background image

Appendix F: LDAP Configuration Illustration 
 

588

 

 
 

3.

 

Add the 

srcuser and userb accounts to the SRC_Admin group. 

 

4.

 

Verify whether each group comprises correct users. 

 

Summary of Contents for Raritan SRC-0100

Page 1: ...Smart Rack Controller User Guide Xerus Firmware v3 5 10 Copyright 2019 Raritan Inc SRC_UserGuide_0A_3 5 10_E May 2019 255 80 0064 00...

Page 2: ...FCC Rules These limits are designed to provide reasonable protection against harmful interference in a commercial installation This equipment generates uses and can radiate radio frequency energy and...

Page 3: ...h the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a commercial installation This...

Page 4: ...ted Wireless LAN Configuration 13 Dual Ethernet Connection 14 Configuring the SRC 15 Connecting a Mobile Device to SRC 16 Connecting the SRC to a Computer 21 Bulk Configuration Methods 23 Cascading Mu...

Page 5: ...AMS Mx Z 63 Connecting a Logitech Webcam 66 Connecting a GSM Modem 67 Connecting an Analog Modem 68 Connecting an External Beeper 68 Connecting a Schroff LHX SHX Heat Exchanger 69 Connecting a Modbus...

Page 6: ...Feature Port 137 Asset Strip 139 External Beeper 148 Schroff LHX SHX 149 User Management 155 Creating Users 156 Editing or Deleting Users 160 Creating Roles 162 Editing or Deleting Roles 163 Setting Y...

Page 7: ...gs 352 SmartLock and Card Reader 356 SmartLock 358 Card Readers 363 Chapter 7 Using SNMP 365 Enabling and Configuring SNMP 365 SNMPv2c Notifications 366 SNMPv3 Notifications 367 Downloading SNMP MIB 3...

Page 8: ...Network Connections 402 Configuring the SRC Device and Network 402 Entering Configuration Mode 403 Quitting Configuration Mode 403 SRC Configuration Commands 404 Network Configuration Commands 406 Ti...

Page 9: ...Restore via SCP 528 Downloading Diagnostic Data via SCP 530 Uploading or Downloading Raw Configuration Data 531 Keys that Cannot Be Uploaded 535 Appendix A Specifications 536 Maximum Ambient Operatin...

Page 10: ...on 577 Download via Web Browsers 577 Download via Curl 578 Uploading Raw Configuration 579 Upload via Curl 580 Curl Upload Return Codes 582 Appendix E Resetting to Factory Defaults 583 Using the Reset...

Page 11: ...o DB9 Cable Requirements for Modem Connections 637 Reserving IP Addresses in DHCP Servers 638 Reserving IP in Windows 639 Reserving IP in Linux 640 Sensor Threshold Settings 642 Thresholds and Sensor...

Page 12: ...xii Browsing through the Online Help 672 Appendix J Integrating Asset Management Strips with Other Products 674 Asset Management Strips and Raritan PDUs 674 Asset Management Strips and dcTrack 675 In...

Page 13: ...vironmental monitoring and or system control At least one Raritan DX or DX2 environmental sensor package is required for this feature After connecting Raritan environmental sensor package s to SRC you...

Page 14: ...asset strip transmits the tag and position information to SRC An SRC device You can remotely locate each tagged IT device through SRC Image surveillance With a Logitech webcam connected a simple camer...

Page 15: ...available asset management strips and tags visit the Raritan website s Product Selector page http www findmypdu com SRC 0100 SRC 0100 has the following ports and components To control access to a cab...

Page 16: ...logging in to the SRC software See Dot Matrix LCD Display on page 74 SRC 0102 SRC 0102 has the following ports and components DUAL INLETS Dual inlets can supply redundant power to this model ONBOARD D...

Page 17: ...74 Package Contents The following lists the equipment shipped with SRC If anything is missing or damaged contact the local dealer or Raritan Technical Support for help One SRC device Bracket pack and...

Page 18: ...the SRC but no IP address is assigned to the SRC This may be caused by the absence or malfunction of DHCP servers in the network Note Configuration by connecting the SRC to a computer using a network...

Page 19: ...on 7 Before You Begin Prepare the installation site Make sure the installation area is clean and not exposed to extreme temperatures or humidity Allow sufficient space around the SRC for cabling and e...

Page 20: ...ike a 1U device in the rack 0U Rackmount Method on page 9 SRC is mounted like a 0U device in the rack In This Chapter 1U Rackmount Method 8 0U Rackmount Method 9 1U Rackmount Method To mount SRC like...

Page 21: ...evice 4 After both L brackets are installed fasten the device to the rack using rack screws through two identical round holes of each L bracket 0U Rackmount Method To mount SRC like a 0U device 1 Alig...

Page 22: ...Rackmount 10 3 Repeat Steps 1 to 2 to screw another L bracket to the other end of the device 4 After both L brackets are installed fasten the device to the rack using rack screws through slots of each...

Page 23: ...rs up it proceeds with the power on self test and software loading for a few moments 3 When the software has completed loading the front panel display illuminates Connecting the SRC to Your Network To...

Page 24: ...gging an RS 232 RJ 45 connector into the Ethernet port can cause permanent damage s to the Ethernet hardware To make a wireless connection Do one of the following Plug a supported USB wireless LAN ada...

Page 25: ...matches the access point The following is the wireless LAN configuration that the SRC supports Network type 802 11 A B G N Protocol WPA2 RSN Key management WPA PSK or WPA EAP with PEAP and MSCHAPv2 au...

Page 26: ...ain must connect to only one network Do NOT connect both Ethernet ports of any SRC master or slave device to the LAN See Cascading Multiple SRC Devices for Sharing Ethernet Connectivity on page 24 Che...

Page 27: ...a connected mobile device 1 Download the PDView app to your mobile device See Connecting a Mobile Device to SRC on page 16 2 Connect the mobile device to SRC via USB 3 Launch PDView to configure the S...

Page 28: ...ing an Android device it must support USB On The Go OTG An appropriate USB cable is required For information refer to Step B below Step A Download and install PDView 1 Visit either Apple App or Google...

Page 29: ...SRC 1 Launch the PDView app from your mobile device Below illustrate iPad s PDView screens a The Disconnected message displays first when PDView has not detected the SRC yet A diagram in PDView indic...

Page 30: ...ically logs in to the web interface of SRC If they have been changed the login screen displays instead and you must enter appropriate user credentials for login 3 The web interface opens Now you can v...

Page 31: ...credentials To make automatic login work again you can save the modified admin credentials or any custom user credentials in PDView A maximum of 5 user credentials can be saved and PDView will try the...

Page 32: ...Per default three administrator user credentials are pre configured for three companies products Raritan Legrand ServerTech Server Technology 5 Modify existing user credentials or type new ones and ta...

Page 33: ...is a number https pdu local See APIPA and Link Local Addressing on page 6 Establish one of the following connections to a computer Ethernet port of SRC must be enabled for the described connection to...

Page 34: ...22 2 Connect the DB9 end to your computer s RS 232 port COM 3 Perform Initial Network Configuration via CLI on page 657 RJ45 to DB9 Cable Requirements for Computer Connections An RJ45 to DB9 adapter c...

Page 35: ...k and a TFTP server is available Procedure Prepare special configuration files which must include fwupdate cfg and copy them to the root directory of the TFTP server Re boot all SRC devices after conn...

Page 36: ...re one Ethernet connection by cascading them via one of the interfaces below USB interface Ethernet interface The first one in the cascading chain is the master device and all the other are slave devi...

Page 37: ...red and one wireless network connections Do NOT connect slave devices to the LAN or WLAN WIFI only You must use Raritan s USB WIFI wireless LAN adapter instead of other WIFI adapters for wireless netw...

Page 38: ...de before establishing the chain See Setting the Cascading Mode on page 187 Any certified USB 2 0 cable up to 5 meters 16 feet long can be used Both cascading modes support a maximum of 16 devices in...

Page 39: ...set correctly See Setting the Cascading Mode on page 187 4 Connect the master device to the LAN using a method below Bridging mode Use a standard network patch cable CAT5e or higher Port Forwarding m...

Page 40: ...he others use static IP addresses Port Forwarding mode Only the master device s network settings should be configured A tip for USB cascading The USB cascading chain can be a combination of diverse Ra...

Page 41: ...ascading Mode on page 187 Both cascading modes support a maximum of 16 devices in a chain When establishing a Port Forwarding chain make sure you follow the guidelines described in the section titled...

Page 42: ...Chapter 3 Initial Installation and Configuration 30 Number Device role Master device Slave 1 Slave 2 Slave 3...

Page 43: ...Port Forwarding Make sure the cascading role and downstream interface are also set correctly See Setting the Cascading Mode on page 187 4 Connect the master device to the LAN using a method below Bri...

Page 44: ...atic IP addresses Port Forwarding mode Only the master device s network settings should be configured Enable R STP if a cascade loop is preferred You can loop a cascading chain to create network commu...

Page 45: ...ter device must have only one upstream device Each cascaded device except for the last slave device must have only one downstream device Use only one cable to cascade two devices That is NO simultaneo...

Page 46: ...Chapter 3 Initial Installation and Configuration 34 One cascaded device has two upstream devices via Ethernet and USB cables One cascaded device has two downstream devices...

Page 47: ...Chapter 3 Initial Installation and Configuration 35 One device is connected to another device via two cascading cables USB and Ethernet cables...

Page 48: ...ting Door Handles or a SmartLock Kit 43 Connecting Contact Closure Detectors 48 Connecting Asset Management Strips 55 Connecting a Logitech Webcam 66 Connecting a GSM Modem 67 Connecting an Analog Mod...

Page 49: ...on each sensor package refer to the Environmental Sensors and Actuators Guide or Online Help on Raritan website s Support page http www raritan com support A DX or DX2 environmental sensor package may...

Page 50: ...ading DX2 remember that the SRC only supports a maximum of 32 sensors and or actuators For the total number of sensors actuators supported by each model see Connecting Raritan Environmental Sensor Pac...

Page 51: ...end of the cable into the remaining RJ 45 port on the prior DX2 package b Plug the other end into either RJ 45 port on an additional DX2 package Repeat the same steps to cascade more DX2 packages Exce...

Page 52: ...sensor package It is designed for cabinet access control so it is included in Raritan s SmartLock kit For information on how to connect door handles and or contact closure sensors refer to Connecting...

Page 53: ...mple if you cascade 12 DX packages and each package contains 3 functions a function is a sensor or actuator the SRC does NOT manage the last 4 functions because the total 36 12 3 36 exceeds 32 by 4 Ti...

Page 54: ...andles and asset management strip s are mutually exclusive so do NOT connect both of them to the SRC simultaneously Using an Optional DPX3 ENVHUB4 Sensor Hub A Raritan DPX3 ENVHUB4 sensor hub increase...

Page 55: ...y have to purchase either only door handles or a full SmartLock kit from Raritan Raritan s SmartLock kit contains one DX2 DH2C2 and a pair of door handles Note For details refer to the user documentat...

Page 56: ...ing door handles or a SmartLock kit that is DX2 DH2C2 kit to SRC IMPORTANT NO asset management strips can be connected simultaneously Up to one DX2 DH2C2 can be connected per SENSOR port of SRC SRC 01...

Page 57: ...DH2C2 such as SRC 0100 Overview No Component Function Two pairs of contact closure sensor terminals Connect to third party contact closure detectors switches for detecting the door open closed status...

Page 58: ...llow of SRC Cascade DX2 sensor package s See DX2 Sensor Packages on page 38 Exception You CANNOT cascade DX2 DH2C2 packages Connection procedure 1 Connect supported door handles to DX2 DH2C2 Optional...

Page 59: ...les if your SRC has a built in DX2 DH2C2 such as SRC 0102 SRC door handle ports and terminals No Component Function Two pairs of contact closure sensor terminals Connect to third party contact closure...

Page 60: ...s switches to detect whether the doors of the same cabinet are open or closed Note that contact closure detectors switches are NOT required for cabinet access control Both DX2 DH2C2 and SRC s contact...

Page 61: ...Connecting Contact Closure Detectors to DX2 DH2C2 Overview No Component Function Two pairs of contact closure sensor terminals Two door handle ports Two RJ 45 ports See the table in the topic titled...

Page 62: ...cting Detectors Switches to Contact Closure Terminals on page 51 2 Connect DX2 DH2C2 to the SENSOR port of SRC Connecting Contact Closure Detectors to SRC Onboard Terminals Overview No Component Funct...

Page 63: ...ge 51 Connecting Detectors Switches to Contact Closure Terminals No matter it is DX2 DH2C2 or the SRC device with onboard door handle ports the location of contact closure terminals are always located...

Page 64: ...to SRC onboard contact closure terminals but you have to turn the terminal module upside down so that you can see the four screws for four termination points To make connections after the terminal mo...

Page 65: ...int Plug both wires of a detector switch into the two termination points to the left Plug both wires of the other detector switch into the two termination points to the right 5 Use a screwdriver with...

Page 66: ...l module To make connections when the terminal module is attached You can also connect a detector switch when the terminal module remains attached to the sensor box For detailed information on the ins...

Page 67: ...after IT devices are tagged electronically To use the asset management feature you need the following items Raritan asset strips An asset strip transmits the asset management tag s ID and positioning...

Page 68: ...e following diagram illustrates some asset strips Note that Raritan provides more types of asset strips than the diagram 8U MASTER asset strip with 8 tag ports 8U SLAVE asset strip with 8 tag ports 5U...

Page 69: ...ve step to connect more slave strips The length of the asset strip assembly can be up to 64U The final slave strip can be 8U or 5U depending on the actual height of your rack Connect the ending asset...

Page 70: ...n programmable ones have factory default ID or barcode numbers which you cannot change A Barcode ID number which is available on either end of the non programmable asset tag B Tag connector C Adhesive...

Page 71: ...dhesive end of an asset tag to each IT device through the tag s tape See Introduction to Asset Tags on page 58 3 Plug the connector of each asset tag into the corresponding tag port on the asset strip...

Page 72: ...g port on the regular or composite asset strip A blade extension strip contains 4 to 16 tag ports The following diagrams illustrate a tag connector cable and a blade extension strip with 16 tag ports...

Page 73: ...nect the tag connector cable to the blade extension strip Plug the cable s connector into the socket at either end of the blade extension strip 2 Move the blade extension strip toward the bottom of th...

Page 74: ...cted to the blade extension strip via asset tags 5 Plug the tag connector of the blade extension strip into the closest tag port of the regular or composite asset strip on the rack 6 Repeat the above...

Page 75: ...s in the cabinet The following diagram illustrates AMS M3 Z A Two RJ 45 connectors B Tag ports Important DO NOT hot swap or hot plug any AMS Mx Z in a composite asset strip chain after connecting the...

Page 76: ...RC device via a standard network patch cable CAT5e or higher a Connect one end of the cable to the RJ 45 port labeled Input on the composite asset strip For a composite asset strip chain connect the c...

Page 77: ...product you purchased It is NOT supported to hot swap or hot plug any AMS Mx Z in a composite asset strip chain that has been connected to Raritan s PDU SRC or PMC Therefore first disconnect the chai...

Page 78: ...t webcams on the Internet The SRC supports up to two webcams After connecting a webcam you can retrieve visual information from anywhere through the SRC web interface For more information on the Logit...

Page 79: ...To connect the GSM modem 1 Connect the GSM modem to the serial port labeled CONSOLE MODEM on the SRC A third party RJ 45 to DB9 male adapter cable is required for this connection See RJ45 to DB9 Cabl...

Page 80: ...pported modem 2 Plug the modem s RS 232 cable into the serial port labeled CONSOLE MODEM on the SRC A third party RJ 45 to DB9 male adapter cable is required for this connection See RJ45 to DB9 Cable...

