Raritan Computer EMX2-111 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Raritan Computer EMX2-111 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Raritan Computer EMX2-111, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Raritan Computer EMX2-111 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Raritan Computer EMX2-111. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Raritan Computer EMX2-111 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Raritan Computer EMX2-111
- Den Namen des Produzenten und das Produktionsjahr des Geräts Raritan Computer EMX2-111
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Raritan Computer EMX2-111
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Raritan Computer EMX2-111 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Raritan Computer EMX2-111 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Raritan Computer finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Raritan Computer EMX2-111 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Raritan Computer EMX2-111, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Raritan Computer EMX2-111 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Copyrigh t © 2012 Raritan, In c. EMX- 0D -v 2.2.0-E September 2012 255 - 80 - 6107 - 00 Raritan EMX User Guide Release 2.2.0[...]

  • Seite 2

    This docum ent contains proprietary inform ation that is protecte d by cop yright. All rights reserved. No part of this docum ent ma y be p hotocopied, reproduce d, or translated into an other language with out express prior written co nsent of Rarit an, Inc. © Copyright 2012 Rar itan, Inc. All third -part y software and hardware m entioned in thi[...]

  • Seite 3

    iii Contents Chapter 1 Introduction 1 Overview ........................................................................................................................................ 2 W hat's New in EMX Help ............................................................................................................... iii Product Models ....[...]

  • Seite 4

    Contents iv Re set Button ................................................................................................................................ 50 Contact Closure Sens or Term ination ........................................................................................... 51 Power Switch ...............................................[...]

  • Seite 5

    Contents v Changing the T elnet Settings ............................................................................................ 91 Enabling Service Advert isem ent ........................................................................................ 92 Configuring the SMT P Settings .........................................................[...]

  • Seite 6

    Contents vi Modifying an Action ......................................................................................................... 157 Deleting an Event Ru le or Action ..................................................................................... 158 A Note about Untr iggered Rules ....................................................[...]

  • Seite 7

    Contents vii Chapter 9 Using SNMP 201 Overview .................................................................................................................................... 201 Enabling SNMP .......................................................................................................................... 202 Configuring SNM P Notific[...]

  • Seite 8

    Contents viii Asset Sensor Mana gement ............................................................................................. 313 Rack Unit Configurati on ................................................................................................... 316 Setting the Histor y Buffer Length .................................................[...]

  • Seite 9

    Contents ix A ppendix C Raritan P X Asset Management 349 Overview .................................................................................................................................... 349 A ppendix D Spe cifications 351 Altitude Correction Fac tors (EMX) ................................................................................[...]

  • Seite 10

    1 In This Chapter Overview .................................................................................................... 2 W hat's New in EMX Help ......................................................................... iii Product Models ......................................................................................... iv Produ[...]

  • Seite 11

    Chapter 1 : Introduction 2 Overview The EMX device pro vides a rack management solution that com bines both asset m anagement and environm ental monitoring capabilities. W ith asset management capabilit y, you can remotel y track the location of IT equipment after tag ging the IT devices electron ically. This f eature is especially useful when ther[...]

  • Seite 12

    iii What's New in EMX Help The following sections h ave changed or inform ation has been added to the EMX Help based on enhancem ents and changes t o the equipment and/or user docum entation.  Support for SNMPv2c a nd SNMPv3 traps and inform s - see Configuring the SN MP Settings, Traps and Inf orms (on page 85 )  Restrictive Service Agr[...]

  • Seite 13

    Chapter 1 : Introduction iv Product Models The EMX devices incl ude two m odels: EMX2 -111 and EMX2-8 88. Different m odels are functionally identical, but vary in the size and total number of ports . EMX2- 11 1 EMX2-111 is a Zero U model with the f ollowing ports and com ponents:  1 Sensor port  1 Feature port  1 RS-485 port  2 USB por[...]

  • Seite 14

    Introduction v Product Features In general, the EMX f eatures include:  The ability to rem otely track the location of each IT equipm ent that is electronicall y tagged using Raritan asset tags  LED color change on the asset sensor to d istinguish bet ween detected and undetected asset tags  Support for a m aximum of 10-m eter cabling on t[...]

  • Seite 15

    Chapter 1 : Introduction vi  The ability to m onitor a connected Schroff ® LHX -20 or LHX-40 heat exchanger  The ability to diagnose th e network , such as pinging a host or listing TCP connections  The ability to m onitor sever accessibilit y  Full disaster recover y option in case of a catastr ophic failure durin g a firmware upgrade[...]

  • Seite 16

    7 In This Chapter Before You Begin ...................................................................................... 7 Mounting the EMX De vice ......................................................................... 7 Connecting the EMX to a Power Source ................................................. 11 Configuring the EMX ...............[...]

  • Seite 17

    Chapter 2 : Installing and Configurin g the EMX Device 8 Mounting a Zero U EM X Device This section describes how to mount a Zero U EMX device using L - brackets and t wo buttons. To mount Zero U models using L -brackets and tw o button s: 1. Align the two edge slots of the L-brack et with the t wo screw holes on the top of the EMX de vice. 2. Scre[...]

  • Seite 18

    Chapter 2 : Installing and C onfiguring the EMX Device 9  Mount the device b y screwing a mounting button in the b ack center of each L- bracket and then hav ing both buttons engage the mounting holes in the rack . The recommended torque f or the button is 1.96 N·m (20 kgf·cm ). Mounting a 1U EM X Device Using the appropriat e brack ets and to[...]

  • Seite 19

    Chapter 2 : Installing and Configurin g the EMX Device 10 3. Insert one end of the cable- support bar into the L-shaped hole of the rackmount brack et, and align the hole on the end of the bar with the threaded hole adjace nt to the L-s haped hole. 4. Secure the cable-sup port bar with one of the Raritan -provided ca p screws. 5. Repeat Steps 3 to [...]

  • Seite 20

    Chapter 2 : Installing and C onfiguring the EMX Device 11 Connecting the EMX to a Power Source If your EMX device is d esigned to use a cab le retention clip, instal l the clip before connecting a power cord. A c able retention clip prev ents the connected power c ord from com ing loose or falling of f. The use of cable retent ion clips is highl y [...]

  • Seite 21

    Chapter 2 : Installing and Configurin g the EMX Device 12 2. Connect the EMX device to the networ k via a wired or wireless connection. 3. Configure the EMX device using the comm and line interf ace. Connecting the EM X to a Computer To configure the EMX us ing a com puter, it mus t be connected to the computer with an RS- 232 serial interf ace. Th[...]

  • Seite 22

    Chapter 2 : Installing and C onfiguring the EMX Device 13 2. Run dominion-seria l-setup.exe. A Dominion Seria l Console Driver Setup W izard appears. 3. Click Install to install the driver. 4. Click Finish when the installation is com plete. 5. Connect the EMX 's USB cable to the com puter. The dri ver is automatically installed. To install th[...]

  • Seite 23

    Chapter 2 : Installing and Configurin g the EMX Device 14 Connecting the EM X to Your Netw ork To use the web interf ace to administer th e EMX, you m ust connect the EMX to your local area n etwork (LAN). The EMX can be con nected to a wired or wireless network . To make a wired con nection: 1. Connect a standard Cate gor y 5e/6 UTP cable to th e [...]

  • Seite 24

    Chapter 2 : Installing and C onfiguring the EMX Device 15 Initial Network Conf iguration After the EMX device is co nnected to your network, you must provide it with an IP address an d som e additional net working inform ation. This section describes the initial configuratio n via a serial or U SB connection. To configur e the EMX via the L AN, see[...]

  • Seite 25

    Chapter 2 : Installing and Configurin g the EMX Device 16 b. For the wired network mode, you ma y configure the LAN interface settings. In m ost scenarios, the def ault setting (auto) works well and should not be changed unless r equired. To set Us e this command LAN interface speed network interface LANInterfaceSpeed <option> where <optio[...]

  • Seite 26

    Chapter 2 : Installing and C onfiguring the EMX Device 17 To set Use this command Authentication method network wireless authMethod <method> where <method> is psk for Pre-Sh ared Key or eap for Exte nsible Authentication Protoco l. PSK network wireless PSK <psk> where <psk> is the P SK string. EAP outer authentication networ[...]

  • Seite 27

    Chapter 2 : Installing and Configurin g the EMX Device 18 To set Use this command IP protocol network ip proto <protocol> where <protocol> is v4Only for enabling IPv4, v6On ly for e nabling IPv6 or both for enabling both IPv4 a nd IPv6 protocols. IP address returned b y the DNS server network ip dnsResolverPreference <resolver> wh[...]

  • Seite 28

    Chapter 2 : Installing and C onfiguring the EMX Device 19  For the static I Pv4 configuration, configure th ese para meters. To set Use this command Static IPv4 address network ipv4 ipAddress <ip address> where <ip address> is the IP a ddress you want to assign. Subnet mask network ipv4 subnetMask <netmask> where <netm ask&g[...]

  • Seite 29

    Chapter 2 : Installing and Configurin g the EMX Device 20 where <option> is en able or disable . See the table below for th e IPv6 commands for m anually specifying DNS serv ers.  For the static IPv6 conf iguration, you should configure the following param eters. Note that the IP address m ust follow the IPv6 form at. To set Use this comma[...]

  • Seite 30

    Chapter 2 : Installing and C onfiguring the EMX Device 21 10. To verif y whether all settings are correc t, type the following commands one b y one. Current network settings are displa yed. Co mmand Description show network Show network parameters. show network ip all Show all IP configurati on parameters. show network wireless details Show all wir[...]

  • Seite 31

    Chapter 2 : Installing and Configurin g the EMX Device 22 Combining Asset Sensors Each tag port on the as set sensors c orresponds to a rac k unit and can be used to locate the IT devices on a sp ecific rack (or cabinet). For each rack, you can attach ass et sensors up to 64U long, co nsisting of one MASTER and m ultiple SLAVE asset sensors . The d[...]

  • Seite 32

    Chapter 2 : Installing and C onfiguring the EMX D evice 23  Make sure that the U-shaped she et metal adjacent to the male DIN connector is inserted into the rear s lot of the m aster asset sensor. Screw up the U -shaped s heet metal to reinf orce the connection. 2. Connect another 8U s lave asset sens or to the one bei ng attached to the master [...]

  • Seite 33

    Chapter 2 : Installing and Configurin g the EMX Device 24 Connecting Asset Sensors to the EMX You need both ass et sensors and asset t ags for track ing devices. Asset tags, which are af fixed to devices, provide a n ID num ber for each device, while the asset sensors transm it ID numbers and position ing inform ation to the connected EMX d evice. [...]

  • Seite 34

    Chapter 2 : Installing and C onfiguring the EMX Device 25 Connecting an Asset Sensor to the EM X- 111 The EMX-111 does n ot natively support the 12 volts of power needed t o connect to asset m anagement sensors via a Categor y 5e/6 cable. Distances greater than 1 to 10 m eters require the use of a 12V Feature Port X-Cable along with a Categor y 5e/[...]

  • Seite 35

    Chapter 2 : Installing and Configurin g the EMX Device 26 Diagram key EMX- 111 Category 5e/6 cable (Cat 5e/6 cable) 12V Feature Port X -Cable (X -cable) To connect asset senso rs to th e EMX-111 device: 1. Affix the adhesive end of an asset tag to each IT device throu gh the tag's tape. 2. Plug the connector on th e other end of each asset tag[...]

  • Seite 36

    Chapter 2 : Installing and C onfiguring the EMX Device 27 Connecting an Asset Senso r to the EMX- 888 The EMX-888 can c onnect to an asset m anagem ent strip via a Categor y 5e/6 cable up to a d istance of 10 m eters. Note: The EMX-888 does not require t he use of a 12V F eature Port X - Cable like the E MX-111. Diagram key Asset managem ent t ags [...]

  • Seite 37

    Chapter 2 : Installing and Configuring the EMX Device 28 To connect asset senso rs to the EM X-888 device: 1. Affix the adhesive end of an asset tag to each IT device throu gh the tag's tape. 2. Plug the connector on th e other end of each ass et tag into the corresponding tag port o n the asset sensor. 3. Connect one end of a Cat5e/6 cable to[...]

  • Seite 38

    Chapter 2 : Installing and C onfiguring the EMX Device 29 b. Connect the other en d of the cable to the FEATURE p ort on the EMX. 2. Affix an asset tag to t he IT device and co nnect this asset tag to t he AMS- M2 -Z b y plugging the tag connector into the tag port on t he AMS- M2 -Z. See Connecting Asset Sensors to the E MX (on page 24 ) for detai[...]

  • Seite 39

    Chapter 2 : Installing and Configurin g the EMX Device 30 Connecting Blade Extension Strips For blade servers, which are contained in a single chas sis, you can use a blade extension strip to track individual blade server s. Raritan's blade extensi on strip functions sim ilar to a Raritan as set sensor but requires a tag co nnector c able for [...]

  • Seite 40

    Chapter 2 : Installing and C onfiguring the EMX Device 31 Note: Each tag port on the blade extensio n strip is labeled a number, which is displayed as th e slot number in the EMX's web interface. To install a blade extens ion strip: 1. Connect the tag conn ector cable to t he blade extension strip.  Plug the cable's connec tor into the[...]

  • Seite 41

    Chapter 2 : Installing and Configurin g the EMX Device 32 b. Plug the tag connector of the asset tag into the tag port on the blade extension strip. 4. Repeat the above ste p until all blade s ervers in the chas sis are connected to the blade extension strip via as set tags. 5. Plug the tag connector of the blade extens ion strip into the closes t [...]

  • Seite 42

    Chapter 2 : Installing and Co nfiguring the EMX Device 33 Connecting Environmental Sensors (Optional) To enable the detecti on of environm ental factors arou nd the EMX, connect one or m ore Raritan en vironmental sensors to the EMX device. The maxim um distance for all sensor cab ling plugged into the pro duct's sensor port should no t exceed[...]

  • Seite 43

    Chapter 2 : Installing and Configurin g the EMX Device 34 Note: If you are using a 12V Feature Port X-Cable to connect an asset management sensor (AMS) to the EMX-111, the SENSOR port on the device is already being used. Plug th e other end of t he Raritan provided phone ca ble into the Sensor con nector on the 1 2V Feature Port X-Ca ble instead of[...]

  • Seite 44

    Chapter 2 : Installing and C onfiguring the EMX Device 35 About Contact Closure S ensors Raritan's contact closure s ensor (DPX - CC2 -T R) can detect the op en- and -closed status of the connected de tectors/switches. This feature requires the integration of at least a discrete (on/of f) detector/switch to work properl y. The types of discret[...]

  • Seite 45

    Chapter 2 : Installing and Configurin g the EMX Device 36 Connecting Detectors/Switches to DPX- CC2 - TR A DPX- CC2 -T R unit provides two channe ls for connecting t wo discrete (on/off) detectors/s witches. There are f our spr ing-loaded term ination points on the bod y of DPX- CC2 -T R: the two to the r ight are associated with one channel (as in[...]

  • Seite 46

    Chapter 2 : Installing and C onfiguring the EMX Device 37 Configuring a Contact Closure Sensor Before using DPX - CC2 -TR to detec t the contact closur e status, water, smoke or vibration, you must determ ine the normal state b y adjusting its dip switch, which controls t he LED state on th e body of DPX - CC2 -TR. A dip switch is assoc iated with [...]

  • Seite 47

    Chapter 2 : Installing and Configurin g the EMX Device 38 Note: The dip switch sett ing must be properly co nfigured, or the se nsor LED may be incorr ectly lit in the Normal state. Connecting Third-Part y Dete ctors/Switches to the EMX A specific EMX m odel (EMX2- 888) provides two channels of contact closure sensor term ination points, allowing f[...]

  • Seite 48

    Chapter 2 : Installing and C onfiguring the EMX Device 39  Plug both wires of the other detector/switch into the two termination points to the right. 4. Release the tin y rectangular buttons af ter inserting the wires properly. 5. Verify that these wires are firm ly fastened. 6. By default the open sta tus of the detec tor/switch is cons idered [...]

