|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
News | IPMI | Recommended Links | PERC controller | iLO 3 -- HP engineering fiasco |
Configuring Platform Events | Updating the DRAC 5 Firmware | Humor | Etc |
Use one of the following methods to update your DRAC 5 firmware.
Before you update your DRAC 5 firmware using local RACADM or the Dell Update Packages, perform the following procedures. Otherwise, the firmware update operation may encounter a failure.
To update your DRAC 5 firmware, download the latest firmware from the Dell Support website located at support.dell.com and save the file to your local system.
The following software components are included with your DRAC 5 firmware package:
Use the Firmware Update page to update the DRAC 5 firmware to the latest revision. When you run the firmware update, the update retains the current DRAC 5 settings.
See "Accessing the Web-Based Interface".
NOTE: If you are running Firefox, the text cursor does not appear in the Firmware Image field. |
For example:
C:\Updates\V1.0\<image_name>.
The default firmware image name is firmimg.d5.
The update may take several minutes to complete. When completed, a dialog box appears.
After the firmware upgrade, clear the Web browser cache.
See your Web browser's online help for more information.
After you configure the DRAC 5, you can remotely access the managed system using one of the following interfaces:
Table 2-1 describes each DRAC 5 interface.
Table 2-1. DRAC 5 Interfaces
Interface | Description |
---|---|
Web-based interface | Provides remote access to the DRAC 5 using
a graphical user interface. The Web-based interface is built into the DRAC
5 firmware and is accessed through the NIC interface from a supported Web
browser on the management station. For a list of supported Web browsers, see "Supported Web Browsers". |
RACADM | Provides remote access to the DRAC 5 using
a command line interface. RACADM uses the managed system's IP address to
execute RACADM commands (racadm remote capability option [-r]). NOTE: The racadm remote capability is supported only on management stations. For more information, see "Supported Web Browsers". NOTE: When using the racadm remote capability, you must have write permission on the folders where you are using the racadm subcommands involving file operations, for example: racadm getconfig -f <file name> or: racadm sslcertupload -t 1 -f c:\cert\cert.txt subcommands |
Telnet Console | Provides access through the DRAC 5 to the
server RAC port and hardware management interfaces through the DRAC 5 NIC
and provides support for serial and RACADM commands including powerdown,
powerup, powercycle, and hardreset commands. NOTE: Telnet is an unsecure protocol that transmits all data-including passwords-in plain text. When transmitting sensitive information, use the SSH interface. |
SSH Interface | Provides the same capabilities as the telnet console using an encrypted transport layer for higher security. |
IPMI Interface | Provides access through the DRAC 5 to the remote system's basic management features. The interface includes IPMI over LAN, IPMI over Serial, and Serial over LAN. See the Dell OpenManage Baseboard Management Controller User's Guide for more information. |
NOTE: The DRAC 5 default user name is root and the default password is calvin. |
You can access the DRAC 5 Web-based interface through the DRAC 5 NIC by using a supported Web browser, or through Server Administrator or IT Assistant.
See "Supported Web Browsers" for a list of supported Web browsers.
To access the DRAC 5 using a supported Web browser, see "Accessing the Web-Based Interface".
To access the DRAC 5 remote access interface using Server Administrator, launch Server Administrator. From the system tree on the left pane of the Server Administrator home page, click System→ Main System Chassis→ Remote Access Controller. For more information, see your Server Administrator User's Guide.
For information about accessing the DRAC 5 using RACADM, see "Using the RACADM Command Line Interface".
This section provides information about configuring and using the DRAC 5 IPMI interface. The interface includes the following:
The DRAC5 is fully IPMI 2.0 compliant. You can configure the DRAC IPMI using your browser; using an open source utility, such as ipmitool; using the Dell OpenManage IPMI shell, ipmish; or using RACADM.
For more information about using the IPMI Shell, ipmish, see the Dell OpenManage™ BMC User's Guide located on the Dell Support website at support.dell.com.
For more information about using RACADM, see "Using RACADM".
NOTE: This setting determines the IPMI commands that can be executed from the IPMI over LAN interface. For more information, see the IPMI 2.0 specifications. |
Under IPMI LAN Settings, click the Channel Privilege Level Limit drop-down menu, select Administrator, Operator, or User and click Apply Changes.
