Drac 5
Drac 5
w w w. d e l l . c o m | s u p p o r t . d e l l . c o m
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________________
Information in this document is subject to change without notice.
© 2009 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, OpenManage, and PowerEdge, are trademarks of
Dell Inc.; Microsoft, Active Directory, Internet Explorer, Windows, Windows NT, Windows Server, and
Windows Vista are either trademarks or registered trademarks of Microsoft Corporation in the
United States and/or other countries; Red Hat and Red Hat Enterprise Linux are registered trademarks
of Red Hat, Inc. in the United States and other countries; Novell and SUSE are registered trademarks of
Novell Inc. in the United States and other countries. Intel is a registered trademark of Intel Corporation
in the U.S. and other countries; UNIX is a registered trademark of The Open Group in the United States
and other countries.
Copyright 1998-2008 The OpenLDAP Foundation. All rights reserved. Redistribution and use in
source and binary forms, with or without modification, are permitted only as authorized by the
OpenLDAP Public License. A copy of this license is available in the file LICENSE in the top-level
directory of the distribution or, alternatively, at http://www.OpenLDAP.org/license.html.
OpenLDAP is a registered trademark of the OpenLDAP Foundation. Individual files and/or contributed
packages may be copyrighted by other parties and subject to additional restrictions. This work is
derived from the University of Michigan LDAP v3.3 distribution. This work also contains materials
derived from public sources. Information about OpenLDAP can be obtained at
http://www.openldap.org/. Portions Copyright 1998-2004 Kurt D. Zeilenga. Portions Copyright
1998-2004 Net Boolean Incorporated. Portions Copyright 2001-2004 IBM Corporation. All rights
reserved. Redistribution and use in source and binary forms, with or without modification, are
permitted only as authorized by the OpenLDAP Public License. Portions Copyright 1999-2003
Howard Y.H. Chu. Portions Copyright 1999-2003 Symas Corporation. Portions Copyright 1998-2003
Hallvard B. Furuseth. All rights reserved. Redistribution and use in source and binary forms, with or
without modification, are permitted provided that this notice is preserved. The names of the copyright
holders may not be used to endorse or promote products derived from this software without their
specific prior written permission. This software is provided "as is'' without express or implied warranty.
Portions Copyright (c) 1992-1996 Regents of the University of Michigan. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that this notice is preserved and
that due credit is given to the University of Michigan at Ann Arbor. The name of the University may not
be used to endorse or promote products derived from this software without specific prior written
permission. This software is provided "as is'' without express or implied warranty. Other trademarks and
trade names may be used in this document to refer to either the entities claiming the marks and names or
their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
December 2009
Contents
1 DRAC 5 Overview . . . . . . . . . . . . . . . . . . . 25
DRAC 5 Specifications and Features . . . . . . . . . . 26
DRAC 5 Specifications . . . . . . . . . . . . . . . 26
DRAC 5 Standard Features . . . . . . . . . . . . . 29
Overview . . . . . . . . . . . . . . . . . . . . . . . . . 37
Installing Your DRAC 5 Software . . . . . . . . . . 37
Configuring Your DRAC 5 . . . . . . . . . . . . . . 38
Contents 3
Installing and Removing RACADM on a
Linux Management Station . . . . . . . . . . . . . 40
Installing RACADM . . . . . . . . . . . . . . . . . 40
4 Contents
Using the connect com2 Serial Command . . . . . 50
Configuring the BIOS Setup Program
for a Serial Connection on the
Managed System . . . . . . . . . . . . . . . . . . 50
Using the Remote Access Serial Interface. . . . . 51
Configuring Linux for Serial Console Redirection
During Boot . . . . . . . . . . . . . . . . . . . . . 51
Enabling Login to the Console After Boot . . . . . 54
Enabling the DRAC 5 Serial/Telnet/SSH
Console . . . . . . . . . . . . . . . . . . . . . . . 57
Using the RACADM Command to Configure
the Settings for the Serial and Telnet Console . . . 58
Contents 5
Using a Serial or Telnet Console . . . . . . . . . . . . 70
RACADM Synopsis . . . . . . . . . . . . . . . . . . . . 80
RACADM Options . . . . . . . . . . . . . . . . . . 81
6 Contents
Adding a DRAC 5 User . . . . . . . . . . . . . . . 100
Removing a DRAC 5 User . . . . . . . . . . . . . . 101
Testing e-mail Alerting . . . . . . . . . . . . . . . 101
Testing the RAC SNMP Trap Alert Feature . . . . . 102
Enabling a DRAC 5 User With Permissions. . . . . 102
Contents 7
Configuring the DRAC 5 With Extended
Schema Active Directory and
Web-Based Interface . . . . . . . . . . . . . . . 124
Configuring the DRAC 5 With
Extended Schema Active Directory and
RACADM . . . . . . . . . . . . . . . . . . . . . 126
Accumulating Privileges
Using Extended Schema . . . . . . . . . . . . . 127
8 Contents
7 Enabling Kerberos Authentication . . . . 143
Prerequisites for Setting up
Kerberos Authentication . . . . . . . . . . . . . . . . . 143
Contents 9
10 Using GUI Console Redirection . . . . . . . 157
Overview . . . . . . . . . . . . . . . . . . . . . . . . 157
10 Contents
Booting From Virtual Media . . . . . . . . . . . . 185
Installing Operating Systems
Using Virtual Media . . . . . . . . . . . . . . . . 186
Using Virtual Media When the Server’s
Operating System Is Running . . . . . . . . . . . . 186
Contents 11
12 Configuring Security Features . . . . . . . . 205
Security Options for the DRAC Administrator . . . . . 206
Disabling the DRAC 5 Local Configuration . . . . 206
Disabling DRAC 5 Remote Virtual KVM . . . . . . 208
12 Contents
Property Names for Fan, Temperature,
Numeric Voltage, Power Consumption,
and Amperage Sensors. . . . . . . . . . . . . . . 240
Supported Property Names for Fans,
Temperature, Numeric Voltage,
Power Consumption, and Amperage Sensors . . . 240
Property Names for Power Supply Sensors . . . . 243
Property Names for Intrusion,
Battery, Voltage, and
Hardware Performance Sensors . . . . . . . . . . 244
Property Names for Fan and
Power Supply Redundancy Set Sensors . . . . . . 246
Property Names for Chassis Sensors . . . . . . . 246
Property Names for
Power Management Service . . . . . . . . . . . . 247
Property Names for Power Capability . . . . . . . 248
Contents 13
15 Configuring Intelligent Platform
Management Interface (IPMI) . . . . . . . 259
Configuring IPMI . . . . . . . . . . . . . . . . . . . . 259
Configuring IPMI Using the
Web-Based Interface . . . . . . . . . . . . . . . 259
Configuring IPMI Using
the RACADM CLI . . . . . . . . . . . . . . . . . 262
Using the IPMI Remote
Access Serial Interface . . . . . . . . . . . . . . 266
14 Contents
17 Recovering and Troubleshooting
the DRAC 5 . . . . . . . . . . . . . . . . . . . . . . 279
Using the RAC Log . . . . . . . . . . . . . . . . . . . . 279
Using the Command Line . . . . . . . . . . . . . . 281
18 Sensors . . . . . . . . . . . . . . . . . . . . . . . . . 285
Battery Probes . . . . . . . . . . . . . . . . . . . . . . 285
Contents 15
A RACADM Subcommand Overview . . . . . 289
help . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
arp . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
clearasrscreen . . . . . . . . . . . . . . . . . . . . . 290
config . . . . . . . . . . . . . . . . . . . . . . . . . . 291
getconfig . . . . . . . . . . . . . . . . . . . . . . . . 293
coredump . . . . . . . . . . . . . . . . . . . . . . . . 296
coredumpdelete . . . . . . . . . . . . . . . . . . . . 297
fwupdate . . . . . . . . . . . . . . . . . . . . . . . . 297
getssninfo . . . . . . . . . . . . . . . . . . . . . . . 300
getsysinfo . . . . . . . . . . . . . . . . . . . . . . . . 302
getractime . . . . . . . . . . . . . . . . . . . . . . . 305
ifconfig . . . . . . . . . . . . . . . . . . . . . . . . . 306
netstat . . . . . . . . . . . . . . . . . . . . . . . . . 306
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
setniccfg . . . . . . . . . . . . . . . . . . . . . . . . 307
getniccfg . . . . . . . . . . . . . . . . . . . . . . . . 309
getsvctag . . . . . . . . . . . . . . . . . . . . . . . . 310
racdump . . . . . . . . . . . . . . . . . . . . . . . . 311
racreset. . . . . . . . . . . . . . . . . . . . . . . . . 312
racresetcfg . . . . . . . . . . . . . . . . . . . . . . . 313
16 Contents
serveraction . . . . . . . . . . . . . . . . . . . . . . . 314
getraclog . . . . . . . . . . . . . . . . . . . . . . . . . 315
clrraclog . . . . . . . . . . . . . . . . . . . . . . . . . 317
getsel . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
clrsel . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
gettracelog . . . . . . . . . . . . . . . . . . . . . . . . 319
sslcsrgen . . . . . . . . . . . . . . . . . . . . . . . . . 320
sslcertupload . . . . . . . . . . . . . . . . . . . . . . 322
sslcertdownload . . . . . . . . . . . . . . . . . . . . . 323
sslcertview. . . . . . . . . . . . . . . . . . . . . . . . 325
sslkeyupload . . . . . . . . . . . . . . . . . . . . . . . 327
krbkeytabupload . . . . . . . . . . . . . . . . . . . . . 328
testemail . . . . . . . . . . . . . . . . . . . . . . . . . 329
testtrap . . . . . . . . . . . . . . . . . . . . . . . . . . 330
vmdisconnect . . . . . . . . . . . . . . . . . . . . . . 332
vmkey . . . . . . . . . . . . . . . . . . . . . . . . . . 333
usercertupload . . . . . . . . . . . . . . . . . . . . . . 333
usercertview . . . . . . . . . . . . . . . . . . . . . . . 335
localConRedirDisable . . . . . . . . . . . . . . . . . . 336
Contents 17
B DRAC 5 Property Database Group
and Object Definitions . . . . . . . . . . . . . . . . 337
Displayable Characters . . . . . . . . . . . . . . . . 337
idRacInfo . . . . . . . . . . . . . . . . . . . . . . . . 337
idRacProductInfo (Read Only) . . . . . . . . . . 337
idRacDescriptionInfo (Read Only) . . . . . . . . 338
idRacVersionInfo (Read Only). . . . . . . . . . . 338
idRacBuildInfo (Read Only) . . . . . . . . . . . . 338
idRacName (Read Only) . . . . . . . . . . . . . 339
idRacType (Read Only) . . . . . . . . . . . . . . 339
cfgLanNetworking . . . . . . . . . . . . . . . . . . . 339
cfgDNSDomainNameFromDHCP
(Read/Write) . . . . . . . . . . . . . . . . . . . 340
cfgDNSDomainName (Read/Write) . . . . . . . . 340
cfgDNSRacName (Read/Write) . . . . . . . . . . 340
cfgDNSRegisterRac (Read/Write) . . . . . . . . 341
cfgDNSServersFromDHCP (Read/Write) . . . . . 341
cfgDNSServer1 (Read/Write) . . . . . . . . . . . 342
cfgDNSServer2 (Read/Write) . . . . . . . . . . . 342
cfgNicEnable (Read/Write) . . . . . . . . . . . . 342
cfgNicIpAddress (Read/Write) . . . . . . . . . . 343
cfgNicNetmask (Read/Write) . . . . . . . . . . . 343
cfgNicGateway (Read/Write) . . . . . . . . . . . 344
cfgNicUseDhcp (Read/Write) . . . . . . . . . . . 344
cfgNicSelection (Read/Write) . . . . . . . . . . 345
cfgNicMacAddress (Read Only) . . . . . . . . . 346
cfgNicVLanEnable (Read/Write) . . . . . . . . . 346
cfgNicVLanId (Read/Write) . . . . . . . . . . . . 346
cfgNicVLanPriority (Read/Write) . . . . . . . . . 347
cfgRemoteHosts . . . . . . . . . . . . . . . . . . . . 347
cfgRhostsSmtpServerIpAddr (Read/Write) . . . . 347
18 Contents
cfgRhostsFwUpdateTftpEnable (Read/Write) . . . 348
cfgRhostsFwUpdateIpAddr (Read/Write) . . . . . 348
cfgRhostsFwUpdatePath (Read/Write) . . . . . . . 348
cfgUserAdmin . . . . . . . . . . . . . . . . . . . . . . 349
cfgUserAdminIpmiLanPrivilege (Read/Write) . . . 349
cfgUserAdminIpmiSerialPrivilege
(Read/Write) . . . . . . . . . . . . . . . . . . . . 349
cfgUserAdminPrivilege (Read/Write) . . . . . . . 350
cfgUserAdminUserName (Read/Write) . . . . . . 351
cfgUserAdminPassword (Write Only) . . . . . . . 352
cfgUserAdminEnable . . . . . . . . . . . . . . . . 352
cfgUserAdminSolEnable . . . . . . . . . . . . . . 353
cfgEmailAlert . . . . . . . . . . . . . . . . . . . . . . 353
cfgEmailAlertIndex (Read Only) . . . . . . . . . . 353
cfgEmailAlertEnable (Read/Write) . . . . . . . . . 354
cfgEmailAlertAddress (Read Only) . . . . . . . . . 354
cfgEmailAlertCustomMsg (Read Only) . . . . . . . 354
cfgSessionManagement . . . . . . . . . . . . . . . . . 355
cfgSsnMgtConsRedirMaxSessions
(Read/Write) . . . . . . . . . . . . . . . . . . . . 355
cfgSsnMgtRacadmTimeout (Read/Write) . . . . . 355
cfgSsnMgtWebserverTimeout (Read/Write) . . . . 356
cfgSsnMgtSshIdleTimeout (Read/Write) . . . . . . 356
cfgSsnMgtTelnetTimeout (Read/Write) . . . . . . 357
cfgSerial . . . . . . . . . . . . . . . . . . . . . . . . . 357
cfgSerialBaudRate (Read/Write) . . . . . . . . . . 358
cfgSerialConsoleEnable (Read/Write) . . . . . . . 358
cfgSerialConsoleQuitKey (Read/Write). . . . . . . 358
cfgSerialConsoleIdleTimeout (Read/Write) . . . . 359
cfgSerialConsoleNoAuth (Read/Write) . . . . . . . 360
cfgSerialConsoleCommand (Read/Write) . . . . . 360
Contents 19
cfgSerialHistorySize (Read/Write) . . . . . . . . 360
cfgSerialSshEnable (Read/Write). . . . . . . . . 361
cfgSerialTelnetEnable (Read/Write) . . . . . . . 361
cfgSerialCom2RedirEnable (Read/Write) . . . . . 361
cfgNetTuning . . . . . . . . . . . . . . . . . . . . . . 362
cfgNetTuningNicAutoneg (Read/Write) . . . . . 362
cfgNetTuningNic100MB (Read/Write) . . . . . . 363
cfgNetTuningNicFullDuplex (Read/Write) . . . . 363
cfgNetTuningNicMtu (Read/Write) . . . . . . . . 363
cfgNetTuningTcpSrttDflt (Read/Write) . . . . . . 364
cfgOobSnmp . . . . . . . . . . . . . . . . . . . . . . 364
cfgOobSnmpAgentCommunity (Read/Write) . . . 364
cfgOobSnmpAgentEnable (Read/Write) . . . . . 365
cfgRacTuning . . . . . . . . . . . . . . . . . . . . . . 365
cfgRacTunePluginType . . . . . . . . . . . . . . 365
cfgRacTuneHttpPort (Read/Write) . . . . . . . . 366
cfgRacTuneHttpsPort (Read/Write) . . . . . . . . 366
cfgRacTuneIpRangeEnable . . . . . . . . . . . . 366
cfgRacTuneIpRangeAddr . . . . . . . . . . . . . 367
cfgRacTuneIpRangeMask . . . . . . . . . . . . 367
cfgRacTuneIpBlkEnable . . . . . . . . . . . . . 367
cfgRacTuneIpBlkFailcount . . . . . . . . . . . . 368
cfgRacTuneIpBlkFailWindow . . . . . . . . . . . 368
cfgRacTuneIpBlkPenaltyTime. . . . . . . . . . . 369
cfgRacTuneSshPort (Read/Write) . . . . . . . . 369
cfgRacTuneTelnetPort (Read/Write) . . . . . . . 369
cfgRacTuneRemoteRacadmEnable
(Read/Write) . . . . . . . . . . . . . . . . . . . 370
cfgRacTuneConRedirEncryptEnable
(Read/Write) . . . . . . . . . . . . . . . . . . . 370
cfgRacTuneConRedirPort (Read/Write) . . . . . 370
20 Contents
cfgRacTuneConRedirVideoPort
(Read/Write) . . . . . . . . . . . . . . . . . . . . 371
cfgRacTuneAsrEnable (Read/Write) . . . . . . . . 371
cfgRacTuneDaylightOffset (Read/Write) . . . . . . 372
cfgRacTuneTimezoneOffset (Read/Write) . . . . . 372
cfgRacTuneWebserverEnable (Read/Write) . . . . 372
cfgRacTuneLocalServerVideo (Read/Write) . . . . 373
cfgRacTuneLocalConfigDisable . . . . . . . . . . 373
cfgRacTuneCtrlEConfigDisable . . . . . . . . . . . 374
ifcRacManagedNodeOs . . . . . . . . . . . . . . . . . 374
ifcRacMnOsHostname (Read/Write) . . . . . . . . 374
ifcRacMnOsOsName (Read/Write) . . . . . . . . . 375
cfgRacSecurity . . . . . . . . . . . . . . . . . . . . . . 375
cfgRacSecCsrCommonName (Read/Write) . . . . 375
cfgRacSecCsrOrganizationName
(Read/Write) . . . . . . . . . . . . . . . . . . . . 376
cfgRacSecCsrOrganizationUnit (Read/Write) . . . 376
cfgRacSecCsrLocalityName (Read/Write) . . . . . 376
cfgRacSecCsrStateName (Read/Write) . . . . . . 377
cfgRacSecCsrCountryCode (Read/Write) . . . . . 377
cfgRacSecCsrEmailAddr (Read/Write) . . . . . . . 377
cfgRacSecCsrKeySize (Read/Write) . . . . . . . . 378
cfgRacVirtual . . . . . . . . . . . . . . . . . . . . . . 378
cfgVirMediaAttached (Read/Write) . . . . . . . . 378
cfgVirAtapiSvrPort (Read/Write) . . . . . . . . . . 379
cfgVirAtapiSvrPortSsl (Read/Write) . . . . . . . . 379
cfgVirMediaKeyEnable (Read/Write) . . . . . . . . 380
cfgVirMediaPluginTypr (Read/Write) . . . . . . . . 380
cfgVirtualBootOnce (Read/Write) . . . . . . . . . 380
cfgFloppyEmulation (Read/Write) . . . . . . . . . 381
cfgActiveDirectory . . . . . . . . . . . . . . . . . . . . 382
Contents 21
cfgADRacDomain (Read/Write). . . . . . . . . . 382
cfgADRacName (Read/Write) . . . . . . . . . . 382
cfgADEnable (Read/Write) . . . . . . . . . . . . 383
cfgADAuthTimeout (Read/Write) . . . . . . . . . 386
cfgADRootDomain (Read/Write) . . . . . . . . . 386
cfgADType (Read/Write) . . . . . . . . . . . . . 386
cfgADSSOEnable (Read/Write) . . . . . . . . . . 387
cfgStandardSchema . . . . . . . . . . . . . . . . . . 387
cfgSSADRoleGroupIndex (Read Only) . . . . . . 387
cfgSSADRoleGroupName (Read/Write) . . . . . 387
cfgSSADRoleGroupDomain (Read/Write) . . . . 388
cfgSSADRoleGroupPrivilege (Read/Write) . . . . 388
cfgIpmiSerial . . . . . . . . . . . . . . . . . . . . . . 389
cfgIpmiSerialConnectionMode (Read/Write) . . . 389
cfgIpmiSerialBaudRate (Read/Write) . . . . . . . 390
cfgIpmiSerialChanPrivLimit (Read/Write) . . . . 390
cfgIpmiSerialFlowControl (Read/Write) . . . . . 390
cfgIpmiSerialHandshakeControl
(Read/Write) . . . . . . . . . . . . . . . . . . . 391
cfgIpmiSerialLineEdit (Read/Write) . . . . . . . . 391
cfgIpmiSerialEchoControl (Read/Write) . . . . . 392
cfgIpmiSerialDeleteControl (Read/Write) . . . . 392
cfgIpmiSerialNewLineSequence (Read/Write) . . 392
cfgIpmiSerialInputNewLineSequence
(Read/Write) . . . . . . . . . . . . . . . . . . . 393
cfgIpmiSol . . . . . . . . . . . . . . . . . . . . . . . 393
cfgIpmiSolEnable (Read/Write) . . . . . . . . . . 393
cfgIpmiSolBaudRate (Read/Write) . . . . . . . . 394
cfgIpmiSolMinPrivilege (Read/Write) . . . . . . 394
cfgIpmiSolAccumulateInterval
(Read/Write) . . . . . . . . . . . . . . . . . . . 395
cfgIpmiSolSendThreshold (Read/Write) . . . . . 395
22 Contents
cfgIpmiLan . . . . . . . . . . . . . . . . . . . . . . . . 395
cfgIpmiLanEnable (Read/Write) . . . . . . . . . . 395
cfgIpmiLanPrivLimit (Read/Write) . . . . . . . . . 396
cfgIpmiLanAlertEnable (Read/Write) . . . . . . . . 396
cfgIpmiEncryptionKey (Read/Write) . . . . . . . . 397
cfgIpmiPetCommunityName (Read/Write) . . . . . 397
cfgIpmiPef . . . . . . . . . . . . . . . . . . . . . . . . 397
cfgIpmiPefName (Read Only) . . . . . . . . . . . . 398
cfgIpmiPefIndex (Read Only) . . . . . . . . . . . . 398
cfgIpmiPefAction (Read/Write) . . . . . . . . . . . 398
cfgIpmiPefEnable (Read/Write) . . . . . . . . . . 399
cfgIpmiPet . . . . . . . . . . . . . . . . . . . . . . . . 399
cfgIpmiPetIndex (Read/Write) . . . . . . . . . . . 399
cfgIpmiPetAlertDestIpAddr (Read/Write) . . . . . 399
cfgIpmiPetAlertEnable (Read/Write) . . . . . . . . 400
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Contents 23
24 Contents
1
DRAC 5 Overview
The Dell™ Remote Access Controller 5 (DRAC 5) is a systems management
hardware and software solution designed to provide remote management
capabilities, crashed system recovery, and power control functions for
Dell systems.
