Opengear User Manual
Opengear User Manual
Opengear User Manual
Rev: 4.9
September 24th 2013
Proper back-up systems and necessary safety devices should be utilized to protect
against injury, death or property damage due to system failure. Such protection is the
responsibility of the user.
This console server device is not approved for use as a life-support or medical system.
Any changes or modifications made to this console server device without the explicit
approval or consent of Opengear will void Opengear of any liability or responsibility of
injury or loss caused by any malfunction.
This equipment is for indoor use and all the communication wirings are limited to
inside of the building.
Publishing history
Date Revision Update details
Jan 2010 3.8.4 SD4001 product
Mar 2010 3.8.5 ACM5004-G, fixed Failover details and added DDNS
June 2010 3.9 V3.1 (shadow password, deg F, SNMP, SMS gateway) and ACM5004-I
Aug 2010 3.9.1 V3.2 (OpenVPN, Zenoss, config commit, Call Home)
Dec 2010 4.0 V3.3 (Firewall router, Web Terminal, SNMP updates)
June 2011 4.1 V3.4 (GPS support, SNMP traffic monitoring and IPv6, 32 port models, SMS over cellular)
Oct 2011 4.2 V3.5 (Auto-Response)
Nov 2011 4.3 V3.5.2 (PPTP, GRE, Groups, FTP server, multiple dial-in, pmshell). Add IM4216-34
Feb 2012 4.4 V3.5.2u3 (Kerberos, Cisco RJ in SD4000, Add ACM5500, Remove KCS)
April 2012 4.5 V3.5.2u14 (Cellular redial)
July 2012 4.6 V3.5.3 (SMS ARM, simple key, Services page) and SD4001 Rev-01, EoL CM4001/4008
Dec 2012 4.7 V3.6 (Authenticated NTP), ACM5504-5-G-W-I release and EoL IM4004-5
April 2013 4.8 V3.7, 4G LTE support
Sept 2013 4.9 V3.8, IM7200
Copyright
©Opengear Inc. 2013. All Rights Reserved.
Information in this document is subject to change without notice and does not represent a commitment on
the part of Opengear. Opengear provides this document “as is,” without warranty of any kind, expressed
or implied, including, but not limited to, the implied warranties of fitness or merchantability for a particular
purpose.
Opengear may make improvements and/or changes in this manual or in the product(s) and/or the
program(s) described in this manual at any time. This product could include technical inaccuracies or
typographical errors. Changes are periodically made to the information herein; these changes may be
incorporated in new editions of the publication.
TABLE OF CONTENTS
THIS MANUAL 12
INSTALLATION 16
2.1 Models 16
2.1.1 ACM5000 kit components 17
2.1.2 ACM5500 kit components 18
2.1.3 IM4208-2, IM4216-2, IM4232-2, IM4248-2 and IM4216-34 kit components 18
2.1.4 IM72016-2, IM7232-2 and IM7248-2 kit components 19
2.1.5 CM4116, CM4132 and CM4148 kit components 20
2.1.6 SD4002 kit components 20
2.1.7 SD4001 kit components 21
2.2 Power Connection 21
2.2.1 All IM7200-DAC and IM4200-DAC models 21
2.2.2 All CM4100-SAC models 21
2.2.3 SD4002 and SD4001 power 22
2.2.4 All ACM5000 models 22
2.2.5 All ACM5500 models 23
2.2.6 IM4216-34-DDC, IM4208-2-DDC, IM4216-2-DDC, IM4232-2-DDC and IM4248-2-DDC power 23
2.3 Network Connection 24
2.4 Serial Port Connection 25
2.4.1 Opengear Classic RJ45 pinout (option –X0) 26
2.4.2 Cisco Rolled (Cyclades) RJ45 pinout (option -X1) 26
2.4.3 Cisco RJ45 pinout (option -X2) 27
2.5 USB Port Connection 27
2.6 Fitting Cellular SIM and Antennas 28
2.6.1 ACM5004-G models 28
2.6.2 ACM5500-G models 29
2.6.3 ACM5500-L models 30
2.6.4 IM4200-G models 30
2.6.5 All IM7200 models 31
2.6.6 IM7200-L models 31
2.7 Digital I/O and Environmental Sensors 31
SYSTEM CONFIGURATION 32
3.1 Management Console Connection 32
3.1.1 Connected computer set up 32
3.1.2 Browser connection 33
3.2 Administrator Set up 34
3.2.1 Change default root System Password 34
3.2.2 Set up a new Administrator 35
3.2.3 Name the System 35
3.3 Network Configuration 36
3.3.1 IPv6 configuration 37
3.3.2 Dynamic DNS (DDNS) configuration 37
3.4 Services and Service Access 39
3.5 Communications Software 42
3.5.1 SDT Connector 42
3.5.2 PuTTY 43
3.5.3 SSHTerm 44
3.6 Management Network Configuration 44
3.6.1 Enable the Management LAN 44
3.6.2 Configure the DHCP server 46
3.6.3 Select Failover or broadband OOB 47
3.6.4 Aggregating the network ports 48
3.6.5 Wi-Fi Wireless LAN 49
THIS MANUAL
This User Manual describes the features and capabilities of the following Opengear product lines, and provides you with
instructions to best take advantage of them:
- ACM5504-5-G/GV-W-I, ACM5504-5-G/GV-I, ACM5504-5-LA/LR/LV-I, ACM5504-2-P, ACM5508-2, ACM5508-2-M and
ACM5008-2-P Remote Management Gateways
- ACM5002-F-E, ACM5003-M-F-E, ACM5004-F-E & ACM5004-2-I Remote Site Managers (with –SDC options and -
G/GV/GS models with cellular support)
- IM7248-2-DAC, IM7232-2-DAC and IM7216-2-DAC Infrastructure Managers (and -LA/LR/LV models with 4G LTE)
- IM4248-2-DAC (or DDC), IM4232-2-DAC (DDC), IM4216-2-DAC (DDC), IM4216-34-DAC (DDC) & IM4208-2-DAC
Infrastructure Managers (and -G/GV models)
- CM4116-SAC, CM4116-SAC & CM4148-SAC Console Servers
- SD4001 & SD4002 Secure Device Servers
Each of these products is referred to generically in this manual as a console server. Where appropriate product groups may
be referred to as console servers, gateways or by specific product line name or product group (e.g. IM4200 family,
ACM5500).
Manual Organization
This manual contains the following chapters:
1. Introduction An overview of the features of the console server and information on this manual
2. Installation Physical installation of the console server and the interconnecting of managed devices
3. System Configuration Covers initial installation and configuration of the console server on the network and the
services that will be supported
4. Serial & Network Covers configuring serial ports and connected network hosts, and setting up users
5. Firewall, Failover & OOB Describes setting up the firewall router functions and the high availability access features
of the console server
6. Secure Tunneling Covers secure remote access using SSH and configuring for RDP, VNC, HTTP, HTTPS
etc. access to network and serially connected devices
7. Auto-Response and Logs Explains the setting up of local and remote event/ data logs and configuring auto-
response actions to trigger events
8. Power & Environment Management of USB, serial and network attached power strips and UPS supplies. EMD
environmental sensor configuration
9. Authentication All access to the console server requires usernames and passwords which are locally or
externally authenticated
10. Nagios Integration Setting Nagios central management with SDT extensions and configuring the console
server as a distributed Nagios server
11. System Management Covers access to and configuration of services to be run on the console server
12. Status Reports View a dashboard summary and detailed status and logs of serial and network connected
devices (ports, hosts, power and environment)
13. Management Includes port controls and reports that can accessed by Users
14 Basic Configuration Command line installation and configuration using the config command
15. Advanced Config Advanced command line configuration activities using Linux commands
Types of users
The console server supports two classes of users:
I. Firstly there are the administrative users who have unlimited configuration and management privileges over the console
server; and all the connected devices. These administrative users will be set up as members of the admin user group
and any user in this class is referred to generically in this manual as the Administrator. An Administrator can access and
control the console server using the config utility, the Linux command line or the browser based Management Console.
By default the Administrator has access to all services and ports to control all the serial connected devices and network
connected devices (hosts).
II. The second class of users embraces those who have been set up by the Administrator with specific limits of their access
and control authority. These users are set up as members of the one of the pre-configured user groups (pptpd, dialin,
ftp, pmshell or users) - or some other user groups the Administrator may have added. They are only authorized to
perform specified controls on specific connected devices are referred to as Users. These Users (when authorized) can
access serial or network connected devices; and control these devices using the specified services (e.g. Telnet, HHTPS,
RDP, IPMI, Serial over LAN, Power Control). An authorized User also has a limited view the Management Console and
can only access authorized configured devices and review port logs.
In this manual, when the term user (lower case) is used, it is referring to both the above classes of users. This document
also uses the term remote users to describe users who are not on the same LAN segment as the console server. These
remote users may be Users, who are on the road connecting to managed devices over the public Internet, or it may be an
Administrator in another office connecting to the console server itself over the enterprise VPN, or the remote user may be
in the same room or the same office but connected on a separate VLAN to the console server.
Management Console
The features of your console server are configured and monitored using the Opengear Management Console. When you
first browse to the Management Console, you can use the menu displayed on the left side to configure the console server.
Once you have completed the initial configuration, you can continue to use the Management Console runs in a browser and
provides a view of the console server and all the connected devices.
Administrators can use the Management Console, either locally or from a remote location, to configure and manage the
console server, users, ports, hosts, power devices and associated logs and alerts. Users can also use the Management
Console, but have limited menu access to control select devices, review their logs and access them using the in-built Web
terminal or control power to them.
The console server runs an embedded Linux operating system, and experienced Linux and UNIX users may prefer to
undertake configuration at the command line. You can command line access by cellular/ dial-in or directly connecting to the
console server’s serial console/modem port; or by using ssh or Telnet to connect to the console server over the LAN (or
connecting with PPTP, IPsec or OpenVPN)
Interface icons
Icons are used in the Management Console for navigation to pages, system status, backup and restore etc.
The logout icon is on the top of every page. Clicking the icon logs you out and ends the current session.
Clicking the backup icon initiates a configuration backup – as detailed in Section 11.4
The commit config icon enables you to commit queue configuration changes– as detailed in Section
11.4
You can click the delete icon associated with the item you want to delete.
Manual Conventions
This manual uses different fonts and typefaces to show specific actions:
Note Text presented like this indicates issues to take note of
Text presented like this highlights important issues and it is essential you read and
take head of these warnings
Text presented with an arrow head indent indicates an action you should take as part of the procedure
Bold text indicates text that you type, or the name of a screen object (e.g. a menu or button) on the Management
Console.
Italic text is also used to indicate a text command to be entered at the command line level.
INSTALLATION
This chapter describes how to install the console server hardware, and connect it to controlled devices.
2.1 Models
There are multiple families and models, each with a different number of network/ serial /USB ports or power supply and
wireless configurations:
Model Serial USB Network Flash Console Modem Wireless Environment RJ Power
Port (V.92) Sensors Pinout
ACM5002-F-E 2 1 1 4G - - - Temp/probes 02 Ext AC/DC
ACM5004-F-E 4 1 1 4G - - - Temp/probes 02 Ext AC/DC
ACM5003-M-F-E 3 1 1 4G - Internal - Temp/probes 02 Ext AC/DC
ACM5004-G(S/V)-E 4 1 1 - - - 3G Temp/probes 02 Ext AC/DC
ACM5004-G(S/V)-I 4* 1 1 - - - 3G Temp & DI/O 02 Ext AC/DC
ACM5004-2-I 4* 2 2 - - - - Temp & DI/O 02 Ext AC/DC
ACM5504-2-P 4 2 2 4G - - - External 02 PoE
ACM5504-5-G(V)-I 4* 2 5 4G - - 3G Temp & DI/O 02 Ext AC/DC
ACM5504-5-G-W-I 4* 2 5 4G - - WAP, 3G Temp & DI/O 02 Ext AC/DC
ACM5504-5-Lx-I 4* 2 5 4G - - 4G Temp & DI/O 02 Ext AC/DC
ACM5508-2 8 2 2 4G - - - - 02 Ext AC/DC
ACM5508-2-I 8* 2 2 4G - - - Temp & DI/O 02 Ext AC/DC
ACM5508-2-M 8 2 2 16G - Internal - - 02 Ext AC/DC
IM4248-2-DAC/DC 48 3** 2 16G 1 Internal 3G opt External 00/01/02 Dual AC/DC
IM4232-2-DAC/DC 32 3** 2 16G 1 Internal 3G opt External 00/01/02 Dual AC/DC
IM4216-2-DAC/DC 16 3** 2 16G 1 Internal 3G opt External 00/01/02 Dual AC/DC
IM4208-2-DAC/DC 8 3** 2 16G 1 Internal 3G opt External 00/01/02 Dual AC/DC
IM4216-34-DAC/DC 16 3** 34 16G 1 Internal - External 02 Dual AC/DC
IM7216-2-DAC 16 2 2 16G 1 Internal WAP, 4G opt External 01/02 Dual AC
IM7232-2-DAC 32 2 2 16G 1 Internal WAP, 4G opt External 01/02 Dual AC
IM7248-2-DAC 48 2 2 16G 1 Internal WAP, 4G opt External 01/02 Dual AC
CM4148-SAC 48 - 1 - 1 - - External 00 Single AC
CM4132-SAC 32 - 1 - 1 - - External 00 Single AC
CM4116-SAC 16 - 1 - 1 - - External 00 Single AC
SD4001 1* - 1 - - - - - DB9*** Ext AC/DC
SD4002 2* - 1 - - - - - DB9*** Ext AC/DC
Network ports are all 10/100 except IM7200 which has dual 10/100/1000 LAN ports (with 2 x RJ45 copper and 2 x SFP fiber module slots
The serial pin-out 02 is Cisco Straight, 01 is Cisco Rolled and 00 is Opengear Classic. IM7200
* These models have RS4232/422/485 serial. All others are RS232 only
** The IM7200 has USB3.0 ports. All other models have USB2.0 ports except those marked ** which have 2x USB2.0 and 1xUSB1.1 port.
***These models also include Cisco RJ adapters
SOFTWARE DHCP DDNS Mgt Cell or OOB Auto- Flash (FTP & FIPS IPsec, PPTP
FEATURES
LAN WiFi Failover Response TFTP) & OpenVPN
ACM5500 yes yes yes** yes*** yes yes yes yes yes
IM4200 yes yes yes yes*** yes yes yes yes yes
IM7200 yes yes yes yes*** yes yes yes yes yes
CM4100 no no no no no yes no no no
SD4000 no no no no no yes no no no
The sections below show the components shipped with each of these models.
Unpack your ACM5000 kit and verify you have all the parts shown above, and that they all appear in good
working order. The ACM5004-G has an external 3G aerial to be attached.
Unpack your ACM5500 kit and verify you have all the parts shown above, and that they all appear in good
working order
The ACM5004-5-G(V)-I and ACM5504-5-LA/LR/LV-I models come with an external cellular aerial to be attached.
The ACM5004-5-G(V)-W-I also has an external 802.11 wireless aerial to be attached
Proceed to connect your ACM5500 to the network, serial and USB ports of the controlled devices, environmental
monitors and AC power as shown below
Unpack your IM4200 (IM4208-2, IM4216-2, IM4232-2, IM4248-2 Infrastructure Manager or IM4216-34
Management Gateway) kit and verify you have all the parts shown above, and that they all appear in good
working order
If you are installing your IM4200 in a rack you will need to attach the rack mounting brackets supplied with the
unit, and install the unit in the rack. Take care to head the Safety Precautions listed in Appendix C
Proceed to connect your IM4200 to the network, to the serial ports of the controlled devices, and to power as
outlined below
Note The IM4216-2-DDC, IM4232-2-DDC, IM4248-2-DDC and IM4216-34-DDC products are DC powered and the kits
do not include an IEC AC power cord
Unpack your IM7200 (IM7248-2-DAC, IM7232-2-DAC and IM7216-2-DAC Infrastructure Manager) kit and verify
you have all the parts shown above, and that they all appear in good working order
If you are installing your IM7200 in a rack you will need to attach the rack mounting brackets supplied with the
unit, and install the unit in the rack. Take care to head the Safety Precautions listed in Appendix C
Proceed to connect your IM7200 to the network, to the serial ports of the controlled devices, and to power as
outlined below
Unpack your CM4116 (or CM4132/CM4148) kit and verify you have all the parts shown above, and that they all
appear in good working order
If you are installing your CM4116 (or CM4132/CM4148) in a rack you will need to attach the rack mounting
brackets supplied with the unit, and install the unit in the rack. Take care to head the Safety Precautions listed in
Appendix C
Proceed to connect your CM4116 (or CM4132/CM4148) to the network, to the serial ports of the controlled
devices, and to power as outlined below
Unpack your SD4002 and verify you have all the parts shown above, and that they all appear in good working
order
Proceed to connect your SD4002 to the network, to the serial port of the controlled device and to power as
outlined below
Unpack your SD4001 and verify you have all the parts shown above, and that they all appear in good working
order
Proceed to connect your SD4001 to the network, to the serial port of the controlled device and to power as
outlined below
Two IEC AC power sockets are located at the rear of the metal case, and these IEC power inlets use conventional IEC
AC power cords. Power cords for various regions are available, although the North American power cord is provided by
default. There is a warning notice printed on the back of each unit.
To avoid electrical shock the power cord grounding conductor must be connected to
ground
CM4116, CM4132 and CM4148 models have an IEC AC power socket located at the rear of the metal case. This IEC power
inlet uses a conventional IEC AC power cord, and the power cords for various regions are available. (The North American
power cord is provided by default). There is a warning notice printed on the back of each unit.
To avoid electrical shock the power cord grounding conductor must be connected to
ground
Plug in the power supply AC power cable and the DC power cable
Turn on the AC power and confirm the console server Power LED (PWR) is lit.
Note: When you first apply power to the SD4002 you will observe the Local and Serial LEDs flashing alternately)
The SD4002 can also be powered directly from any +9V DC to +48V DC power source by connecting the DC power lines
to the IN-GND and IN-VIN+ screw jacks.
Plug in the power supply AC power cable and the DC power cable
Turn on the AC power and confirm the console server Power LED (PWR) is lit
The ACM5000 models can also be powered from an external +9V DC to +30V DC power
source - by connecting the DC power lines to a power plug that plugs into the 12VDC
(PWR) jack.
The industrial ACM5004-2-I model also can be powered externally by connecting a +9 to
+30V DC power source to the DC PWR and GND connectors on the green screw
terminal block on the side of the unit.
Note All ACM5000 models can also be ordered with the -SDC option. These units are
supplied with an external DC-DC power converter. This converter has an integrated
power cable/connector that plugs into the 12VDC (PWR) connector on the ACM5000.
The input voltage for the DC-DC converter is plus or minus 36V DC to 72V DC
Plug in the power supply AC power cable and the DC power cable
Turn on the AC power and confirm the console server Power LED (PWR) is lit
The ACM5500 models can also be powered from an external +9V DC to +30V DC power source - by connecting the DC
power lines to a power plug that plugs into the 12VDC (PWR) jack.
Similarly the ACM5500 can be powered by connecting an external 9V AC to 24V AC power source to this jack.
The industrial ACM5508-2-I and ACM5504-5-G-I models also can
be powered externally by connecting a +9 to +30V DC power source
to the EXT 9-30V DC and GND connectors on the green screw
terminal block on the side of the unit.
The ACM5504-2-P can be PoE powered using 802.3af compliant power sources.
Note An external DC-DC power converter can be ordered as an accessory with any
ACM5500 remote management gateway. This converter has an integrated power
cable/connector that plugs into the 12VDC (PWR) connector on the ACM5500. The
input voltage for the DC-DC converter is plus or minus 36V DC to 72V DC
Strip the DC wire insulation to expose approximately 0.4 inch (10 mm) of conductor
Connect the safety ground wire to the ‘E’ safety ground terminal on the terminal block first. The DDC is floating
(w.r.t. Earth), however the safety terminal on the three way screw terminal block connects to Earth or Chassis
Ground
Connect the power wires to the appropriate terminals of the terminal block:
The ‘+’ Terminal on the four way screw terminal block should always be connect to the more positive voltage
(from 0V to +48 V)
The ‘-‘ terminal on the four way screw terminal block should connect to the more negative voltage (from -48V to
0V)
So the connections for -48 Volt DC input power are:
Tighten the terminal screw to a torque of 8.0 ± 0.5 in-lb (0.93 ± 0.05 N-m)
Repeat the connection steps above for the second power supply
The safety covers are an integral part of the DDC product. Do not operate the unit
without the safety cover installed.
Any exposed wire lead from a DC-input power source can conduct harmful levels of
electricity. So ensure that no exposed portion of the DC-input power source wire
extends from the terminal block plug and safety cover
With the exception of the IM7200 family, all console servers have 10/100 Ethernet LAN ports with RJ45 connectors These
RJ45 ports are located on the front panel of the rack-mount CM4100 and IM4200 units, and on the side of the smaller
ACM5500, ACM5000 and SD4001/2 units. All 10/100 physical connections are made using industry standard Cat5 cabling
and connectors. Ensure you only connect the LAN port to an Ethernet network that supports 10Base-T/100Base-T.
The IM7200 has four physical input ports that are logically bundled as two ports (NET1 & NET2). Each logical port
consists of a copper 10/100/1000 copper port and a fiber-optic small form-factor pluggable (SFP) module slot. Within each
port, you can use only one of the two physical ports, either the SFP module port or the 10/100/1000 port e.g. either
theNET1 (SFP) module port or the 10/100/1000 port NET1 (C). The default operation is that if the SFP module is plugged
in, the fiber-optic medium has the priority over copper medium. If the SFP module is not plugged in, then the copper
medium becomes active. If the SFP module is plugged in later (even after the copper medium establishes the link), then
the link of the copper medium will be disconnected and the fiber-optic medium will become active.
For the initial configuration of the console server you must connect a computer to the console server’s principal network
port. This port is labeled NET1 (on IM7200), NETWORK1 (on IM4200), LAN1 (on ACM5500, CM4100 and SD4000) and
LAN USB1 (on ACM5000).
Some console server models support RS-422 and RS-485 as well as RS-232:
- The four RJ45 serial ports on the ACM5004-2-I and ACM5504-5-G-I are each RS-232/422/485 software
selectable - as are the eight RJ45 serial ports on the ACM5508-2-I
The ACM5504-5-G-W-I, ACM5504-5-G-I, ACM5004-G-E and ACM5004-G-I models each have an internal 3G cellular
modem that requires at least one (or more) SIM cards to be installed and at least one external cellular antenna to be
attached. The ACM5000-GV/GS and ACM5500-GV/GS models also have an internal cellular modem requiring
external antenna connection. However the Verizon and Sprint 3G networks do not require a SIM card.
Similarly the IM4200-2-DAC-X2-G and IM4216-34-DAC-X2-G models have an internal 3G cellular modem that
requires a SIM card and external antenna. The IM4200-2-DAC-X2-GV/GS and IM4216-34-DAC-X2-GV/GS models
also have an internal cellular modem requiring external antenna connection however they do not require a SIM card.
The ACM5504-5-LA/LR/LV-I and IM7200-LA/LR/LV-I models all have an internal 4G LTE cellular modem that requires
at least one SIM card to be installed and two external cellular antennas to be attached.
The ACM5504-5-G-W-I and all IM7200 models also have an internal 802.11 wireless modem that requires at least
one external WiFi antenna to be attached.
For the ACM5004-G-E/I unscrew the cover plate on the side of the insert
the SIM into the SIM garage then screw the cover plate back on.
The ACM5004-G/GV/GS-I and the ACM5004-G/GV/GS-E come with dual SMA antenna
connectors. The AUX connector can be used for receive diversity. This requires an
external antenna (accessory Part# 569006) and cable (Part# 449041).
With the ACM5004-G-I models, the AUX connector can also be used for GPS. An
external GPS passive antenna with magnetic base, SMA connector and 2 meter cable
is available (Part # 569008).
Note The ACM5004-G/G-I/GV has two cellular status LEDs. The SIM LED on top of unit should go on solid when the
ACM5004-G/G-I has been powered and a SIM card has been inserted and detected.
The WWAN LED on top of unit should go on at a fast blink once a radio connection has been established with
your cellular carrier (i.e. after an APN has been properly configured). WWAN LED Status:
Off: In reset mode or not powered.
Slow blink: Searching for service.
Solid Green: Active service with no traffic detected.
Fast Blink: Active service with traffic (blink rate is proportional to traffic detected)
The ACM5504-5-G-I and ACM5504-5-G-W-I models work with GSM carriers globally.
Your carrier will provide you with a SIM card for activating you data plan. You must install
the SIM card before powering on the device.
The ACM5504-5-G(-W)-I can hold two SIM cards from alternate carriers, however only
requires one SIM to operate. Unscrew the SIM card access panel and insert the first
carrier SIM card in the bottom SIM slot. A second carrier SIM can also be installed in the
slot above the first. Screw the cover plate back on.
Take care to insert the SIM cards with contacts facing downward and the notch to RHS.
Screw the provided cellular antenna on to the main Cell (M) connector on the rear of
the ACM5504-G-I.
Then place the unit and/or aerial in a location that will ensure the best signal. The
ACM5504-5-G-I has a second SMA antenna connector. This Cell (A) connector can
be used for receive diversity. This requires an external antenna (accessory Part#
569006) and cable (Part# 449041).
The ACM5504-5-G-I has a second SMA antenna connector. This Cell (A) connector
can be used for receive diversity. This requires an external antenna (accessory Part#
569006) and cable (Part# 449041).
Alternately, the Cell (A) connector can be used for GPS. An external GPS passive antenna with magnetic base, SMA
connector and 2 meter cable is available (Part # 569008).
You must install the SIM card before powering on the device.
Unscrew the SIM card access panel and insert the first carrier SIM card in the bottom
SIM slot. A second carrier SIM can also be installed in the slot above the first.
Double check you inserted the SIM card in the bottom SIM slot with contacts facing
downward and the notch to RHS. Then replace the SIM card access panel.
ACM5500-L models are supplied with two external 7-band cellular antennas. Screw the provided antennas on to the main
Cell (M) and diversity Cell (A) SMA connectors on the rear panel.
An external GPS passive antenna with magnetic base, SMA connector and 2 meter cable is available (Part # 569008). It
is screwed on to the GPS SMA connector on the rear panel.
Your carrier will provide you with a SIM card. Insert the SIM card
(1). It will lock into place
Screw the external antenna coax cable onto the MAIN screw mount
SMA connector on the rear of the console server (2)
The IM4200-2-DAC-X2/X0-GV/GS and IM4216-34-DAC-X2-GV/GS models also have an internal cellular modem (and an
internal 16GB flash memory and an additional USB port at the rear). They do not require a SIM card, but the supplied
external antenna is installed as above.
All the IM7200 models have an internal 802.11 WiFi adapter and come with an external WiFi antenna.
The IM7200 has a second WiFi antenna connector. This WIFI (AUX) connector can be used for diversity and
requires an external antenna (part # 569022)
Your carrier will provide you with a SIM card. Insert the card into the SIM CARD slot and it will lock into place (2)
Take care to insert SIM card with contacts facing downwards
Any ACM5000 or ACM5500 model with an –I in the model number, or any ACM5000 with the –E option all ship with
an external green connector block for attaching environmental sensors and digital I/O devices.
Plug in this block and screw in any external devices.
On the ACM5508-2-I, ACM5504-5-G-I, ACM5504-5-LA/LR/LV-I, ACM5004-2-I and ACM5004-G-I models this block
can also be used for connecting the external DC power source.
Refer Chapter 8 for further details.
SYSTEM CONFIGURATION
This chapter provides step-by-step instructions for the initial configuration of your console server, and connecting it to the
Management or Operational LAN. This involves the Administrator:
activating the Management Console
changing the Administrator password
setting the IP address console server’s principal LAN port
selecting the services to be enabled and access privileges
This chapter also discusses the communications software tools that the Administrator may use in accessing the console
server, and the configuration of the additional LAN ports.
Note For initial configuration it is recommended that the console server be connected directly to a single Computer.
However, if you choose to connect your LAN before completing the initial setup steps, it is important that:
you ensure there are no other devices on the LAN with an address of 192.168.0.1
the console server and the computer are on the same LAN segment, with no interposed router appliances
Now add a static entry to the ARP table and ping the console server to assign the IP address to the console
server. In the example below, a console server has a MAC Address 00:13:C6:00:02:0F (designated on the label
on the bottom of the unit) and we are setting its IP address to 192.168.100.23. Also the computer issuing the arp
command must be on the same network segment as the console server (that is, have an IP address of
192.168.100.xxx)
Type arp -s 192.168.100.23 00-13-C6-00-02-0F (Note for UNIX the syntax is: arp -s 192.168.100.23
00:13:C6:00:02:0F).
Type ping -t 192.18.100.23 to start a continuous ping to the new IP Address.
Turn on the console server and wait for it to configure itself with the new IP address. It will start replying to the
ping at this point.
Type arp –d to flush the ARP cache again.
You will be prompted to log in. Enter the default administration username and administration password
(Username: root Password: default)
Note Console servers are factory configured with HTTPS access enabled and HTTP access disabled.
A Welcome screen, which lists initial installation configuration steps, will be displayed. These steps are:
Change default administration password (Users page. Refer Chapter 3.2)
Configure the local network settings (System/IP page. Refer Chapter 3.3)
To configure console server features:
Configure serial ports settings (Serial & Network/Serial Port page. Refer Chapter 4)
Configure user port access (Serial & Network/Users page. Refer Chapter 4)
If your system has a cellular modem you will also be given the steps to configure the cellular router features:
Configure the cellular modem connection (System/Dial page. Refer Chapter 5)
Allow forwarding to the cellular destination network (System/Firewall page. Refer Chapter 5)
Enable IP masquerading for cellular connection (System/Firewall page. Refer Chapter 5)
After completing each of the above steps, you can return to the configuration list by clicking the Opengear logo in the top
left corner of the screen.
