Dell Drac 5 User Manual
Here you can view all the pages of manual Dell Drac 5 User Manual. The Dell manuals for Server are available online for free. You can easily download all the documents as PDF.
Page 201
Configuring Security Features201 NOTICE: These features severely limit the ability of the local user to configure the DRAC 5 from the local system, including performing a reset to default of the configuration. Dell recommends that you use these features with discretion and should disable only one interface at a time to help avoid losing login privileges altogether. NOTE: See the white paper on Disabling Local Configuration and Remote Virtual KVM in the DRAC on the Dell Support site at...
Page 202
202Configuring Security Features IP address to another device on the network, the resulting conflict may disable the out-of-band connectivity of the DRAC, requiring administrators to reset the firmware to its default settings through a serial connection. Disabling DRAC 5 Remote Virtual KVM Administrators can selectively disable the DRAC 5 remote KVM, providing a flexible, secure mechanism for a local user to work on the system without someone else viewing the user’s actions through console...
Page 203
Configuring Security Features203 Securing DRAC 5 Communications Using SSL and Digital Certificates This subsection provides information about the following data security features that are incorporated in your DRAC 5: Secure Sockets Layer (SSL) Certificate Signing Request (CSR) Accessing the SSL Main Menu Generating a New Certificate Signing Request Uploading a Server Certificate Uploading a Server Certificate Secure Sockets Layer (SSL) The DRAC includes a Web server that is configured to use the...
Page 204
204Configuring Security Features Certificate Signing Request (CSR) A CSR is a digital request to a Certificate Authority (CA) for a secure server certificate. Secure server certificates protect the identity of a remote system and ensure that information exchanged with the remote system cannot be viewed or changed by others. To ensure security for your DRAC, it is strongly recommended that you generate a CSR, submit the CSR to a CA, and upload the certificate returned from the CA. A CA is a business...
Page 205
Configuring Security Features205 Generating a New Certificate Signing Request NOTE: Each new CSR overwrites any previous CSR on the firmware. Before a certificate authority (CA) can accept your CSR, the CSR in the firmware must match the certificate returned from the CA. Otherwise, the DRAC 5 will not upload the certificate. 1In the SSL Main Menu page, select Generate a New Certificate Signing Request (CSR) and click Next. 2In the Generate Certificate Signing Request (CSR) page, type a value for...
Page 206
206Configuring Security Features Table 11-3. Generate Certificate Signing Request (CSR) Page Options Field Description Common NameThe exact name being certified (usually the Web servers domain name, for example, www.xyzcompany.com). Only alphanumeric characters, hyphens, underscores, and periods are valid. Spaces are not valid. Organization NameThe name associated with this organization (for example, XYZ Corporation). Only alphanumeric characters, hyphens, underscores, periods and spaces are valid....
Page 207
Configuring Security Features207 Uploading a Server Certificate 1In the SSL Main Menu page, select Upload Server Certificate and click Next. The Certificate Upload page appears. 2In the File Path field, type the path of the certificate in the Va l u e field or click Browse to navigate to the certificate file. NOTE: The File Path value displays the relative file path of the certificate you are uploading. You must type the absolute file path, which includes the full path and the complete file name...
Page 208
208Configuring Security Features You can change the SSH port with the command: racadm config -g cfgRacTuning -o cfgRacTuneSshPort For more information on cfgSerialSshEnable and cfgRacTuneSshPort properties, see DRAC 5 Property Database Group and Object Definitions. The DRAC 5 SSH implementation supports multiple cryptography schemes, as shown in Table 11-6. NOTE: SSHv1 is not supported. Table 11-6. Cryptography Schemes Scheme Type Scheme Asymmetric Cryptography Diffie-Hellman DSA/DSS 512-1024...
Page 209
Configuring Security Features209 Configuring Services NOTE: To modify these settings, you must have Configure DRAC 5 permission. Additionally, the remote RACADM command-line utility can only be enabled if the user is logged in as root. 1Expand the System tree and click Remote Access. 2Click the Configuration tab and then click Services. 3 Configure the following services as required: Local Configuration (Table 11-7) Web server (Table 11-8) SSH (Table 11-9) Telnet (Table 11-10) Remote RACADM...
Page 210
210Configuring Security Features Table 11-8. Web Server Settings Setting Description EnabledEnables or disables the Web server. Checked=Enabled; Unchecked=Disabled. Max SessionsThe maximum number of simultaneous sessions allowed for this system. Active SessionsThe number of current sessions on the system, less than or equal to the Max Sessions. TimeoutThe time in seconds that a connection is allowed to remain idle. The session is cancelled when the timeout is reached. Changes to the timeout setting...