DRAC is the Dell Remote Access Card. The following details provide guidance on enabling the Appliance DRAC, network configuration , root password, and basic User
This guidance is provided WITHOUT support from RSA. Support of DRAC is under consideration for future release but has been known to work.
Run the following commands from
/usr/sbin
Set DRAC network configuration
./racadm setniccfg ?s <IP_address> <subnet_mask> <gateway>
Example
./racadm setniccfg ?s 10.100.88.48 255.255.255.0 10.100.88.1
Change DRAC root password
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPassword ?i 2 <new_password>
Example
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPassword ?i 2 123abc
Add DRAC user
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i <index> <username>
./racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i <index> <password>
./racadm config ?g cfgUserAdmin ?o cfgUserAdminEnable 1 ?i <index>
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPrivilege <privilege_bit_mask>
Example, where <index> is a number from 1-16. Index 2 is used by the root user.
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 3 johnadmin
./racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 3 123456
./racadm config ?g cfgUserAdmin ?o cfgUserAdminEnable 1 ?i 3
./racadm config ?g cfgUserAdmin ?o cfgUserAdminPrivilege 0x000001FF ?I 3
Locating the proper user index
To find out if a user exists, enter the following command at the command prompt, once for each index of 1?16.
./racadm getconfig -g cfgUserAdmin -i <index>
The two objects of interest are:
# cfgUserAdminIndex=XX
cfgUserAdminUserName=
If the cfgUserAdminUserName object has no value, that index number, which is indicated by the cfgUserAdminIndex object, is available for use. If a name appears after the "=", that index is taken by that user name
Deleting DRAC user
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i <index> ""
Example
./racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 3 ""
The user privilege bit mask is made is up the privileges which are assigned to the user, as detailed in the table below:
|
User Privilege |
Privilege Bit Mask |
|
Log In To DRAC 5 |
0x0000001 |
|
Configure DRAC 5 |
0x0000002 |
|
Configure Users |
0x0000004 |
|
Clear Logs |
0x0000008 |
|
Execute Server Control Commands |
0x0000010 |
|
Access Console Redirection |
0x0000020 |
|
Access Virtual Media |
0x0000040 |
|
Test Alerts |
0x0000080 |
|
Execute Debug Commands |
0x0000100 |
Privilege bit masks should be added to allow multiple user privileges.
The writing of this knowledge database article does not imply support for configuring or use of the DRAC in conjunction with the RSA SecurID Appliance 3.0. Dell has information on the DRAC at: http://support.dell.com/support/edocs/software/smdrac3/
DRAC uses TCP port 5900 so open that in any Firewall between the Appliance and your PC
The iDRAC 6 used on the newer Appliance 250 with Poweredge 710 hardware, Username: root Password: calvin
Related Articles
How to configure SNMP for RSA Authentication Manager 8.x 1.21KNumber of Views How to Configure Two Network Interface Cards for RSA Authentication Manager 8.x 299Number of Views RSA Identify Governance and Lifecycle WorkDay Identity Collector "unexpected element " error 31Number of Views Cloud Access Service - Logging 28Number of Views How to Configure HP OpenView to Accept SNMP Traps 33Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x