Note If you are not able to connect to the Management Console at 192.168.0.1 or if the default Username / Password
were not accepted then reset your console server (refer Chapter 10)
Select Change default administration password from the Welcome page will take you to Serial & Network:
Users & Groups where you can add a new confirmed Password for the user root
Note There are no restrictions on the characters that can be used in the user Password (which each can contain up to
254 characters). However only the first eight Password characters are used to make the password hash.
Note If the console server has flash memory (such as ACM5500 and IM4200) you will be given the option to Save
Password across firmware erases. Checking this will save the password hash in the non-volatile configuration
partition, which does not get erased on firmware reset. However take care as if this password is lost, the device
will need to be firmware recovered
Click Apply. As you have changed the password you will be prompted to log in again. This time use the new
password
Note If you are not confident your console server has been supplied with the current release of firmware, you can
upgrade. Refer Upgrade Firmware - Chapter 11
Note The System Name can contain from 1 to 64 alphanumeric characters (however you can also use the special
characters "-" "_" and ".”). There are no restrictions on the characters that can be used in the System Description
(which can contain up to 254 characters).
The MOTD Banner can be used to display a “message of the day” text to users
Click Apply
Note If you are not confident your console server has been supplied with the current release of firmware, you can
upgrade. Refer Upgrade Firmware - Chapter 11
On the System: IP menu select the Network Interface page then check DHCP or Static for the Configuration
Method
If you selected Static you must manually enter the new IP Address, Subnet Mask, Gateway and DNS server
details. This selection automatically disables the DHCP client
By default the console server LAN port auto detects the Ethernet connection speed. However you can use the
Media menu to lock the Ethernet to 10 Mb/s or 100Mb/s and to Full Duplex (FD) or Half Duplex (HD)
Note If you encounter packet loss or poor network performance with the default auto-negotiation setting, try manually
setting the Ethernet Media settings on the Opengear, and the device it is connected to. In most cases, select
100baseTx-FD (100 megabits, full duplex). Make sure both sides are set identically.
If you selected DHCP the console server will look for configuration details from a DHCP server. This selection
automatically disables any static address. The console server MAC address can be found on a label on the base
plate
Note In its factory default state (with no Configuration Method selected) the console server has its DHCP client enabled,
so it automatically accepts any network IP address assigned by a DHCP server on your network. In this initial state,
the console server will then respond to both its Static address (192.168.0.1) and its newly assigned DHCP address
You may also enter a secondary address or comma-separated list of addresses in CIDR notation,
e.g. 192.168.1.1/24 as an IP Alias
Note If you have changed the console server IP address, you may need to reconfigure your computer so it has an IP
address that is in the same network range as this new address (as detailed in an earlier note in this chapter)
Click Apply
You will need to reconnect the browser on the computer that is connected to the console server by entering
http://new IP address
On the System: IP menu select General Settings page and check Enable IPv6
You will then need to configure the IPv6 parameters on each interface page
IM4200 family of advanced console servers (with Firmware 3.0.2 and later) support DDNS.
The first step in enabling DDNS is to create an account with the supported DDNS service provider of your choice.
Supported DDNS providers include:
- DyNS www.dyns.cx
- dyndns.org www.dyndns.org
- GNUDip gnudip.cheapnet.net
- ODS www.ods.org
- TZO www.tzo.com
- 3322.org (Chinese provider) www.3322.org
Upon registering with the DDNS service provider, you will select a username and password, as well as a
hostname that you will use as the DNS name (to allow external access to your machine using a URL).
The Dynamic DNS service providers allow the user to choose a hostname URL and set an initial IP address to
correspond to that hostname URL. Many Dynamic DNS providers offer a selection of URL hostnames available
for free use with their service. However, with a paid plan, any URL hostname (including your own registered
domain name) can be used.
You can now enable and configure DDNS on any of the Ethernet or cellular network connections on the console server
(by default DDNS is disabled on all ports):
Select the DDNS service provider from the drop down Dynamic DNS list on the System:IP or System:Dial menu
In DDNS Hostname enter the fully qualified DNS hostname for your console server e.g. your-
hostname.dyndns.org
Enter the DDNS Username and DDNS Password for the DDNS service provider account
Specify the Maximum interval between updates - in days. A DDNS update will be sent even if the address has
not changed
Specify the Minimum interval between checks for changed addresses - in seconds. Updates will still only be
sent if the address has changed
Specify the Maximum attempts per update i.e. the number of times to attempt an update before giving up
(defaults to 3)
Note With firmware releases pre 3.5.3 services are enabled and configured using the Service Access tab on the
System: Firewall page
HTTP By default the HTTP service is running and it cannot be fully disabled. However by default HTTP
access is disabled on all interfaces and it is recommended this access remains disabled, if the console
server is to be remotely accessed over the Internet.
Alternate HTTP also enables you to configure an alternate HTTP port to listen on. However the HTTP
service will continue internally listening on TCP port 80 (for CMS and sdt-connector communications)
but will be inaccessible through the firewall.
Telnet By default the Telnet service is running. However by default the service is disabled on all network
interfaces.
Telnet can be used to give the Administrator access to the system command line shell. While this may
be suitable for a local direct connection over a management LAN, it is recommended this service be
disabled if the console server is to be remotely administered. This service may also be useful for local
Administrator and the User access to selected serial consoles.
The Enable telnet command shell checkbox will completely enable or disable the telnet service. An
alternate telnet port to listen on can be specified in Alternate Telnet Port (default port is 23).
SSH This service provides secure SSH access to the console server and attached devices – and by default
the SSH service is running and enabled on all interfaces. It is recommended you choose SSH as the
protocol where the Administrator connects to the console server over the Internet or any other public
network. This will provide authenticated communications between the SSH client program on the remote
computer and the SSH sever in the console server. For more information on SSH configuration refer
Chapter 9 - Authentication.
The Enable SSH command shell checkbox will completely enable or disable this service. An alternate
SSH port to listen on can be specified in SSH command shell port (default port is 22).
TFTP/FTP If a USB flash card or internal flash is detected on an advanced console server (ACM5000, ACM5500,
IM7200 or IM4200) then checking Enable TFTP (FTP) service will enable this service and set up
default tftp and ftp server on the USB flash. These servers are used to store config files, maintain
access and transaction logs etc. Files transferred using tftp and ftp will be stored under
/var/tmp/usbdisk/tftpboot. Unchecking Enable TFTP (FTP) service will completely disable the TFTP
(FTP) service.
DNS Relay Checking Enable DNS Server/Relay will enable the DNS relay feature so clients can be configured
with the console server's IP for their DNS server setting, and the console server will forward the DNS
queries to the real DNS server.
Web Terminal Checking Enable Web Terminal will allow web browser access to the system command line shell
via Manage -> Terminal.
Specify alternate port numbers for Raw TCP, direct Telnet/SSH and unauthenticated Telnet services. The console
server uses specific default ranges for the TCP/IP ports for the various access services that Users and
Administrators can use to access devices attached to serial ports (as covered in Chapter 4 – Configuring Serial
Ports). The Administrator can also set alternate ranges for these services, and these secondary ports will then be
used in addition to the defaults.
The default TCP/IP base port address for telnet access is 2000, and the range for telnet is IP Address: Port (2000
+ serial port #) i.e. 2001 – 2048. So if the Administrator were to set 8000 as a secondary base for telnet then serial
port #2 on the console server can be telnet accessed at IP Address:2002 and at IP Address:8002. The default base
for SSH is 3000; for Raw TCP is 4000; and for RFC2217 it is 5000
A number of other services can be enabled and configured indirectly from this menu by selecting Click here to
configure:
Click Apply. As you apply your services selections, the screen will be updated with a confirmation message:
Message Changes to configuration succeeded
The Services Access settings can now be set to allow or block access. This specifies which (enabled) services the
Administrator can use over each network interface - to connect to the console server and through the console server to
attached serial and network connected devices.
Select the Service Access tab on the System: Services page.
Note With firmware releases pre 3.5.3 the Service Access tab is found on the System: Firewall page
This will display the services currently enabled for the console server’s network interfaces. Depending on the
particular console server model the interfaces displayed may include :
Network interface (for the principal Ethernet connection)
Management LAN/ OOB Failover (second Ethernet connections)
Dialout/Cellular (V90 and 3G modem)
Dial-in (internal or external V90 modem)
Wi-Fi (802.11 wireless)
The Respond to ICMP echos (i.e. ping) service access options that can be configured at this stage. This allows
the console server to respond to incoming ICMP echo requests. Ping is enabled by default, however for security
reasons this service should generally be disabled post initial configuration
You can also configure to allow serial port devices to be accessed from nominated network interfaces using Raw
TCP, direct Telnet/SSH, unauthenticated Telnet services etc
SDT Connector is a light weight tool that enables Users and Administrators to securely access the Console server, and
the various computers, network devices and appliances that may be serially or network connected to the console server.
SDT Connector is a Java client program that couples the trusted SSH tunneling protocol with popular access tools such
as Telnet, SSH, HTTP, HTTPS, VNC, RDP to provide point-and-click secure remote management access to all the
systems and devices being managed.
Information on using SDT Connector for browser access to the console server’s Management Console, Telnet/SSH
access to the console server command line, and TCP/UDP connecting to hosts that are network connected to the console
server can be found in Chapter 6 - Secure Tunneling
SDT Connector can be installed on Windows 2000, XP, 2003, 7, Vista PCs and on most Linux, UNIX and Solaris.
3.5.2 PuTTY
Communications packages like PuTTY can be also used to connect to the Console server command line (and to connect
serially attached devices as covered in Chapter 4). PuTTY is a freeware implementation of Telnet and SSH for Win32 and
UNIX platforms. It runs as an executable application without needing to be installed onto your system. PuTTY (the Telnet
and SSH client itself) can be downloaded at http://www.tucows.com/preview/195286.html
To use PuTTY for an SSH terminal session from
a Windows client, you enter the console server’s
IP address as the ‘Host Name (or IP address)’
To access the console server command line you
select ‘SSH’ as the protocol, and use the default
IP Port 22
Click ‘Open’ and you will be presented with the
console server login prompt. (You may also
receive a ‘Security Alert’ that the host’s key is not
cached, you will need to choose ‘yes’ to
continue.)
Using the Telnet protocol is similarly simple - but
you use the default port 23
Note The second Ethernet port (Network/LAN2) on the IM4200, IM7200, ACM5508-2-I/M and ACM5004-2 can be
configured as either a Management LAN gateway port or it can be configured as an OOB/Failover port. It cannot
be both. So ensure you did not allocate Network/LAN 2 as the Failover Interface when you configured the
principal Network connection on the System: IP menu.
The ACM5504-5-G-I, ACM5504-5-LA/LR/LV-I, ACM5504-5-G-W-I and IM4216-34 console server models have an
integrated four or thirty-two port management LAN switches (with firewall, router, DHCP server and switch functions).
The IM4216-34 is normally configured to have an active 32 port Management LAN (Ethernet 1-32) switch plus have
Network 2 configured for OOB or Failover
The ACM5504-5-G-W-I and AM5504-5-G-I similarly is normally be configured with an active Management LAN.
This can be a 4 port (ETH1-4) Management LAN switch, or a 3 port (ETH2-4) switch with ETH 1 configured for
OOB/Failover
The above Management LAN features are all disabled by default. To configure the Management LAN gateway:
Select the Management LAN Interface page on the System: IP menu and uncheck Disable
Configure the IP Address and Subnet Mask for the Management LAN (but leave the DNS fields blank)
Click Apply
The management gateway function is now enabled with default firewall and router rules. By default these rules are
configured so the Management LAN can only be accessible by SSH port forwarding. This ensures the remote and local
Enter the Gateway address that is to be issued to the DHCP clients. If this field is left blank, the console server’s
IP address will be used
Enter the Primary DNS and Secondary DNS address to issue the DHCP clients. Again if this field is left blank,
console server’s IP address is used, so leave this field blank for automatic DNS server assignment
Optionally enter a Domain Name suffix to issue DHCP clients
Enter the Default Lease time and Maximum Lease time in seconds. The lease time is the time that a
dynamically assigned IP address is valid before the client must request it again
Click Apply
The DHCP server will sequentially issue IP addresses from a specified address pool(s):
Click Add in the Dynamic Address Allocation Pools field
Enter the DHCP Pool Start Address and End Address and click Apply
The DHCP server also supports pre-assigning IP addresses to be allocated only to specific MAC addresses and reserving
IP addresses to be used by connected hosts with fixed IP addresses. To reserve an IP addresses for a particular host:
Click Add in the Reserved Addresses field
Enter the Hostname, the Hardware Address (MAC) and the Statically Reserved IP address for the DHCP client
and click Apply
When DHCP has initially allocated hosts addresses it is recommended to copy these into the pre-assigned list so the
same IP address will be reallocated in the event of a reboot.
Click Apply. You have selected the failover method however it is not active until you have specified the external
sites to be probed to trigger failover, and set up the failover ports themselves. This is covered in Chapter 5.
Note The ACM5504-5-G(-W)-I and IM4216-34 can be configured with an active Management LAN/gateway and with
one of the switched Ethernet ports configured for OOB/Failover (ETH 1 on the ACM5504-5-G(-W)-I or NETOWRK
2 on the IM4216-34). However with the other IM4200, IM7200, ACM5508-2 and ACM5004-2 models, the second
Ethernet port can be configured as either a gateway port or as an OOB/Failover port, but not both. So ensure you
did not enable the Management LAN function on Network/LAN 2
All the IM7200 models and the ACM5504-5-G-W-I have an internal 802.11 WiFi adapter and come with an external WiFi
antenna. The WiFi can be configured as a Wi-Fi Wireless Access Point (WAP) or as a Wi-Fi client. The inbuilt WiFi is
inactive by default. If you wish to use the WiFi facility you will need to attach the WiFi antenna (and any auxiliary WiFi
antenna you may have ordered).
Note: The custom ACM5003-W model also has an internal wireless adapter, however this can only operate as a client.
To activate and configure the Wireless Access Point functionality, navigate to the System: IP page and then click
the Wireless Network Interface tab
WAP configuration:
Configure the IP Settings for the Wireless Network. Generally, if the device is being used as a Wireless AP, a
static address is set here in the IP Settings. In this example, 192.168.10.1 is used. Set the IP address, and the
netmask (in this case, 255.255.255.0 to give 254 unique network addresses in subnet), but do not fill in the
Gateway, Primary DNS and Secondary DNS. These settings are used if the interface is to be the primary network
link to the outside world, or if it will be used for failover.
Select Wireless AP, which will make the Wireless AP Settings section visible:
Country: Select the correct country from the list. If the country does not appear, select the World Regulatory
Domain
Broadcast SSID: Tick this to broadcast the SSID. This should generally done, disabling broadcast is not a
security measure
Network Channel: Select the network channel. 6 is most commonly used, so it is best to do a site survey and
pick another channel if the unit is being deployed into an office environment
Hardware Mode: The unit supports 802.11b,g and single band 802.11n. In most cases, selection 802.11b/g/n
will provide for the best interoperability with other hardware.
Supported Authentication Methods: Select the authentication method for the AP. If the client equipment
supports it, it is always best to selecte WPA/WPA2 and AES encryption. WEP and WPA with TKIP have
been proven vulnerable to cryptanalysis.
If WEP is selected:
WEP Mode: Select Open System or Shared System. Open System is more secure than Shared, due to
the way encryption keys are used.
WEP Key Length: Select the WEP key length. 128 bit keys offer more security, but are not supported on
all devices. WEP Keys must be entered in Hexidecimal.
Default Transmit Key: This selects the default transmit key for the network
If WPA/WPA2 is selected:
WPA/WPA2 Encryption Methods: Select one or both of TKIP or AES for encrypting WPA/WPA2
connections. AES is more secure, and is required for the AP to advertise itself as 802.11n if that hardware
mode is selected
WPA Password: The password that clients will use to connect to the AP.
Once the Wireless AP Settings have been filled out, click Apply, then wait for the page to refresh.
The next step is to set up a DHCP server for the wireless clients. Click the link next to DHCP Server in the IP
settings section, or go to System: DHCP Server page. More information on configuring DHCP can be found in
Chapter 3.6.2
Note The Wireless screen on the Status: Statistics page shows the list of clients that are connected to the WAP
Select Wireless Client in the Wireless Settings section - which will make the Wireless Client Settings section
visible
Note: The Wireless screen in Status: Statistics will display all the locally accessible wireless LANs (with SSID and
Encryption/Authentication settings). You can also use this screen to confirm you have successfully connected to
the selected access point - refer Chapter 12
The console server enables access and control of serially-attached devices and network-attached devices (hosts). The
Administrator must configure access privileges for each of these devices, and specify the services that can be used to
control the devices. The Administrator can also set up new users and specify each user’s individual access and control
privileges.
This chapter covers each of the steps in configuring network connected and serially attached devices:
Serial Ports – setting up protocols used serially connected devices
Users & Groups – setting up users and defining the access permissions for each of these users
Authentication – this is covered in more detail in Chapter 9
Network Hosts – configuring access to local network connected computers or appliances (hosts)
Configuring Trusted Networks - nominate specific IP addresses that trusted users access from
Cascading and Redirection of Serial Console Ports
Connecting to Power (UPS PDU and IPMI) and Environmental Monitoring (EMD) devices
Serial Port Redirection – using the PortShare windows and Linux clients
Managed Devices - presents a consolidated view of all the connections
IPSec – enabling VPN connection
OpenVPN
PPTP
v. Serial Bridge mode enables the transparent interconnection of two serial port devices over a network
Select Serial & Network: Serial Port and you will see details of the serial ports that are currently set up
By default each serial port is set in Console Server mode. For the port to be reconfigured click Edit
When you have reconfigured the common settings (Chapter 4.1.1) and the mode (Chapters 4.1.2 - 4.1.6) for each
port, you set up any remote syslog (Chapter 4.1.7), then click Apply
Note If you wish to set the same protocol options for multiple serial ports at once click Edit Multiple Ports and select
which ports you wish to configure as a group
If the console server has been configured with distributed Nagios monitoring enabled then you will also be
presented with Nagios Settings options to enable nominated services on the Host to be monitored (refer Chapter
10 – Nagios Integration)
Set the Port Pinout. This menu item only presents for IM7200 ports where pin-out for each RJ45 serial port can be
set as either X2 (Cisco Straight) or X1 (Cisco Rolled)
Before proceeding with further serial port configuration, you should connect the ports to the serial devices they will
be controlling, and ensure they have matching settings
Note The serial ports are all set at the factory to RS-232 9600 baud, no parity, 8 data bits, 1 stop bit and Console
Server Mode. The baud rate can be changed to 2400 – 230400 baud using the management console. Lower
baud rates (50, 75, 110, 134, 150, 200, 300, 600, 1200, 1800 baud) can be configured from the command line.
Refer Chapter 14 – Basic Configuration (Linux Commands)
Logging Level This specifies the level of information to be logged and monitored (refer Chapter 7 - Alerts and Logging)
Telnet When the Telnet service is enabled on the console server, a Telnet client on a User’s or Administrator’s computer
can connect to a serial device attached to this serial port on the console server. The Telnet communications are
unencrypted so this protocol is generally recommended only for local or VPN tunneled connections.
With Win2000/XP/NT you can run telnet from the command prompt (cmd.exe). Windows 7 and Vista come with a
Telnet client but it is not enabled by default. You can install it by following the simple steps below.
o Click the Start button , click Control Panel, click Programs, and then click Turn Windows features on
or off. If you are prompted for an administrator password or confirmation, type the password or
provide confirmation.
o In the Windows Features dialog box, select the Telnet Client check box.
If the remote communications are being tunneled with SDT Connector, then Telnet can be used for securely
accessing these attached devices (refer Note below).
Note In Console Server mode, Users and Administrators can use SDT Connector to set up secure Telnet connections
that are SSH tunneled from their client computers to the serial port on the console server. SDT Connector can be
installed on Windows 7, 2000, XP, 2003, Vista PCs and on most Linux platforms and it enables secure Telnet
connections to be selected with a simple point-and-click.
To use SDT Connector to access consoles on the console server serial ports, you configure SDT Connector with
the console server as a gateway, then as a host, and you enable Telnet service on Port (2000 + serial port #) i.e.
2001–2048. Refer Chapter 6 for more details on using SDT Connector for Telnet and SSH access to devices that
are attached to the console server serial ports.
You can also use standard communications packages like PuTTY to set a direct Telnet (or SSH) connection to the serial
ports (refer Note below):
Note PuTTY also supports Telnet (and SSH) and the procedure to set up a Telnet session is simple. Enter the console
server’s IP address as the ‘Host Name (or IP address)’. Select ‘Telnet’ as the protocol and set the ‘TCP port’ to
2000 plus the physical serial port number (i.e. 2001 to 2048).
Click the ‘Open’ button. You may then receive a ‘Security Alert’ that the host’s key is not cached, you will need to
choose ‘yes’ to continue. You will then be presented with the login prompt of the remote system connected to the
serial port chosen on the console server. You can login as normal and use the host serial console screen.
Note In Console Server mode, when you connect through to a serial port you connect via pmshell. To will generate a
BREAK on the serial port you need to type the character sequence '~b' (and if you're doing this over SSH you'll
need to type "~~b")
SSH It is recommended that you use SSH as the protocol where the User or Administrator connects to the console
server (or connects through the console server to the attached serial consoles) over the Internet or any other
public network. This will provide authenticated SSH communications between the SSH client program on the
remote user’s computer and the console server, so the user’s communication with the serial device attached to
the console server is secure
For SSH access to the consoles on devices attached to the console server serial ports, you can use SDT
Connector. You configure SDT Connector with the console server as a gateway, then as a host, and you enable
SSH service on Port (3000 + serial port #) i.e. 3001-3048. Chapter 6 - Secure Tunneling has more information
on using SDT Connector for SSH access to devices that are attached to the console server serial ports.
Also you can use common communications packages, like PuTTY or SSHTerm to SSH connect directly to port
address IP Address _ Port (3000 + serial port #) i.e. 3001–3048
Alternately SSH connections can be configured using the standard SSH port 22. The serial port being
accessed is then identified by appending a descriptor to the username. This syntax supports any of:
<username>:<portXX>
<username>:<port label>
<username>:<ttySX>
<username>:<serial>
So for a User named 'fred' to access serial port 2, when setting up the SSHTerm or the PuTTY SSH client,
instead of typing username = fred and ssh port = 3002, the alternate is to type username = fred:port02 (or
username = fred:ttyS1) and ssh port = 22.
This syntax enables Users to set up SSH tunnels to all serial ports with only a single IP port 22 having to be
opened in their firewall/gateway
Note In Console Server mode, when you connect through to a serial port you connect via pmshell. To will generate a
BREAK on the serial port if you're connected over SSH, you'll need to type the character sequence "~~b"
TCP RAW TCP allows connections directly to a TCP socket. However while communications programs like PuTTY
also supports RAW TCP, this protocol would usually be used by a custom application
For RAW TCP, the default port address is IP Address _ Port (4000 + serial port #) i.e. 4001 – 4048
RAW TCP also enables the serial port to be tunneled to a remote console server, so two serial port devices can
be transparently interconnect over a network (see Chapter 4.1.6 – Serial Bridging)
RFC2217 Selecting RFC2217 enables serial port redirection on that port. For RFC2217, the default port address is IP
Address _ Port (5000 + serial port #) i.e. 5001 – 5048
Special client software is available for Windows UNIX and Linux that supports RFC2217 virtual com ports, so a
remote host can monitor and manage remote serially attached devices, as though they were connected to the
local serial port (see Chapter 4.6 – Serial Port Redirection for details)
RFC2217 also enables the serial port to be tunneled to a remote console server, so two serial port devices can
be transparently interconnect over a network (see Chapter 4.1.6 – Serial Bridging)
Unauthenticated Telnet Selecting Unauthenticated Telnet enables telnet access to the serial port without requiring the
user to provide credentials. When a user accesses the console server to telnet to a serial port they normally are
given a login prompt. However with unauthenticated telnet they connect directly through to port with any console
server login at all. This mode is mainly used when you have an external system (such as conserver) managing
user authentication and access privileges at the serial device level.
For Unauthenticated Telnet the default port address is IP Address _ Port (6000 + serial port #) i.e. 6001 – 6048
Web Terminal Selecting Web Terminal enables web browser access to the serial port via Manage: Devices: Serial
using the Management Console's built in AJAX terminal. Web Terminal connects as the currently
authenticated Management Console user and does not re-authenticate. See section 13.3 for more details.
Authenticate Enable for secure serial communications using Portshare and add password
Accumulation Period By default once a connection has been established for a particular serial port (such as a RFC2217
redirection or Telnet connection to a remote computer) then any incoming characters on that port are forwarded
over the network on a character by character basis. The accumulation period changes this by specifying a period
of time that incoming characters will be collected before then being sent as a packet over the network
Escape Character This enables you to change the character used for sending escape characters. The default is ~.
Power Menu This setting enables the shell power command so a user can control the power connection to a Managed
Device from command line when they are telnet or ssh connected to the device. To operate the Managed Device
must be set up with both its Serial port connection and Power connection configured. The command to bring up
the power menu is ~p
Single Connection This setting limits the port to a single connection so if multiple users have access privileges for a
particular port only one user at a time can be accessing that port (i.e. port “snooping” is not permitted)
For configuration details refer to Chapter 6.6 - Using SDT Connector to Telnet or SSH connect to devices that are serially
attached to the console server
The getty will then configure the port and wait for a connection to be made. An active connection on a serial device is usually
indicated by the Data Carrier Detect (DCD) pin on the serial device being raised. When a connection is detected, the getty
program issues a login: prompt, and then invokes the login program to handle the actual system login.
Note Selecting Terminal Server mode will disable Port Manager for that serial port, so data is no longer logged for alerts
etc.
Select Serial Bridging Mode and specify the IP address of the Server console server and the TCP port address of
the remote serial port (for RFC2217 bridging this will be 5001-5048)
By default the bridging client will use RAW TCP so you must select RFC2217 if this is the console Server mode you
have specified on the server console server
You may secure the communications over the local Ethernet by enabling SSH however you will need to generate
and upload keys (refer Chapter 14 – Advanced Configuration)
4.1.7 Syslog
In addition to inbuilt logging and monitoring (which can be applied to serial-attached and network-attached management
accesses, as covered in Chapter 7 - Alerts and Logging) the console server can also be configured to support the remote
syslog protocol on a per serial port basis:
Select the Syslog Facility/Priority fields to enable logging of traffic on the selected serial port to a syslog server;
and to appropriately sort and action those logged messages (i.e. redirect them/ send alert email etc.)
For example if the computer attached to serial port 3 should never send anything out on its serial console port, the
Administrator can set the Facility for that port to local0 (local0 .. local7 are meant for site local values), and the Priority to
critical. At this priority, if the console server syslog server does receive a message, it will automatically raise an alert.
Refer to Chapter 7 - Alerts & Logging
The Common Settings (baud rate etc.) are ignored when configuring the NMEA “serial port”. However you can specify the
Fix Frequency (i.e. this GPS fix rate determines how often GPS fixes are obtained). You can also apply all the Console
Server Mode, Syslog and Serial Bridging settings to this port.
Note: The NMEA Streaming menu item should display on the Serial & Network: Serial Port menu. However for earlier
revision ACM5004-G-I units you may need to update the setfset settings from the command line:
setfset -r lists all of the current feature set variables. You look for the factory_opts variable, and then add 3g-gps
to it. For example, factory_opts=rs485,3g,ind. To update it to 3g-gps, you do the following:
setfset -u factory_opts=rs485,3g-gps,ind. Then run setfset -r again, and make sure you can see the update
You can use pmshell, webshell, SSH, RFC2217 or RawTCP to get at the stream:
Note: This GPS support is also available for IM4200-G with an internal cellular modem. The NMEA data stream
presents on ports 9/17/33/49 for the IM4208/16/32/48 models. However GPS support is not available for devices
with an externally attached cellular modem.
For configuration and control these USB consoles are presented as new “serial ports”. So for an ACM5504-5-G with
cellular GPS configured on Port 5 (as shown above) any Cisco USB console ports would present as Port 6 and 7. For the
IM4200 (without any internal GPS modem functions) any configured Cisco USB console ports would presents on ports
9&10/17&18/33&34/49&50 for the IM4208/16/32/48 models.
The Common Settings (baud rate etc.) are ignored when configuring the Cisco USB “serial port”. However you can apply
all the Console Server Mode, Syslog and Serial Bridging settings to this port.
Note: The Cisco USB console must be manually configured on initial connection. However any USB console
disconnection is auto-detected. USB console re-connection on the same physical USB port will also be auto-
detected, but only if the console server has been power cycled.
Users can be authorized to access specified services, serial ports, power devices and specified network-attached hosts.
These users can also be given full Administrator status (with full configuration and management and access privileges).
Note: 1. Membership of the admin group provides the user with full Administrator privileges. The admin user
(Administrator) can access the console server using any of the services which have been enabled in System:
Services e.g. if only HTTPS has been enabled then the Administrator can only access the console server
using HTTPS. However once logged in they can reconfigure the console server settings (e.g. to enabled
HTTP/Telnet for future access). They can also access any of the connected Hosts or serial port devices
using any of the services that have been enabled for these connections. But again the Administrator can
reconfigure the access services for any Host or serial port. So only trusted users should have Administrator
access
2. Membership of the user group provides the user with limited access to the console server and connected
Hosts and serial devices. These Users can access only the Management section of the Management Console
menu and they have no command line access to the console server. They also can only access those Hosts
and serial devices that have been checked for them, using services that have been enabled
3. If a user is set up with pptd, dialin, ftp or pmshell group membership they will have restricted user shell
access to the nominated managed devices but they will not have any direct access to the console server
itself. To add this the users must also be a member of the "users" or "admin" groups
4. The Administrator can also set up additional Groups with specific power device, serial port and host access
permissions. However users in these additional groups don’t have any access to the Management Console
menu nor do they have any command line access to the console server itself.
