Home
        4000 Series CM-o-IP Gateway
         Contents
1.        Local Address    SEES Remote Addresses       Administration     SSL Certificates       MTU       Maximum transmission unit of the PPTP interface  Defaults to 1400    Select the Enable check box to enable the PPTP Server    Select the Minimum Authentication Required  Access is denied to remote users attempting to  connect using an authentication scheme weaker than the selected scheme  The schemes are  described below  from strongest to weakest     e Encrypted Authentication  MS CHAP v2   The strongest type of authentication to use  this  is the recommended option   e Weakly Encrypted Authentication  CHAP   This is the weakest type of encrypted password  authentication to use  It is not recommended that clients connect using this as it provides very  little password protection  Also note that clients connecting using CHAP are unable to encrypt  traffic   e Unencrypted Authentication  PAP   This is plain text password authentication  When using  this type of authentication  the client password is transmitted unencrypted    e None    Select the Required Encryption Level  Access is denied to remote users attempting to connect  not using this encryption level  Strong 40 bit or 128 bit encryption is recommended  In Local Address enter IP address to assign to the server s end of the VPN connection    In Remote Addresses enter the pool of IP addresses to assign to the incoming client s VPN  connections  e g  192 168 1 10 20   This must be a free IP address  or a range of free I
2.       To set up new Groups and new users  and to classify users as members of particular Groups      gt  Select Serial  amp  Network  Users  amp  Groups to display the configured Groups and Users      gt  Click Add Group to add a new Group      gt  Adda Group name and Description for each new Group  then nominate the Accessible Hosts   Accessible Ports  and Accessible RPC Outlets s  that you want any users in this new Group to be  able to access      gt  Click Apply       System Name  les1308a Modet  LE A Firmware  3 5 3u5  X Uptime  0 days  8 hours  53 mins  cs Current User  root    NETWORK SERVICES       Serial  amp  Network    Add a New user     Serial Port  oui Username C  A unique name for the user   Description E  A brief description of the user s role  Groups I admin  Provic ers with unlimited configuration and management privileges   I pptpa       have their          Environmental Di dia     Managed Devices their pa  D tp    Alerts  amp  Logging    E pmshell    A group with predefined privileges the user will belong to     Password    The users authenticatio Note  A password may not be required if remote    authentication is beir        gt  Click Add User to add a new user      gt  Add a Username and a confirmed Password for each new user  You may also include  information related to the user  for example  contact details  in the Description field     724 746 5500   blackbox com Page 58       Note The User Name can contain from 1 to 127 alphanumeric characters  you ca
3.       config  s config alerts alert2 sensor temp     config  s config alerts alert2 signal DSR     config  s config alerts alert2 type ups     config  s config alerts alert2 ups1 myUPS localhost     config  s config alerts alert2 ups2 thatUPS 192 168 0 50    Environmental and Power Sensor Alert      config  s config alerts alert2 enviro high critical  critical value        config  s config alerts alert2 enviro high warning  warning value      config  s config alerts alert2 enviro hysteresis  value      config  s config alerts alert2 enviro low critical  critical value        config  s config alerts alert2 enviro low warning  warning value      config  s config alerts alert2 enviro1  Enviro sensor name        config  s config alerts alert2 outlet   RPCname  outlet      alert2 outlet   increments sequentially with each added outlet  The second    outlet   refers to the  specific RPC power outlets      config  s config alerts alert2 rpc   RPC name      config  s config alerts alert2 sensor   temp   humid   load   charge     config  s config alerts alert2 signal DSR     config  s config alerts alert2 type enviro     config  s config alerts alert2  ups1  UPSname hostname     Example1  To configure a temperature sensor alert for a sensor called  SensorInRoom42        config  s config alerts alert2 sensor temp     config  s config alerts alert2 enviro high critical 60     config  s config alerts alert2 enviro high warning 50    config  s config alerts alert2 enviro hysteresis 2     
4.      Black Box command similar to the standard tip or cu but all serial port access is  directed via the portmanager    Black Box command to query portmanager for active user sessions  Black Box command that handles all serial port access  DARPA port to RPC program number mapper  Point to Point protocol daemon   Report a snapshot of the current processes   Print name of current working directory   Soft reboot   Remove files or directories   Remove empty directories   Show or manipulate the IP routing table   Show or manipulate the IP routing table   IP Route tool to flush IPv4 routes   IP Route tool to list routes   Applet printing  proc net rt_acct   RTnetlink listener   Secure copy  remote file copy program    Text stream editor   Sets the MAC address   Sets and reports serial port configuration   Shell   Shows MAC address   Delay for a specified amount of time   Helper utility for mounting SMB file systems   Mount an SMBFS file system   SMBFS umount for normal users   SNMP daemon   Sends an SNMP notification to a manager   RFC 2217 compliant serial port redirector   OpenSSH SSH client  remote login program   Authentication key generation  management  and conversion  OpenSSH SSH daemon   Program that allows plain services to be accessed via SSL  Change and print terminal line settings   Universal SSL tunnel    724 746 5500   blackbox com Page 273                sync   Flush file system buffers   sysctl Configure kernel parameters at runtime   syslogd System logging utility 
5.      Dial in  internal or external V90 modem       OoB Failover  second Ethernet connections       VPN  IPSec or Open VPN connection over any network interface    gt  Check uncheck for each network which service access is to be enabled  disabled    In the example shown below local administrators on local Network Interface LAN have HTTP and Telnet  and HTTPS and SSH access to the console server  and attached serial consoles   However while remote  administrators using Dial In only can access using the console server using HTTPS and SSH  they can  Telnet access attached serial consoles     724 746 5500   blackbox com Page 33    System Name  les1308a Model LES1308A Firmware  3 5 3u5 a  0     aw i Uptime  0 days  7 hours  25 mins  20 secs Current User  root  Q  BaduP Log Out    NETWORK SERVICES          Service Settings Service Access   Services Service Network Management Dialout Cellular Dial in VPN  Enabled Interface LAN   HTTP Web Enabled Vv  m o 5 0  Management  HTTPS Web Enabled Vv Vv Vv Vv Vv  Management  Telnet Enabled Vv Oo O mj mj  command shell  SSH command Enabled Vv Vv Vv Vv Vv  shell  Telnet direct to NIA Vv Vv  m Vv K  serial ports  SSH direct to NJA Vv Vv Vv Vv Vv    serial ports    The Services Access settings specify which services the Administrator can use over which network  interface to access the console server  It also nominates the enabled services that the Administrator and  the User can use to connect through the console server to attached serial and netw
6.      IP      Date  amp  Time      Dial      Firewall      Nagios      Configure Dashboard    Service Access Port Forwarding Firewall Rules Forwarding  amp  Masquerading    Create Modify Port Forward    Name New Port Forward Rule    Name for the rule  Interface Any E  The interface thatthe rule applies to  Source Address Address   Range       Input Port Range 0    Protocol       Output Address    Output Port Range 0    ange of ports  se the format start finish       For example  to forward port 8443 to an internal HTTPS server on 192 168 10 2  the following settings    would be used     Input Interface  Any    Input Port Range  8443    Protocol  TCP    Output Address  192 168 10 2    Output Port Range  443    5 8 4 Firewall rules    Firewall rules can be used to block or allow traffic through an interface based on port number  the  source and or destination IP address  range   the direction  ingress or egress  and the protocol  This can  be used to allow custom on box services  or block traffic based on policy     To setup a firewall rule      gt  Navigate to the System  Firewall page  and click on the Firewall Rules tab    724 746 5500   blackbox com Page 99     lt SBLAC    System Name  le  M Firmware  3 4 2 N  Uptime  2 days  14 nins  3 Current User  root   a     Backup Log Out    NETWORK SERVICES          Serial  amp  Network  Service Access Port Forwarding Firewall Rules Forwarding  amp  Masquerading     Serial Port     Users  amp  Groups     Authentication Create Modify F
7.      Serial  amp  Network     Authentication Configuration Authentication Testing     Serial Port   L Gro       Authentication Configuration    Authentication   Local  Method       Alerts  amp  Logging     Port Log       Auto Response       SMTP  amp  SMS     SNMP      90000000000  r rz       Fd  oi  Fr    se for Web Console  Telnet  SSH  and FTP    Use Remote Groups       ga    Any authentication method that is configured will be used for authentication of any user who attempts  to log in through Telnet  SSH  or the Web Manager to the console server and any connected serial port  or network host devices     724 746 5500   blackbox com Page 166    You can configure the console server to the default  Local  or using an alternate authentication method   TACACS  RADIUS  or LDAP   Optionally  you can select the order in which local and remote    authentication is used     Local TACACS  RADIUS LDAP  Tries local authentication first  falling back to remote if local fails     TACACS  RADIUS LDAP Local  Tries remote authentication first  falling back to local if remote    fails     TACACS  RADIUS LDAP Down Local  Tries remote authentication first  falling back to local if the  remote authentication returns an error condition  for example  if the remote authentication    server is down or inaccessible      9 1 1 Local authentication     gt  Select Serial and Network  Authentication and check Local      gt  Click Apply     9 1 2 TACACS authentication    Perform the following procedure 
8.      Specify the Probe Addresses of two sites  the Primary and Secondary  that the Advanced Console    Server is to ping to determine if Network 1  ethO  is still operating     724 746 5500   blackbox com    Page 86     gt  On the Management LAN Interface   Network 2  configure the IP Address Subnet Mask Gateway  the same as Network Interface   Network 1     In this mode  Network 2  eth1  is available as the transparent back up port to Network 1  ethO  for  accessing the management network  Network 2 will automatically and transparently take over the work  of Network 1  if Network 1 becomes unavailable for any reason  When Network 1 becomes available  again  it takes over the work again     5 4 Dial Out Failover  The internal or externally attached modem on the console server can be set up either    in Failover mode where a dial out connection is only established in event of a ping failure  or    with the dial out connection is always on  In both of the above cases in the event of a disruption in the dial out connection  the console server will  endeavor to re establish the connection   5 4 1 Always on dial out  The console server modem can be configured for out dial to be always on  with a permanent external    dial up ppp connection      gt  Select the System  Dial menu option and check Enable Dial Out to allow outgoing modem  communications     gt  Select the Baud Rate and Flow Control that will communicate with the modem     gt  In the Dial Out Settings   Always On Out of
9.      a To initiate a pre configured dial up connection under Windows  use the following Start  Command     cmd  c start  Starting Out of Band Connection   wait  min rasdial network_connection login  password    724 746 5500   blackbox com Page 116    where network_connection is the name of the network connection as displayed in Control  Panel   gt  Network Connections  login is the dial in username  and password is the dial in  password for the connection       To initiate a pre configured dial up connection under Linux  use the following Start  Command     pon network_connection  where network_connection is the name of the connection      gt  Enter the command or path to a script to stop the OoB connection in Stop Command       To stop a pre configured dial up connection under Windows  use the following Stop  Command     cmd  c start  Stopping Out of Band Connection   wait  min rasdial network_connection   disconnect    where network connection is the name of the network connection as displayed in Control  Panel   gt  Network Connections       To stop a pre configured dial up connection under Linux  use the following Stop Command     poff network_connection    To make the OoB connection using SDT Connector      gt  Select the console server and click Out Of Band  The status bar will change color to indicate that  this console server is now accessed using the OoB link rather than the primary link                 sDTConnector  File Edit Help    22738            208 64 91 182 S
10.      ss Certificates command shell Completely enable or disable the SSH service     Configuration Backup      Firmware SSH Port a      P      Date  amp  Time Port to listen for the SSH command shell     gt  To enable a service check Enable  For some servces you will be asked to specify the TCP IP port  to be used for thie service      gt  There are also some serial port access parameters that you can configure on this menu     Base The console server uses specific default ranges for the TCP IP ports for the various  access services that Users and Administrators can use to access devices attached to  serial ports  as covered in Chapter 4   Configuring Serial Ports   The Administrator  can also set alternate ranges for these services  and these secondary ports will then  be used in addition to the defaults     The default TCP IP base port address for telnet access is 2000  and the range for  telnet is IP Address  Port  2000   serial port    i e  2001     2048  If the Administrator  sets 8000 as a secondary base for telnet  then serial port  2 on the console server can  be accessed via telnet at IP Address 2002 and at IP Address 8002     The default base for SSH is 3000  for Raw TCP is 4000  and for RFC2217 it is 5000     RAW Direct You can also specify that serial port devices can be accessed from nominated  network interfaces using Raw TCP  direct Telnet SSH  unauthenticated Telnet  services etc    3 5 Communications Software    You have configured access protocols for the Adm
11.     Antenna with 10 foot extension cable    Se Se Dual IEC AC power cords    bos Printed Quick Start Guide and User   s Manual on CD ROM    2 1 3 Kit components LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 Advanced Console  Servers       Ee LES1208A R2  LES1216A R2  LES1232A or LES1248A R2  Advanced Console Server  KO KO  2  UTP CATS blue cables     E DB9F RJ45S straight and DB9F RJ45S cross over connectors  Se Se Dual IEC AC power cords  bo   Printed Quick Start Guide and User   s Manual on CD ROM    724 746 5500   blackbox com Page 20    2 1 4 Kit components LES1116A  LES1132A and LES1148A Console Servers    o SS LES1116A  LES1132A or LES1148A Console Server      KO  2  UTP CATS blue cables       a    amp  DB9F RJ45S straight and DB9F RJAS5S cross over connectors  Se IEC AC power cord  bo   Printed Quick Start Guide and User   s Manual on CD ROM    2 1 5 Kit components LES1108A Console Server    LES1108A Console Server    CO KO  2  UTP CAT5 blue cables  a  amp     DB9F RJ45S straight and DB9F RJ45S cross over connectors      Se 5 VDC  2 0A  Power Supply with IEC Socket and AC power cable    bos Printed Quick Start Guide and this User   s Manual on CD ROM       2 2 Power connection    2 2 1 LES1508A power  The LES1508A includes an external DC power supply unit  This unit accepts an AC input voltage between    100 and 250 VAC with a frequency of 50Hz or 60Hz  The DC power supply comes with a selection of wall  socket adapters for each geographic region  North American  
12.     Domain              Client Hostname              Protocol File     O e  9  Heip x Cancel 4P connect                   Note The rdesktop client is supplied with Red Hat 9 0     rpm  ivh rdesktop 1 2 0 1 i386 rpom    For Red Hat 8 0 or other distributions of Linux  download source  untar  configure  make  make   then install     rdesktop currently runs on most UNIX based platforms with the X Window System and can be  downloaded from hittp   www rdesktop org        C  Ona Macintosh client      gt  Download Microsoft s free Remote Desktop Connection client for Mac OS X  http   www  microsoft com mac otherproducts otherproducts aspx pid remotedesktopclient    724 746 5500   blackbox com Page 123    6 9 SDT SSH Tunnel for VNC    With SDT and Virtual Network Computing  VNC   Users and Administrators can securely access and  control Windows 98 NT 2000 XP 2003  Linux  Macintosh  Solaris  and UNIX computers  There   s a range  of popular free and commercial VNC software available  UltraVNC  RealVNC  TightVNC   To set up a  secure VNC connection  install and configure the VNC Server software on the computer the user will  access  then install and configure the VNC Viewer software on the Viewer PC     6 9 1 Install and configure the VNC Server on the computer to be accessed    Virtual Network Computing  VNC  software enables users to remotely access computers running Linux   Macintosh  Solaris  UNIX  all versions of Windows  and most other operating systems     A  For Microsoft Windo
13.     config  s config system smtp encryption2 SSL  can also be TLS or None      config  s config system smtp sender2 John  Black Box com     config  s config system smtp username2 john     config  s config system smtp password2 secret     config  s config system smtp subject2 SMTP alerts    The following command will synchronize the live system with the new configuration       config  a    14 16 SNMP    To set up the SNMP agent on the device       config  s config system snmp protocol   UDP   TCP       config  s config system snmp trapport  port number   default is 162      config  s config system snmp address  NMS IP network address      config  s config system snmp commnity  community name     v1 and v2c only     config  s config system snmp engineid  ID   v3 only      config  s config system snmp username  username     v3 only      config  s config system snmp password  password   v3 only      config  s config system snmp version   1   2c   3     The following command will synchronize the live system with the new configuration       config  a    14 17 Administration    To change the administration settings to     System Name og mydomain com  System Password  root account  secret  Description Device in office 2      config  s config system name og mydomain com    config  P config system password  will prompt user for a password     config  s  config system location Device in office 2     NOTE  The  P parameter will prompt the user for a password  and encrypt it  You can encr
14.    Note How secure is VNC  VNC access generally allows access to your whole computer  so security is    very important  VNC uses a random challenge response system to provide the basic  authentication that allows you to connect to a VNC server  This is reasonably secure and the  password is not sent over the network     Once connected  all subsequent VNC traffic is unencrypted  A malicious user could snoop your  VNC session  There are also VNC scanning programs available  which will scan a subnet looking  for PCs that are listening on one of the ports that VNC uses     Tunneling VNC over a SSH connection ensures all traffic is strongly encrypted  No VNC port is  ever open to the internet  so anyone scanning for open VNC ports will not be able to find your  computers  When tunneling VNC over a SSH connection  the only port that you   re opening on  your console server is the SDT port 22     Sometimes it may be prudent to tunnel VNC through SSH even when the Viewer PC and the  console server are both on the same local network        724 746 5500   blackbox com Page 134    Chapter 7 Alerts  Auto response       and Logging    Introduction    This chapter describes the automated response  alert generation and logging features of the console  server    The new Auto Response facility  in firmware V3 5 1 and later  extends on the basic Alert facility available  in earlier firmware revisions  With the new facility the console server monitors selected serial ports  logins     the power
15.    Or  enter a Descriptive Name for the host to display instead of the IP or DNS address  and any  Notes or a Description of this host  such as its operating system release  or anything special  about its configuration      Click OK     724 746 5500   blackbox com Page 108    6 2 6 Manually adding new services to the new hosts   To extend the range of services that you can use when accessing hosts with SDT Connector    gt  Select Edit  Preferences and click the Services tab  Click Add    gt  Enter a Service Name and click Add      gt  Under the General tab  enter the TCP Port that this service runs on  for example  80 for HTTP    Or  select the client to use to access the local endpoint of the redirection              ce  SDTConnector          j    SDTConnector Preferences          vices   Private Keys   System Defaults            HTTP browser   HTTPS browser   Telnet client  SOL      Telnet client   HTTP browser  RSA II   IBM Director console  SSH client  HyperTerminal   VNC viewer    VMWare Server console                                         gt  Select which Client application is associated with the new service  A range of client application  options are pre configured in the default SDT Connector  RDP client  VNC client  HTTP browser   HTTPS browser  Telnet client  etc    If you want to add new client applications to this range   proceed to the next section  Adding a new client   then return here     Cc SDTConnector       K   SDTConnector Preferences       Client name  
16.    bin sh  ssh  L9001 127 0 0 1 4001  N  o StrictHostkKeyChecking no testuser  lt server ip gt   amp     This will run the tunnel redirecting local port 9001 to the server port 4001     15 6 6 Fingerprinting    Fingerprints are used to ensure you are establishing an SSH session to who you think you are  On the  first connection to a remote server you will receive a fingerprint that you can use on future connections     This fingerprint is related to the host key of the remote server  Fingerprints are stored in     ssh known_hosts     To receive the fingerprint from the remote server  log in to the client as the required user  usually root   and establish a connection to the remote host       ssh remhost  The authenticity of host  remhost  192 168 0 1   can t be established   RSA key fingerprint is 8d 11 e0 7e 8a 6f ad f1 94 0f 93 fc 7c e6 ef 56   Are you sure you want to continue connecting  yes no      At this stage  answer yes to accept the key  You should get the following message     Warning  Permanently added  remhost 192 168 0 1   RSA  to the list of  known hosts     You may be prompted for a password  but there is no need to log in    you have received the fingerprint  and can Ctrl C to cancel the connection  If the host key changes you will receive the following warning   and not be allowed to connect to the remote host     C CCCOC ECE OEE EOE OEE ECECECEOECEECEECOEEEEECEEE     WARNING  REMOTE HOST IDENTIFICATION HAS CHANGED       ITIS POSSIBLE THAT SOMEONE IS DOING S
17.    gt  Create an executable trigger check script file e g   etc config test sh      bin sh   logger  A test script    logger Argument1    1   logger Argument2    2   logger Argument3    3   logger Argument4    4   if    f  etc config customscript 0    then  rm  etc contig customscript 0  exit 7   fi   touch  etc config customscript 0   exit 1    Refer online FAQ for a sample web page html check and other script file templates     gt  Enter the Script Executable file name  e g   etc config test  sh      gt  Set the Check Frequency  i e  the time in seconds between re running the script  and the  Script Timeout  i e  the maximum run time for the script      gt  Specify the Successful Return Code  An Auto Response is triggered if the return code from  the script is not this value     gt  Enter Arguments that are to be passed to the script  e g  with a web page html check script   these Arguments might specify the web page address DNS and user logins      gt  Check Save Auto Response      SNMP       Custom Check    Check  Conditions    Script Executable    ne Script to execute when this action       Check Frequency    Script Timeout       Successful Return 0    Trigger if the return code is not this value       B Serial Pattern Argument 1  Argumentto pass to the script  Argument 2    Argumentto pass to the script             Argument 3       Argumentto pass to the script          Argument 4    7 2 7 SMS Command  An incoming SMS command from a nominated caller can trigger an Auto 
18.    s id value      P id    Description    The config tool is designed to perform multiple actions from one command if needed  so options can be  chained together     The config tool allows you to manipulate and query the system configuration from the command line   Using config  you can activate the new configuration by running the relevant configurator that performs  the action needed to make the configuration changes live     The custom user configuration is saved in the  etc config config xml file  This file is transparently  accessed and edited when configuring the device using the Management Console browser GUI  Only the  user    root    can configure from the shell     By default  the config elements are separated by a     character  The root of the config tree is called   lt config gt   To address a specific element place a     between each node branch e g  to access and display  the description of user1 type       config  g config users user1 description   The root node of the config tree is  lt config gt   To display the entire config tree  type     config  g config   To display the help text for the config command  type     config  h    The config application resides in the  bin directory  The environmental variable called PATH contains a  route to the  bin directory  This allows a user to simply type config at the command prompt instead of  the full path  bin config     Options   a    run all Run all registered configurators  This performs every configuration  sync
19.   Path to client executable file    Command line format for client executable        amp  OK     X Cancel                             gt  Click OK  then Close     A service typically consists of a single SSH port redirection and a local client to access it  It may consist of  several redirections  and some or all may have clients associated with them     724 746 5500   blackbox com Page 109    An example is the Dell RAC service  The first redirection is for the HTTPS connection to the RAC server     it has a client associated with it  web browser  that it launches immediately when you click the button  for this service     The second redirection is for the VNC service that you may choose to later launch from the RAC web  console  It automatically loads in a Java client served through the web browser  so it does not need to  have a local client associated with it               amp  SDTConnector             File Edit Help          ee          Service Name Dell RAC    Local   gt  Remote Port Redirections                                                     gt  On the Add Service screen  you can click Add as many times as needed to add multiple new port  redirections and associated clients   You may also specify Advanced port redirection options      gt  Enter the local address to bind to when creating the local endpoint of the redirection  It is not  usually necessary to change this from    localhost         gt  Enter a local TCP port to bind to when creating the local endpoint o
20.   Re enter the password  Subject Line  If this server requires a specific subject line  specify it here    Apply      However some SMS gateway service providers require blank subjects or require specific authentication  headers to be included in the subject line     gt     Click Apply Settings to activate SMS SMTP connection     SMS via Cellular Modem    To use an attached or internal cellular modem for SMS the Administrator must enable SMS      gt    gt     Select Cellular Modem In the SMS Settings field    Check Receive Messages to enable incoming SMS messages to be received  A custom script will  be called on receipt of incoming SMS messages    You may need to enter the phone number of the carrier   s SMS Message Centre  only if advised  by your carrier or Support     Click Apply Settings to activate SMS connection    724 746 5500   blackbox com Page 144       Nagios     Configure Dashboard SMS Settings  SMS Gateway     Status   Use an external SMS gateway    Cellular Modem ce  Use an attached or internal Cellular Modem       ius SMS via Cellular Modem  RPC Status     Environmental Status SMS Message     Power Su Centre     Dashboard    Manage   Apply Settings       Devices          Note The option to directly send SMS alerts via the cellular modem was included in the Management    GUI in V3 4  Advanced console servers already had the gateway software  SMS Server Tools 3   embedded however you this could only be accessed from the command line to send SMS  messages        7
21.   SMTP  amp  SMS  SNMP Apply      System  Administration  SSL Certificates  Configuration Backup  Firmware  IP       12 5 Dashboard    The Dashboard provides the Administrator with a summary of the status of the console server and its  Managed Devices  You can configure custom dashboards for each user group     System Name  ACSA  Uptime 0 da        NETWORK SERVICES       Serial R Network  nthe es Alerts Managed Devices  Port activity  Aerts  amp  Logging  8  UPS connections    System    12 5 1 Configuring the Dashboard    Only users who are members of the admin group  and the root user  can configure and access the  dashboard  To configure a custom dashboard     724 746 5500   blackbox com Page 205     gt  Select System  Configure Dashboard and select the user  or group  you are configuring this  custom dashboard layout for      gt  Click Next     System Nam  Uptime  0 d        NETWORK SERVICES       Serial  amp  Network    Serial Port Dashboard Configurations  TOGA Crane Select groupluser           __     Authentication s group  admin X  Network Hosts group  admin o configure the dashboard for  user  SR7  Trusted Networks  mi  Cascaded Ports Default dashboan    UPS Connections Spruny winan pun UIE icine Vyotyy veve i osivmiy vi   RPC Connections  Environmental Apply         Note  You can configure a custom dashboard for any admin user or for the admin group or you can  reconfigure the default dashboard     The Status Dashboard screen is the first screen displayed when admin 
22.   Supported types  are NONE  PASSWORD  MDS  or OEM    C Present output in CSV  comma separated variable  format  This is not available with all  commands    C  lt ciphersuite gt   The remote server authentication  integrity  and encryption algorithms to use for IPMIv2 lanplus  connections  See table 22 19 in the IPMIv2 specification  The default is 3 which specifies RAKP   HMAC SHA1 authentication  HMAC SHA1 96 integrity  and AES CBC 128 encryption algorightms    E The remote server password is specified by the environment variable IPMI_PASSWORD    f  lt password_file gt   Specifies a file containing the remote server password  If this option is absent  or if  password_file is empty  the password will default to NULL    h Get basic usage help from the command line    H  lt address gt   Remote server address  can be IP address or hostname  This option is required for lan and  lanplus interfaces    I  lt interface gt   Selects IPMI interface to use  Supported interfaces that are compiled in are visible in the usage  help output    L  lt privivl gt   Force session privilege level  Can be CALLBACK  USER  OPERATOR  ADMIN  Default is ADMIN    m  lt  local_address gt   Set the local IPMB address  The default is 0x20 and there should be no need to change it for  normal operation    o  lt oemtype gt   Select OEM type to support  This usually involves minor hacks in place in the code to work  around quirks in various BMCs from various manufacturers  Use  o list to see a list of current
23.   To enable      gt  Check the Delayed Config Commits button under System  Administration     gt  Click Apply    NETWORK SERVICES       Serial  amp  Network       Serial Port     Users  amp  Groups An ID for this device      Authentication     Network Hosts    System Name les1216a    System Description      Trusted Networks      Call Home      Cascaded Forts System Password      UPS Connections      RPC Connections      Environmental      Managed Devices Confirm System  Password       Alerts  amp  Logging    Delayed Config Commits     PortLog     Alerts     gt  The Commit Config icon will be displayed in top right hand corner of the screen between the  Backup and Log Out icons    System Name  le  6a M A Firmware  3 4 2    LN Uptime  2 days 5 mi Current User  roo    NETWORK SERVICES       To queue then run configuration changes      gt  Firstly apply all the required changes to the configuration e g  modify user accounts  amend  authentication method  enable OpenVPN tunnel or modify system time     gt  Click the Commit Config button  This will generate the System  Commit Configuration screen  displaying all the configurators to be run     gt  Click Apply to run all the configurators in the queue     gt  Alternately click Cancel and this will discard all the delayd configuration changes       Note All the queued configuration changes will be lost if Cancel is selected       To disable the Delayed Configuration Commits mode    gt  Uncheck the Delayed Config Commits button under 
24.   Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    System  Administration  SSL Certificates    Dashboard Layout    re currently configured     Configuring Dashboard for group admin    Widget 1  Alerts     Amount    Maximum number of alerts to display in dashboard     Alerts Connection Alert    Signal Alert        e which alerts to displa    in the da    shboard    Configure Widgets       Note  Dashboard configuration is stored in the  etc config config xml file  Each configured dashboard  will increase the config file  If this file gets too big  you can run out of memory space on the    console manager        724 746 5500   blackbox com    Page 207    12 5 2 Creating custom widgets for the Dashboard  Torun a custom script inside a dashboard widget     Create a file called  widget  lt name gt  sh  in the folder  etc config scripts  where  lt name gt  can be  anything  You can have as many custom dashboard files as you want     Inside this file you can put any code you want  When configuring the dashboard  choose  widget    lt name gt  sh  in the dropdown list  The dashboard will run the script and display the output of the script  commands directly on the screen  inside the specific widget     The best way to format the output would be to send HTML commands back to the browser by adding  echo commands in the script     echo   lt table gt      You can of course r
25.   When NRPE and NSCA are both enabled  NSCA is preferred method for communicating with the  upstream Nagios server    check Prefer NRPE to use NRPE whenever possible  that is  for all  communication except for alerts      10 3 2 Enable NRPE monitoring    Serial    Network       Remote       Nagios  Monitoring Host Console Server    Enabling NRPE allows you to execute plug ins  such as check_tcp and check_ping  on the remote Console  server to monitor serial or network attached remote servers  This will offload CPU load from the  upstream Nagios monitoring machine  This is especially valuable if you are monitoring hundreds or  thousands of hosts  To enable NRPE      gt  Select System  Nagios and check NRPE Enabled     gt  Enter the details for the user connection to the upstream Nagios monitoring server and again  refer to the sample Nagios configuration example below for details about how to configure  specific NRPE checks     By default  the console server will accept a connection between the upstream Nagios monitoring server  and the NRPE server with SSL encryption  without SSL  or tunneled through SSH  The security for the  connection is configured at the Nagios server     10 3 3 Enable NSCA monitoring       Z sassssss sesnsess sesoses   E T       Nagios iii ik       Monitoring Host Console Server Remote  Managed Devices    NSCA is the mechanism that allows you to send passive check results from the remote console server to  the Nagios daemon running on the monitoring serv
26.   Your new rule will be the existing total plus 1  So if the previous command gave you 0  then you start  with rule number 1  If you already have 1 rule your new rule will be number 2  etc     If you want to restrict access to serial port 5 to computers from a single class C network  192 168 5 0 for  example   you need to issue the following commands  assuming you have a previous rule in place      Add a trusted network       config  s config portaccess rule2 address 192 168 5 0     config  s  config portaccess rule2 description foo bar      config  s config portaccess rule2 netmask 255 255 255 0    config  s config portaccess rule2 port5 on     config  s config portaccess total 2    The following command will synchronize the live system with the new configuration       config  r serialconfig    14 8 Cascaded Ports    To add a new slave device with the following settings     IP address DNS name 192 168 0 153  Description Console in office 42  Label les1116 5   Number of ports 16    The following commands must be issued     724 746 5500   blackbox com Page 223      config  s config cascade slaves slave1 address 192 168 0 153     config  s  config cascade slaves slave1 description CM in office 42     config  s config cascade slaves slave1 label les1116 5     config  s config cascade slaves slave1 ports 16    The total number of slaves must also be incremented  If this is the first slave you   re adding  type       config  s config cascade slaves total 1    Increment this value 
27.   and the Port will be set as 22     Go to the SSH   gt  Tunnels menu and in Add new forwarded port enter any high unused port  number for the Source port  for example  54321     Set the Destination  IP details       If your destination device is network connected to the console server and you are connecting  using RDP  set the Destination as  lt Managed Device IP address DNS Name gt  3389  For  example  if when setting up the Managed Device as Network Host on the console server you  specified its IP address to be 192 168 253 1  or its DNS Name was  accounts myco intranet com   then specify the Destination as 192 168 523 1 3389  or  accounts myco intranet com 3389    Only devices that are configured as networked Hosts can  be accessed using SSH tunneling  except by the    root    user who can tunnel to any IP address  the console server can route to      R PuTTY Configuration       Category       Terminal Options controlling SSH port forwarding  i Port forwarding     Local ports accept connections from other hosts    Features        Window  __  Remote ports do the same  SSH 2 only     Appearance Forwarded ports  T    Behaviour    Tahia L54321 192 168 253 1 80    Selection  Colours      Cor i Add new forwarded port     Data   Source port 55555 Add    Proxy  Telnet Destination 192 168 253 1 3389     Rlogin   Local    Remote 5 Dynamic  3  SSH   Auto    IPv4 IPv6                                               If your destination computer is serially connected to the console server
28.   config  s config alerts alert2 alarmrange mon until  hour 14     config  s config alerts alert2 alarmrange mon until min 30     config  s config alerts alert2 description  description      config  s config alerts alert2 sensor temp     config  s config alerts alert2 signal DSR     config  s config alerts alert2 type alarm    To enable an alarm for the entire day       config  s config alerts alert2 alarmrange mon from hour 0    config  s config alerts alert2 alarmrange mon from min 0    config  s config alerts alert2 alarmrange mon until  hour 0    config  s config alerts alert2 alarmrange mon until min 0    The following command will synchronize the live system with the new configuration       config  r alerts    14 15 SMTP  amp  SMS    To set up an SMTP mail or SMS server with the following details     Outgoing server address mail Black Box com  Secure connection type SSL   Sender John Black Box com  Server username john   Server password secret   Subject line SMTP alerts      config  s config system smtp server mail Black Box com     config  s config system smtp encryption SSL  can also be TLS or None      config  s config system smtp sender John  Black Box com     config  s config system smtp username john     config  s config system smtp password secret     config  s config system smtp subject SMTP alerts    To set up an SMTP SMS server with the same details as above       config  s config system smtp server2 mail Black Box com    724 746 5500   blackbox com Page 230  
29.   configuration is entirely independent of SDT Connector and the SSH gateway  You must configure the  SSH client that SDT Connector launches  for example  Putty  OpenSSH  and the host   s SSH server for  public key authentication  Essentially what you are using is SSH over SSH  and the two SSH connections  are entirely separate     724 746 5500   blackbox com Page 118    6 8 Setting up SDT for Remote Desktop access    The Microsoft Remote Desktop Protocol  RDP  enables the system manager to securely access and  manage remote Windows computers   to reconfigure applications and user profiles  upgrade the  server s operating system  reboot the machine  etc  Black Box   s Secure Tunneling uses SSH tunneling  so  this RDP traffic is securely transferred through an authenticated and encrypted tunnel     SDT with RDP also allows remote Users to connect to Windows XP  Vista  Server2003  and Server 2008  computers and to Windows 2000 Terminal Servers  and to access to all of the applications  files  and  network resources  with full graphical interface just as though they were in front of the computer screen  at work   To set up a secure Remote Desktop connection  enable Remote Desktop on the target  Windows computer that you want to access and configure the RPD client software on the client PC     6 8 1 Enable Remote Desktop on the target Windows computer to be accessed  To enable Remote Desktop on the Windows computer being accessed      gt  Open System in the Control Panel and clic
30.   for T Mobile it is  phonenumber  tmomail net                    7 3 2 Send SMS   gt  Click on Send SMS as the Add Trigger Action  Enter a unique Action Name and set the  Action Delay Time   gt  Specify the Phone number that the SMS will be sent to in international format  without the      gt  Edit the Message Text to send and click Save New Action  Note  The SMS alert can only be sent if there is an internal or external USB cellular modem attached   However an SMS alert can also be sent via a SMTP SMS gateway as described above   7 3 3 Perform RPC Action   gt  Click on Perform RPC Action as the Add Trigger Action  Enter a unique Action Name and  set the Action Delay Time   gt  Select a power Outlet and specify the Action to be performed  power On  OFF or Cycle    gt  Click Save New Action  7 3 4 Run Custom Script   gt  Click on Run Custom Script as the Add Trigger Action  Enter a unique Action Name and  set the Action Delay Time   gt  Create a script file to execute when this action is triggered and enter the Script Executable  file name e g   etc config action sh   gt  Set the Script Timeout  i e  the maximum run time for the script   Leave as 0 for unlimited    gt  Enter any Arguments that are to be passed to the script and click Save New Action  7 3 5 Send SNMP Trap   gt  Click on Send SNMP Trap as the Add Trigger Action  Enter a unique Action Name and set  the Action Delay Time  Note  The SNMP Trap actions are valid for Serial  Environmental  UPS and Cellular data trigg
31.   gt  Click Apply        Note The above Trusted Networks will limit Users and Administrators access to the console serial  ports  They do not restrict access to the console server itself or to attached hosts  To change the  default settings for this access  you will to need to edit the  Pitables rules as described in Chapter  14   Aadvanced        4 6 Serial Port Cascading    Cascaded Ports enables you to cluster distributed console servers  A large number of serial ports  up to  1000  can be configured and accessed through one IP address and managed through one Management  Console  One console server  the Master  controls other console servers as Slave units and all the serial  ports on the Slave units appear as if they are part of the Master     Black Box   s clustering connects each Slave to the Master with an SSH connection  This uses public key  authentication so the Master can access each Slave using the SSH key pair  rather than using  passwords   This ensures secure authenticated communications between Master and Slaves  enabling  the Slave console server units to be distributed locally on a LAN or remotely around the world        ike     Local or Remote      Administration Distributed    The Master  A  Slaves    z             4 6 1 Automatically generate and upload SSH keys    To set up public key authentication  you must first generate an RSA or DSA key pair and upload them  into the Master and Slave console servers  This can all be done automatically from the Maste
32.   list List available targets  If possible  output will be compressed into a host range  see TARGET   SPECIFICATION below      q    query Query plug status of targets  If none specified  query all targets  Status is not cached   each time this option is used  powermand queries the appropriate RPC s  Targets  connected to RPC s that could not be contacted  e g  due to network failure  are  reported as status  unknown   If possible  output will be compressed into host ranges     n    node Query node power status of targets  if implemented by RPC   If no targets specified   query all targets  In this context  a node in the OFF state could be ON at the plug but  operating in standby power mode     b    beacon Query beacon status  if implemented by RPC   If no targets are specified  query all  targets     t    temp Query node temperature  if implemented by RPC   If no targets are specified  query all  targets  Temperature information is not interpreted by powerman and is reported as  received from the RPC on one line per target  prefixed by target name     h    help Display option summary     L    license Show powerman license information     d    destination host  port  Connect to a powerman daemon on non default host and optionally port     V    version Display the powerman version number and exit     D    device Displays RPC status information  If targets are specified  only RPC s matching the target  list are displayed     T    telemetry Causes RPC telemetry information to be 
33.   remote machine  and to move files from one machine to another  It provides strong authentication and  secure communications over insecure channels     OpenSSH  the de facto open source SSH application  encrypts all traffic  including passwords  to  effectively eliminate these risks  Additionally  OpenSSH provides a myriad of secure tunneling  capabilities  as well as a variety of authentication methods     OpenSSH is the port of OpenBSD s excellent OpenSSH O  to Linux and other versions of Unix  OpenSSH is  based on the last free version of Tatu Ylonen s sample implementation with all patent encumbered  algorithms removed  to external libraries   all known security bugs fixed  new features reintroduced  and  many other clean ups  http   www openssh com  The only changes in the Black Box SSH  implementation are       PAM support      EGD 1  PRNGD 2  support and replacements for OpenBSD library functions that are absent from  other versions of UNIX      The config files are now in  etc config  e g      etc config sshd_config instead of  etc sshd_config      etc config ssh_config instead of  etc ssh_config     etc config users  lt username gt   ssh  instead of  home  lt username gt   ssh     724 746 5500   blackbox com Page 251    15 6 2 Generating Public Keys  Linux     To generate new SSH key pairs use the Linux ssh keygen command  This will produce an RSA or DSA  public private key pair and you will be prompted for a path to store the two key files  for example   id_dsa pub
34.   set the Destination  as  lt port label gt  3389  For example  if the Label you specified on the serial port on the console  server is win2k3  then specify the remote host as win2k3 3389  Or  you can set the    724 746 5500   blackbox com Page 133    Destination as portXX 3389  where XX is the SDT enabled serial port number   For example  if  port 4 is on the console server is to carry the RDP traffic  then specify port04 3389          Note http  www jfitz com tips putty_config html has useful examples on configuring PuTTY for SSH  tunneling    gt  Select Local and click the Add button    gt  Click Open to SSH connect the Client PC to the console server  You will now be prompted for the    Username Password for the console server user     ep 192 168 252 202   PuTTY         If you are connecting as a User in the    users    group  then you can only SSH tunnel to Hosts  and Serial Ports where you have specific access permission       Ifyou are connecting as an Administrator  in the    admin    group   then you can connect to  any configured Host or Serial Ports  that has SDT enabled      To set up the secure SSH tunnel for a HTTP browser connection to the Managed Device  specify port 80   instead of port 3389 that was used for RDP  in the Destination IP address     To set up the secure SSH tunnel from the Client  Viewer  PC to the console server for VNC  follow the  steps above  but when you configure the VNC port redirection  specify port 5900 in the Destination IP  address  
35.   simply add the list of group_names after the existing    an    entries  including the separating colon         9 3 SSL Certificate    The console server uses the Secure Socket Layer  SSL  protocol for encrypted network traffic between  itself and a connected user  When establishing the connection  the console server has to expose its  identity to the user   s browser using a cryptographic certificate  The default certificate that comes with  the console server device upon delivery is for testing purposes only        The System Administrator should not rely on the default certificate as the  secured global access mechanism for use through Internet         gt  Activate your preferred browser and enter https    IP address  Your browser may respond with a  message that verifies the security certificate is valid but notes that it is not necessarily verified  by a certifying authority  To proceed  you need to click yes if you are using Internet Explorer or  select accept this certificate permanently  or temporarily  if you are using Mozilla Firefox      gt  You will then be prompted for the Administrator account and password as normal     We recommend that you generate and install a new base64 X 509 certificate that is unique for a  particular console server     To do this  the console server must be enabled to generate a new cryptographic key and the associated  Certificate Signing Request  CSR  that needs to be certified by a Certification Authority  CA   A  certification autho
36.   supported OEM types    p  lt port gt   Remote server UDP port to connect to  Default is 623    P  lt password gt   Remote server password is specified on the command line  If supported it will be obscured in  the process list  Note  Specifying the password as a command line option is not recommended    t  lt target_address gt   Bridge IPMI requests to the remote target address    U  lt username gt   Remote server username  default is NULL user      V Increase verbose output level  This option may be specified multiple times to increase the level  of debug output  If given three times you will get hexdumps of all incoming and outgoing  packets     V Display version information     If no password method is specified  then ipmitool will prompt the user for a password  If no password is  entered at the prompt  the remote server password will default to NULL     SECURITY    724 746 5500   blackbox com Page 267    The ipmitool documentation highlights that there are several security issues to be considered before  enabling the IPMI LAN interface  A remote station has the ability to control a system s power state as  well as being able to gather certain platform information  To reduce vulnerability  we strongly advise  that the IPMI LAN interface only be enabled in  trusted  environments where system security is not an  issue or where there is a dedicated secure  management network  or access has been provided through  an console server     Further  we strongly advise that you do 
37.   tar   The tar archiving utility   tc Show traffic control settings   tcpdump Dump traffic on a network   telnetd Telnet protocol server   tftp Client to transfer a file from to tftp server   tftpd Trivial file Transfer Protocol  tftp  server   tip Simple terminal emulator cu program for connecting to modems and serial  devices   top Provide a view of process activity in real time   touch   Change file timestamps   traceroute Print the route packets take to network host   traceroute6 Traceroute for IPv6   true   Returns an exit code of TRUE  0    umount   Unmount file systems   uname   Print system information   usleep   Delay for a specified amount of time   vconfig   Create and remove virtual ethernet devices   vi   Busybox clone of the VI text editor   w Show who is logged on and what they are doing   zcat   Identical to gunzip  c    Commands above which are appended with     come from BusyBox  the Swiss Army Knife of embedded  Linux  http   www busybox net downloads BusyBox html  Others are generic Linux commands and most  commands the  h or   help argument to provide a terse runtime description of their behavior  More  details on the generic Linux commands can found online at http   en tldp org HOWTO HOWTO   INDEX howtos html and http   www faqs org docs Linux HOWTO Remote Serial Console HOWTO html    An updated list of the commands may found using Is command to view all the commands actually  available in the  bin directory in your console server     There were a numbe
38.   the public key  and id_dsa  the private key   For example     S ssh keygen  t  rsa  dsa    Generating public private  rsa  dsa  key pair    Enter file in which to save the key   home user  ssh id_ rsa dsa     Enter passphrase  empty for no passphrase     Enter same passphrase again    Your identification has been saved in  home user  ssh id_ rsa dsa    Your public key has been saved in  home user  ssh id_ rsa dsa  pub   The key fingerprint is   28 aa 29 38 ba 40 f4 11 5e 3f d4 fa e5 36 14 d6 user server   S    Create a new directory to store your generated keys  You can also name the files after the device they  will be used for  For example     S mkdir keys   S ssh keygen  t rsa   Generating public private rsa key pair    Enter file in which to save the key   home user  ssh id_rsa    home user keys control_room  Enter passphrase  empty for no passphrase     Enter same passphrase again    Your identification has been saved in  home user keys control_room  Your public key has been saved in  home user keys control_room pub   The key fingerprint is    28 aa 29 38 ba 40 f4 11 5e 3f d4 fa e5 36 14 d6 user server        Make sure that there is no password associated with the keys  If there is a password  then the Black Box  devices will have no way to supply it as runtime     Full documentation for the ssh keygen command can be found at http   www openbsd org cgi   bin man cgi query ssh keygen  15 6 3 Installing the SSH Public Private Keys  Clustering     For Black Box console se
39.   then click Apply        Note If you want to set the same protocol options for multiple serial ports at once  click Edit Multiple  Ports and select which ports you want to configure as a group         gt  If the console server has been configured with distributed Nagios monitoring enabled  then you  will also be presented with Nagios Settings options to enable nominated services on the Host to  be monitored  refer Chapter 10    Nagios Integration      4 1 1 Common Settings    There are a number of common settings that you can set for each serial port  These are independent of  the mode in which the port is being used  Set these serial port parameters to match the serial port  parameters on the device you attach to that port     724 746 5500   blackbox com Page 47     lt BLA    CK BOX    NETWORK SERVICES    System Name  AC  Uptime  0 days  1    6A Firmware  2 8 0u2  cs Current User  root       Serial  amp  Network  Serial Port   Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    System  Administration   SSL Certificates  Configuration Backup  Firmware   IP    Common Settings for Port 1    Label    Baud Rate    Data Bits    Parity    Stop Bits    Flow Control    Signaling  Protocol     gt  Specify a label for the port      gt  Select the appropriate Baud Rate  Parity  Data Bits  Stop Bits  and Flow Control for eac
40.  1 Port Access and Active Users    The Administrator can see which Users have access privileges with which serial ports      gt  Select the Status  Port Access    N System Name M Firmware  0u2 N   lt S BLACK BOX Uptime  0    Current User  root   10   Backup Log Out    NETWORK SERVICES       Serial  amp  Network  Serial Port  Users  amp  Groups User From 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16  Authentication  Network Hosts deladmin Anywhere N N N N N N N N N N N N N N N N  T       work  austed Netware hpadmin Anywhere N N N N N N N NNN N N N N N N  Cascaded Ports  UPS Connections devwoom Anywhere Y Y Y Y Y Y Y Y Y Y    Y Y Y Y Y  RPC Connections  Environmental   Legend  Managed Devices   Anywhere Accessible from any IP address   ee en Anyone No username is required for access     The Administrator can also see the current status as to Users who have active sessions on those ports      gt  Select the Status  Active Users    12 2 Statistics    The Statistics report provides a snapshot of the status  current traffic  and other activities and  operations of your console server     724 746 5500   blackbox com Page 203     gt  Select the Status  Statistics    System Name    BLACK BOX      A Firmware   Current User     NETWORK SERVICES       Serial  amp  Network       Serial Port      Users  amp  Groups     Authentication      Network Hosts      Trusted Networks     Call Home    Interfaces   RoutesIDNS   Serial Ports P ICMP TCP UDP ees  of Band  Routing Table  Destination Gateway Mas
41.  1 Web Terminal   13 3 2 SDT Connector access   13 4 Power Management  CONFIGURATION FROM THE COMMAND LINE  14 1 Accessing config from the command line  14 2 Serial Port configuration   14 3 Adding and Removing Users  14 4 Adding and removing user Groups  14 5 Authentication   14 6 Network Hosts   14 7 Trusted Networks   14 8  Cascaded Ports   14 9 UPS Connections   14 10 RPC Connections   14 11 Environmental   14 12 Managed Devices   14 13 Port Log   14 14 Alerts   14 15 SMTP  amp  SMS   14 16 SNMP   14 17 Administration   14 18 IP settings   14 19 Date  amp  Time Settings   14 20 Dial in settings   14 21 DHCP server   14 22 Services   14 23 NAGIOS   ADVANCED CONFIGURATION   15 1 Custom Scripting    15 1 1 Custom script to run when booting   15 1 2 Running custom scripts when alerts are triggered   15 1 3 Example script   Power Cycling on Pattern Match   15 1 4 Example script   Multiple email notifications on each alert  15 1 5 Deleting Configuration Values from the CLI   15 1 6 Power Cycle any device when a ping request fails   15 1 7 Running custom scripts when a configurator is invoked    724 746 5500   blackbox com    Page 10    197  198  201  202  203  203  203  204  204  205  205  208  209  209  210  210  210  211  212  213  213  216  219  220  221  222  223  223  224  225  226  227  227  228  230  231  231  231  232  233  233  234  235  236  236  236  237  238  238  238  241  243    15 1 8 Backing up the configuration and restoring using a local USB stick  15 1 9 Back
42.  2 SDT Connector access    Administrator and Users can communicate directly with the console server command line and with  devices attached to the console server serial ports using SDT Connector and their local tenet client  or  using a Web terminal and their browser     gt  Select Manage  Terminal     gt  Click Connect to SDT Connector  This will to activate the SDT Connector client on the computer  you are browsing and load your local telnet client to connect to the command line or serial port  using SSH    Ne System Name  A  Model  LE  Firmware  2     SB Uptime  0 days  2 rs  4 mins Current Use  vA    N    ETWORK SERVICES       Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports    sDTConnector             UPS Connections E   SDTConnector  RPC Connections m  Environmental Fennia    Managed Devices    Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    Gateway Actions    Retrieve Hosts          System       Note You must install SDT Connector on the computer you are browsing from and add and the console  server as a gateway as detailed in Chapter 6        724 746 5500   blackbox com Page 211    13 4 Power Management  Administrators and Users can access and manage the connected power devices      gt  Select Manage  Power    724 746 5500   blackbox com Page 212    Chapter 14 Command Line Configuration    Introduction    For those who prefer to configure their console server at the Linux command lin
43.  5 3    Send SNMP trap alerts    The Administrator can configure the Simple Network Management Protocol  SNMP  agent that resides  on the console server to send SNMP trap alerts to an NMS management application      gt    gt     Select Alerts  amp  Logging  SNMP    Enter the SNMP transport protocol  SNMP is generally a UDP based protocol  though  infrequently  it uses TCP instead     Enter the IP address of the SNMP Manager and the Port to use for connecting  default   162   Select the version being used  The console server SNMP agent supports SNMP v1  v2  and v3     Enter the Community name for SNMP v1 or 2c  An SNMP community is the group that devices  and management stations running SNMP belong to  It helps define where information is sent   SNMP default communities are private for Write  and public for Read      To configure for SNMP v3  you will need to enter an ID and authentication password and contact  information for the local Administrator  in the Security Name      Click Apply to activate SNMP     724 746 5500   blackbox com Page 145    System Name  les1308a Model LES1308A Firmware  3 5 3u5     lt S gt BLACK BOX Uptime  0 days  19 hours  26 mins  30 secs Current User  root    NETWORK SERVICES       Serial  amp  Network  SNMP Service Details Primary SNMP Manager Secondary SNMP Manager      Serial Port      Users  amp  Grou        Enable    Enable the SNMP service    TCPIIP Protocol UDP               The TCP IP protocol to serve  Location    _         _    System Loc
44.  5 7 4  5 8   5 8 1  5 8 2  5 8 3  5 8 4    OoB Dial In Access  Configure Dial In PPP  Using SDT Connector client  Set up Windows XP  2003 Vista 7 client  Set up earlier Windows clients  Set up Linux clients for dial in  OoB broadband access  Broadband Ethernet Failover  Dial Out Failover  Always on dial out  Failover dial out  Cellular Modem Connection  Connect to the GSM HSUPA UMTS carrier network  Connect to the CDMA EV DO carrier network  Verify cellular connection  Cellular modem watchdog  Cellular Operation  OOB access set up  Cellular failover setup  Cellular routing  Cellular CSD dial in setup  Firewall  amp  Forwarding  Configuring network forwarding and IP masquerading  Configuring client devices  Port forwarding  Firewall rules    SECURE SSH TUNNELING AND SDT CONNECTOR    6 1  6 2    Configuring for SSH Tunneling to Hosts    SDT Connector Client Configuration    724 746 5500   blackbox com    102  103  103    Page 7    6 2 1 SDT Connector installation    6 2 2 Configuring a new console server gateway in the SDT Connector client  6 2 3 Auto configure SDT Connector client with the user   s access privileges  6 2 4 Make an SDT connection through the gateway to a host   6 2 5 Manually adding hosts to the SDT Connector gateway   6 2 6 Manually adding new services to the new hosts   6 2 7 Adding a client program to be started for the new service   6 2 8 Dial in configuration    6 3 SDT Connector to Management Console   6 4 SDT Connector   telnet or SSH connect to seriall
45.  5 Firewall  Failover and   OoB Dial       Access    Introduction    The console server has a number of fail over and out of band access capabilities to make sure it   s  available if there are difficulties accessing the console server through the principal network path  The  console server also has routing  NAT  Network Address Translation   packet filtering and port forwarding  support     This chapter covers     out of band  OoB  access from a remote location using dial up modem     out dial failover       OoB access using an alternate broadband link  LES1508A  LES1408A  LES1416A   LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A  LES1208A R2   LES1216A R2  LES1232 and LES1248A R2 models only        broadband failover       firewall and routing    5 1 OoB Dial In Access    To enable OoB dial in access  you first configure the console server  Once it   s set up for dial in PPP  access  the console server will await an incoming dial in connection  Set up the remote client dial in  software so it can establish a network connection from the Administrator   s client modem to the dial in  modem on the console server     OoB dial in management                      Note The LES1208A R2  LES1216A R2  LES1232 and LES1248A R2 models all have an internal  modem and a DB9 Local Console port for OoB access  With these models  you can still attach an    724 746 5500   blackbox com Page 81    external modem via a serial cable to the DB9 port  and you can configure the second Eth
46.  6 2 4 Make an SDT connection through the gateway to a host     gt  Simply point at the host to be accessed and click on the service to use to access that host  The  SSH tunnel to the gateway is then automatically established  the appropriate ports redirected  through to the host  and the appropriate local client application is launched pointing at the local  endpoint of the redirection           SDTConnector  File Edit Help    wa ze     5 208 64 91 182     m HPio2   IBM RSAII   Ip Power Web Management  Dell Server 2003  DRAC4    HP 2003 Server  iLO 2    Dell 2003 Server   Dell 2003 Server  BMC    HP 2003 Server   Local Services                rl m E m eo m m m m m                Logging in to gateway 208 64 91 182             724 746 5500   blackbox com Page 107       Note The SDT Connector client can be configured with unlimited number of Gateways  that is  console    servers   You can configure each Gateway to port forward to an unlimited number of locally  networked Hosts  There is no limit on the number of SDT Connector clients that can be  configured to access the one Gateway  Nor are there limits on the number of Host connections  that an SDT Connector client can concurrently have open through the one Gateway tunnel     There is a limit on the number of SDT Connector SSH tunnels that can be open at the same time  on a particular Gateway  console server   Each Gateway  console server  can support at least 50  such concurrent connections  At any time  you could have up t
47.  Add New Port Forward   gt  Fillin the following fields     Name  Name for the port forward  This should describe the target and the service that  the port forward is used to access    Input Interface  This allows the user to only forward the port from a specific interface  In most  cases  this should be left as  Any     724 746 5500   blackbox com Page 98    Source Address  This allows the user to restrict access to a port forward to a specific address  In  most cases  this should be left blank    Input Port Range  The range of ports to forward to the destination IP  These will be the port s   specified when accessing the port forward  These ports need not be the same as  the output port range     Protocol  The protocol of the data being forwarded  The options are TCP or UDP    Output Address  The target of the port forward  This is an address on the internal network  where packets sent to the Input Interface on the input port range are sent     Output Port Range  The port or ports that the packets will be redirected to on the Output  Address     BOX    NETWORK SERVICES       Serial  amp  Network       Serial Port      Users  amp  Groups     Authentication      Network Hosts      Trusted Networks     Call Home      Cascaded Ports     UPS Connections     RPC Connections     Environmental      Managed Devices    Alerts  amp  Logging       PortLog      Alerts      SMTP  amp  SMS     SNMP    System       Administration      SSL Certificates      Configuration Backup     Firmware
48.  Apply     When DHCP has initially allocated hosts addresses  copy these addresses into the pre assigned list so the  same IP address will be reallocated if you reboot the system     3 6 3 Select Failover or broadband OOB    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A   LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console servers provide a broadband failover    option  If you have a problem using the main LAN connection for accessing the console server  an  alternate access path is used     724 746 5500   blackbox com Page 41    Redundant LAN connection    NETWORK   1   2  Serially  connected    consoles          Management  network        gt  By default  the failover is not enabled  To enable  select the Network page on the System  IP  menu      gt  Select the Failover Interface to be used if the main fails  This can be     o Management LAN   an alternate broadband Ethernet connection  which would be the  Network2 port on the LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A   LES1316A  LES1332A  LES1348A  LES1208A R2  LES1216A R2  LES1232A and LES1248A   R2 console server  or    o Internal Modem   the internal V 92 modem in the LES1208A R2  LES1216A R2   LES1232A and LES1248A R2 console server  or    o Internal Cellular Modem   the CDMA modem in the LES1408A  LES1416A  LES1432 and  LES1448  or theGSM modem in the LES1308A  LES1316A  LES1332 and LES1348 console  server    o Serial DB9   an external serial modem 
49.  Band field enter the access details for the remote  PPP server to be called    Override DNS is available for PPP Devices such as modems  Override DNS allows the use of alternate  DNS servers from those provided by your ISP  For example  an alternative DNS may be required for  OpenDNS used for content filtering      gt  To enable Override DNS  check the Override returned DNS Servers box  Enter the IP of the DNS  servers into the spaces provided     724 746 5500   blackbox com Page 87    System Name  6a Model 216A Firmware     BLACK BOX Uptime  0 days  0 5 mins Current User     NETWORK SERVICES       Serial  amp  Network          Serial Port      Users  amp  Groups     Authentication Internal Modem Dial Settings     Network Hosts      Trusted Networks     Call Home      Cascaded Ports     UPS Connections     RPC Connections       Environmental Enable Dial Out        Managed Devices    Serial DB9 Port Internal Modem    Disable Dial F  Di       modem communication     Enable Dial In    Allow incoming                                     Allow outgo  Alerts  amp  Logging     PortLog P     sAn Serial Settings     SMTP  amp  SMS Baud Rate 9600       SNMP  The port speed in characters per second   System   Flow Control Hardware        Administration The method of flow control          SSL Certificates      Configuration Backup     Firmware   we Dial Out Settings   Always On Out of Band     Date  amp  Time      Dial Phone Number      Firewall      Nagios      Configure Dashboard      
50.  Data and Computer Software clause at DFARS 252 227 7013 or subparagraphs  c   1   and  2  of the Commercial Computer Software     Restricted Rights at 48 C F R  52 227 19  as applicable  or any  successor regulations     TERM AND TERMINATION  This EULA is effective until terminated  The EULA terminates immediately if you fail to  comply with any term or condition  In such an event  you must destroy all copies of the Software  You may also  terminate this EULA at any time by destroying the Software     GOVERNING LAW AND ATTORNEY   S FEES  This EULA is governed by the laws of the State of Utah  USA   excluding its conflict of law rules  You agree that the United Nations Convention on Contracts for the International    724 746 5500   blackbox com Page 279    Sale of Goods is hereby excluded in its entirety and does not apply to this EULA  If you acquired this Software in a  country outside of the United States  that country   s laws may apply  In any action or suit to enforce any right or  remedy under this EULA or to interpret any provision of this EULA  the prevailing party will be entitled to recover its  costs  including reasonable attorneys    fees     ENTIRE AGREEMENT  This EULA constitutes the entire agreement between you and Black Box with respect to the  Software  and supersedes all other agreements or representations  whether written or oral  The terms of this EULA  can only be modified by express written consent of both parties  If any part of this EULA is held to be
