forbidden.
THIS DOCUMENT IS FOR INFORMATIONAL PURPOSES ONLY. THE CONTENT IS
PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND.
Dell, the Dell Logo, and OpenMana ge are trademarks of Dell Inc. Other trademarks a nd trade
names may be used in this document to refer to either the entities claiming the m arks and names
or their products. Dell disclaims proprietary interest in the marks a nd names of othe rs.
AUTHENTICATION AND AUTHORIZATION.......................................................................................................................................................7
L
OG IN VIA LOCAL ACCOUNT
RAC Login User Privilege..............................................................................................................................................................................8
RAC User Configuration Privilege.................................................................................................................................................................8
RAC Server Reset and Power-on/off Privilege............................................................................................................................................8
RAC Virtual Media Privilege..........................................................................................................................................................................8
RAC Test Alert Privilege................................................................................................................................................................................8
ACCESS TO DRAC 5...........................................................................................................................................................................................15
D
ISABLING SERVICES AND CHANGING THE SERVICE PORT NUMBER
S
ECURITY POLICY
IP Blocking....................................................................................................................................................................................................17
SHARED NIC SECURITY....................................................................................................................................................................................19
Authentication and Encryption.....................................................................................................................................................................22
User Session Privacy...................................................................................................................................................................................23
Today, managing distributed servers from a remote location i s a critical require ment.
DRAC 5 enables users to remotely monitor, tro ubleshoot , and repair se rvers even when th e server
is down. DRAC 5 offers a rich set of features like virtual medi a, virtual KVM, and so on, which have
the potential to make the system prone to security risks. DRAC 5 security features mit igate the
security risks that exist while data is being tra nsmitted across the network. Thi s white pape r briefly
describes the security features that DRA C 5 uses to hel p ensure aut henticati on, authorization,
privacy, and data integrity.
PAGE 6 OF 24
Authentication and Authorization
Log in via Local Account
The DRAC 5 ships with a default local user accou nt that is pre-co nfigured with an admin istrator
role. This default user name is “root” and the password i s “calvin” for this user.
Dell strongly recommends changing thi s default setti ng during deployment of the DRAC 5.
DRAC 5 supports up to 16 local users. Each user can be enabled or disabled. You can secure the
DRAC 5 by disabling all local user accounts and using only Micro soft
®
Active Directory® users since
Active Directory is considered to have stronger secure policy management.
Local users’ user names and passwords can be changed. DRAC 5 local users’ account policy is as
follows:
Anonymous user is NOT supported
NULL user name is NOT supported
NULL password is NOT supported
Maximum user name length is 16 characters
Maximum user password length is 20 characters
DRAC 5 local user account information is stored on NVRAM and is encrypted via a proprietary
algorithm.
DRAC 5 supports privilege-based access to a DRAC. Every local user or Active Directory user has
a privilege set associated with it. The privilege is per channel per user. The privilege set decides
what kind of rights a user has on the DRAC 5 on each of the access channe ls.
There are three types of access channels on DRAC 5:
IPMI LAN channel
IPMI Serial channel
RAC channel – including RA C web GUI, RAC serial/t elnet /SSH console , RACADM CLI , RAC
SM-CLP, RAC virtual media, RAC cons ole redire ction
IPMI LAN and IPMI serial channel privilege are defined in the IPMI 2.0 specification. (See IPMI
Out-of-band Access Security
for further information.)
PAGE 7 OF 24
The DRAC 5 RAC channel has nine privil eges. Each user ca n have any combi nation of the nine
privileges. The nine privileges are as follows:
RAC Login User Privilege
This privilege allows a user to log in to the DRAC 5 card. An ad ministrat or can easily disa ble a user
from a DRAC 5 by removing this privilege. Removing th e login privilege from a user is not the
same as deleting a user. The user will remain in the user database but will not be able to log in
and use this DRAC 5 card. An administrat or can quickly re-en able this user by g ranting the login
privilege without having to totally reconfigure this user.
RAC Card Configuration Privilege
This privilege allows a user to change all DRAC 5 card configurations except fo r the user
configuration, for example, out-of-band NIC confi guration, SNMP trap configuration, SSL certificate
configuration, and so on.
RAC User Configuration Privilege
This privilege allows a user to add or delete a user or chang e existing user privile ges.
RAC Log Clear Privilege
This privilege allows a user to clear the System Event Log (SEL), RA C log, or last crash scree n
log.
RAC Server Reset and Power-on/off Privilege
This privilege allows a user to do any power manageme nt operation (like reset or power-on/off a
system).
RAC Console Redirection Privilege
This privilege allows a user to use the console redirection feat ure.
RAC Virtual Media Privilege
This privilege allows a user to use the virtual media feature.
RAC Test Alert Privilege
This privilege allows a user to submit a request to DRAC 5 to test an S NMP trap alert to a pre configured destination.
RAC Debug Command Privilege
This privilege allows a user to issue any debug command. Most of debug command s are used to
help debug or diagnose a DRAC 5.
Dell strongly recommends assig ning this pri vilege only to adm inistrators or service per sonnel
required to help debug or diagnose the DRAC 5.
Log in via Active Directory With Dell Schema Ext ension
A directory service maintains a common database of all i nformation needed f or controlling users,
computers, printers and so forth on a network. If your compa ny uses the Active Dire ctory service
software, you can configure the softwa re to provide access to t he DRAC 5 allowi ng you to add and
control DRAC 5 user privileges to existing users in the Active Directory software.
PAGE 8 OF 24
Loading...
+ 16 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.