background image

AlterPath BladeManager

User Manual

Product Version 1.3.0

Revision No. 7

This document contains proprietary information of Cyclades and is not to be disclosed 

or used except in accordance with applicable contracts or agreements. 

©

Cyclades Corporation, 2005

Summary of Contents for AlterPath BladeManager

Page 1: ...r Manual Product Version 1 3 0 Revision No 7 This document contains proprietary information of Cyclades and is not to be disclosed or used except in accordance with applicable contracts or agreements...

Page 2: ...h KVM net AlterPath Manager E2000 and AlterPath BladeManager are registered trademarks of Cyclades Corporation IBM IBM BladeCenter and ServeRAID are registered trademarks of IBM Corporation Microsoft...

Page 3: ...Interface 1 3 One Click Access to Blades and Switches 1 4 Centralized Data Logging System 1 4 Log File Compression and Rotation 1 4 Prioritized Triggers Alarms 1 4 Other Alarm Features 1 5 Blade Wizar...

Page 4: ...nfiguration 2 23 BladeManager Controls LEDs and Power 2 23 BladeManager Power Features 2 26 Switching On the Server 2 26 Switching Off the BladeManager 2 27 Pre Configuration Requirements 2 28 Configu...

Page 5: ...3 20 Event Logs 3 21 Data Buffer 3 22 User s Profile 3 23 Changing Your Password 3 25 Viewing the Use Access Form 3 25 Viewing the User Groups Form 3 25 Viewing the Security Form 3 27 Chapter 4 BladeM...

Page 6: ...d Selecting the Correct IP Mode 4 24 Function of the Status Field 4 24 Selecting the Group s to Access a Chassis 4 25 Proxies 4 26 Proxy Types 4 26 Configuring the Proxy 4 28 Verifying your Proxy Sett...

Page 7: ...e Notified 4 50 Assigning the Console to a Group 4 51 Deleting a Console from a Group 4 52 Deleting a Console Group 4 53 Connecting to a Console 4 53 Log Rotation 4 53 Initiating Log Rotation 4 53 Set...

Page 8: ...76 BladeManager Database Transaction Support 4 77 Responding to the Warning Message 4 77 Changing the Default Configuration 4 78 Info Reporting 4 78 Chapter 5 Advanced Configuration Working from a CLI...

Page 9: ...nager Manual VII Firmware 5 16 Upgrading the APBM Firmware 5 16 Backing Up User Data 5 17 Managing Log Files 5 18 Changing the Database Configuration 5 19 Installing SSL Certificates 5 20 Appendix A H...

Page 10: ...Table of Contents VIII AlterPath BladeManager Manual...

Page 11: ...Manager Users are expected to have basic knowledge of using a graphical user interface such as Microsoft Windows Document Organization The document is organized as follows Chapter Title Description 1...

Page 12: ...nager screens or windows contain only two levels Example 4 BladeManager Web Administration Explains to the system administrator how to configure the BladeManager through the web interface and enable u...

Page 13: ...application s GUI do not necessarily appear on the actual window Because some forms do not have titles these names are used to distinguish each form as well as to reflect the form function The most c...

Page 14: ...the letters listed within the brackets Example iptables ADC chain rule specification options Ellipses Ellipses indicate that the latest parameter can be repeated as many times as needed Usually this i...

Page 15: ...should not be any spaces between the values sXX pmusers The user access list For example jane 1 2 john 3 4 The format of this field is username outlet list username outlet list Where outlet list s for...

Page 16: ...Before You Begin vi AlterPath BladeManager Manual...

Page 17: ...ministrators to quickly diagnose and restore disconnected devices Easy to use web interface for administrators and regular users For a summary of all the AlterPath BladeManager features see Key Featur...

Page 18: ...ured through the Security Profile settings The switches connect as secondary or cascaded devices to the chassis Front view of the BladeManager See Chapter 2 BladeManager Installation to view the port...

Page 19: ...methods local database RADIUS LDAP Kerberos Tacacs NIS and active_directory Consolidated Views and Blade Access The BladeManager provides secure OS POST and BIOS access to individual blades and switc...

Page 20: ...console log capacity of 20GB the secure online offline storage ensures availability of all important console messages Each line of the logfile contains a timestamp a feature which prevents tampering...

Page 21: ...the system administrator to define the blades automatically using default and customized values The wizard automatically configures the selected blade s and switch es and applies them The wizard save...

Page 22: ...ultiple network segments This enables the BladeManager to physically separate devices and connect to multiple network segments The Ethernet cards are detected by the configuration wizard during boot t...