51.  Networks to specify network addresses that  can access nominated Slave serial ports       gt  Select the appropriate Alerts  amp  Logging  Alerts to configure Slave port Connection  State  Change  or Pattern Match alerts      gt  The configuration changes made on the Master are propagated out to all the Slaves when you  click Apply     4 6 4 Managing the Slaves    The Master is in control of the Slave serial ports  For example  if you change User access privileges or  edit any serial port setting on the Master  the updated configuration files will be sent out to each Slave  in parallel  Each Slave will then automatically make changes to its local configuration  and only make  those changes that relate to its particular serial ports      You can still use the local Slave Management Console to change the settings on any Slave serial port   such as alter the baud rates   These changes will be overwritten next time the Master sends out a  configuration file update     Also  while the Master is in control of all Slave serial port related functions  it is not master over the  Slave network host connections or over the Slave console server system itself     You must access each Slave directly to manage Slave functions such as IP  SMTP  amp  SNMP Settings  Date   amp Time  and DHCP server  These functions are not overwritten when configuration changes are  propagated from the Master  Similarly  you have to configure the Slaves Network Host and IPMI settings  at each Slave     The Ma
52.  Periodically log UPS status  Port Log    Alerts Log Rate 15  SMTP  amp  SMS  eeii Minutes between samples  A  System pply       gt  Enter the Name of the particular remote UPS that you want to remotely monitor  This name    must be the name that the remote UPS was configured with on the remote console server   because the remote console server may itself have multiple UPSes attached that it manages  locally with NUT   Optionally  enter a Description     Enter the IP Address or DNS name of the remote console server  that is managing the remote  UPS    This may be another Black Box console server or it may be a generic Linux server running  Network UPS Tools         Note    An example where centrally monitor remotely distributed UPSes is useful is a campus or large  business site where there   s a multitude of computer and other equipment sites spread afar  each  with their own UPS supply     and many of these  particularly the smaller sites  will be USB or  serially connected     Having a console server at these remote sites would enable the system manager to centrally  monitor the status of the power supplies at all sites  and centralize alarms  So he she can be  warned to initiate a call out or shut down         gt     8 2 3    Check Log Status and specify the Log Rate  minutes between samples  if you want the status  from this UPS to be logged  You can view these logs from the Status  UPS Status screen     Check Enable Shutdown Script if this remote UPS is the UPS providin
53.  S  7 System eee II Es Smee g See eer ee oe wr     PPTP VPN Password The system password can be changed by editing the root user on the Users form     Call Home   gt  Cas MOTD     UPS Banner       RP     Enviro  Message of the day text banner to display to authenticating users      Manag  Delayed  Config E  Alerts  amp  Logging   Commits Config changes are queued  and must be explicitly applied     Port Log     Auto Respo Apply     SMTP  amp  SMS       Select System  Administration and enter a System Name and System Description for the  console server to give it a unique ID        Note    The System Name can contain from 1 to 64 alphanumeric characters  however you can also use  the special characters             _     and             There are no restrictions on the characters that can be used in the System Description or the  System Password  each can contain up to 254 characters   However  only the first eight System  Password characters are used to make the password hash        3 3    The MOTD Banner can be used to display a    message of the day    text to users    Click Apply    Network IP address    724 746 5500   blackbox com Page 30    The next step is to enter an IP address for the principal Ethernet  LAN Network Network1  port on the  console server  or enable its DHCP client so that it automatically obtains an IP address from a DHCP  server on the network it will connect to      gt  Onthe System  IP menu  select the Network Interface page then check dhcp or static
54.  The phone number to call to establish the connection  Username    The username for authentication        Status       PortAccess Password     Active Users      Statistics      Support Report     Syslog      UPS Status      RPC Status      Environmental Status Custom Modem     Dashboard Initialization    e when authenticating the user        Confirm       firmation     initialize the modem          Manage       Devices      Port Logs      Host Logs      Power      Terminal Override DNS    ignore Dial Tone o       Override returned DNS oH  servers Use the following DNS       vers instead of the PPP provid       DNS Server 1       The primary DNS    ever     DNS Server 2       The secondan S server     Dynamic DNS       Dynamic DNS None   DDNS disabled    Update a DI                rver when IP addr       DDNS server       DDNS Hostname    The fully qualified DNS hostname a       DDNS Username    The username for the       ount to manage this interface  DDNS Password    The p          ount to ma       Confirm DDNS Password       enter the pa       confirmation     Maximum interval    between updates  Maximu    chang       Minimum interval  between checks  Minimu    ad       entifthe    Maximum attempts per  update    Apply    Numb    724 746 5500   blackbox com Page 88    5 4 2 Failover dial out    The console server modem can be configured so a dial out PPP connection is automatically set up in the  event of a disruption in the principal management network      gt  When config
55.  a Host   you must identify the Host and  specify the TCP or UDP ports services that will be used to control that Host     System Name  le    BLACK BOX Tor    NETWORK SERVICES       Serial  amp  Network       IP Address DNS Host Name Description Notes Permitted Device             Name Services Type  192 168 254 100 test ad test ad for rdp 3389 tcp  rdp  Edit Delete  0  19  utm4000 utm4000 for http 80 tcp  http  0 Edit Delete  192 digipower 443 tcp  https RPC Edit Delete  192 4 3 1 for 22 tcp  ssh  0 Edit Delete  443 tcp  https  le_Na 80 tcp  http  0 Edit Delete  Alerts  amp  Logging     PortLog nr Office P Edit Delet     Auto Response     SMTP  amp  SMS     SNMP  System          Administration     Access to this service will be logg     SSL Certificates     Configuration Backup Add Host     gt  Selecting Serial  amp  Network  Network Hosts presents all the network connected Hosts that have  been enabled for access  and the related access TCP ports services      gt  Click Add Host to enable access to a new Host  or select Edit to update the settings for an  existing Host       gt  Enter the IP Address or DNS Name and a Host Name  up to 254 alphanumeric characters  for  the new network connected Host  and optionally enter a Description       gt  Add or edit the Permitted Services  or TCP UDP port numbers  that are authorized to be used in  controlling this host  Only these permitted services will be forwarded through by SDT to the  Host  All other services  TCP UDP ports  will 
56.  a number of checks  either actively at the Nagios server s request  or passively at preset  intervals  and submit the results to the Nagios server in a batch     You can augment the console server at the local office site by one or more Intelligent Power  Distribution Units  IPDUs  to remotely control the power supply to the managed devices     724 746 5500   blackbox com Page 193            Network checks over ethernet  wees Serial checks over RS232       Power monitoring and manipulation  via IPDU    Console  server y i j Hosts       I  P  D  U    Il  Remote site    In this scenario  configure the console server NRPE server or NSCA client to actively check configured  services and upload the checks to the Nagios server that   s waiting passively  You can also configure  it to service NRPE commands to perform checks on demand     In this situation  the console server will perform checks based on both serial and network access       Network checks over internet  we Serial checks over RS232           Results updated to Nagios via  Internet NSCA    Firewall  Outgoing connections only       Remote site with restrictive firewall    In this scenario  the role of the console server will vary  One aspect may be to upload check results  through NSCA  Another may be to provide an SSH tunnel to allow the Nagios server to run NRPE  commands     724 746 5500   blackbox com Page 194      55H travel initiated for  remote site    NRPE Server at branch  server s request  Internet          C
57.  also configure the console server to allow the  port forwarded network access to itself      gt  Browse to the console server and select Network Hosts from Serial  amp  Network  click Add  Host  and in the IP Address DNS Name field enter 127 0 0 1  this is the Black Box network  loopback address   Then  enter Loopback in Description      gt  Remove all entries under Permitted Services except for those that you will use to access the  Management Console  80 http or 443 https  or the command line  22 ssh or 23 telnet   Scroll  to the bottom and click Apply      gt  Administrators by default have gateway access privileges  For Users to access the console  server Management Console  you will need to give those Users the required access  privileges  Select Users  amp  Groups from Serial  amp  Network  Click Add User  Enter a  Username  Description and Password Confirm  Select 127 0 0 1 from Accessible Host s   and click Apply        6 4 SDT Connector   telnet or SSH connect to serially attached devices    You can also use SDT Connector to access text consoles on devices that are attached to the console  server serial ports  For these connections  you must configure the SDT Connector client software with a  Service that will access the target gateway serial port  and then set the gateway up as a host      gt  Launch SDT Connector on your PC  Select Edit   gt  Preferences and click the Services tab  Click  Add      gt  Enter  Serial Port 2  in Service Name and click Add      gt  Se
58.  and click  you can initiate a dial up connection  Refer to Chapter 6 5     5 1 3 Set up Windows XP  2003 Vista 7 client     gt  Open Network Connections in Control Panel and click the  New Connection Wizard        New Connection Wizard    Network Connection Type  What do you want to do              Connect to the Intemet  Connect to the Intemet so you can browse the Web and read email        Connect to the network at my workplace  Connect to a business network  using dial up or VPN  so you can work from home   a field office  or another location    O Set up a home or small office network  Connect to an existing home or small office network or set up a new one     O Set up an advanced connection    Connect directly to another computer using your serial  parallel  or infrared port  or  set up this computer so that other computers can connect to it        Select Connect to the Internet and click Next   On the Getting Ready screen  select Set up my connection manually and click Next     On the Internet Connection screen  select Connect using a dial up modem and click Next     VV V WV    Enter a Connection Name  any name you choose  and the dial up Phone number that will  connect through to the console server modem     724 746 5500   blackbox com Page 84    New Connection Wizard    Intemet Account Information  You will need an account name and password to sign in to your Intemet account     Type an ISP account name and password  then write down this information and store it in a 
59.  and serial port devices   refer to Section 6 2 7 and 6 2 9   You can also set up SDT Connector to connect out of band to the  console server  refer to Section 6 2 9      6 2 2 Configuring a new console server gateway in the SDT Connector client    To create a secure SSH tunnel to a new console server      gt  Click the New Gateway    Eo    icon or select the File  New Gateway menu option     Ee  SDTConnector              File Edit Help           EB Import Preferences   amp  Export Preferences  Exit          Enter the IP or DNS Address of the console server and the SSH port that you will use  typically    22         Note    If SDT Connector is connecting to a remote console server through the public Internet or routed  network you will need to     Determine the public IP address of the console server  or of the router  firewall that connects  the console server to the Internet  as assigned by the ISP  One way to find the public IP  address is to access http   checkip dyndns org  or http  www whatismyip com  from a  computer on the same network as the console server and note the reported IP address     Set port forwarding for TCP port 22 through any firewall NAT router that is located between  SDT Connector and the console server so it points to the console server   http   www  portforward com has port forwarding instructions for a range of routers  Also  you  can use the Open Port Check tool from http   www canyouseeme org to check if port  forwarding through local firewall N
60.  and setting up SDT for Nagios    10 2 1 Set up central Nagios server   10 2 2 Set up distributed console servers   10 3 Configuring Nagios distributed monitoring  10 3 1 Enable Nagios on the console server    10 3 2 Enable NRPE monitoring   10 3 3 Enable NSCA monitoring   10 3 4 Configure Selected Serial Ports for Nagios Monitoring  10 3 5 Configure Selected Network Hosts for Nagios Monitoring  10 3 6 Configure the upstream Nagios monitoring host   10 4 Advanced Distributed Monitoring Configuration  10 4 1 Sample Nagios configuration   10 4 2 Basic Nagios plug ins   10 4 3 Additional plug ins   10 4 4 Number of supported devices   10 4 5 Distributed Monitoring Usage Scenarios   SYSTEM MANAGEMENT   11 1 System Administration and Reset   11 2 Upgrade Firmware    724 746 5500   blackbox com    Page 9    149  149  152  152  153  153  154  157  158  159  159  160  162  163  165  165  166  166  167  167  168  169  171  171  172  172  174  174  174  175  177  180  181  181  182  183  185  185  186  186  187  187  188  188  188  191  192  192  193  196  196  197    11 3 Configure Date and Time   11 4 Configuration Backup   11 5 Delayed Configuration Commit  11 6 FIPS Mode   STATUS REPORTS   12 1 Port Access and Active Users  12 2 Statistics   12 3 Support Reports   12 4 Syslog   12 5 Dashboard   12 5 1 Configuring the Dashboard  12 5 2 Creating custom widgets for the Dashboard  MANAGEMENT   13 1 Device Management   13 2 Port and Host Logs   13 3 Serial Port Terminal Connection  13 3
61.  applied to serial attached and network   attached management accesses  as covered in Chapter 7   Alerts and Logging   you can also configure  the console server to support the remote syslog protocol on a per serial port basis      gt  Select the Syslog Facility Priority fields to enable logging of traffic on the selected serial port to    a syslog server  and to appropriately sort and action those logged messages  that is  redirect  them send alert email etc       724 746 5500   blackbox com Page 55    Syslog Settings    Syslog Facility Default     Syslog facility to use on logging messages  Syslog Priority Default     Syslog priority level to use on logging messages    Apply     For example  if the computer attached to serial port 3 should never send anything out on its serial  console port  the Administrator can set the Facility for that port to localO  local0    local7 are for site  local values   and the Priority to critical  At this priority  if the console server syslog server does receive a  message  it will automatically raise an alert  Refer to Chapter 7   Alerts  amp  Logging     4 1 8 Cisco USB console connection    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A   LES1348A  LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console servers support direct  USB2 0 connection to one or two Cisco USB console ports  in addition to the traditional RS 232 serial  console port connections      With such a USB console connection users ca
62.  authentication  The Kerberos authentication can be used with UNIX and Windows  Active Directory  Kerberos servers     This form of authentication does not provide group information  so a local user with the same username  must be created  and permissions set     724 746 5500   blackbox com Page 174       Note     Kerberos is very sensitive to time differences between the Key Distribution Center  KDC     authentication server and the client device  Please make sure that NTP is enabled  and the time  zone is set correctly on the console server        When authenticating against Active Directory  the Kerberos Realm will be the domain name  and the  Master KDC will be the address of the primary domain controller     9 1 12 Authentication testing    Kerberos V    Kerberos Realm    Master KDC address    Slave KDC Address    Discover Slave KDCs  using DNS    The domain name ofthe realm users must authenticate against   The address of the Master KDC to authenticate against   The address of a Slave KDC to authenticate against if the Master is not available  E    Use DNS to find slave KDCs  Only enable this ifthe DNS contains Kerberos information    The Authentication Testing option enables the connection to the remote authentication server to be    tested      lt SBLACK BO      4    NETWORK SERVICES    System Name  3 5 3u5  3 cs Current User root       Serial  amp  Network    Authentication Configuration    Authentication Testing    Authentication Testing    Test Username    m  m    
63.  be configured    the NRPE server is the Nagios daemon  for executing plug ins on remote hosts     Each of the Serial Ports and each of the Hosts connected to the console server that you want to  monitor must have Nagios enabled and any specific Nagios checks configured     Configure the central upstream Nagios monitoring host     10 3 1 Enable Nagios on the console server     gt  Select System  Nagios on the console server Management Console and tick the Nagios service  Enabled      gt  Enter the Nagios Host Name that the Console server will be referred to in the Nagios central  server   this will be generated from local System Name  entered in System  Administration  if  unspecified      gt  In Nagios Host Address enter the IP address or DNS name that the upstream Nagios server will  use to reach the console server    if unspecified this will default to the first network port   s IP   Network  1  as entered in System  IP       gt  In Nagios Server Address enter the IP address or DNS name that the console server will use to  reach the upstream Nagios monitoring server      gt  Check the Disable SDT Nagios Extensions option if you want to disable the SDT Connector  integration with your Nagios server at the head end    this would only be checked if you want to  run a vanilla Nagios monitoring      gt  If not  enter the IP address or DNS name that the SDT Nagios clients will use to reach the console  server in SDT Gateway Address     724 746 5500   blackbox com Page 185     gt
64.  blank     gt  If there is a VPN gateway at the remote end  enter the private subnet details in Right Subnet   Again use the CIDR notation and leave blank if there is only a remote host     gt  Select Initiate Tunnel if the tunnel connection is to be initiated from the Left console server end   This can only be initiated from the VPN gateway  Left  if the remote end was configured with a  static  or dyndns  IP address     gt  Click Apply to save changes       Note Itis essential the configuration details set up on the advanced console server  referred to as the  Left or Local host  exactly matches the set up entered when configuring the Remote  Right   host gateway or software client        4 10 OpenVPN    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A   LES1208A R2  LES1216A R2  LES1232 and LES1248A R2 console servers include OpenVPN which is based  on TSL  Transport Layer Security  and SSL  Secure Socket Layer   With OpenVPN  it is easy to build  cross platform  point to point VPNs using x509 PKI  Public Key Infrastructure  or custom configuration  files     OpenVPN allows secure tunneling of data through a single TCP UDP port over an unsecured network   thus providing secure access to multiple sites and secure remote administration to a console server over  the Internet     OpenVPN also allows the use of Dynamic IP addresses by both the server and client thus providing client  mobility  For example  an OpenVPN tunnel may be est
65.  called  fred   the IP address of the console server is  192 168 0 1  default   and the public key is on the  inux unix computer in    ssh id_dsa pub  Execute the  following command on the  inux unix computer     scp    ssh id_dsa pub      root 192 168 0 1  etc config users fred  ssh authorized_keys    The authorized_keys file on the console server needs to be owned by  fred   so login to the    Management Console as root and type     chown fred  etc config users fred  ssh authorized_keys    724 746 5500   blackbox com    Page 253    Master    Slave       authorized_key        authorized_key  ssh tsa rele  AAAAB3NzaC 1 yc2Efg4 t  AAAABSNzaC 1yc2Efg4 t GHIAAA  name elient1  GHIAAA  name client1        BEGIN RSA  PRIVATE KEY          MIIEogIBAAKCAQEA  ylIPGsNf5 a0LnPUMc  nujXXPGiQGyD3b79  KZg3UZ4MjZI525sCy  opv4 TJTvTK6e8OlYt  GYTByUdl        id_rsa pub    ssh rsa AAAAB3NzaC 1 yc2Efg4 tGHIAAA   name client1    If the Black Box device selected to be the server will only have one client device  then the  authorized_keys file is simply a copy of the public key for that device  If one or more devices will be  clients of the server  then the authorized_keys file will contain a copy of all of the public keys  RSA and  DSA keys may be freely mixed in the authorized_keys file  For example  assume we already have one  server  called bridge_server  and two sets of keys  for the control_room and the plant_entrance    S Is  home user keys control_room control_room pub plant_entrance plant_
66.  compiled executables or scripts that can be scheduled to run on the console server to check  the status of a connected host or service  This status is then communicated to the upstream Nagios  server that uses the results to monitor the current status of the distributed network  Each console server  is preconfigured with a selection of the checks that are part of the Nagios plug ins package     check_tcp and check_udp are used to check open ports on network hosts  check_ping is used to check network host availability    check_nrpe is used to execute arbitrary plug ins in other devices    Each console server is preconfigured with two checks that are specific to Black Box     724 746 5500   blackbox com Page 191    check_serial_signals is used to monitor the handshaking lines on the serial ports    check_port_log is used to monitor the data logged for a serial port     10 4 3 Additional plug ins    Additional Nagios plug ins  listed below  are available for Advanced Console Servers  LES1208A R2   LES1216A R2  LES1232A  LES1248A R2     check_apt  check_dns  check_game  check_jabber  check_mrtgtraf  check_nt  check_ping  check_simap  check_ssh    check_time    check_by_ssh  check_dummy  check_hpjd  check_Idap  check_nagios  check_ntp  check_pop  check_smtp  check_ssmtp    check_udp    check_clamd  check_fping  check_http  check_load  check_nntp  check_nwstat  check_procs  check_snmp  check_swap    check_ups    check_dig  check_ftp  check_imap  check_mrtg  check_nntps  check_over
67.  config auth tacacs password  password     To configure RADIUS authentication       config  s config auth radius auth_server  comma separated list   list of remote authentiction  and authorization servers       config  s config auth radius acct_server  comma separated list   list of remote accounting  servers  If unset  Authentication and Authorization Server Address will be used       config  s config auth radius password  password     To configure LDAP authentication       config  s config auth ldap server  comma separated list   list of remote servers       config  s config auth ldap basedn  name   The distinguished name of the search base  For  example  dc my company dc com      config  s config auth ldap binddn  name   The distinguished name to bind to the server with   The default is to bind anonymously       config  s config auth radius password  password     The following command will synchronize the live system with the new configuration       config  r auth    724 746 5500   blackbox com Page 221    14 6 Network Hosts    To determine the total number of currently configured hosts     config  g config sdt hosts total    Assume this value is equal to 3  If you add another host  make sure you increment the total number of  hosts from 3 to 4       config  s config sdt hosts total 4    If the output is config sdt hosts total then assume 0 hosts are configured     Add power device host  To add a UPS RPC network host with the following details     IP address  DNS name 192 
68.  connect to any major GSM carrier globally  The LES1508A  LES1208A R2  LES1216A R2   LES1232A and LES1248A R2 console servers also support attaching an external USB GSM HSPA  cellular modem from Sierra Wireless to one of its USB 2 0 ports     Before powering on the console server you must install the SIM card provided by your cellular carrier  and  attach the external aerial      gt  Select Internal Cellular Modem panel on the System  Dial menu   gt  Check Enable Dial Out Settings    724 746 5500   blackbox com Page 89    System Name  les1308a Model LES1308A Firmware  3 5 3u5   a  0     JX Uptime  0 days  17 hours  45 mins  37 secs Current User  root  y BaduP Log Out    NETWORK SERVICES       Serial  amp  Network    Serial DB9 Port Internal Modem Internal Cellular Modem    Internal Cellular Modem Dial Settings       Disable Dial      Disable modem communication   Enable Dial In      Allow incoming modem communication  Enable Dial Out ce   Allow outgoing modem communication       Environmental       Managed Devices  SIM Not Ready    Error reading SIM card or SIM card unavailable     Alerts  amp  Logging         Dial Out Settings   Always On Out of Band      APN  System   i     Administration The access  Phone Number       The sequence to dial to establish the connection  defaults to  99   1    Username       Note  Your 3G carrier may have provided you with details for configuring the connection including APN   Access Point Name   Pin Code  optional PIN code which may be requir
69.  connecting to the RPC via the network  you will be presented with the IPMI  protocol options and the SNMP RPC Types currently supported by the embedded  Network UPS Tools       If you are connecting to the RPC by a serial port  you will be presented with all the serial  RPC types currently supported by the embedded PowerMan and the Black Box power    manager      lt BLAC    Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  Port Log  Alerts    BOX    NETWORK SERVICES       Add RPC    Connected Via    RPC Type    Name    Description         APC 24 Port  APPv2 6 5 AOSv2 6 4   24 outlets     APC 24 Port  APPv3 3 3 AO0Sv3 4 4   24 outlets    APC 7900  8 outlets   APC 8 Port  AP9210   8 outlets    APC 8 Port  APPv2 0 0 A0Sv2 5 4   8 outlets    APC 8 Port  APPv2 0 2 AO0Sv2 5 3   8 outlets      APC 8 Port  APPv2 2 0 AOSv3 0 3   8 outlets   APC PDU  24 outlets   Appro  48 outlets   Baytech Serial Devices  8 outlets    Cyclades PM10  10 outlets    Cyclades PM20  20 outlets    Cyclades PM8  8 outlets     Dataprobe CP 815  8 outlets    Digital Loggers  8 outlets   HP 3488  1 outlets     IBM Blade Center  15 outlets     IBM H8  1 outlets    ICS 8064  16 outlets      IP Power 9258 via RS232  4 outlets  Hevice   Linux Networx ICE Box v2 x  10 outlets    Linux Networx ICE Box v3 x  v4 x  10 outlets  N  Measurement Computing Corp  CB 
70.  console server command line from their browser      gt  Select Manage  Terminal to display the Web Terminal from which you can log in to the console  server command line    724 746 5500   blackbox com Page 210    System Name a M Firmware  3 4 2 i  Uptime  0 days 9 mins urrent User  root aa     BaduP Log Out    NETWORK SERVICES       Sean ss Terminal      Serial Port      Users  amp  Groups nae      Authentication login  root      Network Hosts Password    em   whoami  root          e CARIDE   cat  etc version       Cascaded Ports      UPS Connections      RPC Connections      Environmental      Managed Devices SDTConnector          Note  To access the BlackBox unit s co vand line she TConnector  SOTConnector 1 5 0 or later must be installed  Alerts  amp  Logging   on the corr er you are browsing from  with this unit add per the Quick Install Guide      Port Log SSE     Alerts  Connect via SDTConnector      13 3 1 2 Web Terminal to Serial Device  To enable the Web Terminal service for each serial port you want to access      gt  Select Serial  amp  Network  Serial Port and click Edit  Ensure the serial port is in Console Server  Mode     gt  Check Web Terminal and click Apply  Administrator and Users can communicate directly with serial port attached devices from their browser    gt  Select the Serial tab on the Manage  Devices menu   gt  Under the Action column  click the Web Terminal icon to display the Web Terminal  connected  directly to the attached serial device    13 3
71.  driver programs talk directly to the UPS equipment and run on the same host as the NUT  network server  upsd   Drivers are provided for a wide assortment of equipment from most of  the popular UPS vendors and understand the specific language of each UPS  They communicate  with serial  USB  and SNMP network connected UPS hardware and map the communications  back to a compatibility layer  This means both an expensive    smart    protocol UPS and a simple     power strip    model can be handled transparently       The NUT network server program upsd is responsible for passing status data from the drivers to  the client programs via the network  upsd can cache the status from multiple UPSes and then  serve this status data to many clients  upsd also contains access control features to limit the  abilities of the clients  only authorized hosts may monitor or control the UPS hardware        There are a number of NUT clients that connect to upsd to check on the status of the UPS  hardware and do things based on the status  These clients can run on the same host as the NUT  server or they can communicate with the NUT server over the network  enabling them to  monitor any UPS anywhere        The upsc client provides a quick way to poll the status of a UPS server  Use it inside shell  scripts and other programs that need UPS data but don t want to include the full  interface       The upsmon client enables servers that draw power through the UPS to shutdown  gracefully when the batter
72.  example above should be executed as     powerman   on  foo 0 4 5      15 9 2 The pmpower tool    The pmpower utility is a high level tool for manipulating remote preconfigured power devices connected  to the console server either via a serial or network connection  The PDU UPS and IPMI power devices are  variously controlled using the open source PowerMan  IPMItool or Network UPS Tools and Black Box   s  pmpower utility arches over these tools so the devices can be controlled through one command line     pmpower    h    I device    r host    o outlet    u username    p password  action        h This help message     I The serial port to use     o The outlet on the power target to apply to    r The remote host address for the power target    u Override the configured username    p Override the configured password   on This action switches the specified device or outlet s  on   off This action switches the specified device or outlet s  off   cycle This action switches the specified device or outlet s  off and on again  status This action retrieves the current status of the device or outlet    Examples     To turn outlet 4 of the power device connected to serial port 2 on    pmpower  I port02  o 4 on    To turn an IPMI device off located at IP address 192 168 1 100  where username is  root  and  password is  calvin     pmpower  r 192 168 1 100  u root  p calvin off    Default system Power Device actions are specified in  etc powerstrips xml  Custom Power Devices can  be added i
73.  for the  Configuration Method      gt  If you selected Static  you must manually enter the new IP Address  Subnet Mask  Gateway   and DNS server details  This selection automatically disables the DHCP client     System Name  les1308a Modet  LE  inrmware  3 5 3u5    BLACK BOX Uptime  0 days  7 hours  15 mins  10 urrent User  root      NETWORK SERVICES       Network Interface Management LAN General Settings Route Settings  Interface    IP Settings  Network       Configuration    DHCP  Method C St    The mechanism to acquire IP settings  IP Address    A statically assigned IP address   Subnet Mask  A statically assigned network mask    Gateway       5    efault gateway for the unit  Please only setthis on one interface          Auto Response     SMTP  amp  SMS      SNMP Primary DNS  A statically assigned primary name server   System       Administration      SSL Certificates A statically assigned secondary name server     Secondary DNS       Configuration Backup          Firmware Media Auto g    IP The Ethernet media type     Date  amp  Time      Dial DHCP Server Disabled     gt  If you selected DHCP  the console server will look for configuration details from a DHCP server  on your management LAN  This selection automatically disables any static address  The console  server MAC address is printed on a label on the base plate        Note In its factory default state  with no Configuration Method selected  the console server has its  DHCP client enabled  so it automatically acce
74.  id_dsa pub     Client  1 Server Client  2     gt  e F a   Q    Client  1 Keys Client  2 Keys  To generate the keys using OpenBSD s OpenSSH suite  we use the ssh keygen program     S ssh keygen  t  rsa   dsa    Generating public private  rsa   dsa  key pair    Enter file in which to save the key   home user  ssh id_ rsa   dsa     Enter passphrase  empty for no passphrase     Enter same passphrase again    Your identification has been saved in  home user  ssh id_ rsa  dsa    Your public key has been saved in  home user  ssh id_ rsa dsa  pub   The key fingerprint is   28 aa 29 38 ba 40 f4 11 5e 3f d4 fa e5 36 14 d6 user server   S    It is advisable to create a new directory to store your generated keys  It is also possible to name the files  after the device they will be used for  For example     S mkdir keys   S ssh keygen  t rsa   Generating public private rsa key pair    Enter file in which to save the key   nome user  ssh id_rsa    home user keys control_room  Enter passphrase  empty for no passphrase     Enter same passphrase again    Your identification has been saved in  home user keys control_room  Your public key has been saved in  home user keys control_room pub   The key fingerprint is    28 00 29 38 ba 40 f4 11 5e 3f d4 fa e5 36 14 d6 user server   S    You should ensure there is no password associated with the keys  If there is a password  then the  console servers will have no way to supply it as runtime     Authorized Keys     If the console server selected to b
75.  includes code from JSch  a pure Java implementation of SSH2  JSch is licensed under BSD style  license and it is     Copyright  c  2002  2003  2004 Atsuhiko Yamanaka  JCraft Inc  All rights reserved     Redistribution and use in source and binary forms  with or without modification  are permitted provided that the  following conditions are met     1  Redistributions of source code must retain the above copyright notice  this list of conditions and the following  disclaimer     724 746 5500   blackbox com Page 280    2  Redistributions in binary form must reproduce the above copyright notice  this list of conditions and the following  disclaimer in the documentation and or other materials provided with the distribution     3  The names of the authors may not be used to endorse or promote products derived from this software without  specific prior written permission     THIS SOFTWARE IS PROVIDED    AS IS  AND ANY EXPRESSED OR IMPLIED WARRANTIES  INCLUDING  BUT  NOT LIMITED TO  THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE ARE DISCLAIMED  IN NO EVENT SHALL JCRAFT  INC  OR ANY CONTRIBUTORS TO THIS  SOFTWARE BE LIABLE FOR ANY DIRECT  INDIRECT  INCIDENTAL  SPECIAL  EXEMPLARY  OR  CONSEQUENTIAL DAMAGES  INCLUDING  BUT NOT LIMITED TO  PROCUREMENT OF SUBSTITUTE GOODS  OR SERVICES  LOSS OF USE  DATA  OR PROFITS  OR BUSINESS INTERRUPTION  HOWEVER CAUSED AND  ON ANY THEORY OF LIABILITY  WHETHER IN CONTRACT  STRICT LIABILITY  OR TORT  INCLUDING  NEGLIGEN
76.  log level 2  default is 0   Shell power command menu Enabled  RFC2217 access Enabled   Limit pot to 1 connection Enabled   SSH access Enabled   TCP access Enabled   telnet access Disabled  Unauthorized telnet access Disabled      config  s config ports port5 delay 100    config  s config ports port5 escapechar      config  s config ports port5 loglevel 2    config  s config ports port5 powermenu on    config  s config ports port5 rfc2217 on    config  s config ports port5 singleconn on    config  s config ports port5 ssh on    config  s config ports port5 tcp on    config  d config ports port5 telnet    config  d config ports port5 unauthtel  Device Mode  For a device mode port  set the port type to ups  rpc  or enviro     config  s config ports port5 device type  ups   rpc   enviro   For port 5 as a UPS port     config  s config ports port5 mode reserved  For port 5 as an RPC port     config  s config ports port5 mode powerman  For port 5 as an Environmental port       config  s config ports port5 mode reserved    SDT mode  To enable access over SSH to a host connected to serial port 5       config  s config ports port5 mode sadt    config  s config ports port5 sdt ssh on    To configure a username and password when accessing this port with Username   user1 and Password    secret       config  s config ports port  sdt username user1    config  s config ports port  sdt password secret    724 746 5500   blackbox com Page 217    Terminal server mode  Enable a TTY login for a l
77.  modes     724 746 5500   blackbox com Page 46    1  Console Server Mode is the default and this enables general access to serial console port on the  serially attached devices     2  Device Mode sets the serial port up to communicate with an intelligent serial controlled PDU   UPS  or Environmental Monitor Device  EMD      3  SDT Mode enables graphical console access  with RDP  VNC  HTTPS  etc   to hosts that are serially  connected     4  Terminal Server Mode sets the serial port to wait for an incoming terminal login session     5  Serial Bridge Mode transparently interconnects two serial port devices over a network     System Name  A y A Firmware  2 8    Uptime  0 d  urrent User     NETWORK SERVICES       Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication Port   Label Mode Logging Parameters Flow Control    Ports 1 8 Ports 9 16    Network Hosts Level  Trusted Networks  Cascaded Ports  UPS Connections 2 Port 2  RPC Connections   Environmental 3 Port3    1 Port1 None Edit    None Edit       None Edit    gt  Select Serial  amp  Network  Serial Port and you will see the current labels  modes  logging levels   and RS 232 protocol options that are currently set up for each serial port     gt  By default  each serial port is set in Console Server mode  To reconfigure the port  click Edit      gt  When you have reconfigured the common settings  Chapter 4 1 1  and the mode  Chapters 4 1 2     4 1 6  for each port  you can set up any remote syslog  Chapter 4 1 7 
78.  network connected UPSes must first be connected to  and configured to communicate with  the console server     724 746 5500   blackbox com Page 154     gt  For serial UPSes attach the UPS to the selected serial port on the console server  From the Serial  and Network  Serial Port menu  configure the Common Settings of that port with the RS 232    properties  etc  required by the UPS  refer to Chapter 4 1 1   Common Settings   Then select  UPS as the Device Type      gt     For each network connected UPS  go to the Serial  amp  Network  Network Hosts menu and    configure the UPS as a connected Host by specifying it as Device Type  UPS and clicking Apply      gt  No such configuration is required for USB connected UPS hardware      lt BLA    CK BOX    System Name  AC c Model  LES1216A Firmware  2 8 0u2  Uptime  0 days  3 hours  33 mins  26    NETWORK SERVICES    secs Current User  root    a       Backup Log Out       Serial  amp  Network  Serial Port   Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    Managed UPSes    UPS Description  Name    Driver Username Connected    Via    No UPSes currently monitored      Add Managed UPS       Remote UPSes    UPS Description  Name    Address    No UPSes currently monitored      AddRemote UPS       gt  Select the Serial  amp  Network  UPS Connections menu  The Managed UPSes
79.  of the  console server  and the Port Number of the SDT Secure Tunnel for the console server serial  port that you attach to the Windows computer you want to control  For example  if the  Windows computer is connected to serial Port 3 on a console server located at  192 168 0 50  then you would enter 192 168 0 50 7303       Where there is an SSH tunnel  over a dial up PPP connection or over a public internet  connection or private network connection   simply enter the localhost as the IP address   127 0 0 1  For Port Number  enter the source port you created when setting SSH tunneling   port forwarding  in Section 6 1 6   for example   1234     Click Option  In the Display section  specify an appropriate color depth  for example  for a  modem connection we recommend that you not use over 256 colors   In Local Resources   specify the peripherals on the remote Windows computer that are to be controlled  printer   serial port  etc          Remote Desktop Connection       Logon settings    ei Type the name of the computer  or choose a computer from     the drop down list     Computer  127 0 0 1 1234          MS Bob                Save my password    Connection settings      Save current settings  or open saved connection                 724 746 5500   blackbox com Page 121     gt  Click Connect        Note The Remote Desktop Connection software is pre installed with Windows XP  Vista and Server  2003 2008  For earlier Windows PCs  you need to download the RDP client       Go to t
80.  of the node values     For example  if we have five users configured and we use the script to delete user 3  then user 4 will  become user 3  and user 5 will become user 4     This creates an obvious complication because this script does NOT check for any other dependencies  that the node being deleted may have  You are responsible for making sure that any references and  dependencies connected to the deleted node are removed or corrected in the config xml file     The script treats all nodes the same  The syntax to run the script is    delete node  node name   To  remove user 3         delete node config users user3    The delete node script       bin bash   User must provide the node to be removed  e g   config users user1     Usage  delete node  full node path     if  S   1    then  echo  Wrong number of arguments   echo  Usage  delnode  full     delimited node path    exit 2    fi      test for spaces  TEMP     echo  S1    sed  s       N    if    STEMP     N      then  echo  Wrong input format   echo  Usage  delnode  full     delimited node path    exit 2   fi      testing if node exists  TEMP  config  g config   grep   1   if    z  STEMP     then  echo  Node  1 not found   exit 0    fi      LASTFIELD is the last field in the node path e g   user1      ROOTNODE is the upper level of the node e g   config users      NUMBER is the integer value extracted from LASTFIELD e g   1      TOTALNODE is the node name for the total e g   config users total      TOTAL is the value of
81.  of these  You can upload this configuration automatically into the SDT Connector client                  amp  SDTConnector  File Edit Help    z    E  E208 64 91 182  E Gateway Actions         Baytech gateway       Out Of Band                          gt  Click on the new gateway icon and select Retrieve Hosts  This will     724 746 5500   blackbox com Page 106      configure access to network connected Hosts that the user is authorized to access  and set up  for each of these Hosts  the services  for example  HTTPS  IPMI2 0  and  the related IP ports being redirected        configure access to the console server itself  this is shown as a Local Services host        configure access with the enabled services for the serial port devices connected to  the console server           SDTConnector  File Edit Help    aa z e    5  208 64 91 182 Services      p iLo2   FBM RSAIl                       HTTP     HTTPS          E Ip Power Web Management       Dell Server 2003  DRAC4  vnc        HP 2003 Server  iLO 2          Dell 2003 Server   Q JRM RS     Scc          Dell 2003 Server  BMC        HP 2003 Server   E Local Services                                  Note The Retrieve Hosts function will auto configure all user classes  that is  they can be members  of user or admin or some other group or no group  SDT Connector will not auto configure the  root  and we recommend that you only use this account for initial config and to add an initial  admin account to the console server        
82.  on  the Active Server to receive administration privileges on the console server      gt  Click Apply     Ensure the LDAP service is operational and group names are correct within the Active Directory              e  gt   m  g    Xe al mm it ee 7            tester Properties 21 xi   9 Active Directory Users and Com  H Q Saved Queries Environment   Sessions   Remote control   Terminal Services Profile   cOoM     a ep opengear com       General   Address   Account   Profile   Telephones   Organization            H a  Builtin Published Certificates Member Of   Dialin   Object   Security    H  Computers         Domain Controllers Member of    H  ForeignSecurityPrincipal Active Directory Folder   g    LostAndFound opengear com Users   E o NTDS Quotas Domain Users opengear com Users   LJ Program Data MyGroup opengear com Users      System          yy Users    Add    Remove      Primary group  Domain Users          There is no need to change Primary group unless  you have Macintosh clients or POSIX compliant  applications     Set Primary Group          724 746 5500   blackbox com Page 173    9 1 9 Remote groups with TACACS  authentication    When using TACACS  authentication  there are two ways to grant a remotely authenticated user  privileges  The first is to set the priv lvl and port attributes of the raccess service to 12  this is discussed  further in section 9 2 of this document  Additionally or alternatively  group names can be provided to the  console server using the group
83.  on the  network and the services that will be supported     4  Serial  amp  Network Covers configuring serial ports and connected network hosts  and  setting up Users and Groups    5  Firewall  Failover  amp  OoB Describes setting up the high availability access features of the console  server    6  Secure Tunneling  SDT  Covers secure remote access using SSH and configuring for RDP  VNC     HTTP  HTTPS  etc  access to network and serially connected devices     7  Auto response  amp  Logging Explains how to set up local and remote event data logs  how to trigger  SNMP and email alerts and configuring auto response actions to trigger  events     8  Power  amp  Environment Describes how to manage USB  serial  and network attached power  strips and UPS supplies including Network UPS Tool  NUT  operation   IPMI power control  and EMD environmental sensor configuration     9  Authentication Access to the console server requires usernames and passwords that are  locally or externally authenticated     724 746 5500   blackbox com Page 13    10  Nagios Integration Describes how to set Nagios central management with SDT extensions  and configure the console server as a distributed Nagios server     11  System Management Covers access to and configuration of services that will run on the  console server    12  Status Reports View a dashboard summary and detailed status and logs of serial and  network connected devices  ports  hosts  power  and environment    13  Management Includes po
84.  on their local network  as detailed in the previous chapter   You can also  pre configure the SDT Connector with the access tools and applications that are available to run when  you   ve established access to a particular host     SDT Connector can connect to the console server using an alternate OoB access  It can also access the  console server itself and access devices connected to serial ports on the console server     724 746 5500   blackbox com Page 103    6 2 1 SDT Connector installation     gt  The SDT Connector set up program  SDTConnector Setup 1 n exe or sdtcon 1 n tar gz  is  included on the CD supplied with your Black Box console server      gt  Run the set up program        spTConnector Setup    Welcome to the  SDTConnector Setup Wizard    This wizard will guide you through the installation of  SDTConnector     It is recommended that you close all other applications  before starting Setup  This will make it possible to update  relevant system files without having to reboot your  computer     Click Next to continue              Note For Windows clients  the SDTConnectorSetup 1 n exe application will install the SDT Connector  1 n exe and the config file defaults xmil  If there is already a config file on the Windows PC  then it  will not be overwritten  To remove an earlier config file  run the regedit command and search for     SDT Connector     then remove the directory with this name     For Linux and other Unix clients  SDTConnector tar gz application will 
85.  option allows you to enter a custom AT string modem  initialization string  for example  AT amp C1 amp D3 amp K3            IP Dial in Settings     Date  amp  Time     Dial Remote Address         i The IP address to assign a dial in client   ane Local Address       Nagios     Configure Dashboard The IP address for the dial in server     Default Route Oo    The dialed connection is to become a default route for the system    Custom Modem    Initialization  An optional AT command sequence to initialize the modem        Authentication Type    None  least secure   C PAP         APv2  most secure    use when checking the dial in users credentials    Manage 5 If CHAP or MSCHAPv2 is selected  the dial in authentication will be encrypted  However  the traffic itself may     Devices not be    evices     Port Logs Consider using secure protocols  HTTP S SSH  to access network resources over a dial in link    You must select the Authentication Type to apply to the dial in connection  The console server  uses authentication to challenge Administrators who dial in to the console server   For dial in  access  the username and password received from the dial in client are verified against the local  authentication database stored on the console server   The Administrator must also configure  the client PC workstation to use the selected authentication scheme  Select PAP  CHAP   MSCHAPv2  or None  and click Apply     None With this selection  no username or password authentication is requir
86.  other work under  the scope of this License     3  You may copy and distribute the Program  or a work based on it  under Section 2  in object code or executable  form under the terms of Sections 1 and 2 above provided that you also do one of the following     a  Accompany it with the complete corresponding machine readable source code  which must be distributed under  the terms of Sections 1 and 2 above on a medium customarily used for software interchange  or     b  Accompany it with a written offer  valid for at least three years  to give any third party  for a charge no more than  your cost of physically performing source distribution  a complete machine readable copy of the corresponding  source code  to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software  interchange  or     c  Accompany it with the information you received as to the offer to distribute corresponding source code   This  alternative is allowed only for noncommercial distribution and only if you received the program in object code or  executable form with such an offer  in accord with Subsection b above      The source code for a work means the preferred form of the work for making modifications to it  For an executable  work  complete source code means all the source code for all modules it contains  plus any associated interface  definition files  plus the scripts used to control compilation and installation of the executable  However  as a special  excepti
87.  page     15 5 Modifying SNMP Configuration    15 5 1  etc config snmpd conf    The net snmpd is an extensible SNMP agent which responds to SNMP queries for management  information from SNMP management software  Upon receiving a request  it processes the request s    collects the requested information and or performs the requested operation s  and returns the  information to the sender     This includes built in support for a wide range of MIB information modules  and can be extended using  dynamically loaded modules  external scripts and commands  snmpd when enabled should run with a  default configuration  You can customize its behavior via the options in  etc config snmpd conf    To change standard system information such as system contact  name  and location  edit   etc config snmpd conf file and locate the following lines     sysdescr  Black Box     syscontact root  lt root localhost gt  configure  etc default snmpd conf     724 746 5500   blackbox com Page 249    sysname Not defined  edit  etc default snmpd conf   syslocation Not defined  edit  etc default snmpd conf     Simply change the values of sysdescr  syscontact  sysname and syslocation to the desired settings and  restart snmpd     The snmpd conf provides is extremely powerful and too flexible to completely cover here  The  configuration file itself is commented extensively and good documentation is available at the net snmp  website http   www net snmp org  specifically     Man Page  http   www net snmp org doc
88.  pair  you can manually upload them to the Master and Slave console  servers     Note Ifyou already have an RSA or DSA key pair that you do not want to use  you will need to create a  key pair using ssh keygen  PuTTYgen or a similar tool as detailed in Chapter 15 6        To manually upload the public and private key pair to the Master console server    gt  Select System  Administration on Master   s Management Console      gt  Browse to the location where you have stored RSA  or DSA  Public Key and upload it to SSH RSA   DSA  Public Key      gt  Browse to the stored RSA  or DSA  Private Key and upload it to SSH RSA  DSA  Private Key    gt  Click Apply     724 746 5500   blackbox com Page 63      NX    System Name A Fi 2 2  BLACK BOX MENSAS Sann ema A  9 Backup Log Out    NETWORK SERVICES                Serial  amp  Network  Serial Port System Name ACSdoc  Users  amp  Groups An ID for this device  Authentication  Network Hosts System  Trusted Networks Description The physical location of this device  Cascaded Ports titania Aa  UPS Connections System  RPC Connections Password  Environmental  Managed Devices Confirm System  Password R icc aoa df fi  Re enter the above password for confirmation  Alerts  amp  Logging   b  Port Log   Apply    Alerts S  SMTP  amp  SMS  SNMP SSH RSA Public Browse     TE Key Upload a replacement RSA public key file  Administration SSH RSA Private Browse     SSL Certificates Key Upload a replacement RSA private key file   Configuration Backup  Firmwar
89.  recovery back to the original state prior  to failover  The console server continually pings probe addresses whilst in original and failover  states  The original state will automatically be set as a priority and reestablished following three  successful pings of the probe addresses during failover  The failover state will be removed once  the original state has been re established     For earlier firmware that does not support automatic failure recovery  to restore networking to a  recovered state the following command then needs to be run    rm  f  var run   failed over  amp  amp  config  r ipconfig  If required  you can run a custom bash script when the device fails over  It is possible to use this  script to implement automatic failure recovery  depending on your network setup  The script to  create is     etc contig scripts interface failover alert        gt  You can check the connection status by selecting the Cellular panel on the Status  Statistics  menu    o The Operational Status will change as the cellular modem finds a channel and connects to  the network    o The Failover  amp  Out of Band screen will display information relating to a configured  Failover OOB interface and the status of that connection  The IP Address of the Failover   OOB interface will be presented in the Failover  amp  Out of Band screen once the  Failover OOB interface has been triggered    5 7 3 Cellular routing    Once you have configured carrier connection  the cellular modem can be confi
90.  resolve actions will not  be run       7 2 4 ICMP Ping  To use a ping result as the Auto Response trigger event      gt  Click on ICMP Ping as the Check Condition     gt  Specify which Address to Ping  i e  IP address or DNS name to send ICMP Ping to  and  which Interface to send ICMP Ping from  e g  Management LAN or Wireless network      gt  Set the Check Frequency  i e  the time in seconds between checks  and the Number of  ICMP Ping packets to send     gt  Check Save Auto Response      SNMP       Check ICMP Ping Check    Conditions Address to Ping TO    Environmental  interface Default Route x  Interface to send ICMP Ping from    Check Frequency 60    Time in seconds between checks       erial Number of 5  gin Logot Packets  Number of ICMP Ping packets to send    Serial Pattern Seve Auto  Response  Return to Auto Response List                7 2 5 Cellular Data    This check monitors the aggregate data traffic inbound and outbound through the cellular modem as an  Auto Response trigger event      gt  Click on Cellular Data as the Check Condition       Note  Before configuring cellular data checks in Auto Response the internal or external USB cellular  modem must be configured and detected by the console server       7 2 6 Custom Check    This check allows users to run a nominated custom script with nominated arguments whose return value  is used as an Auto Response trigger event     724 746 5500   blackbox com Page 138     gt  Click on Custom Check as the Check Condition
91.  safe place   If you have forgotten an existing account name or password  contact your ISP      User name                 Password          Confirm password     C  Use this account name and password when anyone connects to the Intemet from  this computer    _  Make this the default Intemet connection              gt  Enter the PPP User name and Password you set up for the console server     5 1 4 Set up earlier Windows clients     gt  For Windows 2000  the PPP client set up procedure is the same as above  except you get to the  Dial Up Networking Folder by clicking the Start button and selecting Settings  Then  click  Network and Dial up Connections and click Make New Connection      gt  Similarly  for Windows 98  you double click My Computer on the Desktop  then open Dial Up  Networking and double click Make New Connection  Then  proceed as above     5 1 5 Set up Linux clients for dial in    The online tutorial http   www yolinux com TUTORIALS LinuxTutorialPPP html presents a selection of  methods for establishing a dial up PPP connection     s Command line PPP and manual configuration  works with any Linux distribution     s Using the Linuxconf configuration tool  for Red Hat compatible distributions   This configures  the scripts ifup ifdown to start and stop a PPP connection    s Using the Gnome control panel configuration tool      WVDIAL and the Redhat    Dialup configuration tool          GUI dial program X isp  Download Installation Configuration        Note For all P
92.  section will display  all the UPS connections that have already been configured      gt  Click Add Managed UPS     724 746 5500   blackbox com    Page 155     gt      gt       System Name c Model  LI Firmware  2 8 0u2  BLACK BOX Uptime  0 day 1ours  34 mins  S Current User  root    NETWORK SERVICES       Serial  amp  Network   Serial Port Add Managed UPS   Users  amp  Groups Connected Via Serial Port 3  Port      Authentication   Network Hoss poh may be connected via USB  serial or network  HTTP  HTTPS or    Trusted Networks   Cascaded Ports UPS Name  UPS Connections   RPC Connections   Environmental   Managed Devices Description    The name of this UPS    Alerts  amp  Logging  Port Log  Alerts Username    SMTP  amp  SMS a A a a ace can  SNMP Allow slaves to connect using this username    An optional description    Password  System   Administration  SSL Certificates Confirm  Configuration Backup  Firmware  IP On Critical  Date  amp  Time Power  Dial  Services Run until failure  DHCP Server The action to take when battery power becomes critical for this UPS       Allow slaves to connect using this pass    Re enter the password       Nagios Shutdown Order 0  Configure Dashboard    The order in which th   Status to S  Port Access and    Active Users  Statistics  Support Report  Syslog details   UPS Status Driver Options   RPC Status Option Argument  Environmental Status  Dashboard            ail Ma  all Mai       s are never shu    Driver genericups  v  The driver for this UPS 
93.  ser provisto cuando    El cable de poder o el contacto ha sido da  ado  u   Objectos han caido o liquido ha sido derramado dentro del aparato  o   El aparato ha sido expuesto a la lluvia  o   El aparato parece no operar normalmente o muestra un cambio en su desempe  o  o  El aparato ha sido tirado o su cubierta ha sido da  ada     MINS        724 746 5500   blackbox com Page 5    INDEX    INTRODUCTION    INSTALLATION   2 1 Models   2 1 1 Kit components LES1508A Console Server   2 1 2 Kit components LES1308A  LES1348A and LES1408A   LES1448A Advanced Console Servers  2 1 3 Kit components LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 Advanced Console Servers  2 1 4 Kit components LES1116A  LES1132A and LES1148A Console Servers   2 1 5 Kit components LES1108A Console Server   2 2 Power connection   2 2 1 LES1508A power   2 2 2 LES1408A   LES1448A  LES1308A  LES1348A and LES1208A   LES1248A power   2 2 2 LES1116A  LES1132A and LES1148A power   2 2 4 LES1108A power   2 3 Network connection    2 4 Serial Port connection   2 5 USB Port Connection   2 6 Antenna and SIM   SYSTEM CONFIGURATION   3 1 Management console connection    3 1 1 Connected PC workstation set up  3 1 2 Browser connection   3 2 Administrator Password   3 2 1 Set up new administrator   3 2 2 Name the console server   3 3 Network IP address   3 3 1 IPv6 configuration   3 3 2 Dynamic DNS  DDNS  configuration  3 4 System Services   3 4 1 Service Access   3 4 2 Service Settings   3 5 Communications Software   3 
94.  status and environmental monitors and probes for Check Condition triggers  The console  server will then initiate a sequence of actions in response to the triggers  To configure you     e set general parameters  Section 7 1   then    e select and configure the Check Conditions i e  the conditions that will trigger the response   Section 7 2    then    e specify the Trigger Actions i e  sequence of actions initiated in the event of the trigger condition   Section 7 3   then    e specify the Resolve Actions i e  actions performed when trigger conditions have been resolved   Section 7 4     All console server models can maintain log records of all access and communications with the console  server and with the attached serial devices  A log of all system activity is also maintained as is a history of  the status of any attached environmental monitors     Some models also log access and communications with network attached hosts and maintain a history of  the UPS and PDU power status     e  f port logs are to be maintained on a remote server  then the access path to this location needs  to be configured Then you need to activate and set the desired levels of logging for each serial  and or network port  Section 7 6  and or power and environment UPS  refer Chapter 8     7 1 Configure Auto Response    With the Auto Response facility  a sequence of Trigger Actions is initiated in the event of a specified  trigger condition  Check Condition   Subsequent Resolve Actions can also be p
95.  take by selecting the  appropriate icon     a     Turn ON    724 746 5500   blackbox com Page 152    8 1 4       Turn OFF   J Cycle      Status    You will only be presented with icons for those operations that are supported by the Target you  have selected     Fs s sf System Name  ACSdoc I    6A Firmware  2 8 0u2 Ra  LS Uptime  0 days  3 hours  28 mins  58 secs Current User  root       NETWORK SERVICES ae            Serial  amp  Network  Serial Port eee  Users  amp  Groups Target Portt2 APC PDU    Outlet Outlet1  1     Authentication Select a power device to g   Outlet 1  1   Network Hosts  Outlet 2  2  C  Trusted Networks Action        Turn On        Turn  Outlet 3  3  le     Status    Cascaded Ports   Outlet 4  4  UPS Connections Perform an action on the power q  RPC Connections Outlet 6  6   Environmental Status No existing status  tr Outlet 7  7    may not be completed   Managed Devices Outlet 8  8   Outlet 9  9   A Outlet 10  10       Outlet 11  11   Outlet 12  12   Alerts Outlet 13  13   SMTP  amp  SMS Outlet 14  14   RPC status    You can monitor the current status of your network and serially connected PDUs and IPMI RPCs      gt      gt      gt     8 2    Select the Status  RPC Status menu and a table with the summary status of all connected RPC  hardware will be displayed     Click on View Log or select the RPCLogs menu and you will be presented with a table of the  history and detailed graphical information on the selected RPC     Click Manage to query or control 
96.  tested your alternate default  configuration by clicking Restore     If your alternate default configuration causes the console server to not boot  recover your unit to  factory settings using the following steps     If the configuration is stored on an external USB storage device  unplug the storage device  and reset to factory defaults as per section 11 1 of the user manual     If the configuration is stored on an internal USB storage device  reset it to factory defaults  using a specially prepared USB storage device      e     The USB storage device must be formatted with a Windows FAT32 VFAT file system  on the first partition or the entire disk  most USB thumb drives are already formatted  this way    The file system must have the volume label  OPG_DEFAULT     Insert this USB storage device into an external USB port on the console server and  reset to factory defaults as described in Section 11 1       After recovering your console server  make sure the problem configuration is no longer selected  for Load On Erase        724 746 5500   blackbox com Page 200    11 5 Delayed Configuration Commit    With Advanced Console Servers  LES1208A R2  LES1216A R2  LES1232A  LES1248A R2   a Delayed Config  Commit mode is available which allows the grouping or queuing of configuration changes and the  simultaneous application of these changes to a specific device  For example  changes to authentication  methods or user accounts may be grouped and run once to minimize system downtime
97.  the addresses for connecting clients     Click Apply to save changes  To enter authentication certificates and files  Edit the OpenVPN tunnel     Select the Manage OpenVPN Files tab  Upload or browse to relevant authentication certificates  and files     Apply to save changes  Saved files will be displayed in red on the right hand side of the Upload  button     To enable OpenVPN  Edit the OpenVPN tunnel    Check the Enabled button   Apply to save changes       Note     Please make sure that the console server system time is correct when working with OpenVPN   Otherwise authentication issues may arise        gt     4 10 3    Select Statistics on the Status menu to verify that the tunnel is operational     Windows OpenVPN Client and Server set up    Windows does not come with an OpenVPN server or client  This section outlines the installation and  configuration of a Windows OpenVPN client or a Windows OpenVPN server and setting up a VPN  connection to a console server     The OpenVPN GUI for Windows software  which includes the standard OpenVPN package plus a  Windows GUI  can be downloaded from hitp   openvpn se download  html      gt     Once installed on the Windows machine  an OpenVPN icon will have been created in the  Notification Area located in the right side of the taskbar  Right click on this icon to start  and  stop  VPN connections  and to edit configurations and view logs    dient  gt   IM4004_dient  gt   IM4216_dient  gt    gt    gt    gt     sample  server  Wind
98.  the total number of items before deleting e g   3     NEWTOTAL is the modified total i e  TOTAL 1     CHECKTOTAL checks if TOTAL is the actual total items in  xml    LASTFIELD   1       ROOTNODE S 1         724 746 5500   blackbox com Page 239    NUMBER  echo SLASTFIELD   sed  s  a zA Z    g      TOTALNODE     echo S 1        sed  s         1 total    TOTAL     config  g STOTALNODE   sed  s          NEWTOTAL S  STOTAL  1        Make backup copy of config file  cp  etc config config xml  etc config config  bak  echo  backup of  etc config config xml saved in  etc config config bak     if   z SNUMBER     test whether a singular node is being     deleted e g  config sdt hosts  then    echo  deleting  1   config  d  S1     echo Done  exit 0    elif   SNUMBER   STOTAL     Test if only one item exists  then   echo  only one item exists      Deleting node   echo  Deleting  1    config  d  S1       Modifying item total   config  s  STOTALNODE 0     echo Done  exit O    elif   SNUMBER  It STOTAL     more than one item exists  then      Modify the users list so user numbers are sequential    by shifting the users into the gap one at a time       echo  Deleting  1     LASTFIELDTEXT     echo SLASTFIELD   sed  s  0 9   g   CHECKTOTAL     config  g SROOTNODE SLASTFIELDTEXTSTOTAL      if    z  SCHECKTOTAL       then  echo  WARNING   STOTALNODE  greater than number of items   fi  COUNTER 1  while   SCOUNTER       TOTAL NUMBER 1      do    724 746 5500   blackbox com Page 240    config  g SR
99.  the user group provides the user with limited access to the console server  and connected Hosts and serial devices  These Users can access only the Management  section of the Management Console menu and they have no command line access to the  console server  They also can only access those Hosts and serial devices that have been  checked for them  using services that have been enabled    724 746 5500   blackbox com Page 57    3     If a user is set up with pptd  dialin  ftp or pmshell group membership they will have  restricted user shell access to the nominated managed devices but they will not have any  direct access to the console server itself  To add this the users must also be a member of the   users  or  admin  groups    The Administrator can also set up additional Groups with specific power device  serial port  and host access permissions  However users in these additional groups don   t have any  access to the Management Console menu nor do they have any command line access to the  console server itself     The Administrator can also set up users with specific power device  serial port and host  access permissions  who are not a member of any Groups  Similarly these users don   t have  any access to the Management Console menu nor do they have any command line access to  the console server itself     For convenience the SDT Connector    Retrieve Hosts    function retrieves and auto configures  checked serial ports and checked hosts only  even for admin group users 
100.  tota l 1  Note that if you see config users total this means you  have 0 Users configured     Your new User will be the existing total plus 1  If the previous command gave you 0  then you start with  user number 1  If you already have 1 user your new user will be number 2  etc     To add a user  with Username John  Password secret and Description  mySecondUser  issue the  commands       config  s config users total 2  assuming we already have 1 user configured     config  s config users user2 username John     config  s config users user2 description mySecondUser     config  P config users user2 password    NOTE  The  P parameter will prompt the user for a password  and encrypt it  You can encrypt the value  of any config element using the  P parameter  but only encrypted user passwords and system passwords  are supported  If any other element value were to be encrypted  the value will become inaccessible and  will have to be reset     To add this user to specific groups  admin users        config  s config users user2 groups group1  groupname     config  s config users user2 groups group2  groupname2   etc       To give this user access to a specific port       config  s config users user2 port1 on    config  s config users user2 port2 on    config  s config users user2 port5 on  etc       To remove port access       config  s config users user2 port1    the value is left blank    or simply      config  d config users user2 port1   The port number can be anything from 1 to 
101.  unenforceable  as written  it will be enforced to the maximum extent allowed by applicable law  and will not affect the enforceability of  any other part     Should you have any questions concerning this EULA  or if you desire to contact Black Box for any reason  please  contact the Black Box representative serving your company     THE FOLLOWING DISCLAIMER OF WARRANTY AND LIMITATION OF LIABILITY IS INCORPORATED INTO THIS  EULA BY REFERENCE  THE SOFTWARE IS NOT FAULT TOLERANT  YOU HAVE INDEPENDENTLY  DETERMINED HOW TO USE THE SOFTWARE IN THE DEVICE  AND BLACK BOX HAS RELIED UPON YOU TO  CONDUCT SUFFICIENT TESTING TO DETERMINE THAT THE SOFTWARE IS SUITABLE FOR SUCH USE     LIMITED WARRANTY Black Box warrants the media containing the Software for a period of ninety  90  days from the  date of original purchase from Black Box or its authorized retailer  Proof of date of purchase will be required  Any  updates to the Software provided by Black Box  which may be provided by Black Box at its sole discretion  shall be  governed by the terms of this EULA  In the event the product fails to perform as warranted  Black Box   s sole  obligation shall be  at Black Box   s discretion  to refund the purchase price paid by you for the Software on the  defective media  or to replace the Software on new media  Black Box makes no warranty or representation that its  Software will meet your requirements  will work in combination with any hardware or application software products  provided by thi
