Manuale d’uso / di manutenzione del prodotto EMX2-111 del fabbricante Raritan Computer
Vai alla pagina of 379
Copyrigh t © 2012 Raritan, In c. EMX- 0D -v 2.2.0-E September 2012 255 - 80 - 6107 - 00 Raritan EMX User Guide Release 2.2.0.
This docum ent contains proprietary inform ation that is protecte d by cop yright. All rights reserved. No part of this docum ent ma y be p hotocopied, reproduce d, or translated into an other language with out express prior written co nsent of Rarit an, Inc.
iii Contents Chapter 1 Introduction 1 Overview ........................................................................................................................................ 2 W hat's New in EMX Help ....................................
Contents iv Re set Button ................................................................................................................................ 50 Contact Closure Sens or Term ination ........................................................
Contents v Changing the T elnet Settings ............................................................................................ 91 Enabling Service Advert isem ent .................................................................................
Contents vi Modifying an Action ......................................................................................................... 157 Deleting an Event Ru le or Action ...........................................................................
Contents vii Chapter 9 Using SNMP 201 Overview .................................................................................................................................... 201 Enabling SNMP .....................................................
Contents viii Asset Sensor Mana gement ............................................................................................. 313 Rack Unit Configurati on .........................................................................................
Contents ix A ppendix C Raritan P X Asset Management 349 Overview .................................................................................................................................... 349 A ppendix D Spe cifications 351 Altitude Correction Fac tors (EMX) .
1 In This Chapter Overview .................................................................................................... 2 W hat's New in EMX Help ......................................................................... iii Product Models .
Chapter 1 : Introduction 2 Overview The EMX device pro vides a rack management solution that com bines both asset m anagement and environm ental monitoring capabilities. W ith asset management capabilit y, you can remotel y track the location of IT equipment after tag ging the IT devices electron ically.
iii What's New in EMX Help The following sections h ave changed or inform ation has been added to the EMX Help based on enhancem ents and changes t o the equipment and/or user docum entation.
Chapter 1 : Introduction iv Product Models The EMX devices incl ude two m odels: EMX2 -111 and EMX2-8 88. Different m odels are functionally identical, but vary in the size and total number of ports .
Introduction v Product Features In general, the EMX f eatures include: The ability to rem otely track the location of each IT equipm ent that is electronicall y tagged using Raritan asset tags .
Chapter 1 : Introduction vi The ability to m onitor a connected Schroff ® LHX -20 or LHX-40 heat exchanger The ability to diagnose th e network , such as pinging a host or listing TCP connect.
7 In This Chapter Before You Begin ...................................................................................... 7 Mounting the EMX De vice ......................................................................... 7 Connecting the EMX to a Power Source .
Chapter 2 : Installing and Configurin g the EMX Device 8 Mounting a Zero U EM X Device This section describes how to mount a Zero U EMX device using L - brackets and t wo buttons. To mount Zero U models using L -brackets and tw o button s: 1. Align the two edge slots of the L-brack et with the t wo screw holes on the top of the EMX de vice.
Chapter 2 : Installing and C onfiguring the EMX Device 9 Mount the device b y screwing a mounting button in the b ack center of each L- bracket and then hav ing both buttons engage the mounting holes in the rack . The recommended torque f or the button is 1.
Chapter 2 : Installing and Configurin g the EMX Device 10 3. Insert one end of the cable- support bar into the L-shaped hole of the rackmount brack et, and align the hole on the end of the bar with the threaded hole adjace nt to the L-s haped hole. 4.
Chapter 2 : Installing and C onfiguring the EMX Device 11 Connecting the EMX to a Power Source If your EMX device is d esigned to use a cab le retention clip, instal l the clip before connecting a power cord. A c able retention clip prev ents the connected power c ord from com ing loose or falling of f.
Chapter 2 : Installing and Configurin g the EMX Device 12 2. Connect the EMX device to the networ k via a wired or wireless connection. 3. Configure the EMX device using the comm and line interf ace. Connecting the EM X to a Computer To configure the EMX us ing a com puter, it mus t be connected to the computer with an RS- 232 serial interf ace.
Chapter 2 : Installing and C onfiguring the EMX Device 13 2. Run dominion-seria l-setup.exe. A Dominion Seria l Console Driver Setup W izard appears. 3. Click Install to install the driver. 4. Click Finish when the installation is com plete. 5. Connect the EMX 's USB cable to the com puter.
Chapter 2 : Installing and Configurin g the EMX Device 14 Connecting the EM X to Your Netw ork To use the web interf ace to administer th e EMX, you m ust connect the EMX to your local area n etwork (LAN). The EMX can be con nected to a wired or wireless network .
Chapter 2 : Installing and C onfiguring the EMX Device 15 Initial Network Conf iguration After the EMX device is co nnected to your network, you must provide it with an IP address an d som e additional net working inform ation. This section describes the initial configuratio n via a serial or U SB connection.
Chapter 2 : Installing and Configurin g the EMX Device 16 b. For the wired network mode, you ma y configure the LAN interface settings. In m ost scenarios, the def ault setting (auto) works well and should not be changed unless r equired.
Chapter 2 : Installing and C onfiguring the EMX Device 17 To set Use this command Authentication method network wireless authMethod <method> where <method> is psk for Pre-Sh ared Key or eap for Exte nsible Authentication Protoco l. PSK network wireless PSK <psk> where <psk> is the P SK string.
Chapter 2 : Installing and Configurin g the EMX Device 18 To set Use this command IP protocol network ip proto <protocol> where <protocol> is v4Only for enabling IPv4, v6On ly for e nabling IPv6 or both for enabling both IPv4 a nd IPv6 protocols.
Chapter 2 : Installing and C onfiguring the EMX Device 19 For the static I Pv4 configuration, configure th ese para meters. To set Use this command Static IPv4 address network ipv4 ipAddress <ip address> where <ip address> is the IP a ddress you want to assign.
Chapter 2 : Installing and Configurin g the EMX Device 20 where <option> is en able or disable . See the table below for th e IPv6 commands for m anually specifying DNS serv ers. For the static IPv6 conf iguration, you should configure the following param eters.
Chapter 2 : Installing and C onfiguring the EMX Device 21 10. To verif y whether all settings are correc t, type the following commands one b y one. Current network settings are displa yed. Co mmand Description show network Show network parameters. show network ip all Show all IP configurati on parameters.
Chapter 2 : Installing and Configurin g the EMX Device 22 Combining Asset Sensors Each tag port on the as set sensors c orresponds to a rac k unit and can be used to locate the IT devices on a sp ecific rack (or cabinet). For each rack, you can attach ass et sensors up to 64U long, co nsisting of one MASTER and m ultiple SLAVE asset sensors .
Chapter 2 : Installing and C onfiguring the EMX D evice 23 Make sure that the U-shaped she et metal adjacent to the male DIN connector is inserted into the rear s lot of the m aster asset sensor. Screw up the U -shaped s heet metal to reinf orce the connection.
Chapter 2 : Installing and Configurin g the EMX Device 24 Connecting Asset Sensors to the EMX You need both ass et sensors and asset t ags for track ing devices. Asset tags, which are af fixed to devices, provide a n ID num ber for each device, while the asset sensors transm it ID numbers and position ing inform ation to the connected EMX d evice.
Chapter 2 : Installing and C onfiguring the EMX Device 25 Connecting an Asset Sensor to the EM X- 111 The EMX-111 does n ot natively support the 12 volts of power needed t o connect to asset m anagement sensors via a Categor y 5e/6 cable.
Chapter 2 : Installing and Configurin g the EMX Device 26 Diagram key EMX- 111 Category 5e/6 cable (Cat 5e/6 cable) 12V Feature Port X -Cable (X -cable) To connect asset senso rs to th e EMX-111 device: 1. Affix the adhesive end of an asset tag to each IT device throu gh the tag's tape.
Chapter 2 : Installing and C onfiguring the EMX Device 27 Connecting an Asset Senso r to the EMX- 888 The EMX-888 can c onnect to an asset m anagem ent strip via a Categor y 5e/6 cable up to a d istance of 10 m eters. Note: The EMX-888 does not require t he use of a 12V F eature Port X - Cable like the E MX-111.
Chapter 2 : Installing and Configuring the EMX Device 28 To connect asset senso rs to the EM X-888 device: 1. Affix the adhesive end of an asset tag to each IT device throu gh the tag's tape. 2. Plug the connector on th e other end of each ass et tag into the corresponding tag port o n the asset sensor.
Chapter 2 : Installing and C onfiguring the EMX Device 29 b. Connect the other en d of the cable to the FEATURE p ort on the EMX. 2. Affix an asset tag to t he IT device and co nnect this asset tag to t he AMS- M2 -Z b y plugging the tag connector into the tag port on t he AMS- M2 -Z.
Chapter 2 : Installing and Configurin g the EMX Device 30 Connecting Blade Extension Strips For blade servers, which are contained in a single chas sis, you can use a blade extension strip to track individual blade server s.
Chapter 2 : Installing and C onfiguring the EMX Device 31 Note: Each tag port on the blade extensio n strip is labeled a number, which is displayed as th e slot number in the EMX's web interface. To install a blade extens ion strip: 1. Connect the tag conn ector cable to t he blade extension strip.
Chapter 2 : Installing and Configurin g the EMX Device 32 b. Plug the tag connector of the asset tag into the tag port on the blade extension strip. 4. Repeat the above ste p until all blade s ervers in the chas sis are connected to the blade extension strip via as set tags.
Chapter 2 : Installing and Co nfiguring the EMX Device 33 Connecting Environmental Sensors (Optional) To enable the detecti on of environm ental factors arou nd the EMX, connect one or m ore Raritan en vironmental sensors to the EMX device.
Chapter 2 : Installing and Configurin g the EMX Device 34 Note: If you are using a 12V Feature Port X-Cable to connect an asset management sensor (AMS) to the EMX-111, the SENSOR port on the device is already being used.
Chapter 2 : Installing and C onfiguring the EMX Device 35 About Contact Closure S ensors Raritan's contact closure s ensor (DPX - CC2 -T R) can detect the op en- and -closed status of the connected de tectors/switches. This feature requires the integration of at least a discrete (on/of f) detector/switch to work properl y.
Chapter 2 : Installing and Configurin g the EMX Device 36 Connecting Detectors/Switches to DPX- CC2 - TR A DPX- CC2 -T R unit provides two channe ls for connecting t wo discrete (on/off) detectors/s witches.
Chapter 2 : Installing and C onfiguring the EMX Device 37 Configuring a Contact Closure Sensor Before using DPX - CC2 -TR to detec t the contact closur e status, water, smoke or vibration, you must determ ine the normal state b y adjusting its dip switch, which controls t he LED state on th e body of DPX - CC2 -TR.
Chapter 2 : Installing and Configurin g the EMX Device 38 Note: The dip switch sett ing must be properly co nfigured, or the se nsor LED may be incorr ectly lit in the Normal state.
Chapter 2 : Installing and C onfiguring the EMX Device 39 Plug both wires of the other detector/switch into the two termination points to the right. 4. Release the tin y rectangular buttons af ter inserting the wires properly. 5. Verify that these wires are firm ly fastened.
Chapter 2 : Installing and Configurin g the EMX Device 40 Connecting Differential Air Pressure Sensors You can have a Rarit an differential air pres sure sensor connected to the EMX device if the diff erential air press ure data is des ired.
Chapter 2 : Installing and C onfiguring the EMX Device 41 Connecting a Logitech Webcam (Optional) The EMX supports webcams c onnected to it, allowing you to vie w video or snapshots of the are a surrounding the webcam.
Chapter 2 : Installing and Configurin g the EMX Device 42 To connect an LHX he at exchange r to the serial FEATUR E port using a serial cable (p rovided by Schroff) : 1. Plug DB9 end of c able into the RS232 p ort on the Schr off LHX heat exchanger. 2.
43 In This Chapter Supported W eb Browsers ........................................................................ 43 Connection Ports ..................................................................................... 43 LCD Display Panel ........
Chapter 3 : Ge tting Started 44 Port Used for... FEATURE Connection to asset s ensors via a Categ ory 5e/6 cable. Note: The EMX dev ice supplies power to t he connected asset sensors after the connection is estab lished. CONSOLE/ MODEM Establishing a serial co nnection between a com puter and the EMX d evice: This is a standard DT E RS-232 port.
Chapter 3 : Ge tting Started 45 LCD Display Panel The LCD displa y panel shows the sensor read ing or status, asset managem ent states and the device's MAC address. It consists of: An LCD display Co ntrol buttons LCD Display Different types of inf ormation are shown in different sections of the LCD display.
Chapter 3 : Ge tting Started 46 Section Information show n Depending on your selection, the inf ormation displayed includes: The selected environm ental sensor, includi ng the sensor's ID num ber.
Chapter 3 : Ge tting Started 47 Section Information show n The measurem ent unit for the selected en vironmental sensor appears. The measurem ent unit varies according to the sensor type: % is displayed for a hum idity sensor. is displayed for a tem perature sensor.
Chapter 3 : Ge tting Started 48 2. The LCD displa y shows the reading or state of the selected sensor i n the middle of the LCD d isplay. For a numeric sensor' s reading, the appropr iate measurem ent unit is displayed to the right of th e reading.
Chapter 3 : Ge tting Started 49 Asset Management Information The LCD displa y can display the asset sens or state on each FEAT URE port as well as the asset t ag state of eac h rack unit. For the R aritan asset sensor, a rack unit refers to a tag port.
Chapter 3 : Ge tting Started 50 MAC Address The EMX's MAC addr ess is available b y operating the LCD d isplay, and in Device m ode. Contact your LAN adm inistrator for as sistance. To display the M AC address: 1. Press the MODE butt on until the device set tings are displa yed, indicated b y a 'd' in at the top lef t of the display.
Chapter 3 : Ge tting Started 51 Contact Closure Sensor Termination Two channels for conn ecting two third- party contact c losure sensors are provided on the EMX 2-888 m odel.
Chapter 3 : Ge tting Started 52 http(s)://<ip address> where <ip address > is the IP ad dress of the EMX de vice. 2. If a security alert m essage appears, c lick OK or Yes to accept. The Login page then opens. 3. T y pe your user nam e in the User Nam e field, and password in th e Password field.
Chapter 3 : Ge tting Started 53 Choose the Refr esh command or click the Refresh button on th e web browser. 2. Either the login page op ens or the bro wser is closed, d epending on your choice in the prev ious step. Changing Your Password Normal users can change their own pass words if the y have the Change Own Password perm ission.
Chapter 3 : Ge tting Started 54 Introduction to the Web Interface The web interface pro vides two panes, a m enu bar, a status bar, an Add Page icon, and a logou t button throug hout every page.
Chapter 3 : Ge tting Started 55 Me nus Four menus are avai lable for m anaging different task s or showing inform ation. User Management c ontains m enu items for m anaging user profiles, permissions (r oles), and password.
Chapter 3 : Ge tting Started 56 Last login time: This shows the date and tim e this login name was used to lo g in to this EMX device last tim e. W hen the mouse pointer hovers over the last login time, detailed inform ation about the last login is displa yed, including the access client and IP address .
Chapter 3 : Ge tting Started 57 The following diagram shows a m ulti-tab exam ple. 4. W ith multiple pages ope ned, you can tak e these actions: To switch to one of the opened data pa ges, click the corresponding tab. If there are too m any tabs to be all sho wn, two arrows ( and ) appear at the lef t and right borders of the pane.
Chapter 3 : Ge tting Started 58 Readings Highlighted in Yellow or Red W hen a numeric sensor's reading crosses an y upper or lower threshold, the background color of the whole ro w turns to yel low or red for alert ing users. For a discrete (on/of f) sensor, the ro w changes the back ground color when the sensor ent ers the abnorm al state.
Chapter 3 : Ge tting Started 59 To find the exact m eaning of the alert, re ad the inform ation shown in the State (or Status) colum n: below lower critical: T he num eric sensor's r eading drops below the lower critical threshold. below lower warning: T he numeric sensor's reading drops below the lower warning thresho ld.
Chapter 3 : Ge tting Started 60 Browser-Defined Shortcut M enu A shortcut menu, which is built in the web browser, may appear when right-click ing anywhere in the EMX web interface.
Chapter 3 : Ge tting Started 61 Viewing the Dashboard W hen you log in to the web interface, the D ashboard page is displa yed by default. This page pro vides an overvie w of the EMX device's status. The page is divided i nto several sections acc ording to connecte d equipment, such as ass et sensors an d environm ental sensors.
62 In This Chapter Overview .................................................................................................. 62 Managing Users ...................................................................................... 62 Managing Roles .
Chapter 4 : U ser and Role Manage ment 63 Field Type this... Spaces are NOT permitted Full Name The user's f irst and last nam es. Password, Confirm Password The password the user en ters to log i n. Type it first in the Password fie ld and then again in the Confirm Password field.
Chapter 4 : U ser and Role Managemen t 64 Field Description is the default. Use Password as Authentication Pass Phrase This checkbox is configura ble only if AuthNo Priv or AuthPriv is selected. W hen the checkbox is selected, the authe ntication pass phrase is identical t o the user's pass word.
Chapter 4 : U ser and Role Manage ment 65 7. Click the SSH tab to e nter the public k ey if the pub lic key authentication for the S SH service is ena bled. See Changing t he SSH Settings ( on page 90 ). a. Open the SSH publ ic key with a text editor.
Chapter 4 : U ser and Role Manage ment 66 Modifying a User Profile You can change an y user prof ile's information except f or the user nam e. To modify a user profil e: 1. Choose User Manag ement > Users. T he Manage User s dialog appears. 2.
Chapter 4 : U ser and Role Manage ment 67 4. A message appears , prompting you to confirm the operation. C lick Yes to confirm the deletion. Setting Up User Pr eferences (Units of M easure) The units of m easure used in your EMX GUI can be ch anged as needed.
Chapter 4 : U ser and Role Manage ment 68 In the Temperature Un it field, select (Celsius) or (Fahrenheit) as the m easurem ent unit for tem peratures. In the Length Unit fie ld, select "Meter " or "Feet" as the measurem ent unit for length or height.
Chapter 4 : U ser and Role Manage ment 69 b. Click Yes to disconnec t the user or No to abort t he operation. If clicking Yes, the connecte d user is forc ed to log out. You may change the s orting order of the list if nec essar y. 3. Cl ick Close to quit the d ialog.
Chapter 4 : U ser and Role Manage ment 70 a. Click Add. The "Add Privileges to new Rol e" dialog appears. b. Select the perm ission you want fr om the Privileges list. c. If the permiss ion you selected contains any argum ent setting, the Arguments list is s hown to the right.
Chapter 4 : U ser and Role Manage ment 71 c. If the permiss ion you selected contains any argum ent setting, the Arguments list is s hown to the right. Then se lect o ne or multiple argum ents. d. Click Add to add the sel ected perm ission (and argum ents if any).
72 In This Chapter Overview .................................................................................................. 72 Naming the EMX D evice ......................................................................... 72 Displaying the Device Inf orm ation .
Chapter 5 : EMX Device Manag ement 73 4. Click OK to save the cha nges. Displaying the Device Information The Device Inform ation dialog displa ys information spec ific to the EMX device that you are ac cessing, such as IDs an d protocol versions of asset sensors.
Chapter 5 : EMX Device Manag ement 74 To custom ize the date and time, select the Us er Specified Tim e radio button, and then e nter the date and tim e in appropriate fields. Use the yyyy- mm -dd format f or the date and the hh:mm :ss format f or the time.
Chapter 5 : EMX Device Manag ement 75 Note: The EMX fold er is named "EMX " by default. The name changes after customi zing the device name. S ee N aming the EM X Device (on page 72 ). 2. Click Setup on the Se ttings page. T he EMX Setup dial og appears.
Chapter 5 : EMX Device Manag ement 76 5. To change the tem perature unit, sel ect the desired opti on in the Temperature Unit f ield. : This option displa ys the tem perature in Celsius. : This option displa ys the tem perature in Fahrenheit. 6.
Chapter 5 : EMX Device Manag ement 77 Disabled: W hen applied, disables to port and nothing connecte d to the port is detected . Auto: An icon is disp layed for this port o nly when the E MX d evice detects the physical con nection of the asset se nsor on this port.
Chapter 5 : EMX Device Manag ement 78 Auto: An icon is disp layed for this port o nly when the E MX device detects the physical con nection of the LHX h eat exchanger on this port.
Chapter 5 : EMX Device Manag ement 79 4. To change the LAN sp eed, click the drop-down arr ow in the Speed field and select an o ption from the list. Auto: System determines the optim um LAN speed through aut o- negotiation. 10 Mbit/s: The LAN sp eed is alwa ys 10 Mbps.
Chapter 5 : EMX Device Manag ement 80 7. In the Authentication f ield, click the drop -down arro w, and select an appropriate option f rom the list. Option Description No Authentication Select this option when no authentication d ata is required. PSK A Pre-Shared Ke y is required for this opti on.
Chapter 5 : EMX Device Manag ement 81 Selecting the Internet Protocol The EMX device supp orts two t ypes of Internet protocols -- IPv4 and IPv6. You can enable either or both Internet protocols.
Chapter 5 : EMX Device Manag ement 82 Modifying the IPv4 Settings You must enable the IPv4 protocol before you can modif y the IPv4 network settings. See Selecting th e Internet Protocol (on page 81 ). To modify the IPv4 sett ings: 1. Choose Device Settin gs > Network.
Chapter 5 : EMX Device Manag ement 83 Note: The EMX sup ports a maximum of 3 DNS servers . If two IPv4 DNS servers and two IPv6 D NS servers are available, the EMX only uses the primary IPv4 and I Pv6 DNS serv ers. Modifying the IPv6 Settings You must enable the IPv6 protocol before you can modif y the IPv6 network settings.
Chapter 5 : EMX Device Manag ement 84 Note: The EMX sup ports a maximum of 3 DNS servers . If two IPv4 DNS servers and two IPv6 D NS servers are available, the EMX only uses the primary IPv4 and IPv 6 DNS serv ers.
Chapter 5 : EMX Device Manag ement 85 2. To use a different port f or HTT P or HTTPS, type a new port n umber in the corresponding fie ld. Valid range is 1 to 65535. Warning: Different ne twork serv ices cannot share the same TC P port. 3. Click OK to save the cha nges.
Chapter 5 : EMX Device Manag ement 86 3. Select the "enable" ch eckbox in the "SNM P v1 / v2c" field to enable communication with an SNMP manager us ing SNMP v1 or v2c protocol. T y pe the SNMP read- only comm unity string in the Read Comm unity String field.
Chapter 5 : EMX Device Manag ement 87 7. Click OK, or continu e to the Notifications tab cr eate SNMP T RAP or INFORM comm unications..
Chapter 5 : EMX Device Manag ement 88 8. To create an SNMP T RAP or INFORM com munication, open the Notifications tab on the S NMP Settings dialog. 9. Select the Enabled chec kbox to enable t he feature. For SNMPv2/c T RAP and INFORM notifications: 1.
Chapter 5 : EMX Device Manag ement 89 5. In the Comm unity fields, enter the SN MP communit y string to access the device(s). T he community is the gro up representing the EMX and all SNMP managem ent stations. 6. Click OK. For SNMPv3 T RAP and INFORM notifications: 1.
Chapter 5 : EMX Device Manag ement 90 Security level Description "noAuthNoPriv" Select this if no authori zation or privac y protocols are needed. Click OK "authNoPriv" Select this if authorizat ion is required but no privacy protocols are req uired.
Chapter 5 : EMX Device Manag ement 91 Allow password auth entication onl y: Enables the password - based login only. Allow public ke y authentication only: Enables the p ublic k ey- based login only. Allow password and public ke y authentication: Enables both the password- and pu blic ke y-based login.
Chapter 5 : EMX Device Manag ement 92 Enabling Service Advertisement The EMX advertises all enabled services that are reachable us ing the IP network. T his feature uses DNS-SD (Domain Nam e System- Service Discovery) and m DNS (m ulti cast DNS). T he advertised services are discovered by clients tha t have implem ented DNS -SD and mDNS.
Chapter 5 : EMX Device Manag ement 93 2. T y pe the name or IP address of the m ail server in the Server Nam e field. 3. T y pe the port num ber for the SMT P server in the Port field. T he default is 25. 4. T y pe an em ail address for the sender i n the Sender Em ail Address field.
Chapter 5 : EMX Device Manag ement 94 Setting Up an EMX Using Bulk Configuration Use this feature if you have already set u p an EMX and are n ow setting up another. The Bulk Configuration feature l ets you save the settings of a configured EMX device t o your PC.
Chapter 5 : EMX Device Manag ement 95 Saving an EMX Conf iguration A source device is an already configured EMX device that is used to create a configuration f ile containing the se ttings that can b e shared between EMX devices. T hese settings includ e user and role configurations, event ru les, securit y settings, and so on.
Chapter 5 : EMX Device Manag ement 96 Copying a EM X Configuration A target device is an EMX device that loads another EMX device's configuration file. Copying an EMX c onfiguration to a target dev ice adjusts that EMX device's settings to m atch those of the s ource EMX device.
Chapter 5 : EMX Device Manag ement 97 The file is saved in the XM L forma t, and its content is encrypted using the AES-1 28 encryption algor ithm. To restore the EM X using a backup XM L file: 1. Choose Maintenance > Backup/Restore. T he Backup/Restore of Device Settings dialog op ens.
Chapter 5 : EMX Device Manag ement 98 5. To view the certif icate of the uploaded f irmware, click View Certificate. Optional . 6. To proceed with the u pdate, click Update Firmware. T he update m ay take several m inutes. Warning: Do NOT pow er off the EMX d evice during the up date.
Chapter 5 : EMX Device Manag ement 99 Firmware upgrade resu lt 2. You may change the number of displa yed columns or r e- sort the list for better viewing th e data. 3. To view the details of any firmware upgrade e vent, select it and click Details, or simply doubl e-click the event.
Chapter 5 : EMX Device Manag ement 1 00 Pinging a Host The Ping tool is usef ul for check ing whether a host is acc essible through the network or Intern et. To ping a host: 1. Choose Maintenance > Network Diagnostics > Ping. The Pin g Network Host dialog ap pears.
Chapter 5 : EMX Device Manag ement 101 when you are directed b y Raritan T echnical Support. You can download th e diagnostic file fr om the EMX device to a c lient machine. The file is com pressed into a . tgz file and sh ould be sent to Raritan Technical Support for interpretat ion.
Chapter 5 : EMX Device Manag ement 102 Rebooting the EMX You can rem otely reboot the EMX device via the web interf ace. Rebooting the EMX do es not reset the conf iguration of the device as is done during a factor y reset. Note: Rebooting the EMX deletes the snapsh ots taken via we bcam.
Chapter 5 : EMX Device Manag ement 103 2. Launch a term inal emulation program s uch as HyperTerm inal, Kermit, or PuTT Y, and open a windo w on the EM X. 3. Press (and release) the R eset button of the EMX device while pressing the Esc k ey of the k eyboard several times in rapid succession.
104 In This Chapter Access Securit y Control ........................................................................ 104 Setting Up an SSL Cert ificate ................................................................ 118 Setting Up LDAP Aut hentication .
Chapter 6 : Security 105 Configuring the Firew all The EMX has a f irewall that you can conf igure to prevent specific IP addresses and ran ges of IP address es from acc essing the EMX device. By default the fire wall is disabled. To configu re the firewall: 1.
Chapter 6 : Security 106 a. Click the IPv4 tab if neces sary. b. Ensure the Enable I Pv4 Access Control ch eckbox is selected. c. The default polic y is shown in the Default Polic y field. T o change it, select a different polic y from the drop-down l ist.
Chapter 6 : Security 107 To specif y an entire subnet or range of addresses, change the subnet mask accordingly. Note: Valid IP addres ses range from 0.0.0.0 t hrough 255.255.255.255. Make sure the IP addr esses entered are withi n the scope. To create firewall ru les: 1.
Chapter 6 : Security 108 Action Procedure Insert a rule between two existing rules Select the rule abo ve which you want to insert a new rule. For example, to insert a ru le between rules #3 a nd #4, select #4. Click Insert. T he "Insert new Rule" di alog appears.
Chapter 6 : Security 109 Editing Firewall Rules W hen an existing firewall rule requires upd ates of IP addres s range and/or policy, m odify them accordingl y. To modify a firew all rule: 1. Choose Device Settin gs > Security > IP Access Control.
Chapter 6 : Security 110 Deleting Firewall Rules W hen any firewall rules bec om e obsolete or unnecessar y, remove them from the rules list. To delete a firew all rule: 1. Choose Device Settin gs > Security > IP Access Control. The Configure IP Access Control Settings dialo g appears.
Chapter 6 : Security 111 3. To enable the user b locking feature, select t he "Block user on login failure" check box. 4. T y pe a num ber in the "Maxim um number of failed logins" field. T his is the maxim um number of failed logins the user is per m itted before the user's login is bloc ked from accessing the EMX device.
Chapter 6 : Security 112 Tip: If the desired time option is not listed, you can manually type the desired time in this f ield. For example, you can typ e "4 min" to set the time to 4 minu tes. 5. Click OK to save the cha nges. Tip: Keep the idle timeo ut to 20 minutes or less if possible.
Chapter 6 : Security 113 Enabling Password Aging Password Aging determ ines whether us ers are required to ch ange passwords at regular in tervals. The default inter val is 60 da ys. To force users to chan ge passwords regul arly: 1. Choose Device Settin gs > Security > Passwor d Policy.
Chapter 6 : Security 114 2. To enable the IPv4 f irewall, click the IP v4 tab, and s elect the Enable Role Based Acces s Control for IPv4 check box. 3. To enable the IPv6 f irewall, click the IPv6 tab, and select the Enable Role Based Acces s Control for IPv6 check box.
Chapter 6 : Security 115 Creating Role-Based Access Control Rules Role-based acces s control rules accept or drop traffic, based on the user's role and IP address . Like f irewall rules, the order of r ules is important, since the ru les are executed in num erical order.
Chapter 6 : Security 116 Action Do this... T y pe an ending IP ad dress in the Ending IP Address field. Select a role from the drop- down list in the Role f ield. This rule applies to m embers of this role onl y. Select Allow or Den y from the drop-down list in th e Policy field.
Chapter 6 : Security 117 Sorting Role-Based Access Control Rules Similar to firewall rules , the order of role -based access control rules determines which one of the rules m atching the sam e IP address is performed. To sort role-based access control rules: 1.
Chapter 6 : Security 118 Setting Up an SSL Certificate Having an X.509 digita l certificate ensures that both pa rties in an SSL connection are who th ey say they are. To obtain a certif icate for the EMX , create a Cert ificate Signing Requ est (CSR) and subm it it to a certificate author ity (CA).
Chapter 6 : Security 119 Field Type this informatio n Organization The registered nam e of your compan y. Organizational Unit The nam e of your department. Comm on Name The fully qualified dom ain nam e (FQDN) of your EMX device. Email Address An email address where you or another ad m inistrative user can be reached.
Chapter 6 : Security 120 Installing a CA-Signed Certificate After the CA provides a signed certificate acc ording to the C SR you submitted, you m ust install it on the EMX de vice. To install the certific ate: 1. Choose Device Settin gs > Security > SSL Cert ificate.
Chapter 6 : Security 121 Field Type this informatio n Key Length Select the ke y length (bits) from the drop-down l ist in this field. A larger key length enh ances the securit y, but slows down the EMX device's response. Self Sign Ensure this checkbox is selected, w hich indicates that you are creating a self- signed certificate.
Chapter 6 : Security 122 Installing Existing Ke y and Certific ate Files If the SSL certificate a nd private ke y files are already availabl e, you can install them directl y without going through th e process of creating a CSR or a self-signed certif icate.
Chapter 6 : Security 123 Setting Up LDAP Authentication For security purposes , users attem pting to log in to the EMX must be authenticated. T he EMX supports the acces s using one of the fol lowing .
Chapter 6 : Security 124 If using a Microsoft Active Directory server, c onsult yo ur AD administrator for the name of the Act ive Directory Domain.
Chapter 6 : Security 125 8. SSL Port - T he default is 636. Either use the default port or specif y another port. This f ield is enabled when th e "LDAP over SSL" checkbox is s elected.
Chapter 6 : Security 126 Login nam e attribute (also called Auth orizationString) User entry object clas s User search subfi lter (also called BaseS earch) Note: The EMX w ill preoccupy the logi n name attribute an d user entry object class with default values, which shou ld not be changed unless required.
Chapter 6 : Security 127 Sorting the LD AP Access Order The order of the LDA P list determ ines the access prio rity of r emote LDAP/LDAPS ser vers. The EMX first tries to access the top LDAP/LDAPS se.
Chapter 6 : Security 128 5. Click OK to save the cha nges. Deleting the LD AP Server Settings You can delete the auth entication settings of a specific LDA P/LDAPS server when the serv er is not availa ble or used for r emote authentication. To remove on e or multiple LD AP/LDAPS servers: 1.
Chapter 6 : Security 129 Enabling LD AP and Local Authentication S ervices To make authenticat ion function pr operly all the tim e -- even when external authentication is not available, you can enable both th e local and remote authe ntication services.
Chapter 6 : Security 130 4. Click OK..
131 In This Chapter Ev ent Rules and Actions ....................................................................... 131 Event Logging ........................................................................................ 158 Viewing the Comm unication Log .
Chapter 7 : Event Rules, Event Actions and Application Logs 132 Creating an Event Rule The best wa y to create a new set of event rule, in seq uence, is: Create actions for r esponding to one or m.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 133 Event types Radio buttons Numeric s ensor threshold-cross ing events, or the occurrence of the selected event -- true or false Available radio buttons include "Asserted," "Deasserted" and "Bot h.
Chapter 7 : Event Rules, Event Actions and Application Logs 134 Event types Radio buttons Network interface link state Available radio buttons include "L ink state is up," "Link state is do wn" and "Both." Link state is up: The EMX tak es the action only when the networ k link state changes from down to up.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 135 Event types Radio buttons Server reachabilit y Available radio buttons include "Unreachable, " "Reachable," and "Both. " Unreachable: T he EMX takes the ac tion onl y when an y specified server becom es inaccessible.
Chapter 7 : Event Rules, Event Actions and Application Logs 136 Creating Actions The EMX com es with two built -in actions: System Event Log Ac tion: This action records t he selected e vent in the internal log when t he event occurs.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 137 Log an Event Message This option records th e selected e vents in the internal log. To create a log ev ent message: 1. Choose Device Settin gs > Event Rules. T he Event Rules Settings dialog opens.
Chapter 7 : Event Rules, Even t Actions and Application Logs 138 10. Use the slide bars to increase or decr ease the followin g: Number of Snapshots - the num ber of snapshots to be included in the sequence of im ages that are tak en when the event occurs .
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 139 6. In the "Recipients em ail addresses" field, specif y the em ail address(es) of the recip ient(s). Us e a comm a to separate multiple email addresses. 7. To use the SMT P server specified in the SMTP Server Settings dialog, select the Use Def ault SMTP Serv er check box.
Chapter 7 : Event Rules, Event Actions and Appli cation Logs 140 a. In the Tim eout (sec) field, enter the inter val of time, in s econds, after which a new inform comm unication is resent if the firs t is not received. For ex ample, res end a new inform communication once ever y 3 seconds.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 141 Security level Description "noAuthNoPriv" Select this if no authori zation or privac y protocols are needed. Click OK "authNoPriv" Select this if authorizat ion is required but no privacy protocols are req uired.
Chapter 7 : Event Rules, Event Actions and Application Logs 142 7. In the Port field, specif y an appropriate port number. 8. Click OK to save the n ew action. 9. Click Close to quit t he dialog. Send SMS Message You can configure em ails to be sent when an event occurs and can custom ize the message.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 143 Click the Inform ation icon to open the Event Context Inf ormation dialog, which contains a list of placeholders and their definitions. See Email and S MS Message Placeholder s (on pa ge 145 ) for more details.
Chapter 7 : Event Rules, Event Actions and Application Logs 144 3. Click New. 4. In the "Action nam e" field, type a ne w name f or the action. The default name is Ne w Action <num ber>, where <num ber> is a sequential num ber based on how m any actions are alread y created.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 145 Email and SMS Message Placeholders Following are placeh olders that can be used in custom event email messages. Note: Click the Inform ation icon to o pen the Event Context Information dialog, wh ich contains a list of placeholders and their definitions.
Chapter 7 : Event Rules, Event Actions and Application Logs 146 Placeholder Description [CONFIGVALUE] The new value of a param eter [DATETIME] The hum an readable timestam p of the event occurrence [DEVICEIP] The IP address of the device, the event occurred on.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 147 Placeholder Description [LHXSUPPORTENA BLED] The Schroff LHX Support state [MONITOREDHOST ] The nam e or IP address of a m onitored ho.
Chapter 7 : Event Rules, Event Actions and Application Logs 148 Placeholder Description [UMTARGETUSER] The user, an action was triggered f or [USERIP] The IP address, a user c onnected fr om [USERNAME.
Ch apter 7 : Event Rule s , Event A ctions and Appli cation Logs 149 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* Device > Event log cleare d Event log cleared b y user '[USERNAME]' f rom host '[USERIP]'.
Chapter 7 : Event Rules, Event Actions and Application Logs 150 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* in '[USERIP]' logged in.
Chapter 7 : Ev ent Rules, Event Actions and Application Log s 151 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* alarmed. '[EXTSENSORSLOT ]' is no longer alarmed. Server Monitoring > * > Monitored Server '[SERVER]' is n ow being monitored.
Chapter 7 : Event Rules, Event Actions and Application Logs 152 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* LHX > Sensor > Una vailable Sensor '[LHXSENSORI D]' on LHX at [PORTT YPE] port '[PORTID]' unavailable.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 153 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* Auxiliary Port 2 > Po wer suppl y LHX at [PORT TYPE] port '[PORTID]' at power suppl y '[LHXPOW ERSUPPLYID]'.
Chapter 7 : Event Rules, Event Actions and Application Logs 154 Event/Context Default Assertion Message w hen the Event = TRUE Default Assertion Message when the Ev ent = FALSE* Power Logic Device >.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 155 5. Select "S y stem Event Log Action" as we intend to record th is event in the internal log when the specified events occ ur.
Chapter 7 : Event Rules, Event Actions and Application Logs 156 4. Select "<An y sub-event>" because we want to specif y all events related to the sensor con nected to sensor port #1, .
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 157 4. To change the event, cl ick the desired tab in the Event f ield and select a different item from the pull -down m enu or subm enu.
Chapter 7 : Event Rules, Event Actions and Application Logs 158 Note: If you do not click Save before quitting the current settings page, a message appears . Then click Yes t o save the changes, Discard to abort the ch anges or Cancel to r eturn to the curr ent settings page.
Chapter 7 : Ev ent Rules, Eve nt Actions and Application Logs 159 Viewing the Local Event Log You can view up to 2,00 0 historical e vents that occurred to t he EMX device in the local e vent log. W hen the log already contains 2,000 entries, each new entry over writes the oldest entr y.
Chapter 7 : Event Rules, Event Actions and Application Logs 160 2. Click Clear Event Log. 3. Click Close to quit t he dialog. Viewing the Communication Log The EMX allows you to inspec t all comm unications occurred between the EMX device and its grap hical user int erface (GUI).
161 In This Chapter Overview ................................................................................................ 161 EMX and PX2 PDU Cas cading Connect ions ........................................ 162 Server Accessibilit y ..............
Chapter 8 : Ma naging Ex ternal Devices 162 EMX and PX2 PDU Cascading Connections Up to four (4) devices are s upported as part of a dais y chain. Specifically, a EMX c an have up to thre e (3) additional EMXs c onnected to it, or up to three (3) PX2 devices conn ected to it.
Chapter 8 : Ma naging Ex ternal Devices 163 Cascading EM X Devices Note: When cascad ing devices, use a wired network connection . Wireless connections are n ot supported whe n cascading de vices. To connect EM X devices to an EM X device: 1. If needed, upgrade th e EMX f irmware of each device that will be part of the chain.
Chapter 8 : Ma naging Ex ternal Devices 164 3. If you are adding an ad ditional PX2 to the c hain, plug a USB cab le into USB-B port on th e additional PX, the n plug the ot her end into USB-A on the PX2 that is alread y connected to the master EMX. U p to three (3) PX2s can be connected to the m aster EMX.
Chapter 8 : Ma naging Ex ternal Devices 165 Adding IT Devices f or Ping M onitoring You can have the EMX monitor the acc essibility of any IT equipment, such as DB servers, rem ote authen tication servers or any power distribution unit (PDU). T he EMX sup ports m onitoring a max imum of 8 devices.
Chapter 8 : Ma naging Ex ternal Devices 166 Field Description W ait Time (in seconds) before Resuming Pinging The wait tim e before the EMX resum es pinging after the m onitored equipm ent is declared unreacha ble. Valid range is 1 to 1200 (seconds). 5.
Chapter 8 : Ma naging Ex ternal Devices 167 5. In the W ait Time (in seconds) before Res uming Pinging f ield, type 60 to make the EMX s tops pingin g the target PDU for 60 seconds (1 minute) after the PDU inaccess ibility is declared. After 60 sec onds, the EMX will re-pi ng the target PDU.
Chapter 8 : Ma naging Ex ternal Devices 168 Deleting Ping M onitoring Settings W hen it i s not necess ary to monitor the acc essibility of an y IT device, just remove it. To delete ping mo nitoring settings fo r an IT dev ice: 1. Choose Device Settin gs > Server Reachab ility.
Chapter 8 : Ma naging Ex ternal Devices 169 Configuring the Serial Port You can change the bit- rate of the seri al port labeled CO NSOLE / MODEM on the EMX device. T he default bit-r ate is 115200 bps. Bit- rate adjustm ent may be necessary only when you integrate the EMX with another Raritan prod uct via the serial interf ace.
Chapter 8 : Ma naging Ex ternal Devices 170 2. Log in to the EMX web interface. T he EMX should have detected the connected sensors, an d display them in the web interface. 3. Identify each sensor thr ough the sensor's s erial number. See Identifying Environmental Sensors ( on page 170 ).
Chapter 8 : Ma naging Ex ternal Devices 171 Match the serial num ber from the tag to those listed in the sensor t able. Note that the inform ation in the "# " and "Port" colum ns is different. Column Information # The ID num ber assigned to each environm ental sensor.
Chapter 8 : Ma naging Ex ternal Devices 172 Note: To identify all det ected sensors, s ee Id entifying Environmental Senso rs (on p age 170 ). 4. Click Manage.
Chapter 8 : Ma naging Ex ternal Devices 173 3. Select the sensor that you want to conf igure. 4. Click Setup. T he "Setup of external s ensor <serial num ber> (<sensor type>)" dialog appears, where <serial num ber> is the serial num ber of this sensor and <sensor type> is the s ensor's t ype.
Chapter 8 : Ma naging Ex ternal Devices 174 Setting the Z Coordinate Format You can use either the n umber of rack units or a descriptive text to describe the vertical locat ions (Z coordinates) of env ironm ental sensors. To determine the Z coo rdinate format: 1.
Chapter 8 : Ma naging Ex ternal Devices 175 Describing the Sensor Location Use the X, Y and Z co ordinates to desc ribe each sensor's physical location. You can use th ese location values to trac k records of environmental cond itions in fixed locat ions around your IT equipment.
Chapter 8 : Ma naging Ex ternal Devices 176 Setting Data Logging The EMX can store 120 measurem ents for each sensor in a m em ory bu ffer. This m emory buffer is k nown as the data log.
Chapter 8 : Ma naging Exter nal Devices 177 To select partial sens ors, select the correspo nding check boxes of the desired sensors in the Logging Enabled c olumn. To select all sensors , click Enable All or Enable All in Page. To deselect all sensors , click Disable All or Disable All in Page.
Chapter 8 : Ma naging Ex ternal Devices 178 To view both of managed and unmanaged environmental sensors: 1. If the EMX folder is not expanded, expand it to show al l components. Note: The EMX fold er is named "EMX" by default. The name changes after customi zing the device name.
Chapter 8 : Ma naging Ex ternal Devices 179 States of Managed Sensors An environmental sensor s hows the s tate after being m anaged. Available sensor states vary depending on the sensor t ype -- num eric or discrete sensors.
Chapter 8 : Ma naging Ex ternal Devices 180 "normal" State This state indicates the se nsor is in the norm al state. For a contact closure se nsor, usuall y this state is the norm al state you have set. If the normal state is s et to Norm ally Closed, the normal state m eans the contact closure s witch is closed.
Chapter 8 : Ma naging Ex ternal Devices 181 "below lower critical" State This state m eans a numeric sensor' s reading is below the lower critical threshold as indicate d below: Reading.
Chapter 8 : Ma naging Ex ternal Devices 182 After a sensor is rem oved from management, the ID num ber assigned to that sensor is released and can be aut omaticall y assigned to any newly - detected sensor.
Chapter 8 : Ma naging Ex ternal Devices 183 Hysteresis Lower W arning Reset Lower W arning Threshold Hysteresis Lower Critical Reset Lower Critical T hreshold The hysteresis values d efine a res et threshold. For upper thresholds, the measurem ent must fall past this reset thresh old before a deass ertion event is generated.
Chapter 8 : Ma naging Ex ternal Devices 184 Webcams The EMX supports webcams c onnected to it, allowin g you to view vide o or snapshots of the are a surrounding the webcam.
Chapter 8 : Ma naging Ex ternal Devices 185 Configuring Webcams Before you can configure a webcam , it must be connected t o the EMX. See Connecting a Logite ch Webcam (Opt ional) (on page 41 ). To config ure a webcam: 1. In the navigation tree, c lick on the W ebcam Management fold er.
Chapter 8 : Ma naging Ex ternal Devices 186 Configuring Webcam Storage By default, when a snapsh ot is taken using the Store Sna pshot to W ebcam Storage feature, it is stored loca lly on the EMX . Up to ten (10) images can be store d on the EMX at onc e.
Chapter 8 : Ma naging Ex ternal Devices 187 Viewing Webcam Snapshots and Vid eos By default, once a webcam is att ached, it is set to tak e snapshots ever y five (5) seconds.
Chapter 8 : Ma naging Ex ternal Devices 188 In the snapshot m ode, a snapshot mode icon appears on the top -left corner of the im age along with the num ber of im ages the webcam is set to take per second. In the video m ode, a video mode icon appears on the top-left corner of the image.
Chapter 8 : Ma naging Ex ternal Devices 189 To take a snapshot fro m w ebcam: 1. In the navigation tree, c lick on the webcam y ou want to take a snapshot with. T he webcam im age is displayed in the right pane. The webcam must be in snapshot m ode in order to take snapsh ots.
Chapter 8 : Ma naging Ex ternal Devices 190 3. Use the navigation icons t o m ove through each snapshot, or enter a specific page num ber to jum p to that snapshot snapshot page. 4. Click the Refresh icon to ref resh the page. New snap shots are displayed if the y are available.
Chapter 8 : Ma naging Ex ternal Devices 191 The video remains op en in a secondar y Live Preview windo w in the User A's EMX interf ace. So long as t he secondar y Live Preview window is open in User A's interface, even af ter User A logs out of the EMX interface or th e session tim es out, the link is ava ilable.
Chapter 8 : Ma naging Ex ternal Devices 192 Schroff LHX Heat Exchangers After connecting the Schroff ® LHX heat exchanger to the E MX device via the Feature port or the RS-485 port, the EMX detects LHX. The LHX is viewed under the Fea ture folder or the Aux iliary Port folder in the navigation tree, depe nding on the port it is conn ected to.
Chapter 8 : Ma naging Ex ternal Devices 193 Naming a Heat Exch anger To help identif y an LHX heat exchanger in th e EMX web interf a ce, assign a name to it. T he custom ized LHX heat exchan ger's name is followed by the device t ype and RS -485 port num ber in parentheses.
Chapter 8 : Ma naging Ex ternal Devices 194 Configuring LHX T emperature and F an Thresholds An LHX heat exchan ger is im plemented with various sensors for detecting the air tem perature, water tem perature, and f an speed.
Chapter 8 : Ma naging Ex ternal Devices 195 Viewing the Summary Both the Dashboard and Auxiliary Port pag es display the summ ary of all connected LHX heat exchangers, includ ing the RS -485 port number where each heat ex changer is connected, and each heat exc hanger's status.
Chapter 8 : Ma naging Ex ternal Devices 196 If any LHX sensor read ing reaches or crosses the critical or warni ng threshold, that sensor r eading row is high lighted in red or yellow.
Chapter 8 : Ma naging Ex ternal Devices 197 Operating Hours Operating hours are the accumulative tim e since the LHX heat exchanger is first c onnected to the EMX dev ice and turned ON. The EMX web interf ace displa ys the operating hours both f or the heat exchanger and its fans .
Chapter 8 : Ma naging Ex ternal Devices 198 3. If you clicked S witch Off in the previous step , a dialog appears, prompting you to conf irm the operati on. Click Yes to turn it off or No to abort the operat ion. The heat exchanger's ico n shown in the web interface c hanges after being turned on or of f.
Chapter 8 : Ma naging Ex ternal Devices 199 Configuring the PM 710 and Configuring Thresh old Settings Note: All settings are con figured on a per p ort basis. If you discon nect a PM710 from one E MX port and connect it to another, you m ust reconfigure the settin gs.
Chapter 8 : Ma naging Ex ternal Devices 200 3. Click on Reset All Min / Max Values at the bottom left of the Sensors section of the page. 4. Click OK to confirm . All values are res et. Clearing the PM 710 Energy Accumulators The PM710 saves en ergy accum ulator values, which can b e reset as needed.
201 In This Chapter Overview ................................................................................................ 201 Enabling SNMP ..................................................................................... 202 Configuring SNMP N otifications .
Chapter 9 : U sing SNMP 202 Enabling SNMP By default, SNMP v1/v2c is enabled on th e EMX so the EMX can communicate with an S NMP m anager. If you have disabled the SNM P, it must be enabled to com municate with an SN MP m anager. Note that read-o nly access is enabled and t he comm unity string is public.
Chapter 9 : U sing SNMP 203 a. sysContact - the co ntact person in charge of the s ystem being contacted b. sysName - the name assigned to the s ystem c. sysLocation - the location of the system 5. Select the MIB to be downloaded. The S NMP MIB for your EMX is used by the SNMP m anager.
Chapter 9 : U sing SNMP 204 Configuring SNMP Notifications The EMX autom atically keeps an internal log of events that oc cur. See Event Rules and Actions (on page 1 31). These e vents can also be used to send SNMP v2c or v3 not ifications to a third -party destination.
Chapter 9 : U sing SNMP 205 SNMPv2c Notif ications To configu re the EMX to send SNM P notifications: 1. Choose Device Settin gs > Network Serv ices > SNMP. T he SNMP Settings dialog appears. 2. Enter the MIB-II s ystem group inform ation, if applica ble: a.
Chapter 9 : U sing SNMP 206 a. In the Tim eout (sec) field, enter the inter val of time, in s econds, after which a new inform comm unication is resent if the firs t is not received. For exam ple, resend a ne w inform communication once ever y 3 seconds.
Chapter 9 : U sing SNMP 207 a. sysContact - the co ntact person in charge of the system being contacted b. sysName - the name assigned to the s ystem c. sysLocation - the location of the system 3. Select the MIB to be downloaded. The S NMP MIB for your EMX is used by the SNMP m anager.
Chapter 9 : U sing SNMP 208 Security level Description "noAuthNoPriv" Select this if no authori zation or privac y protocols are needed. Click OK "authNoPriv" Select this if authorizat ion is required but no privacy protocols are req uired.
Chapter 9 : U sing SNMP 209 5. Click OK to save the cha nges. The user is no w set up for encr ypted SNMP v3 comm unication. SNMP Gets and Sets In addition to sending tr aps, the EMX is able to receive SNMP g et and set requests from third-party SNMP m anagers.
Chapter 9 : U sing SNMP 210 4. Click Save to save the file onto your com puter. To dow nload the file from the Dev ice Information di alog: 1. Choose Maintenance > Device Inform ation.
Chapter 9 : U sing SNMP 211 SNMP Sets and Thresholds Some objects c an be configured from the SNMP manager using SNMP set comm ands. Objects that can be configured have a MAX-ACC ESS level of "read-wr ite" in the MIB.
212 In This Chapter About the Interfac e ................................................................................ 212 Logging in to CLI ................................................................................... 213 Restricted Service Agre ement .
Chapter 10 : U s ing the Co mmand Line Inter f ace 213 Logging in to CLI Logging in via H yperTerminal over a loc al connection is a littl e different than logging in using S SH or Telnet. If a security login agre ement has been enab led, you m ust accept the agreement in order t o complete the login.
Chapter 10 : U s ing the Co mmand Line Inter f ace 214 5. T y pe a password and pres s Enter. The p assword is case sens itive, so mak e sure you capitalize the correct let ters. After properly entering the password, th e # or > s ystem prompt appears.
Chapter 10 : U s ing the Co mmand Line Inter f ace 215 5. After properly entering the password, th e # or > s ystem prompt appears. See Differ ent CLI Modes and Prompts (on page 21 5) in the EMX User Gu ide for details.
Chapter 10 : U s ing the Co mmand Line Inter f ace 216 Restricted Service Agreement Welcome to EMX CLI! Last login: 2012-08-06 04:58:42 EDT [CLI (Telnet) from ] # show security details [.
Chapter 10 : U s ing the Co mmand Line Inter f ace 217 # show security details [...] Restricted Service Agreement: enforced Restricted Service Agreement Banner Content: This is my new restricted service agreement.
Chapter 10 : U s ing the Co mmand Line Inter f ace 218 Help Command The help or ? comm and shows a list of m ain CLI com mands available for the current m ode.
Chapter 10 : U s ing the Co mmand Line Inter f ace 219 Network Configu ration This comm and shows all network configuration, such as the IP a ddress, networking m ode, and MAC address .
Chapter 10 : U s ing the Co mmand Line Inter f ace 220 Wireless Configuration This comm and only shows the wireless configuration of the EMX device, such as the SSID p arameter. # show network wireless To show detailed inf ormation, add the p arameter "details" to the end of the comm and.
Chapter 10 : U s ing the Co mmand Line Inter f ace 221 Asset Sensor Sett ings This comm and shows the asset sensor s ettings, such as the tota l number of rack units (tag ports), asset sensor s tate, num bering mode, orientation, available tags a nd LED color sett ings.
Chapter 10 : U s ing the Co mmand Line Inter f a ce 222 Environmental Senso r Information This comm and syntax shows the environm ental sensor's information. # show externalsensors <n> External sensor 3 ('Temperature 1') Sensor type: Temperature Reading: 31.
Chapter 10 : U s ing the Co mmand Line Inter f ace 223 Deassertion hysteresis: 1.0 deg C Assertion timeout: 0 samples Variables: <n> is one of the options: all , or a num ber. Option Description all Displays the inform ation for all environm ental sensors.
Chapter 10 : U s ing the Co mmand Line Inter f ace 224 Environmental Senso r Thresho ld Information This comm and syntax shows the specif ied environmental sensor's threshold-related inf ormation. # show sensor externalsensor <n> To show detailed inf ormation, add the p arameter "details" to the end of the comm and.
Chapter 10 : U s ing the Co mmand Line Inter face 225 Serial #config Entering configuration m ode Apply - save and act ivate changed set tings and lea ve config m ode Cancel - leave conf ig mode witho.
Chapter 10 : U s ing the Co mmand Line Inter f ace 226 Existing User Profiles This comm and shows the data of one or all ex isting user profiles. # show user <user_name> To show detailed inf ormation, add the p arameter "details" to the end of the comm and.
Chapter 10 : U s ing the Co mmand Line Inter f ace 227 Existing Roles This comm and shows the data of one or all ex isting roles. # show roles <role_name> Variables: <role_name> is the nam e of the role whos e perm issions you want to query.
Chapter 10 : Us ing the Co mmand Line Inter face 228 Rack Unit Settings of an Asset Senso r For the Raritan asset s ensor, a rack unit refers to a tag port. T his command sho ws the settings of a specif ic rack unit or all rac k units on an asset sensor, such as a rack unit's LED co lor and LED m ode.
Chapter 10 : U s ing the Co mmand Line Inter f ace 229 Blade Extension Strip Settings This comm and shows the information of a bla de ext ension strip, including the total num ber of tag ports, and if available, the ID (barcod e) number of an y connected tag.
Chapter 10 : U s ing the Co mmand Line Inter f ace 230 History Buffer Length This comm and syntax shows the length of the history buff er for storing the history comm ands. # show history bufferlength Displayed informat ion: The current histor y buffer length is displa yed.
Chapter 10 : U s ing the Co mmand Line Inter f ace 231 Example 2 - In -Depth Security Information More inform ation is displayed when t yping the show s ecurity details command. Configuring the EMX Device and Network To configure the EMX d evice or network settings through the CLI, you must log in as the adm inistrator.
Chapter 10 : U s ing the Co mmand Line Inter f ace 232 Quitting the Con figuration Mode (on page 321 ). Device Configuration Co mmands A device configuration com m and begins wit h emd . You can use the device configuration com mands to change t he settings that appl y to the whole EMX device.
Chapter 10 : U s ing the Co mmand Line Inter f ace 233 Setting the Z Coordinate Format for Environmental Sensors This comm and syntax enables or disables th e use of rack units f or specifying the height (Z c oordinate) of en vironmental sensors .
Chapter 10 : U s ing the Co mmand Line Inter f ace 234 For more inf ormation, see Setting D ata Logging (o n page 17 6 ). Example The following comm and enables the dat a logging feat ure.
Chapter 10 : U s ing the Co mmand Line Inter f ace 235 Setting the Networking Mode If your EMX device is im plem ented with both of the wired a nd wireless networking m echanisms, you must determine which m echanism is enabled for net work connectivity before f urther configuring networking parameters.
Chapter 10 : U s ing the Co mmand Line Inter f ace 236 Enabling IPv4 or IPv6 This comm and syntax determ ines which IP protocol is enabled on the EMX. config:# network ip proto <protocol> Variables: <protocol> is one of the o ptions: v4On ly , v6Only or both .
Chapter 10 : U s ing the Co mmand Line Inter f ace 237 Example The following comm and determ ines that only IPv4 address es returned by the DNS server are used.
Chapter 10 : U s ing the Co mmand Line Inter f ace 238 Setting the Authentication Method This comm and syntax sets the wireless authentication m ethod to either PSK or Extensible A uthentication Prot ocol (EAP). config:# network wireless authMethod <method> Variables: <method> is one of the authentication m ethods : PS K or EAP .
Chapter 10 : U s ing the Co mmand Line Inter face 239 Setting the EAP Parameters W hen the wireless authentication m ethod is set to EAP, you must configure EAP authentica tion param eters, including outer authe ntication, inner authentication, E AP identit y, password, and CA certif icate.
Chapter 10 : U s ing the Co mmand Line Inter f ace 240 Setting the E AP Identity This comm and syntax determines the EA P identity. config:# network wireless eapIdentity <identity> Variables: <identity> is your user name for the EAP authe ntication.
Chapter 10 : U s ing the Co mmand Line Inter f ace 241 d. Press Enter. Tip: To remove an existi ng CA certificate, sim ply press Enter wit hout typing or pasting anyth ing when the sy stem prompts y ou to input the certificate contents. 3. If the certificate is val id, the system shows the comm and prompt " config:# " again.
Chapter 10 : U s ing the Co mmand Line Inter face 242 MIICjTCCAfigAwIBAgIEMaYgRzALBgkqhkiG9w0BAQQwRTELMAk GA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aW NzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjAmFxE5.
Chapter 10 : U s ing the Co mmand Line Inter f ace 243 Configuring the IPv4 Parameters An IPv4 configuration com m and begins with net work ipv4 . The comm ands are case sensit ive so ensure you capitalize them correctly. Setting the IPv4 Configuration Mode This comm and syntax determines the IP conf iguration m ode.
Chapter 10 : U s ing the Co mmand Line Inter f ace 244 Example The following comm and sets the IPv4 preferr ed host nam e to "m y- v4host." config:# network ipv4 preferredHostName my-v4host .
Chapter 10 : U s ing the Co mmand Line Inter f ace 245 Setting the IPv4 Gateway After selecting the sta tic IP configuration m ode, you c an use t his command s yntax to specify the gatewa y. config:# network ipv4 gateway <ip address> Variables: <ip address> is the IP address of the gate way.
Chapter 10 : U s ing the Co mmand Line Inter f ace 246 Setting the IPv4 Secondary DNS Server After selecting the sta tic IP configuration m ode, you ca n use this command s yntax to specify the secondar y DNS server.
Chapter 10 : U s ing the Co mmand Line Inter f ace 247 Example The following comm and overrides the DHC P-assig ned DNS server with the one you specified. config:# network ipv4 overrideDNS enable Configuring the IPv6 Parameters An IPv6 configuration com m and begins with net work ipv6 .
Chapter 10 : U s ing the Co mmand Line Inter f ace 248 Setting the IPv6 Address After selecting the sta tic IP configuration m ode, you ca n use this command s yntax to assign a perm anent IP address to the EMX device.
Chapter 10 : U s ing the Co mmand Line Inter f ace 249 Setting the IPv6 Primary DNS Server After selecting the sta tic IP configuration m ode, you ca n use this command s yntax to specify the prim ary DNS server. It is required to enable overriding the auto-assigned DN S server before you can specif y the DNS servers m anually.
Chapter 10 : U s ing the Co mmand Line Inter f ace 250 Overriding the IPv6 DHCP-Assigned DNS Server After specif ying the primar y/secondary DNS server, you can use this command to override th e DHCP-as signed DNS ser ver with the one you specified.
Chapter 10 : U s ing the Co mmand Line Inter f ace 251 Option Description 10Mbps The LAN speed is alwa ys 10 Mbps. 100Mbps The LAN speed is alwa ys 100 Mbps. Example The following com mand lets the EMX det erm ine the optimal LAN interface speed throug h auto -negotiation.
Chapter 10 : U s ing the Co mmand Line Inter f ace 252 Changing the HTTP Port This comm and syntax changes the HT TP port. config:# network services http port <n> Variables: <n> is a TCP port num ber between 1 and 6 5535. The def ault HTTP port is 80.
Chapter 10 : U s ing the Co mmand Line Inter f ace 253 Enabling or Disabling T elnet This comm and syntax enables or disables th e Telnet service. config:# network services telnet enabled <option> Variables: <option> is one of the op tions: true or false .
Chapter 10 : U s ing the Co mmand Line Inter f ace 254 Enabling or Disabling S SH This comm and syntax enables or disables th e SSH service. config:# network services ssh enabled <option> Variables: <option> is one of the op tions: true or false .
Chapter 10 : U s ing the Co mmand Line Inter f ace 255 Determining the SSH Authentication M ethod This comm and syntax determines the SS H authentication m ethod. config:# network services ssh authentication <auth_method> Variables: <option> is one of the op tions: passwor dOnly , publ icKeyOnly or passwordOrPublicKey .
Chapter 10 : U s ing the Co mmand Line Inter face 256 Option Description disable The SNMP v1/v2c prot ocol is disabled. Example The following comm and enables the SNMP v1/v2c pro tocol. config:# network services snmp v1/v2c enable Enabling or Disabling S NM P v3 This comm and syntax enables or disables th e SNMP v3 protocol.
Chapter 10 : U s ing the Co mmand Line Inter f ace 257 Example This comm and syntax sets the SNMP rea d-on ly community string to "public." config:# network services snmp readCommunity public Setting the SNM P Write Community This comm and syntax sets the SNMP rea d/write communit y string.
Chapter 10 : U s ing the Co mmand Line Inter f ace 258 Setting the sysNam e Value This comm and syntax sets the SNMP M IB-II s ysName value. config:# network services snmp sysName <value> Variables: <value> is a string com prising 0 to 255 alp hanumeric characters .
Chapter 10 : U s ing the Co mmand Line Inter f ace 259 Firewall Control You can manage fire wall control features through the CLI. T he firewall control lets you set up rul es that perm it or disallow access to the EMX device from a specific or a range of IP addres ses.
Chapter 10 : U s ing the Co mmand Line Inter f ace 260 Modifying the Firewall Control Parameters There are different c omm ands for modifying fir ewall control param eters.
Chapter 10 : U s ing the Co mmand Line Inter f ace 261 Option Description reject Discards traff ic from all IP addresses, and an ICMP m essage is sent to the source host f or failure notification. Tip: You can combine b oth commands to mod ify all firewall control parameters at a time.
Chapter 10 : U s ing the Co mmand Line Inter f ace 262 config:# security ipAccessControl ipv4 rule add <ip_mask> <policy> <insert> <rule_number> -- OR -- config:# security ipAc.
Chapter 10 : U s ing the Co mmand Line Inter f ace 263 <insert> is one of the opt ions: insert Above or insertBe low . Option Description insertAbove Inserts the new rule abo ve the spec ified rule number. T hen: new rule's number = the sp ecified rule num ber insertBelow Inserts the new rule be low the specified rule number.
Chapter 10 : U s ing the Co mmand Line Inter f ace 264 config:# security ipAccessControl ipv4 rule modify <rule_number> policy <policy> The command s yntax to modify all content s of an ex.
Chapter 10 : U s ing the Co mmand Line Inter f ace 265 Option Description drop Discards traff ic from the specified IP address (es), without sending an y failure notification to t he source host. reject Discards traff ic from the specified IP address (es), and an ICMP m essage is sent to the source host for failure notification.
Chapter 10 : U s ing the Co mmand Line Inter f ace 266 Example The following comm and rem oves the 5th rule from the IPv6 access control list. config:# security ipAccessControl ipv6 rule delete 5 HTTPS Access This comm and determines whether the HT T PS access to the EMX web interface is forced.
Chapter 10 : U s ing the Co mmand Line Inter f ace 267 Single Login Limitation This comm and syntax enables or disables th e single logi n feature, which controls whether m ultiple logins using the sam e login n ame simultaneousl y is permitted.
Chapter 10 : U s ing the Co mmand Line Inter f ace 268 Password Aging Interval This comm and syntax determines ho w often the passwor d should be changed. config:# security loginLimits passwordAgingInterval <value> Variables: <value> is a num eric value in days set for the p assword aging interval.
Chapter 10 : U s ing the Co mmand Line Inter f ace 269 config:# security userBlocking maximumNumberOfFailedLogins <value1> To determine how long a user's login is blo cked, use this command.
Chapter 10 : U s ing the Co mmand Line Inter f ace 27 0 Enabling or Disabling Strong Passwords This comm and syntax enables or disables th e strong pass word feature. config:# security strongPasswords enabled <option> Variables: <option> is one of the op tions: true or false .
Chapter 10 : U s ing the Co mmand Line Inter f ace 271 Maximum Password Length This comm and syntax determines the m axim um length of the password. config:# security strongPasswords maximumLength <value> Variables: <value> is an integer bet ween 16 and 64.
Chapter 10 : U s ing the Co mmand Line Inter f ace 272 config:# security strongPasswords enforceAtLeastOneUpperCaseCharacter <option> Variables: <option> is one of the op tions: enabl e or disable . Option Description enable At least one upperc ase character is required.
Chapter 10 : U s ing the Co mmand Line Inter face 273 config:# security strongPasswords enforceAtLeastOneSpecialCharacter <option> Variables: <option> is one of the op tions: enabl e or disable . Option Description enable At least one special charact er is required.
Chapter 10 : U s ing the Co mmand Line Inter f ace 274 Role-Bassed Access Control In addition to firewall acc ess control based on IP a ddresses, you can configure other access control rules that are bas ed on both IP addresses and users' roles. An IPv4 role-based acc ess control comm and begins with security roleBasedAccessControl ipv4 .
Chapter 10 : U s ing the Co mmand Line Inter f ace 275 config:# security roleBasedAccessControl ipv6 defaultPolicy <policy> Variables: <option> is one of the op tions: true or false . Option Description true Enables the role-b ased access control feature.
Chapter 10 : U s ing the Co mmand Line Inter face 276 Adding a Role-B ased Access Control Rule Depending on where you want to add a new rule in the list, the com mand syntax for adding a ru le varies.
Chapter 10 : U s ing the Co mmand Line Inter f ace 277 Policy Description deny Drops traff ic from the specified IP address r ange when the user is a m em ber of the specified role <insert> is one of the opt ions: insert Above or insertBe low .
Chapter 10 : U s ing the Co mmand Line Inter f ace 278 config:# security roleBasedAccessControl ipv4 rule modify <rule_number> startIpAddress <start_ip> endIpAddress <end_ip> To modi.
Ch apter 10 : U sing the Co mmand Line Inter face 279 config:# security roleBasedAccessControl ipv6 rule modify <rule_number> policy <policy> To modify all content s of an existing IPv6 ru.
Chapter 10 : U s ing the Co mmand Line Inter f ace 280 Deleting a Role-Ba sed Access Co ntrol Rule This comm and removes a specific rule from the list.
Chapter 10 : U s ing the Co mmand Line Inter f ace 281 Example The following comm and assigns the nam e "Cabinet hum idity" to the environmental sens or with the ID num ber 4.
Chapter 10 : U s ing the Co mmand Line Inter f ace 282 Setting the X Coordinate This comm and syntax specifies the X coor dinate of an env ironmental sensor. config:# externalsensor <n> xlabel "<coordinate>" Variables: <n > is the ID num ber of the en vironmental sensor that you want to configure.
Chapter 10 : U s ing the Co mmand Line Inter f ace 283 Setting the Z Coordinate This comm and syntax specifies the Z co ordinate of an environm ental sensor. config:# externalsensor <n> zlabel "<coordinate>" Variables: <n> is the ID number of the environmenta l sensor that you want to configure.
Chapter 10 : U s ing the Co mmand Line Inter f ace 284 Changing the Sensor Description This comm and syntax provides a description f or a specific environm ental sensor. config:# externalsensor <n> description "<description>" Variables: <n> is the ID number of the environmenta l sensor th at you want to configure.
Chapter 10 : U s ing the Co mmand Line Inter f ace 285 config:# sensor externalsensor <n> <sensor type> upperCritical <option> Variables: <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber i s assigned and shown i n the EMX web interface.
Chapter 10 : U s ing the Co mmand Line Inter f ace 286 config:# sensor externalsensor <n> <sensor type> upperWarning <option> Variables: <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the E MX web interface.
Chapter 10 : U s ing the Co mmand Line Inter face 287 config:# sensor externalsensor <n> <sensor type> lowerCritical <option> Variables: <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface.
Chapter 10 : U s ing the Co mmand Line Inter f ace 288 config:# sensor externalsensor <n> <sensor type> lowerWarning <option> Variables: <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface.
Chapter 10 : U s ing the Co mmand Line Inter f ace 289 config:# sensor externalsensor <n> <sensor type> hysteresis <value> Variables: <n> is the ID number of the environmenta l sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface.
Chapter 10 : U s ing the Co mmand Line Inter face 290 config:# sensor externalsensor <n> <sensor type> assertionTimeout <value> Variables: <n> is the ID num ber of the environm ental sensor that you want to configure. The ID num ber is ass igned and shown in the EMX web interface.
Chapter 10 : U s ing the Co mmand Line Inter f ace 291 2. Re -type the sam e password for conf irmation and press Enter. Variables: <name> is a string com prising up to 32 AS CII printable c haracters. The <name> variable CANNOT contain spaces.
Chapter 10 : U s ing the Co mmand Line Inter f ace 292 Changing a User's Password This comm and syntax allows you to change an existing user's pass word if you have the Adm inistrator Privileges. config:# user modify <name> password After perform ing the above comm and, EMX prompts you to enter a new password.
Chapter 10 : U s ing the Co mmand Line Inter f ace 293 Modifying a User's Personal Data You can change a user's personal data, inclu ding the user's full name, telephone num ber, and email address .
Chapter 10 : U s ing the Co mmand Line Inter f ace 294 config:# user modify May fullName "May Turner" telephoneNumber 123-4567 Results: May's full nam e is specified as Ma y Turner. May's telephone num ber is set to 123- 4567.
Chapter 10 : U s ing the Co mmand Line Inter f ace 295 config:# user modify <name> forcePasswordChangeOnNextLogin <option> Variables: <name> is the nam e of the user whose set tings you want to c hange. <option> is one of the op tions: true or false .
Chapter 10 : U s ing the Co mmand Line Inter f ace 296 To determine the se curity level: config:# user modify <name> securityLevel <option2> Variables: <name> is the nam e of the user whose set tings you want to c hange. <option2> is one of the o ptions: noAut hNoPriv , authN oPriv or authPriv .
Chapter 10 : U s ing the Co mmand Line Inter f ace 297 config:# user modify <name> authenticationPassPhrase <authentication_passphrase> Variables: <name> is the nam e of the user whose set tings you want to c hange.
Chapter 10 : U s ing the Co mmand Line Inter f ace 298 config:# user modify <name> privacyPassPhrase <privacy_passphrase> Variables: <name> is the nam e of the user whose set tings you want to c hange. <privacy_passphrase> is a string used as a privac y passphrase, comprising up to 32 A SCII printable characters .
Chapter 10 : U s ing the Co mmand Line Inter f ace 299 config:# user modify May snmpV3Access enable securityLevel authNoPriv userPasswordAsAuthenticationPassPhrase true Results: The user's SNMPv3 acc ess perm ission is enabled. The SNMPv3 securit y level is authenticat ion only, no privac y.
Chapter 10 : U s ing the Co mmand Line Inter f ace 300 Tip: To set the default measurement units ap plied to the EMX user interfaces for all users via CLI, see Setting D efault Measureme nt Uni ts.
Chapter 10 : U s ing the Co mmand Line Inter f ace 301 Option Description psi This option displa ys the pressure value in ps i. Example The following comm and sets all measurem ent unit preferences for the user "May.
Chapter 10 : U s ing the Co mmand Line Inter f ace 302 a. Open your SSH publ ic key with a text editor. b. Copy all contents in the text editor. c. Paste the contents into th e term inal.
Chapter 10 : U s ing the Co mmand Line Inter f ace 303 Deleting a User Profile This comm and syntax deletes an existing user pr ofile. config:# user delete <name> Example The following comm and deletes the user prof ile "May.
Chapter 10 : U s ing the Co mmand Line Inter face 304 Re- type new password: Setting Up User Pr eferences (Units of M easure) W elco me to EMX CLI! Last login: 2012- 08 -06 02:5 8:14 EDT [CLI ( Serial) from <local >] # show user adm in details [ .
Chapter 10 : U s ing the Co mmand Line Inter f ace 305 Determining the Time Setup Method This comm and syntax determines the m ethod to configure th e system date and time. config:# time method <method> Variables: <method> is one of the time setup opt ions: ma nual or ntp .
Chapter 10 : U s ing the Co mmand Line Inter f ace 306 Example The following comm and sets the primar y time server to 192.168.80.66. config:# time ntp firstServer 192.168.80.66 Specifying the Secondary NTP Server This comm and syntax specifies the prim ary time server if synchronization with the NT P server is enabled.
Chapter 10 : U s ing the Co mmand Line Inter f ace 307 Example The following comm and overrides the DHC P-specif ied NT P servers with the customi zed NTP servers, including t he prim ary and secondary NTP servers. config:# time ntp overrideDHCPProvidedServer true Role Configuration Com mands A role configuration com mand begins with role .
Chapter 10 : U s ing the Co mmand Line Inter f ace 308 Privilege Description changeAssetStripConf iguration Change Asset Str ip Configuration changeAuthSettings Change Authentication Settings ch angeD.
Chapter 10 : U s ing the Co mmand Line Inter f ace 309 Example The following comm and creates a ne w role and assigns privileges to the role. config:# role create tester firmwareUpdate;viewEventSetup Results: A new role "tester" is cr eated.
Chapter 10 : U s ing the Co mmand Line Inter f ace 310 config:# role modify <name> addPrivileges <privilege1>:<argument1>,<argument2>...; <privilege2>:<argument1>,<argument2>...; <privilege3>:<argument1>,<argument2>.
Chapter 10 : U s ing the Co mmand Line Inter f ace 311 config:# role modify <name> removePrivileges <privilege1>:<argument1>,<argument2>...; <privilege2>:<argument1>,<argument2>...; <privilege3>:<argument1>,<argument2>.
Chapter 10 : U s ing the Co mmand Line Inter f ace 312 Example The following comm and deletes an existing ro le. config:# role delete tester Asset Management Commands You can use the CLI com mands to chan ge the settings of the con nected asset sensor (if an y) or the settings of LEDs on the asset sensor.
Chapter 10 : U s ing the Co mmand Line Inter f ace 313 Asset Sensor M anagement An asset sensor m anagement configuration com m and begins with assetStrip . Naming an Asset Sensor This comm and syntax names or changes the name o f an asset se nsor connected to the EMX d evice.
Chapter 10 : U s ing the Co mmand Line Inter f ace 314 Example The following comm and specifies the total n umber of rack units on the asset sensor #1 to 48 rack units.
Chapter 10 : U s ing the Co mmand Line Inter f ace 315 Specifying the Rack Unit Numbering Offset This comm and syntax spec ifies the starting num ber of rack units on the asset sensors connecte d to the EMX device.
Chapter 10 : U s ing the Co mmand Line Inter f ace 316 Orientation Description bottomConnector This option indicates th at the asset sensor is mounted with the RJ -45 connector located at the bottom. Example The following comm and specifies the orie ntation of the RJ - 45 connector on the asset sensor #1 t o be on the top .
Chapter 10 : U s ing the Co mmand Line Inter f ace 317 Example The following comm and assigns the nam e "Linux serv er" to the rack unit whose index num ber is 25 on the ass et sensor#1.
Chapter 10 : U s ing the Co mmand Line Inter f ace 31 8 Setting the LED Disconnect Color This comm and syntax sets the LED co lor for all rack units on the connected asset sensor(s ) to indicate the absence of a connected asset tag.
Chapter 10 : U s ing the Co mmand Line Inter f ace 319 Setting an LED Mode for a Rack Unit This comm and syntax sets the LED m ode for a specific rack unit on the specified asset sensor. You need to set a rack unit's LED m ode only when the LED operati on mode of this rack unit has be en set to "manual.
Chapter 10 : U s ing the Co mmand Line Inter f ace 320 Setting the Histor y Buffer Length This comm and syntax changes the hist ory buffer length. T he default length is 25. config:# history length <n> Variables: <n> is an integer num ber between 1 and 25 0.
Chapter 10 : U s ing the Co mmand Line Inter face 321 Example 2 - Combination of SSID and PSK Parameters This multi-com mand syntax configures bo th of SSID and P SK parameters s imultaneously for the wireless feature. config:# network wireless SSID myssid PSK encryp_key Results: The SSID value is set to m yssid.
Chapter 10 : U s ing the Co mmand Line Inter f ace 322 3. W hen the "Username to unblock" prom pt appears, t ype the login name of the user to be unblock ed and press Enter. 4. A message appears , indicating that the s pecified user was unblocked succ essfully.
Chapter 10 : U s ing the Co mmand Line Inter f ace 323 Network Troubleshooting The EMX provides 4 d iagnostic comm ands for troubleshooting network problems : nslookup , netstat , pi ng , and tracerout e . The diagnost ic commands f unction as corresponding L inux comm ands and can get corresponding Linux out puts.
Chapter 10 : U s ing the Co mmand Line Inter face 324 Showing the Network Connections This comm and syntax displays network connections and/or status of ports. diag> netstat <option> Variables: <option> is one of the op tions: ports or connections .
Chapter 10 : U s ing the Co mmand Line Inter f ace 325 Testing the Network Connectivity This comm and syntax sends the ICMP ECHO_REQUE ST mes sage to a network host for c hecking its net work connectivity.
Chapter 10 : U s ing the Co mmand Line Inter f ace 326 Tracing the Route This comm and syntax traces the net work route betwee n your EMX device and a net work host. diag> traceroute <host> Variables: <host> is the nam e or IP address of the host you want to trace.
Ch apter 10 : U sing the Co mmand Line Inter face 327 # show help To query available n etwork configuratio n parameters, the syntax is: config:# network ? OR config:# network help To query available r.
Chapter 10 : U s ing the Co mmand Line Inter f ace 328 Logging out of CLI After com pleting your tasks using the CLI, alwa y s log out of the CLI to prevent others from accessing the CLI. To log ou t of the CLI: 1. Ensure you have ent ered the adm inistrator m ode and the # prom pt is displayed.
329 In This Chapter Asset Sensors and T ags ....................................................................... 329 A sset Sensors and Tags Asset managem ent tags (AMTs ) are electronic IDs that are adhere d to data center item s such as servers and then plugged in to asset managem ent sensors (AMS) m ounted on the rack .
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 330 Configuring the Asset Sensor The EMX cannot detec t how man y rack units (tag ports ) a connected asset sensor supports , so you mus t provide this information m anually. You can nam e the asset sensor or determ ine the number ing wa y for all rack units in the web i nterface.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 331 For the latest vers ion of asset sensors with a built- in tilt sensor, it is NOT necess ary to configure the orientat ion setting manua lly. The EMX device can detect the orientation of the asset sensors and automatically configure it.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 332 Changing a Specific LED' s Color Settings In the EMX web interf ace, a rack unit refers to a tag port on the asset sensor. You can nam e a specific rack unit, or c hange it s LED co lor settings so that this LE D behaves differentl y from others on th e same asset sensor.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 333 Connecting A MS- M2 -Z Asset Sensors (Opt ional) The AMS- M2 -Z is a special t ype of asset sensor that functions the sam e as re.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 334 c. Connect the other en d of the cable to the RJ- 45 connector labeled "Input" on ano ther AMS- M2 - Z. d. Repeat the above ste ps to dais y chain additional AMS - M2 -Z.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 335 Models Daisy-chain limit ations EMX2-888 Up to 6 AMS- M2 - Z can be dais y chained. The maximum cable length between each AMS- M2 -Z in the chain is 3 m eters. Expanding a Blad e Extension Strip A blade extension str ip, like an asset sensor, has m ultiple tag ports.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 336 3. Double-click that rack unit or click the white arrow prior to the folder icon.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 337 Item Description A Barcode (ID num ber) for the tag connector cable B Tag connector C Cable connector for c onnecting the blade e.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 338 2. Move the blade extens ion strip toward the bott om of the blade chassis until its m ylar section is full y under the chassis, and verif y that the blade extensi on strip does not fall of f easily.
Appendix A : Using Raritan Asset M anagement Sensor s with the EMX 339 5. Plug the tag connector of the blade extension strip into the closest tag port of the asset s ensor assem bly or the AMS- M2 -Z asset sensor on the rack.
340 In This Chapter Overview ................................................................................................ 341 EMX Asset Sensor Ma nagem ent .
Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 341 Overview dcTrack ™ , Raritan's da ta center m anagement solution, integrates with Raritan's EMX, ass et managem ent sensors and asset m anagement tags.
Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 342 Diagram key Asset managem ent tag (AMT) Asset managem ent sensor (AMS) EMX EMX/Power IQ To connect each compon ent: 1.
Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 343 EMX Asset Sensor Management Before asset sensors c an be m anaged in dcTrack ™ , they mus t be configured in EMX, the EMX needs to be add ed to dcT rack as a probe item, and the data ce nter item the asset m anagement tag is adhered to must exist in dcT rack.
Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 344 5. Click Setup in the S ettings section. The Setup of Asset Strip d ialog appears. 6. Enter a nam e of the asset sensor. 7. T y pe the total num ber of rack units th e selected asset sensor has in the "Number of Rack Units" field.
Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 345 12. In the Numbering Off set field, select the startin g num ber. For example, if you select 3, the f irst rack unit is num bered 3, the second is numbered 4, the third is num bered 5, and so on until the f inal number.
Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrack 346 6. Click Configure Rack Unit or double -click the selected rack unit. The setup dialog for the sel ected rack unit appears. 7. In the Name f ield, type a nam e for identif ying this rack unit.
Appendix B : Integrating EM X an d Asset Manag ement Sensor s with dcTrac k 347 4. Select Add a New Item from the Actions drop-do wn in the toolbar. At a minimum , complete all of the required f ields on the Detail 1 page. Complete add itional fields as needed.
Appendix B : Integrating EM X an d Asset Manag ement Sensors w ith dcTrack 348 To assign an IP address , select a subn et. This automatica lly assigns the first availab le address from the selected subnet.
349 In This Chapter Overview ................................................................................................ 349 Overview Raritan's PX2 po wer distribution unit (PDU) a lso supports as set sensors so that you can rem otely track IT devices through the PDU's web interface while m onitoring the PDU's po wer status.
Appendix C : Raritan PX Asset Ma nagement 350 To set up an asset m anagement s ystem: Affix the adhesive end of an ass et tag to each IT device through the tag's tap e. Plug the connector on th e other end of each asset tag into the corresponding tag port o n the asset sensor.
351 In This Chapter Altitude Correction Fac tors (EMX) ......................................................... 351 Maximum Am bient Operating Tem perature (EMX) ............................... 351 Serial RS-232 Port P inouts ........................
Appendix D : Specification s 352 Serial RS-232 Port Pinouts RS -232 Pin/signal def inition Pin No. Signal Direction Description 1 DCD Input Data 2 RxD Input Receive data (data in) 3 TxD Output Transm .
Appendix D : Specifications 353 RS -485 Pin/signal def inition 3 D+ bi - directional Data + 4 ― ― ― 5 ― ― ― 6 D- bi - directional Data - 7 ― ― ― 8 ― ― ―.
354 This section provides a n LDAP exam ple for illustrating the configuration procedure using M icrosoft Active Director y ® (AD). T o configure LDAP authentication, four m ain steps are re quired: a. Determine user accoun ts and groups inten ded for the EMX b.
Appendix E : LDAP Configu ration Illustrat ion 355 Step B. Configure User Groups on the AD Server You must create the gro ups for the EMX o n the AD ser ver, and then make appropriate users mem bers of these groups. In this illustration, we ass um e: The groups for the EMX are nam ed EMX_Admin an d EMX_User .
Appendix E : LDAP Configu ration Illustrat ion 356 Step C. Configure LDA P Authentication on the EMX Device You must enable an d set up LDAP authent ication properl y on the EMX device to use ext ernal authentication. In the illustration, we ass um e: The DNS server setti ngs have been config ured properl y.
Appendix E : LDAP Configu ration Illustrat ion 357 Base DN for Search - T ype dc=techadssl,dc=com as the starting point where your search begins on t he AD server. Login Nam e Attribute - Ensure the f ield is set to sAMAccountName because the LD AP server is Micros oft Active Directory.
Appendix E : LDAP Configu ration Illustrat ion 358 Note: For more informa tion on LDA P configuration, see Setting Up LDAP Authentication (on page 12 3 ). 5. Click OK to save the cha nges. The LDAP serv er is saved. 6. Click OK to save the c hanges. T he LDAP authentication is act ivated.
Appendix E : LDAP Configu ration Illustrat ion 359 c. Click Add. d. Repeat Steps a to c t o add all perm issions beginning with "View." 6. Click OK to save the cha nges. The EMX_User r ole is created. 7. Keep the Manage R oles dialog opened to create the EMX_Adm in role.
Appendix E : LDAP Configu ration Illustrat ion 360 2. T y pe EMX_Admin in the Role Nam e field. 3. T y pe a description for the EMX_Adm in role in the Descr iption field. In this example, we t ype "The role includes a ll privileges" to desc r ibe the role.
Appendix E : LDAP Configu ration Illustrat ion 361 5. Click OK to save the cha nges. The EMX_ Admin role is created. 6. Click Close to quit t he dialog.
.
363 A A Note about Untr iggered Rules • 158 About C ontact Closure Sensors • 35 About the Interfac e • 212 Access Securit y Control • 104 Add Page Icon • 56 Adding a Firewall Rul e • 261 A.
Index 364 Connecting a Logitech W ebcam (Optional) • 41, 184, 185 Connecting a Schrof f LHX Heat Exc hanger (Optional) • 41, 192 Connecting AMS- M2 -Z Ass et Sensors (Optional) • iii, 28, 333 Co.
Index 365 Enabling Login Lim itations • 111 Enabling or Disabling a Us er Profile • 2 94 Enabling or Disabling Dat a Logging • 233 Enabling or Disabling SN MP v1/v2c • 255 Enabling or Disablin.
Index 366 Logging in to CLI • 213 Logging out of CLI • 32 8 Login Limitation • 266 Logout • 52 Lowercase Character R equirem ent • 271 M MAC Address • 5 0 Managing Environm ental Sensors .
Index 367 Record Snapshots to W ebcam Storage • 143 Reset Button • 50 Resetting the EMX • 322 Resetting the PM710 Minim um and Maximum Values • 199 Resetting to F actor y Defaults • 50, 102,.
Index 368 Setting Up an EMX Usi ng Bulk Configur ation • iii, 72, 94 Setting Up an SSL Cert ificate • iii, 104, 118 Setting Up Asset Sensors in EMX • 343 Setting Up Default Us er Preferences (Un.
Index 369 W ired Network Se ttings • 78 W ireless Configuration • 220 W ireless Network Settings • 79 W ith Hype rTerm inal • 213, 321 W ith SS H or T elnet • 214.
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 73 2-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732- 764 -8887 Email for CommandCenter NOC: tech-ccnoc@raritan.
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il Raritan Computer EMX2-111 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del Raritan Computer EMX2-111 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso Raritan Computer EMX2-111 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul Raritan Computer EMX2-111 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il Raritan Computer EMX2-111, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del Raritan Computer EMX2-111.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il Raritan Computer EMX2-111. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo Raritan Computer EMX2-111 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.