Support Center > Search Results > SecureKnowledge Details
iDRAC Troubleshooting Technical Level
Solution

This table provides some verification tests and troubleshooting for iDRAC/LOM.

Table key:

  • Test - The verification test to do.
  • Command - The command to run for the test.
  • Expected Output - The expected output/behavior in a normal system.
  • Next Step - What to do in case of a result other than the expected output/behavior.
Test Items Description
Make sure that the admin user password generated Command N/A
Expected Output N/A
Next Step cpidrac --generate_admin_password
Note: The admin user is for system use only because of the non-operator User Role.
Check the default status of the iDRAC NIC (enabled or disabled) Command cpidrac --get_external_nic_state
Expected Output
External NIC status:enabled
Next Step cpidrac --set_external_nic_state=enable
Check that the eth-idrc0 interface is up and running in the ifconfig output and has the correct ip and mask Command ifconfig eth-idrc0
Expected Output
eth-idrc0   Link encap:Ethernet  HWaddr 6C:2B:59:7C:A4:12
inet addr:169.254.0.2  Bcast:169.254.0.255  Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
Next Step Run these commands:
ifconfig eth-idrc0 169.254.0.2 netmask 255.255.255.0
ifup eth-idrc0
Check bindings of the iDRAC interface Command cat /config/active | grep -i idrc
Expected Output
interface:eth-idrc0 t
interface:eth-idrc0:ipaddr:169.254.0.2:mask 24
interface:eth-idrc0:state on
Next Step Run these commands:
dbset interface:eth-idrc0:ipaddr:169.254.0.2:mask 24
dbset interface:eth-idrc0:state on
dbset :save
Check ping to the internal iDRAC address Command ping 169.254.0.1
Expected Output
PING 169.254.0.1 (169.254.0.1) 56(84) bytes of data.
64 bytes from 169.254.0.1: icmp_seq=1 ttl=64 time=0.214 ms
64 bytes from 169.254.0.1: icmp_seq=2 ttl=64 time=0.167 ms
Next Step Run these commands:
dbset interface:eth-idrc0:ipaddr:169.254.0.2:mask 24
dbset interface:eth-idrc0:state on
dbset :save
Make sure that "169.254.0.0/24" is allowed to access your machine Command clish -c "show allowed-client all"
Expected Output
Host           169.254.0.2
OR
Network        169.254.0.0       24
OR
Host           Any
Next Step clish -c "add allowed-client network ipv4-address 169.254.0.0 mask-length 24"
Check lominfo output Command lominfo
Expected Output
Firmware Revision : 4.40
IP Address : 192.168.1.5
IPv6 Status : Enabled
IPv6 Address : 3900:172::2/64
Next Step service ipmi restart
Check that there are no errors in this file "/var/log/cp_idrac.log" Command N/A
Expected Output N/A
Next Step N/A
Check ssh to the iDRAC interface Command ssh 169.254.0.1
Expected Output
Prompt to type password:
Password:
Next Step Check ".ssh/known_hosts" file content, there should be an entry for this IP. You can try to remove the entry and try the ssh again.
Check that ipmi is up and running Command service ipmi status
Expected Output
ipmi_msghandler module loaded.
ipmi_si module loaded.
ipmi_devintf module loaded.
/dev/ipmi0 exists.
Next Step service ipmi restart


If the issue persists, or is not listed in the table above, contact Check Point Support for assistance.

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment