Appendix C: IPMI
Best Practices after IPMI is Configured
DSM Installation and Configuration Guide
Copyright 2009 - 2020 Thales Group. All rights reserved.
156
The following options are available for Server Health:
l
Sensor Readings
: View sensor information
l
Event Log
: Access event logs. Choose a category from the pull-down menu to filter the events; sort them by
clicking on a column header.
l
Power Consumption
: Displays Power consumption information, including maximum, minimum and average
power consumption in last hour, day and week.
l
Storage Monitoring
: Displays physical and logical storage.
Best Practices after IPMI is Configured
This section describes the best practices after IPMI is configured. Many of these best practices involve changing the
IPMI configuration. These can be changed through both the IPMI management console, or through the DSM CLI (see
"DSM IPMI CLI Commands" on page 161
).
l
"Replace the default certificate with a Web Server Certificate" below
l
"Change the port through which you access IPMI" on the next page
l
"Change the IPMI password" on page 158
l
"Creating IPMI users" on page 158
l
"Restrict inbound traffic to IPMI through IP Access control" on page 160
l
"Reset Default Configuration Settings " on page 160
Replace the default certificate with a Web Server Certificate
Replace the default IPMI certificate to make your system more secure. To replace the certificate you need to upload
an RSA2048 private key and the associated SHA256 certificate using the IPMI GUI.
1. Create a CSR and a 2048-bit RSA private key for the IPMI certificate using Openssl. Type:
openssl req -new -newkey rsa:2048 -nodes -out <hostName>.<domain>.com_rsa.csr -keyout
<hostName>_rsa_2048.key -subj
"/C=<country>/ST=<state>/L=<locality>/O=<organization>/OU=<organization_
unit>/CN=<FQDN>/emailAddress=<email_address>":
openssl req -new -newkey rsa:2048 -nodes -out sys99999.sys5backup.com_rsa.csr -keyout
sys99999.sys5backup.com_rsa_2048.key -subj "/C=US/ST=California/L=San Jose/O=Thales E-
Security, Inc./OU=ThalesQA/CN=sys99999.sys5backup.com/
2. Get the CSR signed by a 3rd party with SHA-256 signature algorithm The following example is from CACert.org: