Home
Raritan Computer EMX2-111 Network Card User Manual
Contents
1. I Paste the contents the terminal Press Enter Verify whether the system shows the following command prompt indicating the provided CA certificate is valid config Setting the BSSID This command syntax specifies the BSSID config network wireless BSSID lt bssid gt Variables e lt bssid gt is the MAC address of the wireless access point Example The following command specifies that the BSSID is 00 14 6C 7E 43 81 config network wireless BSSID 00 14 6C 7E 43 81 es 5E Raritan Raritan Chapter 10 Using the Command Line Interface Configuring the IPv4 Parameters An IPv4 configuration command begins with network ipv4 The commands are case sensitive so ensure you capitalize them correctly Setting the IPv4 Configuration Mode This command syntax determines the IP configuration mode config f network ipv4 ipConfigurationMode mode Variables e mode is one of the modes dhcp or static Mode Description dhcp The IPv4 configuration mode is set to DHCP static The IPv4 configuration mode is set to static IP address Example The following command enables the Static IP configuration mode config f network ipv4 ipConfigurationMode static Setting the IPv4 Preferred Host Name After selecting DHCP as the IPv4 configuration mode you can specify the preferred host name which is optio
2. 224 Snr 225 SIE EE EE 225 Existing User Prolo S e 226 uit 227 Rack Unit Settings of an Asset Sensor uii dietas da ia dua 228 Blade Extension Strip Settings 1 02 3202229 2 M Get ate REYE EE IL RUE CA 229 Command up E 229 History Buffer Longi eec 230 EXAM PICS 230 Configuring the EMX Device and Network nnne 231 Entering the Configuration Modes 2 2 dide dio dae tee 231 Device Gonfigurationi Comtrnands cei ide dii rad Red deed 232 Networking Configuration Command Siseseinte iaeaea 234 Security Configuration ert tne daada 258 Environmental Sensor Configuration Commands 280 Environmental Sensor Threshold Configuration Commands 284 User Configuration Commlarids cure cert deeds 290 Setting Up User Preferences Units of Measure ssessssseseeen 304 Time Configuration COMMANGS is i sae 304 Role Configuration Gommarids 307 Asset Manageme
3. ssssssssssess 30 Connecting Environmental Sensors Optional 33 Connecting Differential Air Pressure 40 Connecting a Logitech Webcam 41 Connecting a Schroff LHX Heat Exchanger Optional 41 Prepare the installation site Make sure the installation area is clean and not exposed to extreme temperatures or humidity Allow sufficient space around the EMX for cabling and asset sensor connections Device Depending on the model you purchased the way to mount an EMX device varies Chapter 2 Installing and Configuring the EMX Device Mounting a Zero U EMX Device This section describes how to mount a Zero U EMX device using L brackets and two buttons gt To mount Zero U models using L brackets and two buttons 1 Align the two edge slots of the L bracket with the two screw holes on the top of the EMX device 2 Screw the L bracket to the device and ensure the bracket is fastened securely 3 Repeat Steps 1 to 2 to screw another L bracket to the bottom of the device 4 After both L brackets are installed on the device you can choose either of the following ways to mount the device in the rack Using rack screws fasten the device to the rack through two identical holes near the edge of each L bracket Raritan
4. dd Connecting Asset Sensors to the Connecting an Asset Sensor to the 111 Connecting an Asset Sensor to the 888 Connecting AMS M2 Z Asset Sensors Gonniecting Blade Extension SIrIpS oec tre ttt rot nae ein Connecting Environmental Sensors Optional About Contact Closure Sensors ce te Eee etre t n eua Connecting Third Party 5 Contact Closure Sensor LEDS s s ide tte aaan Connecting Differential Air Pressure Sensors Connecting a Logitech Webcam Connecting a Schroff LHX Heat Exchanger Optional Chapter 3 Getting Started Supported Web Browsers 5 odere cta Rr Eee da rae re tape e eda Hans COMMECHOMN POL S cssc LGD Display Pall tdt irai TER amp idea tess dee padded Raritan Contents Reset BUTON cic detec eed Gisele Mido eddie ioe ied 50 Co
5. 183 opc ancky 184 Configuring WEDGES canes 185 Configuring Webcam Storage Learner deg Era pde Rente dung LR teats 186 Viewing Webcam Snapshots and Videos sse 187 Taking Viewing and Managing Webcam 188 Sending Videos in an Email or Instant 190 GSM MOJEM S X DL PO U 191 Schroff LHX Heat Exchangers ssssssssssssssseseseeeeeeenne ener 192 Enabling and Disabling Schroff LHX Heat Exchanger 192 Naming a Heat Exchanger 193 Configuring LHX Temperature and Fan Thresholds 194 Monitoring the Heat Exchanger sssssssssssssseseeeenenennne 194 Controlling the Heat Exchanger sssssssssssssesseeeen enne nennen nennen nns 197 PowerLogie PM7 10 S D 198 Configuring the PM710 and Configuring Threshold Settings 199 Resetting the PM710 Minimum and Maximum 199 Clearing the PM710 Energy Accumulators
6. 2 12 2 pendeat Basset a ines De P daa cera 162 Cascading EMX D6VviIC68 iind S an ra HA ERE RR EEL Saline EE La gode 163 Cascading PX2 Devices withia EMX iiid die ien oce o se Pa ER ET EEEA ao A ERA TREE LL a dora 163 SErver ACCESSIDINILY me EM 164 Adding IT Devices for Ping Monitoring iiie ii rient ideae tricis deca te 165 Editing Ping Monitoring Settings iii kid ia aia aiai za duae 167 Deleting Ping Monitoring Settings 168 Checking Server Monitoring States inire rese irent Eqs Eo La Rp dva 168 Configuring the Serial Port bated oae HERRERA erana Fede a acre 169 Environmental SeriSOrs en drea Hedi n ceo La oo eR az RE eed Ia eoa Foo CE Ro Pon e EA 169 Identifying Environmental SensQors REL Isid Quarter ma e de Hd saa 170 Managing Environmental Sensors 3 ctr trt rnnt 171 Configuring Environmental Sersots aniei ania 172 Setting Data LOGIN eee see 176 Viewing SCMSOMD sae 177 Unimanaging Environmental Serisors pere eee tee tt daa 181 Threshold InfOrmialiOEi ecce tent treu deg tenu o ence tnu nee dea Yen nee ore tenaci n ante 182 What is Deassertion Hyst resis reet terere ottenere treten dn 182 Wh atis ASSertiOnt Timeout uii terae etae pk ete aede
7. Setting Up Roles To manage any settings you must log in to the user account with appropriate permissions A role defines the operations and functions a user is permitted to perform or access Every user must be assigned at least a role The EMX is shipped with two built in roles Admin and Operator e The Admin role provides full permissions You can neither modify nor delete this role e Operator role provides limited permissions for frequently used functions You can modify or delete this role By default the Operator role contains these permissions View Event Settings View Local Event Log Change Event Settings Change Own Password Change EMD Configuration e The Operator role is assigned to a newly created user profile by default See Creating a User Profile on page 62 Creating a Role Create a new role when you need a new combination of permissions gt To create a role 1 Choose User Management Roles The Manage Roles dialog appears Tip You can also access the Manage Roles dialog by clicking the Manage Roles button in the Edit User XXX dialog Click New The Create New Role dialog appears Type the role s name in the Role Name field Type a description for the role in the Description field e Click the Privileges tab to assign or multiple permissions 69 70 Chapter 4 User and Role Management 6 Click Add The Add Privileges to new R
8. sse 200 Raritan Contents Chapter 9 Using SNMP 201 e Jm 201 Enabling SNMP it ete 202 Configuring SNMP Notifications i ei eere seb pk Exe 204 SNMPV2C Notifications e 205 Notifications TE 206 Configuring Users for Encrypted SNMP v9 itte ttt re eph arie 208 SNMP Gelts arnd Sels acp dte 209 ST PVG MAX MIB IM 209 Chapter 10 Using the Command Line Interface 212 About the MTC ACCS ecc 212 Logging IM to C 213 With AY POM T Sri D 213 With 214 Different CEI Modes and Prompts 5 5 oie eei eate trie 215 Glosing a Serial CORrlectior eo pa cde ena epa dE xe 215 Restricted Service Agreement 216 Help erotic 218 SHOWING nene 218 Network GonfiQuration te eire Recte setae e xax Ere aque E 219 Asset Sensor Settings oo hee ip estes deri er NNA 221 Environmental Sensor Information iran extr tne eene seres Eo a Saa uade 222 Environmental Sensor Threshold Information sss 224 SHOW
9. Asset Sensor Management An asset sensor management configuration command begins with assetStrip Naming an Asset Sensor This command syntax names or changes the name of an asset sensor connected to the EMX device config assetStrip lt n gt name lt name gt Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e name is a string comprising up to 32 ASCII printable characters The name variable must be enclosed in quotes when it contains spaces Example This command syntax names or changes the name of an asset sensor connected to the EMX device config i assetStrip 1 name Red Rack Specifying the Number of Rack Units This command syntax specifies the total number of rack units on an asset sensor connected to the EMX device config assetStrip lt n gt numberOfRackUnits lt number gt Note For the Raritan asset sensor a rack unit refers to a tag port Variables n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e numbers is the total number of rack units available on the connected asset sensor This value ranges from 8 to 64 313 Chapter 10 Using the Command Line Interface Example The following command specifies the total number of
10. Device gt connect asset sensors to the EMX 888 device 1 Affix the adhesive end of an asset tag to each IT device through the tag s tape 2 Plug the connector on the other end of each asset tag into the corresponding tag port on the asset sensor 3 Connect one end of a Cat5e 6 cable to the RJ 45 connector on the MASTER asset sensor and then connect the other end of the cable into a FEATURE port on the EMX 888 4 f needed repeat the above steps to connect additional asset sensors to the rest of FEATURE ports 5 Configure the asset sensor See Configuring the Asset Sensor on page 330 Connecting AMS M2 Z Asset Sensors Optional The AMS M2 Z is a special type of asset sensor that functions the same as regular MASTER asset sensors with the following differences e t provides two RJ 45 connectors e Multiple AMS M2 Z asset sensors can be daisy chained e Only two tag ports are available on each AMS M2 Z so only two asset tags can be connected This product is especially useful for tracking large devices such as SAN boxes in the cabinet Item Description A RJ 45 connectors B Tag ports gt To connect the AMS M2 Z asset sensors to the EMX 1 Connect the AMS M2 Z to the EMX via a Category 5e 6 cable a Connect one end of the cable to the RJ 45 port labeled Input on the AMS M2 Z Raritan b Chapter 2 Installing and Configuring the EMX Device Connect the other end of the cable to the FEATU
11. lt setting 1 gt lt value 1 gt lt setting 2 gt lt value 2 gt lt setting 3 gt lt value 3 gt Example 1 Combination of IP Subnet Mask and Gateway Parameters The following multi command syntax configures IPv4 address subnet mask and gateway for the network connectivity simultaneously config network ipv4 ipAddress 192 168 84 225 subnetMask 255 255 255 0 gateway 192 168 84 0 Results e The IP address is set to 192 168 84 225 e he subnet mask is set to 255 255 255 0 e The gateway is set to 192 168 84 0 Raritan Chapter 10 Using the Command Line Interface Example 2 Combination of SSID and PSK Parameters This multi command syntax configures both of SSID and PSK parameters simultaneously for the wireless feature config network wireless SSID myssid PSK encryp key Results e The SSID value is set to myssid e The PSK value is set to encryp key Quitting the Configuration Mode Both of apply and cancel commands let you quit the configuration mode The difference is that apply saves all changes you made in the configuration mode while cancel aborts all changes gt To quit the configuration mode use either command config apply OR config cancel The prompt appears after pressing Enter indicating that you have entered the administrator mode Unblocking a User If any user is blocked from accessing the EMX you can unblock them at the local console gt To unbl
12. 4 Inthe Port fields enter the port number used to access the device s 5 Inthe Community fields enter the SNMP community string to access the device s The community is the group representing the EMX and all SNMP management stations gt send SNMP v3 notifications 1 From the Notification Type drop down select SNMP v3 Trap or SNMP v3 Inform For SNMP TRAPs the engine ID is prepopulated For SNMP INFORM communications leave the resend settings at their default or a Inthe Timeout sec field enter the interval of time in seconds after which a new inform communication is resent if the first is not received For example resend a new inform communication once every 3 seconds b In the Number of Retries field enter the number of times you want to resend the inform communication if it fails For example inform communications are resent up to 5 times when the initial communication fails 4 Forboth SNMP TRAPS and INFORMS enter the following as needed and then click OK to apply the settings a Host name b Port number User ID needed to access the host d Select the host security level ii Raritan Z Raritan Chapter 7 Event Rules Event Actions and Application Logs Security level Description noAuthNoPriv Select this if no authorization or privacy protocols are needed e Click OK authNoPriv Select this if authorization is required but no privacy protocols are required e Sel
13. General Members Member OF Managed By Members Active Directory Folder fiemxuser2 techadssi com Users techadssl com ServicesApps rariten 355 356 Appendix LDAP Configuration Illustration Step C Configure LDAP Authentication on the EMX Device You must enable and set up LDAP authentication properly on the EMX device to use external authentication In the illustration we assume The DNS server settings have been configured properly See Modifying the Network Settings on page 80 and Role of a DNS Server on page 84 The AD server s domain name is techadssl com and its IP address is 192 168 56 3 The AD protocol is NOT encrypted over SSL The AD server uses the default TCP port 389 Anonymous bind is used To configure LDAP authentication Choose Device Settings gt Security gt Authentication The Authentication Settings dialog appears Select the LDAP radio button to activate remote LDAP LDAPS server authentication Click New to add an LDAP LDAPS server for authentication The Create new LDAP Server Configuration dialog appears Provide the EMX with the information about the AD server IP Address Hostname Type the domain name techadssl comorIP address 192 168 56 3 Important Without the SSL encryption enabled you can type either the domain name or IP address in this field but you must type the fully qualified domain name if the SSL encryption is enabled Use set
14. The shortcut menu functions are defined by the browser For example the Back command on the Internet Explorer IE shortcut menu works the same as the Back button in the IE browser Both of these functions take you to the previous page For information on each shortcut menu command or item see the online help or documentation accompanying your web browser Below is the illustration of the IE browser s shortcut menu Available menu commands or items may slightly differ based on your web browser version Back Select All Create Shortcut Add to Favorites View Source Encoding Print Refresh Append to Existing PDF Convert to Adobe PDF Export to Microsoft Excel Properties Raritan Chapter 3 Getting Started Viewing the Dashboard zie Raritan When you log in to the web interface the Dashboard page is displayed by default This page provides an overview of the EMX device s status The page is divided into several sections according to connected equipment such as asset sensors and environmental sensors Double clicking any item on the Dashboard page opens the data page specific to the selected item Note If a sensor reading row is colored it means the sensor reading already crosses one of the thresholds or at least one LHX built in sensor fails on the heat exchanger See Readings Highlighted in Yellow or Red EMX see Readings Highlighted in Yellow or Red on page 58 Afte
15. sse enm eren 100 Rebooting the EMX CM TR 102 Resetting to Factory Defaults 102 Chapter 6 Security 104 Acess Security ae ide aE a aE EEEE 104 Forcing HAT TPSEnDCEVDLIOR cde anaa oen Er ota denn AEE 104 Configuring the Firewall tt tren uie eE EEEE 105 Setting Up User Login GORILEOIlS 2 actor onere ea tnr uta En pag kh tnter a EL sees 110 Setting Up Role Based Access Control Rules sse 113 Setting Up am SSL Certificate remo tet te eter pt exero etg Fo edes aeta ELE cues 118 Certificate Signing 07 118 Creating a Self Signed GCertifiCate sents 120 Installing Existing Key and Certificate 122 Downloading Key and Certificate 122 Setting Up LDAP AuthientiCaliOh et tete tar tette Ee tene trend 123 Gathering the LDAP Information tute ret ehh re eta rine rro atk 123 Adding the LDAP Server Settings sse 124 Sorting the LDAP Access Order eene nennen nennen nes 127 Testing the LDAP Server Connection sse eene 127 Editing the LDAP Server Settings sss eene 127 Deleting the LDAP Server Settings sssssssssseee eene 128 Disabling the LDA
16. 2 When the mouse pointer turns into a two way arrow drag the border horizontally to widen or shrink the pane Warning Icon If the value you entered in a specific field is invalid a red warning icon appears to the right and the field in question is surrounded by a red frame as shown in this illustration el D When this occurs position your mouse pointer over the warning icon to view the reason and modify the entered value accordingly zie Raritan M Chapter 3 Getting Started Readings Highlighted in Yellow or Red When a numeric sensor s reading crosses any upper or lower threshold the background color of the whole row turns to yellow or red for alerting users For a discrete on off sensor the row changes the background color when the sensor enters the abnormal state Note Numeric sensors use numeric values to indicate the environmental or internal conditions while discrete on off sensors use alphabetical characters only to indicate the state changes See the table for the meaning of each color Color State White The background is white in one of the following scenarios e For a numeric sensor no thresholds have been enabled e f any thresholds have been enabled for a numeric sensor the sensor reading is between the lower and upper warning thresholds e For a discrete on off sensor the sensor state is normal e The sensor reading or state is unavailable Yellow The reading drops
17. Edit the information as needed Changes to the resolution do not apply to existing stored images it applies only to images and videos taken after the resolution is changed 5 Click OK zie Raritan Chapter 8 Managing External Devices 186 Configuring Webcam Storage By default when a snapshot is taken using the Store Snapshot to Webcam Storage feature it is stored locally on the EMX Up to ten 10 images can be stored on the EMX at once To save more than 10 snapshots save the images on a Common Internet File System Samba Note NFS and FTP are not supported for this release and are disabled on the dialog gt To configure another storage location for images 1 Inthe navigation tree click Snapshot under the Webcam Management folder The Snapshots page opens 2 Click on the Setup Storage icon The Storage Setup dialog opens 3 By default Local meaning the EMX is the designated default storage Select CIFS Samba as the storage location Enter the server on which to store the images If needed enter the share drive folder to store the images in b 00r oe Enter the username and password needed to access the server the images are stored on 8 Enter or use the slide bar to set the number of images that can be saved to the storage location 9 Click OK Raritan Chapter 8 Managing External Devices Viewing Webcam Snapshots and Videos By default once a webcam is attac
18. IP Mask 1 192 168 80 80 32 2 192 255 255 255 24 3 192 155 123 123 32 Delete 6 Click OK to save the changes The rules are applied E Raritan Chapter 6 Security Editing Firewall Rules When an existing firewall rule requires updates of IP address range and or policy modify them accordingly gt 1 ss To modify a firewall rule Choose Device Settings gt Security gt IP Access Control The Configure IP Access Control Settings dialog appears To modify the IPv4 firewall rules click the IPv4 tab To modify the IPv6 firewall rules click the IPv6 tab Ensure the Enable IPv4 Access Control checkbox is selected on the IPv4 tab or the Enable IPv6 Access Control checkbox is selected on the IPv6 tab Select the rule to be modified in the rules list Click Edit or double click the rule The Edit Rule dialog appears Make changes to the information shown Click OK to save the changes Click OK to quit the Configure IP Access Control Settings dialog or the changes are lost Sorting Firewall Rules The rule order determines which one of the rules matching the same IP address is performed 1 Z Raritan To sort the firewall rules Choose Device Settings gt Security gt IP Access Control The Configure IP Access Control Settings dialog appears To sort the IPv4 firewall rules click the IPv4 tab To sort the IPv6 firewall rules click the IPv6 tab Ensure the
19. cbe eei rina lada co riae 43 Conneccion 2 Ek oa IE FH FAIR E dua 43 LGD Display Panel gite tice eat rere Dh ade 45 Reset ia ra EROR EAD Ria I SENATE Rea D Ula UXORI 50 Contact Closure Sensor Termination 51 Power SWIICITS UE 51 B e 51 52 Changing Your Password ied 53 Introduction to the Web Interface 54 Viewing the Dashboard rn rhet dnt 61 Supported Web Browsers The following web browsers can be used to access the EMX web interface Google Chrome 12 e Internet Explorer 8 and 9 e Firefox 10 e Safari 5 1 MacOS Lion e Konqueror The following smart phone browsers are supported e Safari on iOS 5 01 e Dolphin 3 2 1 Connection Ports Depending on the model you purchased the total number of ports available varies The table below explains the function of each port Port Used for USB B Establishing a USB connection between a computer and the EMX device This port can be used for disaster recovery of the EMX device Contact Raritan Technical Support for instructions USB A Conn
20. rackUnit lt n gt lt rack_unit gt LEDMode lt mode gt Variables e lt gt the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e rack unit is the index number of the desired rack unit The index number of each rack unit is available on the Asset Strip page of the web interface e mode is one of the LED modes on off blinkSlow or blinkFast Mode Description on This mode has the LED stay lit permanently off This mode has the LED stay off permanently blinkSlow This mode has the LED blink slowly blinkFast This mode has the LED blink quickly Example The following command causes the LED of the rack unit whose index number is 25 on the asset sensor 1 to blink quickly config f rackUnit 1 25 LEDMode blinkFast zie Raritan i Chapter 10 Using the Command Line Interface Setting the History Buffer Length This command syntax changes the history buffer length The default length is 25 config history length lt n gt Variables e lt gt is an integer number between 1 and 250 e f you leave the n variable blank when using the command the history buffer is set to 25 by default Multi Command Syntax To shorten the configuration time you can combine various configuration commands in one command and perform all of them at a time A multi command syntax looks like this
21. 3 4 M GND 6 1 wire RS 485 Port Pinouts RS 485 Pin signal definition Pin No Signal Direction 1 _ 2 u Description Data Receive data data in Transmit data Data terminal ready Signal ground Data set ready Request to send Clear to send Ring indicator Description Power 500mA fuse protected Signal Ground Signal Ground Used for Feature Port Description Raritan Appendix Specifications RS 485 Pin signal definition 3 D bi Data directional 4 D bi Data directional 7 F2 8 M Sis Raritan Appendix Step A Determine Z Raritan LDAP Configuration Illustration This section provides an LDAP example for illustrating the configuration procedure using Microsoft Active Directory AD To configure LDAP authentication four main steps are required a Determine user accounts and groups intended for the EMX b Create user groups for the EMX on the AD server c Configure LDAP authentication on the EMX device d Configure roles on the EMX device In This Chapter Step A Determine User Accounts and Groups 354 Step B Configure User Groups on the AD Server 355 Step C Configure LDAP Authentication on the EMX Device 356 Step D Configure User Groups on the EMX Device 358 User Accounts and Groups Determine the
22. 33 4 Chapter 2 Installing and Configuring the Device Note If you are using a 12V Feature Port X Cable to connect an asset management sensor AMS to the EMX 111 the SENSOR port on the device is already being used Plug the other end of the Raritan provided phone cable into the Sensor connector on the 12V Feature Port X Cable instead of the SENSOR port on the EMX 111 2 Connect Raritan environmental sensors to any of the four OUT ports on the hub Raritan sensor hubs CANNOT be cascaded so at most a sensor hub can be connected to each SENSOR port on the EMX device This diagram illustrates a configuration with a sensor hub connected The EMX device Raritan provided phone cable Raritan PX sensor hub Raritan environmental sensors 60020 If there are any Raritan air flow sensors attached make sure that sensor faces the source of the wind such as a fan in the appropriate orientation as indicated by the arrow on that sensor 4 Configure the environmental sensor See Configuring Environmental Sensors on page 172 Raritan Chapter 2 Installing and Configuring the Device About Contact Closure Sensors Raritan s contact closure sensor DPX CC2 TR can detect the open and closed status of the connected detectors switches This feature requires the integration of at least a discrete on off detector switch to work properly The types of discrete detectors switches that can be plugged
23. Chapter 5 Device Management Rebooting the EMX You can remotely reboot the EMX device via the web interface Rebooting the EMX does not reset the configuration of the device as is done during a factory reset Note Rebooting the EMX deletes the snapshots taken via webcam gt To reboot the device 1 Choose Maintenance gt Unit Reset The Reset Device dialog appears Reset Device f x Do you really want to reset the device Yes No Click Yes to reset the EMX Amessage appears with a countdown timer showing the remaining time of the operation It takes about one minute to complete 4 When the reset is complete the Login page opens Now you can log back in to the EMX device Note If you are not redirected to the Login page after the reset is complete click the underlined text this link in the message Resetting to Factory Defaults 102 For security reasons the EMX device can be reset to factory defaults only at the local console Important Exercise caution before resetting the EMX to its factory defaults This erases existing information and customized settings such as user profiles threshold values and so on You can use either the reset button or the command line interface CLI to reset the EMX P To reset to factory defaults using the reset button 1 Connect a computer to the EMX device See Connecting the EMX to a Computer on page 12 Raritan Chapter
24. Warning Do NOT power off the EMX device during the update During the firmware update A progress bar appears in the web interface indicating the update status No users can successfully log in to the EMX In the web interface all logged in users see the EMX time out message and the disconnected state is shown in the status bar The user management operation if any is forced to suspend 7 When the update is complete a message appears indicating the update is successful 8 The EMX device resets and the Login page re appears You can now log in and resume your operation Note 1 The other logged in users are also logged out when the firmware update is complete Note 2 If you are using the EMX with an SNMP manager download the EMX MIB again after the firmware update to ensure your SNMP manager has the correct MIB for the latest release you are using See Using SNMP in the EMX User Guide Viewing Firmware Update History The firmware upgrade history if available is permanently stored on the EMX device This history indicates when a firmware upgrade event occurred the prior and new versions associated with the firmware upgrade event and the upgrade result gt To view the firmware update history 1 Choose Maintenance gt View Firmware Update History The Firmware Update History dialog appears with the following information displayed Date and time of the firmware upgrade event P
25. config security loginLimits singleLogin disable Password Aging This command syntax enables or disables the password aging feature which controls whether the password should be changed at a regular interval config security loginLimits passwordAging lt option gt Variables e lt option gt is one of the options enable or disable Option Description enable Enables the password aging feature disable Disables the password aging feature Example The following command enables the password aging feature config f security loginLimits passwordAging enable 267 Chapter 10 Using the Command Line Interface Password Aging Interval This command syntax determines how often the password should be changed config security loginLimits passwordAgingInterval lt value gt Variables e value is a numeric value in days set for the password aging interval The interval ranges from 7 to 365 days Example The following command sets the password again interval to 90 days config f security loginLimits passwordAgingInterval 90 Idle Timeout This command syntax determines how long a user can remain idle before that user is forced to log out of the EMX web interface config security loginLimits idleTimeout lt value gt Variables e lt value gt is a numeric value in minutes set for the idle timeout The timeout ranges from 1 to 1440 minutes 24 hours Example The following command set
26. role create lt name gt lt privilegel gt lt privilege2 gt lt privilege3 gt If a specific privilege contains any arguments that privilege should be followed by a colon and the argument s config i role create name privilegel argumentl argument2 lt privilege2 gt lt argument1 gt lt argument2 gt lt privilege3 gt lt argument1l gt lt argument2 gt Variables e name is a string comprising up to 32 ASCII printable characters e privilegel lt privilege2 gt lt privilege3 gt and the like are names of the privileges assigned to the role Separate each privilege with a semi colon See All Privileges on page 307 e lt argumenti gt lt argument2 gt and the like are arguments set for a particular privilege Separate a privilege and its argument s with a colon and separate arguments with a comma if there are more than one argument for a privilege All Privileges This table lists all privileges Privilege Description adminPrivilege Administrator Privileges zie Raritan d Chapter 10 Using the Command Line Interface Privilege changeAssetStripConfiguration changeAuthSettings changeDataTimeSettings changeEmdConfiguration changeEventSetup changeExternalSensorsConfiguratio n changeLhxConfiguration changeNetworkSettings changePassword changeSecuritySettings changeSnmpSettings changeUserSettings changeWebcamSettings clearLog firmwareUpdate perfor
27. Creating a User Profile 51 62 66 67 69 70 75 91 208 290 Creating Actions 135 136 191 Creating an Event Rule 132 198 Creating Firewall Rules 105 106 Creating Role Based Access Control Rules 113 115 Creating Rules 132 D Data Pane 57 Default Log Messages 129 139 148 Deleting a Firewall Rule 265 Deleting a Role 71 311 364 Deleting a Role Based Access Control Rule 280 Deleting a User Profile 66 303 Deleting an Event Rule or Action 158 Deleting Firewall Rules 110 Deleting Ping Monitoring Settings 168 Deleting Role Based Access Control Rules 117 Deleting the LDAP Server Settings 128 Describing the Sensor Location 173 175 Determining How to Display Tree Items 76 77 Determining the SSH Authentication Method 255 302 Determining the Time Setup Method 305 Device Configuration Commands 232 Device States and Icon Variations 78 196 198 Diagnostic Commands 323 Different CLI Modes and Prompts 214 215 218 231 Disabling the LDAP Authentication 128 Displaying the Device Information 73 Downloading Diagnostic Information 100 Downloading Key and Certificate Files 122 Downloading SNMP MIB 203 204 205 207 209 E Editing Firewall Rules 109 Editing Ping Monitoring Settings 167 Editing Role Based Access Control Rules 116 Editing the LDAP Server Settings 127 Email and SMS Message Place
28. Enlarge the dialog if necessary You can re sort the list or change the columns displayed AL 2027 Or S OO Click Close to quit the dialog bis S Raritan Chapter 8 Overview Z Raritan Managing External Devices In This Chapter OVOV EW daenna eatea aeae aae ii 161 EMX and PX2 PDU Cascading Connections 162 server Accessibility ARR m 164 Configuring the Serial Port edd eate reae eain cine 169 Environmental Sensors 4 3 231 Eten 169 oc 184 GSM Modeltris io e ea ER dE c eerte aide sra 191 Schroff LHX Heat Exchangers des 192 PowerLogio PMI 1O E 198 The EMX provides you with ability to monitor devices and conditions in your data center such as the status of servers environmental conditions and so on using third party sensors and devices You are also able to use a webcam to view data center activity and a GSM modem to send SMS messages when a specific event occurs 161 Chapter 8 Managing External Devices EMX and PX2 PDU Cascading Connections Up to four 4 devices are supported as part of a daisy chain Specifically a EMX can have up to three 3 additional EMXs connected to it or up to three 3 PX2 devices connected to it Note For help on setting up and configuring PX2 devices see the PX2 Help for additiona
29. Numeric Sensor gt Below lower critical threshold External Sensor Slot gt gt State Sensor gt Unavailable External Sensor Slot gt gt State Sensor gt Closed External Sensor Slot gt gt State Sensor gt On External Sensor Slot gt gt State Sensor gt Alarmed 150 Default Assertion Message when the Event TRUE USERIP logged in Authentication failed for user USERNAME from host USERIP User USERNAME from host F USERIP was blocked Session of user USERNAME from host USERIP timed out Sensor OCPSENSOR on overcurrent protector OCP unavailable External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOT unavailable External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOT asserted above upper critical External sensor EXTSENSORNAME in slot EXTSENSORSLOT asserted above upper warning External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOT asserted below lower warning External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOTT asserted below lower critical External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOT unavailable External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOTT is closed External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOT is on External sensor EXTSENSORNAMEJ in slot EXTSENSORSLOT is Default Assertion Message when the Event FALSE USERIP logged out
30. Raritan 1M TIT URN Copyright O 2012 Raritan Inc EMX 0D v2 2 0 E September 2012 255 80 6107 00 This document contains proprietary information that is protected by copyright All rights reserved No part of this document may be photocopied reproduced or translated into another language without express prior written consent of Raritan Inc Copyright 2012 Raritan Inc All third party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders FCC Information This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a commercial installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications Operation of this equipment in a residential environment may cause harmful interference VCCI Information Japan COXIBI HRLBRES SRRSAERMHBMS VCCI ESC TFAZAMRRHRECT RE CATS CBR MEENSRCFCEPHVET COMPILERS DSU XS IE SBLIBKENSCEPHVET Raritan is not responsible for damage to this product resulting from accident disaster misuse abuse non Raritan modification of the product or other events outside of Raritan s reas
31. Security gt Role Based Access Control The Configure Role Based Access Control Settings dialog appears 113 Chapter 6 Security 2 To enable the IPv4 firewall click the IPv4 tab and select the Enable Role Based Access Control for IPv4 checkbox 3 To enable the IPv6 firewall click the IPv6 tab and select the Enable Role Based Access Control for IPv6 checkbox 4 Click OK to save the changes Changing the Default Policy The default policy is to accept all traffic from all IP addresses regardless of the role applied to the user gt change the default policy 1 Choose Device Settings Security Role Based Access Control The Configure Role Based Access Control Settings dialog appears 2 To determine the default policy for IPv4 addresses a Click the IPv4 tab if necessary b Ensure the Enable Role Based Access Control for IPv4 checkbox is selected c Select the action you want from the Default Policy drop down list Allow Accepts traffic from all IPv4 addresses regardless of the user s role Deny Drops traffic from all IPv4 addresses regardless of the user s role 3 To determine the default policy for IPv6 addresses a Click the IPv6 tab b Ensure the Enable Role Based Access Control for IPv6 checkbox is selected Select the action you want from the Default Policy drop down list Allow Accepts traffic from all IPv6 addresses regardless of the user s role Deny Drops tra
32. Settlfigs eaaet nettement reae reet Eu nacer tanen EL kn vee 84 Configuring the SNMP Settings Traps and Informs ssssssssseee 85 Ghanging the SSH Setting et eden Po sente 90 Raritan Contents Changing the Telnet Settings ELE Ee Duque ag E 91 Enabling Service Advertisement miiia nda deseri aa Fra 92 Configuring the SMTP Settings ied need cil Gees riera 92 Setting Up an EMX Using Bulk Configuration aeania 94 Saving EMX GombiQuration cus oriente teen ret ete nie pe toan 95 Gopying a EMX GCOnfIgulaltiQlsscce a tenter i aaa 96 Backup and Restore the EMX Device Settings essent 96 97 Updating the eet Ente 97 Viewing Firmware Update HIStory ront et init tit nuns 98 Full Disastor ROCOVEN 99 Updating the Asset Sensor Fir Ware ciento ten itte oda etin en 99 Network Didono STE 99 AALA OSL KOE A O T ae ae 100 Tracing the Network tt tr tr EN 100 6 100 Downloading Diagnostic Information
33. The 5th rack 283 Chapter 10 Using the Command Line Interface 284 Changing the Sensor Description This command syntax provides a description for a specific environmental sensor config externalsensor lt n gt description lt description gt Variables n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e description is a string comprising up to 64 ASCII printable characters and it must be enclosed in quotes Example The following command gives the description humidity detection to the environmental sensor with the ID number 4 config i externalsensor 4 description humidity detection Environmental Sensor Threshold Configuration Commands A sensor threshold configuration command for environmental sensors begins with sensor externalsensor Setting the Sensor s Upper Critical Threshold This command syntax configures the Upper Critical threshold of a numeric environmental sensor Raritan Chapter 10 Using the Command Line Interface config sensor externalsensor lt n gt lt sensor type gt upperCritical lt option gt Variables n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e lt sensor type is one of these sensor types te
34. The Setup of Asset Strip dialog appears Enter a name of the asset sensor Type the total number of rack units the selected asset sensor has in the Number of Rack Units field This field shows 48 by default Determine how to number all rack units on the asset sensor by selecting an option in the Numbering Mode Top Down The rack units are numbered in the ascending order from the highest to the lowest rack unit Bottom Up The rack units are numbered in the descending order from the highest to the lowest rack unit Raritan strongly suggests you select Bottom Up as the numbering for the rack units because dcTrack numbers rack units from the bottom up where rack units are numbered in the descending order from the highest to the lowest rack unit For example the top rack unit may be 48 and the bottom rack unit is 1 The EMX allows you to number racks from the top down ascending order from the highest to the lowest rack unit or from the bottom up In the Numbering Offset field select the starting number For example if you select 3 the first rack unit is numbered 3 the second is numbered 4 the third is numbered 5 and so on until the final number Indicate how the asset sensor is mounted in the rack in the Orientation field The rack unit that is most close to the RJ 45 connector of the asset sensor will be marked with the index number 1 in the web interface For the latest version of asset sensors with a built i
35. User idle timeout 10 minutes Strong passwords Disabled Enforce HTTPS for web access Ves H Configuring the EMX Device and Network zie Raritan To configure the EMX device or network settings through the CLI you must log in as the administrator Entering the Configuration Mode You must enter the configuration mode since configuration commands function in the configuration mode only gt enter the configuration mode 1 Ensure you have entered the administrator mode and the prompt is displayed Note If you enter the configuration mode from the user mode you may have limited permissions to make configuration changes See Different CLI Modes and Prompts on page 215 2 Type config and press Enter The config prompt appears indicating that you have entered the configuration mode 19 _ 3 Now you can type any configuration command and press Enter to change the settings Important To apply new configuration settings you must issue the apply command before closing the terminal emulation program Closing the program does not save any configuration changes See 231 Chapter 10 Using the Command Line Interface 232 Quitting the Configuration Mode on page 321 Device Configuration Commands A device configuration command begins with emd You can use the device configuration commands to change the settings that apply to the whole EMX device The commands are case sensitive so en
36. where number is a sequential number based on how many actions are already created 5 Inthe Action field click the drop down arrow and select the desired action from the list 6 Click OK to save the new action 7 Click Close to quit the dialog Send a Snapshot via Email This option notifies one or multiple persons of the selected events by emailing snapshots or videos captured by a connected Logitech webcam gt create a send snapshot via email action 1 Choose Device Settings Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Action name field type a new name for the action The default name is New Action numbers where number is a sequential number based on how many actions are already created 5 Inthe Action field click the drop down arrow and select the desired action from the list 6 Inthe Recipients email addresses field specify the email address es of the recipient s Use a comma to separate multiple email addresses 7 Touse the SMTP server specified in the SMTP Server Settings dialog select the Use Default SMTP Server checkbox 8 To use a different SMTP server select the Use Custom SMTP Settings checkbox If the SMTP server settings are not configured yet click Configure See Configuring the SMTP Settings on page 92 for the information of each field 9 Select the webcam that is capturing the images you want sent in the email
37. 5 Device Management 2 Launch a terminal emulation program such as HyperTerminal Kermit or PUTTY and open a window on the EMX 3 Press and release the Reset button of the EMX device while pressing the Esc key of the keyboard several times in rapid succession A prompt gt should appear after about one second Type defaults to reset the EMX to its factory defaults Wait until the Username prompt appears indicating the reset is complete Note HyperTerminal is available on Windows operating systems prior to Windows Vista For Windows Vista or later versions you may use PuTTY which is a free program you can download from the Internet See PuTTY s documentation for details on configuration zie Raritan us Chapter 6 Security In This Chapter Access Security Gontrol iii i ciae tinere talea co Erste sd ess 104 Setting Up an SSL Gertificate iic id dans 118 Setting Up LDAP Authentication 123 Enabling and Editing the Security Banner Restrictive Service Agreement E 129 Access Security Control zie Raritan The EMX provides tools to control access You can require HTTPS encryption enable the internal firewall and create firewall rules and create login limitations Tip You can also create and install the certificate or set up external authentication servers to control any access See Setting Up an SSL Certificate on page 118
38. Action to create a new action See Creating Actions on page 136 for details on creating an action To add additional actions repeat Step 7 Remove actions by selecting them in the Selected Actions box and clicking the Remove arrow 2 Click Save to save the new event rule Note If you do not click Save before quitting the current settings page a message appears Then click Yes to save the changes Discard to abort the changes or Cancel to return to the current settings page 3 Repeat Steps 2 to 10 to create additional event rules 4 Click Close to quit the dialog Note Asset management sensor event rules must be recreated after an EMX firmware upgrade Raritan 136 Chapter 7 Event Rules Event Actions and Application Logs Creating Actions The EMX comes with two built in actions e System Event Log Action This action records the selected event in the internal log when the event occurs e System SNMP Notification Action This action sends SNMP notifications to one or multiple IP addresses after the selected event occurs Note No IP addresses are specified for the System SNMP Notification Action by default so you must specify IP addresses before applying this action to any event rule The default actions cannot be deleted SNMP traps and informs can be created for an action See Configuring the SNMP Settings Traps and Informs on page 85 for more information on traps and informs Executing a
39. Assertion Message when Default Assertion Message the Event TRUE when the Event FALSE Power Logic Device gt gt Sensor PLSENSORNAME on Power Sensor PLSENSORNAME Sensor gt gt Below lower Logic Device at PORTTYPE port Power Logic Device at critical threshold PORTID asserted below lower PORTTYPE port PORTIDJ critical at SENSORREADING deasserted below lower critical at SENSORREADINGUNIT SENSORREADING SENSORREADINGUNIT User Activity gt gt User User USERNAME from host User USERNAME from host accepted the Restricted Service USERIP accepted the Restricted USERIP declined the Restricted Agreement Service Agreement Service Agreement Note Not set for trigger events see ASSERTION ctx Sample Event Rules Sample Asset Management Level Event Rule In this example we want the EMX to record in the internal log when an asset sensor network link goes up or down The sample event rule looks like this e Event Device gt Network interface link state is up e Trigger condition Both e Actions System Event Log Action gt To create the above event rule 1 Enter a name for the rule Select the Enabled checkbox to enable the rule From the Event drop down select Device gt Network interface link state is up These selections indicate we are specifying an event regarding asset sensor management and we want the EMX to respond to the event related to physical
40. At the Password prompt type raritan and press Enter You are prompted to change the password if this is the first time you log in to the EMX Follow the onscreen instructions to type your new password The prompt appears when you log in successfully Type config and press Enter To configure network settings type appropriate commands and press Enter All commands are case sensitive a To set the networking mode type this command network mode mode where mode is either wired for wired connection default or wireless for wireless connection 15 Chapter 2 Installing and Configuring the Device b For the wired network mode you may configure the LAN interface settings In most scenarios the default setting auto works well and should not be changed unless required To set Use this command LAN interface network interface speed LANInterfaceSpeed option where option is auto 10Mbps or 100Mbps LAN interface network interface duplex mode LANInterfaceDuplexMod mode where mode is half full or auto Tip You can combine multiple commands to configure multiple parameters at a time For example network interface LANInterfaceSpeed option LANInterfaceDuplexMode mode c Forthe wireless network mode you must configure the Service Set Identifier SSID parameter To set Use this command SSID network wireless SSID ssid where ssid is the SSID string If n
41. Chapter 10 Using the Command Line Interface Setting the IPv4 Gateway After selecting the static IP configuration mode you can use this command syntax to specify the gateway config i network ipv4 gateway ip address Variables e ip address is the IP address of the gateway The value ranges from 0 0 0 0 to 255 255 255 255 Example The following command sets the IPv4 gateway to 255 255 255 0 config i network ipv4 gateway 255 255 255 0 Setting the IPv4 Primary DNS Server After selecting the static IP configuration mode you can use this command syntax to specify the primary DNS server config f network ipv4 primaryDNSServer ip address gt Variables e ip address is the IP address of the primary DNS server The value ranges from 0 0 0 0 to 255 255 255 255 Example The following command determines that the primary DNS server is 192 168 84 30 config f network ipv4 primaryDNSServer 192 168 84 30 zie Raritan id Chapter 10 Using the Command Line Interface 246 Setting the IPv4 Secondary DNS Server After selecting the static IP configuration mode you can use this command syntax to specify the secondary DNS server config network ipv4 secondaryDNSServer lt ip address gt Variables e ip address gt is the IP address of the secondary DNS server The value ranges from 0 0 0 0 to 255 255 255 255 Note The EMX supports a maximum of 3 DNS servers If two IPv4 DNS servers and two IPv6
42. Character Requirement This command syntax determines whether a strong password includes at least a lowercase character config security strongPasswords enforceAtLeastOneLowerCaseCharacter lt option gt Variables e option is one of the options enable or disable Option Description enable At least one lowercase character is required disable No lowercase character is required Example This command syntax determines that a password must include at least a lowercase character config i security strongPasswords enforceAtLeastOneLowerCaseCharacter enable Uppercase Character Requirement This command syntax determines whether a strong password includes at least a uppercase character zie Raritan ad Chapter 10 Using the Command Line Interface config security strongPasswords enforceAtLeastOneUpperCaseCharacter lt option gt Variables e lt option gt is one of the options enable or disable Option Description enable At least one uppercase character is required disable No uppercase character is required Example This command determines a password must comprise at least one uppercase character config i security strongPasswords enforceAtLeastOneUpperCaseCharacter enable Numeric Character Requirement This command syntax determines whether a strong password includes at least a numeric character config i security strongPasswords enforceAtLeastOneNumericCharacter option Varia
43. Connection 127 Testing the Network Connectivity 325 The EMX MIB 209 Threshold Information 182 211 Time Configuration Commands 304 Tracing the Network Route 100 Tracing the Route 326 U Unblocking a User 110 321 Unmanaging Environmental Sensors 172 181 Updating the Asset Sensor Firmware 99 Updating the Firmware 97 Uppercase Character Requirement 271 User and Role Management 62 User Blocking 268 User Configuration Commands 290 Using Raritan Asset Management Sensors with the EMX 329 Using SNMP 201 Using the Command Line Interface 84 175 212 328 V Viewing Connected Users 68 Viewing Details 195 Viewing Firmware Update History 98 Viewing Sensor Data 177 Viewing the Communication Log 160 Viewing the Dashboard 61 Viewing the Local Event Log 159 Viewing the Summary 195 Viewing Webcam Snapshots and Videos 187 Warning Icon 57 Webcams iii v 41 184 What is Assertion Timeout 173 183 290 What is Deassertion Hysteresis 158 173 182 194 289 What s New in EMX Help iii Raritan Index Wired Network Settings 78 Wireless Configuration 220 Wireless Network Settings 79 With HyperTerminal 213 321 With SSH or Telnet 214 Sis Raritan 36 Raritan gt U S Canada Latin America Monday Friday 8 a m 6 p m ET Phone 800 724 8090 or 732 764 8886 For Command
44. Enable IPv4 Access Control checkbox is selected on the IPv4 tab or the Enable IPv6 Access Control checkbox is selected on the IPv6 tab Select a specific rule by clicking it Click lor to move the selected rule or down until it reaches the desired location Click OK to save the changes 109 110 Chapter 6 Security Deleting Firewall Rules When any firewall rules become obsolete or unnecessary remove them from the rules list gt delete a firewall rule 1 Choose Device Settings gt Security gt IP Access Control The Configure IP Access Control Settings dialog appears 2 delete the IPv4 firewall rules click the IPv4 tab To delete the IPv6 firewall rules click the IPv6 tab 3 Ensure the Enable IPv4 Access Control checkbox is selected on the IPv4 tab or the Enable IPv6 Access Control checkbox is selected on the IPv6 tab 4 Select the rule that you want to delete To make multiple selections press Ctrl click or Shift click to highlight multiple ones Click Delete A message appears prompting you to confirm the operation Click Yes to remove the selected rule s from the rules list 7 Click OK to save the changes Setting Up User Login Controls You can set up login controls to make it more difficult for hackers to access the EMX and the devices connected to it You can arrange to lock persons out after a specified number of failed logins limit the number of persons who l
45. File System Samba e Note NFS and FTP are not supported for this release and are disabled on the dialog See Configuring Webcam Storage on page 186 for more information on configuration an image storage location Snapshot files are saved as JPG files The snapshot file is named based on the number of the snapshot starting from 1 So the first snapshot that is taken is named 1 jpg the second is 2 jpg and so on Raritan Chapter 8 Managing External Devices E Raritan EMX User Masagetest Device Sefings Manlenance EMX Explorer D ud 4 4L tux 192 168 20 104 4 L txbernal Sanson 204 i Page Storage Used 1 Sizes 10 Y Samaa uem Tee WWebcarr tps amp OXI2843AM Webcam 4 ovon men 1 meme 2 meme 2 ILLA BB Autory Ports 4 Webcam Management Shaper Webcam Name 139 Locaton Weba Webcam x Resolution 352 258 8 30 12 9 43 AM zZ A 192 16022104 Adminstrator iadmn y Last Loge 0070012 926 ma F apo om Mage lp tot FP te UP Ma ee DPA adm a PAL eaim Ae Ree A Att 4 aras na d T3 e gt To take a snapshot from webcam 1 Inthe navigation tree click on the webcam you want to take a snapshot with The webcam image is displayed in the right pane The webcam must be in snapshot mode in order to take snapshots If the webcam is in video mode click Setup in the right pane
46. Maximum Ambient Operating Temperature EMX 351 Serial RS 232 Port PIno ts ri net d iE Eoi cado iE Tertia 352 sensor RJ 12 Port Pinouts ir edi ei e dE Ulead 352 RS 485 Port Pihioute uides detenido ded rote Ede 352 Altitude Correction Factors EMX If a Raritan differential air pressure sensor is attached to your device the altitude you enter for the device can serve as an altitude correction factor That is the reading of the differential air pressure sensor will be multiplied by the correction factor to get a correct reading This table shows the relationship between different altitudes and correction factors Altitude meters Altitude feet Correction factor 0 0 0 95 250 820 0 98 425 1394 1 00 500 1640 1 01 740 2428 1 04 1500 4921 1 15 2250 7382 1 26 3000 9842 1 38 Maximum Ambient Operating Temperature EMX zie Raritan The maximum ambient operating temperature TMA for the EMX is the same for all models regardless of the certification standard CE or UL Specification Measure Max Ambient Temperature 60 degrees Celsius 351 Appendix Specifications Serial RS 232 Port Pinouts RS 232 Pin signal definition Pin No Signal Direction 1 DCD Input 2 RxD Input 3 TxD Output 4 DTR Output 5 GND 6 DSR Input 7 RTS Output 8 CTS Input 9 RI Input Sensor RJ 12 Port Pinouts 352 RJ 12 Pin signal definition Pin No Signal Direction 1 12V GND
47. On the Notifications tab select the Enable checkbox to enable the SNMP notification feature From the Notification Type drop down select the type of SNMP notification For SNMP INFORM communications leave the resend settings at their default or 205 Chapter 9 Using SNMP a Inthe Timeout sec field enter the interval of time in seconds after which a new inform communication is resent if the first is not received For example resend a new inform communication once every 3 seconds b Inthe Number of Retries field enter the number of times you want to resend the inform communication if it fails For example inform communications are resent up to 5 times when the initial communication fails 8 Inthe Host fields enter the IP address of the device s you want to access This is the address to which notifications are sent by the SNMP system agent You can specify up to 3 SNMP destinations 9 Inthe Port fields enter the port number used to access the device s 10 In the Community fields enter the SNMP community string to access the device s The community is the group representing the EMX and all SNMP management stations 11 Click OK SNMPv3 Notifications gt To configure the EMX to send SNMPv3 notifications 1 Choose Device Settings Network Services SNMP The SNMP Settings dialog appears Q SNMP Settings x General Notifications SNMP v1 v2c Settings SNMP v1 vac 7 en
48. Password Policy dialog appears 2 Select the Password Aging checkbox to enable the password aging feature 3 determine how often users are requested to change their passwords select a number of days in the Password Aging Interval field Users are required to change their password every time that number of days has passed Tip If the desired time option is not listed you can manually type the desired time in this field For example you can type 9 d to set the password aging time to 9 days 4 Click OK to save the changes Setting Up Role Based Access Control Rules Role based access control rules are similar to firewall rules except they are applied to members sharing a specific role This enables you to grant system permissions to a specific role based on their IP addresses gt To set up role based access control rules 1 Enable the feature See Enabling the Feature on page 113 2 Set the default policy See Changing the Default Policy on page 114 3 Create rules specifying which addresses to accept and which ones to discard when the addresses are associated with a specific role See Creating Role Based Access Control Rules on page 115 Changes made do not affect users currently logged in until the next login Enabling the Feature You must enable this access control feature before any relevant rule can take effect gt enable role based access control rules 1 Choose Device Settings gt
49. Security Settings View Wehream Imanes and Coanfinur Add Edit Delete ok 6 Click OK to save the changes The EMX User role is created amp Manage Roles x Role Name Description System defined administrator role including all privileges The role can only view EMX settings Predefined operator role 7 Keep the Manage Roles dialog opened to create the EMX Admin role gt create the EMX Admin role with full permissions assigned 1 Click New The Create New Role dialog appears Sis Raritan 5m Appendix LDAP Configuration Illustration 2 Type EMX Admin in the Role Name field 3 Type a description for the EMX Admin role in the Description field In this example we type The role includes all privileges to describe the role 4 Click the Privileges tab to select the Administrator permission The Administrator permission allows users to configure or change all EMX settings a Click The Add Privileges to new Role dialog appears b Select the permission named Administrator Privileges from the Privileges list c Click Add amp Create Role Add Edit Delete Cance Raritan Appendix LDAP Configuration Illustration 5 Click OK to save the changes The EMX Admin role is created 4 Manage Roles Role Description Admin System defined administrator role
50. Sensors with the EMX Connecting AMS M2 Z Asset Sensors Optional The AMS M2 Z is a special type of asset sensor that functions the same as regular MASTER asset sensors with the following differences e provides two RJ 45 connectors e Multiple AMS M2 Z asset sensors can be daisy chained e Only two tag ports are available on each AMS M2 Z so only two asset tags can be connected This product is especially useful for tracking large devices such as SAN boxes in the cabinet Item Description A RJ 45 connectors B Tag ports gt connect the AMS M2 Z asset sensors to the EMX 1 Connect the AMS M2 Z to the EMX via a Category 56 6 cable a Connect one end of the cable to the RJ 45 port labeled Input on the AMS M2 Z b Connect the other end of the cable to the FEATURE port on the EMX 2 Affix an asset tag to the IT device and connect this asset tag to the AMS M2 Z by plugging the tag connector into the tag port on the AMS M2 Z See Connecting Asset Sensors to the EMX on page 24 for details 3 If necessary daisy chain multiple AMS M2 Z to track more than two IT devices via this EMX a Verify that the Category 5e 6 cable length is within the limitation See AMS M2 Z Daisy Chain Limitations on page 334 for the cable length limitations b Connect one end of the Category 5e 6 cable to the RJ 45 connector labeled Output on the AMS M2 Z being connected to the EMX 333 334 Appendix A Using Raritan
