Installation Manual
• Set email alerts, IPMI alerts, remote system logs, WS eventing logs, and SNMP traps (v1 and v2c) for events and
improved email alert notification.
• Capture last system crash image.
• View boot and crash capture videos.
Secure Connectivity
Securing access to critical network resources is a priority. iDRAC7 implements a range of security features that
includes:
• Custom signing certificate for Secure Socket Layer (SSL) certificate.
• Signed firmware updates.
• User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP)
Directory Service, or locally administered user IDs and passwords.
• Two-factor authentication using the Smart–Card logon feature. The two-factor authentication is based on the
physical smart card and the smart card PIN.
• Single Sign-on and Public Key Authentication.
• Role-based authorization, to configure specific privileges for each user.
• SNMPv3 authentication for user accounts stored locally in the iDRAC. It is recommended to use this, but it is
disabled by default.
• User ID and password configuration.
• Default login password modification.
• SMCLP and Web interfaces that support 128-bit and 40-bit encryption (for countries where 128 bit is not acceptable),
using the SSL 3.0 standard.
• Session time-out configuration (in seconds).
• Configurable IP ports (for HTTP, HTTPS, SSH, Telnet, Virtual Console, and Virtual Media).
NOTE: Telnet does not support SSL encryption and is disabled by default.
• Secure Shell (SSH) that uses an encrypted transport layer for higher security.
• Login failure limits per IP address, with login blocking from that IP address when the limit is exceeded.
• Limited IP address range for clients connecting to iDRAC7.
• Dedicated Gigabit Ethernet adapter on rack or tower servers with Enterprise license.
New In This Release
The following are the new features in this release:
• Automatically configure components in a server or multiple servers using DHCP provisioning and XML configuration
files that iDRAC accesses from a network share.
• Schedule automatic server firmware updates that iDRAC accesses from a network share or FTP site.
• Manually update firmware using a firmware image file stored on a local system or on a network share, by
connecting to an FTP site, or a network repository that contains a catalog of available updates.
• Rollback firmware for all devices supported by Lifecycle Controller.
• Configure and schedule server configuration backups.
• Enable or disable HTTPs redirection.
• Configure VNC Server to view remote desktop using mobile devices.
• Configure LOM or USB NIC as the OS to iDRAC Pass-through channel.
• Enable or disable I/O Optimization.
• Enable events to be logged into Operating System (OS) log.
17