By communicating with the system’s baseboard management controller
(BMC), the DRAC 5 (when installed) can be configured to send you e-mail
alerts for warnings or errors related to voltages, temperatures, intrusion, and
fan speeds. The DRAC 5 also logs event data and the most recent crash
screen (for systems running the Microsoft® Windows® operating system
only) to help you diagnose the probable cause of a system crash.
The DRAC 5 has its own microprocessor and memory, and is powered by the
system in which it is installed. The DRAC 5 may be preinstalled on your
system, or available separately in a kit.
To get started with the DRAC 5, see "Getting Started With the DRAC 5."
DRAC 5 Overview 25
DRAC 5 Specifications and Features
Figure 1-1 shows the DRAC 5 hardware.
RJ-45
Connector
PCIe Connector
DRAC 5 Specifications
Power Specifications
Table 1-1 lists the power requirements for the DRAC 5.
System Power
1.2 A on +3.3 V AUX (maximum)
550 mA on +3.3 V main (maximum)
0 mA on +5V main (maximum)
Connectors
NOTE: The DRAC 5 hardware installation instructions can be found in the Installing
a Remote Access Card document or the Installation and Troubleshooting Guide
included with your system.
26 DRAC 5 Overview
The DRAC 5 includes one onboard 10/100 Mbps RJ-45 NIC, a 50-pin
management cable, and a 44-pin MII cable. See Figure 1-1 for the DRAC 5
cable connectors.
The 50-pin management cable is the main interface to the DRAC that
provides connectivity to USB, serial, video, and an inter-integrated circuit
(I2C) bus. The 44-pin MII cable connects the DRAC NIC to the system’s
motherboard. The RJ-45 connector connects the DRAC NIC to an out-of-band
connection when the DRAC 5 is configured in Dedicated NIC mode.
Depending on your requirements, you can use the management and MII
cables to configure your DRAC in three separate modes. See "DRAC Modes"
for more information.
DRAC 5 Ports
Table 1-2 identifies the ports used by the DRAC 5 that listen for a server
connection. Table 1-3 identifies the ports that the DRAC 5 uses as a client.
This information is required when opening firewalls for remote access to
a DRAC 5.
DRAC 5 Overview 27
Table 1-3. DRAC 5 Client Ports
Connection Features
DRAC 5 NIC • 10/100 Mbps Ethernet
• DHCP support
• SNMP traps and e-mail event notification
• Dedicated network interface for the DRAC 5 Web-based
interface
• Support for telnet/ssh console and RACADM CLI commands
including system boot, reset, power-on, and shutdown
commands
Serial port • Support for Serial console and RACADM CLI commands
including system boot, reset, power-on, and shutdown
commands
• Support for text-only console redirection to a VT-100 terminal
or terminal emulator
28 DRAC 5 Overview
DRAC 5 Standard Features
The DRAC 5 provides the following features:
• Two-factor authentication, which is provided by the Smart Card logon.
The two-factor authentication is based on what the users have (the Smart
Card) and what they know (the PIN).
• User authentication through Microsoft Active Directory (optional) or
hardware-stored user IDs and passwords
• Role-based authority, which enables an administrator to configure specific
privileges for each user
• User ID and password configuration through the Web-based interface or
RACADM CLI
• Dynamic Domain Name System (DNS) registration
• Remote system management and monitoring using a Web-based
interface, serial connection, remote RACADM, or telnet connection.
• Support for Active Directory authentication — Centralizes all DRAC 5
user ID and passwords in Active Directory using Standard Schema and
Extended Schema.
• Console Redirection — Provides remote system keyboard, video, and
mouse functions.
• Virtual Media — Enables a managed system to access a media drive on the
management station.
• Access to system event logs — Provides access to the system event log
(SEL), DRAC 5 log, and last crash screen of the crashed or unresponsive
system that is independent of the operating system state.
• Dell OpenManage software integration — Enables you to launch the
DRAC5 Web-based interface from Dell OpenManage Server
Administrator or IT Assistant.
• RAC alert — Alerts you to potential managed node issues through e-mail
messages or an SNMP trap using the Dedicated, Shared with Failover, or
Shared NIC settings.
• Local and remote configuration — Provides local and remote
configuration using the RACADM command-line utility.
• Remote power management — Provides remote power management
functions from a management console, such as shutdown and reset.
DRAC 5 Overview 29
• IPMI support.
• Standards-based management with IPMI over LAN and SM-CLP.
• Sensors for monitoring power consumption. The DRAC 5 uses this data to
depict system power consumption through charts and statistics.
• Secure Sockets Layer (SSL) encryption — Provides secure remote system
management through the Web-based interface.
• Password-level security management — Prevents unauthorized access to a
remote system.
• Role-based authority — Provides assignable permissions for different
systems management tasks.
30 DRAC 5 Overview
• The Dell Systems Software Support Matrix provides information about the
various Dell systems, the operating systems supported by these systems,
and the Dell OpenManage components that can be installed on these
systems.
The following system documents are also available to provide more
information about the system in which your DRAC 5 is installed:
• The safety instructions that came with your system provide important
safety and regulatory information. For additional regulatory information,
see the Regulatory Compliance home page at
www.dell.com/regulatory_compliance. Warranty information may be
included within this document or as a separate document.
• The Rack Installation Guide or Rack Installation Instructions included
with your rack solution describes how to install your system into a rack.
• The Getting Started Guide provides an overview of system features, setting
up your system, and technical specifications.
• The Hardware Owner’s Manual provides information about system
features and describes how to troubleshoot the system and install or
replace system components.
• Systems management software documentation describes the features,
requirements, installation, and basic operation of the software.
• Operating system documentation describes how to install (if necessary),
configure, and use the operating system software.
• Documentation for any components you purchased separately provides
information to configure and install these options.
• Updates are sometimes included with the system to describe changes to
the system, software, and/or documentation.
NOTE: Always read the updates first because they often supersede
information in other documents.
• Release notes or readme files may be included to provide last-minute
updates to the system or documentation or advanced technical reference
material intended for experienced users or technicians.
DRAC 5 Overview 31
32 DRAC 5 Overview
2
Getting Started With the DRAC 5
The DRAC 5 enables you to remotely monitor, troubleshoot, and repair a
Dell system even when the system is down. The DRAC 5 offers a rich set of
features like console redirection, virtual media, virtual KVM, Smart Card
authentication, and so on.
Management station is the system from where an administrator remotely
manages a Dell system that is installed with a DRAC card. The systems that
are thus monitored are called managed systems.
To be able to use that DRAC card, follow these steps:
1 Install the DRAC 5 card in your Dell system — The DRAC 5 may be
preinstalled on your system, or available separately in a kit.
NOTE: This procedure may differ for various systems. See your specific
system’s Hardware Owner’s Manual on the Dell Support website at
support.dell.com/manuals for precise instructions on how to perform this
procedure.
You must install the DRAC 5 software on the management station as well
as the managed system. Without the managed system software, you
cannot use the RACADM locally, and the DRAC cannot capture the last
crash screen.
2 Configure the DRAC 5 properties, network settings, and users — You can
configure the DRAC 5 by using either the Remote Access Configuration
Utility, the Web-based interface, or the RACADM.
3 Configure the Microsoft® Active Directory® to provide access to the
DRAC 5, allowing you to add and control DRAC 5 user privileges to
your existing users in your Active Directory software.
4 Configure Smart Card authentication — Smart Card provides an added
level of security to your enterprise.
5 Configure remote access points, such as console redirection and
virtual media.
6 Configure the security settings.
Installing RACADM
1 Log on as root to the system where you want to install the management
station components.
2 If necessary, mount the Dell Systems Management Tools and
Documentation DVD using the following command or a similar command:
mount /media/cdrom
3 Navigate to the /linux/rac directory and execute the following command:
rpm -ivh *.rpm
For help with the RACADM command, type racadm help after issuing the
previous commands.
Uninstalling RACADM
To uninstall RACADM, open a command prompt and type:
rpm -e <racadm_package_name>
where <racadm_package_name> is the rpm package that was used to
install the RAC software.
For example, if the rpm package name is srvadmin-racadm5, then type:
rpm -e srvadmin-racadm5
Windows
The DRAC 5 Web-based interface is supported on the following Windows
operating system languages:
• English
• French
• German
• Spanish
• Japanese
• Simplified Chinese
To view a localized version of the DRAC 5 Web-based interface in
Internet Explorer:
1 Click the Tools menu and select Internet Options.
2 In the Internet Options window, click Languages.
3 In the Language Preference window, click Add.
Linux
If you are running Console Redirection on a Red Hat Enterprise Linux
(version 4) client with a Simplified Chinese GUI, the viewer menu and title
may appear in random characters. This issue is caused by an incorrect
encoding in the Red Hat Enterprise Linux (version 4) Simplified Chinese
operating system. To fix this issue, access and modify the current encoding
settings by performing the following steps:
1 Open a command terminal.
2 Type “locale” and press <Enter>. The following output appears.
LANG=zh_CN.UTF-8
LC_CTYPE="zh_CN.UTF-8"
LC_NUMERIC="zh_CN.UTF-8"
LC_TIME="zh_CN.UTF-8"
LC_COLLATE="zh_CN.UTF-8"
LC_MONETARY="zh_CN.UTF-8"
LC_MESSAGES="zh_CN.UTF-8"
LC_PAPER="zh_CN.UTF-8"
LC_NAME="zh_CN.UTF-8"
LC_ADDRESS="zh_CN.UTF-8"
LC_TELEPHONE="zh_CN.UTF-8"
LC_MEASUREMENT="zh_CN.UTF-8"
LC_IDENTIFICATION="zh_CN.UTF-8"
LC_ALL=
3 If the values include “zh_CN.UTF-8”, no changes are required. If the
values do not include “zh_CN.UTF-8”, go to step 4.
4 Navigate to the /etc/sysconfig/i18n file.
Logging In
You can log in either as a DRAC 5 user or as a Microsoft® Active Directory® user.
The default user name and password are root and calvin, respectively.
Logging Out
1 In the upper-right corner of the DRAC 5 Web-based interface window,
click Log Out to close the session.
2 Close the browser window.
NOTE: The Log Out button does not appear until you log in.
NOTE: Closing the browser without gracefully logging out causes the session to
remain open until it times out. It is strongly recommended that you click the logout
button to end the session; otherwise, the session remains active until the session
timeout is reached.
NOTE: Closing the DRAC 5 Web-based interface within Microsoft Internet Explorer
using the close button ("x") at the top right corner of the window may generate an
application error. To fix this issue, download the latest Cumulative Security Update for
Internet Explorer from the Microsoft Support website, at support.microsoft.com.
#
# inittab This file describes how the INIT process
should set up
# the system in a certain run-level.
#
# Author: Miquel van Smoorenburg
# Modified for RHS Linux by Marc Ewing and
Donnie Barnes
#
# Default runlevel. The runlevels used by RHS are:
# 0 - halt (Do NOT set initdefault to this)
# 1 - Single user mode
# 2 - Multiuser, without NFS (The same as 3, if you
do not have
# networking)
# 3 - Full multiuser mode
# 4 - unused
# 5 - X11
# 6 - reboot (Do NOT set initdefault to this)
#
id:3:initdefault:
# System initialization.
si::sysinit:/etc/rc.d/rc.sysinit
l0:0:wait:/etc/rc.d/rc 0
l1:1:wait:/etc/rc.d/rc 1
l2:2:wait:/etc/rc.d/rc 2
l3:3:wait:/etc/rc.d/rc 3
l4:4:wait:/etc/rc.d/rc 4
l5:5:wait:/etc/rc.d/rc 5
l6:6:wait:/etc/rc.d/rc 6
# Trap CTRL-ALT-DELETE
ca::ctrlaltdel:/sbin/shutdown -t3 -r now
vc/1
vc/2
vc/3
vc/4
vc/5
vc/6
vc/7
vc/8
vc/9
vc/10
vc/11
tty1
tty2
tty3
tty4
tty5
tty6
tty7
tty8
tty9
tty10
tty11
ttyS1
Using the RACADM Command to Configure the Settings for the Serial
and Telnet Console
This subsection provides steps to configure the default configuration settings
for serial/telnet/ssh console redirection.
To configure the settings, type the RACADM config command with the
appropriate group, property, and property value(s) for the setting that you
want to configure.
You can type RACADM commands locally or remotely. When using
RACADM commands remotely, you must include the user name, password,
and managed system DRAC 5 IP address.
Action Command
List the racadm getconfig -h
available groups.
Display the racadm getconfig -g <group>
current settings For example, to display a list of all cfgSerial group settings, type the
for a particular following command:
group.
racadm getconfig -g cfgSerial
Display the racadm -u <user> -p <password> -r <DRAC 5
current settings IP address> getconfig -g cfgSerial
for a particular For example, to display a list of all of the settings for the cfgSerial
group remotely. group remotely, type:
racadm -u root -p calvin -r 192.168.0.1
getconfig -g cfgSerial
Setting Description
Connection Mode • Direct Connect Basic Mode - IPMI Serial Basic Mode
Setting • Direct Connect Terminal Mode - IPMI Serial Terminal
Mode
Baud Rate Sets the data speed rate. Select 9600 bps, 19.2 kbps,
57.6 kbps, or 115.2 kbps.
Setting Description
Flow Control • None — Hardware Flow Control Off
• RTS/CTS — Hardware Flow Control On
Channel Privilege • Administrator
Level Limit • Operator
• User
Setting Description
Enabled Enables or disables the RAC serial console. Checked=
Enabled; Unchecked=Disabled
Maximum Sessions The maximum number of simultaneous sessions allowed
for this system.
Timeout The maximum number of seconds of line idle time before
the line is disconnected. The range is 60 to 1920 seconds.
Default is 300 seconds. Use 0 seconds to disable the
Timeout feature.
Redirect Enabled Enables or disables Console Redirection. Checked=
Enabled; Unchecked=Disabled
Baud Rate The data speed on the external serial port. Values are 9600
bps, 28.8 kbps, 57.6 kbps, and 115.2 kbps. Default is
57.6 kbps.
Escape Key Specifies the <Esc> key. The default are the ^\
characters.
History Buffer Size The size of the serial history buffer, which holds the last
characters written to the console. The maximum and
default = 8192 characters.
Login Command The DRAC command line to be executed upon valid
login.
Button Description
Print Print the Serial Configuration page.
Refresh Refresh the Serial Configuration page.
Apply Changes Apply the IPMI and RAC serial changes.
Terminal Mode Settings Opens the Terminal Mode Settings page.
Setting Description
Line Editing Enables or disables line editing.
Delete Control Select one of the following:
• BMC outputs a <bksp><sp><bksp> character when
<bksp> or <del> is received —
• BMC outputs a <del> character when <bksp> or
<del> is received —
Echo Control Enables or disables echo.
Handshaking Control Enables or disables handshaking.
New Line Sequence Select None, <CR-LF>, <NULL>, <CR>, <LF-CR>,
or <LF>.
Input New Line Select <CR> or <NULL>.
Sequence
Button Description
Print Print the Terminal Mode Settings page.
Refresh Refresh the Terminal Mode Settings page.
Go Back to Serial Port Return to the Serial Port Configuration page.
Configuration
Apply Changes Apply the terminal mode settings changes.
Interface Description
Web-based interface Provides remote access to the DRAC 5 using a graphical
user interface. The Web-based interface is built into
the DRAC 5 firmware and is accessed through the NIC
interface from a supported Web browser on the
management station.
