Idrac Access Via Host Os (Experimental Feature) - Dell iDRAC 8 User Manual

Table of Contents

Advertisement

-u:<admin-username> -p:<admin-passwd> -r:http://<remote-hostname OR IP>/wsman
a:Basic -encoding:utf-8 -skipCACheck –skipCNCheck
Linux operating system
On all iSM supported Linux operating system, iSM provides an executable command. You can run this command by logging into
the operating system by using SSH or equivalent.
Beginning with iSM 2.4.0, you can configure Agent-x as the default protocol for in-band iDRAC SNMP alerts using the following
command:
./Enable-iDRACSNMPTrap.sh 1/agentx –force
If –force is not specified, ensure that the net-SNMP is configured and restart the snmpd service.
– To enable this feature:
Enable-iDRACSNMPTrap.sh 1
Enable-iDRACSNMPTrap.sh enable
– To disable this feature:
Enable-iDRACSNMPTrap.sh 0
Enable-iDRACSNMPTrap.sh disable
NOTE: The --force option configures the Net-SNMP to forward the traps. However, you must configure the trap
destination.
VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface (CMPI)
method provider to enable this feature remotely by using the WinRM remote commands.
winrm i EnableInBandSNMPTraps http://schemas.dell.com/wbem/wscim/1/cim-schema/2/root/
cimv2/dcim/DCIM_iSMService?
__cimnamespace=root/cimv2/dcim+InstanceID=iSMExportedFunctions -u:<user-name> -
p:<passwd> -r:https://<remote-host-name
ip-address>:443/wsman -a:basic -encoding:utf-8 -skipCNCheck -skipCACheck -
skipRevocationcheck @{state="[0/1]"}
NOTE: You must review and configure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at http://
en.community.dell.com/techcenter/extras/m/white_papers.

iDRAC access via Host OS (Experimental Feature)

By using this feature, you can configure and monitor the hardware parameters through iDRAC Web interface, WS-MAN, and
RedFish interfaces using the host IP address without configuring the iDRAC IP address. You can use the default iDRAC credentials if
the iDRAC server is not configured or continue to use the same iDRAC credentials if the iDRAC server was configured earlier.
iDRAC access via Windows Operating Systems
You can perform this task by using the following methods:
Install the iDRAC access feature by using the webpack.
Configure using iSM PowerShell script
Installation by using MSI
You can install this feature by using the web-pack. This feature is disabled on a typical iSM installation. If enabled, the default
listening port number is 1266. You can modify this port number within the range 1024 through 65535. iSM redirects the connection
to the iDRAC. iSM then creates an inbound firewall rule, OS2iDRAC. The listening port number is added to the OS2iDRAC firewall
-
265

Advertisement

Table of Contents
loading

This manual is also suitable for:

Idrac 7

Table of Contents