Page 81: ...nable the support of the LHX SHX heat exchanger see Miscellaneous on page 314 Connecting a Modbus RTU Device or Bus If connecting the Modbus RTU devices to SRC and enabling the Modbus Gateway feature...

Page 82: ...ddresses using the Modbus unit identifier addresses in the Modbus TCP protocol If the Modbus TCP client does not support unit identifier addressing refer to Changing Modbus Settings on page 204 The SR...

Page 83: ...internal beeper s behavior The reset button In This Chapter Connection Ports 71 Dot Matrix LCD Display 74 Reset Button 94 Beeper 94 Connection Ports Depending on the model you purchased the total numb...

Page 84: ...mobile device for viewing or configuring the SRC See Connecting a Mobile Device to SRC on page 16 Connecting a USB device such as a Logitech webcam or wireless LAN adapter Cascading SRC devices for sh...

Page 85: ...o Ethernet ports ETH 10 100 1000 marked in green supports up to 1000 Mbps This is ETH1 ETH 10 100 marked in white supports up to 100 Mbps This is ETH2 Connecting the SRC to your company s network via...

Page 86: ...nect a maximum of two door handles supported by DX2 DH2C2 for cabinet access control See Connecting Raritan s Door Handles to SRC Onboard Ports on page 47 Note that door handles and asset strips are m...

Page 87: ...actuator using and For operation details see Peripherals on page 81 Manual mode To view more information of your SRC enter the manual mode Press or to enter the manual mode where the Main Menu is firs...

Page 88: ...apter 5 Introduction to SRC Components 76 Control Buttons Use the control buttons to navigate to the menu in the manual mode Button Function Up Down OK Back OR Switch between automatic and manual mode...

Page 89: ...evices Control actuators if any Color changes of the display s top and bottom bars In the manual mode both the top and bottom bars will turn yellow or red to indicate the presence of any alert For col...

Page 90: ...page 79 SRC Shows the internal beeper s state and if it is on the reason for turning on See SRC on page 80 Peripherals Shows the information of connected Raritan environmental sensors or actuators su...

Page 91: ...web interface s Dashboard See Dashboard Alerted Sensors on page 110 If there are no alerted sensors the LCD display shows the message No Alerts To view alerted sensors 1 Press or to select Alerts in t...

Page 92: ...above upper warning Upper Critical above upper critical Open only available for Raritan PDUs with overcurrent protectors The Details command appears for alarms only If your Alert List comprises alerte...

Page 93: ...To mute the internal beeper during an alarm 1 Press or to select SRC in the Main Menu and press 2 Press A confirmation message appears 3 Press to select Yes and then press 4 The beeper stops beeping...

Page 94: ...aged sensors actuators are indicated in the top right corner of the display If any sensor enters the warning critical or alarmed state like Tamper Detector 1 shown below it is highlighted in yellow or...

Page 95: ...above upper warning Upper Critical above upper critical On Off Open Closed A numeric sensor shows both the reading and state A state sensor or actuator shows the state only 3 To view an environmental...

Page 96: ...DPX3 series provide the chain position information If this sensor or actuator is on a sensor package with multiple channels such as DX2 DH2C2 its channel number is indicated as Channel x where x is a...

Page 97: ...ags have been detected is shown on the LCD display To show asset strip information 1 Press or to select Assets in the Main Menu and press 2 The display shows the available asset strip and indicates ho...

Page 98: ...the desired tag is not visible press or to scroll up or down 5 If any blade extension strip is connected to this asset strip select it and Press to view a list of available tags and asset IDs on this...

Page 99: ...SRC Components 87 Number Description Device name Firmware version model name and serial number 3 Press to show the Network Common page Number Description DNS servers Default gateways 4 Press to show t...

Page 100: ...t to Port Forwarding and it is a master device Slave Connected Indicates whether the presence of a slave device is detected yes or no Port Forwarding Slave This device s cascading mode is set to Port...

Page 101: ...alf duplex IPv4 IPv6 network information including Network configuration DHCP or Automatic or Static Static represents Static IP IP address Prefix length such as 24 Note If you disable any Ethernet in...

Page 102: ...N adapter is plugged or detected the message No Adapter Detected is shown If a supported WLAN adapter is detected and configured properly wireless network information is shown instead including MAC ad...

Page 103: ...ning levels the screen s background turns yellow When at least one of the alerted sensors enters the critical level or there is any alarm the screen s background turns red For color definitions see Ye...

Page 104: ...and the available command in the bottom right corner is Actions instead of Alert list Available operations For the notice listing alerted sensors only press to view a list of all alerted sensors See A...

Page 105: ...without showing the list of alarms b Optional If Acknowledge all alarms is selected in the above step a confirmation prompt similar to the diagram below appears Press or to confirm or abort the opera...

Page 106: ...this button when a serial connection is available See Resetting to Factory Defaults on page 583 Beeper The SRC includes an internal beeper which can issue an audible alarm Note that the beeper does NO...

Page 107: ...Explorer 11 Firefox 52 and later Safari Mac Google Chrome 52 and later Android 4 2 and later iOS 7 0 and later Login Logout and Password Change The first time you log in to the SRC use the factory de...

Page 108: ...at page after login See Quick Access to a Specific Page on page 106 2 If any security alert message appears accept it 3 The login screen displays Type your user name and password User credentials are...

Page 109: ...interface shown onscreen may look slightly different from the image below Note The address to access a slave device in the Port Forwarding mode via non standard ports is a combination of a protocol h...

Page 110: ...Now ignores the request for this time only Do not ask again ignores the request permanently If you select this checkbox then click Not Now Or enter the new password and click Ok Users without permiss...

Page 111: ...ion on how to activate a web browser s password manager see the user documentation accompanying your browser SRC does NOT support other browser password managers Logout After finishing your tasks you...

Page 112: ...face Overview The web interface consists of four areas as shown below Operation 1 Click any menu or submenu item in the area of 2 That item s data setup page is then opened in the area of 3 Now you ca...

Page 113: ...Chapter 6 Using the Web Interface 101 4 To return to the main menu and the Dashboard page click on the top left corner...

Page 114: ...Chapter 6 Using the Web Interface 102...

Page 115: ...ou can click to view your user account settings Logout button From top to bottom Your SRC model Current firmware version Online Documentation link to the online help of SRC See Browsing through the On...

Page 116: ...w Menu Information shown Dashboard Summary of the SRC status which shows a list of alerted sensors and alarms if any See Dashboard on page 108 SRC Device data and settings such as the device name and...

Page 117: ...n it does NOT show either item by default Either or both menu items appear only when you connect Raritan s SmartLock kit to this product For details refer to the user documentation accompanying the Sm...

Page 118: ...you often visit a specific page in the SRC web interface you can note down its URL or bookmark it with your web browser Next time you just enter its URL in the address bar of the browser prior to logi...

Page 119: ...ascending or descending order based on the selected column Illustration Event Log 1 By default the Event Log is sorted in the descending order based on the ID column Therefore the arrow is displayed...

Page 120: ...the Web Interface 108 5 The arrow now appears adjacent to the selected column Event Class indicating the list is sorted in the ascending order based on that column Dashboard The Dashboard page contai...

Page 121: ...event rules requiring users to take the acknowledgment action When there are no unacknowledged events this section shows the message No Alarms When there are unacknowledged events this section lists...

Page 122: ...ted sensor you can click each sensor s name to go to individual sensor pages See Individual Sensor Actuator Pages on page 131 If wanted you can resort the list by clicking the desired column header Se...

Page 123: ...larmed state For details see Sensor Actuator States on page 125 Dashboard Alarms If configuring any event rules which require users to take the acknowledgment action the Alarms section will list any e...

Page 124: ...n has occurred More Alerts This field appears only when there are more than one types of events triggering this alert If there are other types of events that is other reasons triggering the same alert...

Page 125: ...on shown Firmware version Serial number MAC address Internal Beeper State on page 113 Status of 12V Power Supply Sensor on page 114 To configure global settings 1 Click Edit Settings 2 Customize the N...

Page 126: ...ives DC 12V power from its inlet A sensor monitors the power supply status and indicates it on the SRC page State Description OK The SRC controller is receiving power from its own inlet fault The SRC...

Page 127: ...trieves their data It does not communicate with unmanaged ones See Managed vs Unmanaged Sensors Actuators on page 124 When the number of managed sensors actuators has not reached the maximum SRC autom...

Page 128: ...Chapter 6 Using the Web Interface 116 Go to an individual sensor s or actuator s data setup page by clicking its name...

Page 129: ...r actuator type like 1 2 3 and so on You can customize the name See Individual Sensor Actuator Pages on page 131 Reading Only managed numeric sensors show this data such as temperature and humidity se...

Page 130: ...follow this procedure 1 Click to make checkboxes appear in front of sensors actuators Tip To perform the desired action on only one sensor actuator simply click that sensor actuator without making th...

Page 131: ...Click Peripheral Device Setup 2 Now you can configure the fields Click to select an option Adjust the numeric values Select or deselect the checkbox Field Function Note Peripheral device Z coordinate...

Page 132: ...he measurement unit vary between meter and foot according to user credentials See Setting Your Preferred Measurement Units on page 165 Active powered dry contact limit Determines the maximum number of...

Page 133: ...ues that will apply to newly added sensors but also the threshold values of the already managed sensors where default thresholds are being applied See Individual Sensor Actuator Pages on page 131 1 Cl...

Page 134: ...ake checkboxes appear and then select desired actuators 3 Click the desired button Turn ON Turn OFF Note Per default you can turn on as many dry contact actuators as you want but only one powered dry...

Page 135: ...presents any numeric sensor s reading The symbol means smaller than or equal to Sensor status Color States shown in the interface Description unavailable Sensor state or readings cannot be detected Un...

Page 136: ...retrieves their data Managed sensors actuators are always listed on the Peripheral Devices page no matter they are physically connected or not They have an ID number as illustrated below They show one...

Page 137: ...or s state is marked in red when it is turned on Managed sensor states In the following table R represents any numeric sensor s reading The symbol means smaller than or equal to State Description norm...

Page 138: ...e actuator is turned off unavailable Communication with the managed actuator is lost OR DX2 or DX sensor packages are upgrading their sensor firmware Unmanaged sensor actuator states State Description...

Page 139: ...or actuator is connected on the Peripheral Devices page DX and DX2 series show both the sensor port number and its position in a sensor chain For example Port 1 Chain Position 2 If a Raritan DPX3 ENV...

Page 140: ...nsor package of the sensor chain It is the 2nd channel of the sensor package Port 1 Chain Position 1 Hub Port 2 Chain Position 3 Connected to the sensor port 1 Connected to the 2nd port of the DPX3 EN...

Page 141: ...SRC no longer automatically manages any newly added environmental sensors and actuators and therefore neither ID numbers are assigned nor sensor readings or states are available for newly added ones...

Page 142: ...r you selected has been assigned to a specific sensor actuator Tip The information in parentheses following each ID number indicates whether the number has been assigned to a sensor or actuator If it...

Page 143: ...on page 115 Note that only a numeric sensor has threshold settings while a state sensor or actuator has no thresholds Threshold settings if enabled help you identify whether any numeric sensor enters...

Page 144: ...the Use default thresholds checkbox The default threshold settings are configured on the page of Peripherals on page 115 To customize the threshold settings for this particular sensor deselect the Use...

Page 145: ...ype an integer number The Z coordinate s format is determined on the page of Peripherals on page 115 Alarmed to Normal Delay This field is available for the DX PIR presence detector only It determines...

Page 146: ...itch is considered normal An alarm is triggered when the detector switch turns closed Normal Closed The closed status of the connected detector switch is considered normal An alarm is triggered when t...

Page 147: ...your mouse over the data line in the chart Both the time and data are displayed as illustrated below To turn on or off an actuator 1 Click the desired control button Turn ON Turn OFF 2 Confirm the ope...

Page 148: ...tor on the top left corner Z Coordinate Format Z coordinates refer to vertical locations of Raritan s environmental sensor packages You can use either the number of rack units or a descriptive text to...

Page 149: ...re not tied to any specific measurement scheme Therefore you can use non measurement values Example X Brown Cabinet Row Y Third Rack Z Top of Cabinet Values of the X Y and Z coordinates X and Y They c...

Page 150: ...ame Feature Port and the Feature Port page shows the message No device is currently connected Open the Feature Port page by clicking it in the Menu on page 104 From this page you can enable or disable...

Page 151: ...Raritan asset management strips asset strips the SRC shows Asset Strip in place of Feature Port in the menu Note For connection instructions see Connecting Asset Management Strips on page 55 To open t...

Page 152: ...method in a rack cabinet Top Down The numbering starts from the highest rack unit of a rack cabinet Bottom Up The numbering starts from the lowest rack unit of a rack cabinet Numbering offset The star...

Page 153: ...uch as 00FF00 3 Click Ok The rack unit numbering and LED color settings are immediately updated on the Rack Units list illustrated below The Index number is the physical tag port number printed on the...

Page 154: ...k Units list The setup dialog for the selected one appears 2 Make changes to the information by typing a new value or clicking that field to select a different option Field Description Name Name for t...

Page 155: ...what LED color is shown for this rack unit if the LED is lit To expand a blade extension strip A blade extension strip like an asset strip has multiple tag ports An extension strip is marked with a g...

Page 156: ...Chapter 6 Using the Web Interface 144 2 All tag ports of the blade extension strip are listed below it Their port numbers are displayed in the Slot column To hide the blade extension slots list click...

Page 157: ...In addition you can also customize the ID of a blade extension strip If a barcode reader is intended connect it to the computer you use to access the SRC 1 Click Program Asset IDs 2 In the Asset ID c...

Page 158: ...12 characters that comprise only numbers and or UPPER CASE alphabets Lower case alphabets are NOT accepted 3 Verify the correctness of customized asset IDs and modify as needed 4 Click Apply at the bo...

Page 159: ...on of the asset strip firmware stored in the SRC firmware If two versions are different the asset strip automatically starts downloading the new firmware from the SRC to upgrade its own firmware Durin...

Page 160: ...structions see Connecting an External Beeper on page 68 To open the External Beeper page click it in the Menu on page 104 This page shows an external beeper s status including Number of the FEATURE po...

Page 161: ...h the following Name the heat exchanger Monitor LHX SHX built in sensors and device states Configure the air outlet temperature setpoint Configure the default fan speed Configure the air temperature f...

Page 162: ...ield indicates whether the device is operating fine and the Switch State field indicates its power status If the device does not operate properly such as some sensor failure it shows critical and the...

Page 163: ...int temperature Specify the default fan speed 3 Click Save To view all sensor data and configure thresholds 1 Locate the Sensors section which lists all air outlet inlet temperatures and fan speeds an...

Page 164: ...may be highlighted in yellow or red if they enter the warning or critical range See Yellow or Red Highlighted Sensors on page 123 Tip You can also create event rules to notify you of the warning or c...

Page 165: ...k Show Event Log to go to the Event Log page Operation time statistics This section indicates the accumulative operation hours of the LHX SHX device and its fans since the device is connected to the S...

Page 166: ...ter the SRC detects SHX 30 For additional information on the SHX 30 maximum cooling feature refer to the SHX 30 documentation To perform maximum cooling Go to the SHX page and click Request Maximum Co...

Page 167: ...but you can and should change its password A role determines the tasks actions a user is permitted to perform on the SRC so you must assign one or multiple roles to each user Click User Management in...

Page 168: ...ds showing the message required User information Field setting Description User name The name the user enters to log in to the SRC 4 to 32 characters Case sensitive Spaces are NOT permitted Full name...

Page 169: ...setting Description Enable SNMPv3 Select this checkbox when intending to permit the SNMPv3 access by this user Note The SNMPv3 protocol must be enabled for SNMPv3 access See Configuring SNMP Settings...

Page 170: ...nfirm password Type the privacy password if the Same as Authentication Password checkbox is deselected The password must consist of 8 to 32 ASCII printable characters Protocol This section is configur...

Page 171: ...r s permissions To select all roles select the topmost checkbox in the header row However a user can have a maximum of 32 roles only If the built in roles do not satisfy your needs add new roles by cl...

Page 172: ...n resort the list by clicking the desired column header See Sorting a List on page 107 To edit or delete a user account 1 On the Users page click the desired user The Edit User page for that user open...

Page 173: ...click to make checkboxes appear in front of user names Tip To delete only one user you can simply click that user without making the checkboxes appear Refer to the above procedure 2 Select one or mul...

Page 174: ...al Event Log If the two do not satisfy your needs add new roles SRC supports up to 64 roles To create a role 1 Choose User Management Roles 2 Assign a role name 1 to 32 characters long Case sensitive...

Page 175: ...e arguments list is not expanded yet For example you can specify the actuators that users can switch on off as shown below To select all actuators select the All Actuators checkbox instead 6 Click Sav...

Page 176: ...changed To delete this role click and confirm the operation 3 Click Save To delete any roles 1 On the Roles page click to make checkboxes appear in front of roles Tip To delete only one role you can...

Page 177: ...s only apply to the web interface and command line interface Setting your own preferences does not change the default measurement units See Setting Default Measurement Units on page 166 To select the...

Page 178: ...page 156 To set up default user preferences 1 Click User Management Default Preferences 2 Make changes as needed Field Description Temperature unit Preferred units for temperatures Celsius or Fahrenh...

Page 179: ...vice Settings in the Menu on page 104 and the following submenu displays Menu command Submenu command Refer to Network Configuring Network Settings on page 169 HTTP Changing HTTP S Settings on page 19...

Page 180: ...on page 215 Authentication Setting Up External Authentication on page 220 Login Settings Configuring Login Settings on page 228 Password Policy Configuring Password Policy on page 230 Security Servic...

Page 181: ...nction To set up the network settings 1 Choose Device Settings Network 2 To use DHCP assigned DNS servers and gateway instead of static ones go to step 3 To manually specify DNS servers and default ga...

Page 182: ...ings On the Network page click the ETH1 ETH2 section to configure IPv4 IPv6 settings If the device s cascading mode is set to Bridging the BRIDGE section appears Then you must click the BRIDGE section...

Page 183: ...c settings Assign a static IPv4 address which follows this syntax IP address prefix length Example 192 168 84 99 24 IPv6 settings Field setting Description Enable IPv6 Enable or disable the IPv6 proto...

Page 184: ...etworking requirements Field Description Cascading mode Leave it to the default None unless you are establishing a cascading chain For more information refer to Cascading Multiple SRC Devices for Shar...

Page 185: ...re IP forwarding has been enabled in your network and then you can click Add Route to add static routes See Static Route Examples on page 183 Ethernet Interface Settings By default both ETH1 and ETH2...

Page 186: ...r Outer authentication This field appears when EAP is selected There are two authentication methods for EAP PEAP A TLS tunnel is established and an inner authentication method can be specified for thi...

Page 187: ...ificate This field appears when EAP is selected A third party CA certificate may or may not be needed If needed follow the steps below RADIUS authentication server name This field appears when EAP is...

Page 188: ...ess of the certificate s validity period After deselecting this checkbox the authentication fails whenever any certificate in the selected certificate chain is outdated or not valid yet Allow connecti...

Page 189: ...e wireless networking fails Hardware state Check this field to ensure that the SRC has detected a wireless USB LAN adapter If not verify whether the USB LAN adapter is firmly connected or whether it i...

Page 190: ...en the client and authentication server is performed using TLS certificates Inner authentication This field appears when both EAP and PEAP are selected MS CHAPv2 Authentication based on the given pass...

Page 191: ...certificate This field appears when EAP is selected A third party CA certificate may or may not be needed If needed follow the steps below RADIUS authentication server name This field appears when EAP...

Page 192: ...ate is considered not valid yet and will cause the wireless network connection to fail When this checkbox is selected it will make the wireless network connection successful when the SRC system time i...

Page 193: ...ct the method to configure IPv6 settings Automatic Auto configure IPv6 settings via DHCPv6 Static Manually configure the IPv6 settings Preferred hostname Enter the hostname you prefer for IPv6 connect...

Page 194: ...ork WIRELESS Show WLAN Diagnostic Log 2 The log is refreshed automatically at a regular interval of five seconds To avoid any new events interruption during data browsing you can suspend the automatic...

Page 195: ...static IP addresses Most of local multiple networks are not directly reachable and require the use of a gateway Therefore we will select Gateway in the following examples If your local multiple netwo...

Page 196: ...s the next hop router for your SRC to communicate with any device in the other subnet 192 168 200 0 In the IPv4 Static Routes section you should enter the data as shown below Note that the address in...

Page 197: ...utes you can click on any route and then make changes use or to re sort the priority or click to delete it IPv6 example Your SRC fd07 2fa 6cff 2405 30 Two NICs fd07 2fa 6cff 1111 50 and fd07 2fa 6cff...

Page 198: ...as shown below Note that the address in the first field must be of the Classless Inter Domain Routing CIDR notation Tip If you have configured multiple static routes you can click on any route and th...

Page 199: ...or Sharing Ethernet Connectivity on page 24 The cascading mode configured on the master device determines the Ethernet sharing method which is either network bridging or port forwarding See Overview o...

Page 200: ...e fields have to be configured Note that if either setting below is incorrectly configured a networking issue occurs Field Description Port forwarding role available on all cascaded devices Master or...

Page 201: ...s 7 Click Save For information on accessing each cascaded device in the Port Forwarding mode see Port Forwarding Examples on page 193 Enable R STP if a cascade loop is preferred You can loop a cascadi...

Page 202: ...de In this mode the DHCP server communicates with every cascaded device respectively and assigns four different IP addresses Each device has its own IP address The way to remotely access each cascaded...

Page 203: ...evice can have multiple IP addresses as long as the master device has multiple network interfaces enabled configured properly For example When the master device has two Ethernet ports ETH1 ETH2 you ca...

Page 204: ...ave 15 15 For example to access the Slave 4 device via Modbus TCP the port number is 50604 See Port Forwarding Examples on page 193 for further illustrations Tip The full list of each cascaded device...

Page 205: ...to a cascading chain comprising three devices The IP address is 192 168 84 77 Master device Position code for the master device is 00 so each port number is 5NN00 as listed below Protocols Port numbe...

Page 206: ...SSH 50201 TELNET 50301 SNMP 50501 MODBUS 50601 Examples To access Slave 1 via HTTPS the IP address is https 192 168 84 77 50001 To access Slave 1 via HTTP the IP address is http 192 168 84 77 50101 To...

Page 207: ...ding connection and or software settings of all devices in the chain See Cascading Troubleshooting on page 652 To add a device to an existing chain 1 Connect the device you will cascade to the LAN and...

Page 208: ...now You must disconnect the LAN cable and ALL cascading cables connected to the two devices first before swapping them and then reconnecting all cables To change the cascading mode applied to a chain...

Page 209: ...ed Telnet is disabled and all TCP ports for supported services are set to standard ports You can change default settings if necessary Note Telnet access is disabled by default because it communicates...

Page 210: ...Network Services HTTP 2 Enable either or both protocols by selecting the corresponding Enable checkbox 3 To use a different port for HTTP or HTTPS type a new port number Warning Different network serv...

Page 211: ...SNMP communication allows the manager to retrieve data and configures SRC Besides you may need to configure the SNMP destination s if the built in System SNMP Notification Rule is enabled and the SNM...

Page 212: ...cess is enabled by default The default Read community string is public To enable read write access type the Write community string Usually the string is private 3 Enter the MIB II system group informa...

Page 213: ...69 5 You must download the SNMP MIB for your SRC to use with your SNMP manager a Click the Download MIBs title bar to show the download links b Click the PDU2 MIB download link See Downloading SNMP MI...

Page 214: ...e user name but allowed for the password Enable SMTP over TLS StartTLS If your SMTP server supports the Transport Layer Security TLS select this checkbox Settings for the CA Certificate If the require...

Page 215: ...er documentation for information on configuring AES settings Changing SSH Settings You can enable or disable the SSH access to the command line interface change the TCP port or set a password or publi...

Page 216: ...ngs The SRC supports both the Modbus TCP and Modbus Gateway features Enable either or both Modbus features according to your needs Modbus TCP Access You can enable or disable the Modbus TCP access to...

Page 217: ...us TCP clients on your network will be able to communicate with those Modbus RTU devices attached to SRC See Connecting a Modbus RTU Device or Bus on page 69 1 To allow the Modbus TCP clients on the n...

Page 218: ...parameters Default address If the Modbus TCP client does not support Modbus RTU unit identifier addressing enter a Default Address If you must provide a unit identifier address Only one Modbus RTU dev...

Page 219: ...e advertisement feature supports both IPv4 and IPv6 protocols If you have set a preferred host name for IPv4 and or IPv6 that host name can be used as the zero configuration local host name that is pr...

Page 220: ...e all HTTP accesses to the SRC to be redirected to HTTPS see Changing HTTP S Settings on page 198 Submenu command Refer to IP Access Control Creating IP Access Control Rules on page 209 Role Based Acc...

Page 221: ...r example to specify a single address with the 24 bit prefix length use this format x x x x 24 24 the prefix length Note Valid IPv4 addresses range from 0 0 0 0 through 255 255 255 255 To configure IP...

Page 222: ...destination host Reject Discards traffic from to the specified IP address es and an ICMP message is sent to the source or destination host for failure notification INSERT a rule between two rules Sele...

Page 223: ...Chapter 6 Using the Web Interface 211 You can select any existing rule and then click or to change its priority 7 Click Save The rules are applied...

Page 224: ...u can delete any unnecessary rules To modify or delete a rule 1 Choose Device Settings Security IP Access Control 2 Go to the IPv4 or IPv6 section 3 Select the desired rule in the list Ensure the IPv4...

Page 225: ...eate rules Refer to the tables below for different operations ADD a rule to the end of the list Click Append Type a starting IP address in the Start IP field Type an ending IP address in the End IP fi...

Page 226: ...s the above IPv4 rule setup to create IPv6 rules 3 Make sure you click the Save button in the IPv6 section or the changes made to IPv6 rules are not saved Editing or Deleting Role Based Access Control...

Page 227: ...nsures that both parties in a TLS connection are who they say they are Besides you can create or apply for a multi domain certificate with subject alternative names To obtain a CA signed certificate 1...

Page 228: ...pany is located Organization The registered name of your company Organizational unit The name of your department Common name The fully qualified domain name FQDN of your SRC Email address An email add...

Page 229: ...b Submit it to a CA to obtain the digital certificate c If the CSR contains incorrect data click Delete Certificate Signing Request to remove it and then repeat the above steps to re create it 5 To s...

Page 230: ...ation Field Description Country The country where your company is located Use the standard ISO country code which comprises two uppercase letters For a list of ISO codes google ISO 3166 country codes...

Page 231: ...re create them 5 Optional To download the self signed certificate and or private key click Download Certificate or Download Key in the New TLS Certificate section You are prompted to open or save the...

Page 232: ...nto SRC 1 Choose Device Settings Security TLS Certificate 2 Select the Upload key and certificate checkbox at the bottom of the page 3 The Key File and Certificate file buttons appear Click each butto...

Page 233: ...entication only users will have no access to the SRC except for the admin who always can access the SRC If the external authentication fails an Authentication failed message is displayed Details regar...

Page 234: ...P protocol LDAP over TLS is being used If Secure LDAP is in use consult your LDAP administrator for the CA certificate file The network port used by the LDAP server The type of the LDAP server usually...

Page 235: ...rom existing LDAP server This checkbox appears only when there are existing AA server settings on the SRC To duplicate any existing AA server s settings refer to the duplicating procedure below Type o...

Page 236: ...his checkbox to make the authentication succeed regardless of the certificate s validity period After deselecting this checkbox the authentication fails whenever any certificate in the selected certif...

Page 237: ...s on page 227 5 Click Add Server The new LDAP server is listed on the Authentication page 6 To add more servers repeat the same steps 7 In the Authentication Type field select LDAP Otherwise the LDAP...

Page 238: ...ss hostname The IP address or hostname of your Radius server Type of RADIUS authentication Select an authentication protocol PAP Password Authentication Protocol CHAP Challenge Handshake Authenticatio...

Page 239: ...he same steps 7 In the Authentication Type field select Radius Otherwise the Radius authentication does not work 8 Click Save Radius authentication is now in place Managing External Authentication Set...

Page 240: ...ng checkbox Then the SRC always tries external authentication first Whenever the external authentication fails the SRC switches to local authentication 3 Click Save To disable external authentication...

Page 241: ...is setting determines how long users are permitted to stay idle before being forced to log out If you type a value the value must be followed by a time unit such as 4 min See Time Units on page 229 Ke...

Page 242: ...ting determines how often users are requested to change their passwords If you type a value the value must be followed by a time unit such as 10 d See Time Units on page 229 3 Click Save To force user...

Page 243: ...st accept the agreement or they cannot log in An event notifying you if a user has accepted or declined the agreement can be generated See Default Log Messages on page 244 To enable the service agreem...

Page 244: ...ogin screen Do either of the following or the login fails In the web interface select the checkbox labeled I understand and accept the restricted service agreement Tip To select the agreement checkbox...

Page 245: ...daylight saving time rules are not available for the selected time zone the checkbox is not configurable 4 Select the method for setting the date and time Customize the date and time Select User speci...

Page 246: ...nly when either IPv4 or IPv6 DHCP is enabled To use the manually specified NTP servers specify the primary NTP server in the First time server field A secondary NTP server is optional Click Check NTP...

Page 247: ...ct a custom date Click it and a calendar similar to the following appears Number Item Description 1 arrows Switch between months 2 dates 01 31 All dates of the selected month To select a date simply c...

Page 248: ...d therefore cannot synchronize with the SRC When the NTP synchronization issue occurs change the dispersion settings to resolve it To change the Windows NTP s root dispersion settings 1 Access the reg...

Page 249: ...the SRC email the temperature report every hour Note that you need the Administrator Privileges to configure event rules To create an event rule 1 Choose Device Settings Event Rules 2 If the needed a...

Page 250: ...ilt in event rules do not satisfy your needs create new rules Built in rules System Event Log Rule This causes ANY event occurred to the SRC to be recorded in the internal log It is enabled by default...

Page 251: ...useful if you want to receive the notifications when any numeric sensor s readings pass through a specific threshold 3 In this example the Peripheral Device Slot is selected which is related to the en...

Page 252: ...ause we want the SRC to react only when the selected temperature sensor s reading enters the upper critical range A Trigger condition field appears requiring you to define the exact condition related...

Page 253: ...tion only when the selected event occurs That is the status of the event transits from FALSE to TRUE Deasserted SRC takes the action only when the selected event disappears or stops That is the status...

Page 254: ...Link state is down SRC takes the action only when the network link state changes from up to down Both SRC takes the action whenever the network link state changes Function enabled or disabled Enabled...

Page 255: ...ied server becomes either inaccessible or accessible Device connection or disconnection such as a USB cascaded slave device Connected SRC takes the action only when the selected device is physically c...

Page 256: ...NUMBER AMSNAME Asset Management Rack Unit Blade Extension Connected Blade extension with ID AMSTAGID connected at rack unit AMSRACKUNITPOSITION of asset strip AMSNUMBER AMSNAME Blade extension with ID...

Page 257: ...der detached Card of type SMARTCARDTYPE with ID SMARTCARDID inserted Device System started System started Device System reset System reset performed by user USERNAME from host USERIP Device Firmware v...

Page 258: ...ion copied Bulk configuration copied by user USERNAME from host USERIP Device Network interface link state is up The IFNAME network interface link is now up The IFNAME network interface link is now do...

Page 259: ...hentication with incorrrect system clock Device Features Schroff LHX SHX Support Schroff LHX SHX support enabled Schroff LHX SHX support disabled Peripheral Device Slot Numeric Sensor Unavailable Peri...

Page 260: ...al device EXTSENSORNAME in slot EXTSENSORSLOT unavailable Peripheral device EXTSENSORNAME in slot EXTSENSORSLOT available Peripheral Device Slot State Sensor Actuator Alarmed Open On Peripheral device...

Page 261: ...r user USERNAME from host USERIP User Activity User accepted the Restricted Service Agreement User USERNAME from host USERIP accepted the Restricted Service Agreement User USERNAME from host USERIP de...

Page 262: ...WEBCAMNAME WEBCAMUVCID removed from port WEBCAMUSBPORT Webcam Management Webcam settings changed Webcam WEBCAMNAME settings changed by user USERNAME LHX SHX Connected LHX has been connected to PORTTY...

Page 263: ...HXSENSORID on LHX at PORTTYPE port PORTID deasserted below lower critical at SENSORREADING SENSORREADINGUNIT LHX SHX Base Electronics Failure The base electronics on LHX at PORTTYPE port PORTID failed...

Page 264: ...temperature threshold on LHX at PORTTYPE port PORTID was crossed The air outlet temperature on LHX at PORTTYPE port PORTID is within thresholds LHX SHX Threshold Water Inlet The water inlet temperatu...

Page 265: ...o you must enter IP addresses before applying this action to any event rule See Editing or Deleting a Rule Action on page 286 Any changes made to the SNMP Notifications section on the SNMP page will u...

Page 266: ...or log environmental sensor log or asset management strip data to a remote server using HTTP POST requests See Push Out Sensor Readings on page 259 Record snapshots to webcam storage Makes a connected...

Page 267: ...See Switch Peripheral Actuator on page 272 Syslog message Makes the SRC automatically forward event messages to the specified syslog server See Syslog Message on page 273 4 Enter the information as ne...

Page 268: ...Deselect All 4 To enable the notification resending feature select the Enable re scheduling of alarm notifications checkbox 5 In the Re scheduling period field specify the time interval in minutes at...

Page 269: ...ion s from the Selected actions field click that action s To remove all actions click Deselect All External Beeper If an external beeper is connected to the SRC the SRC can change the beeper s behavio...

Page 270: ...ned on or off when a certain event occurs Operation 1 Choose Device Settings Event Rules 2 Select Internal beeper from the Action list 3 Select an option from the Operation field Turn beeper on Turns...

Page 271: ...ation 1 Choose Device Settings Event Rules 2 Select Push out sensor readings from the Action list 3 Select a server or host which receives the data in the Destination field If the desired destination...

Page 272: ...ge 352 Folder name options Definition Serial number Webcam name Two folders will be created The parent folder s name is the serial number of SRC The subfolder s name is the selected webcam s name Seri...

Page 273: ...oose the timestamp is based on the time you have configured on the SRC See Setting the Date and Time on page 233 To find the serial number of your SRC see Device Information on page 318 To change the...

Page 274: ...Device Settings Event Rules 2 Select Send email from the Action list 3 In the Recipient email addresses field specify the email address es of the recipient s Use a comma to separate multiple email add...

Page 275: ...ll down to select the desired placeholder For details see Placeholders for Custom Messages on page 283 To start a new line in the text box press Enter Note In case you need to type any square brackets...

Page 276: ...ttings Event Rules 2 Select Send sensor report from the Action list 3 In the Destination actions section select the method s to report sensor readings or states The number of available methods varies...

Page 277: ...m the right field 6 To report additional sensors simultaneously repeat the above step to add more sensors To remove any sensor from the Report sensors list box select it and click To make multiple sel...

Page 278: ...be plugged into the SRC in order to send SMS messages See Connecting a GSM Modem on page 67 Note The SRC cannot receive SMS messages For example USERNAME logged into the device on TIMESTAMP translate...

Page 279: ...d in the custom message for non placeholder words always add a backslash in front of the square bracket That is or Otherwise the message sent will not display the square brackets Send Snapshots via Em...

Page 280: ...to be taken when the event occurs For example you can specify 10 images be taken once the event triggers the action Snapshots per mail the number of snapshots to be sent at one time in the email Time...

Page 281: ...form 2 For SNMP INFORM communications leave the resend settings at their default or do the following a In the Timeout field specify the interval of time in seconds after which a new inform communicati...

Page 282: ...unications leave the resend settings at their default or do the following a In the Timeout field specify the interval of time in seconds after which a new inform communication is resent if the first i...

Page 283: ...then confirm the privacy passphrase Start or Stop a Lua Script If you have created or loaded a Lua script file into the SRC you can have that script automatically run or stop in response to a specifi...

Page 284: ...LHX SHX field select the LHX SHX device to be turned on or off To select all available LHX SHX devices click Select All To remove any LHX SHX device from the Selected LHX SHX field click that device s...

Page 285: ...r may not detect the syslog message transmission failure If yes it will log this syslog failure as well as the failure reason in the event log See Viewing or Clearing the Local Event Log on page 325 O...

Page 286: ...quired certificate file is a chain of certificates and you are not sure about the requirements of a certificate chain see TLS Certificate Chain on page 665 Scheduling an Action An action can be regula...

Page 287: ...elect All 3 To remove any action s from the Selected actions field click that action s To remove all actions click Deselect All 4 Select the desired frequency in the Execution time field and then spec...

Page 288: ...lick The time is measured in 12 hour format so you must correctly specify AM or PM by clicking the AM PM button For example if you specify 01 30PM the action is performed at 13 30 pm every day Weekly...

Page 289: ...e of the scheduled action is available in the section titled Send Sensor Report Example on page 277 Send Sensor Report Example To create a scheduled action for emailing a temperature sensor report hou...

Page 290: ...Chapter 6 Using the Web Interface 278 If wanted you can customize the subject and content of this email in this action...

Page 291: ...Chapter 6 Using the Web Interface 279...

Page 292: ...2 Click to create a Send sensor report action that includes the Email a Sensor Report action as its destination action For details see Send Sensor Report on page 264 In this example this action is na...

Page 293: ...terface 281 You can specify more than one temperature sensor as needed in this action 3 Click to create a timer for performing the Send Temperature Sensor Readings action hourly For details see Schedu...

Page 294: ...he specified action at 12 30 pm 01 30 pm 02 30 pm and so on select Hourly and set the Minute to 30 Then the SRC will send out an email containing the specified temperature sensor readings hourly every...

Page 295: ...ns Simply drag the scroll bar and then click the desired placeholder to insert it into the custom message Or you can type a keyword in the search box to quickly find the desired placeholder Note that...

Page 296: ...reader COMPONENTID The ID of a hardware component CONFIGPARAM The name of a configuration parameter CONFIGVALUE The new value of a parameter DATETIME The human readable timestamp of the event occurren...

Page 297: ...he destination phone number of an outgoing SMS message PORTID The label of the external port the event triggering device is connected to PORTTYPE The type of the external port e g feature or auxiliary...

Page 298: ...ing to Note In case you need to type any square brackets and in the custom message for non placeholder words always add a backslash in front of the square bracket That is or Otherwise the message sent...

Page 299: ...n Both Actions System Event Log Action To create the above event rule 1 In the Event field select Device as we are specifying an event regarding the SRC device 2 Then select Network interface link sta...

Page 300: ...creating a new action before creating the rule Step 1 create a new action for sending an email 1 Choose Device Settings Event Rules 2 In this illustration assign the name Send a Notification to the n...

Page 301: ...Chapter 6 Using the Web Interface 289 6 Click Create to finish the creation...

Page 302: ...t field select Peripheral Device Slot to indicate we are specifying an event related to the environmental sensor package 4 Select the ID number of the desired contact closure sensor In this illustrati...

Page 303: ...ule is set like this Event Asset Management Feature Port 1 Rack Unit Index 3 Tag Connected Trigger condition Both Actions System Event Log Action To create the above event rule 1 Select Asset Manageme...

Page 304: ...ther event occurs 6 Select System Event Log Action as we intend to record this event in the internal log when the specified events occur A Note about Infinite Loop You should avoid building an infinit...

Page 305: ...listed on the Device menu occurs Note that Any sub event under the Device menu includes the event Sending SMTP message failed Event selected Action included Device Any sub event Send email A Note abo...

Page 306: ...minute the average of all measurements that occurred during the preceding 60 seconds along with the minimum and maximum measurement values are written to the log Note The SRC device s SNMP agent must...

Page 307: ...ore information on its format see Data Push Format on page 297 For instructions on connecting asset strips see Connecting Asset Management Strips on page 55 After configuring the destination and authe...

Page 308: ...set tag connection or disconnection events Sensor log Transmit the record of all logged sensors including their sensor readings and or status Logged sensors refer to all internal and or environmental...

Page 309: ...see the following topic Sensor Log on page 297 Asset Management Tag List on page 298 Asset Management Tag Log on page 301 Sensor Log The root object of the message is a SensorLogPushMessage structure...

Page 310: ...Asset Management Tag List The root object of the asset management tag list message is an AssetStripsMessage structure It contains current data about all connected asset management strips and tags whic...

Page 311: ...Chapter 6 Using the Web Interface 299...

Page 312: ...Chapter 6 Using the Web Interface 300 Continued...

Page 313: ...management log message is an AssetLogPushMessage structure It contains a list of tag or strip events since the last successful push Note that a Raritan provided explanation which is the comment beginn...

Page 314: ...hould adjust the ping settings for optimal results Tip To make the SRC automatically log send notifications or perform other actions for any server monitoring events you can create event rules See Eve...

Page 315: ...pinging after failure The wait time before the SRC resumes pinging after the monitored equipment is declared Unreachable Valid range is 1 to 1200 seconds Number of consecutive failures before disabli...

Page 316: ...equipment Status Description Reachable The monitored equipment is accessible Unreachable The monitored equipment is inaccessible Waiting for reliable connection The connection between the SRC device...

Page 317: ...onitoring for this server checkbox is selected 4 Enter the data shown below Enter the server s data Field Data entered IP address hostname 192 168 84 95 To make the SRC declare the accessibility of th...

Page 318: ...the Enabled checkbox to enable this new rule 4 Configure the following Field setting Data specified Rule name Send SNMP notifications for PDU 192 168 84 95 inaccessibility Event Choose Server Monitor...

Page 319: ...efault view is shown in the automatic mode See Automatic and Manual Modes on page 75 Mode Data entered Automatic mode This is the default and the only mode The LCD display indicates whether the curren...

Page 320: ...or communications over the serial interface You can set diverse bit rate settings for console and modem operations Usually the SRC can detect the device type and automatically apply the preset bit rat...

Page 321: ...ring the call To configure the GSM modem 1 Enter the SIM PIN code 2 Select the Use custom SMS center number checkbox if a custom SMS center will be used Enter the SMS center number in the SMS center f...

Page 322: ...rmitted 3 Determine whether and when to automatically execute the loaded script Checkbox Behavior when selected Start automatically at system boot Whenever the SRC reboots the script is automatically...

Page 323: ...ript will overwrite all existing codes in the Source Code section Therefore do not load a new script if the current script meets your needs 6 If you chose to load a script or Raritan s example in the...

Page 324: ...e Event Rules and Actions on page 237 and Start or Stop a Lua Script on page 271 To manually start a script 1 Choose Device Settings Lua Scripts The Lua scripts list displays 2 Click the desired scrip...

Page 325: ...ript Output section If needed click to delete the existing output data To manually stop a script 1 Choose Device Settings Lua Scripts 2 Click the desired script whose state is either Running or Restar...

Page 326: ...The script is never executed since the device boot Running The script is currently being executed Terminated The script was once executed but stops now Restarting The script will be executed Only the...

Page 327: ...n the confirmation message To return to the scripts list Click Lua Scripts on the top of the page Or click Lua Scripts in the Menu on page 104 Miscellaneous By default the support for Schroff LHX SHX...

Page 328: ...disable the access to USB A port s 1 Deselect the Enable USB Host Ports checkbox 2 Click Save in the USB Host Ports section Tip After the Enable USB Host Ports checkbox is deselected only the access...

Page 329: ...hapter 6 Using the Web Interface 317 Maintenance Click Maintenance in the Menu on page 104 and the following submenu displays Submenu command Refer to Device Information Device Information on page 318...

Page 330: ...te History on page 329 Bulk Configuration Bulk Configuration on page 330 Backup Restore Backup and Restore of Device Settings on page 335 Network Diagnostic Network Diagnostics on page 337 Download Di...

Page 331: ...ce you can retrieve hardware and software information of components or peripheral devices connected to your SRC Tip If the information shown on this page does not match the latest status press F5 to r...

Page 332: ...he Schroff LHX SHX support See Miscellaneous on page 314 Network The network information such as the current networking mode IPv4 and or IPv6 addresses and so on This tab also indicates whether the SR...

Page 333: ...port page http www raritan com support To identify the cascading status 1 Choose Maintenance Device Information 2 Click the Network title bar If the information shown on this page does not match the l...

Page 334: ...abled See Setting the Cascading Mode on page 187 Cascade position Indicates the position of the SRC in the cascading chain 0 zero represents the master device A non zero number represents a slave devi...

Page 335: ...osition shows a non zero number which indicates its exact position in the Cascade position field and yes in the Cascaded device connected field The following diagram shows 1 indicating it is the first...

Page 336: ...port numbers required for accessing each cascaded device in the Port Forwarding mode click the Port Forwarding title bar on the same page Viewing Connected Users You can check which users have logged...

Page 337: ...this user is connected to the CLI Serial The local connection such as the serial RS 232 or USB connection SSH The SSH connection Telnet The Telnet connection Webcam Live Preview Refers to the live we...

Page 338: ...f ID number of the event Date and time of the event Tip The date and time shown on the SRC web interface are automatically converted to your computer s time zone To avoid time confusion it is suggeste...

Page 339: ...ote that SRC must run 3 5 10 or later If you are connecting SRC to an existing cascading chain comprising non SRC Raritan products you may have to upgrade the existing chain first See Upgrade Guidelin...

Page 340: ...rmware Upgrade via USB on page 552 Upgrade Guidelines for Existing Cascading Chains You must obey the following guidelines when upgrading a chain Otherwise a networking issue occurs Firmware version 3...

Page 341: ...e devices in the chain networking issues occur on some cascaded devices Exception A few products such as SRC are developed much later so they may not support older firmware versions such as 3 5 0 3 4...

Page 342: ...be performed via the USB connection only If the firmware upgrade fails causing the SRC to stop working you can recover it by using a special utility rather than returning the device to Raritan Contact...

Page 343: ...settings will never be included into any profile you will create so they will never be downloaded from any source device See Device Specific Settings on page 665 When the date and time settings are in...

Page 344: ...t bulk configuration method refer to Bulk Configuration via SCP on page 527 Bulk Configuration or Firmware Upgrade via DHCP TFTP on page 554 Configuration or Firmware Upgrade with a USB Drive on page...

Page 345: ...The setting will not be downloaded Included The setting will be downloaded Inherited The setting will follow its parent setting that is the upper level setting If you select Excluded for its upper le...

Page 346: ...ed profile to open the Edit Bulk Profile page 4 Select the Select as default profile checkbox 5 Click Save Step 2 Save a bulk configuration file You must have the Administrator Privileges or Unrestric...

Page 347: ...er to Bulk Configuration via SCP on page 527 Bulk Configuration or Firmware Upgrade via DHCP TFTP on page 554 Configuration or Firmware Upgrade with a USB Drive on page 539 Raw Configuration Upload an...

Page 348: ...ile 2 Click on the top right corner 3 Click Delete on the confirmation message To remove one or multiple profiles 1 Click to make checkboxes appear in front of profiles 2 Select one or multiple profil...