For a list of supported Web browsers, see the Dell
Systems Software Support Matrix on the Dell Support
website at support.dell.com/manuals.
RACADM Provides remote access to the DRAC 5 using a
command line interface. RACADM uses the managed
system’s IP address to execute RACADM commands
(racadm remote capability option [-r]).
NOTE: The racadm remote capability is supported only on
management stations.
NOTE: When using the racadm remote capability, you
must have write permission on the folders where you are
using the racadm subcommands involving file operations,
for example:
racadm getconfig -f <file name>
or:
racadm sslcertupload -t 1 -f
c:\cert\cert.txt subcommands
Telnet Console Provides access through the DRAC 5 to the server RAC
port and hardware management interfaces through the
DRAC 5 NIC and provides support for serial and
RACADM commands including powerdown, powerup,
powercycle, and hardreset commands.
NOTE: Telnet is an unsecure protocol that transmits all
data—including passwords—in plain text. When
transmitting sensitive information, use the SSH interface.
Interface Description
SSH Interface Provides the same capabilities as the telnet console
using an encrypted transport layer for higher security.
IPMI Interface Provides access through the DRAC 5 to the remote
system’s basic management features. The interface
includes IPMI over LAN, IPMI over Serial, and Serial
over LAN. See the Dell OpenManage Baseboard
Management Controller User’s Guide for more
information.
NOTE: The DRAC 5 default user name is root and the default password is
calvin.
You can access the DRAC 5 Web-based interface through the DRAC 5 NIC
by using a supported Web browser, or through Server Administrator or IT
Assistant.
For a list of supported Web browsers, see the Dell Systems Software Support
Matrix on the Dell Support website at support.dell.com/manuals.
To access the DRAC 5 remote access interface using Server Administrator,
launch Server Administrator. From the system tree on the left pane of the
Server Administrator home page, click System→Main System Chassis→
Remote Access Controller. For more information, see your Server
Administrator User’s Guide.
Setting Description
NIC Selection Displays the selected NIC mode (Dedicated, Shared with Failover,
or Shared).
The default setting is Dedicated.
MAC Address Displays the DRAC 5 MAC address.
Enable NIC Enables the DRAC 5 NIC and activates the remaining controls in
this group.
The default setting is Enabled.
Setting Description
Use DHCP (For Enables Dell OpenManage™ Server Administrator to obtain the
NIC IP DRAC 5 NIC IP address from the Dynamic Host Configuration
Address) Protocol (DHCP) server. Selecting the check box deactivates the
Static IP Address, Static Gateway, and Static Subnet Mask
controls.
The default setting is Disabled.
Static IP Specifies or edits the static IP address for the DRAC 5 NIC.
Address To change this setting, deselect the Use DHCP (For NIC
IP Address) check box.
Static Gateway Specifies or edits the static gateway for the DRAC 5 NIC.
To change this setting, deselect the Use DHCP (For NIC
IP Address) check box.
Static Subnet Specifies or edits the static subnet mask for the DRAC 5 NIC. To
Mask change this setting, deselect the Use DHCP (For NIC IP Address)
check box.
Use DHCP to Obtains the primary and secondary DNS server addresses from the
obtain DNS DHCP server instead of the static settings.
server addresses The default setting is Disabled.
Static Preferred Uses the primary DNS server IP address only when Use DHCP to
DNS Server obtain DNS server addresses is not selected.
Static Alternate Uses the secondary DNS server IP address when Use DHCP to
DNS Server obtain DNS server addresses is not selected. You may enter an IP
address of 0.0.0.0 if you do not have an alternate DNS server.
Register DRAC Registers the DRAC 5 name on the DNS server.
on DNS The default setting is Disabled.
DNS DRAC Displays the DRAC 5 name only when Register DRAC 5 on DNS
Name is selected. The default DRAC 5 name is RAC-service tag, where
service tag is the service tag number of the Dell server (for example,
RAC-EK00002).
Use DHCP for Uses the default DNS domain name. When the box is not selected
DNS Domain and the Register DRAC 5 on DNS option is selected, you can
Name modify the DNS domain name in the DNS Domain Name field.
The default setting is Disabled.
Setting Description
DNS Domain The default DNS domain name is MYDOMAIN. When the Use
Name DHCP for DNS Domain Name check box is selected, this option
is grayed out and you cannot modify this field.
Auto Determines whether the DRAC 5 automatically sets the Duplex
Negotiation Mode and Network Speed by communicating with the nearest
router or hub (On) or allows you to set the Duplex Mode and
Network Speed manually (Off).
Network Speed Sets the network speed to 100 Mb or 10 Mb to match your network
environment. This option is not available if Auto Negotiation is set
to On.
Duplex Mode Sets the duplex mode to full or half to match your network
environment. This option is not available if Auto Negotiation is set
to On.
Setting Description
Enable IPMI Over Enables the IPMI LAN channel.
LAN
Channel Privilege Configures the user’s maximum privilege level that can be
Level Limit accepted on the LAN channel. Select one of the following
options: Administrator, Operator, or User.
Encryption Key Configures the encryption key character format: 0 to 20
hexadecimal characters (no blanks allowed).
The default setting is 00000000000000000000.
Enable VLAN ID Enables the VLAN ID. If enabled, only matched VLAN ID
traffic is accepted.
VLAN ID The VLAN ID field of 802.1g fields.
Priority The Priority field of 802.1g fields.
Button Description
Print Prints the Network Configuration page
Refresh Reloads the Network Configuration page
Advanced Settings Displays the Network Security page.
Apply Changes Saves the changes made to the network configuration.
NOTE: Changes to the NIC IP address settings will close all user
sessions and require users to reconnect to the DRAC 5 Web-
based interface using the updated IP address settings. All other
changes will require the NIC to be reset, which may cause a brief
loss in connectivity.
See "Configuring the Network Security Settings Using the DRAC 5 GUI" for
more information.
RACADM Synopsis
racadm -r <RAC IP Address> -u <username> -p <password>
<subcommand> <subcommand options>
racadm -i -r <RAC IP Address> <subcommand> <subcommand
options>
For example:
racadm -r 192.168.0.120 -u root -p calvin getsysinfo
racadm -i -r 192.168.0.120 getsysinfo
If the HTTPS port number of the RAC has been changed to a custom port
other than the default port (443), the following syntax must be used:
racadm -r <RAC IP Address>:<port> -u <username> -p
<password> <subcommand> <subcommand options>
racadm -i -r <RAC IP Address>:<port> <subcommand>
<subcommand options>
Option Description
-r <racIpAddr> Specifies the controller’s remote IP address.
-r <racIpAddr>:<port Use :<port number> if the DRAC 5 port number is
number> not the default port (443)
-i Instructs racadm to interactively query the user for
user name and password.
-u <usrName> Specifies the user name that is used to authenticate
the command transaction. If the -u option is used, the
-p option must be used, and the -i option (interactive)
is not allowed.
-p <password> Specifies the password used to authenticate the
command transaction. If the -p option is used, the -i
option is not allowed.
-S Specifies that racadm should check for invalid
certificate errors. racadm stops the execution of the
command with an error message if it detects an invalid
certificate.
Command Description
help Lists DRAC 5 subcommands.
help Lists usage statement for the specified subcommand.
<subcommand>
arp Displays the contents of the ARP table. ARP table entries may
not be added or deleted.
clearasrscreen Clears the last ASR (crash) screen (last blue screen).
clrraclog Clears the DRAC 5 log. A single entry is made to indicate the
user and time that the log was cleared.
config Configures the RAC.
getconfig Displays the current RAC configuration properties.
coredump Displays the last DRAC 5 coredump.
coredumpdelete Deletes the coredump stored in the DRAC 5.
fwupdate Executes or displays status on DRAC 5 firmware updates.
getssninfo Displays information about active sessions.
getsysinfo Displays general DRAC 5 and system information.
getractime Displays the DRAC 5 time.
ifconfig Displays the current RAC IP configuration.
netstat Displays the routing table and the current connections.
ping Verifies that the destination IP address is reachable from the
DRAC 5 with the current routing-table contents.
setniccfg Sets the IP configuration for the controller.
getniccfg Displays the current IP configuration for the controller.
Parsing Rules
• All lines that start with '#' are treated as comments.
A comment line must start in column one. A '#' character in any other
column is treated as a '#' character.
Some modem parameters may include # characters in its string. An escape
character is not required. You may want to generate a .cfg from a racadm
getconfig -f <filename>.cfg command, and then perform a
racadm config -f <filename>.cfg command to a different
DRAC 5, without adding escape characters.
Example:
#
# This is a comment
[cfgUserAdmin]
cfgUserAdminPageModemInitString=<Modem init # not
a comment>
• All group entries must be surrounded by "[" and "]" characters.
The starting "[" character denoting a group name must start in column one.
This group name must be specified before any of the objects in that group.
Objects that do not include an associated group name generate an error. The
configuration data is organized into groups as defined in "DRAC 5 Property
Database Group and Object Definitions."
DRAC Modes
The DRAC 5 can be configured in one of three modes:
• Dedicated
• Shared
• Shared with failover
Table 4-21 provides a description of each mode.
Mode Description
Dedicated The DRAC uses its own NIC (RJ-45 connector) and the BMC
MAC address for network traffic.
Shared The DRAC uses Broadcom LOM1 on the planar.
Shared with The DRAC uses Broadcom LOM1 and LOM2 as a team for
failover failover. The team uses the BMC MAC address.
Option Description
Upload User Certificate Enables you to upload the user certificate to DRAC and
import it to the user profile.
View User Certificate Displays the user certificate page that has been
uploaded to the DRAC.
Upload Trusted CA Enables you to upload the trusted CA certificate to
Certificate DRAC and import it to the user profile.
View Trusted CA Displays the trusted CA certificate that has been
Certificate uploaded to the DRAC. The trusted CA certificate is
issued by the CA who is authorized to issue certificates
to users.
Property Description
User ID Specifies one of 16 preset User ID numbers.
If you are editing information for user root, this field is
static. You cannot edit the username for root.
Enable User Enables the user to access the DRAC 5. When
unchecked, the User Name cannot be changed.
User Name Specifies a DRAC 5 user name with up to 16 characters.
Each user must have a unique user name.
NOTE: User names on the local DRAC 5 cannot include
the @ (at the rate) , \ (back slash) , " (double quotes), /
(forward slash), or . (period) characters.
NOTE: If the user name is changed, the new name will
not appear in the user interface until the next user login.
Property Description
Change Password Enables the New Password and Confirm New Password
fields. When unchecked, the user’s Password cannot be
changed.
New Password Specifies or edits the DRAC 5 user's password.
Confirm New Password Requires you to retype the DRAC 5 user's password to
confirm.
Property Description
Maximum LAN User Specifies the user’s maximum privilege on the IPMI
Privilege Granted LAN channel to one of the following user groups:
Administrator, Operator, User, or None.
Maximum Serial Port Specifies the user’s maximum privilege on the IPMI
User Privilege Granted Serial channel to one of the following: Administrator,
Operator, User, or None.
Enable Serial Over LAN Allows user to use IPMI Serial Over LAN. When
checked, this privilege is enabled.
Property Description
DRAC Group Specifies the user’s maximum DRAC user privilege to
one of the following: Administrator, Power User, Guest
User, None, or Custom.
See Table 5-5 for DRAC Group permissions.
Login to DRAC Enables the user to log in to the DRAC.
Configure DRAC Enables the user to configure the DRAC.
Configure Users Enables the user to allow specific users to access the
system.
Clear Logs Enables the user to clear the DRAC logs.
Property Description
Execute Server Control Enables the user to execute racadm commands.
Commands
Access Console Enables the user to run Console Redirection.
Redirection
Access Virtual Media Enables the user to run and use Virtual Media.
Test Alerts Enables the user to send test alerts (e-mail and PET) to
a specific user.
Execute Diagnostic Enables the user to run diagnostic commands.
Commands
Button Action
Print Prints the User Configuration page
Refresh Reloads the User Configuration page
Go Back To Users Returns to the Users Page.
Page
Apply Changes Saves the changes made to the network configuration.
Role
Role Group Name Role
Group and Domain Definition
Name
User
NOTE: The Bit Mask values are used only when setting Standard Schema with the
RACADM.
There are two ways to enable Standard Schema Active Directory:
• With the DRAC 5 web-based user interface. See "Configuring the DRAC
5 With Standard Schema Active Directory and Web-Based Interface".
• With the RACADM CLI tool. See "Configuring the DRAC 5 With
Standard Schema Active Directory and RACADM".
Association
Object
RAC4 Privilege
Object
NOTE: The RAC privilege object applies to both DRAC 4 and DRAC 5.
You can create as many or as few association objects as required. However, you
must create at least one Association Object, and you must have one RAC
Device Object for each RAC (DRAC 5) on the network that you want to
integrate with Active Directory for Authentication and Authorization with
the RAC (DRAC 5).
The Association Object allows for as many or as few users and/or groups as
well as RAC Device Objects. However, the Association Object only includes
one Privilege Object per Association Object. The Association Object
connects the "Users" who have "Privileges" on the RACs (DRAC 5s).
Additionally, you can configure Active Directory objects in a single domain or
in multiple domains. For example, you have two DRAC 5 cards (RAC1 and
RAC2) and three existing Active Directory users (user1, user2, and user3).
You want to give user1 and user2 an administrator privilege to both DRAC 5
cards and give user3 a login privilege to the RAC2 card. Figure 6-3 shows how
you set up the Active Directory objects in this scenario.
AO1 AO2
To configure the objects for the single domain scenario, perform the
following tasks:
1 Create two Association Objects.
2 Create two RAC Device Objects, RAC1 and RAC2, to represent the two
DRAC 5 cards.
3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all
privileges (administrator) and Priv2 has login privileges.
4 Group user1 and user2 into Group1.
5 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege
Objects in AO1, and RAC1, RAC2 as RAC Devices in AO1.
6 Add User3 as Members in Association Object 2 (AO2), Priv2 as Privilege
Objects in AO2, and RAC2 as RAC Devices in AO2.
Domain1 Domain2
AO1 AO2
To configure the objects for the multiple domain scenario, perform the
following tasks:
1 Ensure that the domain forest function is in Native or Windows 2003
mode.
2 Create two Association Objects, AO1 (of Universal scope) and AO2,
in any domain.
Figure 6-4 shows the objects in Domain2.
3 Create two RAC Device Objects, RAC1 and RAC2, to represent the two
DRAC 5 cards.
OID 1.2.840.113556.1.8000.1280.1.1.1.1
Description Represents the Dell RAC device. The RAC device must be
configured as dellRacDevice in Active Directory.
This configuration enables the DRAC 5 to send
Lightweight Directory Access Protocol (LDAP) queries to
Active Directory.
Class Type Structural Class
SuperClasses dellProduct
Attributes dellSchemaVersion
dellRacType
OID 1.2.840.113556.1.8000.1280.1.1.1.2
Description Represents the Dell Association Object. The Association
Object provides the connection between the users and the
devices.
Class Type Structural Class
SuperClasses Group
Attributes dellProductMembers
dellPrivilegeMember
OID 1.2.840.113556.1.8000.1280.1.1.1.3
Description Used to define the privileges (Authorization Rights) for the
DRAC 5 device.
Class Type Auxiliary Class
SuperClasses None
Attributes dellIsLoginUser
dellIsCardConfigAdmin
dellIsUserConfigAdmin
dellIsLogClearAdmin
dellIsServerResetUser
dellIsConsoleRedirectUser
dellIsVirtualMediaUser
dellIsTestAlertUser
dellIsDebugCommandAdmin
OID 1.2.840.113556.1.8000.1280.1.1.1.4
Description Used as a container Class for the Dell Privileges (Authorization Rights).
Class Type Structural Class
SuperClasses User
Attributes dellRAC4Privileges
OID 1.2.840.113556.1.8000.1280.1.1.1.5
Description The main class from which all Dell products are derived.
Class Type Structural Class
SuperClasses Computer
Attributes dellAssociationMembers
Adding Privileges
1 Select the Privileges Object tab and click Add.
2 Type the Privilege Object name and click OK.
Click the Products tab to add one or more RAC devices to the association.
The associated devices specify the RAC devices connected to the network
that are available for the defined users or user groups. Multiple RAC devices
can be added to an Association Object.
A01 A02
The figure shows two Association Objects—A01 and A02. These Association
Objects may be part of the same or different domains. User1 is associated to
RAC1 and RAC2 through both association objects. Therefore, User1 has
accumulated privileges that results when combining the Privileges set for
objects Priv1 and Priv2.
For example, Priv1 had the privileges: Login, Virtual Media, and Clear Logs
and Privr2 had the privileges: Login, Configure DRAC, and Test Alerts.
User1 will now have the privilege set: Login, Virtual Media, Clear Logs,
Configure DRAC, and Test Alerts, which is the combined privilege set of
Priv1 and Priv2
Extended Schema Authentication, thus, accumulates privileges to allow the
user the maximum set of privileges possible considering the assigned
privileges of the different privilege objects associated to the same user.
Field Description
Configure Active Configures the Active Directory's DRAC Name, ROOT
Directory Domain Name, DRAC Domain Name, Active Directory
Authentication Timeout, Active Directory Schema
Selection, and Role Group settings.
Upload Active Uploads an Active Directory certificate to the DRAC.
Directory CA
Certificate
Download DRAC The Windows Download Manager enables you to
Server Certificate download a DRAC server certificate to your system.
View Active Directory Displays the Active Directory Certificate that has been
CA Certificate uploaded to the DRAC.
Setting Description
Enable Active Enables Active Directory. Checked=Enabled;
Directory Unchecked=Disabled.
ROOT Domain Name The Active Directory ROOT domain name. This value is
NULL by default.
The name must be a valid domain name consisting of x.y,
where x is a 1-254 character ASCII string with no blank
spaces between characters, and y is a valid domain type
such as com, edu, gov, int, mil, net, org.
Timeout The time in seconds to wait for Active Directory queries
to complete. Minimum value is equal to or greater than 15
seconds. The default value is 120 seconds.
Use Standard Schema Uses Standard Schema with Active Directory
Use Extended Schema Uses Extended Schema with Active Directory
DRAC Name The name that uniquely identifies the DRAC 5 card in
Active Directory. This value is NULL by default.
The name must be a 1-254 character ASCII string with no
blank spaces between characters.
DRAC Domain Name The DNS name (string) of the domain, where the Active
Directory DRAC 5 object resides. This value is NULL by
default.
The name must be a valid domain name consisting of x.y,
where x is a 1-254 character ASCII string with no blank
spaces between characters, and y is a valid domain type
such as com, edu, gov, int, mil, net, org.
Setting Description
Role Groups The list of role groups associated with the DRAC 5 card.
To change the settings for a role group, click their role
group number, in the role groups list. The Configure Role
Group window displays.
NOTE: If you click on the role group link prior to applying the
settings for the Active Directory Configuration and
Management page, you will lose these settings.
Group Name The name that identifies the role group in the Active
Directory associated with the DRAC 5 card.
