NOTE: Some of the features
are available only with iDRAC Enterprise license. For information
on the features available for a license, see Managing licenses.
Inventory and Monitoring
View managed server health.
Inventory and monitor network adapters and storage
subsystem (PERC and direct attached storage) without any operating
system agents.
View and export system inventory.
View sensor information such as temperature, voltage,
and intrusion.
Monitor CPU state, processor automatic throttling,
and predictive failure.
View memory information.
Monitor and control power usage.
Support for SNMPv3 gets and alerts.
For blade servers: launch Chassis Management Controller
(CMC) web interface, view CMC information, and WWN/MAC addresses.
NOTE: CMC provides access
to iDRAC through the M1000E Chassis LCD panel and local console connections.
For more information, see Chassis Management Controller User’s
Guide available at dell.com/support/manuals.
View network interfaces available on host operating
systems.
View inventory and monitor information and configure
basic iDRAC settings using iDRAC Quick Sync feature and a mobile device.
Deployment
Manage vFlash SD card partitions.
Configure front panel display settings.
Manage iDRAC network settings.
Configure and use virtual console and virtual media.
Deploy operating systems using remote file share,
virtual media, and VMCLI.
Enable auto-discovery.
Perform server configuration using the export or
import XML profile feature through RACADM and WS-MAN. For more information,
see the Lifecycle Controller Remote Services Quick Start Guide.
Configure persistence policy for virtual addresses,
initiator, and storage targets.
Remotely configure storage devices attached to the
system at run-time.
Perform the following operations for storage devices:
Physical disks: Assign or unassign physical disk as
a global hot spare.
Virtual disks:
Create virtual disks.
Edit virtual disks cache policies.
Check virtual disk consistency.
Initialize virtual disks.
Encrypt virtual disks.
Assign or unassign dedicated hot spare.
Delete virtual disks.
Controllers:
Configure controller properties.
Import or auto-import foreign configuration.
Clear foreign configuration.
Reset controller configuration.
Create or change security keys.
PCIe SSD devices:
Inventory and remotely monitor the health of PCIe
SSD devices in the server.
Prepare the PCIe SSD to be removed.
Securely erase the data.
Set the backplane mode (unified or split mode).
Blink or unblink component LEDs.
Apply the device settings immediately, at next system
reboot, at a scheduled time, or as a pending operation to be applied
as a batch as part of the single job.
Update
Manage iDRAC licenses.
Update BIOS and device firmware for devices supported
by Lifecycle Controller.
Update or rollback iDRAC firmware and Lifecycle Controller
firmware using a single firmware image.
Manage staged updates.
Back up and restore server profile.
Access iDRAC interface over direct USB connection.
Configure iDRAC using Server Configuration Profiles
on USB device.
Maintenance and Troubleshooting
Perform power-related operations and monitor power
consumption.
Optimize system performance and power consumption
by modifying the thermal settings.
No dependency on OpenManage Server Administrator
for generation of alerts.
Log event data: Lifecycle and RAC logs.
Set email alerts, IPMI alerts, remote system logs,
WS Eventing logs, Redfish event, and SNMP traps (v1, v2c, and v3)
for events and improved email alert notification.
Capture last system crash image.
View boot and crash capture videos.
Out-of-band monitor and alert the performance index
of CPU, memory, and I/O modules.
Configure warning threshold for inlet temperature
and power consumption.
Use iDRAC Service Module to:
View operating system information.
Replicate Lifecycle Controller logs to operating
system logs.
Automatic system recovery options.
Remotely hard-reset iDRAC
Enable in-band iDRAC SNMP alerts
Access iDRAC using host OS (experimental feature)
Populate Windows Management Instrumentation (WMI)
information.
Integrate with SupportAssist collection. This is applicable
only if iDRAC Service Module Version 2.0 or later is installed. For
more information, see Generating SupportAssist
Collection.
Generate SupportAssist collection in the following
ways:
Automatic — Using iDRAC Service Module that automatically
invokes the OS Collector tool.
Manual — Using OS Collector tool.
Dell Best Practices regarding iDRAC
iDRACs are intended to be on a separate management
network; they are not designed nor intended to be placed on or connected
to the internet. Doing so could expose the connected system to security
and other risks for which Dell is not responsible.
Along with locating iDRACs on a separate management
subnet, users should isolate the management subnet/vLAN with technologies
such as firewalls, and limit access to the subnet/vLAN to authorized
server administrators.
Secure Connectivity
Securing access to critical network resources is a
priority. iDRAC implements a range of security features that includes:
Custom signing certificate for Secure Socket Layer
(SSL) certificate.
Signed firmware updates.
User authentication through Microsoft Active Directory,
generic Lightweight Directory Access Protocol (LDAP) Directory Service,
or locally administered user IDs and passwords.
Two-factor authentication using the Smart–Card logon
feature. The two-factor authentication is based on the physical smart
card and the smart card PIN.
Single Sign-On and Public Key Authentication.
Role-based authorization, to configure specific privileges
for each user.
SNMPv3 authentication for user accounts stored locally
in the iDRAC. It is recommended to use this, but it is disabled by
default.
User ID and password configuration.
Default login password modification.
Set user passwords and BIOS passwords using one-way
hash format for improved security.
FIPS 140-2 Level 1 capability.
Support for TLS 1.2, 1.1, and 1.0. To enhance security, default setting is TLS 1.1 and higher.
SMCLP and web interfaces that support 128 bit and
40-bit encryption (for countries where 128 bit is not acceptable),
using the TLS 1.2 standard.
NOTE: To ensure a secure connection, Dell recommends using TLS 1.1 and higher.
Session time-out configuration (in seconds).
Configurable IP ports (for HTTP, HTTPS, SSH, Telnet,
Virtual Console, and Virtual Media).
NOTE: Telnet does not support
SSL encryption and is disabled by default.
Secure Shell (SSH) that uses an encrypted transport
layer for higher security.
Login failure limits per IP address, with login blocking
from that IP address when the limit is exceeded.
Limited IP address range for clients connecting to
iDRAC.
Dedicated Gigabit Ethernet adapter available on rack
and tower servers (additional hardware may be required).
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\