102.  will have no rights  and no password set  It will  not appear in the Black Box configuration tools     Automatically added accounts will not be able to log in if the remote servers are unavailable   RADIUS users are currently assumed to have access to all resources  so they will only be  authorized to log in to the console server  RADIUS users will be authorized each time they access  a new resource      gt  Admin rights granted over AAA     Users may be granted Administrator rights via networked AAA  For TACACS a priv lvl of 12 of  above indicates an Administrator  For RADIUS  Administrators are indicated via the Framed Filter  ID   See the example configuration files below for example       gt  Authorization via TACACS for both serial ports and host access     Permission to access resources may be granted via TACACS by indicating a Black Box Appliance  and a port or networked host the user may access   See the example configuration files below  for example    TACACS Example   user   tim    service   raccess    priv Ivl   11  port1   les1116 port02  port2   192 168 254 145 port05     global   cleartext mit     RADIUS Example   paul Cleartext Password     luap   Service Type   Framed User   Fall Through   No   Framed Filter ld   group_name admin     The list of groups may include any number of entries separated by a comma  If the admin group  is included  the user will be made an Administrator     724 746 5500   blackbox com Page 176    If there is already a Framed Filter Id
103.  will identify that  your carrier has allocated you a Private  P Address  i e  in the range 10 0 0 0     10 255 255 255   172 16 0 0     172 31 255 255 or 192 168 0 0     192 168 255 255    In out of band access mode the internal cellular modem will continually stay connected  The alternative is  to set up Failover mode on the console server as detailed in the next section     5 7 2 Cellular failover setup    Once you have configured carrier connection  the cellular modem can be configured for failover     This will tell the cellular connection to remain idle in a low power state  If the primary and secondary probe  addresses are not available it will bring up the cellular connection and connect back to the cellular carrier      gt  Navigate back to the Network Interface on the System IP menu specify Internal Cellular  modem  cell modem 01  as the Failover Interface to be used when a fault has been detected    724 746 5500   blackbox com Page 93     gt  Specify the Probe Addresses of two sites  the Primary and Secondary  that the console server  is to ping to determine if the principal network is still operational     gt  In event of a failure of the principal network the 3G network connection is activated as the access  path to the console server  and its Managed Devices   Only HTTPS and SSH access is enabled  on the failover connection  which should enable the administrator to connect and fix the problem        Note  By default  the console server supports automatic failure
104.  with an external USB memory stick dedicated to recovery  firmware boot images  extended log file storage etc     2 6 Antenna and SIM    The LES1408A  LES1416A  LES1432A and LES1448A console servers also have an internal CDMA  cellular modem requiring external antenna connection     The LES1308A  LES1316A  LES1332A and LES1348A console servers have an internal GSM cellular  modem that requires a SIM card and an external antenna     Before powering on the console server      gt  Screw the external antenna coax cable onto the MAIN  screw mount SMA connector on the rear of the  console server  2       gt  The AUX connector can be used either for receive  diversity or for GPS      gt  Your GSM cellular carrier will provide you with a SIM  card  Insert the SIM card  1   and it will lock into place   Take care to insert SIM card with contacts facing  downwards        724 746 5500   blackbox com Page 25    Chapter 3 Initial System Configuration    Introduction    This chapter provides step by step instructions for the console server   s initial configuration  and for  connecting it to the Management or Operational LAN  The Administrator must       Activate the Management Console      Change the Administrator password      Set the IP address console server s principal LAN port     Select the network services that will be supported     This chapter also discusses the communications software tools that the Administrator may use to access  the console server     3 1 Management console c
105. 1 0 1 Release          VNC Server   TERAUIIEPED         host display or host  port      Quick Options   O auto  Auto select best settings  Connect  O ULTRA   gt 2Mbit s    Experimental      LAN   gt  IMbit s    Max Colors Cancel  O MEDIUM  128   256Kbit s    256 Colors   OMODEM    19 128Kbit s    64 Colors   Ostow   lt  19kKbit s    8 Colors    C view Only  7  Auto Scaling        C  Use DSMPlugin No Plugin detected     C  Proxy Repeater                  Save connection settings as default Delete saved settings       B  When the Viewer PC is connected directly to the console server  i e  locally or remotely through a  VPN or dial in connection   and the VNC Host computer is serially connected to the console server   enter the IP address of the console server unit with the TCP port that the SDT tunnel will use  The  TCP port will be 7900 plus the physical serial port number  i e  7901 to 7948  so all traffic directed to  port 79xx on the console server is tunneled thru to port 5900 on the PPP connection on serial Port  xx   For a Windows Viewer PC using UltraVNC connecting to a VNC Server attached to Port 1 on a  console server  itis located at 192 168 0 1   UltraVNC Win32 Viewer 1 0 1 Release     VNC Server   192 168 0 1 7901 x     host display or host  port            Quick Options   O auto  Auto select best settings  Connect  O ULTRA   gt 2Mbit s    Experimental   OLAN   gt  IMbit s    Max Colors esa  O MEDIUM  128   256Kbit s    256 Colors    MODEM    19  128Kbit s    64 Co
106. 1 log enabled     config  s config ups remotes remote1 log interval 240     config  s config ups remotes remote1 script enabled on     config  s config ups remotes total 1    The following command will synchronize the live system with the new configuration       config  a    14 10 RPC Connections    You can add an RPC connection from the command line  We do not recommend that you do this  because of dependency issues     However FYI before adding an RPC the Management Console GUI code makes sure that at least one port  has been configured to run in  device mode     and that the device is set to  rpc      To add an RPC with the following values     RPC type APC 7900  Connected via Port 2   UPS name MyRPC  Description RPC in room 5  Login name for device rpclogin   Login password for device secret   SNMP community vi or v2c    724 746 5500   blackbox com Page 225    Logging Enabled  Log interval 600 second  Number of power outlets 4  depends on the type model of the RPC       config  s config ports port2 power type APC 7900     config  s config ports port2 power name MyRPC     config  s  config ports port2 power description RPC in room 5     config  s config ports port2 power username rpclogin     config  s config ports port2 power password secret     config  s config ports port2 p0wer snmp community v1     config  s config ports port2 power log enabled on     config  s config ports port2 power log interval 600     config  s config ports port2 power outlets 4    The following f
107. 13 secs       NETWORK SERVICES       Serial  amp  Network       Serial Port      Users  amp  Groups     Authentication Network Forwarding and Masquerading     Network Hosts      Trusted Networks     Call Home      Cascaded Ports     UPS Connections     RPC Connections     Environmental      Managed Devices    Service Access Port Forwarding Firewall Rules    Source Networks Allowed Destination Networks    Network Interface    Alerts  amp  Logging      PortLog Management LAN     Alerts      SMTP  amp  SMS      SNMP    System       Administration     SSL Certificates Dialout Cellular     Configuration Backup      Firmware     IP      Date  amp  Time      Dial      Firewall       Forwarding  amp  Masquerading    Bacup Log Out     gt  Find the Source Network to be routed  and then tick the relevant Destination Network to    enable Forwarding    IP Masquerading is generally required if the console server will be routing to the Internet  or if the  external network being routed to does not have routing information about the internal network behind    the console server     724 746 5500   blackbox com    Page 96    IP Masquerading performs Source Network Address Translation  SNAT  on outgoing packets  to make  them appear like they ve come from the console server  rather than devices on the internal network    When response packets come back devices on the external network  the console server will translate the  packet address back to the internal IP  so that it is routed correctly  
108. 168 2 5   Host name remoteUPS   Description UPSroom3   Type UPS   Allowed services ssh port 22 and https port 443  Log level for services 0    Issue the commands below       config  s config sdt hosts host4 address 192 168 2 5     config  s config sdt hosts host4 name remoteUPS     config  s config sdt hosts host4 description UPSroom3     config  s config sdt hosts host4 device type ups     config  s config sdt hosts host4 tcpports tcpport1 22     config  s config sdt hosts host4 tcpports tcpport1 loglevel 0    config  s config sdt hosts host4 udpports udpport2 443     config  s config sdt hosts host4 udpports udpport2 loglevel 0    The loglevel can have a value of 0 or 1    The default services that you should configure are  22 tcp  ssh   23 tcp  telnet   80 tcp  http   443 tcp   https   1494 tcp  ica   3389 tcp  rdp   5900 tcp  vnc    Add other network host   To add any other type of network host with the following details     IP address  DNS name 192 168 3 10   Host name OfficePC   Description MyPC   Allowed sevices ssh port 22 https port 443  log level for services 1    Issue the commands below  If the Host is not a PDU or UPS power device or a server with IPMI power  control  then leave the device type blank       config  s config sdt hosts host4 address 192 168 3 10     config  s config sdt hosts host4 description MyPC     config  s config sdt hosts host4 name OfficePC     config  s config sdt hosts host4 device type    leave this value blank     config  s config sdt ho
109. 2048      Click the    Open    button  You may then receive a    Security Alert    that the host s key is not cached   Choose    yes    to continue  You will then be presented with the login prompt of the remote system  connected to the serial port chosen on the console server  Login as normal and use the host  serial console screen     724 746 5500   blackbox com Page 50    R PuTTY Configuration       Category        B  Session  Logging   B  Terminal  Keyboard  Bell    Basic options for your PuTTY session  Specify the destination you want to connect to    Host Name  or IP address   192 168 252 202    Port    2001     Features Connection type    B  Window D Raw    Telnet    Rlogin   SSH    Serial  Appearance  Behaviour  Translation  Selection  Colours Default Settings      Connection    Load  save or delete a stored session  Saved Sessions             Close window on exit   D Aways     Never   Only on clean ext                               PuTTY can be downloaded at http  www tucows com preview 195286 html       SSH    We recommend that you use SSH as the protocol where the User or Administrator connects  to the console server  or connects through the console server to the attached serial consoles   over the Internet or any other public network  This will provide authenticated SSH  communications between the SSH client program on the remote user   s computer and the  console server  so the user   s communication with the serial device attached to the console  server is secur
110. 22 in their firewall gateway     RAW TCP allows connections directly to a TCP socket  Communications programs like PuTTY  also support RAW TCP  You would usually access this protocol via a custom application     For RAW TCP  the default port address is IP Address _ Port  4000   serial port    i e  4001      4048     RAW TCP also enables the serial port to be tunneled to a remote console server  so two serial  port devices can transparently interconnect over a network  see Chapter 4 1 6   Serial  Bridging      Selecting RFC2217 enables serial port redirection on that port  For RFC2217  the default port  address is IP Address _ Port  5000   serial port     that is  5001     5048     Special client software is available for Windows UNIX and Linux that supports RFC2217 virtual  com ports  so a remote host can monitor and manage remote serially attached devices  as  though they were connected to the local serial port  see Chapter 4 6   Serial Port Redirection  for details      RFC2217 also enables the serial port to be tunneled to a remote console server  so two serial  port devices can transparently interconnect over a network  see Chapter 4 1 6   Serial  Bridging      Unauthenticated Telnet Selecting Unauthenticated Telnet enables telnet access to the serial port    without requiring the user to provide credentials  When a user accesses the console server to  telnet to a serial port he normally is given a login prompt  With unauthenticated telnet  the  user connects directly thr
111. 48  depending on the available ports on the specific  console server     For example  assume we have an RPC device connected to port 1 on the console server and the RPC is  configured  To give this user access to RPC outlet number 3 on the RPC device  run the 2 commands  below       config  s config ports port1 power outlet3 users user2 John    config  s config ports port1 power outlet3 users total 2  total number of users that have  access to this outlet     If more users are given access to this power outlet  then increment the   config ports port1 power outlet3 users total  element accordingly     To give this user access to network host 5  assuming the host is configured      724 746 5500   blackbox com Page 219      config  s config sdt hosts host5 users user1 John    config  s config sdt hosts host5 users total 1  total number of users having access to host   To give another user called    Peter    access to the same host     config  s config sdt hosts host5 users user2 Peter    config  s config sdt hosts host5 users total 2  total number of users having access to host   To edit any of the user element values  use the same approach as when adding user elements  that is   use the     s    parameter  If any of the config elements do not exist  they will automatically be created   To delete the user called John  use the delete node script       delete node config users user2  The following command will synchronize the live system with the new configuration       config  r 
112. 5 1 SDT Connector   3 5 2 PuTTY   3 5 3 SSHTerm   3 6 Management network configuration  3 6 1 Enable the Management LAN  3 6 2 Configure the DHCP server   3 6 3 Select Failover or broadband OOB  3 6 4 Aggregating the network ports  3 6 5 Static routes    SERIAL PORT AND NETWORK HOST  4 1 Configure Serial Ports    4 1 1 Common Settings   4 1 2 Console Server Mode   4 1 3 SDT Mode   4 1 4 Device  RPC  UPS  EMD  Mode  4 1 5 Terminal Server Mode   4 1 6 Serial Bridging Mode   4 1 7 Syslog    724 746 5500   blackbox com    Page 6    13  18  18  19  19  20  21  21  21  21  22  22  23  23  23  24  25  26  26  26  27  29  30  30  30  32  32  33  33  35  36  37  37  38  38  39  40  41  43  44  46  46  47  48  53  54  54  55  55    4 10   4 10 1  4 10 2  4 10 3  4 11   4 11 1  4 11 2  4 11 3    Cisco USB console connection  Add  Edit Users  Authentication  Network Hosts  Trusted Networks  Serial Port Cascading  Automatically generate and upload SSH keys  Manually generate and upload SSH keys  Configure the slaves and their serial ports  Managing the Slaves  Serial Port Redirection  Managed Devices  IPsec VPN  Enable the VPN gateway  OpenVPN  Enable the OpenVPN  Configure as Server or Client  Windows OpenVPN Client and Server set up  PPTP VPN  Enable the PPTP VPN server  Add a PPTP user  Set up a remote PPTP client    FIREWALL  FAILOVER AND OoB DIAL IN    5 1   5 1 1  5 1 2  5 1 3  5 1 4  5 1 5  5 2   5 3   5 4   5 4 1  5 4 2  5 5   5 6 1  5 6 2  5 6 3  5 6 4  5 7   5 7 1  5 7 2  5 7 3 
113. 56    BLOWFISH   TWOFISH   RIINDAEL 256   SERPENT   GOST    NSCA password secret   NSCA check in interval 5 minutes   NSCA port 5650  defaults to 5667    user to run as User1  defaults to nsca    group to run as Group1  defaults to nobody       config  s config system nagios nsca enabled on     config  s config system nagios nsca encryption BLOWFISH    config  s config system nagios nsca secret secret     config  s config system nagios nsca interval 2     config  s config system nagios nsca port 5650     config  s config system nagios nsca user User1     config  s config system nagios nsca group Group1    Then synchronize the live system with the new configuration using   config  a    724 746 5500   blackbox com Page 235       Chapter 15    Advanced Configuration    Introduction    Black Box console servers run the embedded Linux operating system  So Administrator class users can  configure the console server and monitor and manage attached serial console and host devices from the  command line using Linux commands and the config utility as described in Chapter 14     The Linux kernel in the console server also supports GNU bash shell script enabling the Administrator to  run custom scripts  This chapter presents a number of useful scripts and scripting tools including        delete node which is a general script for deleting users  groups  hosts  UPSes etc       ping detect which will run specified commands when a specific host stops responding to ping  requests     This cha
114. 7050  8 outlets   MicroEnergetics RPC S6  6 outlets    Phantom v3  v4  1 outlets    Rose UltraPower  12 outlets    Server Technology Sentry Switched CDU  8 outlets    Sun Integrated Lights Out Management  1 outlets    WTI NetPowerSeries  8 outlets  ba                  724 746 5500   blackbox com Page 151    Enter the Username and Password used to login into the RPC  Note that these login credentials  are not related to the Users and access privileges you configured in Serial  amp  Networks  Users  amp   Groups      If you selected SNMP protocol  enter the SNMP v1 or v2c Community for Read Write access  by  default this would be    private         Check Log Status and specify the Log Rate  minutes between samples  if you want the status  from this RPC to be logged  View these logs from the Status  RPC Status screen     Click Apply     For SNMP PDUs  the console server probes the configured RPC to confirm the RPC Type matches  and reports the number of outlets it finds that can be controlled  If unsuccessful  it will report  Unable to probe outlets and you ll need to check the RPC settings or network serial connection     For serially connected RPC devices  a new Managed Device  with the same name as given to the  RPC  will be created  The console server will then configure the RPC with the number of outlets  specified in the selected RPC Type or will query the RPC itself for this information        Note    The Black Box console servers support most popular network and serial P
115. AT router devices has been properly configured        Enter the Username and Password of a user on the gateway that is enabled to connect via SSH  and or create SSH port redirections     724 746 5500   blackbox com Page 105    G   New SDT Gateway          Out Of Band   Remote UDP Gateway       Gateway Address  Gateway Username  Gateway Password    Descriptive Name       Description Notes          OK    9 Cancel                                      gt  Or  enter a Descriptive Name to display instead of the IP or DNS address  and any Notes or a  Description of this gateway  such as its firmware version  site location  or anything special about  its network configuration       gt  Click OK and an icon for the new gateway will now appear in the SDT Connector home page        Note For an SDT Connector user to access a console server  and then access specific hosts or serial  devices connected to that console server   that user must first be setup on the console server   and must be authorized to access the specific ports hosts  refer to Chapter 5   Only these  permitted services will be forwarded through by SSH to the Host  All other services  TCP UDP    ports  will be blocked        6 2 3 Auto configure SDT Connector client with the user   s access privileges    Each user on the console server has an access profile that was configured with those specific connected  hosts and serial port devices the user has authority to access  and a specific set of the enabled services  for each
116. C     The console server Management Console monitors and controls Remote Power Control  RPC  devices  using the embedded PowerMan and Network UPS Tools open source management tools and the Black  Box power management software  RPCs include power distribution units  PDUs  and IPMI power  devices     You can control serial PDUs invariably using their command line console  so you could manage the PDU  through the console server using a remote Telnet client  Also  you could use proprietary software tools  supplied by the vendor  This generally runs on a remote Windows PC  and you could configure the  console server serial port to operate with a serial COM port redirector in the PC  as detailed in Chapter  4      Similarly  you can control network attached PDUs with a browser  for example  with SDT as detailed in  Chapter 6 3   an SNMP management package  or using the vendor supplied control software  Servers  and network attached appliances with embedded IPMI service processors or BMCs invariably have their  own management tools  like SoL  that provide secure management when connected with SDT  Connector     For simplicity  you can now control all these devices through one window using the Management  Console   s RPC remote power control tools     8 1 1 RPC connection    Serial and network connected RPCs must first be connected to  and configured to communicate with   the console server      gt  For serial RPCs  connect the PDU to the selected serial port on the console server  F
117. C   lt  odem  Dial in  Dia        INCOMING NETWORK  e e ROUTING  amp   TRAFFIC FORWARD     T R  4 PORT  FORWARDS   VPN       m    SERVICE  LOCAL PROCESSES  ae p   o    This enables the console server to function as an Internet or external network gateway         Network Forwarding allows the network packets on one network interface  i e  LAN1  eth0  to  be forwarded to another network interface  i e  LAN2 eth1 or dial out cellular   So locally  networked devices can IP connect through the console server to devices on remote networks         IP Masquerading is used to allow all the devices on your local private network to hide behind  and share the one public IP address when connecting to a public network  This type of  translation is only used for connections originating within the private network destined for the  outside public network  and each outbound connection is maintained by using a different source  IP port number         When using IP Masquerading  devices on the external network cannot initiate connections to  devices on the internal network  Port Forwards allows external users to connect to a specific  port on the external interface of the console server cellular router and be redirected to a  specified internal address for a device on the internal network     724 746 5500   blackbox com Page 95        With Firewall Rules  packet filtering inspects each packet passing through the firewall and    accepts or rejects it based on user defined rules         Then Servi
118. CBC  initialized with 128 bit key  i Aug 230  Data Channel Encrypt  Using 160 bit message hash    SHAL    for HMAC authentication  i Aug 230  Data Channel Decrypt  Cipher    BF cBC  initialized with 128 bit key  i Aug  lt 30  Data Channel Decrypt  Using 160 bit message hash  SHA1  for HMAC authentication  i Aug  30  control Channel  TLSv1  cipher TLSV1 SSLv3 DHE RSA AES256 SHA  1024 bit RSA  i Aug 230   server  Peer Connection Initiated with 192 168 250 152 1194  i Aug 230  SENT CONTROL  server    PUSH_REQUEST   status 1   i Aug 2 30 04 PUSH  Received control message     PUSH_REPLY route 10 100 10 1 topology net30 ping 10  ping res  i Aug 230  Options error  Unrecognized option or missing parameter s  in  PUSH OPTIONS  2  topology  2 C  i Aug 230  OPTIONS IMPORT  timers and or timeouts modified  i Aug 530  OPTIONS IMPORT    ifconfig up options modified  i Aug 230  OPTIONS IMPORT  route options modified  i Aug 230  TAP WIN32 device  Local Area Connection 3  opened      Global  12EF532A 3135 4F37 B689 720FEC  i Aug 230  TAP win32 Driver version 8 4  i Aug 230  TAP win32 MTU 1500  i Aug 230  Notified TAP win32 driver to set a DHCP IP netmask of 10 100 10 6 255 255 255 252 on interfac  i Aug 230  Successful ARP Flush on interface  5   12EF532A 3135 4F37 B689 720FE0OB1F713   i Aug 230  TEST ROUTES  0 0 succeeded len 1 ret 0 a 0 u d down  i 230  Route  waiting for TUN TAP interface to come up     TEST ROUTES  0 0 succeeded len 1 ret 0 a 0 u d down  Route  Waiting for TUN TAP interf
119. CE OR OTHERWISE  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE  EVEN IF  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE     SDT Connector License    GNU GENERAL PUBLIC LICENSE  Version 2  June 1991    Copyright  C  1989  1991 Free Software Foundation  Inc   51 Franklin Street  Fifth Floor  Boston  MA 02110 1301  USA    Everyone is permitted to copy and distribute verbatim copies of this license document  but changing it is not allowed     GNU GENERAL PUBLIC LICENSE  TERMS AND CONDITIONS FOR COPYING  DISTRIBUTION AND MODIFICATION    0  This License applies to any program or other work which contains a notice placed by the copyright holder saying  it may be distributed under the terms of this General Public License  The  Program   below  refers to any such  program or work  and a  work based on the Program  means either the Program or any derivative work under  copyright law  that is to say  a work containing the Program or a portion of it  either verbatim or with modifications  and or translated into another language   Hereinafter  translation is included without limitation in the term   modification    Each licensee is addressed as  you      Activities other than copying  distribution and modification are not covered by this License  they are outside its scope   The act of running the Program is not restricted  and the output from the Program is covered only if its contents  constitute a work based on the Program  independent of having been made by running the Program   Wheth
120. Configure Management Controller    724 746 5500   blackbox com Page 268    channels  session Print session information    exec Run list of commands from file  set Set runtime variable for shell and  exec    ipmitool chassis help   Chassis Commands  status  power  identify  policy  restart_cause  poh  bootdev  ipmitool chassis power help   chassis power Commands  status  on  off  cycle  reset  diag  soft    You will find more details on ipmitools at http   ipmitool sourceforge net manpage html    15 11 Custom Development Kit  CDK     As detailed in this manual customers can copy scripts  binaries  and configuration files directly to the  console server     Black Box also freely provides a development kit that allows changes to be made to the software in  console server firmware image  The customer can use the CDK to       generate a firmware image without certain programs  such as telnet  which may be banned by  company policy       generate an image with new programs  such as custom Nagios plug in binaries or company specific  binary utilities       generate an image with custom defaults e g  it may be required that the console server be configured  to have a specific default serial port profile which is reverted to even in event of a factory reset       place configuration files into the firmware image  which cannot then be modified e g     bin config      set  tools update the configuration files in  etc config which are read write  whereas the files in  etc  are read only 
121. DUs  If your PDU is not  on the default list  then you can add support directly  as covered in Chapter 14   Advanced  Configurations  or add the PDU support to either the Network UPS Tools or PowerMan open  source projects     Configure IPMI service processors and BMCs so that all authorized users can use the  Management Console to remotely cycle power and reboot computers  even when their operating  system is unresponsive  To set up IPMI power control  the Administrator first enters the IP  address domain name of the BMC or service processor  for example  a Dell DRAC  in Serial  amp   Network  Network Hosts  then in Serial  amp  Network  RPC Connections specifies the RPC  Type to be IPMI1 5 or 2 0        8 1 2    RPC access privileges and alerts    You can now set PDU and IPMI alerts using Alerts  amp  Logging  Alerts  refer to Chapter 7   You can also  assign which user can access and control which particular outlet on each RPC using Serial  amp  Network   User  amp  Groups  refer Chapter 4      8 1 3    User power management    The Power Manager enables both Users and Administrators to access and control the configured serial  and network attached PDU power strips  and servers with embedded IPMI service processors or BMCs      gt      gt     Select the Manage  Power and the particular Target power device to be controlled  and the  Outlet to be controlled if the RPC supports outlet level control      The outlet status is displayed and you can initiate the Action you want to
122. Dashboard    Manage g     Devices      Port Logs      HostLogs      Power      Terminal    Console Server Settings    Console Server  Mode    Logging Level    Telnet    SSH    Raw TCP    RFC 2217    Unauthenticated    Telnet    Web Terminal    Encrypt Traffic    Authenticate    G  Enable remote network access to the console atthis serial port    level 0   Disabled x  Specify the detail of data to log     Vv    Enable Telnet access    Vv    Enable SSH access    r    Enable raw TCP access    r    Enable RFC 2217 access     r    Enable Telnet access without requiring the user to provide credentials    r  Enable web browser access via Manage   gt  Devices   gt   Oo   Enable PortShare Encryption  Warning  This will override standard RFC 2217 and raw  TCP behaviour   Oo    Enable PortShare Authentication  Warning  This will override standard RFC 2217 and  raw TCP behaviour    Serial     Authentication    Password  Enter password for PortShare authentication    Confirm Password  Re type the password for confirmation   Accumulation    Period  Collect serial data for a period of time  in milliseconds   then transmit any data received    during that time over the network at once          Customize the character used for sending out of band shell commands  The default is     Escape Character    Replace Backspace mj  Substitutes backspace value CTRL    127  with CTRL h  8     Power Menu Ei  Enable shell power command menu  Connect this port to a Managed Device then use   p to run power c
123. Device Settings    Device Type    Click Apply     that have already been configured     Click Add      lt  gt  BLACK B    0X    NETWORK SERVICES    Select the Serial  amp  Network  Environmental menu     Environmental      Specify the device type         Apply this s g 1 use the Environmental page to configure the attached environmental    monitor    System Nam  Uptime  0 day    Firmware   Current User        Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication    Network Hosts Name   Trusted Networks   Cascaded Ports   UPS Connections Connected Via    RPC Connections  Environmental  Managed Devices Description  Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    Temperature Offset    Humidity Offset    System  Administration   SSL Certificates  Configuration Backup  Firmware   IP   Date  amp  Time   Dial   Services   DHCP Server    Alarm  1 Label    Alarm  2 Label    Log Status    lon Rate    Add Environmental Monitor    A descriptive name for the environmental monitor    Serial   Port  4  Port4     Specify the serial port for the environmental monitor    A brief description for the environmental monitor    Fine tuning adjustment for the Temperature Sensor    Fine tuning adjustment for the Humidity Sensor   A label for the first environmental monitor alarm  e g  Door Open   A label for the second environmental monitor alarm  e g  Smoke Alarm  Periodically log environmental status     gt  Enter a Name and optionally a Description for the EMD and s
124. Europe  UK  Japan or Australia   The 12     724 746 5500   blackbox com Page 21    VDC connector from the power supply plugs into the 12VDC  PWR  power socket on the side of the  LES1508A     2 2 2 LES1408A   LES1448A  LES1308A  LES1348A and LES1208A   LES1248A power    The Advanced Console Server models  LES1208A R2  LES1216A R2  LES1232A  LES1248A R2  LES1308A   LES1316A  LES1332A  LES1348A  LES1408A  LES1416A  LES1432A and LES1448A  all have dual universal  AC power supplies with auto failover built in  These power supplies each accept AC input voltage  between 100 and 240 VAC with a frequency of 50 or 60 Hz  The total power consumption per console  server is less than 30W  Two IEC AC power sockets are located at the rear of the metal case  and these  IEC power inlets use conventional IEC AC power cords        Power cords for various regions are available  although the North American power cord is provided by  default  There is a warning notice printed on the back of each unit        A N To avoid electrical shock  connect the power cord grounding conductor to  ground        2 2 2 LES1116A  LES1132A and LES1148A power    The LES1116A  LES1132A and LES1148A models have a built in universal auto switching AC power  supply  This power supply accepts AC input voltage between 100 and 240 VAC with a frequency of 50 or  60 Hz  The power consumption is less than 20W     The LES1116A  LES1132A and LES1148A models have an IEC AC power socket located in the rear of the  metal case  Th
125. Extras E                                           If the remote communications are tunneled with SDT Connector  then you can use Telnet to  securely access these attached devices  refer to the Note below         Note    In Console Server mode  Users and Administrators can use SDT Connector to set up secure  Telnet connections that are SSH tunneled from their client PC workstations to the serial port on  the console server  SDT Connector can be installed on Windows 2000  XP  2003  Vista  and  Windows 7 PCs and on most Linux platforms  You can also set up secure Telnet connections  with a simple point and click     To use SDT Connector to access consoles on the console server serial ports  you configure SDT  Connector with the console server as a gateway  then configure it as a host  Next  you enable  Telnet service on Port  2000   serial port    i e  2001   2048  Refer to Chapter 6 for more details  on using SDT Connector for Telnet and SSH access to devices that are attached to the console  server serial ports        You can also use standard communications packages like PuTTY to set a direct Telnet  or SSH   connection to the serial ports  refer to the Note below         Note    PuTTY also supports Telnet  and SSH  and the procedure to set up a Telnet session is simple   Enter the console server s IP address as the    Host Name  or IP address      Select    Telnet    as the  protocol and set the    TCP port    to 2000 plus the physical serial port number  that is  2001 to  
126. For CLI details refer http   www networkupstools org    e Nagios is a popular enterprise class management tool that provides central monitoring of the  hosts and services in distributed networks  For CLI details refer http   www nagios org    Many components of the console server software are licensed under the GNU General Public License   version 2   which Black Box supports  You may obtain a copy of the GNU General Public License at  http   www  fsf org copyleft gpl html  Black Box will provide source code for any of the components  of the software licensed under the GNU General Public License upon request     The console server also embodies the okvm console management software  This is GPL code and the full  source is available from http   okvm sourceforge net     The console server BIOS  boot loader code  is a port of uboot  which is also a GPL package with source  openly available     The console server CGls  the html code  xml code and web config tools for the Management Console  are  proprietary to Black Box  however the code will be provided to customers  under NDA     Also inbuilt in the console server is a Port Manager application and Configuration tools as described in  Chapters 14 and 15  These both are proprietary to Black Box  but open to customers  as above      The console server also supports GNU bash shell script enabling the Administrator to run custom scripts   GNU bash  version 2 05 0 1  release  arm Black Box linux gnu  offers the following shell comman
127. From the unit command line   vi  etc config inetd conf  Append a line     443 stream tcp nowait root sslwrap  cert  etc config ssI_cert pem  key  etc config ssl_key pem    exec  bin httpd  home httpd     Save the file and signal inetd of the configuration change   kill  HUP    cat  var run inetd pid    The HTTPS server should be accessible from a web client at a URL similar to this  https    lt common name  of unit gt     More detailed documentation about the openssl utility can be found at the website   http   www  openssl org     15 9 Power Strip Control  The console server supports a growing list of remote power control devices  RPCs  that you can    configure using the Management Console as described in Chapter 8  These RPCs are controlled using the  open source PowerMan and Network UPS Tools and with Black Box   s pmpower utility     724 746 5500   blackbox com Page 262    15 9 1 The PowerMan tool    PowerMan provides power management in a data center or compute cluster environment  It performs  operations such as power on  power off  and power cycle via remote power controller  RPC  devices     Synopsis  powerman   option   targets   pm   option   targets     Options   1    on Power ON targets    0    off Power OFF targets      c    cycle Power cycle targets    r    reset Assert hardware reset for targets  if implemented by RPC     f    flash Turn beacon ON for targets  if implemented by RPC       u    unflash_ Turn beacon OFF for targets  if implemented by RPC      I  
128. G is  P rerere mcn      CC Remote IMG4004 m   Retrieve Hosts          Out of band enabled for Remote IMG4004       When you connect to a service on a host behind the console server  or to the console server itself  SDT  Connector will initiate the OoB connection using the provided Start Command  The OoB connection  does not stop  using the provided Stop Command  until you click off Out Of Band under Gateway  Actions  then the status bar will return to its normal color     6 6 Importing  and exporting  preferences    724 746 5500   blackbox com Page 117    To enable the distribution of pre configured client config files  SDT Connector has an Export Import  facility     Ec  SDTConnector           gt  To save a configuration xml file  for backup or for importing into  other SDT Connector clients  select File   gt  Export Preferences and  select the location where you want to save the configuration file     File Help    Edi  ge New Gateway      New Host         Export Preferences         Ext       gt  To import a configuration  select File   gt  Import Preferences and  select the  xml configuration file to install     6 7 SDT Connector Public Key Authentication    SDT Connector can authenticate against an SSH gateway using your SSH key pair instead of requiring you  to enter your password  This is known as public key authentication     To use public key authentication with SDT Connector  first you must add the public part of your SSH key  pair to your SSH gateway      gt  Make su
129. H access to the command line  For these connections to the console server itself   you must configure SDT Connector to access the Gateway itself by setting the Gateway  console server   up as a host  and then configuring the appropriate services      gt  Launch SDT Connector on your PC  Assuming you have already set up the console server as a  Gateway in your SDT Connector client  with username  password etc    select this newly added  Gateway and click the Host icon to create a host  Or  select File   gt  New Host      gt  Enter 127 0 0 1 as the Host Address and provide details in Descriptive Name Notes  Click OK     724 746 5500   blackbox com Page 113        Edit SDT Host                  Host Address 127 0 0 1                                                                                 Services  J  HTTP  T  HTTPS  V  Telnet  V  SSH  VNC E RDP   E  Dell RAC  E  Dell Server Administrator   E  Dell IT Assistant E soL  IBM RSA II El IBM Director  E  IBM AMM    HP iLo2  E VMWare Server  E  TCP Port 1494  Serial 2 SSH E Serial 2 Telnet  Serial 3 SSH E Serial 3 Telnet  E  Serial 4 SSH E Serial 4 Telnet  TCP Port 903                  Descriptive Name  Local Host          Description Notes  Manual entry  connections  to the console server itself                                        gt  Click the HTTP or HTTPS Services icon to access the Management Console  and or click SSH  or Telnet to access the command line console        Note  To enable SDT access to the console  you must
130. LES1108A LES1208A R2 LES1308A LES1408A LES1508A    e   LES1116A LES1216A R2 LES1316A LES1416A   lt SBLACK BOX LES1132A LES1232A LES1332A LES1432A    NETWORK SERVICES LES1148A LES1248A R2 LES1348A LES1448A          Customer Order toll free in the U S   Call 877 877 BBOX  outside U S  call 724 746 5500   Support FREE technical support 24 hours a day  7 days a week  Call 724 746 5500 or fax 724 746 0746    Mailing address  Black Box Corporation  1000 Park Drive  Lawrence  PA 15055 1018    Information Web site  www blackbox com e   E mail  info blackbox com       Value Line and Advanced Console Servers Manual    Trademarks Used in this Manual    Black Box and the Double Diamond logo are registered trademarks of BB Technologies  Inc   Cisco is a registered trademark of Cisco Technology  Inc     Mac is a registered trademark of Apple Computers  Inc    Linux is a registered trademark of Linus Torvalds    Internet Explorer  Windows  Windows Me  Windows NT  and Windows Vista are a registered trademarks of Microsoft Corporation   Nagios is a registered trademark of Nagios Enterprises LLC    Java and Solaris are trademarks of Sun Microsystems  Inc    Unix is a registered trademark of X Open Company Ltd     Any other trademarks mentioned in this manual are acknowledged to be the property of the trademark owners        Page 2 724 746 5500   blackbox com    Value Line and Advanced Console Servers Manual    We re here to help  If you have any questions about your application  or our product
131. Logs and the Host to be displayed     13 3 Serial Port Terminal Connection    There are two methods available for accessing the console server command line and devices attached to  the console server serial ports  directly from a web browser         The Web Terminal service uses AJAX to enable the web browser to connect to the console  server using HTTP or HTTPS  as a terminal   without the need for additional client installation on  the user s PC        The SDT Connector service launches a pre installed SDT Connector client on the user s PC to  establish secure SSH access  then uses pre installed client software on the client PC to connect  to the console server    Web browser access is available to users who are a member of the admin or users groups     13 3 1 Web Terminal    The AJAX based Web Terminal service may be used to access the console server command line or  attached serial devices        Note  Any communication using the Web Terminal service using HTTP is unencrypted and not secure   The Web Terminal connects to the command line or serial device using the same protocol that is  being used to browse to the Management Console  i e  if you are browsing using an https    URL   this is the default   the Web Terminal connects using HTTPS        13 3 1 1 Web Terminal to Command Line  To enable the Web Terminal service for the console server   gt  Select System  Firewall   gt  Check Enable Web Terminal and click Apply  Administrators can now communicate directly with the
132. Method C Static       The mechanism to acquire IP settings    ces  m IP Address  Alerts  amp  Logging         PortLog A statically assigned IP address       Auto Response Subnet Mask Co eer      SMTP  amp  SMS      SNMP A statically assigned network mask      Gateway   System       r   Default gateway for the unit  Please only set this on one interface     Administration       SSL Certificates Primary DNS     Configuration Backup       Firmware A statically assigned primary name server     724 746 5500   blackbox com Page 39       Note You can configure the second Ethernet port as either a gateway port or as an OOB Failover port   but not both   Make sure you did not allocate Network 2 as the Failover Interface when you  configured the principal Network connection on the System  IP menu     The management gateway function is now enabled with default firewall and router rules  By default   these rules are configured so the Management LAN can only be accessible by SSH port forwarding  This  ensures that the remote and local connections to Managed Devices on the Management LAN are secure   You can also configure the LAN ports in bridged mode  as described later in this chapter  or you can  configure them from the command line     3 6 2 Configure the DHCP server    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A   LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console servers also host a DHCP server which  by default is disabled  T
133. NC bundled  or have  third party VNC software that you can download     6 9 2 Install  configure and connect the VNC Viewer    VNC is truly platform independent so a VNC Viewer on any operating system can connect to a VNC  Server on any other operating system  There are Viewers  and Servers  from a wide selection of sources   for example  UltraVNC TightVNC or RealVNC  for most operating systems  There are also a wealth of  Java viewers available so that any desktop can be viewed with any Java capable browser   http   en wikipedia org wiki VNC lists many of the VNC Viewers sources       gt  Install the VNC Viewer software and set it up for the appropriate speed connection        Note To make VNC faster  when you set up the Viewer       Set encoding to ZRLE  if you have a fast enough CPU       Decrease color level  e g  64 bit       Disable the background transmission on the Server or use a plain wallpaper    Refer to http   doc uvnc com for detailed configuration instructions        724 746 5500   blackbox com Page 125     gt  To establish the VNC connection  first configure the VNC Viewer  entering the VNC Server IP  address     A  When the Viewer PC is connected to the console server thru an SSH tunnel  over the public Internet   or a dial in connection  or private network connection   enter localhost  or 127 0 0 1  as the IP VNC  Server IP address  and the source port you entered when setting SSH tunneling  port forwarding  in  Section 6 2 6  e g   1234    TE  Win32 Viewer 
134. NETWORK SERVICES       Sores Nor Current System time  23 39 21 Sep 14  2011      Serial Port Time Zone      Users  amp  Groups   _     Authentication wma Zona Africa Abidjan  r     Network Hosts Select your ti j      Trusted Networks        Call Home          Cascaded Ports Set Timezone       UPS Connections     RPC Connections     Environmental     Managed Devices  Date and Time                Alerts  amp  Logging 5 Year 2000      Port Log     Alerts Month January  E      SMTP  amp  SMS a     SNMP Day vlg  System 5 Hour oie     Administration     SSL Certificates Minute MIr     Configuration Backup       Firmware SA     IP Set Time       Date  amp  Time     Dial     Firewall     Nagios     Configure Dashboard Network Time Protocol  Enable NTP  Same nable Network Time Protocol Support      PortAccess     Active Users NTP Server    r Siia ss ofthe remote NTP Server           Apply Settings     gt  Select the System  Date  amp  Time menu option      gt  Manually set the Year  Month  Day  Hour and Minute using the Date and Time selection boxes   then click Set Time     The gateway can synchronize its system time with a remote time server using the Network Time  Protocol  NTP   Configuring the NTP time server ensures that the console server clock will be accurate  soon after the Internet connection is established  Also if NTP is not used  the system clock will reset  randomly every time the console server is powered up  To set the system time using NTP      gt  Select the Enable 
135. NTP checkbox on the Network Time Protocol page    gt  Enter the IP address of the remote NTP Server and click Apply Settings   You must now also specify your local time zone so the system clock can show local time  and not UTP       gt  Set your appropriate region locality in the Time Zone selection box and click Apply     11 4 Configuration Backup    We recommend that you back up the console server configuration whenever you make significant  changes  such as adding new Users or Managed Devices  or before performing a firmware upgrade         gt  Select the System  Configuration Backup menu option or click the       Note You can also back up the configuration files from the command line  refer to Chapter 14         724 746 5500   blackbox com Page 198       System Name  les1308a Model LES1308A Firmware  3 5 3u5 re   0    lt SBLACK BOX Uptime  0 days  20 hours  49 mins  23 secs Current User  root    Bacup Log Out  NETWORK SERVICES       Serial  amp  Network         Serial Port      Users  amp  Groups     Autheni     Network    Remote Backup Local Backup XML Configuration          Remote Backup           Tru  etworks Last Remote Backup Never     IPsec V     OpenVPN Save Backup       PPTP VPN    i  e          Buhi Choose File   No file  an Saved configuration bac     Managed Devices _Restore      With all console servers  you can save the backup file remotely on your PC and you can restore  configurations from remote locations      gt  Click Save Backup in the Remote Configurat
136. OMETHING NASTY        C  CCC CECOOECECEOCECOOLECEEOCECOOECEEECECEEEOE   Someone could be eavesdropping on you right now  man in the middle attack    It is also possible that the RSA host key has just been changed    The fingerprint for the RSA key sent by the remote host is  ab 7e 33 bd 85 50 5a 43 0b e0 bd 43 3f 1c a5 f8    Please contact your system Administrator    Add correct host key in   ssh known_hosts to get rid of this message    Offending key in   ssh known_hosts 1   RSA host key for remhost has changed and you have requested strict checking     Host key verification failed     724 746 5500   blackbox com Page 257    If the host key has been legitimately changed  it can be removed from the    ssh known_hosts file and  the new fingerprint added  If it has not changed  this indicates a serious problem that should be  investigated immediately     15 6 7 SSH tunneled serial bridging    You have the option to apply SSH tunneling when two Black Box console servers are configured for serial  bridging          Ethernet LAN       Serially connected device COM Port connected     e g  security appliance  control PC S    As detailed in Chapter 4  the Server console server is setup in Console server mode with either RAW or  RFC2217 enabled and the Client console server is set up in Serial Bridging Mode with the Server Address   and Server TCP Port  4000   port for RAW or 5000   port   for RFC2217  specified         gt  Select SSH Tunnel when configuring the Serial Bridging Setti
137. OOTNODE SLASTFIELDTEXTS  NUMBER COUNTER        while read LINE    do  config  s     echo  SLINE    sed  e  s SLASTFIELDTEXTS  NUMBER       COUNTER   SLASTFIELDTEXTS  NUMBER COUNTER 1         e  s           done   let COUNTER      done      deleting last user  config  d SROOTNODE SLASTFIELDTEXTSTOTAL      Modifying item total   config  s  STOTALNODE SNEWTOTAL     echo Done   exit O  else   echo  error  item being deleted has an index greater than total items  Increase the total count  variable     exit O    fi   15 1 6 Power Cycle any device when a ping request fails   The ping detect script is designed to run specified commands when a monitored host stops responding  to ping requests     The first parameter taken by the ping detect script is the hostname IP address of the device to ping  Any  other parameters are then regarded as a command to run whenever the ping to the host fails  ping   detect can run any number of commands     Below is an example using ping detect to power cycle an RPC  PDU  outlet whenever a specific host fails  to respond to a ping request  The ping detect runs from  etc config rc local to make sure that the  monitoring starts whenever the system boots     Suppose we have a serially controlled RPC connected to port01 on a console server and have a router  powered by outlet 3 on the RPC  and the router has an internal IP address of 192 168 22 2   The  following instructions will show you how to continuously ping the router  When the router fails to  resp
138. P  addresses   from the network  typically the LAN  that remote users are assigned while connected  to the Console server    Enter the desired value of the Maximum Transmission Unit  MTU  for the PPTP interfaces into  the MTU field  defaults to 1400     In the DNS Server field  enter the IP address of the DNS server that assigns IP addresses to  connecting PPTP clients    In the WINS Server field  enter the IP address of the WINS server that assigns IP addresses to  connecting PPTP client    724 746 5500   blackbox com Page 78     gt  Enable Verbose Logging to assist in debugging connection problems   gt  Click Apply Settings    4 11 2 Adda PPTP user   gt  Select Users  amp  Groups on the Serial  amp  Networks menu and complete the fields as covered in  section 4 2      gt  Ensure the pptod Group has been checked  to allow access to the PPTP VPN server  Note    users in this group will have their password stored in clear text      gt  Keep note of the username and password for when you need to connect to the VPN connection   gt  Click Apply    4 11 3 Set up a remote PPTP client    Ensure the remote VPN client PC has Internet connectivity  To create a VPN connection across the  Internet  you must set up two networking connections  One connection is for the ISP  and the other  connection is for the VPN tunnel to the console server        Note  This procedure sets up a PPTP client in the Windows 7 Professional operating system  The steps  may vary slightly depending on your netw
139. PP clients       Set the PPP link up with TCP IP as the only protocol enabled     Specify that the Server will assign IP address and do DNS   a Do not set up the console server PPP link as the default for Internet connection        5 2 OoB broadband access    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A   LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console servers have a second Ethernet port   Network 2  that you can configure for alternate and OoB  out of band  broadband access  With two    724 746 5500   blackbox com Page 85    active broadband access paths to the console server  if you are unable to access it through the primary  management network  Network or Network1   you can still access it through the alternate broadband    path  for example  a T1 link      5 3     gt      gt     Broadband Ethernet Failover    On the System  IP menu select Network 2 and configure the IP Address  Subnet Mask   Gateway  and DNS with the access settings for the alternate link     Make sure that when you configure the principal Network 1 Settings connection  the Failover  Interface is set to None     The second Ethernet port on the LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A   LES1316A  LES1332A  LES1348A  LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console  servers can also be configured for failover to ensure transparent high availability      lt  gt  BLACK    BOX    NETWORK SERVICES    Serial  amp  Network  Se
140. Response      gt  Click on SMS Command as the Check Condition     gt  Specify which Phone Number  in international format  of the phone sending the SMS  message     gt  Set the Incoming Message Pattern  PCRE regular expression  to match to create trigger  event    724 746 5500   blackbox com Page 139       Note  The SMS command trigger condition can only be set if there is an internal or external USB cellular  modem detected       7 3    Trigger Actions    To configure the sequence of actions that is to be taken in the event of the trigger condition      gt  For a nominated Auto Response   with a defined Check Condition   click on Add Trigger  Action  e g  Send Email or Run Custom Script  to select the action type to be taken  Then  configure the selected action  as detailed in the following sections      gt  Each action is configured with a nominated Action Delay Time which specifies how long  in  seconds  after the Auto Response trigger event to wait before performing the action  So you  can add follow on actions to create a sequence of actions that will be taken in the event of  the one trigger condition     gt  To edit  or delete  an existing action  click the Modify  or Delete  icon in the Scheduled  Trigger Action table    Trigger Actions                   Add Trigger   Email Action Scheduled Trigger Actions  Action Action Delay Action Action Modify Delete  Send a Name ia  acia Unique name for this action Sl ee   Action D nouen   Delay       Time Time after the Auto Res
141. Response Settings menu    7 2 1 UPS Power Supply    To use the properties of any attached UPS as the trigger event    gt  Click on UPS   Power Supply as the Check Condition     gt  Select UPS Power Device Property  Input Voltage  Battery Charge    Load    Input  Frequency Hz or Temperature in   C  that will checked for the trigger     gt  Specify the Trigger value that the check measurement must exceed or drop below to trigger  the AutoResponse     gt  Select Comparison type as being Above Trigger Value or Below Trigger Value to trigger     gt  Specify any Hysteresis factor that is to be applied to environmental measurements  e g  if an  Auto Response was set up with a trigger event of a battery charge below 20  with a  Hysteresis of 5 then the trigger condition would not be seen as having been resolved till the  battery charge was above 25       gt  Check Save Auto Response       SNMP       Check UPS Power Check    Conditions Power Device  input Voltage V        epee S Prope   Environmental pay Power Device Property to perform check on       Alarms Digital  Inputs    Trigger value for  the check    Comparison type       Hysteresis       Save Auto Response  Return to Auto Response List                tatus     Environmental Status          Note  Before configuring UPS checks in Auto Response you first must configure the attached UPS       7 2 2 UPS Status  To use the alert state of any attached UPS as the Auto Response trigger event      gt  Click on UPS Status as the Check C
142. S scripts Si     fi    done    This code shows that there are two alternative scripts that can be run instead of the default one  This  code first checks whether a file   etc config scripts pattern alert S ALERT_PORTNAME   exists  The  variable S ALERT_PORTNAME  must be replaced with  port01  or  port13  or whichever port the alert  should run for  If this file cannot be found  the script checks whether the file    etc config scripts portmanager pattern alert  exists  If either of these files exists  the script calls the  exec command on the first file that it finds and runs that custom file script instead     As an example  you can copy the  etc scripts portmanager pattern alert script file to   etc config scripts portmanager pattern alert      cd     mkdir  etc config scripts  if the directory does not already exist     cp  etc scripts portmanager pattern alert  etc config scripts portmanager pattern alert    The next step will be to edit the new script file  First  open the file  etc config scripts portmanager   pattern alert using vi  or any other editor   and remove the lines that check for a custom script  the code  from above   This will prevent the new custom script from repeatedly calling itself  After these lines have  been removed  edit the file  or add any additional scripting to the file     724 746 5500   blackbox com Page 237    15 1 3 Example script   Power Cycling on Pattern Match    For example  we have an RPC  PDU  connected to port 1 on a console server an
143. S1232A  32 RJ 45 RS 232 serial ports  LES1448A  LES1348A  LES1248A R2  48 RJ 45 RS 232 serial ports  LES1116A  16 RJ 45 RS 232 serial ports   LES11132A  32 RJ 45 RS 232 serial ports   LES1148A  48 RJ 45 RS 232 serial ports   LES1108A 8 RJ 45 RS 232 serial ports   All models  1 DB 9 RS 232 console  modem serial port       Serial Baud Rates    RJ45 ports   50 to 230 400bps  DB9 port   2400 to 115 200 bps       Ethernet Connectors          LES1508A  LES1408A 16A 32A 48A  LES1308A 16A 32A 48A   LES1208A R2 16A R2 32A 48A R2   Two RJ 45 10 100Base T  Ethernet ports   LES1108A 16A 32A 48A  One RJ 45 10 100Base T Ethernet ports    724 746 5500   blackbox com Page 277            Appendix C Safety  amp  Certifications    Please take care to follow the safety precautions below when installing and operating the console  server       Do not remove the metal covers  There are no operator serviceable components inside  Opening or  removing the cover may expose you to dangerous voltage which may cause fire or electric shock     Refer all service to Black Box qualified personnel       To avoid electric shock the power cord protective grounding conductor must be connected through  to ground       Always pull on the plug  not the cable  when disconnecting the power cord from the socket     Do not connect or disconnect the console server during an electrical storm  We recommend that you use  a surge suppressor or UPS to protect the equipment from transients    FCC Warning Statement   This devic
144. Set up central Nagios server    SDT for Nagios requires a central Nagios server running Nagios 2 x or 3 x  Nagios 1 x is not supported   The Nagios server software is available for most major distributions of Linux using the standard package  management tools  Your distribution will have documentation available on how to install Nagios  This is  usually the quickest and simplest way to get up and running     Note that you will need the core Nagios server package  and at least one of the NRPE or NSCA add ons   NSCA is required to use the alerting features of the Black Box distributed hosts  installing both NRPE and  NSCA is recommended     You will also require a web server such as Apache to display the Nagios web UI  and this may be installed  automatically depending on the Nagios packages      Or  you may wish to download the Nagios source code directly from the Nagios website  and build and  install the software from scratch  The Nagios website  http   www nagios org  has several Quick Start  Guides that walk through this process     Once you are able to browse to your Nagios server and see its web UI and the local services it monitors  by default  you are ready to continue     724 746 5500   blackbox com Page 182    10 2 2 Set up distributed console servers    This section provides a brief walkthrough on configuring a single console server to monitor the status of  one attached network host  a Windows IIS server running HTTP and HTTPS services  and one serially  attached d
145. System  Administration and click Apply     gt  Click the Commit Config button in top right hand corner of the screen to display the System   Commit Configuration screen    724 746 5500   blackbox com Page 201     gt  Click Apply to run the systemsettings configurator    The Commit Config button will no longer be displayed in the top right hand corner of the screen and  configurations will no longer be queued     11 6 FIPS Mode    The Advanced Console Servers  LES1208A R2  LES1216A R2  LES1232A  LES1248A R2  all use an  embedded cryptographic module that has been validated to meet the FIPS 140 2 standards        Note The US National Institute of Standards and Technology  NIST  publishes the FIPS  Federal  Information Processing Standard  series of standards  FIPS 140 1 and FIPS 140 2 are both  technical standards and worldwide de facto standards for the implementation of cryptographic  modules  These standards and guidelines are issued by NIST for use government wide  NIST  develops FIPS when there are compelling Federal government requirements such as for security  and interoperability and there are no acceptable industry standards or solutions     Advanced Console Servers  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A   LES1316A  LES1332A  LES1348A  LES1208A R2  LES1216A R2  LES1232A  LES1248A R2   use an embedded OpenSSL cryptographic module that has been validated to meet the FIPS 140   2 standards and has received Certificate  1051       When configured in FIPs mode al
146. Test Password       Apply    PAM  Pluggable Authentication Modules     The console server supports RADIUS  TACACS   and LDAP for two factor authentication via PAM   Pluggable Authentication Modules   PAM is a flexible mechanism for authenticating users  Nowadays  a  number of new ways of authenticating users have become popular  The challenge is that each time a  new authentication scheme is developed  you need to rewrite all the necessary programs  login  ftpd     etc   to support it     PAM provides a way to develop programs that are independent of authentication scheme  These  programs need    authentication modules    to be attached to them at run time in order to work  Which  authentication module is attached depends on the local system setup and is at the discretion of the local    Administrator     The console server family supports PAM with the following modules added for remote authentication     RADIUS    724 746 5500   blackbox com      pam_radius_auth     http   www freeradius org pam_radius_auth      Page 175    TACACS    pam_tacplus  http   echelon pl pubs pam_tacplus html   LDAP  pam_Idap  http   www padl com OSS pam_lIdap html   Further modules can be added as required     Changes may be made to files in  etc config pam d  that will persist  even if the authentication  configurator runs      gt  Users added on demand     When a user attempts to log in  but does not already have an account on the console server  a  new user account will be created  This account
147. This allows the console server to  provide full outgoing connectivity for internal devices using a single IP Address on the external network     By default IP Masquerading is disabled for all networks  To enable masquerading    gt  Select Forwarding  amp  Masquerading panel on the System  Firewall menu     gt  Check Enable IP Masquerading  SNAT  on the network interfaces where masquerading is be  enabled    Generally this masquerading would be applied to any interface that is connecting with a public network  such as the Internet     5 8 2 Configuring client devices    Client devices on the local network must be configured with Gateway and DNS settings  This can be  done statically on each device  or using DHCP   Manual Configuration     Manually set a static gateway address  being the address of the console server  and set the DNS server  address to be the same as used on the external network i e  if the console server is acting as an internet  gateway or a cellular router  then use the ISP provided DNS server address   DHCP Configuration     gt  Navigate to the System IP page     gt  Click the tab of the interface connected to the internal network  To use DHCP  a static address  must be set  check that the static IP and subnet mask fields are set     System Name  a Model  LES1216A Firmware  3 4 2     lt SBLA K X Uptime  2 days  1 18 mins  29 secs Current User  root  2 amp 7    NETWORK SERVICES       Serial  amp  Network         Serial Port      Users  amp  Groups     Authen
148. U  SHOULD THE  PROGRAM PROVE DEFECTIVE  YOU ASSUME THE COST OF ALL NECESSARY SERVICING   REPAIR OR CORRECTION     12  INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING  WILL ANY COPYRIGHT HOLDER  OR ANY OTHER PARTY WHO MAY MODIFY AND OR  REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE  BE LIABLE TO YOU FOR DAMAGES   INCLUDING ANY GENERAL  SPECIAL  INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING    724 746 5500   blackbox com Page 283    OUT OF THE USE OR INABILITY TO USE THE PROGRAM  INCLUDING BUT NOT LIMITED  TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY  YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER    PROGRAMS   EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGES     END OF TERMS AND CONDITIONS    724 746 5500   blackbox com Page 284    724 746 5500   blackbox com Page 285    Black Box Tech Support  FREE  Live  24 7        Tech support the    way it should be           a    Great tech support is just 30 seconds away at 724 746 5500 or blackbox com      lt   BLACK BOX    About Black Box   Black Box Network Services is your source for an extensive range of networking and infrastructure products  You ll find everything  from cabinets and racks and power and surge protection products to media converters and Ethernet switches all supported by  free  live 24 7 Tech support available in 30 seconds or less        Copyright 2012  All rights reserved  Black Box  and the Double Diam
149. a clean restart of the modem and its services to work around any  carrier issues     Modem Watchdog   Advanced    This feature configures a service which will periodically ping a configurable IP address  If a threshold number  of attempts fail  the service will cause the unit to reboot  This can be used to force a clean restart of the  modem and its services to work around any carrier issues     Enable watchdog r    Configure a service to reboot the unit if a configurable number of ping attempts fail  Address  IP address to periodically ping  Threshold    Number of failed ping attempts required before rebooting       Ping count    Number of pings per attempt  Defaults to 5          Period    Number of seconds to wait between attempts  Defaults to 30    Apply    724 746 5500   blackbox com Page 92    5 7 Cellular Operation    When set up as a console server the 3G cellular modem can be set up to connect to the carrier in either     Failover mode  in this case a dial out cellular connection is only established in event of a ping failure      OOB mode  In this mode the dial out connection to the carrier cellular network is always on   awaiting  any incoming access  from a remote site wanting to access to the console server or attached serial  consoles network hosts       Cellular router mode  Again in this case the dial out connection to the carrier cellular network is always  on  but IP traffic is routed between the cellular connected network and the console server   s local  n
150. ables   Send a signal to a process to end gracefully  Make links between files   Begin session on the system   Black Box loopback diagnostic command  Black Box loopback diagnostic command  Black Box loopback diagnostic command  Black Box loopback diagnostic command  Black Box loopback diagnostic command  Black Box loopback diagnostic command  List directory contents   Send and receive mail   Make directories   Create an MS DOS file system under Linux  Make block or character special files   File perusal filter for crt viewing   Mount a file system   SMTP mail client   Move  rename  files   TCP IP Swiss army knife   Upgrade firmware on ucLinux platforms using the blkmem interface  Print network connections  routing tables  interface statistics etc  Network Time Protocol  NTP  daemon    724 746 5500   blackbox com Page 272          pgrep  pidof   ping   ping6   pkill  pmchat  pmdeny  pminetd  pmloggerd    pmshell    pmusers  portmanager  portmap  pppd   ps     pwd    reboot    rm     rmdir    routed  routed  routef  routel  rtacct  rtmon   scp   sed    setmac  setserial  sh  showmac  sleep    smbmnt  smbmount  smbumount  snmpd  snmptrap  sredird   ssh  ssh keygen  sshd  sslwrap  stty    stunnel       Display process es  selected by regex pattern   Find the process ID of a running program   Send ICMP ECHO_REQUEST packets to network hosts   IPv6 ping   Sends a signal to process es  selected by regex pattern   Black Box command similar to the standard chat command  via portmanager
151. ablished between a roaming windows client and a  console server within a data centre     Configuration of OpenVPN can be complex so a simple GUI interface is provided for basic set up as  described below  However for more detailed information on configuring OpenVPN Access server or client  refer to the HOW TO and FAQs at http   www openvpn net    4 10 1 Enable the OpenVPN   gt  Select OpenVPN on the Serial  amp  Networks menu     gt  Click Add and complete the Add OpenVPN Tunnel screen    724 746 5500   blackbox com Page 71        NETWORK SERVICES       Senet Add OpenVPN Tunnel       Alerts  amp  Logging  iguration Met PKI  X 509 Cortificates        Client Details     gt  Enter any descriptive name you wish to identify the OpenVPN Tunnel you are adding  for  example NorthStOutlet  VPN     gt  Select the Device Driver to be used  either Tun  P or Tap Ethernet  The TUN  network tunnel   and TAP  network tap  drivers are virtual network drivers that support IP tunneling and Ethernet  tunneling  respectively  TUN and TAP are part of the Linux kernel      gt  Select either UDP or TCP as the Protocol  UDP is the default and preferred protocol for  OpenVPN      gt  In Tunnel Mode  nominate whether this is the Client or Server end of the tunnel  When running  as a server  the advanced console server supports multiple clients connecting to the VPN server  over the same port      gt  In Configuration Method  select the authentication method to be used  To authenticate using  certificat
152. ace to come up     TEST ROUTES  1 1 succeeded len 1 ret 1 a 0 u d up              gt  Once established  the OpenVPN icon will display a message notifying of the successful  connection and assigned IP  This information  as well as the time the connection was established   is available anytime by scrolling over the OpenVPN icon          1M4216_client is now connected    7  Assigned IP  10 100  10 6 i          Note  An alternate OpenVPN Windows client can be downloaded from  http   www  openvpn net index php openvpn client downloads  html  Refer to  http   www  openvpn net index php openvpn clien howto openvpn client htm  for help    724 746 5500   blackbox com Page 76      OpenVPN Client E       QPENVPN       Access Status Settings       Server Address        lt  lt    W Connection Profiles AH                   4 11 PPTP VPN    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A   LES1208A R2  LES1216A R2  LES1232 and LES1248A R2 console servers include a PPTP  Point to Point  Tunneling Protocol  server  PPTP is typically used for communications over a physical or virtual serial  link  The PPP endpoints define a virtual IP address to themselves  Routes to networks can then be  defined with these IP addresses as the gateway  which results in traffic being sent across the tunnel   PPTP establishes a tunnel between the physical PPP endpoints and securely transports data across the  tunnel     The strength of PPTP is its ease of configuratio
153. ached devices  hosts   The Administrator must configure access privileges for each of these devices   and specify the services that can be used to control the devices  The Administrator can also set up new  users and specify each user   s individual access and control privileges     Network  connected     HTTP   HTTPS  IPMI   ALOM  SOL   VNC  RDP  SSH  X  Telnet     Serial  connected       This chapter covers each of the steps in configuring hosts and serially attached devices     Configure Serial Ports   setting up the protocols to be used in accessing serially connected devices   Users  amp  Groups   setting up users and defining the access permissions for each of these users   Authentication   covered in more detail in Chapter 9    Network Hosts   configuring access to network connected devices  referred to as hosts    Configuring Trusted Networks   nominate user IP addresses    Cascading and Redirection of Serial Console Ports    Connecting to Power  UPS PDU and IPMI  and Environmental Monitoring  EMD  devices   Managed Devices   presents a consolidted view of all the connections    IPSec     enabling VPN connection    OpenVPN connection    PPTP connection    4 1 Configure Serial Ports    To configure a serial port  you must first set the Common Settings  the protocols and the RS 232  parameters  such as baud rate   that will be used for the data connection to that port     Select what mode the port is to operate in  You can set each port to support one of five operating 
154. alert gets triggered  specific scripts get called  These scripts all reside in  etc scripts    Below is a list of the default scripts that get run for each applicable alert       Fora connection alert  when a user connects or disconnects from a port or network host     etc scripts portmanager user alert  for port connections  or  etc scripts sdt user alert  for host  connections       Fora signal alert  when a signal on a port changes state    etc scripts portmanager signal alert      Fora pattern match alert  when a specific regular expression is found in the serial ports character  stream    etc scripts portmanager pattern alert      Fora UPS status alert  when the UPS power status changes between on line  on battery  and low  battery    etc scripts ups status alert      Fora environmental  power and alarm sensor alerts  temperature  humidity  power load  and  battery charge alerts    etc scripts environmental alert      For an interface failover alert   etc scripts interface failover alert    All of these scripts do a check to see whether you have created a custom script to run instead  The code  that does this check is shown below  an extract from the file  etc scripts portmanager pattern alert        If there s a user configured script  run it instead  scripts 0    etc config scripts pattern alert S ALERT_PORTNAME    scripts 1    etc config scripts portmanager pattern alert   for   i 0   i  lt  S  scripts       i       do  if    f  S scripts SiJ      then  exec  bin sh  
155. ame     All passwords are saved in plaintext except the user passwords and the system passwords  which are    encrypted     724 746 5500   blackbox com Page 215       Note  The config command does not verify whether the nodes edited added by the user are valid  This  means that any node may be added to the tree  If a user runs the following command        bin contig  s contig fruit apple sweet    The configurator will not complain  but this command is useless  When the configurators are run   to turn the config xml file into live config  they will simply ignore this  lt fruit gt  node  Administrators  must make sure of the spelling when typing config commands  Incorrect spelling for a node will  not be flagged        Most configurations made to the XML file will be immediately active  To make sure that all configuration  changes are active  especially when editing user passwords  run all the configurators        bin config  a  For information on backing up and restoring the configuration file  refer to Chapter 15  Advanced  Configuration   14 2 Serial Port configuration    The first set of configurations you need to make to any serial port are the RS 232 common settings  For  example  setup serial port 5 to use the following properties     Baud Rate 9600  Parity None  Data Bits 8   Stop Bits 1   label Myport  log level 0  protocol RS232  flow control None    To do this  use the following commands       config  s config ports port5 speed 9600     config  s config ports port5 p
156. an be created on a host system and copied to the Management  Console device using scp  Alternatively  login to the Management Console and use ftp or wget to  transfer files     Here is a brief description of the elements of the XML entries in  etc config powerstrips xml      lt powerstrip gt    lt id gt Name or ID of the device support lt  id gt    lt outlet port  port id 1  gt Display Port 1 in menu lt  outlet gt    lt outlet port  port id 2  gt Display Port 2 in menu lt  outlet gt      lt on gt script to turn power on lt  on gt    lt off gt script to power off lt  off gt    lt cycle gt script to cycle power lt  cycle gt    lt status gt script to write power status to  var run power status lt  status gt    lt speed gt baud rate lt  speed gt    lt charsize gt character size lt  charsize gt    lt stop gt stop bits lt  stop gt    lt parity gt parity setting lt  parity gt    lt  powerstrip gt   The id appears on the web page in the list of available devices types to configure     The outlets describe targets that the scripts can control  For example  a power control board may  control several different outlets  The port id is the native name for identifying the outlet  This value will  be passed to the scripts in the environment variable outlet  allowing the script to address the correct  outlet     There are four possible scripts  on  off  cycle and status     When a script is run  its standard input and output is redirected to the appropriate serial port  The  script receives 
157. an earlier version      gt     VV VV V WV    11 3    The Firmware version is displayed in each page   s header    Or select Status  Support Report and note the Firmware Version    To upgrade  you first must download the latest firmware image from the Black Box web site   Save this downloaded firmware image file to a system on the same subnet as the console server   Download and read the release_notes txt for the latest information    To upload the firmware image file to your console server  select System  Firmware     Specify the address and name of the downloaded Firmware Upgrade File  or Browse the local  subnet and locate the downloaded file     Click Apply and the console server appliance will perform a soft reboot and start upgrading the  firmware  This process will take several minutes     After the firmware upgrade completes  click here to return to the Management Console  Your  console server will have retained all its pre upgrade configuration information     Configure Date and Time    We recommend that you set the local Date and Time in the console server as soon as it is configured   Features like Syslog and NFS logging use the system time for time stamping log entries  while certificate  generation depends on a correct Timestamp to check the validity period of the certificate     724 746 5500   blackbox com Page 197     a  gt  System Name  les1216a Model  6A Firmware  3 4 2 N  Ss Uptime  2 days  16 hours  16 mins   Current User root   a        lt  BLACK BOX Aa    
158. an provide the secure SSH connections to the console servers and secure  tunnels to connected devices       PuTTY is a complete  though not very user friendly  freeware implementation of SSH for Win32 and  UNIX platforms       SSHTerm is a useful open source SSH communications package     SSH Tectia is leading end to end commercial communications security solution for the enterprise       Reflection for Secure IT  formerly F Secure SSH  is another good commercial SSH based security  solution     For example  the steps below show how to establish an SSH tunneled connection to a network  connected device using the PuTTY client software     R PuTTY Configuration          Basic options for your PuTTY session  Specify the destination you want to connect to  Host Name  or IP address  Port   192 168 252 202 22  Connection type     Raw Telnet Rlogin    SSH Serial   Load  save or delete a stored session  Saved Sessions          Default Settings       toad       Close window on exit   D Always    Never     Only on clean exit                            724 746 5500   blackbox com Page 132    In the Session menu  enter the IP address of the console server in the Host Name or IP address  field       For dial in connections  this IP address will be the Local Address that you assigned to the  console server when you set it up as the Dial In PPP Server       For Internet  or local VPN connections  connections  this will be the console server   s public IP  address     Select the SSH Protocol
159. and cannot be modified    The CDK essentially provides a snapshot of the Black Box build process  taken after the programs have  been compiled and copied to a temporary directory romfs  just before the compressed file systems are  generated  You can obtain a copy of the Black Box CDK for the particular appliance you are working with  from Black Box       Note The CDK is free        15 12 Scripts for Managing Slaves    When the console servers are cascaded the Master is in control of the serial ports on the Slaves  and the  Master   s Management Console provides a consolidated view of the settings for its own and all the  Slave   s serial ports  The Master does not provide a fully consolidated view  for example  Status  Active  Users only displays those users active on the Master   s ports and you will need to write a custom bash  script that parses the port logs if you want to find out who   s logged in to cascaded serial ports from the  master     You will probably also want to enable remote or USB logging  because local logs only buffer 8K of data  and don   t persist between reboots     724 746 5500   blackbox com Page 269    This script would  for example  parse each port log file line by line  each time it sees    LOGIN  username      it adds username to the list of connected users for that port  each time it sees    LOGOUT  username    it  removes it from the list  The list can then be nicely formatted and displayed  You can run the script on  the remote log server  To 
160. and_line SUSER1S check_nrpe  H 192 168 254 147  p 5666  c host_ping SHOSTNAMES       define service    service_description Host Ping  host_name server  use generic service  check_command check_ping_via_Black Box     define service    service_description host ping server  host_name server  use generic service  check_command check_ping_via_Black Box  active_checks_enabled O  passive_checks_enabled 1     define servicedependency   name Black Box_nrpe_daemon_dep  host_name Black Box  dependent_host_name server  dependent_service_description Host Ping  service_description NRPE Daemon    724 746 5500   blackbox com Page 190    execution_failure_criteria W U C           SSH Port  define command    command_name_ check_conn_via_Black Box   command_line SUSER1S check_nrpe  H 192 168 254 147  p 5666  c  host_SHOSTNAMES_SARG1S_SARG2S       define service    service_description SSH Port  host_name server  use generic service  check_command check_conn_via_Black Box tcp 22     define service    service_description host port tcp 22 server    host port  lt protocol gt   lt port gt   lt host gt   host_name server  use generic service  check_command check_conn_via_Black Box tcp 22  active_checks_enabled O  passive_checks_enabled 1     define servicedependency   name Black Box_nrpe_daemon_dep  host_name Black Box  dependent_host_name server  dependent_service_description SSH Port  service_description NRPE Daemon  execution_failure_criteria W U C       10 4 2 Basic Nagios plug ins    Plug ins are
161. are  3 5 3u5     lt SBLACK BOX Uptime  0 days  20 hours  57 mins  36 secs Current User  root    NETWORK SERVICES       Managed Devices Network Serial Power    Device Description Connections    est ad test ad for Network Host 192 168 254 100  rdp       itm4000 Network Host 192 168 254 254       DigiPower for RPC digipower        cvs for ssh Network Host 192 168 253       Network Host www google com       Alerts  amp  Logging     gt  Select Serial Network or Power for a view of the specific connections  The user can then take a  range of actions using these serial  network or power connections by selecting the Action icon  or the related Manage menu item   For example  selecting the Manager Power icon  or Manage   Power from the menu  would enable the user to power Off On Cycle any power outlet on any  PDU the user has been given access privileges to  refer to Chapter 8 for details       724 746 5500   blackbox com Page 209    aN System Name  A Mow Firmware  2 8 0u2   lt  gt BLACK BOX Uptime  0da 54 mins rrent User  S1    NETWORK SERVICES       Manage    Devices Target AN   outlet Outleti 1     Port Logs Select a power device to manage  Host Logs          Terminal    Power asain    Turn On      Turn Off  4  l Cycle   Status    erform an ac power device    13 2 Port and Host Logs    Administrators and Users can view logs of data transfers to connected devices    gt  Select Manage  Port Logs and the serial Port   to be displayed      gt  To display Host logs  select Manage  Host 
162. arity None     config  s config ports port5 charsize 8     config  s config ports port5 stop 1     config  s config ports port5 label myport     config  s config ports port5 loglevel 0     config  s config ports port5 protocol RS232     config  s config ports port5 flowcontrol None    The following command will synchronize the live system with the new configuration     config  r serialconfig    Note  Supported serial port baud rates are    50        75        110        134        150        200        300        600         1200        1800        2400        4800        9600      19200    38400    57600    115200   and  230400    Supported parity values are  None      Odd    Even    Mark  and    Space       Supported data bits values are  8    7    6  and  5     Supported stop bits values are  1   1 5  and  2     Supported flow control values are  Hardware       Software  and  None      Additionally  before any port can function properly  you need to set the port mode  Set any port to run  in one of the five possible modes  refer Chapter 4 for details    Console server mode   Device mode   SDT  mode Terminal server mode   Serial bridge mode   All these modes are mutually exclusive     724 746 5500   blackbox com Page 216    Console server mode  The command to set the port in portmanager mode     config  s config ports port5 mode portmanager    To set the following optional config elements for this mode     Data accumulation period 100 ms   Escape character    default is    
163. art sh  gt      bin sh   PORT  51    USER  52    echo  Welcome to port SPORT SUSER    lt   etc config pmshell start sh gt       The return value from the script controls whether the user is accepted or not  if 0 is returned  or  nothing is done on exit as in the above script  the user is permitted  otherwise the user is denied  access       Here is a more complex script which reads from configuration to display the port label if available  and denies access to the root user      lt  etc config pmshell start sh gt      bin sh  PORT  S1   USER  S2   LABEL S config  g config ports portSPORT label   cut  f2   d     if    SUSER      root     then  echo  Permission denied for Super User   exit 1  fi  if    z  SLABEL     then  echo  Welcome SUSER  you are connected to Port SPORT   else  echo  Welcome SUSER  you are connected to Port SPORT  SLABEL    fi   lt  etc config pmshell start sh gt     15 3 Raw Access to Serial Ports  15 3 1 Access to serial ports  You can use tip and stty to completely bypass the portmanager and have raw access to the serial ports     When you run tip on a portmanager controlled port  portmanager closes that port  and stops  monitoring it until tip releases control of it     724 746 5500   blackbox com Page 247    With stty  the changes made to the port only    stick    until that port is closed and opened again  People  probably will not want to use stty for more than initial debugging of the serial connection     If you want to use stty to configure the po
164. as is a history of the status of any attached  environmental monitors     7 6 1 Log storage    Before activating any Event  Serial  Network or UPS logging  you must specify where those logs are to be  saved  These records are stored off server or in the console server USB flash memory     724 746 5500   blackbox com Page 146     gt  Select the Alerts  amp  Logging  Port Log menu option and specify the Server Type to be used   and the details to enable log server access    System Name  les1308a Model  LES1308A Firmware  3 5 3u5 ba  0       Uptime  0 days  19 hours  38 mins  12 secs Current User  root  Backup Log Out    NETWORK SERVICES       Serial  amp  Network       Serial Port    Remote Log Storage    Server Type       Server Address          Server Path LoM   The directory where to store log in  Username     7  The login name required for remote server  Password   _     __         The secret required to access the remote server  System   Confirm       Re type the above secret for confirmation  ackup Syslog Facility  Daemon   The facility field to include in syslog messages     Date  amp  Time Syslog Priority info a        Dial    From the Manage  Devices menu the Administrator will can view serial  network and power device logs  stored in the console reserve memory  or flash USB   The User will only see logs for the Managed  Devices they  or their Group  have been given access privileges for  Refer Chapter 13      Event logs on the USB can be viewed using the web terminal 
165. asons  only the administrator user named root can initially log into your console server   Only people who know the root password can access and reconfigure the console server itself  However   anyone who correctly guesses the root password could gain access  and the default root password is  default   To avoid this  enter and confirm a new root password before giving the console server any  access to  or control of  your computers and network appliances      gt  The system password can be changed by editing the root user on the Serial  amp  Network  Users   amp  Groups form     gt  Select Change default administration password on the Welcome screen which will take you to  Serial  amp  Network  Users  amp  Groups where you can add a new confirmed Password for the user  root    System Name  les1308a Model LE A Firmware  3 5 3u5 ba  0   Uptime  0 days  6 hours  41 mi Current User  root    Bacup Log Out    NETWORK SERVICES       ee da Edit an Existing User       Serial Port  i Username root  A unique name for the user  Description Root User       cription of the users role    Password       Confirm       Re enter the users password for confirmation       Alerts  amp  Logging   SSH Authorized  Keys      PortLog      Auto Response      SMTP  amp  SMS      SNMP          Disable Password O  ce Authentication Check to only allow public key authentication for this user when using SSH         Date  amp  Time Apply     gt  Enter a new Password then re enter it in Confirm   This is the n
166. ation  Contact as    System Contact  SNMP v1  amp  v2c    Read Only oo  Community     Auto Response The read only community     SMTP  amp  SMS     SNMP Read Write    Community  The read write community  Seer SNMP v3     Administration     SSL Certificates Eegeas      Configuration Backup Ov 3 Engine     Firmware na     IP z     Date  amp  Time Security Level  amp  noauth       Nial       Note All console servers have the snmptrap daemon to send traps notifications to remote SNMP  servers on defined trigger events as detailed above  LES1408A  LES1416A  LES1432A   LES1448A  LES1308A  LES1316A  LES1332A  LES1348A  LES1208A R2  LES1216A R2   LES1232 and LES1248A R2 console servers also embed the net snmpd daemon  It accepts  SNMP requests from remote SNMP management servers and provides information on network  interface  running processes  etc   refer to Chapter 15 5   Modifying SNMP Configuration for  more details         7 5 4 Nagios alerts    To notify the central Nagios server of Alerts  NSCA must be enabled under System  Nagios and Nagios  must be enabled for each applicable host or port under Serial  amp  Network  Network Hosts or Serial  amp   Network  Serial Ports  refer to Chapter 10      7 6 Logging    The console server can maintain log records of auto response events and log records of all access and  communications events  with the console server and with the attached serial  network and power  devices      A log of all system activity is also maintained by default  
167. ation Backup     Firmware        gt  Select Status  Support Report and you will be presented with a status snapshot      gt  Save the file as a text file and attach it to your support email     12 4 Syslog   The Linux System Logger in the console server maintains a record of all system messages and errors    gt  Select Status  Syslog   You can redirect the syslog record to a remote Syslog Server     724 746 5500   blackbox com Page 204     gt  Enter the remote Syslog Server Address and Syslog Server Port details and click Apply   The console maintains a local Syslog  To view the local Syslog file    gt  Select Status  Syslog    To make it easier to find information in the local Syslog file  use the provided pattern matching filter  tool      gt  Specify the Match Pattern that you want to search for  for example  the search for mount is  shown below  and click Apply  The Syslog will then be represented with only those entries that  actually include the specified pattern     System Na  Uptime  0 da  Bacup Log Out    NETWORK SERVICES       Serial  amp  Network   Serial Port Remote System Logging   Users  amp  Groups Syslog Server Address   Authentication   Network Hosts Specify the address of the remote Syslog Server to use    Trusted Networks  Cascaded Ports  UPS Connections Specify which port the remote Syslog Server is serving o  RPC Connections             Environmental Apply     Managed Devices    Syslog Server Port    eT Local System Logging  Port Log Match Pattern  Alerts
168. ave Nagios server at remote sites     The console server products all support basic distributed monitoring  Additionally  the Advanced Console  Server  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A   LES1348A LES1208A R2  LES1216A R2  LES1232A  LES1248A R2  family supports extensive customizable  distributed monitoring     Even if distributed monitoring is not required  the console servers can be deployed locally alongside the  Nagios monitoring host server  to provide additional diagnostics and points of access to managed  devices        Central site Remote site    Nagios   Server  Console server     _   TL    PEE Fr js BET     Network       Managed hosts  and services    SDT for Nagios extends the capabilities of the central Nagios server beyond monitoring  enabling it to be  used for central management tasks  It incorporates the SDT Connector client  enabling point and click  access and control of distributed networks of console servers and their attached network and serial  hosts  from a central location        Note If you have an existing Nagios deployment  you may want to use the console server gateways in a  distributed monitoring server capacity only  If this case and you are already familiar with Nagios   skip ahead to section 10 3        724 746 5500   blackbox com Page 180    10 1 Nagios Overview    Nagios provides central monitoring of the hosts and services in your distributed network  Nagios is freely  downloadable  open source software  T
169. be  sufficient for most cases  Longer keys may result in slower response time of the console  server when establishing connection      gt  Once this is done  click on the button Generate CSR which will initiate the Certificate  Signing Request generation  The CSR can be downloaded to your administration machine  with the Download button      gt  Send the saved CSR string to a Certification Authority  CA  for certification  You will get the  new certificate from the CA after a more or less complicated traditional authentication  process  depending on the CA       gt  Upload the certificate to the console server using the Upload button as shown below      lt  BLACK BOX    Firmware  Current User     System Name   Uptime  0 da       NETWORK SERVICES       Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports Organizational  UPS Connections unit  RPC Connections    Message Changes to configuration succeeded     Common name supplyrooms    The full canonical name for this device     myco production  The group overseeing this device        Environmental Organization myco lic  Managed Devices The name of the organization to which the device belongs   a Locality City odgen  Alerts  amp  Logging The City where the organization is located   Port Log  Alerts State Province utah  SMTP  amp  SMS The State or Province where the organization is located   SNMP Country AM  System The country where the organization is located   Adm
170. be blocked      gt  The Logging Level specifies the level of information to be logged and monitored for each Host  access  refer to Chapter 7   Alerts and Logging       gt  If the Host is a PDU or UPS power device or a server with IPMI power control  then specify RPC   for IPMI and PDU  or UPS and the Device Type  The Administrator can then configure these  devices and enable which users have permission to remotely cycle power  etc   refer to Chapter  8   Otherwise  leave the Device Type set to None     724 746 5500   blackbox com Page 60     gt  If the console server has been configured with distributed Nagios monitoring enabled  then you  will also be presented with Nagios Settings options to enable nominated services on the Host to  be monitored  refer to Chapter 10    Nagios Integration       gt  Click Apply  This will create the new Host and also create a new Managed Device  with the same  name      4 5 Trusted Networks    The Trusted Networks facility gives you an option to nominate specific IP addresses where users   Administrators and Users  must be located to access console server serial ports      gt  Select Serial  amp  Network  Trusted Networks      gt  To add anew trusted network  select Add Rule     System Name  les1308a Model LES1308A Firmware  3 5 3u5 ba  0     7 s       Uptime  1 days  5 hours  29 mins  ecs Current User  root  Bacup Log Out    NETWORK SERVICES       Serial  amp  Network         Serial Port  Us    Add a New Rule  Accessible  Port s   T SelectU
171. be distributed throughout the data center  across a campus  or around the  world     NUT supports the more complex power architectures found in data centers  communications centers   and distributed office environments where many UPSes from many vendors power many systems with  many clients  Each of the larger UPSes power multiple devices  and many of these devices are in turn  dual powered     8 3 Environmental Monitoring    The Environmental Monitor Device  EMD  connects to any Black Box console server serial port and each  console server can support multiple EMDs  Each EMD device has one temperature and one humidity  sensor and one or two general purpose status sensors that you can connect to a smoke detector  water  detector  vibration  or open door sensor        Using the Management Console  Administrators can view the ambient temperature  in   C  and humidity   percentage   and set the EMD to automatically send alarms progressively from warning levels to critical  alerts     724 746 5500   blackbox com Page 162       Vibration Kotso AA Water Leak Desr Smoke Glass Beaks  S    ansor Detest Senser Sensor Open Sete ctor Oetector  a a   n s a  LLETITTTETITITED RIETTE Deeeeewmteeerereereare PsP eE Tee S eee ed OTTEET LETTITETIETTITTE    END E EMD EMO  Tepes aeoe Z Homhihy Seoses Tiara de Z Heidy Sennen Tepes rise 4 HemMite Staser Tiere dere Z eed fity Senter    aa    SS  ane Ea aN    8 3 1 Connecting the EMD    The Environmental Monitor Device  EMD  connects to any serial por
172. cations  Connectivity and Serial I O  Terminology    End User License Agreement      Service and Warranty    724 746 5500   blackbox com Page 12       Chapter 1 Introduction    This Manual    This User   s Manual walks you through installing and configuring your Black Box Console Server   LES1108A  LES1116A  LES1132A  LES1148A  LES1508A  or Advanced Console Server  LES1208A R2   LES1216A R2  LES1232A  LES1248A R2  LES1308A  LES1316A  LES1332A  LES1348A  LES1408A  LES1416A   LES1432A  LES1448A   Each of these products is referred to generically in this manual as a    console  server        Once configured  you will be able to use your console server to securely monitor access and control the  computers  networking devices  telecommunications equipment  power supplies  and operating  environments in your data room or communications centers  This manual guides you in managing this  infrastructure locally  across your operations or management LAN or through the local serial console  port   and remotely  across the Internet  private network  or via dial up      Manual Organization    This manual contains the following chapters     1  Introduction An overview of the features of console server and information on this  manual   2  Installation Physical installation of the console server and how to interconnect    controlled devices     3  System Configuration Describes the initial installation and configuration using the  Management Console  Covers configuration of the console server
173. ce Access Rules can be set for connecting to the console server router itself    5 8 1 Configuring network forwarding and IP masquerading    To use a console server as an Internet or external network gateway requires establishing an external    network connection and then setting up forwarding and masquerading        Note  Network forwarding allows the network packets on one network interface  i e  LAN1  ethO  to be  forwarded to another network interface  i e  LAN2 eth1 or dial out cellular   So locally  networked devices can IP connect through the console server to devices on remote networks  IP  masquerading is used to allow all the devices on your local private network to hide behind and  share the one public IP address when connecting to a public network  This type of translation is  only used for connections originating within the private network destined for the outside public  network  and each outbound connection is maintained by using a different source IP port    number        By default  all console server models are configured so that they will not route traffic between networks   To use the console server as an Internet or external network gateway  forwarding must be enabled so    that traffic can be routed from the internal network to the Internet external network      gt  Navigate to the System  Firewall page  and then click on the Forwarding  amp Masquerading tab    System Name  le  Model  LES1216A Firmware  3 4 2     lt SBLACK BOX Uptime  2 days  13 2 mins  
174. check 1 10  second   1 3 second 1 8  second  NRPE time to service 10 1 second 3 seconds 1  seconds    simultaneous checks       Maximum number of simultaneous  checks before timeouts    30    20  1 2 and 8  or  25  16 and 48 port     25  8 port   35  16  and 48 port                       The results were from running tests 5 times in succession with no timeouts on any runs  There are a  number of ways to increase the number of checks you can do     Usually when using NRPE checks  an individual request will need to set up and tear down an SSL  connection  This overhead can be avoided by setting up an SSH session to the console server and  tunneling the NRPE port  This allows the NRPE daemon to run securely without SSL encryption  because  SSH will provide the security     When the console server submits NSCA results  it staggers them over a certain time period  for example   20 checks over 10 minutes will result in two check results every minute   Staggering the results like this  means that if the power fails or other incident causes multiple problems  the individual freshness checks  will be staggered too     NSCA checks are also batched  In the previous example  the two checks per minute are sent through ina  single transaction     10 4 5 Distributed Monitoring Usage Scenarios    Below are a number of distributed monitoring Nagios scenarios     I  Local office    In this scenario  the console server is set up to monitor each managed device   s console  Configure it  to make
175. cify the  Shutdown Order for this UPS  This is a whole positive number  or  1  Os shut down first  then  1s  2s  etc   1s are not shut down at all  Defaults to 0      gt  Select the Driver that you will use to communicate with the UPS  Most console servers are  preconfigured so the drop down menu presents a full selection of drivers from the latest  Network UPS Tools  NUT version 2 4       gt  Click New Options in Driver Options if you need to set driver specific options for your selected  NUT driver and hardware combination  more details at http   www networkupstools org doc       gt  Check Log Status and specify the Log Rate  minutes between samples  if you want the status  from this UPS to be logged  You can view these logs from the Status  UPS Status screen      gt  Ifyou have enabled Nagios services  then you will be presented with an option for Nagios  monitoring  Check Enable Nagios to enable this UPS to be monitored using Nagios central  management     gt  Check Enable Shutdown Script if this is the UPS providing power to the console server itself and  if a critical power failure occurs  you can perform any   ast gasp  actions on the console server  before power is lost  Place a custom script in  etc config scripts ups shutdown  you may use the  provided  etc scripts ups shutdown as a template   This script only runs when then UPS reaches  critical battery status      gt  Click Apply     Note  You can also customize the upsmon  upsd  and upsc settings for this UPS har
176. ckmount console servers     The LES1508A Console Server has a Cisco RJ 45 pinout shown below           _    PIN   SIGNAL DEFINITION DIRECTION  RJ 45 CTS 1 CTS Clear To Send Input  pi DSR 2 DSR Data Set Ready Input  RD 3 RXD Receive Data Input  3               p  4     4 GND Signal Ground NA  5       i 5 GND Signal Ground NA  6   gt      7 2R 6 TXD Transmit Data Output  g pE 7 DTR Data Terminal Ready Output  8 RTS Request To Send Output    The LES1108A  LES1116A  LES1132A and LES1148A Console Servers have the Black Box Classic RJ 45  pinout shown below     724 746 5500   blackbox com Page 23     RTS   Request To send   Output      osr   Dataset Ready   mpu    oco   Data Carrier Dete   Input  o  w  eno    7   DTR   _ Data Terminal Ready   Output    e  cs   ClearTosend   input         The LES1208A R2  LES1216A R2  LES1232A  LES1248A R2  LES1308A  LES1316A  LES1332A  LES1348A   LES1408A  LES1416A  LES1432A and LES1448A Advanced Console Servers have the Cyclades RJ 45  pinout shown next         PIN sea n    _ DIRECTION  RH45 mi     o Send Output      b Data Terminal     Pata Termin Rese Output  3 EREU A   TransmitData   Data E aa    4      oe Signal Ground OO O M      5   4 ganid Send Input  6 es   7     ae     ee Data Input  3  q gt  raeme _ Carrier Detect Input    Data Set   DataSetReady  lt    Input       The rackmount console servers also have a DB9 LOCAL  Console Modem  port on front panel  The  LE1108A has a DB9 LOCAL  Console Modem  port on rear panel  With the LES1508  Ser
177. ckups on USB   load  FILE     load a specific config from USB  load default    load the default configuration  set default  FILE     set which file becomes the default    The first thing to do is to check if the USB disk has a label      etc scripts backup usb check magic  If this command returns  Magic volume not found   then run the following command        etc scripts backup usb set magic    724 746 5500   blackbox com Page 243    To save the configuration      etc scripts backup usb save config 20May  To check if the backup was saved correctly      etc scripts backup usb list  If this command does not display    config 20May  then there was an error saving the configuration   The set default command takes an input file as an argument and renames it to  default opg   This    default configuration remains stored on the USB disk  The next time you want to load the default config   it will be sourced from the new default opg file  To set a config file as the default        etc scripts backup usb set default config 20May  To load this default       etc scripts backup usb load default  To load any other config file       etc scripts backup usb load  filename     The  etc scripts backup usb script can be executed directly with various COMMANDS or called from  other custom scripts you may create  We recommend that you do not customize the   etc scripts backup usb script itself at all    15 1 9 Backing up the configuration off box    If you do not have a USB port on your console s
178. clients available for Windows computers  WinNUT      If you have an RPC  PDU   you can shut down UPS powered computers and other equipment if if the  they don   t have a client running  for example  communications  and surveillance gear   Set up a UPS  alert and using this to trigger a script that controls a PDU to shut off the power  refer to Chapter 15    8 2 4 UPS alerts    You can set UPS alerts using Alerts  amp  Logging  Alerts  refer Chapter     Alerts  amp  Logging      8 2 5 UPS status    You can monitor the current status of your network  serially or USB connected Managed UPSes  and any  configured Remote UPSes      gt  Select the Status  UPS Status menu and a table with the summary status of all connected UPS  hardware displays      gt  Click on any particular UPS System name in the table and more detailed graphical information  on the selected UPS System appears     724 746 5500   blackbox com Page 159       SmartOnline   SUINT1O00RTXL2Ua    Thu May 14 02 25 13 EDT 2009 Battery Input Output Load    UPS Model   Status   Battery     Input     Output         gt  Click on any particular All Data for any UPS System in the table for more status and  configuration information about the selected UPS System      gt  Select UPS Logs and you will be presented with the log table of the load  battery charge level   temperature  and other status information from all the Managed and Monitored UPS systems   This information will be logged for all UPSes that were configured with L
179. company dc com    m    The distinguished name to bind to the server with  The default is to bind anonymously    Password for the Bind DN user     sAMAccountName    The LDAP attribute that corresponds to the login name of the user     fne mberOf    The LDAP attribute that is used to indicate group memberships    m     The distinguished name of a group existing on the server which all users with access to the  console server must belong to    m     The distinguished name of a group existing on the server whose members will be given    users group access    LDAP Administration    Group DN  The distinguished name of a group existing on the server whose members will be given    admin group access              gt  Enter the Server Address  IP or host name  of the remote Authentication server  Multiple  remote servers may be specified in a comma separated list  Each server is tried in succession    gt  Enter the Server Password    Note To interact with LDAP requires that the user account exist on our console server to work with the  remote server   You can t just create the user on your LDAP server and not tell the console server  about it   You need to add the user account     gt  Click Apply  LDAP remote authentication will now be used for all user access to console server  and serially or network attached devices    LDAP The Lightweight Directory Access Protocol  LDAP  is based on the X 500 standard  but is    significantly simpler and more readily adapted to meet custom needs  T
180. config  s config alerts alert2 enviro low critical 5     config  s config alerts alert2 enviro low warning 10     config  s config alerts alert2 enviro1 SensorinRoom42    config  s config alerts alert2 signal DSR     config  s config alerts alert2 type enviro    Example2  To configure a load sensor alert for outlets 2 and 4 for an RPC called  RPCInRoom20        config  s config alerts alert2 outlet1  RPCname  outlet2    config  s config alerts alert2 outlet2  RPCname  outlet4    724 746 5500   blackbox com Page 229      config  s config alerts alert2 enviro high critical 300    config  s config alerts alert2 enviro high warning 280    config  s config alerts alert2 enviro hysteresis 20     config  s config alerts alert2 enviro low critical 50     config  s config alerts alert2 enviro low warning 70     config  s config alerts alert2 rpc1 RPCInRoom20     config  s config alerts alert2 sensor load     config  s config alerts alert2 signal DSR     config  s config alerts alert2 type enviro    Alarm Sensor Alert    To set an alert for  doorAlarm  and  windowAlarm  that are two alarms connected to an environmental  sensor called  SensorlnRoom3     Both alarms are disabled on Mondays from 8 15 am to 2 30 pm       config  s config alerts alert2 alarm1 SensorinRoom3 alarm1  doorAlarm      config  s config alerts alert2 alarm1 SensorinRoom3 alarm2  windowAlarm     config  s config alerts alert2 alarmrange mon from hour 8     config  s config alerts alert2 alarmrange mon from min 15   
181. connected to the Console port for dialing out to  an ISP or the remote management office     724 746 5500   blackbox com Page 42     lt  gt BLACK BOX    NETWORK SERVICES    Serial  amp  Network  Serial Port   Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  PortLog  Alerts  SMTP  amp  SMS  SNMP    System  Administration   SSL Certificates  Configuration Backup  Firmware   IP   Date  amp  Time   Dial   Services   DHCP Server   Nagios   Configure Dashboard    Status   Port Access  Active Users  Statistics  Support Report  Syslog   UPS Status    Network Interface    System Name c Model  LI  Uptime  0 day ours  11 mins  47      Firmware  2 8 0u2  Current User  root    Backup       Management LAN Interface General Settings    IP Settings  Network    Configuration  Method    IP Address    Subnet Mask    Gateway    Primary DNS    Secondary DNS    Media    Failover  interface    Primary Probe  Address    Secondary Probe    Address         Apply            The mechanism to acquire IP settings             A statically assigned IP address   A statically assigned network mask  A statically ass d gateway   A statically ass    A statically ass       Auto X  The Ethernet media type       Management LAN  lan  EN  None configured and  Management LAN  lan     Serial DB9 Port  sercon  DISABLED  Internal Modem Port  modem01  DISABLED    The address of the first peer to pr
182. cprt2 sctplu  s htm       9 1 3 RADIUS authentication    Perform the following procedure to configure the RADIUS authentication method to use whenever the  console server or any of its serial ports or hosts is accessed      gt  Select Serial and Network  Authentication and check RADIUS or LocalRADIUS or RADIUSLocal  or RADIUSDownLocal     Syslog RADIUS  Z Saan Authentication and  RPC Status Authorisation Server  Environmental Status Address Comma separated list of remote authentiction and authorization servers   Dashboard  Accounting Server  Address  Manage Comma separated list of remote accounting servers  If unset  Authentication and  Devices Authorization Server Address will be used  Port Logs  Host Logs Server Password    Power The shared secret allowing access to the authentication server   Terminal  Confirm Password    Re enter the above password for confirmation     724 746 5500   blackbox com Page 168     gt  Enter the Server Address  IP or host name  of the remote Authentication  Authorization server   Multiple remote servers may be specified in a comma separated list  Each server is tried in  succession      gt  In addition to multiple remote servers  you can also enter separate lists of Authentication   Authorization servers and Accounting servers  If no Accounting servers are specified  the  Authentication Authorization servers are used instead      gt  Enter the Server Password      gt  Click Apply  RADIUS remote authentication will now be used for all user acces
183. cr  check_real  check_spop  check_tcp    check_user    You can download these plug ins from the Nagios plug ins package from www blackbox com     You can also download and run bash scripts  primarily check_log sh       gt  To configure additional checks  save the downloaded plug in program in the tftp addins  directory on the USB flash and save the downloaded text plug in file in  etc config     gt  To enable these new additional checks  select Seria 1 amp  Network  Network Port  then Edit the  Network Host you want to monitor  and select New Checks  The additional check option is  included in the updated Nagios Checks list  and you can again customize the arguments     10 4 4 Number of supported devices    Ultimately the number of devices that by any particular console server can support depends upon the  number of checks made  and how often they are performed  Access method will also play a part  The  table below shows the performance of three of the console servers     724 746 5500   blackbox com    Page 192       Time    No 3DES  encryption    SSH tunnel       NSCA for single check       second       second       second                                  NSCA for 100 sequential checks 100 seconds   100 seconds 100 seconds  NSCA for 10 sequential checks  batched upload   1  seconds 2 seconds 1 second  NSCA for 100 sequential checks  batched upload   7 seconds 11 seconds 6 seconds  No SSL no encryption    encryption tunneled over  existing SSH session  NRPE time to service 1 
184. ctions to a device that you can access  and monitor through the console server  To view the connections to the devices      gt  Select Serial  amp  Network  Managed Devices      lt BLACK BOX    System Nam  Uptime  0 days       NETWORK SERVICES       Serial  amp  Network  Serial Port   Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Managed Devices       s Serial Port  Network Host and power  RPC and UPS  connections to provide a    e under management        Device  Name    Description Notes Related Connections    No devices currently configured    Add Device    This screen displays all the Managed Devices with their Description Notes  It also lists all the configured  Connections  that is  Serial Port    if serially connected  or USB if USB connected  IP Address  if network  connected   Power PDU outlet details  if applicable   and any UPS connections  Devices such as servers    will commonly have more than one power connections  for example  dual power supplied  and more  than one network connection  for example  for BMC service processor      All Users can view  but not edit  these Managed Device connections by selecting Manage  Devices  The  Administrator user can edit and add delete these Managed Devices and their connections     To edit an existing device and add a new connection      gt  Select Edit on the Serial  amp  Network  Managed Devices and click Add Connectio
185. d also have some  telecommunications device connected to port 2  which is powered by the RPC outlet 3   Now assume  the telecom device transmits a character stream  EMERGENCY  out on its serial console port every time  that it encounters some specific error  and the only way to fix this error is to power cycle the telecom  device     The first step is to setup a pattern match alert on port 2 to check for the pattern  EMERGENCY      Next we need to create a custom script to deal with this alert      cd     mkdir  etc config scripts  if the directory does not already exist     cp  etc scripts portmanager pattern alert  etc config scripts portmanager pattern alert    Note  Make sure to remove the if statement  which checks for a custom script  from the new script  in  order to prevent an infinite loop     The pmpower utility is used to send power commands to RPC device in order to power cycle our telecom  device       pmpower  l port01  o 3 cycle  The RPC is on serial port 1  The telecom device is powered by  RPC outlet 3     We can now append this command to our custom script  This will guarantee that our telecom device will  be power cycled every time the console reads the  EMERGENCY  character stream on port 2     15 1 4 Example script   Multiple email notifications on each alert    If you want to send more than one email when an alert triggers  you have to create a replacement script  using the method described above and add the appropriate lines to your new script     Curre
186. d establish an SSH  connection to the Slave remote host       ssh remhost    724 746 5500   blackbox com Page 64    Once the SSH connection has been established  the system asks you to accept the key  Answer yes and    the fingerprint will be added to the list of known hosts  For more details on Fingerprinting  refer to  Chapter 15 6      gt  Ifthe system asks you to supply a password  then there is a problem with uploading keys  The  keys should remove any need to supply a password   4 6 3 Configure the slaves and their serial ports    You can now begin setting up the Slaves and configuring Slave serial ports from the Master console  server     e System Name  A 2 Firmware  BLACK BOX      cra    NETWORK SERVICES       Serial  amp  Network  Serial Port IP Address DNS Description    Label Number Locally  Users  amp  Groups Name of Ports Allocated Port  Authentication Numbers  Network Hosts    No slaves currently configured  Trusted Networks  Cascaded Ports      Add Slave    UPS Connections     gt  Select Serial  amp  Network  Cascaded Ports on the Master   s Management Console      gt  To add clustering support  select Add Slave        Note You can   t add any Slaves until you automatically or manually generate SSH keys        System Name  ACSdoc Model  LES1216A Firmware  2 8 0u2 Ra  0   BLA K X Uptime  0 days  2 hours  33 mins  23 secs Current User  root  Back og Out    NETWORK SERVICES ee       Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication       Click 
187. device via telnet  or ssh  To operate  the Managed Device must be set up with both its Serial port connection  and Power connection configured  The command to bring up the power menu is    p       oP 192 168 252 202   PuTTY          Single Connection This setting limits the port to a single connection gt  If multiple users have access  privileges for a particular port  only one user at a time can access that port  that is  port     snooping    is not permitted      4 1 3 SDT Mode    This setting allows port forwarding of RDP  VNC  HTPP  HTTPS  SSH  Telnet  and other LAN protocols  through to computers that are locally connected to the console server by their serial COM port  Port  forwarding requires that you set up a PPP link over this serial port     724 746 5500   blackbox com Page 53    SDT Settings       SDT Mode  Enable access over SSH to a host connected to this serial port   Username  The login name for PPP  The default is port01  User Password  The login secret for PPP  The default is port01  Confirm  Password  Re type the password for confirmation     For configuration details  refer to Chapter 6 6    Using SDT Connector to Telnet or SSH connect to devices  that are serially attached to the console server     4 1 4 Device  RPC  UPS  EMD  Mode    This mode configures the selected serial port to communicate with a serial controlled Uninterruptable  Power Supply  UPS   Remote Power Controller Power Distribution Unit  RPC  or Environmental  Monitoring Device  EMD      D
188. displayed as commands are processed  Useful  for debugging device scripts     x    exprange Expand host ranges in query responses     For more details refer http   linux die net man 1 powerman  Also refer powermand  http   linux die net man 1 powermand  documentation and powerman conf   http   linux die net man 5 powerman conf     Target Specification    powerman target hostnames may be specified as comma separated or space separated hostnames or  host ranges  Host ranges are of the general form  prefix n m I k       where n  lt  m and I  lt  k  etc   This form    724 746 5500   blackbox com Page 263    should not be confused with regular expression character classes  also denoted by        For example   foo 19  does not represent foo1 or foo9  but rather represents a degenerate range  foo19     This range syntax is meant only as a convenience on clusters with a prefix NN naming convention and  specification of ranges should not be considered necessary   the list foo1 foo9 could be specified as  such  or by the range foo 1 9      Some examples of powerman targets follows    Power on hosts bar baz foo01 foo02     f0005  powerman   on bar baz foo 01 05   Power on hosts bar foo7 foo9 foo10  powerman   on bar foo 7 9 10    Power on foo0 foo4 foo5  powerman   on foo 0 4 5     As a reminder to the reader  some shells will interpret brackets    and    for pattern matching   Depending on your shell  you might need to enclose ranged lists within quotes  For example  in tcsh  the  last
189. dress  ranges use the format ip netmask  where netmask is in bits 1 32   This  may be left blank     Select if the firewall rule will apply to TCP or UDP    Select the traffic direction that the firewall rule will apply to  Ingress    incoming or Egress     Select the action  Accept or Block  that will be applied to the packets  detected that match the Interface  Port Range  Source destination  Address Range  Protocol  Direction    For example  to block all SSH traffic from leaving Dialout Interface  the following settings can be    used     Interface  Dialout Cellular    Port Range  22    724 746 5500   blackbox com Page 100    Protocol  TCP  Direction  Egress    Action  Block    The firewall rules are processed in a set order  from top to bottom  So rule placement is important  For  example with the following rules  all traffic coming in over the Network Interface is blocked except when    it comes from two nominated IP addresses  SysAdmin and Tony      To allow all incoming traffic on all To allow all incoming    interfaces from the SysAdmin  traffic from Tony     Interface Any Any   Port Range Any Any  Source IP IP address of SysAdmin IP address of Tony  Destination IP Any Any  Protocol TCP TCP  Direction Ingress Ingress  Action Accept Accept    To block all incoming traffic  from the Network  Interface     Network Interface  Any  Any  Any  TCP  Ingress    Block    However if the Rule Order above was to be changed so the    Block Everyone Else    rule was second on  the l
190. ds        alias   p   name  value        local name  value        bg  job_spec  logout   bind   lpvsPVS    m keymap    f fi break  n  popd   N    N    n    builtin  shell builtin  arg       printf format  arguments    case WORD in  PATTERN    PATTERN  pushd  dir    N    N    n    cd   PL   dir  pwd   PL    command   pVv  read   ers    t timeout    p promp   command  arg      readonly   anf   name      or read return  n   compgen   abcdefjkvu    o option  select NAME  in WORDS        do  complete   abcdefjkvu    pr    o o  COMMANDS   continue  n  set    abefhkmnptuvxBCHP    o opti   declare   afFrxi    p  name  value  shift  n    dirs   clpv    N    N  shopt   pqsu    o long option  opt  disown   h    ar   jobspec      source filename   echo   neE   arg      suspend   f    enable   pnds    a    f filename  test  expr    eval  arg      time   p  PIPELINE   exec   cl    a name  file  redirec  times   exit  n  trap  arg   signal_spec        export   nf   name      or export true             724 746 5500   blackbox com Page 275          false   fc   e ename    nlr   first   last    fg  job_spec    for NAME  in WORDS        do COMMA  function NAME   COMMANDS     or NA  getopts optstring name  arg    hash   r    p pathname   name        help   s   pattern        history   c    d offset   n  or hi   if COMMANDS  then COMMANDS    elif  jobs   Inprs   jobspec      or job kill   s  sigspec    n signum    si let arg  arg         type   apt  name  name        typeset   afFrxi    p  name  
191. dware directly from  the command line        8 2 2 Remote UPS management  A Remote UPS is a UPS that is connected as a Managed Device to a remote console server that is  monitored  but not managed  by your console server     You can configure the upsc and upslog clients in the Black Box console server to monitor remote servers  that are running Network UPS Tools managing their locally connected UPSes  These remote servers  might be other Black Box console servers or generic Linux servers running NUT  You can centrally  monitor all these distributed UPSes  which may be spread in a row in a data center  around a campus  property  or across the country  through the one central console server window  To add a Remote UPS      gt  Select the Serial  amp  Network  UPS Connections menu  The Remote UPSes section will display all  the remote UPS devices being monitored      gt  Click Add Remote UPS     724 746 5500   blackbox com Page 157    e   System Name oc Model  LE   A Firmware  2 8 0u2  gt    lt SBLACK BOX Uptime  0 day urs  42 mins cs Current User  root ha       Backup Log Out    NETWORK SERVICES       Serial  amp  Network    Serial Port Add Remote UPS  Users  amp  Groups UPS Name  Authentication  ation Hasis The name of this UPS  Trusted Networks Description  Cascaded Ports  UPS Connections An optional description  RPC Connections Address  Environmental  Managed Devices The address or DNS name of the host managing this UPS    Log Status  Alerts  amp  Logging P lly log UPS stat 
192. e     For SSH access to the consoles on devices attached to the console server serial ports  you can  use SDT Connector  Configure SDT Connector with the console server as a gateway  then as a  host  and enable SSH service on Port  3000   serial port    i e  3001 3048  Chapter 6   Secure  Tunneling has more information on using SDT Connector for SSH access to devices that are  attached to the console server serial ports     You can also use common communications packages  like PuTTY or SSHTerm to SSH connect  directly to port address IP Address _ Port  3000   serial port    i e  3001 3048     SSH connections can be configured using the standard SSH port 22  Identify the the serial  port that   s accessed by appending a descriptor to the username  This syntax supports      lt username gt   lt portXX gt    lt username gt   lt port label gt    lt username gt   lt ttySX gt      lt username gt   lt serial gt     724 746 5500   blackbox com Page 51    TCP    RFC2217    For a User named    fred    to access serial port 2  when setting up the SSHTerm or the PuTTY  SSH client  instead of typing username   fred and ssh port   3002  the alternate is to type  username   fred port0O2  or username   fred ttyS1  and ssh port   22     Or  by typing username fred serial and ssh port   22  A port selection option appears to the  User        ep 192 168 254 152   PuTTY o  8   amp              This syntax enables Users to set up SSH tunnels to all serial ports with only opening a single IP  port 
193. e Group        Note There are no specific limits on the number of users you can set up  nor on the number of users  per serial port or host  Multiple users  Users and Administrators  can control monitor one port or  host     There are no specific limits on the number of Groups  Each user can be a member of a number of  Groups  they take on the cumulative access privileges of each of those Groups   A user does not  have to be a member of any Groups  but if the Useris not even a member of the default user  group  then he will not be able to use the Management Console to manage ports      The time allowed to re configure increases as the number and complexity increases  We  recommend that you keep the aggregate number of users and groups under 250        The Administrator can also edit the access settings for any existing users      gt  Select Serial  amp  Network  Users  amp  Groups and click Edit for the User to be modified      gt  Alternately click Delete to remove the User or click Disable to temporarily block any access  privileges       Note For more information on enabling the SDT Connector so each user has secure tunneled remote  RPD VNC Telnet HHTP HTTPS SoL access to the network connected hosts  refer to Chapter 6        724 746 5500   blackbox com Page 59    4 3 Authentication    Refer to Chapter 9 1    Remote Authentication Configuration for authentication configuration details     4 4 Network Hosts    To access a locally networked computer or device  referred to as
194. e SSH DSA Public Browse     IP Key Upload a replacement DSA public key file  Date  amp  Time  Dial SSH DSA Private Browse     Services Key Upload a replacement DSA private key file  DHCP Server  Nagios SSH Authorized Browse     Configure Dashboard nays Upload a replacement authorized keys file  Status eain SSH 7  keys E a  PortAccess automatically Generate SSH keys locally  Active Users  Statistics  ial    Next  you must register the Public Key as an Authorized Key on the Slave  In a case that has only one  Master with multiple Slaves  you only need to upload the one RSA or DSA public key for each Slave        Note Using key pairs can be confusing since one file  Public Key  fulfills two roles    Public Key and  Authorized Key  For a more detailed explanation  refer to the Authorized Keys section of Chapter  15 6  Also  refer to this chapter if you need to use more than one set of Authorized Keys in the  Slave         gt  Select System  Administration on the Slave   s Management Console    gt  Browse again to the stored RSA  or DSA  Public Key and upload it to Slave   s SSH Authorized Key    gt  Click Apply     The next step is to Fingerprint each new Slave Master connection  This one time step will validate that  you are establishing an SSH session to who you think you are  On the first connection  the Slave will  receive a fingerprint from the Master which will be used on all future connections      gt  To establish the fingerprint  first log in the Master server as root an
195. e and Description for the Managed Device        System Name  A Model LES1216A Firmware  2 8 0u2  BLACK BOX Uptime  0 days  2 S  37 mins  34 secs Current User  root    NETWORK SERVICES       Serial  amp  Network   Serial Port Add a New Device   Users  amp  Groups Device Name   Authentication   Network Hosts jeasince aecokacaminaaaia    Trusted Networks  Cascaded Ports  UPS Connections A brief description of the device  RPC Connections   Environmental   Managed Devices    Description Notes    Connections  Alerts  amp  Logging    Serial X Poti     Delete    pis  Alerts Network H    SMTP  amp  SMS Add Connection    SNMP  m Apply    Click Add Connection and select Serial and the Port that connects to the Managed Device     To add a UPS RPC power connection or network connection or another serial connection  click  Add Connection     Click Apply     724 746 5500   blackbox com Page 68       Note To set up a new serially connected RPC UPS or EMD device  configure the serial port  designate  itas a Device  then enter a Name and Description for that device in the Serial  amp  Network  RPC  Connections  or UPS Connections or Environmental   When applied  this will automatically  create a corresponding new Managed Device with the same Name  Description as the RPC UPS  Host  refer to Chapter 8   Power and Environment      All the outlet names on the PDU will by default be    Outlet 1    and    Outlet 2     When you connect a  particular Managed Device  that draws power from the outlet  t
196. e bruits radio  lectriques d  passant les limites applicables aux appareils num  riques de  la classe A prescrites dans le R  glement sur le brouillage radio  lectrique publi   par Industrie Canada        Page 4 724 746 5500   blackbox com    Value Line and Advanced Console Servers Manual    In    strucciones de Seguridad     Normas Oficiales Mexicanas Electrical Safety Statement     1     2  3  4   5    oN OD     o    10     11     12     13    14   15     16    17     18     Todas las instrucciones de seguridad y operaci  n deber  n ser le  das antes de que el aparato el  ctrico sea operado       Las instrucciones de seguridad y operaci  n deber  n ser guardadas para referencia futura       Todas las advertencias en el aparato el  ctrico y en sus instrucciones de operaci  n deben ser respetadas     Todas las instrucciones de operaci  n y uso deben ser seguidas       El aparato el  ctrico no deber   ser usado cerca del agua   por ejemplo  cerca de la tina de ba  o  lavabo  s  tano mojado o cerca    de una alberca  etc      El aparato el  ctrico debe ser usado   nicamente con carritos o pedestales que sean recomendados por el fabricante       El aparato el  ctrico debe ser montado a la pared o al techo s  lo como sea recomendado por el fabricante       Servicio   El usuario no debe intentar dar servicio al equipo el  ctrico m  s all   a lo descrito en las instrucciones de operaci  n     Todo otro servicio deber   ser referido a personal de servicio calificado     El aparato e
197. e client and the server    syslog By default  logs are located in syslog or  if running as a service on             Window  in  Program Files OpenVPN log directory     To initiate the OpenVPN tunnel following the creation of the client server configuration files    gt  Right click on the OpenVPN icon in the Notification Area   gt  Select the newly created client or server configuration  For example  LES1216_client     gt  Click    Connect    as shown below    724 746 5500   blackbox com Page 75                   i Aug 06 129  2010 OpenVPN 2 0 9 win32 Minew  SSL   LZO  built on oct 1 2006  i Aug 06 11 29 57 2010 WARNING  NO server certificate verification method has been enabled  See http   openvpn net   i Aug 06 11 29 57 2010 LZO compression initialized  i Aug 06 229  2010 Control Channel MTU parms   L 1542 D 138 EF 38 EB 0 ET 0 EL 0    i Aug 06 529  2010 Data Channel MTU parms   L 1542 D 1450 EF 42 EB 135 ET 0 EL 0 AF 3 1    i Aug 129  2010 Local Options hash  VER v4    41690919   i Aug  29 57 2010 Expected Remote Options hash  VER v4    530fdded   i Aug 129  upPv4 link local   undef   i Aug 229  upPv4 link remote  192 168  250 152 1194  i Aug 229  TLS  Initial packet from 192 168  250 152 1194  sid dd3359de 265f251d  i Aug  30  VERIFY OK  depth 1   C US ST CA L SanFrancisco O Fort Funston CN OpenvPN CA emai 1Address meG n  i Aug 230  VERIFY OK  depth 0   C US ST CA L SanFrancisco O Fort Funston CN server  emai 1Address me myhos  i Aug 230  Data Channel Encrypt  Cipher  BF c
198. e complies with Part 15 of the FCC rules  Operation of this device is subject to the following    conditions   1  This device may not cause harmful interference  and  2  this device must accept any  interference that may cause undesired operation     724 746 5500   blackbox com Page 278       Appendix F End User License Agreement    READ BEFORE USING THE ACCOMPANYING SOFTWARE    YOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE USING THE  ACCOMPANYING SOFTWARE  THE USE OF WHICH IS LICENSED FOR USE ONLY AS SET FORTH BELOW  IF  YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT  DO NOT USE THE  SOFTWARE  IF YOU USE ANY PART OF THE SOFTWARE  SUCH USE WILL INDICATE THAT YOU ACCEPT  THESE TERMS     You have acquired a product that includes Black Box     Black Box     proprietary software and or proprietary software  licensed to Black Box  This Black Box End User License Agreement     EULA     is a legal agreement between you   either an individual or a single entity  and Black Box for the installed software product of Black Box origin  as well as  associated media  printed materials  and    online    or electronic documentation     Software      By installing  copying   downloading  accessing  or otherwise using the Software  you agree to be bound by the terms of this EULA  If you  do not agree to the terms of this EULA  Black Box is not willing to license the Software to you  In such event  do not  use or install the Software  If you have purchased t
199. e debug on    bin config   run console   reboot      If at some point in the future you chose to connect a modem for dial in out of band access  you can  reverse the procedure with the following commands        bin config   del config console debug    bin config   run console   reboot    15 4 IP  Filtering    The console server uses the iptables utility to provide a stateful firewall of LAN traffic  By default  rules  are automatically inserted to allow access to enabled services  and serial port access via enabled  protocols  The commands that add these rules are contained in configuration files      etc config ipfilter    This is an executable shell script that runs whenever the LAN interface is brought up and whenever  modifications are made to the iptables configuration as a result of CGI actions or the config command  line tool     The basic steps performed are as follows     The current iptables configuration is erased     Ifa customized IP Filter script exists it is executed and no other actions are performed         Standard policies are inserted that will drop all traffic not explicitly allowed to and through the    724 746 5500   blackbox com Page 248    system       Rules are added which explicitly allow network traffic to access enabled services  for example  TTP   SNMP  etc       Rules are added that explicitly allow traffic network traffic access to serial ports over enabled  protocols e g  Telnet  SSH and raw TCP     If the standard system firewall configuratio
200. e fnord httpd from  http   www fefe de fnord     The SSL implementation is provided by the ss wrap application compiled with OpenSSL support  You can  find more detailed documentation at http   www rickk com sslwrap     If your default network address is changed or the unit is to be accessed via a known Domain Name  you  can use the following steps to replace the default SSL Certificate and Private Key with ones tailored for  your new address     15 8 1 Generating an encryption key    To create a 1024 bit RSA key with a password  issue the following command on the command line of a  linux host with the openssl utility installed     openssl genrsa  des3  out ssl_key pem 1024    15 8 2 Generating a self signed certificate with OpenSSL    This example shows how to use OpenSSL to create a self signed certificate  OpenSSL is available for most  Linux distributions via the default package management mechanism   Windows users can check  http   www openssl org related binaries html     To create a 1024 bit RSA key and a self signed certificate  issue the following openssl command from the  host you have openssl installed on     openssl req  x509  nodes  days 1000     newkey rsa 1024  keyout ssl_key pem  out ssl_cert pem    You will be prompted to enter a lot of information  Most of it doesn   t matter  but the  Common Name   should be the domain name of your computer  e g  test Black Box com   When you have entered  everything  the certificate will be created in a file called ss _cer
201. e level  rather than use a  browser and the Management Console   this chapter describes how to use command line access and the  config tool to manage the console server and configure the ports  etc     This config documentation in this chapter walks through command line configuration to deliver the  functions provided using the Management Console GUI     For advanced and custom configurations and for details using other tools and commands  refer to the  next chapter     When displaying a command  the convention used in the rest of this chapter is to use single quotes       for user defined values  for example  descriptions and names   Element values without single quotes  must be typed exactly as shown     After the initial section on accessing the config command  the menu items in this document follow the  same structure as the menu items in the web GUI     14 1 Accessing config from the command line    The console server runs a standard Linux kernel and embeds a suite of open source applications  If you  do not want to use a browser and the Management Console tools  you can configure the console server  and manage connected devices from the command line using standard Linux and Busybox commands  and applications such as ifconfig  gettyd  stty  powerman  nut etc  Without care  these configurations  may not withstand a power cycle reset or reconfigure     Black Box provides a number of custom command line utilities and scripts to make it simple to configure  the console serve
202. e restricted access to serial ports  network hosts and managed devices     Remote authentication with group support works by matching a local group name with a remote group  name provided by the authentication service  If the list of remote group names returned by the  authentication service matches any local group names  the user is given permissions as configured in the  local groups     To enable group support to be used by remote authentication services     724 746 5500   blackbox com Page 171    Select Serial  amp  Network  Authentication  Select the relevant Authentication Method    Check the Use Remote Groups button    9 1 7 Remote groups with RADIUS authentication  Enter the RADIUS Authentication and Authorization Server Address and Server Password  Click Apply    gt  Edit the Radius user s file to include group information and restart the Radius server    When using RADIUS authentication  group names are provided to the console server using the  Framed Filter Id attribute  This is a standard RADIUS attribute  and may be used by other devices  that authenticate via RADIUS     To interoperate with other devices using this field  the group names can be added to the end of any  existing content in the attribute  in the following format     igroup_name testgroup1 users     The above example sets the remote user as a member of testgroup1 and users if groups with those  names exist on the console server  Any groups which do not exist on the console server are ignored     Wh