Group Domain The domain that the group is in.
Group Privilege The privilege level for the group.
Button Description
Print Prints the Active Directory Configuration and
Management page.
Apply Saves the changes made to the Active Directory
Configuration and Management page.
Go Back to Active Returns to the Active Directory Main Menu page.
Directory Main Menu
Setting Description
Role Group Privilege Level Specifies the user’s maximum DRAC user
privilege to one of the following: Administrator,
Power User, Guest user, None, or Custom.
See Table 6-13 for Role Group permissions
Login to DRAC Enables the user to log in to the DRAC.
Configure DRAC Enables the user to configure the DRAC.
Setting Description
Configure Users Enables the user to allow specific users to access
the system.
Clear Logs Enables the user to clear the DRAC logs.
Execute Server Control Enables the user to execute racadm commands.
Commands
Access Console Redirection Enables the user to run Console Redirection.
Access Virtual Media Enables the user to run and use Virtual Media.
Test Alerts Enables the user to send test alerts (e-mail and
PET) to a specific user.
Execute Diagnostic Commands Enables the user to run diagnostic commands.
Property Description
Administrator Login to DRAC, Configure DRAC, Configure Users, Clear
Logs, Execute Server Control Commands, Access Console
Redirection, Access Virtual Media, Test Alerts, Execute
Diagnostic Commands
Power User Login to DRAC, Clear Logs, Execute Server Control
Commands, Access Console Redirection, Access Virtual
Media, Test Alerts
Guest User Login to DRAC
Custom Selects any combination of the following permissions: Login to
DRAC, Configure DRAC, Configure Users, Clear Logs,
Execute Server Action Commands, Access Console
Redirection, Access Virtual Media, Test Alerts, Execute
Diagnostic Commands
None No assigned permissions
Field Description
Serial Number Certificate serial number.
Subject Information Certificate attributes entered by the subject.
Issuer Information Certificate attributes returned by the issuer.
Setting Description
Configure Smart Card • Disabled — Disables Smart Card logon. Subsequent logins
Logon from the graphical user interface (GUI) display the regular
login page. All command line out-of-band interfaces
including secure shell (SSH), Telnet, Serial, and remote
RACADM are set to their default state.
• Enabled — Enables Smart Card logon. After applying the
changes, logout, insert your Smart Card, enter your Smart
Card PIN, and then click Login to log on to the DRAC.
Enabling Smart Card logon disables all CLI out-of-band
interfaces including SSH, Telnet, Serial, remote RACADM,
and IPMI over LAN.
• Enabled with Remote Racadm — Enables Smart Card logon
along with remote RACADM. All other CLI out-of-band
interfaces are disabled.
NOTE: The Smart Card logon requires you to configure the local
DRAC 5 users with the appropriate certificates. If the Smart
Card logon is used to log in a Microsoft Active Directory user,
then you must ensure that you configure the Active Directory
user certificate for that user. You can configure the user
certificate in the Users→User Main Menu page.
Enable CRL check for This check is available only for Smart Card local users. Select
Smart Card Logon this option if you want the DRAC to check the Certificate
Revocation List (CRL) for revocation of the user's Smart
Card certificate. For the CRL feature to work, the DRAC
must have a valid DNS IP address configured as part of its
network configuration. You can configure the DNS IP address
in DRAC under Remote Access→Configuration→Network.
The user will not be able to login if:
• The user certificate is listed as revoked in the CRL file.
• DRAC is not able to communicate with the CRL
distribution server.
• DRAC is not able to download the CRL.
NOTE: You must correctly configure the IP address of the DNS
server in the Configuration→Network page for this check
to succeed.
Overview
The DRAC 5 console redirection feature enables you to access the local
console remotely in either graphic or text mode. Using console redirection,
you can control one or more DRAC 5-enabled systems from one location.
Today with the power of networking and the Internet, you do not have to sit
in front of each server to perform all the routine maintenance. You can
manage the servers from another city or even from the other side of the world
from your desktop or laptop computer. You can also share the information
with others— remotely and instantly.
Information Description
Enabled Checked = Enabled; Unchecked=Disabled
Max Sessions Displays the number of console redirection sessions
that are available.
Active Sessions Displays the number of active console redirection
sessions.
Keyboard and Mouse Port Default = 5900
Number
Video Port Number Default = 5901
Video Encryption Enabled Checked = Enabled; Unchecked=Disabled
Local Server Video Checked = Enabled; Unchecked=Disabled
Enabled
Plug-in Type Enables you to select the Native (ActiveX for
Windows and XPI plug-in for Linux) or Java plug-in.
NOTE: If you select the Java plug-in, ensure that you
already have the Java Virtual Machine (JVM) version
1.6 or later installed on your system.
Property Description
Print Prints the Console Redirect Configuration page
Refresh Reloads the Console Redirect Configuration page
Apply Changes Saves your configuration settings.
NOTE: With DRAC 5 version 1.30 and later, you can disable console redirection for
a remote user. For more information, see "Disabling DRAC 5 Remote Virtual KVM."
Property Description
Console Redirection Yes/No
Enabled
Video Encryption Yes/No
Enabled
Property Description
Local Server Video Yes/No
Enabled
Status Connected or Disconnected
Max Sessions The maximum number of supported console redirection sessions
Active Sessions The current number of active console redirection sessions
Plug-in Type The plug-in type you selected in the Console Redirect
Configuration page.
The buttons in Table 10-5 are available on the Console Redirection page.
Button Definition
Refresh Reloads the Console Redirection Configuration page
Connect Opens a console redirection session on the targeted
remote system.
Print Prints the Console Redirection Configuration page.
DRAC 5 Remote CD
Virtual CD
Network
Remote Floppy
Virtual Floppy
Attaching, Auto-Attaching, and Detaching Virtual Media using the Web browser
You can set the status of a virtual media to Attach, Auto-Attach, or Detach.
Based on this status, the devices in the remote system are displayed in the
DRAC 5 GUI.
• Attach—If the status is Attach, DRAC 5 automatically attaches all devices
of the remote system to the server. When you connect to the server, the
devices available in the remote system are displayed in the DRAC 5 GUI.
• Auto Attach—If the status is Auto Attach, DRAC 5 attaches a device to
the server only if the device is virtualized. For example, when you connect
to the server from a remote machine that has a CD drive, the CD drive is
displayed only if it is virtualized using a CD. Otherwise, the CD drive is
not displayed in the DRAC 5 GUI.
• Detach—If the status is Detach, virtual device is not displayed in the
server.
Windows-Based Systems
On Windows systems, the virtual media drives are automounted and
configured with a drive letter.
Linux-Based Systems
On Linux systems, the virtual media drives are not configured with a drive
letter. Depending on the software installed on your system, the virtual media
drives may not be automounted. If your drives are not automounted,
manually mount the drives.
DRAC 5 IP Address
-r <RAC-IP-address>[:<RAC-SSL-port>]
where <RAC-IP-address> is a valid, unique IP address or the DRAC 5
Dynamic Domain Naming System (DDNS) name (if supported).
This parameter provides the DRAC 5 IP address and SSL port. The VM-CLI
utility needs this information to establish a Virtual Media connection with
the target DRAC 5. If you enter an invalid IP address or DDNS name,
an error message appears and the command is terminated.
If <RAC-SSL-port> is omitted, port 443 (the default port) is used.
The optional SSL port is not required unless you change the DRAC 5 default
SSL port.
Version Display
-v
This parameter is used to display the VM-CLI utility version. If no other
non-switch options are provided, the command terminates without an error
message.
Help Display
-h
This parameter displays a summary of the VM-CLI utility parameters.
If no other non-switch options are provided, the command terminates
without error.
Field Description
Generate a New Click Next to open the Certificate Signing Request
Certificate Signing Generation page that enables you to generate a CSR to send to
Request (CSR) a CA to request a secure Web certificate.
CAUTION: Each new CSR overwrites any pervious CSR on
the firmware. For a CA to accept your CSR, the CSR in the
firmware must match the certificate returned from the CA.
Upload Server Click Next to upload an existing certificate that your company
Certificate has title to, and uses to control access to the DRAC 5.
CAUTION: Only X509, Base 64 encoded certificates are
accepted by the DRAC 5. DER encoded certificates are not
accepted. Upload a new certificate to replace the default
certificate you received with your DRAC 5.
View Server Click Next to view an existing server certificate.
Certificate
Button Description
Print Prints the SSL Main Menu page.
Next Navigates to the next page.
Field Description
Common Name The exact name being certified (usually the Web server's
domain name, for example, www.xyzcompany.com). Only
alphanumeric characters, hyphens, underscores, and periods
are valid. Spaces are not valid.
Organization Name The name associated with this organization (for example, XYZ
Corporation). Only alphanumeric characters, hyphens,
underscores, periods and spaces are valid.
Organization Unit The name associated with an organizational unit, such as a
department (for example, Enterprise Group). Only
alphanumeric characters, hyphens, underscores, periods, and
spaces are valid.
Locality The city or other location of the entity being certified (for
example, Round Rock). Only alphanumeric characters and
spaces are valid. Do not separate words using an underscore or
some other character.
State Name The state or province where the entity who is applying for a
certification is located (for example, Texas). Only
alphanumeric characters and spaces are valid. Do not use
abbreviations.
Country Code The name of the country where the entity applying for
certification is located. Use the drop-down menu to select the
country.
Email The e-mail address associated with the CSR. You can type
your company’s e-mail address, or any e-mail address you
desire to have associated with the CSR. This field is optional.
Button Description
Print Print the Generate Certificate Signing Request (CSR) page.
Go Back to Security Return to the SSL Main Menu page.
Main Menu
Generate Generate a CSR.
Field Description
Serial Number Certificate serial number
Subject Information Certificate attributes entered by the subject
Field Description
Issuer Information Certificate attributes returned by the issuer
Valid From Issue date of the certificate
Valid To Expiration date of the certificate
Configuring Services
NOTE: To modify these settings, you must have Configure DRAC 5 permission.
Additionally, the remote RACADM command-line utility can only be enabled if the
user is logged in as root.
1 Expand the System tree and click Remote Access.
2 Click the Configuration tab and then click Services.
3 Configure the following services as required:
• Local Configuration (Table 12-7)
• Web server (Table 12-8)
• SSH (Table 12-9)
• Telnet (Table 12-10)
• Remote RACADM (Table 12-11)
Setting Description
Disable the DRAC local Disables local configuration of the DRAC 5 using
configuration using option option ROM. The option ROM prompts you to
ROM enter the setup module by pressing <Ctrl+E>
during system reboot.
Disable the DRAC local Disables local configuration of the DRAC 5 using
configuration using RACADM local RACADM.
Setting Description
Enabled Enables or disables the Web server. Checked=Enabled;
Unchecked=Disabled.
Max Sessions The maximum number of simultaneous sessions allowed
for this system.
Active Sessions The number of current sessions on the system, less than
or equal to the Max Sessions.
Timeout The time in seconds that a connection is allowed to
remain idle. The session is cancelled when the timeout is
reached. Changes to the timeout setting do not affect the
current session. When you change the timeout setting,
you must log out and log in again to make the new setting
effective. Timeout range is 60 to 1920 seconds.
Setting Description
HTTP Port Number The port used by the DRAC that listens for a server
connection. The default setting is 80.
HTTPS Port Number The port used by the DRAC that listens for a server
connection. The default setting is 443.
Setting Description
Enabled Enables or disables SSH. Checked=Enabled;
Unchecked=Disabled.
Max Sessions The maximum number of simultaneous sessions allowed
for this system. Up to four sessions are supported.
Active Sessions The number of current sessions on the system, less than
or equal to the Max Sessions.
Timeout The Secure Shell idle timeout, in seconds. Range = 60 to
1920 seconds. Enter 0 seconds to disable the Timeout
feature. The default setting is 300.
Port Number The port used by the DRAC that listens for a server
connection. The default setting is 22.
Setting Description
Enabled Enables or disables Telnet. Checked=Enabled;
Unchecked=Disabled.
Max Sessions The maximum number of simultaneous sessions allowed
for this system. Up to four sessions are supported.
Active Sessions The number of current sessions on the system, less than
or equal to the Max Sessions.
Timeout The Secure Shell idle timeout, in seconds. Range = 60 to
1920 seconds. Enter 0 seconds to disable the Timeout
feature. The default setting is 0.
Port Number The port used by the DRAC that listens for a server
connection. The default setting is 23.
Setting Description
Enabled Enables or disables remote RACADM. Checked=
Enabled; Unchecked=Disabled.
Max Sessions The maximum number of simultaneous sessions allowed
for this system. Up to four sessions are supported.
Active Sessions The number of current sessions on the system, less than
or equal to the Max Sessions.
Setting Description
Enabled Enables or disables the SNMP agent. Checked=Enabled;
Unchecked=Disabled.
Community Name The name of the community that contains the IP address
for the SNMP Alert destination. The Community Name
can be up to 31 non-blank characters in length. The
default setting is public.
Setting Description
Enabled Enables the Automated System Recovery Agent.
Button Description
Print Prints the Services page.
Refresh Refreshes the Services page.
Apply Changes Applies the Services page settings.
IP Filtering (IpRange)
IP address filtering (or IP Range Checking) allows DRAC 5 access only from
clients or management workstations whose IP addresses are within a user-
specific range. All other logins are denied.
IP filtering compares the IP address of an incoming login to the IP address
range that is specified in the following cfgRacTuning properties:
• cfgRacTuneIpRangeAddr
• cfgRacTuneIpRangeMask
The cfgRacTuneIpRangeMask property is applied to both the incoming
IP address and to the cfgRacTuneIpRangeAddr properties. If the results of
both properties are identical, the incoming login request is allowed to access
the DRAC 5. Logins from IP addresses outside this range receive an error.
The login proceeds if the following expression equals zero:
cfgRacTuneIpRangeMask & (<incoming_IP_address> ^
cfgRacTuneIpRangeAddr)
where & is the bitwise AND of the quantities and ^ is the bitwise
exclusive-OR.
See "DRAC 5 Property Database Group and Object Definitions" for a
complete list of cfgRacTune properties.
Property Description
cfgRacTuneIpRangeEnable Enables the IP range checking feature.
cfgRacTuneIpRangeAddr Determines the acceptable IP address bit pattern,
depending on the 1’s in the subnet mask.
This property is bitwise AND’d with
cfgRacTuneIpRangeMask to determine the upper
portion of the allowed IP address. Any IP address that
contains this bit pattern in its upper bits is allowed to
establish a DRAC 5 session. Logins from IP addresses
that are outside this range will fail. The default values
in each property allow an address range from
192.168.1.0 to 192.168.1.255 to establish a DRAC 5
session.
cfgRacTuneIpRangeMask Defines the significant bit positions in the IP address.
The subnet mask should be in the form of a netmask,
where the more significant bits are all 1’s with a single
transition to all zeros in the lower-order bits.
Enabling IP Filtering
Below is an example command for IP filtering setup.
See "Using RACADM Remotely" for more information about RACADM and
RACADM commands.
NOTE: The following RACADM commands block all IP addresses except
192.168.0.57)
To restrict the login to a single IP address (for example, 192.168.0.57), use the
full mask, as shown below.
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeEnable 1
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeAddr 192.168.0.57
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeMask 255.255.255.255
IP Filtering Guidelines
Use the following guidelines when enabling IP filtering:
• Ensure that cfgRacTuneIpRangeMask is configured in the form of a
netmask, where all most significant bits are 1’s (which defines the subnet
in the mask) with a transition of all 0’s in the lower-order bits.
• Use the range base address you prefer as the value for
cfgRacTuneIpRangeAddr. The 32-bit binary value of this address should
have zeros in all the low-order bits where there are zeros in the mask.
IP Blocking
IP blocking dynamically determines when excessive login failures occur from
a particular IP address and blocks (or prevents) the address from logging into
the DRAC 5 for a preselected time span.
The IP blocking parameter uses cfgRacTuning group features that include:
• The number of allowable login failures
• The timeframe in seconds when these failures must occur
• The amount of time in seconds when the "guilty" IP address is prevented
from establishing a session after the total allowable number of failures is
exceeded
Property Definition
cfgRacTuneIpBlkEnable Enables the IP blocking feature.
When consecutive failures
(cfgRacTuneIpBlkFailCount) from a single IP
address are encountered within a specific amount of
time (cfgRacTuneIpBlkFailWindow), all further
attempts to establish a session from that address are
rejected for a certain timespan
(cfgRacTuneIpBlkPenaltyTime).
cfgRacTuneIpBlkFailCount Sets the number of login failures from an IP address
before the login attempts are rejected.
cfgRacTuneIpBlkFailWindow The timeframe in seconds when the failure attempts
are counted. When the failures exceed this limit,
they are dropped from the counter.
crgRacTuneIpBlkPenaltyTime Defines the timespan in seconds when all login
attempts from an IP address with excessive failures
are rejected.
Settings Description
IP Range Enabled Enables the IP Range checking feature, which defines a specific
range of IP addresses that can access the DRAC 5.
IP Range Address Determines the acceptable IP subnet address.
IP Range Subnet Defines the significant bit positions in the IP address. The
Mask subnet mask should be in the form of a netmask, where the
more significant bits are all 1's with a single transition to all
zeros in the lower-order bits.
For example: 255.255.255.0
IP Blocking Enables the IP address blocking feature, which limits the
Enabled number of failed login attempts from a specific IP address for a
preselected time span.
IP Blocking Fail Sets the number of login failures attempted from an IP address
Count before the login attempts are rejected from that address.
IP Blocking Fail Determines the time span in seconds within which IP Block Fail
Window Count failures must occur to trigger the IP Block Penalty Time.
IP Blocking The time span in seconds within which login attempts from an
Penalty Time IP address with excessive failures are rejected.
Button Description
Print Prints the Network Security page
Refresh Reloads the Network Security page
Apply Changes Saves the changes made to the Network Security page.
Go Back to Returns to the Network Configuration page.
Network
Configuration
Page
SM-CLP Features
The SM-CLP promotes the concept of verbs and targets to provide system
management capabilities through the CLI. The verb indicates the
operation to perform, and the target determines the entity (or object)
that runs the operation.
Below is an example of the SM-CLP command line syntax.
<verb> [<options>] [<target>] [<properties>]
Verb Definition
cd Navigates through the MAP using the shell.
delete Deletes an object instance.
help Displays help for a specific target.
reset Resets the target.
show Displays the target properties, verbs, and subtargets.
start Turns on a target.
stop Shuts down a target.
exit Exits from the SM-CLP shell session.
version Displays the version attributes of a target.
Table 13-2. Supported CLI Verbs for Fans, Batteries, Intrusion, Hardware Performance,
Power supplies, Temperatures and Voltages
Verb Definition
cd Navigates through the MAP using the shell.
help Displays help for a specific target.
show Displays the target properties, verbs, and subtargets.
exit Exits from the SM-CLP shell session.
version Displays the version attributes of a target.
Using SM-CLP
1 SSH (or telnet) to the DRAC 5 with correct credentials.
2 At the command prompt, type smclp.
The SMCLP prompt (->) is displayed.