5. The Administrator can also set up users with specific power device, serial port and host access permissions,
who are not a member of any Groups. Similarly these users don’t have any access to the Management
Console menu nor do they have any command line access to the console server itself.
6. For convenience the SDT Connector “Retrieve Hosts” function retrieves and auto-configures checked serial
ports and checked hosts only, even for admin group users
To set up new Groups and new users, and to classify users as members of particular Groups:
Select Serial & Network: Users & Groups to display the configured Groups and Users
Click Add Group to add a new Group
Add a Group name and Description for each new Group, then nominate the Accessible Hosts, Accessible
Ports and Accessible RPC Outlet(s) that you wish any users in this new Group to be able to access
Click Apply
The Administrator can Edit or Delete any added group
Add a Username for each new user. You may also include information related to the user (e.g. contact details) in
the Description field
Note The User Name can contain from 1 to 127 alphanumeric characters (however you can also use the special
characters "-" "_" and "." )
Specify which Group (or Groups) you wish the user to be a member of
Add a confirmed Password for each new user
Note There are no restrictions on the characters that can be used in the user Password (which each can contain up to
254 characters). However only the first eight Password characters are used to make the password hash.
SSH pass-key authentication can be used. This is more secure than password based authentication. Paste the
public keys of authorized public/private keypairs for this user in the Authorized SSH Keys field
Check Disable Password Authentication if you wish to only allow public key authentication for this user when
using SSH
Check Enable Dial-Back in the Dial-in Options menu to allow an out-going dial-back connection to be triggered
by logging into this port. Enter the Dial-Back Phone Number with the phone number to call-back when user logs
in
Check specific Accessible Hosts and/or Accessible Ports to nominate the serial ports and network connected
hosts you wish the user to have access privileges to
If there are configured RPCs you can check Accessible RPC Outlets to specify which outlets the user is able to
control (i.e. Power On/Off)
Click Apply. The new user will now be able to access the Network Devices, Ports and RPC Outlets you
nominated as accessible plus, if the user is a Group member they can also access any other device/port/outlet
that was set up as accessible to the Group
Note There are no specific limits on the number of users you can set up; nor on the number of users per serial port or
host. So multiple users (Users and Administrators) can control /monitor the one port or host. Similarly there are no
specific limits on the number of Groups and each user can be a member of a number of Groups (in which case
they take on the cumulative access privileges of each of those Groups). A user does not have to be a member of
any Groups (but if the User is not even a member of the default user group then they will not be able to use the
Management Console to manage ports).
Note that while there are no specific limits the time to re-configure does increase as the number and complexity
increases so we recommend the aggregate number if users and groups be kept under 250
The Administrator can also edit the access settings for any existing users:
Select Serial & Network: Users & Groups and click Edit to modify the User access privileges
Alternately click Delete to remove the User or click Disable to temporarily block any access privileges
Note For more information on enabling the SDT Connector so each user has secure tunneled remote
RPD/VNC/Telnet/HHTP/HTTPS/SoL access to the network connected hosts refer Chapter 6.
4.3 Authentication
Refer to Chapter 9.1 - Remote Authentication Configuration for authentication configuration details
Selecting Serial & Network: Network Hosts presents all the network connected Hosts that have been enabled for
access, and the related access TCP ports/services
Click Add Host to enable access to a new Host (or select Edit to update the settings for existing Host)
Enter the IP Address or DNS Name and a Host Name (up to 254 alphanumeric characters) for the new network
connected Host (and optionally enter a Description -up to characters)
Add or edit the Permitted Services (or TCP/UDP port numbers) that are authorized to be used in controlling this
host. Only these permitted services will be forwarded through by SDT to the Host. All other services (TCP/UDP
ports) will be blocked.
The Logging Level specifies the level of information to be logged and monitored for each Host access (refer
Chapter 7 - Alerts and Logging)
If the Host is a PDU or UPS power device or a server with IPMI power control, then specify RPC (for IPMI and PDU)
or UPS and the Device Type. The Administrator can then configure these devices and enable which users have
permissions to remotely cycle power etc. (refer Chapter 8). Otherwise leave the Device Type set to None
If the console server has been configured with distributed Nagios monitoring enabled then you will also be
presented with Nagios Settings options to enable nominated services on the Host to be monitored (refer Chapter
10 – Nagios Integration)
Click Apply. This will create the new Host and also create a new Managed Device (with the same name)
Note In the absence of Rules, there are no access limitations as to the IP address at which Users or Administrators can
be located.
Click Apply
Note The above Trusted Networks will limit access by Users and Administrators to the console serial ports. However they
do not restrict access by the Administrator to the console server itself or to attached hosts. To change the default
settings for this access, you will to need to edit the IPtables rules as described in the Chapter 14 - Advanced.
Next you must select whether to generate keys using RSA and/or DSA (if unsure, select only RSA). Generating each set
of keys will require approximately two minutes and the new keys will destroy any old keys of that type that may previously
been uploaded. Also while the new generation is underway on the master functions relying on SSH keys (e.g. cascading)
may stop functioning until they are updated with the new set of keys. To generate keys:
Select RSA Keys and/or DSA Keys
Click Apply
Note If you do not already have RSA or DSA key pair and you do not wish to use you will need to create a key pair
using ssh-keygen, PuTTYgen or a similar tool as detailed in Chapter 15.6
To manually upload the key public and private key pair to the Master console server:
Select System: Administration on Master’s Management Console
Browse to the location you have stored RSA (or DSA) Public Key and upload it to SSH RSA (DSA) Public Key
Browse to the stored RSA (or DSA) Private Key and upload it to SSH RSA (DSA) Private Key
Click Apply
Next, you must register the Public Key as an Authorized Key on the Slave. In the simple case with only one Master with
multiple Slaves, you need only upload the one RSA or DSA public key for each Slave.
Note The use of key pairs can be confusing as in many cases one file (Public Key) fulfills two roles – Public Key and
Authorized Key. For a more detailed explanation refer the Authorized Keys section of Chapter 15.6. Also refer to
this chapter if you need to use more than one set of Authorized Keys in the Slave
Once the SSH connection has been established you will be asked to accept the key. Answer yes and the fingerprint will
be added to the list of known hosts. For more details on Fingerprinting refer Chapter 15.6
If you are asked to supply a password, then there has been a problem with uploading keys. The keys should
remove any need to supply a password
Select Serial & Network: Cascaded Ports on the Master’s Management Console:
To add clustering support select Add Slave
Note You will be prevented from adding any Slaves until you have automatically or manually generated SSH keys:
Select the appropriate Serial & Network: Users & Groups to add new users with access privileges to the Slave
serial ports (or to extend existing users access privileges)
Select the appropriate Serial & Network: Trusted Networks to specify network addresses that can access
nominated Slave serial ports
Select the appropriate Alerts & Logging: Alerts to configure Slave port Connection, State Change or Pattern
Match alerts
The configuration changes made on the Master are propagated out to all the Slaves when you click Apply.
Opengear’s Port Share software delivers the virtual serial port technology your Windows and Linux applications need to
open remote serial ports and read the data from serial devices that are connected to your console server.
PortShare is supplied free with each console server and you are licensed to install PortShare on one or more
computers for accessing any serial device connected to a console server port.
PortShare for Windows
The portshare_setup.exe program is included on the CD supplied with your console server. A copy can be freely
downloaded from the ftp site. Refer to the PortShare User Manual and Quick Start for details on installation and
operation
PortShare for Linux
The PortShare driver for Linux maps the console server serial port to a host try port. Opengear has released the
portshare-serial-client as an open source utility for Linux, AIX, HPUX, SCO, Solaris and UnixWare. This utility can be
freely downloaded from the ftp site.
This PortShare serial port redirector allows you to use a serial device connected to the remote console server as if it
were connected to your local serial port. The portshare-serial-client creates a pseudo tty port, connects the serial
application to the pseudo tty port, receives data from the pseudo tty port, transmits it to the console server through
network and receives data from the console server through network and transmits it to the pseudo-tty port.
The .tar file can be freely downloaded from the ftp site. Refer to the PortShare User Manual and Quick Start for details
on installation and operation.
Managed Devices presents a consolidated view of all the connections to a device that can be accessed and monitored
through the console server. To view the connections to the devices:
This screen displays all the Managed Device with their Description/Notes and lists of all the configured Connections:
- Serial Port # (if serially connected) or
- USB (if USB connected)
- IP Address (if network connected)
- Power PDU/outlet details (if applicable) and any UPS connections
Devices such as servers will commonly have more than one power connections (e.g. dual power supplied) and more than
one network connection (e.g. for BMC/service processor).
All users can view (but not edit) these Managed Device connections by selecting Manage: Devices. Whereas the
Administrator can edit and add/delete these Managed Devices and their connections.
To edit an existing device and add a new connection:
Select Edit on the Serial&Network: Managed Devices and click Add Connection
Select the connection type for the new connection (Serial, Network Host, UPS or RPC) and then select the
specific connection from the presented list of configured unallocated hosts/ports/outlets
corresponding new Managed Device (with the same Name /Description as the RPC/UPS Host) is not created until
this connection step is completed (refer Chapter8 - Power and Environment)
Note The outlet names on this newly created PDU will by default be “Outlet 1” “Outlet 2”. When you connect an
particular Managed Device (that draws power from the outlet) they the outlet will then take up the name of the
powered Managed Device
Click Add Connection and select Serial and the Port that connects to the Managed Device
To add a UPS/RPC power connection or network connection or another serial connection click Add Connection
Click Apply
Note To set up a new serially connected RPC UPS or EMD device, you configure the serial port, designate it as a
Device then enter a Name and Description for that device in the Serial & Network: RPC Connections (or UPS
Connections or Environmental). When applied, this will automatically create a corresponding new Managed
Device with the same Name /Description as the RPC/UPS Host (refer Chapter8 - Power and Environment)
Also all the outlet names on the PDU will by default be “Outlet 1” “Outlet 2”. When you connect a particular
Managed Device (that draws power from the outlet) then the outlet will then take up the name of the powered
Managed Device
Users and administrators at the central office can then securely access the remote console servers and
connected serial console devices and machines on the Management LAN subnet at the remote location as
though they were local
All these remote console servers can then be monitored with a CMS6000 on the central network
With serial bridging, serial data from controller at the central office machine can be securely connected to the
serially controlled devices at the remote sites (refer Chapter 4.1)
The road warrior administrator can use a VPN IPsec software client such as TheGreenBow
(www.thegreenbow.com/vpn_gateway.html) or Shrew Soft (www.shrew.net/support ) to remotely access the advanced
console server and every machine on the Management LAN subnet at the remote location
Configuration of IPsec is quite complex so Opengear provides a simple GUI interface for basic set up as described below.
However for more detailed information on configuring Openswan IPsec at the command line and interconnecting with
other IPsec VPN gateways and road warrior IPsec software refer http://wiki.openswan.org and
http://opengear.com/faq.html
Enter any descriptive name you wish to identify the IPsec Tunnel you are adding such as WestStOutlet-VPN
Select the Authentication Method to be used, either RSA digital signatures or a Shared secret (PSK)
o If you select RSA you will asked to click here to generate keys. This will generate an RSA public key for
the console server (the Left Public Key). You will need to find out the key to be used on the remote
gateway, then cut and paste it into the Right Public Key
o If you select Shared secret you will need to enter a Pre-shared secret (PSK). The PSK must match the
PSK configured at the other end of the tunnel
Enter a Left ID and Right ID. This is the identifier that the Local host/gateway and remote host/gateway use for
IPsec negotiation and authentication. Each ID must include an ‘@’ and can include a fully qualified domain name
preceded by ‘@’ ( e.g. [email protected] )
Enter the public IP or DNS address of this Opengear VPN gateway (or if not an ACM5004-G or ACM5504-5-G-I
enter the address of the gateway device connecting it to the Internet) as the Left Address. You can leave this
blank to use the interface of the default route
In Right Address enter the public IP or DNS address of the remote end of the tunnel (only if the remote end has
a static or dyndns address). Otherwise leave this blank
If the Opengear VPN gateway is serving as a VPN gateway to a local subnet (e.g. the console server has a
Management LAN configured) enter the private subnet details in Left Subnet. Use the CIDR notation (where the
IP address number is followed by a slash and the number of ‘one’ bits in the binary notation of the netmask). For
example 192.168.0.0/24 indicates an IP address where the first 24 bits are used as the network address. This is
the same as 255.255.255.0. If the VPN access is only to the console server itself and to its attached serial
console devices then leave Left Subnet blank
If there is a VPN gateway at the remote end, enter the private subnet details in Right Subnet. Again use the
CIDR notation and leave blank if there is only a remote host
Select Initiate Tunnel if the tunnel connection is to be initiated from the Left console server end. This can only be
initiated from the VPN gateway (Left) if the remote end was configured with a static (or dyndns) IP address
Note It is essential the configuration details set up on the advanced console server (referred to as the Left or Local
host) exactly matches the set up entered when configuring the Remote (Right) host/gateway or software client.
Refer to the http://www.opengear.com/faq.html for details on configuring these remote ends
4.10 OpenVPN
The ACM5500, ACM5000, IM7200 and IM4200 family of advanced console servers with Firmware V3.2 and later, include
OpenVPN which is based on TSL (Transport Layer Security) and SSL (Secure Socket Layer). With OpenVPN, it is easy
to build cross-platform, point-to-point VPNs using x509 PKI (Public Key Infrastructure) or custom configuration files.
OpenVPN allows secure tunneling of data through a single TCP/UDP port over an unsecured network, thus providing
secure access to multiple sites and secure remote administration to a console server over the Internet.
OpenVPN also allows the use of Dynamic IP addresses by both the server and client thus providing client mobility. For
example, an OpenVPN tunnel may be established between a roaming windows client and an Opengear advanced
console server within a data center.
Configuration of OpenVPN can be complex so Opengear provides a simple GUI interface for basic set up as described
below. However for more detailed information on configuring OpenVPN Access server or client refer to the HOW TO and
FAQs at http://www.openvpn.net
Select the Device Driver to be used, either Tun-IP or Tap-Ethernet. The TUN (network tunnel) and TAP (network
tap) drivers are virtual network drivers that support IP tunneling and Ethernet tunneling, respectively. TUN and
TAP are part of the Linux kernel.
Select either UDP or TCP as the Protocol. UDP is the default and preferred protocol for OpenVPN.
In Tunnel Mode, nominate whether this is the Client or Server end of the tunnel. When running as a server, the
advanced console server supports multiple clients connecting to the VPN server over the same port.
In Configuration Method, select the authentication method to be used. To authenticate using certificates select
PKI (X.509 Certificates) or select Custom Configuration to upload custom configuration files. Custom
configurations must be stored in /etc/config.
Note: If you select PKI (public key infrastructure) you will need to establish:
Separate certificate (also known as a public key). This Certificate File will be a *.crt file type
Private Key for the server and each client. This Private Key File will be a *.key file type
Master Certificate Authority (CA) certificate and key which is used to sign each of the server and client
certificates. This Root CA Certificate will be a *.crt file type
For a server you may also need dh1024.pem (Diffie Hellman parameters). Refer http://openvpn.net/easyrsa.html for a
guide to basic RSA key management. For alternative authentication methods see
Select the Manage OpenVPN Files tab. Upload or browse to relevant authentication certificates and files.
Apply to save changes. Saved files will be displayed in red on the right-hand side of the Upload button.
Note: Please make sure that the console server system time is correct when working with OpenVPN. Otherwise
authentication issues may arise
Select Statistics on the Status menu to verify that the tunnel is operational.
Console servers with firmware V3.5.2 and later will generate Windows client config automatically from the GUI – for Pre-
shared Secret (Static Key File) configurations.
Alternately OpenVPN GUI for Windows software (which includes the standard OpenVPN package plus a Windows GUI)
can be downloaded from http://openvpn.se/download.html.
Once installed on the Windows machine, an OpenVPN icon will have been created in the Notification Area
located in the right side of the taskbar. Right click on this icon to start (and stop) VPN connections, and to edit
configurations and view logs
When the OpenVPN software is started, the C:\Program Files\OpenVPN\config folder will be scanned for “.opvn” files.
This folder will be rechecked for new configuration files whenever the OpenVPN GUI icon is right-clicked. So once
OpenVPN is installed, a configuration file will need to be created:
Using a text editor, create an xxxx.ovpn file and save in C:\Program Files\OpenVPN\config. For example,
C:\Program Files\OpenVPN\config\client.ovpn
An example of an OpenVPN Windows client configuration file is shown below:
# description: IM4216_client
client
proto udp
verb 3
Options Description
#description: This is a comment describing the configuration.
Comment lines start with‘#’ and are ignored by OpenVPN.
Client Specify whether this will be a client or server configuration file.
server In the server configuration file, define the IP address pool and netmask.
For example, server 10.100.10.0 255.255.255.0
proto udp Set the protocol to UDP or TCP. The client and server must use the
proto tcp same settings.
mssfix <max. size> Mssfix sets the maximum size of the packet. This is only useful for UDP
if problems occur.
verb <level> Set log file verbosity level. Log verbosity level can be set from 0
(minimum) to 15 (maximum). For example,
0 = silent except for fatal errors
3 = medium output, good for general usage
5 = helps with debugging connection problems
9 = extremely verbose, excellent for troubleshooting
dev tun Select ‘dev tun’ to create a routed IP tunnel or ‘dev tap’ to create an
dev tap Ethernet tunnel. The client and server must use the same settings.
remote <host> The hostname/IP of OpenVPN server when operating as a client. Enter
either the DNS hostname or the static IP address of the server.
Port The UDP/TCP port of the server.
Keepalive Keepalive uses ping to keep the OpenVPN session alive. 'Keepalive 10
120' pings every 10 seconds and assumes the remote peer is down if no
ping has been received over a 120 second time period.
http-proxy <proxy If a proxy is required to access the server, enter the proxy server DNS
server> <proxy port #> name or IP and port number.
ca <file name> Enter the CA certificate file name and location.
The same CA certificate file can be used by the server and all clients.
Note: Ensure each ‘\’ in the directory path is replaced with ‘ \\’. For
example, c:\openvpnkeys\ca.crt will become c:\\openvpnkeys\\ca.crt
cert <file name> Enter the client’s or server’s certificate file name and location.
Each client should have its own certificate and key files.
Note: Ensure each ‘\’ in the directory path is replaced with ‘ \\’.
key <file name> Enter the file name and location of the client’s or server’s key.
Each client should have its own certificate and key files.
Note: Ensure each ‘\’ in the directory path is replaced with ‘ \\’.
dh <file name> This is used by the server only.
Enter the path to the key with the Diffie-Hellman parameters.
Nobind ‘Nobind’ is used when clients do not need to bind to a local address or
specific local port number. This is the case in most client configurations.
persist-key This option prevents the reloading of keys across restarts.
persist-tun This option prevents the close and reopen of TUN/TAP devices across
restarts.
cipher BF-CBC Blowfish Select a cryptographic cipher. The client and server must use the same
(default) settings.
cipher AES-128-CBC
AES
cipher DES-EDE3-CBC
Triple-DES
comp-lzo Enable compression on the OpenVPN link. This must be enabled on both
the client and the server.
syslog By default, logs are located in syslog or, if running as a service on
Window, in \Program Files\OpenVPN\log directory.
To initiate the OpenVPN tunnel following the creation of the client/server configuration files:
Right click on the OpenVPN icon in the Notification Area
Select the newly created client or server configuration. For example, IM4216_client
Click ‘Connect’ as shown below
Once established, the OpenVPN icon will display a message notifying of the successful connection and assigned
IP. This information, as well as the time the connection was established, is available anytime by scrolling over the
OpenVPN icon.
The strength of PPTP is its ease of configuration and integration into existing Microsoft infrastructure. It is generally used
for connecting single remote Windows clients. If you take your portable computer on a business trip, you can dial a local
number to connect to your Internet access service provider (ISP) and then create a second connection (tunnel) into your
office network across the Internet and have the same access to your corporate network as if you were connected directly
from your office. Similarly, telecommuters can also set up a VPN tunnel over their cable modem or DSL links to their local
ISP.
To set up a PPTP connection from a remote Windows client to your Opengear appliance and local network:
1. Enable and configure the PPTP VPN server on your Opengear appliance
2. Set up VPN user accounts on the Opengear appliance and enable the appropriate authentication
3. Configure the VPN clients at the remote sites. The client does not require special software as the PPTP Server
supports the standard PPTP client software included with Windows XP/ NT/ 2000/ 7 and Vista
4. Connect to the remote VPN
Select the Required Encryption Level. Access is denied to remote users attempting to connect not using this
encryption level. Strong 40 bit or 128 bit encryption is recommended
In Local Address enter IP address to assign to the server's end of the VPN connection
In Remote Addresses enter the pool of IP addresses to assign to the incoming client's VPN connections (e.g.
192.168.1.10-20). This must be a free IP address (or a range of free IP addresses), from the network (typically the
LAN) that remote users are assigned while connected to the Opengear appliance
Enter the desired value of the Maximum Transmission Unit (MTU) for the PPTP interfaces into the MTU field
(defaults to 1400)
In the DNS Server field, enter the IP address of the DNS server that assigns IP addresses to connecting PPTP
clients
In the WINS Server field, enter the IP address of the WINS server that assigns IP addresses to connecting PPTP
client
Enable Verbose Logging to assist in debugging connection problems
Click Apply Settings
Note: This procedure sets up a PPTP client in the Windows 7 Professional operating system. The steps may vary
slightly depending on your network access or if you are using an alternate version of Windows. More detailed
instructions are available from the Microsoft web site.
Select Use My Internet Connection (VPN) and enter the IP Address of the Opengear appliance
Note: To connect remote VPN clients to the local network, you need to know the user name and password for the PPTP
account you added, as well as the Internet IP address of the Opengear appliance. If your ISP has not allocated
you a static IP address, consider using a dynamic DNS service. Otherwise you must modify the PPTP client
configuration each time your Internet IP address changes.
Note CMS maintains public key authenticated SSH connections to each of its Managed Console Servers. These
connections are used for monitoring, commanding and accessing the Managed Console Servers and the
Managed Devices connected to the Managed Console Server.
To manage Local Console Servers, or console servers that are reachable from the CMS, the SSH connections
are initiated by CMS.
To manage Remote Console Servers, or console servers that are firewalled, not routable, or otherwise
unreachable from the CMS, the SSH connections are initiated by the Managed Console Server via an initial Call
Home connection.
This ensures secure, authenticated communications and enables Managed Console Servers units to be
distributed locally on a LAN, or remotely around the world.
If you have not already generated or uploaded an SSH key pair for this console server, you will need to do so
before proceeding (refer Chapter 3)
Click Add
Enter the IP address or DNS name (e.g. the dynamic DNS address) of the CMS
Enter the Password that you configured on the CMS as the Call Home Password
Click Apply
These steps initiate the Call Home connection from the console server to the CMS. This creates an SSH listening port on
the CMS, and sets the console server up as a candidate.
Once the candidate has been accepted on the CMS (as outlined in the next section) an SSH tunnel to the console server
is then redirected back across the Call Home connection. The console server has now become a Managed Console
Server and the CMS can connect to and monitor it through this tunnel.
2. So the CMS can be contacted by the console server it must either have a static IP address or, if using DHCP, be
configured to use a dynamic DNS service
3. The Configure: Managed Console Servers screen on the CMS shows the status of local and remote Managed
Console Servers and candidates.
The Managed Console Server section shows the console servers currently being monitored by the CMS.
The Detected Console Servers section:
o The Local Console Servers drop down list in lists all the console servers which are on the same subnet
as the CMS, and are not currently being monitored
o The Remote Console Servers drop down list in the Detected Console Servers section lists all the
console servers that have established a Call Home connection, and are not currently being monitored (i.e.
candidates). You can click Refresh to update
4. To add a console server candidate to the Managed Console Server list:
o Select it from the Remote Console Servers drop down list, and click Add
o Enter IP Address and SSH Port (if these fields have not been auto-completed) and enter a Description and
unique Name for the Managed Console Server you are adding
o Enter the Remote Root Password (i.e. System Password that has been set on this Managed Console
Server). This password is used by the CMS to propagate auto generated SSH keys and then forgotten. It will
not be stored
o Click Apply. The CMS will now set up secure SSH connections to and from the Managed Console Server and
will retrieve its Managed Devices, user account details and configured alerts
By selecting Listening Server, you may create a Remote port forward from the Server to this unit, or a Local port forward
from this unit to the Server:
Specify a Listening Port to forward from, leave this field blank to allocate an unused port
Enter the Target Server and Target Port that will be the recipient of forwarded connections
Note By default the modem port on all Opengear console servers is set with software flow control and the baud rate is
set at:
- 115200 baud for external modems connected to the “Serial DB9 Port” on CM4100, IM7200 and IM4200 console
servers
- 9600 baud for the internal modem or external USB modem and for external modems connected to the Console
serial ports which have been reassigned for dial-in access (on SD4001, SD4002, ACM5000 and ACM5500)
When enabling OOB dial-in it is recommended that the Serial Setting be changed to 38400 baud with Hardware
Flow Control
Note You can further configure the console/modem port (e.g. to include modem init strings) by editing /etc/mgetty.config
files as described in the Chapter 14 - Advanced.
Select the Authentication Type required. Access is denied to remote users attempting to connect using an
authentication scheme weaker than the selected scheme. The schemes are described below, from strongest to
weakest.
Encrypted Authentication (MS-CHAP v2): The strongest type of authentication to use; this is the
recommended option
Weakly Encrypted Authentication (CHAP): This is the weakest type of encrypted password authentication
to use. It is not recommended that clients connect using this as it provides very little password protection.
Also note that clients connecting using CHAP are unable to encrypt traffic
Unencrypted Authentication (PAP): This is plain text password authentication. When using this type of
authentication, the client password is transmitted unencrypted.
None
Select the Required Encryption Level. Access is denied to remote users attempting to connect not using this
encryption level. Strong 40 bit or 128 bit encryption is recommended
Note: Firmware V3.5.2 and beyond support multiple dial-in users, who are setup with dialin Group membership. The
User name and Password to be used for the dial-in PPP link, and any dial-back phone numbers are configured
when the User is set up. Earlier firmware only supported one PPP dial-in account
Note Chapter 13 (Advanced Configurations) has examples of Linux commands that can be used to control the modem
port operation at the command line level
In both of the above cases in the event of a disruption in the dial-out connection, the console server will endeavor to re-
establish the connection.
Select the System: Dial menu option and check Enable Dial-Out to allow outgoing modem communications
Select the Baud Rate and Flow Control that will communicate with the modem
In the Dial-Out Settings - Always On Out-of-Band field enter the access details for the remote PPP server to
be called
Override DNS is available for PPP Devices such as modems. Override DNS allows the use of alternate DNS servers from
those provided by your ISP. For example, an alternative DNS may be required for OpenDNS used for content filtering.
To enable Override DNS, check the Override returned DNS Servers box. Enter the IP of the DNS servers into
the spaces provided.
Note: Only SSH access is enabled on the failover connection. However in firmware versions later than 3.0.2 HTTPS
access is also enabled. So the administrator can then SSH (or HTTPS) connect to the console server and fix the
problem
When configuring the principal network connection in System: IP specify the Failover Interface that will be used
when a fault has been detected with Network / Network1 (eth0). This can be either Internal Modem or the Dial
Serial DB9 (if you are using an external modem on the Console port) or USB Modem (if you are using a plug-on
USB modem on an ACM5500 or ACM5000)
Specify the Probe Addresses of two sites (the Primary and Secondary) that the IM console server is to ping to
determine if Network / Network1 is still operational
Select the System: Dial menu option and the port to be configured (Serial DB9 Port or PC Card or Internal Modem
Port)
Select the Baud Rate and Flow Control that will communicate with the modem
Note You can further configure the console/modem port (e.g. to include modem init strings) by editing /etc/mgetty.config
files as described in the Chapter 13 - Advanced.
Check the Enable Dial-Out Access box and enter the access details for the remote PPP server to be called
Override DNS is available for PPP Devices such as modems. Override DNS allows the use of alternate DNS servers
from those provided by your ISP. For example, an alternative DNS may be required for OpenDNS used for content
filtering.
To enable Override DNS, check the Override returned DNS Servers box. Enter the IP of the DNS servers into
the spaces provided.
Note: By default, the advanced console server supports automatic failure-recovery back to the original state prior to
failover (V3.1.0 firmware and later). The advanced console server continually pings probe addresses whilst in
original and failover states. The original state will automatically be set as a priority and reestablished following three
successful pings of the probe addresses during failover. The failover state will be removed once the original state
has been re-established.
When configuring the principal network connection, specify Management LAN/ Network 2 (eth1) as the Failover
Interface to be used when a fault has been detected with Network 1 (eth0)
Specify the Probe Addresses of two sites (the Primary and Secondary) that the advanced console server is to
ping to determine if Network 1 (eth0) is still operational
Then on the Management LAN Interface - Network 2 (IM4200, IM7200 or ACM5004-2) configure the IP Address/
Subnet Mask/ Gateway the same as you used for Network Interface (Network 1)
In this mode, Network 2 (eth1) is available as the transparent back-up port to Network 1 (eth0) for accessing the
management network. Network 2 will automatically and transparently take over the work of Network 1, in the event
Network 1 becomes unavailable for any reason.
Note: Only SSH access is enabled on the failover connection. However in firmware versions later than 3.0.2 HTTPS
access is also enabled. So the administrator can then SSH (or HTTPS) connect to the console server and fix the
problem
By default, the advanced console server supports automatic failure-recovery back to the original state prior to failover
(V3.1.0 firmware and later). The advanced console server continually pings probe addresses whilst in original and failover
states. The original state will automatically be set as a priority and reestablished following three successful pings of the
probe addresses during failover. The failover state will be removed once the original state has been re-established.
