2
C
OMMAND
C
ENTER
U
SER
G
UIDE
•
Uncompromising Security: secure 128-bit encryption (both intranet and Internet); flexibility of access
via SSL, access restriction (by time of day, and/or maximum session duration) as part of user profile in
user management:
−
Has the ability to restrict login access to products based on time of day, the ability to restrict
duration of on-line sessions, handle password expiration, and prompt for password changes. All
user operations, including access to port history buffer and access to logs, will be granted or
denied based on user authorization level.
−
IP ACL (IP-Filtering) – grants/restricts access by domain name or IP addresses.
−
Grants or restricts access on an individual user basis.
−
Supports primary and secondary servers.
−
Fallback authentication through local database
•
Single IP address access: reduces the complexities of managing multiple IP addresses with associated
user names and passwords.
•
Broadest support for third party authentication: leverages existing investment in authentication
protocols and allows centralized authentication and authorization. Streamlines deployment of large
multi-unit systems and centralizes administration and control. Supports LDAP (including AD, iPlanet,
eDirectory), RADIUS, and .
•
Support for Active Directory authorization and the importing of user groups.
•
Comprehensive administration tools: reduces TCO for managing IT infrastructure; found time can be
used for proactive maintenance:
−
Provides powerful multi-tired user and permissions grouping (user/leaf nodes, targets by topology
and by function); CommandCenter’s powerful, user-customizable categorization allows you to
easily tailor your solution and security, for example, create a “Location” attribute and assign all
users in a given LDAP or Active Directory group access to servers in that Location). The
possibilities are limitless!
−
Provides powerful user-customizable views of all devices connected to CommandCenter; supports
automatic and manual device discovery.
−
Simplifies administration – device upgrade, reset, diagnosis, ping, auto discover, edit, delete –
firmware upgrades, monitoring and access for back up, retrieval and push-down of configuration
to leaf nodes (Dominion Series); simplifies daily maintenance and firmware management.
•
Flexible reporting: provides adjustable ways to view active devices, users, ports, and asset inventory;
reports include Audit Trail, Error Log, Firmware Report, Ping Report, View By Groups, and Users in
Groups.
•
Comprehensive logging:
−
Logs events locally.
−
Can use an external syslog server for event logs (events are immediately posted or exported) and
the ability to have other Raritan products use it as a syslog server.
−
Provides full auditing and tracking capabilities.
−
Keeps an audit trail for tracking user activity.
•
Support for SNMP traps.
−
Provides System level trap notification of CommandCenter’s operational events.
−
Provides Application level trap notification regarding the monitoring of managed devices,
availability events, and the audit events of user access and authorization to CommandCenter.
•
Infrastructure support for customizable applets via GUI:
−
Customizable applets control ranges of devices including power strips, HPs iLO / RILO cards, etc.
−
Target systems accessed through applets – remote access to servers and other data center
equipment managed by Raritan management appliances through downloadable applets/COM
controls.
−
Power strip outlet user authorization setting, mapping, parameter-passing, target server-mapping.
•
Operational Flexibility/Ease of Use/Administrator presentation: enhanced system setup entirely
through graphical user interface (state-of-the-art UI standards with professional look and feel).
•
Designed for high availability:
−
ATA Raid-1 card and two ATA hard drivers to provision for fault-tolerance at the hardware and
OS level.
−
Two network interfaces for failover or to be configured for public and private IP addresses on
separate NICs.
−
Redundant power supplies and ECC memory.
Summary of Contents for COMMANDCENTER 2.20 -
Page 2: ......
Page 4: ...This page intentionally left blank...
Page 12: ......
Page 16: ...4 COMMANDCENTER USER GUIDE...
Page 22: ...10 COMMANDCENTER USER GUIDE...
Page 138: ...126 COMMANDCENTER USER GUIDE...
Page 140: ...128 COMMANDCENTER USER GUIDE...
Page 144: ...132 COMMANDCENTER USER GUIDE...