Management Operations
The DRAC 5 SM-CLP enables users to manage the following:
• Server Power Management — Turn on, shutdown, or reboot the system
• System Event Log (SEL) Management — Display or clear the SEL records
Options
Table 13-3 lists the supported SM-CLP options.
Table 13-3. Supported SM-CLP Options
SM-CLP Description
Option
-all Instructs the verb to perform all possible functions.
-display Displays the user-defined data.
-examine Instructs the command processor to validate the command syntax
without executing the command.
-help Displays command verb help.
-version Displays the command verb version.
Targets
Table 13-4 provides a list of targets provided through the SM-CLP to support
these operations.
Target Definition
/system1 The managed system target.
/system1/logs1 The log collections target
/system1/logs1/log1 The System Event Log (SEL) target on the
managed system.
/system1/logs1/log1/ An individual SEL record instance on the managed
record1 system.
/system1/pwrmgtsvc1 The power management service for the system.
Target Definition
/system1/pwrmgtsvc1/ Capabilities of the power management service for
pwrmgtcap1 the system.
/system1/fan1 A fan target on the managed system.
/system1/fan1/ An individual sensor target on the fan target on the
tachsensor1 managed system.
/system1/batteries1 A battery target on the managed system.
/system1/batteries1/ An individual sensor target on the battery target on
sensor1 the managed system.
/system1/intrusion1 A chassis intrusion target on the managed system.
/system1/intrusion1/ An individual sensor target on the chassis intrusion
sensor1 target on the managed system.
/system1/hardwareperfor A hardware performance target on the managed
mance1 system.
/system1/hardwareperfor An individual sensor target on the hardware
mance1/sensor1 performance target on the managed system.
/system1/powersupplies1 A power supply target on the managed system.
/system1/powersupplies1 An individual sensor target on the power supply
/sensor1 target on the managed system.
/system1/temperatures1 A temperature target on the managed system.
/system1/temperatures1/ An individual sensor target on the temperature
tempsensor1 target on the managed system.
/system1/voltages1 A voltage target on the managed system.
/system1/voltages1/volt An individual sensor target on the voltage target on
sensor1 the managed system.
/system1/chassis1 An individual chassis target of the system.
Operation Syntax
Logging into the >ssh 192.168.0.120
RAC using the >login: root
telnet/SSH >password:
interface
Starting the SM- -
CLP management >smclp
shell DRAC5 SM-CLP System Management Shell,
version 1.0
Copyright (c) 2004-2008 Dell, Inc.
All Rights Reserved
->
Power down the -
server ->stop /system1
system1 has been stopped successfully
Power up the server -
from a powered-off ->start /system1
state system1 has been started successfully
Reboot the server ->reset /system1
system1 has been reset successfully
Operation Syntax
Viewing the ->show /system1/logs1/log1
SEL /system1/logs1/log1
Targets:
Record1
Record2
Record3
Record4
Record5
Properties:
InstanceID = IPMI:BMC1 SEL Log
MaxNumberOfRecords = 512
CurrentNumberOfRecords = 5
Name = IPMI SEL
EnabledState = 2
OperationalState = 2
HealthState = 2
Caption = IPMI SEL
Description = IPMI SEL
ElementName = IPMI SEL
Commands:
cd
show
help
exit
version
Operation Syntax
Viewing the ->show /system1/logs1/log1/record4
SEL record /system1/logs1/log1/record4
Properties:
LogCreationClassName = CIM_RecordLog
CreationClassName = CIM_LogRecord
LogName = IPMI SEL
RecordID = 1
MessageTimeStamp = 20050620100512.000000-
000
Description = FAN 7 RPM: fan sensor,
detected a failure
ElementName = IPMI SEL Record
Commands:
cd
show
help
exit
version
Clearing the ->delete /system1/logs1/log1/record*
SEL All records deleted successfully
Operation Syntax
Viewing the ->show system1/batteries1/sensor1
status of the /system1/batteries1/sensor1:
batteries
Properties:
SystemCreationClassName = CIM_ComputerSystem
SystemName = F196P1S
CreationClassName = CIM_Sensor
DeviceID = BATTERY 1
SensorType = 1
PossibleStates = {"Good" "Bad" "Unknown"}
CurrentState = good
ElementName = System Board CMOS
Battery
OtherSensorTypeDescription = CMOS battery
sensor.
EnabledState = 1
Verbs:
cd
exit
help
show
version
Operation Syntax
Navigate to the ->cd system1
system target and ->reset
reboot
NOTE: The current default target is /.
Navigate to the SEL ->cd system1
target and display the ->cd logs1/log1
log records ->show
->cd system1/logs1/log1
->show
Display current ->cd .
target
Move up one level ->cd ..
Exiting the shell ->exit
System Properties
The Table 13-9 lists the system properties that are displayed when the user
types the following:
show /system1
These properties are derived from the Base System Profile that is provided by
the standards body and is based on the CIM_ComputerSystem class as
defined by the CIM schema.
For additional information, see the DMTF CIM schema definitions.
Using the set verb, you can set the power state of the system. for example, to
turn on the system if it is off:
set powerstate=2
Configuring PET
Setting Description
Enable Serial Over Enables Serial Over LAN. Checked=Enabled;
LAN Unchecked=Disabled.
Baud Rate The IPMI data speed. Select 9600 bps, 19.2 kbps, 57.6
kbps, or 115.2 kbps.
Channel Privilege Sets the IPMI Serial Over LAN minimum user privilege:
Level Limit Administrator, Operator, or User.
Button Description
Print Prints the Serial Over LAN Configuration page.
Refresh Refreshes the Serial Over LAN Configuration page.
Advanced Settings Opens the Serial Over LAN Configuration Advanced
Settings page.
Apply Changes Applies the Serial Over LAN Configuration page settings.
Table 15-3. Serial Over LAN Configuration Advanced Settings Page Settings
Setting Description
Character Accumulate The amount of time that the BMC will wait before
Interval transmitting a partial SOL character data package.
1-based 5ms increments.
Character Send The BMC will send an SOL character data package
Threshold containing the characters as soon as this number of
characters (or greater) has been accepted. 1-based units.
Table 15-4. Serial Over LAN Configuration Advanced Settings Page Buttons
Button Description
Print Prints the Serial Over LAN Configuration Advanced
Settings page.
Refresh Refreshes the Serial Over LAN Configuration Advanced
Settings page.
Go Back To Serial Returns to the Serial Over LAN Configuration page.
Over LAN
Configuration Page
Apply Changes Applies the Serial Over LAN Configuration Advanced
Settings page settings.
Button Action
Print Prints the Power Management page
Refresh Reloads the Power Management page
Field Description
Description System description.
BIOS Version System BIOS version.
Service Tag System Service Tag number.
Host Name Host system’s name.
OS Name Operating system running on the system.
Field Description
Recovery Action When a "system hang" is detected, the DRAC can be
configured to do one of the following actions: No Action,
Hard Reset, Power Down, or Power Cycle.
Initial Countdown The number of seconds after a "system hang" is detected at
which the DRAC will perform a Recovery Action.
Present The current value, in seconds, of the countdown timer.
Countdown
Field Description
NIC1 Ethernet The NIC 1 Ethernet address.
NIC2 Ethernet The NIC 2 Ethernet address.
Field Description
Name Short name.
Product Verbose Name.
Information
Hardware Version Remote Access Controller card version, or "unknown".
Firmware Version DRAC 5 current firmware version level.
Firmware Updated Date and time that the firmware was last updated.
RAC Time System clock setting.
Field Description
Name "Baseboard Management Controller".
IPMI Version Intelligent Platform Management Interface (IPMI) version.
Number of Possible Maximum number of session that can be active at the
Active Sessions same time.
Number of Current Total number of current active sessions.
Active Sessions
Firmware Version Version of the BMC firmware.
LAN Enabled LAN Enabled or LAN Disabled.
Icon/Category Description
A green check mark indicates a healthy (normal) status condition.
A yellow triangle containing an exclamation point indicates a
warning (noncritical) status condition.
Icon/Category Description
Date/Time The date and time that the event occurred. If the date is blank, then
the event occurred at System Boot. The format is mm/dd/yyyy
hh:mm:ss, based on a 24-hour clock.
Description A brief description of the event
Button Action
Print Prints the SEL in the sort order that it appears in the window.
Clear Log Clears the SEL.
NOTE: The Clear Log button appears only if you have Clear Logs
permission.
Save As Opens a pop-up window that enables you to save the SEL to a
directory of your choice.
NOTE: If you are using Internet Explorer and encounter a problem
when saving, be sure to download the Cumulative Security Update for
Internet Explorer, located on the Microsoft Support website at
support.microsoft.com.
Refresh Reloads the SEL page.
Button Action
Print Prints the Last Crash Screen page.
Button Action
Save Opens a pop-up window that enables you to save the Last
Crash Screen to a directory of your choice.
Delete Deletes the Last Crash Screen page.
Refresh Reloads the Last Crash Screen page.
NOTE: Due to fluctuations in the Auto Recovery timer, the Last Crash Screen may
not be captured when the System Reset Timer is set to a value less than 30
seconds. Use Server Administrator or IT Assistant to set the System Reset Timer to
at least 30 seconds and ensure that the Last Crash Screen functions properly. See
"Configuring the Managed System to Capture the Last Crash Screen" for additional
information.
Field Description
Date/ Time The date and time (for example, Dec 19 16:55:47).
When the DRAC 5 initially starts and is unable to communicate
with the managed system, the time will be displayed as System
Boot.
Source The interface that caused the event.
Description A brief description of the event and the user name that logged into
the DRAC 5.
Button Action
Print Prints the RAC Log page.
Clear Log Clears the RAC Log entries.
NOTE: The Clear Log button only appears if you have Clear Logs
permission.
Save As Opens a pop-up window that enables you to save the RAC Log
to a directory of your choice.
NOTE: If you are using Internet Explorer and encounter a problem
when saving, be sure to download the Cumulative Security Update
for Internet Explorer, located on the Microsoft Support website at
support.microsoft.com.
Refresh Reloads the RAC Log page.
Command Description
arp Displays the contents of the Address Resolution Protocol
(ARP) table. ARP entries may not be added or deleted.
ifconfig Displays the contents of the network interface table.
Command Description
netstat Prints the content of the routing table. If the optional
interface number is provided in the text field to the right of
the netstat option, then netstat prints additional information
regarding the traffic across the interface, buffer usage, and
other network interface information.
ping Verifies that the destination IP address is reachable from the
<IP Address> DRAC 5 with the current routing-table contents. A
destination IP address must be entered in the field to the right
of this option. An Internet control message protocol (ICMP)
echo packet is sent to the destination IP address based on the
current routing-table contents.
gettracelog Displays the DRAC 5 trace log. See "gettracelog" for more
information.
Battery Probes
The Battery probes provide information about the system board CMOS and
storage RAM on motherboard (ROMB) batteries.
NOTE: The Storage ROMB battery settings are available only if the system has
a ROMB.
Fan Probes
The fan probe sensor provides information on:
• fan redundancy — the ability of the secondary fan to replace the primary
fan if the primary fan fails to dissipate heat at a pre-set speed.
• fan probe list — provides information on the fan speed for all fans in the
system.
Sensors 285
Power Supplies Probes
The power supplies probes provides information on:
• status of the power supplies, whether within the normal threshold value or
has crossed threshold value.
NOTE: You can set threshold values only from the Dell™ OpenManage™
Server Administrator. See the Dell OpenManage Server Administrator User’s
Guide for more information.
• power supply redundancy, that is, the ability of the redundant power
supply to replace the primary power supply if the primary power supply
fails.
NOTE: If there is only one power supply in the system, the Power Supply
Redundancy section will not display.
286 Sensors
Graph Information
The Graph Information page displays the graphs for the system power level
in Watts and power supplies in Amperes over a time period. The page auto
refreshes every minute.
NOTE: The data is obtained by the DRAC 5 every five minutes and is lost after a
DRAC reset, AC power cycle, or a firmware update.
NOTE: The graphs may display gaps either when the system is powered down or
when the BMC resets. This is because the power sensors are unavailable during
this period.
Power Consumption in Watts displays the time period over which the data for
power is collected. You can set the X-axis range to 1 hour, 1 day, or 1 week
from the drop-down menu available on this page. The time period is from the
current time set on the DRAC. The Y-axis displays the power consumed by
the system in Watts.
Power Consumption in Amperes displays the time period over which the data
for current is collected. You can set the X-axis range to 1 hour, 1 day, or 1 week
from the drop-down menu available on this page. The time period is from the
current DRAC time. The Y-axis displays the current consumed by the power
supplies in Amperes. If there are more than one power supply units on the
system and if the readings are the same, the current graphs may overlap
each other.
Sensors 287
Power Statistics
The Power Statistics page displays the average power consumption and the
maximum and the minimum power consumption statistics for the system in
Watts and BTU/Hr (British Thermal Unit per Hour) over the last 1 hour,
1 day, or 1 week from the current DRAC time. The data is obtained by the
DRAC 5 and is reset if the DRAC undergoes a reset for any reason.
Temperature Probes
The temperature sensor provides information about the system board
ambient temperature. The temperature probes indicate whether the status of
the probes is within the pre-set warning and critical threshold value.
Voltage Probes
The following are typical voltage probes. Your system may have these and/or
others present.
• CPU [n] VCORE
• System Board 0.9V PG
• System Board 1.5V ESB2 PG
• System Board 1.5V PG
• System Board 1.8V PG
• System Board 3.3V PG
• System Board 5V PG
• System Board Backplane PG
• System Board CPU VTT
• System Board Linear PG
The voltage probes indicate whether the status of the probes is within the
pre-set warning and critical threshold values.
288 Sensors
A
RACADM Subcommand Overview
This section provides descriptions of the subcommands that are available in
the RACADM command line interface.
help
NOTE: To use this command, you must have Log In DRAC 5 permission.
Table A-1 describes the help command.
Command Definition
help Lists all of the subcommands available to use with
racadm and provides a short description for each.
Synopsis
racadm help
racadm help <subcommand>
Description
The help subcommand lists all of the subcommands that are available when
using the racadm command along with a one-line description. You may also
type a subcommand after help to get the syntax for a specific subcommand.
Output
The racadm help command displays a complete list of subcommands.
The racadm help <subcommand> command displays information for the
specified subcommand only.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Command Definition
arp Displays the contents of the ARP table. ARP table
entries may not be added or deleted.
Synopsis
racadm arp
Supported Interfaces
• Remote RACADM
• telnet/ssh/serial RACADM
clearasrscreen
NOTE: To use this command, you must have Clear Logs permission.
Table A-3 describes the clearasrscreen subcommand.
Subcommand Definition
clearasrscreen Clears the last crash screen that is in memory.
Synopsis
racadm clearasrscreen
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Definition
config Configures the DRAC 5.
getconfig Gets the DRAC 5 configuration data.
Synopsis
racadm config [-c|-p] -f <filename>
racadm config -g <groupName> -o <objectName> [-i
<index>] <Value>
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Description
The config subcommand allows the user to set DRAC 5 configuration
parameters individually or to batch them as part of a configuration file. If the
data is different, that DRAC 5 object is written with the new value.
Input
Table A-5 describes the config subcommand options.
NOTE: The -f and -p options are not supported for the serial/telnet/ssh console.
Option Description
-f The -f <filename> option causes config to read the contents of the file
specified by <filename> and configure the DRAC 5. The file must
contain data in the format specified in "Parsing Rules."
-p The -p, or password option, directs config to delete the password entries
contained in the config file -f <filename> after the configuration is
complete.
-g The -g <groupName>, or group option, must be used with the -o
option. The <groupName> specifies the group containing the object
that is to be set.
-o The -o <objectName> <Value>, or object option, must be used with
the -g option. This option specifies the object name that is written with
the string <value>.
-i The -i <index>, or index option, is only valid for indexed groups and can
be used to specify a unique group. The <index> is a decimal integer
from 1 through 16. The index is specified here by the index value, not a
"named" value.
-c The -c, or check option, is used with the config subcommand and allows
the user to parse the .cfg file to find syntax errors. If errors are found, the
line number and a short description of what is incorrect are displayed.
Writes do not occur to the DRAC 5. This option is a check only.
Output
This subcommand generates error output upon encountering either of the
following:
• Invalid syntax, group name, object name, index, or other invalid database
members
• racadm CLI failures
This subcommand returns an indication of how many configuration objects
that were written out of how many total objects were in the .cfg file.
getconfig
getconfig Subcommand Description
The getconfig subcommand allows the user to retrieve DRAC 5 configuration
parameters on an individual basis, or all the RAC configuration groups may
be retrieved and saved into a file.
Input
Table A-6 describes the getconfig subcommand options.
NOTE: The -f option without a file specification will output the contents of the file to
the terminal screen.
Option Description
-f The -f <filename> option directs getconfig to write the entire RAC
configuration to a configuration file. This file can be used for batch
configuration operations using the config subcommand.
NOTE: The -f option does not create entries for the cfgIpmiPet and
cfgIpmiPef groups. You must set at least one trap destination to capture the
cfgIpmiPet group to the file.
-g The -g <groupName>, or group option, can be used to display the
configuration for a single group. The groupName is the name for the
group used in the racadm.cfg files. If the group is an indexed group, use
the -i option.
-h The -h, or help option, displays a list of all available configuration
groups that you can use. This option is useful when you do not
remember exact group names.
-i The -i <index>, or index option, is valid only for indexed groups and
can be used to specify a unique group. The <index> is a decimal integer
from 1 through 16. If -i <index> is not specified, a value of 1 is assumed
for groups, which are tables that have multiple entries. The index is
specified by the index value, not a "named" value.
-o The -o <objectname> or object option specifies the object name that is
used in the query. This option is optional and can be used with the -g
option.
-u The -u <username>, or user name option, can be used to display the
configuration for the specified user. The <username> option is the
login name for the user.
-v The -v option displays additional details with the display of the
properties and is used with the -g option.
Output
This subcommand generates error output upon encountering either of the
following:
• Invalid syntax, group name, object name, index, or other invalid database
members
• racadm CLI transport failures
Examples
• racadm getconfig -g cfgLanNetworking
Displays all of the configuration properties (objects) that are contained in
the group cfgLanNetworking.
• racadm getconfig -f myrac.cfg
Saves all group configuration objects from the RAC to myrac.cfg.
• racadm getconfig -h
Displays a list of the available configuration groups on the DRAC 5.
• racadm getconfig -u root
Displays the configuration properties for the user named root.
• racadm getconfig -g cfgUserAdmin -i 2 -v
Displays the user group instance at index 2 with verbose information for
the property values.
Synopsis
racadm getconfig -f <filename>
racadm getconfig -g <groupName> [-i <index>]
racadm getconfig -u <username>
racadm getconfig -h
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Definition
coredump Displays the last DRAC 5 core dump.
Synopsis
racadm coredump
Description
The coredump subcommand displays detailed information related to any
recent critical issues that have occurred with the RAC. The coredump
information can be used to diagnose these critical issues.
If available, the coredump information is persistent across RAC power cycles
and will remain available until either of the following conditions occur:
• The coredump information is cleared with the coredumpdelete
subcommand.
