Deactivating Mac Addresses; Launching Idrac Using Single Sign-On - Dell EMC PowerEdge VRTX User Manual

Chassis management controller
Table of Contents

Advertisement

NOTE: You cannot remove MAC addresses if they are active on the node or are assigned to a profile.
To remove MAC addresses from the network share:
1.
Go to the Server Profiles page. In the Boot Identity Profiles → Manage Virtual MAC Address Pool section, click Remove
MAC Addresses.
2.
Enter the starting MAC address of the MAC address pool in the Starting MAC Address field.
3.
Enter the count of the MAC addresses that you want to remove, in the Number of MAC Addresses field.
4.
Click OK to remove MAC addresses.

Deactivating MAC Addresses

You can deactivate MAC addresses that are active by using the Deactivate MAC Address(es) option in the CMC web interface.
NOTE: Use the Deactivate MAC Address(es) option only if the server is not responding to the Clear Identity action or the
MAC address is not used in any server.
To remove MAC addresses from the network share:
1.
Go to the Server Profiles page. In the Boot Identity Profiles → Manage Virtual MAC Address Pool section, select the active
MAC address(es) that you want to deactivate.
2.
Click Deactivate MAC Address(es).

Launching iDRAC using Single Sign-On

CMC provides limited management of individual chassis components, such as servers. For complete management of these individual
components, CMC provides a launch point for the server's management controller (iDRAC) web-based interface.
A user may be able to launch iDRAC web interface without having to log in a second time, as this feature utilizes single sign-on.
Single sign-on policies are:
A CMC user who has server administrative privilege, is automatically logged in to iDRAC using single sign-on. Once on the iDRAC
site, this user is automatically granted Administrator privileges. This is true even if the same user does not have an account on
iDRAC, or if the account does not have the Administrator's privileges.
A CMC user who does NOT have the server administrative privilege, but has the same account on iDRAC is automatically logged
in to iDRAC using single sign-on. Once on the iDRAC site, this user is granted the privileges that were created for the iDRAC
account.
A CMC user who does not have the server administrative privilege, or the same account on the iDRAC, is not automatically
logged in to iDRAC using single sign-on. This user is directed to the iDRAC login page when the Launch iDRAC GUI is clicked.
NOTE: The term "the same account" in this context means that the user has the same login name with a matching
password for CMC and for iDRAC. The user who has the same login name without a matching password, is considered to
have the same account.
NOTE: Users may be prompted to log in to iDRAC (see the third Single Sign-on policy bullet above).
NOTE: If the iDRAC network LAN is disabled (LAN Enabled = No), single sign-on is not available.
If you click Launch iDRAC GUI, an error page may be displayed, if:
the server is removed from the chassis
the iDRAC IP address is changed
the iDRAC network connection experiences a problem.
In MCM, while launching the iDRAC web interface from a member chassis, the user credentials of the leader and member chassis
must be the same. Else, the current member chassis session is aborted and the member chassis login page is displayed.
106

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents