Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 16

Update, Maintenance and Troubleshooting, Dell Best Practices regarding iDRAC, Secure Connectivity

Page 16 highlights

• PCIe SSD devices: • Inventory and remotely monitor the health of PCIe SSD devices in the server. • Prepare the PCIe SSD to be removed. • Securely erase the data. • Set the backplane mode (unified or split mode). • Blink or unblink component LEDs. • Apply the device settings immediately, at next system reboot, at a scheduled time, or as a pending operation to be applied as a batch as part of the single job. Update • Manage iDRAC licenses. • Update BIOS and device firmware for devices supported by Lifecycle Controller. • Update or rollback iDRAC firmware and Lifecycle Controller firmware using a single firmware image. • Manage staged updates. • Back up and restore server profile. • Access iDRAC interface over direct USB connection. • Configure iDRAC using Server Configuration Profiles on USB device. Maintenance and Troubleshooting • Perform power-related operations and monitor power consumption. • Optimize system performance and power consumption by modifying the thermal settings. • No dependency on OpenManage Server Administrator for generation of alerts. • Log event data: Lifecycle and RAC logs. • Set email alerts, IPMI alerts, remote system logs, WS Eventing logs, Redfish event, and SNMP traps (v1, v2c, and v3) for events and improved email alert notification. • Capture last system crash image. • View boot and crash capture videos. • Out-of-band monitor and alert the performance index of CPU, memory, and I/O modules. • Configure warning threshold for inlet temperature and power consumption. • Use iDRAC Service Module to: • View operating system information. • Replicate Lifecycle Controller logs to operating system logs. • Automatic system recovery options. • Remotely hard-reset iDRAC • Enable in-band iDRAC SNMP alerts • Access iDRAC using host OS (experimental feature) • Populate Windows Management Instrumentation (WMI) information. • Integrate with SupportAssist collection. This is applicable only if iDRAC Service Module Version 2.0 or later is installed. For more information, see Generating SupportAssist Collection. • Prepare to remove NVMe PCIe SSD. For more information, see Preparing to remove PCIe SSD. • Generate SupportAssist collection in the following ways: • Automatic - Using iDRAC Service Module that automatically invokes the OS Collector tool. • Manual - Using OS Collector tool. Dell Best Practices regarding iDRAC • iDRACs are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to the internet. Doing so could expose the connected system to security and other risks for which Dell is not responsible. • Along with locating iDRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies such as firewalls, and limit access to the subnet/vLAN to authorized server administrators. Secure Connectivity Securing access to critical network resources is a priority. iDRAC implements a range of security features that includes: • Custom signing certificate for Secure Socket Layer (SSL) certificate. • Signed firmware updates. • User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP) Directory Service, or locally administered user IDs and passwords. • Two-factor authentication using the Smart-Card logon feature. The two-factor authentication is based on the physical smart card and the smart card PIN. 16 Overview

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

PCIe SSD devices:
Inventory and remotely monitor the health of PCIe SSD devices in the server.
Prepare the PCIe SSD to be removed.
Securely erase the data.
Set the backplane mode (unified or split mode).
Blink or unblink component LEDs.
Apply the device settings immediately, at next system reboot, at a scheduled time, or as a pending operation to be applied as a
batch as part of the single job.
Update
Manage iDRAC licenses.
Update BIOS and device firmware for devices supported by Lifecycle Controller.
Update or rollback iDRAC firmware and Lifecycle Controller firmware using a single firmware image.
Manage staged updates.
Back up and restore server profile.
Access iDRAC interface over direct USB connection.
Configure iDRAC using Server Configuration Profiles on USB device.
Maintenance and Troubleshooting
Perform power-related operations and monitor power consumption.
Optimize system performance and power consumption by modifying the thermal settings.
No dependency on OpenManage Server Administrator for generation of alerts.
Log event data: Lifecycle and RAC logs.
Set email alerts, IPMI alerts, remote system logs, WS Eventing logs, Redfish event, and SNMP traps (v1, v2c, and v3) for events and
improved email alert notification.
Capture last system crash image.
View boot and crash capture videos.
Out-of-band monitor and alert the performance index of CPU, memory, and I/O modules.
Configure warning threshold for inlet temperature and power consumption.
Use iDRAC Service Module to:
View operating system information.
Replicate Lifecycle Controller logs to operating system logs.
Automatic system recovery options.
Remotely hard-reset iDRAC
Enable in-band iDRAC SNMP alerts
Access iDRAC using host OS (experimental feature)
Populate Windows Management Instrumentation (WMI) information.
Integrate with SupportAssist collection. This is applicable only if iDRAC Service Module Version 2.0 or later is installed. For more
information, see
Generating SupportAssist Collection
.
Prepare to remove NVMe PCIe SSD. For more information, see
Preparing to remove PCIe SSD
.
Generate SupportAssist collection in the following ways:
Automatic — Using iDRAC Service Module that automatically invokes the OS Collector tool.
Manual — Using OS Collector tool.
Dell Best Practices regarding iDRAC
iDRACs are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to
the internet.
Doing so could expose the connected system to security and other risks for which Dell is not responsible.
Along with locating iDRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies
such as firewalls, and limit access to the subnet/vLAN to authorized server administrators.
Secure Connectivity
Securing access to critical network resources is a priority. iDRAC implements a range of security features that includes:
Custom signing certificate for Secure Socket Layer (SSL) certificate.
Signed firmware updates.
User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP) Directory Service, or
locally administered user IDs and passwords.
Two-factor authentication using the Smart–Card logon feature. The two-factor authentication is based on the physical smart card and
the smart card PIN.
16
Overview