• Another critical condition occurs on the RAC. In this case, the coredump
information will be relative to the last critical error that occurred.
See the coredumpdelete subcommand for more information about clearing
the coredump.
Supported Interfaces
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Definition
coredumpdelete Deletes the core dump stored in the DRAC 5.
Synopsis
racadm coredumpdelete
Description
The coredumpdelete subcommand can be used to clear any currently
resident coredump data stored in the RAC.
NOTE: If a coredumpdelete command is issued and a coredump is not currently
stored in the RAC, the command will display a success message. This behavior is
expected.
See the coredump subcommand for more information on viewing a
coredump.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
fwupdate
NOTE: To use this command, you must have Configure DRAC 5 permission.
NOTE: Before you begin your firmware update, see "Connecting to the Managed
System Through the Local Serial Port or Telnet Management Station (Client
System)" for additional instructions.
Table A-9 describes the fwupdate subcommand.
Subcommand Definition
fwupdate Updates the firmware on the DRAC 5.
Synopsis
racadm fwupdate -s
racadm fwupdate -g -u -a <TFTP_Server_IP_Address> -d
<path>
racadm fwupdate -p -u -d <path>
Description
The fwupdate subcommand allows users to update the firmware on the
DRAC 5. The user can:
• Check the firmware update process status
• Update the DRAC 5 firmware from a TFTP server by providing an IP
address and optional path
• Update the DRAC 5 firmware from the local file system using local
RACADM
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Input
Table A-10 describes the fwupdate subcommand options.
NOTE: The -p option is supported in local and remote RACADM and is not
supported with the serial/telnet/ssh console. The -p option is not supported on the
Linux platform.
Option Description
-u The update option performs a checksum of the firmware update file and
starts the actual update process. This option may be used along with the -g
or -p options. At the end of the update, the DRAC 5 performs a soft reset.
-s The status option returns the current status of where you are in the update
process. This option is always used by itself.
-g The get option instructs the firmware to get the firmware update file from
the TFTP server. The user must also specify the -a and -d options. In the
absence of the -a option, the defaults are read from properties contained in
the group cfgRemoteHosts, using properties cfgRhostsFwUpdateIpAddr
and cfgRhostsFwUpdatePath.
-a The IP Address option specifies the IP address of the TFTP server.
-d The -d, or directory, option specifies the directory on the TFTP server or on
the DRAC 5’s host server where the firmware update file resides.
-p The -p, or put, option is used to update the firmware file from the managed
system to the DRAC 5. The -u option must be used with the -p option.
Output
Displays a message indicating which operation is being performed.
Examples
• racadm fwupdate -g -u - a 143.166.154.143 -d
<path>
In this example, the -g option tells the firmware to download the firmware
update file from a location (specified by the -d option) on the TFTP server
at a specific IP address (specified by the -a option). After the image file is
downloaded from the TFTP server, the update process begins. When
completed, the DRAC 5 is reset.
If the download exceeds 15 minutes and times out, transfer the firmware flash
image to a local drive on the server. Then, using Console Redirection, connect
to the remote system and install the firmware locally using local racadm.
• racadm fwupdate -s
This option reads the current status of the firmware update.
getssninfo
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-11 describes the getssninfo subcommand.
Subcommand Definition
getssninfo Retrieves session information for one or more
currently active or pending sessions from the
Session Manager's session table.
Synopsis
racadm getssninfo [-A] [-u <username> | *]
Description
The getssninfo command returns a list of users that are connected to the
DRAC. The summary information provides the following information:
• Username
• IP address (if applicable)
• Session type (for example, serial or telnet)
• Consoles in use (for example, Virtual Media or Virtual KVM)
Input
Table A-12 describes the getssninfo subcommand options.
Option Description
-A The -A option eliminates the printing of data headers.
-u The -u <username> user name option limits the printed output to only
the detail session records for the given user name. If an "*" symbol is given
as the user name, all users are listed. Summary information is not printed
when this option is specified.
Examples
• racadm getssninfo
Table A-13 provides an example of output from the racadm getssninfo
command.
• racadm getssninfo -A
"root" 143.166.174.19 "Telnet" "NONE"
• racadm getssninfo -A -u *
"root" "143.166.174.19" "Telnet" "NONE"
"bob" "143.166.174.19" "GUI" "NONE"
Command Definition
getsysinfo Displays DRAC 5 information, system
information, and watchdog status information.
Synopsis
racadm getsysinfo [-d] [-s] [-w] [-A]
Description
The getsysinfo subcommand displays information related to the RAC,
managed system, and watchdog configuration.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Input
Table A-15 describes the getsysinfo subcommand options.
Option Description
-d Displays DRAC 5 information.
-s Displays system information
-w Displays watchdog information
-A Eliminates the printing of headers/labels.
If the -w option is not specified, then the other options are used as defaults.
Sample Output
RAC Information:
RAC Date/Time = Mon Oct 26 19:05:33 2009
Firmware Version = 1.50
Firmware Build = 09.10.21
Last Firmware Update = Wed Oct 21 21:57:33 2009
Hardware Version = A00
Current IP Address = 192.168.1.21
Current IP Gateway = 0.0.0.0
Current IP Netmask = 255.255.255.0
DHCP Enabled = 1
MAC Address = 00:1c:23:d7:1a:d9
Current DNS Server 1 = 0.0.0.0
Current DNS Server 2 = 0.0.0.0
DNS Servers from DHCP = 0
Register DNS RAC Name = 0
DNS RAC Name = rac-297GP1S
Current DNS Domain =
System Information:
System Model = PowerEdge 2950
System Revision = [N/A]
System BIOS Version = 1.3.7
BMC Firmware Version = 02.28
Service Tag = 297GP1S
Host Name =
OS Name =
Examples
• racadm getsysinfo -A -s
"System Information:" "PowerEdge 2900" "A08" "1.0"
"EF23VQ-0023" "Hostname"
"Microsoft Windows 2000 version 5.0, Build Number
2195, Service Pack 2" "ON"
• racadm getsysinfo -w -s
System Information:
System Model = PowerEdge 2900
System BIOS Version = 0.2.3
BMC Firmware Version = 0.17
Service Tag = 48192
Host Name = racdev103
OS Name = Microsoft Windows Server
2003
Power Status = OFF
Watchdog Information:
Recovery Action = None
Present countdown value = 0 seconds
Initial countdown value = 0 seconds
getractime
NOTE: To use this command, you must have Log In DRAC 5 permission.
Table A-16 describes the getractime subcommand.
Subcommand Definition
getractime Displays the current time from the remote access controller.
Synopsis
racadm getractime [-d]
Description
With no options, the getractime subcommand displays the time in a
common readable format.
With the -d option, getractime displays the time in the format,
yyyymmddhhmmss.mmmmmms, which is the same format returned by the
UNIX date command.
Output
The getractime subcommand displays the output on one line.
Sample Output
racadm getractime
Thu Dec 8 20:15:26 2005
racadm getractime -d
20051208201542.000000
ifconfig
NOTE: To use this command, you must have Execute Diagnostic Commands or
Configure DRAC 5 permission.
Table A-17 describes the ifconfig subcommand.
Subcommand Definition
ifconfig Displays the contents of the network interface table.
Synopsis
racadm ifconfig
netstat
NOTE: To use this command, you must have Execute Diagnostic Commands
permission.
Table A-18 describes the netstat subcommand.
Subcommand Definition
netstat Displays the routing table and the current connections.
Synopsis
racadm netstat
Supported Interfaces
• Remote RACADM
ping
NOTE: To use this command, you must have Execute Diagnostic Commands or
Configure DRAC 5 permission.
Table A-19 describes the ping subcommand.
Subcommand Definition
ping Verifies that the destination IP address is reachable from the
DRAC 5 with the current routing-table contents. A destination
IP address is required. An ICMP echo packet is sent to the
destination IP address based on the current routing-table
contents.
Synopsis
racadm ping <ipaddress>
Supported Interfaces
• Remote RACADM
• telnet/ssh/serial RACADM
setniccfg
NOTE: To use the setniccfg command, you must have Configure DRAC 5
permission.
Table A-20 describes the setniccfg subcommand.
Subcommand Definition
setniccfg Sets the IP configuration for the controller.
NOTE: The terms NIC and Ethernet management port may be used
interchangeably.
Description
The setniccfg subcommand sets the controller IP address.
• The -d option enables DHCP for the Ethernet management port (default
is DHCP enabled).
• The -s option enables static IP settings. The IP address, netmask, and
gateway can be specified. Otherwise, the existing static settings are used.
<ipAddress>, <netmask>, and <gateway> must be typed as dot-
separated strings.
racadm setniccfg -s 192.168.0.120 255.255.255.0
192.168.0.1
• The -o option disables the Ethernet management port completely.
<ipAddress>, <netmask>, and <gateway> must be typed as dot-
separated strings.
racadm setniccfg -o 192.168.0.120 255.255.255.0
192.168.0.1
Output
The setniccfg subcommand displays an appropriate error message if the
operation is not successful. If successful, a message is displayed.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Definition
getniccfg Displays the current IP configuration for the controller.
Synopsis
racadm getniccfg
Description
The getniccfg subcommand displays the current Ethernet management port
settings.
Sample Output
The getniccfg subcommand will display an appropriate error message if the
operation is not successful. Otherwise, on success, the output displayed in the
following format:
NIC Enabled = 1
DHCP Enabled = 1
IP Address = 192.168.0.1
Subnet Mask = 255.255.255.0
Gateway = 192.168.0.1
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Definition
getsvctag Displays a service tag.
Synopsis
racadm getsvctag
Description
The getsvctag subcommand displays the service tag of the host system.
Example
Type getsvctag at the command prompt. The output is displayed as
follows:
Y76TP0G
The command returns 0 on success and nonzero on errors.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Definition
racdump Displays status and general DRAC 5 information.
Synopsis
racadm racdump
Description
The racdump subcommand provides a single command to get dump, status,
and general DRAC 5 board information.
The following information is displayed when the racdump subcommand is
processed:
• General system/RAC information
• Coredump
• Session information
• Process information
• Firmware build information
Supported Interfaces
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Definition
racreset Resets the DRAC 5.
CAUTION: When you issue a racreset subcommand, the DRAC may require up to
one minute to return to a usable state.
Synopsis
racadm racreset [hard | soft]
Description
The racreset subcommand issues a reset to the DRAC 5. The reset event is
written into the DRAC 5 log.
A hard reset performs a deep reset operation on the RAC. A hard reset should
only be performed as a last-case resort to recover the RAC.
CAUTION: You must reboot your system after performing a hard reset of the
DRAC 5 as described in Table A-25.
Table A-25 describes the racreset subcommand options.
Option Description
hard A hard reset performs a deep reset operation on the remote access
controller. A hard reset should only be used as a last case resort of
resetting the RAC controller for recovery purposes.
soft A soft reset performs a graceful reboot operation on the RAC.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
racresetcfg
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-26 describes the racresetcfg subcommand.
Subcommand Definition
racresetcfg Resets the entire RAC configuration to factory
default values.
Synopsis
racadm racresetcfg
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
serveraction
NOTE: To use this command, you must have Execute Server Control Commands
permission.
Table A-27 describes the serveraction subcommand.
Subcommand Definition
serveraction Executes a managed system reset or power-on/off/cycle.
Synopsis
racadm serveraction <action>
Description
The serveraction subcommand enables users to perform power management
operations on the host system. Table A-28 describes the serveraction power
control options.
String Definition
<action> Specifies the action. The options for the <action> string are:
• powerdown — Powers down the managed system.
• powerup — Powers up the managed system.
• powercycle — Issues a power-cycle operation on the managed
system. This action is similar to pressing the power button on the
system’s front panel to power down and then power up the system.
• powerstatus — Displays the current power status of the server
("ON", or "OFF")
• hardreset — Performs a reset (reboot) operation on the managed
system.
Output
The serveraction subcommand displays an error message if the requested
operation could not be performed, or a success message if the operation
completed successfully.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
getraclog
NOTE: To use this command, you must have Log In DRAC 5 permission.
Table A-29 describes the racadm getraclog command.
Command Definition
getraclog -i Displays the number of entries in the DRAC 5 log.
getraclog Displays the DRAC 5 log entries.
Description
The getraclog -i command displays the number of entries in the DRAC 5 log.
The following options allow the getraclog command to read entries:
• -A — Displays the output with no headers or labels.
• -c — Provides the maximum count of entries to be returned.
• -m — Displays one screen of information at a time and prompts the user
to continue (similar to the UNIX more command).
• -o — Displays the output in a single line.
• -s — Specifies the starting record used for the display
NOTE: If no options are provided, the entire log is displayed.
Output
The default output display shows the record number, time stamp, source, and
description. The timestamp begins at midnight, January 1 and increases until
the system boots. After the system boots, the system’s timestamp is used.
Sample Output
Record: 1
Date/Time: Dec 8 08:10:11
Source: login[433]
Description: root login from 143.166.157.103
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Synopsis
racadm clrraclog
Description
The clrraclog subcommand removes all existing records from the RAC log.
A new single record is created to record the date and time when the log was
cleared.
getsel
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-30 describes the getsel command.
Command Definition
getsel -i Displays the number of entries in the System Event Log.
getsel Displays SEL entries.
Synopsis
racadm getsel -i
racadm getsel [-E] [-R] [-A] [-o] [-c count] [-s
count] [-m]
Description
The getsel -i command displays the number of entries in the SEL.
The following getsel options (without the -i option) are used to read entries.
-A — Specifies output with no display headers or labels.
-c — Provides the maximum count of entries to be returned.
-o — Displays the output in a single line.
Output
The default output display shows the record number, timestamp, severity, and
description.
For example:
Record: 1
Date/Time: 11/16/2005 22:40:43
Severity: Ok
Description: System Board SEL: event log sensor for
System Board, log cleared was asserted
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
clrsel
NOTE: To use this command, you must have Clear Logs permission.
Synopsis
racadm clrsel
Description
The clrsel command removes all existing records from the system event log (SEL).
gettracelog
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-31 describes the gettracelog subcommand.
Command Definition
gettracelog -i Displays the number of entries in the DRAC 5 trace log.
gettracelog Displays the DRAC 5 trace log.
Synopsis
racadm gettracelog -i
racadm gettracelog [-A] [-o] [-c count] [-s
startrecord] [-m]
Description
The gettracelog (without the -i option) command reads entries.
The following gettracelog entries are used to read entries:
-i — Displays the number of entries in the DRAC 5 trace log
-m — Displays one screen at a time and prompts the user to continue
(similar to the UNIX more command).
-o — Displays the output in a single line.
-c — specifies the number of records to display
-s — specifies the starting record to display
-A — does not display headers or labels
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
sslcsrgen
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-32 describes the sslcsrgen subcommand.
Subcommand Description
sslcsrgen Generates and downloads an SSL certificate
signing request (CSR) from the RAC.
Synopsis
racadm sslcsrgen [-g] [-f <filename>]
racadm sslcsrgen -s
Options
NOTE: The -f option is not supported for the serial/telnet/ssh console.
Table A-33 describes the sslcsrgen subcommand options.
Option Description
-g Generates a new CSR.
-s Returns the status of a CSR generation process (generation in progress,
active, or none).
-f Specifies the filename of the location, <filename>, where the CSR will
be downloaded.
NOTE: If the -f option is not specified, the filename defaults to sslcsr in your current
directory.
If no options are specified, a CSR is generated and downloaded to the local
file system as sslcsr by default. The -g option cannot be used with the -s
option, and the -f option can only be used with the -g option.
The sslcsrgen -s subcommand returns one of the following status codes:
• CSR was generated successfully.
• CSR does not exist.
• CSR generation in progress.
Restrictions
The sslcsrgen subcommand can only be executed from a local or remote
RACADM client and cannot be used in the serial, telnet, or SSH interface.
NOTE: Before a CSR can be generated, the CSR fields must be configured in the
RACADM cfgRacSecurity group. For example: racadm config -g
cfgRacSecurity -o cfgRacSecCsrCommonName MyCompany
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
sslcertupload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-34 describes the sslcertupload subcommand.
Subcommand Description
sslcertupload Uploads a custom SSL server or CA certificate
from the client to the RAC.
Synopsis
racadm sslcertupload -t <type> [-f <filename>]
Options
Table A-35 describes the sslcertupload subcommand options.
Option Description
-t Specifies the type of certificate to upload, either the CA certificate or
server certificate.
1 = server certificate
2 = CA certificate
-f Specifies the file name of the certificate to be uploaded. If the file is
not specified, the sslcert file in the current directory is selected.
Restrictions
The sslcertupload subcommand can only be executed from a local or remote
RACADM client. The sslcsrgen subcommand cannot be used in the serial,
telnet, or SSH interface.
Example
racadm sslcertupload -t 1 -f c:\cert\cert.txt
Supported Interfaces
• Local RACADM
• Remote RACADM
sslcertdownload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-36 describes the sslcertdownload subcommand.
Subcommand Description
sslcertupload Downloads an SSL certificate from the RAC to
the client’s file system.
Synopsis
racadm sslcertdownload -t <type> [-f <filename>]
Option Description
-t Specifies the type of certificate to download, either the
Microsoft® Active Directory® certificate or server certificate.
1 = server certificate
2 = Microsoft Active Directory certificate
-f Specifies the file name of the certificate to be uploaded. If the -f
option or the filename is not specified, the sslcert file in the current
directory is selected.
Restrictions
The sslcertdownload subcommand can only be executed from a local or
remote RACADM client. The sslcsrgen subcommand cannot be used in the
serial, telnet, or SSH interface.
Example
racadm sslcertdownload -t 1 -f c:\cert\cert.txt
Supported Interfaces
• Local RACADM
• Remote RACADM
Subcommand Description
sslcertview Displays the SSL server or CA certificate that
exists on the RAC.
Synopsis
racadm sslcertview -t <type> [-A]
Options
Table A-39 describes the sslcertview subcommand options.
Option Description
-t Specifies the type of certificate to view, either the Microsoft Active
Directory certificate or server certificate.
1 = server certificate
2 = Microsoft Active Directory certificate
-A Prevents printing headers/labels.
Output Example
racadm sslcertview -t 1
Serial Number : 00
Subject Information:
Country Code (CC) : US
State (S) : Texas
Locality (L) : Round Rock
Organization (O) : Dell Inc.
Issuer Information:
Country Code (CC) : US
State (S) : Texas
Locality (L) : Round Rock
Organization (O) : Dell Inc.
Organizational Unit (OU) : Remote Access Group
Common Name (CN) : DRAC5 default certificate
racadm sslcertview -t 1 -A
00
US
Texas
Round Rock
Dell Inc.
Remote Access Group
DRAC5 default certificate
US
Texas
Round Rock
Dell Inc.
Remote Access Group
DRAC5 default certificate
Jul 8 16:21:56 2005 GMT
Jul 7 16:21:56 2010 GMT
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Description
sslkeyupload Uploads SSL key from the client to the DRAC 5.
Synopsis
racadm sslkeyupload -t <type> [-f <filename>]
Options
Table A-41 describes the sslkeyupload subcommand options.