Note: For firmware pre V3.1.0 the advanced console server does not support automatic failure-recovery back to the
original state prior to the failover. So to restore networking to a recovered state the following command then
needs to be run:
rm -f /var/run/*-failed-over && config -r ipconfig
If required, you can run a custom bash script when the device fails over. It is possible to use this script to
implement automatic failure recovery, depending on your network setup. The script to create is:
/etc/config/scripts/interface-failover-alert
Before powering on the ACM5004-G(-I), ACM55044-5-G-I or IM4200-X2-G you must install the SIM card provided
by your cellular carrier, and attach the external aerial
Note: The ACM5004-G(-I) and ACM55044-5-G-I each has two cellular status LEDs. The SIM LED on top of the unit should
go on solid when a SIM card has been inserted and detected.
Note: Your 3G carrier may have provided you with details for configuring the connection including APN (Access Point
Name), Pin Code (optional PIN code which may be required to unlock the SIM card), Phone Number (the sequence
to dial to establish the connection, defaults to *99***1#), Username/ Password (optional) and Dial string (optional
AT commands). However you generally will only need to enter your provider’s APN and leave the other fields blank
Enter the carrier’s APN e.g. for AT&T (USA) simply enter i2gold, for T-Mobile (USA) enter epc.tmobile.com, for
InterNode (Aust) enter internode and for Telstra (Aust) enter telstra.internet
If the SIM Card is configured with a PIN Code, you will be required to unlock the Card by entering the PIN Code.
If the PIN Code is entered incorrectly three times, then the PUK Code will be required to unlock the Card.
You may also need to set Override DNS to use alternate DNS servers from those provided by your carrier.
To enable Override DNS, check the Override returned DNS Servers box. Enter the IP of the DNS servers into
the spaces provided.
Check Apply and a radio connection will be established with your cellular carrier
OTASP success will result in a valid phone number being placed in the NAM Profile Account MDN field
Manual Activation:
Some carriers may not support OTASP in which case it may be necessary to manually provision the modem.
Select Internal Cellular Modem panel on the System: Dial menu
Enter the MSL, MDN and MSID values. These values are specific to your carrier and for manual activation you
will have to investigate what values your carrier uses in each field. For example Verizon have been known to use
an MSL of 000000 and the phone number assigned to the Opengear device as both the MDN and MSID with no
spaces or hyphens e.g. “5551231234” for “555-123-1234”
Click Activate. If no errors occur you will see the new values entered into the NAM Profile at the Cellular page
on Status: Statistics
Navigate to the Internal Cellular Modem tab on System: Dial. To connect to your carriers 3G network enter the
appropriate phone number (usually #777) and a Username and Password if directed to by your account/plan
documentation
Select Enable and then click Apply to initiate the Always On Out-of-Band connection
Before powering on the ACM5504-5-LA/R/V-I, you must install the SIM card provided by your cellular carrier, and
attach the external aerial
Note: The ACM5504-5-LA/R/V-I each has two cellular status LEDs. The SIM LED on top of the unit should go on solid
when a SIM card has been inserted and detected.
Note: Your 4G LTE carrier may have provided you with details for configuring the connection including APN (Access
Point Name), Pin Code (optional PIN code which may be required to unlock the SIM card), Username/ Password
etc. However you generally will only need to enter your provider’s APN and the other fields can remain blank.
If the SIM Card is configured with a PIN Code, you will be required to unlock the Card by entering the PIN Code.
You may also need to set Override DNS to use alternate DNS servers from those provided by your carrier.
Check Apply and a radio connection will be established with your cellular carrier
Out-of-band access is enabled by default so the cellular modem connection should now be on.
You can verify the connection status from the Status: Statistics
o Select the Cellular tab and in Service Availability verify Mode is set to Online
o Select Failover& Out-of-Band and the Connection Status reads Connected
o You can check your allocated IP address
You can measure the received signal strength from the Cellular Statistics page on the Status:
Statistics screen. This will display the current state of the cellular modem including the Received Signal Strength
Indicator (RSSI)
Note: Received Signal Strength Indicator (RSSI) is a measurement of the Radio Frequency (RF) power present in a
received radio signal at the mobile device. It is generally expressed in dBm and the best throughput comes
from placing the device in an area with the highest RSSI.
With the cellular modem connection on you can also see the connection status from the LEDs on top of unit
Note: The ACM5004-G(-I), ACM5504-5-G(-W)-I and ACM5504-5-LA/R/V-I each has two cellular status LEDs. The WWAN
LED is OFF when in reset mode or not powered. When powered it will go ON and while searching for service it will
flash off briefly every 5sec. Once a radio connection has been established with your cellular carrier (i.e. after an
APN has been properly configured) the WWAN LED will blink at a rate proportional to traffic signal strength detected
i.e. OFF =Low, (lower than -100 dBm), Blinking Slow = Low to Medium (-99 to -90 dBm), Blinking Fast = Medium
to High (-89 to -70 dBm) and ON= High (-69 dBm or higher)
This mode is used typically for out of band access to remote sites, and as above to be directly accessed the appliance
needs to have a Public IP address (and it must not have SSH access firewalled). This OOB mode is the default for
IM7200 and IM4200 appliances with internal cellular modems. Out-of-band access is enabled by default and the cellular
modem connection is always on.
To be directly accessed the console server needs to have a Public IP address and it must not have SSH access
firewalled.
Almost all carriers offer corporate mobile data service/plans with a Public (static or dynamic) IP address. These plans
often have a service fee attached.
If you have such a static Public IP address plan you can also now try accessing the console server using the
Public IP Address provided by the carrier. However by default only HTTPS and SSH access is enabled on the
OOB connection. So you can browse to the console server, but you cannot ping it
If you have a dynamic Public IP address plan then a DDNS service will need to be configured to enable the
remote administrator to initiate incoming access. Once this is done you can then also try accessing the console
server using the allocated domain name
By default most providers offer a consumer grade service which provides dynamic Private IP address assignments to 3G
devices. This IP address is not visible across the Internet but generally it is adequate for home and general business use.
With such a plan the Failover& Out-of-Band tab on the Status: Statistics shows will identify that your carrier
has allocated you a Private IP Address (i.e. in the range 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255
or 192.168.0.0 – 192.168.255.255)
For inbound OOB connection with such a plan you will need to use Call Home with a Lighthouse/VCMS/CMS6110
or set up a VPN
In out of band access mode the internal cellular modem will continually stay connected. The alternative is to set up Failover
mode on the console server as detailed in the next section.
In this mode, the appliance continually pings nominated probe addresses over the main network connection and in the
event of ping failure it dials out and sets up a dial-out ppp over the cellular modem and access is switched transparently to
this network connection. Then when the main network connection is restored, access is switched back.
Once you have configured carrier connection, the cellular modem can be configured for failover.
This will tell the cellular connection to remain idle in a low power state. If the primary and secondary probe addresses are
not available it will bring up the cellular connection and connect back to the cellular carrier.
Navigate back to the Network Interface on the System:IP menu specify Internal Cellular modem (cell modem
01) as the Failover Interface to be used when a fault has been detected
Specify the Probe Addresses of two sites (the Primary and Secondary) that the console server is to ping to
determine if the principal network is still operational
In event of a failure of the principal network the 3G network connection is activated as the access path to the console
server (and its Managed Devices). Only HTTPS and SSH access is enabled on the failover connection (which
should enable the administrator to connect and fix the problem)
Note: By default, the advanced console server supports automatic failure-recovery back to the original state prior to
failover (V3.1.0 firmware and later). The advanced console server continually pings probe addresses whilst in
original and failover states. The original state will automatically be set as a priority and reestablished following
three successful pings of the probe addresses during failover. The failover state will be removed once the original
state has been re-established.
For earlier firmware that does not support automatic failure-recovery, to restore networking to a recovered state
the following command then needs to be run:
rm -f /var/run/*-failed-over && config -r ipconfig
If required, you can run a custom bash script when the device fails over. It is possible to use this script to
implement automatic failure recovery, depending on your network setup. The script to create is:
/etc/config/scripts/interface-failover-alert
You can check the connection status by selecting the Cellular panel on the Status: Statistics menu
o The Operational Status will change as the cellular modem finds a channel and connects to the network
Note: CSD is a legacy form of data transmission developed for the TDMA based mobile phone systems like GSM. CSD
uses a single radio time slot to deliver 9.6kb/s data transmission to the GSM Network and Switching
Subsystem where it could be connected through the equivalent of a normal modem to the Public Switched
Telephone Network (PSTN) allowing direct calls to any dial-up service. CSD is provided selectively by carriers
and it is important you receive a Data Terminating number as part of the mobile service your carrier provides. This
is the number which external modems will call to access the console server
This enables the console server to function as an Internet or external network gateway , via cellular connections (e.g. ACM5004-
G remote site managers and ACM5504-5-G/L-I management gateways, or other IM4200, IM7200, ACM5500 or ACM5000
models with external USB cellular modems) or via other Ethernet networks on two Ethernet port models (IM4200-2 and
ACM500x-2 console servers):
Network Forwarding allows the network packets on one network interface (i.e. LAN1/ eth0) to be forwarded to
another network interface (i.e. LAN2/eth1 or dial-out/cellular). So locally networked devices can IP connect
through the console server to devices on remote networks.
IP Masquerading is used to allow all the devices on your local private network to hide behind and share the one
public IP address when connecting to a public network. This type of translation is only used for connections
originating within the private network destined for the outside public network, and each outbound connection is
maintained by using a different source IP port number.
When using IP Masquerading, devices on the external network cannot initiate connections to devices on the
internal network. Port Forwards allows external users to connect to a specific port on the external interface of the
console server and be redirected to a specified internal address for a device on the internal network.
With Firewall Rules, packet filtering inspects each packet passing through the firewall and accepts or rejects it
based on user-defined rules.
Then Service Access Rules can be set for connecting to the console server/router itself
Note: Network forwarding allows the network packets on one network interface (i.e. LAN1/ eth0) to be forwarded to
another network interface (i.e. LAN2/eth1 or dial-out/cellular). So locally networked devices can IP connect
through the console server to devices on remote networks. IP masquerading is used to allow all the devices on
your local private network to hide behind and share the one public IP address when connecting to a public
network. This type of translation is only used for connections originating within the private network destined for the
outside public network, and each outbound connection is maintained by using a different source IP port number.
By default, all console server models are configured so that they will not route traffic between networks. To use the
console server as an Internet or external network gateway, forwarding must be enabled so that traffic can be routed from
the internal network to the Internet/external network:
Navigate to the System: Firewall page, and then click on the Forwarding &Masquerading tab
Find the Source Network to be routed, and then tick the relevant Destination Network to enable Forwarding
For example to configure a single Ethernet device such as an ACM5004-G as a cellular router:
The Source Network would the Network Interface and the Destination Network would be Dialout/Cellular )
IP Masquerading is generally required if the console server will be routing to the Internet, or if the external network being
routed to does not have routing information about the internal network behind the console server.
IP Masquerading performs Source Network Address Translation (SNAT) on outgoing packets, to make them appear like
they've come from the console server (rather than devices on the internal network). When response packets come back
devices on the external network, the console server will translate the packet address back to the internal IP, so that it is
routed correctly. This allows the console server to provide full outgoing connectivity for internal devices using a single IP
Address on the external network.
By default IP Masquerading is disabled for all networks. To enable masquerading:
Check Enable IP Masquerading (SNAT) on the network interfaces where masquerading is be enabled
Generally this masquerading would be applied to any interface that is connecting with a public network such as the
Internet (e.g. for the ACM5004-G the IP masquerading would be enabled on Dialout/Cellular)
Manual Configuration:
Manually set a static gateway address (being the address of the console server) and set the DNS server address to be
the same as used on the external network i.e. if the console server is acting as an internet gateway or a cellular router,
then use the ISP provided DNS server address.
Click on the Disabled link next to DHCP Server which will bring up the System: DHCP Server page
The DHCP server will sequentially issue IP addresses from a specified address pool(s):
Click Add in the Dynamic Address Allocation Pools field
Enter the DHCP Pool Start Address and End Address and click Apply
The DHCP server also supports pre-assigning IP addresses to be allocated only to specific MAC addresses and reserving
IP addresses to be used by connected hosts with fixed IP addresses. To reserve an IP addresses for a particular host.
Once applied, devices on the internal network will be able to access resources on the external network.
Output Port Range: The port or range of ports that the packets will be redirected to on the Output Address.
Ranges use the format start-finish. Only valid for TCP and UDP protocols
For example, to forward port 8443 to an internal HTTPS server on 192.168.10.2, the following settings would be used:
Input Interface: Any
Input Port Range: 8443
Protocol: TCP
Output Address: 192.168.10.2
Output Port Range: 443
Note Prior to firmware V3.4 this tab was labeled Port Rules and fewer firewall rules could be configured
For example, to block all SSH traffic from leaving Dialout Interface, the following settings can be used:
Interface: Dialout/Cellular
Port Range: 22
Protocol: TCP
Direction: Egress
Action: Block
The firewall rules are processed in a set order- from top to bottom. So rule placement is important. For
example with the following rules, all traffic coming in over the Network Interface is blocked except when it comes from two
nominated IP addresses (SysAdmin and Tony):
To allow all incoming traffic on all To allow all incoming To block all incoming traffic
interfaces from the SysAdmin: traffic from Tony: from the Network Interface:
Interface Any Any Network Interface
Port Range Any Any Any
Source MAC Any Any Any
Source IP IP address of SysAdmin IP address of Tony Any
Destination IP Any Any Any
Protocol TCP TCP TCP
Direction Ingress Ingress Ingress
Action Accept Accept Block
However if the Rule Order above was to be changed so the “Block Everyone Else” rule was second on the list then the
traffic coming in over the Network Interface from Tony would be blocked.
To set up the secure SSH tunnel from the Client PC to the console server, you must install and launch SSH client software
on the User/Administrator’s PC. Opengear recommends you use the SDT Connector client software that is supplied with
the console server for this. SDT Connector is simple to install and auto-configure and it will provides all your users with
point-and-click access to all the systems and devices in the secure network. With one click SDT Connector sets up a secure
SSH tunnel from the client to the selected console server, then establishes a port forward connection to the target network
connected host or serial connected device, then executes the client application that will be used in communicating with the
host.
This chapter details the basic SDT Connector operations:
Configuring the console server for SSH tunneled access to network attached hosts and setting up permitted
Services and user access (Section 6.1)
Setting up the SDT Connector client with gateway, host, service and client application details and making
connections between the Client PC and hosts connected to the console server (Section 6.2)
Using SDT Connector to browser access the Management Console (Section 6.3)
Using SDT Connector to Telnet or SSH connect to devices that are serially attached to the console server
(Section 6.4)
The chapter then covers more advanced SDT Connector and SSH tunneling topics:
Using SDT Connector for out of band access(Section 6.5)
Automatic importing and exporting of configurations (Section 6.6)
Configuring Public Key Authentication (Section 6.7)
Setting up a SDT Secure Tunnel for Remote Desktop (Section 6.8)
Setting up a SDT Secure Tunnel for VNC (Section 6.9)
Using SDT to IP connect to hosts that are serially attached to the console server (Section 6.10)
Add the new Users using Serial & Network: Users & Groups menu as detailed in Network Hosts (Chapter 4.4).
Users can be authorized to access the console server ports and specified network-attached hosts. To simplify
configuration, the Administrator can first set up Groups with group access permissions, then Users can be
classified as members of particular Groups.
Note For Windows clients, the SDTConnectorSetup-1.n.exe application will install the SDT Connector 1.n.exe and the
config file defaults.xml. If there is already a config file on the Windows PC then it will not be overwritten. To
remove earlier config file run the regedit command and search for “SDT Connector” then remove the directory
with this name.
For Linux and other Unix clients, SDTConnector.tar.gz application will install the sdtcon-1.n.jar and the config file
defaults.xml
Once the installer completes you will have a working SDT Connector client installed on your machine and an icon on your
desktop:
Click the SDT Connector icon on your desktop to start the client
Note SDT Connector is a Java application so it must have a Java Runtime Environment (JRE) installed. This can be
freely downloaded from http://java.sun.com/j2se/ It will install on Windows 2000, XP, 2003, Vista PCs and on
most Linux platforms. Solaris platforms are also supported however they must have Firefox installed. SDT
Connector can run on any system with Java 1.4.2 and above installed, but it assumes the web browser is
Firefox, and that xterm -e telnet opens a telnet window
To operate SDT Connector, you first need to add new gateways to the client software by entering the access details for
each console server (refer Section 6.2.2) then let the client auto-configure with all host and serial port connections from
each console server (refer Section 6.2.3) then point-and-click to connect to the Hosts and serial devices(refer Section
6.2.4)
Alternately you can manually add network connected hosts (refer Section 6.2.5) and manually configure new services to
be used in accessing the console server and the hosts (refer Section 6.2.6) then manually configuring clients to run on the
PC that will use the service to connect to the hosts and serial port devices (refer Section 6.2.7 and 6.2.9). SDT Connector
can also be set up to make an out-of-band connection to the console server (refer Section 6.2.9)
Click the New Gateway icon or select the File: New Gateway menu option
Enter the IP or DNS Address of the console server and the SSH port that will be used (typically 22)
Note If SDT Connector is connecting to a remote console server through the public Internet or routed network you will
need to:
Determine the public IP address of the console server (or of the router/ firewall that connects the console server
to the Internet) as assigned by the ISP. One way to find the public IP address is to access
http://checkip.dyndns.org/ or http://www.whatismyip.com/ from a computer on the same network as the console
server and note the reported IP address
Set port forwarding for TCP port 22 through any firewall/NAT/router that is located between SDT Connector
and the console server so it points to the console server. http://www.portforward.com has port forwarding
instructions for a range of routers. Also you can use the Open Port Check tool from
http://www.canyouseeme.org to check if port forwarding through local firewall/NAT/router devices has been
properly configured
Enter the Username and Password of a user on the gateway that has been enabled to connect via SSH and/or
create SSH port redirections
Optionally, enter a Descriptive Name to display instead of the IP or DNS address, and any Notes or a
Description of this gateway (such as its firmware version, site location or anything special about its network
configuration).
Click OK and an icon for the new gateway will now appear in the SDT Connector home page
Note For an SDT Connector user to access a console server (and then access specific hosts or serial devices
connected to that console server), that user must first be setup on the console server, and must be authorized to
access the specific ports / hosts (refer Chapter 5) and only these permitted services will be forwarded through by
SSH to the Host. All other services (TCP/UDP ports) will be blocked.
6.2.3 Auto-configure SDT Connector client with the user’s access privileges
Each user on the console server has an access profile which has been configured with those specific connected hosts
and serial port devices the user has authority to access, and a specific set of the enabled services for each of these. This
configuration can be auto-uploaded into the SDT Connector client:
Click on the new gateway icon and select Retrieve Hosts. This will:
configure access to network connected Hosts that the user is authorized to access and set up (for
each of these Hosts) the services (e.g. HTTPS, IPMI2.0) and the related IP ports being redirected
configure access to the console server itself (this is shown as a Local Services host)
configure access with the enabled services for the serial port devices connected to the console server
Note The Retrieve Hosts function will auto-configure all classes of user (i.e. they can be members of user or admin or
some other group or no group) however SDT Connector will not auto-configure the root (and it recommended
that this account is only used for initial config and for adding an initial admin account to the console server)
Note The SDT Connector client can be configured with unlimited number of Gateways. Each Gateway can be
configured to port forward to an unlimited number of locally networked Hosts. Similarly there is no limit on the
number of SDT Connector clients who can be configured to access the one Gateway. Nor are there limits on the
number of Host connections that an SDT Connector client can concurrently have open through the one Gateway
tunnel.
However there is a limit on the number of SDT Connector SSH tunnels that can be open at the one time on a
particular Gateway. SD4001/4002 devices support at least 10 simultaneous client tunnels; ACM5000, ACM5500,
IM4216/4248 and CM4116/4132/4148 each support at least 50 such concurrent connections. So for a site with a
CM4116 gateway you can have, at any time up to 50 users securely controlling an unlimited number of network
attached computers and appliances (servers, routers etc) at that site.
Select the newly added gateway and click the Host icon to create a host that will be accessible via this
gateway. (Alternatively select File: New Host)
Select which Client application is associated with the new service. A range of client application options are pre-
configured in the default SDT Connector (RDP client, VNC client, HTTP browser, HTTPS browser, Telnet client
etc). However if you wish to add new client applications to this range then proceed to the next section (Adding a
new client) then return here
An example is the Dell RAC service. The first redirection is for the HTTPS connection to the RAC server - it has a client
associated with it (web browser) that is launched immediately upon clicking the button for this service.
The second redirection is for the VNC service that the user may choose to later launch from the RAC web console. It is
automatically loads in a Java client served through the web browser, so it does not need a local client associated with it.
On the Add Service screen you can click Add as many times as needed to add multiple new port redirections and
associated clients
Note SDT Connector can also tunnel UDP services. SDT Connector tunnels the UDP traffic through the TCP SSH
redirection, so in effect it is a tunnel within a tunnel.
Enter a Name for the client. Enter the Path to the executable file for the client (or click Browse to locate the
executable)
Enter a Command Line associated with launching the client application. SDT Connector typically launches a
client using command line arguments to point it at the local endpoint of the redirection. There are three special
keywords for specifying the command line format. When launching the client, SDT Connector substitutes these
keywords with the appropriate values:
%path% is path to the executable file, i.e. the previous field.
%host% is the local address to which the local endpoint of the redirection is bound, i.e. the Local Address field for
the Service redirection Advanced options.
%port% is the local port to which the local endpoint of the redirection is bound, i.e. the Local TCP Port field for
the Service redirection Advanced options. If this port is unspecified (i.e. "Any"), the appropriate randomly selected
port will be substituted.
For example SDT Connector is preconfigured for Windows installations with a HTTP service client that will connect with
whichever local browser the local Windows user has configured as the default. Otherwise the default browser used is
Firefox:
Also some clients are launched in a command line or terminal window. The Telnet client is an example of this so the
“Path to client executable file” is telnet and the “Command line format for client executable” is cmd /c start %path%
%host% %port% :
Click OK
Click the HTTP or HTTPS Services icon to access the gateway's Management Console, and/or click SSH or
Telnet to access the gateway command line console
Note: To enable SDT access to the gateway console, you must configure the console server to allow port
forwarded network access to itself.
With V3.3 firmware and later, this can be done using the console server Management Console. Simply browse
to the console server and select the Service Access tab on the System: Firewall menu. Ensure SSH
Command Shell is enabled on the Network interface and any out of band interfaces.
With earlier firmware:
Browse to the console server and select Network Hosts from Serial & Network, click Add Host and in the
IP Address/DNS Name field enter 127.0.0.1 (this is the Opengear's network loopback address) and enter
Loopback in Description
Remove all entries under Permitted Services except for those that will be used in accessing the
Management Console (80/http or 443/https) or the command line (22/ssh or 23/telnet) then scroll to the
bottom and click Apply
Administrators by default have gateway access privileges, however for Users to access the gateway
Management Console you will need to give those Users the required access privileges. Select Users &
Groups from Serial & Network. Click Add User. Enter a Username, Description and Password/Confirm.
\
Select 127.0.0.1 from Accessible Host(s) and click Apply
Assuming you have already set up the target console server as a gateway in your SDT Connector client (with
username/ password etc), select this gateway and click the Host icon to create a host. Alternatively, select File:
New Host.
Enter 127.0.0.1 as the Host Address and select Serial Port 2 for Service. In Descriptive Name, enter
something along the lines of Loopback ports, or Local serial ports. Click OK.
Click Serial Port 2 icon for Telnet access to the serial console on the device attached to serial port #2 on the
gateway
To enable SDT Connector to access to devices connected to the gateway’s serial ports, you must also configure the
Console server itself to allow port forwarded network access to itself, and enable access to the nominated serial port:
Browse to the Console server and select Serial Port from Serial & Network
Click Edit next to selected Port # (e.g. Port 2 if the target device is attached to the second serial port). Ensure the
port's serial configuration is appropriate for the attached device
Scroll down to Console Server Setting and select Console Server Mode. Check Telnet (or SSH) and scroll to
the bottom and click Apply
Select Network Hosts from Serial & Network and click Add Host
In the IP Address/DNS Name field enter 127.0.0.1 (this is the Opengear's network loopback address) and enter
Loopback in Description
Remove all entries under Permitted Services and select TCP and enter 200n in Port. (This configures the Telnet
port enabled in the previous step, so for Port 2 you would enter 2002)
Click Add then scroll to the bottom and click Apply
Administrators by default have gateway and serial port access privileges; however for Users to access the
gateway and the serial port, you will need to give those Users the required access privileges. Select Users &
To initiate a pre-configured dial-up connection under Windows, use the following Start Command:
cmd /c start "Starting Out of Band Connection" /wait /min rasdial network_connection login password
where network_connection is the name of the network connection as displayed in Control Panel -> Network
Connections, login is the dial-in username, and password is the dial-in password for the connection.
To initiate a pre-configured dial-up connection under Linux, use the following Start Command:
pon network_connection
where network_connection is the name of the connection.
Enter the command or path to a script to stop the OOB connection in Stop Command
To stop a pre-configured dial-up connection under Windows, use the following Stop Command:
cmd /c start "Stopping Out of Band Connection" /wait /min rasdial network_connection /disconnect
where network connection is the name of the network connection as displayed in Control Panel -> Network
Connections.
To stop a pre-configured dial-up connection under Linux, use the following Stop Command:
poff network_connection
When you connect to a service on a host behind the gateway, or to the console server gateway itself, SDT Connector will
initiate the OOB connection using the provided Start Command. The OOB connection isn't stopped (using the provided
Stop Command) until Out Of Band under Gateway Actions is clicked off, at which point the status bar will return to its
normal color.
To save a configuration .xml file (for backup or for importing into other SDT Connector clients) select File: Export
Preferences and select the location to save the configuration file
To import a configuration select File: Import Preferences and select the .xml configuration file to be installed
SDT Connector can authenticate against an SSH gateway using your SSH key pair rather than requiring your to enter
your password. This is known as public key authentication.
To use public key authentication with SDT Connector, first you must add the public part of your SSH key pair to your SSH
gateway:
Ensure the SSH gateway allows public key authentication, this is typically the default behavior
If you do not already have a public/private key pair for your client PC (the one running SDT Connector on)
generate them now using ssh-keygen, PuTTYgen or a similar tool. You may use RSA or DSA, however it is
important that you leave the passphrase field blank:
- PuTTYgen: http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
- OpenSSH: http://www.openssh.org/
- OpenSSH (Windows): http://sshwindows.sourceforge.net/download/
Upload the public part of your SSH key pair (this file is typically named id_rsa.pub or id_dsa.pub) to the SSH
gateway, or otherwise add to .ssh/authorized keys in your home directory on the SSH gateway
Next, add the private part of your SSH key pair (this file is typically named id_rsa or id_dsa) to SDT Connector.
Click Edit: Preferences: Private Keys: Add, locate the private key file and click OK
You do not have to add the public part of your SSH key pair, it is calculated using the private key.
SDT Connector will now use public key authentication when connecting through the SSH gateway (console server). You
may have to restart SDT Connector to shut down any existing tunnels that were established using password
authentication.
Also if you have a host behind the console server that you connect to by clicking the SSH button in SDT Connector you
may also wish to configure access to it for public key authentication as well. This configuration is entirely independent of
SDT Connector and the SSH gateway. You must configure the SSH client that SDT Connector launches (e.g. Putty,
OpenSSH) and the host's SSH server for public key authentication. Essentially what you are using is SSH over SSH, and
the two SSH connections are entirely separate.
Microsoft’s Remote Desktop Protocol (RDP) enables the system manager to securely access and manages remote
Windows computers – to reconfigure applications and user profiles, upgrade the server’s operating system, reboot the
machine etc. Opengear’s Secure Tunneling uses SSH tunneling, so this RDP traffic is securely transferred through an
authenticated and encrypted tunnel.
SDT with RDP also allows remote Users to connect to Windows XP, Vista, Server2003, Server 2008 computers and to
Windows 2000 Terminal Servers; and to have access to all of the applications, files, and network resources (with full
graphical interface just as though they were in front of the computer screen at work). To set up a secure Remote Desktop
connection you must enable Remote Desktop on the target Windows computer that is to be accessed and configure the
RPD client software on the client PC.
To set the user(s) who can remotely access the system with RDP click Add on the Remote Desktop Users
dialog box
Note If you need to set up new users for Remote Desktop access, open User Accounts in the Control Panel and
proceed through the steps to nominate the new user’s name, password and account type (Administrator or
Limited)
Note With Windows XP Professional and Vista, you have only one Remote Desktop session and it connects
directly to the Windows root console. With Windows Server 2008 you can have multiple sessions (and with
Server 2003 you have three sessions - the console session and two other general sessions). So more than
one user can have active sessions on a single computer.
Click Connect
Note The Remote Desktop Connection software is pre-installed with Windows XP, Vista and Server 2003/2008,
however for earlier Windows PCs you will need to download the RDP client:
Go to the Microsoft Download Center site http://www.microsoft.com/downloads/details.aspx?familyid=80111F21-
D48D-426E-96C2-08AA2BD23A49&displaylang=en and click the Download button
This software package will install the client portion of Remote Desktop on Windows 95, Windows 98 and 98
Second Edition, Windows Me, Windows NT 4.0 and Windows 2000. When run, this software allows these older
Windows platforms to remotely connect to a computer running current Windows.
option description
Device redirection. i.e. Redirect sound on remote machine to local device i.e. -0 -r sound (MS/Windows
-r
2003)
You can use GUI front end tools like the GNOME Terminal Services Client tsclient to configure and launch the
rdesktop client. (Using tsclient also enables you to store multiple configurations of rdesktop for connection to
many servers)
C. On a Macintosh client:
Download Microsoft's free Remote Desktop Connection client for Mac OS X
http://www.microsoft.com/mac/otherproducts/otherproducts.aspx?pid=remotedesktopclient
6.9.1 Install and configure the VNC Server on the computer to be accessed
Virtual Network Computing (VNC) software enables users to remotely access computers running Linux, Macintosh, Solaris,
UNIX, all versions of Windows and most other operating systems.
