Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

iDRAC9 Version 5.10.30.00 Release Notes

PDF

Security

  1. iDRAC v5.10.00.00 adds an enhanced security check for accessing iDRAC using a hostname. To access iDRAC using a hostname, ensure that you configure the hostname through the attribute idrac.webserver.ManualDNSEntry ( racadm set idrac.webserver.ManualDNSEntry kos2-204-i.datadomain.com).
  2. Setting Custom Cypher String with TLS version 1.3 is not supported.
  3. Accessing iDRAC through OpenManage Enterprise Modular SSO may fail if iDRAC is configured with a short FQDN. Ensure that you configure iDRAC with full FQDN that includes a Hostname with Domain name.
  4. The drivers that LC exposes are present in a read-only drive that is labeled OEMDRV and the drive is active for 18 hours. During this period:
    1. You cannot update any DUP.
    2. LC cannot involve CSIOR.

    However, if a server AC power cycle or iDRAC reboot is performed, the OEMDRV drive is automatically detached.

  5. CPLD firmware update has no impact on Trusted Platform Module enablement.
  6. Ensure that the SSH client is updated to the latest version. Following SSH configurations are no longer available on iDRAC:

    KEX algorithms:

    1. diffie-hellman-group14-sha1

    MAC:

    1. umac-64
    2. umac-64-etm@openssh.com
  7. In the software inventory, the hash value for iDRAC firmware is displayed as NA instead of hash.
  8. Install SEKM license before you update the iDRAC to SEKM supported version 4.00.00.00 or later. If you install the SEKM license after updating the iDRAC to SEKM supported version, you have to reapply SEKM supported iDRAC firmware.
  9. If you are configuring a Gemalto based KeySecure SEKM Server with iDRAC, and to get the redundancy feature functional, copy the certificates manually from primary Gemalto KeySecure cluster to secondary Gemalto SEKM KeySecure cluster. The redundance feature works after the iDRAC is set up for SSL certificate-based authentication.
  10. When FCP is enabled, 'Default Password Warning' setting is disabled after the default user password is changed.
  11. For enhanced security, keyboard interactive authentication is enabled on the iDRAC SSH Server. SSH clients now require keyboard interactive authentication before logging in a user in to iDRAC.
  12. After upgrading or downgrading the iDRAC firmware, ensure that you review the version of the TLS protocol that is selected in the Web Server Settings page.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\