Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 91

Enabling or disabling OS to iDRAC Pass-through using iDRAC settings utility, Obtaining certificates

Page 91 highlights

Enabling or disabling OS to iDRAC Pass-through using iDRAC settings utility To enable or disable OS to iDRAC Pass-through using iDRAC Settings Utility: 1. In the iDRAC Settings utility, go to Communications Permissions. The iDRAC Settings.Communications Permissions page is displayed. 2. Select any of the following options to enable OS to iDRAC pass-through: • LOM - The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through the LOM or NDC. • USB NIC - The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through the internal USB bus. To disable this feature, select Disabled. NOTE: The LOM option can be selected only of the card supports OS to iDRAC pass-through capability. Else, this option is grayed-out. 3. If you select LOM as the pass-through configuration, and if the server is connected using dedicated mode, enter the IPv4 address of the operating system. NOTE: If the server is connected in shared LOM mode, then the OS IP Address field is disabled. 4. If you select USB NIC as the pass-through configuration, enter the IP address of the USB NIC. The default value is 169.254.0.1. However, if this IP address conflicts with an IP address of other interfaces of the host system or the local network, you must change it. Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the front panel when a A/A cable is used 5. Click Back, click Finish, and then click Yes. The details are saved. Obtaining certificates The following table lists the types of certificates based on the login type. Table 13. Types of certificate based on login type Login Type Certificate Type Single Sign-on using Active Directory Trusted CA certificate How to Obtain Generate a CSR and get it signed from a Certificate Authority SHA-2 certificates are also supported. Smart Card login as a local or Active Directory user • User certificate • Trusted CA certificate • User Certificate - Export the smart card user certificate as Base64-encoded file using the card management software provided by the smart card vendor. • Trusted CA certificate - This certificate is issued by a CA. SHA-2 certificates are also supported. Active Directory user login Trusted CA certificate This certificate is issued by a CA. SHA-2 certificates are also supported. Local User login SSL Certificate Generate a CSR and get it signed from a trusted CA NOTE: iDRAC ships with a default self-signed SSL server certificate. The iDRAC Web server, Virtual Media, and Virtual Console use this certificate. Configuring iDRAC 91

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

Enabling or disabling OS to iDRAC Pass-through using
iDRAC settings utility
To enable or disable OS to iDRAC Pass-through using iDRAC Settings Utility:
1.
In the iDRAC Settings utility, go to
Communications Permissions
.
The
iDRAC Settings.Communications Permissions
page is displayed.
2.
Select any of the following options to enable OS to iDRAC pass-through:
LOM
— The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through the LOM
or NDC.
USB NIC
— The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through the
internal USB bus.
To disable this feature, select
Disabled
.
NOTE:
The LOM option can be selected only of the card supports OS to iDRAC pass-through capability. Else, this
option is grayed-out.
3.
If you select
LOM
as the pass-through configuration, and if the server is connected using dedicated mode, enter the IPv4 address of
the operating system.
NOTE:
If the server is connected in shared LOM mode, then the OS IP Address field is disabled.
4.
If you select
USB NIC
as the pass-through configuration, enter the IP address of the USB NIC.
The default value is 169.254.0.1. However, if this IP address conflicts with an IP address of other interfaces of the host system or the
local network, you must change it. Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the
front panel when a A/A cable is used
5.
Click
Back
, click
Finish
, and then click
Yes
.
The details are saved.
Obtaining certificates
The following table lists the types of certificates based on the login type.
Table 13. Types of certificate based on login type
Login Type
Certificate Type
How to Obtain
Single Sign-on using Active Directory
Trusted CA certificate
Generate a CSR and get it signed from a
Certificate Authority
SHA-2 certificates are also supported.
Smart Card login as a local or Active
Directory user
User certificate
Trusted CA certificate
User Certificate — Export the smart
card user certificate as Base64-encoded
file using the card management
software provided by the smart card
vendor.
Trusted CA certificate — This
certificate is issued by a CA.
SHA-2 certificates are also supported.
Active Directory user login
Trusted CA certificate
This certificate is issued by a CA.
SHA-2 certificates are also supported.
Local User login
SSL Certificate
Generate a CSR and get it signed from a
trusted CA
NOTE:
iDRAC ships with a default
self-signed SSL server certificate.
The iDRAC Web server, Virtual
Media, and Virtual Console use this
certificate.
Configuring iDRAC
91