Option Description
-t Specifies the key to upload.
1 = server certificate
-f Specifies the file name of the certificate to be uploaded. If the file is
not specified, the sslcert file in the current directory is selected.
Restrictions
The sslkeyupload subcommand can only be executed from a local or remote
RACADM client. The sslcsrgen subcommand cannot be used in the serial,
telnet, or SSH interface.
Example
racadm sslcertupload -t 1 -f c:\cert\cert.txt
krbkeytabupload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-42 describes the krbkeytabupload subcommand.
Subcommand Description
krbkeytabupload Uploads a Kerberos keytab file.
Synopsis
racadm krbkeytabupload [-f <filename>]
Options
Table A-43 describes the krbkeytabupload subcommand options.
Option Description
-f Specifies the file name of the keytab to be uploaded. If the file is not
specified, the keytab file in the current directory is selected.
Restrictions
The krbkeytabupload subcommand can only be executed from a local or
remote RACADM client.
Example
racadm krbkeytabupload -f c:\keytab\krbkeytab.tab
testemail
Table A-44 describes the testemail subcommand.
Subcommand Description
testemail Tests the RAC’s e-mail alerting
feature.
Synopsis
racadm testemail -i <index>
Description
Sends a test e-mail from the RAC to a specified destination.
Prior to executing the test e-mail command, ensure that the specified index
in the RACADM cfgEmailAlert group is enabled and configured properly.
Table A-45 provides a list and associated commands for the cfgEmailAlert
group.
Action Command
Enable the alert racadm config -g cfgEmailAlert -o
cfgEmailAlertEnable
-i 1 1
Set the destination e- racadm config -g cfgEmailAlert -o
mail address cfgEmailAlertAddress -i 1
[email protected]
Set the custom message racadm config -g cfgEmailAlert -o
that is sent to the cfgEmailAlertCustomMsg -i 1 "This is a
destination e-mail test!"
address
Action Command
Ensure the SNMP IP racadm config -g cfgRemoteHosts -o
address is configured cfgRhostsSmptServerIpAddr -i
properly 192.168.0.152
View the current e-mail racadm getconfig -g cfgEmailAlert -i
alert settings <index>
where <index> is a number from 1 to 4
Options
Table A-46 describes the testemail subcommand options.
Option Description
-i Specifies the index of the e-mail alert to test.
Output
None.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
testtrap
NOTE: To use this command, you must have Test Alerts permission.
Table A-47 describes the testtrap subcommand.
Subcommand Description
testtrap Tests the RAC’s SNMP trap alerting feature.
Description
The testtrap subcommand tests the RAC’s SNMP trap alerting feature by
sending a test trap from the RAC to a specified destination trap listener on
the network.
Before you execute the testtrap subcommand, ensure that the specified index
in the RACADM cfgIpmiPet group is configured properly.
Table A-48 provides a list and associated commands for the cfgIpmiPet
group.
Action Command
Enable the alert racadm config -g cfgIpmiPet -o
cfgIpmiPetAlertEnable
-i 1 1
Set the destination racadm config -g cfgIpmiPet -o
e-mail IP address cfgIpmiPetAlertDestIpAddr -i 1
192.168.0.110
View the current test racadm getconfig -g cfgIpmiPet -i
trap settings <index>
where <index> is a number from 1 to 4
Input
Table A-49 describes the testtrap subcommand options.
Option Description
-i Specifies the index of the trap configuration to use for the test Valid
values are from 1 to 4.
vmdisconnect
NOTE: To use this command, you must have Access Virtual Media permission.
Table A-50 describes the vmdisconnect subcommand.
Subcommand Description
vmdisconnect Closes all open RAC virtual media connections from remote
clients.
Synopsis
racadm vmdisconnect
Description
The vmdisconnect subcommand allows a user to disconnect another user's
virtual media session. Once disconnected, the web-based interface will reflect
the correct connection status. This is available only through the use of local or
remote racadm.
The vmdisconnect subcommand enables a RAC user to disconnect all active
virtual media sessions. The active virtual media sessions can be displayed in
the RAC web-based interface or by using the racadm getsysinfo
subcommand.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Description
vmkey Performs virtual media key-related operations.
Synopsis
racadm vmkey <action>
If <action> is configured as reset, the virtual flash memory is reset to
the default size of 16 MB.
Description
When a custom virtual media key image is uploaded to the RAC, the key size
becomes the image size. The vmkey subcommand can be used to reset the
key back to its original default size, which is 16 MB on the DRAC 5.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
usercertupload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-52 describes the usercertupload subcommand.
Subcommand Description
usercertupload Uploads a user certificate or a user CA
certificate from the client to the DRAC.
Options
Table A-53 describes the usercertupload subcommand options.
Option Description
-t Specifies the type of certificate to upload, either the CA certificate or
server certificate.
1 = user certificate
2 = user CA certificate
-f Specifies the file name of the certificate to be uploaded. If the file is
not specified, the sslcert file in the current directory is selected.
-i Index number of the user. Valid values 1-16.
Restrictions
The usercertupload subcommand can only be executed from a local or a
remote RACADM client.
Example
racadm usercertupload -t 1 -f c:\cert\cert.txt -i 6
Supported Interfaces
• Local RACADM
• Remote RACADM
Subcommand Description
usercertview Displays the user certificate or user CA
certificate that exists on the DRAC.
Synopsis
racadm sslcertview -t <type> [-A] -i <index>
Options
Table A-55 describes the sslcertview subcommand options.
Option Description
-t Specifies the type of certificate to view, either the user certificate or
the user CA certificate.
1 = user certificate
2 = user CA certificate
-A Prevents printing headers/labels.
-i Index number of the user. Valid values are 1-16.
Supported Interfaces
• Local RACADM
• Remote RACADM
• telnet/ssh/serial RACADM
Subcommand Description
localConRedirDisable Disables console redirection to the management station.
Synopsis
racadm localConRedirDisable <option>
If <option> is set to 1, console redirection is disabled.
Supported Interfaces
• Local RACADM
Displayable Characters
Displayable characters include the following set:
abcdefghijklmnopqrstuvwxwz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789~`!@#$%^&*()_+-={}[]|\:";'<>,.?/
idRacInfo
This group contains display parameters to provide information about the
specifics of the DRAC 5 being queried.
One instance of the group is allowed. The following subsections describe the
objects in this group.
Legal Values
String of up to 63 ASCII characters.
Description
Uses a text string to identify the product.
Legal Values
String of up to 255 ASCII characters.
Default
"This system component provides a complete set of remote management
functions for Dell PowerEdge servers."
Description
A text description of the RAC type.
Legal Values
String of up to 63 ASCII characters.
Default
"1.0"
Description
A string containing the current product firmware version.
Legal Values
String of up to 16 ASCII characters.
Description
A string containing the current product build version.
Legal Values
String of up to 15 ASCII characters.
Default
DRAC 5
Description
A user assigned name to identify this controller.
Default
6
Description
Identifies the remote access controller type as the DRAC 5.
cfgLanNetworking
This group contains parameters to configure the DRAC 5 NIC.
One instance of the group is allowed. All changes/updates to the objects in
this group will require the DRAC 5 NIC to be reset, which may cause a brief
loss in connectivity. Objects that change the DRAC 5 NIC IP address settings
will close all active user sessions and require users to reconnect using the
updated IP address settings.
Legal Values
1 (TRUE)
0 (FALSE)
Default
1
Description
Specifies that the RAC DNS Domain Name should be assigned from the
network DHCP server.
cfgDNSDomainName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String of up to 254 ASCII characters. Characters are restricted to
alphanumeric, '-' and '.'
NOTE: Microsoft® Active Directory® only supports Fully Qualified Domain Names
(FQDN) of 64 bytes or fewer.
Default
""
Description
The DNS domain name. This parameter is only valid if
cfgDNSDomainNameFromDHCP is set to 0 (FALSE).
cfgDNSRacName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
rac-service tag
Description
Displays the RAC name, which is rac-service tag (by default). This parameter
is only valid if cfgDNSRegisterRac is set to 1 (TRUE).
cfgDNSRegisterRac (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Registers the DRAC 5 name on the DNS server.
cfgDNSServersFromDHCP (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
cfgDNSServer1 (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
A string representing a valid IP address. For example: "192.168.0.20".
Description
Specifies the IP address for DNS server 1. This property is only valid if
cfgDNSServersFromDHCP is set to 0 (FALSE).
NOTE: cfgDNSServer1 and cfgDNSServer2 may be set to identical values while
swapping addresses.
cfgDNSServer2 (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
A string representing a valid IP address. For example: "192.168.0.20".
Default
0.0.0.0
Description
Retrieves the IP address for DNS server 2. This parameter is only valid if
cfgDNSServersFromDHCP is set to 0 (FALSE).
NOTE: cfgDNSServer1 and cfgDNSServer2 may be set to identical values while
swapping addresses.
cfgNicEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
0
Description
Enables or disables the RAC network interface controller. If the NIC is
disabled, the remote network interfaces to the RAC will no longer be
accessible, and the RAC will only be available through the serial or local
RACADM interfaces.
cfgNicIpAddress (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission. This
parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE).
Legal Values
A string representing a valid IP address. For example: "192.168.0.20".
Default
192.168.0.120
Description
Specifies the static IP address to assign to the RAC. This property is only valid
if cfgNicUseDhcp is set to 0 (FALSE).
cfgNicNetmask (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission. This
parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE).
Legal Values
A string representing a valid subnet mask. For example: "255.255.255.0".
Description
The subnet mask used for static assignment of the RAC IP address. This
property is only valid if cfgNicUseDhcp is set to 0 (FALSE).
cfgNicGateway (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission. This
parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE).
Legal Values
A string representing a valid gateway IP address. For example: "192.168.0.1".
Default
192.168.0.1
Description
The gateway IP address used for static assignment of the RAC IP address.
This property is only valid if cfgNicUseDhcp is set to 0 (FALSE).
cfgNicUseDhcp (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
cfgNicSelection (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (shared)
1 (shared with failover)
2 (dedicated)
Default
2
Description
Specifies the current mode of operation for the RAC network interface
controller (NIC). Table B-1 describes the supported modes.
Mode Description
Shared Used if the host server integrated NIC is shared with the
RAC on the host server. This mode enables
configurations to use the same IP address on the host
server and the RAC for common accessibility on the
network.
Shared with Failover Enables teaming capabilities between host server
integrated network interface controllers.
Dedicated Specifies that the RAC NIC is used as the dedicated
NIC for remote accessibility.
Legal Values
A string representing the RAC NIC MAC address.
Default
The current MAC address of the RAC NIC. For example, "00:12:67:52:51:A3".
Description
The RAC NIC MAC address.
cfgNicVLanEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the VLAN capabilities of the RAC/BMC.
cfgNicVLanId (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 – 4094
Default
0
cfgNicVLanPriority (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0–7
Default
0
Description
Specifies the VLAN Priority for the network VLAN configuration.
This property is only valid if cfgNicVLanEnable is set to 1 (enabled).
cfgRemoteHosts
This group provides properties that allow configuration of various remote
components, which include the SMTP server for e-mail alerts and TFTP
server IP addresses for firmware updates.
cfgRhostsSmtpServerIpAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
A string representing a valid SMTP server IP address. For example,
192.168.0.55.
Default
0.0.0.0
Description
The IP address of the network SMTP server. The SMTP server transmits
e-mail alerts from the RAC if the alerts are configured and enabled.
Legal Values
1 (TRUE)
0 (FALSE)
Default
1
Description
Enables or disables the RAC firmware update from a network TFTP server.
cfgRhostsFwUpdateIpAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
A string representing a valid TFTP server IP address. For example,
192.168.0.61.
Default
0.0.0.0
Description
Specifies the network TFTP server IP address that is used for TFTP RAC
firmware update operations.
cfgRhostsFwUpdatePath (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum length = 255.
Description
Specifies TFTP path where the RAC firmware image file exists on the TFTP
server. The TFTP path is relative to the TFTP root path on the TFTP server.
NOTE: The server may still require you to specify the drive (for example, C).
cfgUserAdmin
This group provides configuration information about the users who are
allowed to access the RAC through the available remote interfaces.
Up to 16 instances of the user group are allowed. Each instance represents the
configuration for an individual user.
cfgUserAdminIpmiLanPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
15 (No access)
Default
4 (User 2)
15 (All others)
Description
The maximum privilege on the IPMI LAN channel.
cfgUserAdminIpmiSerialPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Default
4 (User 2)
15 (All others)
Description
The maximum privilege on the IPMI serial channel.
cfgUserAdminPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Legal Values
0x0000000 to 0x00001ff, and 0x0
Default
0x0000000
Description
This property specifies the allowed role-based authority privileges allowed for
the user. The value is represented as a bitmask that allows for any
combination of privilege values. Table B-2 describes the allowed user
privileges’ bit masks.
Examples
Table B-3 provides sample privilege bit masks for users with one or more
privileges.
cfgUserAdminUserName (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Legal Values
String. Maximum length = 16.
Description
The name of the user for this index. The user index is created by writing a
string into this name field if the index is empty. Writing a string of double
quotes ("") deletes the user at that index. You cannot change the name. You
must delete and then recreate the name. The string must not contain "/"
(forward slash, "\" (backslash), "." (period), "@" ("at" symbol) or quotations
marks.
NOTE: This property value MUST be unique from other user instances.
Legal Values
A string of up to 20 ASCII characters.
Default
""
Description
The password for this user. The user passwords are encrypted and cannot be
seen or displayed after this property is written.
cfgUserAdminEnable
NOTE: To modify this property, you must have Config Users permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
cfgUserAdminSolEnable
NOTE: To modify this property, you must have Config Users permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables Serial Over LAN (SOL) user access.
cfgEmailAlert
This group contains parameters to configure the RAC e-mail alerting
capabilities.
The following subsections describe the objects in this group. Up to four
instances of this group are allowed.
Legal Values
1–4
Default
This parameter is populated based on the existing instances.
Description
The unique index of an alert instance.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Specifies the destination e-mail address for e-mail alerts. For example,
[email protected].
Legal Values
E-mail address format, with a maximum length of 64 ASCII characters.
Default
""
Description
The e-mail address of the alert source.
Legal Values
String. Maximum Length = 32.
Default
""
Description
Specifies a custom message that is sent with the alert.
cfgSsnMgtConsRedirMaxSessions (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1–2
Default
2
Description
Specifies the maximum number of console redirection sessions allowed on
the RAC.
cfgSsnMgtRacadmTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
10 –1920
Default
30
Description
Defines the idle time-out in seconds for the Remote RACADM interface. If a
remote RACADM session remains inactive for more than the specified
sessions, the session will be closed.
Legal Values
60 – 1920
Default
300
Description
Defines the Web server time-out. This property sets the amount of time in
seconds that a connection is allowed to remain idle (there is no user input).
The session is cancelled if the time limit set by this property is reached.
Changes to this setting do not affect the current session (you must log out
and log in again to make the new settings effective).
An expired Web server session logs out the current session.
cfgSsnMgtSshIdleTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (No time-out)
60 – 1920
Default
300
Description
Defines the Secure Shell idle time-out. This property sets the amount of time
in seconds that a connection is allowed to remain idle (there is no user input).
The session is cancelled if the time limit set by this property is reached.
Changes to this setting do not affect the current session (you must log out
and log in again to make the new settings effective).
cfgSsnMgtTelnetTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (No timeout)
60 – 1920
Default
0
Description
Defines the Telnet idle time-out. This property sets the amount of time in
seconds that a connection is allowed to remain idle (there is no user input).
The session is cancelled if the time limit set by this property is reached.
Changes to this setting do not affect the current session (you must log out
and log in again to make the new settings effective).
An expired Telnet session displays the following error message only after you
press <Enter>:
Warning: Session no longer valid, may have timed out
After the message appears, the system returns you to the shell that generated
the Telnet session.
cfgSerial
This group contains configuration parameters for the DRAC 5 serial port.
One instance of the group is allowed. The following subsections describe the
objects in this group.
Legal Values
9600, 28800, 57600, 115200
Default
57600
Description
Sets the baud rate on the DRAC 5 serial port.
cfgSerialConsoleEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the RAC serial console interface.
cfgSerialConsoleQuitKey (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
STRING
MaxLen = 2
Description
This key or key combination terminates text console redirection when using
the connect com2 command. The cfgSerialConsoleQuitKey value can be
represented by:
• ASCII value — For example: "^a"
ASCII values may be represented using the following Escape Key codes:
(a) ^ followed by any alphabetic (a-z, A-Z)
(b) ^ followed by the listed special characters: [ ] \ ^ _
cfgSerialConsoleIdleTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 = No time-out
60 – 1920
Default
300
Description
The maximum number of seconds to wait before an idle serial session is
disconnected.
Legal Values
0 (enables serial login authentication)
1 (disables serial login authentication)
Default
0
Description
Enables or disables the RAC serial console login authentication.
cfgSerialConsoleCommand (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description
Specifies a serial command that is executed after a user logs into the serial
console interface.
Default
""
Example
"connect com2"
cfgSerialHistorySize (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 – 8192
Default
8192
cfgSerialSshEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
1
Description
Enables or disables the secure shell (SSH) interface on the DRAC 5.
cfgSerialTelnetEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the telnet console interface on the RAC.
cfgSerialCom2RedirEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
1
Description
Enables or disables the console for COM 2 port redirection.
cfgNetTuning
This group enables users to configure the advanced network interface
parameters for the RAC NIC. When configured, the updated settings may
take up to a minute to become active.
CAUTION: Use extra precaution when modifying properties in this group.
Inappropriate modification of the properties in this group can result in your RAC
NIC become inoperable.
cfgNetTuningNicAutoneg (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (Enabled)
0 (Disabled)
Default
1
Description
Enables autonegotiation of physical link speed and duplex. If enabled,
autonegotiation takes priority over values set in the cfgNetTuningNic100MB
and cfgNetTuningNicFullDuplex objects.
Legal Values
0 (10 MBit)
1 (100 MBit)
Default
1
Description
Specifies the speed to use for the RAC NIC. This property is not used if the
cfgNetTuningNicAutoNeg is set to 1 (enabled).
cfgNetTuningNicFullDuplex (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (Half Duplex)
1 (Full Duplex)
Default
1
Description
Specifies the duplex setting for the RAC NIC. This property is not used if the
cfgNetTuningNicAutoNeg is set to 1 (enabled).
cfgNetTuningNicMtu (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
576 – 1500
Description
The size in bytes of the maximum transmission unit used by the DRAC 5
NIC.
cfgNetTuningTcpSrttDflt (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
6 – 384
Default
6
Description
The smoothed round trip time-out base default value for TCP retransmission
round trip time in ½ second units. (Type hexadecimal values.)
cfgOobSnmp
The group contains parameters to configure the SNMP agent and trap
capabilities of the DRAC 5.
One instance of the group is allowed. The following subsections describe the
objects in this group.
cfgOobSnmpAgentCommunity (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 31.
Default
public
cfgOobSnmpAgentEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the SNMP agent in the RAC.
cfgRacTuning
This group is used to configure various RAC configuration properties, such as
valid ports and security port restrictions.
cfgRacTunePluginType
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE) — Java Plug-in
0 (FALSE) — Native Plug-in
Default
0
Description
Configures the virtual KVM (vKVM) plug-in type.
Legal Values
10 – 65535
Default
80
Description
Specifies the port number to use for HTTP network communication with the
RAC.
cfgRacTuneHttpsPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
10 – 65535
Default
443
Description
Specifies the port number to use for HTTPS network communication with
the RAC.
cfgRacTuneIpRangeEnable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Description
Enables or disables the IP Address Range validation feature of the RAC.
cfgRacTuneIpRangeAddr
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String, IP address formatted. For example, 192.168.0.44.
Default
192.168.1.1
Description
Specifies the acceptable IP address bit pattern in positions determined by the
1's in the range mask property (cfgRacTuneIpRangeMask).
cfgRacTuneIpRangeMask
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Standard IP mask values with left-justified bits
Default
255.255.255.0
Description
String, IP-address formatted. For example, 255.255.255.0.
cfgRacTuneIpBlkEnable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
0
Description
Enables or disables the IP address blocking feature of the RAC.
cfgRacTuneIpBlkFailcount
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 – 16
Default
5
Description
The maximum number of login failure to occur within the window before the
login attempts from the IP address are rejected.
cfgRacTuneIpBlkFailWindow
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 – 65535
Default
60
Description
Defines the timespan in seconds that the failed attempts are counted. When
the failure attempts age to this limit, the failures are dropped from the count.
Legal Values
2 – 65535
Default
300
Description
Defines the timespan in seconds that session requests from an IP address with
excessive failures are rejected.
cfgRacTuneSshPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 – 65535
Default
22
Description
Specifies the port number used for the RAC SSH interface.
cfgRacTuneTelnetPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 – 65535
Default
23
cfgRacTuneRemoteRacadmEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
1
Description
Enables or disables the Remote RACADM interface in the RAC.
cfgRacTuneConRedirEncryptEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Encrypts the video in a console redirection session.
cfgRacTuneConRedirPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 – 65535
Description
Specifies the port to be used for keyboard and mouse traffic during Console
Redirection activity with the RAC.
NOTE: This object requires a DRAC 5 reset before it becomes active.
cfgRacTuneConRedirVideoPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 – 65535
Default
5901
Description
Specifies the port to be used for video traffic during Console Redirection
activity with the RAC.
NOTE: This object requires a DRAC 5 reset before it becomes active.
cfgRacTuneAsrEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
Enables or disables the crash screen capture feature of the RAC.
cfgRacTuneDaylightOffset (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 – 60
Default
0
Description
Specifies the daylight savings offset (in minutes) to use for the RAC Time.
cfgRacTuneTimezoneOffset (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
-720 – 780
Default
0
Description
Specifies the timezone offset (in minutes) from GMT/UTC to use for the
RAC Time. Some common timezone offsets for timezones in the United
States are shown below:
-480 (PST — Pacific Standard Time)
-420 (MST — Mountain Standard Time)
-360 (CST — Central Standard Time)
-300 (EST — Eastern Standard Time)
cfgRacTuneWebserverEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
1
Description
Enables and disables the RAC Web server. If this property is disabled, the
RAC will not be accessible using client Web browsers or remote RACADM.
This property has no effect on the telnet/ssh/serial or local RACADM
interfaces.
cfgRacTuneLocalServerVideo (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (Enables)
0 (Disables)
Default
1
Description
Enables (switches ON) or disables (switches OFF) the local server video.
cfgRacTuneLocalConfigDisable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Description
Enables or disables the ability of a local user to configure the DRAC 5 using
local racadm or the Dell OpenManage Server Administrator Utilities.
cfgRacTuneCtrlEConfigDisable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the ability to disable the ability of the local user to
configure the DRAC 5 from the BIOS POST option-ROM.
ifcRacManagedNodeOs
This group contains properties that describe the Managed Server operating
system.
One instance of the group is allowed. The following subsections describe the
objects in this group.
ifcRacMnOsHostname (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 255.
Description
The host name of the managed system.
ifcRacMnOsOsName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 255.
Default
""
Description
The operating system name of the managed system.
cfgRacSecurity
This group is used to configure settings related to the RAC SSL certificate
signing request (CSR) feature. The properties in this group MUST be
configured prior to generating a CSR from the RAC.
See the RACADM sslcsrgen subcommand details for more information on
generating certificate signing requests.
cfgRacSecCsrCommonName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 254.
Default
""
cfgRacSecCsrOrganizationName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 254.
Default
""
Description
Specifies the CSR Organization Name (O).
cfgRacSecCsrOrganizationUnit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 254.
Default
""
Description
Specifies the CSR Organization Unit (OU).
cfgRacSecCsrLocalityName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 254.
Default
""
cfgRacSecCsrStateName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 254.
Default
""
Description
Specifies the CSR State Name (S).
cfgRacSecCsrCountryCode (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 2.
Default
""
Description
Specifies the CSR Country Code (CC)
cfgRacSecCsrEmailAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
String. Maximum Length = 254.
Default
""
cfgRacSecCsrKeySize (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1024
2048
4096
Default
1024
Description
Specifies the SSL asymmetric key size for the CSR.
cfgRacVirtual
This group contains parameters to configure the DRAC 5 Virtual Media
feature. One instance of the group is allowed. The following subsections
describe the objects in this group.
cfgVirMediaAttached (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
cfgVirAtapiSvrPort (Read/Write)
NOTE: To modify this property, you must have Access Virtual Media permission.
Legal Values
1 – 65535
Default
3669
Description
Specifies the port number used for encrypted virtual media connections to
the RAC.
cfgVirAtapiSvrPortSsl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Any unused port number between 0 and 65535 decimal.
Default
3669
Description
Sets the port used for SSL Virtual Media connections.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the virtual media key feature of the RAC.
cfgVirMediaPluginTypr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (Java Plug-in)
0 (Native Plug-in)
Default
0
Description
Sets the virtual media plug-in type.
cfgVirtualBootOnce (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 — Disable: Disables this option.
1 — Virtual Flash/Virtual Media: Boot from Virtual Flash or any Virtual
Media device.
2 — Virtual Floppy: Boot from Virtual floppy device.
Default
0
Description
Sets the boot once device. If this property is set to a supported device and the
host system is rebooted, the system attempts to boot from the selected
device—if the appropriate media is installed in the device.
NOTE: To enable the Boot Once feature for the Virtual Flash device, go to the BIOS
Setup and manually change the boot order during system reboot.
NOTE: Boot once devices other than Virtual Flash (1), PXE (4), and Disable (0) are
supported only on some systems with supported BIOS and Baseboard Management
Controller (BMC) firmware versions. See the Dell website at www.dell.com to check
if your system supports all the boot once devices.
NOTE: On systems not supporting Virtual Floppy and Virtual CD/DVD/ISO, use '1'
(Virtual Flash/Virtual Media) to perform the Boot Once either to Virtual Floppy, or
Virtual CD/DVD/ISO or Virtual Flash. In this case, set the required virtual device as
the first boot device in the BIOS Setup. DRAC 5 automatically disconnects this
device once the system reboots to the device, and another reboot is applied to the
system.
NOTE: On systems supporting Virtual Floppy and Virtual CD/DVD/ISO as separate
options, DRAC 5 does not automatically disconnect or detach the virtual media
connection after Boot Once.
cfgFloppyEmulation (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
0
Description
When set to 0, the Virtual Floppy drive is recognized as a removable disk by
Windows operating systems. Windows operating systems will assign a drive
letter that is C: or higher during enumeration. When set to 1, the Virtual
Floppy drive will be seen as a floppy drive by Windows operating systems.
Windows operating systems will assign a drive letter of A: or B:.
cfgActiveDirectory
This group contains parameters to configure the DRAC 5 Active Directory
feature.
cfgADRacDomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Any printable text string with no white space. Length is limited to 254
characters.
Default
""
Description
Active Directory Domain in which the DRAC resides.
cfgADRacName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
""
Description
Name of DRAC as recorded in the Active Directory forest.
cfgADEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables Active Directory user authentication on the RAC. If this
property is disabled, local RAC authentication is used for user logins instead.
cfgADSpecifyServerEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 or 0 (True or False)
Default
0
cfgADDomainController (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Valid IP address or fully qualified domain name (FQDN)
Default
No default values
Description
DRAC 5 uses the value you specify, to search the LDAP server for user names.
cfgADGlobalCatalog (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Valid IP address or FQDN
Default
No default values
Description
DRAC 5 uses the value you specify, to search the Global Catalog server for
user names.
cfgAODomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Valid IP address or FQDN
Default
No default values
Description
DRAC 5 uses the value you specify, to search the Association Object for user
names.
cfgADSmartCardLogonEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the Smart Card logon on DRAC 5.
cfgADCRLEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
cfgADAuthTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
15 – 300
Default
120
Description
Specifies the number of seconds to wait for Active Directory authentication
requests to complete before timing out.
cfgADRootDomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Any printable text string with no white space. Length is limited to 254
characters.
Default
""
Description
Root domain of the Domain Forest.
cfgADType (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 = Enables Extended Schema with Active Directory.
Default
1 = Extended Schema
Description
Determines the schema type to use with Active Directory.
cfgADSSOEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables Active Directory single sign-on authentication on the
RAC.
cfgStandardSchema
This group contains parameters to configure the Standard Schema settings.
Legal Values
Integer from 1 to 5.
Description
Index of the Role Group as recorded in the Active Directory.
cfgSSADRoleGroupName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
(blank)
Description
Name of the Role Group as recorded in the Active Directory forest.
cfgSSADRoleGroupDomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Any printable text string with no white space. Length is limited to
254 characters.
Default
(blank)
Description
Active Directory Domain in which the Role Group resides.
cfgSSADRoleGroupPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0x00000000 to 0x000001ff
Default
(blank)
Description
Use the bit mask numbers in Table B-4 to set role-based authority privileges
for a Role Group.
cfgIpmiSerial
This group specifies properties used to configure the IPMI serial interface of
the BMC.
cfgIpmiSerialConnectionMode (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (Terminal)
1 (Basic)
Default
1
Description
When the DRAC 5 cfgSerialConsoleEnable property is set to 0 (disabled),
the DRAC 5 serial port becomes the IPMI serial port. This property
determines the IPMI defined mode of the serial port.
cfgIpmiSerialBaudRate (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
9600, 19200, 57600, 115200
Default
57600
Description
Specifies the baud rate for a serial connection over IPMI.
cfgIpmiSerialChanPrivLimit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
Default
4
Description
Specifies the maximum privilege level allowed on the IPMI serial channel.
cfgIpmiSerialFlowControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
1
Description
Specifies the flow control setting for the IPMI serial port.
cfgIpmiSerialHandshakeControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
Enables or disables he IPMI terminal mode handshake control.
cfgIpmiSerialLineEdit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
cfgIpmiSerialEchoControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
Enables or disables echo control on the IPMI serial interface.
cfgIpmiSerialDeleteControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
0
Description
Enables or disables delete control on the IPMI serial interface.
cfgIpmiSerialNewLineSequence (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (None)
Default
1
Description
Specifies the newline sequence specification for the IPMI serial interface.
cfgIpmiSerialInputNewLineSequence (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (<ENTER>)
1 (NULL)
Default
1
Description
Specifies the input newline sequence specification for the IPMI serial
interface.
cfgIpmiSol
This group is used to configure the Serial-Over-LAN capabilities of the
system.
cfgIpmiSolEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
1
Description
Enables or disables Serial Over LAN (SOL).
cfgIpmiSolBaudRate (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
9600, 19200, 57600, 115200
Default
57600
Description
The baud rate for serial communication over LAN.
cfgIpmiSolMinPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
Default
4
cfgIpmiSolAccumulateInterval (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 – 255.
Default
10
Description
Specifies the typical amount of time that the BMC waits before transmitting
a partial SOL character data packet. This value is 1-based 5ms increments.
cfgIpmiSolSendThreshold (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 – 255
Default
255
Description
The SOL threshold limit value.
cfgIpmiLan
This group is used to configure the IPMI-Over-LAN capabilities of the
system.
cfgIpmiLanEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
1
Description
Enables or disables the IPMI-Over-LAN interface.
cfgIpmiLanPrivLimit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
Default
0
Description
Specifies the maximum privilege level allowed for IPMI over LAN access.
cfgIpmiLanAlertEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
cfgIpmiEncryptionKey (Read/Write)
NOTE: To view or modify this property, you must have Configure DRAC 5 permission
and administrator privileges.
Legal Values
A string of hexadecimal digits from 0 to 20 characters with no spaces.
Default
"00000000000000000000"
Description
The IPMI encryption key.
cfgIpmiPetCommunityName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
A string up to 18 characters.
Default
"public"
Description
The SNMP community name for traps.
cfgIpmiPef
This group is used to configure the platform event filters available on the
managed server.
The event filters can be used to control policy related to actions that are
triggered when critical events occur on the managed system.
Legal Values
String. Maximum Length = 255.
Default
The name of the index filter.
Description
Specifies the name of the platform event filter.
Legal Values
1 – 17
Default
The index value of a platform event filter object.
Description
Specifies the index of a specific platform event filter.
cfgIpmiPefAction (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (None)
1 (Power Down)
2 (Reset)
3 (Power Cycle)
Default
0
cfgIpmiPefEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
Enables or disables a specific platform event filter.
cfgIpmiPet
This group is used to configure platform event traps on the managed system.
cfgIpmiPetIndex (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1–4
Default
The appropriate index value.
Description
Unique identifier for the index corresponding to the trap.
cfgIpmiPetAlertDestIpAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
0.0.0.0
Description
Specifies the destination IP address for the trap receiver on the network.
The trap receiver receives an SNMP trap when an event is triggered on the
managed system.
cfgIpmiPetAlertEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
Enables or disables a specific trap.
arp
clearasrscreen
clrraclog
clrsel
coredump
coredumpdelete
fwupdate
getconfig
getniccfg
getraclog
getractime
getsel
getssninfo
getsvctag
getsysinfo
gettracelog
help
ifconfig
netstat
ping
racdump
racreset
racresetcfg
serveraction
setniccfg
sslcertdownload
sslcertupload
sslcertview
sslcsrgen
sslkeyupload
testemail
testtrap
vmdisconnect
vmkey
usercertupload
usercertview
localConRedirDisable
Index 403
enabling serial/telnet/ssh using the DRAC 5 with Active
console, 57 Directory, 141
securing communications, 209 using Virtual Media, 198
updating the firmware, 40
H
E hardware
e-mail alerts installing, 35
configuring, 255 hardware specifications, 26
configuring using RACADM connectors, 26
CLI, 256 DRAC 5 ports, 27
configuring using the web user power requirements, 26
interface, 255
enabling
single sign-on, 147 I
example
IP blocking
see sample
about, 221
extended schema enabling, 223
using with Active Directory, 110
IPMI
configuring, 61, 259
configuring using the RACADM
F CLI, 262
features configuring using the Web-based
DRAC 5, 29 interface, 259
DRAC 5 hardware, 26 IpRange
firmware about, 219
downloading, 41 enabling, 220
updating, 40
frequently asked questions
managing and recovering a remote
K
system, 92 kerberos authentication, 143
using console redirection, 168 prerequisites, 143
404 Index
L N
last crash screen network properties
capturing on the managed configuring manually, 90
system, 249 configuring using racadm, 90
Linux XTerm
configuring for telnet console
redirection, 68 O
logs operating system boot, 277
operating system boot, 277
Operating System Boot Capture
POST, 277 Logs, 277
other documents you may
need, 30
M
managed system
accessing through the local serial P
port, 64
parsing rules, 87
capturing the last crash
screen, 249 PEF
configuring BIOS setup, 50 configuring, 251
enabling serial or telnet configuring using RACACM
console, 50 CLI, 252
installing software, 38 configuring using the web user
management station interface, 251
configuring, 158 PET
configuring a Red Hat Enterprise configuring, 253
Linux management configuring using RACADM
station, 39 CLI, 254
configuring terminal configuring using the web user
emulation, 65 interface, 253
installing and removing platform events
RACADM, 40
configuring, 250
installing the software, 39
prerequisites
mouse pointer
setting up kerberos
synchronizing, 166 authentication, 143
Index 405
setting up single sign-on, 147 configuring e-mail alerts, 256
property database groups configuring PEF, 252
cfcRacManagedNodesOs, 374 configuring PET, 254
cfgActiveDirectory, 382 RACADM subcommands
cfgEmailAlert, 353 arp, 290
cfgIpmiLan, 395 clearasrscreen, 290
cfgIpmiPef, 397 clrraclog, 317
cfgIpmiPet, 399 clrsel, 318
cfgIpmiSerial, 389 config, 291
cfgIpmiSol, 393 coredump, 296
cfgLanNetworking, 339 coredumpdelete, 297
cfgNetTuning, 362 fwupdate, 297
cfgOobSnmp, 364 getconfig, 293
cfgRacSecurity, 375 getniccfg, 309
cfgRacTuning, 365 getraclog, 315
cfgRacVirtual, 378 getractime, 305
cfgRemoteHosts, 347 getsel, 317
cfgSerial, 357 getssninfo, 300
cfgSessionManagement, 355 getsvctag, 310
cfgUserAdmin, 349 getsysinfo, 302
idRacInfo, 337 gettracelog, 319
help, 289
ifconfig, 306
R localConRedirDisable, 336
netstat, 306
RAC serial
ping, 307
configuring, 61
racdump, 311
RAC serial interface racreset, 312
about, 51 racresetcfg, 313
RACADM serveraction, 314
attaching virtual media, 185 setniccfg, 307
configuring serial and telnet, 58 sslcertupload, 322, 327
installing and removing, 40 sslcertview, 325
supported interfaces, 401 sslcsrgen, 320
testemail, 329
RACADM CLI
406 Index
testtrap, 330 serial mode
usercertupload, 333 configuring, 61
userertview, 335 Serial Over LAN (SOL)
vmdisconnect, 332 configuring, 267
vmkey, 333
server certificate
racadm utility uploading, 213
configuring network viewing, 213
properties, 90
parsing rules, 87 Server Management Command
Line Protocol (SM-CLP)
subcommands, 289
about, 225
reboot option support, 225
disabling, 250
services
Red Hat Enterprise Linux configuring, 215
configuring for serial console
redirection, 51 Single Sign-On, 140
Index 407
T deploying the operating
system, 198
telnet console
operating system shell
using, 70
options, 194
terminal mode parameters, 191
configuring, 61, 63 using, 189
U W
usercertupload, 333 web browser
configuring, 43
web user interface
V accessing, 48
video viewer configuring e-mail alerts, 255
accessing the viewer menu configuring PEF, 251
bar, 163 configuring PET, 253
using, 163
virtual flash
configuring, 188
disabling, 188
enabling, 187
using, 187
virtual media
about, 177
attaching, 183
booting, 185
detaching, 183
installing the operating
system, 186
installing the plug-in, 179
running, 180
supported configurations, 180
VM-CLI
about, 189
408 Index