Page 23: ...low shows how the BladeManager may be set up to connect to a management network and a public network Equipped with its own Ethernet switches the two networks are physically separated Any BladeManager...

Page 24: ...1 Introduction 1 8 AlterPath BladeManager Manual...

Page 25: ...e Installing a Simple Swap Serial ATA Hard Disk Drive Installing a SCSI Hard Disk Drive Installing an Adapter Completing an Installation Connecting the Cables Updating the Server Configuration Prepari...

Page 26: ...extend more than one device out of the rack cabinet at the same time Connect all power cords to properly wired and grounded electrical outlets Maintain reliable earthing of rack mounted equipment by...

Page 27: ...g vibration prone areas a Press on the rail adjustment bracket 1 on the rear of the slide rail to prevent the bracket from moving b Press on tab 2 and tab 3 and slide the rail locking carrier toward t...

Page 28: ...e slide rail until it snaps into place if you need to adjust the slide rail length b Align the pins on the rear rail locking carrier with the holes on the rear mounting flange c Press the tab 2 to sec...

Page 29: ...o the front mounting flange b If you adjusted the rail length push the rail locking carrier back toward the rear of the slide rail to align the slide rail with the mounting flange c Press the tab 2 to...

Page 30: ...other location with the server installed remove one screw and loosen the other screws as indicated b Fully extend the rail and re insert the screw and tighten all screws to secure the rail c If you do...

Page 31: ...the rack cabinet Secure the server to the front mounting flanges with the captive thumbscrews 1 Note You must leave the shipping brackets 2 attached to the slide rails unless the shipping brackets im...

Page 32: ...and remove the shipping from the slide rail b Repeat previous step for the other shipping bracket c Store the shipping bracket for future use Note You just re install the shipping brackets on the sli...

Page 33: ...ual 2 9 a Attach cables to the rear of the BladeManager such as keyboard mouse monitor cables as needed b Route the cables to the left corner of the BladeManager as viewed from the rear and use the ca...

Page 34: ...o the rack If necessary disconnect the cables from the rear of the server then slide the server out of the rack 150 mm 6 in and insert the M6 screws in each slide rail b Secure the server or the rack...

Page 35: ...components are as follows Blue on a component indicates touch points where you can hold the component such as when you remove it from or install it in the server Orange on or near a component indicat...

Page 36: ...r is running since operating the server without the air baffle might overheat the microprocessor Static Sensitive Devices Static electricity can damage electronic devices including your server To avoi...

Page 37: ...on will reduce the amount of usable memory A certain amount of memory must be reserved for system resources The BIOS displays the total amount of installed memory and the amount of configured memory Y...

Page 38: ...ll a DIMM complete the following procedure 1 Review the preceding installation guidelines 2 Switch off the server and peripheral devices and disconnect the power cord and all external cables 3 Remove...

Page 39: ...he cover 10 Go to Completing the Installation this chapter Installing a Hard Disk Drive Follow the documentation that comes with the hard disk drive in addition to the instructions in this chapter Ins...

Page 40: ...at the beginning of this chapter 2 Switch off the server and peripheral devices disconnect the power cord and all external cables 3 Remove the cover 4 Press the release tabs on the bezel and pull the...

Page 41: ...s adapter In addition to the instructions in this section follow the instructions that come with the adapter Your server comes with two peripheral component interconnect extended PCI X adapter slots l...

Page 42: ...led only in PCI X slot 2 You can install an optional RAID controller in your server to control the internal hard disk drives for example to allow you to configure the internal hard disk drives into di...

Page 43: ...ices disconnect the power cord and all external cables 3 Remove the cover 4 Follow the cabling instructions that come with the adapter Route the adapter cables before you install the adapter 5 Follow...

Page 44: ...e adapter from the static protective package Avoid touching the components and gold edge connectors on the adapter 9 Place the adapter component side up on a flat static protective surface and set any...

Page 45: ...r in the rack cabinet Attention Install your server only in a rack cabinet with perforated doors Do not leave open space above or below an installed server in your rack cabinet To help prevent damage...

Page 46: ...ntifiers are printed on the cables that come with the BladeManager Use these identifiers to connect the cables to the correct connectors 4 There is one keyboard connector on the back of the server Use...

Page 47: ...ration using the SCSI controller with integrated RAID SCSI models only or the integrated Serial ATA controller with RAID and you have installed or removed a hard drive you might have to reconfigure yo...

Page 48: ...anager if it is in a location with numerous other servers If your server supports IBM director you can use IBM Director to light this LED remotely Hard disk drive activity LED When flashing it indicat...