Page 349: ...stricted View Privileges to download a backup file 1 Choose Maintenance Backup Restore 2 Check the Backup format field If the chosen value does not match your need change it Option Description Encrypt...

Page 350: ...e Bulk Configuration and Backup Restore pages Alternative To use a different method to perform backup restore refer to Backup and Restore via SCP on page 528 Network Diagnostics SRC provides the follo...

Page 351: ...box 2 Click Run The Trace Route results are then displayed List TCP Connections 1 Click the List TCP Connections title bar to show the list Downloading Diagnostic Information Important This function i...

Page 352: ...following diagrams opens NO hardware failures detected Hardware failure s detected Hardware Failure alerts on the Dashboard page Note that current hardware failure events if any will also display on...

Page 353: ...countdown timer showing the remaining time of the operation It takes about one minute to complete 4 When the restart is complete the login page opens Tip If you are not redirected to the login page a...

Page 354: ...lete click the text this link in the countdown message Alternative There are two more methods to reset the device to factory defaults Use the mechanical reset button Perform the CLI command For detail...

Page 355: ...the Web Interface 343 Webcam Management The Webcams menu item appears when there is any webcam s connected to the SRC or when there are snapshots saved onto the SRC already See Connecting a Logitech W...

Page 356: ...Webcam Configuration Additional webcam related actions you can take Action Refer to Manually store snapshots taken from the webcam onto the SRC or a remote server Configuring Webcams and Viewing Live...

Page 357: ...determined by the detection order The one that is detected first is named Webcam and the other that is detected later is named Webcam 2 The Webcam page consists of three sections Live Preview Image Co...

Page 358: ...arate window appears which is called the Primary Standalone Live Preview window in this User Guide You can send out this window s URL to share the live image with others See Sending Links to Snapshots...

Page 359: ...ion information in each location field as needed Up to 63 ASCII printable characters are supported Note that the location data you enter is not available in those snapshots stored on remote servers Ti...

Page 360: ...ve Preview window and multiple Secondary Standalone Live Preview windows are identified as one single webcam user in the Connected Users list You can disconnect a webcam user to terminate all sessions...

Page 361: ...e live snapshot or video in a standalone window opens See Configuring Webcams and Viewing Live Images on page 344 4 Copy the URL from that live preview window a Select the URL shown on the top of the...

Page 362: ...nk is no longer valid after two minutes since the final live preview window is closed Viewing and Managing Locally Saved Snapshots This section describes the operation for snapshots saved onto the SRC...

Page 363: ...interface are automatically converted to your computer s time zone To avoid time confusion it is suggested to apply the same time zone settings as those of SRC to your computer or mobile device 3 The...

Page 364: ...the topmost checkbox in the header row 3 On the top of the list click 4 Click Delete on the confirmation message To download any image onto the computer To download an image onto your computer move yo...

Page 365: ...remove the snapshots saved on the SRC such as firmware upgrade If you have either or both needs below you must save snapshots onto a remote server like FTP or CIFS Samba instead of the SRC Total numb...

Page 366: ...ame for server access Password for server access FTP Snapshots are saved onto a FTP server Total number of saved snapshots depends on the server s capacity All saved snapshots remain available after r...

Page 367: ...saved as JPEG and named according to the date and time when saving the snapshots Note that the date and time of the filename are based on the time zone of the SRC rather than that of the computer or...

Page 368: ...a remote server The name of the webcam that your SRC detects later if an additional webcam is connected This is the folder where the snapshots captured by the second webcam are stored The second webca...

Page 369: ...SRC does not have onboard door handle ports such as SRC 0100 but you have purchased Raritan s SmartLock kit with DX2 DH2C2 and connected it to your SRC Note For more information on DX2 DH2C2 such as i...

Page 370: ...that is DX2 DH2C2 modules attached to SRC Shows the status of the door handle integrated card readers connected to DX2 DH2C2 Note Data of external USB card readers is NOT shown on the SmartLock page I...

Page 371: ...e shows information of all DX2 DH2C2 modules attached to SRC including its serial number position and its door handle configuration On this page you can View the status of the cabinet door and card re...

Page 372: ...lock icon is displayed on each door handle section s top right corner and both the Door State and Card Reader sections are unavailable 1 Click Edit Settings in the Settings section 2 In the Door hand...

Page 373: ...e door handle lock will be automatically closed Default is 600 seconds that is 10 minutes Door sensor polarity Determine which of the following status is considered normal for doors that is contact cl...

Page 374: ...hapter 6 Using the Web Interface 362 Door Handle Status and Control After configuring the door handle type properly two more sections are shown for the configured door handle Door State and Card Reade...

Page 375: ...emains closed Card Reader Shows the data of the smart card scanned by the internal or external card reader accompanying each door handle connected to DX2 DH2C2 Note It is not necessary to use the inte...

Page 376: ...oor handle If not then SRC will automatically close the door handle lock after its timeout expires DX2 DH2C2 LED information For information on DX2 DH2C2 LED refer to Environmental Sensors and Actuato...

Page 377: ...ypes Door handle integrated card readers This type of card reader is integrated in the door handle which is any series below Emka Agent E SouthCo H3 EM Dirak eLine MLR 2x00 Note Not every SouthCo H3 E...

Page 378: ...cation Pass Phrase and Privacy Pass Phrase which act as shared secrets between SNMP and the SRC Important You must download the SNMP MIB for your SRC to use with your SNMP manager See Downloading SNMP...

Page 379: ...de to the SNMP Notifications section on the SNMP page will update the settings of the System SNMP Notification Action and vice versa See Available Actions on page 253 SNMPv2c Notifications 1 Choose De...

Page 380: ...nt up to 5 times when the initial communication fails Host The IP address of the device s you want to access This is the address to which notifications are sent by the SNMP agent You can specify up to...

Page 381: ...the Enable SNMP notifications checkbox is selected 4 Select SNMPv3 trap or SNMPv3 inform as the notification type 5 For SNMP TRAPs the engine ID is prepopulated 6 Type values in the following fields F...

Page 382: ...sent up to 5 times when the initial communication fails Security level Three types are available noAuthNoPriv neither authentication nor privacy protocols are needed authNoPriv only authentication is...

Page 383: ...elect the desired MIB file to download PDU2 MIB The SNMP MIB file for SRC management ASSETMANAGEMENT MIB The SNMP MIB file for asset management LHX MIB The SNMP MIB file for managing the LHX SHX heat...

Page 384: ...tion such as the SNMP system name Note The SNMP system name is the SRC device name When you change the SNMP system name the device name shown in the web interface is also changed The SRC does NOT supp...

Page 385: ...er in the MIB as The sensor state boardFirmwareVersion part of the configGroup group describes the firmware version SNMP Sets and Thresholds Some objects can be configured from the SNMP manager using...

Page 386: ...ip To specify the time zone use the CLI or web interface instead For the CLI see Setting the Time Zone on page 442 For the web interface see Setting the Date and Time on page 233 When using the SNMP S...

Page 387: ...ly Completing a Command 524 Logging out of CLI 525 About the Interface The SRC provides a command line interface that enables data center administrators to perform some basic management tasks Using th...

Page 388: ...HyperTerminal 1 Connect your computer to the product via a local USB or RS 232 connection 2 Launch HyperTerminal on your computer and open a console window When the window first opens it is blank Mak...

Page 389: ...guration To log in using SSH or Telnet 1 Ensure SSH or Telnet has been enabled See Configuring Network Services on page 197 in the User Guide 2 Launch an SSH or Telnet client and open a console window...

Page 390: ...nnected 3 Launch a terminal emulation program and configure its baud rate settings according to the baud rate set for the analog modem connected to the SRC See Configuring the Serial Port on page 307...

Page 391: ...m the administrator or user mode In this mode the prompt changes to diag or diag and you can perform the network troubleshooting commands such as the ping command See Entering Diagnostic Mode on page...

Page 392: ...lable Parameters for a Command If you are not sure what commands or parameters are available for a particular type of CLI command or its syntax you can have the CLI show them by adding a space and the...

Page 393: ...xternal sensors user profiles and so on Some show commands have two formats one with the parameter details and the other without The difference is that the command without the parameter details displa...

Page 394: ...RELESS or BRIDGE Note that you must choose configure the bridge interface if your SRC is set to the bridging mode Note In the bridging mode only the IP parameters of the BRIDGE interface function The...

Page 395: ...fic network interface show network ipv4 interface ETH To show the IPv6 configuration of a specific network interface show network ipv6 interface ETH Variables ETH is one of the network interfaces ETH1...

Page 396: ...authentication protocol show network interface ETH Variables ETH is one of the network interfaces ETH1 ETH2 WIRELESS or BRIDGE Note that you must choose configure the bridge interface if your SRC is...

Page 397: ...all Displays the settings of all network services including HTTP HTTPS Telnet SSH and SNMP Tip You can also type the command without adding this option all to get the same data http Only displays the...

Page 398: ...rmation add the parameter details to the end of the command show time details Default Measurement Units This command shows the default measurement units applied to the SRC web and CLI interfaces acros...

Page 399: ...the parameter details to the end of the command show externalsensors n details Variables n is one of the options all or a number Option Description all Displays the information of all environmental s...

Page 400: ...kage Information Different from the show externalsensors commands which show the reading status and configuration of an individual environmental sensor the following command shows the information of a...

Page 401: ...also type the command without adding this option all to get the same data A specific actuator number Displays the information for the specified actuator only The actuator number is the ID number assig...

Page 402: ...or Threshold Information This command syntax shows the specified environmental sensor s threshold related information show sensor externalsensor n To show detailed information add the parameter detail...

Page 403: ...d range Note For a state sensor the threshold related and accuracy related data is NOT available Environmental Sensor Default Thresholds This command syntax shows a certain sensor type s default thres...

Page 404: ...he parameter details the threshold range is displayed in addition to default thresholds settings Security Settings This command shows the security settings of the SRC show security To show detailed in...

Page 405: ...erver_num One Radius server s settings To show the configuration of a specific Radius server assign the desired Radius server with its sequential number in the command To get detailed information add...

Page 406: ...user_name is the name of the user whose profile you want to query The variable can be one of the options all or a user s name Option Description all This option shows all existing user profiles Tip Y...

Page 407: ...ing options Option Description all This option shows all existing roles Tip You can also type the command without adding this option all to get the same data a specific role s name This option shows t...

Page 408: ...port number For the SRC device with only one FEATURE port the valid number is always 1 Rack Unit Settings of an Asset Strip A rack unit refers to a tag port on the asset strips This command shows the...

Page 409: ...specific events Show the last 30 entries show eventlog Show a specific number of last entries in the event log show eventlog limit n Show a specific type of events only show eventlog class event_type...

Page 410: ...achable or unreachable assetManagement Raritan asset management events such as asset tag connections or disconnections lhx Schroff LHX SHX heat exchanger events modem Modem related events timerEvent S...

Page 411: ...lity server n details Variables n is a number representing the sequence of the IT device in the monitored server list You can find each IT device s sequence number using the CLI command of show server...

Page 412: ...s command shows the reliability error log show reliability errorlog n Variables n is one of the options 0 zero or any other integer number Option Description 0 Displays all entries in the reliability...

Page 413: ...hapter 8 Using the Command Line Interface 401 Examples This section provides examples of the show command Example 1 Basic Security Information The diagram shows the output of the show security command...

Page 414: ...when typing the show security details command Clearing Information You can use the clear commands to remove unnecessary data from the SRC After typing a clear command press Enter to execute it Note D...

Page 415: ...twork Connections This command removes all data from the diagnostic log for both the EAP authentication and WLAN connection clear networkDiagLog OR clear networkDiagLog y If you entered the command wi...

Page 416: ...figuration command and press Enter to change the settings Important To apply new configuration settings you must issue the apply command before closing the terminal emulation program Closing the progr...

Page 417: ...changes the device name of SRC config src name name Variables name is a string comprising up to 64 ASCII printable characters The name variable must be enclosed in quotes when it contains spaces Enab...

Page 418: ...294 Specifying the Device Altitude This command specifies the altitude of your SRC above sea level in meters You must specify the altitude of SRC above sea level if a Raritan s differential air press...

Page 419: ...When this is selected you can type a numeric value in the rack unit to describe the Z coordinate of any environmental sensors or actuators freeForm Any alphanumeric string can be used for specifying...

Page 420: ...ce function The IP parameters of ETH1 ETH2 and WIRELESS interfaces do NOT function Interface Description eth1 Determine the IPv4 configuration mode of the ETH1 interface wired networking eth2 Determin...

Page 421: ...he BRIDGE interface function The IP parameters of ETH1 ETH2 and WIRELESS interfaces do NOT function Interface Description eth1 Determine the IPv4 preferred host name of the ETH1 interface that is wire...

Page 422: ...do NOT function Interface Description eth1 Determine the IPv4 address of the ETH1 interface that is wired networking eth2 Determine the IPv4 address of the ETH2 interface that is wired networking wir...

Page 423: ...ctly reachable or not there are two methods for adding a static route For further information see Static Route Examples on page 183 Method 1 add a static route when the other network is NOT directly r...

Page 424: ...ask You can modify either the IP address or the subnet mask or both Configuring IPv6 Parameters An IPv6 configuration command begins with network ipv6 Setting the IPv6 Configuration Mode This command...

Page 425: ...fy the preferred host name which is optional The following is the command config network ipv6 interface ETH preferredHostName name Variables ETH is one of the network interfaces ETH1 ETH2 WIRELESS or...

Page 426: ...nfig network ipv6 interface ETH address ip address Variables ETH is one of the network interfaces ETH1 ETH2 WIRELESS or BRIDGE Note that you must choose configure the bridge interface if your SRC is s...

Page 427: ...the IPv6 network mode is set to static IP and your local network contains two subnets you can configure static routes to enable or disable communications between the SRC and devices in the other subn...

Page 428: ...d prefix length of the subnet where the SRC belongs The format is IP address prefix length hop is the IP address of the next hop router ETH is one of the interfaces ETH1 ETH2 WIRELESS and BRIDGE Type...

Page 429: ...suffix1 OR config network dns searchSuffixes suffix1 suffix2 suffix3 suffix6 Determine which IP address is used when the DNS server returns both IPv4 and IPv6 addresses config network dns resolverPref...

Page 430: ...face config network ethernet ETH enabled option Variables ETH is one of the options eth1 or eth2 Option Description eth1 ETH1 port eth2 ETH2 port option is one of the options true or false Option Desc...

Page 431: ...s 100 Mbps 1000Mbps The LAN speed is always 1000 Mbps Changing the LAN Duplex Mode This command determines the LAN interface duplex mode config network ethernet ETH duplexMode mode Variables ETH is on...

Page 432: ...methods NONE or EAP Method Description NONE The authentication method is set to NONE EAP The authentication method is set to EAP Setting Ethernet EAP Parameters When the selected Ethernet interface s...

Page 433: ...ands including commands for the client certificate client private key and CA certificate the system prompts you to enter the contents of the wanted certificate or key For an example with detailed proc...

Page 434: ...PEAP Outer authentication is set to Protected Extensible Authentication Protocol PEAP TLS Outer authentication is set to TLS inner_auth is one of the options MS CHAPv2 or TLS Option Description MSCHAP...

Page 435: ...e is not valid due to incorrect system time FQDN is the name of the RADIUS server if it is present in the TLS certificate The name must match the fully qualified domain name FQDN of the host shown in...

Page 436: ...ZSBTY2hvY2gwWDALBgkqhkiG9w0BAQEDSQAwR gJBALrAwyYdgxmzNP ts0Uyf6BpmiJYktU w4NG67ULaN4B5CnE z7k57s9o3YY3LecETgQ5iQHmkwlYDTL2fTgVfw0CAQOjgaswgag wZAYDVR0ZAQH BFowWDBWMFQxCzAJBgNVBAYTAlVTMTYwNAYDVQ QKEy1O...