51. USERNAME from host USERIP Raritan Event Context Device gt Event log cleared Device gt Bulk configuration saved Device gt Bulk configuration copied Device gt Network interface link state is up Device gt Sending SMTP message failed Device gt An LDAP error occured Device gt USB slave connected Device gt Features gt Schroff LHX Support User Administration gt User added User Administration gt User modified User Administration gt User deleted User Administration gt Password changed User Administration gt Password settings changed User Administration gt Role added User Administration gt Role modified User Administration gt Role deleted User Activity gt gt User accepted the Restricted Service Agreement User Activity gt gt User logged Raritan Chapter 7 Event Rules Event Actions and Application Logs Default Assertion Message when the Event TRUE Event log cleared by user USERNAME from host Bulk configuration saved from host USERIP Bulk configuration copied from host USERIP The IFNAME network interface link is now up Sending SMTP message to RECIPIENTS using server SERVER failed An LDAP error occured LDAPERRORDESC USB slave connected Schroff LHX support enabled User TARGETUSER added by user USERNAME from host USERIP User TARGETUSER modified by us
52. Units of Measure Default units of measure are applied to the EMX GUI across all users including users accessing the device via LDAP The preferences are also applied to the EMX device display These settings affect e Preferences for newly created users e Units displayed on the LCD EMX2 111 and EMX2 888 only e Units reported in log messages for example when sensor crosses a threshold To set user preferences for just your EMX GUI and not across all users or on the device display see Setting Up User Preferences Units of Measure on page 67 Note Preferences can also be changed by administrators for specific users from the Preferences tab of the Manage Users dialog See Creating a User Profile on page 62 gt To setup up default user preferences 1 Choose User Management Default User Preferences 2 Update any of the following as needed 67 Chapter 4 User and Role Management nthe Temperature Unit field select C Celsius or F Fahrenheit as the measurement unit for temperatures Inthe Length Unit field select Meter or Feet as the measurement unit for length or height Inthe Pressure Unit field select Pascal or psi as the measurement unit for pressure 3 Click OK Changing the User List View You may change the number of displayed columns or re sort the list for better viewing the data Viewing Connected Users You can see which users are connected to the EMX devic
53. WPA2 RSN Key management WPA PSK Encryption CCMP AES Important Currently only Raritan provided wireless USB LAN adapters are supported You may contact Raritan Technical Support for this information Raritan Raritan Chapter 2 Installing and Configuring the EMX Device Initial Network Configuration After the EMX device is connected to your network you must provide it with an IP address and some additional networking information This section describes the initial configuration via a serial or USB connection To configure the EMX via the LAN see Modifying the Network Configuration BCM EMX PX2 PXE see Modifying the Network Configuration on page 78 gt 1 To configure the EMX device Go to the computer that you connected to the EMX and open a communications program such as HyperTerminal or PuTTY Select the appropriate COM port and make sure the port settings are configured as follows Bits per second 115200 115 2Kbps Data bits 8 Stop bits 1 Parity None Flow control None Tip For a USB connection you can find out which COM port is assigned to the EMX by choosing Control Panel gt System gt Hardware gt Device Manager and locating the Dominion Serial Console under the Ports group Press Enter The EMX prompts you to log in Note that both of user name and password are case sensitive a Atthe Username prompt type admin and press Enter b
54. X cable 5 Connect the ethernet end of the X cable into the FEATURE port on the EMX 111 device 6 Plug the sensor cable of the X cable into the SENSOR port on the EMX 111 This supplies power to the asset sensor assembly from the SENSOR port via the Cat5e 6 cable Note If sensors need to be connected to the EMX via the SENSOR port plug them into the SENSOR connector on the X cable If no sensors are connected this connector can remain empty 7 Configure the asset sensor See Configuring the Asset Sensor on page 330 All LEDs on the asset sensor assembly may cycle through different colors during the power on process if the asset sensor s firmware is being upgraded by the EMX device After the power on or firmware upgrade process completes the LEDs show solid colors Note that the LED color of the tag ports with asset tags connected will be different from the LED color of the tag ports without asset tags connected Raritan Chapter 2 Installing and Configuring the Device Connecting an Asset Sensor to the EMX 888 The EMX 888 can connect to an asset management strip via a Category 5e 6 cable up to a distance of 10 meters Note The EMX 888 does not require the use of a 12V Feature Port X Cable like the EMX 111 Diagram key Q Asset management tags Asset management strip Q EMX 888 Q Category 5e 6 cable Cat5e 6 cable Z Raritan a Chapter 2 Installing and Configuring the
55. Your Own Password Every user can change their own password via this command syntax if they have the Change Own Password privilege Note that this command does not begin with user config password After performing this command the EMX prompts you to enter both current and new passwords respectively Important After the password is changed successfully the new password is effective immediately no matter you type the command apply or not to save the changes Example This procedure changes your own password 1 Verify that you have entered the configuration mode See Entering the Configuration Mode on page 231 2 Type the following command and press Enter config i password 3 Type the existing password and press Enter when the following prompt appears Current password 4 Type the new password and press Enter when the following prompt appears Enter new password 5 Re type the new password for confirmation and press Enter when the following prompt appears 303 Chapter 10 Using the Command Line Interface Re type new password Setting Up User Preferences Units of Measure Welcome to EMX CLI Last login 2012 08 06 02 58 14 EDT CLI Serial from lt local gt show user admin details Preferred temperature unit deg C Preferred length unit Meter Preferred pressure unit Pascal config config user modify admin preferredT emperatureUnit config user modify
56. and Groups Step B Configure User Groups on the AD Step C Configure LDAP Authentication on the EMX Device Step D Configure User Groups on the EMX Index Z Raritan Contents 349 Chapter 1 Z Raritan Introduction In This Chapter ISI sinen a aa a aai 2 Whats New in EMX Help iiie inertia tren doti ias iii Product Models ei teo ce eo ree eos enda iv Prod ct Fealures une eene iiie V Package Gontents iie d ae dir eee de Rad ar M RP sage vi Chapter 1 Introduction Overview The EMX device provides a rack management solution that combines both asset management and environmental monitoring capabilities With asset management capability you can remotely track the location of IT equipment after tagging the IT devices electronically This feature is especially useful when there are hundreds of IT devices to administer The following items are required for setting up an asset management system e Raritan asset tags You tag an IT device by sticking an electronic asset tag on it e Raritan asset management sensors asset sensors Each asset sensor transmits the tag and position information to the EMX device e An EMX device You can remotely locate each tagged IT device through the EMX device With Raritan envi
57. and Setting Up LDAP Authentication on page 123 Forcing HTTPS Encryption HTTPS uses Secure Sockets Layer SSL technology to encrypt all traffic to and from the EMX device so it is a more secure protocol than HTTP You can force users to access the EMX web interface through the HTTPS protocol only By default this protocol is enabled gt To force HTTPS access to the web interface 1 Choose Device Settings Security Force HTTPS for Web Access 2 Amessage appears prompting you to confirm the operation Click Yes to enforce the HTTPS service 3 Choose Device Settings Security to verify the Force HTTPS for Web Access checkbox is selected as shown in this diagram Force HTTPS for Web Access If the checkbox is not selected repeat these steps After enabling the HTTPS protocol all access attempts using HTTP are redirected to HTTPS automatically 104 Raritan Chapter 6 Security Configuring the Firewall The EMX has a firewall that you can configure to prevent specific IP addresses and ranges of IP addresses from accessing the EMX device By default the firewall is disabled gt configure the firewall 1 Enable the firewall See Enabling the Firewall on page 105 2 Set the default policy See Changing the Default Policy on page 105 3 Create firewall rules specifying which addresses to accept and which ones to discard See Creating Firewall Rules on page 106 Changes made
58. available for a specific CLI command by adding a question mark to the end of the command See Querying Available Parameters for a Command on page 326 Showing Information You can use the show commands to view current settings or status of the EMX device or part of it such as the IP address networking mode firmware version and so on Some show commands have two formats one with the parameter details and the other without The difference is that the command without the parameter details displays a shortened version of information while the other displays in depth information After typing a show command press Enter to execute it Note Depending on your login name the prompt may be replaced by the prompt See Different CLI Modes and Prompts on page 215 ii Raritan Raritan Chapter 10 Using the Command Line Interface Network Configuration This command shows all network configuration such as the IP address networking mode and MAC address show network IP Configuration This command shows the IP related configuration only such as IPv4 and IPv6 configuration address es gateway and subnet mask show network ip option Variables e option is one of the options all v4 or v6 Option Description all This options shows both of IPv4 and IPv6 settings Tip You can also type the command without adding this option all to get the same data v4 This option shows
59. below the lower warning threshold or rises above the upper warning threshold Red The meaning of the red color varies depending on the sensor type e Foranumeric sensor this color indicates the reading drops below the lower critical threshold or rises above the upper critical threshold e For a discrete on off sensor this color indicates the sensor is in the alarmed state e Fora Schroff LHX heat exchanger if available this color indicates that at least one sensor implemented on that heat exchanger fails See Schroff LHX Heat Exchangers on page 192 2x Raritan Raritan Chapter 3 Getting Started To find the exact meaning of the alert read the information shown in the State or Status column below lower critical The numeric sensor s reading drops below the lower critical threshold below lower warning The numeric sensor s reading drops below the lower warning threshold above upper critical The numeric sensor s reading reaches or exceeds the upper critical threshold above upper warning The numeric sensor s reading reaches or exceeds the upper warning threshold alarmed The discrete sensor is NOT in the normal state For information on the thresholds see Configuring Environmental Sensors on page 172 59 Chapter 3 Getting Started Browser Defined Shortcut Menu A shortcut menu which is built in the web browser may appear when right clicking anywhere in the EMX web interface
60. bottom of the dialog Select the appropriate port and click Use Selected a Assign an IP address to the port Required 347 Appendix Integrating and Asset Management Sensors with dcTrack assign an IP address select a subnet This automatically assigns the first available address from the selected subnet You can change the address by manually typing another address in the subnet or using the drop down to view all the available addresses in that subnet a If needed enter comments pertinent to the port b Enter the SNMP community name the port is associated with Note After adding a Humidity Temperature sensor to an EMX make sure that the Order column in dcTrack is the same order on the EMX c Click Create Port 11 Click Detail 2 to open the Detail 2 page for the EMX then enter any additional information that is needed Optional 12 Click Save The saved item is tagged with a status of New The item appears in red on the cabinet elevation which indicates that the item is new Mi Raritan Appendix Overview Raritan Raritan PX Asset Management In This Chapter Overview Raritan s PX2 power distribution unit PDU also supports asset sensors so that you can remotely track IT devices through the PDU s web interface while monitoring the PDU s power status Only PDUs with model names that begin with PX2 support the asset management function Important When handling asset se
61. can store the last two hours of measurements before the oldest one in log gets overwritten in the log Though the environmental sensors are measured per second their readings may not be updated per second See Information about Update Interval on page 177 The update interval varies depending on how many environmental sensors are connected to the EMX device and the sensor type The more the environmental sensors are connected the larger the update interval is Therefore type a large number in the Measurements Per Log Entry field when there are a large number of environmental sensors connected Whenever measurements are written to the log three values for each sensor are written the average minimum and maximum values For example if measurements are written every minute the average of all measurements that occurred during the preceding 60 seconds along with the minimum and maximum measurement values are written to the log Note The EMX s SNMP agent must be enabled for this feature to work See Enabling SNMP on page 202 for more details In addition using an NTP time server ensures accurately time stamped measurements Enabling Data Logging By default data logging is disabled Only users having the Administrator or Change Data Logging Settings permissions can enable or disable this feature See Setting Up Roles on page 69 gt To configure the data logging feature 1 Choose Device Settings Data Logging The Dat
62. client such as PuTTY Note Telnet access is disabled by default because it communicates openly and is thus insecure To enable Telnet see Modifying the Network Service Settings on page 84 212 Chapter 10 Using the Command Line Interface Logging in to CLI Logging in via HyperTerminal over a local connection is a little different than logging in using SSH or Telnet If a security login agreement has been enabled you must accept the agreement in order to complete the login Users are authenticated first and the security banner is checked afterwards With HyperTerminal You can use any terminal emulation programs for local access to the command line interface This section illustrates HyperTerminal which is part of Windows operating systems prior to Windows Vista gt To log in using HyperTerminal 1 Connect your computer to the EMX device via a local connection 2 Launch HyperTerminal on your computer and open a console window When the window first opens it is blank Make sure the COM port settings use this configuration Bits per second 115200 115 2Kbps Data bits 8 Stop bits 1 Parity None Flow control None Tip For a USB connection you can find out which COM port is assigned to the EMX by choosing Control Panel gt System gt Hardware gt Device Manager and locating the Dominion Serial Console under the Ports group 3 Press Enter The Username prompt appears Usern
63. connected devices in the tree only if there are devices physically connected to FEATURE and RS 485 auxiliary ports and displays nothing if no devices are connected The EMX web interface allows you to determine when and how to display icons for connected and disconnected devices in the tree How to Display Asset Sensors There are two ways to display connected asset sensors in the tree of the web interface Asset sensors are displayed only when they are physically connected Asset sensors are always displayed no matter they are physically connected or not but their icons change to indicate the connection status To determine how to display connected asset sensors Click the Feature Ports folder The Feature Ports page opens in the right pane listing all FEATURE ports Select the number of the port that you want to configure and click Setup Or you can simply double click that port number The Feature Port Setup dialog for the selected port appears In the Detection Mode field select the way to display connected asset sensors Raritan Raritan 4 Chapter 5 EMX Device Management Disabled When applied disables to port and nothing connected to the port is detected Auto An icon is displayed for this port only when the EMX device detects the physical connection of the asset sensor on this port Otherwise nothing is displayed This is the default approach Pinned An icon is displayed for thi
64. consist of a combination of free text and EMX placeholders The placeholders represent information is pulled from the EMX and inserted into the message A supported modem such as the Cinterion GSM MC52i modem must be plugged in to the EMX in order to send SMS messges Note The EMX cannot receive SMS messages For example USERNAME logged into the device on TIMESTAMP translates to JOPublic logged into the device on 2012 January 30 21 00 See Email and SMS Message Placeholders on page 145 for a list and definition of available variables gt To configure SMS message 1 Choose Device Settings gt Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Action name field type a new name for the action The default name is New Action lt number gt where lt number gt is a sequential number based on how many actions are already created 5 Inthe Action field click the drop down arrow and select the desired action from the list 6 Inthe Recipients Phone Number field specify the phone number s of the recipient s Use a comma to separate multiple phone numbers 7 Select the Use Custom Log Message checkbox then create custom message in the provided field Z Raritan Raritan Chapter 7 Event Rules Event Actions and Application Logs Click the Information icon to open the Event Context Information dialog which contains a list of
65. control feature use this command syntax config security ipAccessControl ipv6 enabled option gt To determine the default IPv6 firewall control policy use this command syntax config f security ipAccessControl ipv6 defaultPolicy policy Variables 260 option is one of the options true or false tue Enables the IP access control feature fale Disables the IP access control feature policy is one of the options accept drop or reject Accepts traffic from all IP addresses EN Discards traffic from all IP addresses without sending any failure notification to the source host Raritan Chapter 10 Using the Command Line Interface Option Description reject Discards traffic from all IP addresses and an ICMP message is sent to the source host for failure notification Tip You can combine both commands to modify all firewall control parameters at a time See Multi Command Syntax on page 320 Example The following command sets up two parameters of the IPv4 access control feature config security ipAccessControl ipv4 enabled true defaultPolicy accept Results e he IPv4 access control feature is enabled e The default policy is set to accept Managing Firewall Rules You can add delete or modify firewall rules using the CLI commands e An IPv4 firewall control rule command begins with security ipAccessControl ipv4 rule e AnIPv6 firewall control rule command begin
66. description variable must be enclosed in quotes when it contains spaces gt add more privileges to a specific role config i role modify name addPrivileges lt privilegel gt lt privilege2 gt lt privilege3 gt If a specific privilege contains any arguments add a colon and the argument s after that privilege zie Raritan B Chapter 10 Using the Command Line Interface config role modify lt name gt addPrivileges lt privilegel gt lt argument1 gt lt argument2 gt lt privilege2 gt lt argument1l gt lt argument2 gt lt privilege3 gt lt argument1 gt lt argument2 gt Variables e lt name gt is a string comprising up to 32 ASCII printable characters e privilegel lt privilege2 gt lt privilege3 gt and the like are names of the privileges assigned to the role Separate each privilege with a semi colon See All Privileges on page 307 e argumenti lt argument2 gt and the like are arguments set for a particular privilege Separate a privilege and its argument s with a colon and separate arguments with a comma if there are more than one argument for a privilege gt To remove specific privileges from a role config f role modify name removePrivileges lt privilegel gt lt privilege2 gt lt privilege3 gt If a specific privilege contains any arguments add a colon and the argument s after that privilege zs Raritan Chapter 10 Using the Command Lin
67. example inform communications are resent up to 5 times when the initial communication fails 9 For both SNMP TRAPS and INFORMS enter the following as needed and then click OK to apply the settings a Host name b Port number User ID needed to access the host d Select the host security level zie Raritan 208 Chapter 9 Using SNMP Configuring Users for Encrypted SNMP v3 Security level noAuthNoPriv authNoPriv authPriv Description Select this if no authorization or privacy protocols are needed Click OK Select this if authorization is required but no privacy protocols are required Select the authentication protocol MD5 or SHA Enter the authentication passphrase and then confirm the authentication passphrase Click OK Select this if authentication and privacy protocols are required Select the authentication protocol MD5 or SHA Enter the authentication passphrase and confirm the authentication passphrase Select the Privacy Protocol DES or AES Enter the privacy passphrase and then confirm the privacy passphrase Click OK The SNMP v3 protocol allows for encrypted communication To take advantage of this users need to have an Authentication Pass Phrase and Privacy Pass Phrase which act as shared secrets between them and the EMX 1 Select the user by clicking it Click Edit or double click the user The Edit User XXX dialog appears where XXX is the
68. f the term ALARM appears below the rack unit number it means no asset tag is detected or physically connected to that rack unit f the term ALARM does NOT appear it means a connected asset tag is detected on the rack unit IP Address The IP Address is also available in the EMX LCD display Use the Mode button to switch between sensor asset and device mode When in device mode a small d is displayed in the upper left corner The address starts with the IPv4 address indicated by i4 in the upper right corner of the display Use the Function button to switch to the MAC address in which case an is displayed in the upper right corner zie Raritan Chapter 3 Getting Started Reset Button MAC Address The EMX s MAC address is available by operating the LCD display and in Device mode Contact your LAN administrator for assistance gt display the MAC address 1 Press the MODE button until the device settings are displayed indicated by a d in at the top left of the display 2 Press the Function button below the Mode button one time to change from the IP address to MAC address mode The character M appears in the left side of the LCD display 3 The MAC address is displayed as M XX where XX are two digits of the MAC address The LCD will cycle through the MAC address from the first two digits to the final two For example if the MAC address is 00 0d 5d 03 5E 1A the LCD display shows the fol
69. in the PM710 it must also be 42 in EMX All settings are configured on a per port basis If you disconnect a PM710 from one EMX port and connect it to another you must reconfigure the settings However if you disconnect a PM710 from a port and then plug it back in to the same port the already configured settings still apply Note PM710 meters are not supported through SNMP or the command line interface CLI id Raritan Raritan Chapter 8 Managing External Devices Configuring the PM710 and Configuring Threshold Settings Note All settings are configured on a per port basis If you disconnect a PM710 from one EMX port and connect it to another you must reconfigure the settings However if you disconnect a PM710 from a port and then plug it back in to the same port the already configured settings still apply gt To configure the PM710 1 Connect the PM710 sensor to EMX if it is not already connected Pin the auxiliary port to the PM710 If the Auxiliary Ports folder is not expanded expand it to show all devices connected to the RS 485 ports 4 Click the desired sensor in the EMX Explorer pane The page specific to that sensor opens in the right pane Click Setup in the Settings section The Setup dialog opens Enter a name for the sensor in the Name field Leave the device address line speed and parity as is so it matches the PM710 settings Click OK 9 Configure the threshold settings if
70. including all privileges The role includes all privileges The role can only view EMX setings Predefined operator role 6 Click Close to quit the dialog Raritan id Index A A Note about Untriggered Rules 158 About Contact Closure Sensors 35 About the Interface 212 Access Security Control 104 Add Page Icon 56 Adding a Firewall Rule 261 Adding a Role Based Access Control Rule 276 Adding an EMX to dcTrack 342 346 Adding IT Devices for Ping Monitoring 165 Adding the LDAP Server Settings 124 Alert States and LHX Event Log 196 All Privileges 307 310 311 Altitude Correction Factors EMX 74 351 AMS M2 Z Daisy Chain Limitations 29 329 333 334 Asset Management Commands 312 Asset Management Information 49 Asset Sensor Management 313 Asset Sensor Settings 221 Asset Sensors and Tags 329 Automatically Completing a Command 327 B Backup and Restore the EMX Device Settings iii 96 Before You Begin 7 Blade Extension Strip Settings 229 Browser Defined Shortcut Menu 60 C Cascading EMX Devices 163 Cascading PX2 Devices with a EMX 163 Certificate Signing Request 118 Changing a Specific LED s Color Settings 332 Changing a User s Password 292 Changing the Default Policy 105 113 114 Changing the Device Name 232 Changing the HTTP Port 252 Changing the HTTP S Settings 84 Changi
71. interface It is an integer between 1 and 16 e coordinate is a string comprising up to 24 ASCII printable characters and it must be enclosed in quotes Example The following command sets the value The 4th row to the Y coordinate of the environmental sensor with the ID number 4 config f externalsensor 4 ylabel The 4th row Raritan Raritan Chapter 10 Using the Command Line Interface Setting the Z Coordinate This command syntax specifies the Z coordinate of an environmental sensor config externalsensor lt n gt zlabel lt coordinate gt Variables e n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e Depending on the Z coordinate format you set there are two types of values for the lt coordinate gt variable Type Description Free form lt coordinate gt is a string comprising up to 24 ASCII printable characters and it must be enclosed in quotes Rack units lt coordinate gt is an integer number in rack units Note To specify the Z coordinate using the rack units See Setting the Z Coordinate Format for Environmental Sensors page 233 Example The following command sets the value The 5th rack to the Z coordinate of the environmental sensor with the ID number 4 after the Z coordinate s format is set to freeForm config externalsensor 4 zlabel
72. it is displayed as a folder on that asset sensor s page Note If you need to temporarily disconnect the tag connector of the blade extension strip wait at least 1 second before connecting it back or the EMX may not detect it gt To expand a blade extension strip folder 1 Click the desired asset sensor in the left pane The selected asset sensor s page opens in the right pane 2 Locate the rack unit tag port where the blade extension strip is connected Rack Units Rack Unit Index Slot Name Asset ID 1 1 P cg 2 2 00000007CACB 3 3 4 4 zie Raritan id 336 Appendix A Using Raritan Asset Management Sensors with the EMX 3 Double click that rack unit or click the white arrow P prior to the folder icon The arrow then turns into a black gradient arrow 44 and all tag ports appear below the folder r Rack Units Rack Unit Index Slot Name Asset ID 1 1 4 3 2 2 00000007CACB mj 1 m 2 nr 3 4 m 5 6 7 m 8 n 9 m 10 11 m 12 13 14 mj 15 m 16 3 I 4 4 gt To collapse a blade extension strip Double click the blade extension strip folder or click the black gradient arrow 4 prior to the folder icon All tag ports under the folder are hidden Connecting Blade Extension Strips For blade servers which are contained in a single chassis you can use a blade extension strip to track individual blade serv
73. lt Upper Warning threshold Note The symbol lt means smaller than lt or equal to alarmed State This state means a discrete on off sensor is in the abnormal state Usually for a contact closure sensor the meaning of this state varies based on the sensor s normal state setting e fthe normal state is set to Normally Closed the alarmed state means the contact closure switch is open e If the normal state is set to Normally Open the alarmed state means the contact closure switch is closed Note See Configuring a Contact Closure Sensor on page 37 for information on setting the normal state or dip switch For the onboard contact closure sensor termination see Connecting Third Party Detectors Switches to the EMX on page 38 for how to set the normal state Tip A contact closure sensor s LED is lit after entering the alarmed state If the sensor module has two channels for connecting two switches two LEDs are available Check which contact closure switch is in the abnormal status according to the channel number of the LED i Raritan zie Raritan Chapter 8 Managing External Devices below lower critical State This state means a numeric sensor s reading is below the lower critical threshold as indicated below Reading Lower Critical Threshold below lower warning State This state means a numeric sensor s reading is below the lower warning threshold as indicated below Lower Critical Thr
74. notification to one or multiple SNMP destinations gt 1 To configure sending an SNMP notification Choose Device Settings gt Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Action name field type a new name for the action The default name is New Action numbers where number is sequential number based on how many actions are already created In the Action field click the drop down arrow and select the desired action from the list Select the type of SNMP notification See either procedure below according to your selection To send SNMP v2c notifications From the Notification Type drop down select SNMP v2c Trap or SNMP v2c Inform For SNMP INFORM communications leave the resend settings at their default or 139 Chapter 7 Event Rules Event Actions and Application Logs a Inthe Timeout sec field enter the interval of time in seconds after which a new inform communication is resent if the first is not received For example resend a new inform communication once every 3 seconds b Inthe Number of Retries field enter the number of times you want to resend the inform communication if it fails For example inform communications are resent up to 5 times when the initial communication fails 3 Inthe Host fields enter the IP address of the device s you want to access This is the address to which notifications are sent by the SNMP system agent
75. of sync the certificates are considered expired and users are unable to authenticate using LDAP To ensure proper synchronization administrators should configure the EMX and the LDAP server to use the same NTP server More Information about AD Configuration For more information about the LDAP configuration using Microsoft Active Directory see LDAP Configuration Illustration on page 354 Raritan Raritan Chapter 6 Security Sorting the LDAP Access Order The order of the LDAP list determines the access priority of remote LDAP LDAPS servers The EMX first tries to access the top LDAP LDAPS server in the list for authentication then the next one if the access to the first one fails and so on until the EMX device successfully connects to one of the listed LDAP LDAPS servers Note After successfully connecting to one LDAP LDAPS server the EMX STOPS trying to access the remaining LDAP LDAPS servers in the list regardless of the user authentication result gt re sort the LDAP server access list 1 Choose Device Settings gt Security gt Authentication The Authentication Settings dialog appears Select the LDAP LDAPS server whose priority you want to change Click Move up or Move down until the selected server reaches the desired position in the list 4 Click OK to save the changes Testing the LDAP Server Connection You can test the connection to any LDAP LDAPS server to verify the
76. on page 346 for details on adding the EMX to dcTrack It is important you add the EMX as a probe in order for the EMX to be recognized and its information retrieved 4 Once the EMX is added to dctrack when tags are adhered to an item and plugged in to the asset management sensor connected to the EMX the tag ID of the asset management sensor is automatically updated in dcTrack dcTrack through Power IQ receives location data via the IP connection to the EMX EMX receives this data by polling Power IQ every few minutes to pull in new data and display it See in the diagram The items the asset tags are adhered to must be tracked as part of the dcTrack change management workflow just as with any other device in the data center This allows dcTrack to manage and monitor the status of the items the tags are adhered to See the Change Control Process section in the dcTrack User Help for more information n Raritan Appendix Integrating and Asset Management Sensors with dcTrack EMX Asset Sensor Management zie Raritan Before asset sensors can be managed in dcTrack they must be configured in EMX the EMX needs to be added to dcTrack as a probe item and the data center item the asset management tag is adhered to must exist in dcTrack dcTrack supports the EMX2 111 and EMX2 888 models If you have a large number of EMXs to add consider using the Import Wizard See Import Wizard Note dcTrack does not support as
77. on the EMX device In this illustration we assume Users assigned to the EMX User role can only access the EMX device and view settings Users assigned to the EMX Admin role can both access and configure the EMX device because they have the Administrator permissions To create the EMX User role with appropriate permissions assigned Choose User Management gt Roles The Manage Roles dialog appears Tip You can also access the Manage Holes dialog by clicking the Manage Roles button in the Edit User XXX dialog Click New The Create New Role dialog appears Type EMX User in the Role Name field Type a description for the EMX User role in the Description field In this example we type The role can only view EMX settings to describe the role Click the Privileges tab to select all View XXX permissions where XXX is the name of the setting A View XXX permission lets users view the XXX settings without the capability to configure or change them a Click The Add Privileges to new Role dialog appears b Select a permission beginning with the word View from the Privileges list such as View Event Settings Raritan Appendix E LDAP Configuration Illustration c Click Add d Repeat Steps a to c to add all permissions beginning with View amp Create New Role View Data Logging Settings View Event Settings View Local Event Log View Local User Management View SNMP Settings View
78. on the Feature Ports folder in the navigation tree to expand it Click the desired asset sensor The page specific to that asset sensor opens in the right pane showing the asset sensor settings and information of all rack units tag ports Note You can also access this dialog by double clicking the asset sensor shown on the Dashboard page Select the rack unit whose LED settings you want to change Click Configure Rack Unit or double click the selected rack unit The setup dialog for the selected rack unit appears In the Name field type a name for identifying this rack unit Select either Auto or Manual Override as this rack unit s LED mode Auto based on Tag This is the default setting With this option selected the LED follows the global LED color settings Manual Override This option differentiates this LED s behavior After selecting this option you must select an LED mode and or an LED color for the selected rack unit LED Mode Select On to have the LED stay lit Off to have it stay off Slow blinking to have it blink slowly or Fast blinking to have it blink quickly LED Color If you select On Slow blinking or Fast blinking in the LED Mode field select an LED color by either clicking a color in the color palette or typing the hexadecimal RGB value of a color in the accompanying text box 8 Click OK to save the changes Raritan Z Raritan Appendix A Using Raritan Asset Management
79. ones b Click Delete To add any permissions do this a Click Add The Add Privileges to Role XXX dialog appears where is the role name b Select the permission you want from the Privileges list Raritan Chapter 4 User and Role Management c Ifthe permission you selected contains any argument setting the Arguments list is shown to the right Then select one or multiple arguments d Click Add to add the selected permission and arguments if any e Repeat Steps ato d until you add all necessary permissions 8 To change a specific permission s arguments do this a Select the permission by clicking it b Click Edit The Edit arguments of privilege XXX dialog appears where XXX is the privilege name Note If the permission you selected does not contain any arguments the Edit button is disabled c Select the argument you want You can make multiple selections d Click OK 9 Click OK to save the changes Deleting a Role You can delete any role other than the Admin role gt To delete a role 1 Choose User Management gt Roles The Manage Roles dialog appears Tip You can also access the Manage Roles dialog by clicking the Manage Roles button in the Edit User dialog 2 Select the role you want to delete by clicking it To make multiple selections press Ctrl click or Shift click to highlight multiple ones Click Delete A message appears prompting you to confirm
80. port number in the field Valid range is 1 to 65535 3 To enable the SSH application select the Enable SSH checkbox To disable it deselect the checkbox 4 To select a different authentication method select one of the checkboxes Z Raritan Raritan Chapter 5 EMX Device Management Allow password authentication only Enables the password based login only Allow public key authentication only Enables the public key based login only Allow password and public key authentication Enables both the password and public key based login This is the default 5 Click OK to save the changes If the public key authentication is selected you must type a valid SSH public key for each user profile to log in over the SSH connection See Creating a User Profile on page 62 Changing the Telnet Settings You can enable or disable the Telnet access to the command line interface or change the default TCP port for the Telnet service gt change the Telnet service settings 1 Choose Device Settings gt Network Services gt Telnet The Telnet Settings dialog appears 2 Touse a different port type a new port number in the field Valid range is 1 to 65535 3 To enable the Telnet application select the Enable Telnet Access checkbox To disable it deselect the checkbox 4 Click OK to save the changes 91 Chapter 5 EMX Device Management Enabling Service Advertisement The EMX advertis
81. rule add start ip end ip role policy gt To add anew IPv4 rule by inserting it above or below a specific rule use this command syntax config f security roleBasedAccessControl ipv4 rule add start ip end ip role policy insert rule number e IPv6 commands gt To add anew rule to the bottom of the IPv6 rules list use this command syntax config security roleBasedAccessControl ipv6 rule add start ip end ip role policy gt To add anew IPv6 rule by inserting it above or below a specific rule use this command syntax config f security roleBasedAccessControl ipv6 rule add start ip end ip role policy insert rule number Variables start ip is the starting IP address e end ip is the ending IP address e role is the role for which you want to create an access control rule e policy is one of the options allow or deny Policy Description allow Accepts traffic from the specified IP address range when the user is a member of the specified role xs Raritan Chapter 10 Using the Command Line Interface Policy Description deny Drops traffic from the specified IP address range when the user is a member of the specified role e insert is one of the options insertAbove or insertBelow Option Description insertAbove Inserts the new rule above the specified rule number Then new rule s number the specified rule numbe
82. s threshold related information show sensor externalsensor lt n gt To show detailed information add the parameter details to the end of the command show sensor externalsensor lt n gt details Variables e n is the environmental sensor number The environmental sensor number is the ID number assigned to the sensor which can be found on the External Sensors page of the EMX web interface Displayed information e Without the parameter details only the reading threshold deassertion hysteresis and assertion timeout settings of the specified environmental sensor are displayed e With the parameter details more sensor information is displayed including accuracy and range Note For a discrete on off sensor the threshold related and accuracy related data is NOT available Show Serial show serial Output baudRate The baud rate 5 Chapter 10 Using the Command Line Interface Serial config Entering configuration mode Apply save and activate changed settings and leave config mode Cancel leave config mode without applying the changed settings config f serial baudRate 120012400 4800 9600 19200 38400 1576001115200 Note If this command is executed during a session in which the user connected to the serial port of the device then the changes will take effect after the user logs out and logs back in Security Settings This command shows the se
83. sensor The selected rack unit number of the selected asset sensor Note For the Raritan asset sensor a rack unit refers to a tag port MAC address of the EMX The text ALARM may appear to indicate either of the following scenarios For a numeric environmental sensor such as a temperature sensor it means the sensor reading reaches or crosses the upper or lower thresholds if these thresholds have been enabled For a discrete on off environmental sensor such as a contact closure sensor it means the sensor enters the abnormal state For an asset sensor it means NO asset tag is detected on the selected rack unit Raritan Raritan Chapter 3 Getting Started Section Information shown The measurement unit for the selected environmental sensor appears The measurement unit varies according to the sensor type e is displayed for a humidity sensor e is displayed for a temperature sensor When the term ASSET appears the displayed information is associated with asset sensors and asset tags Control Buttons There are four control buttons Up and Down buttons for selecting a specific ID or port number MODE button for switching between different types of target information including environmental sensor information asset management information and MAC address FUNC button for switching between different types of data for a selected environmental sensor By default the display p
84. service is enabled false The SSH service is disabled Example The following command enables the SSH service config f network services ssh enabled true Changing the SSH Port This command syntax changes the SSH port config f network services ssh port n Variables e n isa TCP port number between 1 and 65535 The default SSH port is 22 Example The following command syntax sets the TCP port for SSH to 555 config f network services ssh port 555 ui Raritan Raritan Chapter 10 Using the Command Line Interface Determining the SSH Authentication Method This command syntax determines the SSH authentication method config network services ssh authentication lt auth_method gt Variables e lt option gt is one of the options passwordOnly publicKeyOnly or passwordOrPublicKey Option Description passwordOnly Enables the password based login only publicKeyOnly Enables the public key based login only passwordOrPublicKey Enables both the password and public key based login This is the default If the public key authentication is selected you must type a valid SSH public key for each user profile to log in over the SSH connection See Specifying the SSH Public Key on page 301 Example The following command causes users to have to type a password for the SSH login Use of the SSH public key is not permitted config f network services ssh authentication passwordOnly Setting the S
85. speed and duplex mode Wireless Network Settings Wireless SSID PSK and BSSID parameters were set during the installation and configuration process See Initial Network Configuration on page 15 You can change them via the web interface 1 To modify the wireless interface settings Choose Device Settings Network The Network Configuration dialog appears The Interface Settings tab should have been selected If not click the Interface Settings tab In the Network Interface field click the drop down arrow and select Wireless from the list Check the Hardware State field to ensure that the EMX device has detected a wireless USB LAN adapter If not verify whether the USB LAN adapter is firmly connected or whether it is supported See Connecting the EMX to Your Network on page 14 Type the name of the wireless access point AP in the SSID field If the BSSID is available select the Force AP BSSID checkbox and type the MAC address in the BSSID field Note BSSID refers to the MAC adaress of an access point in the wireless network 79 Chapter 5 EMX Device Management 7 Inthe Authentication field click the drop down arrow and select an appropriate option from the list Option Description No Authentication Select this option when no authentication data is required PSK A Pre Shared Key is required for this option Inthe Pre Shared Key field type the PSK string EAP PEAP PEAP stands for Prote
86. the command without adding this option all to get the same data A specific Displays the settings of the specified rack unit on number the specified asset sensor Use the index number to specify the rack unit The index number of each rack unit is available on the Asset Strip page of the web interface Raritan Raritan Chapter 10 Using the Command Line Interface Blade Extension Strip Settings This command shows the information of a blade extension strip including the total number of tag ports and if available the ID barcode number of any connected tag show bladeSlot lt n gt lt rack_unit gt lt blade_slot gt Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e rack unit is the index number of the desired rack unit tag port on the selected asset sensor The index number of each rack unit is available on the Asset Strip page of the web interface e blade slot is one of the options all or a specific number of a tag port on the blade extension strip Option Description all Displays the information of all tag ports on the specified blade extension strip connected to a particular rack unit Tip You can also type the command without adding this option all to get the same data A specific Displays the information of the specified tag port number on t
87. the name assigned to the system sysLocation the location of the system Select the MIB to be downloaded The SNMP MIB for your EMX is used by the SNMP manager Raritan Chapter 5 Device Management 7 Click OK or continue to the Notifications tab create SNMP TRAP or INFORM communications ZE Raritan M 5 8 To create an SNMP TRAP or INFORM communication open the Notifications tab on the SNMP Settings dialog SNMP Settings General Notifications SNMP Notification Settings Enabled Notification Type SNMPv2c Inform M Timeout sec 3 Number of Retries 5 Host 1 Port 1 Community 1 162 Host 2 Port 2 Community 2 162 Host 3 Port 3 Community 3 162 Please use the Device Settings gt Event Rules Dialog for a more detailed trap setup Download MIB Cancel 9 Select the Enabled checkbox to enable the feature gt For SNMPv2 c TRAP and INFORM notifications 1 From the Notification Type drop down select the type of SNMP notification 2 For SNMP INFORM communications leave the resend settings at their default or a Inthe Timeout sec field enter the interval of time in seconds after which a new inform communication is resent if the first is not received For example resend a new inform communication once every 3 seconds b Inthe Number of Retries fie
88. the operation Click Yes to confirm the deletion zie Raritan Chapter 5 Overview EMX Device Management In This Chapter OVGIVICW he 72 Naming the 72 Displaying the Device Information 73 Setting the Date and TiM sirining 73 Specifying the Device 74 Changing the Measurement 75 Determining How to Display Tree 76 Modifying the Network Configuration 78 Modifying the Network Service 84 Configuring the SMTP Selttlngs uct terit teet t enixe tex 92 Setting Up an EMX Using Bulk Configuration 94 Backup and Restore the EMX Device 5 96 Firmware Upgrade s s term ett eed e octane 97 Network DIAgtioSltieS ctt uoa dece une 99 Downloading Diagnostic Information sene 100 Hebooting the EMA intueri dun 102 Resetting to Factory Defaults nente iere 102 Following is information on setting up and managing the EMX after t
89. to delete then clicking the Delete icon at the top of the section To select and delete all snapshots at once click the checkbox in the checkbox column header then click the Delete icon Sending Videos in an Email or Instant Message You are able to email or instant message up to two 2 recipients a link to webcams attached to the EMX Users can then click on the links and view snapshots or videos Note For remote Live Preview sessions such as those accessed via link in an email or instant message a total of up to three 3 simultaneous Live Preview sessions are supported at a time One 1 from the originator in the EMX interface and up to two 2 remote sessions Note For the purposes of this topic the message sender is User A and the recipient is User B The recipient is able to access the video image via the link so long as either e The video remains open in Live Preview mode in the User A s EMX interface and User A does not log out of the interface and the session does not time out Or Z Raritan GSM Modems Raritan Chapter 8 Managing External Devices e The video remains open in a secondary Live Preview window in the User A s EMX interface So long as the secondary Live Preview window is open in User A s interface even after User A logs out of the EMX interface or the session times out the link is available Best Practice As a best practice in the EMX interface User A should open the vid
90. to two 2 webcams and the EMX 111 supports one 1 webcam After connecting a webcam you can visually monitor environmental conditions near the EMX through the web interface from anywhere For more information on the QuickCam webcam see the user documentation accompanying it For information on connecting a webcam to the EMX see Connecting a Logitech Webcam Optional on page 41 Snapshots or videos captured by the webcam are displayed in the right pane of EMX web interface once a webcam is selected in the navigation tree Snapshots and videos can also be displayed in Live Preview mode in the Primary Standalone Live Preview window by clicking on the Live Preview icon EMX allows you to take and store snapshots from each webcam See Taking Viewing and Managing Webcam Snapshots on page 188 for additional information Images can be stored locally on the EMX or on another location Locally 10 images can be saved on the EMX Storing images in alternate locations allows you to save as many images as that location allows See Configuring Webcam Storage on page 186 for more information Note Rebooting the EMX deletes the snapshots taken via webcam Links to video being captured by a webcam can be sent via email or instant message See Sending Videos in an Email or Instant Message on page 190 Events that trigger emails containing snapshots from a webcam can be created Events can be defined for each individual webca
91. type fSensor sntplessageRecipients sntpServer errorDescription H STATUS current DESCRIPTION A collection objects providing information in the traps 1 groups 5 NOTIFICATION GROUP NOTIFICATIONS systenStarted systenReset userLogin userLogout userfuthenticationFailure userSessionTineout userfidded userModified userDeleted rolefdded roleModified roleDeleted deuicelpdateStarted deuiceUpdateCompleted userBlocked userPassuordChanged For example the measurementsGroup group contains objects for environmental sensors connected to the EMX device One object listed under this group measurementsExternalSensorState is described later in the MIB as The sensor state boardFirmwareVersion part of the configGroup group describes the firmware version Raritan Raritan Chapter 9 Using SNMP SNMP Sets and Thresholds Some objects can be configured from the SNMP manager using SNMP set commands Objects that can be configured have a MAX ACCESS level of read write in the MIB These objects include threshold objects which causes the EMX to generate a warning and send an SNMP trap when certain parameters are exceeded See Threshold Information on page 182 for a description of how thresholds work Note When configuring the thresholds via SNMP set commands ensure the value of upper critical threshold is higher than that of upper warning threshold 211 Chapter 10 Using t
92. use this configuration file to e Copy that configuration to other EMX devices of the same model and firmware version e Restore the settings of the same EMX device to previous configuration You must have the administrator privileges to save and copy the EMX configurations Bulk Configuration Save Bulk Configuration Download Bulk Configuration M Copy Bulk Configuration Bulk Configuration File Browse Upload amp Restore Bulk Con figuration Raritan Chapter 5 Device Management Saving an EMX Configuration A source device is an already configured EMX device that is used to create a configuration file containing the settings that can be shared between EMX devices These settings include user and role configurations event rules security settings and so on This file does NOT contain device specific information including e Device name e Network settings IP address gateway netmask and so on e Device logs e Environmental sensor names e Environmental sensor states and values e SSL Certificate e Asset management sensor names and rack unit names e SNMP name location and contact e Server monitor entries Because the date and time settings are saved in the configuration file users should exercise caution when distributing the configuration file to the EMX devices in a different time zone than the source device gt T
93. useAuthenticationPassPhraseAsPrivacyPassPhrase lt option4 gt Variables e lt name gt is the name of the user whose settings you want to change e lt option4 gt is one of the options true or false Option Description true Privacy passphrase is identical to the authentication passphrase false Privacy passphrase is different from the authentication passphrase gt determine the privacy passphrase zie Raritan a Chapter 10 Using the Command Line Interface config 298 user modify lt name gt privacyPassPhrase lt privacy passphrase gt Variables lt name gt is the name of the user whose settings you want to change lt privacy_passphrase gt is a string used as a privacy passphrase comprising up to 32 ASCII printable characters gt To determine the authentication protocol config user modify lt name gt authenticationProtocol lt option5 gt Variables e lt name gt is the name of the user whose settings you want to change e lt option5 gt is one of the options MD5 or SHA 1 Option Description MD5 MD5 authentication protocol is applied SHA 1 SHA 1 authentication protocol is applied gt To determine the privacy protocol config f user modify name privacyProtocol lt option6 gt Variables e name is the name of the user whose settings you want to change e option6 is one of the options DES or AES 128 Option Description DES DES privacy protocol is applied AES 128 AES 128 p
94. we are specifying an event at the environmental sensor level 2 Select Slot 1 from the submenu because we want the report about the sensor connected to sensor port 1 3 Select Numeric Sensor to indicate the sensor is a numeric sensor Note A numeric sensor uses numeric values to indicate the environmental condition while a discrete on off sensor uses alphabetical characters to indicate the sensor state 155 156 Chapter 7 Event Rules Event Actions and Application Logs Select lt Any sub event gt because we want to specify all events related to the sensor connected to sensor port 1 including the sensor s unavailable state and threshold crossing events Above upper critical Above upper warning Below lower warning and Below lower critical Select System SNMP Notification Action as we want to send SNMP traps to respond to the specified events when these events occur Sample User Activity Level Event Rule In this example we want the EMX to record the user activity event in the internal log when any user logs in or logs out The event rule is set like this Event User activity gt Any user gt User logged in Trigger condition Both Actions System Event Log Action To create the above event rule Select User activity in the Event field to indicate we are specifying an event regarding the user activity Select lt Any user gt from the submenu because we want to record the activity of a
95. 10 Using the Command Line Interface Tracing the Route This command syntax traces the network route between your EMX device and a network host diag gt traceroute lt host gt Variables e host is the name or IP address of the host you want to trace Example The following command displays the existing network routing for the host 192 168 84 222 diag traceroute 192 168 84 222 Quitting the Diagnostic Mode gt To quit the diagnostic mode use this command diag gt exit The prompt appears after pressing Enter indicating that you have entered the administrator mode Querying Available Parameters for a Command 326 If you are not sure what commands or parameters are available for a particular type of CLI command you can have the CLI show them by adding a space and then a question mark or the word help to the end of that command A list of available parameters and their descriptions will be displayed The following shows a few query examples gt To query available parameters for the show command the syntax is show OR Z Raritan Chapter 10 Using the Command Line Interface show help gt query available network configuration parameters the syntax is config network OR config network help gt To query available role configuration parameters the syntax is config role OR config role help Retrieving Previous Commands If you would like to r
96. 137 Chapter 7 Event Rules Event Actions and Application Logs 138 10 Use the slide bars to increase or decrease the following Number of Snapshots the number of snapshots to be included in the sequence of images that are taken when the event occurs For example you can specify 10 images be taken once the event triggers the action Snapshots Mail field the number of snapshots from the sequence to be sent at one time in the email Time before first Snapshot s the amount of time in seconds between when the event is triggered and the webcam begins taking snapshots Time between Snapshots s the amount of time between when each snapshot is taken 11 Click OK to save the new action 12 Click Close to quit the dialog Send EMail You can configure emails to be sent when an event occurs and can customize the message Messages consist of a combination of free text and EMX placeholders The placeholders represent information is pulled from the EMX and inserted into the message For example USERNAME logged into the device on TIMESTAMP translates to JOPublic logged into the device on 2012 January 30 21 00 See Email and SMS Message Placeholders on page 145 for a list and definition of available variables gt configure sending emails 1 Choose Device Settings gt Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Act
