Dell IDRAC6 Laptop User Manual


 
348 Configuring Security Features
IP address to another device on the network, the resulting conflict may
disable the out-of-band connectivity of the DRAC, requiring administrators
to reset the firmware to its default settings through a serial connection.
Disabling iDRAC6 Virtual Console
Administrators can selectively disable the iDRAC6 remote Virtual Console,
providing a flexible, secure mechanism for a local user to work on the system
without someone else viewing the user’s actions through Virtual Console.
Using this feature requires installing the iDRAC managed node software
on the server. Administrators can disable Virtual Console using the
following command:
racadm LocalConRedirDisable 1
The command LocalConRedirDisable disables existing Virtual Console
session windows when executed with the argument 1
To help prevent a remote user from overriding the local user's settings,
this command is available only to local RACADM. Administrators can use
this command in operating systems that support RACADM, including
Microsoft Windows Server 2003 and SUSE Linux Enterprise Server 10.
Because this command persists across system reboots, administrators must
specifically reverse it to re-enable Virtual Console. They can do so by using
the argument 0:
racadm LocalConRedirDisable 0
Several situations might call for disabling iDRAC6 Virtual Console. For
example, administrators may not want a remote iDRAC6 user to view the
BIOS settings that they configure on a system, in which case they can disable
Virtual Console during the system POST by using the
LocalConRedirDisable command. They may also want to increase
security by automatically disabling Virtual Console every time an
administrator logs in to the system, which they can do by executing the
LocalConRedirDisable command from the user logon scripts.
NOTE: See the white paper on
Disabling Local Configuration and Remote Virtual
KVM in the DRAC
on the Dell Support site at support.dell.com for more information.
For more information on logon scripts, see
technet2.microsoft.com/windowsserver/en/library/31340f46-b3e5-4371-
bbb9-6a73e4c63b621033.mspx.