Page 437: ...e Entering Configuration Mode on page 403 2 Type the appropriate command depending on which file you want to remove and press Enter Client certificate config network ethernet eth1 eapClientCertificate...

Page 438: ...ntil the wireless networking mode is enabled In addition a message appears indicating that the active network interface is not wireless Setting the SSID This command specifies the SSID string config n...

Page 439: ...ariables method is one of the authentication methods PSK or EAP Method Description PSK The authentication method is set to PSK EAP The authentication method is set to EAP Setting the PSK If the Pre Sh...

Page 440: ...et the EAP password config network wireless eapPassword After performing the above command the SRC prompts you to enter the password Then type the password and press Enter Provide a Client Certificate...

Page 441: ...ns PEAP or TLS Option Description PEAP Outer authentication is set to Protected Extensible Authentication Protocol PEAP TLS Outer authentication is set to TLS inner_auth is one of the options MS CHAPv...

Page 442: ...network connection successful when the SRC system time is earlier than the firmware build before synchronizing with the NTP server causing the TLS certificate to become invalid false The network conn...

Page 443: ...ssigned a unique IP address portForwarding The Port Forwarding mode where every cascaded device in the chain shares the same IP address with diverse port numbers assigned Important When enabling eithe...

Page 444: ...terface setting config network portForwarding masterDownstreamInterface option3 Variables option2 is one of the following cascading roles Role Description master The device is a master device slave Th...

Page 445: ...the HTTP port config network services http enabled option Enforce redirection from HTTP to HTTPS config network services http enforceHttps option Variables n is a TCP port number between 1 and 65535 T...

Page 446: ...ion is one of the options true or false Option Description true Forces any access to the SRC via HTTP to be redirected to HTTPS false No HTTP access is redirected to HTTPS Changing the Telnet Configur...

Page 447: ...5 The default Telnet port is 23 Changing the SSH Configuration You can enable or disable the SSH service or change its TCP port using the CLI commands An SSH command begins with network services ssh E...

Page 448: ...cKey Option Description passwordOnly Enables the password based login only publicKeyOnly Enables the public key based login only passwordOrPublicKey Enables both the password and public key based logi...

Page 449: ...is disabled Enabling or Disabling SNMP v3 This command enables or disables the SNMP v3 protocol config network services snmp v3 option Variables option is one of the options enable or disable Option D...

Page 450: ...is a string comprising 0 to 255 alphanumeric characters Setting the sysName Value This command sets the SNMP MIB II sysName value config network services snmp sysName value Variables value is a strin...

Page 451: ...is disabled Enabling or Disabling the Read Only Mode This command enables or disables the read only mode for the Modbus agent config network services modbus readonly option Variables option is one of...

Page 452: ...Service advertisement via LLMNR is enabled or disabled option is one of the options enable or disable Option Description enable Service advertisement via the selected method MDNS or LLMNR is enabled...

Page 453: ...mode on the ETH1 interface config network ipv4 interface eth1 configMethod static Time Configuration Commands A time configuration command begins with time Determining the Time Setup Method This comm...

Page 454: ...tp firstServer first_server Specify the secondary time server config time ntp secondServer second_server To delete the primary time server config time ntp firstServer To delete the secondary time serv...

Page 455: ...e set time hh mm ss Variables Variable Description yyyy mm dd Type the date in the format of yyyy mm dd For example type 2015 11 30 for November 30 2015 hh mm ss Type the time in the format of hh mm s...

Page 456: ...ettings config time autoDST option Variables option is one of the options enable or disable Mode Description enable Daylight savings time is enabled disable Daylight savings time is disabled Examples...

Page 457: ...ent CLI Modes and Prompts on page 377 In the administrator user mode check ntp In the configuration mode config check ntp Security Configuration Commands A security configuration command begins with s...

Page 458: ...Out policy IPv6 commands Enable or disable the IPv6 firewall control feature config security ipAccessControl ipv6 enabled option Determine the default IPv6 firewall control policy for inbound traffic...

Page 459: ...n page 517 Managing Firewall Rules You can add delete or modify firewall rules using the CLI commands An IPv4 firewall control rule command begins with security ipAccessControl ipv4 rule An IPv6 firew...

Page 460: ...k policy Variables direction is one of the options in or out Direction Description in Inbound traffic out Outbound traffic ip_mask is the combination of the IP address and subnet mask values or prefix...

Page 461: ...all Rule Depending on what to modify in an existing rule the command varies IPv4 commands Modify an IPv4 rule s IP address and or subnet mask config security ipAccessControl ipv4 rule modify direction...

Page 462: ...ation of the IP address and subnet mask values or prefix length which are separated with a slash For example an IPv4 combination looks like this 192 168 94 222 24 policy is one of the options accept d...

Page 463: ...existing rule that you want to remove Restricted Service Agreement The CLI command used to set the Restricted Service Agreement feature begins with security restrictedServiceAgreement Enabling or Disa...

Page 464: ...r of the following or the login fails In the web interface select the checkbox labeled I understand and accept the restricted service agreement Tip To select the agreement checkbox using the keyboard...

Page 465: ...ccessfully entered the CLI displays this message Successfully entered Restricted Service Agreement followed by the total number of entered characters in parentheses Note The new content of Restricted...

Page 466: ...Password Aging This command enables or disables the password aging feature which controls whether the password should be changed at a regular interval config security loginLimits passwordAging option...

Page 467: ...security userBlocking You can combine multiple commands to modify the user blocking parameters at a time See Multi Command Syntax on page 517 Determine the maximum number of failed logins before block...

Page 468: ...s This command enables or disables the strong password feature config security strongPasswords enabled option Variables option is one of the options true or false Option Description true Enables the s...

Page 469: ...character is required disable No lowercase character is required Uppercase Character Requirement This command determines whether a strong password includes at least a uppercase character config securi...

Page 470: ...hether a strong password includes at least a special character config security strongPasswords enforceAtLeastOneSpecialCharacter option Variables option is one of the options enable or disable Option...

Page 471: ...mmands for modifying role based access control parameters IPv4 commands Enable or disable the IPv4 role based access control feature config security roleBasedAccessControl ipv4 enabled option Determin...

Page 472: ...les An IPv4 role based access control command for managing rules begins with security roleBasedAccessControl ipv4 rule An IPv6 role based access control command for managing rules begins with security...

Page 473: ...the options allow or deny Policy Description allow Accepts traffic from the specified IP address range when the user is a member of the specified role deny Drops traffic from the specified IP address...

Page 474: ...rule_number role role Modify an IPv4 rule s policy config security roleBasedAccessControl ipv4 rule modify rule_number policy policy Modify all contents of an existing IPv4 rule config security roleBa...

Page 475: ...address role is one of the existing roles policy is one of the options allow or deny Policy Description allow Accepts traffic from the specified IP address range when the user is a member of the speci...

Page 476: ...ns simultaneously security frontPanelPermissions add switchActuator muteBeeper Enabling or Disabling Front Panel Beeper Sound Control The following CLI commands control whether you can mute the intern...

Page 477: ...ng command adds a new IPv4 access control rule and specifies its location in the list config security ipAccessControl ipv4 rule add in 192 168 84 123 24 accept insertAbove 5 Results A new IPv4 firewal...

Page 478: ...w rule becomes the 3rd rule and the original 3rd rule becomes the 4th rule User Configuration Commands Most user configuration commands begin with user except for the password change command Creating...

Page 479: ...After performing the above command SRC prompts you to enter a new password Then 1 Type a new password and press Enter 2 Re type the new password for confirmation and press Enter Variables name is the...

Page 480: ...Change a user s telephone number config user modify name telephoneNumber phone_number Change a user s email address config user modify name eMailAddress email_address Variables name is the name of th...

Page 481: ...Option Description true Enables the specified user profile false Disables the specified user profile Forcing a Password Change This command determines whether the password change is forced when a user...

Page 482: ...etermine the security level config user modify name securityLevel option2 Determine whether the authentication passphrase is identical to the password config user modify name userPasswordAsAuthenticat...

Page 483: ...e user whose settings you want to change option1 is one of the options enable or disable Option Description enable Enables the SNMP v3 access permission for the specified user disable Disables the SNM...

Page 484: ...tion protocol is applied SHA 1 SHA 1 authentication protocol is applied option6 is one of the options DES or AES 128 Option Description DES DES privacy protocol is applied AES 128 AES 128 privacy prot...

Page 485: ...sers via CLI see Setting Default Measurement Units on page 475 Set the preferred temperature unit config user modify name preferredTemperatureUnit option1 Set the preferred length unit config user mod...

Page 486: ...to enter the contents of the SSH public key Do the following to input the contents a Open your SSH public key with a text editor b Copy all contents in the text editor c Paste the contents into the te...

Page 487: ...the password is changed successfully the new password is effective immediately no matter you type the command apply or not to save the changes Example This procedure changes your own password 1 Verif...

Page 488: ...e and command line interface Tip To change the preferred measurement units displayed in the SRC user interfaces for a specific user via CLI see Changing Measurement Units on page 472 Set the default t...

Page 489: ...several user configuration examples Example 1 Creating a User Profile The following command creates a new user profile and sets two parameters for the new user config user create Mary enable admin Res...

Page 490: ...lt temperature unit is set to Fahrenheit The default length unit is set to feet The default pressure unit is set to psi Role Configuration Commands A role configuration command begins with role Creati...

Page 491: ...a comma if there are more than one argument for a privilege All Privileges This table lists all privileges Privilege Description acknowledgeAlarms Acknowledge Alarms adminPrivilege Administrator Privi...

Page 492: ...Log View Local Event Log viewSecuritySettings View Security Settings viewSnmpSettings View SNMP Settings viewUserSettings View Local User Management viewWebcamSettings View Webcam Snapshots and Config...

Page 493: ...Privileges privilege1 privilege2 privilege3 If a specific privilege contains any arguments add a colon and the argument s after that privilege config role modify name addPrivileges privilege1 argument...

Page 494: ...haracters description is a description comprising alphanumeric characters The description variable must be enclosed in quotes when it contains spaces privilege1 privilege2 privilege3 and the like are...

Page 495: ...oth set the authentication type and determine whether to switch to local authentication in case the remote authentication is not available Determine the authentication type only config authentication...

Page 496: ...AP related commands begin with authentication ldap If you enable LDAP authentication you must add at least one LDAP server Later you can modify or delete any existing LDAP server as needed Adding an L...

Page 497: ...command When the above command is successfully performed a list of all LDAP servers including the newly added one will be displayed which is similar to the following diagram Tip To verify all setting...

Page 498: ...ommand as illustrated below If adding multiple optional parameters you must add them to the END of the command and separate them with a space Example 1 Specify an Active Directory Domain s name config...

Page 499: ...ctory Domain verify_cert is one of the options true or false Option Description true Enable the verification of the LDAP server certificate false Disable the verification of the LDAP server certificat...

Page 500: ...netOrgPerson verifyServerCertificate true b The system now prompts you to enter the certificate s content c Type or copy the certificate s content in the CLI and press Enter Note The certificate s con...

Page 501: ...SRC See Authentication Settings on page 392 Modifying an Existing LDAP Server You can modify one or multiple parameters of an existing LDAP server such as its IP address TCP port number Base DN and so...

Page 502: ...de anonymousBind and authenticatedBind searchBaseDN base_DN Change the base DN for search base_DN is the new base DN for search loginNameAttribute login_name_att Change the login name attribute login_...

Page 503: ...nge the bind DN bind_DN is the new bind DN bindPassword Change the bind DN password a First add the bindPassword parameter to the command and press Enter b The system prompts you for the input of the...

Page 504: ...s All Radius related commands begin with authentication radius If you enable Radius authentication you must add at least one Radius server Later you can modify or delete any existing Radius server as...

Page 505: ...2 168 7 99 chap 1812 1813 10 3 Modifying an Existing Radius Server You can modify one or multiple parameters of an existing Radius server or change the priority or sequence of existing servers in the...

Page 506: ...ential number of the specified server in the Radius server list host is the new IP address or host name of the Radius server rds_type is one of the Radius authentication types pap chap msChapV2 auth_p...

Page 507: ...ameters of an individual environmental sensor Note To configure an actuator see Actuator Configuration Commands on page 504 Changing the Sensor Name This command names an environmental sensor config e...

Page 508: ...ion or vibration Type Description contact The connected detector switch is for detection of door lock or door closed open status smokeDetection The connected detector switch is for detection of the sm...

Page 509: ...and specifies the Z coordinate of an environmental sensor config externalsensor n zlabel coordinate Variables n is the ID number of the environmental sensor that you want to configure The ID number is...

Page 510: ...s when it contains spaces Using Default Thresholds This command determines whether default thresholds including the deassertion hysteresis and assertion timeout are applied to a specific environmental...

Page 511: ...the CLI It is an integer starting at 1 time is an integer number in seconds ranging between 0 and 300 Examples This section illustrates several environmental sensor configuration examples Example 1 En...

Page 512: ...time by combining multiple commands See Multi Command Syntax on page 517 Set the Default Upper Critical Threshold for a specific sensor type config defaultThresholds sensor type upperCritical value S...

Page 513: ...sors value is the value for the specified threshold of the specified sensor type Note that diverse sensor types use different measurement units Sensor types Measurement units absoluteHumidity g m 3 th...

Page 514: ...n a new value to the threshold at any time regardless of whether the threshold has been enabled Threshold Configuration Commands for a Sensor A sensor threshold configuration command for environmental...

Page 515: ...t is an integer starting at 1 sensor type is one of the following numeric sensor types Sensor types Description absoluteHumidity Absolute humidity sensors relativeHumidity Relative humidity sensors te...

Page 516: ...environmental sensor See To De assert and Deassertion Hysteresis on page 647 as_value is a number in samples that is assigned to the assertion timeout for the specified environmental sensor It ranges...

Page 517: ...ctuator s description config actuator n description description Variables n is the ID number assigned to the actuator The ID number can be found using the SRC web interface or CLI It is an integer sta...

Page 518: ...ds You can use the CLI to add or delete an IT device such as a server from the server reachability list or modify the settings for a monitored IT device A server reachability configuration command beg...

Page 519: ...s the number of consecutive Unreachable declarations before the SRC disables the ping monitoring feature for the monitored device and returns to the Waiting for reliable connection state Valid range i...

Page 520: ...ings for declaring Unreachable config serverReachability modify n numberOfUnsuccessfulPingsForFailure fail_number Modify the wait time after a successful ping config serverReachability modify n waitTi...

Page 521: ...e Unreachable Valid range is 1 to 100 succ_wait is the wait time to send the next ping after a successful ping Valid range is 5 to 600 seconds fail_wait is the wait time to send the next ping after a...

Page 522: ...nected For the SRC device with only one FEATURE port the number is always 1 name is a string comprising up to 64 ASCII printable characters The name variable must be enclosed in quotes when it contain...

Page 523: ...tomUp Mode Description topDown The rack units are numbered in the ascending order from the highest to the lowest rack unit bottomUp The rack units are numbered in the descending order from the highest...

Page 524: ...C device with only one FEATURE port the number is always 1 orientation is one of the options topConnector or bottomConnector Orientation Description topConnector This option indicates that the asset s...

Page 525: ...ips A rack unit configuration command begins with rackUnit Naming a Rack Unit This command syntax assigns or changes the name of the specified rack unit on the specified asset strip config rackUnit n...

Page 526: ...rack unit The index number is available on the asset strip or the Asset Strip page of the web interface mode is one of the LED modes automatic or manual Mode Description automatic This option makes t...

Page 527: ...Note A rack unit s LED color setting overrides the global LED color setting on it See Setting LED Colors for Connected Tags on page 511 and Setting LED Colors for Disconnected Tags on page 512 Setting...

Page 528: ...s the LED color for all rack units on the asset sensor 1 to BLACK that is 000000 to indicate the absence of a connected asset tag config assetStrip 1 LEDColorForDisconnectedTags 000000 Note Black colo...

Page 529: ...rt bit rate change is required when the SRC works in conjunction with Raritan s Dominion LX KVM switch Dominion LX only supports 19200 bps for communications over the serial interface Determine the MO...

Page 530: ...mmands in one command to perform all of them at a time All combined commands must belong to the same configuration type such as commands prefixed with network user modify sensor externalsensor and so...

Page 531: ...or off that mechanism or system through the actuator control command in the CLI Perform these commands in the administrator or user mode See Different CLI Modes and Prompts on page 377 Switching On an...

Page 532: ...or using the show command in the CLI It is an integer starting at 1 If you entered the command without y a message appears prompting you to confirm the operation Then Type y to confirm the operation O...

Page 533: ...set To restart the SRC 1 Ensure you have entered administrator mode and the prompt is displayed 2 Type either of the following commands to restart the SRC reset unit OR reset unit y 3 If you entered t...

Page 534: ...rresponding Linux commands and can get corresponding Linux outputs Entering Diagnostic Mode Diagnostic commands function in the diagnostic mode only To enter the diagnostic mode 1 Enter either of the...

Page 535: ...S information of a network host diag nslookup host Variables host is the name or IP address of the host whose DNS information you want to query Showing Network Connections This command syntax displays...

Page 536: ...address whose networking connectivity you want to check Options You can include any or all of additional options listed below in the ping command Options Description count number1 Determines the numbe...

Page 537: ...ing Previous Commands If you would like to retrieve any command that was previously typed in the same connection session press the Up arrow on the keyboard several times until the desired command is d...

Page 538: ...complete the second word Example 3 more than one possible commands a Type only the first two words of the network ipv4 gateway xxx xxx xxx xxx command that is network ipv4 b Then press Tab or Ctrl i o...

Page 539: ...the firmware via SCP 1 Type the following SCP command and press Enter scp firmware file user name device ip fwupdate firmware file is the SRC firmware s filename If the firmware file is not in the cur...

Page 540: ...To save the configuration via SCP 1 Type the following SCP command and press Enter scp user name device ip bulk_config txt filename user name is the admin or any user profile with Administrator Privil...

Page 541: ...txt user name device ip bulk_restore Alternative of bulk configuration via SCP Both methods of uploading bulk configuration file or raw configuration file via SCP can serve the purpose of bulk config...

Page 542: ...nistrator Privileges device ip is the IP address or hostname of the SRC whose settings you want to restore 2 Type the user password when prompted 3 The system copies the configuration included in the...

Page 543: ...g slave device The diagnostic file s default filename diag data zip is wanted Then add a dot in the end of the SCP command as shown below scp P port user name device ip diag data zip Scenario 3 Specif...

Page 544: ...diag data zip filename Uploading or Downloading Raw Configuration Data You can download the raw configuration data of a specific SRC for review backup or modification After modifying or creating any...

Page 545: ...new filename but use the default SCP port SSH SCP port is the default 22 and the accessed SRC is a standalone device Renaming the raw configuration file is wanted scp user name device ip raw_config tx...

Page 546: ...ssed SRC is a Port Forwarding slave device There is only one device to configure so a CSV file for device specific settings is NOT needed scp P port config file user name device ip raw_config_update S...

Page 547: ...e config txt on page 546 dev_col comprises serial or mac and the number of the column where the serial number or MAC address of each SRC is in the uploaded CSV file This is the data based on which eac...

Page 548: ...pecific settings with the upload of raw configuration but not with the bulk configuration file Bulk Configuration via SCP on page 527 Keys that Cannot Be Uploaded The raw configuration downloaded from...

Page 549: ...RC is 60 degrees Celsius Serial RS 232 RJ 45 Port Pinouts RJ 45 Pin signal definition Pin No Signal Direction Description 1 RTS Output Request to send 2 DTR Output Data terminal ready 3 TxD Output Tra...

Page 550: ...re signal for Raritan environmental sensor packages 8 GND Signal Ground Note A maximum of 500mA power is permitted for both pin 1 and pin 2 altogether Feature RJ 45 Port Pinouts RJ 45 Pin signal defin...

Page 551: ...Appendix A Specifications 539 RJ 45 Pin signal definition Pin No Signal Direction Description intended for use with Raritan devices Do NOT connect 7 GND Signal Ground 8 DCD Input Reserved...

Page 552: ...ted by default Only firmware upgrade is permitted with fwupdate cfg A special parameter is required to permit firmware downgrade via fwupdate cfg See fwupdate cfg on page 542 Therefore firmware downgr...

Page 553: ...ttons next to the display for one second until the smiley disappears Tip You can remove the USB drive and plug it into another SRC device for performing the same task s once the happy smiley or the fi...

Page 554: ...e types of configuration files fwupdate cfg This file MUST be always present for performing configuration or firmware upgrade tasks See fwupdate cfg on page 542 config txt This file is used for config...

Page 555: ...ork fine you must update your SRC to the latest firmware version user A required option Specify the name of a user account with Administrator Privileges For SRC with factory default configuration set...

Page 556: ...downgrade via USB drive on Raritan power products with USB A port s To do this the parameter allow_downgrade must be present and properly set in the fwupdate cfg file config Specify the name of the c...

Page 557: ...ulk restore operation This option CANNOT be used with the option full_config_restore If a firmware upgrade will be performed at the same time you must generate the bulk configuration file based on the...

Page 558: ...Specify a Lua script file For example execute_lua_script my_script lua Script output will be recorded to a log file BASENAME_OF_SCRIPT SERIAL_NUMBER log Note this log file s size is limited on DHCP T...

Page 559: ...an to get a device configuration file specific to your SRC model and firmware version Tip You can choose to encrypt important data in the config txt file so that people cannot easily recognize it such...

Page 560: ...ms are implemented Examples magic users 1 snmp_v3 auth_phrase swordfish magic users 1 snmp_v3 priv_phrase opensesame To configure device specific settings 1 Make sure the device list configuration fil...

Page 561: ...tore a specific setting to factory default Add delete to the beginning of the key whose setting you want to remove The custom setting will be removed and then reset to factory default Example delete n...

Page 562: ...es csv file by comparing its serial number or MAC address to one of the columns in the file Determine the column to identify SRC devices By default the SRC searches for its serial number in the 1st co...

Page 563: ...ection of Raritan website s Support page http www raritan com support 2 Launch Excel to open this utility Note Other office suites such as OpenOffice and LibreOffice are not supported 3 Read the instr...

Page 564: ...y on page 550 2 Launch a terminal to log in to the CLI of any SRC running version 3 5 10 or later See Logging in to CLI on page 375 3 Type the encryption command and the value of the setting you want...

Page 565: ...to the beginning of that setting Firmware Upgrade via USB Firmware files are available on Raritan website s Support page http www raritan com support Note that if the firmware file used for firmware u...

Page 566: ...another SRC for firmware upgrade when the firmware upgrade message displays 5 It may take one to five minutes to complete the firmware upgrade depending on your product 6 When the firmware upgrade fi...

Page 567: ...r firmware upgrade via DHCP TFTP only works on standalone SRC devices directly connected to the network This feature does NOT work for slave devices in the cascading configuration Tip For the other al...

Page 568: ...rmware versions If you have existing configuration files it is suggested to double check with Raritan Technical Support for the correctness of these files prior to using this feature 2 Configure your...

Page 569: ...tively if both IPv4 and IPv6 settings are configured properly in DHCP All required configuration files are available in the TFTP root directory See Bulk Configuration Upgrade Procedure on page 555 If...

Page 570: ...Click Add to add a new vendor class c Specify a unique name for this vendor class and type the binary codes of Raritan PDU 1 0 in the New Class dialog The vendor class is named Raritan PDU in this il...

Page 571: ...click the IPv4 node in DHCP to select Set Predefined Options b Select DHCP Standard Options in the Option class field and Vendor Class Identifier in the Option name field Leave the String field blank...

Page 572: ...on or Firmware Upgrade via DHCP TFTP 560 a Select Raritan PDU in the Option class field b Click Add to add the first option Type pdu tftp server in the Name field select IP Address as the data type an...

Page 573: ...t String as the data type and type 2 in the Code field d Click Add to add the third one Type pdu update magic in the Name field select String as the data type and type 3 in the Code field 4 Create a n...

Page 574: ...Appendix C Bulk Configuration or Firmware Upgrade via DHCP TFTP 562 The policy is named PDU in this illustration c Click Add to add a new condition...

Page 575: ...Appendix C Bulk Configuration or Firmware Upgrade via DHCP TFTP 563 d Select the vendor class Raritan PDU in the Value field click Add and then Ok e Click Next...

Page 576: ...guration or Firmware Upgrade via DHCP TFTP 564 f Select DHCP Standard Options in the Vendor class field select 060 Vendor Class Identifier from the Available Options list and type Raritan PDU 1 0 in t...

Page 577: ...guration or Firmware Upgrade via DHCP TFTP 565 g Select the Raritan PDU in the Vendor class field select 001 pdu tftp server from the Available Options list and type your TFTP server s IPv4 address in...

Page 578: ...ions list and type any string in the String value field This third option code is the magic cookie to prevent the fwupdate cfg commands from being executed repeatedly It does NOT matter whether the IP...

Page 579: ...ic cookie in DHCP and the one stored in SRC Therefore you must modify the magic cookie s value in DHCP when intending to execute the fwupdate cfg commands next time DHCP IPv6 Configuration in Windows...

Page 580: ...in DHCP to select Define Vendor Classes b Click Add to add a new vendor class c Specify a unique name for the vendor class type 13742 in the Vendor ID IANA field and type the binary codes of Raritan...

Page 581: ...Appendix C Bulk Configuration or Firmware Upgrade via DHCP TFTP 569 2 Add three options to the Raritan PDU 1 0 vendor class a Right click the IPv6 node in DHCP to select Set Predefined Options...

Page 582: ...or Firmware Upgrade via DHCP TFTP 570 b Select Raritan PDU 1 0 in the Option class field c Click Add to add the first option Type pdu tftp server in the Name field select IP Address as the data type...

Page 583: ...ring as the data type and type 2 in the Code field e Click Add to add the third one Type pdu update magic in the Name field select String as the data type and type 3 in the Code field 3 Configure serv...

Page 584: ...ration or Firmware Upgrade via DHCP TFTP 572 c Select Raritan PDU 1 0 in the Vendor class field select 00001 pdu tftp server from the Available Options list and type your TFTP server s IPv6 address in...

Page 585: ...ptions list and type any string in the String value field This third option code is the magic cookie to prevent the fwupdate cfg commands from being executed repeatedly It does NOT matter whether the...

Page 586: ...the one stored in SRC Therefore you must modify the magic cookie s value in DHCP when intending to execute the fwupdate cfg commands next time DHCP IPv4 Configuration in Linux Modify the dhcpd conf f...

Page 587: ...the fwupdate cfg commands from being executed repeatedly It does NOT matter whether the IPv4 magic cookie is identical to or different from the IPv6 magic cookie The magic cookie is a string comprisi...

Page 588: ...ate and open the dhcpd6 conf file of the DHCP server 2 The SRC will provide the following values to the vendor class option option 16 Configure related settings in DHCP accordingly 13742 Raritan s IAN...

Page 589: ...mprising numerical and or alphabetical digits in any format In the following illustration diagram it is a combination of a date and a serial number Important The magic cookie is transmitted to and sto...

Page 590: ...ration that will be uploaded to any SRC See Keys that Cannot Be Uploaded on page 535 Both configuration download and upload operations require the Administrator Privileges In This Chapter Downloading...

Page 591: ...ned If you would like to log in after issuing the download request type an URL without login credentials contained in the web browser The system will then prompt you to enter the login credentials htt...

Page 592: ...me you prefer Example curl k https admin raritan 192 168 84 114 cgi bin raw_config_download cgi config txt Uploading Raw Configuration There are two upload methods SCP or PSCP command See Uploading or...

Page 593: ...word device IP cgi bin raw_config_update cgi Parameter Description user Any user name that has the Administrator Privileges password The password of the specified user name device IP Hostname or IP ad...

Page 594: ...ress of each SRC is in the uploaded CSV file This is the data based on which each device finds its device specific settings For example If the second column contains each device s serial number the pa...

Page 595: ...on was successful 1 An internal error occurred 2 A parameter error occurred 3 A raw configuration update operation is already running 4 The file is too large 5 Invalid raw configuration file provided...

Page 596: ...Reset Button An RS 232 serial connection to a computer is required for using the reset button To reset to factory defaults using the reset button 1 Connect a computer to the SRC See Connecting the SRC...

Page 597: ...nfiguration see Step 2 of Initial Network Configuration via CLI on page 657 3 Log in to the CLI by typing the user name admin and its password 4 After the system prompt appears type either of the foll...

Page 598: ...ather than SSL 3 0 In This Chapter Step A Determine User Accounts and Roles 585 Step B Configure User Groups on the AD Server 586 Step C Configure LDAP Authentication on the SRC 588 Step D Configure R...

Page 599: ...lustration we assume The groups roles for the SRC are named SRC_Admin and SRC_User User accounts srcuser srcuser2 usera and userb already exist on the AD server To configure user groups on the AD serv...

Page 600: ...Appendix F LDAP Configuration Illustration 588 3 Add the srcuser and userb accounts to the SRC_Admin group 4 Verify whether each group comprises correct users...

Page 601: ...lick New to add an LDAP LDAPS server 3 Provide the SRC with the information about the AD server Field setting Do this IP address hostname Type the domain name techadssl com or IP address 192 168 56 3...

Page 602: ...erver Login Name Attribute Ensure the field is set to sAMAccountName because the LDAP server is Microsoft Active Directory User entry object class Ensure the field is set to user because the LDAP serv...

Page 603: ...Appendix F LDAP Configuration Illustration 591 4 Click Add Server The LDAP server is saved 5 In the Authentication Type field select LDAP 6 Click Save The LDAP authentication is activated...

Page 604: ...SRC on the AD server or authorization will fail Therefore we will create the roles named SRC_User and SRC_Admin on the SRC device In this illustration we assume Users assigned to the SRC_User role ca...

Page 605: ...thout the capability to configure or change them d Click Save 3 The SRC_User role is created 4 Keep the Roles page open to create the SRC_Admin role To create the SRC_Admin role with full permissions...

Page 606: ...Configuration Illustration 594 c In the Privileges list select Administrator Privileges The Administrator Privileges allows users to configure or change all SRC settings d Click Save 2 The SRC_Admin...

Page 607: ...ese user role names by returning an attribute named as follows rciusergroup attribute type string This may require a schema extension on your LDAP LDAPS server Consult your authentication server admin...

Page 608: ...ma 1 Right click the Active Directory Schema root node in the left pane of the window and then click Operations Master The Change Schema Master dialog appears 2 Select the Schema can be modified on th...

Page 609: ...LDAP Display Name field 6 Type 1 3 6 1 4 1 13742 50 in the Unique x5000 Object ID field 7 Type a meaningful description in the Description field 8 Click the Syntax drop down arrow and choose Case Ins...

Page 610: ...Updating the LDAP Schema 598 2 Scroll to the user class in the right pane and right click it 3 Choose Properties from the menu The user Properties dialog appears 4 Click the Attributes tab to open it...

Page 611: ...ibutes for User Members To run the Active Directory script on a Windows 2003 server use the script provided by Microsoft available on the Windows 2003 server installation CD These scripts are loaded o...

Page 612: ...Updating the LDAP Schema 600 3 Go to the directory where the support tools were installed Run adsiedit msc The ADSI Edit window opens 4 Open the Domain 5 In the left pane of the window select the CN U...

Page 613: ...the right pane Right click the user name and select Properties 7 Click the Attribute Editor tab if it is not already open Choose rciusergroup from the Attributes list 8 Click Edit The String Attribut...