NOTE: The DRAC 5 IPMI supports the RMCP+ protocol. |
Under IPMI LAN Settings in the Encryption Key field, type the encryption key and click Apply Changes.
NOTE: The encryption key must consist of an even number of hexadecimal characters with a maximum of 40 characters. |
NOTE: To redirect the serial console over LAN, ensure that the SOL baud rate is identical to your managed system's baud rate. |
Click the Channel Privilege Level Limit drop-down menu, select User, Operator, or Administrator.
Under IPMI Serial, click the Connection Mode Setting drop-down menu, select the appropriate mode.
Click the Baud Rate drop-down menu, select the appropriate baud rate, and click Apply Changes.
Click the Channel Privilege Level Limit drop-down menu, select Administrator, Operator, or User.
If IPMI serial is in terminal mode, you can configure the following additional settings:
For more information about these properties, see the IPMI 2.0 specification.
Open a command prompt, type the following command, and press <Enter>:
racadm config -g cfgIpmiLan -o cfgIpmiLanEnable 1
NOTE: This setting determines the IPMI commands that can be executed from the IPMI over LAN interface. For more information, see the IPMI 2.0 specifications. |
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgIpmiLan -o cfgIpmiLanPrivilegeLimit <level>
where <level> is one of the following:
For example, to set the IPMI LAN channel privilege to 2 (User), type the following command:
racadm config -g cfgIpmiLan -o cfgIpmiLanPrivilegeLimit 2
NOTE: The DRAC 5 IPMI supports the RMCP+ protocol. See the IPMI 2.0 specifications for more information. |
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgIpmiLan -o cfgIpmiEncryptionKey <key>
where <key> is a 20-character encryption key in a valid hexadecimal format.
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgIpmiSol -o cfgIpmiSolEnable 1
The IPMI SOL minimum privilege level determines the minimum privilege required to activate IPMI SOL. For more information, see the IPMI 2.0 specification.
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgIpmiSol -o cfgIpmiSolMinPrivilege <level>
where <level> is one of the following:
For example, to configure the IPMI privileges to 2 (User), type the following command:
racadm config -g cfgIpmiSol -o cfgIpmiSolMinPrivilege 2
NOTE: To redirect the serial console over LAN, ensure that the SOL baud rate is identical to your managed system's baud rate. |
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgIpmiSol -o cfgIpmiSolBaudRate <baud_rate>
where <baud_rate> is 9600, 19200, 57600, or 115200 bps.
For example:
racadm config -g cfgIpmiSol -o cfgIpmiSolBaudRate 57600
NOTE: SOL can be enabled or disabled for each individual user. |
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgUserAdmin -o cfgUserAdminSolEnable -i <id> 2
where <id> is the user's unique ID.
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgSerial -o cfgSerialConsoleEnable 0
Open a command prompt, type the following command, and press <Enter>:
racadm config -g cfgIpmiSerial -o cfgIpmiSerialBaudRate <baud_rate>
where <baud_rate> is 9600, 19200, 57600, or 115200 bps.
For example:
racadm config -g cfgIpmiSerial -o cfgIpmiSerialBaudRate 57600
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgIpmiSerial -o cfgIpmiSerialFlowControl 1
At the command prompt, type the following command and press <Enter>:
racadm config -g cfgIpmiSerial -o cfgIpmiSerialChanPrivLimit <level>
where <level> is one of the following:
For example, to set the IPMI serial channel privileges to 2 (User), type the following command:
racadm config -g cfgIpmiSerial -o cfgIpmiSerialChanPrivLimit 2
The IPMI configuration is complete.
If IPMI serial is in terminal mode, you can configure the following additional settings using racadm config cfgIpmiSerial commands:
For more information about these properties, see the IPMI 2.0 specification.
|
||||
Bulletin | Latest | Past week | Past month |
|
Dell Remote Access Controller - DRAC 5, v.1.51, A00 Release Date: 12/31/2009 |
|
|
|
|
|
|
||||
Bulletin | Latest | Past week | Past month |
|
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March 12, 2019