DRAC is the Dell Remote Access Card. The following details provide guidance on enabling the Appliance DRAC, network configuration , root password, and basic User
This guidance is provided WITHOUT support from RSA. Support of DRAC is under consideration for future release but has been known to work.
Run the following commands from
/usr/sbin
Set DRAC network configuration
./racadm setniccfg ?s <IP_address> <subnet_mask> <gateway>
Example
./racadm setniccfg ?s 10.100.88.48 255.255.255.0 10.100.88.1
Change DRAC root password
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPassword ?i 2 <new_password>
Example
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPassword ?i 2 123abc
Add DRAC user
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i <index> <username>
./racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i <index> <password>
./racadm config ?g cfgUserAdmin ?o cfgUserAdminEnable 1 ?i <index>
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPrivilege <privilege_bit_mask>
Example, where <index> is a number from 1-16. Index 2 is used by the root user.
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 3 johnadmin
./racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 3 123456
./racadm config ?g cfgUserAdmin ?o cfgUserAdminEnable 1 ?i 3
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPrivilege 0x000001FF ?I 3
Locating the proper user index
To find out if a user exists, enter the following command at the command prompt, once for each index of 1?16.
./racadm getconfig -g cfgUserAdmin -i <index>
The two objects of interest are:
# cfgUserAdminIndex=XX
cfgUserAdminUserName=
If the cfgUserAdminUserName object has no value, that index number, which is indicated by the cfgUserAdminIndex object, is available for use. If a name appears after the "=", that index is taken by that user name
Deleting DRAC user
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i <index> ""
Example
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 3 ""
The user privilege bit mask is made is up the privileges which are assigned to the user, as detailed in the table below:
|
User Privilege |
Privilege Bit Mask |
|
Log In To DRAC 5 |
0x0000001 |
|
Configure DRAC 5 |
0x0000002 |
|
Configure Users |
0x0000004 |
|
Clear Logs |
0x0000008 |
|
Execute Server Control Commands |
0x0000010 |
|
Access Console Redirection |
0x0000020 |
|
Access Virtual Media |
0x0000040 |
|
Test Alerts |
0x0000080 |
|
Execute Debug Commands |
0x0000100 |
Privilege bit masks should be added to allow multiple user privileges.
The writing of this knowledge database article does not imply support for configuring or use of the DRAC in conjunction with the RSA SecurID Appliance 3.0. Dell has information on the DRAC at: http://support.dell.com/support/edocs/software/smdrac3/
DRAC uses TCP port 5900 so open that in any Firewall between the Appliance and your PC
The iDRAC 6 used on the newer Appliance 250 with Poweredge 710 hardware, Username: root Password: calvin
Related Articles
How to Configure Two Network Interface Cards for RSA Authentication Manager 8.x 299Number of Views How to configure SNMP for RSA Authentication Manager 8.x 1.21KNumber of Views Supporting operating system versions on RSA SecurID Authentication Agent 8.1 for PAM 83Number of Views How to configure AES ciphers for the RSA Authentication Manager 8.1 Security Console 664Number of Views How to configure additional authentication for the RSA SecurID Access Cloud Administration Console 120Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor… RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Release Notes for RSA Authentication Manager 8.8