Page 614: ...hat we assume that the NPS is running on a Windows 2008 system in the NPS illustrations In This Chapter Standard Attributes 601 Vendor Specific Attributes 620 AD Related Configuration 633 Standard Att...

Page 615: ...633 Step A Add Your SRC as a RADIUS Client The RADIUS implementation on the SRC follows the standard RADIUS Internet Engineering Task Force IETF specification so you must select RADIUS Standard as its...

Page 616: ...n 604 2 Right click NPS Local and select Properties Verify the authentication and accounting port numbers shown in the properties dialog are the same as those specified on your SRC In this example the...

Page 617: ...The New RADIUS Client dialog appears 4 Do the following to add your SRC to NPS a Verify the Enable this RADIUS client checkbox is selected b Type a name for identifying your SRC in the Friendly name f...

Page 618: ...endix H RADIUS Configuration Illustration 606 f Type the shared secret in the Shared secret and Confirm shared secret fields The shared secret must be the same as the one specified on your SRC 5 Click...

Page 619: ...policies IP address or host name of the SRC Connection request forwarding method Authentication method s Standard RADIUS attributes Presumptions in the illustration IP address of your SRC 192 168 56...

Page 620: ...Configuration Illustration 608 2 Right click Connection Request Policies and select New The New Connection Request Policy dialog appears 3 Type a descriptive name for identifying this policy in the P...

Page 621: ...Appendix H RADIUS Configuration Illustration 609 You can leave the Type of network access server field to the default Unspecified...

Page 622: ...Appendix H RADIUS Configuration Illustration 610 4 Click Next to show the Specify Conditions screen Click Add 5 The Select condition dialog appears Click Add...

Page 623: ...NAS IPv4 Address dialog appears Type the SRC IP address 192 168 56 29 and click OK 7 Click Next in the New Connection Request Policy dialog 8 Select Authenticate requests on this server because a loc...

Page 624: ...Connection Request Forwarding options must match your environment 9 When the system prompts you to select the authentication method select the following two options Override network policy authentica...

Page 625: ...Appendix H RADIUS Configuration Illustration 613 Note If your SRC uses PAP then select PAP...

Page 626: ...Appendix H RADIUS Configuration Illustration 614 10 Select Standard to the left of the dialog and then click Add...

Page 627: ...Appendix H RADIUS Configuration Illustration 615 11 Select Filter Id from the list of attributes and click Add...

Page 628: ...Appendix H RADIUS Configuration Illustration 616 12 In the Attribute Information dialog click Add 13 Select String type Raritan G Admin in the text box and then click OK...

Page 629: ...ix H RADIUS Configuration Illustration 617 Admin inside the curved brackets is the existing role on the SRC It is recommended to use the Admin role to test this configuration The role name is case sen...

Page 630: ...Appendix H RADIUS Configuration Illustration 618 14 The new attribute is added Click OK...

Page 631: ...Appendix H RADIUS Configuration Illustration 619 15 Click Next to continue...

Page 632: ...You simply add all user data including user names passwords and roles in the following FreeRADIUS path etc raddb users Presumptions in the illustration User name steve Steve s password test123 Steve...

Page 633: ...e name2 role name3 For configuration on NPS see NPS VSA Illustration on page 620 For configuration on FreeRADIUS see FreeRADIUS VSA Illustration on page 632 NPS VSA Illustration To configure Windows 2...

Page 634: ...cation so you must select RADIUS Standard as its vendor name when configuring the NPS server Presumptions in the illustration IP address of your SRC 192 168 56 29 RADIUS authentication port specified...

Page 635: ...n 623 2 Right click NPS Local and select Properties Verify the authentication and accounting port numbers shown in the properties dialog are the same as those specified on your SRC In this example the...

Page 636: ...The New RADIUS Client dialog appears 4 Do the following to add your SRC to NPS a Verify the Enable this RADIUS client checkbox is selected b Type a name for identifying your SRC in the Friendly name f...

Page 637: ...endix H RADIUS Configuration Illustration 625 f Type the shared secret in the Shared secret and Confirm shared secret fields The shared secret must be the same as the one specified on your SRC 5 Click...

Page 638: ...s IP address or host name of the SRC Connection request forwarding method Authentication method s Standard RADIUS attributes Presumptions in the illustration IP address of your SRC 192 168 56 29 Local...

Page 639: ...Configuration Illustration 627 2 Right click Connection Request Policies and select New The New Connection Request Policy dialog appears 3 Type a descriptive name for identifying this policy in the P...

Page 640: ...Appendix H RADIUS Configuration Illustration 628 You can leave the Type of network access server field to the default Unspecified...

Page 641: ...Appendix H RADIUS Configuration Illustration 629 4 Click Next to show the Specify Conditions screen Click Add 5 The Select condition dialog appears Click Add...

Page 642: ...NAS IPv4 Address dialog appears Type the SRC IP address 192 168 56 29 and click OK 7 Click Next in the New Connection Request Policy dialog 8 Select Authenticate requests on this server because a loc...

Page 643: ...Connection Request Forwarding options must match your environment 9 When the system prompts you to select the authentication method select the following two options Override network policy authentica...

Page 644: ...he Vendor Specific Attribute Information dialog appears 13 Click Enter Vendor Code and type 13742 14 Select Yes it conforms to indicate that the custom attribute conforms to the RADIUS Request For Com...

Page 645: ...re two major configuration steps a Use a dictionary to define the Raritan vendor specific attribute b Add all user data including user names passwords and roles Presumptions in the illustration Rarita...

Page 646: ...Related Configuration When RADIUS authentication is intended make sure you also configure the following settings related to Microsoft Active Directory AD Register the NPS server in AD Configure remote...

Page 647: ...Configuration Illustration 635 2 Right click NPS Local and select Register server in Active Directory 3 Click OK and then OK again To grant SRC users remote access permission 1 Open Active Directory U...

Page 648: ...he user whom you want to grant the access permission 3 Click the Dial in tab and select the Allow access checkbox To enable reversible encryption for CHAP authentication 1 Open Active Directory Users...

Page 649: ...Appendix H RADIUS Configuration Illustration 637 3 Click the Account tab and select the Store password using reversible encryption checkbox...

Page 650: ...guration via CLI 657 Device Specific Settings 665 TLS Certificate Chain 665 Browsing through the Online Help 672 RJ45 to DB9 Cable Requirements for Modem Connections An RJ45 to DB9 adapter cable is re...

Page 651: ...c IP addresses the client identifier of each network interface is different The main difference is the absence presence of a suffix which is the interface name added to the end of the serial number Th...

Page 652: ...ersion ETH1 PEG1A00003 50 45 47 31 41 30 30 30 30 33 ETH2 PEG1A00003 ETH2 50 45 47 31 41 30 30 30 30 33 2D 45 54 48 32 The suffix comprising the dash symbol and the word ETH2 is also converted WIRELES...

Page 653: ...t identifier see Reserving IP Addresses in DHCP Servers on page 638 In the following illustrations it is assumed that the SRC serial number is PEG1A00003 and the IP address you want to reserve is 192...

Page 654: ...47 31 41 30 30 30 30 33 3 Now enter the converted client identifier with the following syntax host mypx option dhcp client identifier 00 50 45 47 31 41 30 30 30 30 33 fixed address 192 168 20 1 Illust...

Page 655: ...sensor Thresholds and Sensor States A numeric sensor has four thresholds Lower Critical Lower Warning Upper Warning and Upper Critical The threshold settings determine how many sensor states are avai...

Page 656: ...ix I Additional SRC Information 644 above upper critical Upper Critical above upper warning Upper Warning normal Lower Warning below lower warning Lower Critical below lower critical Available sensor...

Page 657: ...r has both the Upper Critical and Upper Warning thresholds enabled it has three sensor states normal above upper warning and above upper critical States of above upper warning and below lower warning...

Page 658: ...sserts a state for it whenever a bad state change occurs To assert a state To assert a state is to announce a new worse state Below are bad state changes that cause the SRC to assert 1 above upper war...

Page 659: ...d notifications for assertion events setting the Assertion Timeout is helpful for eliminating a number of notifications that you may receive in case the sensor s readings fluctuate around a certain th...

Page 660: ...the readings improve To de assert a state To de assert a state is to announce the end of the previously asserted worse state Below are good state changes that cause the SRC to de assert the previous s...

Page 661: ...Appendix I Additional SRC Information 649...

Page 662: ...on Hysteresis 2 then the deassertion level of each threshold is either 2 or 2 as illustrated below Threshold value Deassertion value Upper Critical 33 Deassertion level 31 33 2 31 Upper Warning 25 Dea...

Page 663: ...the temperature drops to 17 degrees Celsius or lower the SRC performs the deassertion action to announce the end of the above upper warning state Altitude Correction Factors If a Raritan differential...

Page 664: ...on this website include intelligent PDU KVM EMX BCM and CommandCenter Secure Gateway CC SG To get access to these training materials or courses you need to apply for a username and password through t...

Page 665: ...n the master device Network connection Power supply Anything below is disabled on the master device The Ethernet or wireless interface IPv4 or IPv6 settings In the Port Forwarding mode related setting...

Page 666: ...g mode IPv4 or IPv6 settings are disabled on the slave device in question In the Port Forwarding mode one of the following issues occurs The master device s role is incorrectly set to Slave The master...

Page 667: ...3 Whether a newer product model if involved in the chain runs the appropriate minimum firmware version or later Slave Device Events in the Log The log messages for connection disconnection of a cascad...

Page 668: ...ce of a slave device on its USB A port Slave disconnected This log entry is generated when it detects the disconnection of a slave device from its USB A port The Ping Tool The SRC provides a ping tool...

Page 669: ...cable 2 Run dominion serial setup n exe on the computer and follow online instructions to install the driver Note If any Windows security warning appears accept it to continue the installation 3 Conn...

Page 670: ...k you must provide it with an IP address and some additional networking information This section describes the initial network configuration via a serial RS 232 or USB connection To configure the netw...

Page 671: ...anges To abort type cancel Commands for wired networking The ipvX variable in the following commands is either ipv4 or ipv6 depending on the type of IP protocol you are configuring Replace the variabl...

Page 672: ...xample 192 168 7 9 24 Static IPv4 or IPv6 gateway network ipvX gateway ip address ip address gateway s IP address IPv4 or IPv6 primary DNS server network dns firstServer ip address ip address DNS serv...

Page 673: ...ame for EAP authentication EAP TLS client certificate network ethernet ETH eapClientCertificate When prompted to enter the client certificate open the certificate with a text editor copy and paste the...

Page 674: ...e CA certificate The content to be copied from the CA certificate does NOT include the first line containing BEGIN CERTIFICATE and the final line containing END CERTIFICATE If a certificate is install...

Page 675: ...11n protocol network wireless enableHT option option true or false Wireless authentication method network wireless authMethod method method psk or eap PSK network wireless PSK psk psk PSK string Wire...

Page 676: ...pen the key with a text editor copy and paste the content into the communications program Wireless EAP password network wireless eapPassword When prompted to enter the password for EAP authentication...

Page 677: ...imeRangeCerts option2 option2 true or false Make the connection successful by ignoring the incorrect system time network wireless allowConnectionWithIncorrectClo ck option3 option3 true or false Wirel...

Page 678: ...erver monitoring entries Asset strip names and rack unit names TLS Certificate Chain A TLS server sends out a certificate to any client attempting to connect to it The receiver determines whether a TL...

Page 679: ...ver How a certificate chain is generated To explain how a TLS server s certificate is related to the certificate chain that is uploaded to the receiver we assume that there are three related certifica...

Page 680: ...ates Certificate chain that you must upload to the receiver such as SRC Because the TLS server provides only Certificate C you need to upload a file containing the missing certificates of the chain th...

Page 681: ...SRC Therefore at least the root certificate must be authentic issued by a CA you trust and downloaded from that CA over a secure channel Never implicitly trust a root certificate that is sent by the s...

Page 682: ...f you will apply your company s SMTP service to SRC ignore this GMAIL illustration topic Simply contact your IT department to retrieve the appropriate certificate chain file and upload it to the SRC T...

Page 683: ...QELBQAwSTELMAkGA1UE YHKKJH96sSNC 6dLpOOoRritL5z jn2WFLcQkL2mRoWQi6pYTzPyXB4D END CERTIFICATE 1 s C US O Google Inc CN Google Internet Authority G2 i C US O GeoTrust Inc CN GeoTrust Global CA BEGIN CER...

Page 684: ...the root certificate self signed by Equifax Secure Certificate Authority to SRC If not you need to find all missing issuer certificates including the root certificate and upload them to SRC Step 2 Fin...

Page 685: ...he root CA s website rather than from the server you want to connect Browsing through the Online Help The SRC Online Help is accessible over the Internet To use online help Active Content must be enab...

Page 686: ...essary select the Match partial words checkbox to include information matching part of the words entered in the Search text box The search results are displayed in the left pane 7 To have the left pan...

Page 687: ...tches PX2 PDUs PX3 PDUs PX3TS transfer switches Branch Circuit Monitor BCM series PMC models of BCM2 series Warning Other BCM2 models than PMC models do NOT support asset management strips For informa...

Page 688: ...cTrack polls Power IQ the connection disconnection events are pulled into dcTrack and displayed in the dcTrack Web Client To poll and display asset management events in dcTrack The SRC that the asset...

Page 689: ...07 Assertion Timeout Example for Temperature Sensors 647 Asset Management Commands 510 Asset Management Strips and dcTrack 676 Asset Management Strips and Raritan PDUs 675 Asset Management Tag List 29...

Page 690: ...332 335 540 552 555 Configuring Data Push Settings 168 259 295 Configuring DNS Parameters 417 Configuring Environmental Sensors Default Thresholds 500 Configuring IPv4 Parameters 407 Configuring IPv6...

Page 691: ...79 109 110 Data Encryption in config txt 547 549 552 Data Push Format 295 297 Date and Time Settings 386 Deassertion Hysteresis Example for Temperature Sensors 650 Default Log Messages 231 238 244 25...

Page 692: ...ing the Restricted Service Agreement 96 168 208 231 Entering Configuration Mode 379 404 423 425 467 474 475 Entering Diagnostic Mode 379 522 656 Environmental Sensor Configuration Commands 495 Environ...

Page 693: ...81 122 168 307 Full Disaster Recovery 330 fwupdate cfg 540 542 543 547 550 553 556 G Gathering LDAP Radius Information 221 222 H Hardware Issue Detection 109 318 340 400 How Long a Link Remains Acces...

Page 694: ...an Existing LDAP Server 489 Modifying an Existing Radius Server 493 Modifying Firewall Control Parameters 445 Modifying or Deleting a Script 310 315 Modifying or Removing Bulk Profiles 335 Modifying...

Page 695: ...tings to Factory Defaults 318 341 584 Resetting the SRC 521 Resetting to Factory Defaults 94 342 521 584 Restarting the Device 521 Restricted Service Agreement 451 Restrictions of Port Forwarding Conn...

Page 696: ...IPv4 Address 410 Setting the IPv4 Configuration Mode 408 Setting the IPv4 Gateway 410 Setting the IPv4 Preferred Host Name 409 Setting the IPv6 Address 414 Setting the IPv6 Configuration Mode 412 Set...

Page 697: ...b Browsers 95 Supported Wireless LAN Configuration 13 653 Switch LHX SHX 255 272 Switch Peripheral Actuator 255 272 Switching Off an Actuator 520 Switching On an Actuator 519 Syslog Message 255 273 Sy...

Page 698: ...ocal Event Log 201 221 273 318 326 W Ways to Probe Existing User Profiles 652 Web Interface Overview 100 673 Webcam Management 105 326 343 What is a Certificate Chain 666 667 673 Windows NTP Server Sy...

Reviews: