How to find the Dell Service Tag on VMWare ESXi Server Virtual from vSphere

To identify DELL service tag on this server, you should login to vSphere client -> click on the top level node in the left-hand tree structure (this is the vmware node) -> click on the “Configuration” tab -> On the left side, it will display “Hardware” and “Software” sections -> click on “Processors” link in the “Hardware” section -> under the “System”, you’ll see the DELL service tag as shown in the picture below.

 

How To Change DRAC Password Using RACADM

The default username and password for Dell Remote Access Controllers (DRAC) are “root” and “calvin, ” respectively. As with everything else, for security reasons it is recommended to change either or both.

There are always those cases where you either forget the password or don’t know it to begin with.  Like in the case of purchasing used equipment on eBay or elsewhere.

Resetting the DRAC password can be done using the command line tool, racadm.  RACADM can be downloaded from Dell by searching for “racdm download.” Once installed racdm.exe will be located, by default, in C:\Program Files (x86)\Dell\SysMgt\rac5 (for DRAC 5 on 64-bit Windows OS) or C:\Program Files\Dell\SysMgt\rac5 (for DRAC 5 on 32-bit OS).  Navigate to the appropriate directory to run the following commands.

Notes:

  • In DRAC 4 the first index slot is “root” by default.
  • In DRAC 5 index 1 is “Administrator” and index 2 is “root”. This is essential to know to correctly reset the password.

Examples using racadm to reset DRAC password from the Windows command line:

  • DRAC 4: racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 1 <NewPassword>
  • DRAC 5: racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 2 <NewPassword>

You can also display the info using the racadm command:

  • DRAC 4: racadm getconfig -g cfgUserAdmin -i 1
  • DRAC 5: racadm getconfig -g cfgUserAdmin -i 2

http://support.dell.com/support/edocs/software/smdrac3/idrac/idrac10mono/en/ug/html/racugc6.htm

How Do I Setup or Change the IP Address on a D-Link Print Server?

In the link below you will find the utility itself called PSAdmin.  You need to install PSAdmin on a PC that is on the same network as the print server.  Be sure the print server is plugged into power and a network switch.  You can then use the PSAdmin tool to set or change the IP address (Use Manual IP, NOT DHCP), set the subnet mask which is typically 255.255.255.0 and set the Default Gateway (usually the IP address of the router at that location).  There is a detailed PDF file that has instructions for using PSAdmin to setup the DP-301 Print Server.

http://download.mos.com.np/Drivers/D-Link/printservers/PS%20Admin/

Solar Website Security Certificate Warnings

When browsing to a secure portion of the Solar web start page (Session Manager, Connection Pool, etc.), you will receive an error similar to the following:

“There is a problem with this website’s security certificate. The security certificate presented by this website was issued for a different website’s address. Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server. We recommend that you close this webpage and do not continue to this website.”

The warning is expected, and can be safely ignored. Regardless of any warnings, all web traffic over HTTPS between the client and application server is fully encrypted.

The way certificates work in regards to web browsing is as follows: the web browser notices there is an HTTPS connection and attempts to verify the certificate given against both the certificate authority that signed the certificate, as well as the FQDN of the destination address.

In this case, the web browser sees that the certificate is signed by a non-trusted authority, and that the destination’s IP address doesn’t appear in the certificate. This warning will always appear, because Eclipse signs our own certificates and does not customize them for each customer. To remove the warning, each customer would have to generate a certificate from a trusted authority (i.e. VeriSign) for each unique web address. Each of these certificates would have to be re-integrated with each change to the application server (i.e. point upgrade). Eclipse has weighed the warning vs. the practicality of doing this for every customer and chose to self-sign a generic certificate to provide encryption without authentication. This is an industry standard practice for secure websites on a company Intranet where a server’s identity is known.

If a customer wishes to order and install their own security certificates, they may do so at their own expense and without support from Eclipse.