Page 49: ...ST You might have to use a pen or the end of a straightened paper clip to press the button Rear LEDs Function Ethernet 1 transmit receive activity LED This LED is on the Ethernet connector When lit it...

Page 50: ...the following ways If a power failure occurs while the BladeManager is switched on the BladeManager will start automatically when power is restored If the BladeManager is connected to an Advanced Sys...

Page 51: ...ght have more than one power cord To remove all electrical current from the device ensure that all power cords are disconnected from the power source You can switch off the BladeManager in any of the...

Page 52: ...ccess is designed for regular users who will use or operate the application after the BladeManager administrator has completed the configuration procedures discussed in chapter 4 Requirement Descripti...

Page 53: ...ace and configuring the BladeManager connectivity and system settings The process is discussed in more detail in Chapter 4 Configuring the BladeManager Before using the terminal make sure it is config...

Page 54: ...2 BladeManager Installation 2 30 AlterPath BladeManager Manual...

Page 55: ...ng the BladeManager Web Management Interface Logging In Using the Alarms forms Using the Blades forms Using the Logs forms Using the User Profile forms If you are a BladeManager administrator refer to...

Page 56: ...TTP to Use Only HTTPS on page 5 16 Chapter 5 Advanced Configuration Blades Use the Blades form to view a list of blades assigned to you From the list select the blade you wish to access or select the...

Page 57: ...ser name and password as provided by your system administrator 3 Select the Login button Upon successful login the Alarms form appears Note The first time BladeManager launches your application screen...

Page 58: ...pears on the lower left hand corner of the screen The Admin tab is visible to regular users with admin rights Be sure to select the Logout button on the top right hand corner after you finish your ses...

Page 59: ...List form This allows you to search through a List form by selecting the search category i e Blade group from the dropdown field and selecting the Search button You can also filter your search by sel...

Page 60: ...Reassign the ticket or assignment to another user and optionally add notes about the ticket Once assigned the user working on the ticket can perform any of the following procedures to resolve the ala...

Page 61: ...e symbol above the ticket number indicates the severity level of the alarm Select the number to display the Alarm Detail form Blade Blade from which the alarm originated Click on the blade name to ena...

Page 62: ...elow 1 From the Alarm List form click on the ticket number Blade Config Blade configuration Select this to view the Blade Detail form which includes the secondary form Console Notify Console Access an...

Page 63: ...larm Select a user to assign or re assign ticket to another individual user Status Dropdown box to select the status of the ticket Messages The system generated message s pertaining to the alarm Notes...

Page 64: ...ish to view The system displays the Logs form Assigning a Ticket to a User To assign or re assign a ticket to a user follow these steps 1 From the Alarm List form select an alarm or ticket to open the...

Page 65: ...a KVM port for KVM net Power ON or OFF the selected blade or switch Access to blades and switches and the types of connection are configured by the System Administrator from the Security Profile You...

Page 66: ...your mouse cursor over the Blade name to select connection type CLI KVM VM ON OFF Type The type of blade as defined in the Blade Detail form Config For each line select view to open the Blade Detail f...

Page 67: ...s the authentication Multiple Users and Read Write Access Because the BladeManager supports multiple connections to the same port this makes it possible for multiple users to view the same form Note h...

Page 68: ...ar user you can only view those blade servers to which you have access You may also view your user profile with regards to blade access from the User s Profile option of the menu Security form Console...

Page 69: ...he group s to which the current console belongs Console Name Name of the target console Device Name Name of the device used by the console Port Name of port used by the console Status Status of the ta...

Page 70: ...ss the current blade To view the Blade Access form 1 From the Blade Detail form click on Access The system displays the Blade Access form Consoles Notify Form The Console Notify form shows the users w...

Page 71: ...he selection box a plus sign indicates a group as opposed to a user USER is the default list which contains all users Consoles Groups Form The Console Groups form shows the group s to which the curren...

Page 72: ...ppropriate log type from the title bar As with blades and alarms you can only view the logs of systems to which you have authorized access Log Type Definition Access Log Logs that provide logging info...

Page 73: ...ave authorized access perform the following steps 1 Select Logs from the menu Table 3 5 Form Fields and Elements Field Name Definition Console Drop down list to select a blade server that will be the...

Page 74: ...ect a range of dates from which to base your logs by selecting from the Date From and Date to drop down lists The system brings up the Logs Detail form Access Logs Use Access Logs form to view the Acc...

