Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 257
iDRAC access via Host OS Experimental Feature
![]() |
View all Dell PowerEdge R830 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 257 highlights
Beginning with iSM 2.4.0, you can configure Agent-x as the default protocol for in-band iDRAC SNMP alerts using the following command: ./Enable-iDRACSNMPTrap.sh 1/agentx -force If -force is not specified, ensure that the net-SNMP is configured and restart the snmpd service. • To enable this feature: Enable-iDRACSNMPTrap.sh 1 Enable-iDRACSNMPTrap.sh enable • To disable this feature: Enable-iDRACSNMPTrap.sh 0 Enable-iDRACSNMPTrap.sh disable NOTE: The --force option configures the Net-SNMP to forward the traps. However, you must configure the trap destination. • VMware ESXi operating system On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface (CMPI) method provider to enable this feature remotely by using the WinRM remote commands. winrm i EnableInBandSNMPTraps http://schemas.dell.com/wbem/wscim/1/cim-schema/2/root/cimv2/ dcim/DCIM_iSMService? __cimnamespace=root/cimv2/dcim+InstanceID=iSMExportedFunctions -u: -p: r:https://:443/wsman -a:basic -encoding:utf-8 -skipCNCheck -skipCACheck skipRevocationcheck @{state="[0/1]"} NOTE: You must review and configure the VMware ESXi system-wide SNMP settings for traps. NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at http:// en.community.dell.com/techcenter/extras/m/white_papers. iDRAC access via Host OS (Experimental Feature) By using this feature, you can configure and monitor the hardware parameters through iDRAC Web interface, WSMAN, and Redfish interfaces using the host IP address without configuring the iDRAC IP address. You can use the default iDRAC credentials if the iDRAC server is not configured or continue to use the same iDRAC credentials if the iDRAC server was configured earlier. iDRAC access via Windows Operating Systems You can perform this task by using the following methods: • Install the iDRAC access feature by using the webpack. • Configure using iSM PowerShell script Installation by using MSI You can install this feature by using the web-pack. This feature is disabled on a typical iSM installation. If enabled, the default listening port number is 1266. You can modify this port number within the range 1024 through 65535. iSM redirects the connection to the iDRAC. iSM then creates an inbound firewall rule, OS2iDRAC. The listening port number is added to the OS2iDRAC firewall rule in the host operating system, which allows incoming connections. The firewall rule is enabled automatically when this feature is enabled. Beginning with iSM 2.4.0, you can retrieve the current status and listening-port configuration by using the following PowerShell cmdlet: Enable-iDRACAccessHostRoute -status get The output of this command indicates whether this feature is enabled or disabled. If the feature is enabled, it displays the listening-port number. Using iDRAC Service Module 257
![](/manual_guide/products/dell-poweredge-c6320p-integrated-remote-access-controller-8-version-2707070-users-guide-f520c3e/257.png)