203. e the IP  address as shown in the illustration above    From  169 134 13 1    To  169 134 13 2    724 746 5500   blackbox com Page 129    Or  you can set the advanced connection and access on the Windows computer to use the  console server defaults       Specify 10 233 111 254 as the From  address    Select Allow calling computer to specify its own address    Also  you could use the console server default username and password when you set up the  new Remote Desktop User and gave this User permission to use the advance connection to  access the Windows computer       The console server default Username is portXX where XX is the serial port number on the  console server       The default Password is portXX    To use the defaults for a RDP connection to the serial port 2 on the console server  you would  have set up a Windows user named port02         gt  When the PPP connection has been set up  a network icon will appear in the Windows task bar        Note The above notes describe setting up an incoming connection for Windows XP  The steps are  similar for Vista and Windows Server 2003 2008  but the set up screens present slightly differently        Incoming Connections Properties  ARENA AERA a       You need to put a check in the box for Always allow directly connected devices such as  palmtop         The option for to Set up an advanced connection is not available in Windows 2003 if RRAS is  configured  If RRAS has been configured  you can enable the null modem connection fo
204. e the server will only have one client device  then the authorized_keys  file is simply a copy of the public key for that device  If one or more devices will be clients of the server     724 746 5500   blackbox com Page 259    then the authorized_keys file will contain a copy of all of the public keys  RSA and DSA keys may be  freely mixed in the authorized _keys file     For example  assume we already have one server  called bridge_server  and two sets of keys  for the  control_room and the plant_entrance     S Is  home user keys  control_room control_room pub plant_entrance plant_entrance pub  S cat  home user keys control_room pub   home user keys plant_entrance pub  gt    home user keys authorized_keys_bridge_server   Uploading Keys     The keys for the server can be uploaded through the web interface  on the System  Administration page  as detailed earlier  If only one client will be connecting  then simply upload the appropriate public key as  the authorized keys file  Otherwise  upload the authorized keys file constructed in the previous step     Each client will then need its own set of keys uploaded through the same page  Take care to ensure that  the correct type of keys  DSA or RSA  go in the correct spots  and that the public and private keys are in  the correct spot     15 6 8 SDT Connector Public Key Authentication    SDT Connector can authenticate against a console servers using your SSH key pair  rather than requiring  you to enter your password  i e  public k
205. ection  click Advanced  and Add the above as a secondary IP connection     If it is not convenient to change your PC workstation network address  you can use the ARP Ping  command to reset the console server IP address  To do this from a Windows PC       Click Start   gt  Run  or select All Programs then Accessories then Run      Type cmd and click OK to bring up the command line     Type arp  d to flush the ARP cache       Type arp    a to view the current ARP cache  this should be empty        Type the name of a program  folder  document  or    Internet resource  and Windows will open it for you     Open    Stale              Now add a static entry to the ARP table and ping the console server to assign the IP address to  the console server  In the example below  a console server has a MAC Address 00 13 C6 00 02 0F   designated on the label on the bottom of the unit  and we are setting its IP address to  192 168 100 23  Also the PC workstation issuing the arp command must be on the same  network segment as the console server  that is  have an IP address of 192 168 100 xxx       Type arp  s 192 168 100 23 00 13 C6 00 02 OF  Note for UNIX the syntax is  arp  s  192 168 100 23 00 13 C6 00 02 0F        Type ping  t 192 18 100 23 to start a continuous ping to the new IP Address       Turn on the console server and wait for it to configure itself with the new IP address  It will  start replying to the ping at this point       Type arp  d to flush the ARP cache again     Browser co
206. ed for  dial in access  We do not recommend this     PAP Password Authentication Protocol  PAP  is the usual method of user  authentication used on the internet  sending a username and password to a  server where they are compared with a table of authorized users  While most  common  PAP is the least secure of the authentication options     CHAP Challenge Handshake Authentication Protocol  CHAP  is used to verify a user s  name and password for PPP Internet connections  It is more secure than PAP   the other main authentication protocol     MSCHAPv2 Microsoft Challenge Handshake Authentication Protocol  MSCHAP  is  authentication for PPP connections between a computer using a Microsoft  Windows operating system and a network access server  It is more secure than  PAP or CHAP  and is the only option that also supports data encryption     724 746 5500   blackbox com Page 83       Note  The User name and Password to be used for the dial in PPP link are setup when the User is  initially set up with dialin Group membership  The dialin Group supports multiple dial in users   Any dial back phone numbers are also configured when the User is set up           Note Chapter 15   Advanced Configuration  has examples of Linux commands that you can use to  control the modem port operation at the command line level        5 1 2 Using SDT Connector client    Administrators can use their SDT Connector client to set up secure OoB dial in access to all their remote  console servers  With a point
207. ed to unlock the SIM card    Phone Number  the sequence to dial to establish the connection  defaults to  99   1    Username   Password  optional  and Dial string  optional AT commands   However you generally will only  need to enter your provider s APN and leave the other fields blank         gt  Enter the carrier s APN e g  for AT amp T  USA  simply enter i2gold  for T Mobile  USA  enter  epc tmobile com  for InterNode  Aust  enter internode and for Telstra  Aust  enter te stra internet     gt  If the SIM Card is configured with a PIN Code  you will be required to unlock the Card by entering  the PIN Code  If the PIN Code is entered incorrectly three times  then the PUK Code will be  required to unlock the Card     You may also need to set Override DNS to use alternate DNS servers from those provided by your  carrier      gt  To enable Override DNS  check the Override returned DNS Servers box  Enter the IP of the  DNS servers into the spaces provided     Override DNS    Override returned Vv  DNS servers Use the following DNS servers instead of the PPP provided servers    DNS Server 1    The primary DNS server       DNS Server 2       gt  Check Apply and a radio connection will be established with your cellular carrier    724 746 5500   blackbox com Page 90    5 6 2 Connect to the CDMA EV DO carrier network    The LES1408A  LES1416A  LES1432A and LES1448A console servers have an internal CDMA modem   The LES1508A  LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console se
208. elect Widget    Auto Responses                     System Name  les1308a Model LES1308A Firmware  3 5 3u5  Uptime  0 days  20 hours  53 mins  47 secs Current User  root       Select Widget    Select Widget  4    Select Widget  6    1     Selec lich wi to display in this  Select Widget Active Users X  a Se hich widget to display in this  Select Widget  5   ay in this  on   Refresh Timer C S  Ol        a       Backup Log Out    Configure Widgets    Managed Devices        which w o display in this       widget to display in this       Environmental  j    S ch widget to display in this             Apply       Note  The Alerts widget is a new screen that shows the current alerts status  When an alert gets  triggered  a corresponding  XML file is created in  var run alerts   The dashboard scans all these files and  displays a Summary status in the alerts widget  When an alert is deleted  the corresponding  XML files  that belong to that alert are also deleted        To configure what is to be displayed by each widget      gt     Go to the Configure widgets panel and configure each selected widget  for example  specify    which UPS status is to be displayed on the ups widget or the maximum number of Managed  Devices to be displayed in the devices widget     Click Apply     System Name  A  Uptime  0 d    NETWORK SERVICES    c Model  LES121      53 mins     Firmware  2 8 0u2  Current User  root       Serial  amp  Network  Serial Port   Users  amp  Groups  Authentication  Network Hosts
209. elect the pre configured serial  port that the EMD will be Connected Via      gt  You may optionally calibrate the EMD with a Temperature Offset    or     C  or Humidity Offset       or percent       gt  Provide Labels for each of the two alarms  if used      724 746 5500   blackbox com    Page 164     gt  Check Log Status and specify the Log Rate  minutes between samples  if you want to log the  status from this EMD  These logs can be views from the Status  Environmental Status screen      gt  Click Apply  This will also create a new Managed Device  with the same name      8 3 2 Environmental alerts    You can now set temperature  humidity and probe status alerts using Alerts  amp  Logging  Alerts  refer to    Chapter 7      8 3 3 Environmental status    You can monitor the current status of all EMDs and their probes      gt  Select the Status  Environmental Status menu and a table with the summary status of all  connected EMD hardware will be displayed      gt  Click on View Log or select the Environmental Logs menu and you will be presented with a table  and graphical plot of the selected EMD   s log history     A Firmware  2 8 0u2  Uptime  0 days  19 hours  15 r    NETWORK SERVICES    Serial  amp  Network  Serial Port   Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  PortLog  Alerts  SMTP  amp  SMS  SNMP    System  Administration   SSL Certificate
210. en setting the Framed Filter ld  the system may also remove the leading colon for an empty field   To work around this  add some dummy text to the start of the string  For example     dummy group_namestesigroup1 users      gt  If no group is specified for a user  for example AmandauJones  then the user will have no User  Interface and serial port access but limited console access     gt  Default groups available on the console server include    admin    for administrator access and     users    for general user access    TomFraser Cleartext Password       FraTom70     Framed Filter ld      group_name admin       AmandaJones _ Cleartext Password     JonAma83      FredWhite Cleartext Password     WhiFre62     Framed Filter Id   group_name testgroup1 users       JanetLong Cleartext Password     LonJan57       Framed Filter ld      group_name admin         gt  Additional local groups such as testgroup1 can be added via Users  amp  Groups  Serial  amp   Network    9 1 8 Remote groups with LDAP authentication    Unlike RADIUS  LDAP has built in support for group provisioning  which makes setting up remote groups  easier  The console server will retrieve a list of all the remote groups that the user is a direct member of   and compare their names with local groups on the console server        Note  Any spaces in the group name will be converted to underscores        724 746 5500   blackbox com Page 172    For example  in an existing Active Directory setup  a group of users may be pa
211. enable log storage and connection logging       Select Alerts  amp  Logging  Port Log     Configure log storage     Select Serial  amp  Network  Serial Port  Edit the serial port s      Under Console server  select Logging Level 1 and click Apply    There   s a useful tutorial on creating a bash script CGI at  http   www  yolinux com TUTORIALS LinuxTutorialCgiShellScript htm     Similarly  the Master does maintain a view of the status of the slaves      Select Status  Support Report     Scroll down to Processes     Look for   bin ssh  MN  o ControlPath  var run cascade  h slavename     These are the slaves that are connected     Note the end of the Slaves  names will be truncated  so the first 5 characters must be unique    Alternatively  you can write a custom CGI script as described above  The currently connected Slaves can    be determined by running   s  var run cascade and the configured slaves can be displayed by running   config  g config cascade slaves    724 746 5500   blackbox com Page 270    Appendix A Linux Commands  amp  Source Code    The console server platform is a dedicated Linux computer  optimized to provide monitoring and secure  access to serial and network consoles of critical server systems and their supporting power and  networking infrastructure     Black Box console servers are built on the 2 4 uCLinux kernel as developed by the uCLinux project  This is  GPL code and source can be found at http   cvs uclinux org  Some uCLinux commands have config fil
212. ent  enter the console servers IP  address as the    Host Name  or IP address         To access the console server command line   select    SSH    as the protocol  and use the  default IP Port 22     Click    Open    and the console server login  prompt will appear   You may also receive a     Security Alert    that the host   s key is not  cached  Choose    yes    to continue      Using the Telnet protocol is similarly simple    but you use the default port 23     Another popular communications package you can use is SSHTerm  an open source package that you can    download from http   sourceforge net projects sshtools      To use SSHTerm for an SSH terminal session from a Windows Client  simply Select the    File    option  and click on    New Connection        Connection Profile    Host   Protocol  Proxy Commands Terminal    Hostname  z 19216801  Port    3001  Userrame  root    a    password  pablckey    keybord interactive       3 6 Management network configuration         A new dialog box will appear for your    Connection Profile      Type in the host name or IP address  for the console server  unit  and the TCP port that the SSH session will use  port 22    Then  authentication  and click connect     in your username  choose password      You may receive a message about the host key fingerprint   Select    yes    or    always    to continue       The next step is password authentication  The system  prompts you for your username and password from the  remote system  Thi
213. ent Specify whether this will be a client or server configuration file    server In the server configuration file  define the IP address pool and netmask   For example  server 10 100 10 0 255 255 255 0   proto udp Set the protocol to UDP or TCP  The client and server must use the   proto tcp same settings    mssfix  lt max  size gt  Mssfix sets the maximum size of the packet  This is only useful for UDP  if problems occur    verb  lt level gt  Set log file verbosity level  Log verbosity level can be set from 0   minimum  to 15  maximum   For example   0   silent except for fatal errors  3   medium output  good for general usage       724 746 5500   blackbox com Page 74       5   helps with debugging connection problems  9   extremely verbose  excellent for troubleshooting                dev tun Select    dev tun    to create a routed IP tunnel or    dev tap    to create an   dev tap Ethernet tunnel  The client and server must use the same settings    remote  lt host gt  The hostname IP of OpenVPN server when operating as a client  Enter  either the DNS hostname or the static IP address of the server    Port The UDP TCP port of the server    Keepalive Keepalive uses ping to keep the OpenVPN session alive   Keepalive 10    120  pings every 10 seconds and assumes the remote peer is down if no  ping has been received over a 120 second time period        http proxy  lt proxy If a proxy is required to access the server  enter the proxy server DNS  server gt   lt proxy port   gt  na
214. entrance pub   cat   home user keys control_room pub  home user keys plant_entrance pub  gt    home user keys authorized_keys_bridge_server       724 746 5500   blackbox com Page 254    Master    Master       authorized_keys    ssh rsa AAAABINzaC 1yc2Efas tGH    AAA   name elient1   ssh dss AAAAB3NzaZr OV01C8gdgz  _   BEGIN DSA XDg   name client2    PRIVATE KEY        MIBugIBAAKBGOCR PRIVATE KEY        JX  Li    gt  ik RENNA MIIEogIBAAKCAQEA   oynY4QNIXjIYU7T nujXXPGIQGyD3b79   87ITLQIAhn3yp7ZWYy KZg3UZ4M  ZI5255Cy  TZ5C3sLF8046G0 opv4TJTvTK6e8OIvt   GYTByUdl           ssh dss  sh rsa  AMAAAB3INzaZr OV01 C8gdaz  AAAABSNzal 1yc2Efg4tG  HIAAA   name eclient1    XDg   name client2  id_dsa pub id_rsa pub       More documentation on OpenSSH can be found at   http   openssh org portable html  http   www openbsd org cgi bin man cgi query ssh amp sektion 1  http   www openbsd org cgi bin man cgi query sshd     15 6 5 Generating public private keys for SSH  Windows   This section describes how to generate and configure SSH keys using Windows     First create a new user from the Black Box Management  the following example uses a user called   testuser   making sure it is a member of the  users  group     If you do not already have a public private key pair you can generate them now using ssh keygen   PuTTYgen or a similar tool   PuTTYgen  http   www chiark greenend org uk  sgtatham putty download html  OpenSSH  http   www openssh org   OpenSSH  Windows   http   sshwindows sourceforge n
215. equired  specify TACACS Service to authenticate with  This determines which set of attributes  are returned by the server  defaults to raccess       gt  If required  check Default Admin Privileges to give all TACAS  authenticated users admin  privileges  Use Remote Groups must also be ticked for these privileges to be granted     gt  Click Apply  TACAS  remote authentication will now be used for all user access to console server  and serially or network attached devices        TACACS  The Terminal Access Controller Access Control System  TACACS   security protocol is a  recent protocol developed by Cisco  It provides detailed accounting information and flexible  administrative control over the authentication and authorization processes  TACACS  allows for a  single access control server  the TACACS  daemon  to provide authentication  authorization  and  accounting services independently  Each service can be tied into its own database to take  advantage of other services available on that server or on the network  depending on the  capabilities of the daemon  There is a draft RFC detailing this protocol  You can find further  information on configuring remote TACACS  servers at the following sites     http   www cisco com en US tech tk59 technologies_tech_note09186a0080094e99 shtml    http   www cisco com en US products sw secursw ps491 1 products_user_guide_chapter09186a0  0800eb6d6 html    http   cio cisco com univercd cc td doc product software ios1 13ed 1 13ed_cr secur_c s
216. er  To enable NSCA     724 746 5500   blackbox com Page 186    10 3 4    Select System  Nagios and check NSCA Enabled     Select the Encryption to be used from the drop down menu  then enter a Secret password and  specify a check Interval     Refer to the sample Nagios configuration section below for some examples of configuring  specific NSCA checks     Configure Selected Serial Ports for Nagios Monitoring    The individual Serial Ports connected to the console server to be monitored must be configured for  Nagios checks  Refer to Chapter 4 4   Network Host Configuration for details on enabling Nagios  monitoring for Hosts that are network connected to the console server  To enable Nagios to monitor a  device connected to the console server serial port      gt    gt     10 3 5    Select Serial  amp  Network  Serial Port and click Edit on the serial Port   you want to monitor     Select Enable Nagios  specify the name of the device on the upstream server and determine the  check you want to run on this port  Serial Status monitors the handshaking lines on the serial  port and Check Port monitors the data logged for the serial port     Configure Selected Network Hosts for Nagios Monitoring    The individual Network Hosts connected to the console server that you want to monitor must also be  configured for Nagios checks      gt    gt     VV V WV    Select Serial  amp  Network  Network Port and click Edit on the Network Host you want to monitor     Select Enable Nagios  specify 
217. er  which defaults to  777      gt  Click Apply    gt  The Cellular statistics page on Status  Statistics will display the current state of the modem      gt  OTASP success will result in a valid phone number being placed in the NAM Profile Account  MDN field     Manual Activation   Some carriers may not support OTASP in which case it may be necessary to manually provision the  modem      gt  Select Internal Cellular Modem panel on the System  Dial menu     gt  Enter the MSL  MDN and MSID values  These values are specific to your carrier and for manual  activation you will have to investigate what values your carrier uses in each field  For example  Verizon have been known to use an MSL of 000000 and the phone number assigned to your  console server device as both the MDN and MSID with no spaces or hyphens e g     5551231234     for    555 123 1234        gt  Click Activate  If no errors occur you will see the new values entered into the NAM Profile at the  Cellular page on Status  Statistics    724 746 5500   blackbox com Page 91     gt     5 6 3    Navigate to the Internal Cellular Modem tab on System  Dial  To connect to your carriers 3G  network enter the appropriate phone number  usually  777  and a Username and Password if  directed to by your account plan documentation    Select Enable and then click Apply to initiate the Always On Out of Band connection    Verify cellular connection    Out of band access is enabled by default so the cellular modem connection should no
218. er 2008  you can have  multiple sessions  and with Server 2003 you have three sessions    the console session and  two other general sessions   More than one user can have active sessions on a single  computer     When the remote user connects to the accessed computer on the console session  Remote  Desktop automatically locks that computer  no other user can access the applications and  files   When you come back to your computer at work  you can unlock it by typing  CTRL ALT DEL        6 8 2    Configure the Remote Desktop Connection client    Now that you have the Client PC securely connected to the console server  either locally  or remotely     through the enterprise VPN  or a secure SSH internet tunnel  or a dial in SSH tunnel   you can establish  the Remote Desktop connection from the Client  Simply enable the Remote Desktop Connection on the  remote client PC  then point it to the SDT Secure Tunnel port in the console server     A  Ona Windows client PC     gt     Click Start  Point to Programs  then to Accessories  then Communications  and click Remote  Desktop Connection     724 746 5500   blackbox com Page 120     iix    Connection         Remote Desktop  1y         Computer   192 168 2 19 z     Username  WINSERVER 2 Bill  You will be asked for credentials when you connect        J cose   Hep   Ontions  gt  gt       In Computer  enter the appropriate IP Address and Port Number          Where there is a direct local or enterprise VPN connection  enter the IP Address
219. er that is  true depends on what the Program does     1  You may copy and distribute verbatim copies of the Program s source code as you receive it  in any medium   provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and  disclaimer of warranty  keep intact all the notices that refer to this License and to the absence of any warranty  and  give any other recipients of the Program a copy of this License along with the Program     You may charge a fee for the physical act of transferring a copy  and you may at your option offer warranty protection  in exchange for a fee     2  You may modify your copy or copies of the Program or any portion of it  thus forming a work based on the  Program  and copy and distribute such modifications or work under the terms of Section 1 above  provided that you  also meet all of these conditions     a  You must cause the modified files to carry prominent notices stating that you changed the files and the date of  any change     724 746 5500   blackbox com Page 281    b  You must cause any work that you distribute or publish  that in whole or in part contains or is derived from the  Program or any part thereof  to be licensed as a whole at no charge to all third parties under the terms of this  License     c  If the modified program normally reads commands interactively when run  you must cause it  when started  running for such interactive use in the most ordinary way  to print or display an anno
220. erated key Save public key Save private key    Parameters    Type of key to generate   OSSH 1  RSA     SSH 2 RSA OSSH 2 DSA    Number of bits in a generated key  1024       Create a new file   authorized_keys    with notepad  and copy your public key data from the  Public  key for pasting into OpenSSH authorized_keys file  section of the PUTTY Key Generator  and paste  the key data to the  authorized_keys  file  Make sure there is only one line of text in this file     Use WinSCP to copy this  authorized_keys  file into the users home directory  e g    etc config users testuser  ssh authorized_keys of the Black Box gateway which will be the SSH  server  You will need to make sure this file is in the correct format with the correct permissions with  the following commands       dos2unix     etc config users testuser  ssh authorized_keys  amp  amp  chown testuser     etc config users testuser   ssh authorized_keys    Using WinSCP copy the attached sshd_config over  etc config sshd_config on the server  Makes  sure public key authentication is enabled      Test the Public Key by logging in as  testuser  Test the Public Key by logging in as  testuser  to the  client Black Box device and typing  you should not need to enter anything     ssh  o  StrictHostKeyChecking no  lt server ip gt     724 746 5500   blackbox com Page 256    To automate connection of the SSH tunnel from the client on every power up you need to make the  clients  etc config rc local look like the following     
221. erformed when the trigger  condition has been resolved     To configure  first set the general parameters that will be applied to all Auto Responses      gt  Check Log Events on Alerts  amp  Logging  Auto Response to enable logging all Auto   Response activities     gt  Check Delay after Boot to set any general delay to be applied after console server system  boot  before processing events    724 746 5500   blackbox com Page 135    System Name  les1308a Model  LES1308A Firmware  3 5 3u5 ba  0   Uptime  0 days  18 hours  51 mins  O0 secs Current User  root    Bacup Log Out    BLAC    NETWORK SERVICES       Serial  amp  Network 5  Configured Auto Responses     Serial Port  M E Groups Name Check Type Status Modify Delete Cancel  New Auto Response  Global Auto Response Settings  Log Events oO  Log Events and actions related to Auto Responses  Delay after boot 120  Delay after system boot before processing events    Save Settings    Auto Response Logs       No AutoResponse Logs       SNMP    To configure a new Auto Response      gt      gt     Select New Auto Response in the Configured Auto Response field  You will be presented    with a new Auto Response Settings menu    Enter a unique Name for the new Auto Response    Specify the Reset Timeout for the time in seconds after resolution to delay before this Auto     Response can be triggered again    Check Repeat Trigger Actions to continue to repeat trigger action sequences until the check    is resolved    Enter any required dela
222. erial DB9 Port or Internal  Modem Port     gt  Check Enable Dial In    Note The console server console modem serial port is set by default to 115200 baud  No parity  8 data  bits and 1 stop bit  with software  Xon Xoff  flow control enabled for the Serial DB9 Port and 9600  baud for the Internal modem and PC Card Ports  When enabling OoB dial in  we recommend that  this be changed to 38 400 baud with Hardware Flow Control     gt  Select the Baud Rate and Flow Control that will communicate with the modem    gt  Click Apply  Note You can further configure the console modem port  for example  to include modem init strings  by    editing  etc mgetty config files as described in the Chapter 15   Advanced Configuration        724 746 5500   blackbox com Page 82    In the Remote Address field  enter the IP address to be assigned to the dial in client  You can  select any address for the Remote IP Address  It  and the Local IP Address  must both be in the  same network range  e g  200 100 1 12 and 200 100 1 67      In the Local Address field  enter the IP address for the Dial In PPP Server  This is the IP address  that will be used by the remote client to access console server once the modem connection is  established  You can select any address for the Local IP Address but it must be in the same  network range as the Remote IP Address     The Default Route option enables the dialed PPP connection to become the default route for  the Console server     The Custom Modem Initialization
223. ernet  port for broadband OoB access     Make sure you unplug the console server power before installing the modem  When it next boots   it will detect the modem and a PC Card Modem tab will appear under System   gt  Dial     The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A   LES1348A  LES1108A  LES1116A  LES1132 and LES1148A models need to have an external  modem attached via a serial cable to the DB9 port marked Local  located on the front of the unit         5 1 1    Configure Dial In PPP    To enable dial in PPP access on the modem     System Name  les1308a Model LES1308A Firmware  3 5 3u5 ba  0   Uptime  0 days  16 hours  58 mins  39 secs Current User  root  B    aduP Log Out       Serial  amp  Network   Message Changes to configuration succeeded      Serial Port     Users  amp  Groups  Serial DB9 Port Internal Modem Internal Cellular Modem    Internal Modem Dial Settings  Disable Dial C    Disable modem communication   Enable Dial in    Allow incoming modem communication    Enable Dial Out     Allow outgoing modem communication        Serial Settings    se     SMTP  amp  SMS Baud Rate 38400       SNMP   The port speed in characters per second   System   Flow Control Software  gt      Administration The method of flow control to use     SSL Certificates     Configuration Backup     Firmware     P Dial In Settings     Date  amp  Time     Dial Remote Address           gt  Select the System  Dial menu option and the port to be configured  S
224. ers only  7 3 6 Send Nagios Event     gt  Click on Send Nagios Event as the Add Trigger Action  Enter a unique Action Name and  set the Action Delay Time     gt  Edit the Nagios Event Message text to display on the Nagios status screen for the service     gt  Specify the Nagios Event State  OK  Warning  Critical or Unknown  to return to Nagios for  this service    724 746 5500   blackbox com Page 141     gt  Click Save New Action       Note  To notify the central Nagios server of Alerts  NSCA must be enabled under System  Nagios and  Nagios must be enabled for each applicable host or port       7 4 Resolve Actions    Actions can also be scheduled to be taken a trigger condition has been resolved      gt  For a nominated Auto Response   with a defined trigger Check Condition   click on Add  Resolve Action  e g  Send Email or Run Custom Script  to select the action type to be  taken    Note  Resolve Actions are configured exactly the same as Trigger Actions except the designated  Resolve Actions are all executed on resolution of the trigger condition and there are no Action  Delay Times set       Resolve Actions          Scheduled Resolve Actions    Add  Resolve  Action       Action Action Modify Delete  Name Type       Scheduled                         7 5 Configure SMTP  SMS  SNMP and or Nagios service for alert notifications  The Auto Response facility enables remote alerts to be sent as Trigger and Resolve Actions  Before such  alert notifications can be sent  you must conf
225. erver  you can back up the configuration to an  off box file  Before backing up you need to arrange a way to transfer the backup off box  This  could be via an NFS share  a Samba  Windows  share to USB storage  or copied off box via the  network  If backing up directly to off box storage  make sure it is mounted      tmp is not a good location for the backup except as a temporary location before transferring it  off box  The  tmp directory will not survive a reboot  The  etc config directory is not a good  place either  because it will not survive a restore     Backup and restore should be done by the root user to make sure correct file permissions are  set  The config command is used to create a backup tarball     config  e  lt Output File gt     The tarball will be saved to the indicated location  It will contain the contents of the   etc config  directory in an uncompressed and unencrypted form     Example nfs storage       mount  t nfs 192 168 0 2  backups  mnt   config  e  mnt les4108 config    umount mnt     Example transfer off box via scp       config  e  tmp les4108 config    scp  tmp les4108 config 192 168 0 2  backups    The config command is also used to restore a backup     config  i  lt Input File gt     724 746 5500   blackbox com Page 244    This will extract the contents of the previously created backup to  tmp  and then synchronize  the  etc config directory with the copy in  tmp     One problem that can crop up here is that there is not enough room in  tmp 
226. es  that can be altered  e g  portmanager  inetd  init  ssh sshd scp sshkeygen  ucd snmpd  samba  fnord   sslwrap   Other commands you can run and do neat stuff with  e g  loopback  bash  shell   ftp  hwclock   iproute  iptables  netcat  ifconfig  mii tool  netstat  route  ping  portmap  pppd  routed  setserial   smtpclient  stty  stunel  tcodump  tftp  tip  traceroute     Below are most of the standard uCLinux and BusyBox commands  and some custom Black Box  commands  that are in the default build tree  The Administrator can use these to configure the console  server  and monitor and manage attached serial console and host devices        addgroup   Add a group or add an user to a group   adduser   Add an user   agetty alternative Linux getty   arp Manipulate the system ARP cache   arping Send ARP requests replies   bash GNU Bourne Again Shell   busybox Swiss army knife of embedded Linux commands   cat   Concatenate FILE s  and print them to stdout   chat Useful for interacting with a modem connected to stdin stdout   chgrp   Change file access permissions   chmod   Change file access permissions   chown   Change file owner and group   config Black Box tool to manipulate and query the system configuration from the  command line   cp   Copy files and directories   date   Print or set the system date and time   dd   Convert and copy a file   deluser   Delete USER from the system   df   Report filesystem disk space usage   dhcpd Dynamic Host Configuration Protocol server   disca
227. es select PKI  X 509 Certificates  or select Custom Configuration to upload custom  configuration files  Custom configurations must be stored in  etc config        Note  If you select PKI  public key infrastructure  you will need to establish      Separate certificate  also known as a public key   This Certificate File will be a   crt file type     Private Key for the server and each client  This Private Key File will be a   key file type     Master Certificate Authority  CA  certificate and key which is used to sign each of the server and   client certificates  This Root CA Certificate will be a   crt file type   For a server you may also need dh1024 pem  Diffie Hellman parameters   Refer  http   openvpn net easyrsa html for a guide to basic RSA key management  For alternative authentication  methods see hitp   openvpn net index php documentation howto html auth  For more information also  see http   openvpn net howto html        gt  Check or uncheck the Compression button to enable or disable compression  respectively    4 10 2 Configure as Server or Client   gt  Complete the Client Details or Server Details depending on the Tunnel Mode selected     o If Clienthas been selected  the Primary Server Address will be the address of the  OpenVPN Server     724 746 5500   blackbox com Page 72    o If Server has been selected  enter the IP Pool Network address and the IP Pool Network  mask for the IP Pool  The network defined by the IP Pool Network address mask is used  to provide
228. et download     For example  using PuTTYgen  make sure you have a recent version of the puttygen exe  available from  http   www chiark  greenend org uk  sgtatham putty download html  Make sure you have a recent  version of WinSCP  available from http   winscp net eng download php      To generate a SSH key using PuTTY http   sourceforge net docs FO2  clients     724 746 5500   blackbox com Page 255    Execute the PUTTYGEN EXE program    Select the desired key type SSH2 DSA  you may use RSA or DSA  within the Parameters section   It is important that you leave the passphrase field blank    Click on the Generate button     Follow the instruction to move the mouse over the blank area of the program in order to create  random data used by PUTTYGEN to generate secure keys  Key generation will occur once PUTTYGEN  has collected sufficient random data       PuTTY Key Generator    File Key Conversions Help    Key  Public key for pasting into OpenSSH authorized_keys file     MASAB IN z2aC 1 yo2EAASABIOASAIBI NOAGKIGY zoky1 ORVc3wbK2TZYuGsT LKFZe  HK gnmb21 OvputT 4ayqJf1f3qg3SxF4JDFIB7AdoL2VTRTHH8131bFH8SsNECnT 5m bp T   1  pLNALvHOB tDXyLIFnEAppLGmxtuZpneF fk fyaeSqns TY CYTO f3rebD uhNPudhw      1sa key 20061212       Key fingerprint    ssh tsa 1023 91 18 3d 14 f7 07 86 64 f2 ca 4a 9b 7e cf 18 4b          Key comment  tsa key 20061212  Key passphrase              Confirm passphrase        Actions    Generate a public private key pair  Load an existing private key file  Save the gen
229. etwork Host        The destination network host that the route provides access to   Destination a   netmask   EEEE Gasaeciaa eaten  An    the range 0 32   Route Gateway D  The IP address of a router that will route packets to the destination network      SNMP Metric E        q   The route metric  which represent  a this route  Lower        System   metric routes will be used in p       Administration  SSL Certificates Apply    To add to the static route to the route table of the system      gt    gt     Select the Route Settings tab on the System  IP General Settings menu   Enter a meaningful Route Name for the route      In the Destination Network Host field enter the IP address of the destination network host that  the route provides access to     Enter a value in the Destination netmask field that identifies the destination network or host  Any  number between 0 and 32  A subnet mask of 32 identifies a host route     Enter Route Gateway with the IP address of a router that will route packets to the destination  network     Enter a value in the Metric field that represents the metric of this connection  This generally only  has to be set if two or more routes conflict or have overlapping targets  Any number equal to or  greater than 0     Click Apply     724 746 5500   blackbox com Page 45    Chapter 4 Serial Port  Host  Device  amp  User Configuration       Introduction    The Black Box console server enables access and control of serially attached devices and network  att
230. etwork ports      Circuit Switched Data  CSD  mode  In this dial in mode the cellular modem can receive incoming calls  from remote modems who dial a special Data Terminating number    5 7 1 OOB access set up    Out of band access is enabled by default and the cellular modem connection is always on  However to be  directly accessed the console server needs to have a Public IP address and it must not have SSH access  firewalled     Almost all carriers offer corporate mobile data service plans with a Public  static or dynamic  IP address   These plans often have a service fee attached      gt  If you have such a static Public IP address plan you can also now try accessing the console  server using the Public IP Address provided by the carrier  However by default only HTTPS  and SSH access is enabled on the OOB connection  So you can browse to the console  server  but you cannot ping it     gt  If you have a dynamic Public IP address plan then a DDNS service will need to be configured  to enable the remote administrator to initiate incoming access  Once this is done you can  then also try accessing the console server using the allocated domain name    By default most providers offer a consumer grade service which provides dynamic Private IP address  assignments to 3G devices  This IP address is not visible across the Internet but generally it is adequate  for home and general business use      gt  With such a plan the Failover amp  Out of Band tab on the Status  Statistics shows
231. evice  the console port of a network router   and to send alerts back to the Nagios server  when an Administrator connects to the router or IIS server     This walkthrough provides an example  but details of the configuration options are described in the next  section  This walkthrough also assumes the network host and serial devices are already physically  connected to the console server  The first step is to set up the Nagios features on the console server     Q System Name  AC Model  LES1216A Firmware  2 8 0u2  BLA K B X Uptime  0 days  1 48 mins  14 secs Current User  root    NETWORK SERVICES       Serial  amp  Network   Serial Port Enabled   Users  amp  Groups Switch on the Nagios service    Authentication   Network Hosts Nagios Host Name   Trusted Networks Name ofthis syste   Cascaded Ports   UPS Connections Nagios Host Address   RPC Connections   Environmental   Managed Devices Nagios Server  Address    n in Nagios  Generated from System Name if unspecified     Address for Nagios to find this device at  Defaults to Network 1 IP if set     Alerts  amp  Logging  Port Log Disable SDT for  Alerts Nagios Extensions Don t show sat  links in s  SMTP  amp  SMS    SNMP SDT Gateway    Address  System  Administration  SSL Certificates Use NRPE instead of NSCA whenever possible  Defaults to prefer NSCA  Canfinuentian Da    Prefer NRPE     gt  Browse the Black Box console server and select System  Nagios on the console server  Management Console  Check Nagios service Enabled      g
232. evice Settings    Device Type None      None pe    RPC  Environmental       gt  Select the desired Device Type  UPS  RPC or EMD      gt  Proceed to the appropriate device configuration page  Serial  amp  Network  UPS Connections  RPC  Connection or Environmental  as detailed in Chapter 8    Power  amp  Environmental Management     4 1 5 Terminal Server Mode     gt  Select Terminal Server Mode and the Terminal Type  vt220  vt102  vt100  Linux  or ANSI  to  enable a getty on the selected serial port     Terminal Server Settings    Terminal Server  Mode    Enable a TTY login for a local terminal attached to this serial port  Terminal Type vi220    The terminal standard to use on this serial port    The getty will then configure the port and wait for a connection to be made  An active connection on a  serial device is usually indicated by the Data Carrier Detect  DCD  pin on the serial device being raised   When a connection is detected  the getty program issues a login  prompt  and then invokes the login  program to handle the actual system login        Note Selecting Terminal Server mode will disable Port Manager for that serial port  so data is no longer  logged for alerts  etc        724 746 5500   blackbox com Page 54    4 1 6 Serial Bridging Mode    With serial bridging  the serial data on a nominated serial port on one console server is encapsulated  into network packets and then transported over a network to a second console server  It is then  represented on its serial p
233. ew password for root  the main  administrative user account  so choose a complex password  and keep it safe        Note There are no restrictions on the characters that can be used in the Password  It can contain up to  254 characters  However  only the first eight System Password characters are used to make the  password hash        724 746 5500   blackbox com Page 29    Click Apply  Since you have changed the password you will be prompted to log in again  This  time  use the new password        Note    3 2 1    If you are not confident that your console server has the current firmware release  you can  upgrade  Refer to Upgrade Firmware   Chapter 10     Set up new administrator    It is also recommended that you set up a new Administrator user as soon as convenient and log in as  this new user for all ongoing administration functions  rather than root      This Administrator can be configured in the admin group with full access privileges through the Serial  amp   Network  Users  amp  Groups menu  refer Chapter 4 for details     3 2 2    Name the console server    It is also recommended that you set up a System Name for your console server to make it simple to  identify     System Name  M Firmware  3 5      3 5 3u5   lt SBLACK BOX Uptime  0 d  5 s  36 S Current User  root    NETWORK SERVICES                       Serial  amp  Network E  System     Serial Port Name pum     Users  amp  Groups An ID for this device   System  Description  a The physical location of this device 
234. ext to each user who should be allowed a connection to this    computer  Note that other factors  such as a disabled user account  may affect a user s  ability to connect     Users allowed to connect   0G Guest  1  HelpAssistant  Remote Desktop Help Assistant Account              Remote Bob  Remote Bob    C   j SUPPORT_388945a0  CN Microsoft Corporation L Redmond S Washingt    o Egi SUPPORT_  151ab9  CN Dell Computer Corporation  L Round Rock S Te_  v    lt  j   B              gt  Specify which Users will be allowed to use this connection  This should be the same Users who  were given Remote Desktop access privileges in the earlier step  Click Next      gt  On the Network Connection screen select TCP IP and click Properties     Incoming TCP IP Properties    Nawas     V  Allow callers to access my local area network    TCP IP address assignment     Assign TCP IP addresses automatically using DHCP      Specify TCP IP addresses   From  169   134  143   1l    To  169   134   133   2       Total        V  Allow calling computer to specify its own IP address        gt  Select Specify TCP IP addresses on the Incoming TCP IP Properties screen  select TCP IP   Nominate a From  and a To  TCP IP address  and click Next        Note You can choose any TCP IP addresses so long as they are addresses that are not used    anywhere else on your network  The From  address will be assigned to the Windows XP 2003  computer and the To  address will be used by the console server  For simplicity  us
235. ey authentication       gt  To use public key authentication with SDT Connector  you must first create an RSA or DSA key pair   using ssh keygen  PuTTYgen or a similar tool  and add the public part of your SSH key pair to the  Black Box gateway   as described in the earlier section      gt  Next  add the private part of your SSH key pair  this file is typically named id_rsa or id_dsa  to SDT  Connector client  Click Edit   gt  Preferences   gt  Private Keys   gt  Add  locate the private key file and click  OK  You do not have to add the public part of your SSH key pair  it is calculated using the private key     SDT Connector will now use public key authentication when SSH connecting through the console server   You may have to restart SDT Connector to shut down any existing tunnels that were established using  password authentication     If you have a host behind the console server that you connect to by clicking the SSH button in SDT  Connector  you can also configure it for public key authentication  Essentially what you are using is SSH  over SSH  and the two SSH connections are entirely separate  and the host configuration is entirely  independent of SDT Connector and the console server  You must configure the SSH client that SDT  Connector launches  e g  Putty  OpenSSH  and the host   s SSH server for public key authentication     15 7 Secure Sockets Layer  SSL  Support    Secure Sockets Layer  SSL  is a protocol developed by Netscape for transmitting private documents 
236. f the redirection  If you  leave this blank  a random port is selected     724 746 5500   blackbox com Page 110       E   sDTConnector  File Edit Help                                              Local Address localhost    Local TCP Port  5900  UDP Port                                                        Note SDT Connector can also tunnel UDP services  SDT Connector tunnels the UDP traffic through  the TCP SSH redirection  so it is a    tunnel within a tunnel        Enter the UDP port where the service is running on the host  This will also be the local UDP port  that SDT Connector binds as the local endpoint of the tunnel     Note that for UDP services  you still need to specify a TCP port under General  This will be an  arbitrary TCP port that is not in use on the gateway  An example of this is the SOL Proxy service   It redirects local UDP port 623 to remote UDP port 623 over the arbitrary TCP port 6667        6 2 7 Adding a client program to be started for the new service    Clients are local applications that you may launch when a related service is clicked  To add to the pool of  client programs      gt  Select Edit  Preferences and click the Client tab  Click Add     E SDTConnector  File Edit Help            SDTConnector Preferences       Add Client  gt on  RIOT  Client name    Path to client executable file                                                                724 746 5500   blackbox com Page 111     gt  Enter a Name for the client  Enter the Path to the e
237. faces or Bond Interfaces    o When bridging is enabled  network traffic is forwarded across all Ethernet ports with no  firewall restrictions  All the Ethernet ports are all transparently connected at the data  link layer  layer 2  so they do retain their unique MAC addresses     o With bonding the network traffic is carried between the ports but they present with one  MAC address     o Both modes remove all the Management LAN Interface and Out of Band Failover  Interface functions and disable the DHCP Server                  o Allthe Ethernet ports are all transparently connected at the data link layer  layer 2  and  they are configured collectively using the Network Interface menu     3 6 5 Static routes    Static routes provide a very quick way to route data from one subnet to different subnet  So you can hard  code a path that specifies to the console server to get to a certain subnet by using a certain path  This  may be useful for remotely accessing various subnets at a remote site when being accessed using the  cellular out of band connection     724 746 5500   blackbox com Page 44    System Name  les1308a Model LES1308A Firmware  3 5 3u5 aa  0     N     Uptime  0 days  8 hours  33 mins  46 secs Current User  root  BaduP Log Out    NETWORK SERVICES       Serial  amp  Network    Network Interface Management LAN General Settings Route Settings     Serial Port    Interface        Route Settings    Route Name New Route    Meaningful name for the Route    Destination Sas  N
238. g  s config interfaces lan dhcpd staticips staticip1 mac 00 1e 67 82 72 d9    config  s config interfaces lan dhcpd staticips staticip1 host John PC     config  s config interfaces lan dhcpd staticips total 1    The following command will synchronize the live system with the new configuration       config  a    14 22 Services    You can manually enable or disable network servers from the command line  For example  if you wanted  to guarantee the following server configuration     HTTP Server Enabled  HTTPS Server Disabled  Telnet Server Disabled  SSH Server Enabled  SNMP Server Disabled  Ping Replies  Respond to ICMP echo requests  Disabled  TFTP server Enabled      config  s config services http enabled on    config  d config services https enabled     config  d config services telnet enabled     config  s config services ssh enabled on     config  d config services snmp enabled     config  d config services pingreply enabled    config  s config services tftp enabled on    To set secondary port ranges for any service      config  s config services telnet portbase  port base number  Default  2000    config  s config services ssh portbase  port base number  Default  3000    config  s config services tcp portbase  port base number  Default  4000    724 746 5500   blackbox com Page 234      config  s config services rfc2217 portbase  port base number  Default  5000    config  s config services unauthtel portbase  port base number Default  6000    The following command will synch
239. g it with your console server      gt  If there are multiple USB devices installed  you will be warned to remove them     724 746 5500   blackbox com Page 199    To backup to the USB  enter a brief Description of the backup in the Local Configuration Backups  menu and select Save Backup     The Local Configuration Backup menu will display all the configuration backup files you have  stored onto the USB flash     System Name  A el  L A Firmware  2 8 0u2 Ra  Uptime  0 da S Current User  root     Bacup Log Out        NETWORK SERVICES       Serial  amp  Network  Serial Port Remote Backup Local Backup  Users  amp  Groups  Authentication Local Backup  Network Hosts  Trusted Networks Description  pa A brief description to identify the backup   RPC Connections Save Backup  Environmental    _        Managed Devices  Alerts  amp  Logging Description Load On Erase  eas  Factory default     Alerts s  SMTP  amp  SMS internal    Restore Delete  SNMP  ELED Apply     gt  To restore a backup from the USB simply select Restore on the particular backup you wish to    restore and click Apply     After saving a local configuration backup  you may choose to use it as the alternate default    configuration  When the console server is reset to factory defaults  it will then load your alternate  default configuration instead of its factory settings      gt  To setan alternate default configuration  check Load On Erase and click Apply        Note Before selecting Load On Erase  make sure that you have
240. g on th        step by following the  in the top left corner of the       ys and enable supported protocols on the Seria   amp  Network Serial Port page    ess to serial ports on the Serial  amp  Network Users page  Done             A Welcome screen  which lists initial installation configuration steps  will be displayed       Change the default administration password on the Users page  Chapter 3        Configure the local network settings on the System IP page  Chapter 3        Configure port settings and enable       the Serial  amp  Network Serial Port page  Chapter 4        Configure users with access to serial ports on the Serial  amp  Network Users page  Chapter 4      If your system has a cellular modem you will also be given the steps to configure the cellular router    features       Configure the cellular modem connection on System Dial page  Chapter 5       Allow forwarding to the cellular destination network on System Firewall page  Chapter 5       Enable IP masquerading for cellular connection on System Firewall page  Chapter 5     724 746 5500   blackbox com Page 28    After completing each of the above steps  you can return to the configuration list by clicking in the top  left corner of the screen on the Black Box logo        Note Ifyou are not able to connect to the Management Console at 192 168 0 1 or if the default  Username Password were not accepted  then reset your console server  refer to Chapter 11         3 2 Administrator Password    For security re
241. g power to the console  server itself  If the UPS reaches critical battery status  the custom script in   etc config scripts ups shutdown runs  enabling you to perform any    last gasp    actions     Click Apply     Controlling UPS powered computers    One of the advantages of having a Managed UPS is that you can configure computers that draw power  through that UPS to shut down gracefully if you have UPS problems     For Linux computers  set up upsmon on each computer and direct them to monitor the console server  that is managing their UPS  This will set the specific conditions that will be used to initiate a power down  of the computer  Non critical servers may be powered down some seconds after the UPS starts running    724 746 5500   blackbox com Page 158    on battery  In contrast  more critical servers may not be shut down until a low battery warning is  received   Refer to the online NUT documentation for details on how to do this     http   eu1 networkupstools org doc 2 2 0 INSTALL html  http   linux die net man 5 upsmon conf  http   linux die net man 8 upsmon   An example upsmon conf entry might look like   MONITOR managedups 192 168 0 1 1 username password slave    managedups is the UPS Name of the Managed UPS    192 168 0 1 is the IP address of the Black Box console server    1 indicates the server has a single power supply attached to this UPS    username is the Username of the Managed UPS    password is the Password of the Manager UPS   There are NUT monitoring 
242. g www dyndns org     GNUDip gnudip cheapnet net     ODS www ods org     TZO www tzo com      3322 org  Chinese provider  www 3322 org    Upon registering with the DDNS service provider  you will select a username and password  as  well as a hostname that you will use as the DNS name  to allow external access to your machine  using a URL      The Dynamic DNS service providers allow the user to choose a hostname URL and set an initial  IP address to correspond to that hostname URL  Many Dynamic DNS providers offer a selection  of URL hostnames available for free use with their service  However  with a paid plan  any URL  hostname  including your own registered domain name  can be used     You can now enable and configure DDNS on any of the Ethernet or cellular network connections on the  console server  by default DDNS is disabled on all ports       gt     Select the DDNS service provider from the drop down Dynamic DNS list on the System IP or  System Dial menu    In DDNS Hostname enter the fully qualified DNS hostname for your console server e g  your   hostname dyndns org  Enter the DDNS Username and DDNS Password for the DDNS service provider account    Specify the Maximum interval between updates   in days  A DDNS update will be sent even if  the address has not changed    Specify the Minimum interval between checks for changed addresses   in seconds  Updates will  still only be sent if the address has changed    Specify the Maximum attempts per update i e  the number of ti
243. gt      gt    gt     Select Alerts from the Alerts  amp  Logging menu and click Add Alert   In Description enter  Administrator connection   Check Nagios  NSCA      In Applicable Ports check the serial port that has the router console port attached  In  Applicable Hosts check the IP address DNS name of the IIS server     Click Connection Alert     Click Apply     Finally  you need to add a User for the client running SDT Connector     724 746 5500   blackbox com Page 184    Select Users  amp  Groups from the Serial  amp  Network menu   Click Add User     In Username  enter  sdtnagiosuser  then enter and confirm a Password     VV V WV    In Accessible Hosts click the IP address DNS name of the IIS server  and in Accessible Ports click  the serial port that has the router console port attached      gt  Click Apply     10 3 Configuring Nagios distributed monitoring    To activate the console server Nagios distributed monitoring     Nagios integration must be enabled and a path established to the central upstream Nagios server     If the console server is to periodically report on Nagios monitored services  then the NSCA client  embedded in the console server must be configured   the NSCA program enables scheduled check   ins with the remote Nagios server and is used to send passive check results across the network to  the remote server     If the Nagios server is to actively request status updates from the console server  then the NRPE  server embedded in the console server must
244. gured to route traffic  through the console server  This requires setting up forwarding and masquerading   as detailed in  Chapter 5 8     5 7 4 Cellular CSD dial in setup    Once you have configured carrier connection  the cellular modem can be configured to receive Circuit  Switched Data  CSD  calls        Note  CSD is a legacy form of data transmission developed for the TDMA based mobile phone systems  like GSM  CSD uses a single radio time slot to deliver 9 6kb s data transmission to the  GSM Network and Switching Subsystem where it could be connected through the equivalent of a  normal modem to the Public Switched Telephone Network  PSTN  allowing direct calls to  any dial up service  CSD is provided selectively by carriers and it is important you receive a Data  Terminating number as part of the mobile service your carrier provides  This is the number which  external modems will call to access the console server        gt  Select the Cellular Modem panel on the System  Dial menu   gt  Check Enable Dial In and configure the Dial In Settings    724 746 5500   blackbox com Page 94    5 8 Firewall  amp  Forwarding    The console server has routing  NAT  packet filtering and port forwarding support on all physical and  virtual network interfaces     Console server                A LAN 1  Network interface   gt  OUTGOING IP is     ba I        MASQUERADE i     gt  TRAFFIC RULES     1  gt  ine     bnn   lt   LAN2  Management LAN   gt       Bo f E  Modem  Dialin  Diakut   gt  T 
245. h port     Port  The serial ports unique identifier     9600    The serial ports speed  8v  The number of data bits to use  None  v  The serial ports parity  1 X  The number of stop bits to use  None X  The flow control method  RS232 b  e elec aling on this        Note  The RS 485 RS 422 option is not relevant for console servers       gt  Before proceeding with further serial port configuration  connect the ports to the serial devices    they will be controlling  and make sure they have matching settings            Note The serial ports are all set at the factory to RS232 9600 baud  no parity  8 data bits  1 stop bit     and Console server Mode  You can change the baud rate to 2400 230400 baud using the    management console  You can configure lower baud rates  50  75  110  134  150  200  300  600   1200  1800 baud  from the command line  Refer to Chapter 14    Basic Configuration  Linux    Commands         4 1 2 Console Server Mode    Select Console Server Mode to enable remote management access to the serial console that is attached    to this serial port     724 746 5500   blackbox com    Page 48       Administration      SSL Certificates      Configuration Backup     Firmware      IP      Date  amp  Time      Dial      Firewall      Services      DHCP Server      Nagios      Configure Dashboard    Status       PortAccess      Active Users      Statistics      Support Report      Syslog      UPS Status      RPC Status      Environmental Status     Power Supply Status     
246. he DHCP server enables the automatic distribution of IP addresses to hosts on  the Management LAN that are running DHCP clients  To enable the DHCP server      gt  Onthe System  IP menu select the Management LAN page and click the Disable label in the  DHCP Server field  or directly go to the System  DHCP Server menu      gt  Check Enable DHCP Server     System Name  les1308a Model LES1308A Firmware  3 5 3u5     lt SBLACK BOX Uptime  0 days  8 hours  2 mins  6 secs Current User  root    NETWORK SERVICES       Serial  amp  Network      Network Interface Management LAN Interface     Serial Port       Management LAN DHCP Server Settings  Subnet Unavailable   DHCP Server o  Enable DHCP Server  Gateway  The Default Gateway to assign     Use interface  address as gateway Use this interface as the DHCP Gateway    Primary DNS  The primary DNS to assign   Secondary DNS    The secondary DNS to assign          SNMP        Use this interface O  addressasthe DNS Use the built in DNS relay for DNS lookups  System E server The DNS service r Services page     Administration  en cas       SSL Certificates Domain Name CL     Co    guration Backup Th       e Domain Name to assign      gt  Enter the Gateway address that you want to issue to the DHCP clients  If you leave this field  blank  the console server s IP address will be used      gt  Enter the Primary DNS and Secondary DNS address to issue the DHCP clients  If you leave this  field blank  the console server s IP address is used  So  lea
247. he Microsoft Download Center site  http  Awww microsoft com downloads details aspx familyid 801 1 1F21 D48D 426E 96C2   O8AA2BD23A498 amp displaylang en and click the Download button    This software package will install the client portion of Remote Desktop on Windows 95  Windows  98 and 98 Second Edition  Windows Me  Windows NT 4 0  and Windows 2000  When run  this  software allows these older Windows platforms to remotely connect to a computer running current  Windows        B  Ona Linux or UNIX client PC    gt  Launch the open source rdesktop client     rdesktop  u windows user id  p windows password  g 1200x950 ms windows terminal   server host name    option description   a Color depth  8  16  24    be Device redirection    Redirect sound on remote machine to local device   0  r sound   MS Windows 2003      g Geometry  widthxheight or 70  screen percentage    p Use  p   to receive password prompt      gt  You can use GUI front end tools like the GNOME Terminal Services Client tsclient to configure  and launch the rdesktop client   Using tsclient also enables you to store multiple configurations  of rdesktop for connection to many servers        724 746 5500   blackbox com Page 122       Terminal Server Client    Terminal Server  Client       i   Display Local Resources   Programs   Performance  Logon Settings    Li Type the name of the computer or choose a    ee computer from the drop down list        Computer           Protocol        User Name           Password       
248. he Software  promptly return the Software and all accompanying  materials with proof of purchase for a refund     Products with separate end user license agreements that may be provided along with the Software are licensed to  you under the terms of those separate end user license agreements     LICENSE GRANT  Subject to the terms and conditions of this EULA  Black Box grants you a nonexclusive right and  license to install and use the Software on a single CPU  provided that   1  you may not rent  lease  sell  sublicense or  lend the Software   2  you may not reverse engineer  decompile  disassemble or modify the Software  except and  only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation  and  3   you may not transfer rights under this EULA unless such transfer is part of a permanent sale or transfer of the  Product  you transfer at the same time all copies of the Software to the same party or destroy such materials not  transferred  and the recipient agrees to this EULA     No license is granted in any of the Software   s proprietary source code  This license does not grant you any rights to  patents  copyright  trade secrets  trademarks or any other rights with respect to the Software     You may make a reasonable number of copies of the electronic documentation accompanying the Software for each  Software license you acquire  provided that  you must reproduce and include all copyright notices and any other  proprieta
249. he core LDAP  specifications are all defined in RFCs  LDAP is a protocol used to access information stored in an  LDAP server  You can find further information on configuring remote RADIUS servers at the  following sites     http   www Idapman org articles intro_to_ Idap html  http  Awww Idapman org servers html   http   www  linuxplanet com linuxplanet tutorials 5050 1   http   www  linuxplanet com linuxplanet tutorials 5074 4     724 746 5500   blackbox com Page 170    9 1 5 RADIUS TACACS User Configuration    Users may be added to the local console server appliance  If they are not added and they log in via  remote AAA  a user will be added for them  This user will not show up in the Black Box configurators  unless they are specifically added  at which point they are transformed into a completely local user  The  newly added user must authenticate from the remote AAA server  and will have no access if it is down     If a local user logs in  they may be authenticated authorized from the remote AAA server  depending on  the chosen priority of the remote AAA  A local user   s authorization is the union of local and remote  privileges     Example 1     User Tim is locally added  and has access to ports 1 and 2  He is also defined on a remote  TACACS server  which says he has access to ports 3 and 4  Tim may log in with either his local or  TACACS password  and will have access to ports 1 through 4  If TACACS is down  he will need to  use his local password  and will only be ab
250. he section as a whole is intended to apply in other circumstances     It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest  validity of any such claims  this section has the sole purpose of protecting the integrity of the free software distribution  system  which is implemented by public license practices  Many people have made generous contributions to the  wide range of software distributed through that system in reliance on consistent application of that system  it is up to  the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot  impose that choice     This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License     8  If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted  interfaces  the original copyright holder who places the Program under this License may add an explicit geographical  distribution limitation excluding those countries  so that distribution is permitted only in or among countries not thus  excluded  In such case  this License incorporates the limitation as if written in the body of this License     9  The Free Software Foundation may publish revised and or new versions of the General Public License from time  to time  Such new versions will be similar in spirit to the present version  but may differ in detai
251. hen the outlet will then take up the  name of the powered Managed Device        4 9 IPsec VPN    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A   LES1348A LES1208A R2  LES1216A R2  LES1232 and LES1248A R2 console servers include Openswan  a  Linux implementation of the IPsec  IP Security  protocols  which can be used to configure a Virtual    Private Network  VPN   The VPN allows multiple sites or remote administrators to access the console  server  and Managed Devices  securely over the Internet       The administrator can establish an encrypted authenticated VPN connection between advanced  console serves distributed at remote sites and a VPN gateway  such as Cisco router running  OS  IPsec  on their central office network     o Users and administrators at the central office can then securely access the remote  console servers and connected serial console devices and machines on the Management  LAN subnet at the remote location as though they were local   o With serial bridging  serial data from controller at the central office machine can be  securely connected to the serially controlled devices at the remote sites  refer Chapter  4 1       The road warrior administrator can use a VPN IPsec software client such as TheGreenBow   www thegreenbow com vpn_gateway html  or Shrew Soft  www shrew net support   to remotely  access the console server and every machine on the Management LAN subnet at the remote    location  IPsec VPN Client as see
252. here to go back  or here to upload or generate keys       To define and configure a Slave    gt    gt     Enter the remote IP Address  or DNS Name  for the Slave console server     Enter a brief Description and a short Label for the Slave  use a convention here that enables you  to effectively manage large networks of clustered console servers and the connected devices     gt      gt     Enter the full number of serial ports on the Slave unit in Number of Ports   Click Apply  This will establish the SSH tunnel between the Master and the new Slave     The Serial  amp  Network  Cascaded Ports menu displays all the Slaves and the port numbers that have  been allocated on the Master  If the Master console server has 16 ports of its own  then ports 1 16 are  pre allocated to the Master  The first Slave added will be assigned port number 17 and up     724 746 5500   blackbox com Page 65    Once you have added all the Slave console servers  you can assign and access the Slave serial ports and  the connected devices from the Master   s Management Console menu  You can also access them  through the Master   s IP address      gt  Select the appropriate Serial  amp  Network  Serial Port and Edit to configure the serial ports on the  Slave      gt  Select the appropriate Serial  amp  Network  Users  amp  Groups to add new users with access  privileges to the Slave serial ports  or to extend existing users    access privileges       gt  Select the appropriate Serial  amp  Network  Trusted
