . . . . . . . . . . . . . . . . . . 19 . . . . . . . . . . . . . . . . 19 . . . . . . . . . . . . . . . . . .
2 Installing and Setting Up the DRAC 4 27 Before You Begin . . . . . . . . . . . . . . . . . . . . Installing the DRAC 4 Hardware . . . . . . . . . . . . 28 . . . . . . . . . . 28 Configuring Your DRAC 4 Software . . . . . . . . . Registering the DRAC Host Name With DNS Using DHCP . . . . . . . . . . . . . . . . . . Installing the Software on the Managed System Disabling the Windows Automatic Reboot Option . . . . . . . . . . 29 29 . . . . . . . . 30 . . . . . . . . .
Configuring DRAC 4 Properties . . . . . . . . . . . . . Configuring the DRAC 4 Network Settings . . . . . . . Configuring the DRAC 4 Network Settings Using the Option ROM . . . . . . . . . . . 37 37 . . . . 38 Adding and Configuring DRAC 4 Users . . . . . . . . . 42 Adding and Configuring SNMP Alerts . . . . . . . . . 42 . . . . . . . . . . . . . 42 Updating the DRAC 4 Firmware Clearing the Web Browser Cache With Internet Explorer . . . . . . . . . . . . . . .
3 Configuring the DRAC 4 to Use a Serial or Telnet Text Console . . . . . . . . . . . . . . Serial and Telnet Console Features . 49 . . . . . . . . . . . 49 Enabling and Configuring the Managed System to Use a Serial or Telnet Console . . . . . . . . . . . . 50 Configuring the System Setup Program on the Managed System . . . . . . . . . . . . . . . . 50 Configuring Red Hat Enterprise Linux for Serial Redirection During Boot . . . . . . . . . . . 51 Enabling Login to the Console After Boot .
Configuring the Management Station Terminal Emulation Software . . . . . . . . . . . . . . . . . . . Configuring Red Hat Enterprise Linux Minicom for Serial Console Emulation . . . . . . . . . . Configuring HyperTerminal for Serial Console Redirection . . . . . . . . . . . 63 . . . . . . . 65 Configuring Red Hat Enterprise Linux XTerm for Telnet Console Redirection . . . . . . . . . . . 66 . . . . . . . . 66 . . . . . . . . . . . . 67 Enabling Microsoft Telnet for Telnet Console Redirection .
Using the SEL . . . . . . . . . . . . . . . . . . . . Using the DRAC 4 Log . . . . . . . . . . . . . . . Viewing the Last System Crash Screen Using the Diagnostic Console 93 . . . . . . . . . . . 94 . . . . . . . . 96 Troubleshooting Alerting Problems . . . . . . . . 98 . . . . . . . . . . . . . . 102 Using the DRAC 4 With Microsoft Active Directory . . . . . . . . . . . . . Advantages and Disadvantages of Extended Schema and Standard Schema . . . . . . . . . . . . . . . . . .
Standard Schema Active Directory Overview Configuring Standard Schema Active Directory to Access Your DRAC 4 . . . . . . . 125 . . . . . . . 127 Configuring the DRAC 4 with Standard Schema Active Directory and the racadm CLI . . . . . . . 127 Enabling SSL on a Domain Controller . . . . . . . . . 128 Exporting the Domain Controller Root CA Certificate . . . . . . . . . . . . . . . . . 129 Importing the DRAC 4 Firmware SSL Certificate . . . . . . . . . . . . . . . . . . . 130 . . . .
Using the Virtual Media Feature . . . . . . . . . . . . Booting From the Virtual Media . . . . . . . . . . Installing Operating Systems Using Virtual Media . . . . . . . . . . . . . . . . . . . . Using Virtual Media When the Server’s Operating System Is Running . . . . . . Enabling and Disabling the Virtual Media Feature . . . . . . . . . . . . . . . . . . . . . . 152 . . . . . . . 154 . . . . . . . . . 154 . . . . . . . . . . . . . . 155 Using the Serial and racadm Commands . . . . . . . . .
Configuring Multiple DRAC 4s Configuration File Overview Configuration File Example . . . . . . . . 172 . . . . . . . . . . . . 176 Using the racadm Utility to Configure the DRAC 4 . . . . . . . . . . . . . . . Before Adding a DRAC 4 User . . . . . . . . . 177 . . . . . . . . . . . 177 Adding a DRAC 4 User Without Alert Capabilities . . . . . . . . Adding a DRAC 4 User With Alerting Capabilities . . . . . . . . . . . . . . 178 . . . . . . . . . . . .
getssninfo . . . . . . . . . . . . . . . . . . . . . . . . 200 getsysinfo . . . . . . . . . . . . . . . . . . . . . . . . 201 getractime . . . . . . . . . . . . . . . . . . . . . . . . 204 ifconfig . . . . . . . . . . . . . . . . . . . . . . . . . . 205 netstat . . . . . . . . . . . . . . . . . . . . . . . . . . 205 . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 ping setniccfg/getniccfg . . . . . . . . . . . . . . . . . . . 206 . . . . . . . . . . . . . . . . . . . . . . . .
sslcertview . . . . . . . . . . . . . . . . . . . . . . . 222 . . . . . . . . . . . . . . . . . . . . . . . . 224 . . . . . . . . . . . . . . . . . . . . . . . . . 225 testemail . testtrap . vmdisconnect B DRAC 4 Property Database Group and Object Definitions . . . . . . . . . idRacInfo 227 . . . . . . . . . . . . . . . . . . . 227 229 . . . . . . . . . . . . . . . 234 . . . . . . . . . . . . . . . . . . . . . 236 . . . . . . . . . . . . . . . . . . . . . . 238 . . . . . . . . . . . . . .
cfgStandardSchema . . . . . . . . . . . . . . . . . . . 271 . . . 273 . . . . . . 273 . . . . . . . 275 Alert Filter Properties . . . . . . . . . . . . . . . . . . 276 Alert Test Commands . . . . . . . . . . . . . . . . . . 276 Event Filter Operation and Event Mask Properties DRAC 4-Generated Event Mask Definitions . System-Generated Alert Mask Definitions Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Index 14 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1 DRAC 4 Overview The Dell™ Remote Access Controller 4 (DRAC 4) is a systems management hardware and software solution designed to provide remote management capabilities, crashed system recovery, and power control functions for Dell PowerEdge™ systems. By communicating with the system’s baseboard management controller (BMC), the DRAC 4 can be configured to send you email alerts for warnings or errors related to voltages, temperatures, and fan speeds.
• Supports a new macro—+ key code sequence to initiate a crash dump of the Microsoft Windows operating system. For more information, see the Microsoft Knowledge Base at: http://support.microsoft.com/kb/256986/ NOTE: You must keep the key pressed during the additional keystrokes. • Provides DRAC 4/P support on the Dell PowerVault™ 100. DRAC 4 Hardware Features Figure 1-1 shows the DRAC 4/I hardware features and Figure 1-2 shows the DRAC 4/P hardware features.
Figure 1-2. DRAC 4/P Hardware Features Video Connector RJ-45 Connector Management Connector Hardware Specifications Power Requirements Table 1-1 lists the power requirements for the DRAC 4. Table 1-1. DRAC 4 Power Requirements System Power 1.2 A on +3.3 V AUX (maximum) 550 mA on +3.
Connectors NOTE: The DRAC 4 hardware installation instructions are located in the Installing a Remote Access Card document or the Installation and Troubleshooting Guide included with your system. Ensure that you connect the management cable and the local video monitor (if present) to the DRAC 4/P in PCI slot 4. The DRAC 4 provides a dedicated 10/100 Mbps RJ-45 NIC and a connector for mounting the card to the system board. The DRAC 4/P also provides a video connector, and a 30-pin Management Connector.
Supported Remote Access Connections Table 1-3 lists the features of each type of connection. Table 1-3.
• Configurable IP ports (where applicable) • Secure Shell (SSH), which uses an encrypted transport layer for higher security. SSH is available on DRAC 4 firmware 1.40 and later.
Table 1-4.
Table 1-4. Supported Operating Systems (continued) Operating System Family Operating System Red Hat® Enterprise Linux® WS, ES, and AS (version 3) (x86 and x86_64) Enterprise Linux WS, ES, and AS (version 4) (ia32 and x86_64) Enterprise Linux WS, ES, and AS (version 4) (x86 and x86_64) Enterprise Linux WS, ES, and AS (Version 4.5) (x86) Enterprise Linux WS, ES, and AS (Version 4.5) (x86_64) Enterprise Linux WS and AS (Version 4.
Table 1-5. Supported Web Browsers Operating System Supported Web Browser Windows Internet Explorer 6.0 (32-bit) with SP2 for Windows XP and Windows 2003 R2 SP2 only. Internet Explorer 7.0 for Windows Vista, Windows XP, and Windows 2003 R2 SP2 only.
To disable the whitelist feature and avoid repetitive, unnecessary plug-in installations, perform the following steps: 1 Open a Firefox Web browser window. 2 In the address field, type the following and press : about:config 3 In the Preference Name column, locate and double-click xpinstall.whitelist.required. The values for Preference Name, Status, Type, and Value change to bold text. The Status value changes to user set and the Value value changes to false.
• Access to the system event log (SEL) and DRAC 4 logs and last crash screen (of the crashed or unresponsive system) independent of the operating system state. • Integrated launch of the DRAC 4 interface from Server Administrator and IT Assistant. • Ability to alert you to potential problems on the managed system by sending either an email message or an SNMP trap through the DRAC 4 NIC to a management station.
The following system documents are also available to provide more information about the system in which your DRAC 4 is installed: • The Product Information Guide provides important safety and regulatory information. Warranty information may be included within this document or as a separate document. • The Rack Installation Guide and Rack Installation Instructions included with your rack solution describes how to install your system into a rack.
Installing and Setting Up the DRAC 4 2 This chapter provides information about how to install and setup your DRAC 4 hardware and software. Before You Begin Gather the following items that came with your system prior to installing and configuring the DRAC 4 software.
Software Installation and Configuration Overview This section provides a high-level overview of the DRAC 4 software installation and configuration process. Configure your DRAC 4 using the Web-based interface, racadm CLI, or Serial/Telnet console. Network configuration can also be performed using operating system utilities (Option ROM). For more information about the DRAC 4 software components, see "Installing the Software on the Managed System.
4 Configure the Web browser to connect to the Web-based interface. See "Configuring a Supported Web Browser." 5 Install the Sun Java plug-in. See "Installing the Sun Java Plug-In." NOTE: The Sun Java plug-in is only required if you are using the Console Redirection feature. 6 Disable the Windows Automatic Reboot Option. See "Disabling the Windows Automatic Reboot Option." 7 Update the DRAC 4 Firmware. See "Updating the DRAC 4 Firmware." 8 Access the DRAC 4 through a network.
Managed system software will install your choices from the following components on the managed system: the appropriate version of Server Administrator and the appropriate DRAC 4 agent or only the DRAC 4 agent. NOTE: Do not install the DRAC 4 management station software and the DRAC 4 managed system software on the same system. Depending on the operating system, the DRAC 4 agent consists of either Microsoft Windows services, Novell NLMs, or Red Hat Enterprise Linux agents.
Disabling the Windows Automatic Reboot Option To ensure that the DRAC 4 Web-based interface last crash screen feature works properly, disable the Automatic Reboot option on managed systems running the Microsoft Windows Server 2003 and Windows 2000 Server operating systems. Disabling the Automatic Reboot Option in Windows Server 2003 1 Open the Windows Control Panel and double-click the System icon. 2 Click the Advanced tab. 3 Under Startup and Recovery, click Settings.
• Dell Systems Documentation CD — Helps you stay current with documentation for systems, systems management software products, peripherals, and RAID controllers. NOTE: Starting with Dell OpenManage version 5.3, you can also obtain all the above components from the Dell Systems Management Tools and Documentation DVD and the Dell Server Updates DVD. For instructions about installing Server Administrator software, see your Server Administrator User's Guide.
Configuring a Supported Web Browser The following sections provide instructions for configuring the supported Web browsers. For a list of supported Web browsers, see "Supported Web Browsers." Configuring Your Web Browser to Connect to the Web-Based Interface If you are connecting to the DRAC 4 Web-based interface from a management station that connects to the Internet through a proxy server, you must configure the Web browser to access the Internet from this server.
Viewing Localized Versions of the Web-Based Interface The DRAC 4 Web-based interface is supported on the following Windows operating system languages: • French • German • Spanish • Japanese • Simplified Chinese To view a localized version of the DRAC 4 Web-based interface in Internet Explorer, perform the following steps: 1 Click the Tools menu and select Internet Options. 2 In the Internet Options window, click Languages. 3 In the Language Preference window, click Add.
