DRAC is the Dell Remote Access Card. The following details provide guidance on enabling the Appliance DRAC, network configuration , root password, and basic User
This guidance is provided WITHOUT support from RSA. Support of DRAC is under consideration for future release but has been known to work.
Run the following commands from
/usr/sbin
Set DRAC network configuration
./racadm setniccfg ?s <IP_address> <subnet_mask> <gateway>
Example
./racadm setniccfg ?s 10.100.88.48 255.255.255.0 10.100.88.1
Change DRAC root password
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPassword ?i 2 <new_password>
Example
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPassword ?i 2 123abc
Add DRAC user
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i <index> <username>
./racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i <index> <password>
./racadm config ?g cfgUserAdmin ?o cfgUserAdminEnable 1 ?i <index>
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPrivilege <privilege_bit_mask>
Example, where <index> is a number from 1-16. Index 2 is used by the root user.
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 3 johnadmin
./racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 3 123456
./racadm config ?g cfgUserAdmin ?o cfgUserAdminEnable 1 ?i 3
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPrivilege 0x000001FF ?I 3
Locating the proper user index
To find out if a user exists, enter the following command at the command prompt, once for each index of 1?16.
./racadm getconfig -g cfgUserAdmin -i <index>
The two objects of interest are:
# cfgUserAdminIndex=XX
cfgUserAdminUserName=
If the cfgUserAdminUserName object has no value, that index number, which is indicated by the cfgUserAdminIndex object, is available for use. If a name appears after the "=", that index is taken by that user name
Deleting DRAC user
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i <index> ""
Example
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 3 ""
The user privilege bit mask is made is up the privileges which are assigned to the user, as detailed in the table below:
|
User Privilege |
Privilege Bit Mask |
|
Log In To DRAC 5 |
0x0000001 |
|
Configure DRAC 5 |
0x0000002 |
|
Configure Users |
0x0000004 |
|
Clear Logs |
0x0000008 |
|
Execute Server Control Commands |
0x0000010 |
|
Access Console Redirection |
0x0000020 |
|
Access Virtual Media |
0x0000040 |
|
Test Alerts |
0x0000080 |
|
Execute Debug Commands |
0x0000100 |
Privilege bit masks should be added to allow multiple user privileges.
The writing of this knowledge database article does not imply support for configuring or use of the DRAC in conjunction with the RSA SecurID Appliance 3.0. Dell has information on the DRAC at: http://support.dell.com/support/edocs/software/smdrac3/
DRAC uses TCP port 5900 so open that in any Firewall between the Appliance and your PC
The iDRAC 6 used on the newer Appliance 250 with Poweredge 710 hardware, Username: root Password: calvin
Related Articles
RSA SecurID Appliance hangs when booting on NTP service for RSA Authentication Manager 8.1 338Number of Views How to backup and restore an RSA SecurID Appliance 3.0 using PING 2.36KNumber of Views You uploaded an invalid file error during Quick Setup of the RSA SecurID Appliance 8.x 323Number of Views How to configure the Intel Remote Management Module 4 (RMM) and the Baseboard Management Controller (BMC) for the RSA Auth… 1.57KNumber of Views How to Configure Two Network Interface Cards for RSA Authentication Manager 8.x 300Number of Views
Trending Articles
RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide User Event Monitor Messages for Cloud Access Service (1501 - 20406) How to test RSA Identity Router (IDR) Secure Connector connectivity to the RSA ID Plus Cloud Access Service RSA Release Notes for RSA Authentication Manager 8.8 Troubleshooting RSA MFA Agent for Microsoft Windows