97. 165 182 184 204 Event Rules Event Actions and Application Logs 131 Example 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 261 263 265 266 267 268 269 270 271 272 273 275 271 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 298 299 301 302 303 305 306 307 309 311 312 313 314 315 316 317 318 319 323 324 325 326 Ping Monitoring and SNMP Notifications 166 Example 1 Basic Security Information 230 Example 1 Combination of IP Subnet Mask and Gateway Parameters 320 Example 2 Combination of SSID and PSK Parameters 321 Example 2 In Depth Security Information 231 Examples 230 Executing an Action Group 136 Z Raritan Index Existing Roles 227 Existing User Profiles 226 Expanding a Blade Extension Strip 335 F Firewall Control 259 Firmware Upgrade 96 97 Forcing a Password Change 294 Forcing HTTPS Encryption 84 104 118 Full Disaster Recovery 99 G Gathering the LDAP Information 123 Getting Started 43 GSM Modems 191 H Help Command 218 History Buffer Length 230 How to Display Asset Sensors 76 How to Display LHX Heat Exchangers 77 HTTPS Access 266 Identifying Environmental Sensors 170 172 Idle Timeout 268 Information about Update Interval 33 171 176 1
98. 77 Initial Network Configuration 15 51 55 78 79 328 Installing a CA Signed Certificate 120 Installing and Configuring the EMX Device 7 Installing Existing Key and Certificate Files 122 Installing the USB to Serial Driver 12 Integrating EMX and Asset Management Sensors with dcTrack iii 340 Introduction 1 Introduction to the Web Interface 54 IP Address 49 IP Configuration 219 L LAN Interface Settings 219 Layout 210 LCD Display 45 47 49 LCD Display Panel 45 LDAP Configuration Illustration 126 354 Listing TCP Connections 100 Log an Event Message 137 Logging In 51 365 Index Logging in to CLI 213 Logging out of CLI 328 Login Limitation 266 Logout 52 Lowercase Character Requirement 271 MAC Address 50 Managing Environmental Sensors 170 171 Managing External Devices 161 Managing Firewall Rules 261 Managing Role Based Access Control Rules 275 Managing Roles 69 Managing Users 62 Maximum Ambient Operating Temperature EMX 351 Maximum Password History 273 Maximum Password Length 271 Menus 55 Minimum Password Length 270 Modifying a Firewall Rule 263 Modifying a Role 65 66 70 309 Modifying a Role Based Access Control Rule 277 Modifying a User Profile 53 66 70 291 Modifying a User s Personal Data 293 Modifying an Action 157 Modifying an Even
99. AgQR MAS8ECT gzMjk3MDgyM4ACBSAwDQYDVROKBAY wBAMCBkAwCwY JKoZIhvcNAQEEA4GB AH2y1VCEw A4zaXzSYZJTTUi3uawbbFiS2yxHvgf28 8Js00HXk1H1w2d6qO0HH21 X82tZXd 0JtGOg1T9usFFBDvYK8OOebgz P5ELJnBL2 atObEuJy 12ZZOpBDWINR3 WKkDNLCGITkCKpOFS5EWIrVDwh54NNevkCQRZita z4IBO END CERTIFICATE 5 Select and copy the contents excluding the starting line containing BEGIN CERTIFICATE and the ending line containing END CERTIFICATE as illustrated below sis Raritan ad Chapter 10 Using the Command Line Interface MIICjTCCAfigAwIBAgIEMaYgRzALBgkqhkiG9wOBAQQwRTELMAk GAlUEBhMCVVMxNjAOBgNVBAoTLUShdGlvbmFsIEFlcm9uYXV0aW NzIGFuZCBTcGFjZSBBZGlpbmlzdHJhdGlvbjAmFxE5NjA1MjgxM zQ5MDUrMDgwMBCROTgwNTI4MTMOOTA1KzAA4MDAwZzELMAkGA1UE BhMCVVMxNjAOBgNVBAoTLU5hdGlvbmFsIEFlcm9uYXVOaWNzIGF uZCBTcGFjZSBBZGlpbmlzdHJhdGlvbjEgMAkGA1UEBRMCMTYwEWw YDVQODEwxTdGV2ZSBTY2hvY2gwWDALBgkqhkiG9wOBAQEDSQAwR i gJBALrAwyYdgxmzNP tsOUyf6BpmiJYktU w4NG67ULaNA4B5Cn Z7Ik57s903YY3LecETgO5iOHmkwlYDTL2fTgVfwOCAQOjgaswgag ZAYDVROZAOH BFowWDBWMFOXxCZzAJBgNVBAYTAl1VTMTYwNAYDVQ KEylOYXRpb25hbCBBZXJvbmFldGljcyBhbmQgU3BhY2UgOWRta 5pc3RyYXRpb24xDTALBgNVBAMTBENSTDEwFwYDVROBAQH BAOw 4A JODMyOTcwODEWMBgGA1UdAgQRMA8ECTgzMj k3MDgyM4ACBSA DOYDVROKBAYwBAMCBkAwCwYJKoZIhvcNAQEEAAGBAH2ylVCEw AzaXzSYZJTTUi3uawbbFiS2yxHvgf284 8Js00HXk1Hl1w2d6qOH 21X82tZzXd 0JtGO0glT9usFFBDvYK800ebgz P5ELJnBL2 atOb uJylZZOpBDWINR3WKkKDNLCGiTkCKpOF5EWIrVDwh54NNevkCORZ ta z4IBO
100. Asset Management Sensors with the EMX c Connect the other end of the cable to the RJ 45 connector labeled Input on another AMS M2 Z d Repeat the above steps to daisy chain additional AMS M2 Z See AMS M2 Z Daisy Chain Limitations on page 334 for the maximum number of AMS M2 Z asset sensors supported in the chain e tis highly recommended using the cable ties to help hold the weight of all connecting cables 4 Repeat Step 2 to connect IT devices to the other AMS M2 Z s in the chain via the asset tags AMS M2 Z Daisy Chain Limitations There are some limitations when daisy chaining the AMS M2 Z asset sensors The limitations vary according to the Raritan product model connected to the first AMS M2 Z Models Daisy chain limitations All PDUs e Upto 4 AMS M2 Z can be daisy whose chained model e The maximum cable length between names each AMS M2 Z in the chain is 2 meters begin with PX2 2 111 e Upto 2 AMS M2 Z can be daisy chained e maximum cable length between each AMS M2 Z in the chain is 2 meters Z Raritan Appendix A Using Raritan Asset Management Sensors with the Models Daisy chain limitations EMX2 888 e Upto 6 AMS M2 Z can be daisy chained e The maximum cable length between each AMS M2 Z in the chain is 3 meters Expanding a Blade Extension Strip A blade extension strip like an asset sensor has multiple tag ports After connecting it to a specific asset sensor
101. Center NOC Press 6 then Press 1 For CommandCenter Secure Gateway Press 6 then Press 2 Fax 732 764 8887 Email for CommandCenter NOC tech ccnoc raritan com Email for all other products tech raritan com gt China Beijing Monday Friday 9 a m 6 p m local time Phone 86 10 88091890 Shanghai Monday Friday 9 a m 6 p m local time Phone 86 21 5425 2499 GuangZhou Monday Friday 9 a m 6 p m local time Phone 86 20 8755 5561 gt India Monday Friday 9 a m 6 p m local time Phone 91 124 410 7881 gt Japan Monday Friday 9 30 a m 5 30 p m local time Phone 81 3 3523 5991 Email support japan raritan com gt Europe Europe Monday Friday 8 30 a m 5 p m GMT 1 Phone 31 10 2844040 Email tech europe raritan com United Kingdom Monday Friday 8 30 a m to 5 p m GMT Phone 44 0 20 7090 1390 France Monday Friday 8 30 a m 5 p m GMT 1 CET Phone 33 1 47 56 20 39 Germany Monday Friday 8 30 a m 5 30 p m GMT 1 CET Phone 49 20 17 47 98 0 Email rg support raritan com gt Melbourne Australia Monday Friday 9 00 a m 6 p m local time Phone 61 3 9866 6887 gt Taiwan Monday Friday 9 a m 6 p m GMT 5 Standard 4 Daylight Phone 886 2 8919 1333 Email support apac raritan com
102. Chapter 2 Installing and Configuring the Device Mount the device by screwing a mounting button in the back center of each L bracket and then having both buttons engage the mounting holes in the ie The recommended torque for the button is 1 96 N m 20 kgf cm Mounting 10 EMX Device Using the appropriate brackets and tools fasten the 1U EMX device to the rack or cabinet gt To mount the 10 EMX device 1 Attach one rackmount bracket to one side of the EMX device a Align the oval shaped holes of the rackmount bracket with the threaded holes on one side of the EMX device b Secure the rackmount bracket with Raritan provided screws Note The appropriate oval shaped hole locations of the rackmount bracket may vary according to the threaded holes on you model 2 Repeat Step 1 for securing the other rackmount bracket to the other side of the EMX Z Raritan Chapter 2 Installing and Configuring the EMX Device 3 Insert one end of the cable support bar into the L shaped hole of the rackmount bracket and align the hole on the end of the bar with the threaded hole adjacent to the L shaped hole SCrews 5 Repeat Steps 3 to 4 to secure the other end of the cable support bar to the other rackmount bracket 6 Mount the EMX device on the rack by securing the rackmount brackets ears to the rack s front rails with your own screws bolts cage nuts or the like Raritan Chapte
103. D TAGID disconnected at rack unit RACKUNIT of asset strip STRIPID STRIPNAME Blade extension overflow cleared for strip STRIPID STRIPNAME LHX has been disconnected from PORTTYPE port PORTID LHX connected to PORTTYPE port PORTID has been switched off 151 Chapter 7 Event Rules Event Actions and Application Logs Event Context LHX gt Sensor gt Unavailable LHX gt Sensor gt Auxiliary Port 2 gt Above upper critical threshold LHX gt Sensor gt Auxiliary Port 2 gt Above upper warning threshold LHX gt Sensor gt Auxiliary Port 2 gt Below lower warning threshold LHX gt Sensor gt Auxiliary Port 2 gt Auxiliary Port 2 gt Below lower critical threshold LHX gt Emergency Cooling gt Auxiliary Port 2 LHX gt Maximum cooling request gt Auxiliary Port 2 LHX gt Parameter Data Loss gt Auxiliary Port 2 LHX gt ST Bus Communication Error gt Auxiliary Port 2 LHX gt Collective fault gt Auxiliary Port 2 LHX gt Auxiliary Port 2 gt Door Contact LHX gt Sensor Failure Auxiliary Port 2 gt Sensor LHX gt Fan Failure gt Auxiliary Port 2 gt LHX fan LHX gt Power Supply Failure 152 Default Assertion Message when the Event TRUE Sensor LHXSENSORID on LHX at PORTTYPE port TPORTID unavailable Sensor LHXSENSORID on LHX at PORTTYPE port PORTID asserted above upper critical Sensor LHXSENSORID o
104. DNS servers are available the EMX only uses the primary IPv4 and IPv6 DNS servers Example The following command determines that the secondary DNS server is 192 168 84 33 config f network ipv4 secondaryDNSServer 192 168 84 33 Overriding the IPv4 DHCP Assigned DNS Server After specifying the primary secondary DNS server you can use this command to override the DHCP assigned DNS server with the one you specified config f network ipv4 overrideDNS option Variables e option is one of the options enable or disable Option Description enable This option overrides the DHCP assigned DNS server with the primary secondary DNS server you assign disable This option resumes using the DHCP assigned DNS server Raritan Chapter 10 Using the Command Line Interface Example The following command overrides the DHCP assigned DNS server with the one you specified config network ipv4 overrideDNS enabl Configuring the IPv6 Parameters An IPv6 configuration command begins with network ipv6 The commands are case sensitive so ensure you capitalize them correctly Setting the IPv6 Configuration Mode This command syntax determines the IP configuration mode config f network ipConfigurationMode mode Variables e mode is one of the modes automatic or static Mode Description automatic The IPv6 configuration mode is set to automatic static The IPv6 configuration mode is set to sta
105. E PORTID PORTTYPE RACKSLOT SENSORINTVALUE SENSORREADING SENSORREADINGUNIT SENSORSTATE SENSORTYPE SERVER SMTPRECIPIENTS SMTPSERVER TIMESTAMP TYPEDPORTID UMTARGETROLE Description The Schroff LHX Support state The name or IP address of a monitored host The numeric ID of the previous sensor state The firmware version the device is being upgraded from The outlet power line identifier The outlet sensor name The sensor name for a certain power line The Power Logic Device sensor id The Power Logic Device sensor name The label of the external port the event triggering device is connected to The type of the external port for example feature or auxiliary the event triggering device is connected to The horizontal slot position an action applies to The integer value of a sensor reading or state The value of a sensor reading The unit of a sensor reading The numeric ID of the current sensor state The type of a sensor The name or IP address of a server The list of recipients an SMTP message was sent to The name or IP address of an SMTP server The timestamp of the event occurance The port id with type prefix A for auxiliary F for feature The name of a user management role an action was applied on 147 Chapter 7 Event Rules Event Actions and Application Logs Placeholder Description UMTARGETUSER The user an action was triggered f
106. EMX only supports the Schroff LHX 20 and LHX 40 heat exchangers Raritan LCD Display Panel Raritan Chapter 3 Getting Started The LCD display panel shows the sensor reading or status asset management states and the device s MAC address Raritan CX CX It consists of e AnLCD display e Control buttons LCD Display Different types of information are shown in different sections of the LCD display The diagram indicates the sections 0 e 45 46 Chapter 3 Getting Started Section Information shown Depending on your selection the information displayed includes The selected environmental sensor including the sensor s ID number The EMX shows the selected environmental sensor in two ways For a sensor whose ID number is below 100 it is displayed as SENSOR X or SENSOR where X and XX are numeric digits For a sensor whose ID number is equal to or over 100 it is displayed as 1 SENSOR XX where XX are the last two numeric digits of the ID number The number of the FEATURE port where the selected asset sensor is connected Depending on your selection the information displayed includes Sensor reading comprising numeric digits or sensor state comprising alphabetical characters Number of the SENSOR port where the selected sensor is physically connected X Y or Z coordinates of the selected environmental sensor Serial number of the selected environmental
107. HX Heat Exchanger support is disabled As such support needs to be enabled before the device appears in the navigation tree or on the dashboard Additionally Schroff LHX Heat Exchanger support must be enabled in order for the LHX MIB to be accessible through SNMP gt To enable the Schroff LHX Heat Exchanger 1 Select Device Settings gt Features and then select the Schroff Heat Exchanger checkbox on the menu Click Yes to confirm Reboot the EMX Raritan Chapter 8 Managing External Devices Naming a Heat Exchanger To help identify an LHX heat exchanger in the EMX web interface assign a name to it The customized LHX heat exchanger s name is followed by the device type and RS 485 port number in parentheses The web interface provides two types of setup dialogs for naming a specific LHX heat exchanger gt Z Raritan To name a heat exchanger using the Auxiliary Port Setup dialog Connect the LHX heat exchanger to EMX if it is not already connected If the EMX folder is not expanded expand it to show all components Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 Click the Auxiliary Ports folder The Auxiliary Ports page opens in the right pane listing all RS 485 ports Select the port where the desired heat exchanger is connected on the Auxiliary Ports page and click Setup Or simply double click that por
108. LDAP is in use consult your LDAP administrator for the CA certificate file e The network port used by the LDAP server e The type of the LDAP server usually one of the following options OpenLDAP f using an OpenLDAP server consult the LDAP administrator for the Bind Distinguished Name DN and password Microsoft Active Directory AD zie Raritan 124 Chapter 6 Security f using a Microsoft Active Directory server consult your AD administrator for the name of the Active Directory Domain e Bind Distinguished Name DN and password if anonymous bind is NOT used e The Base DN of the server used for searching for users e The login name attribute or AuthorizationString e user entry object class e user search subfilter or BaseSearch Adding the LDAP Server Settings To activate and use external LDAP LDAPS server authentication enable LDAP authentication and enter the information you have gathered for any LDAP LDAPS server Note An LDAPS server refers to an SSL secured LDAP server gt To add the LDAP LDAPS server settings 1 Choose Device Settings Security Authentication The Authentication Settings dialog appears 2 Select the LDAP radio button to activate remote LDAP LDAPS server authentication 3 Click New to add an LDAP LDAPS server for authentication The Create new LDAP Server Configuration dialog appears 4 Address Hostname Type the IP address
109. Management Sensors with the EMX 329 Asset Sensors and ags iinet Nae based aisle added 329 Configuring the Asset Sensor aces 330 Specific LED s Color Settings cocido tert o eene trn baa 332 Connecting AMS M2 Z Asset Sensors Optional sess 333 Expanding a Blade Extension Strip i ses gta ote 335 Connecting Blade Extension Strips i uci reti etre tet o hd getreten o sa 336 Appendix B Integrating EMX and Asset Management Sensors with dcTrack 340 viii OV 341 EMX Asset Sensor Managemient 1 02 cet utere ice de Econ in ELE Desk a aa 343 Setting Up Asset Sensors In EMX isin 3 aiii HR Re SERRE IE ad ieee 343 Raritan Appendix Raritan PX Asset Management MA DA LL AL Appendix Specifications Altitude Correction Factors EMX sse Maximum Ambient Operating Temperature EMX Serial RS 232 Port Pinouts sssssssssssseseeeeeene enne Sensor RJ 12 Port Pinouts RS 485 Port Pinouts 0 0 00 cccccccceecceeecseeceeeceneeeeeceeeeeesceeeeesseeeeeeesseeaeeeseeeaeess Appendix E LDAP Configuration Illustration Step A Determine User Accounts
110. NMP Configuration You can enable or disable the SNMP v1 v2c or v3 agent configure the read and write community strings or set the MIB II parameters such as sysContact using the CLI commands An SNMP command begins with network services snmp Enabling or Disabling SNMP v1 v2c This command syntax enables or disables the SNMP v1 v2c protocol config f network services snmp vl v2c option Variables e option is one of the options enable or disable Option Description enable The SNMP v1 v2c protocol is enabled 255 Chapter 10 Using the Command Line Interface Option Description disable The SNMP v1 v2c protocol is disabled Example The following command enables the SNMP v1 v2c protocol config network services snmp vl v2c enable Enabling or Disabling SNMP v3 This command syntax enables or disables the SNMP v3 protocol config network services snmp v3 lt option gt Variables e option is one of the options enable or disable Option Description enable The SNMP v3 protocol is enabled disable The SNMP v3 protocol is disabled Example The following command enables the SNMP v3 protocol config f network services snmp v3 enable Setting the SNMP Read Community This command syntax sets the SNMP read only community string config f network services snmp readCommunity lt string gt Variables e lt string gt is a string comprising 4 to 64 ASCII printable characters e The string CANNOT
111. NMP MIB on page 209 6 Click OK to save the changes zie Raritan d Chapter 9 Using SNMP Configuring SNMP Notifications The EMX automatically keeps an internal log of events that occur See Event Rules and Actions on page 131 These events can also be used to send SNMP v2c or v3 notifications to a third party destination The EMX provides you with the ability to create SNMPv2c and SNMPv3 TRAP communications or SNMPv2c and SNMPv3 INFORM communications SNMP TRAP communications capture and send information via SNMP but no confirmation that the communication between the devices has succeeded is provided to the receiving device SNMP INFORM communications capture and send information via SNMP and an acknowledgment that the communication was received by the receiving device is provided If the inform communication fails it is resent You can define the number of times and the intervals to resend the inform communication or leave the defaults of five 5 resends in three 3 second intervals Note SNMP INFORM communications may take up slightly more network resources than SNMP TRAP communications since there are additional communications between the devices and due to additional network traffic created should the initial communication fail and another is sent Use SNMP TRAP rules if you do not need confirmation that the communication has succeeded and if you need to conserve network resources Use SNMP INFORM communicatio
112. P 128 Enabling LDAP and Local Authentication Services sse 129 Enabling and Editing the Security Banner Restrictive Service Agreement Banner 129 Chapter 7 Event Rules Event Actions and Application Logs 131 Event Rules Inepte 131 Components of Event RUNG Eon 131 Creating am Event 132 Saimple Event RUES eer tr 154 Modityiag an Event potu eux re Rennen Ron n auus 156 zie Raritan d Contents Moditying ACUON 157 Deleting an Event Rule or ACthO Msi iii 158 A Note about Untriggered Rules 3h idedediadebeathdecedienieck 158 EVGNt 1000100 158 Viewing the Local EvetntibOg coerente nete ere nde 159 Glearing Event Entries auc tee trt tenter nente E ears gea Exe Rd genaue dana LY ate 159 Viewing the Communication rn re esit tea EE usb e Eger edad 160 Chapter 8 Managing External Devices 161 SRI cdo 161 EMX and PX2 PDU Cascading Gonnections
113. R port where each environmental sensor is physically connected CC1 CC2 refer to the onboard contact closure sensor termination Managing Environmental Sensors The EMX starts to retrieve an environmental sensor s reading and or state and records the state transitions after the environmental sensor is managed If a Raritan sensor hub is used you can connect up to 16 environmental sensors per SENSOR port That is e For EMX2 111 which has only 1 SENSOR port a maximum of 16 environmental sensors can be connected e For EMX2 888 which has 8 SENSOR ports a maximum of 128 environmental sensors can be connected Since the EMX2 888 device is implemented with two channels of onboard contact closure termination it supports a maximum of 130 environmental sensors e Each SENSOR port can only support a maximum of two Raritan contact closure sensors which has the shortest update interval among all Raritan sensors See Information about Update Interval on page 177 When the total number of managed sensors has not reached the maximum the EMX automatically brings detected environmental sensors under management You should only have to manually manage a sensor when it is not under management gt To manually manage an environmental sensor 1 Ifthe EMX folder is not expanded expand it to show all components Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming th
114. RE port on the EMX 2 Affix an asset tag to the IT device and connect this asset tag to the AMS M2 Z by plugging the tag connector into the tag port on the AMS M2 Z See Connecting Asset Sensors to the EMX on page 24 for details 3 If necessary daisy chain multiple AMS M2 Z to track more than two IT devices via this EMX a Verify that the Category 5e 6 cable length is within the limitation See AMS M2 Z Daisy Chain Limitations on page 334 for the cable length limitations Connect one end of the Category 5e 6 cable to the RJ 45 connector labeled Output on the AMS M2 Z being connected to the EMX Connect the other end of the cable to the RJ 45 connector labeled Input on another AMS M2 Z Repeat the above steps to daisy chain additional AMS M2 Z See AMS M2 Z Daisy Chain Limitations on page 334 for the maximum number of AMS M2 Z asset sensors supported in the chain It is highly recommended using the cable ties to help hold the weight of all connecting cables 4 Repeat Step 2 to connect IT devices to the other AMS M2 Z s in the chain via the asset tags Raritan 29 30 Chapter 2 Installing and Configuring the Device Connecting Blade Extension Strips For blade servers which are contained in a single chassis you can use a blade extension strip to track individual blade servers Raritan s blade extension strip functions similar to a Raritan asset sensor but requires a tag connector cabl
115. RNAME on Power Logic Device at PORTTYPE port PORTID unavailable Sensor PLSENSORNAME on Power Logic Device at PORTTYPE port PORTID asserted above upper critical at SENSORREADING SENSORREADINGUNIT Sensor PLSENSORNAME on Power Logic Device at PORTTYPE port PORTID asserted above upper warning at SENSORREADING SENSORREADINGUNIT Sensor PLSENSORNAME on Power Logic Device at PORTTYPE port PORTID asserted below lower warning at SENSORREADING SENSORREADINGUNIT Default Assertion Message when the Event FALSE The humidity on LHX at PORTTYPE port PORTID is within thresholds PowerLogic Device has been disconnected from PORTTYPE port PORTID PowerLogic Device connected to PORTTYPE port PORTID left an alarm condition Sensor PLSENSORNAME on Power Logic Device at PORTTYPE port PORTIDJ available Sensor PLSENSORNAME on Power Logic Device at PORTTYPE port TPORTID deasserted above upper critical at SENSORREADING SENSORREADINGUNIT Sensor PLSENSORNAME Power Logic Device at PORTTYPE port TPORTID deasserted above upper warning at SENSORREADING SENSORREADINGUNIT Sensor PLSENSORNAME Power Logic Device at PORTTYPE port PORTID deasserted below lower warning at SENSORREADING SENSORREADINGUNIT 153 Chapter 7 Event Rules Event Actions and Application Logs Event Context Default
116. Select the desired sensor in the Sensors table and click Setup Thresholds or simply double click that sensor The setup dialog for the selected sensor appears 5 Adjust the threshold and deassertion hysteresis settings The Upper Critical and Lower Critical values are points at which the EMX considers the operating environment critical and outside the range of the acceptable threshold enable any threshold select the corresponding checkbox To disable a threshold deselect the checkbox After any threshold is enabled type an appropriate numeric value in the accompanying text box enable the deassertion hysteresis for all thresholds type a numeric value other than zero in the Deassertion Hysteresis field See What is Deassertion Hysteresis on page 182 6 Click OK to save the changes Monitoring the Heat Exchanger The EMX web interface lets you monitor the status of each connected LHX heat exchanger as well as the status of each LHX built in sensor kg Raritan Z Raritan Chapter 8 Managing External Devices Viewing the Summary Both the Dashboard and Auxiliary Port pages display the summary of all connected LHX heat exchangers including the RS 485 port number where each heat exchanger is connected and each heat exchanger s status If any LHX heat exchanger is highlighted in red in the summary it indicates that there is LHX sensor failure on that heat exchanger View the State or Status colu
117. Sensor OCPSENSOR on overcurrent protector OCP available External sensor TEXTSENSORNAME in slot EXTSENSORSLOT available External sensor TEXTSENSORNAME in slot EXTSENSORSLOT deasserted above upper critical External sensor EXTSENSORNAME in slot EXTSENSORSLOT deasserted above upper warning External sensor EXTSENSORNAME in slot EXTSENSORSLOT deasserted below lower warning External sensor EXTSENSORNAME in slot EXTSENSORSLOT deasserted below lower critical External sensor EXTSENSORNAME in slot EXTSENSORSLOT available External sensor EXTSENSORNAME in slot EXTSENSORSLOT is open External sensor EXTSENSORNAME in slot TEXTSENSORSLOT is off External sensor EXTSENSORNAME in slot Raritan Event Context Server Monitoring gt gt Monitored Server Monitoring gt gt Unreachable Asset Management gt State Asset Management gt Rack Unit gt gt Tag Connected Asset Management gt Rack Unit gt gt Blade Extension Connected Asset Management gt Firmware Update Asset Management gt Device Config Changed Asset Management gt Rack Unit Config Changed Asset Management gt Blade Extension Overflow Asset Management gt Composite Asset Strip Composition Changed LHX gt Auxiliary Port 2 gt Connected LHX gt Auxiliary Port 2 gt Operational State Raritan Chapter 7 Event R
118. The default policy is shown in the Default Policy field To change it select a different policy from the drop down list Accept Accepts traffic from all IPv4 addresses Drop Discards traffic from all IPv4 addresses without sending any failure notification to the source host Reject Discards traffic from all IPv4 addresses and an ICMP message is sent to the source host for failure notification 3 To determine the default policy for IPv6 addresses a Click the IPv6 tab b Ensure the Enable IPv6 Access Control checkbox is selected c The default policy is shown in the Default Policy field To change it select a different policy from the drop down list Accept Accepts traffic from all IPv6 addresses Drop Discards traffic from all IPv6 addresses without sending any failure notification to the source host Reject Discards traffic from all IPv6 addresses and an ICMP message is sent to the source host for failure notification 4 Click OK to save the changes The new default policy is applied Creating Firewall Rules Firewall rules determine whether to accept or discard traffic intended for the EMX based on the IP address of the host sending the traffic When creating firewall rules keep these principles in mind Rule order is important When traffic reaches the EMX device the rules are executed in numerical order Only the first rule that matches the IP address determines whether the traffic is acce
119. To configure a record snapshot to webcame storage action Choose Device Settings gt Event Rules The Event Rules Settings dialog opens Click the Actions tab 143 144 Chapter 7 Event Rules Event Actions and Application Logs 10 11 12 Click New In the Action name field type a new name for the action The default name is New Action numbers where number is a sequential number based on how many actions are already created In the Action field click the drop down arrow and select the desired action from the list Select a webcam from the Webcam drop down Selecting the action to perform Start Recording or Stop Recording Use the slide bar to specify the total number of snapshots to be taken when the event occurs The maximum amount of snapshots that can be stored on the is ten 10 If you set it for a number greater than ten after the tenth snapshot is taken and stored the oldest snapshots are overwritten In the Time before first Snapshot s field use the slide bar or enter the amount of time in seconds between when the event is triggered and the webcam begins taking snapshots In the Time between Snapshots s field use the slide bar or enter the amount of time between when each snapshot is taken Click OK to save the new action Click Close to quit the dialog Raritan Z Raritan Chapter 7 Event Rules Event Actions and Application Logs Email and SMS Message Pl
120. VICENAME EXTSENSORCHANNEL EXTSENSORNAME EXTSENSORSERIAL EXTSENSORSLOT EXTSENSORSUBTYPE IFNAME INLETPOLE INLETSENSOR ISASSERTED LDAPERRORDESC LHXERRORCODE LHXFANID LHXGWOLDOPSTATE LHXGWOPSTATE LHXGWSENSORID LHXGWSENSORTYPEID LHXPOWERSUPPLYID LHXSENSORID Description The new value of a parameter The human readable timestamp of the event occurrence The IP address of the device the event occurred on The name of the device the event occurred on The channel of an external sensor e g contact closure The name of an external sensor The serial number of an external sensor The ID of an external sensor slot The subtype of an external contact closure sensor The human readable name of an network interface The inlet power line identifier The inlet sensor name Boolean flag whether an event condition was entered 1 or left 0 An LDAP error occurred The error code supplied by an LHX The ID of a fan connected to an LHX The recent operational state of an LHX The present operational state of an LHX The 0 based sensor index The sensor type ID derived from LHX MIB The ID of an LHX power supply The ID of an LHX sensor probe Raritan Z Raritan Chapter 7 Event Rules Event Actions and Application Logs Placeholder LHXSUPPORTENABLED MONITOREDHOST OLDSENSORSTATE OLDVERSION OUTLETPOLE OUTLETSENSOR PDUPOLESENSOR PLSENSOR PLSENSORNAM
121. X device or Raritan contact closure sensor module DPX CC2 TR Each LED shows the state of the corresponding channel The LED is lit when the associated detector switch is in the abnormal state which is the opposite of the Normal state The meaning of a lit LED varies depending on the Normal state settings When the Normal state is set to Normally Closed N C LED Sensor state Not lit Closed Lit Open When the Normal state is set to Normally Open N O LED Sensor state Not lit Open Lit Closed 39 Chapter 2 Installing and Configuring the Device Connecting Differential Air Pressure Sensors You can have a Raritan differential air pressure sensor connected to the EMX device if the differential air pressure data is desired With this sensor the temperature around the sensor can be also detected through a temperature sensor implemented inside it Multiple differential air pressure sensors can be cascaded gt connect differential air pressure sensors 1 Plug one end of a Raritan provided phone cable to the SENSOR port of the EMX device 2 Plug the other end of this phone cable to the IN port of the differential air pressure sensor 3 To connect additional Raritan differential air pressure sensors do the following a Plug one end of a Raritan provided phone cable to the OUT port of the previous differential air pressure sensor b Plug the other end of this phone cable to the IN port of the ne
122. X displays all available ports in the data pane Raritan Chapter 8 Managing External Devices Cascading EMX Devices Note When cascading devices use a wired network connection Wireless connections are not supported when cascading devices gt connect EMX devices to an EMX device 1 If needed upgrade the EMX firmware of each device that will be part of the chain 2 Plug a USB cable into the USB B port on the slave EMX and connect it to the USB A port on the master EMX 3 If you are adding an additional EMXs to the chain plug a USB cable into USB B port on the additional EMX then plug the other end into USB A on the EMX that is already connected to the master EMX Up to three 3 EMXs can be connected to the master EMX 9 9 Cascading PX2 Devices with a EMX Note When cascading devices use a wired network connection Wireless connections are not supported when cascading devices gt connect PX2 devices to an EMX 1 If needed upgrade the EMX firmware of each device that will be part of the chain 2 Plug a USB cable into the USB B port on the slave PX2 and connect it to the USB A port on the master EMX zie Raritan m Chapter 8 Managing External Devices 3 If you are adding an additional PX2 to the chain plug a USB cable into USB B port on the additional PX then plug the other end into USB A on the PX2 that is already connected to the master EMX Up to three 3 PX2s
123. a Logging Options dialog appears 2 To enable the data logging feature select the enable checkbox in the Enable Data Logging field 3 Type a number in the Measurements Per Log Entry field Valid range is from 1 to 600 The default is 60 4 Select the environmental sensors whose data logging you want to enable Raritan Raritan Chapter 8 Managing External Devices select partial sensors select the corresponding checkboxes of the desired sensors in the Logging Enabled column To select all sensors click Enable All or Enable All in Page deselect all sensors click Disable All or Disable All in Page 5 Click OK to save the changes Information about Update Interval Raritan environmental sensors can be divided into two categories according to the update interval of the sensor s reading or state e Normal type Sensor readings or states are updated in a longer interval which varies between 3 to 40 seconds according to the total number of connected environmental sensors Most Raritan environmental sensors belong to this type such as the temperature or humidity sensor e High priority type Sensor readings or states are updated in a shorter interval which is less than or equal to 3 seconds Raritan contact closure sensors belong to this type Viewing Sensor Data Readings of the environmental sensors will display in the web interface after these sensors are properly connected and manage
124. a hyphen Cannot contain more than 63 characters Cannot contain punctuation marks spaces and other symbols Note If the Service Select the Specify DNS server manually checkbox if necessary Then type the address of the primary DNS server in the Primary DNS Server field The secondary DNS server and DNS suffix are optional Static To manually assign an IP address select Static and enter the following information in the corresponding fields address Netmask Gateway Primary DNS server Secondary DNS server optional DNS Suffix optional 4 Click OK to save the changes Raritan Chapter 5 Device Management Note The EMX supports a maximum of 3 DNS servers If two IPv4 DNS servers and two IPv6 DNS servers are available the EMX only uses the primary IPv4 and IPv6 DNS servers Modifying the IPv6 Settings You must enable the IPv6 protocol before you can modify the IPv6 network settings See Selecting the Internet Protocol on page 81 gt modify the IPv6 settings 1 Choose Device Settings Network The Network Configuration dialog appears Click the IPv6 Settings tab In the IP Auto Configuration field click the drop down arrow and select the desired option from the list Option Description Automatic auto configure EMX select Automatic With this option selected you can enter a preferred host name which is optional Type the host name in the Preferred Host
125. able Read Community String pubic Write Community String SNMP v3 Settings SNMP v3 E enable System Group sysContact sysName sysLocation Download Cancel 2 Enter the MIB II system group information if applicable di Raritan Chapter 9 Using SNMP a sysContact the contact person in charge of the system being contacted b sysName the name assigned to the system c sysLocation the location of the system 3 Select the MIB to be downloaded The SNMP MIB for your EMX is used by the SNMP manager Important You must download the SNMP MIB for your EMX to use with your SNMP manager Click Download MIB in this dialog to download the desired MIB file For more details see Downloading SNMP MIB on page 209 Click OK to save the changes On the Notifications tab select the Enable checkbox to enable the SNMP pnotification feature 6 From the Notification Type drop down select the type of SNMP notification 7 For SNMP TRAPs the engine ID is prepopulated For SNMP INFORM communications leave the resend settings at their default or a Inthe Timeout sec field enter the interval of time in seconds after which a new inform communication is resent if the first is not received For example resend a new inform communication once every 3 seconds b In the Number of Retries field enter the number of times you want to resend the inform communication if it fails For
126. abled true Forcing a Password Change This command syntax determines whether the password change is forced when a user logs in to the specified user profile next time xii Raritan Chapter 10 Using the Command Line Interface config user modify lt name gt forcePasswordChangeOnNextLogin lt option gt Variables e lt name gt is the name of the user whose settings you want to change e lt option gt is one of the options true or false Option Description true A password change is forced on the user s next login false No password change is forced on the user s next login Example The following command enforces a password change on May s next login config user modify May forcePasswordChangeOnNextLogin true Modifying the SNMPv3 Settings There are different commands to modify the SNMPv3 parameters of a specific user profile You can combine all of the following commands to modify the SNMPv3 parameters at a time See Multi Command Syntax on page 320 gt To enable or disable the SNMP v3 access to EMX for the specified user config user modify name snmpV3Access lt optionl gt Variables e name is the name of the user whose settings you want to change e option is one of the options enable or disable Option Description enable Enables the SNMP v3 access permission for the specified user disable Disables the SNMP v3 access permission for the specified user zie Raritan d Chapte
127. above the video image to open the Webcam Setup dialog then select the Snapshot radio button 2 Once the snapshot image being taken by the selected webcam is displayed in the right pane click the Store Snapshot to Webcam Storage icon above the image to take a snapshot Up to ten 10 snapshots can be stored at once on the device gt To view existing snapshots 1 Inthe navigation tree click Snapshot under the Webcam Management folder The snapshots are displayed in the right pane in the Storage section of the page 2 View an individual snapshot by clicking on a snapshot file in the Storage section of the page The size of each snapshot file the date and time each snapshot was taken and the webcam that took each snapshot is displayed when viewing snapshots Details such as the webcam location and or labels if any are displayed in the Details section below the snapshot in the right pane This information is defined when the webcam is initially configured See Configuring Webcams on page 185 Sis Raritan 190 Chapter 8 Managing External Devices 3 Use the navigation icons to move through each snapshot or enter a specific page number to jump to that snapshot snapshot page 14 4 Page 2 bi 4 Click the Refresh icon to refresh the page New snapshots displayed if they are available gt To delete snapshots manually e Delete snapshots by selecting the checkbox next to the snapshot you want
128. aceholders Following are placeholders that can be used in custom event email messages Note Click the Information icon to open the Event Context Information dialog which contains a list of placeholders and their definitions Note The LHX placeholders are only available when the Schroff LHX Support feature is enabled Placeholder AMSBLADEOVERFLOW AMSBLADESIZE AMSBLADESLOTNUMBER AMSBLADESLOTPOSITION AMSCOMPONENTCOUNT AMSLEDCOLOR AMSLEDMODE AMSLEDOPMODE AMSNAME AMSNUMBER AMSOLDCOMPONENTCOU NT AMSRACKUNITNUMBER AMSRACKUNITPOSITION AMSSTATE AMSTAGID CONFIGPARAM CONFIGPARAMID Description The asset strip overflow indicator The slot count of a blade extension The numeric index of a blade slot The horizontal slot position an action applies to The number of components a composite asset strip consists of The RGB LED color The LED indication mode The LED operating mode The name of an asset strip The numeric ID of an asset strip The number of components a composite asset strip consisted of The numeric index of a rack unit The vertical rack unit position an action applies to The human readable state of an asset strip The asset tag ID The name of a configuration parameter The ID of a configuration parameter 145 146 Chapter 7 Event Rules Event Actions and Application Logs Placeholder CONFIGVALUE DATETIME DEVICEIP DE
129. achability The Server Reachability dialog appears Select the IT device whose settings you want to modify by clicking it Click Edit or double click the IT device The Edit Server XXX dialog appears where XXX is the IP address or host name of the IT device Make changes to the information shown Click OK to save the changes 167 Chapter 8 Managing External Devices 168 Deleting Ping Monitoring Settings When it is not necessary to monitor the accessibility of any IT device just remove it gt 1 To delete ping monitoring settings for an IT device Choose Device Settings gt Server Reachability The Server Reachability dialog appears Select the IT device whose ping monitoring settings you want to remove by clicking it To make multiple selections press Ctrl click or Shift click to highlight multiple ones Click Delete A message appears prompting you to confirm the operation Click Yes to confirm the deletion Click Close to quit the dialog Checking Server Monitoring States Server monitoring results are available in the Server Reachability dialog after specifying servers for the EMX device to monitor gt 1 To check the server monitoring states and results Choose Device Settings gt Server Reachability The Server Reachability dialog appears The column labeled Ping Enabled indicates whether the monitoring for the corresponding server is activated or not S This icon d
130. admin preferredTemperatureUnit config user modify admin preferredLengthUnit meter feet config t user modify admin preferredLengthUnit meter config user modify admin preferredPressureUnit pascal psi config t user modify admin preferredPressureUnit pascal config apply Time Configuration Commands A time configuration command begins with time Raritan Chapter 10 Using the Command Line Interface Determining the Time Setup Method This command syntax determines the method to configure the system date and time config time method lt method gt Variables e method is one of the time setup options manual or nip Mode Description manual The date and time settings are customized ntp The date and time settings synchronize with a specified NTP server Example The following command sets the date and time settings by using the NTP Servers config f time method ntp Setting the NTP Parameters A time configuration command that is used to set the NTP parameters begins with time ntp Specifying the Primary NTP Server This command syntax specifies the primary time server if synchronization with the NTP server is enabled config i time ntp firstServer first server Variables e The first server is the IP address or host name of the primary NTP server zie Raritan Chapter 10 Using the Command Line Interface 306 Example The following command sets the primary time ser
131. akes the action only when the chosen sensor returns to normal Both EMX takes the action both when the chosen sensor enters or quits the alarmed state Sensor availability Available radio buttons include Unavailable Available and Both Unavailable The EMX takes the action only when the chosen sensor is NOT detected and becomes unavailable Available The EMX takes the action only when the chosen sensor is detected and becomes available Both The EMX takes the action both when the chosen sensor becomes unavailable or available zie Raritan m Chapter 7 Event Rules Event Actions and Application Logs Event types Network interface link state Function enabled or disabled User logon state Server monitoring event 134 Radio buttons Available radio buttons include Link state is up Link state is down and Both Link state is up The EMX takes the action only when the network link state changes from down to up Link state is down The EMX takes the action only when the network link state changes from up to down Both The EMX takes the action whenever the network link state changes Available radio buttons include Enabled Disabled and Both Enabled The EMX takes the action only when the chosen function is enabled Disabled The EMX takes the action only when the chosen function is disabled Both The EMX takes the action when the chosen function is either e
132. ame 4 Type aname and press Enter The name is case sensitive so make sure you capitalize the correct letters Then you are prompted to enter a password zie Raritan ii Chapter 10 Using the Command Line Interface Username admin Password _ 5 Type a password and press Enter The password is case sensitive so make sure you capitalize the correct letters After properly entering the password the or gt system prompt appears See Different CLI Modes and Prompts on page 215 in the EMX User Guide for details Tip The Last Login information including the date and time is also displayed if the same user profile was once used to log in to the EMX web interface or CLI 6 You are now logged in to the command line interface and can begin administering the EMX device With SSH or Telnet You can remotely log in to the command line interface using an SSH or Telnet client such as PuTTY Note PuTTY is a free program you can download from the Internet See PuTTY s documentation for details on configuration gt To log in using SSH or Telnet 1 Ensure SSH or Telnet has been enabled See Modifying the Network Service Settings on page 84 in the EMX User Guide 2 Launch an SSH or Telnet client and open a console window A login prompt appears name and press Enter The name is case sensitive so make sure you capitalize the correct letters Note If using the SSH client the name must NOT ex
133. anel shows the first environmental sensor listed on the External Sensors page of the web interface until you select a different environmental sensor or a different target Environmental Sensor Information The environmental sensor information is displayed as SENSOR in the LCD display Operate the LCD display to view information about the selected environmental sensor including the sensor reading or state the sensor s physical port number X Y Z coordinates and its serial number gt 1 To display the environmental sensor information Press the Up or Down button until the desired environmental sensor s ID number is displayed in the top of the LCD display See LCD Display on page 45 For example SENSOR 1 refers to the 1 sensor listed on the External Sensors page of the web interface Pressing the A UP button moves up one selection Pressing the V DOWN button moves down one selection 1 SENSOR 24 refers to the 124 sensor Note Press and hold the Up or Down buttons for at least two 2 seconds to quickly move through several items at once 47 Chapter 3 Getting Started The LCD display shows the reading or state of the selected sensor in the middle of the LCD display For a numeric sensor s reading the appropriate measurement unit is displayed to the right of the reading is displayed for a humidity sensor a is displayed for a temperature sensor For a discrete sensor either of the followin
134. are case sensitive so ensure you capitalize them correctly Setting the SSID This command syntax specifies the SSID string config f network wireless SSID ssid Variables e lt ssid gt is the name of the wireless access point which consists of Up to 32 ASCII characters No spaces ASCII codes 0x20 0 7 Example The following command assigns myssid as the SSID config f network wireless SSID myssid zie Raritan id Chapter 10 Using the Command Line Interface Setting the Authentication Method This command syntax sets the wireless authentication method to either PSK or Extensible Authentication Protocol EAP config network wireless authMethod lt method gt Variables e method is one of the authentication methods PSK or EAP Method Description PSK The wireless authentication method is set to PSK EAP The wireless authentication method is set to EAP Example The following command sets the wireless authentication method to PSK config f network wireless authMethod PSK Setting the PSK If the Pre Shared Key PSK authentication method is selected you must assign a PSK passphrase by using this command syntax config f network wireless PSK lt psk gt Variables e psk is a string or passphrase that consists of Up to 32 ASCII characters No spaces ASCII codes 0x20 0 7 Example This command assigns encryp key as the PSK config network wireless PSK encryp
135. asily If necessary you may use the adhesive tape in the back of the mylar section to help fix the strip in place 3 Connect one end of an asset tag to a blade server and connect the other end to the blade extension strip a Affix the adhesive part of the asset tag to one side of a blade server through the tag s tape Z Raritan 32 Chapter 2 Installing and Configuring the EMX Device b Plug the tag connector of the asset tag into the tag port on the blade extension strip 4 Repeat the above step until all blade servers in the chassis are connected to the blade extension strip via asset tags 5 Plug the tag connector of the blade extension strip into the closest tag port of the asset sensor assembly or the AMS M2 Z asset sensor on the rack Note If you need to temporarily disconnect the tag connector of the blade extension strip wait at least 1 second before connecting it back or the EMX may not detect it Raritan Chapter 2 Installing and Configuring the EMX Device Connecting Environmental Sensors Optional Raritan To enable the detection of environmental factors around the EMX connect one or more Raritan environmental sensors to the EMX device The maximum distance for all sensor cabling plugged into the product s sensor port should not exceed 30 meters 100 feet Contact Raritan Technical Support if you have questions If a Raritan sensor hub is used you can connect up to 16 enviro
136. aster asset sensor Raritan Chapter 2 Installing and Configuring the EMX Device Make sure that the U shaped sheet metal adjacent to the male DIN connector is inserted into the rear slot of the master asset sensor Screw up the U shaped sheet metal to reinforce the connection 2 Connect another 8U slave asset sensor to the one being attached to the master asset sensor in the same manner as Step 1 3 Repeat the above step to connect more slave asset sensors The length of the asset sensor assembly can be up to 64U final asset sensor can be 80 50 depending on the actual height of your rack Using the ending asset sensor as the final asset sensor is strongly recommended 4 Vertically attach the asset sensor assembly to the rack next to the IT equipment making each tag port horizontally align with a rack unit The asset sensors are automatically attracted to the rack because of magnetic stripes on the back Note The asset sensor is implemented with a tilt sensor so it can be mounted upside down Raritan 24 Chapter 2 Installing and Configuring the Device Connecting Asset Sensors to the EMX You need both asset sensors and asset tags for tracking devices Asset tags which are affixed to devices provide an ID number for each device while the asset sensors transmit ID numbers and positioning information to the connected EMX device The following diagram illustrates an as
137. ation Value This command syntax sets the SNMP MIB II sysLocation value config network services snmp sysLocation lt value gt Variables e value is a string comprising 0 to 255 alphanumeric characters Example The following command sets the SNMP MIB II sysLocation to New TAIPEI config f network services snmp sysLocation New TAIPEI Security Configuration Commands A security configuration command begins with security ics Raritan Chapter 10 Using the Command Line Interface Firewall Control You can manage firewall control features through the CLI The firewall control lets you set up rules that permit or disallow access to the EMX device from a specific or a range of IP addresses e AnIPvA firewall configuration command begins with security ipAccessControl ipv4 e AnIPv6 firewall configuration command begins with security ipAccessControl ipv6 Raritan Chapter 10 Using the Command Line Interface Modifying the Firewall Control Parameters There are different commands for modifying firewall control parameters IPv4 commands gt enable or disable the IPv4 firewall control feature use this command syntax config security ipAccessControl ipv4 enabled lt option gt gt To determine the default IPv4 firewall control policy use this command syntax config security ipAccessControl ipv4 defaultPolicy lt policy gt e IPv6 commands gt enable or disable the IPv6 firewall
138. ation is complete gt In Linux No additional drivers are required but you must provide the name of the tty device which can be found in the output of the dmesg after connecting the EMX to the computer Usually the tty device is dev ttyACM or dev ttyUSB where is an integer number For example if you are using the kermit terminal program and the tty device is dev ttyACMO perform the following commands gt set line dev ttyACMO gt connect Raritan Chapter 2 Installing and Configuring the EMX Device Connecting the EMX to Your Network To use the web interface to administer the EMX you must connect the EMX to your local area network LAN The EMX can be connected to a wired or wireless network gt make a wired connection 1 Connect a standard Category 5e 6 UTP cable to the ETHERNET port on the EMX 2 Connect the other end of the cable to your LAN gt To make a wireless connection Do one of the following Plug a 802 11n wireless USB LAN adapter into the USB A port on your EMX Connect a USB docking station to the USB A port on the EMX and plug the 802 11n wireless USB LAN adapter into the appropriate USB port on the docking station Supported Wireless LAN Configuration If you select the wireless connection ensure that both of your wireless USB LAN adapter and wireless network configuration meet the following requirements Network type 802 11n Protocol
139. ation requested Type this information The country where your company is located Use the standard ISO country code For a list of ISO codes visit the SO website httpz www iso org iso country codes iso 3166 code lists htm The full name of the state or province where your company is located The city where your company is located The registered name of your company The name of your department The fully qualified domain name FQDN of your EMX device An email address where you or another administrative user can be reached Raritan Chapter 6 Security Field Type this information Key Length Select the key length bits from the drop down list in this field A larger key length enhances the security but slows down the EMX device s response Self Sign Ensure this checkbox is selected which indicates that you are creating a self signed certificate Validity in days This field appears after the Self Sign checkbox is selected Type the number of days for which the self signed certificate is valid in this field Note All fields in the Subject section are mandatory except for the Organization Organizational Unit and Email Address fields A password is not required for a self signed certificate so the Challenge and Confirm Challenge fields disappear after the Self Sign checkbox is selected 4 Click Create New SSL Key to create both the self signed certificate and private key This may take several minutes to comp
140. b Inthe Wait Time in seconds after Unsuccessful Ping field type Raritan Z Raritan Chapter 8 Managing External Devices In the Wait Time in seconds before Resuming Pinging field type 60 to make the EMX stops pinging the target PDU for 60 seconds 1 minute after the PDU inaccessibility is declared After 60 seconds the EMX will re ping the target PDU Step 2 Create an event rule to send SNMP notifications for this PDU Choose Device Settings Event Rules The Event Rule Settings dialog appears Click New In the Rule name field type Send SNMP notifications for PDU 192 168 84 95 inaccessibility Select the Enabled checkbox to enable this new rule In the Event field choose Server Monitoring gt 192 168 84 95 gt Unreachable In the Trigger condition field select the Unreachable radio button This makes the EMX react only when the target PDU becomes inaccessible Select the System SNMP Notification Action from the Available actions list box and click 16 to add it to the Selected actions list box Note If you have not configured the System SNMP Notification Action to specify the SNMP destination s see Configuring SNMP Notifications on page 204 Editing Ping Monitoring Settings You can edit the ping monitoring settings for any IT device whenever it requires changes 1 To modify the ping monitoring settings for an IT device Choose Device Settings Server Re
141. ble click that port number The Auxiliary Port Setup dialog for the selected port appears In the Detection Mode field select the way to display connected LHX heat exchangers Disabled When applied disables to port and nothing connected to the port is detected 77 5 Auto An icon is displayed for this port only when the EMX device detects the physical connection of the LHX heat exchanger on this port Otherwise nothing is displayed This is the default approach Pinned An icon is displayed for this port all the time but the icon image varies according to the connection status See Device States and Icon Variations on page 196 When the Pinned checkbox is selected click the drop down arrow to select the appropriate device type for this port LHX 20 or LHX 40 4 Click OK to save the changes In the tree the icon if present is followed by the device name if available device type and the port number or FEATURE port if applicable Modifying the Network Configuration The network settings you can change via the web interface include wired wireless IPv4 and or IPv6 settings Modifying the Network Interface Settings The EMX supports two types of network interfaces wired and wireless You should configure the network interface settings according to the networking mode that applies See Connecting the EMX to Your Network on page 14 Wired Netwo
142. bles e option is one of the options enable or disable Option Description enable At least one numeric character is required disable No numeric character is required Example The following command determines that a password must comprise at least one numeric character config i Security strongPasswords enforceAtLeastOneNumericCharacter enable Special Character Requirement This command syntax determines whether a strong password includes at least a special character s Raritan Chapter 10 Using the Command Line Interface config security strongPasswords enforceAtLeastOneSpecialCharacter lt option gt Variables e lt option gt is one of the options enable or disable Option Description enable At least one special character is required disable No special character is required Example The following command determines that a password must comprise at least one special character config security strongPasswords enforceAtLeastOneSpecialCharacter enable Maximum Password History This command syntax determines the number of previous passwords that CANNOT be repeated when changing the password config security strongPasswords passwordHistoryDepth lt value gt Variables e value is an integer between 1 and 12 Example The following command determines that the previous 7 passwords CANNOT be re used when changing the password config i security strongPasswords passwordHist
143. cal since only fully qualified domain name can be used for specifying the LDAP server For information on LDAP authentication see Setting Up LDAP Authentication on page 123 Modifying the Network Service Settings The EMX supports these network communication services HTTPS HTTP Telnet and SSH HTTPS and HTTP enable the access to the web interface and Telnet and SSH enable the access to the command line interface see Using the Command Line Interface on page 212 By default SSH is enabled Telnet is disabled and all TCP ports for supported services are set to standard ports You can change default settings if necessary Note Telnet access is disabled by default because it communicates openly and is thus insecure In addition the EMX also supports the SNMP protocol Changing the HTTP S Settings HTTPS uses Secure Sockets Layer SSL technology to encrypt all traffic to and from the EMX device so it is a more secure protocol than HTTP By default any access to the EMX device via HTTP is automatically redirected to HTTPS See Forcing HTTPS Encryption on page 104 gt change the HTTP or HTTPS port settings 1 Choose Device Settings Network Services HTTP The HTTP Settings dialog appears sis Raritan Raritan Chapter 5 EMX Device Management 2 To use a different port for HTTP or HTTPS type a new port number in the corresponding field Valid range is 1 to 65535 Warning Different