To clear the Java cache on a Windows operating system, perform the following steps: 1 Click Settings→Control Panel→Java Plug-in Control Panel. 2 Click the Cache tab. 3 Click Clear. 4 Deselect the Enable Caching check box to disable cache. 5 Click Apply. 6 Close and restart the browser. Installing the Sun Java Plug-In to Use Mozilla NOTE: For a list of the latest supported Java Virtual Machine (JVM) plug-ins, see the racread.
3 Install the Java plug-in packages that comprise the Java 2 Runtime Environment (JRE). At the command prompt, type: rpm -iv j2re-1_4-linux-i586.rpm The Java plug-in packages are installed on your system. 4 Delete the symbolic link to the previous Java plug-in version (if applicable). NOTE: Only one Java plug-in can be registered at a time. If you have never registered a Java plug-in, go to step 5. Otherwise, follow the procedure in this step.
7 Ensure that your updated JRE software is installed and registered on your system. a Open a Mozilla Web browser window. b In the Web browser window, click Tools and select Web Development→Java Console. The JRE version is displayed at the top of the Java Console window. If the version that is shown is not the same as the version you downloaded or if the Java Console menu option is grayed out, the software is not registered.
Configuring the DRAC 4 Network Settings Using the Option ROM The DRAC 4 contains an integrated NIC with a default IP address of 192.168.0.120 and a default gateway of 192.168.0.1. To use the DRAC 4 IDE Option ROM utility to configure these settings and a limited number of additional DRAC 4 network settings, perform the following steps: 1 Access the DRAC 4 IDE Option ROM utility during the managed system’s boot process.
Table 2-1. DRAC 4 IDE Option ROM Utility Properties (continued) Properties Description DNS Current Configuration Displays the current IP address assigned to the DHCP server. NIC TCP/IP Configuration Options Use DHCP is: Indicates whether the DHCP system has assigned the DRAC 4 IP address or whether the DRAC 4 is using a preset static IP address. The available settings are Enabled and Disabled. Press to toggle the setting. When this option is selected, the other options in this group are grayed out.
Table 2-1. DRAC 4 IDE Option ROM Utility Properties (continued) Properties LAN Duplex Setting Description Indicates the DRAC 4 NIC duplex setting. The available settings are Half Duplex and Full Duplex. When set to Half Duplex, the NIC communicates in one direction at a time, indicating that the NIC can only receive or transmit information at any given moment. When set to Full Duplex, the NIC communicates in both directions simultaneously. Press to toggle to this setting.
Table 2-1. DRAC 4 IDE Option ROM Utility Properties (continued) Properties Static Domain Name Description The default setting is Disabled. The default static domain name is MYDOMAIN. Press to toggle the setting. When this option is selected, the static domain name is displayed. You can modify the domain name only when toggling from the Disabled setting by pressing . However, if Use DHCP (described earlier in this table) is set to Disabled, you cannot set Static Domain Name to Disabled.
4 Press to save the changes or to return to the setup menu. NOTE: When the DRAC 4 registers with the DNS server, it adds an extra line with a long string of characters. This TXT entry in the database is an encrypted string that is used to uniquely identify the owner of the DDNS entry and to serialize update operations. The TXT entry is associated with the RAC DDNS name. NOTE: The DRAC 4 DDNS implementation requires that DNS servers be configured to allow non-secure updates.
• Repair utility (diskette-based update): This update restores all DRAC 4 configurations back to factory defaults. Go to the Dell Support website at support.dell.com, download the appropriate DRAC 4 firmware image file, and follow the instructions to create two diskettes. Insert the first diskette into the system to be updated and follow the instructions on the screen. NOTICE: The Repair utility is only supported when used locally.
Table 2-2. DRAC 4 Interfaces Interface Description Web-based interface Connects to the managed system using a supported Web browser through the DRAC 4 NIC. For a list of supported Web browsers, see "Supported Web Browsers." racadm CLI Connects to the managed system using a remote console. You can execute racadm commands (racadm remote capability option [-r]) or connect to the management station using its IP address. NOTE: The racadm remote capability is supported only on management stations.
You can access the DRAC 4 Web-based interface through the DRAC 4 NIC by using a supported Web browser, or through Server Administrator or IT Assistant. Accessing the DRAC 4 Using a Supported Web Browser 1 Open a Web browser window. 2 In the Address field, type the DRAC 4 IP address. 3 Log in with your DRAC 4 user name and password. The default user name and password are root and calvin, respectively. See the remote access interface online help for more information.
The following list describes basic software information for using a DRAC 4 with the Red Hat Enterprise Linux operating system: • To verify that the DRAC 4 event server for the managed system is loaded, type the following command: service racsvc status • To start, stop, get status of, restart, or reload the racsrvc service, type the following command: service racsvc where is start, stop, status, or probe.
Additional Information Removing the DRAC 4 See the Installation and Troubleshooting Guide included with your system for information about removing expansion cards, such as the DRAC 4. Removing DRAC 4-Related Applications and Drivers 1 Remove the RAC module included with Server Administrator by uninstalling Server Administrator. a Click Start and select Settings→Control Panel→Add or Remove Programs. b In the Add or Remove Programs window, select and uninstall Server Administrator.
Installing and Setting Up the DRAC 4
Configuring the DRAC 4 to Use a Serial or Telnet Text Console 3 The DRAC 4 provides serial and telnet command interfaces designed to perform all of the configuration and systems management functions using the DRAC 4 Web-based interface or racadm CLI. This section provides information about the serial/telnet text console features, and explains how to set up your system so you can perform systems management actions through a serial/telnet console.
• Menu-based VT-100 block screen interface that provides easy operation of commonly used commands including reset, power-on, and power-off NOTE: Because the racadm command does not have access to a file system on a serial or telnet console, several options (such as reading or writing a file) are not supported by the racadm command through a serial or telnet console. For more information about supported racadm commands for the serial and telnet consoles, see "Using the Serial and racadm Commands.
6 Set the Console Redirection screen to the following settings: Console Redirection – Serial Port 1 Redirection After Boot – Disabled 7 Press to exit the System Setup program to complete the System Setup program configuration. Configuring Red Hat Enterprise Linux for Serial Redirection During Boot NOTE: The following instructions are specific to the Red Hat Enterprise Linux GRand Unified Bootloader (GRUB). Similar changes would be necessary for using a different boot loader.
Table 3-1. Sample File: /etc/grub.con # grub.conf generated by anaconda # Note that you do not have to rerun grub after making changes to this file # NOTICE: You do not have a /boot partition. This means that # all kernel and initrd paths are relative to /, e.g. # root (hd0,0) # kernel /boot/vmlinuz-version ro root= /dev/sdal # initrd /boot/initrd-version.img #boot=/dev/sda default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.
Additional information for editing the grub.conf: • You may need to disable GRUB's graphical interface and use the text-based interface; otherwise, the GRUB screen will not be displayed in RAC console redirection. To do so, comment out the line starting with splashimage. • If you have multiple options in GRUB and you want all of them to start a console session through the RAC serial connection, add console= ttyS1,57600 to all options.
Table 3-2. Sample File: /etc/innitab # # inittab This file describes how the INIT process should set up # the system in a certain run-level. # # Author: Miquel van Smoorenburg,
Table 3-2. Sample File: /etc/innitab (continued) # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now. # This does, of course, assume you have power installed and your # UPS is connected and working correctly.
Edit the file /etc/securetty by adding a new line with the name of the serial tty for COM1: ttyS1 The sample file (see Table 3-3) shows the new line. Table 3-3. Sample File: /etc/securetty vc/1 vc/2 vc/3 vc/4 vc/5 vc/6 vc/7 vc/8 vc/9 vc/10 vc/11 tty1 tty2 tty3 tty4 tty5 tty6 tty7 tty8 tty9 tty10 tty11 ttyS1 Enabling the Serial/Telnet Console on the DRAC 4 You can enable the serial/telnet console locally or remotely.
Enabling the Serial/Telnet Console Locally NOTE: You (the current user) must have Configure DRAC 4 permission in order to perform the steps in this section. To enable the serial/telnet console from the managed system, type the following local racadm CLI commands from a command prompt. NOTE: For detailed information about how to use the racadm CLI, serial/telnet, and racadm commands, see "Using the Serial and racadm Commands.
Using racadm Locally To type racadm commands locally, type the commands from a command prompt on the managed system: racadm config -g -o
Using the Secure Shell (SSH) Secure Shell (SSH) is a command line session that includes the same capabilities as a telnet session, but with higher security. The DRAC 4 supports SSH version 2 with password authentication. SSH is enabled on the DRAC 4 when you install or update your DRAC 4 firmware. NOTE: SSH is not available for the first fifteen minutes of operation after installing/updating the DRAC 4 firmware. During this time the host keys are generated internally.
Supporting Cryptography Schemes The DRAC 4 SSH implementation supports multiple cryptography schemes: • Asymmetric Cryptography: – • • • 60 Diffie-Hellman DSA/DSS 512-1024 (random) bits per NIST specification Symmetric Cryptography: – AES256-CBC – RIJNDAEL256-CBC – AES192-CBC – RIJNDAEL192-CBC – AES128-CBC – RIJNDAEL128-CBC – BLOWFISH-128-CBC – 3DES-192-CBC – ARCFOUR-128 Message Integrity: – HMAC-SHA1-160 – HMAC-SHA1-96 – HMAC-MD5-128 – HMAC-MD5-96 Authentication: – Passwor
Connecting to the Managed System Through the Local Serial Port or Telnet Management Station (Client System) The managed system provides access between the DRAC 4 and the serial port on your system to enable you to power on, power off, or reset the managed system and access logs. The serial console is available on the DRAC 4 through the managed system external serial connector. Only one serial client system (management station) can be active at any given time.
Table 3-4.
Configuring Red Hat Enterprise Linux Minicom for Serial Console Emulation Minicom is the serial port access utility for Red Hat Enterprise Linux. The following steps are valid for configuring Minicom version 1.8. Other Minicom versions may differ slightly but require the same basic settings. Use the information in "Required Minicom Settings for Serial Console Emulation" to configure other versions of Minicom. Configuring Minicom Version 1.
15 Select Exit From Minicom and press . 16 At the command shell prompt, type minicom . 17 To expand the Minicom window to 80 x 25, drag the corner of the window. 18 To exit Minicom, press , , . NOTE: If you are using Minicom for serial text console redirection to configure the managed system BIOS, it is recommended that you turn on color in Minicom. To turn on color, at the command prompt type minicom -c on.
Configuring HyperTerminal for Serial Console Redirection HyperTerminal is the Microsoft Windows serial port access utility. To set the size of your console screen appropriately, use Hilgraeve’s HyperTerminal Private Edition version 6.3. To configure HyperTerminal for serial console redirection, perform the following steps: 1 Start the HyperTerminal program. 2 Type a name for the new connection and click OK.
Configuring Red Hat Enterprise Linux XTerm for Telnet Console Redirection NOTE: When you are using the connect com2 command through a telnet console to display the System Setup screens, set the terminal type to ANSI in System Setup and for the telnet session.
Using a Serial or Telnet Console NOTE: If you are running Windows XP or Windows 2003 and experience problems with characters in a DRAC 4 telnet session, navigate to the Microsoft Support website located at support.microsoft.com website and search for Knowledge Base article 824810, which provides a hot fix for this issue. This problem may manifest itself as an apparently frozen login (the return key does not respond and the password prompt does not appear).
Configuring the DRAC 4 to Use a Serial or Telnet Text Console
Managing and Recovering a Remote System 4 The DRAC 4 provides a Web-based interface and the racadm CLI (command-line interface), which allows you to perform the following tasks: • Configure the DRAC 4 properties and users • Perform remote management tasks • Troubleshoot a remote (managed) system for problems For routine systems management, use the DRAC 4 Web-based interface.
Logging In NOTE: To log in, you must have Log In to DRAC 4 permission. You can log in as either a DRAC 4 user or as a Microsoft® Active Directory® user. The default user name and password is root and calvin, respectively. To log in, perform the following steps: 1 In the User Name field, type one of the following: • Your DRAC 4 user name. For example: john_doe The DRAC 4 user name for local users is case sensitive. • Your Active Directory user name.
Adding and Configuring DRAC 4 Users and Alerts To manage your system with the DRAC 4, you can create unique users with specific administrative permissions (role-based authority). Additionally, you can configure alerts that are emailed to different users.
Configuring User Permissions Under User Permissions, click the User Group drop-down menu and select the user’s permissions group. Use Table 4-2 to determine the User Group (permissions) for the user. Table 4-2.
Configuring email Alerts by Severity The information under email Alerts in the Web-based interface enables you to select the events—according to their severity—that generate an email alert. Select the severity of the temperature, voltage, fan, or miscellaneous sensor for the generated e-mail alert. You can specify three severities: • Informational (lowest severity) • Warning (medium severity) • Severe (highest severity) Alerts will be sent to the email address you typed in Enabling User email Alerts.
Table 4-4. email Alert Severity (continued) Severity Description Apply Changes Adds a new DRAC 4 user or commits changes made to the current DRAC 4 user. Go Back To User Opens the DRAC 4 Users page. Configuration Page Printing the Page Click the Print button in the top-right corner of the screen to print the Add/Configure DRAC 4 User page. Configuring the DRAC 4 NIC 1 Click the Configuration tab and select Network.
Table 4-5. DRAC 4 Network Configuration Page Settings (continued) Setting Description Static IP Address Specifies or edits the static IP address for the DRAC 4 NIC. To change this setting, you must first deselect the Use DHCP (For NIC IP Address) check box. Static Gateway Specifies or edits the static gateway for the DRAC 4 NIC. To change this setting, deselect the Use DHCP (For NIC IP Address) check box. Static Subnet Mask Specifies or edits the static subnet mask for the DRAC 4 NIC.
Table 4-5. DRAC 4 Network Configuration Page Settings (continued) Setting Description Auto Negotiation Determines whether the DRAC 4 automatically sets the Duplex Mode and Network Speed by communicating with the nearest router or hub (On) or allows you to set the Duplex Mode and Network Speed manually (Off). Duplex Mode Sets the duplex mode to full or half to match your network environment. This option is not available if Auto Negotiation is set to On.
Adding and Configuring SNMP Alerts NOTE: You must have Configure DRAC 4 permission to add or delete an SNMP alert; otherwise, these options will not be available. 1 Click the Configuration tab and select Alerts. 2 In the Add/Configure SNMP Alerts page, add, delete, configure, and test the SNMP alerts. NOTE: The DRAC 4 supports three severity levels: Informational, Warning, and Severe. Some events support only the informational severity level because they deliver only a message.
Configuring Alerts by Severity 1 Use the Severity Configuration section to select which events, according to their severity, will cause an SNMP alert to be sent to the IP address you typed in Configuring Alert Properties. 2 Select the severity of the sensor for which you want an SNMP alert generated. 3 Use Table 4-8 to decide which events you want to cause an SNMP alert. Table 4-8.
Viewing Information About Existing Alerts Click an alert in the SNMP Alert List to display the properties for existing SNMP alerts. See Table 4-9 for descriptions. NOTE: During the first 40 seconds after a DRAC 4 reset, the DRAC 4 is synchronizing with the system BMC and the managed system service. If an alert is generated during this time, some of the values may be reported as "unknown." The time field contains the number of seconds since DRAC 4 startup.
Other Options The SNMP Alerts and Add/Configure SNMP Alerts pages provide the buttons in Table 4-10 in the top-right corner of the screen. Table 4-10.
1 Open a Windows Explore window. 2 In the Address field, type the path to the firmware image. For example: C:\Updates\V1.0\ The default firmware image name is firmimg.dml. 3 Click Update Firmware. The update may take several minutes to complete. When the update is completed, a dialog box appears. 4 Click OK to close the session and automatically log out. 5 After the DRAC 4 resets, click Log In to log in to the DRAC 4 again.
Certificate Signing Request (CSR) A CSR is a digital request to a Certificate Authority (CA) for a secure server certificate. Secure server certificates ensure the identity of a remote system and ensure that information exchanged with the remote system cannot be viewed or changed by others. To ensure this security for your DRAC 4, it is strongly recommended that you generate a CSR and submit the CSR to a CA.
The buttons in Table 4-12 are available on the Viewing a Server Certificate page. Table 4-12. View Server Certificate Page Buttons Button Action Print Prints the contents of the open window to your default printer Go Back to Returns to the previous page Certificate Management Page Generating, Uploading, and Viewing a Server Certificate 1 Click the Configuration tab and click Security.
Generating a Certificate Signing Request 1 Type a value in the field for each CSR attribute. Table 4-14 describes what values are valid for each required field. The Email Address field is optional. You may type your company's email address, or any email address that you want to have associated with the CSR. NOTICE: Each new CSR overwrites any previous CSR on the firmware.
The buttons in Table 4-15 are available on the Certificate Signing Request Generation page. Table 4-15. Certificate Signing Request Generation Page Buttons Button Action Print Prints the contents of the window's data area using the default printer for your system. Go Back to Certificate Management Page Returns to the previous page. Generate Generates a CSR and then prompts you to either open it or save it in the directory you specify.
Viewing System Information The System Summary page displays system information (see Table 4-17 through Table 4-20) and DRAC 4 session information (see Table 4-21). System Information This section provides information about the types of system information. Table 4-17. Types of System Information Field Description DRAC 4 Information Information about the DRAC 4 firmware and hardware. System Information Information about the system on which the DRAC 4 is installed.
Table 4-18. DRAC 4 Information Fields (continued) Field Description Current IP Gateway IP address of the switch or router servicing the DRAC 4 NIC. Current IP Netmask IP address of the subnet to which the DRAC 4 is connected. DHCP Enabled? (Default No) Yes if DHCP is enabled on the DRAC 4. No if DHCP is disabled. Use DHCP to If TRUE, the primary and secondary DNS server addresses are Obtain DNS Server obtained from the DHCP server (rather than the static Addresses settings).
Watchdog Information Table 4-20. Watchdog Information Fields Field Description Recovery Action Specifies whether to reset, power cycle, shut down, or to not take action if the system hangs. Present countdown Number of seconds remaining before the watchdog initiates the value recovery action. This value may fluctuate because it is displayed in real time. Initial countdown value Number of seconds from where the countdown begins.
Table 4-21. Session Status Fields (continued) Field Description Login Date/Time Time and date that the user logged in according to the DRAC 4 internal clock Active Consoles One of the following consoles per session: Console Redirect — A console redirection session is active. Virtual Media — A virtual media session is active.
Managing Power on a Remote System The DRAC 4 allows you to remotely perform several power management actions on the managed system to try and recover after a system crash or other problem. Use the Server Control page to perform an orderly shutdown through the operating system when rebooting, and power the system on or off. NOTE: You must have Execute Server Action Commands permission to perform power management actions.
Other Options The Server Control page provides buttons (see Table 4-22) in the top-right corner of the screen. Table 4-22. Server Control Page Buttons (Top Right) Button Action Print Prints the Server Control page Refresh Reloads the Server Control page Using the SEL The System Event Log (SEL) page displays system-critical events that occur on the managed system.
Table 4-24. SEL Buttons (Top Right) Button Action Print Prints the SEL. Clear Log Clears the SEL. NOTE: The Clear Log button appears only if you have Clear Logs permission. Save As Opens a pop-up window that enables you to save the SEL to a directory of your choice. Refresh Reloads the SEL page. Using the DRAC 4 Log The DRAC 4 Log is a persistent log maintained in the DRAC 4 firmware. The log contains a list of user actions (such as log in and log out) and alerts issued by the DRAC 4.
Using the DRAC 4 Log Page Buttons The DRAC 4 Log page provides the following buttons (see Table 4-26). Table 4-26. DRAC 4 Log Buttons Button Action Print Prints the DRAC 4 Log page. Clear Log Clears the DRAC 4 Log entries. NOTE: The Clear Log button only appears if you have Clear Logs permission. Save As Opens a pop-up window that enables you to save the DRAC 4 Log to a directory of your choice. Refresh Reloads the DRAC 4 Log page.
Table 4-27. Last Crash Screen Page Buttons Button Action Print Prints the Last Crash Screen page. Save As Opens a pop-up window that enables you to save the Last Crash Screen to a directory of your choice. Refresh Reloads the Last Crash Screen page. Delete Last Crash Screen Deletes the Last Crash Screen page. NOTE: Due to fluctuations in the watchdog timer, the Last Crash Screen has a higher probability of not being captured when the System Reset Timer is set to a value less than 30 seconds.
Table 4-28. Diagnostic Commands Command Description arp Displays the contents of the Address Resolution Protocol (ARP) table. ARP entries may not be added or deleted. ifconfig Displays the contents of the network interface table. netstat Prints the content of the routing table.
The Diagnostic Console page provides buttons (see Table 4-29) in the top-right corner of the screen. Table 4-29. Diagnostic Console Page Buttons (Top Right) Button Action Refresh Reloads the Diagnostic Console page. Troubleshooting Network Problems The internal DRAC 4 Trace Log can be used by administrators to debug alerting, or networking from the DRAC 4. The Trace Log can be accessed from the DRAC 4 Web-based interface by clicking the Diagnostics tab, and typing the gettracelog command.
Table 4-30. DRAC 4 Network Error Codes (continued) Error Code Description 0x5016 EINVALID: An argument is invalid. 0x5017 ENFILE: An internal table has run out of space. 0x5020 EPIPE: The connection is broken. 0x5023 EWOULDBLOCK: The operation would block; socket is nonblocking. 0x5024 EINPROGRESS: Socket is nonblocking; connection not completed immediately. 0x5025 EALREADY: Socket is nonblocking; previous connection attempt not complete.
Table 4-30. DRAC 4 Network Error Codes (continued) Error Code Description 0x5041 EHOSTUNREACH: The destination host could not be reached. 0x5046 ENIDOWN: NI_INIT returned -1. 0x5047 ENMTU: The MTU is invalid. 0x5048 ENHWL: The hardware length is invalid. 0x5049 ENNOFIND: The route specified cannot be found. 0x504A ECOLL: Collision in select call; these conditions already selected by another task. 0x504B ETID: The task ID is invalid.
Table 4-31. DRAC 4 Log Messages Message ID Description Suggested Action RAC186W DHCP: no response from server, need LAN address. The NIC cannot be enabled until a response is received from the DHCP server. Provides information only. No specific corrective action is indicated. Ensure that the DHCP server is operational. RAC188W DHCP: no response from Provides information only. No server, warm starting with . indicated.
Table 4-31. DRAC 4 Log Messages (continued) Message ID Description Suggested Action RAC030A DRAC 4 time was set Provides information only. RAC048A DRAC 4 firmware update was Provides information only. initiated. RAC049A DRAC 4 Firmware Update was initiated with config to defaults option. Provides information only. RAC064A Clear crash screen Provides information only. RAC065A DRAC 4 hard reset, delay was initiated Provides information only.
Table 4-31. DRAC 4 Log Messages (continued) Message ID Description Suggested Action RAC156A Session cancelled from , max log in attempts exceeded. RAC157A Session cancelled from , due to inactivity. Provides information only. RAC158A Nonvalidated session from cancelled. Provides information only. RAC159A Start console redirection. Provides information only. RAC160A End console redirection. Provides information only.
Frequently Asked Questions Table 4-32 lists frequently asked questions and answers. Table 4-32. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer The following message is displayed for unknown reasons: As part of discovery, IT Assistant attempts to verify the get and set community names of the device. In IT Assistant, you have the get community name = public and the set community name = private. By default, the community name for the DRAC 4 agent is public.
Table 4-32.
Table 4-32. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer When accessing the DRAC 4 Web-based interface, I get a security warning stating the SSL certificate was issued by a certificate authority (CA) that is not trusted. DRAC 4 includes a default DRAC 4 server certificate to ensure network security for the Webbased interface and remote racadm features. This certificate was not issued by a trusted CA.
5 Using the DRAC 4 With Microsoft Active Directory A directory service is used to maintain a common database of all information needed for controlling users, computers, printers, etc. on a network. If your company uses the Microsoft® Active Directory® service software, it can be configured to give you access to the DRAC 4, allowing you to add and control DRAC 4 user privileges to your existing users in your Active Directory software.
Extended Schema Active Directory Overview There are two ways to enable Extended Schema Active Directory: • Via the DRAC 4 web-based user interface. See "Configuring the DRAC 4 with Extended Schema Active Directory and the Web-Based Interface." • Via the RACADM CLI tool. See "Configuring the DRAC 4 with Extended Schema Active Directory and the racadm CLI." Active Directory Schema Extensions The Active Directory data is a distributed database of Attributes and Classes.
Overview of the RAC Schema Extensions To provide the greatest flexibility in the multitude of customer environments, Dell provides a group of properties that can be configured by the user depending on the desired results. Dell has extended the schema to include an Association, Device, and Privilege property. The Association property is used to link together the users or groups with a specific set of privileges to one or more RAC devices.
Figure 5-1. Typical Setup for Active Directory Objects Association Object User(s) Group(s) Privilege Object RAC Device Object(s) RAC4 Privilege Object You can create as many or as few association objects as required. However, you must create at least one Association Object, and you must have one RAC Device Object for each RAC (DRAC 4) on the network that you want to integrate with Active Directory for Authentication and Authorization with the RAC (DRAC 4).
Figure 5-2. Setting Up Active Directory Objects in a Single Domain AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To set up the objects for the single domain scenario, perform the following tasks: 1 Create two Association Objects. 2 Create two RAC Device Objects, RAC1 and RAC2, to represent the two DRAC 4 cards. 3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privileges. 4 Group user1 and user2 into Group1.
Figure 5-3 shows how you can set up the Active Directory objects in multiple domains. In this scenario, you have two DRAC 4 cards (RAC1 and RAC2) and three existing Active Directory users (user1, user2, and user3). User1 is in Domain1, and user2 and user 3 are in Domain2. You want to give user1 and user 2 an administrator privilege to both DRAC 4 cards and give user3 a login privilege to the RAC2 card. Figure 5-3.
4 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privileges. 5 Group user1 and user2 into Group1. The group scope of Group1 must be Universal. 6 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege Objects in AO1, and RAC1, RAC2 as RAC Devices in AO1. 7 Add User3 as Members in Association Object 2 (AO2), Priv2 as Privilege Objects in AO2, and RAC2 as RAC Devices in AO2.
You can extend your schema using one of the following methods: • Dell Schema Extender utility • LDIF script file. If you use the LDIF script file, the Dell organizational unit will not be added to the schema.
Table 5-1. Class Definitions for Classes Added to the Active Directory Schema Class Name Assigned Object Identification Number (OID) dellRacDevice 1.2.840.113556.1.8000.1280.1.1.1.1 dellAssociationObje 1.2.840.113556.1.8000.1280.1.1.1.2 ct dellRAC4Privileges 1.2.840.113556.1.8000.1280.1.1.1.3 dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4 dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5 Table 5-2. dellRacDevice Class OID 1.2.840.113556.1.8000.1280.1.1.1.
Table 5-4. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description This class is used to define the privileges (Authorization Rights) for the DRAC 4 device. Class Type Auxiliary Class SuperClasses None Attributes dellIsLoginUser dellIsCardConfigAdmin dellIsUserConfigAdmin dellIsLogClearAdmin dellIsServerResetUser dellIsConsoleRedirectUser dellIsVirtualMediaUser dellIsTestAlertUser dellIsDebugCommandAdmin Table 5-5. dellPrivileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.
Table 5-6. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description This is the main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 5-7. List of Attributes Added to the Active Directory Schema Attribute Name/Description Assigned OID/Syntax Object Identifier dellPrivilegeMember 1.2.840.113556.1.8000.1280.1. FALSE 1.2.1 List of dellPrivilege Objects that belong to this Attribute.
Table 5-7. List of Attributes Added to the Active Directory Schema (continued) Attribute Name/Description Assigned OID/Syntax Object Identifier dellIsUserConfigAdmin 1.2.840.113556.1.8000.1280.1. TRUE 1.2.5 TRUE if the user has User Configuration rights on the device. delIsLogClearAdmin TRUE if the user has Log Clearing rights on the device. dellIsServerResetUser TRUE if the user has Server Reset rights on the device. dellIsConsoleRedirectUser Single Valued Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.
Table 5-7. List of Attributes Added to the Active Directory Schema (continued) Attribute Name/Description Assigned OID/Syntax Object Identifier dellIsDebugCommandAdmin 1.2.840.113556.1.8000.1280.1. TRUE 1.2.11 TRUE if the user has Debug Command Admin rights on the device. dellSchemaVersion The Current Schema Version is used to update the schema. dellRacType This attribute is the Current Rac Type for the dellRacDevice object and the backward link to the dellAssociationObjectMembers forward link.
Snap-In option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For more information about the Active Directory Users and Computers snap-in, see your Microsoft documentation. Installing the Administrator Pack You must install the Administrator Pack on each system that is managing the Active Directory DRAC 4 Objects.
Adding DRAC 4 Users and Privileges to Active Directory Using the Dell-extended Active Directory Users and Computers snap-in, you can add DRAC 4 users and privileges by creating RAC, Association, and Privilege objects. To add each type of object, perform the following procedures: • Create a RAC Device Object • Crate a Privilege Object • Create an Association Object • Add Objects to an Association Object Creating a RAC Device Object 1 In the MMC Console Root window, right-click a container.
Creating an Association Object The Association Object is derived from a Group and must contain a Group Type. The Association Scope specifies the Security Group Type for the Association Object. When you create an Association Object, you must choose the Association Scope that applies to the type of objects you intend to add. Selecting Universal, for example, means that association objects are only available when the Active Directory Domain is functioning in Native Mode or above.
Adding Privileges 1 Select the Privileges Object tab and click Add. 2 Type the Privilege Object name and click OK. Click the Products tab to add one or more RAC devices to the association. The associated devices specify the RAC devices connected to the network that are available for the defined users or user groups. Multiple RAC devices can be added to an association object. Adding RAC Devices or RAC Device Groups 1 Select the Products tab and click Add.
8 Click Apply to save the Active Directory settings. 9 Click Upload Active Directory CA Certificate to upload your domain forest Root CA certificate into the DRAC 4. The domain controllers' SSL certificates should have been signed by the root CA. Have the root CA certificate available on your management station accessing the DRAC 4 (see "Exporting the Domain Controller Root CA Certificate"). 10 Click the Configuration tab and select Network.
Configuring the DRAC 4 with Extended Schema Active Directory and the racadm CLI Use the following commands to configure the DRAC 4 Active Directory Feature with Extended Schema using the racadm CLI instead of the Web-based interface.
To specify an LDAP server, type: racadm config -g cfgActive Directory -o cfgADDomainController To specify a Global Catalog server, type: racadm config -g cfgActive Directory -o cfgGlobalCatalog NOTE: If you specify the IP address as 0.0.0.0, DRAC 4 will not search for any server. NOTE: You can specify a list of LDAP or Global Catalog servers separated by commas.
Standard Schema Active Directory Overview As shown in Figure 5-4, using standard schema for Active Directory integration requires configuration on both Active Directory and the DRAC 4. On the Active Directory side, a standard group object is used as a role group. A user with DRAC 4 access is a member of the role group. In order to give this user access to a specific DRAC 4 card, the role group name and its domain name need to be configured on the specific DRAC 4 card.
Table 5-8.
Configuring Standard Schema Active Directory to Access Your DRAC 4 You need to perform the following steps to configure the Active Directory before an Active Directory user can access the DRAC 4: 1 On an Active Directory server (domain controller), open the Active Directory Users and Computers Snap-in. 2 Create a group or select an existing group.
racadm sslcertupload -t 0x2 -f racadm sslcertdownload -t 0x1 -f NOTE: For Bit Mask number values, see Table B-3.
2 Enable SSL on each of your domain controllers by installing the SSL certificate for each controller. a Click Start and select Settings→Control Panel→Administrative Tools→Domain Security Policy. b Expand the Public Key Policies folder, right-click Automatic Certificate Request Settings and click Automatic Certificate Request. c In the Automatic Certificate Request Setup Wizard, click Next and select Domain Controller. d Click Next and click Finish.
15 Upload the certificate you saved in step 14 to the DRAC 4. To upload the certificate using racadm CLI commands, see "Configuring the DRAC 4 with Extended Schema Active Directory and the racadm CLI." To upload the certificate using the Web-based interface, perform the following steps: a Open a supported Web browser window. See "Supported Web Browsers." b Log in to the DRAC 4 Web-based interface. c Expand the System tree and click Remote Access.
4 Install the RAC SSL Certificate in each domain controller’s Trusted Root Certification Authority. If you have installed your own certificate, ensure that the CA signing your certificate is in the Trusted Root Certification Authority list. If the Authority is not in the list, you must install it on all your Domain Controllers. 5 Click Next and select whether you would like Windows to automatically select the certificate store based on the type of certificate, or browse to a store of your choice.
the DRAC card for validation. The DRAC card validates the CA certificate and extracts the private key from the certificate, which is used to decrypt transmissions between the DRAC card and the Active Directory server. NOTE: Depending on your network configuration, authentication may require up to 90 seconds to complete. Frequently Asked Questions Table 5-9 lists frequently asked questions and answers. Table 5-9.
Table 5-9. Using the DRAC 4 With Active Directory: Frequently Asked Questions (continued) Question Answer Are there any restrictions on Domain Controller SSL configuration? Yes. All Active Directory servers’ SSL certificates in the forest must be signed by the same root CA since DRAC 4 only allows uploading one trusted CA SSL certificate.
Table 5-9. Using the DRAC 4 With Active Directory: Frequently Asked Questions (continued) Question Answer What can I do if I cannot log into Troubleshoot as follows: the DRAC 4 using Active Directory • Ensure that you have checked the Enable authentication? How do I Active Directory box on the DRAC 4 Active troubleshoot the issue? Directory configuration page. • Ensure that the DNS setting is correct on the DRAC 4 Networking configuration page.
Using Console Redirection 6 Overview The DRAC 4 console redirection feature allows you to access the local server console remotely in either graphic or text mode. Today, with the power of networking and the Internet, you do not have to sit in front of each server to perform all the routine maintenance. You can manage the servers from another city or even from the other side of the world from your desktop or laptop computer. You can also share the information with others—remotely and instantly.
Keyboard, Video, and Mouse Encryption The DRAC 4 firmware version 1.40 and later provides RC4 128-bit encryption for your keyboard, video, and mouse functions. This encryption feature provides a secure environment when transmitting data and video to and from the DRAC 4 in the managed system. All keyboard and mouse functions are encrypted by default.
Table 6-1. Console Redirection Page Information Information Description Current console redirection status Displays the status of console redirection. Maximum console redirection sessions Displays the number of console redirection sessions that are available. Current console redirection sessions Displays the number of active console redirection sessions. Table 6-2. Other Console Redirection Page Buttons Button Action Open Opens the Console Redirection page.
Table 6-3. Console Redirection Viewer Page Buttons Button Action Keyboard Macros Selects and types one of the following keystroke combinations that cannot be typed using your local keyboard without affecting your local system. <(Left) Shift><(Right) Shift> Send Sends the selected keystroke macro.
Table 6-3. Console Redirection Viewer Page Buttons (continued) Button Action Create Snapshot Captures the current remote system screen to a .jpg file on the local system. A dialog box is displayed that allows you to save the .jpg file to a specified location. Close Exits the Console Redirection page. Frequently Asked Questions Table 6-4 lists frequently asked questions and answers. Table 6-4.
Table 6-4. Using Console Redirection: Frequently Asked Questions (continued) Question Answer During Console Redirection, the keyboard and mouse became locked after coming back from hibernation on a Windows 2000 system. What caused this to happen? To resolve this issue, you must reset the DRAC 4 by running the racadm racreset command. If the problem is still not resolved, you must reset the DRAC 4 by running the racadm racreset hard command.
Table 6-4. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why do I get a blank screen on the remote console after completing a Windows 2000 installation? The managed system does not have the correct ATI video driver. The DRAC 4 Console Redirection will not run correctly on the SVGA video driver on the Windows 2000 distribution CD.
Table 6-4. Using Console Redirection: Frequently Asked Questions (continued) Question Answer How can I set the server display to 256 colors on Windows 2003? To set the server display to 256 colors: • Right-click desktop. • Select Properties. • Click the Settings tab. • Click the Advanced button. • Click the Adapter tab. • Click the List All Modes... button. • Select, for example:1024x768, 256 Colors, 60 Hertz.
Table 6-4. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why doesn’t the mouse sync in DOS when performing Console Redirection? The Dell BIOS is emulating the mouse driver as a PS/2 mouse. By design, the PS/2 mouse uses relative position for the mouse pointer, which causes the lag in syncing. DRAC 4 has a USB mouse driver, which allows absolute position and closer tracking of the mouse pointer.
Table 6-4. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why doesn’t the vKVM mouse work with Red Hat Enterprise Linux, version 2.1, update 3? Red Hat Enterprise Linux, version 2.1 does not fully support multiple input devices. You must manually select the USB mouse if there is a PS/2 mouse already connected to the managed system.
Table 6-4. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why can't I see the bottom of the server screen from the vKVM window? Make sure the server screen resolution is in one of the supported resolutions (640x480, 800x600, and 1024x768).
Table 6-4. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why does console On systems running Windows 2000 that can boot to multiple redirection fail to operating systems, change the default boot operating system show the operating by performing the following steps: system boot menu in 1 Right-click the My Computer icon and select Properties. the Chinese, 2 Click the Advanced tab. Japanese, and Korean 3 Click Startup and Recovery.
Configuring and Using Virtual Media 7 Overview The Virtual Media feature provides the managed system with a virtual floppy diskette drive and a virtual CD drive, which can use standard media from anywhere on the network. Figure 7-1 shows the overall architecture of virtual media. Figure 7-1.
The managed system is configured with a DRAC 4 card. The virtual CD and floppy drives are two electronic devices embedded in the DRAC 4 that are controlled by the DRAC 4 firmware. These two devices are present on the managed system’s operating system and BIOS at all times, whether virtual media is connected or disconnected. The management station provides the physical media or image file across the network.
Installing the Virtual Media Plug-In The virtual media browser plug-in must be installed on your management station to use the virtual media feature. After you open the DRAC 4 user interface and launch the Virtual Media page, the browser automatically downloads the plug-in, if required. If the plug-in is successfully installed, the Virtual Media page displays a list of floppy diskettes and optical disks that connect to the virtual drive.
Using the Virtual Media Feature NOTE: If your system is running a supported 64-bit operating system (see Table 1-4), install and run a supported 32-bit Web browser (see Table 1-5). Otherwise, you may experience unexpected results when running Virtual Media and other processes. See "Supported Web Browsers for 64-Bit Operating Systems" for more information. To use the virtual media feature, perform the following steps: 1 Open a supported Web browser on your management station. See "Supported Web Browsers.
3 Scroll to the boot sequence and press . In the pop-up window, the virtual CD and virtual floppy drives are listed along with other regular boot devices. 4 Ensure that the virtual drive is enabled and that it is the first device with bootable media present among the listed devices. If it is not the first device, you can change the boot order by following the on-screen instructions. 5 Save the changes and exit. The managed system reboots.
Using Virtual Media When the Server’s Operating System Is Running Windows-Based System On Windows systems, the virtual media drives are mounted and given a drive letter. Using the virtual drives from within Windows is similar to using your physical drives. Once connected to the media at a management station, the media is available at the system by simply clicking the drive and browsing its content.
After system restart, the DRAC 4 IDE Option ROM utility will time-out for up to 15 seconds (about 7.5 seconds per virtual device) when the virtual media feature is disabled. The virtual media feature is enabled by default.
To modify how the virtual floppy appears to the operating system (as a super-floppy drive or hard drive), use the racadm command to reconfigure the cfgFloppyEmulation object. NOTE: In the Windows Control Panel, Dell VSF and Dell Virtual VCD identify the Virtual Floppy and Virtual CD-ROM, respectively.
Frequently Asked Questions Table 7-2 lists frequently asked questions and answers. Table 7-2. Using Virtual Media: Frequently Asked Questions Question Answer When I boot my system, the • The Dell Virtual Media devices may have been following messages appear during disabled.
Table 7-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer I modified the virtual floppy device to emulate a super-floppy device and restarted my system. After restart, the drive letter(s) did not change. The Dell Virtual Media drive letter enumeration is assigned when the operating system is first installed or if the DRAC 4 IDE controller is deleted and rescanned by the Microsoft Windows Device Manager.
Table 7-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer Why do error messages like the following display on the console when Red Hat Enterprise Linux boots a Dell server with a DRAC 4 present? The Red Hat Enterprise Linux IDE driver writes all error responses that it receives to the console log for diagnostic purposes. However, in this case, the messages are not indications of any real errors and should be ignored. ... other console startup messages ...
Table 7-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer I am viewing the contents of a floppy drive or USB memory key. If I try to establish a Virtual Media connection using the same drive, I receive a connection failure and am asked to retry. Why? Simultaneous access to Virtual Floppy drives is not allowed. Before you virtualize the drive, close the application that you are using to view the drive contents. Do I need to install drivers on the No.
Table 7-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer What media can I boot from? DRAC 4 allows you to boot from any of the following bootable media: • CDROM media • 1.44 floppy disk • 1.44 floppy image • USB key • CD/DVD image file in ISO9660 format. How can I make my USB key bootable? Dell provides a Windows utility for formatting its USB Solid State devices as bootable devices on the Dell Resource CD that ships with a Dell system.
Table 7-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer How do I find my device names on Red Hat Enterprise Linux systems so I can mount them? You can look at the /etc/fstab file which lists the device names for all your devices. When you know the device name, then you can use the mount and umount command to mount and unmount your CD or floppy drives.
Table 7-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer What privileges do I need to You must have write privileges on the browser's install and use the Virtual Media directory tree in order to successfully install the plug-in on a Red Hat Enterprise Virtual Media plug-in. Linux management station? Can I use my virtual drives under Currently, the Virtual Media feature is not any version of Novell NetWare? supported under any version of the NetWare operating system.
Configuring and Using Virtual Media
Using the Serial and racadm Commands 8 The DRAC 4 provides serial and racadm commands that allow you to manage and configure the managed system locally or remotely. The serial/telnet console provides a set of serial commands. The serial commands, which include the racadm command, give you access to all of the text-based features supported by the DRAC 4 Web-based interface. The racadm CLI allows you to locally or remotely configure and manage your DRAC 4.
Starting a Text Console After you have logged into the DRAC 4 through your management station terminal software or by telnet, you can redirect the managed system text console by using connect com2, which is a serial/telnet command. Only one connect com2 client is supported at a time (out of four total sessions shared with the DRAC 4 Web-based interface). To connect to the managed system text console, type connect com2 from the DRAC 4 command prompt (displayed through Minicom or HyperTerminal).
If you type a command that is not supported on the system you are using, an error similar to the following is displayed. setsvctag: Firmware: UNSUPPORTED COMMAND Table 8-1 lists the serial/telnet commands. These commands are also supported as racadm commands. The descriptions and "man page" information including required syntax for the serial/telnet commands are identical for the racadm command.
Using the racadm CLI The racadm CLI commands can be run locally or remotely from the serial or telnet console command prompt or through a normal DOS or Linux command prompt. Use the racadm command to configure DRAC 4 properties, perform remote management tasks, or recover a crashed system. Table 8-2 lists the racadm command that you can type into the racadm CLI. When using the racadm CLI, type racadm help to display the entire racadm subcommand list, which lists all the commands supported by the DRAC 4.
Using the racadm CLI Remotely NOTICE: Configure the IP address on your DRAC 4 before using the racadm remote capability. For more information about initially configuring your DRAC 4, including a list of other documents you may need, see "Installing and Setting Up the DRAC 4." The racadm CLI provides a remote capability option (-r) that allows you to connect to the managed system and execute racadm subcommands from a remote console or management station.
racadm Options Table 8-3 lists the options for the racadm command. Table 8-3. racadm Command Options Option Description -r or Specifies the remote IP address of the controller. -r : if the DRAC 4 port number has been changed -i Tells racadm to interactively query the user for the user's user name and password. -u Specifies the user name that is used to authenticate the command transaction. If not specified, the default user name "racadmusr" is used.
Enabling and Disabling the racadm Remote Capability NOTE: It is recommended that you run these commands on your local system. The racadm CLI remote capability is enabled by default.
Table 8-5. racadm Subcommands Command Description help Lists DRAC 4 subcommands. help Lists usage statement for the specified subcommand. clearasrscreen Clears the last System Reset Timer screen (last blue screen). config/getconfig Configures the DRAC 4 and displays the DRAC 4 configuration. coredump Displays the last DRAC 4 coredump. coredumpdelete Deletes the coredump stored in the DRAC 4. fwupdate Executes or displays status on DRAC 4 firmware updates.
Table 8-5. racadm Subcommands (continued) testemail (see Email Test Command) Forces the DRAC 4 to send an email over the DRAC 4 NIC. testtrap (see Trap Test Command) Forces the DRAC 4 to send an SNMP over the DRAC 4 NIC. vmdisconnect Forces a virtual media connection to close. racadm Error Messages For information about racadm CLI error messages, see "Frequently Asked Questions" in this chapter.
The getconfig -f racadm.cfg subcommand requests the configuration of the DRAC 4 and generates a racadm.cfg file (you can choose any name for this file). NOTE: The generated .cfg file does not contain user passwords.
The .cfg file is first parsed to verify that valid group and object names are present and that some simple syntax rules are being followed. Errors are flagged with the line number in which the error was detected, and a simple message explains the problem. The entire file is parsed for correctness, and all errors are displayed. Writes are not performed to the DRAC 4 if an error is found in the .cfg file. The user must correct all errors before any configuration can take place.
Parsing Rules • All lines that start with '#' are treated as comments. A comment line must start in column one. A '#' character in any other column is treated as a # character. (Some modem parameters may have # characters as part of their string. An escape character is not required. You may want to generate a .cfg from a racadm getconfig -f .cfg command, and then perform a racadm config -f .cfg command to a different DRAC 4, without adding escape characters).
• An indexed object entry is ignored by the .cfg parser. The user cannot specify which index is used. If the index already exists, it is used, or else the new entry is created in the first available index for that group. The racadm getconfig -f .cfg command places a comment in front of index objects, which allows the user to see which comments are being used.
Configuration File Example The following example describes the IP address of the DRAC 4. Remove all unnecessary =value entries. In this situation, only the actual variable group’s label with "[" and "]" will remain along with the two =value entries pertaining to the IP address change. The file contents are as follows: # # Object Group "cfgLanNetworking" # [cfgLanNetworking] cfgNicIpAddress=10.35.10.110 cfgNicGateway=10.35.10.
Using the racadm Utility to Configure the DRAC 4 The DRAC 4 Web-based interface is the fastest way to configure a DRAC 4. If you prefer command-line or script configuration, or need to configure multiple DRAC 4s, you can also use the racadm CLI. The racadm CLI is installed along with the DRAC 4 agents on the managed system.
Several parameters and object IDs are displayed along with their current values. The two objects of interest are: # cfgUserAdminIndex=XX cfgUserAdminUserName= If the cfgUserAdminUserName object has no value, that index number, which is indicated by the cfgUserAdminIndex object, is available for use. If a name appears after the "=," that index is taken by that user name. NOTE: When you manually add or remove a user with the racadm config subcommand, you must specify the index with the -i option.
Deleting a DRAC 4 User All users must be deleted manually. You cannot delete users by specifying them in a racadm.cfg file. To delete the user "john" created in the previous example, type the following command line: racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i "" A null string of double quote characters("") indicates to the DRAC 4 to delete the index for the specified group.
racadm config -g cfgUserAdmin -o cfgUserAdminAlertFilterSysEventMask -i 2 0x0 racadm config -g cfgTraps -o cfgTrapsSnmpCommunity -i 2 public racadm config -g cfgTraps -o cfgTrapsEnable -i 2 1 racadm config -g cfgTraps -o cfgTrapsFilterRacEventMask -i 2 0x0 racadm config -g cfgTraps -o cfgTrapsFilterSysEventMask -i 2 0x0 racadm config -g cfgTraps -o cfgTrapsDestIpAddr -i 2 racadm config -g cfgOobSnmp -o cfgOobSnmpTrapsEnable 1 racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAd
Adding a DRAC 4 User With Permissions To add a user with specific administrative permissions (role-based authority), first locate an available user index by performing the steps in "Before Adding a DRAC 4 User." Next, type the following command lines with the new user name and password. NOTE: See Table B-1 for a list of the Bit Mask numbers to enable specific user permissions. The default user permission is 0, which provides full admininstrative permission.
racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 192.168.0.5 racadm config -g cfgLanNetworking -o cfgDNSServer2 192.168.0.
Table 8-6. Using the serial and racadm Commands: Frequently Asked Questions (continued) Question Answer When I use the racadm commands and You may encounter one or more of the subcommands, I get errors that I don’t following errors when using the racadm understand. commands and subcommands: • Local error messages — Occur when problems occur with syntax, typographical errors, incorrect names, and so on.
Using the Serial and racadm Commands
9 Troubleshooting Troubleshooting the DRAC 4 See the following tables for help with troubleshooting the DRAC 4 and the racadm CLI: Table 4-30, "DRAC 4 Network Error Codes" Table 4-32, "Managing and Recovering a Remote System: Frequently Asked Questions" Table 5-8, "Using the DRAC 4 With Active Directory: Frequently Asked Questions" Table 6-4, "Using Console Redirection: Frequently Asked Questions" Table 7-1, "Using Virtual Media: Frequently Asked Questions" Table 8-6, "Using the serial and racadm Commands
Troubleshooting
A racadm Subcommand Man Pages This section provides descriptions of the subcommands that you can run in the racadm CLI. help NOTE: To use this command, you must have Log In DRAC 4 permission. Table A-1 describes the help command. Table A-1. Help Command Command Definition help Lists all of the subcommands available to use with racadm and provides a short description for each.
arp NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table A-2 describes the arp command. Table A-2. arp Command Command Definition arp Displays the contents of the ARP table. ARP table entries may not be added or deleted. Synopsis racadm arp clearasrscreen NOTE: To use this command, you must have Execute Debug Commands permission. Table A-3 describes the clearasrscreen subcommand. Table A-3.
config/getconfig NOTE: To use the getconfig command, you must have Log In DRAC 4 permission. Table A-4 describes the config and getconfig subcommands. Table A-4. config/getconfig Subcommand Definition config Configures the DRAC 4. getconfig Gets the DRAC 4 configuration data.
Table A-5. config Subcommand Options and Descriptions Option Description -f The -f option causes config to read the contents of the file specified by and configure the DRAC 4. The file must contain data in the format specified in "Parsing Rules." -s The -s, or synchronize option, directs config to synchronize the user and password database with Server Administrator (if any user passwords were modified).
getconfig Subcommand Description The getconfig subcommand allows the user to retrieve DRAC 4 configuration parameters on an individual basis, or all the configuration groups may be retrieved and saved into a file. Input Table A-6 describes the getconfig subcommand options. Table A-6. getconfig Subcommand Options Option Description -f The -f , or filename option, causes getconfig to create the file .
Output This subcommand generates error output upon encountering either of the following: • Invalid syntax, group name, object name, index, or other invalid database members • racadm CLI transport failures If errors are not encountered, this subcommand displays the contents of the specified configuration. Examples • racadm getconfig -g cfgLanNetworking — Displays all of the configuration parameters (objects) that are contained in the group cfgLanNetworking.
coredump NOTE: To use this command, you must have Execute Debug Commands permission. Table A-7 describes the coredump subcommand. Table A-7. coredump Subcommand Definition coredump Displays the last DRAC 4 core dump. Synopsis racadm coredump Description The coredump subcommand displays detailed information, including register values, recorded when the most recent bus error occurred, or the message No CORE dump available (if a previous bus error has not occurred, or if the data has been cleared).
R0 =D000AEB2 R1 =01151C1C R2 =0186179C R3 =00000007 R4 =01861700 R5 =C854E35C R6 =018617A0 R7 =00000011 R8 =01383C44 R9 =F1C729C6 R10=00000004 R11=01151C1C R12=0000005F USP=DEADBEEF ULR=00000000 SSP=018616DC SLR=01023C34 SPSR_svc=60000013 PC =01151C88-01151C88: Image ID: jon Wed Oct 23 14:55:53 CDT 2004 //DG0YN811/c/esm4/10_23/RAC2.
coredumpdelete NOTE: To use this command, you must have Clear Logs or Execute Debug Commands permission. Table A-8 describes the coredumpdelete subcommand. Table A-8. coredumpdelete Subcommand Definition coredumpdelete Deletes the core dump stored in the DRAC 4. Synopsis racadm coredumpdelete Description The coredumpdelete command clears the area reserved for persistent storage of bus error information.
Synopsis racadm fwupdate -u [-w] [-D] racadm fwupdate -s racadm fwupdate -g [-u ] [-w][-D] [-a ] [f ] racadm fwupdate -c racadm fwupdate -p -f [-u] [-w] [-D] Description The fwupdate subcommand allows the caller to update the firmware on the DRAC 4. The user may: • Start updating a firmware update file that has previously been loaded into the RAMdisk update area. • Check the status of the firmware update process.
Table A-10. fwupdate Subcommand Options Option Description -u The update option performs a checksum of the firmware update file and starts the actual update process. If this option is typed by itself, it is assumed that a firmware update file has already been loaded into the RAMdisk using the -g or -p options. This option may also be used along with the -g or -p options. After the firmware update file has been loaded, the update process is started within the same call.
Table A-10. fwupdate Subcommand Options (continued) Option Description -c The -c, or checksum, option allows the user to verify an update file that has been loaded into the RAMdisk area. The update file can be loaded by one of the two loading mechanisms (racadm CLI or TFTP). This option essentially gets the size of the firmware update file and calculates the checksum, and verifies the file token. The TFTP interface verifies the checksum after loading automatically.
• racadm fwupdate -u The -u option starts the update process. This command assumes that a valid firmware update file has been previously loaded using the -g or -p option. The update file checksum is verified for correctness before proceeding. • racadm fwupdate -g -u -a 143.166.154.143 -f firmimg.dm1 In this example, the -g option tells the firmware to download the firmware update file from a location (specified by the -f option) on the TFTP server at a specific IP address (specified by the -a option).
getssninfo NOTE: To use this command, you must have Log In To DRAC 4 permission. Table A-11 describes the getssinfo subcommand. Table A-11. getssinfo Subcommand Subcommand Definition getssninfo Retrieves session information for one or more currently active or pending sessions from the Session Manager's session table.
Examples • racadm getssninfo Session table summary status: 1 VALID 3 AVAILABLE Table A-13 provides an example of output from the racadm getssninfo command. Table A-13. getssninfo Subcommand Output Example Type User Web DRAC 4 root Thu, 06 Mar 143.166.174. 2004 19 10:32:39 GMT-06:00 • IP Address Login Date/Time Consoles NONE racadm getssninfo -A 1 3 "Web" "RAC\root" 143.166.174.19 "Thu, 06 Mar 2004 10:32:39 GMT-06:00" "NONE" • racadm getssninfo -A -u * "Web" "RAC\root" 143.166.174.
Synopsis racadm getsysinfo [-d] [-s] [-w] [-A] Description The getsysinfo command returns information about watchdog status, depending on the command options. Input Table A-15 describes the getsysinfo subcommand options. Table A-15. getsysinfo Subcommand Options Option Description -d Displays DRAC 4 information. -s Displays system information -w Displays watchdog information -A Eliminates the printing of headers/labels.
Table A-16. Watchdog Recovery Action Number Descriptions Value Description Watchdog recovery action An enumeration defines the meaning of this value: • 0 = no-action • 1 = hard-reset • 2 = power-down • 3 = power-cycle Examples • racadm getsysinfo -A -w -s "123456" "PowerEdge 2800" "A08" "EF23VQ-0023" "" 0x100 "Server1" "Microsoft Windows 2000 version 5.0, Build Number 2195, Service Pack 2" "1.
Watchdog Information: Recovery Action = Power Down Present countdown value = 36 Initial countdown value = 40 getractime NOTE: To use this command, you must have Log In DRAC 4 permission. Table A-17 describes the getractime subcommand. Table A-17. getractime Subcommand Definition getractime Displays the time from the controller.
ifconfig NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 4 permission. Table A-18 describes the ifconfig subcommand. Table A-18. ifconfig Subcommand Definition ifconfig Displays the contents of the network interface table. Synopsis racadm ifconfig netstat NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table A-19 describes the netstat subcommand. Table A-19.
ping NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 4 permission. Table A-20 describes the ping subcommand. Table A-20. ping Subcommand Definition ping Verifies that the destination IP address is reachable from the DRAC 4 with the current routing-table contents. A destination IP address is required. An ICMP echo packet is sent to the destination IP address based on the current routing-table contents.
Synopsis racadm setniccfg -d racadm setniccfg -s [ ] racadm setniccfg -o racadm getniccfg Description for setniccfg The setniccfg subcommand sets the controller IP address. • The -d option enables DHCP for the Ethernet management port (default is DHCP enabled). • The -s option enables static IP settings. The IP address, netmask, and gateway can be specified. Otherwise, the existing static settings are used. • The -o option disables the Ethernet management port completely.
getsvctag NOTE: To use this command, you must have Log In To DRAC 4 permission. Table A-22 describes the getsvctag subcommand. Table A-22. getsvctag Subcommand Definition getsvctag Displays a service tag. Synopsis racadm getsvctag Description The getsvctag subcommand displays the Service Tag for the system. Example Type getsvctag at the command prompt. The output is displayed as follows: Y76TP0G The command returns 0 on success and nonzero on errors.
Description The racdump subcommand provides a single command to get dump, status, and general DRAC 4 board information. The following commands are executed as a result of the single racdump subcommand: • getsysinfo • coredump • memmap • netstat • getssninfo Output The output of the individual commands are displayed. racreset NOTE: To use this command, you must have Configure DRAC 4 permission. Table A-24 describes the racreset subcommand. Table A-24.
Description The racreset subcommand issues a reset to the DRAC 4. The user is allowed to select how many seconds of delay occur before the reset sequence is started. The reset event is written into the DRAC 4 log. The default option is soft. If you do not type an option, the racadm CLI waits three seconds and then runs the soft option with the racreset subcommand. NOTICE: You must reboot your system after performing a hard reset of the DRAC 4 as described in Table A-25.
racresetcfg NOTE: To use this command, you must have Configure DRAC 4 permission. Table A-26 describes the racresetcfg subcommand. Table A-26. racresetcfg Subcommand Definition racresetcfg Resets all database configuration parameters to default values; equivalent to a soft reset. Synopsis racadm racresetcfg Description The racresetcfg command removes all database property entries that have been configured by the user.
serveraction NOTE: To use this command, you must have Execute Server Control Commands permission. Table A-27 describes the serveraction subcommand. Table A-27. serveraction Subcommand Definition serveraction Executes a managed system reset or poweron/off/cycle. Synopsis racadm serveraction [-d ] Description The serveraction command provides an interface to control system reset and power control. Table A-28 describes the serveraction subcommand option values. Table A-28.
getraclog NOTE: To use this command, you must have Log In DRAC 4 permission. Table A-29 describes the getraclog command. Table A-29. getraclog Command Definition getraclog -i Displays the number of entries in the DRAC 4 log. getraclog Displays the DRAC 4 log entries. Synopsis racadm getraclog -i racadm getraclog [-A] [-c count] [-d delay-seconds ]\[-s start-record] [-v] [-V] [-m] Description NOTE: The command name and the racadm subcommand names may be different. This is normal.
Output One line of output is displayed for each DRAC 4 log entry. Restrictions The output buffer size is too big for execution across IPMI transport. clrraclog NOTE: To use this command, you must have Clear Logs permission. Synopsis racadm clrraclog Description NOTE: The command name and the racadm subcommand names may be different. This is normal. The clrraclog command completely clears the DRAC 4 log. A single entry is made to indicate the user and time that the log was cleared.
Description The getsel -i command displays the number of entries in the SEL. The clrsel command completely clears the SEL. The following getsel options (without the -i option) are used to read entries. -A — Provides API-formatted output (no header). -c — Provides the maximum count of entries to be returned. — Default is to display the entire log racadm and serial commands only (default). -d — Provides the number of seconds to delay the recording of any new log entries.
gettracelog NOTE: To use this command, you must have Log In To DRAC 4 permission. Table A-31 describes the gettracelog subcommand. Table A-31. gettracelog Command Definition gettracelog -i Displays the number of entries in the DRAC 4 trace log. gettracelog Displays the DRAC 4 trace log. Synopsis racadm gettracelog -i racadm gettracelog [-m] Description The gettracelog -i command displays the number of entries in the DRAC 4 trace log. The gettracelog (without the -i option) command reads entries.
Synopsis racadm setrac [-h -o -T -d] Description NOTE: The racadm setrac command cannot be used remotely. The setrac command sets the managed system name, operating system name, or operating system type from the managed system to the DRAC 4. If options are not typed, all four parameters are set. The -d option allows the user to display the parameters only without actually writing them to the DRAC 4 firmware. Any combination of options, or no options, may be typed.
Examples • racadm setrac -d — Only the parameter values are displayed. • racadm setrac -h — The UTC time and managed system name are taken from the managed system and written to the DRAC 4. sslcsrgen NOTE: To use this command, you must have Configure DRAC 4 permission. Table A-34 describes the sslcsrgen subcommand. Table A-34. sslcsrgen Subcommand Description sslcsrgen Generates and downloads the SSL CSR.