Page 75: ...ime on your target blade server Table 3 6 Access Logs Field Definition Field Name Definition Date Date in which the event occurred Time Time of the event User User who connected to the blade Action Wh...

Page 76: ...data buffer generated by a target blade server Note You can also access the Data Buffer log from the Alarms form Table 3 7 Event Logs Field Definition Field Name Definition Date Date of the event Time...

Page 77: ...nly your own profile The User s Profile has four tabbed forms See the Form Fields and Elements table for the function of each form Table 3 8 Users Profile Details Form Fields and Elements Field Name D...

Page 78: ...indicate that the user has Admin privileges and also belongs to the Admin user group Security Profile Check box to indicate that a security profile has been assigned to the user Local Password Check b...

Page 79: ...he new password twice 3 Click on Submit Viewing the User Access Form The User Access form shows the blades that the current user can access To view the User Access form 1 From the User Detail form cli...

Page 80: ...urrent form Select groups for the user List box from which to select a possible list of user groups assignable to the current user Add Button to add a selected user group left list box to the Selected...

Page 81: ...enu select User s Profile from the Details form select the Security tab The system displays the Security tabbed form Table 3 10 User s Profile Security Form Fields and Elements Field Name Definition S...

Page 82: ...rofile list box Selected security profiles The list box that shows the Security Profile assigned to the current user Security profiles via user groups The list box that shows the Security Profile assi...

Page 83: ...ration Wizard BladeManager Web Interface Admin Mode Forms Summary Parts of the Web Interface Chassis Management Proxies Two Methods of Blade Configuration Configuring Blades Manually through the Menu...

Page 84: ...ked Unless a regular user has been configured to be an admin user as well through the User Detail form regular users can use the application only in Access mode Only an administrator or admin user can...

Page 85: ...nsole Perform First Time Configuration Reboot successful Reset system to default factory settings Logon to Blade Manager as Admin N Y Chassis Info Reporting Groups Alarm Trigger Users Blades Switches...

Page 86: ...serial console Log in as root Before you run First Time Configuration check to ensure that your system is set up properly If you are using a PC ensure that HyperTerminal is installed on your Windows...

Page 87: ...n the Authentication Method that you select the system will prompt you for additional information See Setting the Authentication Method on page 4 8 for more information Resetting Configuration to Fact...

Page 88: ...nced by the heading Welcome to Cyclades APBM Caution Before the Welcome heading appears the system will prompt you for the following Be sure to answer no to the above questions Once completed you shou...

Page 89: ...d Current system date and time is Tue Apr 5 17 11 18 PDT 2005 Press ENTER to accept it or specify new ones Enter date in MM DD YYYY format 48 Enter date in MM DD YYYY format Tue Apr 5 17 11 00 PDT 200...

Page 90: ...Note If you use NIS Authentication and the NIS server fails APBM will not allow you to add the user in the local database since it already exists in the NIS server This is due to the way NIS centraliz...

Page 91: ...IP address of either the first or second Ethernet interface that you defined during the First Time Configuration 2 When the Login screen appears enter admin as the username and the password as specif...

Page 92: ...e menu choices are discussed in the following order Chassis Blades Switches Alarm Triggers Users Groups Security Profiles Info Reporting Forms Summary The table below summarizes all the forms of the B...

Page 93: ...to access the chassis Proxies Select the type of web proxy to use when using the web application i e IBM BladeManager Switch 1 Configure a switch for the chassis Switch 2 Configure a second switch for...

Page 94: ...elong Security Select one or more security profiles to apply to the current user Groups Group List View list of groups according to user blade or switch Chassis General Select group members for the se...

Page 95: ...y profile Source IP Define the source IP addresses allowed or not allowed VLAN Subnet Define the VLANs subnets allowed or not allowed Date Time Define the date and time in which system access is allow...

Page 96: ...When the BladeManager launches your application screens for the first time the process tends to be slow The system needs to build all the web pages in the BladeManager Once the screens are stored ret...

Page 97: ...all primary forms are shown in their entirety i e the entire screen which includes the menu panel and form Non primary forms are shown only as individual forms i e without the menu panel and other GU...

Page 98: ...appears adjacent to the heading on which the sort is based The position of the arrowhead indicates the sort order A downward arrowhead indicates that the list is alpha numerically arranged in ascendin...

Page 99: ...ge against the form Chassis Management The Chassis option composed of the Devices List form and seven tabbed forms of the menu allows you to add a blade chassis and use the wizard to create 14 blade c...