144. can be connected to the master EMX Server Accessibility You can monitor whether specific IT devices are alive by having the EMX device continuously ping them An IT device s successful response to the ping commands indicates that the IT device is still alive and can be remotely accessed This function is especially useful when you are not located in an area with Internet connectivity Raritan Raritan Chapter 8 Managing External Devices Adding IT Devices for Ping Monitoring You can have the EMX monitor the accessibility of any IT equipment such as DB servers remote authentication servers or any power distribution unit PDU The EMX supports monitoring a maximum of 8 devices The default ping settings may not be suitable for monitoring devices that require high connection reliability so it is strongly recommended that you should adjust the ping settings to meet your own needs Tip To make the EMX automatically log send notifications or perform other actions for any server accessibility or inaccessibility events you can create event rules associated with server monitoring See Configuring Event Rules see Event Rules and Actions on page 131 gt 1 To add IT equipment for ping monitoring Choose Device Settings Server Reachability The Server Reachability dialog appears Click New The Add New Server dialog appears By default the Enable Ping Monitoring for this Server checkbo
145. can combine multiple strong password commands to modify different parameters at a time See Multi Command Syntax on page 320 zie Raritan dd Chapter 10 Using the Command Line Interface Enabling or Disabling Strong Passwords This command syntax enables or disables the strong password feature config security strongPasswords enabled lt option gt Variables e lt option gt is one of the options true or false Option Description true Enables the strong password feature false Disables the strong password feature Example This command syntax enables the strong password feature config security strongPasswords enabled true Minimum Password Length This command syntax determines the minimum length of the password config security strongPasswords minimumLength lt value gt Variables e value is an integer between 8 and 32 Example This command syntax determines a password must comprise at least 8 characters config f security strongPasswords minimumLength 8 se Raritan Chapter 10 Using the Command Line Interface Maximum Password Length This command syntax determines the maximum length of the password config security strongPasswords maximumLength lt value gt Variables e value is an integer between 16 and 64 Example This command syntax determines that a password must NOT comprise more than 20 characters config security strongPasswords maximumLength 20 Lowercase
146. ccepts traffic from the specified IP address range when the user is a member of the specified role deny Drops traffic from the specified IP address range when the user is a member of the specified role Example The following command modifies all contents of the 8th IPv4 rule config f Security roleBasedAccessControl ipv4 rule modify 8 startIpAddress 192 168 8 8 endIpAddress 192 168 90 90 role operator policy allow Hesults e The starting IPv4 address is changed to 192 168 8 8 and the ending IPv4 address to 192 168 90 90 e The role is changed to operator e The policy now becomes allow zie Raritan Chapter 10 Using the Command Line Interface Deleting a Role Based Access Control Rule This command removes a specific rule from the list Pv4 commands config i security roleBasedAccessControl ipv4 rule delete rule number Pv6 commands config i security roleBasedAccessControl ipv6 rule delete rule number Variables e rule numbers is the number of the existing rule that you want to remove Example The following command removes the 7th IPv6 rule config f security roleBasedAccessControl ipv6 rule delete 7 Environmental Sensor Configuration Commands An environmental sensor configuration command begins with externalsensor You can configure the name and location parameters of an individual environmental sensor Changing the Sensor Name This command syntax names an environme
147. ce e An SNMP trap is sent to indicate the firmware upgrade event Network Diagnostics Raritan The EMX provides the following tools in the web interface for diagnosing potential networking issues e Ping e Trace Route e List TCP Connections Tip These network diagnostic tools are also available through CLI See Network Troubleshooting on page 323 99 5 Pinging a Host The Ping tool is useful for checking whether a host is accessible through the network or Internet gt To ping a host 1 Choose Maintenance gt Network Diagnostics gt Ping The Ping Network Host dialog appears 2 Inthe Host Name field type the name or IP address of the host that you want to check 3 Inthe Number of Requests field a number up to 10 or adjust the value by clicking either arrow This number determines how many packets are sent for pinging the host 4 Click Run Ping to start pinging the host A dialog appears displaying the Ping results 5 Click Close to quit the dialog Tracing the Network Route Trace Route lets you find out the route over the network between two hosts or systems gt To trace the route for a host 1 Choose Maintenance gt Network Diagnostics gt Trace Route The Trace Route to Host dialog appears 2 Type the IP address or name of the host whose route you want to check in the Host Name field Click Run A dial
148. ce Agreement banner content Maximum content length is 10000 characters no Special characters allowed Terminate the input with lt Enter gt END lt Enter gt This is my new restricted service agreement END Successfully entered Restricted Service Agreement 44 characters config apply 5 ZE Raritan Chapter 10 Using the Command Line Interface show security details 5 Restricted Service Agreement enforced Restricted Service Agreement Banner Content This is my new restricted service agreement gt on login with newly configured banner Login for EMX CLI Username admin Password RESTRICTED SERVICE AGREEMENT This is my new restricted service agreement I understand and accept the Restricted Service Agreement y n y Welcome to EMX CLI 217 Chapter 10 Using the Command Line Interface Help Command The help or command shows a list of main CLI commands available for the current mode This is helpful when you are not familiar with the CLI commands gt The help command syntax under the administrator mode is help OR gt The help command syntax under the configuration mode is config help OR config Press Enter after typing the command and a list of main commands for the current mode is displayed Tip You can check what parameters are
149. ceed 25 characters Otherwise the login fails Then you are prompted to enter a password login admin admin 192 168 84 88 s password 4 Type a password and press Enter The password is case sensitive so make sure you capitalize the correct letters 2n Raritan Chapter 10 Using the Command Line Interface 5 After properly entering the password the or gt system prompt appears See Different CLI Modes and Prompts on page 215 in the EMX User Guide for details Tip The Last Login information including the date and time is also displayed if the same user profile was once used to log in to the EMX web interface or CLI 6 You are now logged in to the command line interface and can begin administering the EMX device Different CLI Modes and Prompts Depending on the login name you use and the mode you enter the system prompt in the CLI varies e User Mode When you log in as a normal user who does not have full permissions to configure the EMX device the gt prompt appears e Administrator Mode When you log in as an administrator who has full permissions to configure the EMX device the prompt appears e Configuration Mode You can enter the configuration mode from the administrator mode In this mode the prompt changes to config and you can change EMX device and network configurations See Entering the Configuration Mode on page 231 e Diagnostic Mode You can enter the diagnostic mode f
150. communication with a contact closure sensor s processor is lost all detectors that is all switches connected to the same sensor module show the unavailable state Note When the sensor is deemed unavailable the existing sensor configuration remains unchanged For example the ID number assigned to the sensor remains associated with it The EMX continues to ping unavailable sensors and moves out of the unavailable state after detecting the sensor for two consecutive scans zie Raritan Chapter 8 Managing External Devices normal State This state indicates the sensor is in the normal state For a contact closure sensor usually this state is the normal state you have set e lf the normal state is set to Normally Closed the normal state means the contact closure switch is closed e If the normal state is set to Normally Open the normal state means the contact closure switch is open For a Raritan s floor water sensor the normal state must be set to Normally Closed which means no water is detected Note See Configuring a Contact Closure Sensor on page 37 for information on setting the normal state or dip switch For the onboard contact closure sensor termination see Connecting Third Party Detectors Switches to the EMX on page 38 for how to set the normal state For a numeric sensor this state means the sensor reading is within the acceptable range as indicated below Lower Warning threshold lt Reading
151. connections and or disconnections 4 Select the Both radio button since we want both connection and disconnection actions to be recorded when either action is taken id Raritan Raritan Chapter 7 Event Rules Event Actions and Application Logs 5 Select System Event Log Action as we intend to record this event in the internal log when the specified events occur 3 Event Rule Settings x Rules Actions Rule Settii sus TE Webcam Image Taken Rule name Sample Asset Management Level Event Rule Event Action Rule Enabled System Event Log Rule Event Device Network interface link state is up t MP Ti Trigger condition Link state Link state is down Both Sa Asset Management Level Actions Selected actions Available actions SMS System Event Log Action System SNMP Trap Action iG D New Rule Delete Rule Save Close Sample Sensor Level Event Rule In this example we want the EMX device to send SNMP traps to the SNMP manager when the reading of the temperature sensor connected to the sensor port 1 crosses any threshold or when the sensor is unavailable To do that we would set up an event rule like this e Event External sensor slot gt Slot 1 gt Numeric Sensor gt Any sub event e Actions System SNMP Trap Action gt To create the above event rule 1 Select External sensor slot in the Event field to indicate
152. cted Extensible Authentication Protocol The following authentication data is required Inner Authentication Only Microsoft s Challenge Authentication Protocol Version 2 MSCHAPv2 is supported allowing authentication to databases that support MSCHAPv2 Identity Type your user name for EAP authentication Password Type your password for EAP authentication CA Certificate A third party CA certificate must be provided for EAP authentication Click Browse to select a valid certificate file To view the contents of the selected certificate file click Show f the selected certificate file is invalid click Remove Then select a new file 8 Click OK to save the changes Modifying the Network Settings The EMX was configured for network connectivity during the installation and configuration process See Configuring the EMX on page 11 If necessary you can modify any network settings using the web interface E Raritan Chapter 5 Device Management Selecting the Internet Protocol The EMX device supports two types of Internet protocols IPv4 and IPv6 You can enable either or both Internet protocols After enabling the desired Internet protocol s all but not limited to the following protocols will be compliant with the enabled Internet protocol s Z Raritan LDAP NTP SMTP SSH Telnet FTP SSL SNMP SysLog To select the appropriate Internet Protocol Choose Device Settings g
153. curity settings of the EMX show security To show detailed information add the parameter details to the end of the command show security details Displayed information e Without the parameter details the information including IP access control role based access control password policy and HTTPS encryption is displayed e With the parameter details more security information is displayed such as user blocking time and user idle timeout zie Raritan Chapter 10 Using the Command Line Interface Existing User Profiles This command shows the data of one or all existing user profiles show user lt user name gt To show detailed information add the parameter details to the end of the command show user user name details Variables e User name is the name of the user whose profile you want to query The variable can be one of the options or a user s name Option Description all This option shows all existing user profiles Tip You can also type the command without adding this option all to get the same data a specific user s name This option shows the profile of the specified user only Displayed information e Without the parameter details only four pieces of user information are displayed user name enabled status SNMP v3 access privilege and role s e With the parameter details more user information is displayed such as the telephone numbe
154. d Menus Four menus are available for managing different tasks or showing information User Management contains menu items for managing user profiles permissions roles and password Device Settings deals with device related settings such as the device name network settings security settings and system time Maintenance provides tools that are helpful for maintaining the EMX such as the event log hardware information firmware upgrade and so on Help displays information regarding the firmware and all open source packages embedded on the EMX In addition you can access the user guide from this menu Setup Button The Setup button is available for most tree items It triggers a setup dialog where you can change settings for the selected tree item Status Bar The status bar shows five pieces of information from left to right Device name This is the name assigned to the EMX device The default is EMX See Naming the EMX Device on page 72 EMX 19216884 48 IP address The numbers enclosed in parentheses is the IP address assigned to the EMX device See Initial Network Configuration on page 15 or Modifying the Network Settings on page 80 EMX 192 168 84 48 Tip The presence of the device name and IP address in the status bar indicates the connection to the EMX device If the connection is lost it shows disconnected instead Login name This is the user name y
155. d Note The option Any sub event gt refers to all events items listed on the same submenu Any slot refers to all slots Any server refers to all servers and Any user refers to all users 6 According to the event you selected in the previous step the Trigger condition field containing three radio buttons may or may not appear Raritan Chapter 7 Event Rules Event Actions and Application Logs Event types Radio buttons Numeric sensor Available radio buttons include threshold crossing Deasserted and Both events or the Asserted The EMX takes the action only peel when the event occurs This means the un ec iP i status of the described event transits from rue or false FALSE to TRUE Deasserted The EMX takes the action only when the event condition disappears This means the status of the described event transits from TRUE to FALSE Both EMX takes the action both when the event occurs asserts and when the event condition disappears deasserts e For connection state for USB cascading and auxiliary RS 485 devices assertion is displayed as connected and deassertion as disconnected Discrete on off Available radio buttons include Alarmed No sensor state change longer alarmed and Both Alarmed The EMX takes the action only when the chosen sensor enters the alarmed state that is the abnormal state Nolonger alarmed The EMX t
156. d The Dashboard page shows the information for managed environmental sensors only while the External Sensors page shows the information for both of managed and unmanaged ones If a sensor reading row is colored it means the sensor reading already crosses one of the thresholds or at least one LHX built in sensor fails on the heat exchanger See Headings Highlighted in Yellow or Red EMX see Readings Highlighted in Yellow or Red on page 58 gt To view managed environmental sensors only 1 Click the Dashboard icon in the EMX Explorer pane and the Dashboard page opens in the right pane 2 Locate the External Sensors section on the Dashboard page The section shows Total number of managed sensors Total number of unmanaged sensors Information of each managed sensor including Name Reading State 177 Chapter 8 Managing External Devices To view both of managed and unmanaged environmental sensors If the EMX folder is not expanded expand it to show all components Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 Click the External Sensors folder in the EMX Explorer pane and the External Sensors page opens in the right pane Detailed information for each connected sensor is displayed including Label number Serial number Sensor type Name Reading State Channel for a contact cl
157. d DNS server before you can specify the DNS servers manually See Overriding the IPv6 DHCP Assigned DNS Server on page 250 config f network ipv6 primaryDNSServer ip address gt Variables e ip address is the IP address of the primary DNS server This value uses the IPv6 address format Example The following command determines that the primary DNS server is 2103 288 8201 1 14 config network primaryDNSServer 2103 288 8201 1 14 Setting the IPv6 Secondary DNS Server After selecting the static IP configuration mode you can use this command syntax to specify the secondary DNS server It is required to enable overriding the auto assigned DNS server before you can specify the DNS servers manually See Overriding the IPv6 DHCP Assigned DNS Server on page 250 config network ipv6 secondaryDNSServer ip address gt Variables e ip address is the IP address of the secondary DNS server This value uses the IPv6 address format Note The EMX supports a maximum of 3 DNS servers If two IPv4 DNS servers and two IPv6 DNS servers are available the EMX only uses the primary IPv4 and IPv6 DNS servers Example The following command determines that the secondary DNS server is 2103 288 8201 1 700 config network ipv6 secondaryDNSServer 2103 288 8201 1 700 249 Chapter 10 Using the Command Line Interface Overriding the IPvG DHCP Assigned DNS Server After specifying the primary secondary DNS
158. d Tag Appendix A Using Raritan Asset Management Sensors with the EMX For the latest version of asset sensors with a built in tilt sensor it is NOT necessary to configure the orientation setting manually The EMX device can detect the orientation of the asset sensors and automatically configure it Top Connector This option indicates that the asset sensor is mounted with the RJ 45 connector located on the top Bottom Connector This option indicates that the asset sensor is mounted with the RJ 45 connector located at the bottom To change the LED color denoting the presence of a connected tag either click a color in the color palette or type the hexadecimal RGB value of the color in the Color with connected Tag field To change the LED color denoting the absence of a connected tag either click a color in the color palette or type the hexadecimal RGB value of the color in the Color without connected Tag field Click OK to save the changes 331 332 Appendix A Using Raritan Asset Management Sensors with the EMX Changing a Specific LED s Color Settings In the EMX web interface a rack unit refers to a tag port on the asset sensor You can name a specific rack unit or change its LED color settings so that this LED behaves differently from others on the same asset sensor gt 1 To change an LED s settings Connect the asset sensor to the EMX if it is not already Click
159. d by the DNS server is used configure the following parameters zie Raritan 18 Chapter 2 Installing and Configuring the Device To set Use this command IP protocol network ip proto lt protocol gt where lt protocol gt is v4Only for enabling IPv4 v6Only for enabling IPv6 or both for enabling both IPv4 and IPv6 protocols IP address network ip returned by dnsResolverPreferenc the DNS resolver server where resolver is preferV4 for IPv4 addresses or preferV6 for IPv6 addresses e If you enabled the IPv4 protocol in the previous step configure the IPv4 network parameters To set Use this command IP network ipv4 configuration ipConfigurationMode mode method where mode is either dhcp for auto configuration default or static for specifying a static IP address For the IPv4 DHCP configuration configure this parameter To set Use this command Preferred host network ipv4 name preferredHostName name optional where name is the preferred host name Tip To override the DHCP assigned IPv4 DNS servers with those you specify manually type this command network ipv4 overrideDNS option where option is enable or disable See the table below for the IPv4 commands for manually specifying DNS servers Raritan Chapter 2 Installing and Configuring the Device For the static IPv4 configuration configure these parameters To set Sta
160. d due to additional network traffic created should the initial communication fail and another is sent Use SNMP TRAP rules if you do not need confirmation that the communication has succeeded and if you need to conserve network resources Use SNMP INFORM communications to ensure more reliable communications and if network resources can be managed with the potential additional network traffic gt To configure the SNMP communication 1 Choose Device Settings Network Services SNMP The SNMP Settings dialog appears 2 Enter the destination information that applies to the trap types you are using 85 86 5 Select the enable checkbox in the SNMP v1 v2c field to enable communication with an SNMP manager using SNMP v1 or v2c protocol Type the SNMP read only community string in the Read Community String field Usually the string is public Type the read write community string in the Write Community String field Usually the string is private Select the enable checkbox in the SNMP v3 field to enable communication with an SNMP manager using SNMP v3 protocol Tip You can permit or disallow a user to access the EMX via the SNMP v3 protocol See Configuring Users for Encrypted SNMP v3 on page 208 Enter the MIB II system group information if applicable a sysContact the contact person in charge of the system being contacted b sysName
161. d on your PC Click Upload amp Restore Bulk Configuration to copy the file A message appears prompting you to confirm the operation and enter the admin password Enter the admin password then click Yes to confirm the operation Wait until the EMX device resets and the Login page re appears indicating that the configuration copy is complete Backup and Restore the EMX Device Settings All EMX information is captured in the XML backup file except for the device logs and SSL certificate gt 1 To download a backup EMX XML file Choose Maintenance gt Backup Restore The Backup Resiore of Device Settings dialog opens In the Save Device Settings section click Download Device Settings Save the file to your computer Raritan Firmware Upgrade Raritan Chapter 5 EMX Device Management The file is saved in the XML format and its content is encrypted using the AES 128 encryption algorithm gt To restore the EMX using a backup XML file 1 Choose Maintenance gt Backup Restore The Backup Restore of Device Settings dialog opens In the Copy Device Settings section click Browse to locate the file Click Upload amp Restore Device Settings to upload the file A message appears prompting you to confirm the operation and enter the admin password 4 Enter the admin password then click Yes to confirm the operation Wait until the EMX device resets and the Login page re appears indicating t
162. data pane lets you open data pages of multiple tree items without overriding any opened page gt 1 To open new data pages Click the Add Page icon new tab along with a blank data page appears Click a tree item whose data page you want to open The data of the selected tree item is then displayed on the blank page To open more data pages repeat Steps 1 to 2 All tabs representing opened pages are shown across the top of the page Raritan Chapter 3 Getting Started The following diagram shows a multi tab example basa Fest ters Asset stip 8 Gori 4 With multiple pages opened you can take these actions To switch to one of the opened data pages click the corresponding tab If there are too many tabs to be all shown two arrows del and appear at the left and right borders of the pane Click either arrow to navigate through all tabs Toclose any data page click the Close button aX on the corresponding tab Data Pane The right pane shows the data page of the selected tree item The data page includes the item s current status settings and a Setup button if available All tabs above the pane represent the opened data pages The highlighted tab indicates the current selection You can change the width of the pane to make the area larger or smaller gt To adjust the pane s width 1 Move the mouse pointer to the left border of the right pane
163. directed to HTTPS config security enforceHttpsForWebAccess lt option gt Variables e lt option gt is one of the options enable or disable Option Description enable Enables the HTTPS access to the web interface disable Disables the HTTPS access to the web interface Example The following command disables the HTTPS access feature config security enforceHttpsForWebAccess disable Login Limitation The login limitation feature controls login related limitations such as password aging simultaneous logins using the same user name and the idle time permitted before being forced to log out A login limitation command begins with security loginLimits You can combine multiple commands to modify the login limitation parameters at a time See Multi Command Syntax on page 320 Raritan Z Raritan Chapter 10 Using the Command Line Interface Single Login Limitation This command syntax enables or disables the single login feature which controls whether multiple logins using the same login name simultaneously is permitted config security loginLimits singleLogin lt option gt Variables e lt option gt is one of the options enable or disable Option Description enable Enables the single login feature disable Disables the single login feature Example The following command disables the single login feature so that more than one user can log in using the same user name at the same time
164. does not have a serial port use a regular USB cable to connect the EMX to the computer for initial configuration The EMX device can emulate a USB to serial converter after the USB to serial driver is properly installed in the Windows operating system Note Not all serial to USB converters work properly with the EMX device so this section does not introduce the use of such converters Now connect the EMX to a computer for initial configuration by following either of the following procedures gt make a serial connection 1 Connect one end of the null modem cable to the RS 232 port labeled CONSOLE MODEM on the EMX 2 Connect the other end of the null modem cable to the serial port COM on the computer gt make a USB connection 1 Connect one end of a regular USB cable to the USB B port on the EMX 2 Connect the other end of the USB cable to the USB A port on the computer Installing the USB to Serial Driver The EMX can emulate a USB to serial converter over a USB connection A USB to serial driver named Dominion Serial Console is required for Microsoft Windows operating systems Download the dominion serial zip driver file which contains dominion serial inf and dominion serial setup exe files from the Raritan website http www raritan com under the Firmware and Documentation http Www http www raritan com support firmware and documentation section for the EMX gt To install the driv
165. dress range when the user is a member of the specified role Click OK to save the changes The system automatically numbers the rule Insert a rule between Select the rule above which you want to insert a new two existing rules rule For example to insert a rule between rules 3 and 4 select 4 a Click Insert The Insert new Rule dialog appears a starting IP address in the Starting IP Address field zie Raritan m Chapter 6 Security Action 5 Do this Type an ending IP address the Ending IP Address field Select a role from the drop down list in the Role field This rule applies to members of this role only Select Allow or Deny from the drop down list in the Policy field Allow Accepts traffic from the specified IP address range when the user is a member of the specified role Deny Drops traffic from the specified IP address range when the user is a member of the specified role Click OK to save the changes The system inserts the rule and automatically renumbers the following rules Click OK to save the changes Editing Role Based Access Control Rules You can modify existing rules when these rules do not meet your needs 1 ALO o ov 116 To modify a role based access control rule Choose Device Settings Security Role Based Access Control The Configure Role Based Access Control Settings dialog appears To modify the IPv4 firewall
166. e 317 Setting the Network Service Parameters 251 Setting the Networking Mode 235 Setting the NTP Parameters 305 Setting the Outer Authentication 239 Setting the PSK 238 Setting the Sensor s Assertion Timeout 289 Setting the Sensor s Deassertion Hysteresis 288 Setting the Sensor s Lower Critical Threshold 286 Setting the Sensor s Lower Warning Threshold e 287 Setting the Sensor s Upper Critical Threshold 284 Setting the Sensor s Upper Warning Threshold 285 Setting the Serial Port Baud Rate 312 Setting the SNMP Configuration 255 Setting the SNMP Read Community 256 Setting the SNMP Write Community 257 Setting SSID 237 Setting the sysContact Value 257 Setting the sysLocation Value 258 Setting the sysName Value 258 Setting the Wireless Parameters 237 Setting the X Coordinate 282 Setting the Y Coordinate 282 Setting the Z Coordinate 233 283 Setting the Z Coordinate Format 174 Setting the Z Coordinate Format for Environmental Sensors 233 283 367 Index Setting Up an EMX Using Bulk Configuration iii 72 94 Setting Up an SSL Certificate iii 104 118 Setting Up Asset Sensors in EMX 343 Setting Up Default User Preferences Units of Measure iii 65 67 75 Setting Up LDAP Authentication 84 104 123 358 Setting Up Role Based Access Control Rules 113 Setting Up Roles 53 62 65 69 176 Sett
167. e This reduces the number of idle sessions connected and the number of simultaneous commands sent to the EMX Enabling Strong Passwords Use of strong passwords makes it more difficult for intruders to crack user passwords and access the EMX device By default strong passwords should be at least eight characters long and contain upper and lower case letters numbers and special characters such as or amp gt To force users to create strong passwords 1 Choose Device Settings gt Security gt Password Policy The Password Policy dialog appears 2 Select the Strong Passwords checkbox to activate the strong password feature The following are the default settings Minimum length 8 characters Maximum length 32 characters At least one lowercase character Required At least one uppercase character Required At least one numeric character Required At least one special character Required Number of restricted passwords history 5 Note The maximum password length accepted by the EMX is 32 characters Make necessary changes to the default settings Click OK to save the changes ia Raritan Raritan Chapter 6 Security Enabling Password Aging Password Aging determines whether users are required to change passwords at regular intervals The default interval is 60 days gt To force users to change passwords regularly 1 Choose Device Settings gt Security gt Password Policy The
168. e normal Resolution 0 1 deg C Accuracy 1 00 Tolerance 0 05 deg C Range 55 0 deg C 125 0 deg C Lower critical threshold 15 0 deg C Lower warning threshold 20 0 deg C Upper warning threshold 55 0 deg C Upper critical threshold 60 0 deg C Raritan Raritan Chapter 10 Using the Command Line Interface Deassertion hysteresis 1 0 deg C Assertion timeout 0 samples Variables e lt gt one of the options all or a number Option Description all Displays the information for all environmental sensors Tip You can also type the command without adding this option all to get the same data A specific Displays the information for the specified environmental environmental sensor only sensor number The environmental sensor number is the ID number assigned to the sensor which can be found on the External Sensors page of the EMX web interface Displayed information e Without the parameter details only the sensor ID sensor type and reading are displayed Note A state on off sensor displays the sensor state instead of the numeric reading e With the parameter details more information is displayed in addition to the ID number and sensor reading such as the serial number and X Y and Z coordinates 223 Chapter 10 Using the Command Line Interface Environmental Sensor Threshold Information This command syntax shows the specified environmental sensor
169. e EMX Device on page 72 2 Click the External Sensors folder in the EMX Explorer pane and the External Sensors page opens in the right pane 3 Click the sensor you want to manage on the External Sensors page 171 172 Chapter 8 Managing External Devices Note To identify all detected sensors see Identifying Environmental Sensors on page 170 Click Manage The Manage sensor lt serial number gt lt sensor type gt dialog appears where serial numbers is the sensor s serial number and lt sensor type gt is the sensor s type Note For a contact closure sensor a channel number is added to the end of the lt sensor type gt There are two ways to manage the sensor manage this sensor by letting the EMX assign a number to it select Automatically assign a sensor number This method does not release any managed sensors manage this sensor by assigning the number you want to it select Manually select a sensor number Then click the drop down arrow to select a number If the number you selected was already assigned to a sensor that sensor becomes released after losing this ID number Tip The information in parentheses following each ID number indicates whether the number has been assigned to any sensor If it has been assigned to a sensor it shows that sensor s serial number Otherwise it shows the term unused Click OK The EMX starts to track and display the managed sensor s readi
170. e ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e lt sensor type is one of these sensor types temperature humidity airPressure or air Flow Note If the specified sensor type does not match the type of the specified environmental sensor this error message appears Specified sensor type XXX does not match the sensor s type sensortype where XXX is the specified sensor type and sensortype is the correct sensor type e option is one of the options enable disable or a numeric value Option Description enable Enables the upper warning threshold for the specified environmental sensor disable Disables the upper warning threshold for the specified environmental sensor A numeric Sets a value for the upper warning threshold of value the specified environmental sensor and enables this threshold at the same time Example The following command enables the Upper Warning threshold of the environmental temperature sensor with the ID number 4 config i sensor externalsensor 4 temperature upperWarning enable Setting the Sensor s Lower Critical Threshold This command syntax configures the Lower Critical threshold of a numeric environmental sensor di Raritan Chapter 10 Using the Command Line Interface config sensor externalsensor lt n gt lt sensor type gt lowerCritical lt option gt Variables e n is the ID number of the environmen
171. e Interface config role modify lt name gt removePrivileges lt privilegel gt lt argument1 gt lt argument2 gt lt privilege2 gt lt argument1 gt lt argument2 gt lt privilege3 gt lt argumentl gt lt argument2 gt Note When removing privileges from a role make sure the specified privileges and arguments if any exactly match those assigned to the role Otherwise the command fails to remove specified privileges that are not available Variables e name is a string comprising up to 32 ASCII printable characters e privilegel lt privilege2 gt lt privilege3 gt and the like are names of the privileges assigned to the role Separate each privilege with a semi colon See All Privileges on page 307 e argumenti lt argument2 gt and the like are arguments set for a particular privilege Separate a privilege and its argument s with a colon and separate arguments with a comma if there are more than one argument for a privilege Example The following command modifies the privileges of the role tester config i role modify tester addPrivileges changeAuthSettings removePrivileges firmwareUpgrade Hesults e The changeAuthSettings Change Authentication Settings privilege is added to the role e The firmwareUpgrade Firmware Upgrade privilege is removed from the role Deleting a Role This command syntax deletes an existing role config role delete lt name gt zie Ra
172. e SNMP settings zeroconfig Only displays the settings of the zero configuration advertising Pe Raritan Chapter 10 Using the Command Line Interface Asset Sensor Settings This command shows the asset sensor settings such as the total number of rack units tag ports asset sensor state numbering mode orientation available tags and LED color settings show assetStrip lt n gt Variables e n is one of the options all or a number Option Description all Displays all asset sensor information Tip You can also type the command without adding this option all to get the same data A specific asset Displays the settings of the asset sensor sensor number connected to the specified FEATURE port number For the EMX device with only one FEATURE port the valid number is always 1 zie Raritan a Chapter 10 Using the Command Line Interface 222 Environmental Sensor Information This command syntax shows the environmental sensor s information show externalsensors lt n gt External sensor 3 Temperature 1 Sensor type Temperatur Reading 31 8 deg normal Serial number AEI0950133 Description Not configured Location X Not configured Y Not configured Z Not configured To show detailed information add the parameter details to the end of the command show externalsensors lt n gt details External sensor 3 Temperature Reading 31 8 deg C Stat
173. e and their status If you have administrator privileges you can terminate any user s connection to the EMX device gt To view connected users 1 Choose Maintenance gt Connected Users The Connected Users dialog appears showing a list of connected users with the following information Column Description User Name The login name used by each connected user IP Address The IP address of each user s host For the login via a serial connection lt local gt is displayed instead of an IP address Client Type The interface through which the user is being connected to the EMX Web GUI Refers to the EMX web interface CLI Refers to the command line interface CLI The information in parentheses following CLI indicates how this user was connected to the CLI Serial Represents the local connection serial or USB SSH Represents the SSH connection Telnet Represents the Telnet connection Idle Time The length of time for which a user remains idle The unit min represents minutes 2 To disconnect any user click the corresponding Disconnect button a Adialog appears prompting you to confirm the operation is Raritan Managing Roles Raritan Chapter 4 User and Role Management b Click Yes to disconnect the user or No to abort the operation If clicking Yes the connected user is forced to log out You may change the sorting order of the list if necessary 3 Click Close to quit the dialog
174. e for connecting to a tag port on the regular asset sensor or AMS M2 Z The blade extension strip contains 4 to 16 tag ports depending on which model you purchased The diagram illustrates a tag connector cable and a blade extension strip with 16 tag ports Tag connector cable A C Item Description A Barcode ID number for the tag connector cable B Tag connector Cable connector for connecting the blade extension strip Note A tag connector cable has a unique barcode which is displayed in the EMX s web interface for identifying each blade extension strip where it is connected Blade extension strip beo 000 000 9 9 000 9j i E Item Description D Mylar section with the adhesive tape E Tag ports F Cable socket s for connecting the tag connector cable Raritan Chapter 2 Installing and Configuring the EMX Device Note Each tag port on the blade extension strip is labeled a number which is displayed as the slot number in the EMX s web interface gt To install a blade extension strip 1 Connect the tag connector cable to the blade extension strip Plug the cable s connector into the socket at either end of the blade extension strip Eee ESEE mb 9 5 609 6 6 9069 9 6 900 09 2 Move the blade extension strip toward the bottom of the blade chassis until its mylar section is fully under the chassis and verify that the blade extension strip does not fall off e
175. e role based access control feature false Disables the role based access control feature e policy is one of the options allow or deny Policy Description allow Accepts traffic from all IP addresses regardless of the user s role deny Drops traffic from all IP addresses regardless of the user s role Tip You can combine both commands to modify all role based access control parameters at a time See Multi Command Syntax on page 320 Example The following command sets two parameters of the role based IPv4 access control feature config i security roleBasedAccessControl ipv4 enabled true defaultPolicy allow Raritan Results e role based IPv4 access control feature is enabled e default policy is set to allow Managing Role Based Access Control Rules You can add delete or modify role based access control rules e AnIPv4 role based access control command for managing rules begins with security roleBasedAccessControl ipv4 rule e AnIPv6 role based access control command for managing rules begins with security roleBasedAccessControl ipv6 rule 275 Chapter 10 Using the Command Line Interface Adding a Role Based Access Control Rule Depending on where you want to add a new rule in the list the command syntax for adding a rule varies e Pv4 commands gt To add anew rule to the bottom of the IPv4 rules list use this command syntax config f security roleBasedAccessControl ipv4
176. eased and can be automatically assigned to any newly detected sensor Threshold Information Setting and enabling the thresholds causes the EMX to generate alert notifications when it detects that any sensor s state crosses the thresholds There are four thresholds for each sensor Lower Critical Lower Warning Upper Warning and Upper Critical e Upper and Lower Warning thresholds indicate the sensor reading enters the warning range before the critical threshold e Upper and Lower Critical thresholds indicate the sensor reading is at the critical level To avoid generating a large amount of alert events the deassertion hysteresis for each threshold is enabled You can change the default hysteresis value if necessary For more information on the deassertion hysteresis see What is Deassertion Hysteresis on page 182 Note After setting the thresholds remember to configure the event rules See Configuring Event Rules see Event Rules and Actions on page 131 For information on configuring an environmental sensor s threshold see Configuring Environmental Sensors on page 172 For information on configuring thresholds for a Schroff LHX heat exchanger see Configuring Temperature and Fan Thresholds see Configuring LHX Temperature and Fan Thresholds on page 194 What is Deassertion Hysteresis The hysteresis setting determines when a threshold condition is reset This diagram illustrates how hysteresis values rela
177. ecessary configure more wireless parameters shown in the following table To set Use this command BSSID network wireless BSSID lt bssid gt where lt bssid gt is the AP MAC address Raritan Chapter 2 Installing and Configuring the Device To set Use this command Authentication network wireless authMethod method lt method gt where method is psk for Pre Shared Key or eap for Extensible Authentication Protocol PSK network wireless PSK lt psk gt where lt psk gt is the PSK string EAP outer network wireless authentication eapOuterAuthentication outer auth where outer auth is PEAP EAP inner network wireless authentication eapInnerAuthentication inner auth where inner auth is MSCHAPVv2 EAP identity network wireless eapIdentity identity where identity is your user name for EAP authentication EAP password network wireless eapPassword When prompted to enter the password for EAP authentication type the password EAP CA network wireless certificate eapCACertificate When prompted to enter the CA certificate open the certificate with a text editor copy and paste the content into the communications program Note The content to be copied from the CA certificate does NOT include the first line containing BEGIN CERTIFICATE and the final line containing END CERTIFICATE d To determine which IP protocol is enabled and which IP address returne
178. ect the authentication protocol MD5 or SHA e Enter the authentication passphrase and then confirm the authentication passphrase e Click OK authPriv Select this if authentication and privacy protocols are required e Select the authentication protocol MD5 or SHA e Enter the authentication passphrase and confirm the authentication passphrase e Select the Privacy Protocol DES or AES e Enter the privacy passphrase and then confirm the privacy passphrase e Click OK Syslog Message Use this action automatically forward event messages to the specified syslog server gt 1 To configure a syslog message action Choose Device Settings gt Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Action name field type a new name for the action The default name is New Action numbers where number is a sequential number based on how many actions are already created In the Action field click the drop down arrow and select the desired action from the list In the Syslog server field specify the IP address to which the syslog is forwarded 141 142 Chapter 7 Event Rules Event Actions and Application Logs 7 Inthe Port field specify an appropriate port number 8 Click OK to save the new action 9 Click Close to quit the dialog Send SMS Message You can configure emails to be sent when an event occurs and can customize the message Messages
179. ecting a USB device This is a host port which is powered per USB 2 0 specifications 43 zie Raritan 44 Chapter 3 Getting Started Port FEATURE CONSOLE MODEM SENSOR ETHERNET RS 485 Used for Connection to asset sensors via a Category 5e 6 cable Note The EMX device supplies power to the connected asset sensors after the connection is established Establishing a serial connection between a computer and the EMX device This is a standard DTE RS 232 port You can use a null modem cable with two DB9 connectors on both ends to connect the EMX device to the computer Connection to Raritan s environmental sensors A Raritan sensor hub may be required if you want to connect more environmental sensors Connecting the EMX device to your company s network Connect a standard Cat5e 6 UTP cable to this port and connect the other end to your network This connection is necessary to administer or access the EMX device remotely using the web interface There are two small LEDs adjacent to the port Green indicates a physical link and activity Yellow indicates communications at 10 100 BaseT speeds For a USB cascading configuration the wired connection is a must for the master EMX See Cascading the EMX via USB for details Note Connection to this port is not required if the EMX device is connected to a wireless network Connection to an electrical device with the RS 485 interface Currently the
180. ecting the EMX to a Computer on page 12 2 Launch a terminal emulation program such as HyperTerminal Kermit or PUTTY and open a window on the EMX 3 Login to the CLI by typing the user name admin and its password See Step 4 of Initial Network Configuration on page 15 4 After the system prompt appears type either of the following commands and press Enter 5 Type reset factorydefaults OR reset factorydefaults y 6 Wait until the Username prompt appears indicating the reset is complete 7 f you entered the command without y a message appears prompting you to confirm the operation Type y to confirm the reset x Raritan Appendix A Using Raritan Asset Management Sensors with the EMX In This Chapter Asset Sensors and Tags 329 Asset Sensors and Tags Asset management tags AMTs are electronic IDs that are adhered to data center items such as servers and then plugged in to asset management sensors AMS mounted on the rack Once the asset tags are adhered to items plugged in to asset management sensors and the asset management sensors are configured in EMX you can remotely track the item s location In EMX a Feature port is identified with a combination of the name Asset Strip and the port number After connecting an asset sensor you must provide the total number of rack units tag ports the connected asset sensor has to the EMX de
181. elect models of the Schneider PM710 via Modbus The ability to send emails log details and or set SNMP traps for specific events vi Chapter 1 Introduction Package Contents The ability to monitor a connected Schroff LHX 20 or LHX 40 heat exchanger The ability to diagnose the network such as pinging a host or listing TCP connections The ability to monitor sever accessibility Full disaster recovery option in case of a catastrophic failure during a firmware upgrade The following describes the equipment shipped with an EMX device If anything is missing or damaged contact the local dealer or Raritan Technical Support for help The EMX device Power cord Bracket pack and screws Asset sensors optional Asset tags optional Raritan Chapter 2 Before You Begin Mounting the EMX Raritan Installing and Configuring the EMX Device In This Chapter Before You Begin 0 0 2 cecccceeceecccceeeecceeeeeeeceeeeeeceeesseceeeseaeeeeesneeeeeesneeaeenenees 7 Mounting the EMX Device sssssseesneeeenene nennen 7 Connecting the EMX to a Power 11 Configuring the EMX 11 Combining Asset Sensors seen 22 Connecting Asset Sensors to the EMX 24 Connecting AMS M2 Z Asset Sensors 28 Connecting Blade Extension Strips
182. end an SNMP Notification 139 Send EMail 138 Send SMS Message 142 Sending Videos in an Email or Instant Message 184 190 Sensor Measurement Accuracy 178 Sensor RJ 12 Port Pinouts 352 Serial 225 Serial Port Configuration Commands 312 Serial RS 232 Port Pinouts 352 Server Accessibility 164 Setting an LED Color for a Rack Unit 317 318 Setting an LED Mode for a Rack Unit 317 319 Setting Data Logging 176 234 Setting EMX Asset Sensor LED Colors 345 Setting the Authentication Method 238 Setting the BSSID 242 Setting the Data Logging Measurements Per Entry 234 Setting the Date and Time 73 Z Raritan Index Setting the EAP Identity 240 Setting the EAP Parameters 239 Setting the EAP Password 240 Setting the History Buffer Length 320 Setting the Inner Authentication 239 Setting the IPv4 Address 244 Setting the IPv4 Configuration Mode 243 Setting the IPv4 Gateway 245 Setting the IPv4 Preferred Host Name 243 Setting the IPv4 Primary DNS Server 245 Setting the IPv4 Secondary DNS Server 246 Setting the IPv4 Subnet Mask 244 Setting the IPv6 Address 248 Setting the IPv6 Configuration Mode 247 Setting the IPv6 Gateway 248 Setting the IPv6 Primary DNS Server 249 Setting the IPv6 Secondary DNS Server 249 Setting the LAN Interface Parameters 250 Setting the LED Disconnect Color 318 Setting the LED Operation Mod
183. enotes that the monitoring for the corresponding server is enabled This icon denotes that the monitoring for the corresponding server is disabled The column labeled Status indicates the accessibility of each monitored server Status Description Reachable The server is accessible Unreachable The server is inaccessible Waiting for reliable The connection between the EMX device and the connection server is not established yet You may change the sorting order of the list if necessary Click Close to quit the dialog Raritan Chapter 8 Managing External Devices Configuring the Serial Port You can change the bit rate of the serial port labeled CONSOLE MODEM on the EMX device The default bit rate is 115200 bps Bit rate adjustment may be necessary only when you integrate the EMX with another Raritan product via the serial interface Change the bit rate before connecting it to a Raritan product through the serial port or there are communication problems Note The serial port setting is especially useful when the EMX works in conjunction with Raritan s Dominion LX KVM switch The Dominion LX only supports 19200 bps for communications over the serial interface gt change the serial port baud rate settings 1 Choose Device Settings Serial Port Settings The Serial Port Configuration dialog appears 2 Inthe Baud Rate field click the drop down arrow and select the desired baud rate from the
184. enter the time by deleting existing numbers and typing new ones in the hour minute and second fields or clicking the arrows to adjust each number To let an NTP server set the date and time select the Synchronize with NTP Server radio button There are two ways to assign the NTP servers To use the DHCP assigned NTP servers make sure the Always use the servers below and ignore DHCP provided servers checkbox is deselected This method is usable only when either IPv4 or IPv6 DHCP is enabled To use the NTP servers that are manually specified select the Always use the servers below and ignore DHCP provided servers checkbox and specify the primary NTP server in the First Time Server field A secondary NTP server is optional Note If the EMX device s IP adaress is assigned through IPv4 or IPv6 DHCP the NTP servers can be automatically discovered When this occurs the data you entered in the fields of First and Second Time Server will be overridden 5 Click OK to save the changes Specifying the Device Altitude You must specify the EMX device s altitude above sea level if a Raritan differential air pressure sensor is attached This is because the device s altitude is associated with the altitude correction factor See Altitude Correction Factors see Altitude Correction Factors EMX on page 351 The default altitude measurement unit is meter You can have the measurement unit vary between meter and foot acc
185. eo in a secondary Live Preview window and leave the Live Preview window open at least until User B opens the video via the link Once User B opens the video via the link the secondary Live Preview mode window can be closed in the User A s EMX interface User B must manually let User A know they have opened the link or User A can check to see if User B is currently connected to the application by clicking Maintenance Connected Users gt To send a video link via email or instant message 1 Inthe navigation tree click on the webcam that is capturing the video you want to provide a link to in the email The video is displayed in Live Preview mode in the right pane 2 Click the Live Preview icon located above the video The video opens in a secondary Live Preview window 3 Copy the URL from the Live Preview window paste it into the email or instant message application Leave the Live Preview window open at least until the recipient opens the video via the link A Cinteron MC52iT or MC55iT GSM modem must be connected to the EMX in order to send SMS event messages See Creating Actions on page 136 for more information on SMS event messages Note The EMX cannot receive SMS messages gt Toconnect the GSM modem 1 Connect the GSM modem to the DB9 serial port on the EMX 2 Configure the GSM modem as needed See the supporting GSM modem help for information on configuring the GSM modem 3 Configure the GSM m
186. er USERNAME from host USERIP User TTARGETUSER deleted by user USERNAME from host USERIP Password of user TARGETUSER changed by user USERNAME from host TUSERIP Password settings changed by user USERNAME from host USERIP Role TARGETROLE added by user USERNAME from host USERIP Role TARGETROLE modified by user USERNAME from host USERIP Role TARGETROLE deleted by user USERNAME from host USERIP Restricted Service Agreement accepted by USERNAME User USERNAME from host Default Assertion Message when the Event FALSE The IFNAME network interface link is now down USB slave disconnected Schroff LHX support disabled Restricted Service Agreement declined by USERNAME User USERNAME from host 149 Chapter 7 Event Rules Event Actions and Application Logs Event Context in User Activity gt gt Authentication failure User Activity gt gt User blocked User Activity gt gt Session timeout Overcurrent Protector gt gt Sensor gt gt Unavailable External Sensor Slot gt gt Numeric Sensor gt Unavailable External Sensor Slot gt gt Numeric Sensor gt Above upper critical threshold External Sensor Slot gt gt Numeric Sensor gt Above upper warning threshold External Sensor Slot gt gt Numeric Sensor gt Below lower warning threshold External Sensor Slot gt gt
187. er in Windows Vista and 7 1 Disconnect the EMX s USB cable from the computer Raritan Chapter 2 Installing and Configuring the Device 2 Run dominion serial setup exe A Dominion Serial Console Driver Setup Wizard appears Click Install to install the driver Click Finish when the installation is complete Connect the EMX s USB cable to the computer The driver is automatically installed gt To install the driver in Windows XP 1 Disconnect the EMX s USB cable from the computer 2 Checkif the file usbser sys is available in C Windows ServicePackFiles i386 If not extract it from the Windows installation CD disc and copy it to the same directory where the USB to serial driver is stored On a CD disc with SP3 included it is extracted from 1386 SP3 CAB CD disc with SP2 included it is extracted from 1386 5 2 a CD without an SP it is extracted from 1386 DRIVER CAB Connect the EMX s USB cable to the computer The computer detects the new device and the Found New Hardware Wizard dialog appears If this dialog does not appear choose Control Panel gt System gt Hardware gt Device Manager right click the Dominion Serial Console and choose Update Driver 5 Select Install from a list or specific location and specify the location where the driver is stored 6 If you see the message requesting the file usbser sys specify the location of the file 7 The install
188. er whose settings you want to change e full name is a string comprising up to 32 ASCII printable characters The lt full_name gt variable must be enclosed in quotes when it contains spaces e phone number is the phone number that can reach the specified user The lt phone_number gt variable must be enclosed in quotes when it contains spaces e email address is the email address of the specified user Tip You can combine all commands to modify the parameters of a specific user profile at a time See Multi Command Syntax on page 320 Example The following command modifies two parameters for the user profile May zie Raritan 5 Chapter 10 Using the Command Line Interface config user modify May fullName May Turner telephoneNumber 123 4567 Results e May s full name is specified as May Turner e May s telephone number is set to 123 4567 Enabling or Disabling a User Profile This command syntax enables or disables a user profile A user can log in to the EMX device only after that user s user profile is enabled config i user modify name enabled option Variables e name is the name of the user whose settings you want to change e option is one of the options true or false Option Description true Enables the specified user profile false Disables the specified user profile Example The following command enables the user profile May config i user modify May en
189. ermissions See Setting Up Roles on page 69 To manage any settings you must log in to the user account with appropriate permissions By default multiple users can log in simultaneously using the same login name Creating a User Profile Creating new users adds a new login to the EMX gt create a user profile 1 Choose User Management Users The Manage Users dialog appears Click New The Create New User dialog appears Type the information about the user in the corresponding fields Note that User Name Password and Confirm Password fields are required Field Type this User Name The name the user enters to log in to the EMX The name can be 4 to 32 characters long 15 case sensitive 62 Raritan Chapter 4 User and Role Management Field Type this Spaces are NOT permitted Full Name The user s first and last names Password The password the user enters to log in Type it first in the Password field and then again in the Confirm Password Confirm Password field The password can be 4 to 32 characters long tis case sensitive Spaces are permitted Telephone Number A phone number where the user can be reached eMail Address An email address where the user can be reached The email can be up to 32 characters long 15 case sensitive Select the Enabled checkbox This is required so the user can log in to the EMX device Select the Force password change
190. ers Raritan s blade extension strip functions similar to a Raritan asset sensor but requires a tag connector cable for connecting to a tag port on the regular asset sensor or AMS M2 Z The blade extension strip contains 4 to 16 tag ports depending on which model you purchased The diagram illustrates a tag connector cable and a blade extension strip with 16 tag ports Tag connector cable C Raritan Appendix A Using Raritan Asset Management Sensors with the Item Description A Barcode ID number for the tag connector cable B Tag connector Cable connector for connecting the blade extension strip Note A tag connector cable has a unique barcode which is displayed in the EMX s web interface for identifying each blade extension strip where it is connected Blade extension strip Item Description D Mylar section with the adhesive tape E Tag ports F Cable socket s for connecting the tag connector cable Note Each tag port on the blade extension strip is labeled a number which is displayed as the slot number in the EMX s web interface gt To install a blade extension strip 1 Connect the tag connector cable to the blade extension strip Plug the cable s connector into the socket at either end of the blade extension strip zie Raritan d Appendix A Using Raritan Asset Management Sensors with the 2 Move the blade extension strip toward the bottom of the blade chassis unti
191. es all enabled services that are reachable using the IP network This feature uses DNS SD Domain Name System Service Discovery and mDNS multicast DNS The advertised services are discovered by clients that have implemented DNS SD and mDNS The advertised services include the following e HTTP e HTTPS e Telnet e SSH e Modbus e json rpc e SNMP This feature is enabled by default gt To enable Service Advertisement 1 Click Device Settings gt Network Services gt Service Advertisement 2 Click Yes in the Changing Service Advertisement confirmation dialog box The feature is enabled and the Service Advertisement checkbox is selected in the menu gt To disable Service Advertisement 1 Click Device Settings gt Network Services gt Service Advertisement 2 Click No in the Changing Service Advertisement confirmation dialog box The feature is disabled and the Service Advertisement checkbox is deselected in the menu Configuring the SMTP Settings The EMX can be configured to send alerts or event messages to a specific administrator by email To do this you have to configure the SMTP settings and enter an IP address for your SMTP server and a sender s email address Note See Configuring Event Rules see Event Rules and Actions on page 131 for information on creating event rules to send email notifications gt To set the SMTP server settings 1 Choose Device Settings gt SMTP Server The SMTP Ser
192. eshold lt Reading Lower Warning Threshold Note The symbol lt means smaller than or equal to above upper warning State This state means a numeric sensor s reading is above the upper warning threshold as indicated below Upper Warning Threshold Reading Upper Critical Threshold Note The symbol lt means smaller than or equal to above upper critical State This state means a numeric sensor s reading is above the upper critical threshold as indicated below Upper Critical Threshold lt Reading Note The symbol lt means smaller than or equal to Unmanaging Environmental Sensors When it is unnecessary to monitor a particular environmental factor you can unmanage or release the corresponding environmental sensor so that the EMX device stops retrieving the sensor s reading and or state gt release a managed sensor 1 Ifthe EMX folder is not expanded expand it to show all components Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 2 Click the External Sensors folder in the EMX Explorer pane and the External Sensors page opens in the right pane 3 Click the sensor you want to unmanage on the External Sensors page 4 Click Release 181 182 Chapter 8 Managing External Devices After a sensor is removed from management the ID number assigned to that sensor is rel
193. etection of the smoke presence waterDetection The connected detector switch is for detection of the water presence vibration The connected detector switch is for detection of the vibration Example The following indicates that a smoke detector is being connected to Raritan s contact closure sensor DPX CC2 TR whose ID number shown in the EMX web interface is 2 config externalsensor 2 sensorSubType smokeDetection 281 282 Chapter 10 Using the Command Line Interface Setting the X Coordinate This command syntax specifies the X coordinate of an environmental sensor config externalsensor lt n gt xlabel lt coordinate gt Variables n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e coordinate is a string comprising up to 24 ASCII printable characters and it must be enclosed in quotes Example The following command sets the value The 2nd cabinet to the X coordinate of the environmental sensor with the ID number 4 config f externalsensor 4 xlabel The 2nd cabinet Setting the Y Coordinate This command syntax specifies the Y coordinate of an environmental sensor config f externalsensor n ylabel coordinate Variables n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web
194. etrieve any command that was previously typed in the same connection session press the Up arrow the keyboard until the desired command is displayed Automatically Completing a Command A CLI command always consists of several words For some unique CLI commands such as the reset command you can easily complete them by pressing the Tab or Cirl i instead of typing the whole command word by word gt have a unique command completed automatically 1 Type initial letters or words of the command For example type the first word of the reset factorydefaults command that is reset 2 Press Tab or Cirl i until the complete command appears For example although you typed only one word for the reset command the rest of the command appears after pressing Tab or Ctrl i zie Raritan d Chapter 10 Using the Command Line Interface Logging out of CLI After completing your tasks using the CLI always log out of the CLI to prevent others from accessing the CLI gt To log out of the CLI 1 Ensure you have entered the administrator mode and the prompt is displayed 2 Type exit and press Enter Resetting to Factory Defaults CLI The Command Line Interface CLI provides a reset command for restoring the EMX to factory defaults For information on CLI see Using the Command Line Interface on page 212 To reset to factory defaults using the CLI command 1 Connect a computer to the EMX device See Conn
195. etwork Troubleshooting The EMX provides 4 diagnostic commands for troubleshooting network problems nslookup netstat ping and traceroute The diagnostic commands function as corresponding Linux commands and can get corresponding Linux outputs Entering the Diagnostic Mode Diagnostic commands function in the diagnostic mode only gt To enter the diagnostic mode 1 Ensure you have entered the administrator mode and the prompt is displayed 2 Type diag and press Enter The diag gt prompt appears indicating that you have entered the diagnostic mode 3 Now you can type any diagnostic commands for troubleshooting Diagnostic Commands The diagnostic command syntax varies from command to command Querying the DNS Servers This command syntax queries Internet domain name server DNS information of a network host diag gt nslookup lt host gt Variables e host is the name or IP address of the host whose DNS information you want to query Example The following command checks the DNS information regarding the host 192 168 84 222 diag nslookup 192 168 84 222 zie Raritan 24 Chapter 10 Using the Command Line Interface Showing the Network Connections This command syntax displays network connections and or status of ports diag gt netstat lt option gt Variables e option is one of the options ports or connections Option Description ports Shows TCP UDP ports con
196. f you clicked Switch Off in the previous step a dialog appears prompting you to confirm the operation Click Yes to turn it off or No to abort the operation The heat exchanger s icon shown in the web interface changes after being turned on or off See Device States and Icon Variations on page 196 PowerLogic PM710 The Schneider Electric PowerLogic PM710 power meter is connected to the EMX 111 RS485 port Once it is connected and the EMX detects it the PM710 is viewed under the Auxiliary Port folder in the navigation tree Note The EMX 888 does not support the PowerLogic PM710 This device is only supported when plugged into the RS485 port using a PM710 supported cable not provided by Raritan with the EMX Refer to your Schneider Electric PowerLogic PM710 documentation for information on the pinouts for the meter Note For information on the PM710 and any sensor specific configuration required see the PM710 user guide From the EMX you can remotely reset the PM710 energy accumulators and the PM710 minimum and maximum reading values Additionally you can create event rules and actions for the PM710 such as emailing or sending an SMS message when thresholds are reached and so on See Creating an Event Rule on page 132 The PM710 line speed parity and address as well as the thresholds for PM710 numeric sensors can be configured on the PM710 These settings need to be the match in EMX For example if the address is 42
197. face config sensor externalsensor lt n gt lt sensor type gt hysteresis lt value gt Variables e n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e sensor type is one of these sensor types temperature humidity airPressure or air Flow Note If the specified sensor type does not match the type of the specified environmental sensor this error message appears Specified sensor type XXX does not match the sensor s type sensortype where XXX is the specified sensor type and sensortype is the correct sensor type e value is a numeric value that is assigned to the hysteresis for the specified environmental sensor See What is Deassertion Hysteresis on page 182 for the function of the deassertion hysteresis Example The following command sets the deassertion hysteresis of the environmental temperature sensor with the ID number 4 to 2 degrees Celsius That is the temperature must drop by at least 2 degrees Celsius below the upper threshold or rise by at least 2 degrees Celsius above the lower threshold before any threshold crossing event is deasserted config i sensor externalsensor 4 temperature hysteresis 2 Setting the Sensor s Assertion Timeout This command syntax configures the assertion timeout value of a numeric environmental sensor zie Raritan dd Cha
198. faces Example The following command determines that both of IPv4 and IPv6 protocols are enabled config f network ip proto both Selecting IPv4 or IPv6 Addresses This command syntax determines which IP address is used when the DNS server returns both of IPv4 and IPv6 addresses You need to configure this setting only after both of IPv4 and IPv6 protocols are enabled on the EMX config f network ip dnsResolverPreference resolver Variables e resolver is one of the options preferV4 or preferV6 Option Description preferV4 Use the IPv4 addresses returned by the DNS server preferV6 Use the IPv6 addresses returned by the DNS server Raritan Chapter 10 Using the Command Line Interface Example The following command determines that only IPv4 addresses returned by the DNS server are used config network ip dnsResolverPreference preferV4 Setting the Wireless Parameters You must configure wireless parameters including Service Set Identifier SSID authentication method Pre Shared Key PSK and Basic Service Set Identifier BSSID after the wireless networking mode is enabled A wireless configuration command begins with network wireless Note If current networking mode is not wireless the SSID PSK and BSSID values are not applied until the networking mode is changed to wireless In addition a message appears indicating that the active network interface is not wireless The commands
199. ffic from all IPv6 addresses regardless of the user s role 4 Click OK to save the changes d Raritan Chapter 6 Security Creating Role Based Access Control Rules Role based access control rules accept or drop traffic based on the user s role and IP address Like firewall rules the order of rules is important since the rules are executed in numerical order gt create role based access control rules 1 Choose Device Settings gt Security gt Role Based Access Control The Configure Role Based Access Control Settings dialog appears 2 Click the IPv4 tab for creating firewall rules or click the IPv6 tab for creating IPv6 firewall rules 3 Ensure the Enable Role Based Access Control for IPv4 checkbox is selected on the IPv4 tab or the Enable Role Based Access Control for IPv6 checkbox is selected on the IPv6 tab 4 Create specific rules Action Do this Add a rule to the end of Click Append The Append new Rule dialog the rules list appears a starting IP address in the Starting IP Address field Type an ending IP address in the Ending IP Address field Select a role from the drop down list in the Role field This rule applies to members of this role only Select Allow or Deny from the drop down list in the Policy field Allow Accepts traffic from the specified IP address range when the user is a member of the specified role Deny Drops traffic from the specified IP ad
200. for Search Login Name Attribute User Entry Object Cass User Search Subfiter Active Directory Domain 192 168 56 3 Use settings from LDAP Server Select LDAP Server Microsoft Active Directory C LDAP over SSL 389 636 Use only trusted LDAP Server Certificates not set Show Remove select new certificate Browse Anonymous Bind Use Bind Credentials dc techadssl dc com sAMAccountNeme user techadssl com Test Connection 357 Appendix LDAP Configuration Illustration 5 6 Note For more information on LDAP configuration see Setting Up LDAP Authentication on page 123 Click OK to save the changes The LDAP server is saved Click OK to save the changes The LDAP authentication is activated Note If the EMX clock and the LDAP server clock are out of sync the certificates are considered expired and users are unable to authenticate using LDAP To ensure proper synchronization administrators should configure the EMX and the LDAP server to use the same NTP server Step D Configure User Groups on the EMX Device 358 A role on the EMX device determines the system permissions You must create the roles whose names are identical to the user groups created for the EMX on the AD server or authorization will fail Therefore we will create the roles named EMX User and EMX Admin
201. for the EMX 111 for each connected asset sensor The ability to monitor environmental factors such as external temperature and humidity User specified location attributes for environmental sensors The ability to display temperatures in Celsius or Fahrenheit height in meters or feet and pressure in Pascal or psi according to user credentials Support for a maximum of 130 environmental sensors for the EMX 888 and 16 for the EMX 111 Support for cascading AMS devices and or PX2 devices connected to the EMX Support for SNMP v1 v2 and v3 The ability to send traps and informs using the SNMP protocol The ability to configure and set values through SNMP Support for SSH and Telnet services For SSH both password and public key authentications are supported Service Advertisement support The ability to save one EMX device s configuration settings and then deploy those settings to other identical EMX devices Support for the tilt sensor implemented on the Raritan asset sensors Wireless connection via a Raritan provided wireless USB LAN adapter The ability to visually monitor the data center environment through a connected Logitech webcam See Webcams on page 184 for supported Logitech makes and models Support for webcam images sent via email to designated recipients Support of Cinterion MC52iT and MC55iT GSM modems which allow you to send customized SMS messages to designated recipients for specific events Support for s
202. g sensor states is displayed The sensor is in the abnormal state OFF The sensor is in the normal state Note Numeric sensors use numeric values to indicate the environmental or internal conditions while discrete on off sensors use alphabetical characters only to indicate the state changes If your EMX device has more than one SENSOR ports press the FUNC button to display the physical port number of the environmental sensor The port number is shown as P X where X is the port number For the onboard contact closure sensor it is displayed as CC1 or CC2 Press the FUNC button to display the X Y and Z coordinates of the sensor respectively X coordinate is shown as x XX where XX are the first two numeric digits entered for the X coordinate in the web interface Y coordinate is shown as y XX where XX are the first two numeric digits entered for the Y coordinate in the web interface Z coordinate is shown as 2 where XX are the first two numeric digits entered for the Z coordinate in the web interface If one or both of the first two digits for a specific coordinate are alphabetical characters one or two underscores are displayed in place of the alphabetical characters Press the FUNC button again to display the serial number of the sensor which is shown as s XX where XX are two digits of the serial number The LCD will cycle through the serial number from the first two digits to the final t
203. haracters and where in the database to begin searching for the specified Base DN An example Base Search value might be cn Users dc raritan dc com Consult your authentication server administrator for the appropriate values to enter into these fields Type the following information in the corresponding fields LDAP needs this information to verify user names and passwords 125 Chapter 6 Security 126 Login name attribute also called AuthorizationString User entry object class User search subfilter also called BaseSearch Note The EMX will preoccupy the login name attribute and user entry object class with default values which should not be changed unless required 17 Active Directory Domain Type the name of the Active Directory Domain For example testradius com Consult with your Active Directory Administrator for a specific domain name 18 To verify if the LDAP LDAPS configuration is done correctly you may click Test Connection to check whether the EMX can connect to the LDAP LDAPS server successfully Tip You can also do this by using the Test Connection button in the Authentication Settings dialog 19 Click OK to save the changes The new LDAP server is listed in the Authentication Settings dialog 20 To add additional LDAP LDAPS servers repeat Steps 3 to 19 21 Click OK to save the changes The LDAP authentication is now in place Note If the EMX clock and the LDAP server clock are out
204. hat the restore is complete You may upgrade your EMX device to benefit from the latest enhancements improvements and features The EMX firmware files are available on the Raritan website s Firmware and Documentation section http www raritan com support firmware and documentation Updating the Firmware You must be the system administrator or log in to the user profile with the Firmware Update permission to update the EMX device s firmware If applicable to your model download the latest firmware file from the Raritan website read the release notes then start the upgrade If you have any questions or concerns about the upgrade contact Raritan Technical Support BEFORE upgrading Warning Do NOT perform the firmware upgrade over a wireless connection gt To update the firmware 1 Choose Maintenance gt Update Firmware The Firmware Update dialog appears 2 Inthe Firmware File field click Browse to select an appropriate firmware file Click Upload A progress bar appears to indicate the upload status When the upload is complete version information of both the existing firmware and uploaded firmware is shown providing you a last chance to terminate the update 97 98 5 5 To view the certificate of the uploaded firmware click View Certificate Optional 6 To proceed with the update click Update Firmware The update may take several minutes
205. he EMX device is installed Optionally if you have already installed and configured an EMX and are now configuring a different EMX you can use the Bulk Configuration feature to make the configuration process easier See Setting Up an EMX Using Bulk Configuration on page 94 Naming the EMX Device zie Raritan The default name for an EMX device is EMX which can be changed as needed gt change the device name 1 In left navigation panel click the EMX folder The Settings page opens Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 Click Setup on the Settings page The EMX Setup dialog appears Type a new name in the Device Name field 72 Chapter 5 Device Management 4 Click OK to save the changes Displaying the Device Information The Device Information dialog displays information specific to the EMX device that you are accessing such as IDs and protocol versions of asset sensors gt To display the device information 1 Choose Maintenance gt Device Information The Device Information dialog appears 2 Click the tab containing the information you want to view Tab Information shown Device Information General device information such as model name serial number firmware version hardware revision and so on Asset Strips Each asset sensor s ID boot version application version and protoc
206. he Command Line Interface In This Chapter Abo t the Interface 5 ieiuno ere terne Doi i 212 LOGGING IN 10 psc 213 Restricted Service Agreement sese 216 Help COMMANG 218 Showing Iriformatioru nee 218 Configuring the EMX Device and 231 Unblocking User trei ea rein Le eade renes 321 Resetting the EMX terret i erae edades 322 Network Troubleshooting uiii eia ce tinet eee taies 323 Querying Available Parameters for a 326 Retrieving Previous Commands sse 327 Automatically Completing a Command 327 Logging outor CLl cR c 328 Resetting to Factory Defaults CL 328 About the Interface Z Raritan The EMX provides a command line interface that enables data center administrators to perform some basic management tasks Using this interface you can do the following e Reset the EMX device e Display the EMX and network information such as the device name firmware version IP address and so on e Configure the EMX and network settings e Troubleshoot network problems You can access the interface over a serial connection using a terminal emulation program such as HyperTerminal or via a Telnet or SSH
207. he EMX or you are using SNMP on the EMX click the EMX Credentials and SNMP v3 Settings button to open the EMX Credentials and SNMP v3 Settings dialog Note For SNMP v2 enter the SNMP v2 community string in the DataPort field for that probe when you create a data port a Enter the username password and password confirmation information for the login credentials if applicable b Enable or disable the use of the device s SNMP settings Click Create Ports The Create Ports dialog opens a Select Asset Strip from the Port Type drop down b Enter a name for the port Required c Select the cabinet and position of the port Required d Enter comments as needed e Click Create Port A confirmation that the port was created is at the top of the dialog Click Close Create a comm port for the EMX and assign it the IP address used to locate the device on the network Click Create Ports in the Comm Ports section of the page The Create Ports dialog appears Note After adding a Humidity Temperature sensor to an EMX make sure that the Order column in dcTrack is the same order on the EMX a Create the port manually or by selecting it from the port library Manually select or enter the port name in the Port Name drop down then select the connector media protocol and speed Required If the port is available in the Port Library it is displayed in the Create from the Model s Port Definition in the Library list at the
208. he LAN interface duplex mode config network interface LANInterfaceDuplexMode lt mode gt Variables e lt mode gt is one of the modes auto half or full Option Description auto The EMX selects the optimum transmission mode through auto negotiation half Half duplex Data is transmitted in one direction to or from the EMX device at a time full Full duplex Data is transmitted in both directions simultaneously Example The following command lets the EMX determine the optimal transmission mode through auto negotiation config f network interface LANInterfaceDuplexMode auto Setting the Network Service Parameters A network service command begins with network services zie Raritan di Chapter 10 Using the Command Line Interface Changing the HTTP Port This command syntax changes the HTTP port config network services http port lt n gt Variables e lt n gt is a TCP port number between 1 and 65535 The default HTTP port is 80 Example The following command sets the HTTP port to 81 config network services http port 81 Changing the HTTPS Port This command syntax changes the HTTPS port config network services https port lt n gt Variables e lt n gt is a TCP port number between 1 and 65535 The default HTTPS port is 443 Example The following command sets the HTTPS port to 333 config network services https port 333 Changing the Telnet Configuration You ca
209. he action s do any of the following in the Actions field To add new action click the drop down arrow select the action from the list and click Add Action Action 7 To remove any action select it from the Added actions list box and click the Remove button to move it back to the Available actions list box To make multiple selections press Ctrl click or Shift click to highlight multiple ones To remove all actions at a time simply click the Remove All button 8 Click Save to save the changes Note If you do not click Save before quitting the current settings page a message appears Then click Yes to save the changes Discard to abort the changes or Cancel to return to the current settings page 9 Click Close to quit the dialog Modifying an Action An existing action can be changed so that all event rules where this action is involved change their behavior accordingly Exception The built in action System Event Log Action is not user configurable gt To modify an action 1 Choose Device Settings gt Event Rules The Event Rule Settings dialog appears Click the Actions tab Select the action that you want to modify from the left list Make necessary changes to the information shown gi we co Click Save to save the changes 157 158 Chapter 7 Event Rules Event Actions and Application Logs Event Logging Note If you do not click Save before quitti
210. he blade extension strip connected to a particular rack unit The number of each tag port on the blade extension strip is available on the Asset Strip page Command History This command syntax shows the command history for current connection session show history Displayed information e A list of commands that were previously entered in the current session is displayed 229 Chapter 10 Using the Command Line Interface 230 History Buffer Length This command syntax shows the length of the history buffer for storing the history commands show history bufferlength Displayed information e The current history buffer length is displayed Examples This section provides examples of the show command Example 1 Basic Security Information The diagram shows the output of the show security command D ae Disabled Role based access control Disabled Password aging Enabled Prevent concurrent user login Strong passwords Disabled Enforce HTTPS for web access Yes Raritan Chapter 10 Using the Command Line Interface Example 2 In Depth Security Information More information is displayed when typing the show security details command show security details IP access control Disabled Role based access control Disabled Password aging Enabled Aging interval 60 days Prevent concurrent user login No Maximum number of failed logins 3 User block time 10 minutes
211. he fully qualified domain name FQDN of your EMX device An email address where you or another administrative user can be reached Note All fields in the Subject section are mandatory except for the Organization Organizational Unit and Email Address fields If you generate a CSR without values entered in the required fields you cannot obtain third party certificates In the Key Creation Parameters section Do this Select the key length bits from the drop down list in this field A larger key length enhances the security but slows down the EMX device s response For requesting a certificate signed by the CA ensure this checkbox is NOT selected Type a password The password is used to protect the certificate or CSR This information is optional and the value should be 4 to 64 characters long The password is case sensitive so ensure you capitalize the letters correctly Type the same password again for confirmation 4 Click Create New SSL Key to create both the CSR and private key This may take several minutes to complete 5 To download the newly created CSR to your computer click Download Certificate Signing Request a You are prompted to open or save the file Click Save to save it on your computer b After the file is stored on your computer submit it to a CA to obtain the digital certificate c If desired click Delete Certificate Signing Request to remove the CSR file permanently from the EMX dev
212. he right pane showing the asset sensor settings and information of all rack units tag ports Note You can also access this dialog by double clicking the asset sensor shown on the Dashboard page Click Setup in the Settings section The Setup of Asset Strip dialog appears Enter a name of the asset sensor Type the total number of rack units the selected asset sensor has in the Number of Rack Units field This field shows 48 by default Determine how to number all rack units on the asset sensor by selecting an option in the Numbering Mode Top Down The rack units are numbered in the ascending order from the highest to the lowest rack unit Bottom Up The rack units are numbered in the descending order from the highest to the lowest rack unit In the Numbering Offset field select the starting number For example if you select 3 the first rack unit is numbered 3 the second is numbered 4 the third is numbered 5 and so on until the final number Indicate how the asset sensor is mounted in the rack in the Orientation field The rack unit that is most close to the RJ 45 connector of the asset sensor will be marked with the index number 1 in the web interface Raritan 5 Raritan 12 Setup of Asset Sensor 4 4 Asset Sensor 4 Number of Rack Units 48 Numbering Mode Bottom Up Numbering Offset 1 Orientation Top Connector Color with connected Tag W rrooo0 Color without connecte
213. he web interface and command line interface Click OK to save the changes Deleting a User Profile Delete outdated or redundant user profiles when necessary gt 1 To delete user profiles Choose User Management gt Users The Manage Users dialog appears Select the user you want to delete by clicking it To make multiple selections press Ctrl click or Shift click to highlight multiple ones Click Delete Raritan zie Raritan Chapter 4 User and Role Management 4 Amessage appears prompting you to confirm the operation Click Yes to confirm the deletion Setting Up User Preferences Units of Measure The units of measure used in your EMX GUI can be changed as needed Note Changing your preferences does not change the EMX device display See Setting Up Default User Preferences Units of Measure on page 67 for information on changing the device display gt change your EMX GUI units of measure 1 Choose User Management gt User Preferences The Setup User Preferences dialog opens 2 Update any of the following as needed nthe Temperature Unit field select C Celsius or F Fahrenheit as the measurement unit for temperatures Inthe Length Unit field select Meter or Feet as the measurement unit for length or height Inthe Pressure Unit field select Pascal or psi as the measurement unit for pressure 3 Click OK Setting Up Default User Preferences
214. hed it is set to take snapshots every five 5 seconds Change the webcam settings and or switch between snapshots and live video from the Webcam Setup dialog by clicking on a webcam in the navigation tree and then clicking the Setup button in the Live Preview pane See Configuring Webcams on page 185 Snapshots or videos captured by a webcam are displayed in the right pane of EMX web interface once a webcam is selected in the navigation tree Raritan EMX User Managemen Device Settings Msintenanuy Exp 7 webcam C9000 pro Wl Dashboard Preview 2 4 J EMX 192 168 52 80 E 4 7 External Sensors lde J Air Pressure 1 4 Contact Closure 1 6 Contact Closure 2 Temperature 1 4 7 Feature Ports A Asset Strip 1 4 Webcam Management Snapshots Ma webcam C9000 pro la Location Name X Y zs NAM AL AOA Martane uo AS A rn Cie pias n Ly Raritan ad 188 Chapter 8 Managing External Devices In the snapshot mode a snapshot mode icon E appears on the top left corner of the image along with the number of images the webcam is set to take per second In the video mode a video mode icon appears on the top left corner of the image Switch between snapshot mode and video mode click Setup and select either the Image or Video radio buttons A date and time stamp is displayed on each snapshot as well The
215. holders iii 138 139 142 143 145 EMX and PX2 PDU Cascading Connections iii 162 EMX Asset Sensor Management 343 EMX Device Management 72 EMX2 111 iv EMX2 888 iv Enabling and Disabling Schroff LHX Heat Exchanger Support 77 192 209 Enabling and Editing the Security Banner Restrictive Service Agreement Banner iii 51 129 Enabling Data Logging 176 Enabling IPv4 or IPv6 236 Enabling LDAP and Local Authentication Services 129 Raritan Enabling Login Limitations 111 Enabling or Disabling a User Profile 294 Enabling or Disabling Data Logging 233 Enabling or Disabling SNMP v1 v2c 255 Enabling or Disabling SNMP v3 256 Enabling or Disabling SSH 254 Enabling or Disabling Strong Passwords 270 Enabling or Disabling Telnet 253 Enabling Password Aging 113 Enabling Service Advertisement 92 Enabling SNMP 176 202 Enabling Strong Passwords 112 Enabling the Feature 113 Enabling the Firewall 105 Enabling User Blocking 110 Entering the Configuration Mode 215 231 241 292 302 303 Entering the Diagnostic Mode 215 323 Environmental Sensor Configuration Commands 280 Environmental Sensor Information 47 222 Environmental Sensor Threshold Configuration Commands 284 Environmental Sensor Threshold Information 224 Environmental Sensors 169 Event Logging 158 Event Rules and Actions iii 85 92 131 148
216. ibration you must determine the normal state by adjusting its dip switch which controls the LED state on the body of DPX CC2 TR A dip switch is associated with a channel gt To adjust the dip switch setting 1 Place the detectors switches connected to DPX CC2 TR to the position where you want to detect a specific environmental situation 2 Uncover the dip switch on the body of DPX CC2 TR 3 To set the Normal state for channel 1 locate the dip switch labeled 1 4 Use a pointed tip such as a pen to move the slide switch to the end labeled N O or N C The side labeled N O Normally Open The open status of the connected detector switch is considered normal This is the default The side labeled N C Normally Closed The closed status of the connected detector switch is considered normal For Raritan s water sensors the Normal state should be Normally Open which indicates there is no water detected Adjust the dip switch setting to Normally Open and verify that the LED of the channel where the Raritan s water sensor is connected remains OFF 5 To set the Normal state for channel 2 repeat Step 4 for adjusting the other dip switch s setting 6 Install back the dip switch cover Z Raritan Chapter 2 Installing and Configuring the Device Note The dip switch setting must be properly configured or the sensor LED may be incorrectly lit in the Normal state Connecting Third Party Detectors Swi
217. ice 6 To store the newly created private key on your computer click Download Key You are prompted to open or save the file Click Save to save it on your computer 7 Click Close to quit the dialog zie Raritan m 120 Chapter 6 Security Field Country ISO Code State or Province Locality Organization Organizational Unit Common Name Email Address Installing a CA Signed Certificate After the CA provides a signed certificate according to the CSR you submitted you must install it on the EMX device gt To install the certificate 1 Choose Device Settings gt Security gt SSL Certificate The Manage SSL Certificate dialog appears Click the New SSL Certificate tab In the Certificate File field click Browse to select the certificate file provided by the CA 4 Click Upload The certificate is installed on the EMX device Tip To verify whether the certificate has been installed successtully click the Active SSL Certificate tab later 5 Click Close to quit the dialog Creating a Self Signed Certificate When appropriate certificate and key files for the EMX device are unavailable the alternative other than submitting a CSR to the CA is to generate a self signed certificate gt To create and install a self signed certificate 1 Choose Device Settings gt Security gt SSL Certificate The Manage SSL Certificate dialog appears Click the New SSL Certificate tab Provide the inform
218. include spaces m Raritan Chapter 10 Using the Command Line Interface Example This command syntax sets the SNMP read only community string to public config network services snmp readCommunity public Setting the SNMP Write Community This command syntax sets the SNMP read write community string config f network services snmp writeCommunity lt string gt Variables e lt string gt is a string comprising 4 to 64 ASCII printable characters e The string CANNOT include spaces Example The following command sets the SNMP read write community string to private config i network services snmp writeCommunity private Setting the sysContact Value This command syntax sets the SNMP MIB II sysContact value config network services snmp sysContact lt value gt Variables e value is a string comprising 0 to 255 alphanumeric characters Example The following command sets the SNMP MIB II sysContact to John Krause config network services snmp sysContact John Krause zie Raritan dd Chapter 10 Using the Command Line Interface Setting the sysName Value This command syntax sets the SNMP MIB II sysName value config network services snmp sysName lt value gt Variables e value is a string comprising 0 to 255 alphanumeric characters Example The following command sets the SNMP MIB II sysName to Win7_system config network services snmp sysName Win7 system Seiting the sysLoc
219. ing Up User Preferences see Setting Up User Preferences Units of Measure on page 67 and Setting Up Default User Preferences see Setting Up Default User Preferences Units of Measure on page 67 To change the measurement unit setting you must have the administrator privileges gt To set the preferred measurement units 1 Choose User Management gt Users The Manage Users dialog appears Select the user by clicking it 3 Click Edit or double click the user The Edit User XXX dialog appears where XXX is the user name 4 Click the Preferences tab 75 76 Chapter 5 EMX Device Management To change the temperature unit select the desired option in the Temperature Unit field C This option displays the temperature in Celsius F This option displays the temperature in Fahrenheit To change the length or height unit select the desired option in the Length Unit field Meter This option displays the length or height in meters Feet This option displays the length or height in feet To change the pressure unit select the desired option in the Pressure Unit field Pascal This option displays the pressure value in Pascals A Pascal is equal to one newton per square meter psi This option displays the pressure value in psi Psi stands for pounds per square inch 8 Click OK to save the changes Determining How to Display Tree Items By default the EMX web interface displays
220. ing Up User Login Controls 110 Setting Up User Preferences Units of Measure iii 65 67 75 301 304 Setup Button 55 Show Serial 224 Showing Information 218 Showing the Network Connections 324 Single Login Limitation 267 SNMP Gets and Sets 209 SNMP Sets and Thresholds 211 SNMPv2c Notifications 205 SNMPv3 Notifications 206 Sorting Firewall Rules 109 Sorting Role Based Access Control Rules 117 Sorting the LDAP Access Order 127 Special Character Requirement 272 Specifications 351 Specifying the Asset Sensor Orientation 315 Specifying the Device Altitude 74 Specifying the Number of Rack Units 313 Specifying the Primary NTP Server 305 Specifying the Rack Unit Numbering Mode 314 Specifying the Rack Unit Numbering Offset 315 Specifying the Secondary NTP Server 306 Specifying the Sensor Type 281 Specifying the SSH Public Key 255 301 States of Managed Sensors 179 Status Bar 55 Step A Determine User Accounts and Groups 354 Step B Configure User Groups on the AD Server 355 Step C Configure LDAP Authentication on the EMX Device 356 Step D Configure User Groups on the EMX Device 358 Strong Passwords 269 368 Supported Web Browsers 43 Supported Wireless LAN Configuration 14 Switch LHX 143 Syslog Message 141 T Taking Viewing and Managing Webcam Snapshots 184 188 Testing the LDAP Server
221. into DPX CC2 TR include those for e Door open closed detection e Door lock detection e Floor water detection e Smoke detection e Vibration detection Raritan does NOT produce most of the above detectors switches except floor water sensors When using third party probes you must test them with Raritan s DPX CC2 TR to ensure they work properly Important Integration and testing for third party detectors switches is the sole responsibility of the customer Raritan cannot assume any liability as a result of improper termination or failure incidental or consequential of third party detectors switches that customers provide and install Failure to follow installation and configuration instructions can result in false alarms or no alarms Raritan makes no statement or claim that all third party detectors switches will work with DPX CC2 TR Connecting Third Party Detectors Switches There are two ways to connect third party detectors switches to the EMX device e Connect the detectors switches to DPX CC2 TR which will be connected to a SENSOR port on the EMX device e Connect the detectors switches to the contact closure sensor termination on the EMX device if your EMX device is EMX2 888 35 zie Raritan 36 Chapter 2 Installing and Configuring the Device Connecting Detectors Switches to DPX CC2 TR A DPX CC2 TR unit provides two channels for connecting two discrete on off detectors switches There are four spri
222. ion on page 104 for instructions on forcing users to employ SSL when connecting to the EMX A CSR is not required in either of the following scenarios e You decide to generate a self signed certificate on the EMX device e Appropriate valid certificate and key files have been available Certificate Signing Request When appropriate certificate and key files for the EMX are NOT available one of the alternatives is to create a CSR and private key on the EMX device and send the CSR to a CA for signing the certificate Creating a Certificate Signing Request Follow this procedure to create the CSR for your EMX device gt To create a CSR 1 Choose Device Settings gt Security gt SSL Certificate The Manage SSL Certificate dialog appears Click the New SSL Certificate tab Provide the information requested In the Subject section Type this information The country where your company is located Use the standard ISO country code For a list of ISO codes visit the ISO website httpz www iso org iso country codes iso 3166 code lists htm The full name of the state or province where your company is located The city where your company is located Raritan Field Organization Organizational Unit Common Name Email Address Field Key Length Self Sign Challenge Confirm Challenge Chapter 6 Security Type this information The registered name of your company The name of your department T
223. ion name field type a new name for the action The default name is New Action numbers where number is a sequential number based on how many actions are already created 5 Inthe Action field click the drop down arrow and select the desired action from the list Raritan Raritan 6 9 Chapter 7 Event Rules Event Actions and Application Logs In the Recipients email addresses field specify the email address es of the recipient s Use a comma to separate multiple email addresses To use the SMTP server specified in the SMTP Server Settings dialog select the Use Default SMTP Server checkbox To use a different SMTP server select the Use Custom SMTP Settings checkbox If the SMTP server settings are not configured yet click Configure See Configuring the SMTP Settings on page 92 for the information of each field Default messages are sent based on the event See Default Log Messages on page 148 for a list of default log messages and events that trigger them If needed select the Use Custom Log Message checkbox and then create a custom message in the provided field Click the Information icon to open the Event Context Information dialog which contains a list of placeholders and their definitions See Email and SMS Message Placeholders on page 145 for more details Click OK to save the new action 10 Click Close to quit the dialog Send an SNMP Notification This option sends an SNMP
224. ion of the asset sensors and automatically configure it Top Connector This option indicates that the asset sensor is mounted with the RJ 45 connector located on the top Bottom Connector This option indicates that the asset sensor is mounted with the RJ 45 connector located at the bottom To change the LED color denoting the presence of a connected tag either click a color in the color palette or type the hexadecimal RGB value of the color in the Color with connected Tag field To change the LED color denoting the absence of a connected tag either click a color in the color palette or type the hexadecimal RGB value of the color in the Color without connected Tag field Click OK to save the changes See the EMX Help for additional information on using the EMX device Setting EMX Asset Sensor LED Colors In the EMX web interface a rack unit refers to a tag port on the asset sensor You can name a specific rack unit or change its LED color settings so that this LED behaves differently from others on the same asset sensor gt 1 To change an LED s settings If you have not already done so log in to the EMX Connect the asset sensor to the EMX if it is not already Click on the Feature Ports folder in the navigation tree to expand it Click the desired asset sensor The page specific to that asset sensor opens in the right pane showing the asset sensor settings and information of all rack u
225. is not expanded expand it to show all devices connected to the RS 485 ports 2 Click the desired sensor in the EMX Explorer pane The page specific to that sensor opens in the right pane 3 Click on Clear all Energy Accumulators at the bottom left of the Sensors section of the page 4 Click OK to confirm All values are clear Raritan Chapter 9 Overview Raritan Using SNMP In This Chapter OVGIVICW ss 22 M 201 Enabling SNMP eid edo 202 Configuring SNMP Notifications rsrsrsrsrs iee 204 Configuring Users for Encrypted SNMP 208 SNMP Gets and Sets era Rar A 209 This SNMP section helps you set up the EMX for use with an SNMP manager The EMX can be configured to send traps or informs to an SNMP manager as well as receive GET and SET commands in order to retrieve status and configure some basic settings 201 Chapter 9 Using SNMP Enabling SNMP 202 By default SNMP v1 v2c is enabled on the EMX so the EMX can communicate with an SNMP manager If you have disabled the SNMP it must be enabled to communicate with an SNMP manager Note that read only access is enabled and the community string is public gt To enable SNMP 1 Choose Device Settings Network Services SNMP The SNMP Settings dialog appears SNMP Settings General No
226. isable the checkbox Type the authentication pass phrase in this field if the Use Password as Authentication Pass Phrase checkbox is disabled The pass phrase must consist of 8 to 32 ASCII printable characters Re type the same authentication pass phrase for confirmation This checkbox is configurable only if AuthPriv is selected When the checkbox is selected the privacy pass phrase is identical to the authentication pass phrase To specify a different privacy pass phrase disable the checkbox Type the privacy pass phrase in this field if the Use Authentication Pass Phrase as Privacy Pass Phrase checkbox is disabled The pass phrase must consist of 8 to 32 ASCII printable characters Re type the same privacy pass phrase for confirmation Click the drop down arrow and select the desired authentication protocol from the list Two protocols are available MD5 SHA 1 default Click the drop down arrow and select the desired privacy protocol from the list Two protocols are available DES default AES 128 Raritan Raritan T Chapter 4 User and Role Management Click the SSH tab to enter the public key if the public key authentication for the SSH service is enabled See Changing the SSH Settings on page 90 a Open the SSH public key with a text editor b Copy and paste all contents in the text editor into the Public Key field on the SSH tab Click the Roles tab to determi
227. it gt delete role based access control rule 1 Choose Device Settings gt Security gt Role Based Access Control The Configure Role Based Access Control Settings dialog appears 2 delete the IPv4 firewall rules click the IPv4 tab To delete the IPv6 firewall rules click the IPv6 tab 3 Ensure the Enable Role Based Access Control for IPv4 checkbox is selected on the IPv4 tab or the Enable Role Based Access Control for IPv6 checkbox is selected on the IPv6 tab 4 Selectthe rule to be deleted in the rules list To make multiple selections press Ctrl click or Shift click to highlight multiple ones Click Delete A message appears prompting you to confirm the operation Click Yes to confirm the deletion 7 Click OK to save the changes 117 Chapter 6 Security Setting Up an SSL Certificate 118 Field Country ISO Code State or Province Locality Having an X 509 digital certificate ensures that both parties in an SSL connection are who they say they are To obtain a certificate for the EMX create a Certificate Signing Request CSR and submit it to a certificate authority CA After the CA processes the information in the CSR it provides you with an SSL certificate which you must install on the EMX device Note If you are using a SSL certificate that is part of a chain of certificates each part of the chain is signed during the validation process Note See Forcing HTTPS Encrypt
228. ith the EMX click this button Raritan Raritan Chapter 8 Managing External Devices Operating Hours Operating hours are the accumulative time since the LHX heat exchanger is first connected to the EMX device and turned ON The EMX web interface displays the operating hours both for the heat exchanger and its fans Operating hour information is located in the Statistics section of each heat exchanger page Statistics Operating Hours Varistar LHX 41d16h Operating Hours Fan M1 Oh Operating Hours Fan M2 4d4h Operating Hours Fan M3 8d8h Operating Hours Fan M4 12d12h Operating Hours Fan M5 16d 16h Operating Hours Fan M6 20d20h Operating Hours Fan M7 25 d Below are the time units used for operating hours e h hour s day s For example 5h means the total operating time is 3 days 5 hours Controlling the Heat Exchanger The EMX allows you to remotely turn on or off a connected heat exchanger gt To control the LHX heat exchanger 1 Ifthe Auxiliary Ports folder is not expanded expand it to show all devices connected to the RS 485 ports Click the desired heat exchanger in the EMX Explorer pane The page specific to that heat exchanger opens in the right pane 2 Locate the Information section To turn off the LHX heat exchanger click Switch Off To turn on the LHX heat exchanger click Switch On 197 Chapter 8 Managing External Devices 3 I
229. itical and Lower Critical values are points at which the EMX considers the operating environment critical and outside the range of the acceptable threshold 9 Click OK to save the changes 173 Chapter 8 Managing External Devices Setting the Z Coordinate Format You can use either the number of rack units or a descriptive text to describe the vertical locations Z coordinates of environmental sensors gt To determine the Z coordinate format 1 In left navigation panel click the EMX folder The Settings page opens Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 Click Setup on the Settings page The EMX Setup dialog appears In the External sensors Z coordinate format field click the drop down arrow and select an option from the list Rack Units The height of the Z coordinate is measured in standard rack units When this is selected you can type a numeric value in the rack unit to describe the Z coordinate of any environmental sensors Free Form Any alphanumeric string can be used for specifying the Z coordinate 4 Click OK to save the changes i Raritan Raritan Chapter 8 Managing External Devices Describing the Sensor Location Use the X Y and Z coordinates to describe each sensor s physical location You can use these location values to track records of environmental conditions in fixed locati
230. ity gt SSL Certificate The Manage SSL Certificate dialog appears Click the New SSL Certificate tab Select the Upload Key and Certificate checkbox The Key File and Certificate File fields appear In the Key File field click Browse to select the private key file In the Certificate File field click Browse to select the certificate file Click Upload The selected files are installed on the EMX device Tip To verify whether the certificate has been installed successtully click the Active SSL Certificate tab later 7 Click Close to quit the dialog Downloading Key and Certificate Files You can download the key and certificate files currently installed on the EMX device for backup or other operations For example you can install the files on a replacement EMX device add the certificate to your browser and so on gt To download the certificate and key files from an EMX device 1 Choose Device Settings Security SSL Certificate The Manage SSL Certificate dialog appears The Active SSL Certificate tab should open If not click it Click Download Key to download the private key file installed on the EMX device You are prompted to open or save the file Click Save to save it on your computer 4 Click Download Certificate to download the certificate file installed on the EMX device You are prompted to open or save the file Click Save to save it on your computer 5 Click Close to quit the dialog si
231. key Raritan Z Raritan Chapter 10 Using the Command Line Interface Setting the EAP Parameters When the wireless authentication method is set to EAP you must configure EAP authentication parameters including outer authentication inner authentication EAP identity password and CA certificate Setting the Outer Authentication This command syntax determines the outer authentication protocol for the EAP config f network wireless eapOuterAuthentication outer auth Variables e The value of outer auth is PEAP because EMX only supports Protected Extensible Authentication Protocol PEAP as the outer authentication Example The following command determines the outer authentication protocol for the EAP authentication is Protected Extensible Authentication Protocol PEAP config f network wireless eapOuterAuthentication PEAP Setting the Inner Authentication This command syntax determines the inner authentication protocol for the EAP config f network wireless eapInnerAuthentication inner auth Variables e The value of inner auth is MSCHAPv2 because EMX only supports Microsoft s Challenge Authentication Protocol Version 2 MSCHAPv2 as the inner authentication Example The following command determines the inner authentication protocol for the EAP authentication is MSCHAPv2 config f network wireless eapInnerAuthentication MSCHAPv2 239 Chapter 10 Using the Command Li
232. l communication fails For both SNMP TRAPS and INFORMS enter the following as needed and then click OK to apply the settings a Host name b Port number User ID needed to access the host d Select the host security level 89 90 5 Security level Description noAuthNoPriv Select this if no authorization or privacy protocols are needed e Click OK authNoPriv Select this if authorization is required but no privacy protocols are required e Select the authentication protocol MD5 or SHA e Enter the authentication passphrase and then confirm the authentication passphrase e Click OK authPriv Select this if authentication and privacy protocols are required e Select the authentication protocol MD5 or SHA e Enter the authentication passphrase and confirm the authentication passphrase e Select the Privacy Protocol DES or AES e Enter the privacy passphrase and then confirm the privacy passphrase e Click OK Changing the SSH Settings You can enable or disable the SSH access to the command line interface or change the default TCP port for the SSH service In addition you can decide to log in using either the password or the public key over the SSH connection gt change the SSH service settings 1 Choose Device Settings gt Network Services gt SSH The SSH Settings dialog appears 2 Touse a different port type a new
233. l information The following configurations are supported e EMX EMX EMX EMX e EMX PX2 2 px2 The first EMX is the master device and all devices connected to the master are its slaves The master device is device 1 in the chain and all subsequent devices are numbered sequentially The first slave device connects to the USB A port on the EMX master device from the slave s USB B port via a USB cable If another device is added to the chain connect the new device s USB B port to the existing devices USB A port using a USB cable EMX devices must be using the EMX 2 2 or later firmware and all PX2 devices must be using PX 2 3 or later firmware If the devices are not running the supported firmware upgrade your device before you connect each device in the chain All devices in the chain are accessible over an IP network with the master EMX acting as a network bridge The USB cascading configuration only supports wired networking so you must make sure e The master device has wired Ethernet connectivity e None of the slave devices has wired Ethernet connectivity Even though you connect any slave device to the LAN through a network cable its wired Ethernet interface is automatically disabled e None of the devices in the chain has wireless connectivity The devices in the chain are displayed in the explorer pane on the left once they are connected and detected by the master EMX Clicking on the master EM
234. l its mylar section is fully under the chassis and verify that the blade extension strip does not fall off easily If necessary you may use the adhesive tape in the back of the mylar section to help fix the strip in place 3 Connect one end of an asset tag to a blade server and connect the other end to the blade extension strip a Affix the adhesive part of the asset tag to one side of a blade server through the tag s tape b Plug the tag connector of the asset tag into the tag port on the blade extension strip 4 Repeat the above step until all blade servers in the chassis are connected to the blade extension strip via asset tags EE Raritan Appendix A Using Raritan Asset Management Sensors with the EMX 5 Plug the tag connector of the blade extension strip into the closest tag port of the asset sensor assembly or the AMS M2 Z asset sensor on the rack i ya Note If you need to temporarily disconnect the tag connector of the blade extension strip wait at least 1 second before connecting it back or the EMX may not detect it JJ eus Sis Raritan n Appendix Integrating EMX and Asset Management Sensors with dcTrack In This Chapter le VII RM 341 EMX Asset Sensor Management sssssssssseeeeeee 343 zie Raritan d Appendix Integrating and Asset Management Sensors with dcTrack Overview dcTrack Raritan s data center management soluti
235. ld enter the number of times you want to resend the inform communication if it fails For example inform communications are resent up to 5 times when the initial communication fails 3 Inthe Host fields enter the IP address of the device s you want to access This is the address to which notifications are sent by the SNMP system agent You can specify up to 3 SNMP destinations 4 Inthe Port fields enter the port number used to access the device s Raritan Raritan Chapter 5 EMX Device Management In the Community fields enter the SNMP community string to access the device s The community is the group representing the EMX and all SNMP management stations Click OK For SNMPv3 TRAP and INFORM notifications On the Notifications tab select the Enable checkbox to enable the SNMP notification feature From the Notification Type drop down select the type of SNMP notification For SNMP TRAPs the engine ID is prepopulated For SNMP INFORM communications leave the resend settings at their default or a Inthe Timeout sec field enter the interval of time in seconds after which a new inform communication is resent if the first is not received For example resend a new inform communication once every 3 seconds b In the Number of Retries field enter the number of times you want to resend the inform communication if it fails For example inform communications are resent up to 5 times when the initia
236. le the EMX notifies the system administrator of the event and records the event in the log Note Asset management sensor event rules must be recreated after an EMX firmware upgrade 131 132 Chapter 7 Event Rules Event Actions and Application Logs Creating an Event Rule The best way to create a new set of event rule in sequence is e Create actions for responding to one or multiple events e Create rules to determine what actions are taken when these events occur Creating Rules After required actions are available you can create event rules to determine what actions are taken to respond to specific events By default the EMX provides two built in event rules System Event Log Rule and System SNMP Notification Action If the built in rules do not satisfy your needs create new ones gt To create event rules 1 Choose Device Settings gt Event Rules The Event Rule Settings dialog appears On the Rules tab click New In the Rule name field type a new name for identifying the rule The default name is New Rule number where numbers is a sequential number Select the Enable checkbox to enable the SNMP notification feature Click Event to select an event for which you want to trigger an action A pull down menu showing various types of events appears Select the desired event type from the pull down menu and if a submenu appears continue the navigation until the desired event is selecte
237. leBasedAccessControl ipv4 rule modify rule number policy policy gt modify all contents of an existing IPv4 rule use this command syntax config f security role BasedAccessControl ipv4 rule modify rule number startIpAddress start ip endIpAddress end ip role role policy policy IPv6 commands gt modify a rule s IPv6 address range use this command syntax config security roleBasedAccessControl ipv6 rule modify rule number startIpAddress start ip endIpAddress end ip gt To modify an IPv6 rule s role use this command syntax config f security roleBasedAccessControl ipv6 rule modify rule number role role gt To modify an IPv6 rule s policy use this command syntax 278 Raritan Chapter 10 Using the Command Line Interface config security roleBasedAccessControl ipv6 rule modify rule number policy policy gt To modify all contents of an existing IPv6 rule use this command syntax config f security roleBasedAccessControl ipv6 rule modify rule number startIpAddress start ip endIpAddress end ip role role policy policy Variables e rule numbers is the number of the existing rule that you want to modify e cslart ip is the starting IP address e end ip is the ending IP address e role is one of the existing roles e policy is one of the options allow or deny Policy Description allow A
238. lect the appropriate sensor type in the Binary Sensor Subtype field Contact The detector switch is designed to detect the door lock or door open closed status Smoke Detection The detector switch is designed to detect the appearance of smoke Water Detection The detector switch is designed to detect the appearance of water on the floor Vibration The detector switch is designed to detect the vibration in the floor Type a new name in the Name field Describe the sensor s location by assigning alphanumeric values to the X Y and Z coordinates See Describing the Sensor Location on page 175 If the selected environmental sensor is a numeric sensor its threshold settings are displayed in the dialog Click Edit or double click the Threshold Configuration table to adjust the threshold deassertion hysteresis and assertion timeout settings To enable any threshold select the corresponding checkbox To disable a threshold deselect the checkbox After any threshold is enabled type an appropriate numeric value in the accompanying text box enable the deassertion hysteresis for all thresholds type a numeric value other than zero in the Deassertion Hysteresis field See What is Deassertion Hysteresis on page 182 To enable the assertion timeout for all thresholds type a numeric value other than zero in the Assertion Timeout samples field See What is Assertion Timeout on page 183 The Upper Cr
239. lete 5 You can also do any of the following Click Install Key and Certificate to immediately install the self signed certificate and private key When any confirmation and security messages appear click Yes to continue Tip To verify whether the certificate has been installed successfully click the Active SSL Certificate tab later download the self signed certificate or private key click Download Certificate or Download Key You are prompted to open or save the file Click Save to save it on your computer To remove the self signed certificate and private key permanently from the EMX device click Delete Key and Certificate 6 If you installed the self signed certificate in Step 5 after the installation completes the EMX device resets and the login page re opens Raritan n 122 Chapter 6 Security Installing Existing Key and Certificate Files If the SSL certificate and private key files are already available you can install them directly without going through the process of creating a CSR or a self signed certificate Note If you are using a SSL certificate that is part of a chain of certificates each part of the chain is signed during the validation process Is this the right place for this note Does this explain it well enough or is an example needed of what a SSL certificate chain is gt To install the existing key and certificate files 1 Choose Device Settings gt Secur
240. list 3 If needed configure GSM modem settings a Enterthe SIM PIN b Select Use custom SMS center number if a custom SMS will be used c Enter the SMS center number in the SMS Center field Click Advanced Information and complete all required information e Enter the number of the recipients phone in the Recipients Phone field then click Send SMS Test to send a test SMS message 4 Click OK Environmental Sensors Raritan The EMX can monitor the environmental conditions such as temperature and humidity where environmental sensors are placed When a sensor is plugged in to the EMX and there are free sensor numbers available the sensor is manged automatically Specifically it a sensor number is assigned to it and the EMX starts polling its readings Additionally the LCD display switches to most recently added external sensor so you can confirm that the sensor has been added gt To add environmental sensors 1 Physically connect environmental sensors to the EMX device See Connecting Environmental Sensors Optional on page 33 169 Chapter 8 Managing External Devices 2 Log into the EMX web interface The EMX should have detected the connected sensors and display them in the web interface 3 Identify each sensor through the sensor s serial number See Identifying Environmental Sensors on page 170 4 The EMX should automatically manage the detected sensors Verify whether detected sen
241. ll users Select User logged in to select the user login related events Select the Both radio button since we want both login and logout actions to be recorded when either event occurs Select System Event Log Action as we intend to record this event in the internal log when the specified events occur Modifying an Event Rule You can change an event rule s event action trigger condition and other settings if any Exception Events and actions selected in the built in event rules are not changeable including System Event Log Rule and System SNMP Notification Rule To modify an event rule Choose Device Settings gt Event Rules The Event Rule Settings dialog appears On the Rules tab select the event rule that you want to modify in the left pane To disable the event rule deselect the Enabled checkbox Raritan Raritan Chapter 7 Event Rules Event Actions and Application Logs 4 Tochange the event click the desired tab in the Event field and select a different item from the pull down menu or submenu For example in a user activity event rule for the admin user you can click the admin tab to display a pull down submenu showing all user names and then select a different user name or all user names referred to as lt Any user gt 5 If radio buttons are available you may select a radio button other than the current selection to change the rule triggering condition 6 change t
242. location of the webcam is displayed in the Location pane below the image along with any labels applied to the webcam See Configuring Webcams on page 185 Up to five 5 Live Preview sessions can be displayed at once in different tabs in the EMX interface or in separate Live Preview windows that are accessed by clicking the Live Preview icon located above the snapshot video Note For remote Live Preview sessions such as those accessed via link in an email or instant message a total of up to three 3 simultaneous Live Preview sessions are supported at a time One 1 from the originator in the EMX interface and up to two 2 remote sessions Individual snapshots taken by a webcam are viewed by clicking on Snapshots under Webcam Management in the navigation tree Once selected the Snapshots tab opens in the right pane See Taking Viewing and Managing Webcam Snapshots on page 188 and Viewing and Managing Stored Snapshots for details Taking Viewing and Managing Webcam Snapshots Once a snapshot is taken using the Store Snapshot to Webcam Storage feature it is stored locally on the EMX Up to ten 10 images can be stored on the EMX at once Unless snapshots are deleted manually the oldest snapshot is automatically deleted from the device when the number of snapshots exceeds ten Note Rebooting the EMX deletes the snapshots taken via webcam To save more than 10 snapshots save the images on a Common Internet
243. lowing information one after another M 00 gt M 0d gt M 5d gt 03 gt M 5E gt M 1A The reset button is located inside a small hole which is labeled RESET Qo oo The EMX device can be reset to its factory default values using this button when a serial connection is available See Hesetting to Factory Defaults on page 102 Without the serial connection pressing this reset button restarts the EMX device s software Raritan Chapter 3 Getting Started Contact Closure Sensor Termination Power Switch Logging In zie Raritan Two channels for connecting two third party contact closure sensors are provided on the EMX2 888 model For more information see e Connecting Third Party Detectors Switches to the EMX on page 38 e Contact Closure Sensor LEDs on page 39 The power switch turns on or off the EMX device To power cycle the EMX press the power switch to turn off the device wait at least 10 seconds and then press the power switch again to turn it on Note that a minimum of 10 second power off period is required or the device may not boot up properly To log in to the web interface you must enter a user name and password The first time you log in to the EMX use the default user name admin and password raritan You are then prompted to change the password for security purposes Exception If you already changed the password for the admin account during the Initial Ne
244. lt name gt password After performing the above command EMX prompts you to enter a new password Then 1 a new password and press Enter 2 Re type the new password for confirmation and press Enter Variables e name is the name of the user whose settings you want to change Example The following procedure illustrates how to change the password of the user May 1 Verify that you have entered the configuration mode See Entering the Configuration Mode on page 231 2 Type the following command to change the password for the user profile May config f user modify May password Type a new password when prompted and press Enter Type the same new password and press Enter If the password change is completed successfully the config prompt appears in Raritan Chapter 10 Using the Command Line Interface Modifying a User s Personal Data You can change a user s personal data including the user s full name telephone number and email address gt change a user s full name use this command syntax config i user modify name fullName lt full name gt gt change a user s telephone number use this command syntax config user modify lt name gt telephoneNumber lt phone number gt gt change a user s email address use this command syntax config user modify lt name gt eMailAddress email address gt Variables e lt name gt is the name of the us
245. m See Event Rules and Actions on page 131 You must have Change Webcam Configuration permission applied to your role in order to configure webcams and the View Webcam Images and Configuration permission to view images in EMX Raritan Chapter 8 Managing External Devices Configuring Webcams Before you can configure a webcam it must be connected to the EMX See Connecting a Logitech Webcam Optional on page 41 gt To configure a webcam 1 Inthe navigation tree click on the Webcam Management folder The Webcam Management page opens 2 Click on the webcam you want to configure and then click Setup at the bottom right of page The Webcam Setup dialog opens Enter a name for the webcam Up to 64 characters are supported Select a resolution for the webcam Select the webcam mode This can be changed as needed once the webcam is configured a Video the webcam is in video mode Set the Framerate frames per second rate b Snapshot the webcam displays images from the webcam Set the Time Between Image s rate as measured in seconds 6 Click OK The image or video from the webcam is now available in the EMX once you click on the webcam in the navigation tree gt To edit a webcam configuration 1 Inthe navigation tree click on the Webcam Management folder The Webcam Management page opens 2 Double click on the webcam you want to edit The webcam image or video opens in a new tab Click Setup
246. mReset viewEventSetup viewLog viewSecuritySettings viewSnmpSettings viewUserSettings viewW ebcamSettings Description Change Asset Strip Configuration Change Authentication Settings Change Date Time Settings Change EMD Configuration Change Event Settings Change External Sensors Configuration Change LHX Configuration Change Network Settings Change Own Password Change Security Settings Change SNMP Settings Change Local User Management Change Webcam Configuration Clear Local Event Log Firmware Update Reset Warm Start View Event Settings View Local Event Log View Security Settings View SNMP Settings View Local User Management View Webcam Images and Configuration Raritan Chapter 10 Using the Command Line Interface Example The following command creates a new role and assigns privileges to the role config role create tester firmwareUpdate viewEventSetup Hesults e Anew role tester is created e Two privileges are assigned to the role firmwareUpdate Firmware Update and viewEventSetup View Event Settings Modifying a Role You can modify diverse parameters of an existing role including its privileges gt modify a role s description config f role modify name description description Variables e name is a string comprising up to 32 ASCII printable characters e lt description gt is a description comprising alphanumeric characters The
247. mn to identify failed sensors gt To view the LHX summary on the Dashboard page 1 Click the Dashboard icon in the EMX Explorer pane The Dashboard page opens in the right pane 2 Locate the LHX Heat Exchanger section where a list of connected LHX heat exchangers is displayed gt To view the LHX summary on the Auxiliary Ports page 1 If the EMX folder is not expanded expand it to show all components Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 2 Click the Auxiliary Ports folder The Auxiliary Ports page opens in the right pane listing all RS 485 ports Viewing Details An LHX heat exchanger page shows detailed information including e Device information and settings such as the RS 485 port number and device name e The air outlet temperature e Readings and states of all LHX built in sensors e Accumulative operating hours e Errors such as failed LHX sensors or emergency cooling activation gt To view details of a specific LHX heat exchanger 1 Ifthe Auxiliary Ports folder is not expanded expand it to show all devices connected to the RS 485 ports Click the desired heat exchanger in the EMX Explorer pane The page specific to that heat exchanger opens in the right pane 195 Chapter 8 Managing External Devices If any LHX sensor reading reaches or crosses the critical or warning threshold that sensor readi
248. mperature humidity airPressure or air Flow Note If the specified sensor type does not match the type of the specified environmental sensor this error message appears Specified sensor type XXX does not match the sensor s type sensortype where XXX is the specified sensor type and sensortype is the correct sensor type e option is one of the options enable disable or a numeric value Option Description enable Enables the upper critical threshold for the specified environmental sensor disable Disables the upper critical threshold for the specified environmental sensor A numeric Sets a value for the upper critical threshold of the value specified environmental sensor and enables this threshold at the same time Example The following command sets the Upper Critical threshold of the environmental temperature sensor with the ID number 2 to 40 degrees Celsius It also enables the upper critical threshold if this threshold has not been enabled yet config i sensor externalsensor 2 temperature upperCritical 40 Setting the Sensor s Upper Warning Threshold This command syntax configures the Upper Warning threshold of a numeric environmental sensor zie Raritan Chapter 10 Using the Command Line Interface config sensor externalsensor lt n gt lt sensor type gt upperWarning lt option gt Variables e n is the ID number of the environmental sensor that you want to configure Th
249. n roles After performing the user creation command the EMX prompts you to assign a password to the newly created user Then 1 Type the password and press Enter idi Raritan Chapter 10 Using the Command Line Interface 2 Re type the same password for confirmation and press Enter Variables e lt name gt is a string comprising up to 32 ASCII printable characters The lt name gt variable CANNOT contain spaces e option is one of the options enable or disable Option Description enable Enables the newly created user profile disable Disables the newly created user profile e roles is a role or a list of comma separated roles assigned to the specified user profile Example The following command creates a new user profile and sets two parameters for the new user config f user create May enable admin Results e Anew user profile May is created e The new user profile is enabled e The admin role is assigned to the new user profile Modifying a User Profile A user profile contains various parameters that you can modify Tip You can combine all commands to modify the parameters of a specific user profile at a time See Multi Command Syntax on page 320 zie Raritan a Chapter 10 Using the Command Line Interface Changing a User s Password This command syntax allows you to change an existing user s password if you have the Administrator Privileges config user modify
250. n Action Group This option allows you to select the action or actions performed when an event is triggered When more than one action is selected all actions are performed with the is event triggered Note A supported modem such as the Cinterion GSM MC52i modem must be plugged in to the EMX in order to send SMS messges gt To create a action group 1 Choose Device Settings Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Action name field type a new name for the action The default name is New Action numbers where number is a sequential number based on how many actions are already created 5 Inthe Action field click the drop down arrow and select the desired action from the list 6 Select an action from the Available Actions box then click the Add arrow to add to the Used Actions box All actions in the Used Actions box are executed when the event is triggered Click OK to save the new action Click Close to quit the dialog Raritan Raritan Chapter 7 Event Rules Event Actions and Application Logs Log an Event Message This option records the selected events in the internal log gt create a log event message 1 Choose Device Settings Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Action name field type a new name for the action The default name is New Action numbers
251. n Description accept Accepts traffic from the specified IP address es Z Raritan Chapter 10 Using the Command Line Interface Option Description drop Discards traffic from the specified IP address es without sending any failure notification to the source host reject Discards traffic from the specified IP address es and an ICMP message is sent to the source host for failure notification Example The following command modifies all contents of the 5th IPv4 rule config f Security ipAccessControl ipv4 rule modify 5 ipMask 192 168 84 123 24 policy accept Hesults e The IPv4 address is changed to 192 168 84 123 and the subnet mask to 255 255 255 0 e The policy now becomes accept Deleting a Firewall Rule The following commands remove a specific IPv4 or IPv6 rule from the list Pv4 commands config i security ipAccessControl ipv4 rule delete rule number e Pv6 commands config i security ipAccessControl ipv6 rule delete rule number Variables e rule numbers is the number of the existing rule that you want to remove zie Raritan Chapter 10 Using the Command Line Interface Example The following command removes the 5th rule from the IPv6 access control list config security ipAccessControl ipv6 rule delete 5 HTTPS Access This command determines whether the HTTPS access to the EMX web interface is forced If yes all HTTP access attempts are automatically
252. n LHX at PORTTYPE port PORTID asserted above upper warning Sensor LHXSENSORID on LHX at PORTTYPE port PORTID asserted below lower warning Sensor LHXSENSORID on LHX at PORTTYPE port PORTID asserted below lower critical Emergency cooling on LHX at PORTTYPE port PORTID was activated Maximum cooling was requested for LHX at PORTTYPE port PORTID Data loss in parameter memory was detected on LHX at PORTTYPE port PORTIDJ An ST Bus communication error was detected on LHX at PORTTYPE port PORTID A collective fault occurred on LHX at PORTTYPE port PORTID The door of LHX at PORTTYPE port PORTID was opened A sensor failure broken or short circuit occurred on LHX at PORTTYPE port PORTID at sensor LHXSENSORID A fan motor failure occurred on LHX at PORTTYPE port PORTID at fan LHXFANID A power supply failure occurred on Default Assertion Message when the Event FALSE Sensor LHXSENSORID on LHX at PORTTYPE port PORTID available Sensor LHXSENSORID on LHX at PORTTYPE port PORTID deasserted above upper critical Sensor LHXSENSORID on LHX at PORTTYPE port PORTID deasserted above upper warning Sensor LHXSENSORIDJ on LHX at PORTTYPE port PORTID deasserted below lower warning Sensor LHXSENSORID on LHX at PORTTYPE port PORTID deasserted below l
253. n a local internal event log Raritan Raritan Chapter 7 Event Rules Event Actions and Application Logs Viewing the Local Event Log You can view up to 2 000 historical events that occurred to the EMX device in the local event log When the log already contains 2 000 entries each new entry overwrites the oldest entry gt 1 To display the local log Choose Maintenance View Event Log The Event Log dialog appears Each event entry in the local log consists of Date and time of the event Type of the event description of the event 10 number of the event The dialog shows the final page by default You can Switch between different pages by doing one of the following Click or PI to go to the first or final page Click 4 or P to go to the prior or next page Type a number in the Page text box and press Enter to go to a specific page Select a log entry from the list and click Show Details or simply double click the log entry to view detailed information Note Sometimes when the dialog is too narrow the icon takes the place of the Show Details button In that case click and select Show Details to view details Click P to view the latest events Enlarge the dialog if necessary You can re sort the list or change the columns displayed Click Close to quit the dialog Clearing Event Entries If itis not necessary to keep existing event histor
254. n enable or disable the Telnet service or change its TCP port using the CLI commands A Telnet command begins with network services telnet S Raritan Z Raritan Chapter 10 Using the Command Line Interface Enabling or Disabling Telnet This command syntax enables or disables the Telnet service config network services telnet enabled lt option gt Variables e option is one of the options true or false Option Description true The Telnet service is enabled false The Telnet service is disabled Example The following command enables the Telnet service config network services telnet enabled tru Changing the Telnet Port This command syntax changes the Telnet port config network services telnet port lt n gt Variables e lt n gt is a TCP port number between 1 and 65535 The default Telnet port is 23 Example The following command syntax sets the TCP port for Telnet to 44 config network services telnet port 44 Changing the SSH Configuration You can enable or disable the SSH service or change its TCP port using the CLI commands An SSH command begins with network services ssh 253 Chapter 10 Using the Command Line Interface Enabling or Disabling SSH This command syntax enables or disables the SSH service config network services sshenabled lt option gt Variables e option is one of the options true or false Option Description true The SSH
255. n tilt sensor it is NOT necessary to configure the orientation setting manually The EMX device can detect the orientation of the asset sensors and automatically configure it Top Connector This option indicates that the asset sensor is mounted with the RJ 45 connector located on the top Bottom Connector This option indicates that the asset sensor is mounted with the RJ 45 connector located at the bottom Determine how to number all rack units on the asset sensor by selecting an option in the Numbering Mode Top Down The rack units are numbered in the ascending order from the highest to the lowest rack unit Bottom Up The rack units are numbered in the descending order from the highest to the lowest rack unit Raritan Raritan 12 16 Appendix B Integrating EMX and Asset Management Sensors with dcTrack In the Numbering Offset field select the starting number For example if you select 3 the first rack unit is numbered 3 the second is numbered 4 the third is numbered 5 and so on until the final number Indicate how the asset sensor is mounted in the rack in the Orientation field The rack unit that is most close to the RJ 45 connector of the asset sensor will be marked with the index number 1 in the web interface For the latest version of asset sensors with a built in tilt sensor it is NOT necessary to configure the orientation setting manually The EMX device can detect the orientat
256. nabled or disabled Available radio buttons include Logged Logged out and Both Logged in The EMX takes the action only when the selected user logs in Logged out The EMX takes the action only when the selected user logs out Both The EMX takes the action both when the selected user logs in and logs out Available radio buttons include Monitoring started Monitoring stopped and Both Monitoring started The EMX takes the action only when the monitoring of any specified server starts Monitoring stopped The EMX takes the action only when the monitoring of any specified server stops Both The EMX takes the action when the monitoring of any specified server starts or stops Raritan Chapter 7 Event Rules Event Actions and Application Logs Event types Radio buttons Server reachability Available radio buttons include Unreachable Reachable and Both Unreachable The EMX takes the action only when any specified server becomes inaccessible Reachable The EMX takes the action only when any specified server becomes accessible Both The EMX takes the action when any specified server becomes either inaccessible or accessible 1 From the Available Actions box select the actions to be taken when the event occurs Use the Add arrow to add the action to the Selected Actions box If none of the existing actions accommodate the event rule you are creating click Create New
257. nal The following is the command syntax config f network ipv4 preferredHostName lt name gt Variables e name is a host name which Consists of alphanumeric characters and or hyphens Cannot begin or end with a hyphen Cannot contain more than 63 characters Cannot contain punctuation marks spaces and other symbols 243 Chapter 10 Using the Command Line Interface Example The following command sets the IPv4 preferred host name to my v4host config f network ipv4 preferredHostName my v4host Setting the IPv4 Address After selecting the static IP configuration mode you can use this command syntax to assign a permanent IP address to the EMX device config f network ipv4 ipAddress ip address gt Variables e ip address is the IP address being assigned to your EMX device The value ranges from 0 0 0 0 to 255 255 255 255 Example The following command assigns the static IPv4 address 192 168 84 222 to the EMX device config i network ipv4 ipAddress 192 168 84 222 Setting the IPv4 Subnet Mask After selecting the static IP configuration mode you can use this command syntax to define the subnet mask config f network ipv4 subnetMask lt netmask gt Variables e netmask is the subnet mask address The value ranges from 0 0 0 0 to 255 255 255 255 Example The following command sets the subnet mask to 192 168 84 0 config f network ipv4 subnetMask 192 168 84 0 d Raritan
258. name field The host name Consists of alphanumeric characters and or hyphens Cannot begin or end with a hyphen a Cannot contain more than 63 characters Cannot contain punctuation marks spaces and other symbols Select the Specify DNS server manually checkbox if necessary Then type the address of the primary DNS server in the Primary DNS Server field The secondary DNS server and DNS suffix are optional Static To manually assign an IP address select Static and enter the following information in the corresponding fields address Gateway Primary DNS server Secondary DNS server optional DNS Suffix optional 4 Click OK to save the changes zie Raritan M 5 Note The EMX supports a maximum of 3 DNS servers If two IPv4 DNS servers and two IPv6 DNS servers are available the EMX only uses the primary IPv4 and IPv6 DNS servers Role of a DNS Server As Internet communications are carried out on the basis of IP addresses appropriate DNS server settings are required for mapping domain names host names to corresponding IP addresses or the EMX may fail to connect to the given host Therefore DNS server settings are important for LDAP authentication With appropriate DNS settings the EMX can resolve the LDAP server s name to an IP address for establishing a connection If the SSL encryption is enabled the DNS server settings become criti
259. nces Units of Measure on page 67 Note Users can change the measurement units at any time by setting up their own user preferences See Setting Up User Preferences Units of Measure on page 67 11 Click OK to save the changes 65 66 Chapter 4 User and Role Management Modifying a User Profile You can change any user profile s information except for the user name gt 1 To modify a user profile Choose User Management gt Users The Manage Users dialog appears Select the user by clicking it Click Edit or double click the user The Edit User XXX dialog appears where XXX is the user name Make all necessary changes to the information shown To change the password type a new password in the Password and Confirm Password fields If the password field is left blank the password is not changed To change the SNMPv3 access permissions click the SNMPv3 tab and make necessary changes For details see Step 6 of Creating a User Profile on page 62 To change the permissions click the Roles tab and do one of these Select or deselect any role s checkbox modify the permissions of any role double click the role or highlight it and then click Edit Role See Modifying a Role on page 70 To change the measurement unit for temperature length or pressure click the Preferences tab and select a different option from the drop down list Note The measurement unit change only applies to t
260. ne Interface 240 Setting the EAP Identity This command syntax determines the EAP identity config network wireless eapIdentity identity Variables e identity is your user name for the EAP authentication Example The following command sets the EAP identity to eap userO1 config network wireless eapIdentity eap user01 Setting the EAP Password This command syntax determines the EAP password config f network wireless eapPassword Variables e password is your password for EAP authentication Example The following command sets the EAP password to user01_ password config i network wireless eapPassword user0l password Providing the EAP CA Certificate You may need to provide a third party CA certificate for the EAP authentication gt To provide a CA certificate 1 Type the CA certificate command as shown below and press Enter config f network wireless eapCACertificate 2 The system prompts you to enter the contents of the CA certificate Do the following to input the contents a Open your CA certificate with a text editor b Copy the contents between the BEGIN CERTIFICATE and END CERTIFICATE lines in a certificate C Paste the certificate contents into the terminal Raritan Chapter 10 Using the Command Line Interface d Press Enter Tip To remove an existing CA certificate simply press Enter without typing or pasting anything when the system
261. ne Interface Tip To set the default measurement units applied to the EMX user interfaces for all users via CLI see Setting Default Measurement Units gt To set the preferred temperature unit config user modify name preferredTemperatureUnit lt optionl gt Variables e name is the name of the user whose settings you want to change e option is one of the options C or F Option Description C This option displays the temperature in Celsius F This option displays the temperature in Fahrenheit gt To set the preferred length unit config user modify lt name gt preferredLengthUnit lt option2 gt Variables e lt name gt is the name of the user whose settings you want to change e lt option2 gt is one of the options meter or feet Option Description meter This option displays the length or height in meters feet This option displays the length or height in feet P To set the preferred pressure unit config user modify lt name gt preferredPressureUnit lt option3 gt Variables e lt name gt is the name of the user whose settings you want to change e lt option3 gt is one of the options pascal or psi Option Description pascal This option displays the pressure value in Pascals Pa xk Raritan Chapter 10 Using the Command Line Interface Option Description psi This option displays the pressure value in psi Example The following command sets all measurement u
262. ne the permissions of the user Select one or multiple roles by selecting corresponding checkboxes The Admin role provides full permissions The Operator role provides limited permissions for frequently used functions See Setting Up Holes on page 69 for the scope of permissions This role is selected by default f no roles meet your needs you Modify the permissions of an existing role To modify the permissions of any role double click the role or highlight it and then click Edit Role See Modifying a Role on page 70 Create a new role by clicking the Manage Roles button See Creating a Role on page 69 Note With multiple roles selected a user has the union of all roles permissions To change any measurement units displayed in the web interface and command line interface for this new user click the Preferences tab and do any of the following Inthe Temperature Unit field select C Celsius or F Fahrenheit as the measurement unit for temperatures Inthe Length Unit field select Meter or Feet as the measurement unit for length or height Inthe Pressure Unit field select Pascal or psi as the measurement unit for pressure A Pascal is equal to one newton per square meter Psi stands for pounds per square inch Note The measurement unit change only applies to the web interface and command line interface To change the EMX device display see Setting Up Default User Prefere
263. nections Shows network connections Example The following command displays the server connections to your EMX device diag netstat connections Raritan Chapter 10 Using the Command Line Interface Testing the Network Connectivity This command syntax sends the ICMP ECHO_REQUEST message to a network host for checking its network connectivity If the output shows the host is responding properly the network connectivity is good or the host is shut down or not being connected to the network diag gt ping lt host gt Variables e host is the host name or IP address whose networking connectivity you want to check Options e You can include any or all of additional options listed below in the ping command Options Description count lt number1 gt Determines the number of messages to be sent lt number1 gt is an integer number size lt number2 gt Determines the packet size lt number2 gt is an integer number in bytes timeout lt number3 gt Determines the waiting period before timeout number3 is an integer number in seconds The command looks like this syntax when it includes all options diag ping host count lt numberl gt size number2 timeout lt number3 gt Example The following command checks the network connectivity of the host 192 168 84 222 by sending the ICMP ECHO REQUEST message to the host for 5 times diag ping 192 168 84 222 count 5 zie Raritan in Chapter
264. needed Click on Thresholds at the bottom right of the Sensors section or Power Quality section of the page The Thresholds dialog opens and displays the sensor readings gathered by EMX 10 Select a reading and then click Edit or double click on a reading to open its corresponding Threshold dialog 11 Check the checkboxes next to the readings you want to set thresholds for then edit the thresholds as needed Click OK to save the changes Resetting the PM710 Minimum and Maximum Values The PM710 saves readings when they reach their highest and lowest value The highest value and lowest value are the minimum and maximum values which can be reset as needed Review your PM710 documentation for additional information gt Toreset the PM710 minimum and maximum values 1 Ifthe Auxiliary Ports folder is not expanded expand it to show all devices connected to the RS 485 ports 2 Click the desired sensor in the EMX Explorer pane The page specific to that sensor opens in the right pane 199 Chapter 8 Managing External Devices 3 Click on Reset All Min Max Values at the bottom left of the Sensors section of the page 4 Click OK to confirm All values are reset Clearing the PM710 Energy Accumulators The PM710 saves energy accumulator values which can be reset as needed Review your PM710 documentation for additional information gt Toclear the PM710 energy accumulator values 1 Ifthe Auxiliary Ports folder
265. network services cannot share the same TCP port 3 Click OK to save the changes Configuring the SNMP Settings Traps and Informs SNMP communications allow you to retrieve the status of the EMX device Additionally you may need to configure the SNMP destination s if the built in System SNMP Notification Rule is enabled and the trap destination has not been set yet See Event Rules and Actions on page 131 You can enable or disable SNMP communication between an SNMP manager and the EMX device By default SNMP v1 v2c is enabled on the EMX so the EMX can communicate with an SNMP manager The EMX provides you with the ability to create SNMPv2c and SNMPv3 TRAP communications or SNMPv2c and SNMPv3 INFORM communications SNMP TRAP communications capture and send information via SNMP but no confirmation that the communication between the devices has succeeded is provided to the receiving device SNMP INFORM communications capture and send information via SNMP and an acknowledgment that the communication was received by the receiving device is provided If the inform communication fails it is resent You can define the number of times and the intervals to resend the inform communication or leave the defaults of five 5 resends in three 3 second intervals Note SNMP INFORM communications may take up slightly more network resources than SNMP TRAP communications since there are additional communications between the devices an
266. ng and or state 7 To manage additional sensors repeat Steps to 6 Note When the number of managed sensors reaches the maximum you CANNOT manage additional sensors until you remove or replace any managed sensors To remove a sensor see Unmanaging Environmental Sensors on page 181 Configuring Environmental Sensors You may change the default name for easily identifying the managed sensor and describe its location with X Y and Z coordinates gt To configure environmental sensors 1 If the EMX folder is not expanded expand it to show all components Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 Click the External Sensors folder in the EMX Explorer pane and the External Sensors page opens in the right pane Raritan Z Raritan Chapter 8 Managing External Devices Select the sensor that you want to configure Click Setup The Setup of external sensor serial number sensor type gt dialog appears where serial number is the serial number of this sensor and sensor type is the sensor s type Tip You can also trigger the same setup dialog by selecting the desired environmental sensor icon in the tree and then clicking Setup on that sensor s page opened in the right pane If the selected environmental sensor is the Raritan contact closure sensor connected with a third party detector switch se
267. ng loaded termination points on the body of DPX CC2 TR the two to the right are associated with one channel as indicated by the LED number and the two to the left are associated with the other You must plug discrete detectors switches into these termination points gt connect third party or Raritan s discrete detectors switches 1 Strip the insulation around 12mm from the end of each wire of discrete detectors switches Press and hold down the tiny rectangular buttons above the termination points on the body of DPX CC2 TR Note Each button controls the spring of each corresponding termination point Fully insert each wire of both detectors switches into each termination point Plug both wires of a detector switch into the two termination points to the left Plug both wires of the other detector switch into the two termination points to the right 4 Release the tiny rectangular buttons after inserting the wires properly Verify that these wires are firmly fastened If any detector switch plugged into the contact closure sensor is Raritan s floor water sensor verify that the total cable length from the port of the Raritan PX to the water detector at the end of the water sensor does not exceed 30 meters 100 feet Raritan Chapter 2 Installing and Configuring the Device Configuring a Contact Closure Sensor Before using DPX CC2 TR to detect the contact closure status water smoke or v
268. ng or Disabling Data Logging This command syntax enables or disables the data logging feature config f emd dataRetrieval option Variables e option is one of the options enable or disable Option Description enable Enables the data logging feature disable Disables the data logging feature zie Raritan 3 Chapter 10 Using the Command Line Interface For more information see Setting Data Logging on page 176 Example The following command enables the data logging feature config emd dataRetrieval enabl Setting the Data Logging Measurements Per Entry This command syntax defines the number of measurements accumulated per log entry config md measurementsPerLogEntry lt number gt Variables e numbers is an integer between 1 and 600 The default is 60 samples per log entry For more information see Setting Data Logging on page 176 Example The following command determines that 66 measurements are accumulated per log entry for sensors that is 66 seconds config i md measurementsPerLogEntry 66 Networking Configuration Commands A network configuration command begins with network A number of network settings can be changed through the CLI such as the IP address transmission speed duplex mode and so on d Raritan Chapter 10 Using the Command Line Interface Setting the Networking Mode If your EMX device is implemented with both of the wired and wireles
269. ng row is highlighted in red or yellow See Readings Highlighted in Yellow or Red on page 58 Device States and Icon Variations The EMX web interface changes icons to represent different statuses of each connected LHX heat exchanger Icons Device status amp The heat exchanger is turned ON and operating normally The heat exchanger is turned OFF The heat exchanger is turned ON but enters the critical state because of any LHX sensor failure At least one of the LHX sensor readings has crossed the upper or lower warning threshold NO device is detected on this RS 485 port S amp eg y To identify the cause of the critical state view one of the following e The LHX Heat Exchanger section of the Dashboard page See Monitoring the Heat Exchanger on page 194 The Auxiliary Ports page See Monitoring the Heat Exchanger on page 194 e The Alert States section of the LHX heat exchanger page See Alert States and LHX Event Log on page 196 Alert States and LHX Event Log When an LHX heat exchanger is physically connected to the EMX device a section labeled Alert States appears on its device page The Alert States section shows information identifying the LHX sensors that currently fail Tip The Dashboard and Auxiliary Ports pages also point out failed sensors See Monitoring the Heat Exchanger on page 194 A button labeled Show Event Log is located in the Alert States section To view the events associated w
270. ng the HTTPS Port 252 Changing the LAN Duplex Mode 251 Changing the LAN Interface Speed 250 Changing the Measurement Units 74 75 299 5 Raritan Changing the Role s 299 Changing the Sensor Description 284 Changing the Sensor Name 280 Changing the SSH Configuration 253 Changing the SSH Port 254 Changing the SSH Settings 65 90 Changing the Telnet Configuration 252 Changing the Telnet Port 253 Changing the Telnet Settings 91 Changing the User List View 68 Changing Your Own Password 303 Changing Your Password 53 Checking Server Monitoring States 168 Clearing Event Entries 159 Clearing the PM710 Energy Accumulators 200 Closing a Serial Connection 215 Combining Asset Sensors 22 Command History 229 Components of an Event Rule 131 Configuring a Contact Closure Sensor 37 180 Configuring Asset Sensors in EMX 343 Configuring Environmental Sensors 34 59 170 172 182 Configuring IP Protocol Settings 235 Configuring LHX Temperature and Fan Thresholds 182 194 Configuring SNMP Notifications 167 204 Configuring the Asset Sensor 26 28 330 Configuring the EMX 11 80 Configuring the EMX Device and Network 231 Configuring the Firewall 105 Configuring the IPv4 Parameters 243 Configuring the IPv6 Parameters 247 Configuring the PM710 and Configuring Threshold Settings 199 Configu
271. ng the current settings page a message appears Then click Yes to save the changes Discard to abort the changes or Cancel to return to the current settings page 6 Click Close to quit the dialog Deleting an Event Rule or Action If any event rule or action is obsolete simply remove it Note You cannot delete the built in event rules and actions gt To delete an event rule or action 1 Choose Device Settings gt Event Rules The Event Rule Settings dialog appears 2 To delete an event rule a Ensure the Rules tab is selected If not click the Rules tab b Select the desired rule from the left list and click Delete Rule c Amessage appears prompting you to confirm the operation Click Yes to confirm the deletion 3 To delete an action a Click the Actions tab b Select the desired action from the left list and click Delete Action c Amessage appears prompting you to confirm the operation Click Yes to confirm the deletion 4 Click Close to quit the dialog A Note about Untriggered Rules In some cases a measurement exceeds a threshold causing the EMX to generate an alert The measurement then returns to a value within the threshold but the EMX does not generate an alert message for the Deassertion event Such scenarios can occur due to the hysteresis tracking the EMX uses See What is Deassertion Hysteresis on page 182 By default the EMX captures certain system events and saves them i
272. nit preferences for the user May config f user modify May preferredTemperatureUnit F preferredLengthUnit feet preferredPressureUnit psi Z Raritan Results e preferred temperature unit is set to Fahrenheit e The preferred length unit is set to feet e preferred pressure unit is set to psi Setting Up User Preferences Units of Measure Change user preferences config user modify admin preferredTemperatureUnit C or F config user modify admin preferredLengthUnit meter or feet config user modify admin preferredPressureUnit pascal or psi Change default preferences config f user defaultPreferences preferredPressureUnit pascal or psi Specifying the SSH Public Key If the SSH key based authentication is enabled specify the SSH public key for each user profile using the following procedure gt specify the SSH public key for a specific user 1 Type the SSH public key command as shown below and press Enter config f user modify name sshPublicKey 2 The system prompts you to enter the contents of the SSH public key Do the following to input the contents 301 Chapter 10 Using the Command Line Interface Open your SSH public key with a text editor Copy all contents in the text editor Paste the contents into the terminal ao Press Enter Tip To remove an existing SSH public key simply press Enter without typing or pasting anything when the
273. nits tag ports Note You can also access this dialog by double clicking the asset sensor shown on the Dashboard page Select the rack unit whose LED settings you want to change 345 346 Appendix B Integrating EMX and Asset Management Sensors with dcTrack 6 Click Configure Rack Unit or double click the selected rack unit The setup dialog for the selected rack unit appears 7 Inthe Name field type a name for identifying this rack unit Select either Auto or Manual Override as this rack unit s LED mode Auto based on Tag This is the default setting With this option selected the LED follows the global LED color settings Manual Override This option differentiates this LED s behavior After selecting this option you must select an LED mode and or an LED color for the selected rack unit LED Mode Select On to have the LED stay lit Off to have it stay off Slow blinking to have it blink slowly or Fast blinking to have it blink quickly LED Color If you select On Slow blinking or Fast blinking in the LED Mode field select an LED color by either clicking a color in the color palette or typing the hexadecimal RGB value of a color in the accompanying text box 9 Click OK to save the changes Adding an EMX to dcTrack Once the asset management sensor has been connected to and configured in the EMX add the EMX to dcTrack as a probe Following are the steps for creating a single EMX and its asse
274. nmental sensors per SENSOR port That is e For EMX2 111 which has only 1 SENSOR port a maximum of 16 environmental sensors can be connected e For EMX2 888 which has 8 SENSOR ports a maximum of 128 environmental sensors can be connected Since the EMX2 888 device is implemented with two channels of onboard contact closure termination it supports a maximum of 130 environmental sensors Each SENSOR port can only support a maximum of two Raritan contact closure sensors which has the shortest update interval among all Raritan sensors See Information about Update Interval on page 177 Note that a Raritan environmental sensor usually contains more than one sensor For example a DPX T2H2 counts as 4 sensors and a DPX T3H1 counts as 4 sensors Warning For proper operation wait for 15 30 seconds between each connection operation or each disconnection operation of environmental sensors gt To directly connect one or multiple environmental sensors e Plug the connector of the environmental sensor into the SENSOR port on your EMX device Note Depending on the model you purchased the total number of SENSOR ports varies gt To connect environmental sensors via an optional PX sensor hub 1 Connect a Raritan sensor hub to the EMX device a Plug one end of the Raritan provided phone cable 4 wire 6 pin RJ 12 into the IN port Port 1 of the hub b Plug the other end into one of the SENSOR ports on the EMX device
275. ns to ensure more reliable communications and if network resources can be managed with the potential additional network traffic Note You should update the MIB used by your SNMP manager when updating to a new EMX release This ensures your SNMP manager has the correct MIB for the release you are using See Downloading SNMP MIB on page 209 A Raritan Raritan Chapter 9 Using SNMP SNMPv2c Notifications gt To configure the EMX to send SNMP notifications 1 Choose Device Settings gt Network Services gt SNMP The SNMP Settings dialog appears SNMP Settings General Notifications SNMP v1 v2c Settings SNMP v1 v2c Read Community String Write Community String SNMP v3 Settings SNMP v3 MIB II System Group sysContact sysName sysLocation Download 7 enable public enable OK Cancel 2 Enter the MIB II system group information if applicable a sysContact the contact person in charge of the system being contacted b sysName the name assigned to the system sysLocation the location of the system Select the MIB to be downloaded The SNMP MIB for your EMX is used by the SNMP manager Important You must download the SNMP MIB for your EMX to use with your SNMP manager Click Download MIB in this dialog to download the desired MIB file For more details see Downloading SNMP MIB on page 209 Click OK to save the changes
276. nsor lt n gt lt sensor type gt lowerWarning lt option gt Variables e n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e sensor type is one of these sensor types temperature humidity airPressure or air Flow Note If the specified sensor type does not match the type of the specified environmental sensor this error message appears Specified sensor type XXX does not match the sensor s type sensortype where XXX is the specified sensor type and sensortype is the correct sensor type e option is one of the options enable disable or a numeric value Option Description enable Enables the lower warning threshold for the specified environmental sensor disable Disables the lower warning threshold for the specified environmental sensor A numeric Sets a value for the lower warning threshold of value the specified environmental sensor and enables this threshold at the same time Example The following command disables the Lower Warning threshold of the environmental humidity sensor with the ID number 3 config f sensor externalsensor 3 humidity lowerWarning disable Setting the Sensor s Deassertion Hysteresis This command syntax configures the deassertion hysteresis value of a numeric environmental sensor Raritan Chapter 10 Using the Command Line Inter
277. nsors that are connected to each put as little stress as possible on the joints between the asset sensors in order to avoid them breaking at the connection point lt SS B lt _ 7 C e Letter Item A The Dominion PX device B Asset sensors C Asset tags D IT devices such as servers 349 Appendix Raritan PX Asset Management gt To set up an asset management system 1 Affix the adhesive end of an asset tag to each IT device through the tag s tape e Plug the connector on the other end of each asset tag into the corresponding tag port on the asset sensor e Connect the asset sensor assembly on the rack to the Dominion PX device a Connect one end of the Category 5e 6 UTP cable to the RJ 45 connector on the asset sensor b Connect the other end of the cable to the FEATURE port on the Dominion PX device For more information on the Dominion PX product see the Dominion PX documentation that accompanies the Dominion PX device which can be downloaded from the Raritan website s Firmware and Documentation section http www raritan com support firmware and documentation Or you can access the product s online help in the Product Online Help section http www raritan com support online help x Raritan Appendix Specifications In This Chapter Altitude Correction Factors 351
278. nt 5 312 Serial Port Configuration Commands eate Ert te teta to ede 312 zie Raritan n Contents Asset Sensor Management 2 2 1 21 UE enr LIEU RE Gea Ainslie dean eae 313 Rack Unit Configuratio Meisnerio EE 316 Setting the History Buffer Length isisisi tisini aiaei 320 Multi Command 320 Quitting the Configuration MOGe 4 nene rne et rtt teta oa nde ea LL sua 321 A USO E 321 Resetting the EMX 322 ize the DEVICE E 322 Resetting to Factory Defaulls 5 ette tete the epe Pre e trente ok 322 Network Troubleshooting 323 Entering the Diagnostic Mode i iicet teret 323 Diagnostic arena 323 Quitting the DidQnostic te te eterne teta Ere paene tana Ln suu 326 Querying Available Parameters for a Command 326 Retrieving Previous Commands Step E 327 Automatically Completing a Command 327 Logging o tof ED 328 Resetting to Factory Defaults CLI sse nennen nnn enne 328 Appendix A Using Raritan Asset
279. ntact Glosure Sensor Termination isi eile intel acted sieantas aa deddnetidiaaendes 51 Power SWIG get eee 51 Logging 51 52 Changing Your PassWord cene trt 53 Introduction to the Web Interface rentre riter ined 54 MUIUrM 55 Sf HU BUON UU T 55 senate nese cara eet a cea eae eee ee T 55 Ada Paga COM EEEE ede 56 57 pe 57 Readings Highlighted in Yellow or Red eee 58 Browser Defined Shortcut oett otn det tn ete rte o cea 60 Viewing the DashbOar ds E 61 Chapter 4 User and Role Management 62 OVEIVICW E eed oleae estes 62 Managing USCIS soutien 62 Greating a User Profile neriesi e ai aiaei 62 Setting Up User Preferences Units of Measure 67 Setting Up Default User Preferences Units of 67 Ghanging the U
280. ntal sensor config f externalsensor n name name Variables e n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e name is a string comprising up to 32 ASCII printable characters The name variable must be enclosed in quotes when it contains spaces di Raritan Z Raritan Chapter 10 Using the Command Line Interface Example The following command assigns the name Cabinet humidity to the environmental sensor with the ID number 4 config externalsensor 4 name Cabinet humidity Specifying the Sensor Type Raritan s contact closure sensor DPX CC2 TR supports the connection of diverse third party or Raritan s detectors switches You must specify the type of connected detector switch for proper operation Use this command syntax when you need to specify the sensor type config externalsensor lt n gt sensorSubType lt type gt Variables n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e type is one of these types contact smokeDetection waterDetection or vibration Type Description contact The connected detector switch is for detection of door lock or door closed open status smokeDetection The connected detector switch is for d
281. number 1 This option sets the time limit to 1 day Tip If the desired time option is not listed you can manually type the desired time in this field For example you can type 4 min to set the time to 4 minutes Click OK to save the changes Enabling Login Limitations Login limitations determine whether more than one person can use the same login name at the same time and how long users are permitted to stay idle before being forced to log out 1 To enable login limitations Choose Device Settings Security Login Settings The Login Settings dialog appears Locate the Login Limitations section To prevent more than one person from using the same login at the same time select the Prevent concurrent login with same username checkbox To adjust how long users can remain idle before they are forcibly logged out by the EMX select a time option in the Idle Timeout Period field The default is 10 minutes X min This type of option sets the time limit to X minutes where X is a number Xh This type of option sets the time limit to X hours where X is a number 1d This option sets the time limit to 1 day 111 Chapter 6 Security Tip If the desired time option is not listed you can manually type the desired time in this field For example you can type 4 min to set the time to 4 minutes 5 Click OK to save the changes Tip Keep the idle timeout to 20 minutes or less if possibl
282. o save a configuration file 1 Choose Maintenance gt Bulk Configuration The Bulk Configuration dialog appears Click Download Bulk Configuration When the web browser prompts you to open or save the configuration file click Save Choose a suitable location and save the configuration file to your PC The file is saved in the XML format and its content is encrypted using the AES 128 encryption algorithm zie Raritan P 96 5 Copying Configuration A target device is device that loads another device s configuration file Copying an EMX configuration to a target device adjusts that EMX device s settings to match those of the source EMX device In order to successfully copy an EMX configuration The user must be the Admin user Or the Admin role is assigned to the user The target EMX device must be of the same model type as the source EMX device The target EMX device must be running the same firmware version as the source EMX device To copy a EMX configuration Log in to the target device s web interface If the target device s firmware version does not match that of the source device update the target s firmware See Firmware Upgrade on page 97 Choose Maintenance gt Bulk Configuration The Bulk Configuration dialog appears In the Copy Bulk Configuration section click Browse and select the configuration file store
283. ock a user 1 Login to the CLI interface using any terminal program via a local connection See With HyperTerminal on page 213 2 When the Username prompt appears type unblock and press Enter Username unblock zie Raritan Chapter 10 Using the Command Line Interface 3 When the Username to unblock prompt appears type the login name of the user to be unblocked and press Enter Username to unblock 4 Amessage appears indicating that the specified user was unblocked successfully Resetting the EMX You can reset the EMX device to factory defaults or simply restart it using the CLI commands Restarting the Device This command restarts the EMX device It is not a factory default reset gt To restart the EMX device 1 Ensure you have entered the administrator mode and the prompt is displayed 2 Type either of the following commands to restart the EMX device reset unit OR reset unit y 3 If you entered the command without y in Step 2 a message appears prompting you to confirm the operation Type y to confirm the reset 4 Wait until the Username prompt appears indicating the reset is complete Resetting to Factory Defaults This command restores all settings of the EMX device to factory defaults gt To reset EMX settings use either command reset factorydefaults OR T reset factorydefaults y Raritan Chapter 10 Using the Command Line Interface N
284. odem settings in EMX a Click Device Settings gt Serial Port Settings The Serial Port Configuration dialog opens b If needed enter the GSM modem SIM PIN 191 192 Chapter 8 Managing External Devices Schroff LHX Heat Exchangers After connecting the Schroff LHX heat exchanger to the EMX device via the Feature port or the RS 485 port the EMX detects LHX The LHX is viewed under the Feature folder or the Auxiliary Port folder in the navigation tree depending on the port it is connected to Note If connecting the LHX to the Feature port use the serial cable provided with the LHX From the EMX you can remotely do the following e Name a connected LHX heat exchanger e Configure the air outlet temperature setpoint e Configure air outlet temperature thresholds e Configure air inlet temperature thresholds e Configure water inlet temperature thresholds e Configure fan speed thresholds e Monitor the air inlet temperature e Monitor the air outlet temperature e Monitor the fan speed e Configure basic settings for the connected heat exchanger such as the sensor thresholds Note These settings are stored on the EMX port where the heat exchanger is connected and are lost if that heat exchanger is moved to a different port See Connecting a Schroff LHX Heat Exchanger Optional on page 41 for how to connect the heat exchanger Enabling and Disabling Schroff LHX Heat Exchanger Support By default Schroff L
285. of consecutive successful or unsuccessful pings has not reached before the EMX can declare that the monitored device is reachable or unreachable Example Ping Monitoring and SNMP Notifications In this illustration it is assumed that a significant PDU IP address 192 168 84 95 shall be monitored by your EMX to make sure that PDU is properly operating all the time and the EMX must send out SNMP notifications trap or inform if that PDU is declared unreachable due to power or network failure The prerequisite for this example is that the power source for your EMX is different from the power source for that PDU This requires two steps set up the PDU monitoring and create an event rule gt Step 1 Set up the ping monitoring for the target PDU 1 Choose Device Settings gt Server Reachability The Server Reachability dialog appears Type 192 168 84 95 in the IP Address Hostname field To make the EMX declare the accessibility of the monitored PDU every 15 seconds 3 pings 5 seconds when that PDU is accessible do the following a Inthe Number of Successful Pings to Enable Feature field type 3 b Inthe Wait Time in seconds after Successful Ping field type 5 4 make the EMX declare the inaccessibility of the monitored PDU when that PDU becomes inaccessible for around 12 seconds 4 pings 3 seconds do the following a Inthe Number of Consecutive Unsuccessful Unsuccessful Pings for Failure field type 4
286. og appears displaying the Trace Route results Click Close to quit the dialog Listing TCP Connections You can use the List TCP Connections to display a list of TCP connections gt To trace the route for a host 1 Choose Maintenance gt Network Diagnostics gt List TCP Connections The TCP connections dialog appears 2 Click Close to quit the dialog Downloading Diagnostic Information Important This function is for use by Raritan Field Engineers or m Raritan Chapter 5 Device Management when you are directed by Raritan Technical Support You can download the diagnostic file from the EMX device to a client machine The file is compressed into a tgz file and should be sent to Raritan Technical Support for interpretation This feature is accessible only by users with Administrative Privileges gt To retrieve a diagnostic file 1 Choose Maintenance gt Download Diagnostic Information The File Download dialog appears File Download Do you want to open or save this file Name diag data tgz Type WinRAR archive From 192 168 84 57 While files from the Intemet can be useful some files can potertialy harm your computer If you do not tust the source do not open or save this file What s the risk 2 Click Save The Save As dialog appears 3 Navigate to the desired directory and click Save 4 E mail this file as instructed by Raritan Technical Support 101 zie Raritan
287. og in using the same user name at the same time and force users to create strong passwords Enabling User Blocking User blocking determines how many times a user can attempt to log in to the EMX and fail authentication before the user s login is blocked Note that this function applies only to local authentication instead of authentication through external AA servers Note If any user blocking event occurs you can unblock that user manually by using the unblock CLI command via a serial connection See Unblocking a User on page 321 gt To enable user blocking 1 Choose Device Settings gt Security gt Login Settings The Login Settings dialog appears 2 Locate the User Blocking section Raritan Z Raritan 3 4 Chapter 6 Security To enable the user blocking feature select the Block user on login failure checkbox Type a number in the Maximum number of failed logins field This is the maximum number of failed logins the user is permitted before the user s login is blocked from accessing the EMX device To determine how long the login is blocked select the desired length of time from the drop down list in the Block timeout field The following describes available options Infinite This option sets no time limit on blocking the login X min This type of option sets the time limit to X minutes where X is a number Xh This type of option sets the time limit to X hours where X is a
288. ol version 3 Enlarge the dialog if necessary 4 Youcan re sort the list or change the columns displayed 5 Click Close to quit the dialog Tip The firmware version is also available by clicking the EMX folder in the EMX Explorer pane Setting the Date and Time zie Raritan Set the internal clock on the EMX device manually or link to a Network Time Protocol NTP server and let it set the date and time for the EMX gt To set the date and time 1 Choose Device Settings gt Date Time The Configure Date Time Settings dialog appears 2 Inthe Time Zone field click the drop down arrow and select your time zone from the list 3 If the daylight saving time applies to your time zone verify the Automatic Daylight Saving Time Adjustment checkbox is selected If the daylight saving time rules are not available for the selected time zone the checkbox is not configurable 4 Choose one of the methods to set the date and time 73 5 To customize the date and time select the User Specified Time radio button and then enter the date and time in appropriate fields Use the yyyy mm dd format for the date and the hh mm ss format for the time To set the date delete existing numbers in the Date field and type new ones or click the calendar icon 3 to select a date The time is measured in 24 hour format so enter 13 for 1 00pm 14 for 2 00pm and so on You can
289. ole dialog appears Select the permission you want from the Privileges list c Ifthe permission you selected contains any argument setting the Arguments list is shown to the right Then select one or multiple arguments d Click Add to add the selected permission and arguments if any e Repeat Steps ato d until you add all necessary permissions Click OK to save the changes Now you can assign the new role to any users See Creating a User Profile on page 62 or Modifying a User Profile on page 66 Modifying a Role You can change an existing role s settings except for the name gt 1 To modify a role Choose User Management gt Roles The Manage Roles dialog appears Tip You can also access the Manage Roles dialog by clicking the Manage Roles button in the Edit User dialog Select the role you want to modify by clicking it Click Edit or double click the role The Edit Role XXX dialog appears where is the role name Tip You can also access the Edit Role dialog by clicking the Edit Role button in the Edit User XXX dialog Modify the text shown in the Description field if necessary To change the permissions click the Privileges tab Note You cannot change the Admin role s permissions To delete any permissions do this a Select the permission you want to remove by clicking it To make multiple selections press Cirl click or Shift click to highlight multiple
290. om the SNMP Settings dialog Choose Device Settings Network Services SNMP The SNMP Settings dialog appears Click Download MIB A submenu of MIB files appear Select the desired MIB file to download EMD MIB The SNMP MIB file for managing the EMX device ASSETMANAGEMENT MIB The SNMP MIB file for asset management LHX MIB The SNMP MIB file for managing the LHX heat exchanger s Note Schroff LHX Support must be enabled in order for the LHX MIB to be available See Enabling and Disabling Schroff LHX Heat Exchanger Support on page 192 209 Chapter 9 Using SNMP 210 4 Click Save to save the file onto your computer gt To download the file from the Device Information dialog 1 Choose Maintenance gt Device Information The Device Information dialog appears 2 Click the download link in the EMD MIB ASSETMANAGEMENT MIB or LHX MIB field to download the desired SNMP MIB 3 Click Save to save the file onto your computer Layout Opening the MIB reveals the custom objects that describe the EMX system As standard these objects are first presented at the beginning of the file listed under their parent group The objects then appear again individually defined and described in detail B cmd_mib Notepad File Eck Forms View trapInFormationGroup ORJECT GROUP OBJECTS userNane targetUser inageUersion roleHane oldsensorstate pduhNunmber externalSensorMunber
291. on integrates with Raritan s EMX asset management sensors and asset management tags This integration allows you to monitor your devices and provide location information on each asset at the rack level using asset management sensors Asset management tags AMTs are adhered to data center items such as servers so you can remotely track the item s location The AMTs are plugged in to an asset management sensor AMS mounted on the rack The asset sensors are then connected to an EMX device and configured in the EMX Once the asset management sensors are connected to and configured in EMX they can be added to dcTrack where readings are pulled from EMX to dcTrack Note There may be a short delay between when the asset tag is plugged in to the asset sensor and when that information becomes available in EMX sis Raritan i Appendix Integrating and Asset Management Sensors with dcTrack Diagram key Asset management tag AMT Asset management sensor AMS EMX EMX Power IQ v To connect each component 1 Affix the adhesive end of the asset management tag AMT to the data center item you want to track and plug the other end of the AMT into the asset management sensor AMS See in the diagram N Use a Cat 5e 6 cable to connect the asset management sensors RJ 45 connector to the EMX See in the diagram 3 Add the EMX to dcTrack as a probe See Adding an EMX to EMX see Adding an EMX to dcTrack
292. on next login checkbox if you prefer a password change by the user when the user logs in for the first time after this checkbox is enabled Click the SNMPvS tab to set the SNMPv3 access permission The permission is disabled by default a To permit the SNMPv3 access by this user select the Enable SNMPv3 access checkbox Otherwise leave the checkbox disabled Note The SNMPV3 protocol must be enabled for SNMPv3 access See Configuring the SNMP Settings see Configuring the SNMP Settings Traps and Informs on page 85 b Setup SNMPv3 parameters if enabling the SNMPv3 access permission Field Description Security Level Click the drop down arrow to select a preferred security level from the list NoAuthNoPriv No authentication and no privacy AuthNoPriv Authentication and no privacy AuthPriv Authentication and privacy This 63 Chapter 4 User and Role Management Field Use Password as Authentication Pass Phrase Authentication Pass Phrase Confirm Authentication Pass Phrase Use Authentication Pass Phrase as Privacy Pass Phrase Privacy Pass Phrase Confirm Privacy Pass Phrase Authentication Protocol Privacy Protocol Description is the default This checkbox is configurable only if AuthNoPriv or AuthPriv is selected When the checkbox is selected the authentication pass phrase is identical to the user s password To specify a different authentication pass phrase d
293. onable control or not arising under normal operating conditions If a power cable is included with this product it must be used exclusively for this product CE LISTED Contents Chapter 1 Introduction SUCRE Whats New EMX Help toritate tator nn e ertet tute amne Product Models etit e eii eet rei eee tees IX LS NM RUE EMX2 Oe rire tts eect ts Ide UR LAM I eee Product Pealures n REE Package Contents ere Chapter 2 Installing and Configuring the EMX Device Before YOu E Mounting the EMX rien tiec ete Mounting a Zero U EMX Device nee nter thence annes Mounting 1U EMX 2 ctt neben tse aene Connecting the EMX to a Power Source Configuring the EMX iiia cider ierit ai Mente nr di aa Pa o eR e dandas Gonnecting the EMX 2 Installing the USB to Serial Connecting the EMX to Your Initial Network Configuration rient tg ita Pate uei rh inea Combining Asset Sensors
294. onfiguring Webcams on page 185 for information on configuring the webcam once it has been connected Note You must have Change Webcam Configuration permission applied to your role in order to configure webcams and the View Webcam Images and Configuration permission to view images in EMX Connecting a Schroff LHX Heat Exchanger Optional zie Raritan To remotely monitor and administer the Schroff LHX 20 or LHX 40 heat exchangers through the EMX device you must establish a connection between the heat exchanger and the EMX device For more information on the LHX heat exchanger see the user documentation accompanying that product gt To connect an LHX heat exchanger 1 Plug one end of a standard Category 5e 6 UTP cable into the RS 485 port on the Schroff LHX heat exchanger 2 Plug the other end of the cable into one of available RS 485 ports on your EMX device 41 42 Chapter 2 Installing and Configuring the Device gt connect an LHX heat exchanger to the serial FEATURE port using a serial cable provided by Schroff 1 Plug DB9 end of cable into the RS232 port on the Schroff LHX heat exchanger 2 Plug the other end of the cable into one of available serial FEATURE ports on your EMX device See Schroff LHX Heat Exchangers on page 192 for how to monitor and administer the heat exchanger using the EMX Raritan Chapter3 Getting Started In This Chapter Supported Web Browsers
295. ons around your IT equipment The X Y and Z values act as additional attributes and are not tied to any specific measurement scheme If you choose to you can use non measurement values For example X Brown Cabinet Row Y Third Rack Z Top of Cabinet Values for the X Y and Z coordinates may consist of e For X and Y Any combination of alphanumeric characters The coordinate value can be 0 to 24 characters long e For Z when the Z coordinate format is set to Rack Units any numeric value ranging from 0 to 60 e For Z when the Z coordinate format is set to Free Form any alphanumeric characters from 0 to 24 characters Tip To configure and retrieve these coordinate values over SNMP see the EMX MIB To configure and retrieve these values over the CLI see Using the Command Line Interface on page 212 175 176 Chapter 8 Managing External Devices Setting Data Logging The EMX can store 120 measurements for each sensor in a memory buffer This memory buffer is known as the data log Sensor readings in the data log can be retrieved using SNMP You can configure how often measurements are written into the data log using the Measurements Per Log Entry field Since the environmental sensors are measured per second specifying a value of 60 for example would cause measurements to be written to the data log once every minute Since there are 120 measurements of storage per sensor specifying a value of 60 means the log
296. or USERIP The IP address a user connected from USERNAME The user who triggered an action VERSION The firmware version the device is upgrading WIRESENSOR to The wire sensor name Default Log Messages Following are default log messages triggered and emailed to specified recipients when EMX events occur are TRUE or in some cases do not occur are FALSE See Event Rules and Actions on page 131 for information configuring email messages to be sent when specified events occur Event Context Device System started Device System reset Device Firmware validation failed Device Firmware update started Device Firmware update completed Device Firmware update failed Device Device identification changed 148 Default Assertion Message when the Event FALSE Default Assertion Message when the Event TRUE System started System reset performed by user USERNAME from host USERIP Firmware validation failed by user USERNAME from host USERIP Firmware upgrade started from version OLDVERSION to version VERSIONJ by user USERNAME from host USERIP Firmware upgraded successfully from version OLDVERSION to version VERSIONJ by user USERNAME from host USERIP Firmware upgrade failed from version lOLDVERSION J to version VERSIONJ by user USERNAMEJ from host USERIP Config parameter PARAMETER changed to VALUE by user
297. or hostname of your LDAP LDAPS authentication server Important Without the SSL encryption enabled you can type either the domain name or IP address in this field but you must type the fully qualified domain name if the SSL encryption is enabled 5 Type of external LDAP LDAPS server Choose from among the options available OpenLDAP Microsoft Active Directory Active Directory is an implementation of LDAP LDAPS directory services by Microsoft for use in Windows environments 6 LDAP over SSL Select this checkbox if you would like to use SSL Secure Sockets Layer SSL is a cryptographic protocol that allows the EMX to communicate securely with the LDAP LDAPS server 7 Port The default Port is 389 Either use the standard LDAP TCP port or specify another port Raritan Z Raritan Chapter 6 Security SSL Port The default is 636 Either use the default port or specify another port This field is enabled when the LDAP over SSL checkbox is selected Use only trusted LDAP Server Certificates Select this checkbox if you would like to use a trusted LDAP server certificate file that is a certificate file signed by the CA When NOT selected you can use all LDAP LDAPS server certificates including a self signed certificate file A certificate file is required after enabling this option Server Certificate Consult your authentication server administrator to get the CA certificate file for the LDAP LDAPS ser
298. ording to user credentials See Changing the Measurement Units on page 75 gt specify the altitude of the EMX device 1 In left navigation panel click the EMX folder The Settings page opens Z Raritan Chapter 5 Device Management Note The EMX folder is named EMX by default The name changes after customizing the device name See Naming the EMX Device on page 72 2 Click Setup on the Settings page The EMX Setup dialog appears 3 Type an integer number in the Altitude field Depending on the measurement unit displayed the range of valid numbers differs For meters m the value ranges between 0 and 3000 For feet ft the value ranges between 0 and 9842 4 Click OK to save the changes Changing the Measurement Units zie Raritan By default the following measurement units are applied to all data shown in the EMX web interface Temperature degrees in Celsius Length or height meters Air pressure pascal pa The EMX web interface allows shows different measurement units based on user login name That is different users may see different measurement units displayed according to their preferences The other alternatives for each measurement unit include Temperature degrees in Fahrenheit F Length or height feet ft Air pressure psi Determine the desired measurement unit when creating user profiles See Creating a User Profile on page 62 and Sett
299. oryDepth 7 zie Raritan a Chapter 10 Using the Command Line Interface Role Bassed Access Conirol In addition to firewall access control based on IP addresses you can configure other access control rules that are based on both IP addresses and users roles e AnIPvA4 role based access control command begins with security roleBasedAccessControl ipv4 e AnIPv6 role based access control command begins with security roleBasedAccessControl ipv6 Modifying the Role Based Access Control Parameters There are different commands for modifying role based access control parameters Pv4 commands gt To enable or disable the IPv4 role based access control feature use this command syntax config security roleBasedAccessControl ipv4 enabled lt option gt gt determine the IPv4 role based access control policy use this command syntax config security roleBasedAccessControl ipv4 defaultPolicy lt policy gt IPv6 commands gt enable or disable the IPv6 role based access control feature use this command syntax config security roleBasedAccessControl ipv6 enabled option gt determine the IPv6 role based access control policy use this command syntax e Raritan Chapter 10 Using the Command Line Interface config security roleBasedAccessControl defaultPolicy policy Variables e option is one of the options true or false Option Description true Enables th
300. osure sensor only Sensor Measurement Accuracy Raritan environmental sensors are with the following factory specifications Calibration is not required for environmental sensors 178 Temperature 2 degrees Celsius Humidity 5 when humidity lt 60 or 8 when humidity gt 60 Differential air pressure 1 5 Air flow 6 5 Raritan Chapter 8 Managing External Devices States of Managed Sensors An environmental sensor shows the state after being managed Available sensor states vary depending on the sensor type numeric or discrete sensors For example a contact closure sensor is a discrete on off sensor so it switches between three states only unavailable alarmed and normal Note Numeric sensors use numeric values to indicate the environmental or internal conditions while discrete on off sensors use alphabetical characters only to indicate the state changes Sensor state Applicable to unavailable All sensors alarmed Discrete sensors normal All sensors below lower critical Numeric sensors below lower warning Numeric sensors above upper warning Numeric sensors above upper critical Numeric sensors unavailable State The unavailable state means the connectivity to the sensor is lost The EMX pings all managed sensors at regular intervals in seconds If it does not detect a particular sensor for three consecutive scans the unavailable state is displayed for that sensor When the
301. ou used to log in to the web interface amp Administrator admin 55 56 Chapter 3 Getting Started Last login time This shows the date and time this login name was used to log in to this EMX device last time amp Last Login 3 24 11 9 46 PM When the mouse pointer hovers over the last login time detailed information about the last login is displayed including the access client and IP address For the login via a serial connection lt local gt is displayed instead of an IP address There are different types of access clients Web GUI Refers to the EMX web interface CLI Refers to the command line interface CLI The information in parentheses following CLI indicates how this user was connected to the CLI Serial Represents the local connection serial or USB SSH Represents the SSH connection Telnet Represents the Telnet connection System date and time Current date year and time are displayed to the right of the bar If positioning the mouse pointer over the system date and time the time zone information is also displayed 3 24111 10 18 Sometimes flag icon T may appear to the far right of the bar when communication error between the EMX device and the graphical user interface GUI occurs When the icon appears you can click the icon to view the communications log See Viewing the Communication Log Add Page Icon The Add Page icon located on the top of the
302. ower critical Emergency cooling on LHX at PORTTYPE port PORTID was deactivated Maximum cooling is not any more requested for LHX at PORTTYPE port PORTID The door of LHX at PORTTYPE port PORTID was closed Raritan Event Context Auxiliary Port 2 gt Power supply LHX gt Threshold Humidity Auxiliary Port 2 LHX gt External Water Cooling Failure gt Auxiliary Port 2 LHX gt Water Leak gt Auxiliary Port 2 Power Logic Device gt gt Connected Power Logic Device gt gt Alarm Power Logic Device gt gt Sensor gt gt Unavailable Power Logic Device gt gt Sensor gt gt Above upper critical threshold Power Logic Device gt gt Sensor gt gt Above upper warning threshold Power Logic Device gt gt Sensor gt gt Below lower warning threshold Raritan Chapter 7 Event Rules Event Actions and Application Logs Default Assertion Message when the Event TRUE LHX at PORTTYPE port PORTID at power supply LHXPOWERSUPPLYIDJ The humidity threshold on LHX at PORTTYPE port PORTID was crossed An external water cooling failure occurred on LHX at PORTTYPE port PORTIDJ Water leakage was detected on LHX at PORTTYPE port PORTID PowerLogic Device has been connected to PORTTYPE port PORTID PowerLogic Device connected to PORTTYPE port PORTID entered an alarm condition Sensor PLSENSO
303. p lt n gt LEDColorForDisconnectedTags lt color gt Setting an LED Color for a Rack Unit This command syntax sets the LED color for a specific rack unit on the specified asset sensor You need to set a rack unit s LED color only when the LED operation mode of this rack unit has been set to manual config rackUnit n rack unit LEDColor color Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e rack unit is the index number of the desired rack unit The index number of each rack unit is available on the Asset Strip page of the web interface e color is the hexadecimal RGB value of a color in HTML format The color variable ranges from 000000 to FFFFFF Note A rack unit s LED color setting overrides the global LED color setting on it See Global LED Color Settings Example The following command sets the LED color of the rack unit whose index number is 25 on the asset sensor 1 to PINK that is FFOOFF config rackUnit 1 25 LEDColor FFOOFF dii Raritan Chapter 10 Using the Command Line Interface Setting an LED Mode for a Rack Unit This command syntax sets the LED mode for a specific rack unit on the specified asset sensor You need to set a rack unit s LED mode only when the LED operation mode of this rack unit has been set to manual config
304. placeholders and their definitions See Email and SMS Message Placeholders on page 145 for more details Note Only English is supported for SMS messages For Turkish characters use 7 bit ASCII instead 8 Click OK to save the new action 9 Click Close to quit the dialog Switch LHX If Schroff LHX Support is enabled this option is available See Schroff LHX Heat Exchangers on page 192 Use this action to switch the LHX on or off when for example temperature thresholds are reached 1 8 9 To create a switch LHX action Choose Device Settings gt Event Rules The Event Rules Settings dialog opens Click the Actions tab Click New In the Action name field type a new name for the action The default name is New Action numbers where number is a sequential number based on how many actions are already created In the Action field click the drop down arrow and select the desired action from the list From the Option drop down select Turn LHX On or Turn LHX Off From the available LHXs box click on the LHX to be turned on or off then click the Add arrow to add to the Switched LHXs box Use the Remove arrow to remove the LHX from the list thereby removing the action Click Close to quit the dialog Click OK to save the new action Record Snapshots to Webcam Storage This option allows you to define an action that starts or stops a specific webcam from taking snapshots 1
305. prompts you to input the certificate contents 3 If the certificate is valid the system shows the command prompt config again If not it shows a message indicating that the certificate is not valid Example This section provides a CA certificate example only Your CA certificate contents should be different from the contents displayed in this example gt To provide a CA certificate 1 Make sure you have entered the configuration mode See Entering the Configuration Mode on page 231 2 Type the following command and press Enter config network wireless eapCACertificate The system prompts you to enter the contents of the CA certificate Open a CA certificate using a text editor You should see certificate contents similar to the following BEGIN CERTIFICATE MIICjTCCAfigAwIBAgIEMaY gRZALBgkghkiG9w0BAQQwRTELMAkGA1UEBhMCVVMx NjAOBgNVBAoTLUShdGlvbmFsIEFlcm9uYXVOaWNzIGFuZCBTcGFjZSBBZG1pbmlz dHJhdGlvbjamFxESNjA1MjgxMzQ5MDUrMDgwMBCROTgwNTI4MTMOOTA1KzA4MDAw ZzELMAkGA1UEBhMCVVMXxNjAOBgNVBAOTLUShdGlvbmFsIEFlcm9uY XVOaWNzIGFu ZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEgMAkGA 1UEBRMCMT Y wEwYDVQQDEwXxTdGV2 ZSBTY2hvY2gwWDALBgkqhkiG9wOBAQEDSQAwRgJBALrAw y Y dgxmzNP tsOUyf6Bp miJYktU w4NG67ULaN4B5CnEz7k57s903YY3LecETgQ5iQHmkwIYDTL2fTgVfwOC AQOjgaswgagwZAYDVROZAQH BFowWDBWMF QxCzAJBgNVBAYT AIVTMT YwNAYDVQQK Ey1OYXRpb25hbCBBZXJvbmF idGljcyBhbmQgU3BhY 2UgQWRtaW 5pc3RyYXRpb24x DTALBgNVBAMTBENSTDEwFwYDVROBAQH BAOWC4AJODMyOT cwODEwMBgGA1Ud
306. pted or discarded Any subsequent rules matching the IP address are ignored by the EMX Subnet mask may be required When typing the IP address you may or may not need to specify BOTH the address and a subnet mask The default subnet mask is 32 that is 255 255 255 255 You must specify a subnet mask only when it is not the same as the default For example to specify a single address in a Class C network use this format X X X X 24 where 24 a subnet mask of 255 255 255 0 Raritan Chapter 6 Security To specify an entire subnet or range of addresses change the subnet mask accordingly Note Valid IP addresses range from 0 0 0 0 through 255 255 255 255 Make sure the IP addresses entered are within the scope gt create firewall rules 1 Choose Device Settings gt Security gt IP Access Control The Configure IP Access Control Settings dialog appears 2 Click the IPv4 tab for creating firewall rules or click the IPv6 tab for creating IPv6 firewall rules 3 Ensure the Enable IPv4 Access Control checkbox is selected on the IPv4 tab or the Enable IPv6 Access Control checkbox is selected on the IPv6 tab 4 Create specific rules See the table for different operations Action Procedure Add a rule to the end of Click Append The Append new Rule dialog appears the rules list Type an IP address and subnet mask in the IP Mask field Select Accept Drop or Reject from the drop down list in
307. pter 10 Using the Command Line Interface config sensor externalsensor lt n gt lt sensor type gt assertionTimeout lt value gt Variables n is the ID number of the environmental sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e lt sensor type is one of these sensor types temperature humidity airPressure or air Flow Note If the specified sensor type does not match the type of the specified environmental sensor this error message appears Specified sensor type XXX does not match the sensor s type sensortype where XXX is the specified sensor type and sensortype is the correct sensor type e value is a number in samples that is assigned to the assertion timeout for the specified environmental sensor See What is Assertion Timeout on page 183 Example The following command sets the assertion timeout of the environmental temperature sensor with the ID number 3 to 4 samples That is at least 4 consecutive samples must cross a specific current threshold before that threshold crossing event is asserted config f sensor externalsensor 3 temperature assertionTimeout 4 User Configuration Commands Most user configuration commands begin with user except for the password change command Creating a User Profile This command syntax creates a new user profile config f user create name optio
308. ption bottomConnector This option indicates that the asset sensor is mounted with the RJ 45 connector located at the bottom Example The following command specifies the orientation of the RJ 45 connector on the asset sensor 1 to be on the top config i assetStrip 1 assetStripOrientation topConnector Rack Unit Configuration For the Raritan asset sensor a rack unit refers to a tag port A rack unit configuration command begins with rackUnit Naming a Rack Unit This command syntax assigns or changes the name of the specified rack unit on the specified asset sensor config f rackUnit n rack unit name lt name gt Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e rack unit is the index number of the desired rack unit The index number of each rack unit is available on the Asset Strip page of the web interface e name is a string comprising up to 32 ASCII printable characters The name variable must be enclosed in quotes when it contains spaces e Raritan Raritan Chapter 10 Using the Command Line Interface Example The following command assigns the name Linux server to the rack unit whose index number is 25 on the asset sensor 1 config rackUnit 1 25 name Linux server Setting the LED Operation Mode This command syntax determines whe
309. r insertBelow Inserts the new rule below the specified rule number Then new rule s number the specified rule number 1 e rule number is the number of the existing rule which you want to insert the new rule above or below Example The following command creates a newlPv4 role based access control rule and specifies its location in the list config f security roleBasedAccessControl ipv4 rule add 192 168 78 50 192 168 90 100 admin deny insertAbove 3 Hesults e Anew IPv4 role based access control rule is added dropping all packets from any IPv4 address between 192 168 78 50 and 192 168 90 100 when the user is a member of the role admin e The newly added IPv4 rule is inserted above the 3rd rule That is the new rule becomes the 3rd rule and the original 3rd rule becomes the 4th rule Modifying a Role Based Access Control Rule Depending on what to modify in an existing rule the command syntax varies Pv4 commands gt To modify a rule s IPv4 address range use this command syntax zie Raritan a Chapter 10 Using the Command Line Interface config security roleBasedAccessControl ipv4 rule modify rule number startIpAddress start ip endIpAddress end ip gt To modify an IPv4 rule s role use this command syntax config f security roleBasedAccessControl ipv4 rule modify rule number role role gt modify an IPv4 rule s policy use this command syntax config f security ro
310. r e mail address preferred measurement units and so on m Raritan Chapter 10 Using the Command Line Interface Existing Roles This command shows the data of one or all existing roles it show roles lt role name gt Variables e role names is the name of the role whose permissions you want to query The variable can be one of the following options Option Description all This option shows all existing roles Tip You can also type the command without adding this option all to get the same data a specific role s name This option shows the data of the specified role only Displayed information e Role settings are displayed including the role description and privileges zie Raritan a Chapter 10 Using the Command Line Interface 228 Rack Unit Settings of an Asset Sensor For the Raritan asset sensor a rack unit refers to a tag port This command shows the settings of a specific rack unit or all rack units on an asset sensor such as a rack unit s LED color and LED mode show rackUnit n rack unit Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e rack unit is one of the options all or a specific rack unit s index number Option Description all Displays the settings of all rack units on the specified asset sensor Tip You can also type
311. r 10 Using the Command Line Interface gt To determine the security level config user modify lt name gt securityLevel lt option2 gt Variables e lt name gt is the name of the user whose settings you want to change e lt option2 gt is one of the options noAuthNoPriv authNoPriv or authPriv noAuthNoPriv No authentication and no privacy authNoPriv Authentication and no privacy Authentication and privacy gt determine whether the authentication passphrase is identical to the password config user modify lt name gt userPasswordAsAuthenticationPassphrase lt option3 gt Variables e lt name gt is the name of the user whose settings you want to change e lt option3 gt is one of the options true or false true Authentication passphrase is identical to the password false Authentication passphrase is different from the password gt To determine the authentication passphrase d Raritan Chapter 10 Using the Command Line Interface config user modify lt name gt authenticationPassPhrase lt authentication passphrase gt Variables e lt name gt is the name of the user whose settings you want to change e lt authentication_passphrase gt is a string used as an authentication passphrase comprising up to 32 ASCII printable characters gt determine whether the privacy passphrase is identical to the authentication passphrase config user modify lt name gt
312. r 2 Installing and Configuring the Device Connecting the EMX to a Power Source If your EMX device is designed to use a cable retention clip install the clip before connecting a power cord A cable retention clip prevents the connected power cord from coming loose or falling off The use of cable retention clips is highly recommended for regions with high seismic activities and environments where shocks and vibrations are expected Configuring the EMX Raritan To connect the EMX device to a power source Install the cable retention clip by inserting both ends into the tiny holes on two hexagon screws adjacent to the power socket Plug one end of the Raritan provided power cord into the power socket and press the cable retention clip toward the power cord until it holds the cord firmly Connect the other end of the power cord to an appropriate power source To configure the EMX device Connect the EMX device to a computer via a serial or USB connection 11 12 Chapter 2 Installing and Configuring the Device 2 Connect the EMX device to the network via a wired or wireless connection 3 Configure the EMX device using the command line interface Connecting the EMX to a Computer To configure the EMX using a computer it must be connected to the computer with an RS 232 serial interface The computer must have a communications program such as HyperTerminal or PuTTY If your computer
313. r clicking any other icon in the hierarchical tree the Dashboard page is overridden To return to the Dashboard page click the Dashboard icon When the Dashboard page is opened you can do the following to uncover or hide specific data gt To collapse any section 1 Locate the section you want to collapse 2 Click the upward arrow prior to the section title The data specific to the section is hidden gt To expand a collapsed section 1 Locate the section you want to expand 2 Click the downward arrow 7 prior to the section title The data specific to the section appears 61 4 Overview Managing Users zie Raritan User and Role Management In This Chapter OVGIVICW aed an he 62 Managing RBET e 62 Managing Roles ere eie Eee eie iive secos aaa 69 The EMX is shipped with one built in user profile admin which is used for initial login and configuration This profile has full system permissions and should be reserved for the system administrator It cannot be deleted and its permissions are not user configurable except for the SNMP v3 permission All users must have a user profile which specifies a login name and password and contains additional optional information about the user Every user profile must have at least a role to determine the user s system p
314. rack units on the asset sensor 1 to 48 rack units config assetStrip 1 numberOfRackUnits 48 Specifying the Rack Unit Numbering Mode This command syntax specifies the numbering mode of rack units on the asset sensors connected to the EMX device The numbering mode changes the rack unit numbers config assetStrip lt n gt rackUnitNumberingMode lt mode gt Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e mode is one of the numbering modes topDown or bottomUp Mode Description topDown The rack units are numbered in the ascending order from the highest to the lowest rack unit bottomUp The rack units are numbered in the descending order from the highest to the lowest rack unit Example The following command causes the rack units of the asset sensor 1 to be numbered in an ascending order from the one closest to the asset sensor s RJ 45 connector to the farthest one That is the rack unit that is most close to the RJ 45 connector is numbered 1 config f assetStrip 1 rackUnitNumberingMode topDown 2s Raritan Z Raritan Chapter 10 Using the Command Line Interface Specifying the Rack Unit Numbering Offset This command syntax specifies the starting number of rack units on the asset sensors connected to the EMX device config assetStrip lt n gt rackUnitNumberingOffse
315. rating EMX and asset management sensors with Raritan s data center management application dcTrack See Integrating EMX and Asset Management Sensors with dcTrack on page 340 Please see the Release Notes for a more detailed explanation of the changes applied to this version of the EMX Chapter 1 Introduction Product Models The EMX devices include two models EMX2 111 and EMX2 888 Different models are functionally identical but vary in the size and total number of ports EMX2 111 EMX2 111 is a Zero U model with the following ports and components Wo 1 Sensor port 1 Feature port 1 RS 485 port 2 USB ports 1 USB A and 1 USB B 1 RS 232 port 1 Ethernet port 1 LCD display Control buttons oem oo eo EMX2 888 EMX2 888 is a 1U model with the following ports and components 8 Sensor ports 8 Feature ports 8 RS 485 ports 3 USB ports 2 USB A and 1 USB B 1 RS 232 port 1 Ethernet port 1 LCD display Control buttons Contact closure sensor termination E m Raritan Product Features Z Raritan Introduction In general the EMX features include The ability to remotely track the location of each IT equipment that is electronically tagged using Raritan asset tags LED color change on the asset sensor to distinguish between detected and undetected asset tags Support for a maximum of 10 meter cabling on the EMX 888 and 1 meter cabling
316. revious firmware version Update firmware version Raritan Chapter 5 Device Management Firmware upgrade result 2 You may change the number of displayed columns or re sort the list for better viewing the data 3 To view the details of any firmware upgrade event select it and click Details or simply double click the event The Firmware Update Details dialog appears showing detailed information of the selected event 4 Click Close to quit the dialog Full Disaster Recovery If the firmware upgrade fails causing the EMX device to stop working you can recover it by using a special utility rather than returning the device to Raritan Contact Raritan Technical Support for the recovery utility which works in Windows XP Vista 7 and Linux In addition an appropriate EMX firmware file is required in the recovery procedure Updating the Asset Sensor Firmware After connecting the asset sensor to the EMX device it automatically checks its own firmware version against the version of the asset sensor firmware stored in the EMX firmware If two versions are different the asset sensor automatically starts downloading the new firmware from the EMX device to upgrade its own firmware During the firmware upgrade the following events take place e The asset sensor is completely lit up with the blinking LEDs changing the color from red to green e A firmware upgrade process is indicated in the EMX web interfa
317. ring the Serial Port 169 Configuring the SMTP Settings 92 137 139 Configuring the SNMP Settings Traps and Informs iii 63 85 136 Configuring Users for Encrypted SNMP v3 86 202 208 Configuring Webcam Storage iii 184 186 188 Configuring Webcams 41 185 187 188 189 363 Index Connecting a Logitech Webcam Optional 41 184 185 Connecting a Schroff LHX Heat Exchanger Optional 41 192 Connecting AMS M2 Z Asset Sensors Optional iii 28 333 Connecting an Asset Sensor to the EMX 111 25 Connecting an Asset Sensor to the EMX 888 27 Connecting Asset Sensors to the EMX 24 29 333 343 Connecting Blade Extension Strips 30 336 Connecting Detectors Switches to DPX CC2 TR 36 Connecting Differential Air Pressure Sensors 40 Connecting Environmental Sensors Optional 33 169 Connecting the EMX to a Computer 12 102 328 Connecting the EMX to a Power Source 11 Connecting the EMX to Your Network 14 78 79 Connecting Third Party Detectors Switches 35 Connecting Third Party Detectors Switches to the EMX 38 51 180 Connection Ports 43 Contact Closure Sensor LEDs 39 51 Contact Closure Sensor Termination 51 Control Buttons 47 Controlling the Heat Exchanger 197 Copying a EMX Configuration 96 Creating a Certificate Signing Request 118 Creating a Role 65 69 307 Creating a Self Signed Certificate 120
318. ritan d Chapter 10 Using the Command Line Interface Example The following command deletes an existing role config role delete tester Asset Management Commands You can use the CLI commands to change the settings of the connected asset sensor if any or the settings of LEDs on the asset sensor Serial Port Configuration Commands A serial port configuration command begins with serial Setting the Serial Port Baud Rate The following command syntax sets the baud rate bps of the serial port labeled CONSOLE MODEM on the EMX device Change the baud rate before connecting it to any Raritan device such as Raritan s P2CIM SER through the serial port or there are communications errors If you change the baud rate dynamically after the connection has been made you must reset the EMX or power cycle the other Raritan device for proper communications config serial baudRate baud rate Variables e baud rate is one of the baud rate options 1200 2400 4800 9600 19200 38400 57600 115200 Note The serial port setting is especially useful when the EMX works in conjunction with Raritan s Dominion LX KVM switch The Dominion LX only supports 19200 bps for communications over the serial interface Example The following command sets the baud rate of the EMX device s serial port to 9600 bps config f serial baudRate 9600 e Raritan Raritan Chapter 10 Using the Command Line Interface
319. rivacy protocol is applied Example The following command sets three SNMPv3 prameters of the user May Raritan Chapter 10 Using the Command Line Interface config user modify May snmpV3Access enable securityLevel authNoPriv userPasswordAsAuthenticationPassPhrase true Results e The user s SNMPv3 access permission is enabled e The SNMPv3 security level is authentication only no privacy e The authentication passphrase is identical to the user s password Changing the Role s This command syntax changes the role s of a specific user config f user modify name roles roles Variables e name is the name of the user whose settings you want to change e roles is a role or a list of comma separated roles assigned to the specified user profile Example The following command assigns two roles to the user May config i user modify May roles admin tester Hesults e The user May has the union of all privileges of admin and tester Changing the Measurement Units You can change the measurement units displayed for temperatures length and pressure for a specific user profile Different measurement unit commands can be combined so that you can set all measurement units at a time To combine all commands see Multi Command Syntax on page 320 Note The measurement unit change only applies to the web interface and command line interface zie Raritan a Chapter 10 Using the Command Li
320. rk Settings The LAN interface speed and duplex mode were set during the installation and configuration process See Initial Network Configuration on page 15 By default the LAN speed and duplex mode are set to Auto automatic which works in nearly all scenarios You can change them if there are special local requirements gt modify the network interface settings 1 Choose Device Settings Network The Network Configuration dialog appears 2 The Interface Settings tab should have been selected If not click the Interface Settings tab 3 In the Network Interface field click the drop down arrow and select Wired from the list Raritan Raritan 6 Chapter 5 EMX Device Management To change the LAN speed click the drop down arrow in the Speed field and select an option from the list Auto System determines the optimum LAN speed through auto negotiation 10 Mbit s The LAN speed is always 10 Mbps 100 Mbit s The LAN speed is always 100 Mbps To change the duplex mode click the drop down arrow in the Duplex field and select an option from the list Auto The EMX selects the optimum transmission mode through auto negotiation Full Data is transmitted in both directions simultaneously Half Data is transmitted in one direction to or from the EMX device at a time Click OK to save the changes Tip You can check the LAN status in the Current State field including the
321. rom the administrator mode In this mode the prompt changes to diag gt and you can perform the network troubleshooting commands such as the ping command See Entering the Diagnostic Mode on page 323 Closing a Serial Connection Close the window or terminal emulation program when you finish accessing a EMX device over the serial connection When accessing or upgrading multiple EMX devices do not transfer the serial cable from one device to another without closing the serial connection window first zie Raritan Chapter 10 Using the Command Line Interface Restricted Service Agreement Welcome to EMX CLI Last login 2012 08 06 04 58 42 EDT CLI Telnet from show security details D Restricted Service Agreement disabled Restricted Service Agreement Banner Content Unauthorized access prohibited all access and activities not explicitly authorized by management are unauthorized All activities are monitored and logged There is no privacy on this system Unauthorized access and activities or any criminal activity will be reported to appropriate authorities config config security restrictedServiceAgreement enabled bannerContent config security restrictedServiceAgreement enabled true false config security restrictedServiceAgreement enabled true config security restrictedServiceAgreement bannerContent Please input the Restricted Servi
322. ronmental sensors connected to the EMX device you can remotely monitor environmental conditions such as temperature or humidity in the data center or server room With a Logitech QuickCam Pro 9000 webcam connected a simple camera and video surveillance system is built displaying the real time snapshots or videos inside the server room or data center to enhance monitoring and security Events and actions that are triggered when an event occurs are supported by the EMX Specifically email messages log events syslog messages webcam snapshots SNMP traps and SMS messages can be triggered when the events you define occur Custom messages can be configured for email messages and images captured by the webcam can be sent to users via email In addition the EMX device integrates with a Schroff LHX 20 or LHX 40 heat exchanger which draws warm air into the air water heat exchanger to cool the air This integration provides a solution for remotely monitoring the heat exchanger EMX can also be used in conjunction with Raritan s data center management application dc Track This user guide describes the following models e EMX2 111 e EMX2 888 Raritan What s New EMX Help zie Raritan The following sections have changed or information has been added to the EMX Help based on enhancements and changes to the equipment and or user documentation Support for SNMPv2c and SNMPVv3 traps and informs see Configuring the SNMP Se
323. ror message that appears If a security agreement is displayed on the Login page accept it Note If you do not accept the security agreement you cannot log on to the EMX Click Login or press Enter The EMX page opens Note Depending on your hardware configuration elements shown on the EMX page may appear slightly different from this image After finishing your tasks with the EMX you should log out to prevent others from accessing the web interface 1 To log out of the web interface Do one of these Click logout on the top right corner of the web interface G logout Close the web browser by clicking the Close button xh on the top right corner of the browser Close the web browser by choosing File gt Close or File gt Exit The command varies according to the version of the browser you use Raritan Chapter 3 Getting Started Choose the Refresh command or click the Refresh button on the web browser 2 Either the login page opens or the browser is closed depending on your choice in the previous step Changing Your Password Normal users can change their own passwords if they have the Change Own Password permission See Setting Up Roles on page 69 If you are the administrator admin the EMX web interface automatically prompts you to change the password if this is your first time to log in to the EMX If you have the Administrator Privileges you can change other users pass
324. rtened version of wireless settings 11 If all are correct type exit to log out of the EMX If any are incorrect repeat Steps 7 to 10 to change any network settings The IP address configured may take seconds to take effect 21 Chapter 2 Installing and Configuring the Device Combining Asset Sensors Each tag port on the asset sensors corresponds to a rack unit and can be used to locate the IT devices on a specific rack or cabinet For each rack you can attach asset sensors up to 64U long consisting of one MASTER and multiple SLAVE asset sensors The difference between the master and slave asset sensors is that the master asset sensor has an RJ 45 connector while the slave one does not The following diagram illustrates some asset sensors Note that Raritan provides more types of asset sensors than the diagram Item 1 8U MASTER asset sensor with 8 tag ports 8U SLAVE asset sensor with 8 tag ports e 5U ending SLAVE asset sensor with 5 tag ports Note Unlike regular slave asset sensors which have one DIN connector respectively on either end the ending slave asset sensor has one DIN connector on only one end An ending asset sensor is installed at the end of the asset sensor assembly gt To assemble asset sensors 1 Connect a MASTER asset sensor to an 8U SLAVE asset sensor Plug the white male DIN connector of the slave asset sensor into the white female DIN connector of the m
325. rules click the IPv4 tab To modify the IPv6 firewall rules click the IPv6 tab Ensure the Enable Role Based Access Control for IPv4 checkbox is selected on the IPv4 tab or the Enable Role Based Access Control for IPv6 checkbox is selected on the IPv6 tab Select the rule to be modified in the rules list Click Edit or double click the rule The Edit Rule dialog appears Make changes to the information shown Click OK to save the changes Raritan Z Raritan Chapter 6 Security Sorting Role Based Access Control Rules Similar to firewall rules the order of role based access control rules determines which one of the rules matching the same IP address is performed gt sort role based access control rules 1 Choose Device Settings gt Security gt Role Based Access Control The Configure Role Based Access Control Settings dialog appears 2 To sort the IPv4 firewall rules click the IPv4 tab To sort the IPv6 firewall rules click the IPv6 tab 3 Ensure the Enable Role Based Access Control for IPv4 checkbox is selected on the IPv4 tab or the Enable Role Based Access Control for IPv6 checkbox is selected on the IPv6 tab 4 Select a specific rule by clicking it 5 Click A lor z to move the selected rule up or down until it reaches the desired location 6 Click OK to save the changes Deleting Role Based Access Control Rules When any access control rule becomes unnecessary or obsolete remove
326. s Pv4 commands gt The command syntax to modify an IPv4 rule s IP address and or subnet mask config f security ipAccessControl ipv4 rule modify rule number ipMask ip mask gt The command syntax to modify an IPv4 rule s policy zie Raritan dd Chapter 10 Using the Command Line Interface config config config config config 264 security ipAccessControl ipv4 rule modify rule number policy lt policy gt gt The command syntax to modify all contents of an existing IPv4 rule security ipAccessControl ipv4 rule modify rule number ipMask ip mask policy policy e IPv6 commands gt The command syntax to modify an IPv6 rule s IP address and or subnet mask security ipAccessControl ipv6 rule modify rule number ipMask ip mask gt The command syntax to modify an IPv6 rule s policy security ipAccessControl ipv6 rule modify rule number policy policy gt The command syntax to modify all contents of an IPv6 existing rule security ipAccessControl ipv6 rule modify rule number ipMask ip mask policy policy Variables e rule numbers is the number of the existing rule that you want to modify e ip masle is the combination of the IP address and subnet mask values which are separated with a slash For example an IPv4 combination looks like this 192 168 94 222 24 e policy is one of the options accept drop or reject Optio
327. s networking mechanisms you must determine which mechanism is enabled for network connectivity before further configuring networking parameters This command syntax enables the wired or wireless networking mode config network mode lt mode gt Variables e lt mode gt is one of the modes wired or wireless Mode Description wired Enables the wired networking mode wireless Enables the wireless networking mode Note If you enable the wireless networking mode and the EMX does not detect any wireless USB LAN adapter or the connected wireless USB LAN adapter is not supported the message Supported Wireless device not found is displayed Example The following command enables the wired networking mode config i network mode wired Configuring IP Protocol Settings By default only the IPv4 protocol is enabled You can enable both the IPv4 and IPv6 protocols or only the IPv6 protocol for your EMX device An IP protocol configuration command begins with network ip zie Raritan 3i Chapter 10 Using the Command Line Interface 236 Enabling IPv4 or IPv6 This command syntax determines which IP protocol is enabled on the EMX config network ip proto lt protocol gt Variables e protocol is one of the options v4Only v6Only or both Mode Description v4Only Enables IPv4 only on all interfaces This is the default v6Only Enables IPv6 only on all interfaces both Enables both IPv4 and IPv6 on all inter
328. s Raritan Chapter 6 Security Setting Up LDAP Authentication For security purposes users attempting to log in to the EMX must be authenticated The EMX supports the access using one of the following authentication mechanisms e Local database of user profiles on the EMX device e Lightweight Directory Access Protocol LDAP By default the EMX is configured for local authentication If you stay with this method you do not need to do anything other than create user profiles for each authorized user If you prefer to use an external LDAP server you must e Provide the EMX with information about the LDAP server e Create user profiles for users who are authenticated externally because a user profile on the EMX device determines the role s applied to the user and determines the permissions for the user accordingly When configured for LDAP authentication all EMX users must have an account on the LDAP server Local authentication only users will have no access to the EMX except for the admin who always can access the EMX Gathering the LDAP Information It requires knowledge of your LDAP server and directory settings to configure the EMX for LDAP authentication If you are not familiar with the settings consult your LDAP administrator for help To configure LDAP authentication you need to check e The IP address or hostname of the LDAP server e Whether the Secure LDAP protocol LDAP over SSL is being used f Secure
329. s and Actions ccccccccceeseeeeeeeseeeeeeseeeeeeeseeeeeeeseeeeeeeeeeees 131 EVEN LOG ING PERDE ccn 158 Viewing the Communication Log sss 160 Event Rules and Actions Z Raritan A benefit of the product s intelligence is its ability to notify you of and react to a change in conditions This event notification or reaction is an event rule The EMX is shipped with two built in event rules which cannot be deleted e System Event Log Rule This causes ANY event occurred to the EMX to be recorded in the internal log It is enabled by default e System SNMP Notification Action This causes SNMP traps or informs to be sent to specified IP addresses or hosts when ANY event occurs to the EMX It is disabled by default If these two do not satisfy your needs you can create additional rules to respond to different events Note Internet Explorer 8 IE8 does not use compiled JAVA script When using IE8 to create or change event rules the CPU performance may be degraded resulting in the appearance of the connection time out message When this occurs click Ignore to continue Components of an Event Rule An event rule defines what the EMX does in certain situations and is composed of two parts e Event This is the situation where the EMX or part of it meets a certain condition For example the temperature sensor exceeds the warning threshold e Action This is the response to the event For examp