253. his section offers a quick background of Nagios and its  capabilities  A complete overview  FAQ  and comprehensive documentation are available at   http   www  nagios org    Nagios does take some time to install and configure  however once Nagios is up and running however  it  provides an outstanding network monitoring system     With Nagios you can     Display tables showing the status of each monitored server and network service in real time       Use a wide range of freely available plug ins to make detailed checks of specific services   for  example  don t just check that a database is accepting network connections  check that it can  actually validate requests and return real data       Display warnings and send warning e mails  pager  or SMS alerts when a service failure or  degradation is detected           Assign contact groups who are responsible for specific services in specific time frames     10 2 Central management and setting up SDT for Nagios    The Black Box Nagios solution has three parts  the Central Nagios server  Distributed Black Box console  servers  and the SDT for Nagios software     x    Central    Nagios 4    Server 9 j s    Distributed  console servers    7  Client 4    Central Nagios server      Avanilla Nagios 2 x or 3 x installation  typically on a Linux server  generally running on a blade  PC   virtual machine  etc  at a central location       Runs a web server that displays the Nagios GUI       Imports configuration from distributed console se
254. host  Status  RPE SM Host Name  Environmental Status  Dashboard Name of hostin Nagios  Generated using host description if unspecified   z Nagios Checks Command check  Devices 1 Check NRPE y Use Default Args hd host  Delete    Port Logs Check NRPE alive  Host Logs Check Ping fauli MMAND     Sewer Check Permitted TCP Fcheckhostalive     T Check Permitted UDP  erminal  Check TUP  Apply    Check UDP          Scroll down to Nagios Settings and check Enable Nagios    Click New Check and select Check Ping  Click check host alive   Click New Check and select Check Permitted TCP  Select Port 3389  Click New Check and select Check TCP  Select Port 80    Click New Check and select Check TCP  Select Port 443     Click Apply     Similarly  you now must configure the serial port to the router to be monitored by Nagios      gt    gt    gt      gt    gt     Select Serial Port from the Serial  amp  Network menu   Locate the serial port that has the router console port attached and click Edit     Make sure the serial port settings under Common Settings are correct and match the attached  router   s console port     Click Console server Mode  and select Logging Level 1     Check Telnet  SSH access is not required  as SDT Connector is used to secure the otherwise  insecure Telnet connection      Scroll down to Nagios Settings and check Enable Nagios   Check Port Log and Serial Status   Click Apply     Now you can set the console server to send alerts to the Nagios server      gt    gt    gt    
255. hronization action pushing all changes to the live system   h  help Display a brief usage message    724 746 5500   blackbox com Page 214     v  verbose     d  del id     g  get id   p    path file     r    run configurator     s   set id value     e   export file   i   import file   t   test import file   S   separator char     P   password id    Log extra debug information     Remove the given configuration element specified by a     separated  identifier     Display the value of a configuration element     Specify an alternate configuration file to use  The default file is located  at  etc config config xml     Run the specified registered configurator  Registered configurators are  listed below     Change the value of configuration element specified by a    separated  identifier     Save active configuration to file    Load configuration from file    Pretend to load configuration from file    The pattern to separate fields with  default is        Prompt user for a value  Hash the value  then save it in id     The registered configurators are     alerts  auth  cascade  console  dhcp  dialin  eventlog  hosts  ipaccess    There are three ways to delete    detailed later in Chapter 15  You can also assign the config element to    node using  d     ipconfig   nagios   power  serialconfig  services   slave  systemsettings  time   ups   users    a config element value  The simplest way is use the delete node script     or delete the entire config       bin config  d    element n
256. ial Port 1 is  configured by default in Local Console  modem  mode     Conventional CAT5 cabling with RJ 45 jacks is used for serial connections  Before connecting an external  device   s console port to the console server serial port  confirm that the device supports the standard  RS 232C  EIA 232      Black Box supplies a range of cables and adapters that may be required to connect to the more popular  servers and network appliances  Call Technical Support at 724 746 5500 for details     2 5 USB Port Connection    The LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console servers each also have one  USB1 1 port on the front face and two additional USB 2 0 ports at the rear face  adjacent to modem jack      The LES1308A  LES1316A  LES1332A  LES1348A  LES1408A  LES1416A  LES1432A and LES1448A  console servers each also have one USB1 1 port on the front face and one additional USB 2 0 ports at  the rear face  This USB2 0 port is adjacent to antenna connector and conne cts using the micro AB USB  cable     The LES1508A console server has twoUSB 2 0 ports on the front face   The USB2 0 ports can be used for     724 746 5500   blackbox com Page 24        connecting to USB consoles of Managed Devices  e g  for managing UPS supplies        attaching other external USB peripherals  e g  an external USB memory stick or modem       adding supported Sierra Wireless cellular USB modems       plugging in USB hubs to provide additional ports    The USB1 1 port is best reserved for use
257. igure the nominated alert service    7 5 1 Send Email alerts    The console server uses SMTP  Simple Mail Transfer Protocol  for sending the email alert notifications   To use SMTP  the Administrator must configure a valid SMTP server for sending the email      gt  Select Alerts  amp  Logging  SMTP  amp SMS    724 746 5500   blackbox com Page 142     lt BLAC    NETWORK SERVICES       Serial  amp  Network                     SMTP Server  Server  pide Secure Connection    O VPN     PPTP VPN     Call Home SMTP port  Sender     Managed Devices  Username  Alerts  amp  Logging 6  Password  Confirm  System 5     Administration  ertificates Authentication  onfiguration Backup Method       Firmware    IP       Date  amp  Time Subject Line    System Name  les 1308a  Uptime  0 days  19 hours  19 mins     m    The outgoing mail server address    None x     f this server uses a    m     Specify the SMTP port  Default is 25    m     The from    address which will appear on the    m    Ifthis server requires authentication  specify    m     f this server requires authentication  specify    m     Re enter the password     Automatic x     Allows authentication to be    m    secure connection  spec    overriden should    Model LES1308A Firmware  3 5 3u5    a       Bacup Log Out    50secs Current User root    cify its type     sent ema    the username    the password     autodetection fail     gt  Inthe SMTP Server field  enter the outgoing mail Server s IP address      gt  If this mail server 
258. ing  7 6 4 Auto Response event logging   7 6 5 Power device logging    POWER  amp  ENVIRONMENTAL MANAGEMENT    724 746 5500   blackbox com    Page 8    104  105  106  107  108  109  111  113  113  114  116  117  118  119  119  120  124  124  125  127  127  131  132  132  135  137  137  138  138  138  138  139  140  140  141  141  141  141  141  142  142  142  143  145  146  146  146  147  148  148  148  149    8 1 Remote Power Control  RPC   8 1 1 RPC connection    8 1 2 RPC access privileges and alerts   8 1 3 User power management   8 1 4 RPC status   8 2 Uninterruptible Power Supply Control  UPS   8 2 1 Managed UPS connections   8 2 2 Remote UPS management   8 2 3 Controlling UPS powered computers  8 2 4 UPS alerts   8 2 5 UPS status   8 2 6 Overview of Network UPS Tools  NUT   8 3 Environmental Monitoring   8 3 1 Connecting the EMD   8 3 2 Environmental alerts   8 3 3 Environmental status    AUTHENTICATION  9 1 Authentication Configuration    9 1 1 Local authentication   9 1 2 TACACS authentication   9 1 3 RADIUS authentication   9 1 4 LDAP authentication   9 1 5 RADIUS TACACS User Configuration   9 1 6 Group support with remote authentication  9 1 7 Remote groups with RADIUS authentication  9 1 8 Remote groups with LDAP authentication  9 1 9 Remote groups with TACACS  authentication  9 1 10 Idle timeout   9 1 11 Kerberos authentication    9 2 PAM  Pluggable Authentication Modules    9 3 SSL Certificate   NAGIOS INTEGRATION   10 1 Nagios Overview   10 2 Central management
259. ing up the configuration off box   15 2 Advanced Portmanager   15 2 1 Portmanager commands   15 2 2 External Scripts and Alerts   15 3 Raw Access to Serial Ports   15 3 1 Access to serial ports   15 3 2 Accessing the console modem port   15 4 IP  Filtering   15 5 Modifying SNMP Configuration   15 5 1  etc config snmpd conf   15 5 2 Adding more than one SNMP server   15 6 Secure Shell  SSH  Public Key Authentication  15 6 1 SSH Overview   15 6 2 Generating Public Keys  Linux    15 6 3 Installing the SSH Public Private Keys  Clustering   15 6 4 Installing SSH Public Key Authentication  Linux   15 6 5 Generating public private keys for SSH  Windows   15 6 6 Fingerprinting   15 6 7 SSH tunneled serial bridging   15 6 8 SDT Connector Public Key Authentication   15 7 Secure Sockets Layer  SSL  Support   15 8 HTTPS   15 8 1 Generating an encryption key   15 8 2 Generating a self signed certificate with OpenSSL  15 8 3 Installing the key and certificate   15 8 4 Launching the HTTPS Server   15 9 Power Strip Control   15 9 1 The PowerMan tool   15 9 2 The pmpower tool   15 9 3 Adding new RPC devices   15 10 IPMItool   15 11 Custom Development Kit  CDK    15 12 Scripts for Managing Slaves    724 746 5500   blackbox com    Page 11    243  244  245  245  246  247  247  248  248  249  249  250  251  251  252  252  253  255  257  258  260  260  261  261  261  262  262  262  263  264  264  266  269  269    APPENDIX    CLI Commands and Source Code  Hardware Specification   Safety and Certifi
260. inistration Email eng myco com  SSL Certificates The email address of a contact person for this device       Backup Challenge POE FEEESR  irmware Password 7  IP An optional  dependant on CA  password   Date  amp  Time Confirm eeeeeeet  Dial Password Confirmation of the challenge password   Services  DHCP Server Key Length 512  Nagios  bits  Length of generated key in bits   Configure Dashboard    Download CancelCSR_    Status  Port Access    Active Users   Certificate   Browse       Statistics Certificate file issued by your CA   Support Report  Syslog   Upload      After completing these steps  the console server has its own certificate that is used for identifying the  console server to its users        Note You can find information on issuing certificates and configuring HTTPS from the command line in  Chapter 15        724 746 5500   blackbox com Page 179    Chapter 10 Nagios Integration    Introduction    Nagios is a powerful  highly extensible open source tool for monitoring network hosts and services  The  core Nagios software package will typically be installed on a server or virtual server  the central Nagios  server     Console servers operate in conjunction with a central upstream Nagios server to distribute and monitor  attached network hosts and serial devices  They embed the NSCA  Nagios Service Checks Acceptor  and  NRPE  Nagios Remote Plug in Executor  add ons   this allows them to communicate with the central  Nagios server  so you won   t need a dedicated sl
261. inistrator client to use when connecting to the console  server  User clients  who you may set up later  will also use these protocols when accessing console  server serial attached devices and network attached hosts  You will need to have appropriate  communications software tools set up on the Administrator  and User  PC workstation     724 746 5500   blackbox com Page 36    Black Box provides the SDT Connector Java applet as the recommended client software tool  You can use  other generic tools such as PuTTY and SSHTerm  These tools are all described below as well     3 5 1 SDT Connector    Each console server has an unlimited number of SDT Connector licenses to use with that console server          SDT Connector   RDP  YNC  Telnet  HTTP client              Applications   amp  database       SSH encrypted  tunnel    RDP  VNC   Telnet  HTTP sessions  forwarded to devices computers   service processors on the LAN    SDT Connector is a lightweight tool that enables Users and Administrators to securely access the console  server and the various computers  network devices  and appliances that may be serially or network  connected to the console server     SDT Connector is a Java applet that couples the trusted SSH tunneling protocol with popular access tools  such as Telnet  SSH  HTTP  HTTPS  VNC  and RDP to provide point and click secure remote management  access to all the systems and devices being managed     Information on using SDT Connector for browser access to the conso
262. install the sdicon 1 n jar  and the config file defaults xml        Once the installer completes you will have a working SDT Connector client installed on your machine and  an icon on your desktop         gt  Click the SDT Connector icon on your desktop to start the client        Note SDT Connector is a Java application  so it must have a Java Runtime Environment  JRE   installed  You can download this for free from http   java sun com j2se   It installs on Windows  2000  XP  2003  Vista  and 7 PCs and on most Linux platforms  Solaris platforms are also  supported  but they must have Firefox installed  SDT Connector can run on any system with  Java 1 4 2 and above installed  but it assumes the web browser is Firefox  and that xterm  e  telnet opens a telnet window        To operate SDT Connector  you first need to add new gateways to the client software by entering the  access details for each console server  refer to Section 6 2 2   Then  let the client auto configure all host  and serial port connections from each console server  refer to Section 6 2 3   Finally  point and click to  connect to the Hosts and serial devices  refer to Section 6 2 4      Or  you can manually add network connected hosts  refer to Section 6 2 5  and manually configure new  services to use to access the console server and the hosts  refer to Section 6 2 6   Then  manually    724 746 5500   blackbox com Page 104    configure clients to run on the PC that will use the service to connect to the hosts
263. ion Backup menu      gt  The config backup file  System Name_date_config opg  will be downloaded to your PC and  saved in the location you nominate     To restore a remote backup      gt  Click Browse in the Remote Configuration Backup menu and select the Backup File you want to    restore      gt  Click Restore and click OK  This will overwrite all the current configuration settings in your  console server     With Advanced Console Servers  LES1208A R2  LES1216A R2  LES1232A  LES1248A R2   you can save the    backup file locally on the console server USB storage  To do this you must have an external USB flash  drive installed      lt SBLACK BOX sa    NETWORK SERVICES       Serial  amp  Network  Serial Port Remote Backup  Users  amp  Groups  Authentication  Network Hosts  Trusted Networks Before saving configuration locally  you must prepare the USB storac  Cascaded Ports   UPS Connections Disc  RPC Connections USB    Local Backup    Local Backup       e  then click here to proceed  After the       To backup and restore using USB      gt  Make sure the USB flash is the only USB device attached to the console server and click Prepare  Storage in the Local Configuration Backup menu      gt  This will set a Volume Label on the USB storage device  This preparation step is only necessary    the first time  and will not affect any other information you have saved onto the USB storage    device  We recommend that you back up any critical data from the USB storage device before  usin
264. irewall Rule     Network Hosts Name     Trusted Networks am New Firewall Rule     Call Home Name for the rule       Cascaded Ports       UPS Connections Interface       RPC Connections     Environmental     Managed Devices    Alerts  amp  Logging     PortLog       Alerts Source MAC address       SMTP  amp  SMS     SNMP    System   Source Address Address  Range       Administration     SSL Certificates     Configuration Backup       Firmware Destination    IP Address Address Range       Date  amp  Time     Dial     Firewall       Nagios Protocol       Configure Dashboard     gt  Click New Firewall Rule    Any lz     The interface thatthe rule applies to    Destination Port Port  Range    is may be left blar        gt  Fillin the following fields     Name     Interface     Port Range     Name the rule  This name should describe the policy the firewall rule is  being used to implement  e g  block ftp  Allow Tony     Select the interface that the firewall rule will be applied to  i e  Any   Dialout Cellular  VPN  Network Interface  Dial in etc     Specify the Port or range of Ports  e g  1000     1500  that the rule will  apply to  This may be left blank for Any    Source Address Range  Specify the source IP address  or address range  to match  IP address    Destination Range     Protocol     Direction     Action     ranges use the format ip netmask  where netmask is in bits 1 32   This  may be left blank for Any    Specify the destination IP address address range to match  IP ad
265. is IEC power inlet uses a conventional IEC AC power cord  and the power cords for various    regions are available  Call Black Box Technical Support for details at 724 746 5500   The North American  power cord is provided by default   There is a warning notice printed on the back of each unit           A N To avoid electrical shock  connect the power cord grounding conductor to  ground        724 746 5500   blackbox com Page 22    2 2 4 LES1108A power    The LES1108A includes an external DC power supply unit  This unit accepts an AC input voltage between  100 and 250 VAC with a frequency of 50Hz or 60Hz  The DC power supply has an IEC AC power socket   which accepts a conventional IEC AC power cord  The power cord for North America is included in the  kit  The 5 VDC connector from the power supply plugs into the 5VDC power socket on the rear of the  LES1108A     2 3 Network connection    The RJ 45 LAN ports are located on the rear panel of the LES1108A and LES1508A  and on the front  panel of the rack mount console servers  Use industry standard Cat5 cabling and connectors  Make sure  that you only connect the LAN port to an Ethernet network that supports 10BASE T 100BASE T  To  initially configure the console server  you must connect a PC or workstation to the console server   s  principal network port  labeled NETWORK1 or LAN      2 4 Serial Port connection    The RJ 45 serial ports are located on the rear panel of the LES1108A and on the front panel of the  LES1508A and ra
266. ist then the traffic coming in over the Network Interface from Tony would be blocked     724 746 5500   blackbox com    Page 101    Chapter 6 Secure SSH Tunneling  amp  SDT Connector       Introduction    Each Black Box console server has an embedded SSH server and uses SSH tunneling so remote users can  securely connect through the console server to Managed Devices   using text based console tools  such  as SSH  telnet  SoL  or graphical tools  such VNC  RDP  HTTPS  HTTP  X11  VMware  DRAC  iLO      The Managed Devices you access can be located on the same local network as the console server or they  can be attached to the console server via a serial port  The remote User Administrator connects to the  console server thru an SSH tunnel via dial up  wireless or ISDN modem  a broadband Internet  connection  the enterprise VPN network  or the local network           Secure Remote  Management    Secure Local    Management Secure OoB     Dial In or  Broradband     Network Serial    connected connected    To set up the secure SSH tunnel from the client PC to the console server  install and launch SSH client  software on the User Administrator   s PC  Black Box recommends you use the SDT Connector client  software supplied with the console server for this  SDT Connector is simple to install and auto configure  and it provides all your users with point and click access to all the systems and devices in the secure  network  With one click  SDT Connector sets up a secure SSH tunnel fr
267. ith the engine ID    To set the Username field  SNMP version 3 only   config   set config system snmp username2 yourusername    724 746 5500   blackbox com Page 250       replacing yourusername with the username  config system snmp usernamez2  3 only     To set the Engine ID field  SNMP version 3 only   config   set config system snmp password2 yourpassword     replacing yourpassword with the password    Once the fields are set  apply the configuration with the following command   config   run snmp    You can add a third or more SNMP servers by incrementing the  2  in the above commands  e g   config system snmp protocol3  config system snmp address3  etc     15 6 Secure Shell  SSH  Public Key Authentication    This section covers how to generate public and private keys in a Linux and Windows environment and  configure SSH for public key authentication  The steps to use in a Clustering environment are      Generate a new public and private key pair      Upload the keys to the Master and to each Slave console server      Fingerprint each connection to validate     15 6 1 SSH Overview    Popular TCP IP applications such as telnet  rlogin  ftp  and others transmit their passwords unencrypted   Doing this across pubic networks like the Internet can have catastrophic consequences  It leaves the  door open for eavesdropping  connection hijacking  and other network level attacks     Secure Shell  SSH  is a program to log into another computer over a network  to execute commands in a
268. itor1 options option1 opt option    config  s config ups monitors monitor1 options option1 arg argument    config  s config ups monitors monitor1 options total 1     config  s config ups monitors monitor1 log enabled on     config  s config ups monitors monitor1 log interval 2     config  s config ups monitors monitor1 script enabled on    724 746 5500   blackbox com    Page 224    Make sure to increment the total monitors     config  s config ups monitors total 1    The five commands below will add the UPS to Managed devices  Assuming there are already two  managed devices configured       config  s  config devices device3 connections connection1 name My UPS     config  s  config devices device3 connections connection1 type UPS Unit     config  s  config devices device3 name My UPS      config  s  config devices device3 description UPS in toom 5      config  s config devices total 3    To delete this managed UPS     config  d config ups monitors monitor1    Decrement monitors total when deleting a managed UPS     Remote UPSes    To add a remote UPS with the following details  assuming this is our first remote UPS      UPS name oldUPS  Description UPS in room 2  Address 192 168 50 50  Log status Disabled   Log rate 240 seconds  Run shutdown script Enabled      config  s config ups remotes remote1 name oldUPS     config  s  config ups remotes remote1 description UPS in room 2     config  s config ups remotes remote1 address 192 168 50 50     config  d config ups remotes remote
269. ive commands are used by the Management Console to add the RPC to    Managed  Devices          config  s config devices device3 connections connection1 name myRPC     config  s  config devices device3 connections connection1 type RPC Unit     config  s config devices device3 name myRPC     config  s  config devices device3 description RPC in room 5      config  s config devices total 3    The following command will synchronize the live system with the new configuration       config  a    14 11 Environmental    To configure an environmental monitor with the following details     Monitor name Envi4   Monitor Description Monitor in room 5  Temperature offset 2   Humidity offset 5   Enable alarm 1   yes   Alarm 1 label door alarm   Enable alarm 2   yes   Alarm 2 label window alarm  Logging enabled   yes   Log interval 120 seconds      config  s config ports port3 enviro name Envi4     config  s  config ports port3 enviro description Monitor in room 5     config  s config ports port3 enviro offsets temp 2     config  s config ports port3 enviro offsets humid 5     config  s config ports port3 enviro alarms alarm1 alarmstate on     config  s config ports port3 enviro alarms alarm1 label door alarm    config  s config ports port3 enviro alarms alarm2 alarmstate on     config  s config ports port3 enviro alarms alarm2 label window alarm    config  s config ports port3 enviro alarms total 2     config  s config ports port3 enviro log enabled on     config  s config ports port3 enviro 
270. k Flags Interface       Cascaded Ports etho          UPS Connections     RPC Connections 192 168 254 0 0 0 0 0 etho     Environmental     Managed Devices 127 0 0 0 0 0 0 0 255 0 0 0   0 0 0 192 168 254 254 0 0 0 G etho  Alerts  amp  Logging   DNS Information      PortLog     Alerts   resolv conf from eth0 0     SMTP  amp  SMS ameserver 192 16     SNMP     gt  You can find detailed statistics reports by selecting the various submenus     12 3 Support Reports    The Support Report provides useful status information that will assist the Black Box Technical Support  team to solve any problems you may experience with your console server     If you do experience a problem and have to contact tech support  make sure you include the Support  Report with your email support request  The Support Report is generated when the issue is occurring   and is attached in plain text format        System irmwal  Uptime s  16 3 Current User     NETWORK SERVICES       Serial  amp  Network       Serial Port      Users  amp  Groups     Authentication      Network Hosts      Trusted Networks     Call Home Uptime     Cascaded Ports     UPS Connections     RPC Connections     Environmental      Managed Devices    Firmware Version    BlackBowLES12xxA Version 3 4 2     Wed Aug 31 23 18 11 EST 2011    2 days  16 hours  34 mins  43 secs    IP Configuration  Alerts  amp  Logging           Port Log      Alerts      SMTP  amp  SMS     SNMP    System 5       Administration     SSL Certificates          Configur
271. k the Remote tab     System Properties    General Computer Name Hardware Advanced  System Restore Automatic Updates Remote     6  gt   Select the ways that this computer can be used from another   d location   Remote Assistance   C  Allow Remote Assistance invitations to be sent from this computer  What is Remote Assistance     Remote Desktop   Allow users to connect remotely to this computer  Full computer name   Bigbob  What is Remote Desktop     For users to connect remotely to this computer  the user account must  have a password     Windows Firewall will be configured to allow Remote Desktop  connections to this computer         gt  Check Allow users to connect remotely to this computer      gt  Click Select Remote Users     724 746 5500   blackbox com Page 119     gt     Remote Desktop Users    The users listed below can connect to this computer  and any members of  the Administrators group can connect even if they are not listed        Remote Bob       Lox   cma         To set the user s  who can remotely access the system with RDP  click Add on the Remote  Desktop Users dialog box        Note    If you need to set up new users for Remote Desktop access  open User Accounts in the Control  Panel and follow the steps to nominate the new user   s name  password  and account type   Administrator or Limited         Note    With Windows XP Professional and Vista  you have only one Remote Desktop session and it  connects directly to the Windows root console  With Windows Serv
272. l  ctrico debe ser situado de tal manera que su posici  n no interfiera su uso  La colocaci  n del aparato el  ctrico  sobre una cama  sof    alfombra o superficie similar puede bloquea la ventilaci  n  no se debe colocar en libreros o gabinetes  que impidan el flujo de aire por los orificios de ventilaci  n     El equipo el  ctrico deber ser situado fuera del alcance de fuentes de calor como radiadores  registros de calor  estufas u otros  aparatos  incluyendo amplificadores  que producen calor     El aparato el  ctrico deber   ser connectado a una fuente de poder s  lo del tipo descrito en el instructivo de operaci  n  o como  se indique en el aparato     Precauci  n debe ser tomada de tal manera que la tierra fisica y la polarizaci  n del equipo no sea eliminada       Los cables de la fuente de poder deben ser guiados de tal manera que no sean pisados ni pellizcados por objetos colocados  sobre o contra ellos  poniendo particular atenci  n a los contactos y receptaculos donde salen del aparato     El equipo el  ctrico debe ser limpiado   nicamente de acuerdo a las recomendaciones del fabricante    En caso de existir  una antena externa deber   ser localizada lejos de las lineas de energia      El cable de corriente deber   ser desconectado del cuando el equipo no sea usado por un largo periodo de tiempo    Cuidado debe ser tomado de tal manera que objectos liquidos no sean derramados sobre la cubierta u orificios de ventilaci  n     Servicio por personal calificado deber  
273. l AC  Dual AC  Single AC  Single AC  Single AC  Ext AC DC    Memory    flash RAM   16 64MB  4GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16GB  16 64MB  16 64MB  16 64MB  8 16MB     gt  Unpack your kit and verify you have all the parts shown above  and that they all appear in good    working order     724 746 5500   blackbox com    Page 18     gt  If you are installing the console server in a rack  you will need to attach the rack mounting  brackets supplied with the unit  then install the unit in the rack  Make sure you follow the Safety  Precautions listed in Appendix C      gt  Connect your console server to the network  to the serial ports of the controlled devices  and to  power as outlined next     2 1 1 Kit components LES1508A Console Server    CERERA LES1508A Console Server  KO KO  2  UTP CATS blue cables    a  amp  DB9F RJ45S straight and DB9F RJ45S cross over connectors  ex Power Supply 12VDC 1 0A Wall mount  a    Printed Quick Start Guide and this User   s Manual on CD ROM    2 1 2 Kit components LES1308A  LES1348A and LES1408A   LES1448A Advanced Console Servers  Ee LES1308A  LES1316A  LES1332A  LES1348A  LES1408A   LES1416A  LES1432A or LES1448A Advanced Console Server  O KO  2  UTP CATS blue cables    724 746 5500   blackbox com Page 19    c  DB9F RJ45S straight and DB9F RJ45S cross over connectors    USB micro AB adapter cable    
274. l SSH  HTTPS and SDT Connector access to all services on the advanced  console servers will use the embedded FIPS compliant cryptographic module  To connect you must also  be using cryptographic algorithms that are FIPs approved in your browser or client or the connection will  fail      gt  Select the System  Administration menu option   gt  Check FIPS Mode to enable FIPS mode on boot  and check Reboot to safely reboot the console    server     gt  Click Apply and the console server will now reboot  It will take several minutes to reconnect as  secure communications with your browser are validated  and when reconnected it will display     FIPs mode  Enabled    in the banner       Not To enable FIPS mode from the command line  login and run these commands     config  s config system fips on  touch  etc config FIPS   chmod 444  etc config FIPS  flatfsd  b    The final command saves to flash and reboots the unit  The unit will take a few minutes  to boot into FIPS mode  To disable FIPS mode     contig  d config system  fips  rm  etc conftig FIPS  flatfsd    b    724 746 5500   blackbox com Page 202       Chapter 12 Status Reports      Introduction  This chapter describes the dashboard feature and the status reports that are available     Port Access and Active Users    Statistics    Support Reports    Syslog    Dashboard  Other status reports that are covered elsewhere include     UPS Status  Chapter 8 2     RPC Status  Chapter 8 1       Environmental Status  Chapter 8 3     12
275. l to address new  problems or concerns     Each version is given a distinguishing version number  If the Program specifies a version number of this License  which applies to it and  any later version   you have the option of following the terms and conditions either of that  version or of any later version published by the Free Software Foundation  If the Program does not specify a version  number of this License  you may choose any version ever published by the Free Software Foundation     10  If you wish to incorporate parts of the Program into other free programs whose distribution conditions are  different  write to the author to ask for permission  For software which is copyrighted by the Free Software  Foundation  write to the Free Software Foundation  we sometimes make exceptions for this  Our decision will be  guided by the two goals of preserving the free status of all derivatives of our free software and  of promoting the sharing and reuse of software generally     NO WARRANTY    11  BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE  THERE IS NO WARRANTY  FOR THE PROGRAM  TO THE EXTENT PERMITTED BY APPLICABLE LAW  EXCEPT WHEN  OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES  PROVIDE THE PROGRAM  AS IS  WITHOUT WARRANTY OF ANY KIND  EITHER EXPRESSED  OR IMPLIED  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED WARRANTIES OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE  THE ENTIRE RISK AS  TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YO
276. le dial in access on the DB9 serial port from the command line with the following attributes     Local IP Address 172 24 1 1  Remote IP Address 172 24 1 2  Authentication Type  MSCHAPv2  Serial Port Baud Rate  115200  Serial Port Flow Control  Hardware  Custom Modem Initialization  ATQOV1HO  Callback phone 0800223665  User to dial as user1  Password for user secret    Run the following commands       config  s config console ppp localip 172 24 1 1     config  s config console ppp remoteip 172 24 1 2    config  s config console ppp auth MSCHAPv2     config  s config console speed 115200     config  s config console flow Hardware     config  s config console initstring ATQOV1HO     config  s config console ppp enabled on     config  s config console ppp callback enabled on    config  s config console ppp callback phone1 0800223665    config  s config console ppp username user1     config  s config console ppp password secret    To make the dialed connection the default route     config  s config console ppp defaultroute on    Please note that supported authentication types are  None      PAP    CHAP  and  MSCHAPv2    Supported serial port baud rates are  9600    19200    38400    57600    115200   and  230400    Supported parity values are  None      Odd    Even    Mark  and  Space       Supported data bits values are  8    7   6  and  5     Supported stop bits values are  1   1 5  and  2     Supported flow control values are  Hardware      Software  and  None      If you do no
277. le server s Management Console   Telnet SSH access to the console server command line  and TCP UDP connecting to hosts that are  network connected to the console server is in Chapter 6   Secure Tunneling     SDT Connector can be installed on Windows 2000  XP  2003  Vista and Windows 7 PCs  and on most  Linux  UNIX  and Solaris computers     3 5 2 PuTTY    You can also use communications packages like PuTTY to connect to the console server command line   and to connect serially attached devices as covered in Chapter 4   PuTTY is a freeware implementation  of Telnet and SSH for Windows and UNIX platforms  It runs as an executable application without needing  to be installed onto your system  PuTTY  the Telnet and SSH client itself  can be downloaded from  http   www tucows com preview 195286 html    724 746 5500   blackbox com Page 37    ig PuTTY Configuration       Category   B  Session  Logging     Terminal  Keyboard  Bell  Features  E  Window  B  Connection  Data  Proxy  Telnet  Rlogin      SSH  Kex  Auth  TTY  X11  Tunnels  Bugs       Basic options for your PuTTY session  Specify the destination you want to connect to  Host Name  or IP address  Port  192 168 252 202 22  Connection type     Raw    Tenet    Rlogin   SSH    Serial       Load  save or delete a stored session  Saved Sessions       Default Settings       Close window on exit   Always     Never    Only on clean exit                      3 5 3  SSHTerm    To use PuTTY for an SSH terminal session from a  Windows cli
278. le to access ports 1 and 2     Example 2     User Ben is only defined on the TACACS server  which says he has access to ports 5 and 6  When  he attempts to log in  a new user will be created for him  and he will be able to access ports 5  and 6  If the TACACS server is down he will have no access     Example 3   User Paul is defined on a RADIUS server only  He has access to all serial ports and network hosts   Example 4     User Don is locally defined on an appliance using RADIUS for AAA  Even if Don is also defined on  the RADIUS server  he will only have access to those serial ports and network hosts he has been  authorized to use on the appliance     If a    no local AAA    option is selected  then root will still be authenticated locally     You can add remote users to the admin group via either RADIUS or TACACS  Users may have a set of  authorizations set on the remote TACACS server  Users automatically added by RADIUS will have  authorization for all resources  whereas those added locally will still need their authorizations specified     LDAP has not been modified  and will still need locally defined users     9 1 6 Group support with remote authentication    All console servers allow remote authentication via RADIUS  LDAP and TACACS   With RADIUS and  LDAP additional restrictions can be provided on user access based on group information or membership   For example  with remote group support  RADIUS and LDAP users can belong to a local group that has  been setup to hav
279. lect Telnet client as the Client  Enter 2002 in TCP Port  Click OK  then Close and Close again     724 746 5500   blackbox com Page 114     gt      gt      gt                  amp  SDTConnector  B  3                      F   Add Service          Service Name Serial Port 2            Add Port Redirection          General   Advanced    Client Telnet client    TCP Port                          2 ok   3 cancel                            Assuming you have already set up the target console server as a gateway in your SDT Connector  client  with username  password etc   select this gateway and click the Host icon to create a  host  Or  select File   gt  New Host     Enter 127 0 0 1 as the Host Address and select Serial Port 2 for Service  In Descriptive Name   enter something such as Loopback ports  or Local serial ports  Click OK     Click Serial Port 2 icon for Telnet access to the serial console on the device attached to serial  port  2 on the gateway     To enable SDT Connector to access to devices connected to the gateway   s serial ports  you must also  configure the Console server itself to allow port forwarded network access to itself  and enable access to  the nominated serial port      gt    gt     Browse to the Console server and select Serial Port from Serial  amp  Network     Click Edit next to selected Port    for example  Port 2 if the target device is attached to the  second serial port   Make sure the port   s serial configuration is appropriate for the attached  de
280. log interval 120    Assign alarms total 2 even if they are off     The following 5 commands will add the environmental monitor to    Managed devices        724 746 5500   blackbox com Page 226    To get the total number of managed devices     config  g config devices total  Make sure you use the total   1 for the new device below       config  s config  devices device5 connections connection1 name Envi4     config  s  config  devices device5 connections connection1 type EMD Unit     config  s config  devices device5 name Envi4     config  s  config  devices device5 description Monitor in room 5      config  s config devices total 5    The following command will synchronize the live system with the new configuration       config  a    14 12 Managed Devices  To add a managed device   also see UPS  RPC connections and Environmental       config  s  config devices device8 name my device      config  s  config devices device8 description The eighth device      config  s  config devices device8 connections connection1 name my device      config  s config devices device8 connections connection1 type  serial   Host   UPS   RPC      config  s config devices total 8  decrement this value when deleting a managed device     To delete the above managed device     config  d config devices device8  The following command will synchronize the live system with the new configuration       config  a    14 13 Port Log  To configure serial network port logging       config  s config eventlog serve
281. loglevel  debug info warn error alert     Change which configuration file it uses   c  etc config portmanager conf    Signals    Sending a SIGHUP signal to the portmanager will cause it to re read its configuration file    15 2 2 External Scripts and Alerts  The portmanager can execute external scripts on certain events   When the portmanager opens a port       It attempts to execute  etc config scripts portxx  init  where XX is the number of the port  e g  08    The script is run with STDIN and STDOUT both connected to the serial port       Ifthe script cannot be executed  then portmanager will execute  etc config scripts portXX chat via  the chat command on the serial port     When an alert occurs on a port     724 746 5500   blackbox com Page 246      The portmanager will attempt to execute  etc config scripts portXX alert  where XX is the port  number  e g  08       The script is run with STDIN containing the data which triggered the alert  and STDOUT redirected to   dev null  NOT to the serial port  If you want to communicate with the port  use pmshell or pmchat  from within the script       Ifthe script cannot be executed  then the alert will be mailed to the address configured in the  system administration section     When a user connects to any port       Ifa file called  etc config pmshell start sh exists it is run when a user connects to a port  It is  provided 2 arguments  the  Port number  and the  Username   Here is a simple example      lt  etc config pmshell st
282. lors   OsLow   lt  19kKbit s    8 Colors    C view Only  C  Auto Scaling       C  Use DSMPlugin No Plugin detected     C Proxy Repeater                  Save connection settings as default Delete saved settings        gt  To establish the VNC connection  simply activate the VNC Viewer software on the Viewer PC and  enter the password     724 746 5500   blackbox com Page 126    VC Authentication       O Password    MII            Note For general background reading on Remote Desktop and VNC access we recommend the    following     The Microsoft Remote Desktop How To   http  Awww microsoft com windowsxp using mobility getstarted remoteintro mspx   The Illustrated Network Remote Desktop help page   http   theillustratednetwork mvps org RemoteDesktop RemoteDesktopSetupandTroubleshooting ht  ml   What is Remote Desktop in Windows XP and Windows Server 2003  by Daniel Petri   http  Awww petri co il what s_remote_desktop htm   Frequently Asked Questions about Remote Desktop    http  Awww  microsoft com windowsxp using mobility rdfag mspx   Secure remote access of a home network using SSH  Remote Desktop and VNC for the home user  http   theillustratednetwork mvps org RemoteDesktop SSH RDP   VNC RemoteDesktopVNCandSSH html   Taking your desktop virtual with VNC  Red Hat magazine   http  Awww redhat com magazine O06apr05 features vnc  and  http  Awww redhat com magazine 007may05 features vnc    Wikipedia general background on VNC http   en wikipedia org wiki VNC        6 10 Using SDT 
283. m on the remote  PC workstation and the SSH server in the console server  By default SSH is enabled   For more information on SSH configuration refer Chapter 9   Authentication      gt  You can configure related service options at this stage     SNMP    This will enable netsnmp in the console server  which will keep a remote log of all  posted information  SNMP is disabled by default  This SNMP service is only available    724 746 5500   blackbox com Page 34    in rackmount models  To modify the default SNMP settings  the Administrator must  make the edits at the command line as described in Chapter 15   Advanced  Configuration     TFTP This service will set up the default tftp server on the USB flash card  and is relevant  to LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A   LES1332A  LES1348A  LES1208A R2  LES1216A R2  LES1232A and LES1248A R2  console servers only   This server can be used to store config files  and maintain  access and transaction logs  etc     Ping The Respond to ICMP echos  i e  ping  allows the console server to respond to  incoming ICMP echo requests  Ping is enabled by default  For security reasons  you  should disable this service after initial configuration     Nagios Access to the Nagios NRPE monitoring daemons  refer Chapter 8   NUT Access to the NUT UPS monitoring daemon  refer Chapter 10     SNMP This will enable netsnmp in the console server  which will keep a remote log of all  posted information  SNMP is disabled by defa
284. me or IP and port number   ca  lt file name gt  Enter the CA certificate file name and location     The same CA certificate file can be used by the server and all clients   Note  Ensure each    V in the directory path is replaced with        For  example  c  openvpnkeysi ca crt will become c   openvpnkeys  ca crt  cert  lt file name gt  Enter the client s or servers   s certificate file name and location    Each client should have its own certificate and key files    Note  Ensure each      in the directory path is replaced with      V    key  lt file name gt  Enter the file name and location of the client   s or server s key    Each client should have its own certificate and key files     Note  Ensure each    V in the directory path is replaced with      V                       dh  lt file name gt  This is used by the server only   Enter the path to the key with the Diffie Hellman parameters    Nobind    Nobind    is used when clients do not need to bind to a local address or  specific local port number  This is the case in most client configurations    persist key This option prevents the reloading of keys across restarts    persist tun This option prevents the close and reopen of TUN TAP devices across  restarts    cipher BF CBC Blowfish   Select a cryptographic cipher  The client and server must use the same    default  settings    cipher AES 128 CBC   AES   cipher DES EDE3 CBC   Triple DES   comp  zo Enable compression on the OpenVPN link  This must be enabled on both  th
285. mes to attempt an update  before giving up  defaults to 3     724 746 5500   blackbox com Page 32    3 4 System Services    The Administrator can access and configure the console server  and connected devices  using a range of  access protocols services     and for each such access  the particular service must be running with access  through the firewall enabled  Service Access specifies which access protocols services can be used to  access the console server  and connected serial ports      By default HTTP  HTTPS  Telnet and SSH services are running  and these services are enabled on all  network interfaces  However  again by default  only HTTPS and SSH access to the console server is  enabled  while HTTP and Telnet access is disabled     For other services  such as SNMP Nagios NRPE NUT  the service must first be started on the relevant  network interface using Service Settings  Then the Services Access can be set to allow or block access     3 4 1 Service Access    Service Access specifies which access protocols services can be used to access the console server  and  connected serial ports   To change the access settings      gt  Select the Service Access tab on the System  Services page  This will displays the services  currently enabled for the console server s network interfaces  Depending on the particular  console server model the interfaces displayed may include          Network interface  for the principal Ethernet connection       Dial out  V90 and cellular modem  
286. n       el  see the hardware compatibility list for    New Option      Log Status  Manage    Devices  Port Logs Log Rate 15  Host Logs  Power  Terminal    Periodically log UPS status    Minutes between samples      Apply      Select if the UPS will be Connected Via USB  over a pre configured serial port  or via  SNMP HTTP HTTPS over the preconfigured network Host connection     When you select a network UPS connection  then the corresponding Host Name Description  that you set up for that connection will be entered as the Name and Description for the power  device  Or  if you selected to Connect Via a USB or serial connection then you will need to  enter a Name and Description for the power device  and these details will also be used to  create a new Managed Device entry for the serial USB connected UPS devices      Enter the login details  This Username and Password is used by slaves of this UPS  that is  other  computers that are drawing power through this UPS  to connect to the console server to  monitor the UPS status so they can shut themselves down when battery power is low   Monitoring will typically be performed using the upsmon client running on the slave server   refer to Section 8 2 3     724 746 5500   blackbox com Page 156       Note  These login credentials are not related to the Users and access privileges you configured in Serial   amp  Networks  Users  amp  Groups         gt  If you have multiple UPSes and require them to be shut down in a specific order  spe
287. n     724 746 5500   blackbox com Page 67     gt  Select the connection type for the new connection  Serial  Network Host  UPS  or RPC  and then    select the specific connection from the presented list of configured unallocated  hosts ports outlets     To add a new network connected Managed Device      gt      gt     The Administrator adds a new network connected Managed Device using Add Host on the Serial   amp  Network  Network Host menu  This automatically creates a corresponding new Managed  Device  as covered in Section 4 4    Network Hosts      When adding a new network connected RPC or UPS power device  you set up a Network Host   designate it as RPC or UPS  then go to RPC Connections  or UPS Connections  to configure the  relevant connection  A corresponding new Managed Device  with the same Name  Description    as the RPC UPS Host  is not created until you complete this connection step  refer Chapter 8     Power and Environment         Note    The outlet names on this newly created PDU will by default be    Outlet 1    and    Outlet 2     When  you connect a particular Managed Device  that draws power from the outlet   then the outlet will  take the powered Managed Device   s name        To add a new serially connected Managed Device      gt      gt     Configure the serial port using the Serial  amp  Network  Serial Port menu  refer to Section 4 1     Configure Serial Port      Select Serial  amp  Network  Managed Devices and click Add Device     Enter a Device Nam
288. n  etc config powerstrips xml  If an action is attempted which has not been configured for a  specific Power Device  pmpower will exit with an error     15 9 3 Adding new RPC devices  There are a number of simple paths to adding support for new RPC devices     724 746 5500   blackbox com Page 264    The first is to have scripts to support the particular RPC included in either the open source PowerMan  project  http   sourceforge net projects powerman  or the open source NUT UPS Tools project  The  PowerMan device specifications are rather weird and it is suggested that you leave the actual writing of  these scripts to the PowerMan authors  Documentation on how they work can be found at  http   linux die net man 5 powerman dev  The Network UPS Tools  NUT  project has recently moved on  from its UPS management origins to also cover SNMP PDUs  and embrace PowerMan   Black Box  progressively includes the updated PowerMan and NUT build into the console server firmware releases     The second path is to directly add support for the new RPC devices  or to customize the existing RPC  device support  on your particular console server  The Manage  Power page uses information contained  in  etc powerstrips xml to configure and control devices attached to a serial port  The configuration also  looks for  and loads   etc config powerstrips xm  if it exists     The user can add their own support for more devices by putting definitions for them into   etc config powerstrips xml  This file c
289. n  on Management LAN     IPsec VPN Gient   Remote        Configuration of IPsec is quite complex so the LES1508A  LES1408A  LES1416A  LES1432A  LES1448A   LES1308A  LES1316A  LES1332A  LES1348A LES1208A R2  LES1216A R2  LES1232 and LES1248A R2    724 746 5500   blackbox com Page 69    console servers provide a simple GUI interface for basic set up as described below  However for more  detailed information on configuring Openswan IPsec at the command line and interconnecting with other  IPsec VPN gateways and road warrior IPsec software refer http   wiki openswan org    4 9 1   gt      gt     Enable the VPN gateway  Select IPsec VPN on the Serial  amp  Networks menu    Click Add and complete the Add IPsec Tunnel screen    Enter any descriptive name you wish to identify the IPsec Tunnel you are adding such as  WestStOutlet  VPN        NETWORK SERVICES       on Add IPsec Tunnel    Alerts  amp  Logging    System    Select the Authentication Method to be used  either RSA digital signatures or a Shared secret   PSK     o If you select RSA you will asked to click here to generate keys  This will generate an RSA  public key for the console server  the Left Public Key   You will need to find out the key  to be used on the remote gateway  then cut and paste it into the Right Public Key    o Ifyou select Shared secret you will need to enter a Pre shared secret  PSK   The PSK  must match the PSK configured at the other end of the tunnel    In Authentication Protocol select the authentica
290. n also use the special    oo oy    characters             _     and              There are no restrictions on the characters that you can use in the user Password  each can  contain up to 254 characters   Only the first eight Password characters are used to make the  password hash         gt  Specify which Group  or Groups  you want the user to join      gt  SSH pass key authentication can be used  This is more secure than password based  authentication  Paste the public keys of authorized public private keypairs for this user in the  Authorized SSH Keys field      gt  Check Disable Password Authentication if you wish to only allow public key authentication for  this user when using SSH      gt  Check Enable Dial Back in the Dial in Options menu to allow an out going dial back connection  to be triggered by logging into this port  Enter the Dial Back Phone Number with the phone  number to call back when user logs in      gt  Check specific Accessible Hosts and or Accessible Ports to nominate the serial ports and  network connected hosts you want the user to have access privileges to      gt  If there are configured RPCs  you can check Accessible RPC Outlets to specify which outlets the  user is able to control  that is  Power On Off       gt  Click Apply  The new user can now access the Network Devices  Ports  and RPC Outlets you  nominated as accessible  Plus  if the user is a Group member they can also access any other  device port outlet that was set up as accessible to th
291. n and integration into existing Microsoft infrastructure  It is  generally used for connecting single remote Windows clients  If you take your portable computer on a  business trip  you can dial a local number to connect to your Internet access service provider  ISP  and  then create a second connection  tunne   into your office network across the Internet and have the same  access to your corporate network as if you were connected directly from your office  Similarly   telecommuters can also set up a VPN tunnel over their cable modem or DSL links to their local ISP     To set up a PPTP connection   1  Enable and configure the PPTP VPN server on your console server  2  Setup VPN user accounts on the console server and enable the appropriate authentication    3  Configure the VPN clients at the remote sites  The client does not require special software as the  PPTP Server supports the standard PPTP client software included with Windows XP  NT  2000  7  and Vista    4  Connect to the remote VPN  4 11 1 Enable the PPTP VPN server     gt  Select PPTP VPN on the Serial  amp  Networks menu    724 746 5500   blackbox com Page 77       System Name  les1308a Model LES1308A Firmware  3 5 3u5 Ra  0   Uptime  1 days  5 hours  45 mins  7 secs Current User  root  BaduP Log Out    NETWORK SERVICES       Serial  amp  Network   PPTP Server     Serial Port     amp  Groups Enable E  Enable the PPTP server        Minium C None  least secure  Authentication  Required    Required  Encryption Level
292. n is not adequate for your needs you can bypass it safely by  creating a file at  etc config filter custom containing commands to build a specialized firewall  This  firewall script will run whenever the LAN interface is brought up  including initially  and will override any  automated system firewall settings     Below is a simple example of a custom script that creates a firewall using the iptables command  Only  incoming connections from computers on a C class network 192 168 10 0 will be accepted when this  script is installed at  etc config filter custom  Note that when this script is called  any preexisting chains  and rules have been flushed from iptables       bin sh    Set default policies to drop any incoming or routable traffic    and blindly accept anything from the 192 168 10 0 network   iptables     policy FORWARD DROP  iptables     policy INPUT DROP  iptables     policy OUTPUT ACCEPT    Allow responses to outbound connections back in   iptables     append INPUT        match state     state ESTABLISHED  RELATED     jump ACCEPT    Explicitly accept any connections from computers on    192 168 10 0 24  iptables     append INPUT     source 192 168 10 0 24    jump ACCEPT    There   s good documentation about using the iptables command at the Linux netfilter website  http   netfilter org documentation index html  There are also many high quality tutorials and HOWTOs  available via the netfilter website  in particular peruse the tutorials listed on the netfilter HOWTO
293. n send IOS commands through the USB console port  remotely  using a browser and the console server s built in AJAX terminal  or monitor messages from the  Cisco USB console ports and take rule book actions  using the console server s built in Auto Response  capabilities      For configuration and control these USB consoles are presented as new    serial ports    on the Serial  amp   Network  Serial Port menu  So for an LES1508A any Cisco USB console ports would present as Port 9  and 10     Common Seitings  such baud rate  are ignored when configuring the Cisco USB    serial port     However  you can apply all the Console Server Mode  Syslog and Serial Bridging settings to this port        Note  The Cisco USB console is auto detected and the new    serial port    numbers are created  However  it must be manually configured on initial connection  Any subsequent USB console disconnection  is auto detected  USB console re connection on the same physical USB port will also be auto   detected  but only if the console server has been power cycled        4 2 Add  Edit Users    The Administrator uses this menu selection to set up  edit  and delete users  and to define the access  permissions for each of these users     724 746 5500   blackbox com Page 56        NETWORK SERVICES       Serial  amp  Network    Groups    Hame       Alerts  amp  Logging    r  Add Group    Users       Users can be authorized to access specified console server serial ports and specified network attached  ho
294. n the Management Console     Italic text indicates a text command you enter at the command line level     Publishing history    724 746 5500   blackbox com Page 15       Date Revision Update details                September 2011 1 1 Prerelease  October 2011 2 0 Release for V2 8 firmware and later  December 2012 3 0 Release for V3 5 firmware and later       724 746 5500   blackbox com Page 16       Copyright    Black Box Corporation 2011  All Rights Reserved     Information in this document is subject to change without notice and does not represent a commitment  on the part of Black Box  Black Box provides this document    as is     without warranty of any kind  either  expressed or implied  including  but not limited to  the implied warranties of fitness or merchantability  for a particular purpose     Black Box may make improvements and or changes in this manual or in the product s  and or the  program s  described in this manual at any time  This manual could include technical inaccuracies or  typographical errors  Changes are periodically made to the information herein  these changes may be  incorporated in new editions of the publication     Notice to Users    Use proper back up systems and necessary safety devices to protect against injury  death  or property  damage caused by system failure  This protection is the user   s responsibility     This device is not approved for use as a life support or medical system     Any changes or modifications made to this device witho
295. name custom attribute of the raccess service     An example Linux tac plus config snippet might look like     user   myuser    service   raccess    groupname  users   groupname 1  routers   groupname2  dracs          You may also specify multiple groups in one comma delimited  e g  groupname  users  routers dracs  but  be aware that the maximum length of the attribute value string is 255 characters     To use an attribute name other than  groupname   set Authentication   gt  TACACS    gt  TACACS Group  Membership Attribute   9 1 10 Idle timeout    You can specify amount of time in minutes the console server waits before it terminates an idle ssh   pmshell or web connection     Web Management 0  Session Timeout       erve  Web Management session idle timeout in minutes     Nagios z     Configure Dashboard CL Management  Session Timeout  CLI Management session idle timeout in minutes  Status      Console Server    Session Timeout       Serial console server session idle timeoutin minutes     gt  Select Serial and Network  Authentication     gt  Web Management Session Timeout specifies the browser console session idle timeout in  minutes  The default setting is 20 minutes     gt  CLI Management Session Timeout specifies the ssh console session idle timeout in minutes   The default setting is to never expire     gt  Console Server Session Timeout specifies the pmshell serial console server session idle  timeout in minutes  The default setting is to never expire    9 1 11 Kerberos
296. network IP address  preserved   This soft reset disconnects all users and ends any established SSH sessions     A soft reset will also occur when you switch OFF power from the console server  and then switch the  power back ON  If you cycle the power and the unit is writing to flash  you could corrupt or lose data  so  rebooting the software is the safer option     A hard erase  hard reset  is performed by     724 746 5500   blackbox com Page 196     gt     Pushing the Erase button on the rear panel twice  A ball point pen or bent paper clip is a  suitable tool for this procedure  Do not use a graphite pencil  Press the button gently twice   within a couple of seconds  while the unit is powered ON     This will reset the console server back to its factory default settings and clear the console server s stored  configuration information        The hard erase will clear all custom settings and Connect to 192 168 0 1    return the unit back to factory default settings  i e   the IP address will be reset to 192 168 0 1      You will be prompted to log in and must enter the  default administration username and    administration password  Moer neme  E root z     11 2    A    192  168 0  1 80               Password   eessso  S    I    Remember my password    Username  root    Password  default    A ee    Upgrade Firmware    Before upgrading  make sure you are already running the most current firmware in your gateway  Your  console server will not allow you to upgrade to the same or 
297. network attached host      gt     Add the new host and the permitted services using the Serial  amp  Network  Network Hosts menu  as detailed in Network Hosts  Chapter 4 4   Only these permitted services will be forwarded  through by SSH to the host  All other services  TCP UDP ports  will be blocked        Note    Following are some of the TCP Ports used by SDT in the console server     22 SSH  All SDT Tunneled connections    23 Telnet on local LAN  forwarded inside tunnel    80 HTTP on local LAN  forwarded inside tunnel    3389 RDP on local LAN  forwarded inside tunnel    5900 VNC on local LAN  forwarded inside tunnel    73XX RDP over serial from local LAN     where XX is the serial port number  that is  7301 to  7348 on a 48 port console server    79XX VNC over serial from local LAN     where XxX is the serial port number       6 2    Add the new Users using Serial  amp  Network  Users  amp  Groups menu as detailed in  Network Hosts  Chapter 4 4   Users can be authorized to access the console server ports  and specified network attached hosts  To simplify configuration  the Administrator can  first set up Groups with group access permissions  then Users can be classified as  members of particular Groups     SDT Connector Client Configuration    The SDT Connector client works with all Black Box console servers  Each of these remote console servers  has an embedded OpenSSH based server that you can configure to port forward connections from the  SDT Connector client to hosts
298. ng     Serial Bridge Settings  Serial Bridging Mode  Create a network connection to a remote serial port via RFC 2217   Server Address  The network address of an RFC 2217 server to connect to   Server TCP Port  The TCP port the RFC 2217 server is serving on   RFC 2217 ea   Enable RFC 2217 access        SSH Tunnel    Redirect the serial bridge over an SSH tunnel to the server          Next  you will need to set up SSH keys for each end of the tunnel and upload these keys to the Server  and Client console servers     Client Keys     The first step in setting up ssh tunnels is to generate keys  Ideally  you will use a separate  secure   machine to generate and store all keys to be used on the console servers  If this is not ideal for your  situation  keys may be generated on the console servers themselves     It is possible to generate only one set of keys  and reuse them for every SSH session  While we do not  recommend this  each organization will need to balance the security of separate keys against the  additional administration they bring     Generated keys may be one of two types   RSA or DSA  and it is beyond the scope of this document to  recommend one over the other   RSA keys will go into the files id_rsa and id_rsa pub  DSA keys will be  stored in the files id_dsa and id_dsa pub     724 746 5500   blackbox com Page 258    For simplicity going forward  the term private key will be used to refer to either id_rsa or id_dsa and  public key to refer to either id_rsa pub or
299. ng  distributing or  modifying the Program or works based on it     724 746 5500   blackbox com Page 282    6  Each time you redistribute the Program  or any work based on the Program   the recipient automatically receives  a license from the original licensor to copy  distribute or modify the Program subject to these terms and conditions   You may not impose any further restrictions on the recipients    exercise of the rights granted herein  You are not  responsible for enforcing compliance by third parties to this License     7  lf  as a consequence of a court judgment or allegation of patent infringement or for any other reason  not limited  to patent issues   conditions are imposed on you  whether by court order  agreement or otherwise  that contradict the  conditions of this License  they do not excuse you from the conditions of this License  If you cannot distribute so as  to satisfy simultaneously your obligations under this License and any other pertinent obligations  then as a  consequence you may not distribute the Program at all  For example  if a patent license would not permit royalty free  redistribution of the Program by all those who receive copies directly or indirectly through you  then the only way you  could satisfy both it and this License would be to refrain entirely from distribution of the Program     If any portion of this section is held invalid or unenforceable under any particular circumstance  the balance of the  section is intended to apply and t
300. nnection    Activate your preferred browser on the connected PC workstation and enter  https   192 168 0 1 The Management Console supports all current versions of the popular  browsers  Internet Explorer  Mozilla Firefox  Chrome  and more      724 746 5500   blackbox com Page 27     gt  You will be prompted to log in  Enter the default  administration username and administration  password     Username  root    Password  default              Connect to 192 168 0 1 2 x     192  168 0  1 80  User name   e root z   Password    eoeceee     T Remember my password    Loox J oe            Note Console servers are factory configured with HTTPS access enabled and HTTP access disabled        NETWORK SERVICES       Serial  amp  Network       Serial Port      Users  amp  Groups      Authentication    figure the following  n return to the                  PPTP VPN      Call Home      Configure  Done       Configure          Environmental     Managed Devices       Alerts  amp  Logging   e Configure th    e Allow forw       Auto Response    Welcome to the BlackBox Management Console         c e Change the default administration password on the     OpenVPN e Configure the local network settings on the System     ellular modem connection on the Sy  g to the Dialout Cellular destination netv     PortLog    Enable IP masquerading for Dialout Cellular on the Sy    a Model LES1308A Firmware  3 5 3u5 ba  6 hours  4 mins  50 secs Current User  root       Bacup Log Out    unit  After corr  by clickin
301. nome KDE etc  front end  for example  with Red Hat Enterprise Linux 4  there   s VNC Server software and a choice of Viewer client software  and to launch      gt  Select the Remote Desktop entry in the Main Menu   gt  Preferences menu      gt  Click the Allow other users    checkbox to allow remote users to view and control your  desktop     724 746 5500   blackbox com Page 124    a Remote Desktop Preferences EJ     Sharing     a  x  Allow other users to view your desktop    r  lt   Allow other users to control your desktop                Users can view your desktop using this command   yncviewer hoopoe elk 0  Security  When a user tries to view or control your desktop    x  Ask you for confirmation        Z  Require the user to enter this password        Password                   gt  Toset up a persistent VNC server on Red Hat Enterprise Linux 4     Set a password using vncpasswd   Edit  etc sysconfig vncservers   Enable the service with chkconfig vncserver on   Start the service with service vncserver start   Edit  home username  vnc xstartup if you want a more advanced session than just twm  and an xterm    C  For Macintosh servers  and clients      O   0 Oi    OF  O     OSXvnc http   www redstonesoftware com vnc html is a robust  full featured VNC server for Mac  OS X that allows any VNC client to remotely view and or control the Mac OS X machine  OSXvnc is  supported by Redstone Software     D  Most other operating systems  Solaris  HPUX  PalmOS etc  either come with V
302. not enable IPMI for remote access without setting a password   and that that password should not be the same as any other password on that system     When an IPMI password is changed on a remote machine with the IPMIv1 5  an interface  the new  password is sent across the network as clear text  This could be observed and then used to attack the  remote system  We recommend that IPMI password management only be done over IPMlv2 0 lanplus  interface or the system interface on the local station     For IPMI v1 5  the maximum password length is 16 characters  Passwords longer than 16 characters will  be truncated     For IPMI v2 0  the maximum password length is 20 characters  longer passwords are truncated   COMMANDS    help    This can be used to get command line help on ipmitoo  commands  It may also be placed at the  end of commands to get option usage help     ipmitool help    Commands    raw Send a RAW IPMI request and print  response   lan Configure LAN Channels   chassis Get chassis status and set power  state   event Send pre defined events to MC   mc Management Controller status and  global enables   sdr Print Sensor Data Repository  entries and readings   sensor Print detailed sensor information   fru Print built in FRU and scan SDR  for FRU locators   sel Print System Event Log  SEL    pef Configure Platform Event Filtering   PEF    sol Configure IPMlv2 0 Serial over LAN   isol Configure IPMlv1 5 Serial over LAN   user Configure Management Controller  users   channel 
303. nrpe_daemon      Serial Status  define command      command_name check_serial_status  command_line SUSER1S check_nrpe  H 192 168 254 147  p 5666  c check_serial_SHOSTNAMES      define service    service_description Serial Status  host_name server  use generic service  check_command check_serial_status      define service    service_description serial signals server  host_name server  use generic service  check_command check_serial_status  active_checks_enabled O  passive_checks_enabled 1      define servicedependency   name Black Box_nrpe_daemon_dep  host_name Black Box  dependent_host_name server  dependent_service_description Serial Status  service_description NRPE Daemon  execution_failure_criteria W U C        Port Log    define command   command_name_ check_port_log  command_line SUSER1S check_nrpe  H 192 168 254 147  p 5666  c port_log_SHOSTNAMES       define service    service_description Port Log  host_name server  use generic service  check_command check_port_log    724 746 5500   blackbox com Page 189    define service      service_description port log server  host_name server  use generic service  check_command check_port_log  active_checks_enabled O  passive_checks_enabled 1      define servicedependency   name Black Box_nrpe_daemon_dep  host_name Black Box  dependent_host_name server  dependent_service_description Port Log  service_description NRPE Daemon  execution_failure_criteria W U C         Ping  define command   command_name_ check_ping_via_Black Box  comm
