2 C
OMMAND
C
ENTER
S
ECURE
G
ATEWAY
A
DMINISTRATOR
G
UIDE
are managed by CC-SG. These devices control the target servers and systems that are
connected to them.
•
Director Client
—A Java-based client for CC-SG useable by both normal access users and
administrators. It is the only client that permits administration.
•
Elements
—are the values of a category. For example, the “New York City” element belongs
to the “Location” category. Or, the “Windows” element belongs to the “OS Type” category.
•
Ghosted Ports
—a ghosted port can occur when managing Paragon devices and when a CIM
or target server is removed from the system or powered off (manually or accidentally). Refer
to Raritan’s
Paragon II User Manual
for additional information.
•
Hostname
—A hostname can be used if DNS server support is enabled. Please refer to
Network Configuration in
Chapter 12: Advanced Administration
for additional
information. The hostname and its Fully-Qualified Domain Name (FQDN = Ho
Suffix) cannot exceed 257 characters. It can consist of any number of components, as long as
they are separated by “.”. Each component has a maximum size of 63 characters and the first
character must be alphabetic. The remaining characters can be alphabetic, numeric, or “-
“ (hyphen or minus). The last character of a component may not be “-”. While the system
preserves the case of the characters entered into the system, the FQDN is case-insensitive
when used.
•
iLO/RILOE
—Hewlett Packard’s Integrated Lights Out/Remote Insight Lights Out servers
that can be managed by CC-SG. Targets of an iLO/RILOE device are powered on/off and
recycled directly. iLO/RILOE devices cannot be discovered by CC-SG; they have to be
manually added as nodes.
•
In-band Access
—going through the TCP/IP network to correct or troubleshoot a target in
your network. KVM and Serial devices can be accessed via these in-band applications:
RemoteDesktop Viewer
,
SSH Client
,
RSA Client
,
VNC Viewer
.
•
IPMI Servers
(Intelligent Platform Management Interface)—servers that can be controlled
by CC-SG. IPMI are discovered automatically but can be added manually as well.
•
Out-of-Band Access
—using applications such as Raritan Remote Console (RRC), Raritan
Console (RC), or Multi-Platform Client (MPC) to correct or troubleshoot a KVM or serial
managed node in your network
.
•
Policies
—define the permissions, type of access, and to which nodes and devices a user
group can access. Policies are applied to a user group and have several control parameters to
determine the level of control, such as date and time of access.
•
Nodes
—are the target systems, such as servers, desktop PCs, or other networked equipment,
that CC-SG users can access.
•
Interfaces
—Interfaces are ways a Node can be accessed, whether through an out-of-band
solution such as a Dominion KX101 connection, or through an in-band solution such as a
VNC server.
•
Node Groups
—a defined group of nodes that are accessible to a user. Node groups are used
when creating a policy to control access to the nodes in the group.
•
Ports
—are connection points between a Raritan Device and a Node. Ports only exist on
Raritan devices and identify a pathway from that device to a node.
•
SASL
—(Simple Authentication and Security Layer). A method for adding authentication
support to connection-based protocols.
•
SSH
—Clients, such as Putty or OpenSSH, that provide a command line interface to CC-SG.
Only a subset of CC-SG commands is provided via SSH to administer devices and CC-SG
itself. Please refer to
Chapter 12: Advanced Administration
for additional information.
•
User Groups
—sets of users that share the same level of access and privileges. For example,
the default user group
System Administrators
has full access to all configuration tasks and
target nodes.
Содержание CC-SG
Страница 2: ...This page intentionally left blank...
Страница 26: ...12 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Страница 46: ...32 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Страница 158: ...144 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Страница 228: ...214 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Страница 236: ......
Страница 246: ...232 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...
Страница 248: ...234 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...
Страница 250: ...236 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...
Страница 256: ...242 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...