Page 100: ...orm Delete button Search sort and save list of devices Chassis List form Select group s to access the chassis Groups tabbed form Select type of web proxy to access web pages Proxies tabbed form Config...

Page 101: ...le 4 3 Chassis Devices List Fieldnames and Elements Fieldname Element Definition unlabeled checkbox Checkbox to select the device to be deleted Device Device name Click on the device name to connect t...

Page 102: ...ew the log for this device Status Status of the device Enabled Disabled or OnDemand OnDemand means that the device is enabled only upon user connection Filter by From the dropdown box select the field...

Page 103: ...ype form 3 From the Select Device Type form since the field box already says IBM BladeCenter click the Select button Proceed to Step 5 4 If you are editing an existing chassis from the Device list for...

Page 104: ...ently selected tabbed form Device Name The symbolic name linked to the chassis Type IBM Blade Center is the only supported type of device or chassis Location Physical location of the device or chassis...

Page 105: ...DHCP is served by another server or Static if using a static IP See Configuring Your DHCP Server this chapter Mac Address The MAC address if the selected IP mode is int_dhcp IP Address The IP address...

Page 106: ...de is Enable i e permanently connected Disable no connection established or OnDemand Table 4 4 Types of IP Mode IP Mode When to use this mode int_dhcp internal Select this mode if you are using the Bl...

Page 107: ...chassis 1 From the menu go to Devices Details Groups The system displays the Devices Groups tabbed form 2 Select or highlight from the left list box the device group that the current chassis supports...

Page 108: ...any web interface Provide a secure mechanism for BladeManager clients to access remote servers Configure remote AlterPath devices directly from the BladeManager Proxy Types There are three types of pr...

Page 109: ...ices Forward Proxy A forward proxy acts as a gateway for a client s browser sending HTTP requests on the client s behalf to the Internet The proxy protects your inside network by hiding the client s a...

Page 110: ...sts highlight the device and click on the Edit button 3 From the Device Edit form select the Proxies tab The system displays the Proxies tabbed form 4 From the Proxies tabbed form select the type of w...

Page 111: ...age indicating that they are not authorized to access the proxy Configuring Ports to be Proxied When Forward Proxy with or without ARP is enabled for a device the default proxied ports are 80 and 443...

Page 112: ...rm IP Address The IP address of the chassis module using IP mode int_dhcp or static Type The symbolic name linked to the chassis switch IBM Blade Center is the only supported type of chassis Admin Nam...

Page 113: ...ot allow you to add or configure a switch console unless this field is set to Enable Netmask As indicated in dotted notation IP Mode Dropdown list box Select int_dhcp if the BladeManager is the DHCP s...

Page 114: ...are as follows The Blade Wizard forms are as follows Table 4 6 Summary of Blade Wizard Forms Screen Form Name Function Warning Warns the users that existing entries for chassis blades in the BladeMana...

Page 115: ...of any data to be overwritten and the choices you have before going ahead with the wizard Note Use the Back Next and Cancel buttons to navigate through the forms Pressing the Next button saves your cu...

Page 116: ...so adds a plus sign to any added user group that appears in the selection box Follow the instructions for the User Access form and then click on the Notify tab to proceed to the user notification form...

Page 117: ...plete the Groups form as necessary and then select the Next button to display the Unconfigured Consoles form 6 Unconfigured Consoles Select the check box for each unconfigured console that you wish to...

Page 118: ...2 2 to continue the same form Note If you need to change the prefix of the console names type in the new prefix in the Console Prefix field and then click on the Console Prefix button The system appli...

Page 119: ...wn below displays all the blades and switches configured and supported by the BladeManager The form allows you to Connect to a blade Switch When you move your cursor to the blade or switch name a pop...

Page 120: ...k on the device name to which you wish to connect If the Proxy for this device is enabled then you should have the option to connect to CLI or Web when you click on the device name In the example belo...

Page 121: ...From the Device Detail form click on Groups The system displays the Device Group form 4 From the Selected Groups view panel of the Console Group form select the group or groups from which you wish to...

Page 122: ...the menu select Alarm Trigger Table 4 7 Summary of Alarm Trigger Forms Form Function Form s Used Add a new trigger string Alarm Trigger list form Add button Alarm Trigger detail form Edit an alarm tri...

Page 123: ...form section To view or edit the configuration of an alarm trigger click on the alarm trigger name Creating an Alarm Trigger Use the Alarm Trigger Detail form to define triggers to generate user notif...

Page 124: ...ting a trigger name invokes the Alarm Trigger Detail form for that trigger Trigger Expression String used to generate a trigger Notify Yes or No Indicates if system needs to notify i e send an email t...

