LOM Card Configuration

Configuring an IP Address

The LOM Card needs at least one of these:

  • IPv4 address

  • IPv6 address

Note - Initial IPv4 setup is part of the First Time Wizard. See First-Time Setup.

Configuring DNS Settings and Changing the Host Name

Configure one or two DNS servers to resolve the NTP Server hostnames for automatic date and time See Configuring date and time automatically.

The Host Name is the name for the LOM Card in the Home view. This name may be different from the name used for the appliance in the network interface. The Host Name is not related to web hosting. You can only change the Host Name when DNS is enabled.

Configuring Link Speed and Duplex Settings

You can configure the link speed and duplex settings for the LOM Card network connection to match your environment.

Configuring an SSL Certificate

You can generate a new SSL Certificate for the LOM Card or upload an existing SSL Certificate.

Configuring LOM Card Services

You can configure the port and the user access for these LOM Card services:

  • Web - access to the LOM Card web user interface

  • KVM (Keyboard Video Mouse, also called Virtual Media) - access to the host appliance's Command Line Interface (CLI)

  • CD-media - access to a virtual CD drive on the host appliance

  • HD-media - access to a virtual hard disk drive on the host appliance

Note - Maximum Sessions shows the maximum number of users allowed to use a service at the same time. Each service has a preset and unchangeable maximum number of users.

Configuring Date and Time Settings

You can configure date and time for the LOM Card manually, or configure the LOM Card to get date and time automatically from an NTP Server.

Configuring the LOM Card To Send Log Messages to a Syslog Server

In HTML5-Based LOM Card firmware versions 6.15 and higher, you can configure the LOM Card to send specific log messages to a Syslog server about these actions:

  • user login attempts to the LOM Card WebUI (for more information, see Users and Access)

  • power cycles of the host device from the LOM Card (for more information, see Power Management)

Important - Traffic between the LOM Card and the Syslog server is encrypted only if you use a TCP port and upload a certificate for the Syslog server. If you use a UDP port on the Syslog server, traffic is not encrypted, so make sure the network is physically protected.