Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 81

Enabling FIPS mode using RACADM, Disabling FIPS mode, Configuring services

Page 81 highlights

5. Install a trusted certificate for iDRAC. NOTE: The default SSL certificate is not allowed in FIPS mode. NOTE: Some iDRAC interfaces, such as the standards-compliant implementations of IPMI and SNMP, do not support FIPS-compliance. Enabling FIPS mode using RACADM Use RACADM CLI to execute the following command: racadm set iDRAC.Security.FIPSMode Disabling FIPS mode To disable FIPS mode, you must reset iDRAC to the factory-default settings. Configuring services You can configure and enable the following services on iDRAC: Local Configuration Web Server SSH Telnet Remote RACADM Redfish SNMP Agent Automated System Recovery Agent VNC Server Disable access to iDRAC configuration (from the host system) using Local RACADM and iDRAC Settings utility. Enable access to iDRAC web interface. If you disable the web interface, remote RACADM also gets disabled. Use local RACADM to re-enable the web server and remote RACADM. Access iDRAC through firmware RACADM. Access iDRAC through firmware RACADM. Remotely access iDRAC. Enables support for Redfish RESTful API. Enables support for SNMP queries (GET, GETNEXT, and GETBULK operations) in iDRAC. Enable Last System Crash Screen. Enable VNC server with or without SSL encryption. Configuring services using web interface To configure the services using iDRAC Web interface: 1. In the iDRAC Web interface, go to Overview > iDRAC Settings > Network > Services. The Services page is displayed. 2. Specify the required information and click Apply. For information about the various settings, see the iDRAC Online Help. NOTE: Do not select the Prevent this page from creating additional dialogs check-box. Selecting this option prevents you from configuring services. Configuring services using RACADM To enable and configure services using RACADM, use the set command with the objects in the following object groups: • iDRAC.LocalSecurity • iDRAC.LocalSecurity • iDRAC.SSH • iDRAC.Webserver Configuring iDRAC 81

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

5.
Install a trusted certificate for iDRAC.
NOTE:
The default SSL certificate is not allowed in FIPS mode.
NOTE:
Some iDRAC interfaces, such as the standards-compliant implementations of IPMI and SNMP, do not support
FIPS-compliance.
Enabling FIPS mode using RACADM
Use RACADM CLI to execute the following command:
racadm set iDRAC.Security.FIPSMode <Enable>
Disabling FIPS mode
To disable FIPS mode, you must reset iDRAC to the factory-default settings.
Configuring services
You can configure and enable the following services on iDRAC:
Local
Configuration
Disable access to iDRAC configuration (from the host system) using Local RACADM and iDRAC Settings utility.
Web Server
Enable access to iDRAC web interface. If you disable the web interface, remote RACADM also gets disabled. Use
local RACADM to re-enable the web server and remote RACADM.
SSH
Access iDRAC through firmware RACADM.
Telnet
Access iDRAC through firmware RACADM.
Remote RACADM
Remotely access iDRAC.
Redfish
Enables support for Redfish RESTful API.
SNMP Agent
Enables support for SNMP queries (GET, GETNEXT, and GETBULK operations) in iDRAC.
Automated
System Recovery
Agent
Enable Last System Crash Screen.
VNC Server
Enable VNC server with or without SSL encryption.
Configuring services using web interface
To configure the services using iDRAC Web interface:
1.
In the iDRAC Web interface, go to
Overview
>
iDRAC Settings
>
Network
>
Services
.
The
Services
page is displayed.
2.
Specify the required information and click
Apply
.
For information about the various settings, see the
iDRAC Online Help
.
NOTE:
Do not select the
Prevent this page from creating additional dialogs
check-box. Selecting this option
prevents you from configuring services.
Configuring services using RACADM
To enable and configure services using RACADM, use the
set
command with the objects in the following object groups:
iDRAC.LocalSecurity
iDRAC.LocalSecurity
iDRAC.SSH
iDRAC.Webserver
Configuring iDRAC
81