Page 125: ...refore both types of messages will cause alarms if OK is appended to the HeaLth_MoNiToR trigger string Blades Switches The Blades Switches option allows you to configure the following Save Button to s...

Page 126: ...any alarms from the current console Console detail form Notify button Console Notify form Edit a console Console List form edit link under the Config column Console detail form Delete console Console...

Page 127: ...ining to the console and to select users to have authorized access to the console Data buffering data logging and event notification are valid definitions only for consoles with permanent connections...

Page 128: ...erial Console This procedure uses the serial console as an example of the console type to be created Depending on the type of console there will be variations in the Console Detail form but the proced...

Page 129: ...rPath BladeManager Manual 4 47 The system displays the Select Console Type form 3 From the Select Console Type form select the type of console Blade or Switch you wish to add The system displays the C...

Page 130: ...oup form used to assign the current console to one or more console groups Console Name Required Name of the console Device Name Drop down list Console server to which the current console is connected...

Page 131: ...r more users to access the current blade console 1 From the Console Detail form Consoles Console List Console Detail click on the Access button Status Drop down list Enable Disable OnDemand Log Rotati...

Page 132: ...3 Select the Add button The system transfers the selected user to the Selected Users view panel on the right 4 To select another user repeat steps 1 and 2 You can also use the Shift key to select mul...

Page 133: ...Selected Users view panel on the right 4 To select another user repeat steps 1 and 2 You can also use the Shift key to select multiple users 5 Click on Save to complete the procedure Assigning the Con...

Page 134: ...the selected group to the Selected Groups view panel on the right 4 To select another group repeat steps 1 and 2 You can also use the Shift key to select multiple groups 5 Click on Save to complete t...

Page 135: ...to a Console To connect to a console using Secure Shell SSH follow the following step 1 From the Console List form select the console you wish to connect to by selecting the console name Log Rotation...

Page 136: ...ency daily weekly or monthly of the log rotation 3 Click on Save Users The Users option provides forms that enable the following user management tasks Table 4 11 Summary of Users Forms Form Function F...

Page 137: ...e g Name Location Phone which you define in the User Detail form Any user who will use the BladeManager application must be entered in the BladeManager database in order to access the application rega...

Page 138: ...ry Table 4 12 Users Details Form Fieldnames and Elements Fieldnames Definition Details Button to display the User Detail form which is the currently displayed form Access Click this button to select t...

Page 139: ...ser password Full Name The full name of the user Email As indicated This field is also used by the Alarm Trigger to notify the user of any event or issue relating to consoles and other system areas de...

Page 140: ...to whom you wish to assign console access The system displays the User Detail form 3 From the User Detail form click on the Access button The system displays the User Access form 4 From the resulting...

Page 141: ...sign a user to the user group Otherwise select Groups from the menu to create a user group To assign a user to one or more groups follow the steps below 1 From the menu select Users The system display...

Page 142: ...ting a User from a Group To delete a user from one or more groups follows the steps below 1 From the menu panel select Users The system displays the User List form 2 From the User List form click on t...

Page 143: ...users even when server based authentication is being used Setting Up Local Authentication To set up local authentication for a user follow the following steps 1 From the User List form select the user...

Page 144: ...soles or devices as well as to edit or delete these groups The BladeManager has three default groups Device Console User The system does not allow you to edit or delete these groups You can edit and d...

Page 145: ...nual 4 63 The system displays the Group List form 2 From the Group List form click on the Add button The system displays the Adding Group form 3 From the resulting form select the group type you wish...

Page 146: ...p Note You cannot delete the following system generated default groups Device Console and User To delete a group follow the steps below 1 From the menu select Groups The system displays the Group List...

Page 147: ...y Profiles deal with IP filtering VLAN restriction time and date restrictions and authorization rules that are applied to each user The default rule of security profiles is Deny You can apply security...

Page 148: ...ion status Enabled Disabled or Deleted and rule Allow or Deny Source IP tabbed form Enter the client workstation IP addresses from which you may allow a user to connect LAN ITF tabbed form Enter the L...

Page 149: ...he menu select Security Profile The system displays the Security Profile list form see previous page 2 Select the Add button to add or select an existing profile to edit Status States if the profile i...

Page 150: ...e General tabbed form enter the profile name required a brief description of the profile its status Enabled Disabled Deleted and the rule to be applied to the entire profile Allow or Deny 4 Click on S...

Page 151: ...e current tabbed form Rule The configured policy Allow or Deny that applies to the entire security profile The default rule is configured from the General tabbed form Add Source IP Conditions This sec...