  • Seite 49

    Chapter 2 : Installing and Configurin g the EMX Device 40 Connecting Differential Air Pressure Sensors You can have a Rarit an differential air pres sure sensor connected to the EMX device if the diff erential air press ure data is des ired. W ith thi s sensor, the t emperature around the sensor can be a lso detected through a tem perature sensor i[...]

  • Seite 50

    Chapter 2 : Installing and C onfiguring the EMX Device 41 Connecting a Logitech Webcam (Optional) The EMX supports webcams c onnected to it, allowing you to vie w video or snapshots of the are a surrounding the webcam. T he following webcams are supported:  Logitech ® W ebcam ® Pro 9000, Model 960- 000048  Logitech Quick Cam Deluxe fo r Not[...]

  • Seite 51

    Chapter 2 : Installing and Configurin g the EMX Device 42 To connect an LHX he at exchange r to the serial FEATUR E port using a serial cable (p rovided by Schroff) : 1. Plug DB9 end of c able into the RS232 p ort on the Schr off LHX heat exchanger. 2. Plug the other end of the cable into one of available s erial FEATURE ports on your EMX de vice. [...]

  • Seite 52

    43 In This Chapter Supported W eb Browsers ........................................................................ 43 Connection Ports ..................................................................................... 43 LCD Display Panel .................................................................................. 45 Reset Button ........[...]

  • Seite 53

    Chapter 3 : Ge tting Started 44 Port Used for... FEATURE Connection to asset s ensors via a Categ ory 5e/6 cable. Note: The EMX dev ice supplies power to t he connected asset sensors after the connection is estab lished. CONSOLE/ MODEM Establishing a serial co nnection between a com puter and the EMX d evice: This is a standard DT E RS-232 port. Yo[...]

  • Seite 54

    Chapter 3 : Ge tting Started 45 LCD Display Panel The LCD displa y panel shows the sensor read ing or status, asset managem ent states and the device's MAC address. It consists of:  An LCD display  Co ntrol buttons LCD Display Different types of inf ormation are shown in different sections of the LCD display. The diagram indicates the se[...]

  • Seite 55

    Chapter 3 : Ge tting Started 46 Section Information show n Depending on your selection, the inf ormation displayed includes:  The selected environm ental sensor, includi ng the sensor's ID num ber. The EMX sho ws the selected environmental sensor i n two wa y s:  For a sensor whose ID num ber is below 100, it is displayed as "SENSOR[...]

  • Seite 56

    Chapter 3 : Ge tting Started 47 Section Information show n The measurem ent unit for the selected en vironmental sensor appears. The measurem ent unit varies according to the sensor type:  % is displayed for a hum idity sensor.  is displayed for a tem perature sensor. W hen the term "ASSET" appears, th e displayed inform ation is as[...]

  • Seite 57

    Chapter 3 : Ge tting Started 48 2. The LCD displa y shows the reading or state of the selected sensor i n the middle of the LCD d isplay. For a numeric sensor' s reading, the appropr iate measurem ent unit is displayed to the right of th e reading.  % is displayed for a hum idity sensor.  is displayed for a tem perature sensor. For a dis[...]

  • Seite 58

    Chapter 3 : Ge tting Started 49 Asset Management Information The LCD displa y can display the asset sens or state on each FEAT URE port as well as the asset t ag state of eac h rack unit. For the R aritan asset sensor, a rack unit refers to a tag port. To display the as set management informat ion: 1. Press the MODE button until the term "ASSE[...]

  • Seite 59

    Chapter 3 : Ge tting Started 50 MAC Address The EMX's MAC addr ess is available b y operating the LCD d isplay, and in Device m ode. Contact your LAN adm inistrator for as sistance. To display the M AC address: 1. Press the MODE butt on until the device set tings are displa yed, indicated b y a 'd' in at the top lef t of the display.[...]

  • Seite 60

    Chapter 3 : Ge tting Started 51 Contact Closure Sensor Termination Two channels for conn ecting two third- party contact c losure sensors are provided on the EMX 2-888 m odel. For more inf ormation, see:  Connecting Third- Party Detectors/Swit ches to the E MX (on pag e 38 )  Contact Closure Sensor L EDs (on p age 39 ) Power Switch The power [...]

  • Seite 61

    Chapter 3 : Ge tting Started 52 http(s)://<ip address> where <ip address > is the IP ad dress of the EMX de vice. 2. If a security alert m essage appears, c lick OK or Yes to accept. The Login page then opens. 3. T y pe your user nam e in the User Nam e field, and password in th e Password field. Note: Both the user name and pass word a[...]

  • Seite 62

    Chapter 3 : Ge tting Started 53  Choose the Refr esh command or click the Refresh button on th e web browser. 2. Either the login page op ens or the bro wser is closed, d epending on your choice in the prev ious step. Changing Your Password Normal users can change their own pass words if the y have the Change Own Password perm ission. See Settin[...]

  • Seite 63

    Chapter 3 : Ge tting Started 54 Introduction to the Web Interface The web interface pro vides two panes, a m enu bar, a status bar, an Add Page icon, and a logou t button throug hout every page. Number Web interface element Menus EMX Explorer pane Setup button* Status bar Add Page icon Logout button Data pane * The Setup button is not available on [...]

  • Seite 64

    Chapter 3 : Ge tting Started 55 Me nus Four menus are avai lable for m anaging different task s or showing inform ation.  User Management c ontains m enu items for m anaging user profiles, permissions (r oles), and password.  Device Settings de als with device-r elated settings, su ch as the device nam e, network settings, sec urity settings,[...]

  • Seite 65

    Chapter 3 : Ge tting Started 56  Last login time: This shows the date and tim e this login name was used to lo g in to this EMX device last tim e. W hen the mouse pointer hovers over the last login time, detailed inform ation about the last login is displa yed, including the access client and IP address . For the login via a seria l connection, [...]

  • Seite 66

    Chapter 3 : Ge tting Started 57 The following diagram shows a m ulti-tab exam ple. 4. W ith multiple pages ope ned, you can tak e these actions:  To switch to one of the opened data pa ges, click the corresponding tab. If there are too m any tabs to be all sho wn, two arrows ( and ) appear at the lef t and right borders of the pane. Click either[...]

  • Seite 67

    Chapter 3 : Ge tting Started 58 Readings Highlighted in Yellow or Red W hen a numeric sensor's reading crosses an y upper or lower threshold, the background color of the whole ro w turns to yel low or red for alert ing users. For a discrete (on/of f) sensor, the ro w changes the back ground color when the sensor ent ers the abnorm al state. No[...]

  • Seite 68

    Chapter 3 : Ge tting Started 59 To find the exact m eaning of the alert, re ad the inform ation shown in the State (or Status) colum n:  below lower critical: T he num eric sensor's r eading drops below the lower critical threshold.  below lower warning: T he numeric sensor's reading drops below the lower warning thresho ld.  abo[...]

  • Seite 69

    Chapter 3 : Ge tting Started 60 Browser-Defined Shortcut M enu A shortcut menu, which is built in the web browser, may appear when right-click ing anywhere in the EMX web interface. The shortcut m enu functions are define d b y the browser. For exam ple, the Back c ommand on the Internet Explorer ® (IE) shortc ut menu works the same as the Back bu[...]

  • Seite 70

    Chapter 3 : Ge tting Started 61 Viewing the Dashboard W hen you log in to the web interface, the D ashboard page is displa yed by default. This page pro vides an overvie w of the EMX device's status. The page is divided i nto several sections acc ording to connecte d equipment, such as ass et sensors an d environm ental sensors. Doub le- click[...]

  • Seite 71

    62 In This Chapter Overview .................................................................................................. 62 Managing Users ...................................................................................... 62 Managing Roles ....................................................................................... 69 Overview [...]

  • Seite 72

    Chapter 4 : U ser and Role Manage ment 63 Field Type this...  Spaces are NOT permitted Full Name The user's f irst and last nam es. Password, Confirm Password The password the user en ters to log i n. Type it first in the Password fie ld and then again in the Confirm Password field.  The password can b e 4 to 32 characters long.  It i[...]

  • Seite 73

    Chapter 4 : U ser and Role Managemen t 64 Field Description is the default. Use Password as Authentication Pass Phrase This checkbox is configura ble only if AuthNo Priv or AuthPriv is selected. W hen the checkbox is selected, the authe ntication pass phrase is identical t o the user's pass word. To specif y a different authentication pass phr[...]

  • Seite 74

    Chapter 4 : U ser and Role Manage ment 65 7. Click the SSH tab to e nter the public k ey if the pub lic key authentication for the S SH service is ena bled. See Changing t he SSH Settings ( on page 90 ). a. Open the SSH publ ic key with a text editor. b. Copy and paste all co ntents in the text editor into the Public Ke y field on the SSH tab. 8. C[...]

  • Seite 75

    Chapter 4 : U ser and Role Manage ment 66 Modifying a User Profile You can change an y user prof ile's information except f or the user nam e. To modify a user profil e: 1. Choose User Manag ement > Users. T he Manage User s dialog appears. 2. Select the user b y clicking it. 3. Click Edit or doub le-click the user. T he Edit User 'XX [...]

  • Seite 76

    Chapter 4 : U ser and Role Manage ment 67 4. A message appears , prompting you to confirm the operation. C lick Yes to confirm the deletion. Setting Up User Pr eferences (Units of M easure) The units of m easure used in your EMX GUI can be ch anged as needed. Note: Changing your pr eferences does not ch ange the E MX device display. See Setting Up [...]

  • Seite 77

    Chapter 4 : U ser and Role Manage ment 68  In the Temperature Un it field, select (Celsius) or (Fahrenheit) as the m easurem ent unit for tem peratures.  In the Length Unit fie ld, select "Meter " or "Feet" as the measurem ent unit for length or height.  In the Pressure Unit f ield, select "Pascal" or "ps[...]

  • Seite 78

    Chapter 4 : U ser and Role Manage ment 69 b. Click Yes to disconnec t the user or No to abort t he operation. If clicking Yes, the connecte d user is forc ed to log out. You may change the s orting order of the list if nec essar y. 3. Cl ick Close to quit the d ialog. Managing Roles Setting Up Roles To manage an y settings, you must log in to the u[...]

  • Seite 79

    Chapter 4 : U ser and Role Manage ment 70 a. Click Add. The "Add Privileges to new Rol e" dialog appears. b. Select the perm ission you want fr om the Privileges list. c. If the permiss ion you selected contains any argum ent setting, the Arguments list is s hown to the right. Then se lect one or multiple argum ents. d. Click Add to add t[...]

  • Seite 80

    Chapter 4 : U ser and Role Manage ment 71 c. If the permiss ion you selected contains any argum ent setting, the Arguments list is s hown to the right. Then se lect o ne or multiple argum ents. d. Click Add to add the sel ected perm ission (and argum ents if any). e. Repeat Steps a to d un til you add all necessar y permiss ions. 8. To change a spe[...]

  • Seite 81

    72 In This Chapter Overview .................................................................................................. 72 Naming the EMX D evice ......................................................................... 72 Displaying the Device Inf orm ation ........................................................... 73 Setting the Date and [...]

  • Seite 82

    Chapter 5 : EMX Device Manag ement 73 4. Click OK to save the cha nges. Displaying the Device Information The Device Inform ation dialog displa ys information spec ific to the EMX device that you are ac cessing, such as IDs an d protocol versions of asset sensors. To display the device inf ormation: 1. Choose Maintenance > Device Inform ation. T[...]

  • Seite 83

    Chapter 5 : EMX Device Manag ement 74  To custom ize the date and time, select the Us er Specified Tim e radio button, and then e nter the date and tim e in appropriate fields. Use the yyyy- mm -dd format f or the date and the hh:mm :ss format f or the time.  To set the date, delete existing numbers in the Date f ield and type new ones, or cl[...]

  • Seite 84

    Chapter 5 : EMX Device Manag ement 75 Note: The EMX fold er is named "EMX " by default. The name changes after customi zing the device name. S ee N aming the EM X Device (on page 72 ). 2. Click Setup on the Se ttings page. T he EMX Setup dial og appears. 3. T y pe an integer num ber in the Alt itude field. Depending on the measurem ent un[...]

  • Seite 85

    Chapter 5 : EMX Device Manag ement 76 5. To change the tem perature unit, sel ect the desired opti on in the Temperature Unit f ield.  : This option displa ys the tem perature in Celsius.  : This option displa ys the tem perature in Fahrenheit. 6. To change the length or height unit, sel ect the desired opti on in the Length Unit field.  M[...]

  • Seite 86

    Chapter 5 : EMX Device Manag ement 77  Disabled: W hen applied, disables to port and nothing connecte d to the port is detected .  Auto: An icon is disp layed for this port o nly when the E MX d evice detects the physical con nection of the asset se nsor on this port. Otherwise, nothing is displayed. This is the def ault approach.  Pinned:[...]

  • Seite 87

    Chapter 5 : EMX Device Manag ement 78  Auto: An icon is disp layed for this port o nly when the E MX device detects the physical con nection of the LHX h eat exchanger on this port. Otherwise, nothing is displa yed. This is the default approach.  Pinned: An icon is disp layed for this port al l the t ime, but the icon image varies accordin g [...]

  • Seite 88

    Chapter 5 : EMX Device Manag ement 79 4. To change the LAN sp eed, click the drop-down arr ow in the Speed field and select an o ption from the list.  Auto: System determines the optim um LAN speed through aut o- negotiation.  10 Mbit/s: The LAN sp eed is alwa ys 10 Mbps.  100 Mbit/s: The LAN s peed is al ways 100 Mbps. 5. To change the du[...]

  • Seite 89

    Chapter 5 : EMX Device Manag ement 80 7. In the Authentication f ield, click the drop -down arro w, and select an appropriate option f rom the list. Option Description No Authentication Select this option when no authentication d ata is required. PSK A Pre-Shared Ke y is required for this opti on.  In the Pre- Shared Ke y field, type the PSK str[...]

  • Seite 90

    Chapter 5 : EMX Device Manag ement 81 Selecting the Internet Protocol The EMX device supp orts two t ypes of Internet protocols -- IPv4 and IPv6. You can enable either or both Internet protocols. Af ter enabling the desired Internet protoco l(s), all but not lim ited to the follo wing protocols will be com pliant with the enab led Internet protoco [...]

  • Seite 91

    Chapter 5 : EMX Device Manag ement 82 Modifying the IPv4 Settings You must enable the IPv4 protocol before you can modif y the IPv4 network settings. See Selecting th e Internet Protocol (on page 81 ). To modify the IPv4 sett ings: 1. Choose Device Settin gs > Network. T he Network Configuration dialog appears. 2. Click the IPv4 Settings ta b. 3[...]

  • Seite 92

    Chapter 5 : EMX Device Manag ement 83 Note: The EMX sup ports a maximum of 3 DNS servers . If two IPv4 DNS servers and two IPv6 D NS servers are available, the EMX only uses the primary IPv4 and I Pv6 DNS serv ers. Modifying the IPv6 Settings You must enable the IPv6 protocol before you can modif y the IPv6 network settings. See Selecting th e Inte[...]

  • Seite 93

    Chapter 5 : EMX Device Manag ement 84 Note: The EMX sup ports a maximum of 3 DNS servers . If two IPv4 DNS servers and two IPv6 D NS servers are available, the EMX only uses the primary IPv4 and IPv 6 DNS serv ers. Role of a DNS Server As Internet comm unications are carr ied out on the basis of IP addresses, appropriate DNS serv er settings are r [...]

  • Seite 94

    Chapter 5 : EMX Device Manag ement 85 2. To use a different port f or HTT P or HTTPS, type a new port n umber in the corresponding fie ld. Valid range is 1 to 65535. Warning: Different ne twork serv ices cannot share the same TC P port. 3. Click OK to save the cha nges. Configuring the SNM P Settings, T raps and Informs SNMP comm unications allow y[...]