Table A-35. sslcsrgen Subcommand Options Option Description -g Generates a new CSR. -s Returns the status of a CSR generation process (generation in progress, active, or none). -u Uploads the CSR to the filename specified by the -f option. -f Specifies the filename of the location, , where the CSR will be downloaded. NOTE: If the -f option is not specified, the filename defaults to sslcsr in your current directory. If options are not specified, the default is -g -u.
sslcertupload NOTE: To use this command, you must have Configure DRAC 4 permission. Table A-36 describes the sslcertupload subcommand. Table A-36. sslcertupload Subcommand Description sslcertupload Downloads a CA certificate to the DRAC 4. Synopsis racadm sslcertupload -t [-f ] Options Table A-37 describes the sslcertupload subcommand options. Table A-37.
sslcertdownload NOTE: To use this command, you must have Configure DRAC 4 permission. Table A-38 describes the sslcertdownload subcommand. Table A-38. sslcertdownload Subcommand Description sslcertupload Downloads a CA certificate to the DRAC 4. Synopsis racadm sslcertdownload -t [-f ] Options Table A-39 describes the sslcertdownload subcommand options. Table A-39.
sslcertview NOTE: To use this command, you must have Configure DRAC 4 permission. Table A-40 describes the sslcertview subcommand. Table A-40. sslcertview Subcommand Description sslcertview Displays a CA certificate or server certificate that is located in the DRAC 4. Synopsis racadm sslcertview -t [-A] Options Table A-41 describes the sslcertview subcommand options. Table A-41.
subject.C=US subject.CN=RMC Default Certificate subject.O=Dell Inc. subject.OU=BVS subject.L=Round Rock subject.S=Texas subject.E=john@dell.com issuer.C=US issuer.CN=RMC Default Certificate issuer.O=Dell Inc. issuer.OU=BVS issuer.L=Round Rock issuer.S=Texas issuer.E=john@dell.com For the racadm sslcertview -t 1 -A subcommand, you receive output similar to the following example: 1 00 1024 DSU+12:34:31 DSU+15:34:31 US RMC Default Certificate Dell Inc. BVS Round Rock Texas john@dell.
testemail Table A-42 describes the testemail subcommand. Table A-42. testemail Subcommand Description testemail Tests an email alert. Synopsis racadm testemail -i | -u Description The testemail subcommand forces the DRAC 4 to send an email over the DRAC 4 network adapter. Options Table A-43 describes the testemail subcommand options. Table A-43. testemail Subcommand Options Option Description -u Specifies the user who receives the email.
testtrap NOTE: To use this command, you must have Test Alerts permission. Table A-44 describes the testtrap subcommand. Table A-44. testtrap Subcommand Description testtrap Tests an SNMP trap. Synopsis racadm testtrap -i Description The testtrap subcommand forces the DRAC 4 to send an SNMP trap over the DRAC 4 NIC. Input Table A-45 describes the testtrap subcommand options. Table A-45. testtrap Subcommand Options Option Description -i Specifies the index of the trap.
Synopsis racadm vmdisconnect Description The vmdisconnect subcommand allows a user to forcibly disconnect another user's virtual media session. Once disconnected, the GUI will reflect the updated connection status. This is available only through the use of local or remote racadm.
B DRAC 4 Property Database Group and Object Definitions The DRAC 4 property database contains the configuration information for the DRAC 4. Data is organized by associated object, and objects are organized by object group. The IDs for the groups and objects that the property database supports are listed in this section. Use the group and object IDs with the racadm utility to configure the DRAC 4. The following sections describe each object and indicate whether the object is readable, writable, or both.
Default RAC Description A text description of the RAC type. idRacVersionInfo (Read Only) Legal Values String of up to 63 ASCII characters. Default RAC Firmware Version x.x Description A string containing the current firmware version of the product, where x is the current revision. idRacName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values String of up to 15 ASCII characters. Default RAC Description A user assigned name to identify this controller.
Default Null string Description Generic property undefined at this release. idRacType (Read) Default 5 Description Identifies the remote access controller type as the DRAC 4. cfgLanNetworking This group contains parameters to configure the DRAC 4 NIC. One instance of the group is allowed. All objects in this group will require the DRAC 4 NIC to be reset, which may cause a brief loss in connectivity.
cfgDNSDomainName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values String of up to 254 ASCII characters. At least one of the characters must be alphabetic. NOTE: Microsoft Active Directory only supports Fully Qualified Domain Names (FQDN) of 64 bytes or fewer. Default MYDOMAIN Description The DNS domain name. This parameter is only valid if cfgDNSRegisterRac is set to 1 (TRUE) and if cfgDNSDomainNameFromDHCP is set to 0 (FALSE).
cfgDNSRegisterRac (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Boolean, either 1 or 0 (TRUE or FALSE). Default 0 Description Registers the DRAC 4 name on the DNS server. cfgDNSServersFromDHCP (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Boolean, either 1 or 0 (TRUE or FALSE). Default 0 Description Retrieves DNS server addresses from the DHCP server.
Description Retrieves the IP address for DNS server 1. This parameter is only valid if cfgDNSServersFromDHCP parameter is set to 0 (FALSE). NOTE: cfgDNSServer1 and cfgDNSServer2 may be set to identical values while swapping addresses. cfgDNSServer2 (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Any legal IP address, including 0.0.0.0. Default 192.168.0.6 Description Retrieves the IP address for DNS server 2.
cfgNicIpAddress (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of "." separated numeric fields containing the static IP address. Default 192.168.0.120 Description The IP address of the DRAC 4 NIC. cfgNicNetmask (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of "." separated numeric fields containing the static network mask. Default 255.255.255.
cfgNicUseDhcp (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Boolean, either 1 or 0 (TRUE or FALSE) Default 0 Description 0=Use the static DRAC 4 NIC parameters described above. 1=Use DHCP and obtain the necessary parameters from the DHCP server for the DRAC 4 NIC. cfgNicMacAddress (Read Only) Description MAC address for the integrated NIC. cfgCurrentLanNetworking This group contains parameters that are currently in use by the DRAC 4 NIC.
cfgNicCurrentNetmask (Read Only) Legal Values A string of "." separated numeric fields containing the network mask. Default None Description The current network mask used by the DRAC 4 NIC. cfgNicCurrentGateway (Read Only) Legal Values A string of "." separated numeric fields containing the gateway address. Default None Description The current gateway used by the DRAC 4 NIC. cfgNicCurrentDhcpWasUsed (Read Only) Legal Values Boolean, either 1 or 0 (TRUE or FALSE).
cfgDNSCurrentDomainName (Read Only) Description Current DNS domain name. cfgDNSCurrentServer1 (Read Only) Description Current IP address used for DNS Server 1. cfgDNSCurrentServer2 (Read Only) Description Current IP address used for DNS Server 2. cfgRemoteHosts The group contains parameters to configure various firmware update loading, IP addresses, enables, and so on. One instance of the group is allowed. The following subsections describe the objects in this group.
cfgRhostsSmtpServerIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of "." separated numeric fields containing the IP address. Default 127.0.0.1 Description The IP address of the server used in email alerts. cfgRhostsFwUpdateTftpEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Boolean either 1 or 0 (TRUE or FALSE).
cfgRhostsFwUpdatePath (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values String of up to 255 ASCII characters that designate a valid path name. Default "" Description The path name pointing to the firmware update binary file. If this is a file name only, then the path needs to be specified in the TFTP server. Otherwise, the entire path can be specified here. NOTE: The server may still require you to specify the drive (for example, C).
Table B-1. Bit Masks for User Privileges User Privilege Bit Mask Log In To DRAC 4 0x80000001 Configure DRAC 4 0x80000002 Configure Users 0x80000004 Clear Logs 0x80000008 Execute Server Control Commands 0x80000010 Access Console Redirection 0x80000020 Access Virtual Media 0x80000040 Test Alerts 0x80000080 Execute Debug Commands 0x80000100 cfgUserAdminUserName (Read/Write) NOTE: To modify this property, you must have Configure Users permission.
Legal Values A string of up to 20 ASCII characters. Default None Description The password for this user. The user passwords are encrypted and cannot be seen or displayed after this property is written. cfgUserAdminAlertFilterRacEventMask (Read/Write) NOTE: To modify this property, you must have Configure Users permission. Legal Values See "DRAC 4-Generated Event Mask Definitions." Default 0x777777 Description See "DRAC 4-Generated Event Mask Definitions." (Type hexadecimal values.
cfgUserAdminEmailEnable (Read/Write) NOTE: To modify this property, you must have Configure Users permission. Legal Values Boolean either 1 or 0 (TRUE or FALSE). Default 0 Description 0=Disable, 1=Enable email alerting on a per user basis. cfgUserAdminEmailAddress (Read/Write) NOTE: To modify this property, you must have Configure Users permission. Legal Values A string of up to 63 ASCII characters. Default "" Description Standard email address, such as john_doe@mycompany.com.
cfgUserAdminIndex (Read Only) Description Index of user entry. cfgTraps This group contains parameters to configure the delivery of SNMP traps. Sixteen instances of this group are allowed, which represent sixteen unique trap destinations. The following subsections describe the objects in this group. cfgTrapsDestIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of "." separated numeric fields containing the IP.
Description 0=Disabled, 1=Enabled for this indexed entry. cfgTrapsSnmpCommunity (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of up to 31 ASCII characters. Default "" Description A SNMP community name. cfgTrapsFilterRacEventMask (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values See "DRAC 4-Generated Event Mask Definitions.
Default 0x77777 Description See "DRAC 4-Generated Event Mask Definitions." (Type hexadecimal values.) cfgTrapsIndex (Read Only) Legal Values See "DRAC 4-Generated Event Mask Definitions." Default 0x77777 Description Index of Trap entry. cfgSessionManagement This group contains parameters to configure the number of sessions that can connect to the DRAC 4. One instance of the group is allowed. All objects in this group require a DRAC 4 reset before they become active.
Description The maximum number of simultaneous sessions that are allowed at one time from the DRAC 4 Web-based remote access interface. (Type hexadecimal values.) cfgSsnMgtMaxSessionsPerUser (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 0x1 through 0x4 Default 0x4 Description The maximum number of simultaneous sessions allowed per user. (Type hexadecimal values.
cfgSerial This group contains configuration parameters for the system external serial port. One instance of the group is allowed. The following subsections describe the objects in this group. cfgSerialBaudRate (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. NOTE: For best results redirecting BIOS System Setup screens, Dell recommends using 115200. Legal Values 9600, 28800, 57600, 115200 Default 115200 Description Sets the baud rate on the external serial port.
Legal Values A string of 3 or less characters. Default The <~><.> key combination The key represents a carriage return; press as a substitute for . Description This key sequence terminates text console redirection when using VT-100. cfgSerialConsoleIdleTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Integer from 1 to any positive number. Type hexadecimal values.
Description Sets the serial console shell type. (Type hexadecimal values.) cfgSerialConsoleNoAuth (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 0 – Login prompt is Enabled on the serial shell. 1 – Login prompt is Disabled on serial shell. Default 0 Description Allows you to disable authentication on the serial shell. cfgSerialConsoleCommand (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
cfgSerialHistorySize (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Any integer less than or equal to 8192. (If a value larger than 8192 is supplied, no error is returned and the history size is set to 8192.) Default 8192 characters Description Sets the size of the serial history buffer. cfgSerialSshEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Legal Values 0=disabled, 1=enabled cfgSerialCom2RedirEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Description Enables/disables the console through the COM 2 port Default 1=COM 2 (console enabled) Legal Values 0=Disabled, 1=Enabled cfgSerialTelnet7flsBackspace (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Description When enabled, the DRAC 4 will interpret 0x7f characters as backspaces from a telnet session.
cfgNetTuning The group contains parameters to tune the DRAC 4 network configuration. One instance of the group is allowed. All objects in this group require a DRAC 4 reset before they become active. The following subsections describe the objects in this group. cfgNetTuningNicAutoneg (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 1 or 0 Default 1 Description Enables autonegotiation of physical link speed and duplex.
Legal Values 1 or 0 Default 1 Description Sets the duplex to full duplex(1) or half duplex (0). cfgNetTuningNicMtu (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Integer from 576 to 1500. Default 0x5dc (1500). Description The size in bytes of the maximum transmission unit used by the DRAC 4 NIC. (Type hexadecimal values.) cfgNetTuningIpTtl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
cfgNetTuningIpReassTtl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Integer from 60 to 240. Default 0x3c (60) Description The maximum IP packet fragment reassembly time in ½ second units. (Type hexadecimal values.) cfgNetTuningTcpSrttBase (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Integer from 0 to 256.
Description The smoothed round trip time-out base default value for TCP retransmission round trip time in ½ second units. (Type hexadecimal values.) cfgNetTuningTcpReXmtMin (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Integer from 2 to 1024. Default 0x2 (2) Description The minimum number of TCP retransmission time in ½ second units. (Type hexadecimal values.
Default 0x3c (60) Description The maximum TCP segment lifetime in ½ second units. (Type hexadecimal values.) cfgNetTuningIpSubnetsAreLocal (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 1 or 0 Default 1 Description Packets addressed to subnets of the local net do not go to the gateway. Tuning the DRAC 4 for Satellite Connectivity The racadm CLI may be used to modify the network tuning properties of the DRAC 4. It is also possible to use the racadm.
racadm config -g cfgNetTuning -o cfgNetTuningTcpReXmtMin racadm config -g cfgNetTuning -o cfgNetTuningTcpReXmtMax racadm config -g cfgNetTuning -o cfgNetTuningTcpMsl where is obtained from Table B-2. Table B-2.
cfgOobSnmp The group contains parameters to configure the SNMP agent and trap capabilities of the DRAC 4. One instance of the group is allowed. The following subsections describe the objects in this group. cfgOobSnmpAgentCommunity (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of up to 31 ASCII characters. Default public Description Use this to modify the SNMP Community Name.
Legal Values Boolean either 1 or 0 (TRUE or FALSE). Default 0 Description 0=Disable, 1=Enable the DRAC 4 SNMP agent. cfgRacTuning The group contains various tuning configuration parameters. One instance of the group is allowed. The following subsections describe the objects in this group. cfgRacTuneHttpPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 0 – 65535 Default 80 Description Use this property to configure the DRAC 4 HTTP port.
Default 443 Description Use this property to configure the DRAC 4 HTTPS port. (Type hexadecimal values.) cfgRacTuneSshPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 0 – 65535 Default 22 Description Use this property to configure the DRAC 4 SSH port. (Type hexadecimal values.) cfgRacTuneTelnetPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Legal Values Integer from 0 to 600. Default 0x46 or 70 Description The maximum number in seconds to wait between when the firmware update file is loaded, and the update sequence is started. (Type hexadecimal values.) cfgRacTuneD3debugEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Boolean, either 1 or 0 (TRUE or FALSE). Default 1 Description 0=disable, 1=enable the DRAC 4 debug command.
cfgRacTuneHostCom2BaudRate (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 115200, 57600, 19200, and 9600 Default 57600 NOTE: For best results when redirecting BIOS System Setup screens, Dell recommends setting this baud rate to 57600. cfgRacTuneConRedirPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Default 0 Description Encrypts the video in a console redirection session. ifcRacManagedNodeOs This group contains parameters to configure the DRAC 4 with managed system and operating system naming information. One instance of the group is allowed. The following subsections describe the objects in this group. ifcRacMnOsHostname (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of up to 255 ASCII characters.
Description The operating system name of the managed system. ifcRacMnOsOsType (Read Only) Legal Values Not user-writable. Default 0 Description Manage system operating system type. cfgRacSecurity This group contains parameters to configure the DRAC 4 SSL (Secure Sockets Layer) security features. cfgRacSecCsrCommonName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Legal Values A string of any ASCII characters. Default "" Description The CSR organization name. cfgRacSecCsrOrganizationUnit (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of any ASCII characters. Default "" Description The CSR organization unit. cfgRacSecCsrLocalityName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of any ASCII characters.
Legal Values A string of any ASCII characters. Default "" Description The CSR state. cfgRacSecCsrCountryCode (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values The two-letter country code. Default "" Description The CSR country code. cfgRacSecCsrEmailAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values A string of any ASCII characters. Default "" Description The CSR email address.
Legal Values Positive integers. Default 0x400 Description DRAC 4 SSL asymmetric key size. (Type hexadecimal values.) cfgRacVirtual This group contains parameters to configure the DRAC 4 Virtual Media feature. One instance of the group is allowed. The following subsections describe the objects in this group. cfgFloppyEmulation (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Default 0 (Enabled) Description 0 (Enabled) enables the Dell Virtual floppy on the next system restart. 1 (Disabled) disables the Dell Virtual floppy and CD-ROM on the next system restart. After restart: • The operating system cannot access the drives. • The virtual devices do not appear in the BIOS Setup screen.
cfgADRacDomain (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Any printable text string with no white space. Length is limited to 254 characters. Default (blank) Description Active Directory Domain in which the DRAC resides. cfgADRacName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Any printable text string with no white space. Length is limited to 254 characters.
Description 1 (True) allows Active Directory authentication to take place. 0 (False) enables local DRAC 4 authentication only. cfgADSpecifyServerEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values 1 or 0 (True or False) Default 0 Description 1 (True) enables you to specify an LDAP or a Global Catalog server. 0 (False) disables this option. cfgADDomainController (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Default No default values Description DRAC 4 uses the value you specify, to search the Global Catalog server for user names. cfgADAuthTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Integer greater than 15 Default 0x78 (120 seconds) Description Time in seconds to wait for Active Directory queries to complete. (Type hexadecimal values.) cfgADRootDomain (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Legal Values 0x1 = Enables Extended Schema with Active Directory. 0x2 = Enables Standard Schema with Active Directory. Default 0x1 = Extended Schema Description Determines the schema type to use with Active Directory. cfgStandardSchema This group contains parameters to configure the Standard Schema settings. cfgSSADRoleGroupIndex (Read Only) Legal Values Integer from 1 to 5. Description Index of the Role Group as recorded in the Active Directory.
cfgSSADRoleGroupDomain (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission. Legal Values Any printable text string with no white space. Length is limited to 254 characters. Default (blank) Description Active Directory Domain in which the Role Group resides. cfgSSADRoleGroupPrivilege (Read/Write) NOTE: To modify this property, you must have Configure DRAC 4 permission.
Table B-3. Bit Masks for Role Group Privileges (continued) Role Group Privilege Bit Mask Access Console Redirection 0x00000020 Access Virtual Media 0x00000040 Test Alerts 0x00000080 Execute Debug Commands 0x00000100 Event Filter Operation and Event Mask Properties The DRAC 4 alert filter scans the alert enable database properties before it scans the event masks.
Table B-4. DRAC 4-Generated Event Mask Bit Definitions Bits Data Type 28–31 DRAC 4 undefined reserved 24–27 DRAC 4 miscellaneous alerts 20–23 DRAC 4 BMC communication alerts where has the following bit definitions: • Bit-0: 1 = Send alert for DRAC 4 communication with BMC and lost or restored communication between the DRAC 4 and BMC. • Bit-1: 1 = Send alert for DRAC 4 lost communication with BMC. • Bit-2: Reserved. • Bit-3: Reserved.
System-Generated Alert Mask Definitions The cfgTraps cfgTrapsFilter {Rac, Sys} EventMask properties are an unsigned 32-bit integer property that holds the filter information for managed-system generated events. The bit definitions in Table B-5 apply. Table B-5.
Alert Filter Properties The alert filter property group ID is cfgUserAdmin. The object IDs are shown in Table B-6. Table B-6.
Email Test Command Synopsis racadm testemail -e -i racadm testemail -e -u Alert Data Definitions The email alert contains the following information: message (including test message, if a paging test), event description, date, time, severity, system ID, model, BIOS version, asset tag, service tag, managed system name, operating system name, and BMC version.
Trap Test Command Synopsis racadm testtrap -t -i Alert Data Definitions The "alertMessage" string (up to 1 KB) provides the specific information describing the cause and specific source of the event, which includes: • Sensor identification: entity/IPMBslaveAddress • Sensor number • Sensor ID string (if possible) • Current reading and range (normal/warning/critical) • Threshold values: minimum, maximum, normal For more information, see the Dell OpenManage™ Server Administrator SNMP R
Glossary Active Directory Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. AGP Abbreviation for accelerated graphics port, which is a bus specification that allows graphics cards faster access to main system memory.
CA A certificate authority is a business entity that is recognized in the IT industry for meeting high standards of reliable screening, identification, and other important security criteria. Examples of CAs include Thawte and VeriSign. After the CA receives your CSR, they review and verify the information the CSR contains.
DDNS Abbreviation for Dynamic Domain Name System. DNS Abbreviation for Domain Name System. DRAC 4 Abbreviation for Dell Remote Access Controller 4. DSU Abbreviation for disk storage unit. extended schema A solution used with Active Directory to determine user access to DRAC 4; uses Dell-defined Active Directory objects. FQDN Acronym for Fully Qualified Domain Names. Microsoft Active Directory only supports FQDN of 64 bytes or fewer. FSMO Flexible Single Master Operation.
GUI Abbreviation for graphical user interface, which refers to a computer display interface that uses elements such as windows, dialog boxes, and buttons as opposed to a command prompt interface, in which all user interaction is displayed and typed in text. hardware log Records events generated by the DRAC 4 and the BMC. ICMB Abbreviation for Intelligent Chassis Management Bus. ICMP Abbreviation for Internet control message protocol.
LAN Abbreviation for local area network. LDAP Abbreviation for Lightweight Directory Access Protocol. LED Abbreviation for light-emitting diode. MAC Acronym for media access control, which is a network sublayer between a network node and the network physical layer. MAC address Acronym for media access control address, which is a unique address embedded in the physical components of a NIC. managed system The managed system is the system in which the DRAC 4 is installed or embedded.
OID Abbreviation for Object Identifiers. PCI Abbreviation for Peripheral Component Interconnect, which is a standard interface and bus technology for connecting peripherals to a system and for communicating with those peripherals. POST Acronym for power-on self-test, which is a sequence of diagnostic tests that are run automatically by a system when it is powered on.
SEL Acronym for system event log. SMI Abbreviation for systems management interrupt. SMTP Abbreviation for Simple Mail Transfer Protocol, which is a protocol used to transfer electronic mail between systems, usually over an Ethernet. SNMP Abbreviation for Simple Network Management Protocol, which is a protocol designed to manage nodes on an IP network. DRAC 4s are SNMP-managed devices (nodes).
UPS Abbreviation for uninterruptible power supply. USB Abbreviation for Universal Serial Bus. UTC Abbreviation for Universal Coordinated Time. See GMT. VNC Abbreviation for virtual network computing. VT-100 Abbreviation for Video Terminal 100, which is used by the most common terminal emulation programs. WAN Abbreviation for wide area network.
Index A Active Directory configuring, 111 object overview, 107 schema extensions, 106 using with extended schema, 106 using with standard schema, 125 alerts adding, 71 configuring, 71 SNMP, 77 troubleshooting, 98 configuring the software, 49 configuring the DRAC 4, 177 connections supported, 19 connectors, 18 connecting the DB-9 cable, 61 console redirection using, 135 coredump, 193 coredumpdelete, 195 arp, 188 D B BIOS updating the system, 29 C certificate signing request (CSR) about, 82 viewing a serv
configuring using racadm, 177 deleting a user, 179 enabling serial/telnet console, 56 installing hardware, 27 installing software, 28 updating firmware, 42 using Active Directory to log in, 131 DRAC 4 log messages, 98 dracadm utility parsing rules, 174 subcommands, 187 getraclog, 213 getractime, 204 getsel, 214 getssninfo, 200 getsvctag, 208 getsysinfo, 201 gettracelog, 216 I ifconfig, 205 E installation software, 49 extended schema using with Active Directory, 106 Internet Explorer configuring, 33 F
M O managed system capturing the last crash screen, 30 configuring the system setup program, 50 connecting using the client system, 61 connecting using the local serial port, 61 enabling to use serial or telnet console, 50 installing software, 29 managing, 80 recovering, 89 troubleshooting, 89 operating systems supported, 20 management station configuring terminal emulation, 62 installing software, 31 messages DRAC 4 log, 98 Microsoft Windows disabling reboot option, 31 installing using Virtual Media, 1
Red Hat Enterprise Linux configuring for serial console emulation, 63 configuring for serial redirection during boot, 51 configuring XTerm, 66 DRAC 4 software basics, 45 installing the racadm CLI, 32 installing using Virtual Media, 151 remote system managing, 80 software configuration, 49 software installation, 49 specifications hardware, 17 specify global catalog server, 124 LDAP server, 124 SSL about, 81 sslcertdownload, 221 S Secure Shell (SSH) changing the SSH port, 59 enabling, 59, 128 using, 59 seri
U updating system BIOS, 29 V Virtual Floppy configuring, 153 Virtual Media booting, 150 disabling, 152 enabling, 152 installing operating systems, 151 installing plug-in, 149 using, 150 vmdisconnect, 225 W warranty, 25 Web browser configuring, 33 configuring Firefox, 33 configuring Internet Explorer, 33 Web browsers for 64-bit operating systems, 23 supported, 22 Web-based interface accessing, 69 what’s new, 15 Index 291
Index