330. s not available checkbox 4 Click OK to save the changes Enabling and Editing the Security Banner Restrictive Service Agreement Banner zie Raritan Use the EMX restricted service agreement security banner if you want to require users to read and accept a security agreement when they log on to the EMX A default agreement is provided You can edit or replace the default text as needed by typing directly in the security dialog or pasting text into it A maximum of 10 000 characters can be entered or pasted into the security banner If a user declines the agreement they cannot log in An event notifying you if a user has accepted or declined the agreement can be created See Default Log Messages on page 148 P To enable the service agreement 1 Click Device Services Security Restricted Service Agreement Banner The Restricted Service Agreement Setup dialog opens Select the Enforce Restricted Service Agreement checkbox Edit the text or replace it as needed 129 Chapter 6 Security 4 Click OK Unauthorized access prohibited all access and activities not explicitly authorized by management are unauthorized All activiteise are monitored and logged There is no privacy on this system Unauthorized access and activities or any criminal activity will be reported to appropriate authorities Raritan Chapter 7 Event Rules Event Actions and Application Logs In This Chapter Event Rule
331. s one of the options accept drop or reject Policy Description accept Accepts traffic from the specified IP address es drop Discards traffic from the specified IP address es without sending any failure notification to the Source host reject Discards traffic from the specified IP address es and an ICMP message is sent to the source host for failure notification Z Raritan Chapter 10 Using the Command Line Interface e insert is one of the options insertAbove or insertBelow Option Description insertAbove Inserts the new rule above the specified rule number Then new rule s number the specified rule number insertBelow Inserts the new rule below the specified rule number Then new rule s number the specified rule number 1 e rule number is the number of the existing rule which you want to insert the new rule above or below Example The following command adds a new IPv4 access control rule and specifies its location in the list config security ipAccessControl ipv4 rule add 192 168 84 123 24 accept insertAbove 5 Results e Anew IPv4 firewall control rule is added allowing all packets from the IPv4 address 192 168 84 123 to be accepted e The newly added rule is inserted above the 5th rule That is the new rule becomes the 5th rule and the original 5th rule becomes the 6th rule Modifying a Firewall Rule Depending on what to modify in an existing rule the command syntax varie
332. s port all the time but the icon image varies according to the connection status If the connection of an asset sensor is detected on a specific Feature port this icon M is displayed on that port If not detected this icon appears instead See Determining How Display Tree Items on page 76 When the Pinned checkbox is selected click the drop down arrow to select the device type to be displayed Select Asset Strip for asset sensors Click OK to save the changes In the tree the icon if present is followed by the device name if available device type and the port number How to Display LHX Heat Exchangers There are two ways to display connected Schroff LHX heat exchangers in the tree of the web interface LHX heat exchangers are displayed only when they are physically connected LHX heat exchangers are always displayed no matter they are physically connected or not but their icons change to indicate the connection status The EMX supports the LHX 20 and LHX 40 models Note Schroff LHX Support must be enabled in order for the LHX to be displayed See Enabling and Disabling Schroff LHX Heat Exchanger Support on page 192 1 To determine how to display connected LHX heat exchangers Click the Auxiliary Ports folder or the Feature Ports folder depending on which port you want to connect the sensor to Select the number of the port that you want to configure and click Setup Or you can simply dou
333. s the idle timeout to 10 munites config security loginLimits idleTimeout 10 User Blocking There are different commands for changing different user blocking parameters These commands begin with security userBlocking gt To determine the maximum number of failed logins before blocking a user use this command syntax xii Raritan Chapter 10 Using the Command Line Interface config security userBlocking maximumNumberOfFailedLogins lt valuel gt gt determine how long a user s login is blocked use this command syntax config i security userBlocking blockTime lt value2 gt Variables e valuet is an integer between and 10 or unlimited which sets no limit on the maximum number of failed logins and thus disables the user blocking function e lt value2 gt is a numeric value in minutes Tip You can combine multiple commands to modify the user blocking parameters at a time See Multi Command Syntax on page 320 Example The following command sets up two user blocking parameters config f Security userBlocking maximumNumberOfFailedLogins 5 blockTime 30 Results e he maximum number of failed logins is set to 5 e The user blocking time is set to 30 minutes Strong Passwords The strong password commands determine whether a strong password is required for login and what a strong password should contain at least A strong password command begins with security strongPasswords You
334. s with security ipAccessControl ipv6 rule Adding a Firewall Rule Depending on where you want to add a new firewall rule in the list the command syntax for adding a rule varies lt lt Pv4 commands gt To add anew rule to the bottom of the IPv4 rules list use this command syntax config i Security ipAccessControl ipv4 rule add ip mask policy gt To add a new IPv4 rule by inserting it above or below a specific rule use this command syntax Raritan ii Chapter 10 Using the Command Line Interface config config config config config 262 security ipAccessControl ipv4 rule add ip mask policy insert rule number security ipAccessControl ipv4 rule add insert rule number ip mask policy e Pv6 commands gt To add anew rule to the bottom of the IPv6 rules list use this command syntax Security ipAccessControl ipv6 rule add ip mask policy gt To add anew IPv6 rule by inserting it above or below a specific rule use this command syntax security ipAccessControl ipv6 rule add ip mask policy insert rule number sss security ipAccessControl ipv6 rule add insert rule number ip mask policy Variables e ip mask is the combination of the IP address and subnet mask values which are separated with a slash For example an IPv4 combination looks like this 192 168 94 222 24 e policy i
335. ser EISE VIEW cris ee tt teet teen dean eevee 68 Viewing Connected USOIS cnet attt tente tent nne 68 PROIE TON 69 Setting UP RONG Sas 69 SATIN eh 69 YING 70 Deleting 71 Chapter 5 EMX Device Management 72 OVGIVICW r ee Sed RG ede a neat 72 Naming the EMX DEVICE 72 Displaying the Device Information t eee iter deste 73 Setting the Date and Titre deti ea ied eed eee 73 Specifying the Device Altitude 74 Changing the Measurement Units sisisi aa aaia aa aaa aeran 75 Determining How to Display Tree Items ise 76 Howto Display Asset SOMSOMS cs on cuit tete totae rte dt rena ied er de etus none 76 How to Display LHX Heat Excharngets orte tnt tne teen 77 Modifying th Network Configuratio s euasit oerte tnu nk te one ah enden 78 Modifying the Network Interface Settings sssssssseseseseeee entente 78 Modifying the Network Settings cosi eee reto trt ten ette eee ota etes Re dead 80 Modifying the Network Service Selttings dene od eb sedes road 84 Changing the TTP S
336. server you can use this command to override the DHCP assigned DNS server with the one you specified config network ipv6 overrideDNS option Variables e option is one of the options enable or disable Option Description enable This option overrides the DHCP assigned DNS server with the primary secondary DNS server you assign disable This option resumes using the DHCP assigned DNS server Example The following command overrides the DHCP assigned DNS server with the one you specified config f network ipv6 overrideDNS enabl Setting the LAN Interface Parameters A LAN interface configuration command begins with network interface The commands are case sensitive so ensure you capitalize them correctly Changing the LAN Interface Speed This command syntax determines the LAN interface speed config network interface LANInterfaceSpeed lt option gt Variables e option is one of the options auto 10Mbps and 100Mbps Option Description auto System determines the optimum LAN speed through auto negotiation ii Raritan Chapter 10 Using the Command Line Interface Option Description 10Mbps The LAN speed is always 10 Mbps 100Mbps The LAN speed is always 100 Mbps Example The following command lets the EMX determine the optimal LAN interface speed through auto negotiation config network interface LANInterfaceSpeed auto Changing the LAN Duplex Mode This command syntax determines t
337. server accessibility or the validity of the authentication settings gt To test the connection to an LDAP LDAPS server 1 Choose Device Settings Security Authentication The Authentication Settings dialog appears Select the LDAP LDAPS server that you want to test Click Test Connection to start the connection test Editing the LDAP Server Settings If the configuration on any LDAP LDAPS server has been changed such as the port number bind DN and password you must modify the LDAP LDAPS settings on the EMX device accordingly or the authentication fails gt To modify the LDAP authentication configuration 1 Choose Device Settings gt Security gt Authentication The Authentication Settings dialog appears Select the LDAP LDAPS server that you want to edit Click Edit The Edit LDAP Server Configuration dialog appears Make necessary changes to the information shown 127 128 Chapter 6 Security 5 Click OK to save the changes Deleting the LDAP Server Settings You can delete the authentication settings of a specific LDAP LDAPS server when the server is not available or used for remote authentication gt 1 To remove one or multiple LDAP LDAPS servers Choose Device Settings gt Security gt Authentication The Authentication Settings dialog appears Select the LDAP LDAPS server that you want to remove To make multiple selections press Ctrl click or Shift click to highlight mul
338. set management blade extension strips Setting Up Asset Sensors in EMX Before asset sensors can be managed in dcTrack they must be configured in EMX and the EMX needs to be added to dcTrack as a probe item Configuring Asset Sensors in EMX The EMX cannot detect how many rack units tag ports a connected asset sensor supports so you must provide this information manually You can name the asset sensor or determine the numbering way for all rack units in the web interface Additionally you can provide a description to identify each asset sensor The customized name is followed by the label in parentheses Note In this context the label refers to the port number where the asset sensor is connected See Connecting Asset Sensors to the EMX on page 24 for information on connecting asset sensors gt To configure asset sensors 1 If you have not already done so log in to the EMX Connect the asset sensor to the EMX if it is not already Click on the Feature Ports folder in the navigation tree to expand it Boc m Click the desired asset sensor The page specific to that asset sensor opens in the right pane showing the asset sensor settings and information of all rack units tag ports Note You can also access this dialog by double clicking the asset sensor shown on the Dashboard page 343 Appendix Integrating and Asset Management Sensors with dcTrack 344 Click Setup in the Settings section
339. set tag A C Letter Item A Barcode ID number which is available on either end of the asset tag B Tag connector C Adhesive area with the tape Note The barcode of each asset tag is unique and is displayed in the EMX web interface so it can easily be identified Raritan Raritan Chapter 2 Installing and Configuring the EMX Device Connecting an Asset Sensor to the EMX 111 The EMX 111 does not natively support the 12 volts of power needed to connect to asset management sensors via a Category 5e 6 cable Distances greater than 1 to 10 meters require the use of a 12V Feature Port X Cable along with a Category 5e 6 cable to connect to asset management strips Diagram key Asset management tags Asset management strip 25 Chapter 2 Installing and Configuring the Device Diagram key Q EMX 111 Q Category 5e 6 cable Cat5e 6 cable 12V Feature Port X Cable X cable gt To connect asset sensors to the EMX 111 device 1 Affix the adhesive end of an asset tag to each IT device through the tag s tape 2 Plug the connector on the other end of each asset tag into the corresponding tag port on the asset sensor 3 Connect one end of a Cat5e 6 cable to the RJ 45 connector on the MASTER asset sensor The EMX 111 supports a maximum of 10 meters of cable connecting each asset sensor assembly 4 Connect the other end of the Cat5e 6 cable into the in line Cat5e 6 connector on the
340. sors are managed If not have them managed See Managing Environmental Sensors on page 171 5 Configure the sensors See Configuring Environmental Sensors on page 172 The steps include a Name the sensor b If the connected sensor is a Raritan contact closure sensor specify an appropriate sensor type c Mark the sensor s physical location on the rack or in the room Note Numeric sensors use numeric values to indicate the environmental or internal conditions while discrete on off sensors use alphabetical characters only to indicate the state changes Identifying Environmental Sensors An environmental sensor includes a serial number tag on the sensor cable The serial number for each sensor appears listed in the web interface after each sensor is detected by the EMX Za Porn Serial Number Type Channel Name Reading State 1 PRB1390001 Air Flow Air Flow 1 unavailable FX AEIBBS0019 Temperature Temperature 1 258 C normal 35 AEIB850019 Humidity Humidity 1 45 normal 4 PRC1600001 49 Contact On Off 1 On Off 1 normal 5 CC2 PRC1600001 Contact On Off 2 On Off 2 normal dii Raritan Raritan Chapter 8 Managing External Devices Match the serial number from the tag to those listed in the sensor table Note that the information in the and Port columns is different Column Information The ID number assigned to each environmental sensor Port The number of the SENSO
341. sure you capitalize them correctly Changing the Device Name This command syntax changes the EMX device s name config emd name lt name gt Variables e lt name gt is a string comprising up to 32 ASCII printable characters The lt name gt variable must be enclosed in quotes when it contains spaces Example The following command assigns the name my emx888 to the EMX device config emd name my emx888 Raritan Chapter 10 Using the Command Line Interface Setting the Z Coordinate Format for Environmental Sensors This command syntax enables or disables the use of rack units for specifying the height Z coordinate of environmental sensors config md externalSensorsZCoordinateFormat lt option gt Variables e option is one of the options rackUnits or freeForm Option Description rackUnits The height of the Z coordinate is measured in standard rack units When this is selected you can type a numeric value in the rack unit to describe the Z coordinate of any environmental sensors freeForm Any alphanumeric string can be used for specifying the Z coordinate Note After determining the format for the Z coordinate you can set a value for it See Setting the Z Coordinate on page 283 Example The following command determines that the unit of rack is used for specifying the Z coordinate of environmental sensors config f md externalSensorsZCoordinateFormat rackUnits Enabli
342. system prompts you to input the contents Example This section illustrates how to specify an SSH public key for an existing user May if the SSH public key based authentication is enabled See Determining the SSH Authentication Method on page 255 Your SSH public key contents should be different from the contents displayed in this example gt To specify the SSH public key for the user 1 Make sure you have entered the configuration mode See Entering the Configuration Mode on page 231 2 Type the following command and press Enter config user modify May sshPublicKey 1 The system prompts you to enter the contents of the SSH public key 2 Open the SSH public key using a text editor You should see the SSH public key contents similar to the following ssh rsa AAAAB3NzaC1yc2bEAAAADAQABAAAAGQDLZMXx ETBqjczWoO0uU6JHZ54H7PwIOHyAa OdeKdCq8i0h59pi1VVva6vS4agObxMUS8FjHIZOuQSLknTjWw3wy358BpJVYmyz8HITOm QBR59VviIrSjn77cI7U8DbY QOVgqm8NvF amiiFbd7yX pMXikeSXZCxP4QtonDvqgZ 36l vjQ May raritan com 3 Select and copy all contents of the SSH public key 4 Paste the contents in the terminal 5 Press Enter s Raritan zie Raritan Chapter 10 Using the Command Line Interface Deleting a User Profile This command syntax deletes an existing user profile config user delete lt name gt Example The following command deletes the user profile May config user delete May Changing
343. t Network The Network Configuration dialog appears Click the IP Protocol tab Select one checkbox according to the Internet protocol s you want to enable Pv4 only Enables IPv4 only on all interfaces This is the default only Enables IPv6 only on all interfaces Pv4 and IPv6 Enables both IPv4 and IPv6 on all interfaces If you selected the IPv4 and IPv6 checkbox in the previous step you must determine which IP address is used when the DNS resolver returns both of IPv4 and IPv6 addresses Pv4 Address Use the IPv4 addresses returned by the DNS server Address Use the IPv6 addresses returned by the DNS server Click OK to save the changes 81 Chapter 5 EMX Device Management Modifying the IPv4 Settings You must enable the IPv4 protocol before you can modify the IPv4 network settings See Selecting the Internet Protocol on page 81 gt To modify the IPv4 settings 1 Choose Device Settings gt Network The Network Configuration dialog appears Click the IPv4 Settings tab In the IP Auto Configuration field click the drop down arrow and select the desired option from the list Option Description DHCP To auto configure the EMX select DHCP With DHCP selected you can enter a preferred DHCP host name which is optional Type the host name in the Preferred Hostname field The host name Consists of alphanumeric characters and or hyphens Cannot begin or end with
344. t The Auxiliary Ports Setup dialog for the selected port appears Type a name for the heat exchanger in the Name field Click OK to save the changes To name a heat exchanger using the setup dialog for a heat exchanger If the Auxiliary Ports folder is not expanded expand it to show all devices connected to the RS 485 ports Click the desired heat exchanger in the EMX Explorer pane The page specific to that heat exchanger opens in the right pane Click Setup in the Settings section Type a name for the heat exchanger in the Name field Click OK to save the changes 193 Chapter 8 Managing External Devices Configuring LHX Temperature and Fan Thresholds An LHX heat exchanger is implemented with various sensors for detecting the air temperature water temperature and fan speed You can set thresholds for these sensors so that the EMX alerts you when any sensor readings are getting close to a critical condition These settings are stored on the EMX port where the heat exchanger is connected and are lost if that heat exchanger is moved to a different port gt configure the thresholds for a sensor 1 Connect the LHX heat exchanger to EMX if it is not already connected 2 Ifthe Auxiliary Ports folder is not expanded expand it to show all devices connected to the RS 485 ports 3 Click the desired heat exchanger in the EMX Explorer pane The page specific to that heat exchanger opens in the right pane 4
345. t lt number gt Variables e lt gt the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e numbers is a starting number for numbering rack units on the connected asset sensor This value is an integer number Example The following command specifies the starting number of rack units of the asset sensor 1 to be 5 That is the rack units are numbered 5 6 7 and so on from the first to the final rack unit on the asset sensor 1 config assetStrip 1 rackUnitNumberingOffset 5 Specifying the Asset Sensor Orientation This command syntax specifies the orientation of the asset sensors connected to the EMX device Usually you do not need to perform this command unless your asset sensors do NOT come with the tilt sensor causing the EMX unable to detect the asset sensors orientation config assetStrip lt n gt assetStripOrientation lt orientation gt Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e orientation is one of the options topConnector or bottomConnector Orientation Description topConnector This option indicates that the asset sensor is mounted with the RJ 45 connector located on the top 315 Chapter 10 Using the Command Line Interface Orientation Descri
346. t management sensors in dcTrack If you have a large number of EMXs and asset management sensors to add to dcTrack consider using the Import wizard to import multiple devices at once See Import Wizard for details The EMX goes through the change management workflow just like any other item that is added to dcTrack However asset sensor readings are available immediately in dc Track once they are attached to the EMX Important dcTrack recognizes EMX devices as probes so it is important to add them as such The asset management sensors that are detected by dcTrack are listed in the Temp Humidity section of the Probes list page in Classic View After adding a Humidity Temperature sensor to an EMX make sure that the Order column is set exactly to the same order appearing in the EMX gt To add the EMX to dcTrack as a probe 1 Open dcTrack Classic View From the Explorer menu select Environ Items Probe 2 3 Select Add from the Page Mode drop down in the toolbar Raritan Z Raritan Appendix Integrating Asset Management Sensors with dcTrack Select Add a New Item from the Actions drop down in the toolbar At a minimum complete all of the required fields on the Detail 1 page Complete additional fields as needed Enter the probe name Required Select the make and model Required Select the cabinet and rail position of the probe Required If login credentials are required to access t
347. t Rule 156 Modifying the Firewall Control Parameters 260 Modifying the IPv4 Settings 82 Modifying the IPv6 Settings 83 Modifying the Network Configuration 15 78 Modifying the Network Interface Settings 78 Modifying the Network Service Settings 84 212 214 Modifying the Network Settings 55 80 356 Modifying the Role Based Access Control Parameters 274 Modifying the SNMPv3 Settings 295 Monitoring the Heat Exchanger 194 196 More Information about AD Configuration 126 Mounting 10 EMX Device 9 Mounting a Zero U EMX Device 8 Mounting the EMX Device 7 Multi Command Syntax 261 266 269 275 291 293 295 299 320 366 N Naming a Heat Exchanger 193 Naming a Rack Unit 316 Naming an Asset Sensor 313 Naming the EMX Device 55 72 75 171 172 174 178 181 193 195 Network Configuration 219 Network Diagnostics 99 Network Service Settings 220 Network Troubleshooting 99 323 Networking Configuration Commands 234 Networking Mode 219 Numeric Character Requirement 272 Operating Hours 197 Overriding the DHCP Assigned NTP Servers 306 Overriding the IPv4 DHCP Assigned DNS Server 246 Overriding the IPv6 DHCP Assigned DNS Server 249 250 Overview 2 62 72 161 201 341 349 P Package Contents vi Password Aging 267 Password Aging Interval 268 Pinging a Host 100 Power Swi
348. tal sensor that you want to configure The ID number is assigned and shown in the EMX web interface It is an integer between 1 and 16 e sensor type is one of these sensor types temperature humidity airPressure or air Flow Note If the specified sensor type does not match the type of the specified environmental sensor this error message appears Specified sensor type XXX does not match the sensor s type sensortype where XXX is the specified sensor type and sensortype is the correct sensor type e option is one of the options enable disable or a numeric value Option Description enable Enables the lower critical threshold for the specified environmental sensor disable Disables the lower critical threshold for the specified environmental sensor A numeric Sets a value for the lower critical threshold of the value specified environmental sensor and enables this threshold at the same time Example The following command sets the Lower Critical threshold of the environmental humidity sensor with the ID number 1 to 15 It also enables the lower critical threshold if this threshold has not been enabled yet config f sensor externalsensor 1 humidity lowerCritical 15 Setting the Sensor s Lower Warning Threshold This command syntax configures the Lower Warning threshold of a numeric environmental sensor zie Raritan d Chapter 10 Using the Command Line Interface config sensor externalse
349. tch 51 PowerLogic PM710 iii 198 Product Features v Product Models iv Providing EAP CA Certificate 240 Q Querying Available Parameters for a Command 218 326 Querying the DNS Servers 323 Quitting the Configuration Mode 232 321 Quitting the Diagnostic Mode 326 R Rack Unit Configuration 316 Rack Unit Settings of an Asset Sensor 228 Raritan PX Asset Management 349 Readings Highlighted in Yellow or Red 58 61 177 196 Rebooting the EMX 102 Raritan Record Snapshots to Webcam Storage 143 Reset Button 50 Resetting the EMX 322 Resetting the PM710 Minimum and Maximum Values 199 Resetting to Factory Defaults 50 102 322 Resetting to Factory Defaults CLI 328 Restarting the Device 322 Restricted Service Agreement 216 Retrieving Previous Commands 327 Role Configuration Commands 307 Role of a DNS Server 84 356 Role Bassed Access Control 274 RS 485 Port Pinouts 352 S Sample Asset Management Level Event Rule 154 Sample Event Rules 154 Sample Sensor Level Event Rule 155 Sample User Activity Level Event Rule 156 Saving an EMX Configuration 95 Schroff LHX Heat Exchangers 42 58 143 192 Security 104 Security Configuration Commands 258 Security Settings 225 Selecting IPv4 or IPv6 Addresses 236 Selecting the Internet Protocol 81 82 83 Send a Snapshot via Email 137 S
350. tches to the EMX A specific EMX model EMX2 888 provides two channels of contact closure sensor termination points allowing for direct connection of third party contact closure detectors switches It is not guaranteed that all third party detectors switches are compatible with the EMX device You need to test the compatibility after properly installing them gt connect third party detectors switches 1 Strip the insulation around 12mm from the end of each wire of discrete detectors switches 2 Press and hold down the tiny rectangular buttons above the termination points Note Each button controls the spring of each corresponding termination point 3 Fully insert each wire of both detectors switches into each termination point Plug both wires of a detector switch into the two termination points to the left S Raritan Z Raritan Chapter 2 Installing and Configuring the EMX Device Plug both wires of the other detector switch into the two termination points to the right 4 Release the tiny rectangular buttons after inserting the wires properly 5 Verify that these wires are firmly fastened 6 By default the open status of the detector switch is considered normal To set the normal setting to closed press down the corresponding button adjacent to the termination points Contact Closure Sensor LEDs Two LEDs are located near the contact closure termination points on the EM
351. te to thresholds Upper Critical Threshold Hysteresis Upper Critical Reset Upper Warning Threshold ysteresis Upper Warning Reset Raritan Chapter 8 Managing External Devices Lower Warning Reset Hysteresis Lower Warning Threshold Lower Critical Reset Hysteresis Lower Critical Threshold Raritan The hysteresis values define a reset threshold For upper thresholds the measurement must fall past this reset threshold before a deassertion event is generated For lower thresholds the measurement must rise above this reset threshold before a deassertion event is generated What is Assertion Timeout When the assertion timeout is enabled the EMX device asserts any warning or critical condition only after a specified number of consecutive samples that cross a particular threshold are generated This prevents a number of threshold alerts from being generated if the measurements return to normal immediately after rising above any upper threshold or dropping below any lower threshold 183 184 Chapter 8 Managing External Devices Webcams The EMX supports webcams connected to it allowing you to view video or snapshots of the area surrounding the webcam The following webcams are supported e Logitech Webcam Pro 9000 Model 960 000048 e Logitech QuickCam Deluxe for Notebooks Model 960 000043 e Logitech QuickCam Communicate MP Model 960 000240 e Logitech C200 The EMX 888 device supports up
352. the IPv4 settings only v6 This option shows the IPv6 settings only LAN Interface Settings This command shows the LAN interface information only such as LAN interface speed duplex mode and current LAN interface status show network interface Networking Mode This command shows whether the current networking mode is wired or wireless show network mode 219 Chapter 10 Using the Command Line Interface Wireless Configuration This command only shows the wireless configuration of the EMX device such as the SSID parameter show network wireless To show detailed information add the parameter details to the end of the command show network wireless details Network Service Settings This command shows the network service settings only including the Telnet setting TCP ports for HTTP HTTPS and SSH services and SNMP settings show network services lt option gt Variables e lt option gt is one of the options all http https telnet ssh snmp and zeroconfig Option Description all Displays the settings of all network services including HTTP HTTPS Telnet SSH and SNMP Tip You can also type the command without adding this option all to get the same data http Only displays the TCP port for the HTTP service https Only displays the TCP port for the HTTPS service telnet Only displays the settings of the Telnet service ssh Only displays the settings of the SSH service snmp Only displays th
353. the Policy field Accept Accepts traffic from the specified IP address es Drop Discards traffic from the specified IP address es without sending any failure notification to the source host Reject Discards traffic from the specified IP address es and an ICMP message is sent to the source host for failure notification Click OK to save the changes The system automatically numbers the rule zie Raritan Chapter 6 Security Action Procedure Insert a rule between two Select the rule above which you want to insert a new rule For existing rules example to insert a rule between rules 3 and 4 select 4 a Click Insert The Insert new Rule dialog appears an IP address and subnet mask in the IP Mask field Select Accept Drop or Reject from the drop down list in the Policy field Accept Accepts traffic from the specified IP address es Drop Discards traffic from the specified IP address es without sending any failure notification to the source host Reject Discards traffic from the specified IP address es and an ICMP message is sent to the source host for failure notification Click OK to save the changes The system inserts the rule and automatically renumbers the following rules 5 When finished the rules appear in the Configure IP Access Control Settings dialog Configure IP Access Control Settings Enable IPv4 Access Control Default Policy Accept
354. ther a specific rack unit on the specified asset sensor follows the global LED color settings config rackUnit n rack unit LEDOperationMode mode Variables e n is the number of the FEATURE port where the selected asset sensor is physically connected For the EMX device with only one FEATURE port the number is always 1 e rack unit is the index number of the desired rack unit The index number of each rack unit is available on the Asset Strip page of the web interface e mode is one of the LED modes automatic or manual Mode Description automatic This option makes the LED of the specified rack unit follow the global LED color settings See Global LED Color Settings This is the default manual This option enables selection of a different LED color and LED mode for the specified rack unit When this option is selected see Setting an LED Color for a Rack Unit on page 318 and Setting an LED Mode for a Rack Unit on page 319 to set different LED settings Example The following command allows the rack unit whose index number is 25 on the asset sensors to have a different LED color and mode config f rackUnit 1 25 LEDOperationMode manual 317 Chapter 10 Using the Command Line Interface Setting the LED Disconnect Color This command syntax sets the LED color for all rack units on the connected asset sensor s to indicate the absence of a connected asset tag config assetStri
355. tic IP address Example The following command sets the IP configuration mode to the static IP address mode config f network ipConfigurationMode static zie Raritan Chapter 10 Using the Command Line Interface Setting the IPv6 Address After selecting the static IP configuration mode you can use this command syntax to assign a permanent IP address to the EMX device config network ipv6 ipAddress ip address gt Variables e ip address is the IP address being assigned to your EMX device This value uses the IPv6 address format Example The following command assigns the static IPv6 address 3210 4179 0 8 0 800 200 417 128 to the EMX device config i network ipv6 ipAddress 3210 4179 0 8 0 800 200 417 128 Setting the IPv6 Gateway After selecting the static IP configuration mode you can use this command syntax to specify the gateway config i network ipv6 gateway ip address gt Variables e ip address is the IP address of the gateway This value uses the IPv6 address format Example The following command sets the gateway to 500 0 330 0 4 9 3 2 config i network ipv6 gateway 500 0 330 0 4 9 3 2 et 5E Raritan Raritan Chapter 10 Using the Command Line Interface Setting the IPv6 Primary DNS Server After selecting the static IP configuration mode you can use this command syntax to specify the primary DNS server It is required to enable overriding the auto assigne
356. tic IPv4 address Subnet mask Gateway Primary DNS server Secondary DNS server optional f If you enabled IPv6 in the earlier step configure the IPv6 Use this command network ipv4 ipAddress lt ip address gt where lt ip address gt is the IP address you want to assign network ipv4 subnetMask lt netmask gt where netmask is the subnet mask network ipv4 gateway ip address gt where lt ip address gt is the IP address of the gateway network ipv4 primaryDNSServer lt ip address gt where lt ip address gt is the IP address of the primary DNS server network ipv4 secondaryDNSServer lt ip address gt where lt ip address gt is the IP address of the secondary DNS server network parameters To set IP configuration method Use this command network ipv6 ipConfigurationMode lt mode gt where mode is either automatic for auto configuration default or static for specifying a static IP address Tip To override the DHCP assigned IPv6 DNS servers with those you specify manually type this command network ipv6 overrideDNS option Z Raritan 19 20 Chapter 2 Installing and Configuring the Device where option is enable disable See the table below for the IPv6 commands for manually specifying DNS servers For the static IPv6 configuration you should configure the following parameters Note that the IP address must follow the IP
357. tifications SNMP v1 v2c Settings SNMP v1 v2c Read Community String Write Community String SNMP v3 Settings SNMP v3 MIB II System Group sysContact sysName sysLocation Download MIB V enable pubic enable 2 Select the enable checkbox in the SNMP v1 v2c field to enable communication with an SNMP manager using SNMP v1 or v2c protocol Type the SNMP read only community string in the Read Community String field Usually the string is public Type the read write community string in the Write Community String field Usually the string is private Select the enable checkbox in the SNMP v3 field to enable communication with an SNMP manager using SNMP v3 protocol Tip You can permit or disallow a user to access the EMX via the SNMP v3 protocol See Configuring Users for Encrypted SNMP v3 on page 208 4 Enter the MIB II system group information if applicable Raritan Chapter 9 Using SNMP a sysContact the contact person in charge of the system being contacted b sysName the name assigned to the system c sysLocation the location of the system 5 Select the MIB to be downloaded The SNMP MIB for your EMX is used by the SNMP manager Important You must download the SNMP MIB for your EMX to use with your SNMP manager Click Download MIB in this dialog to download the desired MIB file For more details see Downloading S
358. tings from LDAP server Leave the checkbox deselected Type of LDAP Server Select Microsoft Active Directory from the drop down list LDAP over SSL Have the checkbox deselected since the SSL encryption is not applied in this example Port Ensure the field is set to 389 SSL Port and Server Certificate Skip the two fields since the SSL encryption is not enabled Use Bind Credentials Do NOT select this checkbox because anonymous bind is used Bind DN Bind Password and Confirm Bind Password Skip the three fields because anonymous bind is used Raritan ZE Raritan Appendix E LDAP Configuration Illustration Base DN for Search Type dc techadss1 dc com as the starting point where your search begins on the AD server Login Name Attribute Ensure the field is set to sAMAccountName because the LDAP server is Microsoft Active Directory User Entry Object Class Ensure the field is set to user because the LDAP server is Microsoft Active Directory User Search Subfilter The field is optional The subfilter information is also useful for filtering out additional objects in a large directory structure In this example we leave it blank Active Directory Domain Type techadssl com amp Create new LDAP Server Configuration P Address Hostname Type of LDAP Server Por SSL Port Server Certficate Bind DN Bind Pessword Confirm Bind Password Base DN
359. tiple ones Click Delete A message appears prompting you to confirm the operation Click Yes to confirm the deletion Click OK to save the changes Disabling the LDAP Authentication When the remote authentication service is disabled the EMX authenticates users against the local database stored on the EMX device gt 1 To disable the LDAP authentication service Choose Device Settings gt Security gt Authentication The Authentication Settings dialog appears Select the Local Authentication radio button Click OK to save the changes Raritan Chapter 6 Security Enabling LDAP and Local Authentication Services To make authentication function properly all the time even when external authentication is not available you can enable both the local and remote authentication services When both authentication services are enabled the EMX follows these rules for authentication e When any of the LDAP LDAPS servers in the access list is accessible the EMX authenticates against the connected LDAP LDAPS server only e When the connection to every LDAP LDAPS server fails the EMX allows authentication against the local database gt To enable both authentication services 1 Choose Device Settings Security Authentication The Authentication Settings dialog appears Ensure the LDAP radio button has been selected Select the Use Local Authentication if Remote Authentication service i
360. to firewall rules take effect immediately Any unauthorized IP activities cease instantly Note The purpose of disabling the firewall by default is to prevent users from accidentally locking themselves out of the device Enabling the Firewall The firewall rules if any take effect only after the firewall is enabled gt To enable the EMX firewall 1 Choose Device Settings gt Security gt IP Access Control The Configure IP Access Control Settings dialog appears 2 To enable the IPv4 firewall click the IPv4 tab and select the Enable IPv4 Access Control checkbox 3 To enable the IPv6 firewall click the IPv6 tab and select the Enable IPv6 Access Control checkbox 4 Click OK to save the changes Changing the Default Policy After enabling the firewall the default policy is to accept traffic from all IP addresses This means only IP addresses discarded by a specific rule will NOT be permitted to access the EMX You can change the default policy to Drop or Reject in which case traffic from all IP addresses is discarded except the IP addresses accepted by a specific rule gt change the default policy 1 Choose Device Settings Security IP Access Control The Configure IP Access Control Settings dialog appears 2 To determine the default policy for IPv4 addresses 105 106 Chapter 6 Security Click the IPv4 tab if necessary Ensure the Enable IPv4 Access Control checkbox is selected c
361. ttings Traps and Informs on page 85 Restrictive Service Agreement security banner support see Enabling and Editing the Security Banner Restrictive Service Agreement Banner on page 129 Support for AMS M2 Z Asset Sensors see Connecting AMS M2 Z Asset Sensors Optional on page 28 Support for Logitech QuickCam Deluxe for Notebooks and Logitech QuickCam Communicate MP webcams See Webcams on page 184 Setting up alternate webcam snapshot image storage locations See Configuring Webcam Storage on page 186 Support for the PowerLogic PM710 power meter See PowerLogic 710 on page 198 Support for device USB cascading See EMX and PX2 PDU Cascading Connections on page 162 Configurable units of measure for individual and all users See Setting Up User Preferences Units of Measure on page 67 and Setting Up Default User Preferences Units of Measure on page 67 respectively Enhanced bulk configuration feature See Setting Up an EMX Using Bulk Configuration on page 94 Enhanced back and restore feature See Backup and Restore the EMX Device Settings on page 96 Support for SSL certificates that are part of a chain See Setting Up an SSL Certificate on page 118 Additional email and SMS placeholder information See Email and SMS Message Placeholders on page 145 Redesigned event and action dialog box for easier rule and action creation See Event Rules and Actions on page 131 Information on integ
362. twork Configuration on page 15 use the new password instead to log in to the web interface and the EMX will NOT prompt you to change the password After successfully logging in you can create user profiles for your other users These profiles define their login names and passwords See Creating a User Profile on page 62 If a security login agreement has been enabled you must accept the agreement in order to complete the login The security agreement appears in the same dialog as the login credential requirements See Enabling and Editing the Security Banner Restrictive Service Agreement Banner on page 129 for more information The web interface allows a maximum of 16 users to log in simultaneously You must enable JavaScript in the web browser for proper operation gt To log in to the web interface 1 Open a browser such as Microsoft Internet Explorer or Mozilla Firefox and type this URL 51 52 Chapter 3 Getting Started Logout http s lt ip address gt where ip address gt is the IP address of the EMX device 2 Ifa security alert message appears click OK or Yes to accept The Login page then opens 3 Type your user name in the User Name field and password in the Password field amp Login 5 User Name Password Note Both the user name and password are case sensitive so make sure you capitalize them correctly Click Clear to clear either the inputs or any er
363. ules Event Actions and Application Logs Default Assertion Message when the Event TRUE alarmed Server SERVER is now being monitored Server SERVER is unreachable State of asset strip STRIPID STRIPNAME changed to STATEJ Asset tag with ID TAGID connected at rack unit RACKUNIT slot RACKSLOT of asset strip STRIPID STRIPNAME Blade extension with ID TAGID connected at rack unit RACKUNIT of asset strip STRIPID STRIPNAME Firmware update for asset strip STRIPID STRIPNAME status changed to STATE Config parameter PARAMETER of asset strip STRIPID STRIPNAME changed to TVALUEJ by user USERNAME Config of rack unit RACKUNIT of asset strip STRIPID STRIPNAME changed by user USERNAME to LED Operation Mode TLEDOPMODEJ LED Color TLEDCOLOR LED Mode LEDMODEJ Blade extension overflow occured on strip STRIPID STRIPNAME Composition changed on composite asset strip STRIPID STRIPNAME LHX has been connected to PORTTYPE port PORTID LHX connected to PORTTYPE port PORTID has been switched on Default Assertion Message when the Event FALSE TEXTSENSORSLOT is no longer alarmed Server SERVER is no longer being monitored Server SERVER is reachable Asset tag with ID TAGID disconnected at rack unit RACKUNIT slot RACKSLOT of asset strip STRIPID STRIPNAME Blade extension with I
364. user accounts and groups that are authenticated for accessing the EMX In this example we will create two user groups with different permissions Each group will consist of two user accounts available on the AD server User groups User accounts members EMX User usera emxuser2 EMX Admin userb emxuser Group permissions e The EMX User group will only have read only permissions e The EMX Admin group will have full system permissions 354 Appendix LDAP Configuration Illustration Step B Configure User Groups on the AD Server sis Raritan You must create the groups for the EMX on the AD server and then make appropriate users members of these groups In this illustration we assume e The groups for the EMX are named EMX Admin and EMX User e User accounts emxuser emxuser2 usera and userb already exist on the AD server gt configure the user groups on the AD server 1 Onthe AD server create new groups EMX Admin and EMX User Note See the documentation or online help accompanying Microsoft AD for detailed instructions Add the emxuser2 and usera accounts to the EMX User group Add the emxuser and userb accounts to the EMX Admin group Verify whether each group comprises correct users EMX Admin Properties 2 x General Members Member ot Menaged By Members Active Directory Folder emxuser techadssl com Users i userb techadssl com ServicesApps raritan EMX User Properties 21x
365. user name To configure users for SNMP v3 encrypted communication Choose User Management gt Users The Manage Users dialog appears To change the SNMPv3 access permissions click the SNMPv3 tab and make necessary changes For details see Step 6 of Creating a User Profile on page 62 Raritan SNMP Gets and Sets zie Raritan Chapter 9 Using SNMP 5 Click OK to save the changes The user is now set up for encrypted SNMP v3 communication In addition to sending traps the EMX is able to receive SNMP get and set requests from third party SNMP managers Get requests are used to retrieve information about the EMX such as the system location Set requests are used to configure a subset of the information such as the SNMP system name Note The SNMP system name is the EMX device name When you change the SNMP system name the device name shown in the web interface is also changed The EMX does NOT support configuring IPv6 related parameters using the SNMP set requests Valid objects for these requests are limited to those found in the SNMP MIB II System Group and the custom EMX MIB The EMX MIB The SNMP MIB file is required for using your EMX device with an SNMP manager An SNMP MIB file describes the SNMP functions Downloading SNMP MIB The SNMP MIB file for the EMX can be easily downloaded from the web interface There are two ways to download the SNMP MIB file 1 To download the file fr
366. v6 format To set Static IPv6 address Gateway Primary DNS server Secondary DNS server optional Use this command network ipv6 ipAddress ip address where ip address is the IP address you want to assign network ipv6 gateway ip address where ip address is the IP address of the gateway network ipv6 primaryDNSServer ip address where ip address is the IP address of the primary DNS server network ipv6 secondaryDNSServer ip address where ip address is the IP address of the secondary DNS server 9 To quit the configuration mode with or without saving the changes type either command and press Enter Command apply Description Save all configuration changes and quit the configuration mode cancel Abort all configuration changes and quit the configuration mode The prompt appears indicating that you have quit the configuration mode Raritan Raritan Chapter 2 Installing and Configuring the EMX Device 10 To verify whether all settings are correct type the following commands one by one Current network settings are displayed Command Description show network Show network parameters show network ip Show all IP configuration all parameters show network Show all wireless parameters wireless details Perform this command only when you enable the wireless mode Tip You can also type show network wireless to display a sho
367. ver Use the Browse button to navigate to the certificate file This file is required when the Use only trusted LDAP Server Certificates checkbox is selected Tip You can first upload the CA certificate file for a future use before selecting the Use only trusted LDAP Server Certificates checkbox and then select the checkbox when you need to utilize the certificate file Anonymous Bind For OpenLDAP use this checkbox to enable or disable anonymous bind o use anonymous bind select this checkbox When a Bind DN and password are required to bind to the external LDAP LDAPS server deselect this checkbox Use Bind Credentials For Microsoft Active Directory use this checkbox to enable or disable anonymous bind To use anonymous bind deselect this checkbox By default it is deselected When a Bind DN and password are required to bind to the external LDAP LDAPS server select this checkbox Bind DN Specify the DN of the user who is permitted to search the LDAP directory in the defined search base This information is required only when the Use Bind Credentials checkbox is selected Bind Password and Confirm Bind Password Enter the Bind password in the Bind Password field first and then the Confirm Bind Password field This information is required only when the Use Bind Credentials checkbox is selected Base DN for Search Enter the name you want to bind against the LDAP LDAPS up to 31 c
368. ver Settings dialog appears Raritan Z Raritan 9 Chapter 5 EMX Device Management Type the name or IP address of the mail server in the Server Name field Type the port number for the SMTP server in the Port field The default is 25 Type an email address for the sender in the Sender Email Address field Type the number of email retries in the Number of Sending Retries field The default is 2 retries Type the time interval between email retries in the Time Interval Between Sending Retries in minutes field The time is measured in minutes The default is 2 minutes If your SMTP server requires password authentication do this a Select the Server Requires Authentication checkbox b Type a user name in the User Name field c Type a password in the Password field Now that you have set the SMTP settings you can test it to ensure it works properly Do the following a Type the recipient s email address in the Recipient Email Addresses field Use a comma to separate multiple email addresses b Click Send Test Email Click OK to save the changes 10 Check if the recipient s receives the email successfully 93 5 Setting Up an EMX Using Bulk Configuration Use this feature if you have already set up an EMX and are now setting up another The Bulk Configuration feature lets you save the settings of a configured EMX device to your PC You can
369. ver to 192 168 80 66 config time ntp firstServer 192 168 80 66 Specifying the Secondary NTP Server This command syntax specifies the primary time server if synchronization with the NTP server is enabled config time ntp secondServer second server Variables e The second server is the IP address or host name of the secondary NTP server Example The following command sets the secondary time server to 192 168 80 78 config f time ntp secondServer 192 168 80 78 Overriding the DHCP Assigned NTP Servers This command syntax determines whether the customized NTP server settings override the DHCP specified NTP servers config f time ntp overrideDHCPProvidedServer lt option gt Variables e option is one of these options true or false Mode Description true Customized NTP server settings override the DHCP specified NTP servers false Customized NTP server settings do NOT override the DHCP specified NTP servers Z Raritan Chapter 10 Using the Command Line Interface Example The following command overrides the DHCP specified NTP servers with the customized NTP servers including the primary and secondary NTP servers config time ntp overrideDHCPProvidedServer tru Role Configuration Commands A role configuration command begins with role Creating a Role This command syntax creates a new role with a list of semicolon separated privileges assigned to the role config
370. vice If necessary you can also manually change the LED color settings for a specific rack unit on the asset sensor to make that LED behave differently from other LEDs A daisy chain AMS M2 Z asset sensors is supported by the EMX See AMS M2 Z Daisy Chain Limitations on page 334 for information on AMS M2 Z daisy chain limitations Once connected EMX recognizes each AMS M2 Z asset sensor that is part of the chain Blade extensions can be connected to each AMS M2 Z asset sensor in the chains as needed As AMS M2 Z asset sensors are added or removed from the chain events are generated in EMX zie Raritan is 330 Appendix A Using Raritan Asset Management Sensors with the EMX Configuring the Asset Sensor The EMX cannot detect how many rack units tag ports a connected asset sensor supports so you must provide this information manually You can name the asset sensor or determine the numbering way for all rack units in the web interface Additionally you can provide a description to identify each asset sensor The customized name is followed by the label in parentheses Note In this context the label refers to the port number where the asset sensor is connected a To configure an asset sensor Connect the asset sensor to the EMX if it is not already Click on the Feature Ports folder in the navigation tree to expand it Click the desired asset sensor The page specific to that asset sensor opens in t
371. wly added differential air pressure sensor c Repeat Steps a to b to cascade more differential air pressure sensors Note that each SENSOR port supports a maximum of 16 environmental sensors o The EMX device The Raritan differential air pressure sensor C7 Y r arren y era o aisa dada gt 9 e eee E Fr iis Raritan Chapter 2 Installing and Configuring the Device Connecting a Logitech Webcam Optional The EMX supports webcams connected to it allowing you to view video or snapshots of the area surrounding the webcam The following webcams are supported e Logitech Webcam Pro 9000 Model 960 000048 e Logitech QuickCam Deluxe for Notebooks Model 960 000043 e Logitech QuickCam Communicate MP Model 960 000240 e Logitech C200 The EMX 888 device supports up to two 2 webcams and the EMX 111 supports one 1 webcam After connecting a webcam you can visually monitor environmental conditions near the EMX through the web interface from anywhere For more information on the QuickCam webcam see the user documentation accompanying it gt connect a webcam 1 Connect the webcam to the USB A port on the EMX device The EMX automatically detects the webcam 2 Position the webcam properly Snapshots or videos captured by the webcam are immediately displayed in the EMX web interface See Webcams on page 184 for additional information on the feature and C
372. wo For example if the serial number is AE17A00022 the LCD display shows the following information one after another S AE 5 17 gt s A0 gt s 00 gt 5 22 If no button is pressed after tens of seconds the LCD display returns to the sensor reading or state Raritan Chapter 3 Getting Started Asset Management Information The LCD display can display the asset sensor state on each FEATURE port as well as the asset tag state of each rack unit For the Raritan asset sensor a rack unit refers to a tag port gt To display the asset management information 1 Press the MODE button until the term ASSET is displayed in the top right corner of the LCD display 2 Press the Up or Down button until the desired FEATURE port number is displayed in the top of the LCD display See LCD Display on page 45 Pressing the UP button moves up one selection Pressing the V DOWN button moves down one selection If no asset sensor is detected or physically connected to the selected FEATURE port the term nA appears Note Press and hold the Up or Down buttons for at least two 2 seconds to quickly move through several items at once 3 Press the FUNC button When an blinking double arrow symbol appears on the left side of the LCD display press the Up or Down button to select the desired rack unit on the currently selected asset sensor The rack unit number appears in the middle of the LCD display
373. words as well See Modifying a User Profile on page 66 gt change your password 1 Choose User Management Change Password The Change User Password dialog appears j Change User admin Password x Old Password Password Enter new password Confirm Password Repeat new password Type the current password in the Old Password field Type your new password in the Password and Confirm Password fields The password can be 4 to 64 characters long It is case sensitive 4 Click OK to save the changes Raritan a 54 Chapter 3 Getting Started Introduction to the Web Interface The web interface provides two panes a menu bar a status bar an Add Page icon and a logout button throughout every page 13 Raritan EMX ops o TU UNA uie OF ILLIS sad ea 3 aries 5 Mimes Sette Lo neces 10 TL pedew Eees way 2 coortrurs tora Fr e droent veer 1025329000 6 Lo f emos hn MAC 0212469 24 a1 o DIXIE MD D r inten Leet Lowe TOI E09 Ow 25919 Number Web interface element 1 Menus EMX Explorer pane e Setup button 4 Status bar e Add Page icon Q Logout button Data pane The Setup button is not available on some pages such as the Dashboard page For detailed information about these web interface elements see the sections that follow Raritan Raritan Chapter 3 Getting Starte
374. x is selected If not select it to enable the ping monitoring feature Provide the information required Field IP Address Hostname Number of Successful Pings to Enable Feature Wait Time in seconds after Successful Ping Wait Time in seconds after Unsuccessful Ping Number of Consecutive Unsuccessful Pings for Failure Description IP address or host name of the IT equipment whose accessibility you want to monitor The number of successful pings required to declare that the monitored equipment is Reachable Valid range is 0 to 200 The wait time before sending the next ping if the previous ping was successfully responded Valid range is 5 to 600 seconds The wait time before sending the next ping if the previous ping was not responded Valid range is 3 to 600 seconds The number of consecutive pings without any response before the monitored equipment is declared Unreachable Valid range is 1 to 100 165 166 Chapter 8 Managing External Devices Field Description Wait Time in The wait time before the EMX resumes seconds before pinging after the monitored equipment is Resuming Pinging declared unreachable Valid range is 1 to 1200 seconds 5 Click OK to save the changes 6 To add more IT devices repeat Steps 2 to 5 7 Click Close to quit the dialog In the beginning the status of the monitored equipment shows Waiting for reliable connection which means the requested number
375. y you can remove all of it from the local log gt To delete all event entries 1 Choose Maintenance View Event Log The Event Log dialog appears 159 Chapter 7 Event Rules Event Actions and Application Logs 2 Click Clear Event Log 3 Click Close to quit the dialog Viewing the Communication Log The EMX allows you to inspect all communications occurred between the EMX device and its graphical user interface GUI The information is usually useful for a technical support engineer only and you may not need to view it This feature is accessible only by users with Administrative Privileges gt To view the communication log 1 Choose Maintenance gt View Communication Log The Communication Log dialog appears 2 The dialog shows the final page by default You can Switch between different pages by doing one of the following Click or PI to go to the first or final page Click 4 or P to go to the prior or next page Type a number in the Page text box and press Enter to go to a specific page Select a log entry from the list and click Show Details or simply double click the log entry to view detailed information Note Sometimes when the dialog is too narrow the icon takes the place of the Show Details button In that case click and select Show Details to view details To immediately update the communication log click ge To save the communication log on your computer click d
Download Pdf Manuals
Related Search
Related Contents
SmartStorm User Manual Best Practice for Identifying Leaks in GC and GC/MS Systems アストロン製品カタログ @relax mode d`emploi - CE Ouest-Nord FK321.4DFX / KGC15442Si FK321.4DF / KGC15441W 2015 Profession de foi des listes présentées par le SNESUP Mode d`emploi Imprimante LC-P45 Guida alla programmazione e alla risoluzione dei - Migros The Terra Latch 0001 Installation Guide DRY CLEANING MANUAL Copyright © All rights reserved.
Failed to retrieve file