  • Seite 95

    Chapter 5 : EMX Device Manag ement 86 3. Select the "enable" ch eckbox in the "SNM P v1 / v2c" field to enable communication with an SNMP manager us ing SNMP v1 or v2c protocol.  T y pe the SNMP read- only comm unity string in the Read Comm unity String field. Usually the string is "public."  T y pe the read/writ[...]

  • Seite 96

    Chapter 5 : EMX Device Manag ement 87 7. Click OK, or continu e to the Notifications tab cr eate SNMP T RAP or INFORM comm unications.[...]

  • Seite 97

    Chapter 5 : EMX Device Manag ement 88 8. To create an SNMP T RAP or INFORM com munication, open the Notifications tab on the S NMP Settings dialog. 9. Select the Enabled chec kbox to enable t he feature. For SNMPv2/c T RAP and INFORM notifications: 1. From the Notification T ype drop-do wn, select the t ype of SNMP notification. 2. For SNMP INFORM [...]

  • Seite 98

    Chapter 5 : EMX Device Manag ement 89 5. In the Comm unity fields, enter the SN MP communit y string to access the device(s). T he community is the gro up representing the EMX and all SNMP managem ent stations. 6. Click OK. For SNMPv3 T RAP and INFORM notifications: 1. On the Notifications tab, select the Enable check box to ena ble the SNMP notifi[...]

  • Seite 99

    Chapter 5 : EMX Device Manag ement 90 Security level Description "noAuthNoPriv" Select this if no authori zation or privac y protocols are needed.  Click OK "authNoPriv" Select this if authorizat ion is required but no privacy protocols are req uired.  Select the authenticatio n protocol - MD5 or SHA  Enter the authenti[...]

  • Seite 100

    Chapter 5 : EMX Device Manag ement 91  Allow password auth entication onl y: Enables the password - based login only.  Allow public ke y authentication only: Enables the p ublic k ey- based login only.  Allow password and public ke y authentication: Enables both the password- and pu blic ke y-based login. This is the default. 5. Click OK t[...]

  • Seite 101

    Chapter 5 : EMX Device Manag ement 92 Enabling Service Advertisement The EMX advertises all enabled services that are reachable us ing the IP network. T his feature uses DNS-SD (Domain Nam e System- Service Discovery) and m DNS (m ulti cast DNS). T he advertised services are discovered by clients tha t have implem ented DNS -SD and mDNS. The advert[...]

  • Seite 102

    Chapter 5 : EMX Device Manag ement 93 2. T y pe the name or IP address of the m ail server in the Server Nam e field. 3. T y pe the port num ber for the SMT P server in the Port field. T he default is 25. 4. T y pe an em ail address for the sender i n the Sender Em ail Address field. 5. T y pe the number of email retries in the Num ber of Sending R[...]

  • Seite 103

    Chapter 5 : EMX Device Manag ement 94 Setting Up an EMX Using Bulk Configuration Use this feature if you have already set u p an EMX and are n ow setting up another. The Bulk Configuration feature l ets you save the settings of a configured EMX device t o your PC. You can use t his configuration file to :  Copy that configuration t o other EMX d[...]

  • Seite 104

    Chapter 5 : EMX Device Manag ement 95 Saving an EMX Conf iguration A source device is an already configured EMX device that is used to create a configuration f ile containing the se ttings that can b e shared between EMX devices. T hese settings includ e user and role configurations, event ru les, securit y settings, and so on. This file does NOT c[...]

  • Seite 105

    Chapter 5 : EMX Device Manag ement 96 Copying a EM X Configuration A target device is an EMX device that loads another EMX device's configuration file. Copying an EMX c onfiguration to a target dev ice adjusts that EMX device's settings to m atch those of the s ource EMX device. I n order to successfully copy an EMX configuration:  The[...]

  • Seite 106

    Chapter 5 : EMX Device Manag ement 97 The file is saved in the XM L forma t, and its content is encrypted using the AES-1 28 encryption algor ithm. To restore the EM X using a backup XM L file: 1. Choose Maintenance > Backup/Restore. T he Backup/Restore of Device Settings dialog op ens. 2. In the Copy Device Sett ings section, click Browse t o l[...]

  • Seite 107

    Chapter 5 : EMX Device Manag ement 98 5. To view the certif icate of the uploaded f irmware, click View Certificate. Optional . 6. To proceed with the u pdate, click Update Firmware. T he update m ay take several m inutes. Warning: Do NOT pow er off the EMX d evice during the up date. During the firm ware update:  A progress bar appears in the w[...]

  • Seite 108

    Chapter 5 : EMX Device Manag ement 99  Firmware upgrade resu lt 2. You may change the number of displa yed columns or r e- sort the list for better viewing th e data. 3. To view the details of any firmware upgrade e vent, select it and click Details, or simply doubl e-click the event. The Firm ware Update Details dialog appears, s howing det ail[...]

  • Seite 109

    Chapter 5 : EMX Device Manag ement 1 00 Pinging a Host The Ping tool is usef ul for check ing whether a host is acc essible through the network or Intern et. To ping a host: 1. Choose Maintenance > Network Diagnostics > Ping. The Pin g Network Host dialog ap pears. 2. In the Host Nam e field, type the name or IP address o f the host that you [...]

  • Seite 110

    Chapter 5 : EMX Device Manag ement 101 when you are directed b y Raritan T echnical Support. You can download th e diagnostic file fr om the EMX device to a c lient machine. The file is com pressed into a . tgz file and sh ould be sent to Raritan Technical Support for interpretat ion. This feature is acces sible onl y by users with Adm inistrative [...]

  • Seite 111

    Chapter 5 : EMX Device Manag ement 102 Rebooting the EMX You can rem otely reboot the EMX device via the web interf ace. Rebooting the EMX do es not reset the conf iguration of the device as is done during a factor y reset. Note: Rebooting the EMX deletes the snapsh ots taken via we bcam. To reboot th e device: 1. Choose Maintenance > Unit Reset[...]

  • Seite 112

    Chapter 5 : EMX Device Manag ement 103 2. Launch a term inal emulation program s uch as HyperTerm inal, Kermit, or PuTT Y, and open a windo w on the EM X. 3. Press (and release) the R eset button of the EMX device while pressing the Esc k ey of the k eyboard several times in rapid succession. A prom pt (=>) should appear after about one secon d.[...]

  • Seite 113

    104 In This Chapter Access Securit y Control ........................................................................ 104 Setting Up an SSL Cert ificate ................................................................ 118 Setting Up LDAP Aut hentication ........................................................... 123 Enabling and Editing the Securit[...]

  • Seite 114

    Chapter 6 : Security 105 Configuring the Firew all The EMX has a f irewall that you can conf igure to prevent specific IP addresses and ran ges of IP address es from acc essing the EMX device. By default the fire wall is disabled. To configu re the firewall: 1. Enable the fire wall. See Enabling t he Firewall (o n page 1 05 ). 2. Set the default po[...]

  • Seite 115

    Chapter 6 : Security 106 a. Click the IPv4 tab if neces sary. b. Ensure the Enable I Pv4 Access Control ch eckbox is selected. c. The default polic y is shown in the Default Polic y field. T o change it, select a different polic y from the drop-down l ist.  Accept: Accepts traf fic from all IPv4 address es.  Drop: Discards traf fic from all I[...]

  • Seite 116

    Chapter 6 : Security 107 To specif y an entire subnet or range of addresses, change the subnet mask accordingly. Note: Valid IP addres ses range from 0.0.0.0 t hrough 255.255.255.255. Make sure the IP addr esses entered are withi n the scope. To create firewall ru les: 1. Choose Device Settin gs > Security > IP Access Control. The Configure I[...]

  • Seite 117

    Chapter 6 : Security 108 Action Procedure Insert a rule between two existing rules  Select the rule abo ve which you want to insert a new rule. For example, to insert a ru le between rules #3 a nd #4, select #4.  Click Insert. T he "Insert new Rule" di alog appears.  T y pe an IP address an d subnet mask in the IP/Mask f ield. ?[...]

  • Seite 118

    Chapter 6 : Security 109 Editing Firewall Rules W hen an existing firewall rule requires upd ates of IP addres s range and/or policy, m odify them accordingl y. To modify a firew all rule: 1. Choose Device Settin gs > Security > IP Access Control. The Configure IP Access Control Settings dialo g appears. 2. To modif y the IPv4 firewall rules,[...]

  • Seite 119

    Chapter 6 : Security 110 Deleting Firewall Rules W hen any firewall rules bec om e obsolete or unnecessar y, remove them from the rules list. To delete a firew all rule: 1. Choose Device Settin gs > Security > IP Access Control. The Configure IP Access Control Settings dialo g appears. 2. To delete the IPv4 f irewall rules, cl ick the IPv4 ta[...]

  • Seite 120

    Chapter 6 : Security 111 3. To enable the user b locking feature, select t he "Block user on login failure" check box. 4. T y pe a num ber in the "Maxim um number of failed logins" field. T his is the maxim um number of failed logins the user is per m itted before the user's login is bloc ked from accessing the EMX device. [...]

  • Seite 121

    Chapter 6 : Security 112 Tip: If the desired time option is not listed, you can manually type the desired time in this f ield. For example, you can typ e "4 min" to set the time to 4 minu tes. 5. Click OK to save the cha nges. Tip: Keep the idle timeo ut to 20 minutes or less if possible. This r educes the number of idle sess ions connect[...]

  • Seite 122

    Chapter 6 : Security 113 Enabling Password Aging Password Aging determ ines whether us ers are required to ch ange passwords at regular in tervals. The default inter val is 60 da ys. To force users to chan ge passwords regul arly: 1. Choose Device Settin gs > Security > Passwor d Policy. T he Password Polic y dialog appears. 2. Select the Pas[...]

  • Seite 123

    Chapter 6 : Security 114 2. To enable the IPv4 f irewall, click the IP v4 tab, and s elect the Enable Role Based Acces s Control for IPv4 check box. 3. To enable the IPv6 f irewall, click the IPv6 tab, and select the Enable Role Based Acces s Control for IPv6 check box. 4. Click OK to save the cha nges. Changing the Default Policy The default polic[...]

  • Seite 124

    Chapter 6 : Security 115 Creating Role-Based Access Control Rules Role-based acces s control rules accept or drop traffic, based on the user's role and IP address . Like f irewall rules, the order of r ules is important, since the ru les are executed in num erical order. To create role-b ased access control rul es: 1. Choose Device Settin gs &[...]

  • Seite 125

    Chapter 6 : Security 116 Action Do this...  T y pe an ending IP ad dress in the Ending IP Address field.  Select a role from the drop- down list in the Role f ield. This rule applies to m embers of this role onl y.  Select Allow or Den y from the drop-down list in th e Policy field.  Allow: Accepts traff ic from the specifi ed IP addres[...]

  • Seite 126

    Chapter 6 : Security 117 Sorting Role-Based Access Control Rules Similar to firewall rules , the order of role -based access control rules determines which one of the rules m atching the sam e IP address is performed. To sort role-based access control rules: 1. Choose Device Settin gs > Security > Role Base d Access Control . The Configure Ro[...]

  • Seite 127

    Chapter 6 : Security 118 Setting Up an SSL Certificate Having an X.509 digita l certificate ensures that both pa rties in an SSL connection are who th ey say they are. To obtain a certif icate for the EMX , create a Cert ificate Signing Requ est (CSR) and subm it it to a certificate author ity (CA). After the CA processes the inform ation in the CS[...]

  • Seite 128

    Chapter 6 : Security 119 Field Type this informatio n Organization The registered nam e of your compan y. Organizational Unit The nam e of your department. Comm on Name The fully qualified dom ain nam e (FQDN) of your EMX device. Email Address An email address where you or another ad m inistrative user can be reached. Note: All fields in the S ubje[...]

  • Seite 129

    Chapter 6 : Security 120 Installing a CA-Signed Certificate After the CA provides a signed certificate acc ording to the C SR you submitted, you m ust install it on the EMX de vice. To install the certific ate: 1. Choose Device Settin gs > Security > SSL Cert ificate. T he Manage SSL Certificate dialog appears. 2. Click the New SSL C ertifica[...]

  • Seite 130

    Chapter 6 : Security 121 Field Type this informatio n Key Length Select the ke y length (bits) from the drop-down l ist in this field. A larger key length enh ances the securit y, but slows down the EMX device's response. Self Sign Ensure this checkbox is selected, w hich indicates that you are creating a self- signed certificate. Validity in [...]

  • Seite 131

    Chapter 6 : Security 122 Installing Existing Ke y and Certific ate Files If the SSL certificate a nd private ke y files are already availabl e, you can install them directl y without going through th e process of creating a CSR or a self-signed certif icate. Note: If you are using a SSL c ertificate that is part of a chain of certificates, each par[...]

  • Seite 132

    Chapter 6 : Security 123 Setting Up LDAP Authentication For security purposes , users attem pting to log in to the EMX must be authenticated. T he EMX supports the acces s using one of the fol lowing authentication m echanisms:  Local database of user profiles on t he EMX device  Lightweight Director y Access Protocol (LDAP) By default, the E[...]

  • Seite 133

    Chapter 6 : Security 124  If using a Microsoft Active Directory server, c onsult yo ur AD administrator for the name of the Act ive Directory Domain.  Bind Distinguished Nam e (DN) and pass word (if anonymous bind is NOT used)  The Base DN of the serv er (used f or searc hing for users)  The login nam e attribute (or Authori zationStrin[...]

  • Seite 134

    Chapter 6 : Security 125 8. SSL Port - T he default is 636. Either use the default port or specif y another port. This f ield is enabled when th e "LDAP over SSL" checkbox is s elected. 9. Use only trusted LDA P Server Certif icates - Sel ect this check box if you would like to use a trus ted LDAP serv er certificate f ile, that is, a cer[...]

  • Seite 135

    Chapter 6 : Security 126  Login nam e attribute (also called Auth orizationString)  User entry object clas s  User search subfi lter (also called BaseS earch) Note: The EMX w ill preoccupy the logi n name attribute an d user entry object class with default values, which shou ld not be changed unless required. 17. Active Directory Dom ain -[...]

  • Seite 136

    Chapter 6 : Security 127 Sorting the LD AP Access Order The order of the LDA P list determ ines the access prio rity of r emote LDAP/LDAPS ser vers. The EMX first tries to access the top LDAP/LDAPS ser ver in the list for aut hentication, then the n ext one if the access to the first one f ails, and so on until the EMX device succes sfully connects[...]

  • Seite 137

    Chapter 6 : Security 128 5. Click OK to save the cha nges. Deleting the LD AP Server Settings You can delete the auth entication settings of a specific LDA P/LDAPS server when the serv er is not availa ble or used for r emote authentication. To remove on e or multiple LD AP/LDAPS servers: 1. Choose Device Settin gs > Security > Authent icatio[...]

  • Seite 138

    Chapter 6 : Security 129 Enabling LD AP and Local Authentication S ervices To make authenticat ion function pr operly all the tim e -- even when external authentication is not available, you can enable both th e local and remote authe ntication services. W hen both authentication services ar e enabled, the EMX follows these rules for authentication[...]

  • Seite 139

    Chapter 6 : Security 130 4. Click OK.[...]

  • Seite 140

    131 In This Chapter Ev ent Rules and Actions ....................................................................... 131 Event Logging ........................................................................................ 158 Viewing the Comm unication Log ........................................................... 160 Event Rules and Actions A b[...]

  • Seite 141

    Chapter 7 : Event Rules, Event Actions and Application Logs 132 Creating an Event Rule The best wa y to create a new set of event rule, in seq uence, is:  Create actions for r esponding to one or m ultiple events  Create rules to determ ine what actions are tak en when these e vents occur Creating Rules After required actions are available, y[...]

  • Seite 142

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 133 Event types Radio buttons Numeric s ensor threshold-cross ing events, or the occurrence of the selected event -- true or false Available radio buttons include "Asserted," "Deasserted" and "Bot h."  Asserted: T he EMX takes the act ion only when the ev[...]