Page 152: ...ons where multiple network or LAN segments are used or defined Add Button to add to the conditions list the address you just entered in the IP or Netmask field Delete Button to delete a selected IP ad...

Page 153: ...d policy Allow or Deny that applies to the current form and the entire security profile The default rule is configured from the General tabbed form Select LAN ITF Conditions List box that lists all LA...

Page 154: ...r deny access to the system Delete Button to remove any selected LAN ITF conditions from the right list box Selected LAN ITF Conditions List of selected LAN ITF conditions that will be applied by the...

Page 155: ...day columns Clicking inside a segment selects a specific one hour period of a day Add Time Period Conditions Define below this title the time period conditions that applies to the default rule by cli...

Page 156: ...he left hand box which lists all the actions select the action you wish to assign to the security profile and then click on Add The list of valid actions to select from are as follows Authorized Actio...

Page 157: ...configuration and data files of the BladeManager to a local or a remote destination This feature allows you to backup and restore either independently or altogether the following data types PowerCont...

Page 158: ...he new unit will have the same configuration as the original unit To use the Backup and Restore commands in CLI see Backup and Restore Commands on page 5 18 System Recovery Guidelines In the event tha...

Page 159: ...usly the system will generate a warning message to one of the users Responding to the Warning Message When you receive the above warning message you must perform the following steps 1 Click on the Rel...

Page 160: ...er to Chapter 5 Advanced Configuration Info Reporting Info Reporting is a list that summarizes all console access information by users and administrators as shown Table 4 17 Info Reporting Fieldnames...

Page 161: ...r user you wish to view When you select a user from the Info Reporting List screen the system displays the following detail list Reason Reason for any failure of state change Connection Type Connectio...

Page 162: ...4 BladeManager Web Administration 4 80 AlterPath BladeManager Manual...

Page 163: ...ds 2 Copying and Pasting Text within the Console Applet Window Connecting Directly to Ports Sample Command Line Interface Set Commands Changing the Escape Sequence Re defining the Interrupt Key Changi...

Page 164: ...the system will display a menu You can either run the console shell from the menu OR Go directly to the system prompt See the sample print of a CLI session at the end of this chapter If you are a reg...

Page 165: ...en positioning your cursor to the desired destination as you select the Paste option Note Linux browsers do not support the Copy and Paste feature Connecting Directly to Ports It is possible to connec...

Page 166: ...bsent if the user is logged in as an admin Password AlterPath Manager Please choose from one of the following options 1 CLI 2 Shell Prompt 3 Quit Option 1 User admin AlterPath Manager V_1 1 0b Mar 19...

Page 167: ...disconnect a attach read write b send broadcast message c toggle flow control d down a console e change escape sequence f force attach read write g group info i information dump l break sequence list...

Page 168: ...oose the desirable authentication method local radius tacacs ldap kerberos nis active_directory local Configuration changed Execute saveconf to save the new values in flash Note If you select Radius a...

Page 169: ...these parameters y N SETDATETIME sets the system date and time based on the selected time zone For example root APM_Paulo root setdatetime Please choose the time zone where this machine is located 1 A...

Page 170: ...root date 012515402005 Tue Jan 25 15 40 00 PST 2005 SETNAMES sets the hostname domain name and primary nameserver s IP address For example root APM_Paulo root setnames Enter the System s Hostname max...

Page 171: ...e eth0 1 IP address 1 1 1 1 Enter Subinterface eth0 1 Subnet Mask 255 0 0 0 Configure more Ethernet Subinterfaces Y es N o or L ist N VLAN eth0 2 IP address S tatic N one or K eep current K Configure...

Page 172: ...new values in flash Changing the Escape Sequence There are two ways to change the escape sequence Locally From the console session use option Ece refer to the table of help above for e to change the e...

Page 173: ...C here Customize it as you wish stty intr _ Changing the Number of Lines in the SSH Applet By default the number of lines used by the memory buffer when a user scrolls the window is set to 1000 lines...

Page 174: ...From etc services add the following line telnet 23 udp 2 Edit etc xinetd conf as follows service telnet flags REUSE socket_type stream wait no user root server usr kerberos sbin telnetd log_on_failur...

Page 175: ...roup network passwd protocols publickey rpc services and shadow service Available nis use NIS version 2 dns use Domain Name Service and files use the local files actions this syntax has this format st...

Page 176: ...es the system to authenticate NIS users and local users Authenticate the user first through the local database and if the user is not found use NIS passwd files compat shadow files compat group files...