304. nselect all Ports    O m O m O 0 0 O  Port 1 Port 2 Port 3 Port 4 Port 5 Port 6 Port7 Port 8          PPTP VPN Network  ome Address       The IP Address of the subnet to permit  Network  Mask   The subnet mask for the permitted IP range     Description          Alerte  amp  Logging   A brief explanation of this entry     PortLog      Auto Response      SMTP  amp  SMS eal       gt  Select the Accessible Port s  that the new rule is to be applied to    gt  Then  enter the Network Address of the subnet to be permitted access      gt  Then  specify the range of addresses that are to be permitted by entering a Network Mask for  that permitted IP range  for example       To permit all the users located with a particular Class C network  for example  204 15 5 0   connection to the nominated port then you would add the following Trusted Network New    Rule   Network Address 204 15 5 0  Network Mask 255 255 255 0      If you want to permit only the one user who is located at a specific IP address  for example   204 15 5 13 say  to connect     Network Address 204 15 5 0    724 746 5500   blackbox com Page 61                               Network Mask 255 255 255 255      If  however  you want to allow all the users operating from within a specific range of IP  addresses  for example  any of the thirty addresses from 204 15 5 129 to 204 15 5 158  to  be permitted connection to the nominated port     Host  Subnet Address 204 15 5 128    Subnet Mask 255 255 255 224                        
305. ntly  there is a script  etc scripts alert email that runs from within all the alert scripts  for example   portmanager user alert or environmental alert   The alert email script sends the email  The line that  invokes the email script is as follows      bin sh  etc scripts alert email Ssuffix  amp     If you want to send another email to a single address or the same email to many recipients  edit the  custom script appropriately  You can follow the examples in any of the seven alert scripts listed above   In particular  consider the portmanager user alert script  If you need to send the same alert email to  more than one email address  find the lines in the script responsible for invoking the alert email script   then add the following lines below the existing lines     export TOADDR  emailaddress domain com    bin sh  etc scripts alert email Ssuffix  amp     These two lines assign a new email address to TOADDR and invoke the alert email script in the  background     15 1 5 Deleting Configuration Values from the CLI    The delete node script is provided to help with deleting nodes from the command line  The  delete   node  script takes one argument  the node name you want to delete  for example   config users user1   or  config sdt hosts host1       724 746 5500   blackbox com Page 238    delete node is a general script for deleting any node you desire  users  groups  hosts  UPSes  etc   from  the command line  The script deletes the specified node and shuffles the remainder
306. o 50 users securely controlling an  unlimited number of Managed Devices at a remote site through the on site console server  Gateway        6 2 5    Manually adding hosts to the SDT Connector gateway    For each gateway  you can manually specify the network connected hosts that you will access through  that console server  and for each host  specify the services that you will use to communicate with the    host      gt  Select the newly added gateway and click the Host icon I to create a host that will be    accessible via this gateway   Alternatively select File  New Host      F New SDT Host       Host Address    Services  7  HTTP   E Telnet   E  vnc   7  Dell RAC     Dell Server Administrator   Dell IT Assistant SOL   E IBM RSA I      IBM Director   IBM AMM HP iLO 2   VMWare Server TCP Port 1494   Serial 2 SSH Serial 2 Telnet   Serial 3 SSH Serial 3 Telnet   Serial 4 SSH Serial 4 Telnet   TCP Port 903                                                                         Descriptive Name       Description Notes                               Enter the IP or DNS Host Address of the host  if this is a DNS address  it must be able to be  resolved by the gateway      Select which Services to use to access the new host  A range of service options are pre   configured in the default SDT Connector client  RDP  VNC  HTTP  HTTPS  Dell RAC  VMware  etc     However if you want to add new services to the range  then proceed to the next section  Adding  a new service  then return here  
307. obe for connectivity detection    The address of the second peer to probe for connectivity detection    a        gt  Click Apply  You have selected the failover method  It is not active until you specify the external    sites to be probed to trigger failover  and set up the failover ports themselves  This is covered in  Chapter 5        Note    3 6 4    Aggregating the network ports    You can configure the second Ethernet port as either a gateway port or as an OOB Failover port   but not both  Make sure you did not enable the Management LAN function on Network 2     By default  you can only access the console server s Management LAN network ports using SSH  tunneling port forwarding or by establishing an IPsec VPN tunnel to the console server  However  all the  wired network ports on the console servers can also aggregated by being bridged or bonded     724 746 5500   blackbox com    Page 43    System Name  les1308a Model LES1308A Firmware  3 5 3u5 Ra  0     a j Uptime  0 days  8 hours  22 mins  48 secs Current User  root  Bacup Log Out    NETWORK SERVICES       Serial  amp  Network    Network Interface Management LAN General Settings Route Settings     Serial Port        Interface    General Settings           Interface   Disabled     OpenVPN Aggregation C Bri     PPTP VPN      ia  Enable aggreg of wired Ethernet interfaces  Enable IPv6 oO  Enable IPv6 for all interfaces  Apply     gt  Select Enable Bridging on the System  IP General Settings menu    gt  Select Bridge Inter
308. ocal terminal attached to serial port 5       config  s config ports port5 mode terminal    config  s config ports port5 terminal  vt220   vt102   vt100   linux   ansi     The default terminal is vt220     Serial bridge mode  Create a network connection to a remote serial port via RFC 2217 on port 5     config  s config ports port5 mode bridge    Optional configurations for the network address of RFC 2217 server of 192 168 3 3 and TCP port used by  the RFC 2217 service   2500       config  s config ports port5 bridge address 192 168 3 3    config  s config ports port5 bridge port 2500    To enable RFC 2217 access    config  s config ports port5  bridge rfc2217 on    To redirect the serial bridge over an SSH tunnel to the server    config  s  config ports port5 bridge ssh enabled on    Syslog settings  Additionally  the global system log settings can be set for any specific port  in any mode       config  s config ports port  syslog facility  facility      facility    can be   Default  local 0 7  auth  authpriv  cron  daemon  ftp  kern  Ipr  mail  news  user  uucp    config  s config ports port  syslog priority  priority      priority    can be   Default  warning  notice  Info  error  emergency  debug  critical  alert    724 746 5500   blackbox com Page 218    14 3 Adding and Removing Users    First  determine the total number of existing Users  if you have no existing Users you can assume this is  0      config  g config users total    This command should display config users
309. og Status checked  The  information is also presented graphically       System Name  Modet  LI 216A Firmware  2 8 0u2 N  0    lt SBLACK BOX Uptime  0 d  ours  46 mins cs Current User  root ia  Bacup Log Out    NETWORK SERVICES       Serial  amp  Network SmartOnline   Status Graph  Serial Port  Users  amp  Groups    Authentication  Network Hosts  Trusted Networks 28  Cascaded Ports 10  UPS Connections  RPC Connections     Environmental 62 38 62 40 82 58    Managed Devices          38          SmartOnline   Log    Alerts  amp  Logging Date Time Battery Input Load Status Temperature Frequency  Port Log Charge Voltage  Alerts  SMTP  amp  SMS 20090518 212100 100 237 3 0 off 49 9  tenti 20090518 212200 100 237 3 0 off 49 9  System 20090518 212300 100 235 8 0 off 49 9    8 2 6 Overview of Network UPS Tools  NUT     NUT is built on a networked model with a layered scheme of drivers  server and clients  Configure NUT  using the Management Console as described above  or configure the tools and manage the UPSes  directly from the command line  This section provides an overview of NUT  You can find full  documentation at http   www networkupstools org doc     724 746 5500   blackbox com Page 160       I  Monitor log graph  amp  alert    NUT upsc client  i         f  Local NUT upsa server  NUT serialUSB SNMP UPS drivers na  NUT sian server  on ss    UPS drivers  Multiple fa ad  remote UPSes    NUT is built on a networked model with a layered scheme of drivers  server and clients       The
310. om the client to the selected  console server  then establishes a port forward connection to the target network connected host or  serial connected device  Next  it executes the client application that it uses in communicating with the  host     This chapter details the basic SDT Connector operations       Configuring the console server for SSH tunneled access to network attached hosts and setting up  permitted Services and user access  Section 6 1        Setting up the SDT Connector client with gateway  host  service  and client application details   and making connections between the Client PC and hosts connected to the console server   Section 6 2        Using SDT Connector to access the Management Console via a browser  Section 6 3      724 746 5500   blackbox com Page 102    Using SDT Connector to Telnet or SSH connect to devices that are serially attached to the  console server  Section 6 4      The chapter then covers more advanced SDT Connector and SSH tunneling topics     6 1    Using SDT Connector for out of band access  Section 6 5    Automatic importing and exporting configurations  Section 6 6    Configuring Public Key Authentication  Section 6 7     Setting up a SDT Secure Tunnel for Remote Desktop  Section 6 8    Setting up a SDT Secure Tunnel for VNC  Section 6 9      Using SDT to IP connect to hosts that are serially attached to the console server  Section 6 10      Configuring for SSH Tunneling to Hosts    To set up the console server to SSH tunnel access a 
311. ommands     Single Connection o  Limit the port to a single concurrent connection    Logging Level This specifies the level of information to be logged and monitored  referto Chapter 7     Alerts and Logging      Telnet When the Telnet service is enabled on the console server  a Telnet client on a User or  Administrator   s computer can connect to a serial device attached to this serial port on the  console server  The Telnet communications are unencrypted  so this protocol is generally  recommended only for local connections     With Win2000 XP NT you can run telnet from the command prompt  cmd exe   Vista and  Windows 7 include a Telnet client and server  but they are not enabled by default  To enable    Telnet       Log in as Admin and go to Start Control Panel Programs and Features       Select Turn Windows features on or off  check the Telnet Client  and click OK     724 746 5500   blackbox com Page 49        Al Windows Features       Turn Windows features on or off      To turn a feature on  select its check box  To turn a feature off  clear its  check box  A filled box means that only part of the feature is turned on           re  my SNMP feature   _   Subsystem for UNIX based Applications  ie Tablet PC Optional Components       Telnet Client       Telnet Server       TFTP Client   J Windows DFS Replication Service                                           J Windows Fax and Scan   J Windows Meeting Space   FJI Windows Process Activation Service   Z  J Windows Ultimate 
312. on  the source code distributed need not include anything that is normally distributed  in either source or  binary form  with the major components  compiler  kernel  and so on  of the operating system on which the  executable runs  unless that component itself accompanies the executable     If distribution of executable or object code is made by offering access to copy from a designated place  then offering  equivalent access to copy the source code from the same place counts as distribution of the source code  even  though third parties are not compelled to copy the source along with the object code     4  You may not copy  modify  sublicense  or distribute the Program except as expressly provided under this License   Any attempt otherwise to copy  modify  sublicense or distribute the Program is void  and will automatically terminate  your rights under this License  However  parties who have received copies  or rights  from you under this License will  not have their licenses terminated so long as such parties remain in full compliance     5  You are not required to accept this License  since you have not signed it  However  nothing else grants you  permission to modify or distribute the Program or its derivative works  These actions are prohibited by law if you do  not accept this License  Therefore  by modifying or distributing the Program  or any work based on the Program    you indicate your acceptance of this License to do so  and all its terms and conditions for copyi
313. ond logo are registered trademarks of BB Technologies  Inc   Any third party trademarks appearing in this white paper are acknowledged to be the property of their respective owners     LES1108A  version 3       724 746 5500   blackbox com    
314. ond to a series of pings  the console server will send a command to RPC outlet 3 to power cycle the  router  and write the current date time to a file       Copy the ping detect script to  etc config scripts  on the console server    Open  etc config rc local using vi    Add the following line to rc  ocal      etc config scripts ping detect 192 168 22 2  bin bash  c  pmpower  I portO1  o 3 cycle  amp  amp  date   gt    tmp output log  amp     724 746 5500   blackbox com Page 241    The above command will cause the ping detect script to continuously ping the host at 192 168 22 2  which is the router  If the router crashes  it will no longer respond to ping requests  If this happens  the  two commands pmpower and date will run  The output from these commands is sent to the file   tmp output log so that we have a record  The ping detect is also run in the background using the   amp       Remember the rc  oca  script only runs by default when the system boots  You can manually run the  rc local script or the ping detect script if desired     The ping detect script    The above is just one example of using the ping detect script  The idea of the script is to run any number  of commands when a specific host stops responding to ping requests  Here are details of the ping detect  script itself        bin sh    Usage  ping detect HOST  COMMANDBS        This script takes 2 types of arguments  hostname IPaddress to ping  and the commands to    run if the ping fails 5 times in a row  Thi
315. ondition     gt  Select the reported UPS State to trigger the Auto Response  either On Battery or Low  Battery   The Auto Response will resolve when the UPS state returns to the  Online  state     gt  Select which connected UPS Device to monitor and check Save Auto Response       Note  Before configuring UPS state checks in Auto Response you first must configure the attached  UPS       724 746 5500   blackbox com Page 137    7 2 3 Serial Login Logout  To monitor serial ports and check for login logout or pattern matches for Auto Response triggers events      gt  Click on Serial Login Logout as the Check Condition  Then in the Serial Login Logout  Check menu select Trigger on Login  to trigger when any user logs into the serial port  or  Trigger on Logout and specify Serial Port to perform check on  and or     gt  Click on Serial Signal as the Check Condition  Then in the Serial Signal Check menu  select the Signal  CTS  DCD  DSR  to trigger on  the Trigger condition  either on serial  signal change  or check level  and specify Serial Port to perform check on  and or     gt  Click on Serial Pattern as the Check Condition  Then in the Serial Pattern Check menu  select the PCRE pattern to trigger on and the serial line  TX or RX  and Serial Port to  pattern check on     gt  Check Save Auto Response       Note  Before configuring serial port checks in Auto Response you first must configure the serial port in  Console server mode  Also most serial port checks are not resolvable so
316. onnection  Your console server is configured with a default IP Address 192 168 0 1 Subnet Mask 255 255 255 0     gt  Directly connect a PC or workstation to the console server        Note For initial configuration we recommend that you connect the console server directly to a single PC  or workstation  However  if you choose to connect your LAN before completing the initial setup  steps  it is important that       you make sure that there are no other devices on the LAN with an address of 192 168 0 1    the console server and the PC workstation are on the same LAN segment  with no interposed  router appliances        3 1 1 Connected PC workstation set up    To configure the console server with a browser  the connected PC workstation should have an IP  address in the same range as the console server  e g  192 168 0 100       gt  To configure the IP Address of your Linux or Unix PC workstation simply run ifconfig   gt  For Windows PCs  Win9x Me 2000 XP  Vista  7 NT       a Click Start   gt   Settings   gt   Control Panel and double click Network Connections  for  95 98 Me  double click Network        Right click on Local Area Connection and select Properties     Select Internet Protocol  TCP IP  and click Properties     Select Use the following IP address and enter the following details     o IP address  192 168 0 100    724 746 5500   blackbox com Page 26     gt     3 1 2    o Subnet mask  255 255 255 0      If you want to retain your existing IP settings for this network conn
317. onsole  server       Remote site with no network access    In this scenario the console server allows dial in access for the Nagios server  Periodically  the Nagios  server will establish a connection to the console server and execute any NRPE commands  before  dropping the connection     724 746 5500   blackbox com Page 195    Chapter 11 System Management      Introduction    This chapter describes how the Administrator can perform a range of general console server system  administration and configuration tasks such as       Applying Soft and Hard Resets to the gateway     Re flashing the Firmware     Configuring the Date  Time and NTP       Setting up Backup of the configuration files     System administration and configuration tasks that are covered elsewhere include       Resetting the System Password and entering a new System Name and Description  Chapter  3 2        Setting the System IP Address  Chapter 3 3       Setting the permitted Services by which to access the gateway  Chapter 3 4      Setting up OoB Dial in  Chapter 5       Configuring the Dashboard  Chapter 12      11 1 System Administration and Reset  The Administrator can reboot or reset the gateway to default settings   A soft reset is affected by      gt  Selecting Reboot in the System  Administration menu and clicking Apply     Manage 5 FIPS Mode       Devices      Port Logs Reboot     Host Logs     Power      Terminal      Apply      The console server reboots with all settings  for example  the assigned 
318. or by ssh telnet connecting to the console  server        System Name  les1308a Model LES1308A Firmware  3 5 3u5 ba  0   LS Uptime  0 days  19 hours  39 mins  39 secs Current User  root    BaduP Log Out    NETWORK SERVICES       Terminal    login  root  Password       7 6 2 Serial port logging    In Console Server mode  activity logs can be maintained of all serial port activity  To specify which serial  ports are to have activities recorded and to what level data is to be logged      gt  Select Serial  amp  Network  Serial Port and Edit the port to be logged   gt  Specify the Logging Level of for each port as     Level 0 Turns off logging for the selected port   Level 1 Logs all User connection events to the port   Level 2 Logs all data transferred to and from the port and all changes in hardware flow  control status and all User connection events   Level 3 Logs all data transferred from the port and all changes in hardware flow control  status and all User connection events    724 746 5500   blackbox com Page 147    Level 4 Logs all data transferred to the port and all changes in hardware flow control  status and all User connection events  Click Apply       Note    A cache of the most recent 8K of logged data per serial port is maintained locally  in addition to  the Logs which are transmitted for remote USB flash storage   To view the local cache of logged  serial port data select Manage  Port Logs       7 6 3    Network TCP and UDP port logging    The console server supp
319. ork access or if you are using an alternate version of  Windows  More detailed instructions are available from the Microsoft web site         gt  Login to your Windows client with administrator privileges     gt  From the Network  amp  Sharing Center on the Control Panel select Network Connections and  create a new connection    SF  i Set Up a Connection or Network    Choose a connection option    Connect to the Intemet  Set up a ess  broadba    Ew Set up a new network    onfigure a ne outer or access point       ts Fe to a wireless        Ork or cre    Je Connect to a workplace  Set up a dial up or VPN connection to your workplace      ie up a dial up connection  Connect to the Internet us    CN    Cancel          gt  Select Use My Internet Connection  VPN  and enter the IP Address of the console server    724 746 5500   blackbox com Page 79       Note     To connect remote VPN clients to the local network  you need to know the user name and  password for the PPTP account you added  as well as the Internet IP address of the console  server  lf your ISP has not allocated you a static IP address  consider using a dynamic DNS    service  Otherwise you must modify the PPTP client configuration each time your Internet IP  address changes            lin Connect to a Workplace    Type your user name and password    User name       Password     Show characters          Remember this password    Domain  optional         Connect Cancel    724 746 5500   blackbox com Page 80    Chapter
320. ork connected    devices      gt  The following general service access options can be specified     HTTPS    HTTP    Telnet    SSH    This ensures secure browser access to all the Management Console menus  It also  allows appropriately configured Users secure browser access to selected  Management Console Manage menus  If you enable HTTPS  the Administrator will be  able to use a secure browser connection to the Console servers Management  Console  For information on certificate and user client software configuration  refer  to Chapter 9   Authentication  By default  HTTPS is enabled  and we recommend that  that you only use HTTPS access if the console server will be managed over any public  network  for example  the Internet      By default HTTP is disabled  We recommend that the HTTP service remain disabled if  the console server will be remotely accessed over the Internet     This gives the Administrator Telnet access to the system command line shell  Linux  commands   This may be suitable for a local direct connection over a management  LAN  By default  Telnet is disabled  We recommend that this service remain disabled  if you will remotely administer the console server     This service provides secure SSH access to the Linux command line shell  We  recommend that you choose SSH as the protocol where the Administrator connects  to the console server over the Internet or any other public network  This will provide  authenticated communications between the SSH client progra
321. ort again as serial data  The two console servers effectively act as a virtual  serial cable over an IP network     One console server is configured as the Server  Set the Server serial port to be bridged in Console Server  mode with either RFC2217 or RAW enabled  as described in Chapter 4 1 2   Console Server Mode      For the Client console server  the serial port to bridge must be set in Bridging Mode     Serial Bridge Settings    Serial Bridging  Mode    Create a network connection to a remote serial port via RFC 2217  Server Address   The network address of an RFC 2217 server to connect to  Server TCP Port   The TCP port the RFC 2217 server is serving on  RFC 2217   Enable RFC 2217 access    SSH Tunnel    Redirect the serial bridge over an SSH tunnel to the server    Select Serial Bridging Mode and specify the IP address of the Server console server and the TCP  port address of the remote serial port  for RFC2217 bridging this will be 5001 5048      By default  the bridging client will use RAW TCP  Select RFC2217 if this is the console server  mode you have specified on the server console server            Local Ethernet LAN U         Serially connected device COM Port connected   e g  security appliance  control PC     gt  You may secure the communications over the local Ethernet by enabling SSH  You will need to    4 1 7    generate and upload keys  refer to Chapter 14    Advanced Configuration      Syslog    In addition to built in logging and monitoring  which can be
322. orts optional logging of access to and communications with network attached    Hosts      gt      gt     7 6 4    7 6 5    For each Host  when you set up the Permitted Services which are authorized to be used  you also  must set up the level of logging that is to be maintained for each service    Specify the logging level that is to be maintained for that particular TDC UDP port service  on  that particular Host     Level 0 Turns off logging for the selected TDC UDP port to the selected Host  Level 1 Logs all connection events to the port  Level 2 Logs all data transferred to and from the port    Click Add then click Apply  Auto Response event logging    Check Log Events on Alerts  amp  Logging  Auto Response to enable logging all Auto Response  activities    Power device logging    The console server also logs access and communications with network attached hosts and maintain a  history of the UPS and PDU power status     To activate and set the desired levels of logging for each serial  Section 7 4  and or network port  Section  7 5  and or power and environment UPS  refer Chapter 8     724 746 5500   blackbox com Page 148    Chapter 8 Power  amp  Environmental Management    Introduction    Black Box console servers manage embedded software that you can use to manage connected Power  Distribution Systems  PDUs   IPMI devices  and Uninterruptible Power Supplies  UPSs  supplied by a  number of vendors  and some environmental monitoring devices     8 1 Remote Power Control  RP
323. ough to a port with any console server login  This mode is mainly  used when you have an external system  such as conserver  managing user authentication  and access privileges at the serial device level     For Unauthenticated Telnet  the default port address is IP Address _ Port  6000   serial port     i e  6001     6048    724 746 5500   blackbox com Page 52    Web Terminal Selecting Web Terminal enables web browser access to the serial port via Manage   Devices  Serial using the Management Console s built in AJAX terminal  Web Terminal  connects as the currently authenticated Management Console user and does not re   authenticate  See section 13 3 for more details     Authenticate Enable for secure serial communications using Portshare and add password    Accumulation Period By default  once a connection is established for a particular serial port  such as a  RFC2217 redirection or Telnet connection to a remote computer  then any incoming  characters on that port are forwarded over the network on a character by character basis   The accumulation period changes this by specifying a period of time that incoming characters  will be collected before then being sent as a packet over the network     Escape Character This enables you to change the character used for sending escape characters   The default is       Power Menu This setting enables the shell power command  A user can control the power connection  to a Managed Device from command line when they are connected to the 
324. over address1  ip address       config  s config interfaces wan failover address2  ip address     config  s config interfaces wan failover interface   eth1   console   modem      The network interfaces can also be configured automatically       config  s config interfaces wan mode dhcp    config  s config interfaces lan mode dhcp    The following command will synchronize the live system with the new configuration      bin config     run ipconfig  The following command will synchronize the live system with the new configuration       config  r ipconfig    14 19 Date  amp  Time Settings    To enable NTP using a server at pool ntp org  issue the following commands       config  s config ntp enabled on    config  s config ntp server pool ntp org    Alternatively  you can manually change the clock settings   To change running system time     date 092216452005 05 Format is MMDDhhmm  CC YY   ss   Then the following command will save this new system time to the hardware clock      bin hwclock  systohc  Alternatively  to change the hardware clock      bin hwclock    set   date 092216452005 05 Format is MMDDhhmm  CC YY    ss   Then the following command will save this new hardware clock time as the system time      bin hwclock  hctosys    724 746 5500   blackbox com Page 232    To change the timezone     config  s config system timezone US Eastern  The following command will synchronize the live system with the new configuration       config  r time    14 20 Dial in settings    To enab
325. ows_Client    Proxy Settings  About       724 746 5500   blackbox com Page 73    When the OpenVPN software is started  the C  Program Files OpenVPN config folder will be scanned for     opvn    files  This folder will be rechecked for new configuration files whenever the OpenVPN GUI icon is  right clicked  So once OpenVPN is installed  a configuration file will need to be created      gt  Using a text editor  create an xxxx ovpn file and save in C  Program Files OpenVPN config  For  example  C  Program Files OpenVPN config client ovpn    An example of an OpenVPN Windows client configuration file is shown below       description  les1216_client  client   proto udp   verb 3   dev tun   remote 192 168 250 152   port 1194   ca c  lopenvpnkeys  ca crt  cert c  lopenvpnkeys  client crt  key c  lopenvpnkeys lclient key  nobind   persist key   persist tun   comp Izo    An example of an OpenVPN Windows Server configuration file is shown below     server 10 100 10 0 255 255 255 0  port 1194   keepalive 10 120   proto udp   mssfix 1400   persist key   persist tun   dev tun   ca c   lopenvpnkeys  ca crt   cert c  lopenvpnkeys  server crt  key c  lopenvpnkeys  server key  dh c   openvpnkeys  dh pem  comp lzo   verb 1   syslog LES1216_OpenVPN_Server    The Windows client server configuration file options are                                Options Description    description  This is a comment describing the configuration   Comment lines start with a         and are ignored by OpenVPN    Cli
326. plained below     Common name This is the network name of the console server once it is installed in the  network  usually the fully qualified domain name   It is identical to the name that is used to  access the console server with a web browser  without the    http       prefix   In case the  name given here and the actual network name differ  the browser will pop up a security  warning when the console server is accessed using HTTPS     Organizational Unit Use this field to specify which department within an organization the  console server belongs to     Organization The name of the organization that the console server belongs to   Locality City The city where the organization is located   State Province The state or province where the organization is located     Country The country where the organization is located  This is the two letter ISO code   for example  DE for Germany  or US for the USA   Note  Enter the country code in CAPITAL  LETTERS      Email The email address of a contact person that is responsible for the console server  and its security     Challenge Password Some certification authorities require a challenge password to  authorize later changes on the certificate  for example  revocation of the certificate   The  password must be at least 4 characters long     Confirm Challenge Password Confirmation of the Challenge Password     724 746 5500   blackbox com Page 178    Key length This is the length of the generated key in bits  1024 Bits are supposed to 
327. ponse triggers to   perform this action   Recipient   Email   Address The email address to send this email to       Subject    The subject of the email                Email  Text    TIMESTAMP  This action was run    Check details   vs trigger value SAR_TRIGGER_VAL             Save ee   l l   Note  A message text can be sent with Email  SMS and Nagios actions  This configurable message can  include selected values    AR_TRIGGER_VAL   the trigger value for the check e g  for UPS Status  it could be onbatt or  battlow   AR_VAL   the value returned by the check e g  for ups status  it could be online onbatt battlow   AR_CHECK_DEV   the device name of the device being checked e g  for Alarm  the alarm  name   TIMESTAMP   the current timestamp   HOSTNAME   the hostname of the console server  The default message text is   TIMESTAMP  This action was run   Check details  value  AR_VAL  vs trigger value  AR_TRIGGER_VAL   7 3 1 Send Email     gt  Click on Send Email as the Add Trigger Action  Enter a unique Action Name and set the  Action Delay Time    724 746 5500   blackbox com Page 140    Specify the Recipient Email Address to send this email to and the Subject of the email  For  multiple recipients you can enter comma separated addresses     gt  Edit the Email Text message to send and click Save New Action       Note    An SMS alert can also be sent via an SMTP  email  gateway  You will need to specify the  Recipient Email Address in the format specified by the gateway provider  e g
328. pter then details how to perform advanced and custom management tasks using Black Box  commands  Linux commands  and the open source tools embedded in the console server       portmanager serial port management     raw data access to the ports and modems     iptables modifications and updating IP filtering rules     modifying SNMP with net snmpd     public key authenticated SSH communications     SSL  configuring HTTPS and issuing certificates     using pmpower for NUT and PowerMan power device management    using  PMItools      CDK custom development kit    15 1 Custom Scripting   The console server supports GNU bash shell commands  refer to Appendix A  enabling the Administrator  to run custom scripts    15 1 1 Custom script to run when booting    The  etc config rc local script runs whenever the system boots  By default  this script file is empty  You  can add any commands to this file if you want them to run at boot time  for example  if you wanted to  display hello world        bin sh   echo  Hello World      If this script has been copied from a Windows machine  you may need to run the following command on  the script before bash can run it successfully     724 746 5500   blackbox com Page 236      dos2unix  etc config rc local    Another scenario would be to call another custom script from the  etc config rc local file  making sure  that your custom script will run whenever the system is booted     15 1 2 Running custom scripts when alerts are triggered    Whenever an 
329. pts any network IP address assigned by a DHCP  server on your network  In this initial state  the console server will then respond to both its Static  address  192 168 0 1  and its newly assigned DHCP address         gt  By default the console server LAN port auto detects the Ethernet connection speed  You can use  the Media menu to lock the Ethernet to 10 Mbps or 100 Mbps  and to Full Duplex  FD  or Half  Duplex  HD         Note If you changed the console server IP address  you may need to reconfigure your PC workstation  so it has an IP address that is in the same network range as this new address         gt  Click Apply      gt  Enter http   new IP address to reconnect the browser on the PC workstation that is connected  to the console server     724 746 5500   blackbox com Page 31    3 3 1    IPv6 configuration    You can also configure the console server Network and Management LAN Interfaces for IPv6 operation      gt    gt     3 3 2    On the System  IP menu select General Settings page and check Enable IPv6     Then  configure the IPv6 parameters on each Interface page     Dynamic DNS  DDNS  configuration    With Dynamic DNS  DDNS  a console server whose IP address is dynamically assigned  and that may  change from time to time  can be located using a fixed host or domain name      gt     The first step in enabling DDNS is to create an account with the supported DDNS service  provider of your choice  Supported DDNS providers include      DyNS www dyns cx      dyndns or
330. r     724 746 5500   blackbox com Page 62     gt  Select System  Administration on Master   s Management Console      gt  Check Generate SSH keys automatically and click Apply     LS  gt  System Name  Mov 2 Fari 28 002  BLACK BOX Uptime  0 day  25 Current User  root    NETWORK SERVICES       Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication  Network Hosts To generate keys  select RSA and or DSA   Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections DSA Keys  Environmental  Managed Devices         ely two minutes  Any old  ng  may stop functio       eys of that type will be  ing until they are updated       with s  If       RSA Keys    Generate RSA Keys    Generate DSA Keys      Apply      Next  you must select whether to generate keys using RSA and or DSA  if unsure  select only RSA    Generating each set of keys will require approximately two minutes  and the new keys will destroy any  old keys of that type that may previously been uploaded     Also  while the new generation is underway on the master  functions relying on SSH keys  for example   cascading  may stop functioning until they are updated with the new set of keys     To generate keys    gt  Select RSA Keys and or DSA Keys    gt  Click Apply    gt  Once the new keys have been successfully generated  Click here to return and the keys will  automatically be uploaded to the Master and connected Slaves     4 6 2 Manually generate and upload SSH keys    Or  if you have an RSA or DSA key
331. r address  remote server ip address     config  s config eventlog server logfacility  facility        facility  can be   Daemon  Local 0 7  Authentication  Kernel  User  Syslog  Mail  News  UUCP      config  s config eventlog server logpriority  priority        priority    can be   Info  Alert  Critical  Debug  Emergency    724 746 5500   blackbox com Page 227    Error  Notice  Warning    Assume the remote log server needs a username  name1  and password    secret          config  s config eventlog server username name1    config  s config eventlog server password secret    To set the remote path as   Black Box logs  to save logged data       config  s config eventlog server path  Black Box logs    config  s config eventlog server type  none   syslog   nfs   cifs   usb     If the server type is set to usb  none of the other values need to be set  The mount point for storing ona  remote USB device is  var run portmanager logdir    The following command will synchronize the live system with the new configuration     config  a    14 14 Alerts  You can add an email  SNMP or NAGIOS alert by following the steps below     The general settings for all alerts    Assume this is our second alert  and we want to send alert emails to john Black Box com and sms s to  peter Black Box com       config  s config alerts alert2 description MySecondAlert    config  s config alerts alert2 email john Black Box com    config  s config alerts alert2 email2 peter  Black Box com    To use NAGIOS to no
332. r and make sure the changes are stored in the console server s flash memory  etc     In particular  the config utility allows you to manipulate the system configuration from the command  line  With config  you can activate a new configuration by running the relevant configurator  which  performs the action needed to make the configuration changes live     To access config from the command line      gt  Power on the console server and connect the    terminal    device     o If you are connecting using the serial line  plug a serial cable between the console server  local DBO console port and terminal device  Configure the serial connection of the terminal  device you are using to 115200 bps  8 data bits  no parity  and one stop bit     724 746 5500   blackbox com Page 213    o If you are connecting over the LAN  then you will need to interconnect the Ethernet ports  and direct your terminal emulator program to the IP address of the console server   192 168 0 1 by default       gt  Log onto the console server by pressing    return    a few times  The console server will request a  username and password  Enter the username root and the password default  You should now  see the command line prompt which is a hash            a certain level of understanding before you execute Linux kernel level    A This chapter is not intended to teach you Linux  We assume you already have  commands     The config tool  Syntax   config    ahv      d id      g id      p path      r configurator   
333. r is configured  and individual serial port and  network host connections on the console server are configured for Nagios monitoring  If NSCA is   enabled  each selected check will be executed once over the period of the check interval  If NRPE is  enabled  then the upstream server will be able to request status updates under its own scheduling     10 4 Advanced Distributed Monitoring Configuration  10 4 1 Sample Nagios configuration    An example configuration for Nagios is listed below  It shows how to set up a remote Console server to  monitor a single host  with both network and serial connections  For each check it has two  configurations  one each for NRPE and NSCA  In practice  these would be combined into a single check  which used NSCA as a primary method  falling back to NRPE if a check was late    for details see the  Nagios documentation  http   www nagios org docs   on Service and Host Freshness Checks       Host definitions      Black Box console server    define host   use generic host  host_name Black Box  alias Console server  address 192 168 254 147        Managed Host   define host   use generic host  host_name server  alias server  address 192 168 254 227         NRPE daemon on gateway  define command      command_name check_nrpe_daemon  command_line SUSER1S check_nrpe  H 192 168 254 147  p 5666       define service      724 746 5500   blackbox com Page 188    service_description NRPE Daemon    host_name Black Box  use generic service  check_command check_
334. r of Black Box tools listed above that make it simple to configure the console server  and make sure the changes are stored in the console server s flash memory  etc  These commands are  covered in the previous chapters and include     e config which allows manipulation and querying of the system configuration from the command  line  With config a new configuration can be activated by running the relevant configurator   which performs the action necessary to make the configuration changes live     e portmanager which provides a buffered interface to each serial port  It is supported by the  pmchat and pmshell commands which ensure all serial port access is directed via the  portmanager     e pmpower is a configurable tool for manipulating remote power devices that are serially or  network connected to the console server     e SDT Connector is a java client applet that provides point and click SSH tunneled connections to  the console server and Managed Devices     724 746 5500   blackbox com Page 274    There are also a number of other CLI commands related to other open source tools embedded in the  console server including     e PowerMan provides power management for many preconfigured remote power controller   RPC  devices  For CLI details refer http   linux die net man 1 powerman    e Network UPS Tools  NUT  provides reliable monitoring of UPS and PDU hardware and ensure  safe shutdowns of the systems which are connected   with a goal to monitor every kind of UPS  and PDU  
335. r the dial   in configuration        724 746 5500   blackbox com Page 130    C  For earlier version Windows computers  follow the steps in Section B  above  To get to the Make  New Connection button     6 10 2    For Windows 2000  click Start  and select Settings  At the Dial Up Networking Folder  click  Network and Dial up Connections  and click Make New Connection  You may need to first set  up a connection over the COM port using Connect directly to another computer before  proceeding to Set up an advanced connection     For Windows 98  double click My Computer on the Desktop  then open Dial Up Networking  and double click     Set up SDT Serial Ports on console server    To set up RDP  and VNC  forwarding on the console server Serial Port that is connected to the Windows  computer COM port     Select the Serial  amp  Network  Serial Port menu option and click Edit  for the particular Serial Port  that is connected to the Windows computer COM port      On the SDT Settings menu  select SDT Mode  this will enable port forwarding and SSH tunneling   and enter a Username and User Password     SDT Settings  SDT Mode  Enable access over SSH to a host connected to this serial port  Username  The login name for PPP  The default is port01  User Password  The login secret for PPP  The default is port04  Confirm    Password  Re type the password for confirmation           Note    When you enable SDT  it will override all other Configuration protocols on that port           Note    If 
336. rd Network utility that listens on the discard port   dmesg   Print or control the kernel ring buffer   echo   Print the specified ARGs to stdout   erase Tool for erasing MTD partitions   eraseall Tool for erasing entire MTD partitions   false   Do nothing  unsuccessful   find Search for files          724 746 5500   blackbox com Page 271          flashw  flatfsd   ftp  gen keys  getopt    gettyd  grep    gunzip    gzip     hd  hostname    httpd  hwclock  inetd  inetd echo  init   ip  ipmitool  iptables  ip6tables  iptables   restore  iptables save  kill     In     login  loopback  loopback1  loopback2  loopback8 amp   loopback16  loopback48  Is     mail   mkdir    mkfs jffs2  mknod    more    mount    msmtp   mv     nc  netflash  netstat  ntpd       Write data to individual flash devices   Daemon to save RAM file systems back to FLASH  Internet file transfer program   SSH key generation program   Parses command options   Getty daemon   Print lines matching a pattern   Compress or expand files   Compress or expand files   ASCII  decimal  hexadecimal  octal dump   Get or set hostname or DNS domain name   Listen for incoming HTTP requests   Query and set hardware clock  RTC    Network super server daemon   Network echo utility   Process control initialization   Show or manipulate routing  devices  policy routing and tunnels  Linux IPMI manager   Administration tool for IPv4 packet filtering and NAT  Administration tool for IPv6 packet filtering    Restore IP Tables    Save IP T
337. rd parties  that the operation of the software products will be uninterrupted or error free  or that all  defects in the Software will be corrected     BLACK BOX DISCLAIMS ANY AND ALL OTHER WARRANTIES  WHETHER EXPRESS OR IMPLIED  INCLUDING  WITHOUT LIMITATION  ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR  PURPOSE  OTHER THAN AS STATED HEREIN  THE ENTIRE RISK AS TO SATISFACTORY QUALITY   PERFORMANCE  ACCURACY  AND EFFORT IS WITH YOU  ALSO  THERE IS NO WARRANTY AGAINST  INTERFERENCE WITH YOUR ENJOYMENT OF THE SOFTWARE OR AGAINST INFRINGEMENT  IF YOU HAVE  RECEIVED ANY WARRANTIES REGARDING THE DEVICE OR THE SOFTWARE  THOSE WARRANTIES DO  NOT ORIGINATE FROM  AND ARE NOT BINDING ON  BLACK BOX     NO LIABILITY FOR CERTAIN DAMAGES  EXCEPT AS PROHIBITED BY LAW  BLACK BOX SHALL HAVE NO  LIABILITY FOR COSTS  LOSS  DAMAGES OR LOST OPPORTUNITY OF ANY TYPE WHATSOEVER  INCLUDING  BUT NOT LIMITED TO  LOST OR ANTICIPATED PROFITS  LOSS OF USE  LOSS OF DATA  OR ANY  INCIDENTAL  EXEMPLARY SPECIAL OR CONSEQUENTIAL DAMAGES  WHETHER UNDER CONTRACT  TORT   WARRANTY OR OTHERWISE ARISING FROM OR IN CONNECTION WITH THIS EULA OR THE USE OR  PERFORMANCE OF THE SOFTWARE  IN NO EVENT SHALL BLACK BOX BE LIABLE FOR ANY AMOUNT IN  EXCESS OF THE LICENSE FEE PAID TO BLACK BOX UNDER THIS EULA  SOME STATES AND COUNTRIES  DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL  DAMAGES  SO THIS LIMITATION MAY NOT APPLY TO YOU     JSch License    SDT Connector
338. re the SSH gateway allows public key authentication  this is typically the default  behavior      gt  Ifyou do not already have a public private key pair for your client PC  the one running SDT  Connector   generate them now using ssh keygen  PuTTYgen or a similar tool  You may use RSA  or DSA  however  leave the passphrase field blank        PuTTYgen  http   www chiark greenend org uk  sgtatham putty download html    OpenSSH  http   www openssh org       OpenSSH  Windows   http   sshwindows sourceforge net download      gt  Upload the public part of your SSH key pair  this file is typically named id_rsa pub or id_dsa pub   to the SSH gateway  or otherwise add to  ssh authorized keys in your home directory on the SSH  gateway      gt  Next  add the private part of your SSH key pair  this file is typically named id_rsa or id_dsa  to  SDT Connector  Click Edit   gt  Preferences   gt  Private Keys   gt  Add  locate the private key file  and  click OK     You do not have to add the public part of your SSH key pair  the private key calculates it     SDT Connector will now use public key authentication when connecting through the SSH gateway   console server   You may have to restart SDT Connector to shut down any existing tunnels that were  established using password authentication     If you have a host behind the console server that you connect to by clicking the SSH button in SDT  Connector  you may also want to configure access to it for public key authentication as well  This
339. resents a list of serial ports and network Host connections that you have set up  with device type RPC  but have yet to connect to a specific RPC device        When you select Connect Via for a Network RPC connection  then the corresponding    Host Name Description that you set up for that connection will be entered as the Name  and Description for the power device       Or  if you select to Connect Via a Serial connection  enter a Name and Description for  the power device     724 746 5500   blackbox com Page 150     lt BLACK BO       A    NETWORK SERVICES    System Name 16A Firmware  2 8 0u2  Uptime  0 da 0m s Current User  root       Serial  amp  Network  Serial Port  Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    System  Administration  SSL Certificates  Configuration Backup  Firmware    Add RPC    Connected Via    RPC Type    Name    Description    Username    Password    Confirm    Serial  Pot 2 Pot2  v  Specify the serial port or network host address for the power device    None X    Specify the type of the connected power device    A descriptive name for the power device    A brief description for the power device    Specify the login name for the power device    Specify the login secret for the power device     gt  Select the appropriate RPC Type for the PDU  or IPMI  being connected       If you are
340. rial Port  Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    System  Administration   SSL Certificates  Configuration Backup  Firmware   IP   Date  amp  Time   Dial   Services   DHCP Server   Nagios   Configure Dashboard    Status   Port Access  Active Users  Statistics  Support Report  Syslog   UPS Status    Network Interface       Management LAN Interface General Settings    IP Settings  Network    Configuration  Method    IP Address    Subnet Mask    Gateway    Primary DNS    Secondary DNS    Media    Failover  Interface    Primary Probe  Address    Secondary Probe  Address      Apply    DHCP  Static  The mechanism to acquire IP settings  A statically assigned IP address  A statically assigned network mask  A statically assigned gateway  A statically assigned primary name server  A statically assigned secondary name server  Auto v    The Ethernet media type       Management LAN  lan  in  None C  Management LAN  lan    Serial DB9 Port  sercon  DISABLED   Internal Modem Port  modem01  DISABLED    The address of the first peer to probe for connectivity detection       onfigured and    The address of the second peer to probe for connectivity detection     gt  When configuring the principal network connection  specify Network 2  eth1  as the Failover  Interface to use when a fault is detected with Network 1  ethO 
341. rity verifies that you are the person who you claim you are  and signs and issues a SSL  certificate to you  To create and install a SSL certificate for the console server     724 746 5500   blackbox com Page 177     lt BLAC    6A Firmware  2 8 0u2  cs Current User  root       System Name   Uptime  0 days  19    NETWORK SERVICES       Serial  amp  Network  Serial Port   Users  amp  Groups  Authentication  Network Hosts  Trusted Networks  Cascaded Ports  UPS Connections  RPC Connections  Environmental  Managed Devices    Alerts  amp  Logging  Port Log  Alerts  SMTP  amp  SMS  SNMP    System  Administration   SSL Certificates  Configuration Backup  Firmware   IP   Date  amp  Time   Dial   Services   DHCP Server  Nagios   Configure Dashboard    Common name  The full canonical name for this device  Organizational unit  The group overseeing this device  Organization  The name of the organization to which the device belongs  Locality City  he City where the organization is located   State Province  he State or Province where the organization is located  Country AD    he country where the organization is located  Email    The email addre contact person for this device       Challenge Password    An optional  depe       dant on CA  password  Confirm Password   Confirmation of the challenge password  Key Length  bits  512      Length of generated key in bits    Status GenerateCSR_    Port Access                           gt  Select System  SSL Certificate and fill out the fields as ex
342. rom the  Serial and Network  Serial Port menu  configure the Common Settings of that port with the  RS 232 properties etc required by the PDU  refer to Chapter 4 1 1 Common Settings   Then  select RPC as the Device Type      gt  For each network connected RPC  go to Serial  amp  Network  Network Hosts menu and configure  the RPC as a connected Host by specifying it as Device Type  RPC and clicking Apply  refer to  Section 4 4  Network Hosts      724 746 5500   blackbox com Page 149    F e System Name  c Model  LES1216A Firmware  2 8 0u2  BLACK BOX Uptime  0 d hours  13 mins s Current User  root    NETWORK SERVICES          Serial  amp  Network  Serial Port IP Address DNS  Name  eee  ere The hosts IP Address or DNS name  Authentication  Network Hosts Host Name    Trusted Networks   Cascaded Ports   UPS Connections Description Notes  RPC Connections    A descriptive name to identify the host    A brief description of the host  Environmental  Managed Devices Permitted   22 tcp  ssh    0  Services   23 tcp  telnet    0  Alerts  amp  Logging   80 tcp  http    0  Port Log   443 tcp  https    0  Alerts   1494 tcp  ica    0  SMTP  amp  SMS 3389 tcp  rdp    0  SNMP 5900 tcp  vnc    0           Remove  System      TCP  Administration UDP Port  irene ae level 0   Disabled    Configuration Backup       Firmware  Add      Select the Serial  amp  Network  RPC Connections menu  This will display all the RPC connections  that have already been configured     Click Add RPC     Connected Via p
343. ronize the live system with the new configuration       config  a    14 23 NAGIOS  To configure NAGIOS with the following settings     NAGIOS host name console at R3  Name of this system   NAGIOS host address 192 168 0 1  IP to find this device at   NAGIOS server address 192 168 0 10  upstream NAGIOS server   Enable SDT for NAGIOS ext  Enabled   SDT gateway address 192 168 0 1  defaults to host address   Prefer NRPE over NSCA Disabled  defaults to Disabled       config  s config system nagios enabled on     config  s config system nagios name les1116     config  s config system nagios address 192 168 0 1     config  s config system nagios server address 192 168 0 10     config  s config system nagios sdt disabled on  diables SDT for nagios extensions     config  s config system nagios sdt address 192 168 0 1     config  s config system nagios nrpe prefer       To configure NRPE with following settings     NRPE port 5600  port to listen on for nrpe  Defualts to 5666   NRPE user user1  User to run as  Defaults to nrpe    NRPE group group1  Group to run as  Defaults to nobody   Allow command arguments Enabled      config  s config system nagios nrpe enabled on     config  s config system nagios nrpe port 5600     config  s config system nagios user user1     config  s config system nagios nrpe group group1    config  s config system nagios nrpe cmdargs on    To configure NSCA with the following settings     NSCA encryption BLOWFISH  can be    None   XOR   DES   TRPLEDES   CAST 2
344. rt               amp  OK     X Cancel J                                              Also some clients are launched in a command line or terminal window  The Telnet client is an example  of this so the    Path to client executable file    is telnet and the    Command line format for client  executable    is cmd  c start  path   host   port       724 746 5500   blackbox com Page 112             F   SDTConnector             G   SDTConnector Preferences             R Edit Client          Client name   Telnet client   Path to client executable file   telnet   Command line format for client executable    cmd  c start  path   host   port            0K   3  Cancel                   Close                             gt  Click OK     6 2 8 Dial in configuration    If the client PC is dialing into Local Console port on the console server  you will need to set up a dial in  PPP link      gt  Configure the console server for dial in access  following the steps in the Configuring for Dial In  PPP Access section in Chapter 5  Configuring Dial In Access       gt  Set up the PPP client software at the remote User PC  following the Set up the remote Client  section in Chapter 5      Once you have a dial in PPP connection established  you then can set up the secure SSH tunnel from the  remote Client PC to the console server     6 3 SDT Connector to Management Console    You can also configure SDT Connector for browser access to the console server   s Management Console     and for Telnet or SS
345. rt  you can put stty commands in   etc config scripts portXX init which gets run whenever portmanager opens the port     Otherwise  any setup you do with stty will get lost when the portmanager opens the port   The reason  that portmanager sets things back to its config rather than using whatever is on the port  is so the port is  in a known good state  and will work  no matter what things are done to the serial port outside of  portmanager      15 3 2 Accessing the console modem port   The console dial in is handled by mgetty  with automatic PPP login extensions  mgetty is a smart getty   replacement  designed to be used with Hayes compatible data and data fax modems  mgetty knows   about modem initialization  manual modem answering  your modem doesn   t answer if the machine   isn   t ready   UUCP locking  you can use the same device for dial in and dial out   mgetty provides very   extensive logging facilities  All standard mgetty options are supported    Modem initialization strings      To override the standard modem initialization string either use the Management Console  refer  Chapter 5  or the command line config tool  refer to Dial In Configuration Chapter 14      Enabling Boot Messages on the Console       Ifyou are not using a modem on the DB9 console port and instead want to connect to it directly via  a Null Modem cable  enable verbose mode  which allows you to see the standard linux start up  messages  Follow these commands        bin config   set config consol
346. rt controls that Users can access    14 Basic Configuration Command line installation and configuration using the config command    15  Advanced Config More advanced command line configuration activities where you will    need to use Linux commands     The latest update of this manual can be found online at www blackbox com    Types of users  The console server supports two classes of users     First  there are the administrative users who will be authorized to configure and control the console  server  and to access and control all the connected devices  These administrative users will be set up  as members of the admin user group and any user in this class is referred to generically in this  manual as the Administrator  An Administrator can access and control the console server using the  config utility  the Linux command line  or the browser based Management Console  By default  the  Administrator has access to all services and ports to control all the serial connected devices and  network connected devices  hosts      The second class of users are those who have been set up by the Administrator with specific limits of  their access and control authority  These users are set up as members of the users user group  or  some other user groups the Administrator may have added   They are only authorized to perform  specified controls on specific connected devices and are referred to as Users  These Users  when  authorized  can access serial or network connected devices  and con
347. rt of the    UPS Admin    and     Router Admin    groups  On the console server  these users will be required to have access to a group     Router_Admin     with access to port 1  connected to the router   and another group    UPS Admin     with  access to port 2  connected to the UPS   Once LDAP is setup  users that are members of each group will  have the appropriate permissions to access the router and UPS     Currently  the only LDAP directory service that supports group provisioning is Microsoft Active Directory   Support is planned for OpenLDAP at a later time     To enable group information to be used with an LDAP server    gt  Complete the fields for standard LDAP authentication including LDAP Server Address  Server  Password  LDAP Base DN  LDAP Bind DN and LDAP User Name Attribute     gt  Enter memberOf for LDAP Group Membership Attribute as group membership is currently only  supported on Active Directory servers     gt  If required  enter the group information for LDAP Console Server Group DN and or LDAP  Administration Group DN    A user must be a member of the LDAP Console Server Group DN group in order to gain access to the    console and user interface  For example  the user must be a member of    MyGroup    on the Active Server  to gain access to the console server     Additionally  a user must be a member of the LDAP Administration Group DN in order to gain  administrator access to the console server  For example  the user must be a member of    AdminGroup   
348. rvers  the keys can be simply uploaded through the web interface  on the  System  Administration page  This enables you to upload stored RSA or DSA Public Key pairs to the  Master and apply the Authorized key to the slave and is described in Chapter 4  Once complete  you  then proceed to Fingerprinting as described below     724 746 5500   blackbox com Page 252    System       Administration      SSL Certificates      Configuration Backup     Firmware      IP      Date  amp  Time      Dial SSH DSA Public Key     Firewall      Nagios      Configure Dashboard    SSH RSA Public Key    SSH RSA Private Key    SSH DSA Private Key    Status E      Port Access SSH Authorized Keys     Active Users      Statistics      Support Report      Syslog Generate SSH keys     UPS Status automatically      RPC Status      Environmental Status   Apply       Dashboard    Choose File   No file chosen  Upload a replacement RSA public key file    Choose File   No file chosen  Upload a replacement RSA private key file    Choose File   No file chosen  Upload a replacement DSA public key file    Choose File   No file chosen  Upload a replacement DSA private key file          Choose File   No file chosen  Upload a replacement authorized keys file    Generate SSH keys locally    15 6 4 Installing SSH Public Key Authentication  Linux     Alternately  the public key can be installed on the unit remotely from the linux host with the scp utility    as follows     Assuming the user on the Management Console is
349. rvers also  support attaching an external USB CDMA cellular modem from Sierra Wireless to one of its USB 2 0  ports  Both will connect to the Verizon network in North America     After creating an account with the CDMA carrier some carriers require an additional step to provision the  Internal Cellular Modem  referred to as Provisioning  Your console server supports     Over the Air Service Provisioning  OTASP  where modem specific parameters can be retrieved  via a voice call to a special phone number  and    a manual process where the phone number and other parameters can be entered manually  OTASP Activation     Before activating over the air  you will need to establish a data plan then register the device for  activation      gt  Contact your carrier and provide them with your ESN  Electronic Serial Number  which can be  found on the white label on the underside of the console server      gt  Select Internal Cellular Modem panel on the System  Dial menu      gt  A particular phone number will need to be dialed to complete OTASP e g  Verizon uses  22899   Telus uses  22886      gt  Click Activate to initiate the OTASP call  The process is successful if no errors are displayed and  you no longer see the CDMA Modem Activation form    If OTASP is unsuccessful you can consult  the System Logs for clues to what went wrong at Status  Syslog       gt  When OTASP has completed successfully you can proceed to enabling the Internal Cellular  Modem by entering the carriers phone numb
350. rvers using the SDT for Nagios Configuration  Wizard     724 746 5500   blackbox com Page 181    Distributed console servers      Black Box console servers   E Serial and network hosts are attached to each console server     Each runs Nagios plug ins  NRPE  and NSCA add ons  but not a full Nagios server     Clients      Typically a client PC  laptop  etc   running Windows  Linux  or Mac OS X      Runs SDT Connector client software 1 5 0 or later    a Possibly remote to the central Nagios server or distributed console servers  i e  a road warrior       May receive alert emails from the central Nagios server or distributed console servers     E Connects to the central Nagios server web UI to view status of monitored hosts and serial devices       Uses SDT Connector to connect through the console servers to manage monitored hosts and serial  devices     SDT Nagios setup involves the following steps     i  Install Nagios and the NSCA and NRPE add ons on the central Nagios server  Section 10 2 1   Set  up central Nagios server      ii  Configure each Black Box distributed console server for Nagios monitoring  alerting  and SDT  Nagios integration  Section 10 2 2    Set up distributed Black Box servers      iii  Run the SDT for Nagios Configuration Wizard on the central Nagios server  Section 10 2 3    Set  up SDT Nagios on central Nagios server  and perform any additional configuration tasks     iv  Install SDT Connector on each client  Section 10 2 4   Set up clients      10 2 1 
351. ry rights notices appearing on the electronic documentation  Black Box reserves all rights not expressly  granted herein     INTELLECTUAL PROPERTY RIGHTS  The Software is protected by copyright laws  international copyright treaties   and other intellectual property laws and treaties  Black Box and its suppliers retain all ownership of  and intellectual  property rights in  including copyright   the Software components and all copies thereof  provided however  that  1   certain components of the Software  including SDT Connector  are components licensed under the GNU General  Public License Version 2  which Black Box supports  and  2  the SDT Connector includes code from JSch  a pure  Java implementation of SSH2 which is licensed under BSD style license  Copies of these licenses are detailed below  and Black Box will provide source code for any of the components of the Software licensed under the GNU General  Public License upon request     EXPORT RESTRICTIONS  You agree that you will not export or re export the Software  any part thereof  or any  process or service that is the direct product of the Software in violation of any applicable laws or regulations of the  United States or the country in which you obtained them     U S  GOVERNMENT RESTRICTED RIGHTS  The Software and related documentation are provided with Restricted  Rights  Use  duplication  or disclosure by the Government is subject to restrictions set forth in subparagraph  c   1    ii  of the Rights in Technical
352. s  Configuration Backup  Firmware   IP   Date  amp  Time   Dial   Services   DHCP Server       Summary comms room    EMD  Engineering    Temperature Graph             40    36             26 48 26 45  MW Temperature W Humidity    EMD  Engineering    Log    Time Temperature Humidity Alarm  1 Alarm  2 Alert Status  Fri Jan 16 20 37 05 24 51 Open  0  Open  0  Normal  2009  Fri Jan 16 20 38 05 24 47 Open  0  Open  0  Normal    2009    724 746 5500   blackbox com Page 165    Chapter 9 Authentication    Introduction    The console server is a dedicated Linux computer with a myriad of popular and proven Linux software  modules for networking  secure access  OpenSSH   and communications  OpenSSL   and sophisticated  user authentication  PAM  RADIUS  TACACS  and LDAP        This chapter details how the Administrator can use the Management Console to establish  remote AAA authentication for all connections to the console server and attached serial and  network host devices       This chapter also covers how to establish a secure link to the Management Console using HTTPS  and using OpenSSL and OpenSSH to establish a secure Administration connection to the console  server     9 1 Authentication Configuration    Authentication can be performed locally  or remotely using an LDAP  Radius  or TACACS  authentication  server  The default authentication method for the console server is Local     A Firmware  3 5 3u5    J 7 ns  4    x BLACK BOX   s  13 S  Current User  root    NETWORK SERVICES  
353. s  contact Black Box Tech Support at 724 746 5500  or go to blackbox com and click on    Talk to Black Box       You ll be live with one of our technical experts in less than 30 seconds        724 746 5500   blackbox com Page 3    Value Line and Advanced Console Servers Manual    Federal Communications Commission and Industry Canada Radio Frequency Interference  Statements    This equipment generates  uses  and can radiate radio frequency energy  and if not installed and used properly  that is  in strict  accordance with the manufacturer s instructions  may cause interference to radio communication  It has been tested and found to  comply with the limits for a Class A computing device in accordance with the specifications in Subpart B of Part 15 of FCC rules   which are designed to provide reasonable protection against such interference when the equipment is operated in a commercial  environment  Operation of this equipment in a residential area is likely to cause interference  in which case the user at his own  expense will be required to take whatever measures may be necessary to correct the interference     Changes or modifications not expressly approved by the party responsible for compliance could void the user   s authority to  operate the equipment     This digital apparatus does not exceed the Class A limits for radio noise emission from digital apparatus set out in the Radio  Interference Regulation of Industry Canada     Le pr  sent appareil num  rique n   met pas d
354. s logs you on to the console server    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A   LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console servers have a second network port  that you can configure as a management LAN port or as a failover  OOB access port     724 746 5500   blackbox com    Page 38    3 6 1 Enable the Management LAN    The LES1508A  LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A   LES1208A R2  LES1216A R2  LES1232A and LES1248A R2 console servers provide a firewall  router  and  DHCP server  You need to connect an external LAN switch to Network 2 to attach hosts to this  management LAN     Gateway to the  Management LAN    NETWORK 1 NETWORK 2           Operations              network  a Management  Serially network  connected  consoles  l  5    This Management LAN feature is disabled by default  To configure the Management LAN gateway    gt  Select the Management LAN page on the System  IP menu and uncheck Disable      gt  Configure the IP Address and Subnet Mask for the Management LAN  but leave the DNS fields  blank       gt  Click Apply     System Name  les rmware  3 5 3u5    SBLACK BOX Uptime  0 days  s 5 urrent User  root    NETWORK SERVICES       Serial  amp  Network      Network Interface Management LAN General Settings Route Settings     Serial Port    Interface    Disable E  Deactivate this network interface     IP Settings  Management LAN    Configuration    DHCP  
355. s man snmpd conf html  FAQ  http   www net snmp org docs FAQ html  Net SNMPD Tutorial  http   www net snmp org tutorial tutorial 5 demon snmpd html    15 5 2 Adding more than one SNMP server    To add more than one SNMP server for alert traps add the first SNMP server using the Management  Console  refer Chapter 7  or the command line config tool  Secondary and any further SNMP servers are  added manually using config     Log in to the console server   s command line shell as root or an admin user  Refer back to the  Management Console UI or user documentation for descriptions of each field     To set the Manager Protocol field   config   set config system snmp protocol2 UDP or  config   set config system snmp protocol2 TCP    To set the Manager Address field   config   set config system snmp address2 w x y Z     replacing w x y z with the IP address or DNS name     To set the Manager Trap Port field  config   set config system snmp trapport2 162     replacing 162 with the TCP UDP port number    To set the Version field  config   set config system snmp version2 1 or  config   set config system snmp version2 2c or  config   set config system snmp version2 3    To set the Community field  SNMP version 1 and 2c only   config   set config system snmp community2 yourcommunityname     replacing yourcommunityname with the community name    To set the Engine ID field  SNMP version 3 only   config   set config system snmp engineid2 800000020109840301     replacing 800000020109840301 w
356. s script can only take one host IPaddress per    instance  Multiple independent commands can be sent to the script  The commands will be    run one after the other        PINGREP is the entire reply from the ping command    LOSS is the percentage loss from the ping command     1 must be the hostname IPaddress of device to ping     2    must be the commands to run when the pings fail   COUNTER 0  TARGET  S1   shift    loop indefinitely   while true  do    ping the device 10 times  PINGREP    ping  c 10  i 1  STARGET      get the packet loss percentage  LOSS    echo  SPINGREP    grep       sed  e  s       0 9          1    if    SLOSS   eq  100       then  COUNTER     expr SCOUNTER   1    else  COUNTER 0  sleep 30s  fi  if   SCOUNTER   eq 5    then  COUNTER 0   S  n   sleep 2s  fi    done    724 746 5500   blackbox com Page 242    15 1 7 Running custom scripts when a configurator is invoked    A configurator is responsible for reading the values in  etc config config xml and making the  appropriate changes live  Some changes made by the configurators are part of the Linux configuration  itself  such as user passwords or ipconfig     Currently there are nineteen configurators  Each one is responsible for a specific group of config  for  example  the    users    configurator makes the user configurations in the config xmI file live   To see all the  available configurators type the following from a command line prompt       config    When a change is made using the Management Con
357. s to console server  and serially or network attached devices        RADIUS The Remote Authentication Dial In User Service  RADIUS  protocol was developed by  Livingston Enterprises as an access server authentication and accounting protocol  The RADIUS  server can support a variety of methods to authenticate a user  When it is provided with the  username and original password given by the user  it can support PPP  PAP  or CHAP  UNIX  login  and other authentication mechanisms  You can find further information on configuring  remote RADIUS servers at the following sites     http  Awww  microsoft com technet prodtechnol windowsserver2003 library DepkKit d4fe8248 eecd   49e4 88f6 9e304f97fefc mspx    http   www cisco com en US tech tk59 technologies_tech_note09186a00800945cc shtml  http   www  freeradius org        9 1 4 LDAP authentication    Perform the following procedure to configure the LDAP authentication method to use whenever the  console server or any of its serial ports or hosts is accessed      gt  Select Serial and Network  Authentication and check LDAP or LocalLDAP or LDAPLocal or  LDAPDownLocal    724 746 5500   blackbox com Page 169    LDAP    Server Address    LDAP Base DN    LDAP Bind DN    Bind DN Password    Confirm Password    LDAP Username  Attribute    LDAP Group  Membership  Attribute    LDAP Console Server  Group DN    LDAP Basic  Management Group  DN    m    Comma separated list of servers    The distinguished name of the search base  For example  dc my 
358. sktop VNC HTTP X connection to the console server      gt  Open Network Connections in Control Panel and click the New Connection Wizard     New Connection Wizard    i Network Connection Type  What do you want to do        Connect to the Intemet  Connect to the Intemet so you can browse the Web and read email        Connect to the network at my workplace  Connect to a business network  using dial up or VPN  so you can work from home   a field office  or another location       Set up a home or small office network  Connect to an existing home or small office network or set up a new one        Set up an advanced connection    Connect directly to another computer using your serial  parallel  or infrared port  or  set up this computer so that other computers can connect to it         gt  Select Set up an advanced connection and click Next      gt  Onthe Advanced Connection Options screen  select Accept Incoming Connections and click  Next      gt  Select the Connection Device  i e  the serial COM port on the Windows computer that you  cabled through to the console server   By default  select COM1  The COM port on the Windows  computer should be configured to its maximum baud rate  Click Next      gt  Onthe Incoming VPN Connection Options screen  select Do not allow virtual private  connections and click Next     724 746 5500   blackbox com Page 128    New Connection Wizard    User Permissions    You can specify the users who can connect to this computer     Select the check box n
359. sole web GUI  the appropriate configurator  automatically runs  This can be a problem if another Administrator makes a change using the  Management Console  The configurator could possibly overwrite any custom CLI linux configurations  you may have set     The solution is to create a custom script that runs after each configurator runs  After each configurator  runs  it will check whether that appropriate custom script exists  You can then add any commands to the  custom script and they will be invoked after the configurator runs     The custom scripts must be in the correct location    etc config scripts config post   To create an alerts custom script       cd  etc config scripts    touch config post alerts    vi config post alerts    You could use this script to recover a specific backup config or overwrite a config or make copies of  config files  etc     15 1 8 Backing up the configuration and restoring using a local USB stick    The  etc scripts backup usb script is written to save and load custom configuration using a USB flash  disk  Before saving configuration locally  you must prepare the USB storage device for use  To do this   disconnect all USB storage devices except for the storage device you want to use     Usage   etc scripts backup usb COMMAND  FILE   COMMAND     check magic    check volume label   set magic    set volume label   save  FILE     save configuration to USB   delete  FILE     delete a configuration tarbal from USB  list    list available config ba
360. ster   s Management Console provides a consolidated view of the settings for its own and all the  Slave   s serial ports  The Master does not provide a fully consolidated view  For example  if you want to  find out who s logged in to cascaded serial ports from the master  you ll see that Status  Active Users  only displays those users active on the Master   s ports  so you may need to write custom scripts to  provide this view  This is covered in Chapter 11     4 7 Serial Port Redirection    To allow an application on a client PC to access the virtual serial ports on the console server  you need to  run client software  to redirect the local serial port traffic to remote console server serial port      There   s a selection of commercial software available including Serial to Ethernet from Eltima   www eltima com  and Serial IP    COM Port Redirector from Tactical Software   www tacticalsoftware com products serialip htm      724 746 5500   blackbox com Page 66    Serial Device  Applications         Remote    Serial Device Retail Data    Systems    ae  Building  TERNE  B         _   _  Automation  Pi   Systems  Serial IP Redirector   A  Virtual COM Ports y Controllers  jm Sensors    This serial port redirector software is loaded in your desktop PC  and it allows you to use a serial device  that   s connected to the remote console server as if it were connected to your local serial port     4 8    Managed Devices    Managed Devices presents a consolidated view of all the conne
361. sts  These users can also be given full Administrator status  with full configuration and management  and access privileges      To simplify user set up  they can be configured as members of Groups  There are six Groups set up by  default  admin and user      admin Provides users with unlimited configuration and management privileges    pptpd Group to allow access to the PPTP VPN server  Users in this group will have    their password stored in clear text     dialin Group to allow dialin access via modems  Users in this group will have their    password stored in clear text     fip Group to allow ftp access and file access to storage devices  pmshell Group to set default shell to pmshell  users Provides users with basic management privileges       Note     l    Members of the admin group have full Administrator privileges  The admin user   Administrator  can access the console server using any of the services that are enabled in  System  Services  For example  if only HTTPS has been enabled  then the Administrator can  only access the console server using HTTPS  Once logged in  they can reconfigure the  console server settings  for example  to enabled HTTP Telnet for future access   They can  also access any of the connected Hosts or serial port devices using any of the services that  have been enabled for these connections  The Administrator can reconfigure the access  services for any Host or serial port  Only trusted users should have Administrator access     Membership of
362. sts host4 tcpports tcpport1 22     config  s config sdt hosts host4 tcpports tcpport1 loglevel 1     config  s config sdt hosts host4 udpports tcppport2 443     config  s config sdt hosts host4 udpports tcpport2 loglevel 1    724 746 5500   blackbox com Page 222    If you want to add the new host as a managed device  make sure you use the current total number of  managed devices   1  for the new device number     To get the current number of managed devices     config  g config devices total    Assuming we already have one managed device  our new device will be device 2  Issue the following  commands       config  s config  devices device2 connections connection1 name 192 168 3 10    config  s config  devices device2 connections connection1 type Host     config  s config  devices device2 name 0fficePC     config  s config  devices device2 description MyPC     config  s config devices total 2    The following command will synchronize the live system with the new configuration       config  hosts    14 7 Trusted Networks    You can further restrict remote access to serial ports based on the source IP address  To configure this  via the command line  you need to do the following     Determine the total number of existing trusted network rules  If you have no existing rules  you can  assume this is O       config  g config portaccess total  This command should display config portaccess total 1  Note that if you see config portaccess total this means you have 0 rules configured   
363. t  Enter the Host Name and the Nagios Host Address  for example  IP address  that the central  Nagios server will use to contact the distributed Black Box console server      gt  Enter the IP address that the distributed Black Box console server will use to contact the central  Nagios server in Nagios Server Address      gt  Enter the IP address that the clients running SDT Connector will use to connect through the  distributed Black Box servers in SDT Gateway address      gt  Check Prefer NRPE  NRPE Enabled  and NRPE Command Arguments      gt  Check NSCA Enabled  choose an NSCA Encryption Method and enter and confirm an NSCA  Secret  Remember these details because you will need them later on  For NSCA Interval  enter   5     gt  Click Apply     Next  you must configure the attached Window network host and specify the services you will be  checking with Nagios  HTTP and HTTPS       gt  Select Network Hosts from the Serial  amp  Network menu and click Add Host      gt  Enter the IP Address DNS Name of the network server  for example  192 168 1 10 and enter a  Description  for example  Windows 2003 IIS Server     724 746 5500   blackbox com Page 183     gt     VV VV Y     gt     Remove all Permitted Services  This server will be accessible using Terminal Services  so check  TCP  Port 3389 and log level 1 and click Add  Remove and re add the service to enable logging        Statistics Nagios Settings  Support Report  Syslog Enable Nagios y   UPS Status Switch Nagios on for this 
364. t command gt     ipmitool   c  h  v  V   I Jan  H  lt hostname gt     p  lt port gt      U  lt username gt      A  lt authtype gt      L  lt privivi gt      a  E  P  f  lt password gt      o  lt oemtype gt      lt command gt     ipmitool   c  h  v  V   I Janplus  H  lt hostname gt     p  lt port gt      U  lt username gt      L  lt privivi gt      a  E  P  f  lt password gt      o  lt oemtype gt       C  lt ciphersuite gt     lt command gt     DESCRIPTION    This program lets you manage Intelligent Platform Management Interface  IPMI  functions of either the  local system  via a kernel device driver  or a remote system  using IPMI V1 5 and IPMI v2 0  These  functions include printing FRU information  LAN configuration  sensor readings  and remote chassis  power control     IPMI management of a local system interface requires a compatible IPMI kernel driver to be installed  and configured  On Linux  this driver is called Open PMI and it is included in standard distributions  On  Solaris  this driver is called BMC and is inclued in Solaris 10  Management of a remote station requires  the IPMl over LAN interface to be enabled and configured  Depending on the particular requirements of  each system  it may be possible to enable the LAN interface using ipmitool over the system interface     OPTIONS     a Prompt for the remote server password     724 746 5500   blackbox com Page 266     A  lt authtype gt   Specify an authentication type to use during IPMIv1 5  an session activation
365. t must request it again     gt  Click Apply    The DHCP server will sequentially issue IP addresses from a specified address pool s     gt  Click Add in the Dynamic Address Allocation Pools field   gt  Enter the DHCP Pool Start Address and End Address and click Apply  The DHCP server also supports pre assigning IP addresses to be allocated only to specific MAC addresses    and reserving IP addresses to be used by connected hosts with fixed IP addresses  To reserve an IP  addresses for a particular host     Once applied  devices on the internal network will be able to access resources on the external network        Note The DHCP server feature is available only on the LES1508A  LES1408A  LES1416A  LES1432A   LES1448A  LES1308A  LES1316A  LES1332A  LES1348A  LES1208A R2  LES1216A R2   LES1232A and LES1248A R2 console servers  It is not supported on LES1108A  LES1116A   LES1132A and LES1148A console servers        5 8 3 Port forwarding    When using IP Masquerading  devices on the external network cannot initiate connections to devices on  the internal network     To work around this  Port Forwards can be set up to allow external users to connect to a specific port   or range of ports on the external interface of the console server cellular router   and have the console  server cellular router redirect the data to a specified internal address and port range  To setup a port   forward      gt  Navigate to the System  Firewall page  and click on the Port Forwarding tab   gt  Click
366. t on the console server via a  special EMD Adapter and standard CAT5 cable  The EMD is powered over this serial connection  and communicates using a custom handshake protocol  It is not an RS 232 device and should not  be connected without the adapter      gt  Plug the male RJ plug on the EMD Adapter into EMD and   ea then connect it to the console server serial port using the  provided UTP cable  If the 6 foot  2 meter  UTP cable   provided with the EMD is not long enough  you can    replace it with a standard CAT5 UTP cable up to 33 feet   10 meters  long      gt  Screw the bare wires on any smoke detector  water  detector  vibration sensor  open door sensor  or general  purpose open close status sensors into the terminals on       the EMD     724 746 5500   blackbox com Page 163       Note  You can attach two external sensors onto the terminals on EMDs that are connected to LES1108A   LES1116A  LES1132 and LES1148A console servers  LES1508A  LES1408A  LES1416A   LES1432A  LES1448A  LES1308A  LES1316A  LES1332A  LES1348A  LES1208A R2  LES1216A   R2  LES1232 and LES1248A R2 console servers only support attaching a single sensor to each    EMD        You can only use the EMD with a Black Box console server  you cannot connect it to standard    RS 232 serial ports on other appliances      gt     Select Environmental as the Device Type in the Serial  amp  Network  Serial Port menu for the port    to which the EMD will be attached  No particular Common Settings are required     
367. t pem     724 746 5500   blackbox com Page 261    15 8 3 Installing the key and certificate    We recommend that you use an SCP  Secure Copying Protocol  client to copy files securely to the  console server unit  The scp utility is distributed with OpenSSH for most Unix distributions  while  Windows users can use something like the PSCP command line utility available with PuTTY     You can install remotely the files created in the steps above with the scp utility as follows     scp ssl_key pem root  lt address of unit gt   etc config   scp ssl_cert pem root  lt address of unit gt   etc config     or using PSCP     pscp  scp ssl_key pem root  lt address of unit gt   etc config   pscp  scp ssl_cert pem root  lt address of unit gt   etc config     PuTTY and the PSCP utility can be downloaded from   http   www chiark greenend org uk  sgtatham putty download  html    More detailed documentation on the PSCP can be found   http   the earth li  sgtatham putty 0 58 htmlidoc Chapter5 html pscp    15 8 4 Launching the HTTPS Server    Note that the easiest way to enable the HTTPS server is from the web Management Console  Simply click  the appropriate checkbox in Network   gt  Services   gt  HTTPS Server and the HTTPS server will be activated   assuming the ss _key pem  amp  ss _cert pem files exist in the  etc config directory      Alternatively inetd can be configured to launch the secure fnord server from the command line of the  unit as follows     Edit the inetd configuration file  
368. t want to use out of band dial in access  note that the procedure for enabling start up  messages on the console port is covered in Chapter 15   Accessing the Console Port   The following command will synchronize the live system with the new configuration       config  a    14 21 DHCP server    To enable the DHCP server on the console management LAN  with settings     Default lease time 200000 seconds  Maximum lease time 300000 seconds    724 746 5500   blackbox com Page 233    DNS server1 192 168 2 3    DNS server2 192 168 2 4  Domain name company com  Default gateway 192 168 0 1   IP pool 1 start address 192 168 0 20  IP pool 1 end address 192 168 0 100  Reserved IP address 192 168 0 50  MAC to reserve IP for 00 1e 67 82 72 d9  Name to identify this host John PC    Issue the commands       config  s config interfaces lan dhcpd enabled on     config  s config interfaces lan dhcpd defaultlease 200000     config  s config interfaces lan dhcpd maxlease 300000     config  s config interfaces lan dhcpd dns1 192 168 2 3     config  s config interfaces lan dhcpd dns2 192 168 2 4     config  s config interfaces lan dhcpd domain company com     config  s config interfaces lan dhcpd gateway 192 168 0 1     config  s config interfaces lan dhcpd pools pool1 start 192 168 0 20     config  s config interfaces lan dhcpd pools pool1 end 192 168 0 100     config  s config interfaces lan dhcpd pools total 1     config  s config interfaces lan dhcpd staticips staticip1 ip 192 168 0 50    confi
369. tgoing mail Server SMS gateway    724 746 5500   blackbox com    Page 143    Select a Secure Connection  if applicable  and specify the SMTP port to be used  if other than  the default port 25     You may also enter a Sender email address which will appear as the    from    address in all email  notifications sent from this console server  Some SMS gateway service providers only forward  email to SMS when the email has been received from authorized senders  So you may need to  assign a specific authorized email address for the console server    You may also enter a Username and Password as some SMS gateway service providers use  SMTP servers which require authentication    Similarly you can specify the specific Subject Line that will be sent with the email  Generally the  email subject will contain a truncated version of the alert notification message  which is  contained in full in the body of the email      Nagios  Configure Dashboard SMTP SMS Server  Server   Status   Port Access   Active Users Secure N  Statistics Connection   Support Report   Syslog SSL   UPS Status   RPC Status If this server uses a secure connection  specify its type    The outgoing          one  TLS    Environmental Status  Dashboard    Sender    The from    address which will appear on the sent email  Manage Username  Devices  Port Logs Ifthis server requires authentication  specify the username  Host Logs Password  Power  Terminal If this server requires authentication  specify the password  Confirm
370. the individual power outlet  This will take you to the Manage   Power screen     Uninterruptible Power Supply Control  UPS     You can configure all Black Box console servers to manage locally and remotely connected UPS hardware  using Network UPS Tools     Network UPS Tools  NUT  is a group of open source programs that provide a common interface for  monitoring and administering UPS hardware  These programs ensure safe shutdowns of the systems  that are connected  NUT is built on a networked model with a layered scheme of drivers  server  and  clients  covered in some detail in Chapter 8 2 6      724 746 5500   blackbox com Page 153    Multiple local  serial USB  networked  UPSes       MANAGED UPS   N    Multiple ae  remote UPSes         REMOTE UPS    8 2 1 Managed UPS connections    A Managed UPS is a UPS that is directly connected as a Managed Device to the console server  You can  connect it via serial or USB cable or by the network  The console server becomes the master of this UPS   and runs a upsd server to allow other computers that are drawing power through the UPS  slaves  to  monitor the UPS status and take appropriate action  such as shutdown when the UPS battery is low     Serial  USB  or network  connections    Managed  UPS       The console server may or may not be drawing power itself through the Managed UPS  When the UPS   s    battery power reaches critical  the console server signals and waits for slaves to shut down  then powers  off the UPS     Serial and
371. the name of the device as it will appear on the upstream Nagios  server     Click New Check to add a specific check which will be run on this host     Select Check Permitted TCP UDP to monitor a service that you have previously added as a  Permitted Service     Select Check TCP UDP to specify a service port that you want to monitor  without allowing  external  SDT Connector  access     Select Check TCP to monitor     The Nagios Check nominated as the check host alive check is the check used to determine  whether the network host itself is up or down     Typically this will be Check Ping   although in some cases the host will be configured not to  respond to pings     If no check host alive check is selected  the host will always be assumed to be up   You may deselect check host alive by clicking Clear check host alive   If required  customize the selected Nagios Checks to use custom arguments     Click Apply     724 746 5500   blackbox com Page 187    10 3 6 Configure the upstream Nagios monitoring host  Refer to the Nagios documentation  http   www nagios org docs   for configuring the upstream server      gt  The section entitled Distributed Monitoring steps through what you need to do to configure  NSCA on the upstream server  under Central Server Configuration       gt  NRPE Documentation was recently added that steps through configuring NRPE on the upstream  server http   nagios sourceforge net docs nrpe NRPE pdf     At this stage  Nagios at the upstream monitoring serve
372. the outlet and port in the outlet and port environment variables respectively     The script can be anything that can be executed within the shell   All of the existing scripts in  etc powerstrips xml use the pmchat utility     pmchat works just like the standard unix  chat  program  only it ensures interoperation with the port  manager     The final options  speed  charsize  stop and parity define the recommended or default settings for the  attached device     724 746 5500   blackbox com Page 265    15 10 IPMItool    The console server includes the ipmitoo  utility for managing and configuring devices that support the  Intelligent Platform Management Interface  IPMI  version 1 5 and version 2 0 specifications     IPMI is an open standard for monitoring  logging  recovery  inventory  and control of hardware that is  implemented independent of the main CPU  BIOS  and OS  The service processor  or Baseboard  Management Controller  BMC  is the brain behind platform management and its primary purpose is to  handle the autonomous sensor monitoring and event logging features     The ipmitool program provides a simple command line interface to this BMC  It features the ability to  read the sensor data repository  SDR  and print sensor values  display the contents of the System Event  Log  SEL   print Field Replaceable Unit  FRU  inventory information  read and set LAN configuration  parameters  and perform remote chassis power control     SYNOPSIS  ipmitool   c  h  v  V   I open  l
373. ther group called  Group8  access to the same host       config  s config sdt hosts host5 groups group2 Group8    config  s config sdt hosts host5 groups total 2  total number of users having access to host     To delete the group called Group7  use the following command       rmuser Group7    724 746 5500   blackbox com Page 220    Attention  The rmuser script is a generic script to remove any config element from config xml correctly   However  any dependencies or references to this group will not be affected  Only the group details are  deleted  The Administrator is responsible for going through config xm l and removing group  dependencies and references manually  specifically if the group had access to a host or RPC device     The following command will synchronize the live system with the new configuration       config  a    14 5 Authentication  To change the type of authentication for the console server     config  s config auth type  authtype        authtype  can be   Local  LocalTACACS  TACACS  TACACSLocal  TACACSDownLocal  LocalRADIUS  RADIUS  RADIUSLocal  RADIUSDownLocal  LocalLDAP  LDAP  LDAPLocal  LDAPDownLocal    To configure TACACS authentication       config  s config auth tacacs auth_server  comma separated list     list of remote authentiction  and authorization servers       config  s config auth tacacs acct_server  comma separated list   list of remote accounting  servers  If unset  Authentication and Authorization Server Address will be used       config  s
374. tication IP Settings  Network     Network Hosts      Trusted Networks     Call Home Sta     Cascaded Ports The mechani     UPS Connections      RPC Connections IP Address     Environmental      Managed Devices A statically assigned IP address    Network Interface Management LAN Interface General Settings Route Settings    Configuration Method DHCP       Subnet Mask  Alerts  amp  Logging       Port Log      Alerts Gateway      SMTP  amp  SMS      SNMP A statically assigned gateway    Primary DNS  System      Administration      SSL Certificates Secondary DNS     Configuration Backup      Firmware A statically assigned se     IP      Date  amp  Time Seda Auto     Dial      Firewall     Nagios DHCP Server Disabled      Configure Dashboard Configure a DHCP server for this interface     A statically assigned primary name server       The Ethernet media type     724 746 5500   blackbox com Page 97    Click on the Disabled link next to DHCP Server which will bring up the System  DHCP Server page  Check Enable DHCP Server    To configure the DHCP server  tick the Use interface address as gateway check box    VV V WV    Set the DNS server address es  to be the same as used on the external network i e  if the console  server is acting as an internet gateway or a cellular router  then use the ISP provided DNS server  address     gt  Enter the Default Lease time and Maximum Lease time in seconds  The lease time is the time  that a dynamically assigned IP address is valid before the clien
375. tify of this alert     config  s config alerts alert2 nsca enabled on  To use SNMP to notify of this alert     config  s config alerts alert2 snmp enabled on  Increment the total alerts      config  s config alerts total 2    Below are the specific settings depending on the type of alert required     Connection Alert  To trigger an alert when a user connects to serial port 5 or network host 3       config  s config alerts alert2 host3  host name     config  s config alerts alert2 port5 on     config  s config alerts alert2 sensor temp     config  s config alerts alert2 signal DSR     config  s config alerts alert2 type login    Signal Alert  To trigger an alert when a signal changes state on port 1       config  s config alerts alert2 port1 on    config  s config alerts alert2 sensor temp    724 746 5500   blackbox com Page 228      config  s config alerts alert2 signal   DSR   DCD   CTS     config  s config alerts alert2 type signal    Pattern Match Alert  To trigger an alert if the regular expression    0 0  id  is found in serial port 10 s character stream       config  s  config alerts alert2 pattern   0 0  id     config  s config alerts alert2 port10 on     config  s config alerts alert2 sensor temp     config  s config alerts alert2 signal DSR     config  s config alerts alert2 type pattern    UPS Power Status Alert    To trigger an alert when myUPS  on localhost  or thatUPS  on remote host 192 168 0 50  power status  changes between on line  on battery and low battery 
376. tion or Internet connection via a LAN  or VPN  and the secondary out of band connectivity is provided by a dial up or wireless modem directly  attached to the gateway  Out of band access enables you to access the hosts and serial devices on the  network  diagnose any connectivity issues  and restore the gateway s primary link     In SDT Connector  to configure OoB access  you provide the secondary IP address of the gateway  and  tell SDT Connector how to start and stop the OoB connection  You can start an OoB connection by  initiating a dial up connection  or adding an alternate route to the gateway  SDT Connector allows for  maximum flexibility  It allows you to provide your own scripts or commands for starting and stopping  the OoB connection                     New SDT Gateway          General  Out Of Band   Remote UDP Gateway           Secondary Address   Port 22       Start Command Tonnection   wait  min rasdial OOB login password       Stop Command  iit  min rasdial network_connection login password     L 2 ox   Cancet_                          To configure SDT Connector for OoB access    gt  When adding a new Gateway or editing an existing Gateway select the Out Of Band tab      gt  Enter the secondary  OoB IP address of the gateway  for example  the IP address it is using when  dialed in directly   You also may modify the gateway   s SSH port if it s not using the default of 22      gt  Enter the command or path to a script to start the OoB connection in Start Command
377. tion protocol to be used  Either authenticate as  part of ESP  Encapsulating Security Payload  encryption or separately using the AH   Authentication Header  protocol     Enter a Left ID and Right ID  This is the identifier that the Local host gateway and remote  host gateway use for IPsec negotiation and authentication  Each ID must include an         and can  include a fully qualified domain name preceded by           e g  left example com      Enter the public IP or DNS address of this console server VPN gateway  or enter the address of  the device connecting the console server to the Internet  as the Left Address  You can leave this  blank to use the interface of the default route    In Right Address enter the public IP or DNS address of the remote end of the tunnel  only if the  remote end has a static or dyndns address   Otherwise leave this blank    724 746 5500   blackbox com Page 70     gt  Ifthe VPN gateway is serving as a VPN gateway to a local subnet  e g  the console server has a  Management LAN configured  enter the private subnet details in Left Subnet  Use the CIDR  notation  where the IP address number is followed by a slash and the number of    one    bits in the  binary notation of the netmask   For example 192 168 0 0 24 indicates an IP address where the  first 24 bits are used as the network address  This is the same as 255 255 255 0  If the VPN  access is only to the console server itself and to its attached serial console devices then leave  Left Subnet
378. to IP connect to hosts that are serially attached to the gateway    Network  IP  protocols like RDP  VNC and HTTP can also be used for connecting to host devices that are  serially connected through their COM port to the console server  To do this you must     6 10 1    establish a PPP connection  Section 6 7 1  between the host and the gateway  then  set up Secure Tunneling   Ports on the console server  Section 6 7 2   then    configure SDT Connector to use the appropriate network protocol to access IP consoles on the host  devices that are attached to the Console server serial ports  Section 6 7 3     Establish a PPP connection between the host COM port and console server     This step is only necessary for serially connected computers     First  physically connect the COM port on the host computer you want to access to the serial port on the  console server  then     A     For non Windows  Linux  UNIX  Solaris  etc   computers  establish a PPP connection over the serial  port  The online tutorial http   www yolinux com TUTORIALS LinuxTutorialPPP html presents a  selection of methods for establishing a PPP connection for Linux     724 746 5500   blackbox com Page 127    B     For Windows XP and 2003 computers  follow the steps below to set up an advanced network  connection between the Windows computer  through its COM port to the console server  Both  Windows 2003 and Windows XP Professional allow you to create a simple dial in service which can  be used for the Remote De
379. to configure the TACACS  authentication method to use whenever the  console server or any of its serial ports or hosts is accessed      gt  Select Serial and Network  Authentication and check TACAS or LocalTACACS or TACACSLocal    or TACACSDownLocal       UPS Status TACACS      RPC Status      Environmental Status Authentication and  Authorisation Server  Address          Accounting Server  a Address    Server Password       Terminal    Confirm Password    TACACS Login    Method    TACACS Group  Membership  Attribute    TACACS Service    Default Admin  Priviledges    Comma separated list of remote authentication and authorization servers             efaults to PAP      gt  Enter the Server Address  IP or host name  of the remote Authentication Authorization server   Multiple remote servers may be specified in a comma separated list  Each server is tried in    succession     724 746 5500   blackbox com Page 167     gt  In addition to multiple remote servers  you can also enter separate lists of Authentication   Authorization servers and Accounting servers  If no Accounting servers are specified  the  Authentication Authorization servers are used instead      gt  Enter and confirm the Server Password  Then select the method to be used to authenticate to  the server  defaults to PAP   To use DES encrypted passwords  select Login     gt  If required enter the TACACS Group Membership Attribute that is to be used to indicate group  memberships  defaults to groupname n      gt  If r
380. to extract files to   The following command will temporarily increase the size of  tmp     mount  t tmpfs  o remount size 2048k tmpfs  var    If restoring to either a new unit or one that has been factory defaulted  make sure that the  process generating SSH keys either stops or completes before restoring configuration  If this is  not done  then a mix of old and new keys may be put in place     SSH uses these keys to avoid man in the middle attacks  Logging in may be disrupted     15 2 Advanced Portmanager  Black Box   s portmanger program manages the console server serial ports  It routes network connection  to serial ports  checks permissions  and monitors and logs all the data flowing to from the ports     15 2 1 Portmanager commands    pmshell    The pmshell command acts similar to the standard tip or cu commands  but all serial port access is  directed via the portmanager     Example  To connect to port 8 via the portmanager     pmshell  I port08  pmshell Commands     Once connected  the pmshell command supports a subset of the     escape commands that  tip cu support  For SSH you must prefix the escape with an additional         command  i e  use the           escape     Send Break  Typing the character sequence   b  will generate a BREAK on the serial port   History  Typing the character sequence   h  will generate a history on the serial port   Quit pmshell  Typing the character sequence      will exit from pmshell   Set RTS to 1 run the command  pmshell   rts 1  Sho
381. trol these devices using the  specified services  for example  Telnet  HHTPS  RDP  IPMI  Serial over LAN  Power Control   An  authorized User also has a limited view of the Management Console and can only access authorized  configured devices and review port logs     In this manual  when the term user  lower case  is used  it refers to both the above classes of users  This  document also uses the term remote users to describe users who are not on the same LAN segment as  the console server  These remote users may be Users  who are on the road connecting to managed  devices over the public Internet  or it may be an Administrator in another office connecting to the  console server itself over the enterprise VPN  or the remote user may be in the same room or the same  office but connected on a separate VLAN than the console server     Management Console  The Management Console provides a view of the console server and all the connected devices     Administrators can use any browser to log into the Management Console either locally or from a remote  location  They can then use Management Console to manage the console server  the users  the serial    724 746 5500   blackbox com Page 14    ports and serially connected devices  network connected hosts  and connected power devices  and to  view associated logs and configure alerts     System Name  les1308a Model LES1308A Firmware  3 5 3u5 ba  0     OX i Uptime  0 days  6 hours  14 mins  56 secs Current User  root     OP  Backup Log O
382. ult  To modify the default SNMP  settings  the Administrator must make the edits at the command line as described in  Chapter 15     Advanced Configuration    NTP Refer Chapter 11     gt  Click Apply  As you apply your services selections  the screen will be updated with a  confirmation message     Message Changes to configuration succeeded     3 4 2 Service Settings    The Administrator can access the console server  and connected serial ports and managed devices  using  a range of access protocols services  However for each such access the particular service must first be  configured and enabled to run on the console server     To enable and configure a service      gt  Select the Service Settings tab on the System  Services page    724 746 5500   blackbox com Page 35    System Name  les1308a Modet LE A Firmware  3 5 3u5 az  0     g Uptime  0 days  7 hours  48 mins   s Current User  root  ING  Bacup Log Out    NETWORK SERVICES       Serial  amp  Network    Service Settings Service Access    ured  you can control the network          int    Alternate HTTP Port 80  Alternate HTTP port tc  port 80  for CMS a    port 80  fo             Enable HTTPS Web Vv    Management Completely enable or disable the HTTPS web management service    HTTPS Port 443    Port to listen for the HTTPS web management service       Enable Telnet Vv  command shell    Completely enable or disable the telnet service       Alternate Telnet       SNMP   aan Port   System        Administration Enable SSH Vv 
383. un any command and its output will be displayed in the widget window directly   Below is an example script that writes the current date to a file  and then echos HTML code back to the  browser  The HTML code gets an image from a specific URL and displays it in the widget        bin sh    date  gt  gt   tmp test   echo   lt table gt     echo     lt tr gt  lt td gt  This is my custom script running  lt  td gt  lt  tr gt     echo   lt tr gt  lt td gt     echo     lt img src  http   www vinras com images linux online inc jpg  gt    echo   lt  td gt  lt  tr gt     echo   lt  table gt      exit 0    724 746 5500   blackbox com Page 208    Chapter 13 EET Gai    Introduction    The console server has a small number of Manage reports and tools that are available to both  Administrators and Users       Access and control authorized devices      View serial port logs and host logs for those devices      Use SDT Connector or the Web terminal to access serially attached consoles     Control power devices  where authorized      All other Management Console menu items are available to Administrators only     13 1 Device Management  To display the Managed Devices and their associated serial  network  and power connections      gt  Select Manage  Devices  The Administrator will be presented with a list of all configured  Managed Devices  whereas the User will only see the Managed Devices they  or their Group  has  been given access privileges for     System Name  les1308a Model LES1308A Firmw
384. uncement including an  appropriate copyright notice and a notice that there is no warranty  or else  saying that you provide a warranty  and  that users may redistribute the program under these conditions  and telling the user how to view a copy of this  License   Exception  if the Program itself is interactive but does not normally print such an announcement  your work  based on the Program is not required to print an announcement      These requirements apply to the modified work as a whole  If identifiable sections of that work are not derived from  the Program  and can be reasonably considered independent and separate works in themselves  then this License   and its terms  do not apply to those sections when you distribute them as separate works  But when you distribute  the same sections as part of a whole which is a work based on the Program  the distribution of the whole must be on  the terms of this License  whose permissions for other licensees extend to the entire whole  and thus to each and  every part regardless of who wrote it     Thus  it is not the intent of this section to claim rights or contest your rights to work written entirely by you  rather  the  intent is to exercise the right to control the distribution of derivative or collective works based on the Program     In addition  mere aggregation of another work not based on the Program with the Program  or with a work based on  the Program  on a volume of a storage or distribution medium does not bring the
385. uring the principal network connection in System  IP specify the Failover Interface  that will be used when a fault has been detected with Network   Network1  ethO   This can be  either Internal Modem or the Dial Serial DB9  if you are using an external modem on the  Console port  or USB Modem     gt  Specify the Probe Addresses of two sites  the Primary and Secondary  that the IMG IM console  server is to ping to determine if Network   Network1 is still operational     gt  Select the System  Dial menu option and the port to be configured  Serial DB9 Port or PC Card  or Internal Modem Port      gt  Select the Baud Rate and Flow Control that will communicate with the modem       Note You can further configure the console modem port  for example  to include modem init strings  by  editing  etc mgetty config files as described in Chapter 13        5 5 Cellular Modem Connection    The LES1408A  LES1416A  LES1432A  LES1448A  LES1308A  LES1316A  LES1332A and LES1348A  console servers have an internal cellular modem  The LES1508A  LES1208A R2  LES1216A R2   LES1232A and LES1248A R2 console servers support external cellular modems       These modems first need to be set up to validate they can connect to the carrier network   They then can be configured for operation in Failover mode  OOB mode  Cellular router mode or  CSD mode     5 6 1 Connect to the GSM HSUPA UMTS carrier network    The LES1308A  LES1316A  LES1332A and LES1348A console servers have an internal GSM modem  that will
386. users    14 4 Adding and removing user Groups    The console server is configured with a few default user groups  even though only two of these groups  are visible in the Management Console GUI   To find out how many groups are already present       config  g config groups total  Assume this value is six  Make sure you number any new groups you create from seven and up     To add a custom group to the configuration with Group name Group7  Group description MyGroup and  Port access  1 5 you   d issue the commands       config  s config groups group7 name Group7     config  s config groups group7 description MyGroup    config  s config groups total 7     config  s config groups group7 port1 on     config  s config groups group7 port5 on    Assume we have an RPC device connected to port 1 on the console manager  and the RPC is configured   To give this group access to RPC outlet number 3 on the RPC device  run the two commands below       config  s config ports port1 power outlet3 groups group1 Group7    config  s config ports port1 power outlet3 groups total 1  total number of groups that have  access to this outlet     If more groups are given access to this power outlet  then increment the     config ports port1 power outlet3 groups total  element accordingly     To give this group access to network host 5       config  s config sdt hosts host5 groups group1 Group7    config  s config sdt hosts host5 groups total 1  total number of groups having access to host     To give ano
387. users  other than root  log  into the console manager  If you log in as    John     and John is member of the admin group and  there is a dashboard layout configured for John  then you will see the dashboard for John upon  log in and each time you click on the Status Dashboard menu item     If there is no dashboard layout configured for John  but there is an admin group dashboard  configured  then you will see the admin group dashboard instead  If there is no user dashboard or  admin group dashboard configured  then you will see the default dashboard     The root user does not have its own dashboard     Use the above configuration options to enable admin users to setup their own custom  dashboards        The Dashboard displays six widgets  These widgets include each of the Status screens  alerts  devices   ports ups  rpc  and environmental status  and a custom script screen  The admin user can configure  which of these widget is to be displayed where      gt  Go to the Dashboard layout panel and select which widget is to be displayed in each of the six  display locations  widget    6       gt  Click Apply     724 746 5500   blackbox com Page 206    LS    0X    NETWORK SERVICES    Serial  amp  Network       Serial Port          OpenVPN       PPTP VPN          Managed Devices    Alerts  amp  Logging     Port Log          SMTP  amp  SMS     SNMP    System     Administration     SSL Certificates    ation Backup       Dashboard Layout    Configuring Dashboard for Group  admin    S
388. uses a Secure Connection  specify its type      gt  You may enter a Sender email address which will appear as the    from    address in all email  notifications sent from this console server  Many SMTP servers check the sender   s email address  with the host domain name to verify the address as authentic  So it may be useful to assign an  email address for the console server such as consoleserver2 mydomain com     gt  You may also enter a Username and Password if the SMTP server requires authentication      gt  You can specify the specific Subject Line that will be sent with the email      gt  Click Apply to activate SMTP     7 5 2 Send SMS alerts    With any model console server you can use email to SMS services to send SMS alert notifications to  mobile devices  Almost all mobile phone carriers provide an SMS gateway service that forwards email to  mobile phones on their networks  There   s also a wide selection of SMS gateway aggregators who  provide email to SMS forwarding to phones on any carriers  Alternately if your console server has an  embedded or externally attached cellular modem you will be given the option to send the SMS directly    over the carrier connection     SMS via Email Gateway    To use SMTP SMS the Administrator must configure a valid SMTP server for sending the email      gt  Inthe SMTP Settings field in the Alerts  amp  Logging  SMTP  amp SMS menu select SMS Gateway  An  SMS via Email Gateway field will appear     gt  Enter the IP address of the ou
389. ut    NETWORK SERVICES                    Serial  amp  Network  Groups     Serial Port  Fe Name Description  admin Provi 1 unlimited configuration and management privileges  pptpd  dialin  fip  pmshell  users Provides users with basic management privileges  Alerts  amp  Logging z Add Group     PortLog  SMTP  amp      SNMP Users  Username Group Description    System         Administration    root       Root User Edit Disable       A User can also use the Management Console  but has limited menu access to control select devices   review their logs and access them using the built in java terminal or control power to them     The console server runs an embedded Linux operating system  and experienced Linux   and UNIX   users  may prefer to configure it at the command line  To get command line access  connect through a terminal  emulator or communications program to the console serial port  connect via ssh or telnet through the  LAN  or connect through an SSH tunneling to the console server     Manual Conventions    This manual uses different fonts and typefaces to show specific actions        Note Text presented like this indicates issues to note           Text presented like this highlights important information  Make sure you read  and follow these warnings         gt  Text presented with an arrow head indent indicates an action you should take as part of the  procedure     Bold text indicates text that you type  or the name of a screen object  for example  a menu or button   o
390. ut the explicit approval or consent of Black Box  will void Black Box of any liability or responsibility of injury or loss caused by any malfunction     This equipment is for indoor use and all the communication wirings are limited to the inside of the  building     724 746 5500   blackbox com Page 17    Chapter 2    Introduction    Installation    This chapter describes how to install the console server hardware and connect it to controlled devices        A N To avoid physical and electrical hazards please read Appendix C on Safety           2 1 Models    There are multiple console server models  each with a different number of network and serial ports or  power supply configurations     Serial   Ports  LES1508A 8  LES1448A 48  LES1432A 32  LES1416A 16  LES1408A 8  LES1348A 48  LES1332A 32  LES1316A 16  LES1308A 8  LES1248A R2 48  LES1232A 32  LES1216A R2 16  LES1208A R2 8  LES1148A 48  LES1132A 32  LES1116A 16  LES1108A 8    The next sections show the components shipped with each of these models     USB  Ports    ww w  WI  INININININI  NININJIN    Network  Ports    ejejeie NININI NINININI NININININJIN    Console  Port    e  jejejejejlejeje  leje  lelejejlejejeje    Modem    Internal CDMA  Internal CDMA  Internal CDMA  Internal CDMA  Internal GSM  Internal GSM  Internal GSM  Internal GSM  Internal V 92  Internal V 92  Internal V 92  Internal V 92    RJ  Pinout    Power    Ext AC DC  Dual AC  Dual AC  Dual AC  Dual AC  Dual AC  Dual AC  Dual AC  Dual AC  Dual AC  Dual AC  Dua
391. value ulimit     SHacdflmnpstuv   limit    umask   p    S   mode    unalias   a   name        unset   f    v   name        until COMMANDS  do COMMANDS  done  variables   Some variable names an wait   n    while COMMANDS  do COMMANDS   done   COMMANDS             724 746 5500   blackbox com Page 276       Appendix B    FEATURE    Dimensions    Hardware Specifications    VALUE    LES1408A 16A 32A 48A  LES1308A 16A 32A 48A  LES1208A   R2 16A R2 32A 48A R2  17 x 12 x 1 75 in  43 2 x 31 3  x 4 5 cm   LES1116A 32A 48A  17 x 8 5 x 1 75 in  43 2 x 21x 4 5 cm   LES1108A  8 2 x 4 9 x 1 2 in  20 8 x 12 6 x 4 5 cm        Weight    LES1408A 16A 32A 48A  LES1308A 16A 32A 48A  LES1208A   R2 16A R2 32A 48A R2   5 4 kg  11 8 Ibs    LES1116A 32A 48A  3 9 kg  8 5 Ibs    LES1108A  1 7 kg  3 7 Ibs        Ambient operating temperature  Non operating storage    5  C to 50  C  41  F to 122  F    30  C to  60  C   20  F to  140  F                    temperature   Humidity 5  to 90    Power Refer to Chapter 2 for various models   Power Consumption All less than 30W   CPU Micrel KS8695P controller   Memory LES1408A 16A 32A 48A  LES1308A 16A 32A 48A  LES1208A     R2 16A R2 32A 48A R2   64MB SDRAM 16MB Flash 16GB USB Flash  LES1116A 32A 48A  64MB SDRAM 16MB Flash  LES1108A  16MB SDRAM 8MB Flash       Serial Connectors    LES1508A 8 RJ 45 RS 232 serial ports   LES1408A  LES1308A  LES1208A R2  8 RJ 45 RS 232 serial ports  LES1416A  LES1316A  LES1216A R2  16 RJ 45 RS 232 serial ports  LES1432A  LES1332A  LE
392. ve this field blank for automatic DNS  server assignment      gt  Optionally  enter a Domain Name suffix to issue DHCP clients     724 746 5500   blackbox com Page 40     gt  Enter the Default Lease time and Maximum Lease time in seconds  The lease time is the time  that a dynamically assigned IP address is valid before the client must request it again      gt  Click Apply     The DHCP server will sequentially issue IP addresses from a specified address pool s     gt  Click Add in the Dynamic Address Allocation Pools field    gt  Enter the DHCP Pool Start Address and End Address and click Apply        System Name  ACSdoc Mo 81216A Firmware  2 8 0u2       NETWORK SERVICES       Serial  amp  Network   apa anaes Statically Reserved Address  Authentication  Network Hosts se   Tiuta cloaks The name to identify this host by  Cascaded Ports Statically   UPS Connections Reserved IP   RPC Connections IP Address reserved for specific host   Environmental Hardware   Managed Devices Address    Host Name    MAC Address to reserve IP for  Alerts  amp  Logging EET  Port Log PPly    The DHCP server also supports pre assigning IP addresses to be allocated only to specific MAC addresses    and reserving IP addresses to be used by connected hosts with fixed IP addresses  To reserve an IP  addresses for a particular host      gt  Click Add in the Reserved Addresses field      gt  Enter the Hostname  the Hardware Address  MAC   and the Statically Reserved IP address for  the DHCP client and click
393. via  the Internet  SSL works by using a private key to encrypt data that s transferred over the SSL connection     724 746 5500   blackbox com Page 260    The console server includes OpenSSL  The OpenSSL Project is a collaborative effort to develop a robust   commercial grade  full featured  and Open Source toolkit implementing the Secure Sockets Layer  SSL  v2 v3  and Transport Layer Security  TLS v1  protocols as well as a full strength general purpose  cryptography library  The project is managed by a worldwide community of volunteers that use the  Internet to communicate  plan  and develop the OpenSSL toolkit and its related documentation     OpenSSL is based on the excellent SSLeay library developed by Eric A  Young and Tim J  Hudson  The  OpenSSL toolkit is licensed under an Apache style licence  which basically means that you are free to get  and use it for commercial and non commercial purposes subject to some simple license conditions  In  the console server  OpenSSL is used primarily in conjunction with    http    to have secure browser access to  the GUI management console across insecure networks     More documentation on OpenSSL is available from   http   www openssl org docs apps openssl html    http   www openssl org docs HOWTO certificates txt    15 8 HTTPS    The Management Console can be served using HTTPS by running the webserver via ss wrap  The server  can be launched on request using inetd     The HTTP server provided is a slightly modified version of th
394. vice     Scroll down to Console server Setting and select Console server Mode  Check Telnet  or SSH   and scroll to the bottom and click Apply     Select Network Hosts from Serial  amp  Network and click Add Host     In the IP Address DNS Name field enter 127 0 0 1  this is the Black Box network loopback  address  and enter Loopback in Description     Remove all entries under Permitted Services  select TCP  and enter 200n in Port   This  configures the Telnet port enabled in the previous step  so for Port 2 you would enter 2002      Click Add  then scroll to the bottom and click Apply     Administrators by default have gateway and serial port access privileges  however for Users to  access the gateway and the serial port  you will need to give those Users the required access  privileges  Select Users  amp  Groups from Serial  amp  Network  Click Add User  Enter a Username     724 746 5500   blackbox com Page 115    Description  and Password Confirm  Select 127 0 0 1 from Accessible Host s  and select Port 2  from Accessible Port s   Click Apply     6 5 Using SDT Connector for out of band connection to the gateway    You can also set up SDT Connector to connect to the console server  gateway  out of band  OoB   OoB  access uses an alternate path for connecting to the gateway to that used for regular data traffic  OoB  access is useful for when the primary link into the gateway is unavailable or unreliable     Typically  a gateway   s primary link is a broadband Internet connec
395. w all signals    pmshell    signals   DSR 1 DTR 1 CTS 1 RTS 1 DCD 0    Read a line of text from the serial port    omshell  getline    pmchat    The pmchat command acts similar to the standard chat command  but all serial port access is directed  via the portmanager     Example  To run a chat script via the portmanager       pmchat  v  f  etc config scripts port08 chat  lt   dev port08    724 746 5500   blackbox com Page 245    For more information on using chat  and pmchat  you should consult the UNIX man pages     http   techpubs sgi com library tp  cgibin getdoc cgi coll linux amp db man amp fname  usr share catman   man8s chat 8 html    pmusers  The pmusers command is used to query the portmanager for active user sessions   Example  To detect which users are currently active on which serial ports      pmusers    This command will output nothing if there are no active users currently connected to any ports   Otherwise  it will respond with a sorted list of usernames per active port     Port 1    user1   user2  Port 2    user1  Port 8    user2    The above output indicates that a user named    user1    is actively connected to ports 1 and 2  while     user2    is connected to both ports 1 and 8   portmanager daemon    There is normally no need to stop and restart the daemon  To restart the daemon normally  just run the  command       portmanager  Supported command line options are   Force portmanager to run in the foreground      nodaemon  Set the level of debug logging    
396. w be on      gt     You can verify the connection status from the Status  Statistics   o Select the Cellular tab and in Service Availability verify Mode is set to Online   o Select Failover amp  Out of Band and the Connection Status reads Connected   o You can check your allocated  P address   You can measure the received signal strength from the Cellular Statistics page on the Status     Statistics screen  This will display the current state of the cellular modem including the Received  Signal Strength Indicator  RSSI        Note  Received Signal Strength Indicator  RSSI  is a measurement of the Radio Frequency  RF     power present in a received radio signal at the mobile device  It is generally expressed  in dBm and the best throughput comes from placing the device in an area with the highest  RSSI      100 dbm or less   Unacceptable coverage    99 dbm to    90 dbm   Weak Coverage    89 dbm to     70 dbm   Medium to High Coverage   69 dbm or greater   Strong Coverage        gt     5 6 4    With the cellular modem connection on you can also see the connection status from the LEDs on  top of unit    Cellular modem watchdog    When you select Enable Dial Out on the System  Dial menu you will be given the option to configure a  cellar modem watchdog service  with firmware V3 5 2u13 and later   This service will periodically ping a  configurable IP address  If a threshold number of consecutive attempts fail  the service will cause the unit  to reboot  This can be used to force 
397. when adding more slaves     NOTE  If a slave is added using the CLI  then the master SSH public key will need to be manually copied  to every slave device before cascaded ports will work  refer Chapter 4      The following command will synchronize the live system with the new configuration       config  r cascade    14 9 UPS Connections  Managed UPSes    Before adding a managed UPS  make sure that at least 1 port has been configured to run in    device    mode     and that the device is set to  ups    To add a managed UPS with the following values     Connected via   UPS name   Description   Username to connect to UPS  Password to connect to UPS  shutdown order   Driver   Driver option   option   Driver option   argument  Logging   Log interval   Run script when power is critical    Port 1   My UPS   UPS in room 5  User2   secret   2  O shuts down first   genericups  option  argument  Enabled   2 minutes  Enabled      config  s config ups monitors monitor1 port  dev port01  If the port number is higher than 9  eg port 13  enter     config  s config ups monitors monitor1 port  dev port13      config  s  config ups monitors monitor1 name My UPS      config  s  config ups monitors monitor1 description UPS in room 5     config  s config ups monitors monitor1 username User2     config  s config ups monitors monitor1 password secret     config  s config ups monitors monitor1 sdorder 2     config  s config ups monitors monitor1 driver genericups     config  s config ups monitors mon
398. ws servers  and clients      Windows does not include VNC software  so you will need to download  install  and activate a third  party VNC Server software package     REAL RealVNC http   www realvnc com is fully cross platform  so a desktop  AN running on a Linux machine may be displayed on a Windows PC  on a Solaris  machine  or on any number of other architectures  There is a Windows  C server  allowing you to view the desktop of a remote Windows machine on  any of these platforms using exactly the same viewer  RealVNC was founded   by members of the AT amp T team who originally developed VNC     TightVNC http   www tightvnc com is an enhanced version of VNC  It has  added features such as file transfer  performance improvements  and read   only password support  They have just recently included a video drive much  VNC like UltraVNC  TightVNC is still free  cross platform  Windows Unix  and  CD Linux   and compatible with the standard  Real  VNC        UltraVNC http   ultravnc com is easy to use  fast  and free VNC software that  has pioneered and perfected features that the other flavors have  consistently refused or been very slow to implement for cross platform and  minimalist reasons  UltraVNC runs under Windows operating systems  95   98  Me  NT4  2000  XP  2003   Download UltraVNC from Sourceforge s  UltraVNC file list     B  For Linux servers  and clients      Most Linux distributions now include VNC Servers and Viewers and they generally can be  launched from the  G
399. xecutable file for the client  or click Browse  to locate the executable       gt  Enter a Command Line associated with launching the client application  SDT Connector typically  launches a client using command line arguments to point it at the local endpoint of the  redirection  There are three special keywords for specifying the command line format  When  launching the client  SDT Connector substitutes these keywords with the appropriate values      path  is path to the executable file  that is  the previous field      host  is the local address to which the local endpoint of the redirection is bound  that is  the  Local Address field for the Service redirection Advanced options      port  is the local port to which the local endpoint of the redirection is bound  that is  the Local  TCP Port field for the Service redirection Advanced options  If this port is unspecified  that is      Any      the appropriate randomly selected port will be substituted     For example SDT Connector is preconfigured for Windows installations with a HTTP service client that  will connect with the local browser that the local Windows user has configured as the default   Otherwise  the default browser used is Firefox         amp  SDTConnector       File Edit Help    K   SDTConnector Preferences             Edit Client          Client name  HTTP browser    Path to client executable file    rundil32 url dllFileProtocolHandler    Command line format for client executable    Ypath  http    host    po
400. y attached devices  6 5 Using SDT Connector for out of band connection to the gateway  6 6 Importing  and exporting  preferences   6 7 SDT Connector Public Key Authentication   6 8 Setting up SDT for Remote Desktop access    6 8 1 Enable Remote Desktop on the target Windows computer to be accessed   6 8 2 Configure the Remote Desktop Connection client   6 9 SDT SSH Tunnel for VNC   6 9 1 Install and configure the VNC Server on the computer to be accessed   6 9 2 Install  configure and connect the VNC Viewer   6 10 Using SDT to IP connect to hosts that are serially attached to the gateway  6 10 1 Establish a PPP connection between the host COM port and console server  6 10 2 Set up SDT Serial Ports on console server   6 10 3 Set up SDT Connector to SSH port forward over the console server Serial Port    6 11 SSH Tunneling using other SSH clients  e g  PuTTY   ALERTS AND LOGGING    721 UPS   Power Supply  7 2 2 UPS Status   7 2 3 Serial Login Logout  7 2 4 ICMP Ping   7 2 5 Cellular Data   7 2 6 Custom Check   7 2 7 SMS Command   7 3 Trigger Actions   7 3 1 Send Email   7 3 2 Send SMS   7 3 3 Perform RPC Action  7 3 4 Run Custom Script  7 3 5 Send SNMP Trap  7 3 6 Send Nagios Event    7 4 Resolve Actions  7 5 Configure SMTP  SMS  SNMP and or Nagios service for alert notifications  7 5 1 Send Email alerts    7 5 2 Send SMS alerts   7 5 3 Send SNMP trap alerts   7 5 4 Nagios alerts   7 6 Logging   7 6 1 Log storage   7 6 2 Serial port logging   7 6 3 Network TCP and UDP port logg
401. y power reaches critical       There are also logging clients  ups og  and third party interface clients  Big Sister  Cacti   Nagios  Windows  and more  Refer www networkupstools org client projects      724 746 5500   blackbox com Page 161      The latest release of NUT  2 4  also controls PDU systems  It can do this either natively using  SNMP or through a binding to Powerman  open source software from Livermore Labs that also  is embedded in Black Box console servers      These NUT clients and servers all are embedded in each Black Box console server  with a Management  Console presentation layer added     and they also are run remotely on distributed console servers and  other remote NUT monitoring systems  This layered distributed NUT architecture enables       Multiple manufacturer support  NUT can monitor UPS models from 79 different  manufacturers   and PDUs from a growing number of vendors   with a unified interface       Multiple architecture support  NUT can manage serial and USB connected UPS models with the  same common interface  Network connected USB and PDU equipment can also be monitored  using SNMP       Multiple clients monitoring one UPS  Multiple systems may monitor a single UPS using only their  network connections  There is a wide selection of client programs that support monitoring UPS  hardware via NUT  Big Sister  Cacti  Nagios and more        Central management of multiple NUT servers  A central NUT client can monitor multiple NUT  servers that may 
402. y time before repeating trigger actions in Repeat Trigger Action  Delay  This delay starts after the last action is queued    System Name  les1308a Model LES1308A Firmware  3 5 3u5   a  O   Uptime  0 days  18 hours  51 mins  48 secs Current User  root    BaduP Log Out     lt SBLACK BOX    NETWORK SERVICES       Serial  amp  Network       Auto Response Settings          Name  Unique Name for this AutoResponse  Reset Timeout q  ime in seconds after resolution to delay before this AutoResponse can be triggered again  Repeat Trigger Actions o  Repeat Trigger actions until the check is resolved  Repeat Trigger Action bag     Environmental Delay     Managed Devices  Alerts  amp  Logging   Disable Auto Response rc     Po at specific times Allows Auto Responses to be pei lly disabled based on time and da          Auto      SMTP     SNMP          System         Administration  L Certifi           Configuration Backup     Firmware     IP      Date  amp  Time    Check Add a new check by selecting a check type from the left mer  Conditions    Environmenta        gt  Check Disable Auto Response at specific times and you will be able to periodically disable  auto Responses between specified times of day    724 746 5500   blackbox com Page 136    7 2 Check Conditions    To configure the condition that will trigger the Auto Response      gt  Click on the Check Condition type  e g  Environmental  UPS Status or ICMP ping  to be  configured as the trigger for this new Auto Response in the Auto 
403. you leave the Username and User Password fields blank  they default to portXX and portXx  where XX is the serial port number  The default username and password for Secure RDP over  Port 2 is port02        Make sure the console server Common Settings  Baud Rate  Flow Control  are the same as those  set up on the Windows computer COM port and click Apply     RDP and VNC forwarding over serial ports is enabled on a Port basis  You can add Users who can  have access to these ports  or reconfigure User profiles  by selecting Serial  amp  Network  User  amp   Groups menu tag   as described earlier in Chapter 4  Configuring Serial Ports     724 746 5500   blackbox com Page 131    6 10 3 Set up SDT Connector to SSH port forward over the console server Serial Port    In the SDT Connector software running on your remote computer  specify the gateway IP address of  your console server and a username password for a user you set up on the console server that has  access to the desired port     Next  add a New SDT Host  In the Host address  put portxx  where xx   the port you are connecting to   Example  for port 3 you would have a Host Address of  port03  Then select the RDP Service check box     6 11 SSH Tunneling using other SSH clients  e g  PuTTY     As covered in the previous sections of this chapter  we recommend that you use the SDT Connector  client software that is supplied with the console server  There   s also a wide selection of commercial and  free SSH client programs that c
404. ypt the value  of any config element using the  P parameter  but only encrypted user passwords and system passwords  are supported  If any other element value were to be encrypted  the value will become inaccessible and  will have to be reset     The following command will synchronize the live system with the new configuration       config  a    14 18 IP settings    To configure the primary network interface with static settings     IP address 192 168 0 23  Netmask 255 255 255 0  Default gateway 192 168 0 1  DNS server 1 192 168 0 1  DNS server 2 192 168 0 2    724 746 5500   blackbox com Page 231      config  s config interfaces wan address 192 168 0 23     config  s config interfaces wan netmask 255 255 255 0     config  s config interfaces wan gateway 192 168 0 1     config  s config interfaces wan dns1 192 168 0 1     config  s config interfaces wan dns2 192 168 0 2     config  s config interfaces wan mode static     config  s config interfaces wan media   Auto   100baseTx FD   100baseTx HD   10baseT HD    10baseT FD    To enable bridging between all interfaces     config  s config system bridge enabled on   To enable IPv6 for all interfaces    config  s config system ipv6 enabled on   To configure the management LAN interface  use the same commands as above but replace   config interfaces wan  with config interfaces lan   Note  Not all devices have a management LAN interface    To configure a failover device in case of an outage       config  s config interfaces wan fail
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Philips Spot light 52172/17/86  Powermate IH1195023 User's Manual    User Manual - Austin Hughes  User Manual - FTP Directory Listing  Star Micronics SP320S User's Manual  Manuale d`uso e manutenzione  GRAM ECO/SUPERIOR User manual  Imation Portable Hard Drive, 250GB  Bose CineMate 1 SR    Copyright © All rights reserved. 
   Failed to retrieve file