  • Seite 143

    Chapter 7 : Event Rules, Event Actions and Application Logs 134 Event types Radio buttons Network interface link state Available radio buttons include "L ink state is up," "Link state is do wn" and "Both."  Link state is up: The EMX tak es the action only when the networ k link state changes from down to up.  Lin[...]

  • Seite 144

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 135 Event types Radio buttons Server reachabilit y Available radio buttons include "Unreachable, " "Reachable," and "Both. "  Unreachable: T he EMX takes the ac tion onl y when an y specified server becom es inaccessible.  Reachable: T he EMX tak es th[...]

  • Seite 145

    Chapter 7 : Event Rules, Event Actions and Application Logs 136 Creating Actions The EMX com es with two built -in actions:  System Event Log Ac tion: This action records t he selected e vent in the internal log when t he event occurs.  System SNMP Notificati on Action: This acti on sends SNMP notifications to one or m ultiple IP addresses af[...]

  • Seite 146

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 137 Log an Event Message This option records th e selected e vents in the internal log. To create a log ev ent message: 1. Choose Device Settin gs > Event Rules. T he Event Rules Settings dialog opens. 2. Click the Actions tab. 3. Click New. 4. In the "Action nam e" field, t[...]

  • Seite 147

    Chapter 7 : Event Rules, Even t Actions and Application Logs 138 10. Use the slide bars to increase or decr ease the followin g:  Number of Snapshots - the num ber of snapshots to be included in the sequence of im ages that are tak en when the event occurs . For exam ple, you can specif y 10 images be taken once the event triggers the act ion. ?[...]

  • Seite 148

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 139 6. In the "Recipients em ail addresses" field, specif y the em ail address(es) of the recip ient(s). Us e a comm a to separate multiple email addresses. 7. To use the SMT P server specified in the SMTP Server Settings dialog, select the Use Def ault SMTP Serv er check box. [...]

  • Seite 149

    Chapter 7 : Event Rules, Event Actions and Appli cation Logs 140 a. In the Tim eout (sec) field, enter the inter val of time, in s econds, after which a new inform comm unication is resent if the firs t is not received. For ex ample, res end a new inform communication once ever y 3 seconds. b. In the Number of Retries field, enter the number of tim[...]

  • Seite 150

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 141 Security level Description "noAuthNoPriv" Select this if no authori zation or privac y protocols are needed.  Click OK "authNoPriv" Select this if authorizat ion is required but no privacy protocols are req uired.  Select the authenticatio n protocol - MD5 o[...]

  • Seite 151

    Chapter 7 : Event Rules, Event Actions and Application Logs 142 7. In the Port field, specif y an appropriate port number. 8. Click OK to save the n ew action. 9. Click Close to quit t he dialog. Send SMS Message You can configure em ails to be sent when an event occurs and can custom ize the message. Messages consist of a combination of f ree text[...]

  • Seite 152

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 143 Click the Inform ation icon to open the Event Context Inf ormation dialog, which contains a list of placeholders and their definitions. See Email and S MS Message Placeholder s (on pa ge 145 ) for more details. Note: Only English is s upported for SMS mes sages. For Turk ish characte[...]

  • Seite 153

    Chapter 7 : Event Rules, Event Actions and Application Logs 144 3. Click New. 4. In the "Action nam e" field, type a ne w name f or the action. The default name is Ne w Action <num ber>, where <num ber> is a sequential num ber based on how m any actions are alread y created. 5. In the Action field, click the drop- down arrow a[...]

  • Seite 154

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 145 Email and SMS Message Placeholders Following are placeh olders that can be used in custom event email messages. Note: Click the Inform ation icon to o pen the Event Context Information dialog, wh ich contains a list of placeholders and their definitions. Note: The LHX plac eholders a[...]

  • Seite 155

    Chapter 7 : Event Rules, Event Actions and Application Logs 146 Placeholder Description [CONFIGVALUE] The new value of a param eter [DATETIME] The hum an readable timestam p of the event occurrence [DEVICEIP] The IP address of the device, the event occurred on. [DEVICENAME] The nam e of the device, the event occ urred on [EXTSENSORCHANN EL] The cha[...]

  • Seite 156

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 147 Placeholder Description [LHXSUPPORTENA BLED] The Schroff LHX Support state [MONITOREDHOST ] The nam e or IP address of a m onitored host [OLDSENSORST ATE] The num eric ID of the previous s ensor state [OLDVERSION] The firm ware version the device is being upgraded from [OUTLET POLE] [...]

  • Seite 157

    Chapter 7 : Event Rules, Event Actions and Application Logs 148 Placeholder Description [UMTARGETUSER] The user, an action was triggered f or [USERIP] The IP address, a user c onnected fr om [USERNAME] The user who trigger ed an action [VERSION] The firm ware version the device is upgrading to [WIRESENSOR] The wire sensor nam e Default Log Messages[...]

  • Seite 158

    Ch apter 7 : Event Rule s , Event A ctions and Appli cation Logs 149 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* Device > Event log cleare d Event log cleared b y user '[USERNAME]' f rom host '[USERIP]'. Device > Bulk c onfiguration saved Bulk configurat[...]

  • Seite 159

    Chapter 7 : Event Rules, Event Actions and Application Logs 150 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* in '[USERIP]' logged in. '[USERIP]' logged o ut. User Activity > * > Authentication failure Authentication failed f or user '[USERNAME]'[...]

  • Seite 160

    Chapter 7 : Ev ent Rules, Event Actions and Application Log s 151 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* alarmed. '[EXTSENSORSLOT ]' is no longer alarmed. Server Monitoring > * > Monitored Server '[SERVER]' is n ow being monitored. Server '[SER[...]

  • Seite 161

    Chapter 7 : Event Rules, Event Actions and Application Logs 152 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* LHX > Sensor > Una vailable Sensor '[LHXSENSORI D]' on LHX at [PORTT YPE] port '[PORTID]' unavailable. Sensor '[LHXSENSORI D]' on LHX at[...]

  • Seite 162

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 153 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* Auxiliary Port 2 > Po wer suppl y LHX at [PORT TYPE] port '[PORTID]' at power suppl y '[LHXPOW ERSUPPLYID]'. LHX > Threshold Hum idity Auxiliary[...]

  • Seite 163

    Chapter 7 : Event Rules, Event Actions and Application Logs 154 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* Power Logic Device > * > Se nsor > * > Be low lower critical threshold Sensor '[PLSENSORN AME]' on Po wer Logic Device at [PORTT YPE] port '[PORT[...]

  • Seite 164

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 155 5. Select "S y stem Event Log Action" as we intend to record th is event in the internal log when the specified events occ ur. Sample Sensor-Level Event Rule In this exam ple, we want the EMX device t o send SNMP traps t o the SNMP manager when the reading of the temperatur[...]

  • Seite 165

    Chapter 7 : Event Rules, Event Actions and Application Logs 156 4. Select "<An y sub-event>" because we want to specif y all events related to the sensor con nected to sensor port #1, including the sensor's unavailable s tate and threshold -crossing events -- "Above upper critical, "Above up per warning," "B[...]

  • Seite 166

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 157 4. To change the event, cl ick the desired tab in the Event f ield and select a different item from the pull -down m enu or subm enu. For exam ple, in a user activity event ru le for the "ad min" user, you can click the "adm in" tab to displa y a pull-do wn submen[...]

  • Seite 167

    Chapter 7 : Event Rules, Event Actions and Application Logs 158 Note: If you do not click Save before quitting the current settings page, a message appears . Then click Yes t o save the changes, Discard to abort the ch anges or Cancel to r eturn to the curr ent settings page. 6. Click Close to quit t he dialog. Deleting an Event Ru le or Action If [...]

  • Seite 168

    Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 159 Viewing the Local Event Log You can view up to 2,00 0 historical e vents that occurred to t he EMX device in the local e vent log. W hen the log already contains 2,000 entries, each new entry over writes the oldest entr y. To display the local log : 1. Choose Maintenance > View Ev[...]

  • Seite 169

    Chapter 7 : Event Rules, Event Actions and Application Logs 160 2. Click Clear Event Log. 3. Click Close to quit t he dialog. Viewing the Communication Log The EMX allows you to inspec t all comm unications occurred between the EMX device and its grap hical user int erface (GUI). T he inform ation is usually useful for a tech nical support engine e[...]

  • Seite 170

    161 In This Chapter Overview ................................................................................................ 161 EMX and PX2 PDU Cas cading Connect ions ........................................ 162 Server Accessibilit y ............................................................................... 164 Configuring the Serial Port .[...]

  • Seite 171

    Chapter 8 : Ma naging Ex ternal Devices 162 EMX and PX2 PDU Cascading Connections Up to four (4) devices are s upported as part of a dais y chain. Specifically, a EMX c an have up to thre e (3) additional EMXs c onnected to it, or up to three (3) PX2 devices conn ected to it. Note: For help on sett ing up and configur ing PX2 devic es, see the PX2 [...]

  • Seite 172

    Chapter 8 : Ma naging Ex ternal Devices 163 Cascading EM X Devices Note: When cascad ing devices, use a wired network connection . Wireless connections are n ot supported whe n cascading de vices. To connect EM X devices to an EM X device: 1. If needed, upgrade th e EMX f irmware of each device that will be part of the chain. 2. Plug a USB cable in[...]

  • Seite 173

    Chapter 8 : Ma naging Ex ternal Devices 164 3. If you are adding an ad ditional PX2 to the c hain, plug a USB cab le into USB-B port on th e additional PX, the n plug the ot her end into USB-A on the PX2 that is alread y connected to the master EMX. U p to three (3) PX2s can be connected to the m aster EMX. Server Accessibility You can monitor whet[...]

  • Seite 174

    Chapter 8 : Ma naging Ex ternal Devices 165 Adding IT Devices f or Ping M onitoring You can have the EMX monitor the acc essibility of any IT equipment, such as DB servers, rem ote authen tication servers or any power distribution unit (PDU). T he EMX sup ports m onitoring a max imum of 8 devices. The default ping sett ings ma y not be suitable for[...]

  • Seite 175

    Chapter 8 : Ma naging Ex ternal Devices 166 Field Description W ait Time (in seconds) before Resuming Pinging The wait tim e before the EMX resum es pinging after the m onitored equipm ent is declared unreacha ble. Valid range is 1 to 1200 (seconds). 5. Click OK to save the cha nges. 6. To add m ore IT devices, repeat Ste ps 2 to 5. 7. Click Close [...]

  • Seite 176

    Chapter 8 : Ma naging Ex ternal Devices 167 5. In the W ait Time (in seconds) before Res uming Pinging f ield, type 60 to make the EMX s tops pingin g the target PDU for 60 seconds (1 minute) after the PDU inaccess ibility is declared. After 60 sec onds, the EMX will re-pi ng the target PDU. Step 2: Create an event rule to send SNM P notifications [...]

  • Seite 177

    Chapter 8 : Ma naging Ex ternal Devices 168 Deleting Ping M onitoring Settings W hen it i s not necess ary to monitor the acc essibility of an y IT device, just remove it. To delete ping mo nitoring settings fo r an IT dev ice: 1. Choose Device Settin gs > Server Reachab ility. The Server Reachability dialog ap pears. 2. Select the IT device who[...]

  • Seite 178

    Chapter 8 : Ma naging Ex ternal Devices 169 Configuring the Serial Port You can change the bit- rate of the seri al port labeled CO NSOLE / MODEM on the EMX device. T he default bit-r ate is 115200 bps. Bit- rate adjustm ent may be necessary only when you integrate the EMX with another Raritan prod uct via the serial interf ace. Change the bi t -ra[...]

  • Seite 179

    Chapter 8 : Ma naging Ex ternal Devices 170 2. Log in to the EMX web interface. T he EMX should have detected the connected sensors, an d display them in the web interface. 3. Identify each sensor thr ough the sensor's s erial number. See Identifying Environmental Sensors ( on page 170 ). 4. The EMX should autom atically manage the detected se[...]

  • Seite 180

    Chapter 8 : Ma naging Ex ternal Devices 171 Match the serial num ber from the tag to those listed in the sensor t able. Note that the inform ation in the "# " and "Port" colum ns is different. Column Information # The ID num ber assigned to each environm ental sensor. Port The num ber of the SENSOR port where each environmental [...]

  • Seite 181

    Chapter 8 : Ma naging Ex ternal Devices 172 Note: To identify all det ected sensors, s ee Id entifying Environmental Senso rs (on p age 170 ). 4. Click Manage. The " Manage sensor <ser ial number> (<sensor type>)" dialog appears, where <serial num ber> is the sensor's serial number and <sensor t ype> is the se[...]

  • Seite 182

    Chapter 8 : Ma naging Ex ternal Devices 173 3. Select the sensor that you want to conf igure. 4. Click Setup. T he "Setup of external s ensor <serial num ber> (<sensor type>)" dialog appears, where <serial num ber> is the serial num ber of this sensor and <sensor type> is the s ensor's t ype. Tip: You can also[...]

  • Seite 183

    Chapter 8 : Ma naging Ex ternal Devices 174 Setting the Z Coordinate Format You can use either the n umber of rack units or a descriptive text to describe the vertical locat ions (Z coordinates) of env ironm ental sensors. To determine the Z coo rdinate format: 1. In left navigation panel, cl ick the EMX folder. The Settings page opens. Note: The E[...]

  • Seite 184

    Chapter 8 : Ma naging Ex ternal Devices 175 Describing the Sensor Location Use the X, Y and Z co ordinates to desc ribe each sensor's physical location. You can use th ese location values to trac k records of environmental cond itions in fixed locat ions around your IT equipment. The X, Y and Z values act as additional attrib utes and are not [...]

  • Seite 185

    Chapter 8 : Ma naging Ex ternal Devices 176 Setting Data Logging The EMX can store 120 measurem ents for each sensor in a m em ory bu ffer. This m emory buffer is k nown as the data log. Sensor r eadings in the data log can be retr ieved using SNM P. You can configure h ow often m easurements are written into the d ata log using the Measurem ents P[...]

  • Seite 186

    Chapter 8 : Ma naging Exter nal Devices 177  To select partial sens ors, select the correspo nding check boxes of the desired sensors in the Logging Enabled c olumn.  To select all sensors , click Enable All or Enable All in Page.  To deselect all sensors , click Disable All or Disable All in Page. 5. Click OK to save the cha nges. Informa[...]

  • Seite 187

    Chapter 8 : Ma naging Ex ternal Devices 178 To view both of managed and unmanaged environmental sensors: 1. If the EMX folder is not expanded, expand it to show al l components. Note: The EMX fold er is named "EMX" by default. The name changes after customi zing the device name. S ee N aming the EM X Device (on page 72 ). 2. Click the Ext[...]

  • Seite 188

    Chapter 8 : Ma naging Ex ternal Devices 179 States of Managed Sensors An environmental sensor s hows the s tate after being m anaged. Available sensor states vary depending on the sensor t ype -- num eric or discrete sensors. For example, a con tact closure s ensor is a discr ete (on/off) sensor s o it switches between three stat es only -- unavail[...]

  • Seite 189

    Chapter 8 : Ma naging Ex ternal Devices 180 "normal" State This state indicates the se nsor is in the norm al state. For a contact closure se nsor, usuall y this state is the norm al state you have set.  If the normal state is s et to Norm ally Closed, the normal state m eans the contact closure s witch is closed.  If the normal sta[...]

  • Seite 190

    Chapter 8 : Ma naging Ex ternal Devices 181 "below lower critical" State This state m eans a numeric sensor' s reading is below the lower critical threshold as indicate d below: Reading < Lower Cr itical Thres hold "below lower warning" State This state m eans a numeric sensor' s reading is below the lower warning t[...]

  • Seite 191

    Chapter 8 : Ma naging Ex ternal Devices 182 After a sensor is rem oved from management, the ID num ber assigned to that sensor is released and can be aut omaticall y assigned to any newly - detected sensor. Threshold Information Setting and enabling th e thresholds causes the EMX to gen erate alert notifications when it det ects that an y sensor&ap[...]

  • Seite 192

    Chapter 8 : Ma naging Ex ternal Devices 183 Hysteresis Lower W arning Reset Lower W arning Threshold Hysteresis Lower Critical Reset Lower Critical T hreshold The hysteresis values d efine a res et threshold. For upper thresholds, the measurem ent must fall past this reset thresh old before a deass ertion event is generated. For lower thresholds, t[...]

  • Seite 193

    Chapter 8 : Ma naging Ex ternal Devices 184 Webcams The EMX supports webcams c onnected to it, allowin g you to view vide o or snapshots of the are a surrounding the webcam. T he following webcams are supported:  Logitech ® W ebcam ® Pro 9000, Model 960- 000048  Logitech Quick Cam Deluxe for Notebo oks, Model 960 -000043  Logitech Quick [...]

  • Seite 194

    Chapter 8 : Ma naging Ex ternal Devices 185 Configuring Webcams Before you can configure a webcam , it must be connected t o the EMX. See Connecting a Logite ch Webcam (Opt ional) (on page 41 ). To config ure a webcam: 1. In the navigation tree, c lick on the W ebcam Management fold er. The W ebcam Management page opens. 2. Click on the webcam you [...]

  • Seite 195

    Chapter 8 : Ma naging Ex ternal Devices 186 Configuring Webcam Storage By default, when a snapsh ot is taken using the Store Sna pshot to W ebcam Storage feature, it is stored loca lly on the EMX . Up to ten (10) images can be store d on the EMX at onc e. To save m ore than 10 snapshots, save the im ages on a Comm on Internet File System /Sam ba. N[...]

  • Seite 196

    Chapter 8 : Ma naging Ex ternal Devices 187 Viewing Webcam Snapshots and Vid eos By default, once a webcam is att ached, it is set to tak e snapshots ever y five (5) seconds. Cha nge the webcam settings and/or switch bet ween snapshots and live v ideo from the W ebcam Setup dialog b y clicking on a webcam in the navigat ion tree and then click ing [...]

  • Seite 197

    Chapter 8 : Ma naging Ex ternal Devices 188 In the snapshot m ode, a snapshot mode icon appears on the top -left corner of the im age along with the num ber of im ages the webcam is set to take per second. In the video m ode, a video mode icon appears on the top-left corner of the image. Switch between sna pshot mode and video mode, click Setup and[...]

  • Seite 198

    Chapter 8 : Ma naging Ex ternal Devices 189 To take a snapshot fro m w ebcam: 1. In the navigation tree, c lick on the webcam y ou want to take a snapshot with. T he webcam im age is displayed in the right pane. The webcam must be in snapshot m ode in order to take snapsh ots. If the webcam is in video mode, click Setup in the righ t pane above th [...]

  • Seite 199

    Chapter 8 : Ma naging Ex ternal Devices 190 3. Use the navigation icons t o m ove through each snapshot, or enter a specific page num ber to jum p to that snapshot snapshot page. 4. Click the Refresh icon to ref resh the page. New snap shots are displayed if the y are available. To delete snapshot s manually:  Delete snapshots b y selecting the [...]

  • Seite 200

    Chapter 8 : Ma naging Ex ternal Devices 191  The video remains op en in a secondar y Live Preview windo w in the User A's EMX interf ace. So long as t he secondar y Live Preview window is open in User A's interface, even af ter User A logs out of the EMX interface or th e session tim es out, the link is ava ilable. Best Practice As a b[...]

  • Seite 201

    Chapter 8 : Ma naging Ex ternal Devices 192 Schroff LHX Heat Exchangers After connecting the Schroff ® LHX heat exchanger to the E MX device via the Feature port or the RS-485 port, the EMX detects LHX. The LHX is viewed under the Fea ture folder or the Aux iliary Port folder in the navigation tree, depe nding on the port it is conn ected to. Note[...]

  • Seite 202

    Chapter 8 : Ma naging Ex ternal Devices 193 Naming a Heat Exch anger To help identif y an LHX heat exchanger in th e EMX web interf a ce, assign a name to it. T he custom ized LHX heat exchan ger's name is followed by the device t ype and RS -485 port num ber in parentheses. The web interface pro vides two types of s etup dialogs for nam ing a[...]

  • Seite 203

    Chapter 8 : Ma naging Ex ternal Devices 194 Configuring LHX T emperature and F an Thresholds An LHX heat exchan ger is im plemented with various sensors for detecting the air tem perature, water tem perature, and f an speed. You can set thresholds f or these sensors so that th e EMX alerts you when any sensor readings are g etting close to a critic[...]

  • Seite 204

    Chapter 8 : Ma naging Ex ternal Devices 195 Viewing the Summary Both the Dashboard and Auxiliary Port pag es display the summ ary of all connected LHX heat exchangers, includ ing the RS -485 port number where each heat ex changer is connected, and each heat exc hanger's status. If any LHX heat exchan ger is highlighted in red in the sum mary, [...]

  • Seite 205

    Chapter 8 : Ma naging Ex ternal Devices 196 If any LHX sensor read ing reaches or crosses the critical or warni ng threshold, that sensor r eading row is high lighted in red or yellow. See Readings Highlighted in Yellow or Red (on p age 58 ). Device States and Icon Variations The EMX web interf ace changes icons to repres ent diff erent statuses of[...]

  • Seite 206

    Chapter 8 : Ma naging Ex ternal Devices 197 Operating Hours Operating hours are the accumulative tim e since the LHX heat exchanger is first c onnected to the EMX dev ice and turned ON. The EMX web interf ace displa ys the operating hours both f or the heat exchanger and its fans . Operating hour inf ormation is located in the Statistics section of[...]

  • Seite 207

    Chapter 8 : Ma naging Ex ternal Devices 198 3. If you clicked S witch Off in the previous step , a dialog appears, prompting you to conf irm the operati on. Click Yes to turn it off or No to abort the operat ion. The heat exchanger's ico n shown in the web interface c hanges after being turned on or of f. See Devic e States and Icon Variations[...]

  • Seite 208

    Chapter 8 : Ma naging Ex ternal Devices 199 Configuring the PM 710 and Configuring Thresh old Settings Note: All settings are con figured on a per p ort basis. If you discon nect a PM710 from one E MX port and connect it to another, you m ust reconfigure the settin gs. However, if you d isconnect a P M710 from a port and then plug it back in to the[...]

  • Seite 209

    Chapter 8 : Ma naging Ex ternal Devices 200 3. Click on Reset All Min / Max Values at the bottom left of the Sensors section of the page. 4. Click OK to confirm . All values are res et. Clearing the PM 710 Energy Accumulators The PM710 saves en ergy accum ulator values, which can b e reset as needed. Review your PM710 docum entation for additional [...]

  • Seite 210

    201 In This Chapter Overview ................................................................................................ 201 Enabling SNMP ..................................................................................... 202 Configuring SNMP N otifications ............................................................ 204 Configuring Users f[...]

  • Seite 211

    Chapter 9 : U sing SNMP 202 Enabling SNMP By default, SNMP v1/v2c is enabled on th e EMX so the EMX can communicate with an S NMP m anager. If you have disabled the SNM P, it must be enabled to com municate with an SN MP m anager. Note that read-o nly access is enabled and t he comm unity string is public. To enable SNM P: 1. Choose Device Settin g[...]

  • Seite 212

    Chapter 9 : U sing SNMP 203 a. sysContact - the co ntact person in charge of the s ystem being contacted b. sysName - the name assigned to the s ystem c. sysLocation - the location of the system 5. Select the MIB to be downloaded. The S NMP MIB for your EMX is used by the SNMP m anager. Important: You mus t download the SN MP MIB for your E MX to u[...]

  • Seite 213

    Chapter 9 : U sing SNMP 204 Configuring SNMP Notifications The EMX autom atically keeps an internal log of events that oc cur. See Event Rules and Actions (on page 1 31). These e vents can also be used to send SNMP v2c or v3 not ifications to a third -party destination. The EMX provides you with the ability to creat e SNMPv2c and SNMPv3 TRAP comm u[...]

  • Seite 214

    Chapter 9 : U sing SNMP 205 SNMPv2c Notif ications To configu re the EMX to send SNM P notifications: 1. Choose Device Settin gs > Network Serv ices > SNMP. T he SNMP Settings dialog appears. 2. Enter the MIB-II s ystem group inform ation, if applica ble: a. sysContact - the co ntact person in charge of the system being contacted b. sysName -[...]

  • Seite 215

    Chapter 9 : U sing SNMP 206 a. In the Tim eout (sec) field, enter the inter val of time, in s econds, after which a new inform comm unication is resent if the firs t is not received. For exam ple, resend a ne w inform communication once ever y 3 seconds. b. In the Number of Retries field, enter the number of tim es you want to resend the inf orm co[...]

  • Seite 216

    Chapter 9 : U sing SNMP 207 a. sysContact - the co ntact person in charge of the system being contacted b. sysName - the name assigned to the s ystem c. sysLocation - the location of the system 3. Select the MIB to be downloaded. The S NMP MIB for your EMX is used by the SNMP m anager. Important: You mus t download the SN MP MIB for your E MX to us[...]

  • Seite 217

    Chapter 9 : U sing SNMP 208 Security level Description "noAuthNoPriv" Select this if no authori zation or privac y protocols are needed.  Click OK "authNoPriv" Select this if authorizat ion is required but no privacy protocols are req uired.  Select the authenticatio n protocol - MD5 or SHA  Enter the authenticat ion pa[...]

  • Seite 218

    Chapter 9 : U sing SNMP 209 5. Click OK to save the cha nges. The user is no w set up for encr ypted SNMP v3 comm unication. SNMP Gets and Sets In addition to sending tr aps, the EMX is able to receive SNMP g et and set requests from third-party SNMP m anagers.  Get requests are used to re trieve inform ation about the EM X, such as the system l[...]

  • Seite 219

    Chapter 9 : U sing SNMP 210 4. Click Save to save the file onto your com puter. To dow nload the file from the Dev ice Information di alog: 1. Choose Maintenance > Device Inform ation. The Devic e Inform ation dialog appears. 2. Click the "download " link in the EMD -MIB, ASS ETMANAGEMENT - MIB or LHX-MIB f ield to download the desired[...]

  • Seite 220

    Chapter 9 : U sing SNMP 211 SNMP Sets and Thresholds Some objects c an be configured from the SNMP manager using SNMP set comm ands. Objects that can be configured have a MAX-ACC ESS level of "read-wr ite" in the MIB. These objects include t hreshold objects, which c auses the EMX to generate a warning an d send an SNMP trap when certain [...]

  • Seite 221

    212 In This Chapter About the Interfac e ................................................................................ 212 Logging in to CLI ................................................................................... 213 Restricted Service Agre ement ............................................................... 216 Help Comm and ......[...]

  • Seite 222

    Chapter 10 : U s ing the Co mmand Line Inter f ace 213 Logging in to CLI Logging in via H yperTerminal over a loc al connection is a littl e different than logging in using S SH or Telnet. If a security login agre ement has been enab led, you m ust accept the agreement in order t o complete the login. Use rs are authenticated first and the security[...]

  • Seite 223

    Chapter 10 : U s ing the Co mmand Line Inter f ace 214 5. T y pe a password and pres s Enter. The p assword is case sens itive, so mak e sure you capitalize the correct let ters. After properly entering the password, th e # or > s ystem prompt appears. See Differ ent CLI Modes and Prompts (on page 21 5) in the EMX User Gu ide for details. Tip: T[...]

  • Seite 224

    Chapter 10 : U s ing the Co mmand Line Inter f ace 215 5. After properly entering the password, th e # or > s ystem prompt appears. See Differ ent CLI Modes and Prompts (on page 21 5) in the EMX User Gu ide for details. Tip: The "Last Login " information, includ ing the date and time, is a lso displayed if the same user profile was onc[...]

  • Seite 225

    Chapter 10 : U s ing the Co mmand Line Inter f ace 216 Restricted Service Agreement Welcome to EMX CLI! Last login: 2012-08-06 04:58:42 EDT [CLI (Telnet) from ] # show security details [...] Restricted Service Agreement: disabled Restricted Service Agreement Banner Content: Unauthorized access prohibited; all access and activities not explicitly au[...]

  • Seite 226

    Chapter 10 : U s ing the Co mmand Line Inter f ace 217 # show security details [...] Restricted Service Agreement: enforced Restricted Service Agreement Banner Content: This is my new restricted service agreement. # - > on login (with newly configured banner) Login for EMX CLI Username: admin Password: RESTRICTED SERVICE AGREEMENT ==============[...]

  • Seite 227

    Chapter 10 : U s ing the Co mmand Line Inter f ace 218 Help Command The help or ? comm and shows a list of m ain CLI com mands available for the current m ode. This is helpful whe n you are not fam iliar with the CLI commands. The help command syntax under the administr ator mode is: # help OR # ? The help command syntax under the config uration mo[...]

  • Seite 228

    Chapter 10 : U s ing the Co mmand Line Inter f ace 219 Network Configu ration This comm and shows all network configuration, such as the IP a ddress, networking m ode, and MAC address . # show network IP Configuration This comm and shows the IP-related co nfiguration onl y, such as IPv4 and IPv6 configuration, address (es), gate way, and subnet m a[...]

  • Seite 229

    Chapter 10 : U s ing the Co mmand Line Inter f ace 220 Wireless Configuration This comm and only shows the wireless configuration of the EMX device, such as the SSID p arameter. # show network wireless To show detailed inf ormation, add the p arameter "details" to the end of the comm and. # show network wireless details Network Service Se[...]

  • Seite 230

    Chapter 10 : U s ing the Co mmand Line Inter f ace 221 Asset Sensor Sett ings This comm and shows the asset sensor s ettings, such as the tota l number of rack units (tag ports), asset sensor s tate, num bering mode, orientation, available tags a nd LED color sett ings. # show assetStrip <n> Variables:  <n> is one of the options: all[...]

  • Seite 231

    Chapter 10 : U s ing the Co mmand Line Inter f a ce 222 Environmental Senso r Information This comm and syntax shows the environm ental sensor's information. # show externalsensors <n> External sensor 3 ('Temperature 1') Sensor type: Temperature Reading: 31.8 deg C (normal) Serial number: AEI0950133 Description: Not configured [...]

  • Seite 232

    Chapter 10 : U s ing the Co mmand Line Inter f ace 223 Deassertion hysteresis: 1.0 deg C Assertion timeout: 0 samples Variables:  <n> is one of the options: all , or a num ber. Option Description all Displays the inform ation for all environm ental sensors. Tip: You can also type th e command without adding this option "all" t o [...]

  • Seite 233

    Chapter 10 : U s ing the Co mmand Line Inter f ace 224 Environmental Senso r Thresho ld Information This comm and syntax shows the specif ied environmental sensor's threshold-related inf ormation. # show sensor externalsensor <n> To show detailed inf ormation, add the p arameter "details" to the end of the comm and. # show sens[...]

  • Seite 234

    Chapter 10 : U s ing the Co mmand Line Inter face 225 Serial #config Entering configuration m ode Apply - save and act ivate changed set tings and lea ve config m ode Cancel - leave conf ig mode without app lying the chang ed settings config:# serial {baudRate [1200|2400|4800|9600|19200|38400|57600|115200]} Note: If this comman d is executed during[...]

  • Seite 235

    Chapter 10 : U s ing the Co mmand Line Inter f ace 226 Existing User Profiles This comm and shows the data of one or all ex isting user profiles. # show user <user_name> To show detailed inf ormation, add the p arameter "details" to the end of the comm and. # show user <user_name> details Variables:  <user_name> is th[...]

  • Seite 236

    Chapter 10 : U s ing the Co mmand Line Inter f ace 227 Existing Roles This comm and shows the data of one or all ex isting roles. # show roles <role_name> Variables:  <role_name> is the nam e of the role whos e perm issions you want to query. The variable ca n be one of the following options: Option Description all This option shows [...]

  • Seite 237

    Chapter 10 : Us ing the Co mmand Line Inter face 228 Rack Unit Settings of an Asset Senso r For the Raritan asset s ensor, a rack unit refers to a tag port. T his command sho ws the settings of a specif ic rack unit or all rac k units on an asset sensor, such as a rack unit's LED co lor and LED m ode. # show rackUnit <n> <rack_unit>[...]

  • Seite 238

    Chapter 10 : U s ing the Co mmand Line Inter f ace 229 Blade Extension Strip Settings This comm and shows the information of a bla de ext ension strip, including the total num ber of tag ports, and if available, the ID (barcod e) number of an y connected tag. # show bladeSlot <n> <rack_unit> <blade_slot> Variables:  <n> i[...]

  • Seite 239

    Chapter 10 : U s ing the Co mmand Line Inter f ace 230 History Buffer Length This comm and syntax shows the length of the history buff er for storing the history comm ands. # show history bufferlength Displayed informat ion:  The current histor y buffer length is displa yed. Examples This section provides exam ples of th e show comm and. Example[...]

  • Seite 240

    Chapter 10 : U s ing the Co mmand Line Inter f ace 231 Example 2 - In -Depth Security Information More inform ation is displayed when t yping the show s ecurity details command. Configuring the EMX Device and Network To configure the EMX d evice or network settings through the CLI, you must log in as the adm inistrator. Entering the Configu ration [...]

  • Seite 241

    Chapter 10 : U s ing the Co mmand Line Inter f ace 232 Quitting the Con figuration Mode (on page 321 ). Device Configuration Co mmands A device configuration com m and begins wit h emd . You can use the device configuration com mands to change t he settings that appl y to the whole EMX device. The comm ands are case sensitive so e nsure you capital[...]

  • Seite 242

    Chapter 10 : U s ing the Co mmand Line Inter f ace 233 Setting the Z Coordinate Format for Environmental Sensors This comm and syntax enables or disables th e use of rack units f or specifying the height (Z c oordinate) of en vironmental sensors . config:# emd externalSensorsZCoordinateFormat <option> Variables:  <option> is one of t[...]

  • Seite 243

    Chapter 10 : U s ing the Co mmand Line Inter f ace 234 For more inf ormation, see Setting D ata Logging (o n page 17 6 ). Example The following comm and enables the dat a logging feat ure. config:# emd dataRetrieval enable Setting the Data Logging Measurements Per Entry This comm and syntax defines the num ber of measurem ents accumulated per log e[...]

  • Seite 244

    Chapter 10 : U s ing the Co mmand Line Inter f ace 235 Setting the Networking Mode If your EMX device is im plem ented with both of the wired a nd wireless networking m echanisms, you must determine which m echanism is enabled for net work connectivity before f urther configuring networking parameters. This comm and syntax enables the wired or wire[...]

  • Seite 245

    Chapter 10 : U s ing the Co mmand Line Inter f ace 236 Enabling IPv4 or IPv6 This comm and syntax determ ines which IP protocol is enabled on the EMX. config:# network ip proto <protocol> Variables:  <protocol> is one of the o ptions: v4On ly , v6Only or both . Mode Description v4Only Enables IPv4 onl y on all interf aces. This is th[...]

  • Seite 246

    Chapter 10 : U s ing the Co mmand Line Inter f ace 237 Example The following comm and determ ines that only IPv4 address es returned by the DNS server are used. config:# network ip dnsResolverPreference preferV4 Setting the Wireless Parameters You must configure wireless param eters, including Service Set Identif ier (SSID), authentication m ethod,[...]

  • Seite 247

    Chapter 10 : U s ing the Co mmand Line Inter f ace 238 Setting the Authentication Method This comm and syntax sets the wireless authentication m ethod to either PSK or Extensible A uthentication Prot ocol (EAP). config:# network wireless authMethod <method> Variables:  <method> is one of the authentication m ethods : PS K or EAP . Me[...]

  • Seite 248

    Chapter 10 : U s ing the Co mmand Line Inter face 239 Setting the EAP Parameters W hen the wireless authentication m ethod is set to EAP, you must configure EAP authentica tion param eters, including outer authe ntication, inner authentication, E AP identit y, password, and CA certif icate. Setting the Outer Authentication This comm and syntax dete[...]

  • Seite 249

    Chapter 10 : U s ing the Co mmand Line Inter f ace 240 Setting the E AP Identity This comm and syntax determines the EA P identity. config:# network wireless eapIdentity <identity> Variables:  <identity> is your user name for the EAP authe ntication. Example The following comm and sets the EAP identit y to "eap_user01. " co[...]

  • Seite 250

    Chapter 10 : U s ing the Co mmand Line Inter f ace 241 d. Press Enter. Tip: To remove an existi ng CA certificate, sim ply press Enter wit hout typing or pasting anyth ing when the sy stem prompts y ou to input the certificate contents. 3. If the certificate is val id, the system shows the comm and prompt " config:# " again. If not, it s [...]

  • Seite 251

    Chapter 10 : U s ing the Co mmand Line Inter face 242 MIICjTCCAfigAwIBAgIEMaYgRzALBgkqhkiG9w0BAQQwRTELMAk GA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aW NzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjAmFxE5NjA1MjgxM zQ5MDUrMDgwMBcROTgwNTI4MTM0OTA1KzA4MDAwZzELMAkGA1UE BhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGF uZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEgMAk[...]

  • Seite 252

    Chapter 10 : U s ing the Co mmand Line Inter f ace 243 Configuring the IPv4 Parameters An IPv4 configuration com m and begins with net work ipv4 . The comm ands are case sensit ive so ensure you capitalize them correctly. Setting the IPv4 Configuration Mode This comm and syntax determines the IP conf iguration m ode. config:# network ipv4 ipConfigu[...]

  • Seite 253

    Chapter 10 : U s ing the Co mmand Line Inter f ace 244 Example The following comm and sets the IPv4 preferr ed host nam e to "m y- v4host." config:# network ipv4 preferredHostName my-v4host Setting the IPv4 Address After selecting the sta tic IP configuration m ode, you can use this command s yntax to assign a perm anent IP address to the[...]

  • Seite 254

    Chapter 10 : U s ing the Co mmand Line Inter f ace 245 Setting the IPv4 Gateway After selecting the sta tic IP configuration m ode, you c an use t his command s yntax to specify the gatewa y. config:# network ipv4 gateway <ip address> Variables:  <ip address> is the IP address of the gate way. The value ranges from 0.0.0.0 to 255.25 [...]

  • Seite 255

    Chapter 10 : U s ing the Co mmand Line Inter f ace 246 Setting the IPv4 Secondary DNS Server After selecting the sta tic IP configuration m ode, you ca n use this command s yntax to specify the secondar y DNS server. config:# network ipv4 secondaryDNSServer <ip address> Variables:  <ip address> is the IP address of the second ary DNS[...]

  • Seite 256

    Chapter 10 : U s ing the Co mmand Line Inter f ace 247 Example The following comm and overrides the DHC P-assig ned DNS server with the one you specified. config:# network ipv4 overrideDNS enable Configuring the IPv6 Parameters An IPv6 configuration com m and begins with net work ipv6 . The comm ands are case sensitive so e nsure you capitali ze th[...]

  • Seite 257

    Chapter 10 : U s ing the Co mmand Line Inter f ace 248 Setting the IPv6 Address After selecting the sta tic IP configuration m ode, you ca n use this command s yntax to assign a perm anent IP address to the EMX device. config:# network ipv6 ipAddress <ip address> Variables:  <ip address> is the IP address being assig ned to your EMX [...]

  • Seite 258

    Chapter 10 : U s ing the Co mmand Line Inter f ace 249 Setting the IPv6 Primary DNS Server After selecting the sta tic IP configuration m ode, you ca n use this command s yntax to specify the prim ary DNS server. It is required to enable overriding the auto-assigned DN S server before you can specif y the DNS servers m anually. See O verriding the [...]

  • Seite 259

    Chapter 10 : U s ing the Co mmand Line Inter f ace 250 Overriding the IPv6 DHCP-Assigned DNS Server After specif ying the primar y/secondary DNS server, you can use this command to override th e DHCP-as signed DNS ser ver with the one you specified. config:# network ipv6 overrideDNS <option> Variables:  <option> is one of the op tion[...]

  • Seite 260

    Chapter 10 : U s ing the Co mmand Line Inter f ace 251 Option Description 10Mbps The LAN speed is alwa ys 10 Mbps. 100Mbps The LAN speed is alwa ys 100 Mbps. Example The following com mand lets the EMX det erm ine the optimal LAN interface speed throug h auto -negotiation. config:# network interface LANInterfaceSpeed auto Changing the LAN Duplex Mo[...]

  • Seite 261

    Chapter 10 : U s ing the Co mmand Line Inter f ace 252 Changing the HTTP Port This comm and syntax changes the HT TP port. config:# network services http port <n> Variables:  <n> is a TCP port num ber between 1 and 6 5535. The def ault HTTP port is 80. Example The following comm and sets the HTT P port to 81. config:# network service[...]

  • Seite 262

    Chapter 10 : U s ing the Co mmand Line Inter f ace 253 Enabling or Disabling T elnet This comm and syntax enables or disables th e Telnet service. config:# network services telnet enabled <option> Variables:  <option> is one of the op tions: true or false . Option Description true The Telnet service is e nabled. false The Telnet serv[...]

  • Seite 263

    Chapter 10 : U s ing the Co mmand Line Inter f ace 254 Enabling or Disabling S SH This comm and syntax enables or disables th e SSH service. config:# network services ssh enabled <option> Variables:  <option> is one of the op tions: true or false . Option Description true The SSH service is en abled. false The SSH service is d isable[...]

  • Seite 264

    Chapter 10 : U s ing the Co mmand Line Inter f ace 255 Determining the SSH Authentication M ethod This comm and syntax determines the SS H authentication m ethod. config:# network services ssh authentication <auth_method> Variables:  <option> is one of the op tions: passwor dOnly , publ icKeyOnly or passwordOrPublicKey . Option Descr[...]

  • Seite 265

    Chapter 10 : U s ing the Co mmand Line Inter face 256 Option Description disable The SNMP v1/v2c prot ocol is disabled. Example The following comm and enables the SNMP v1/v2c pro tocol. config:# network services snmp v1/v2c enable Enabling or Disabling S NM P v3 This comm and syntax enables or disables th e SNMP v3 protocol. config:# network servic[...]

  • Seite 266

    Chapter 10 : U s ing the Co mmand Line Inter f ace 257 Example This comm and syntax sets the SNMP rea d-on ly community string to "public." config:# network services snmp readCommunity public Setting the SNM P Write Community This comm and syntax sets the SNMP rea d/write communit y string. config:# network services snmp writeCommunity &l[...]

  • Seite 267

    Chapter 10 : U s ing the Co mmand Line Inter f ace 258 Setting the sysNam e Value This comm and syntax sets the SNMP M IB-II s ysName value. config:# network services snmp sysName <value> Variables:  <value> is a string com prising 0 to 255 alp hanumeric characters . Example The following comm and sets the SNMP MI B-II s ysName to &q[...]

  • Seite 268

    Chapter 10 : U s ing the Co mmand Line Inter f ace 259 Firewall Control You can manage fire wall control features through the CLI. T he firewall control lets you set up rul es that perm it or disallow access to the EMX device from a specific or a range of IP addres ses.  An IPv4 firewall configurat ion comm and begins with security ipAccessContr[...]

  • Seite 269

    Chapter 10 : U s ing the Co mmand Line Inter f ace 260 Modifying the Firewall Control Parameters There are different c omm ands for modifying fir ewall control param eters.  IPv4 commands To enable or disab le the IPv4 firew all control feature, use thi s command syntax: config:# security ipAccessControl ipv4 enabled <option> To determine [...]

  • Seite 270

    Chapter 10 : U s ing the Co mmand Line Inter f ace 261 Option Description reject Discards traff ic from all IP addresses, and an ICMP m essage is sent to the source host f or failure notification. Tip: You can combine b oth commands to mod ify all firewall control parameters at a time. See M ulti-Command Syntax (on page 3 20 ). Example The followin[...]

  • Seite 271

    Chapter 10 : U s ing the Co mmand Line Inter f ace 262 config:# security ipAccessControl ipv4 rule add <ip_mask> <policy> <insert> <rule_number> -- OR -- config:# security ipAccessControl ipv4 rule add <insert> <rule_number> <ip_mask> <policy>  IPv6 commands To add a new rule to the bottom of the I[...]

  • Seite 272

    Chapter 10 : U s ing the Co mmand Line Inter f ace 263  <insert> is one of the opt ions: insert Above or insertBe low . Option Description insertAbove Inserts the new rule abo ve the spec ified rule number. T hen: new rule's number = the sp ecified rule num ber insertBelow Inserts the new rule be low the specified rule number. T hen: [...]

  • Seite 273

    Chapter 10 : U s ing the Co mmand Line Inter f ace 264 config:# security ipAccessControl ipv4 rule modify <rule_number> policy <policy> The command s yntax to modify all content s of an existing IPv 4 rule: config:# security ipAccessControl ipv4 rule modify <rule_number> ipMask <ip_mask> policy <policy>  IPv6 comman[...]

  • Seite 274

    Chapter 10 : U s ing the Co mmand Line Inter f ace 265 Option Description drop Discards traff ic from the specified IP address (es), without sending an y failure notification to t he source host. reject Discards traff ic from the specified IP address (es), and an ICMP m essage is sent to the source host for failure notification. Example The followi[...]

  • Seite 275

    Chapter 10 : U s ing the Co mmand Line Inter f ace 266 Example The following comm and rem oves the 5th rule from the IPv6 access control list. config:# security ipAccessControl ipv6 rule delete 5 HTTPS Access This comm and determines whether the HT T PS access to the EMX web interface is forced. If yes, all HT TP access attempts are autom atically [...]

  • Seite 276

    Chapter 10 : U s ing the Co mmand Line Inter f ace 267 Single Login Limitation This comm and syntax enables or disables th e single logi n feature, which controls whether m ultiple logins using the sam e login n ame simultaneousl y is permitted. config:# security loginLimits singleLogin <option> Variables:  <option> is one of the op [...]

  • Seite 277

    Chapter 10 : U s ing the Co mmand Line Inter f ace 268 Password Aging Interval This comm and syntax determines ho w often the passwor d should be changed. config:# security loginLimits passwordAgingInterval <value> Variables:  <value> is a num eric value in days set for the p assword aging interval. The interval r anges f rom 7 to 36[...]

  • Seite 278

    Chapter 10 : U s ing the Co mmand Line Inter f ace 269 config:# security userBlocking maximumNumberOfFailedLogins <value1> To determine how long a user's login is blo cked, use this command syntax: config:# security userBlocking blockTime <value2> Variables:  <value1> is an integer b etween 3 and 10, or unlim ited , which [...]

  • Seite 279

    Chapter 10 : U s ing the Co mmand Line Inter f ace 27 0 Enabling or Disabling Strong Passwords This comm and syntax enables or disables th e strong pass word feature. config:# security strongPasswords enabled <option> Variables:  <option> is one of the op tions: true or false . Option Description true Enables the strong pas sword fea[...]

  • Seite 280

    Chapter 10 : U s ing the Co mmand Line Inter f ace 271 Maximum Password Length This comm and syntax determines the m axim um length of the password. config:# security strongPasswords maximumLength <value> Variables:  <value> is an integer bet ween 16 and 64. Example This comm and syntax determines that a p assword m ust NOT compris e[...]

  • Seite 281

    Chapter 10 : U s ing the Co mmand Line Inter f ace 272 config:# security strongPasswords enforceAtLeastOneUpperCaseCharacter <option> Variables:  <option> is one of the op tions: enabl e or disable . Option Description enable At least one upperc ase character is required. disable No uppercase charact er is r equired. Example This com[...]

  • Seite 282

    Chapter 10 : U s ing the Co mmand Line Inter face 273 config:# security strongPasswords enforceAtLeastOneSpecialCharacter <option> Variables:  <option> is one of the op tions: enabl e or disable . Option Description enable At least one special charact er is required. disable No special character is req uired. Example The following co[...]

  • Seite 283

    Chapter 10 : U s ing the Co mmand Line Inter f ace 274 Role-Bassed Access Control In addition to firewall acc ess control based on IP a ddresses, you can configure other access control rules that are bas ed on both IP addresses and users' roles.  An IPv4 role-based acc ess control comm and begins with security roleBasedAccessControl ipv4 . [...]

  • Seite 284

    Chapter 10 : U s ing the Co mmand Line Inter f ace 275 config:# security roleBasedAccessControl ipv6 defaultPolicy <policy> Variables:  <option> is one of the op tions: true or false . Option Description true Enables the role-b ased access control feature. false Disables the role- based acc ess control feature.  <policy> is [...]

  • Seite 285

    Chapter 10 : U s ing the Co mmand Line Inter face 276 Adding a Role-B ased Access Control Rule Depending on where you want to add a new rule in the list, the com mand syntax for adding a ru le varies.  IPv4 commands To add a new rule to the bottom of t he IPv4 rules list, use this command syntax: config:# security roleBasedAccessControl ipv4 rul[...]

  • Seite 286

    Chapter 10 : U s ing the Co mmand Line Inter f ace 277 Policy Description deny Drops traff ic from the specified IP address r ange when the user is a m em ber of the specified role  <insert> is one of the opt ions: insert Above or insertBe low . Option Description insertAbove Inserts the new rule abo ve the spec ified rule number. T hen: n[...]

  • Seite 287

    Chapter 10 : U s ing the Co mmand Line Inter f ace 278 config:# security roleBasedAccessControl ipv4 rule modify <rule_number> startIpAddress <start_ip> endIpAddress <end_ip> To modify an IPv 4 rule's role, use this comm and syntax: config:# security roleBasedAccessControl ipv4 rule modify <rule_number> role <role>[...]

  • Seite 288

    Ch apter 10 : U sing the Co mmand Line Inter face 279 config:# security roleBasedAccessControl ipv6 rule modify <rule_number> policy <policy> To modify all content s of an existing IPv6 rule, use this command syntax: config:# security roleBasedAccessControl ipv6 rule modify <rule_number> startIpAddress <start_ip> endIpAddres[...]

  • Seite 289

    Chapter 10 : U s ing the Co mmand Line Inter f ace 280 Deleting a Role-Ba sed Access Co ntrol Rule This comm and removes a specific rule from the list.  IPv4 commands config:# security roleBasedAccessControl ipv4 rule delete <rule_number>  IPv6 commands config:# security roleBasedAccessControl ipv6 rule delete <rule_number> Variab[...]

  • Seite 290

    Chapter 10 : U s ing the Co mmand Line Inter f ace 281 Example The following comm and assigns the nam e "Cabinet hum idity" to the environmental sens or with the ID num ber 4. config:# externalsensor 4 name "Cabinet humidity" Specifying the Sensor Type Raritan's contact closure s ensor (DPX - CC2 -T R) supports the connecti[...]

  • Seite 291

    Chapter 10 : U s ing the Co mmand Line Inter f ace 282 Setting the X Coordinate This comm and syntax specifies the X coor dinate of an env ironmental sensor. config:# externalsensor <n> xlabel "<coordinate>" Variables:  <n > is the ID num ber of the en vironmental sensor that you want to configure. The ID num ber is a[...]

  • Seite 292

    Chapter 10 : U s ing the Co mmand Line Inter f ace 283 Setting the Z Coordinate This comm and syntax specifies the Z co ordinate of an environm ental sensor. config:# externalsensor <n> zlabel "<coordinate>" Variables:  <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass[...]

  • Seite 293

    Chapter 10 : U s ing the Co mmand Line Inter f ace 284 Changing the Sensor Description This comm and syntax provides a description f or a specific environm ental sensor. config:# externalsensor <n> description "<description>" Variables:  <n> is the ID number of the environmenta l sensor th at you want to configure. Th[...]

  • Seite 294

    Chapter 10 : U s ing the Co mmand Line Inter f ace 285 config:# sensor externalsensor <n> <sensor type> upperCritical <option> Variables:  <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber i s assigned and shown i n the EMX web interface. It is an integ er between 1 and 16.  &[...]

  • Seite 295

    Chapter 10 : U s ing the Co mmand Line Inter f ace 286 config:# sensor externalsensor <n> <sensor type> upperWarning <option> Variables:  <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the E MX web interface. It is an integ er between 1 and 16.  &l[...]

  • Seite 296

    Chapter 10 : U s ing the Co mmand Line Inter face 287 config:# sensor externalsensor <n> <sensor type> lowerCritical <option> Variables:  <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface. It is an integ er between 1 a nd 16.  &l[...]

  • Seite 297

    Chapter 10 : U s ing the Co mmand Line Inter f ace 288 config:# sensor externalsensor <n> <sensor type> lowerWarning <option> Variables:  <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface. It is an integ er between 1 a nd 16.  &l[...]

  • Seite 298

    Chapter 10 : U s ing the Co mmand Line Inter f ace 289 config:# sensor externalsensor <n> <sensor type> hysteresis <value> Variables:  <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface. It is an integ er between 1 and 16.  <se[...]

  • Seite 299

    Chapter 10 : U s ing the Co mmand Line Inter face 290 config:# sensor externalsensor <n> <sensor type> assertionTimeout <value> Variables:  <n> is the ID num ber of the environm ental sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface. It is an integ er between 1 and 16.  [...]

  • Seite 300

    Chapter 10 : U s ing the Co mmand Line Inter f ace 291 2. Re -type the sam e password for conf irmation and press Enter. Variables:  <name> is a string com prising up to 32 AS CII printable c haracters. The <name> variable CANNOT contain spaces.  <option> is one of the op tions: enabl e or disable . Option Description enable[...]

  • Seite 301

    Chapter 10 : U s ing the Co mmand Line Inter f ace 292 Changing a User's Password This comm and syntax allows you to change an existing user's pass word if you have the Adm inistrator Privileges. config:# user modify <name> password After perform ing the above comm and, EMX prompts you to enter a new password. Then: 1. T y pe a new [...]

  • Seite 302

    Chapter 10 : U s ing the Co mmand Line Inter f ace 293 Modifying a User's Personal Data You can change a user's personal data, inclu ding the user's full name, telephone num ber, and email address . To change a user' s full name, use this command s yntax: config:# user modify <name> fullName "<full_name>" T[...]

  • Seite 303

    Chapter 10 : U s ing the Co mmand Line Inter f ace 294 config:# user modify May fullName "May Turner" telephoneNumber 123-4567 Results:  May's full nam e is specified as Ma y Turner.  May's telephone num ber is set to 123- 4567. Enabling or Disabling a User Profile This comm and syntax enables or disables a user profile. A[...]

  • Seite 304

    Chapter 10 : U s ing the Co mmand Line Inter f ace 295 config:# user modify <name> forcePasswordChangeOnNextLogin <option> Variables:  <name> is the nam e of the user whose set tings you want to c hange.  <option> is one of the op tions: true or false . Option Description true A password change is forced on the user&ap[...]

  • Seite 305

    Chapter 10 : U s ing the Co mmand Line Inter f ace 296 To determine the se curity level: config:# user modify <name> securityLevel <option2> Variables:  <name> is the nam e of the user whose set tings you want to c hange.  <option2> is one of the o ptions: noAut hNoPriv , authN oPriv or authPriv . Option Description no[...]

  • Seite 306

    Chapter 10 : U s ing the Co mmand Line Inter f ace 297 config:# user modify <name> authenticationPassPhrase <authentication_passphrase> Variables:  <name> is the nam e of the user whose set tings you want to c hange.  <authentication_pass phrase> is a string used as a n authen tication passphrase, com prising up to 32 [...]

  • Seite 307

    Chapter 10 : U s ing the Co mmand Line Inter f ace 298 config:# user modify <name> privacyPassPhrase <privacy_passphrase> Variables:  <name> is the nam e of the user whose set tings you want to c hange.  <privacy_passphrase> is a string used as a privac y passphrase, comprising up to 32 A SCII printable characters . To[...]

  • Seite 308

    Chapter 10 : U s ing the Co mmand Line Inter f ace 299 config:# user modify May snmpV3Access enable securityLevel authNoPriv userPasswordAsAuthenticationPassPhrase true Results:  The user's SNMPv3 acc ess perm ission is enabled.  The SNMPv3 securit y level is authenticat ion only, no privac y.  The authentication passphr ase is identi[...]

  • Seite 309

    Chapter 10 : U s ing the Co mmand Line Inter f ace 300 Tip: To set the default measurement units ap plied to the EMX user interfaces for all users via CLI, see Setting D efault Measureme nt Uni ts. To set the preferred t emperature unit : config:# user modify <name> preferredTemperatureUnit <option1> Variables:  <name> is the n[...]

  • Seite 310

    Chapter 10 : U s ing the Co mmand Line Inter f ace 301 Option Description psi This option displa ys the pressure value in ps i. Example The following comm and sets all measurem ent unit preferences for the user "May." config:# user modify May preferredTemperatureUnit F preferredLengthUnit feet preferredPressureUnit psi Results:  The pr[...]

  • Seite 311

    Chapter 10 : U s ing the Co mmand Line Inter f ace 302 a. Open your SSH publ ic key with a text editor. b. Copy all contents in the text editor. c. Paste the contents into th e term inal. d. Press Enter. Tip: To remove an existi ng SSH public k ey, simply press Enter without typing or pasting anyth ing when the sys tem prompts you to input the cont[...]

  • Seite 312

    Chapter 10 : U s ing the Co mmand Line Inter f ace 303 Deleting a User Profile This comm and syntax deletes an existing user pr ofile. config:# user delete <name> Example The following comm and deletes the user prof ile "May." config:# user delete May Changing Your Own Password Every user can change their own pass word via this com [...]

  • Seite 313

    Chapter 10 : U s ing the Co mmand Line Inter face 304 Re- type new password: Setting Up User Pr eferences (Units of M easure) W elco me to EMX CLI! Last login: 2012- 08 -06 02:5 8:14 EDT [CLI ( Serial) from <local >] # show user adm in details [ ...] Preferred tem perature unit: deg C Preferred length unit: Meter Preferred pressure u nit: Pas[...]

  • Seite 314

    Chapter 10 : U s ing the Co mmand Line Inter f ace 305 Determining the Time Setup Method This comm and syntax determines the m ethod to configure th e system date and time. config:# time method <method> Variables:  <method> is one of the time setup opt ions: ma nual or ntp . Mode Description manual The date and tim e settings are cus[...]

  • Seite 315

    Chapter 10 : U s ing the Co mmand Line Inter f ace 306 Example The following comm and sets the primar y time server to 192.168.80.66. config:# time ntp firstServer 192.168.80.66 Specifying the Secondary NTP Server This comm and syntax specifies the prim ary time server if synchronization with the NT P server is enabled. config:# time ntp secondServ[...]

  • Seite 316

    Chapter 10 : U s ing the Co mmand Line Inter f ace 307 Example The following comm and overrides the DHC P-specif ied NT P servers with the customi zed NTP servers, including t he prim ary and secondary NTP servers. config:# time ntp overrideDHCPProvidedServer true Role Configuration Com mands A role configuration com mand begins with role . Creatin[...]

  • Seite 317

    Chapter 10 : U s ing the Co mmand Line Inter f ace 308 Privilege Description changeAssetStripConf iguration Change Asset Str ip Configuration changeAuthSettings Change Authentication Settings ch angeDataTimeSettings Change Date/Tim e Settings changeEmdConf iguration Change EMD Config uration changeEventSetup Change Event Settin gs changeExternalSen[...]

  • Seite 318

    Chapter 10 : U s ing the Co mmand Line Inter f ace 309 Example The following comm and creates a ne w role and assigns privileges to the role. config:# role create tester firmwareUpdate;viewEventSetup Results:  A new role "tester" is cr eated.  Two privileges are ass igned to the role: firm wareUpdate (Firm ware Update) and viewE ven[...]

  • Seite 319

    Chapter 10 : U s ing the Co mmand Line Inter f ace 310 config:# role modify <name> addPrivileges <privilege1>:<argument1>,<argument2>...; <privilege2>:<argument1>,<argument2>...; <privilege3>:<argument1>,<argument2>...; ... Variables :  <name> is a string com prising up to 32 AS C[...]

  • Seite 320

    Chapter 10 : U s ing the Co mmand Line Inter f ace 311 config:# role modify <name> removePrivileges <privilege1>:<argument1>,<argument2>...; <privilege2>:<argument1>,<argument2>...; <privilege3>:<argument1>,<argument2>...; ... Note: When removi ng privileges from a ro le, make sure the s p[...]

  • Seite 321

    Chapter 10 : U s ing the Co mmand Line Inter f ace 312 Example The following comm and deletes an existing ro le. config:# role delete tester Asset Management Commands You can use the CLI com mands to chan ge the settings of the con nected asset sensor (if an y) or the settings of LEDs on the asset sensor. Serial Port Configur ation Commands A seria[...]

  • Seite 322

    Chapter 10 : U s ing the Co mmand Line Inter f ace 313 Asset Sensor M anagement An asset sensor m anagement configuration com m and begins with assetStrip . Naming an Asset Sensor This comm and syntax names or changes the name o f an asset se nsor connected to the EMX d evice. config:# assetStrip <n> name "<name>" Variables: ?[...]

  • Seite 323

    Chapter 10 : U s ing the Co mmand Line Inter f ace 314 Example The following comm and specifies the total n umber of rack units on the asset sensor #1 to 48 rack units. config:# assetStrip 1 numberOfRackUnits 48 Specifying the Rack Unit Numbering Mode This comm and syntax specifies the num bering mode of rack units on the asset sensors connecte d t[...]

  • Seite 324

    Chapter 10 : U s ing the Co mmand Line Inter f ace 315 Specifying the Rack Unit Numbering Offset This comm and syntax spec ifies the starting num ber of rack units on the asset sensors connecte d to the EMX device. config:# assetStrip <n> rackUnitNumberingOffset <number> Variables:  <n> is the num ber of the FEATURE port where [...]

  • Seite 325

    Chapter 10 : U s ing the Co mmand Line Inter f ace 316 Orientation Description bottomConnector This option indicates th at the asset sensor is mounted with the RJ -45 connector located at the bottom. Example The following comm and specifies the orie ntation of the RJ - 45 connector on the asset sensor #1 t o be on the top . config:# assetStrip 1 as[...]

  • Seite 326

    Chapter 10 : U s ing the Co mmand Line Inter f ace 317 Example The following comm and assigns the nam e "Linux serv er" to the rack unit whose index num ber is 25 on the ass et sensor#1. config:# rackUnit 1 25 name "Linux server" Setting the LED Operation Mode This comm and syntax determines whet her a specific rack unit on the [...]

  • Seite 327

    Chapter 10 : U s ing the Co mmand Line Inter f ace 31 8 Setting the LED Disconnect Color This comm and syntax sets the LED co lor for all rack units on the connected asset sensor(s ) to indicate the absence of a connected asset tag. config:# assetStrip <n> LEDColorForDisconnectedTags <color> Setting an LED Color for a Rack Unit This com[...]

  • Seite 328

    Chapter 10 : U s ing the Co mmand Line Inter f ace 319 Setting an LED Mode for a Rack Unit This comm and syntax sets the LED m ode for a specific rack unit on the specified asset sensor. You need to set a rack unit's LED m ode only when the LED operati on mode of this rack unit has be en set to "manual." config:# rackUnit <n> &[...]

  • Seite 329

    Chapter 10 : U s ing the Co mmand Line Inter f ace 320 Setting the Histor y Buffer Length This comm and syntax changes the hist ory buffer length. T he default length is 25. config:# history length <n> Variables:  <n> is an integer num ber between 1 and 25 0.  If you leave the <n> variab le blank when using the com mand, the[...]

  • Seite 330

    Chapter 10 : U s ing the Co mmand Line Inter face 321 Example 2 - Combination of SSID and PSK Parameters This multi-com mand syntax configures bo th of SSID and P SK parameters s imultaneously for the wireless feature. config:# network wireless SSID myssid PSK encryp_key Results:  The SSID value is set to m yssid.  The PSK value is set to enc[...]

  • Seite 331

    Chapter 10 : U s ing the Co mmand Line Inter f ace 322 3. W hen the "Username to unblock" prom pt appears, t ype the login name of the user to be unblock ed and press Enter. 4. A message appears , indicating that the s pecified user was unblocked succ essfully. Resetting the EMX You can reset the EMX d evice to factor y defaults or sim pl[...]

  • Seite 332

    Chapter 10 : U s ing the Co mmand Line Inter f ace 323 Network Troubleshooting The EMX provides 4 d iagnostic comm ands for troubleshooting network problems : nslookup , netstat , pi ng , and tracerout e . The diagnost ic commands f unction as corresponding L inux comm ands and can get corresponding Linux out puts. Entering the Diagnostic Mode Diag[...]

  • Seite 333

    Chapter 10 : U s ing the Co mmand Line Inter face 324 Showing the Network Connections This comm and syntax displays network connections and/or status of ports. diag> netstat <option> Variables:  <option> is one of the op tions: ports or connections . Option Description ports Shows TCP/UDP ports. connections Shows network connectio[...]

  • Seite 334

    Chapter 10 : U s ing the Co mmand Line Inter f ace 325 Testing the Network Connectivity This comm and syntax sends the ICMP ECHO_REQUE ST mes sage to a network host for c hecking its net work connectivity. If the output sh ows the host is responding prop erly, the network connectivity is good, or t he host is shut down or not being connected to the[...]

  • Seite 335

    Chapter 10 : U s ing the Co mmand Line Inter f ace 326 Tracing the Route This comm and syntax traces the net work route betwee n your EMX device and a net work host. diag> traceroute <host> Variables:  <host> is the nam e or IP address of the host you want to trace. Example The following comm and displa ys the existing network rou[...]

  • Seite 336

    Ch apter 10 : U sing the Co mmand Line Inter face 327 # show help To query available n etwork configuratio n parameters, the syntax is: config:# network ? OR config:# network help To query available role configuratio n parameters, t he syntax is: config:# role ? OR config:# role help Retrieving Previous Commands If you would like to retri eve any c[...]

  • Seite 337

    Chapter 10 : U s ing the Co mmand Line Inter f ace 328 Logging out of CLI After com pleting your tasks using the CLI, alwa y s log out of the CLI to prevent others from accessing the CLI. To log ou t of the CLI: 1. Ensure you have ent ered the adm inistrator m ode and the # prom pt is displayed. 2. T y pe exit and press Enter . Resetting to Factory[...]

  • Seite 338

    329 In This Chapter Asset Sensors and T ags ....................................................................... 329 A sset Sensors and Tags Asset managem ent tags (AMTs ) are electronic IDs that are adhere d to data center item s such as servers and then plugged in to asset managem ent sensors (AMS) m ounted on the rack . Once the asset tags ar[...]

  • Seite 339

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 330 Configuring the Asset Sensor The EMX cannot detec t how man y rack units (tag ports ) a connected asset sensor supports , so you mus t provide this information m anually. You can nam e the asset sensor or determ ine the number ing wa y for all rack units in the web i nterface. A[...]

  • Seite 340

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 331 For the latest vers ion of asset sensors with a built- in tilt sensor, it is NOT necess ary to configure the orientat ion setting manua lly. The EMX device can detect the orientation of the asset sensors and automatically configure it.  Top Connector: T his option indicates t[...]

  • Seite 341

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 332 Changing a Specific LED' s Color Settings In the EMX web interf ace, a rack unit refers to a tag port on the asset sensor. You can nam e a specific rack unit, or c hange it s LED co lor settings so that this LE D behaves differentl y from others on th e same asset sensor. T[...]

  • Seite 342

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 333 Connecting A MS- M2 -Z Asset Sensors (Opt ional) The AMS- M2 -Z is a special t ype of asset sensor that functions the sam e as regular MASTER ass et sensors with the f ollowing diff erences:  It provides two RJ -45 connectors  Multiple AMS- M2 -Z asset sensors c an be dais[...]

  • Seite 343

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 334 c. Connect the other en d of the cable to the RJ- 45 connector labeled "Input" on ano ther AMS- M2 - Z. d. Repeat the above ste ps to dais y chain additional AMS - M2 -Z. See AMS- M2 -Z Da isy-Chain Limitatio ns (on page 334 ) for the maximum num ber of AMS- M2 - Z ass[...]

  • Seite 344

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 335 Models Daisy-chain limit ations EMX2-888  Up to 6 AMS- M2 - Z can be dais y chained.  The maximum cable length between each AMS- M2 -Z in the chain is 3 m eters. Expanding a Blad e Extension Strip A blade extension str ip, like an asset sensor, has m ultiple tag ports. Aft[...]

  • Seite 345

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 336 3. Double-click that rack unit or click the white arrow prior to the folder icon. The arrow then turns into a black , gradient arrow , and all tag ports appear belo w the folder. To collapse a blade e xtension strip:  Double-click the blad e extension strip folder, or c lick [...]

  • Seite 346

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 337 Item Description A Barcode (ID num ber) for the tag connector cable B Tag connector C Cable connector for c onnecting the blade extension strip Note: A tag connector ca ble has a unique b arcode, which is disp layed in the EMX's web interfac e for identify ing each blade ex[...]

  • Seite 347

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 338 2. Move the blade extens ion strip toward the bott om of the blade chassis until its m ylar section is full y under the chassis, and verif y that the blade extensi on strip does not fall of f easily. If necess ary, you ma y use the adhesi ve tape in the back of the m ylar sectio[...]

  • Seite 348

    Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 339 5. Plug the tag connector of the blade extension strip into the closest tag port of the asset s ensor assem bly or the AMS- M2 -Z asset sensor on the rack. Note: If you need to tem porarily disconnect the tag connector of the blade extension strip, wa it at least 1 second before[...]

  • Seite 349

    340 In This Chapter Overview ................................................................................................ 341 EMX Asset Sensor Ma nagem ent .......................................................... 343 A ppendix B Integrating EMX and Asset Management Sensors w ith dcTrack[...]

  • Seite 350

    Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 341 Overview dcTrack ™ , Raritan's da ta center m anagement solution, integrates with Raritan's EMX, ass et managem ent sensors and asset m anagement tags. This integration all ows you to m onitor your devices and provide l ocation inform ation on each asset at [...]

  • Seite 351

    Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 342 Diagram key Asset managem ent tag (AMT) Asset managem ent sensor (AMS) EMX EMX/Power IQ To connect each compon ent: 1. Affix the adhesive end of the asset m anagement tag (AMT ) to the data center item you want to track , and plug the other end of the AMT into the asset[...]

  • Seite 352

    Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 343 EMX Asset Sensor Management Before asset sensors c an be m anaged in dcTrack ™ , they mus t be configured in EMX, the EMX needs to be add ed to dcT rack as a probe item, and the data ce nter item the asset m anagement tag is adhered to must exist in dcT rack. dcTrack [...]

  • Seite 353

    Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 344 5. Click Setup in the S ettings section. The Setup of Asset Strip d ialog appears. 6. Enter a nam e of the asset sensor. 7. T y pe the total num ber of rack units th e selected asset sensor has in the "Number of Rack Units" field. This field s hows 48 by defau[...]

  • Seite 354

    Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 345 12. In the Numbering Off set field, select the startin g num ber. For example, if you select 3, the f irst rack unit is num bered 3, the second is numbered 4, the third is num bered 5, and so on until the f inal number. 13. Indicate how the asset se nsor is m ounted in [...]

  • Seite 355

    Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrack 346 6. Click Configure Rack Unit or double -click the selected rack unit. The setup dialog for the sel ected rack unit appears. 7. In the Name f ield, type a nam e for identif ying this rack unit. 8. Select either Auto or Manual Overrid e as this rack unit's LED mode. ?[...]

  • Seite 356

    Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 347 4. Select Add a New Item from the Actions drop-do wn in the toolbar. At a minimum , complete all of the required f ields on the Detail 1 page. Complete add itional fields as needed. 5. Enter the probe nam e. Required 6. Select the m ake and model . Required 7. Select th[...]

  • Seite 357

    Appendix B : Integrating EM X an d Asset Manag ement Sensors w ith dcTrack 348  To assign an IP address , select a subn et. This automatica lly assigns the first availab le address from the selected subnet. You can change the addres s by m anually typing another address in the subnet, or using t he drop -down to view all the available addresses [...]

  • Seite 358

    349 In This Chapter Overview ................................................................................................ 349 Overview Raritan's PX2 po wer distribution unit (PDU) a lso supports as set sensors so that you can rem otely track IT devices through the PDU's web interface while m onitoring the PDU's po wer status. Onl[...]

  • Seite 359

    Appendix C : Raritan PX Asset Ma nagement 350 To set up an asset m anagement s ystem: Affix the adhesive end of an ass et tag to each IT device through the tag's tap e. Plug the connector on th e other end of each asset tag into the corresponding tag port o n the asset sensor. Connect the asset sensor a ssembl y on the rack to the Dominion PX [...]

  • Seite 360

    351 In This Chapter Altitude Correction Fac tors (EMX) ......................................................... 351 Maximum Am bient Operating Tem perature (EMX) ............................... 351 Serial RS-232 Port P inouts ................................................................ .... 352 Sensor RJ-12 Port P inouts ......................[...]

  • Seite 361

    Appendix D : Specification s 352 Serial RS-232 Port Pinouts RS -232 Pin/signal def inition Pin No. Signal Direction Description 1 DCD Input Data 2 RxD Input Receive data (data in) 3 TxD Output Transm it data 4 DTR Out put Data term inal ready 5 GND ― Signal ground 6 DSR Input Data set read y 7 RTS Output Request to send 8 CTS Input Clear to send [...]

  • Seite 362

    Appendix D : Specifications 353 RS -485 Pin/signal def inition 3 D+ bi - directional Data + 4 ― ― ― 5 ― ― ― 6 D- bi - directional Data - 7 ― ― ― 8 ― ― ―[...]

  • Seite 363

    354 This section provides a n LDAP exam ple for illustrating the configuration procedure using M icrosoft Active Director y ® (AD). T o configure LDAP authentication, four m ain steps are re quired: a. Determine user accoun ts and groups inten ded for the EMX b. Create user groups for the EMX on the AD server c. Configure LDAP authent ication on t[...]

  • Seite 364

    Appendix E : LDAP Configu ration Illustrat ion 355 Step B. Configure User Groups on the AD Server You must create the gro ups for the EMX o n the AD ser ver, and then make appropriate users mem bers of these groups. In this illustration, we ass um e:  The groups for the EMX are nam ed EMX_Admin an d EMX_User .  User accounts emx user , emxus [...]

  • Seite 365

    Appendix E : LDAP Configu ration Illustrat ion 356 Step C. Configure LDA P Authentication on the EMX Device You must enable an d set up LDAP authent ication properl y on the EMX device to use ext ernal authentication. In the illustration, we ass um e:  The DNS server setti ngs have been config ured properl y. See Modifying the Network S ettings [...]

  • Seite 366

    Appendix E : LDAP Configu ration Illustrat ion 357  Base DN for Search - T ype dc=techadssl,dc=com as the starting point where your search begins on t he AD server.  Login Nam e Attribute - Ensure the f ield is set to sAMAccountName because the LD AP server is Micros oft Active Directory.  User Entr y Object Class - E nsure the field is se[...]

  • Seite 367

    Appendix E : LDAP Configu ration Illustrat ion 358 Note: For more informa tion on LDA P configuration, see Setting Up LDAP Authentication (on page 12 3 ). 5. Click OK to save the cha nges. The LDAP serv er is saved. 6. Click OK to save the c hanges. T he LDAP authentication is act ivated. Note: If the EMX clock and the LDAP serv er clock are out o [...]

  • Seite 368

    Appendix E : LDAP Configu ration Illustrat ion 359 c. Click Add. d. Repeat Steps a to c t o add all perm issions beginning with "View." 6. Click OK to save the cha nges. The EMX_User r ole is created. 7. Keep the Manage R oles dialog opened to create the EMX_Adm in role. To create the EM X_Admin role w ith full permissio ns assigned: 1. C[...]

  • Seite 369

    Appendix E : LDAP Configu ration Illustrat ion 360 2. T y pe EMX_Admin in the Role Nam e field. 3. T y pe a description for the EMX_Adm in role in the Descr iption field. In this example, we t ype "The role includes a ll privileges" to desc r ibe the role. 4. Click the Privileges t ab to select the Adm inistrator perm ission. The Administ[...]

  • Seite 370

    Appendix E : LDAP Configu ration Illustrat ion 361 5. Click OK to save the cha nges. The EMX_ Admin role is created. 6. Click Close to quit t he dialog.[...]

  • Seite 371

    [...]

  • Seite 372

    363 A A Note about Untr iggered Rules • 158 About C ontact Closure Sensors • 35 About the Interfac e • 212 Access Securit y Control • 104 Add Page Icon • 56 Adding a Firewall Rul e • 261 Adding a Role- Based Access Control Rule • 276 Adding an EMX to dcT rack • 342, 346 Adding IT Devices f or Ping Monitoring • 16 5 Adding the LDAP[...]

  • Seite 373

    Index 364 Connecting a Logitech W ebcam (Optional) • 41, 184, 185 Connecting a Schrof f LHX Heat Exc hanger (Optional) • 41, 192 Connecting AMS- M2 -Z Ass et Sensors (Optional) • iii, 28, 333 Connecting an Asset Sensor to the EMX - 111 • 25 Connecting an Asset Sensor to the EMX - 888 • 27 Connecting Asset Se nsors to the EMX • 24, 29, 3[...]

  • Seite 374

    Index 365 Enabling Login Lim itations • 111 Enabling or Disabling a Us er Profile • 2 94 Enabling or Disabling Dat a Logging • 233 Enabling or Disabling SN MP v1/v2c • 255 Enabling or Disabling SN MP v3 • 256 Enabling or Disabling S SH • 254 Enabling or Disabling Stro ng Passwords • 270 Enabling or Disabling T elnet • 253 Enabling P[...]

  • Seite 375

    Index 366 Logging in to CLI • 213 Logging out of CLI • 32 8 Login Limitation • 266 Logout • 52 Lowercase Character R equirem ent • 271 M MAC Address • 5 0 Managing Environm ental Sensors • 170, 171 Managing External De vices • 161 Managing Firewall Rul es • 261 Managing Role- Based Access Control Rules • 275 Managing Roles • 6[...]

  • Seite 376

    Index 367 Record Snapshots to W ebcam Storage • 143 Reset Button • 50 Resetting the EMX • 322 Resetting the PM710 Minim um and Maximum Values • 199 Resetting to F actor y Defaults • 50, 102, 322 Resetting to Factor y Defaults (CLI) • 32 8 Restarting the Dev ice • 322 Restricted Service Agre ement • 216 Retrieving Previous Com mands [...]

  • Seite 377

    Index 368 Setting Up an EMX Usi ng Bulk Configur ation • iii, 72, 94 Setting Up an SSL Cert ificate • iii, 104, 118 Setting Up Asset Sensors in EMX • 343 Setting Up Default Us er Preferences (Units of Measure) • iii, 65, 67, 75 Setting Up LDAP Authentication • 84, 104, 123, 358 Setting Up Role- Base d Access Control Rules • 113 Setting [...]

  • Seite 378

    Index 369 W ired Network Se ttings • 78 W ireless Configuration • 220 W ireless Network Settings • 79 W ith Hype rTerm inal • 213, 321 W ith SS H or T elnet • 214[...]

  • Seite 379

    U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 73 2-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732- 764 -8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Beijing Monday - Friday [...]