Page 177: ...a On line 3 see example above add the lines as shown in boldface using your own values b Deletetheuristatement alreadydeletedfromline3intheexample which is used in traditional LDAP but not needed in A...

Page 178: ...nableLookups true redirectPort 443 acceptCount 100 debug 0 connectionTimeout 20000 useURIValidationHack false disableUploadTimeout true 3 Restart the web server using the following command etc init d...

Page 179: ...to the E2000 as root and then change the directory to tmp as follows ssh root APBM_IP cd tmp 4 Install the new software to compact flash as follows installimg all all tgz reboot Backing Up User Data...

Page 180: ...ger is then replaced with a new unit to which all data is restored The new unit will have the same configuration as the original unit Backup and Restore Commands Using CLI the command line for backup...

Page 181: ...der the privileges of the specified user If you do not supply user the system will assume that the current user is the remote one For remote destination ensure that the remote machine is prepared to a...

Page 182: ...k the log file var log conf V_ version number log and decide whether to restore the original configuration For example if you are upgrading your configuration from V_1 2 1 to 1 3 0 then the log file t...

Page 183: ...pen SSL package through the command openssl req new nodes keyout private key out public csr If you use this command the following information is required You may skip the other requested information P...

Page 184: ...ut Importing Certificates There are many sources of information regarding certificate management on the web The information below has been excerpted and modified from the keytool document which you ca...

Page 185: ...s that you see with the ones that they show Only if the fingerprints are equal is it guaranteed that the certificate has not been replaced in transit with somebody else s for example an attacker s ce...

Page 186: ...5 Advanced Configuration 5 24 Alterpath BladeManager Manual...

Page 187: ...can minimize the bandwidth on slower WAN links Basic In Out System Chips on the motherboard of a computer contain read only BIOS memory instructions that are used to start up a computer The operating...

Page 188: ...s to a chassis that can hold a number of hot swappable devices called blades That is the entire package of chassis server blades and option blades Boot To start a computer so that it is ready to run p...

Page 189: ...cular servers that have no exact information about the individual computers until they request the information The overall purpose of this is to reduce the work necessary to administer a large IP netw...

Page 190: ...question is dumb and can only do one thing with the information being sent to it for instance print it then there is no need for an escape sequence However most devices have more than one capability a...

Page 191: ...me network that carries the data this is called in band management IP Address A 32 bit address assigned to hosts using TCP IP It belongs to one of five classes A E and is expressed as 4 octets separat...

Page 192: ...ess that is assigned to the NIC Network Interface Card which interfaces the node to the LAN MTU Short for Maximum Transmission Unit the largest physical packet size measured in bytes that a network ca...

Page 193: ...protocol address Network masks divide IP addresses into two parts network address and address of a particular host within the network Mask have the same form as IP addresses i e 255 255 255 0 however...

Page 194: ...t follows the standard Port A port is a 16 bit number the allowed range being 1 through 65535 used by the TCP and UDP protocols at the transport layer Ports are used to address applications services t...

Page 195: ...ervice is a client server protocol and software that enables remote access servers to communicate with a central server to authenticate dial in users and authorize their access to the requested system...

Page 196: ...as Address Mask STTY Set the options for a terminal device interface This command prints information about your terminal settings The information printed is the same as if you had typed stty while int...

Page 197: ...t has either crashed and is down or crashed and rebooted Telnet A terminal emulation program for TCP IP networks such as the Internet The Telnet program runs on your computer and connects your PC to a...

Page 198: ...nly connectionless Datagrams are usually used for streaming media because an occasional packet loss will not affect the final product of the transmission U Rack Height Unit A standard computer rack ha...

Page 199: ...Text based console shell access Cyclades web based management CWM interface Dimensions Height 43mm 1 75 inches 1 U Depth 508 mm 20 inches Width 430 mm 16 69 inches Maximum Weight 12 7 kg 28 lb dependi...

Page 200: ...inimum configuration 307 Btu 90 watts Maximum configuration 850 Btu 250 watts Acoustical noise emissions Sound power idling 6 5 bel maximum Sound power operating 6 5 bel maximum Certifications FCC Cla...

Page 201: ...browsers and java runtime systems Mozilla 1 0 2 java plugin 1 4 2 Netscape 7 1 java plugin 1 4 2 Internet Explorer 6 0 java plugin 1 4 2 The Java Runtime plugin is available from the Sun web site at...

Page 202: ...A BladeManager Hardware Specifications A 4 AlterPath BladeManager Manual...

Reviews: