Adding Idrac7 To The List Of Trusted Domains - Dell iDRAC7 User Manual

Table of Contents

Advertisement

Under Java (Sun):
Use JRE 1.6.x_yz: selected (optional; version may differ)
Under Multimedia:
Enable automatic image resizing: selected
Play animations in Web pages: selected
Play videos in Web pages: selected
Show pictures: selected
Under Security:
Check for publishers' certificate revocation: cleared
Check for signatures on downloaded programs: cleared
Check for signatures on downloaded programs: selected
Use SSL 2.0: cleared
Use SSL 3.0: selected
Use TLS 1.0: selected
Warn about invalid site certificates: selected
Warn if changing between secure and not secure mode: selected
Warn if forms submittal is being redirected: selected
NOTE: To modify the settings, it is recommended that you learn and understand the consequences. For
example, if you block pop-ups, parts of iDRAC7 Web interface may not function properly.
7.
Click Apply, and then click OK.
8.
Click the Connections tab.
9.
Under Local Area Network (LAN) settings, click LAN Settings.
10. If the Use a proxy server box is selected, select the Bypass proxy server for local addresses box.
11. Click OK twice.
12. Close and restart your browser to make sure all changes take effect.
Related Links
Viewing Localized Versions of Web Interface

Adding iDRAC7 to the List of Trusted Domains

Disabling Whitelist Feature in Firefox
Adding iDRAC7 to the List of Trusted Domains
When you access iDRAC7 Web interface, you are prompted to add iDRAC7 IP address to the list of trusted domains if the
IP address is missing from the list. When completed, click Refresh or relaunch the Web browser to establish a
connection to iDRAC7 Web interface.
On some operating systems, Internet Explorer (IE) 8 may not prompt you to add iDRAC7 IP address to the list of trusted
domains if the IP address is missing from the list.
NOTE: When connecting to the iDRAC7 Web interface with a certificate the browser does not trust, the browser's
certificate error warning may display a second time after you acknowledge the first warning. This is the expected
behavior to for security.
50

Advertisement

Table of Contents
loading

Table of Contents