Dell Remote Access Controller Installation and Setup Guide
The Dell Remote Access Card III (DRAC III), DRAC III/XT, Dell Embedded Remote Access (ERA), and the Dell Embedded Remote Access Option (ERA/O) are systems management hardware and software solutions designed to provide remote management capabilities for Dell PowerEdge systems. Collectively, these solutions are known as remote access controllers (RACs). RACs allow you to remotely manage and monitor your system even when the system is down.
NOTE: Throughout the remainder of this document, the DRAC III, DRAC III/XT, ERA, and ERA/O controllers are referred to collectively as "RACs", except when it is necessary to distinguish between each controller. When information applies only to a specific RAC, it is identified explicitly. Information that refers to "RAC" applies to all of the controllers. |
Your RAC provides a complete hardware and software solution for remote systems management. The RAC allows you to remotely access an inoperable system to get the system up and running as quickly as possible. The RAC can alert you when the system is down, and allows you to restart the system remotely. By communicating with the system's ESM, the RAC reports warnings or errors related to voltages, temperatures, and fan speeds. In addition, the RAC can log the probable cause of a system crash and save the most recent crash screen.
NOTE: Throughout the remainder of this document, the system in which the RAC is installed or embedded is referred to as the managed system. A system that remotely accesses the RAC is referred to as a management station. The term system console refers to a system's keyboard, mouse, and monitor. |
The following is a list of features available on all RACs. However, some RACs (such as the DRAC III), provide additional features. For a list of features that are specific to your RAC, see the features list in each individual RAC section.
Using Dell OpenManage Server Administrator, you can access the RAC through the managed system's standard network connection and configure the RAC properties, such as RAC users and alerting options.
If the managed system goes down or becomes otherwise unresponsive and you want to perform crash-recovery actions, or if you just want to check the status of sensor monitors when the system is running, you can launch the RAC's browser-based remote access interface.
RACs currently support the following operating systems:
NOTE: If NetWare is running on the managed system, console redirection supports text- only mode. |
NOTE: MS-DOS® version 6.22 supports the RAC Remote Floppy Boot feature (32-bit systems only). |
NOTE: When using Internet Explorer or Netscape Navigator on systems running Microsoft Windows, to view localized versions of the RAC's Web-based remote access interface, open the Windows Control Panel, double-click the Regional Options icon, and select the desired locale from the Your locale (location) drop-down menu. |
RACs provide software components that include a set of services for each supported operating system. The services interface with RAC hardware to allow RAC configuration and access to the managed system.
Table 1-1 summarizes the RAC software components.
Table 1-1. RAC Software Components
Software Component |
Description |
---|---|
To configure the RAC to remotely access and manage a system, you can use one of several configuration interfaces provided with your RAC software. Table 1-2 describes these configuration interfaces. For an overview of RAC software configuration, see the section of this document that applies to your RAC.
NOTE: It is recommended that you use Server Administrator to configure your RAC. |
Table 1-2. RAC Configuration Interfaces
Interface |
Description |
---|---|
Three types of remote access connections are supported by RACs. Table 1-3 lists the features of each type of connection.
Table 1-3. Supported Remote Access Connections
Connection |
Features |
---|---|
After you configure the RAC, you can remotely access the managed system using one of three remote access interfaces. Remote access is particularly important when the managed system is down and cannot be accessed through the system's NIC. The RAC NIC acts as a remote access port for all RACs. Additionally, DRAC III also provides remote access through its own serial port and optional modem. Table 1-4 describes the RAC's remote access interfaces.
Table 1-4. Remote Access Interfaces
Interface |
Description |
---|---|
Enables you to remotely access the managed system through the RAC's NIC (or the DRAC III optional modem). For a list of supported Web Browsers, see "Supported Web Browsers". | |
NOTE: The racadm remote capability is supported only on Windows Server 2003, Windows 2000 Server, and Red Hat Linux operating systems. | |
Table 1-5 identifies the ports used by RACs. This information is required when opening firewalls for remote access to a RAC.
RAC Port Number |
Used For |
---|---|
Remote floppy boot image. The port is closed when the transfer of the image is complete. |
An important feature of the RAC is its ability to notify you when the managed system has potential problems (for example: problems with voltage, temperature, or cooling fans). To do this, the RAC sends an alert using one or more of its remote access port connections. RAC firmware constantly monitors the IPMI hardware log to determine when to generate an event. Table 1-6 lists the RACs and the types of alerts supported on each.
NOTE: E-mail alerts are sent to a specified e-mail address on an SMTP server. SNMP traps are sent to a specified IP address. Numeric and alphanumeric pages are alerts sent to a specified user. |
NOTE: For information about configuring SNMP, see the Server Administrator User's
Guide. Table 1-6. Supported Event Alerts
|
Because RAC firmware has an embedded Web server, you can connect to the RAC from a management station without installing any software on the management station (other than a supported Web browser).
After receiving an alert, you can view the event log to get more information on the type and severity of the event. The Web browser connects to the RAC using the 10- or 100-Mbps Ethernet NIC (10 Mbps for ERA/O on the PowerEdge 1650) on a LAN/WAN or the optional DRAC III modem, both of which are located on the RAC.
If a system crashes, you can configure the system to enable the RAC to capture the system console screen to assist you in analyzing the cause of the failure. To get the system up and running again, you can perform a remote reset or power cycle and view the boot process through the RAC Web-based (remote access) interface.
You can configure the RAC to notify different users of different events. When the RAC detects a new event, the firmware tests the event against each user's event filter and sends an alert to the appropriate users.
You can also configure RAC firmware to identify which events should generate SNMP traps. After it is configured, the RAC sends the SNMP traps through the LAN to the IP address specified in the RAC configuration files. DRAC III can also send the trap through dial-up networking. The telephone number, user name, password, and IP address where the dial-out trap is sent are specified in the RAC configuration files.
The following sections describe the security features available on all RACs. For a list of security features that are specific to your RAC, see the section of this document that pertains to your RAC.
RACs support encrypted password authentication for TCP/IP NIC connections.
The RAC Web-based remote access interface content is proprietary and does not provide direct access to the managed system's operating system. Typically, remote access to the RAC is used when an administrator is not logged locally into the managed system. If an administrator logs in locally, operating system access is protected by standard operating-system security measures.
When a remote user accesses the RAC and performs a console redirection, a pop-up notification box appears on the managed system's console stating that remote console redirection is occurring.
NOTE: If you are performing console redirection from a remote location and you do not want anyone to interfere with the managed system at its location, you can remotely disable the managed system's keyboard and mouse. This feature is supported only on managed systems running Windows Server 2003 or Windows 2000 Server. |
The RAC's Web-based remote access interface requires a valid login. When establishing a remote connection to the RAC, the user enters a user name and password at the remote console. The password is then encrypted and sent to the RAC. The RAC receives the user name and encrypted password and begins authentication. The password saved by the RAC for this user name is also encrypted. It is then compared with the encrypted password received from the remote user. If a match occurs, the user is validated and access to the RAC is granted. No other commands are recognized until validation occurs (except for online help). All information (except console redirection screens) is transmitted using SSL encryption.
RAC user types include RAC users as well as operating-system users. DRAC III also provides two additional user/entry types (see "DRAC III User Types and Feature Configuration").
RAC users can establish console redirection and perform configuration and management actions on all RACs.
NOTE: The RAC Web-based interface does not accept a user name without a password. When you create a RAC user, you must assign a valid user name and password. |
NOTE: DRAC III provides additional user types and events. For more information, see "DRAC III User Types and Feature Configuration." |
In addition to RAC users, which are defined and stored as part of the RAC internal configuration, RACs also recognize operating system users. These users are not stored in the internal RAC databasethey are stored by the operating system running on the managed system. Operating system users can perform all the functions of a RAC user with the exception of receiving event notification e-mails.
This added functionality allows a user to access any RAC by using their operating system's user name and password, provided that:
This authentication method (operating system authentication versus RAC-user authentication) operates independently of the operating system's user authentication configuration. The operating system is generally set up to attempt a connection to a domain controller to acquire the latest information about user names, passwords, and access rights before it queries the local operating system database. This connection is transparent to a RAC.
In addition to this Installation and Setup Guide, the following documents provide additional information about the setup and operation of the RAC in your system:
The following system documents are also available to provide more information about the system in which your RAC is installed:
The System Information Guide provides important safety and regulatory information. Warranty information may be included within this document or as a separate document. |
NOTE: Always read the updates first because they often supersede information in other documents. |
Release notes or readme files may be included to provide last-minute updates to the system or documentation or advanced technical reference material intended for experienced users or technicians.