A. For Microsoft Windows servers (and clients):
Windows does not include VNC software, so you will need to download, install and activate a third party VNC Server
software package:
UltraVNC http://ultravnc.com is easy to use, fast and free VNC software that
has pioneered and perfected features that the other flavors have consistently
refused or been very slow to implement for cross platform and minimalist
reasons. UltraVNC runs under Windows operating systems (95, 98, Me, NT4,
2000, XP, 2003) Download UltraVNC from Sourceforge's UltraVNC file list
B. For Linux servers (and clients):
Most Linux distributions now include VNC Servers and Viewers and they are generally can be launched from the
(Gnome/KDE etc) front end e.g. with Red Hat Enterprise Linux 4 there’s VNC Server software and a choice of
Viewer client software, and to launch:
Select the Remote Desktop entry in the Main Menu: Preferences menu
Click the Allow other users… checkbox to allow remote users to view and control your desktop
To establish the VNC connection, first configure the VNC Viewer, entering the VNC Server IP address
A. When the Viewer PC is connected to the console server thru a SSH tunnel (over the public Internet, or a dial-in
connection, or private network connection), enter localhost (or 127.0.0.1) as the IP VNC Server IP address; and the
source port you entered when setting SSH tunneling /port forwarding (in Section 6.2.6) e.g. :1234
B. When the Viewer PC is connected directly to the console server (i.e. locally or remotely through a VPN or dial in
connection); and the VNC Host computer is serially connected to the console server; enter the IP address of the
console server unit with the TCP port that the SDT tunnel will use. The TCP port will be 7900 plus the physical serial
port number (i.e. 7901 to 7948, so all traffic directed to port 79xx on the console server is tunneled thru to port 5900
on the PPP connection on serial Port xx) e.g. for a Windows Viewer PC using UltraVNC connecting to a VNC Server
which is attached to Port 1 on a console server located 192.168.0.1
You can then establish the VNC connection by simply activating the VNC Viewer software on the Viewer PC and
entering the password
Note For general background reading on Remote Desktop and VNC access we recommend the following:
The Microsoft Remote Desktop How-To
http://www.microsoft.com/windowsxp/using/mobility/getstarted/remoteintro.mspx
The Illustrated Network Remote Desktop help page
http://theillustratednetwork.mvps.org/RemoteDesktop/RemoteDesktopSetupandTroubleshooting.html
What is Remote Desktop in Windows XP and Windows Server 2003? by Daniel Petri
http://www.petri.co.il/what's_remote_desktop.htm
Frequently Asked Questions about Remote Desktop
http://www.microsoft.com/windowsxp/using/mobility/rdfaq.mspx
Secure remote access of a home network using SSH, Remote Desktop and VNC for the home user
http://theillustratednetwork.mvps.org/RemoteDesktop/SSH-RDP-VNC/RemoteDesktopVNCandSSH.html
Taking your desktop virtual with VNC, Red Hat magazine http://www.redhat.com/magazine/006apr05/features/vnc/
and http://www.redhat.com/magazine/007may05/features/vnc/
Wikipedia general background on VNC http://en.wikipedia.org/wiki/VNC
6.10 Using SDT to IP connect to hosts that are serially attached to the gateway
Network (IP) protocols like RDP, VNC and HTTP can also be used for connecting to host devices that are serially
connected through their COM port to the console server. To do this you must:
● establish a PPP connection (Section 6.7.1) between the host and the gateway, then
● set up Secure Tunneling - Ports on the console server (Section 6.7.2), then
● configure SDT Connector to use the appropriate network protocol to access IP consoles on the host devices that are
attached to the Console server serial ports (Section 6.7.3)
Specify which Users will be allowed to use this connection. This should be the same Users who were given
Remote Desktop access privileges in the earlier step. Click Next
On the Network Connection screen select TCP/IP and click Properties
Select Specify TCP/IP addresses on the Incoming TCP/IP Properties screen select TCP/IP. Nominate a From:
and a To: TCP/IP address and click Next
Note You can choose any TCP/IP addresses so long as they are addresses which are not used anywhere else on
your network. The From: address will be assigned to the Windows XP/2003 computer and the To: address will
be used by the console server. For simplicity use the IP address as shown in the illustration above:
From: 169.134.13.1
To: 169.134.13.2
Alternately you can set the advanced connection and access on the Windows computer to use the console
server defaults:
Specify 10.233.111.254 as the From: address
Select Allow calling computer to specify its own address
When the PPP connection has been set up, a network icon will appear in the Windows task bar
Note The above notes describe setting up an incoming connection for Windows XP. The steps are similar for Vista/7
and Windows Server 2003/2008 however the set up screens present slightly differently:
You need to put a check in the box for Always allow directly connected devices such as palmtop…..
Also the option for to Set up an advanced connection is not available in Windows 2003 if RRAS is configured. If RRAS
has been configured it is a simply task to enable the null modem connection for the dial-in configuration.
C. For earlier version Windows computers again follow the steps in Section B. above, however to get to the Make New
Connection button:
For Windows 2000, click Start and select Settings then at the Dial-Up Networking Folder click Network and
Dial-up Connections and click Make New Connection. Note you may need to first set up connection over the
COM port using Connect directly to another computer before proceeding to Set up an advanced connection
For Windows 98 you double click My Computer on the Desktop, then open Dial-Up Networking and double click
Note When you enable SDT, this will override all other Configuration protocols on that port
Note If you leave the Username and User Password fields blank, they default to portXX and portXX where XX is the
serial port number. So the default username and password for Secure RDP over Port 2 is port02
Ensure the console server Common Settings (Baud Rate, Flow Control) are the same as were set up on the
Windows computer COM port and click Apply
RDP and VNC forwarding over serial ports is enabled on a Port basis. You can add Users who can have access
to these ports (or reconfigure User profiles) by selecting Serial & Network :User & Groups menu tag - as
described earlier in Chapter 4 Configuring Serial Ports
6.10.3 Set up SDT Connector to ssh port forward over the console server Serial Port
In the SDT Connector software running on your remote computer specify the gateway IP address of your console server
and a username/password for a user you have setup on the console server that has access to the desired port.
Next you need to add a New SDT Host. In the Host address you need to put portxx where xx = the port you are
connecting to. Example for port 3 you would have a Host Address of: port03 and then select the RDP Service check box.
In the Session menu enter the IP address of the console server in the Host Name or IP address field
For dial-in connections, this IP address will be the Local Address that you assigned to the console server
when you set it up as the Dial-In PPP Server
For Internet (or local/VPN connections) connections this will be the public IP address of the console server
Select the SSH Protocol, and the Port will be set as 22
Go to the SSH: Tunnels menu and in Add new forwarded port enter any high unused port number for the Source
port e.g. 54321
Set the Destination: IP details
If your destination device is network connected to the console server and you are connecting using RDP, set
the Destination as <Managed Device IP address/DNS Name>:3389 e.g. if when setting up the Managed
Device as Network Host on the console server you specified its IP address to be 192.168.253.1 (or its DNS
Name was accounts.myco.intranet.com) then specify the Destination as 192.168.523.1:3389 (or
accounts.myco.intranet.com:3389 ). Only devices which have been configured as networked Hosts can be
accessed using SSH tunneling (except by the “root” user who can tunnel to any IP address the console server
can route to.
If your destination computer is serially connected to the console server, set the Destination as <port
label>:3389 e.g. if the Label you specified on the serial port on the console server is win2k3, then specify the
remote host as win2k3:3389 . Alternative you can set the Destination as portXX:3389 where XX is the SDT
enabled serial port number e.g. if port 4 is on the console server is to carry the RDP traffic then specify
port04:3389
Note http://www.jfitz.com/tips/putty_config.html has useful examples on configuring PuTTY for SSH tunneling
If you are connecting as a User in the “users” group then you can only SSH tunnel to Hosts and Serial Ports
where you have specific access permissions
If you are connecting as an Administrator (in the “admin” group) then you can connect to any configured Host
or Serial Ports (which has SDT enabled)
To set up the secure SSH tunnel for a HTTP browser connection to the Managed Device specify port 80 (rather than port
3389 as was used for RDP) in the Destination IP address.
Note How secure is VNC? VNC access generally allows access to your whole computer, so security is very important.
VNC uses a random challenge-response system to provide the basic authentication that allows you to connect to a
VNC server. This is reasonably secure and the password is not sent over the network.
However, once connected, all subsequent VNC traffic is unencrypted. So a malicious user could snoop your VNC
session. Also there are VNC scanning programs available, which will scan a subnet looking for PCs which are
listening on one of the ports which VNC uses.
Tunneling VNC over a SSH connection ensures all traffic is strongly encrypted. Also no VNC port is ever open to
the internet, so anyone scanning for open VNC ports will not be able to find your computers. When tunneling VNC
over a SSH connection, the only port which you're opening on your console server the SDT port 22.
So sometimes it may be prudent to tunnel VNC through SSH even when the Viewer PC and the console server are
both on the same local network.
Check Disable Auto-Response at specific times and you will be able to periodically disable auto-Responses
between specified times of day
7.2.1 Environmental
To configure Humidity or Temperature levels as the trigger event:
Click on the Environmental as the Check Condition
In the Environmental Check menu, select the specific Environmental Sensor to be checked for the trigger
Specify the Trigger value (in °C / °F for Temp and % for Humidity) that the check measurement must exceed or
drop below to trigger the AutoResponse
Select Comparison type as being Above Trigger Value or Below Trigger Value to trigger
Specify any Hysteresis factor that is to be applied to environmental measurements (e.g. if an Auto-Response
was set up with a trigger event of a temp reading above 49°C with a Hysteresis of 4 then the trigger condition
would not be seen as having been resolved till the temp reading was below 45°C)
Check Save Auto-Response
Note: Before configuring Environmental Checks as the trigger in Auto-Response you will need first to configure the
Temp and/or Humidity sensors on your ACM5000 or attached EMD
Note: Before configuring UPS checks in Auto-Response you first must configure the attached UPS
Note: Before configuring UPS state checks in Auto-Response you first must configure the attached UPS
Note: With Serial Pattern checks you can nominate to “Disconnect Immediately” all users from the serial being
monitored in event of a successful pattern match.
Note: For devices with an inbuilt cellular modem with GPS enabled the GPS will be displayed as an additional port and
it can be monitored for trigger events eg with an ACM5504-5-G-I with 4 x serial ports the GPS will be shown as
Port 5
Note: Before configuring serial port checks in Auto-Response you first must configure the serial port in Console server
mode. Also most serial port checks are not resolvable so resolve actions will not be run
Note: Before configuring cellular data checks in Auto-Response the internal or external USB cellular modem must be
configured and detected by the console server
Refer online FAQ for a sample web page html check and other script file templates
Enter the Script Executable file name (e.g. /etc/config/test.sh)
Set the Check Frequency (i.e. the time in seconds between re-running the script) and the Script Timeout (i.e.
the maximum run-time for the script)
Specify the Successful Return Code. An Auto-Response is triggered if the return code from the script is not this
value
Enter Arguments that are to be passed to the script (e.g. with a web page html check script, these Arguments
might specify the web page address/DNS and user logins)
Check Save Auto-Response
Note: The SMS command trigger condition can only be set if there is an internal or external USB cellular modem detected
To configure the sequence of actions that is to be taken in the event of the trigger condition:
For a nominated Auto-Response - with a defined Check Condition - click on Add Trigger Action (e.g. Send Email
or Run Custom Script) to select the action type to be taken. Then configure the selected action (as detailed in the
following sections)
Each action is configured with a nominated Action Delay Time which specifies how long (in seconds) after the
Auto-Response trigger event to wait before performing the action. So you can add follow-on actions to create a
sequence of actions that will be taken in the event of the one trigger condition
To edit (or delete) an existing action, click the Modify (or Delete) icon in the Scheduled Trigger Action table
Note: A message text can be sent with Email, SMS and Nagios actions. This configurable message can include
selected values:
$AR_TRIGGER_VAL = the trigger value for the check e.g. for UPS Status, it could be onbatt or battlow
$AR_VAL = the value returned by the check e.g. for ups status, it could be online/onbatt/battlow
$AR_CHECK_DEV = the device name of the device being checked e.g. for Alarm, the alarm name
$TIMESTAMP = the current timestamp
$HOSTNAME = the hostname of the console server
The default message text is: $TIMESTAMP: This action was run - Check details: value $AR_VAL vs trigger value
$AR_TRIGGER_VAL
Click on Send Email as the Add Trigger Action. Enter a unique Action Name and set the Action Delay Time
Specify the Recipient Email Address to send this email to and the Subject of the email. For multiple recipients
you can enter comma separated addresses
Edit the Email Text message to send and click Save New Action
Note An SMS alert can also be sent via an SMTP (email) gateway. You will need to specify the Recipient Email
Address in the format specified by the gateway provider (e.g. for T-Mobile it is phonenumber @tmomail.net)
Click on Send SMS as the Add Trigger Action. Enter a unique Action Name and set the Action Delay Time
Specify the Phone number that the SMS will be sent to in international format (without the +)
Edit the Message Text to send and click Save New Action
Note: The SMS alert can only be sent if there is an internal or external USB cellular modem attached. However an SMS
alert can also be sent via a SMTP SMS gateway as described above.
Click on Perform RPC Action as the Add Trigger Action. Enter a unique Action Name and set the Action
Delay Time
Select a power Outlet and specify the Action to be performed (power On, OFF or Cycle)
Click Save New Action
Click on Run Custom Script as the Add Trigger Action. Enter a unique Action Name and set the Action Delay
Time
Create a script file to execute when this action is triggered and enter the Script Executable file name e.g.
/etc/config/action.sh
Set the Script Timeout (i.e. the maximum run-time for the script). Leave as 0 for unlimited.
Enter any Arguments that are to be passed to the script and click Save New Action
Click on Send SNMP Trap as the Add Trigger Action. Enter a unique Action Name and set the Action Delay
Time
Note: The SNMP Trap actions are valid for Serial, Environmental, UPS and Cellular data triggers only
Note: To notify the central Nagios server of Alerts, NSCA must be enabled under System: Nagios and Nagios must be
enabled for each applicable host or port
Actions can also be scheduled to be taken a trigger condition has been resolved:
For a nominated Auto-Response - with a defined trigger Check Condition - click on Add Resolve Action (e.g.
Send Email or Run Custom Script) to select the action type to be taken
Note: Resolve Actions are configured exactly the same as Trigger Actions except the designated Resolve Actions are
all executed on resolution of the trigger condition and there are no Action Delay Times set
7.5 Configure SMTP, SMS, SNMP and/or Nagios service for alert notifications
The Auto-Response facility enables remote alerts to be sent as Trigger and Resolve Actions. Before such alert notifications
can be sent, you must configure the nominated alert service.
In the SMTP Server field enter the IP address of the outgoing mail Server
If this mail server uses a Secure Connection, specify its type. You may also specify the IP port to use for SMTP.
The default SMTP Port is 25.
You may enter a Sender email address which will appear as the “from” address in all email notifications sent from
this console server. Many SMTP servers check the sender’s email address with the host domain name to verify
the address as authentic. So it may be useful to assign an email address for the console server such as
[email protected]
You may also enter a Username and Password if the SMTP server requires authentication
Similarly can specify the specific Subject Line that will be sent with the email
Click Apply to activate SMTP
In the SMTP Settings field in the Alerts & Logging: SMTP &SMS menu select SMS Gateway. An SMS via
Email Gateway field will appear
Enter the IP address of the outgoing mail Server SMS gateway
Select a Secure Connection (if applicable) and specify the SMTP port to be used (if other than the default port
25)
You may also enter a Sender email address which will appear as the “from” address in all email notifications sent
from this console server. Some SMS gateway service providers only forward email to SMS when the email has
been received from authorized senders. So you may need to assign a specific authorized email address for the
console server
Note The option to directly send SMS alerts via the cellular modem was included in the Management GUI in V3.4.
Advanced console servers have had the gateway software (SMS Server Tools 3) embedded since V3.1 however
you this could only be accessed from the command line to send SMS messages (refer online FAQ).
Note: All console servers can also be configured to provide status information on demand using snmpd. This SNMP
agent is configured using the SNMP Service Detail on Alerts & Logging: SNMP - as described in Chapter 15
Select the Manager Protocol. SNMP is generally a UDP-based protocol though infrequently it uses TCP instead.
Enter the host address of the SNMP Network Manager into the Manager Address field.
Enter the TCP/IP port number into the Manager Trap Port field (default =162).
Select the Version to be used. The console server SNMP agent supports SNMP v1, v2 and v3
Enter the Community name for SNMP v1 or SNMP v2c. At a minimum, a community needs to be set for either SNMP
v1 or v2c traps to work. An SNMP community is the group to which devices and management stations running SNMP
belong. It helps define where information is sent. SNMP default communities are private for Write and public for
Read.
Configure SNMP v3 if required. For SNMP v3 messages, the user’s details and security level must match what the
receiving SNMP Network Manager is expecting. SNMP v3 mandates that the message will be rejected unless the
SNMPv3 user sending the trap already exists in the user database on the SNMP Manager. The user database in a
SNMP v3 application is actually referenced by a combination of the Username and the Engine ID for the given SNMP
application you are talking to.
o Enter the Engine ID for the user sending messages as a hex number e.g. 0x8000000001020304.
o Specify the Security Level. The level of security has to be compatible with the settings of the remote SNMP
Network Manager.
authPriv Uses both authentication and encryption. This is the highest level
of security and requires an encryption protocol (DES or AES) and
password in addition to the authentication protocol and
password.
o Complete the Username. This is the Security Name of the SNMPv3 user sending the message. This field is
mandatory and must be completed when configuring the console server for SNMPv3.
o An Authentication Protocol (SHA or MD5) and Authentication Password must be given for a Security
Level of either authNoPriv or authPriv. The password must contain at least 8 characters to be valid.
o A Privacy Protocol (DES or AES) must be specified for the authPriv level of security to be used as the
encryption algorithm. AES is recommended for stronger security. A password of at least 8 characters must be
provided for encryption to work.
Click Apply
Note Console servers with V3.0 firmware (and later) also embed the net-snmpd daemon which can accept SNMP
requests from remote SNMP management servers and provides information on serial port and device status (refer
Chapter 15.5 for more details).
Console servers with firmware earlier than V3.3 could only configure a Primary SNMP server from the
Management Console. Refer Chapter 15.5 for details on configuring the snmptrap daemon to send
traps/notifications to multiple remote SNMP servers.
Note: In a Lighthouse CMS centrally managed environment you can check the Nagios alert option. On the trigger
condition (for matched patterns, logins, power events and signal changes) an NSCA check "warning" result will be
sent to the central Nagios server. This condition is displayed on the Nagios status screen and triggers a
notification, which can then cause the Nagios central server itself to send out an email or an SMS, page, etc.
7.6 Logging
The console server can maintain log records of auto-response events and log records of all access and communications
events (with the console server and with the attached serial, network and power devices).
A log of all system activity is also maintained by default, as is a history of the status of any attached environmental monitors.
From the Manage: Devices menu the Administrator will can view serial, network and power device logs stored in the
console reserve memory (or flash USB). The User will only see logs for the Managed Devices they (or their Group) have
been given access privileges for (Refer Chapter 13).
Event logs on the USB can be viewed using the web terminal or by ssh/telnet connecting to the console server.
Select Serial & Network: Serial Port and Edit the port to be logged
Specify the Logging Level of for each port as:
Level 0 Turns off logging for the selected port
Level 1 Logs all User connection events to the port
Level 2 Logs all data transferred to and from the port and all changes in hardware flow control status and
all User connection events
Level 3 Logs all data transferred from the port and all changes in hardware flow control status and all
User connection events
Level 4 Logs all data transferred to the port and all changes in hardware flow control status and all User
connection events
Click Apply
Note A cache of the most recent 8K of logged data per serial port is maintained locally (in addition to the Logs which
are transmitted for remote/USB flash storage). To view the local cache of logged serial port data select Manage:
Port Logs
Specify the logging level that is to be maintained for that particular TDC/UDP port/service, on that particular Host:
Level 0 Turns off logging for the selected TDC/UDP port to the selected Host
Level 1 Logs all connection events to the port
Level 2 Logs all data transferred to and from the port
Click Add then click Apply
Check Log Events on Alerts & Logging: Auto-Response to enable logging all Auto-Response activities
Select the Serial & Network: RPC Connections menu. This will display all the RPC connections that have
already been configured
- When you select Connect Via for a Network RPC connection then the corresponding Host
Name/Description that you set up for that connection will be entered as the Name and Description for
the power device
- Alternately if you select to Connect Via a Serial connection then you will need to enter a Name and
Description for the power device
Select the appropriate RPC Type for the PDU (or IPMI) being connected:
- If you are connecting to the RPC via the network you will be presented with the IPMI protocol options and
the SNMP RPC Types currently supported by the embedded Network UPS Tools
- If you are connecting to the RPC by a serial port you will be presented with all the serial RPC types
currently supported by the embedded PowerMan and Opengear’s power manager:
Enter the Username and Password used to login into the RPC (Note that these login credentials are not related
the Users and access privileges you will have configured in Serial & Networks: Users & Groups)
If you selected SNMP protocol you will need to enter the SNMP v1 or v2c Community for Read/Write access (by
default this would be “private”)
Check Log Status and specify the Log Rate (minutes between samples) if you wish the status from this RPC to
be logged. These logs can be views from the Status: RPC Status screen
Click Apply
For SNMP PDUs the console server will now probe the configured RPC to confirm the RPC Type matches and
will report the number of outlets it finds that can be controlled. If unsuccessful it will report Unable to probe
outlets and you’ll need to check the RPC settings or network/serial connection
For serially connected RPC devices, a new Managed Device (with the same name as given to the RPC) will be
created. The console server will then configure the RPC with the number of outlets specified in the selected RPC
Type or will query the RPC itself for this information
Note Opengear’s console servers support the majority of the popular network and serial PDUs. If your PDU is not on the
default list then support can be added directly (as covered in Chapter 14 - Advanced Configurations) or by having
the PDU supported added to either the Network UPS Tools or PowerMan open source projects.
IPMI service processors and BMCs can be configured so all authorized users can use the Management Console to
remotely cycle power and reboot computers, even when their operating system is unresponsive. To set up IPMI
power control, the Administrator first enters the IP address/domain name of the BMC or service processor (e.g. a
Dell DRAC) in Serial & Network: Network Hosts, then in Serial & Network: RPC Connections specifies the RPC
Type to be IPMI1.5 or 2.0
Select the Manage: Power and the particular Target power device to be controlled (and the Outlet to be
controlled if the RPC supports outlet level control)
The outlet status is displayed and you can initiate the desired Action to be taken by selecting the appropriate
icon:
Turn ON
Turn OFF
Cycle
Status
You will only be presented with icons for those operations that are supported by the Target you have selected.
Click on View Log or select the RPCLogs menu and you will be presented with a table of the history and detailed
graphical information on the selected RPC
Click Manage to query or control the individual power outlet. This will take you to the Manage: Power screen
Network UPS Tools (NUT) is a group of open source programs that provide a common interface for monitoring and
administering UPS hardware; and ensuring safe shutdowns of the systems which are connected. NUT is built on a
networked model with a layered scheme of drivers, server and clients (covered in some detail in Chapter 8.2.6)
The console server may or may not be drawing power itself through the Managed UPS. When the UPS's battery power
reaches critical, the console server signals and waits for slaves to shut down, then powers off the UPS.
Serial and network connected UPSes must first be connected to, and configured to communicate with the console server:
For serial UPSes attach the UPS to the selected serial port on the console server. From the Serial and Network:
Serial Port menu, configure the Common Settings of that port with the RS232 properties etc required by the
UPS (refer Chapter 4.1.1 Common Settings). Then select UPS as the Device Type
Similarly for each network connected UPS go to Serial & Network: Network Hosts menu and configure the UPS
as a connected Host by specifying it as Device Type: UPS and clicking Apply
Select the Serial & Network: UPS Connections menu. The Managed UPSes section will display all the UPS
connections that have already been configured.
Click Add Managed UPS
Select if the UPS will be Connected Via USB or over pre-configured serial port or via SNMP/HTTP/HTTPS over
the preconfigured network Host connection
When you select a network UPS connection then the corresponding Host Name/Description that you set up for
that connection will be entered as the Name and Description for the power device. Alternately if you selected to
Connect Via a USB or serial connection then you will need to enter a Name and Description for the power
device (and these details will also be used to create a new Managed Device entry for the serial/USB connected
UPS devices)
Enter the login details. This Username and Password is used by slaves of this UPS (i.e. other computers that
are drawing power through this UPS) to connect to the console server to monitor the UPS status so they can shut
themselves down when battery power is low. Monitoring will typically be performed using the upsmon client
running on the slave server (refer section 8.2.3)
Note: These login credentials are not related the Users and access privileges you will have configured in Serial &
Networks: Users & Groups
Select the action to take when UPS battery power becomes critical i.e. Shut down the UPS (or Shut down all
Managed UPSes) or simply Run until failure
Note: The shutdown script /etc/scripts/ups-shutdown can be customized so, in the event of a critical power failure (when
the UPS battery runs out) you can perform program the console server to perform "last gasp" actions using
before power is lost! Refer online FAQ for details. However it generally is much simpler to perform such "last
gasp" actions by triggering Auto-Response on the UPS hitting batt or lowbatt. Refer Chapter 7
If you have multiple UPSes and require them to be shut down in a specific order, specify the Shutdown Order
for this UPS. This is a whole positive number, or -1. 0s are shut down first, then 1s, 2s, etc. -1s are not shut
down at all. Defaults to 0
Select the Driver that will be used to communicate with the UPS. Most console servers are preconfigured so the
drop down menu presents full selection of drivers from the latest Network UPS Tools (NUT version 2.4)
However for the SD4001/4002 models you will need to upload the driver you need from
www.opengear.com/download
Click New Options in Driver Options if you need to set driver-specific options for your selected NUT driver and
hardware combination (more details at http://www.networkupstools.org/doc)
Check Log Status and specify the Log Rate (minutes between samples) if you wish the status from this UPS to
be logged. These logs can then be viewed from the Status: UPS Status screen
If you have enabled Nagios services then you will presented with an option for Nagios monitoring. Check Enable
Nagios to enable this UPS to be monitored using Nagios central management
Check Enable Shutdown Script if this is the UPS providing power to the console server itself and in the event of
a critical power failure you can perform any "last gasp" actions on the console server before power is lost. This is
achieved by placing a custom script in /etc/config/scripts/ups-shutdown (you may use the provided /etc/scripts/ups-
shutdown as a template). This script is only run when then UPS reaches critical battery status
Click Apply
Note: You can also customize the upsmon, upsd and upsc settings for this UPS hardware directly from the command line
Select the Serial & Network: UPS Connections menu. The Remote UPSes section will display all the remote
UPS devices being monitored
Click Add Remote UPS
Enter the Name of the particular remote UPS to be remotely monitored. This name must be the name that the
remote UPS was configured with on the remote console server (as the remote console server may itself have
multiple UPSes attached that it is managing locally with NUT). Optionally enter a Description
Enter the IP Address or DNS name of the remote console server* that is managing the remote UPS. (*This may
be another Opengear console server or it may be a generic Linux server running Network UPS Tools)
Note An example where centrally monitor remotely distributed UPSes is useful is a campus or large business site
where there’s a multitude of computer and other equipment sites spread afar, each with their own UPS supply …
and many of these (particularly the smaller sites) will be USB or serially connected.
Having a SD4001/2, ACM5000 or ACM5500 at these remote sites would enable the system manager to centrally
monitor the status of the power supplies at all sites, and centralize alarms. So he/she can be warned to initiate a
call-out or take shut down actions
Check Log Status and specify the Log Rate (minutes between samples) if you wish the status from this UPS to
be logged. These logs can then be viewed from the Status: UPS Status screen
Check Enable Shutdown Script if this remote UPS is the UPS providing power to the console server itself. In the
event the UPS reaches critical battery status the custom script in /etc/config/scripts/ups-shutdown is run enabling
you to perform any "last gasp" actions
Click Apply
Note: The Remote UPS feature is supported on all console servers with V2.8 firmware and later. Earlier versions
supported a single remote “Monitored UPS” which could be set to trigger the console server shutdown script
Click on any particular UPS System name in the table and you will be presented with a more detailed graphical
information on the select UPS System
Click on any particular All Data for any UPS System in the table for more status and configuration information on
the select UPS System
Select UPS Logs and you will be presented with the log table of the load, battery charge level, temperature and
other status information from all the Managed and Monitored UPS systems. This information will be logged for all
UPSes which were configured with Log Status checked. The information is also presented graphically
NUT is built on a networked model with a layered scheme of drivers, server and clients:
The driver programs talk directly to the UPS equipment and run on the same host as the NUT network server
(upsd). Drivers are provided for a wide assortment of equipment from most of the popular UPS vendors and
understand the specific language of each UPS. They communicate to serial, USB and SNMP network connected
UPS hardware and map the communications back to a compatibility layer. This means both an expensive "smart"
protocol UPS and a simple "power strip" model can be handled transparently
The NUT network server program upsd is responsible for passing status data from the drivers to the client
programs via the network. upsd can cache the status from multiple UPSes and then serve this status data to
many clients. upsd also contains access control features to limit the abilities of the clients (e.g. so only authorized
hosts may monitor or control the UPS hardware)
There are a number of NUT clients that connect to upsd to check on the status of the UPS hardware and do
things based on the status. These clients can run on the same host as the NUT server or they can communicate
with the NUT server over the network (enabling them to monitor any UPS anywhere):
The upsc client provides a quick way to poll the status of a UPS server. It can be used inside shell scripts
and other programs that need UPS data but don't want to include the full interface
The upsmon client enables servers that draw power through the UPS to shutdown gracefully when the
battery power reaches critical
There are also logging clients (upslog) and third party interface clients (Big Sister, Cacti, Nagios,
Windows and more)
The latest release of NUT (2.4) also controls PDU systems. It can do this either natively using SNMP or through a
binding to Powerman (open source software from Livermore Labs that also is embedded in Opengear console
servers)
These NUT clients and servers all are embedded in each Opengear console server (with a Management Console
presentation layer added) … and they also are run remotely on distributed console servers and other remote NUT
monitoring systems. This layered distributed NUT architecture enables:
Multiple manufacturer support: NUT can monitor UPS models from 79 different manufacturers - and PDUs from a
growing number of vendors - with a unified interface
Multiple architecture support: NUT can manage serial and USB connected UPS models with the same common
interface. Network connected USB and PDU equipment can also be monitored using SNMP
Multiple clients monitoring the one UPS: Multiple systems may monitor a single UPS using only their network
connections and there's a wide selection of client programs which support monitoring UPS hardware via NUT (Big
Sister, Cacti, Nagios and more)
Central management of multiple NUT servers: A central NUT client can monitor multiple NUT servers that may be
distributed throughout the data center, across a campus or around the world
NUT supports the more complex power architectures found in data centers, communications centers and distributed office
environments where many UPSes from many vendors power many systems with many clients - and each of the larger
UPSes power multiple devices - and many of these devices are in turn dual powered
All Opengear console servers can be configured to monitor their operating environment.
External Environmental Monitor Devices (EMDs) can be connected to any Opengear console server serial port. Each
console server can support multiple EMDs.
Each EMD device has an internal temperature and humidity sensor plus one or two general purpose status sensor ports
which can be connected to smoke detectors, water detectors, vibration sensors or open-door sensors.
The ACM5000 and ACM5500 advanced console server models also each have internal temperature sensor and can
optionally be configured to have up to four general purpose status sensor ports (which can be connected smoke or water
detector and vibration or open-door sensors) directly connected.
Using the Management Console, Administrators can view the ambient temperature (in °C or °F) and humidity
(percentage) and configure alerts to monitor the status and sensors to automatically send alarms progressively from
warning levels to critical.
EMD sensor
Note: You can attach two sensors onto the terminals on EMDs that are connected to console servers with Opengear
Classic pinouts. However console servers with -01 and -02 pinouts only support attaching a single sensor to each
EMD
The EMD can be used only with an Opengear console server and cannot be connected to standard RS232 serial
ports on other appliances.
Select Environmental as the Device Type in the Serial & Network: Serial Port menu for the port to which the
EMD is to be attached. No particular Common Settings are required.
Click Apply
Note: The ACM5000-E Sensor ‘inputs’ are four ‘dry contact’ inputs which are normally open (NO). When open these are
sensed as a TTL high or digital ‘1’. When activated the external devices (door close, vibration, water, smoke)
present a short circuit and the contact ‘closes to ground’ which is read as a TTL low or a digital ‘0’.
For custom applications a user can sense the state (closed or open) of non-Opengear dry contact sensors
through the UI or command line.
It is also possible to control the sensor pins as ‘outputs’. The user can set the pins as TTL high (1) or low (0) as
required for their low voltage/low current application.
The ACM5004-2-I, ACM5508-2-I and ACM5504-5-G-I models have specific dedicated I/O (DIO1 & DIO2) and
output only pins (OUT1 & OUT2), the later having inverting outputs with higher voltage/current transistor
By default on the ACM5000 and ACM500 each SENSOR and DIO port is configured as an Input, so they are available to
be used with external environmental sensors attached
To confirm the direction and state configurations for these ports you can select the System: I/O Ports menu and
a table with the summary status of the four digital I/O ports will be displayed. I/O Port1 = DIO1 or SENSOR1, I/O
Port2 = DIO2 or SENSOR2, I/O Port3 = SENSOR3 and I/O Port4 = SENSOR 4)
When configured as Inputs, the SENSOR and DIO ports are notionally attached to the internal EMD. So go to the
Serial & Network: Environmental page and enable the Internal EMD. Then configure the attached sensors as
alarms as covered in the next section
To add a new EMD click Add and configure an external EMD enter a Name and optionally a Description and
select the pre-configured serial port that the EMD will be Connected Via
You may optionally calibrate the EMD with a Temperature Offset (+ or - °C) or Humidity Offset (+ or percent). Also
if you check Temperature in Fahrenheit then the temperature will be reported in Fahrenheit. Otherwise it will be
reported in degrees Celsius
Provide Labels for each of the alarm sensors you will used e.g. Door Open or Smoke Alarm.
Check Log Status and specify the Log Rate (minutes between samples) if you wish the status from this EMD to
be logged. These logs can be views from the Status: Environmental Status screen
Click Apply. This will also create a new Managed Device (with the same name)
For the ACM5000-E select the Serial & Network: Environmental menu and check Enabled. You will then need
set any temperature offsets and label the sensors as described above
Click on View Log or select the Environmental Logs menu and you will be presented with a table and graphical
plot of the log history of the select EMD
The ACM5004-2-I, ACM5508-2-I and ACM5504-5-G-I models have four digital interface ports which present on a green
connector block on the side of the unit:
DIO1 and DIO2 are two TTL level digital I/O ports (5V max @ 20mA)
OUT1 and OUT2 are two "High-Voltage" digital Output ports (>5V to <= 30V @100mA)
The I/O ports are configured via the I/O port page which is found under the system menu. Each port can be configured
with a default direction and state.
OUT1 and OUT2 transistors can operate with a supply of >5V to <= 30V @100mA. This means to drive a relay circuit you
must guarantee it doesn't provide more than 100mA when set to 1.
AUTHENTICATION
The console server platform is a dedicated Linux computer, and it embodies a myriad of popular and proven Linux
software modules for networking, secure access (OpenSSH) and communications (OpenSSL) and sophisticated user
authentication (PAM, RADIUS, TACACS+, Kerberos and LDAP).
This chapter details how the Administrator can use the Management Console to establish remote AAA
authentication for all connections to the console server and attached serial and network host devices
This chapter also covers establishing a secure link to the Management Console using HTTPS and using OpenSSL
and OpenSSH for establishing secure Administration connection to the console server
More details on RSA SecurID and working with Windows IAS can be found on the online FAQs.
Authentication can be performed locally, or remotely using an LDAP, Radius, Kerberos or TACACS+ authentication
server. The default authentication method for the console server is Local.
Any authentication method that is configured will be used for authentication of any user who attempts to log in through
Telnet, SSH or the Web Manager to the console server and any connected serial port or network host devices.
The console server can be configured to the default (Local) or an alternate authentication method (TACACS, RADIUS,
LDAP or Kerberos) with the option of a selected order in which local and remote authentication is to be used:
Local TACACS /RADIUS/LDAP/Kerberos: Tries local authentication first, falling back to remote if local fails
TACACS /RADIUS/LDAP/Kerberos Local: Tries remote authentication first, falling back to local if remote fails
TACACS /RADIUS/LDAP/Kerberos Down Local: Tries remote authentication first, falling back to local if the
remote authentication returns an error condition (e.g. the remote authentication server is down or inaccessible)
Select Serial and Network: Authentication and check TACAS or LocalTACACS or TACACSLocal or
TACACSDownLocal
Enter the Server Address (IP or host name) of the remote Authentication/Authorization server. Multiple remote
servers may be specified in a comma separated list. Each server is tried in succession.
In addition to multiple remote servers you can also enter for separate lists of Authentication/Authorization servers
and Accounting servers. If no Accounting servers are specified, the Authentication/Authorization servers are used
instead.
Enter and confirm the Server Password. Then select the method to be used to authenticate to the server
(defaults to PAP). To use DES encrypted passwords, select Login
If required enter the TACACS Group Membership Attribute that is to be used to indicate group memberships
(defaults to groupname#n)
If required, specify TACACS Service to authenticate with. This determines which set of attributes are returned by
the server (defaults to raccess )
If required, check Default Admin Privileges to give all TACAS+ authenticated users admin privileges. Use
Remote Groups must also be ticked for these privileges to be granted
Click Apply. TACAS+ remote authentication will now be used for all user access to console server and serially or
network attached devices
TACACS+ The Terminal Access Controller Access Control System (TACACS+) security protocol is a recent protocol
developed by Cisco. It provides detailed accounting information and flexible administrative control over the
authentication and authorization processes. TACACS+ allows for a single access control server (the TACACS+
daemon) to provide authentication, authorization, and accounting services independently. Each service can be
tied into its own database to take advantage of other services available on that server or on the network,
depending on the capabilities of the daemon. There is a draft RFC detailing this protocol. Further information on
configuring remote TACACS+ servers can be found at the following sites:
Enter the Server Address (IP or host name) of the remote Authentication/ Authorization server. Multiple remote
servers may be specified in a comma separated list. Each server is tried in succession
In addition to multiple remote servers you can also enter for separate lists of Authentication/Authorization servers
and Accounting servers. If no Accounting servers are specified, the Authentication/Authorization servers are used
instead
Enter the Server Password
Click Apply. RADIUS remote authentication will now be used for all user access to console server and serially or
network attached devices
RADIUS The Remote Authentication Dial-In User Service (RADIUS) protocol was developed by Livingston
Enterprises as an access server authentication and accounting protocol. The RADIUS server can support a
variety of methods to authenticate a user. When it is provided with the username and original password given by
the user, it can support PPP, PAP or CHAP, UNIX login, and other authentication mechanisms. Further
information on configuring remote RADIUS servers can be found at the following sites:
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/DepKit/d4fe8248-eecd-49e4-88f6-
9e304f97fefc.mspx
http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a00800945cc.shtml
http://www.freeradius.org/
Enter the Server Address (IP or host name) of the remote Authentication server. Multiple remote servers may be
specified in a comma separated list. Each server is tried in succession.
Enter the Server Password
Note To interact with LDAP requires that the user account exist on our console server to work with the remote server
i.e. you can't just create the user on your LDAP server and not tell the console server about it. You need to add
the user account.
Click Apply. LDAP remote authentication will now be used for all user access to console server and serially or
network attached devices
LDAP The Lightweight Directory Access Protocol (LDAP) is based on the X.500 standard, but significantly simpler and
more readily adapted to meet custom needs. The core LDAP specifications are all defined in RFCs. LDAP is a
protocol used to access information stored in an LDAP server. Further information on configuring remote RADIUS
servers can be found at the following sites:
http://www.ldapman.org/articles/intro_to_ldap.html
http://www.ldapman.org/servers.html
http://www.linuxplanet.com/linuxplanet/tutorials/5050/1/
http://www.linuxplanet.com/linuxplanet/tutorials/5074/4/
Note To interact with RADIUS, TACACS+ and LDAP with console server firmware pre 2.4.2 you must also set up the
user accounts on the local console server. All resource authorizations must be added to the local appliance. With
this release if remote AAA is selected, it is used for password checking only. Root is always authenticated locally.
Any changes to PAM configurations will be destroyed next time the authentication configurator is run
Edit the Radius user’s file to include group information and restart the Radius server
When using RADIUS authentication, group names are provided to the console server using the Framed-Filter-Id
attribute. This is a standard RADIUS attribute, and may be used by other devices that authenticate via RADIUS.
To interoperate with other devices using this field, the group names can be added to the end of any existing content in
the attribute, in the following format:
:group_name=testgroup1,users:
The above example sets the remote user as a member of testgroup1 and users if groups with those names exist on
the console server. Any groups which do not exist on the console server are ignored.
When setting the Framed-Filter-Id, the system may also remove the leading colon for an empty field. To work around
this, add some dummy text to the start of the string. For example:
dummy:group_name=testgroup1,users:
If no group is specified for a user, for example AmandaJones, then the user will have no User Interface and
serial port access but limited console access
Default groups available on the console server include ‘admin’ for administrator access and ‘users’ for general
user access
Additional local groups such as testgroup1 can be added via Users & Groups: Serial & Network
For example, in an existing Active Directory setup, a group of users may be part of the “UPS Admin” and “Router Admin”
groups. On the console server, these users will be required to have access to a group “Router_Admin”, with access to
port 1 (connected to the router), and another group “UPS_Admin”, with access to port 2 (connected to the UPS). Once
LDAP is setup, users that are members of each group will have the appropriate permissions to access the router and
UPS.
Currently, the only LDAP directory service that supports group provisioning is Microsoft Active Directory. Support is
planned for OpenLDAP at a later time.
To enable group information to be used with an LDAP server:
Complete the fields for standard LDAP authentication including LDAP Server Address, Server Password, LDAP
Base DN, LDAP Bind DN and LDAP User Name Attribute
Enter memberOf for LDAP Group Membership Attribute as group membership is currently only supported on
Active Directory servers
If required, enter the group information for LDAP Console Server Group DN and/or LDAP Administration
Group DN
A user must be a member of the LDAP Console Server Group DN group in order to gain access to the console and user
interface. For example, the user must be a member of ‘MyGroup’ on the Active Server to gain access to the console
server.
Additionally, a user must be a member of the LDAP Administration Group DN in order to gain administrator access to the
console server. For example, the user must be a member of ‘AdminGroup’ on the Active Server to receive administration
privileges on the console server.
Click Apply.
Ensure the LDAP service is operational and group names are correct within the Active Directory
Note When you are using remote groups with LDAP remote auth, you need to have corresponding local groups on the
console server BUT where the LDAP group names can contain upper case and space characters the local group
name on the console server must be all lower case and the spaces replaced with underscrores. For example, a
remote group on the LDAP server may be 'My Ldap Access Group' needs a corresponding local group on the
console server called 'my_ldap_access_group' (both without the single quotes). The local group on the console
server must specify what the group member is granted access to for any group membership to be effective.
When using TACACS+ authentication, there are two ways to grant a remotely authenticated user privileges. The first is to
set the priv-lvl and port attributes of the raccess service to 12, this is discussed further in section 9.2 of this document.
Additionally or alternatively, group names can be provided to the console server using the groupname custom attribute of
the raccess service.
user = myuser {
service = raccess {
groupname="users"
groupname1="routers"
groupname2="dracs"
}
}
You may also specify multiple groups in one comma-delimited, e.g. groupname="users,routers,dracs" but be aware that
the maximum length of the attribute value string is 255 characters.
To use an attribute name other than "groupname", set Authentication -> TACACS+ -> TACACS Group Membership
Attribute.
Note: Kerberos is very sensitive to time differences between the Key Distribution Center (KDC) authentication server
and the client device. Please make sure that NTP is enabled, and the time zone is set correctly on the console
server.
When authenticating against Active Directory, the Kerberos Realm will be the domain name, and the Master KDC will be
the address of the primary domain controller.
priv-lvl = 11
port1 = sd4001/port02
port2 = 192.168.254.145/port05
}
global = cleartext mit
}
RADIUS Example:
paul Cleartext-Password := "luap"
Service-Type = Framed-User,
Fall-Through = No,
Framed-Filter-Id=":group_name=admin:"
The list of groups may include any number of entries separated by a comma. If the admin group is included, the
user will be made an Administrator.
If there is already a Framed-Filter-Id simply add the list of group_names after the existing entries, including the
separating colon ":".
The System Administrator should not rely on the default certificate as the secured
global access mechanism for use through Internet
Activate your preferred browser and enter https:// IP address. Your browser may respond with a message that
verifies the security certificate is valid but notes that it is not necessarily verified by a certifying authority. To proceed
you need to click yes if you are using Internet Explorer or select accept this certificate permanently (or temporarily)
if you are using Mozilla Firefox.
You will then be prompted for the Administrator account and password as normal.
To do this the console server must be enabled to generate a new cryptographic key and the associated Certificate Signing
Request (CSR) that needs to be certified by a Certification Authority (CA). A certification authority verifies that you are the
person who you claim you are, and signs and issues a SSL certificate to you. To create and install a SSL certificate for the
console server:
Select System: SSL Certificate and fill out the fields as explained below:
Common name This is the network name of the console server once it is installed in the network (usually the
fully qualified domain name). It is identical to the name that is used to access the console server with a web
browser (without the “http://” prefix). In case the name given here and the actual network name differ, the
browser will pop up a security warning when the console server is accessed using HTTPS
Organizational Unit This field is used for specifying to which department within an organization the console
server belongs
Organization The name of the organization to which the console server belongs
Locality/City The city where the organization is located
State/Province The state or province where the organization is located
Country The country where the organization is located. This is the two-letter ISO code, e.g. DE for Germany,
or US for the USA. (Note: the country code has to be entered in CAPITAL LETTERS)
Email The email address of a contact person that is responsible for the console server and its security
Challenge Password Some certification authorities require a challenge password to authorize later changes
on the certificate (e.g. revocation of the certificate). The minimal length of this password is 4 characters
Confirm Challenge Password Confirmation of the Challenge Password
Key length This is the length of the generated key in bits. 1024 Bits are supposed to be sufficient for most
cases. Longer keys may result in slower response time of the console server during connection establishment
Once this is done, click on the button Generate CSR which will initiate the Certificate Signing Request
generation. The CSR can be downloaded to your administration machine with the Download button
Send the saved CSR string to a Certification Authority (CA). for certification. You will get the new certificate
from the CA after a more or less complicated traditional authentication process (depending on the CA)
Upload the certificate to the console server using the Upload button as shown below
After completing these steps the console server has its own certificate that is used for identifying the console server to its
users.
Note Information on issuing certificates and configuring HTTPS from the command line can be found in Chapter 15 -
Advanced
NAGIOS INTEGRATION
Nagios is a powerful, highly extensible open source tool for monitoring network hosts and services. The core Nagios
software package will typically be installed on a server or virtual server, the central Nagios server.
Console servers operate in conjunction with a central/upstream Nagios server to provide distributing monitoring of attached
network hosts and serial devices. They embed the NSCA (Nagios Service Checks Acceptor) and NRPE (Nagios Remote
Plug-in Executor) add-ons – this allows them to communicate with the central Nagios server, eliminating the need for a
dedicated slave Nagios server at remote sites.
The console server products all support basic distributed monitoring. Additionally, IM4xxx families support extensive
customizable distributed monitoring.
Even if distributed monitoring is not required, the Console servers can be deployed locally alongside the Nagios monitoring
host server, to provide additional diagnostics and points of access to managed devices.
Opengear’s SDT for Nagios extends the capabilities of the central Nagios server beyond monitoring, enabling it to be used
for central management tasks. It incorporates the Opengear SDT Connector client, enabling point-and-click access and
control of distributed networks of Console servers and their attached network and serial hosts, from a central location.
Note If you have an existing Nagios deployment, you may wish to use the console server gateways in a distributed
monitoring server capacity only. If this case and you are already familiar with Nagios, skip ahead to section 10.3.
Nagios provides central monitoring of the hosts and services in your distributed network. Nagios is freely downloadable,
open source software. This section offers a quick background of Nagios and its capabilities. A complete overview, FAQ
and comprehensive documentation are available at: http://www.nagios.org
Nagios forms the core of many leading commercial system management solutions such as GroundWork:
http://www.groundworkopensource.com
Nagios does take some time to install and configure – solutions such as GroundWork and Opengear SDT Nagios are aimed
at simplifying this process. Once Nagios is up and running however, it provides an outstanding network monitoring system.
With Nagios you can:
Display tables showing the status of each monitored server and network service in real time
Use a wide range of freely available plug-ins to make detailed checks of specific services – e.g. don't just check a
database is accepting network connections, check that it can actually validate requests and return real data
Display warnings and send warning e-mails, pager or SMS alerts when a service failure or degradation is detected
Assign contact groups who are responsible for specific services in specific time frames
A vanilla Nagios 2.x or 3.x installation (typically on a Linux server) generally running on a blade, PC, virtual machine,
etc. at a central location
Runs a web server that displays the Nagios GUI
Imports configuration from distributed Opengear servers using the SDT for Nagios Configuration Wizard
Clients
Browse the Opengear console server and select System: Nagios on the console server Management Console.
Check Nagios service Enabled
Enter the Host Name and the Nagios Host Address (i.e. IP address) that the central Nagios server will use to
contact the distributed Opengear console server
Enter the Username and Password (from10.2.2) in Gateway Username and Password – in this example we
used sdtnagiosuser
Close SDT Connector (it’s not necessary to add any SDT Connector hosts)
Now you can open your web browser and login to the SDT Nagios web UI on the central Nagios server:
Select Service Detail from the Monitoring menu
Locate the row with the Windows IIS Server host then the service check beginning with check_tcp_3339, and click
the link to Connect via SDT
SDT Connector launches and starts up a Terminal Services session to the IIS Server, securely tunneled through the
distributed Opengear server.
Likewise, locate the row for the router’s serial console port, and the service check beginning with check_serial,
and click the link to Connect via SDT
Note that these actions will also trigger the alert_login alerts that you added
Enter the Nagios Host Name that the Console server will be referred to in the Nagios central server – this will be
generated from local System Name (entered in System: Administration) if unspecified
In Nagios Host Address enter the IP address or DNS name that the upstream Nagios server will use to reach
the console server – if unspecified this will default to the first network port’s IP (Network (1) as entered in System:
IP)
In Nagios Server Address enter the IP address or DNS name that the console server will use to reach the
upstream Nagios monitoring server
Check the Disable SDT Nagios Extensions option if you wish to disable the SDT Connector integration with
your Nagios server at the head end – this would only be checked if you want to run a vanilla Nagios monitoring
If not, enter the IP address or DNS name the SDT Nagios clients will use to reach the console server in SDT
Gateway Address
When NRPE and NSCA are both enabled, NSCA is preferred method for communicating with the upstream
Nagios server – check Prefer NRPE to use NRPE whenever possible (i.e. for all communication except for alerts)
Enabling NRPE allows you to execute plug-ins (such as check_tcp and check_ping) on the remote Console server to
monitor serial or network attached remote servers. This will offload CPU load from the upstream Nagios monitoring
machine which is especially valuable if you are monitoring hundreds or thousands of hosts. To enable NRPE:
Enter the details the user connection to the upstream Nagios monitoring server and again refer the sample Nagios
configuration example below for details of configuring specific NRPE checks
By default the console server will accept a connection between the upstream Nagios monitoring server and the NRPE
server with SSL encryption, without SSL, or tunneled through SSH. The security for the connection is configured at the
Nagios server.
NSCA is the mechanism that allows you to send passive check results from the remote console server to the Nagios
daemon running on the monitoring server. To enable NSCA:
Select Enable Nagios, specify the name of the device as it will appear on the upstream Nagios server
Click New Check to add a specific check which will be run on this host
Select Check Permitted TCP/UDP to monitor a service that you have previously added as a Permitted Service
Select Check TCP/UDP to specify a service port that you wish to monitor, but do not wish to allow external (SDT
Connector) access to
Select Check TCP to monitor
The Nagios Check nominated as the check-host-alive check is the check used to determine whether the
network host itself is up or down
Typically this will be Check Ping – although in some cases the host will be configured not to respond to pings
If no check-host-alive check is selected, the host will always be assumed to be up
You may deselect check-host-alive by clicking Clear check-host-alive
If required, customize the selected Nagios Checks to use custom arguments
Click Apply
; Managed Host
define host{
use generic-host
host_name server
alias server
address 192.168.254.227
}
define service {
service_description NRPE Daemon
host_name opengear
use generic-service
check_command check_nrpe_daemon
}
; Serial Status
define command {
command_name check_serial_status
command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c check_serial_$HOSTNAME$
}
define service {
service_description Serial Status
host_name server
use generic-service
check_command check_serial_status
}
define service {
service_description serial-signals-server
host_name server
use generic-service
check_command check_serial_status
active_checks_enabled 0
passive_checks_enabled 1
}
define servicedependency{
name opengear_nrpe_daemon_dep
host_name opengear
dependent_host_name server
dependent_service_description Serial Status
service_description NRPE Daemon
execution_failure_criteria w,u,c
}
; Port Log
define command{
command_name check_port_log
command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c port_log_$HOSTNAME$
}
define service {
service_description Port Log
host_name server
use generic-service
check_command check_port_log
}
define servicedependency{
name opengear_nrpe_daemon_dep
host_name opengear
dependent_host_name server
dependent_service_description Port Log
service_description NRPE Daemon
execution_failure_criteria w,u,c
}
; Ping
define command{
command_name check_ping_via_opengear
command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c host_ping_$HOSTNAME$
}
define service {
service_description Host Ping
host_name server
use generic-service
check_command check_ping_via_opengear
}
define service {
service_description host-ping-server
host_name server
use generic-service
check_command check_ping_via_opengear
active_checks_enabled 0
passive_checks_enabled 1
}
define servicedependency{
name opengear_nrpe_daemon_dep
host_name opengear
dependent_host_name server
dependent_service_description Host Ping
service_description NRPE Daemon
execution_failure_criteria w,u,c
}
; SSH Port
define command{
command_name check_conn_via_opengear
command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c host_$HOSTNAME$_$ARG1$_$ARG2$
}
define service {
service_description SSH Port
define service {
service_description host-port-tcp-22-server
; host-port-<protocol>-<port>-<host>
host_name server
use generic-service
check_command check_conn_via_opengear!tcp!22
active_checks_enabled 0
passive_checks_enabled 1
}
define servicedependency{
name opengear_nrpe_daemon_dep
host_name opengear
dependent_host_name server
dependent_service_description SSH Port
service_description NRPE Daemon
execution_failure_criteria w,u,c
}
These plug-ins from the Nagios plug-ins package can be downloaded from ftp.opengear.com.
There also are bash scripts which can be downloaded and run (primarily check_log.sh).
To configure additional checks the downloaded plug-in program must be saved in the tftp addins directory on the
USB flash and the downloaded text plug-in file saved in /etc/config
To enable these new additional checks you select Serial&Network: Network Port, then Edit the Network Host to
be monitored, and select New Checks. The additional check option will have been included in the updated
Nagios Checks list, and you can again customize the arguments
If you need other plug-ins to be loaded into the IM7200 or IM4200 firmware:
If the plug-in in a Perl script, it must be rewritten as the console server does not support Perl at this point.
However, if you do require Perl support, please make a feature request to [email protected]
Individual compiled programs may be generated using gcc for ARM. Again contact [email protected] for
details
I. Local office
In this scenario, the console server is set up to monitor the console of each managed device. It can be configured to
make a number of checks, either actively at the Nagios server's request, or passively at preset intervals, and submit the
results to the Nagios server in a batch.
The console server may be augmented at the local office site by one or more Intelligent Power Distribution Units (IPDUs)
to remotely control the power supply to the managed devices.
SYSTEM MANAGEMENT
This chapter describes how the Administrator can perform a range of general console server system administration and
configuration tasks such as:
Applying Soft and Hard Resets to the gateway
Re-flashing the Firmware
Configuring the Date, Time and NTP
Setting up Backup of the configuration files
Delayed configuration commits
Configuring the console server in FIPS mode
System administration and configuration tasks that are covered elsewhere include:
Resetting System Password and entering new System Name/ Description for the console server (Chapter
3.2)
Setting the console server’s System IP Address (Chapter 3. 3)
Setting the permitted Services by which to access the console server (Chapter 3.4)
Setting up OOB Dial-in (Chapter 5)
Configuring the Dashboard (Chapter 12)
The console server reboots with all settings (e.g. the assigned network IP address) preserved. However this soft reset does
disconnect all users and ends any SSH sessions that had been established.
A soft reset will also be affected when you switch OFF power from the console server, and then switch the power back ON.
However if you cycle the power and the unit is writing to flash you could corrupt or lose data, so the software reboot is the
safer option.
A hard erase (hard reset) is effected by:
Pushing the Erase button on the rear panel twice. A ball point pen or bent paper clip is a suitable tool for
performing this procedure. Do not use a graphite pencil. Depress the button gently twice (within a couple of
second period) while the unit is powered ON.
This will reset the console server back to its factory default settings and clear the console server’s stored configuration
information (i.e. the IP address will be reset to 192.168.0.1). You will be prompted to log in and must enter the default
administration username and administration password (Username: root Password: default).
Before upgrading you should ascertain if you are already running the most current firmware in your Opengear device. Your
Opengear device will not allow you to upgrade to the same or an earlier version.
The Firmware version is displayed in the header of each page
Alternately selecting Status: Support Report reports the Firmware Version
To upgrade, you first must download the latest firmware image from ftp://ftp.opengear.com or
http://opengear.com/firmware/:
Save this downloaded firmware image file on to a system on the same subnet as the Opengear device
Also download and read the release_notes.txt for the latest information
To up-load the firmware image file, select System: Firmware
Specify the address and name of the downloaded Firmware Upgrade File, or Browse the local subnet and locate
the downloaded file
Click Apply and the Opengear device will undertake a soft reboot and commence upgrading the firmware. This
process will take several minutes
It is important to set the local Date and Time in your Opengear appliance as soon as it is configured. Features such as
Syslog and NFS logging use the system time for time-stamping log entries, while certificate generation depends on a
correct Timestamp to check the validity period of the certificate.
Your Opengear appliance can synchronize its system time with a remote Network Time Protocol (NTP) server. NTP uses
Coordinated Universal Time (UCT) for all time synchronizations so it is not affected by different time zones. However you
do need to specify your local time zone so the system clock shows correct local time:
Set your appropriate region/locality in the Time Zone selection box and click Set Timezone
Note: With Version 3.2.0 firmware the Time Zone can also be set to UCT which replaced Greenwich Mean Time as the
World standard for time in 1986.
Configuring NTP ensures the Opengear appliance clock is kept extremely accurate (once Internet connection has been
established).
Select the Enable NTP checkbox in the Network Time Protocol section of the System: Date & Time page
If your external NTP server requires authentication, you need to specify the NTP Authentication Key and the
Key Index to use when authenticating with the NTP server
Note: All Opengear appliances, except the SD4001/2 models, have an internal battery-backed hardware clock. When
the time and date is set manually through the management console, or retrieved from an NTP server,
the hardware clock of the Opengear appliance is automatically updated. The hardware clock uses a battery to
allow the current time and date to be maintained across reboots, and after the appliance has been powered down
for longer periods of time.
Note: With the NTP peering model, the Opengear appliance can share its time information with other devices connected
to it, so all devices can be time synchronized. To do this, tick Enable NTP on the Time and Date page, and
ensure that the appropriate networks are selected on the Service Access page.
Select the System: Configuration Backup menu option or click the icon
Note The configuration files can also be backed up from the command line (refer Chapter 14)
With all console servers you can save the backup file remotely on your PC and you can restore configurations from
remote locations:
Click Save Backup in the Remote Configuration Backup menu
The config backup file (System Name_date_config.opg) will be downloaded to your PC and saved in the location
you nominate
Click Browse in the Remote Configuration Backup menu and select the Backup File you wish to restore
Click Restore and click OK. This will overwrite all the current configuration settings in your console server
Alternately with some console servers you can save the backup file locally onto the USB storage. To do this your console
server must support USB and you must have an internal or external USB flash drive installed.
To back up to the USB enter a brief Description of the backup in the Local Backup menu and select Save
Backup
The Local Backup menu will display all the configuration backup files you have stored onto the USB flash
To restore a backup from the USB simply select Restore on the particular backup you wish to restore and click
Apply
Note: Before selecting Load On Erase please ensure you have tested your alternate default configuration by clicking
Restore
If for some reason your alternate default configuration causes the console server to become unbootable recover
your unit to factory settings using the following steps:
If the configuration is stored on an external USB storage device, unplug the storage device and reset to
factory defaults as per section 11.1 of the user manual
If the configuration is stored on an internal USB storage device reset to factory defaults using a specially
prepared USB storage device:
o The USB storage device must be formatted with a Windows FAT32/VFAT file system on the first
partition or the entire disk, most USB thumb drives are already formatted this way
o The file system must have the volume label: OPG_DEFAULT
o Insert this USB storage device into an external USB port on the console server and reset to factory
defaults as per section 11.1
After recovering your console server, ensure the problematic configuration is no longer selected for Load On
Erase
The Delayed Config Commit mode is available on all ACM5500, ACM5000, IM7200 and IM4200 family of advanced
console servers with Firmware V3.2 and later.
This mode allows the grouping or queuing of configuration changes and the simultaneous application of these changes to
a specific device. For example, changes to authentication methods or user accounts may be grouped and run once to
minimize system downtime. To enable:
Check the Delayed Config Commits button under System: Administration
Click Apply
Alternately click Cancel and this will discard all the delayed configuration changes
Note All the queued configuration changes will be lost if Cancel is selected
Uncheck the Delayed Config Commits button under System: Administration and click Apply
Click the Commit Config button in top right-hand corner of the screen to display the System: Commit
Configuration screen
The Commit Config button will no longer be displayed in the top right-hand corner of the screen and configurations will
no longer be queued.
Note The US National Institute of Standards and Technology (NIST) publishes the FIPS (Federal Information
Processing Standard) series of standards. FIPS 140-1 and FIPS 140-2 are both technical standards and
worldwide de-facto standards for the implementation of cryptographic modules. These standards and guidelines
are issued by NIST for use government-wide. NIST develops FIPS when there are compelling Federal
government requirements such as for security and interoperability and there are no acceptable industry standards
or solutions.
Opengear advance console servers use an embedded OpenSSL cryptographic module that has been validated to
meet the FIPS 140-2 standards and has received Certificate #1051
When configured in FIPs mode all SSH, HTTPS and SDT Connector access to all services on the advanced console servers
will use the embedded FIPS compliant cryptographic module. To connect you must also be using cryptographic algorithms
that are FIPs approved in your browser or client or the connection will fail.
Select the System: Administration menu option
Check FIPS Mode to enable FIPS mode on boot, and check Reboot to safely reboot the console server
Click Apply and the console server will now reboot. It will take several minutes to reconnect as secure
communications with your browser are validated, and when reconnected it will display “FIPs mode: Enabled” in
the banner
Note: To enable FIPS mode from the command line, login and run these commands:
config -s config.system.fips=on
touch /etc/config/FIPS
chmod 444 /etc/config/FIPS
flatfsd -b
The final command saves to flash and reboots the unit. The unit will take a few minutes to boot into FIPS mode.
To disable FIPS mode:
config -d config.system.fips
rm /etc/config/FIPS
flatfsd –b
STATUS REPORTS
This chapter describes the dashboard feature and the status reports that are available:
Port Access and Active Users
Statistics
Support Reports
Syslog
Dashboard
Other status reports that are covered elsewhere include:
UPS Status (Chapter 8.2)
RPC Status (Chapter 8.1)
Environmental Status (Chapter 8.3)
The Administrator can also see the current status as to Users who have active sessions on those ports:
Select the Status: Active Users
12.2 Statistics
The Statistics report provides a snapshot of the status, current traffic and other activities and operations of your console
server:
Select the Status: Statistics
The Support Report provides useful status information that will assist the Opengear technical support team to solve any
problems you may experience with your console server.
If you do experience a problem and have to contact support, ensure you include the Support Report with your email support
request. The Support Report should be generated when the issue is occurring, and attached in plain text format.
Select Status: Support Report and you will be presented with a status snapshot
Save the file as a text file and attach it to your support email
12.4 Syslog
The Linux System Logger in the console server maintains a record of all system messages and errors:
Select Status: Syslog
The syslog record can be redirected to a remote Syslog Server:
Enter the remote Syslog Server Address and Syslog Server Port details and click Apply
The console maintains a local Syslog. To view the local Syslog file:
Select Status: Syslog
To make it easier to find information in the local Syslog file, a pattern matching filter tool is provided.
Specify the Match Pattern that is to be searched for (e.g. the search for mount is shown below) and click Apply.
The Syslog will then be represented with only those entries that actually include the specified pattern
12.5 Dashboard
The Dashboard provides the administrator with a summary of the status of the console server and its Managed Devices.
Custom dashboards can be configured for each user groups.
Note: You can configure a custom dashboard for any admin user or for the admin group or you can reconfigure the
default dashboard
The Status:Dashboard screen is the first screen displayed when admin users (other than root) log into the console
manager. If you log in as "John", and John is member of the admin group and there is a dashboard layout
configured for John, then you will see the dashboard for John (on log-in and each time you click on the
Status:Dashboard menu item.
If there is no dashboard layout configured for John but there is an admin group dashboard configured then you
will see the admin group dashboard instead. If there is no user dashboard or admin group dashboard configured,
then you will see the default dashboard.
The root user does not have its own dashboard.
The above configuration options are intended to enable admin users to setup their own custom dashboards
The Dashboard displays six widgets . These widgets include each of the Status screens (alerts, devices, ports ups, rpc
and environmental status) and a custom script screen. The admin user can configure which of these widgets is to be
displayed where:
Go to the Dashboard layout panel and select which widget is to be displayed in each of the six display locations
(widget1 …6)
Note: The Alerts widget is a new screen that shows the current alerts status. When an alert gets triggered, a
corresponding .XML file is created in /var/run/alerts/. The dashboard scans all these files and displays a summary
status in the alerts widget. When an alert is deleted the corresponding .XML files that belong to that alert are also
deleted.
Go to the Configure widgets panel and configure each selected widget (e.g. specify which UPS status is to be
displayed on the ups widget or the maximum number of Managed Devices to be displayed in the devices widget
Click Apply
Note: Dashboard configuration is stored in the /etc/config/config.xml file. Each configured dashboard will increase the
config file. If this file gets too big, you can run out of memory space on the console server.
#!/bin/sh
exit 0
MANAGEMENT
The console server has a small number of Manage reports and tools that are available to both Administrators and Users:
Access and control authorized devices
View serial port logs and host logs for those devices
Use SDT Connector or the Web Terminal to access serially attached consoles
Control of power devices (where authorized)
All other Management Console menu items are available to Administrators only
To display the Managed Devices and their associated serial, network and power connections:
Select Manage: Devices. The Administrator will be presented with a list of all configured Managed Devices
whereas the User will only see the Managed Devices they (or their Group) has been given access privileges for
Select Serial, Network or Power for a view of the specific connections. The user can then take a range of actions
using these serial, network or power connections by selecting the Action icon or the related Manage menu item
Administrators can now communicate directly with the console server command line from their browser:
Select Manage: Terminal to display the Web Terminal from which you can log in to the console server command
line
Administrator and Users can communicate directly with serial port attached devices from their browser:
Select the Serial tab on the Manage: Devices menu
Under the Action column, click the Web Terminal icon to display the Web Terminal, connected directly to the
attached serial device
Note The Web Terminal feature was introduced in firmware V3.3. Earlier releases had an open source jcterm java
terminal applet which could be downloaded into your browser to connect to the console server and attached serial
port devices. However jcterm had some JRE compatibility issues and is no longer supported
This chapter is not intended to teach you Linux. We assume you already have a
certain level of understanding before you execute Linux kernel level commands.
Description
There are three ways to delete a config element value. The simplest way is use the delete-node script detailed later in
Chapter 15. You can also assign the config element to "", or delete the entire config node using -d:
# /bin/config -d 'element name'
All passwords are saved in plaintext except the user passwords and the system passwords, which are encrypted.
Note: The config command does not verify whether the nodes edited/added by the user are valid. This means that any node
may be added to the tree. If a user were to run the following command:
# /bin/config -s config.fruit.apple=sweet
The configurator will not complain, but this command is clearly useless. When the configurators are run (to turn the
config.xml file into live config) they will simply ignore this <fruit> node. Administrators must make sure of the spelling
when typing config commands. Incorrect spelling for a node will not be flagged.
Most configurations made to the XML file will be immediately active. To make sure that all configuration changes are active,
especially when editing user passwords, run all the configurators:
# /bin/config -a
For information on backing up and restoring the configuration file refer Chapter 15 Advanced Configuration.
Device Mode
For a device mode port, set the port type to either ups, rpc, or enviro:
# config -s config.ports.port5.device.type=[ups | rpc | enviro]
For port 5 as a UPS port:
# config -s config.ports.port5.mode=reserved
For port 5 as an RPC port:
# config -s config.ports.port5.mode=powerman
For port 5 as an Environmental port:
# config -s config.ports.port5.mode=reserved
Syslog settings
Additionally, the global system log settings can be set for any specific port, in any mode:
# config -s config.ports.port#.syslog.facility='facility'
'facility' can be:
Default
local 0-7
auth
authpriv
cron
daemon
ftp
kern
lpr
mail
news
user
uucp
# config -s config.ports.port#.syslog.priority='priority'
'priority' can be:
Default
warning
notice
Info
error
NOTE: The -P parameter will prompt the user for a password, and encrypt it. In fact, the value of any config element can be
encrypted using the -P parameter, but only encrypted user passwords and system passwords are supported. If any other
element value were to be encrypted, the value will become inaccessible and will have to be re-set.
To add this user to specific groups (admin/users):
# config -s config.users.user2.groups.group1='groupname'
# config -s config.users.user2.groups.group2='groupname2'
etc...
To give this user access to a specific port:
# config -s config.users.user2.port1=on
# config -s config.users.user2.port2=on
# config -s config.users.user2.port5=on
etc...
To remove port access:
# config -s config.users.user2.port1='' (the value is left blank)
or simply:
# config -d config.users.user2.port1
The port number can be anything from 1 to 48, depending on the available ports on the specific console server.
For example assume we have an RPC device connected to port 1 on the console server and the RPC is configured. To
give this user access to RPC outlet number 3 on the RPC device, run the 2 commands below:
# config -s config.ports.port1.power.outlet3.users.user2=John
# config -s config.ports.port1.power.outlet3.users.total=2 (total number of users that have access to this outlet)
If more users are given access to this power outlet, then increment the 'config.ports.port1.power.outlet3.users.total' element
accordingly.
To give this user access to network host 5 (assuming the host is configured):
# config -s config.sdt.hosts.host5.users.user1=John
# config -s config.sdt.hosts.host5.users.total=1 (total number of users having access to host)
To edit any of the user element values, use the same approach as when adding user elements i.e. use the '-s' parameter.
If any of the config elements do not exist, they will automatically be created.
To delete the user called John, use the delete-node script:
# ./delete-node config.users.user2
The following command will synchronize the live system with the new configuration:
# config -r users
# config -s config.ups.monitors.monitor1.port=/dev/port01
If the port number is higher than 9, eg port 13, enter:
# config -s config.ups.monitors.monitor1.port=/dev/port13
Remote UPSes
To add a remote UPS with the following details (assuming this is our first remote UPS):
# config -s config.ups.remotes.remote1.name=oldUPS
# config -s "config.ups.remotes.remote1.description=UPS in room 2"
# config -s config.ups.remotes.remote1.address=192.168.50.50
# config -d config.ups.remotes.remote1.log.enabled
# config -s config.ups.remotes.remote1.log.interval=240
# config -s config.ups.remotes.remote1.script.enabled=on
# config -s config.ups.remotes.total=1
The following command will synchronize the live system with the new configuration:
# config -a
However FYI before adding an RPC the Management Console GUI code makes sure that at least 1 port has been configured
to run in 'device mode', and that the device is set to 'rpc'.
To add an RPC with the following values:
The following command will synchronize the live system with the new configuration:
# config -a
14.1.10 Environmental
To configure an environmental monitor with the following details:
# config -s config.ports.port3.enviro.name=Envi4
# config -s "config.ports.port3.enviro.description=Monitor in room 5"
# config -s config.ports.port3.enviro.offsets.temp=2
# config -s config.ports.port3.enviro.offsets.humid=5
# config -s config.ports.port3.enviro.alarms.alarm1.alarmstate=on
# config -s config.ports.port3.enviro.alarms.alarm1.label=door alarm
# config -s config.ports.port3.enviro.alarms.alarm2.alarmstate=on
# config -s config.ports.port3.enviro.alarms.alarm2.label=window alarm
# config -s config.ports.port3.enviro.alarms.total=2
# config -s config.ports.port3.enviro.log.enabled=on
# config -s config.ports.port3.enviro.log.interval=120
It is important to assign alarms.total=2 even if they are off.
The following 5 commands will add the environmental monitor to 'Managed devices':
To get the total number of managed devices:
# config -g config.devices.total
Make sure to use the total + 1 for the new device below:
# config -s config. devices.device5.connections.connection1.name=Envi4
# config -s "config. devices.device5.connections.connection1.type=EMD Unit"
# config -s config. devices.device5.name=Envi4
# config -s "config. devices.device5.description=Monitor in room 5"
# config -s config.devices.total=5
The following command will synchronize the live system with the new configuration:
# config -a
# config -s config.eventlog.server.logpriority='priority'
'priority' can be:
Info
Alert
Critical
Debug
Emergency
Error
Notice
Warning
Assume the remote log server needs a username 'name1' and password 'secret':
# config -s config.eventlog.server.username=name1
# config -s config.eventlog.server.password=secret
To set the remote path as '/opengear/logs' to save logged data:
# config -s config.eventlog.server.path=/opengear/logs
# config -s config.eventlog.server.type=[none | syslog | nfs | cifs | usb]
If the server type is set to usb, none of the other values need to be set. The mount point for storing on a remote USB
device is /var/run/portmanager/logdir
The following command will synchronize the live system with the new configuration:
# config -a
14.1.13 Alerts
You can add an email, SNMP or NAGIOS alert by following the steps below.
Assume this is our second alert, and we want to send alert emails to [email protected] and sms's to
[email protected]:
# config -s config.alerts.alert2.description=MySecondAlert
# config -s [email protected]
# config -s [email protected]
To use NAGIOS to notify of this alert
# config -s config.alerts.alert2.nsca.enabled=on
To use SNMP to notify of this alert
# config -s config.alerts.alert2.snmp.enabled=on
Increment the total alerts:
# config -s config.alerts.total=2
Below are the specific settings depending on the type of alert required:
Connection Alert
To trigger an alert when a user connects to serial port 5 or network host 3:
# config -s config.alerts.alert2.host3='host name'
# config -s config.alerts.alert2.port5=on
# config -s config.alerts.alert2.sensor=temp
# config -s config.alerts.alert2.signal=DSR
# config -s config.alerts.alert2.type=login
Signal Alert
To trigger an alert when a signal changes state on port 1:
# config -s config.alerts.alert2.port1=on
# config -s config.alerts.alert2.sensor=temp
# config -s config.alerts.alert2.signal=[ DSR | DCD | CTS ]
# config -s config.alerts.alert2.type=signal
Example2: To configure a load sensor alert for outlets 2 and 4 for an RPC called 'RPCInRoom20':
# config -s config.alerts.alert2.outlet1='RPCname'.outlet2
# config -s config.alerts.alert2.outlet2='RPCname'.outlet4
# config -s config.alerts.alert2.enviro.high.critical=300
# config -s config.alerts.alert2.enviro.high.warning=280
# config -s config.alerts.alert2.enviro.hysteresis=20
# config -s config.alerts.alert2.enviro.low.critical=50
# config -s config.alerts.alert2.enviro.low.warning=70
# config -s config.alerts.alert2.rpc1=RPCInRoom20
# config -s config.alerts.alert2.sensor=load
# config -s config.alerts.alert2.signal=DSR
# config -s config.alerts.alert2.type=enviro
# config -s config.alerts.alert2.alarmrange.mon.from.hour=0
# config -s config.alerts.alert2.alarmrange.mon.from.min=0
# config -s config.alerts.alert2.alarmrange.mon.until.hour=0
# config -s config.alerts.alert2.alarmrange.mon.until.min=0
The following command will synchronize the live system with the new configuration:
# config -r alerts
# config -s config.system.smtp.server=mail.opengear.com
# config -s config.system.smtp.encryption=SSL (can also be TLS or None )
# config -s [email protected]
# config -s config.system.smtp.username=john
# config -s config.system.smtp.password=secret
# config -s config.system.smtp.subject=SMTP alerts
To set-up an SMTP SMS server with the same details as above:
# config -s config.system.smtp.server2=mail.opengear.com
# config -s config.system.smtp.encryption2=SSL (can also be TLS or None )
# config -s [email protected]
# config -s config.system.smtp.username2=john
# config -s config.system.smtp.password2=secret
# config -s config.system.smtp.subject2=SMTP alerts
The following command will synchronize the live system with the new configuration:
# config -a
14.1.15 SNMP
To set-up the SNMP agent on the device:
# config -s config.system.snmp.protocol=[ UDP | TCP ]
# config -s config.system.snmp.trapport='port number' (default is 162)
# config -s config.system.snmp.address='NMS IP network address'
# config -s config.system.snmp.commnity='community name' (v1 and v2c only)
# config -s config.system.snmp.engineid='ID' (v3 only)
# config -s config.system.snmp.username='username' (v3 only)
# config -s config.system.snmp.password='password' (v3 only)
# config -s config.system.snmp.version=[ 1 | 2c | 3 ]
The following command will synchronize the live system with the new configuration:
# config -a
# config -s config.system.name=og.mydomain.com
# config -P config.system.password (will prompt user for a password)
# config -s "config.system.location=Device in office 2"
NOTE: The -P parameter will prompt the user for a password, and encrypt it. In fact, the value of any config element can be
encrypted using the -P parameter, but only encrypted user passwords and system passwords are supported. If any other
element value were to be encrypted, the value will become inaccessible and will have to be re-set.
The following command will synchronize the live system with the new configuration:
# config –a
14.1.17 IP settings
To configure the primary network interface with static settings:
IP address 192.168.0.23
Netmask 255.255.255.0
Default gateway192.168.0.1
DNS server 1 192.168.0.1
DNS server 2 192.168.0.2
# config -s config.interfaces.wan.address=192.168.0.23
# config -s config.interfaces.wan.netmask=255.255.255.0
# config -s config.interfaces.wan.gateway=192.168.0.1
# config -s config.interfaces.wan.dns1=192.168.0.1
# config -s config.interfaces.wan.dns2=192.168.0.2
# config -s config.interfaces.wan.mode=static
# config -s config.interfaces.wan.media=[ Auto | 100baseTx-FD | 100baseTx-HD | 10baseT-HD ] 10baseT-FD
To enable bridging between all interfaces:
# config -s config.system.bridge.enabled=on
To enable IPv6 for all interfaces
# config -s config.system.ipv6.enabled=on
To configure the management lan interface, use the same commands as above but replace:
config.interfaces.wan, with config.interfaces.lan
Note: Not all devices have a management LAN interface.
To configure a failover device in case of an outage:
# config -s config.interfaces.wan.failover.address1='ip address'
# config -s config.interfaces.wan.failover.address2='ip address'
# config -s config.interfaces.wan.failover.interface=[ eth1 | console | modem ]
The network interfaces can also be configured automatically:
# config -s config.interfaces.wan.mode=dhcp
# config -s config.interfaces.lan.mode=dhcp
The following command will synchronize the live system with the new configuration:
# /bin/config –-run=ipconfig
The following command will synchronize the live system with the new configuration:
# config -r ipconfig
# /bin/hwclock --systohc
If you do not wish to use out-of-band dial-in access please note that the procedure for enabling start-up messages on the
console port is covered in Chapter 15 - Accessing the Console Port.
The following command will synchronize the live system with the new configuration:
# config –a
# config -s config.services.http.enabled=on
# config -d config.services.https.enabled
# config -d config.services.telnet.enabled
# config -s config.services.ssh.enabled=on
# config -d config.services.snmp.enabled
# config -d config.services.pingreply.enabled
# config -s config.services.tftp.enabled=on
To set secondary port ranges for any service
# config -s config.services.telnet.portbase='port base number' Default: 2000
# config -s config.services.ssh.portbase='port base number' Default: 3000
# config -s config.services.tcp.portbase='port base number' Default: 4000
# config -s config.services.rfc2217.portbase='port base number' Default: 5000
# config -s config.services.unauthtel.portbase='port base number Default: 6000
The following command will synchronize the live system with the new configuration:
# config -a
14.1.22 NAGIOS
To configure NAGIOS with the following settings:
NAGIOS host name cm4116 (Name of this system)
NAGIOS host address 192.168.0.1 (IP to find this device at)
NAGIOS server address 192.168.0.10 (upstream NAGIOS server)
Enable SDT for NAGIOS ext. Enabled
SDT gateway address 192.168.0.1 (defaults to host address)
Prefer NRPE over NSCA Disabled (defaults to Disabled)
# config -s config.system.nagios.enabled=on
# config -s config.system.nagios.name=cm4116
# config -s config.system.nagios.address=192.168.0.1
# config -s config.system.nagios.server.address=192.168.0.10
# config -s config.system.nagios.sdt.disabled=on (disables SDT for nagios extensions)
# config -s config.system.nagios.sdt.address=192.168.0.1
# config -s config.system.nagios.nrpe.prefer=''
To configure NRPE with following settings:
NRPE port 5600 (port to listen on for nrpe. Defaults to 5666)
NRPE user user1 (User to run as. Defaults to nrpe)
NRPE group group1 (Group to run as. Defaults to nobody)
Allow command arguments Enabled
# config -s config.system.nagios.nsca.enabled=on
# config -s config.system.nagios.nsca.encryption=BLOWFISH
# config -s config.system.nagios.nsca.secret=secret
# config -s config.system.nagios.nsca.interval=2
# config -s config.system.nagios.nsca.port=5650
# config -s config.system.nagios.nsca.user=User1
# config -s config.system.nagios.nsca.group=Group1
The following command will synchronize the live system with the new configuration:
# config –a
ADVANCED CONFIGURATION
Opengear console servers run the embedded Linux operating system. So Administrator class users can configure the
console server and monitor and manage attached serial console and host devices from the command line using Linux
commands and the config utility (as described in Chapter 14).
The Linux kernel in the console server also supports GNU bash shell script enabling the Administrator to run custom
scripts. This chapter presents a number of useful scripts and scripting tools including
- delete-node which is a general script for deleting users, groups, hosts, UPS's etc
- ping-detect which will run specified commands when a specific host stops responding to ping requests
This chapter then details how to perform advanced and custom management tasks using Opengear commands, Linux
commands and the open source tools embedded in the console server:
- portmanager serial port management
- raw data access to the ports and modems
- iptables modifications and updating IP filtering rules
- retrieving status information using SNMP and modifying SNMP with net-snmpd
- public key authenticated SSH communications
- SSL, configuring HTTPS and issuing certificates
- using pmpower for NUT and PowerMan power device management
- using IPMItools
- CDK custom development kit
- sms server tools
- disable multicasting
The console server supports GNU bash shell commands (refer Appendix A) enabling the Administrator to run custom
scripts.
if [ $# != 1 ]
then
echo "Wrong number of arguments"
echo "Usage: delnode {full '.' delimited node path}"
exit 2
fi
LASTFIELD=${1##*.}
ROOTNODE=${1%.*}
NUMBER=`echo $LASTFIELD | sed 's/^[a-zA-Z]*//g'`
TOTALNODE=`echo ${1%.*} | sed 's/\(.*\)/\1.total/'`
TOTAL=`config -g $TOTALNODE | sed 's/.* //'`
NEWTOTAL=$[ $TOTAL -1 ]
echo Done
exit 0
echo Done
exit 0
if [ -z "$CHECKTOTAL" ]
then
echo "WARNING: "$TOTALNODE" greater than number of items"
fi
COUNTER=1
while [ $COUNTER != $((TOTAL-NUMBER+1)) ]
do
config -g $ROOTNODE.$LASTFIELDTEXT$((NUMBER+COUNTER)) \
| while read LINE
do
config -s \
"`echo "$LINE" | sed -e "s/$LASTFIELDTEXT$((NUMBER+ \
COUNTER))/$LASTFIELDTEXT$((NUMBER+COUNTER-1))/" \
-e 's/ /=/'`"
done
let COUNTER++
done
echo Done
exit 0
else
echo "error: item being deleted has an index greater than total items. Increase the total count variable."
exit 0
fi
15.1.8 Backing-up the configuration and restoring using a local USB stick
The /etc/scripts/backup-usb script been written to save and load custom configuration using a USB flash disk. Before
saving configuration locally, you must prepare the USB storage device for use. To do this, disconnect all USB storage
devices except for the storage device you wish to use.
Usage: /etc/scripts/backup-usb COMMAND [FILE]
COMMAND:
check-magic -- check volume label
set-magic -- set volume label
save [FILE] -- save configuration to USB
delete [FILE] -- delete a configuration tarbal from USB
list -- list available config backups on USB
load [FILE] -- load a specific config from USB
load-default -- load the default configuration
set-default [FILE] -- set which file becomes the default
The set-default command takes an input file as an argument and renames it to "default.opg". This default configuration
remains stored on the USB disk. The next time you want to load the default config, it will be sourced from the new
default.opg file. To set a config file as the default:
# /etc/scripts/backup-usb set-default config-20May
To load this default:
# /etc/scripts/backup-usb load-default
To load any other config file:
# /etc/scripts/backup-usb load {filename}
The /etc/scripts/backup-usb script can be executed directly with various COMMANDS or called from other custom scripts
you may create. However it is recommended that you do not customize the /etc/scripts/backup-usb script itself at all.
pmshell
The pmshell command acts similar to the standard tip or cu commands, but all serial port access is directed via the
portmanager.
Example: To connect to port 8 via the portmanager:
# pmshell -l port08
pmshell Commands:
Once connected, the pmshell command supports a subset of the '~' escape commands that tip/cu support. For
SSH you must prefix the escape with an additional ‘~’ command (i.e. use the ‘~~’ escape)
Send Break: Typing the character sequence '~b' will generate a BREAK on the serial port (if you're doing this
over ssh, you'll need to type "~~b")
History: Typing the character sequence '~h' will generate a history on the serial port.
Quit pmshell: Typing the character sequence '~.' will exit from pmshell.
Set RTS to 1 run the command: pmshell --rts=1
Show all signals: # pmshell –signals
DSR=1 DTR=1 CTS=1 RTS=1 DCD=0
Read a line of text from the serial port: # pmshell –getline
Note: V3.5.2 and later firmware has includes pmshell chooser escape command so you can now hit ~m from connected
serial port to drop back to pmshell
pmchat
The pmchat command acts similar to the standard chat command, but all serial port access is directed via the
portmanager.
Example: To run a chat script via the portmanager:
# pmchat -v -f /etc/config/scripts/port08.chat < /dev/port08
For more information on using chat (and pmchat) you should consult the UNIX man pages:
http://techpubs.sgi.com/library/tpl/cgibin/getdoc.cgi?coll=linux&db=man&fname=/usr/share/catman/man8/chat.8.html
pmusers
The pmusers command is used to query the portmanager for active user sessions.
Example: To detect which users are currently active on which serial ports:
# pmusers
This command will output nothing if there are no active users currently connected to any ports, otherwise it will respond
with a sorted list of usernames per active port:
Port 1:
user1
portmanager daemon
There is normally no need to stop and restart the daemon. To restart the daemon normally, just run the command:
# portmanager
Supported command line options are:
Force portmanager to run in the foreground: --nodaemon
Set the level of debug logging: --loglevel={debug,info,warn,error,alert}
Change which configuration file it uses: -c /etc/config/portmanager.conf
Signals
Sending a SIGHUP signal to the portmanager will cause it to re-read its configuration file
Note: Initially only advanced console server models were equipped with an SNMP Service. With V3.0 (and later)
firmware this support was extended to all console servers. Also the MIBS were extended (and renamed for
compliance) with this firmware release.
All console servers can also be configured to send SNMP traps/messages to multiple remote SNMP Network Managers
on defined trigger events. Refer Chapter 7 for configuration details
The MIBs in your console server are located in /etc/snmp/mibs. You also can view the current MIBs online at
http://opengear.com/download/snmp/and they include:
OG-STATUS-MIB This new MIB contains serial and connected device status
information (for snmpstatusd & snmpalertd)
OGTRAP-MIB SMIv1 traps from old MIBS (as smilint will not let SMIv1
structures coexist with SMIv2)
priv Enforces the use of encryption. This is the highest level of security and
requires an encryption protocol (DES or AES) and password in addition
to the authentication protocol and password.
o Complete the Read Only Username. Enter the read only security name. This field is mandatory and must be
completed when configuring the console server for SNMPv3.
o For a Security Level of auth, select the Auth. Protocol (SHA or MD5) and the Auth. Password. A
password of at least 8 characters is required.
o For a Security Level of priv, select the Privacy Protocol (DES or AES) and the Privacy Password. AES is
recommended as it provides stronger privacy but requires more intense calculations. A password of at least 8
characters is required.
Click Apply
Using the snmpwalk and snmpget commands, the status information can be retrieved from any console server.
For example:
snmpwalk -Oa -v1 -M .:/usr/share/snmp/mibs -c public im4004 OG-STATUS-MIB::ogStatus
noauth
snmpwalk -Oa –v3 –l noAuthNoPriv –u readonlyusername -M .:/usr/share/snmp/mibs im4004 OG-STATUS-
MIB::ogStatus
auth
snmpwalk -Oa –v3 –l authNoPriv –u readonlyusername –a SHA –A “authpassword” -M .:/usr/share/snmp/mibs
im4004 OG-STATUS-MIB::ogStatus
priv
snmpwalk -Oa –v3 –l authNoPriv –u readonlyusername –a SHA –A “authpassword” –x DES –X “privpassword” -M
.:/usr/share/snmp/mibs im4004 OG-STATUS-MIB::ogStatus
A mib browser may be used to explore the Opengear enterprise MIB structure. For example, the ogStatus tree is shown
below:
15.5.4 /etc/config/snmpd.conf
The net-snmpd is an extensible SNMP which includes built-in support for a wide range of MIB information modules, and
can be extended using dynamically loaded modules, external scripts and commands. snmpd when enabled should run
with a default configuration. Its behavior can be customized via the options in /etc/config/snmpd.conf. Note that if the
SNMP Service is enabled through the Web Based Management Console this configuration file will be overridden and you
will lose any customization.
Changing standard system information such as system contact, name and location can be achieved by editing
/etc/config/snmpd.conf file and locating the following lines:
sysdescr "opengear"
syscontact root <root@localhost>(configure /etc/default/snmpd.conf)
sysname Not defined (edit /etc/default/snmpd.conf)
syslocation Not defined (edit /etc/default/snmpd.conf)
Simply change the values of sysdescr, syscontact, sysname and syslocation to the desired settings and restart snmpd.
The snmpd.conf provides is extremely powerful and too flexible to completely cover here. The configuration file itself is
commented extensively and good documentation is available at the net-snmp website http://www.net-snmp.org,
specifically:
Once the fields are set, apply the configuration with the following command:
config --run snmp
You can add a third or more SNMP servers by incrementing the "2" in the above commands, e.g.
config.system.snmp.protocol3, config.system.snmp.address3, etc
This section covers the generation of public and private keys in a Linux and Windows environment and configuring SSH
for public key authentication. The steps to use in a Clustering environment are:
- Generate a new public and private key pair
- Upload the keys to the Master and to each Slave console server
- Fingerprint each connection to validate
It is advisable to create a new directory to store your generated keys. It is also possible to name the files after the device
they will be used for. For example:
$ mkdir keys
$ ssh-keygen -t rsa
Generating public/private rsa key pair.
You must ensure there is no password associated with the keys. If there is a password, then the Opengear devices will
have no way to supply it as runtime.
Full documentation for the ssh-keygen command can be found at http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-
keygen
Master
Slave Slave
authorized_key
authorized_key
ssh-rsa
ssh-rsa AAAAB3NzaC1yc2Efg4+t
AAAAB3NzaC1yc2Efg4+t GHlAAA==name@client1
GHlAAA==name@client1
id_rsa
-----BEGIN RSA
PRIVATE KEY-----
MIIEogIBAAKCAQEA
yIPGsNf5+a0LnPUMc
nujXXPGiQGyD3b79
KZg3UZ4MjZI525sCy
opv4TJTvTK6e8QIYt
GYTByUdI
id_rsa.pub
If the Opengear device selected to be the server will only have one client device, then the authorized_keys file is simply a
copy of the public key for that device. If one or more devices will be clients of the server, then the authorized_keys file will
contain a copy of all of the public keys. RSA and DSA keys may be freely mixed in the authorized_keys file. For example,
assume we already have one server, called bridge_server, and two sets of keys, for the control_room and the
plant_entrance:
$ ls /home/user/keys control_room control_room.pub plant_entrance plant_entrance.pub $ cat
/home/user/keys/control_room.pub /home/user/keys/plant_entrance.pub >
/home/user/keys/authorized_keys_bridge_server
Slave
authorized_keys
ssh-rsa AAAAB3NzaC1yc2Efg4+tGHl
AAA== name@client1
id_dsa ssh-dss AAAAB3NzaZr+OV01C8gdgz
-----BEGIN DSA XDg== name@client2 id_rsa
PRIVATE KEY----- -----BEGIN RSA
MIIBugIBAAKBgQCR PRIVATE KEY-----
kixjJ0SKuiREXTM MIIEogIBAAKCAQEA
x0PFp9HqBvEg7Ww9 yIPGsNf5+a0LnPUMc
oynY4QNiXj1YU7T nujXXPGiQGyD3b79
87ITLQiAhn3yp7ZWy KZg3UZ4MjZI525sCy
7Z5C3sLF8o46Go opv4TJTvTK6e8QIYt
GYTByUdI
ssh-dss ssh-rsa
AAAAB3NzaZr+OV01C8gdgz AAAAB3NzaC1yc2Efg4+tG
XDg== name@client2 HlAAA== name@client1
id_dsa.pub id_rsa.pub
- Create a new file " authorized_keys " (with notepad) and copy your public key data from the "Public key for pasting
into OpenSSH authorized_keys file" section of the PuTTY Key Generator, and paste the key data to the
"authorized_keys" file. Make sure there is only one line of text in this file
- Use WinSCP to copy this "authorized_keys" file into the user’s home directory: eg.
/etc/config/users/testuser/.ssh/authorized_keys of the Opengear gateway which will be the SSH server. You will need
to make sure this file is in the correct format with the correct permissions with the following commands:
# dos2unix \
/etc/config/users/testuser/.ssh/authorized_keys && chown testuser \
/etc/config/users/testuser/.ssh/authorized_keys
- Using WinSCP copy the attached sshd_config over /etc/config/sshd_config on the server (Makes sure public key
authentication is enabled)
- Test the Public Key by logging in as "testuser" Test the Public Key by logging in as "testuser" to the client Opengear
device and typing (you should not need to enter anything): # ssh -o StrictHostKeyChecking=no <server-ip>
To automate connection of the SSH tunnel from the client on every power-up you need to make the clients
/etc/config/rc.local look like the following:
#!/bin/sh
ssh -L9001:127.0.0.1:4001 -N -o StrictHostKeyChecking=no testuser@<server-ip> &
This will run the tunnel redirecting local port 9001 to the server port 4001.
15.6.6 Fingerprinting
Fingerprints are used to ensure you are establishing an SSH session to who you think you are. On the first connection to
a remote server you will receive a fingerprint which you can use on future connections.
This fingerprint is related to the host key of the remote server. Fingerprints are stored in ~/.ssh/known_hosts.
You may be prompted for a password, but there is no need to log in - you have received the fingerprint and can Ctrl-C to
cancel the connection.If the host key changes you will receive the following warning, and not be allowed to connect to the
remote host:
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
ab:7e:33:bd:85:50:5a:43:0b:e0:bd:43:3f:1c:a5:f8.
Please contact your system administrator.
Add correct host key in /.ssh/known_hosts to get rid of this message.
Offending key in /.ssh/known_hosts:1
RSA host key for remhost has changed and you have requested strict checking.
Host key verification failed.
If the host key has been legitimately changed, it can be removed from the ~/.ssh/known_hosts file and the new fingerprint
added. If it has not changed, this indicates a serious problem that should be investigated immediately.
As detailed in Chapter 4, the Server console server is setup in Console Server mode with either RAW or RFC2217
enabled and the Client console server is set up in Serial Bridging Mode with the Server Address, and Server TCP Port
(4000 + port for RAW or 5000 + port # for RFC2217) specified:
Select SSH Tunnel when configuring the Serial Bridging Setting
Next you will need to set up SSH keys for each end of the tunnel and upload these keys to the Server and Client console
servers.
Client Keys:
The first step in setting up ssh tunnels is to generate keys. Ideally, you will use a separate, secure, machine to generate
and store all keys to be used on the console servers. However, if this is not ideal to your situation, keys may be
generated on the console servers themselves.
It is possible to generate only one set of keys, and reuse them for every SSH session. While this is not recommended,
each organization will need to balance the security of separate keys against the additional administration they bring.
Generated keys may be one of two types - RSA or DSA (and it is beyond the scope of this document to recommend one
over the other). RSA keys will go into the files id_rsa and id_rsa.pub. DSA keys will be stored in the files id_dsa and
id_dsa.pub.
For simplicity going forward the term private key will be used to refer to either id_rsa or id_dsa and public key to refer to
either id_rsa.pub or id_dsa.pub.
To generate the keys using OpenBSD's OpenSSH suite, we use the ssh-keygen program:
$ ssh-keygen -t [rsa|dsa]
Generating public/private [rsa|dsa] key pair.
Enter file in which to save the key (/home/user/.ssh/id_[rsa|dsa]):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/user/.ssh/id_[rsa|dsa].
Authorized Keys:
If the console server selected to be the server will only have one client device, then the authorized_keys file is simply a
copy of the public key for that device. If one or more devices will be clients of the server, then the authorized_keys file will
contain a copy of all of the public keys. RSA and DSA keys may be freely mixed in the authorized_keys file.
For example, assume we already have one server, called bridge_server, and two sets of keys, for the control_room and
the plant_entrance:
$ ls /home/user/keys
control_room control_room.pub plant_entrance plant_entrance.pub
$ cat /home/user/keys/control_room.pub
/home/user/keys/plant_entrance.pub >
/home/user/keys/authorized_keys_bridge_server
Uploading Keys:
The keys for the server can be uploaded through the web interface, on the System: Administration page as detailed
earlier. If only one client will be connecting, then simply upload the appropriate public key as the authorized keys file.
Otherwise, upload the authorized keys file constructed in the previous step.
Each client will then need its own set of keys uploaded through the same page. Take care to ensure that the correct type
of keys (DSA or RSA) goes in the correct spots, and that the public and private keys are in the correct spot.
The console server supports a growing list of remote power-control devices (RPCs) which can be configured using the
Management Console as described in Chapter 8. These RPCs are controlled using the open source PowerMan and
Network UPS Tools and with Opengear’s pmpower utility.
Synopsis
Options
-1, --on Power ON targets.
-0, --off Power OFF targets.
-c, --cycle Power cycle targets.
-r, --reset Assert hardware reset for targets (if implemented by RPC).
-f, --flash Turn beacon ON for targets (if implemented by RPC).
-u, --unflash Turn beacon OFF for targets (if implemented by RPC).
-l, --list List available targets. If possible, output will be compressed into a host range (see TARGET SPECIFICATION
below).
-q, --query Query plug status of targets. If none specified, query all targets. Status is not cached; each time this
option is used, powerman queries the appropriate RPC's. Targets connected to RPC's that could not be
contacted (e.g. due to network failure) are reported as status "unknown". If possible, output will be
compressed into host ranges.
-n, --node Query node power status of targets (if implemented by RPC). If no targets specified, query all targets. In
this context, a node in the OFF state could be ON at the plug but operating in standby power mode.
-b, --beacon Query beacon status (if implemented by RPC). If no targets are specified, query all targets.
-t, --temp Query node temperature (if implemented by RPC). If no targets are specified, query all targets.
Temperature information is not interpreted by powerman and is reported as received from the RPC on
one line per target, prefixed by target name.
-h, --help Display option summary.
-L, --license Show powerman license information.
-d, --destination host[:port] Connect to a powerman daemon on non-default host and optionally port.
-V, --version Display the powerman version number and exit.
-D, --device Displays RPC status information. If targets are specified, only RPC's matching the target list is displayed.
-T, --telemetry Causes RPC telemetry information to be displayed as commands are processed. Useful for debugging
device scripts.
-x, --exprange Expand host ranges in query responses.
Target Specification
powerman target hostnames may be specified as comma separated or space separated hostnames or host ranges. Host
ranges are of the general form: prefix[n-m,l-k,...], where n < m and l < k, etc., This form should not be confused with
regular expression character classes (also denoted by ''[]''). For example, foo[19] does not represent foo1 or foo9, but
rather represents a degenerate range: foo19.
This range syntax is meant only as a convenience on clusters with a prefix NN naming convention and specification of
ranges should not be considered necessary -- the list foo1,foo9 could be specified as such, or by the range foo[1,9].
Some examples of powerman targets follow.
Power on hosts bar,baz,foo01,foo02,...,foo05: powerman --on bar baz foo[01-05]
Power on hosts bar,foo7,foo9,foo10: powerman --on bar,foo[7,9-10]
Power on foo0,foo4,foo5: powerman --on foo[0,4-5]
As a reminder to the reader, some shells will interpret brackets ([ and ]) for pattern matching. Depending on your shell, it
may be necessary to enclose ranged lists within quotes. For example, in tcsh, the last example above should be executed
as:
powerman --on "foo[0,4-5]"
pmpower [-?h] [-l device | -r host] [-o outlet] [-u username] [-p password] action
Examples:
To turn outlet 4 of the power device connected to serial port 2 on: # pmpower -l port02 -o 4 on
To turn an IPMI device off located at IP address 192.168.1.100 (where username is 'root' and password is 'calvin':
# pmpower -r 192.168.1.100 -u root -p calvin off
Default system Power Device actions are specified in /etc/powerstrips.xml. Custom Power Devices can be added in
/etc/config/powerstrips.xml. If an action is attempted which has not been configured for a specific Power Device pmpower
will exit with an error.
15.10 IPMItool
The console server includes the ipmitool utility for managing and configuring devices that support the Intelligent Platform
Management Interface (IPMI) version 1.5 and version 2.0 specifications.
IPMI is an open standard for monitoring, logging, recovery, inventory, and control of hardware that is implemented
independent of the main CPU, BIOS, and OS. The service processor (or Baseboard Management Controller, BMC) is the
brain behind platform management and its primary purpose is to handle the autonomous sensor monitoring and event
logging features.
The ipmitool program provides a simple command-line interface to this BMC. It features the ability to read the sensor data
repository (SDR) and print sensor values, display the contents of the System Event Log (SEL), print Field Replaceable
Unit (FRU) inventory information, read and set LAN configuration parameters, and perform remote chassis power control.
SYNOPSIS
ipmitool [-c|-h|-v|-V] -I open <command>
ipmitool [-c|-h|-v|-V] -I lan -H <hostname>
[-p <port>]
[-U <username>]
[-A <authtype>]
[-L <privlvl>]
[-a|-E|-P|-f <password>]
[-o <oemtype>]
<command>
ipmitool [-c|-h|-v|-V] -I lanplus -H <hostname>
[-p <port>]
[-U <username>]
[-L <privlvl>]
[-a|-E|-P|-f <password>]
[-o <oemtype>]
[-C <ciphersuite>]
<command>
This program lets you manage Intelligent Platform Management Interface (IPMI) functions of either the local system, via a
kernel device driver, or a remote system, using IPMI V1.5 and IPMI v2.0. These functions include printing FRU
information, LAN configuration, sensor readings, and remote chassis power control.
IPMI management of a local system interface requires a compatible IPMI kernel driver to be installed and configured. On
Linux this driver is called OpenIPMI and it is included in standard distributions. On Solaris this driver is called BMC and is
included in Solaris 10. Management of a remote station requires the IPMI-over-LAN interface to be enabled and
configured. Depending on the particular requirements of each system it may be possible to enable the LAN interface using
ipmitool over the system interface.
OPTIONS
-a Prompt for the remote server password.
-A <authtype>
Specify an authentication type to use during IPMIv1.5 lan session activation. Supported types are NONE,
PASSWORD, MD5, or OEM.
-c Present output in CSV (comma separated variable) format. This is not available with all commands.
-C <ciphersuite>
The remote server authentication, integrity, and encryption algorithms to use for IPMIv2 lanplus connections. See
table 22-19 in the IPMIv2 specification. The default is 3 which specifies RAKP-HMAC-SHA1 authentication,
HMAC-SHA1-96 integrity, and AES-CBC-128 encryption algorithms.
-E The remote server password is specified by the environment variable IPMI_PASSWORD.
-f <password_file>
Specifies a file containing the remote server password. If this option is absent, or if password_file is empty, the
password will default to NULL.
-h Get basic usage help from the command line.
-H <address>
Remote server address, can be IP address or hostname. This option is required for lan and lanplus interfaces.
-I <interface>
Selects IPMI interface to use. Supported interfaces that are compiled in are visible in the usage help output.
-L <privlvl>
Force session privilege level. Can be CALLBACK, USER, OPERATOR, and ADMIN. Default is ADMIN.
-m <local_address>
Set the local IPMB address. The default is 0x20 and there should be no need to change it for normal operation.
-o <oemtype>
Select OEM type to support. This usually involves minor hacks in place in the code to work around quirks in
various BMCs from various manufacturers. Use -o list to see a list of current supported OEM types.
-p <port>
Remote server UDP port to connect to. Default is 623.
-P <password>
Remote server password is specified on the command line. If supported it will be obscured in the process list.
Note! Specifying the password as a command line option is not recommended.
-t <target_address>
Bridge IPMI requests to the remote target address.
-U <username>
Remote server username, default is NULL user.
-v Increase verbose output level. This option may be specified multiple times to increase the level of debug output. If
given three times you will get hexdumps of all incoming and outgoing packets.
-V Display version information.
If no password method is specified then ipmitool will prompt the user for a password. If no password is entered at the
prompt, the remote server password will default to NULL.
SECURITY
The ipmitool documentation highlights that there are several security issues to be considered before enabling the IPMI
LAN interface. A remote station has the ability to control a system's power state as well as being able to gather certain
COMMANDS
help
This can be used to get command-line help on ipmitool commands. It may also be placed at the end of
commands to get option usage help.
ipmitool help
Commands:
raw Send a RAW IPMI request and print
response
lan Configure LAN Channels
chassis Get chassis status and set power
state
event Send pre-defined events to MC
mc Management Controller status and
global enables
sdr Print Sensor Data Repository
entries and readings
sensor Print detailed sensor information
fru Print built-in FRU and scan SDR
for FRU locators
sel Print System Event Log (SEL)
pef Configure Platform Event Filtering
(PEF)
sol Configure IPMIv2.0 Serial-over-LAN
isol Configure IPMIv1.5 Serial-over-LAN
user Configure Management Controller
users
channel Configure Management Controller
channels
session Print session information
exec Run list of commands from file
set Set runtime variable for shell and
exec
ipmitool chassis help
Chassis Commands: status, power, identify, policy, restart_cause, poh, bootdev
ipmitool chassis power help
chassis power Commands: status, on, off, cycle, reset, diag, soft
You will find more details on ipmitools at http://ipmitool.sourceforge.net/manpage.html.
Note The CDK is free, however Opengear does not provide free technical support for systems modified using the CDK
and any changes are the responsibility of the user.
Similarly the Master does maintain a view of the status of the slaves:
- Select Status: Support Report
- Scroll down to Processes
- Look for: /bin/ssh -MN -o ControlPath=/var/run/cascade/%h slavename
- These are the slaves that are connected
- Note the end of the Slaves' names will be truncated, so the first 5 characters must be unique
Alternatively, you can write a custom CGI script as described above. The currently connected Slaves can be determined
by running: ls /var/run/cascade and the configured slaves can be displayed by running: config -g config.cascade.slaves
Firmware releases V3.1 and later include the SMS Server Tools software which provides an SMS Gateway which can
send and receive short messages through GSM modems and mobile phones.
You can send short messages by simply storing text files into a special spool directory. The program monitors this
directory and sends new files automatically. It also stores received short messages into another directory as text files.
Binary messages (including Unicode text) are also supported, for example ring tone messages. It's also possible to send a
WAP Push message to the WAP / MMS capable mobile phone.
The program can be run as a SMS daemon which can be started automatically when the operating system starts. High
availability can be ensured by using multiple GSM devices (currently up to 64, this limit is easily changeable).
The program can run other external programs or scripts after events like reception of a new message, successful sending
and also when the program detects a problem. These programs can inspect the related text files and perform automatic
actions
The SMS Server Tools software needs a GSM modem (or mobile phone) with SMS command set according to the
European specifications GSM 07.05 (=ETSI TS 300 585) and GSM 03.38 (=ETSI TS 100 900). AT command set is
supported. Devices can be connected with serial port, infrared or USB.
15.14 Multicast
By default, all Opengear console servers come with Multicasting enabled. Multicasting provides Opengear products with
the ability to simultaneously transmit information from a single device to a select group of hosts.
Multicasting can be disabled and re-enabled from the command line (Firmware releases V3.1 and later). To disable
multicasting type:
ifconfig eth0 –multicast
To re-enable multicasting from the command line type:
ifconfig eth0 multicast
IPv6 may need to be restarted when toggling between multicast states.
Commands above which are appended with '*' come from Busybox (the Swiss Army Knife of embedded Linux)
http://www.busybox.net/downloads/BusyBox.html.
Others are generic Linux commands and most commands the -h or --help argument to provide a terse runtime description
of their behavior. More details on the generic Linux commands can found online at http://en.tldp.org/HOWTO/HOWTO-
INDEX/howtos.html and http://www.faqs.org/docs/Linux-HOWTO/Remote-Serial-Console-HOWTO.html
An updated list of the commands in the latest console server build can be found at http://www.opengear.com/faq233.html.
However it may be worth using ls command to view all the commands actually available in the /bin directory in your
console server.
There were a number of Opengear tools listed above that make it simple to configure the console server and ensure the
changes are stored in the console server's flash memory etc. These commands are covered in the previous chapters and
include:
config which allows manipulation and querying of the system configuration from the command line. With config a
new configuration can be activated by running the relevant configurator, which performs the action necessary to
make the configuration changes live
portmanager which provides a buffered interface to each serial port. It is supported by the pmchat and pmshell
commands which ensure all serial port access is directed via the portmanager
pmpower is a configurable tool for manipulating remote power devices that are serially or network connected to
the console server
SDT Connector is a java client applet that provides point-and-click SSH tunneled connections to the console
server and Managed Devices
There are also a number of other CLI commands related to other open source tools embedded in the console server
including:
PowerMan provides power management for many preconfigured remote power controller (RPC) devices. For CLI
details refer http://linux.die.net/man/1/powerman
Network UPS Tools (NUT) provides reliable monitoring of UPS and PDU hardware and ensure safe shutdowns
of the systems which are connected - with a goal to monitor every kind of UPS and PDU. For CLI details refer
http://www.networkupstools.org
Nagios is a popular enterprise-class management tool that provides central monitoring of the hosts and services
in distributed networks. For CLI details refer http://www.nagios.org
Many components of the console server software are licensed under the GNU General Public License (version 2), which
Opengear supports. You may obtain a copy of the GNU General Public License at http://www.fsf.org/copyleft/gpl.html.
Opengear will provide source code for any of the components of the software licensed under the GNU General Public
License upon request.
Alternately the complete source code corresponding to each released version is available from us for a period of
three years after its last shipment. If you would like the source code for an earlier release than the latest current
release please write “source for firmware Version x.xx ” in the memo line of your payment.
The console server also embodies the okvm console management software. This is GPL code and the full source is
available from http://okvm.sourceforge.net.
The console server BIOS (boot loader code) is a port of uboot which is also a GPL package with source openly available.
The console server CGIs (the html code, xml code and web config tools for the Management Console) are proprietary to
Opengear, however the code will be provided to customers, under NDA.
Also inbuilt in the console server is a Port Manager application and Configuration tools as described in Chapters 14 and
15. These both are proprietary to Opengear, but open to customers (as above).
The console server also supports GNU bash shell script enabling the Administrator to run custom scripts. GNU bash,
version 2.05.0(1)-release (arm-OpenGear-linux-gnu) offers the following shell commands:
FEATURE VALUE
Dimensions ACM5002/3/4(-2) (-M/W/G): 4.1x3.4x1.1 in (10.3 x 8.7 x 2.8 cm)
ACM5504/8-2/5(-M/G/W/I): 6.5 x 4 x 1.4 in (16.6 x 10.2 x 2.8 cm)
IM7216/32/48: 17 x 10 x 1.75 in (44 x 25.4 x 4.5 cm)
IM4208/16/32/48: 17 x 12 x 1.75 in (43.2 x 31.3. x 4.5 cm)
IM4216-34: 17 x 12 x 1.75 in (43.2 x 31.3. x 4.5 cm)
CM4116/32/48: 17 x 8.5 x 1.75 in (43.2 x 21. x 4.5 cm)
SD4002: 3.9 x 2.8 x 1.0 in (10 x 7.2 x 2.5 cm)
SD4001: 4 x 1.75 x 1.0 in (10.2 x 4.4 x 2.5 cm)
Weight ACM5002/3/4(M/W/G)(-2): 1.0 kg (2.2 lbs)
ACM5504/8-2/5(-M/G/W/I): 1.8 kg (4 lbs)
IM7216/32/48: 4.5 kg (10 lbs)
IM4208/16/32/48: 5.4 kg (11.8 lbs)
IM4216-34: 5.4 kg (11.8 lbs)
CM4116/32/48: 3.9 kg (8.5 lbs)
SD4002: 1.1 kg (2.5 lbs)
Ambient operating temperature 5°C to 50°C (41°F to 122°F) Higher for –I models
Non-operating storage temp -30°C to +60°C (-20°F to +140°F)
Humidity 5% to 90%
Power Refer Chapter 2 for various models
Power Consumption All less than 30W
CPU IM7200: 1GHz ARM SoC (Marvell 88F6283)
ACM5000 & ACM5500: Micrel KSZ8692 ARM9
Others: Micrel KS8695P controller
Memory ACM5002/3/4(M/W/G)(-2): 32MB SDRAM 16MB Flash
ACM5504/8-2/5(-M/G/W/I): 64MB SDRAM 16MB + 4GB USB Flash
IM7216/32/48: 256MB SDRAM, 64MB NOR flash + 16 GB Flash
IM4208/16/32/48: 64MB SDRAM 16MB + 16GB USB Flash
IM4216-34: 64MB SDRAM 16MB Flash 16GB USB Flash
CM4116/32/48: 64MB SDRAM 16MB Flash
SD4001/2: 16MB SDRAM 8MB Flash
USB ports ACM5002/3/4(M/W/G)(-2): 2 internal/external USB2.0
ACM5504/8-2/5(-M/G/W/I): 2 external USB2.0
IM7216/32/48: 2 external USB3.0
IM4208/16/32/48 & IM4216-34: 3 external USB2.0
Serial Connectors ACM5002: 2 RJ-45 RS-232 serial ports
ACM5003-M/W: 3 RJ-45 RS-232 serial ports
ACM5004(G)(-2): 4 RJ-45 RS-232 serial ports
ACM5004-2(G)-I: 4 RJ-45 selectable RS-232/422/485 serial ports
ACM5504-(2/5)-G(-W)-I(-P): 4 RJ-45 RS-232 serial ports
ACM5508-2-I/M: 8 RJ-45 selectable RS-232/422/485 serial ports
IM7216-2: 16 RJ-45 RS-232 serial ports **
IM7232-2: 32 RJ-45 RS-232 serial ports **
IM7248-2: 48 RJ-45 RS-232 serial ports**
IM4208-2: 8 RJ-45 RS-232 serial ports *
IM4216-2 & IM4216-34: 16 RJ-45 RS-232 serial ports *
IM4232-2: 32 RJ-45 RS-232 serial ports *
IM4248-2: 48 RJ-45 RS-232 serial ports *
Please take care to follow the safety precautions below when installing and operating the console server:
- Do not remove the metal covers. There are no operator serviceable components inside. Opening or removing the
cover may expose you to dangerous voltage which may cause fire or electric shock. Refer all service to Opengear
qualified personnel
- To avoid electric shock the power cord protective grounding conductor must be connected through to ground.
- Always pull on the plug, not the cable, when disconnecting the power cord from the socket.
Do not connect or disconnect the console server during an electrical storm. Also it is recommended you use a surge
suppressor or UPS to protect the equipment from transients.
Pin-out standards exist for both DB9 and DB25 connectors; however there are not pin-out standards for serial connectivity
using RJ45 connectors. Most console servers and serially managed servers/ router/ switches/ power devices have adopted
their own unique pin-out; so custom connectors and cables may be required to interconnect your console server.
Opengear's console servers come with one to forty eight serial connectors (notated SERIAL or SERIAL PORTS) for the
RS232 serial ports:
- The SD4001 and SD4002 models have DB9 serial port connectors. All other models have RJ45 serial port
connectors
- The RJ45 serial ports are located on the front face of the ACM5000 and ACM5500; on the front panel of the rack
mount CM4100 and IM4200; and on the rear panel of the rack mount IM7200
- The ACM5000 and ACM5500 models and the IM4216-34 have Cisco serial pinouts on its RJ45 connectors
- The other IM4200 console servers are available with a selection of alternate RJ45 pinouts (which must be specified
in the part number at the time of order). The IM4208-2 IM4216-2 IM42032-2 and IM4248-2 console servers have
three RJ45 pinout configurations available - Opengear Classic (default), Cisco or Cyclades
The CM4100 models have Opengear Classic RJ45 pinout
The IM7200 has software selectable Cisco Straight or Cisco Rolled RJ45
Console servers with a dedicated LOCAL console/modem port use a standard DB9 connector for this port.
To connect to the LOCAL modem/console port on the console servers using a computer or terminal device use the
319001 or 319003 adaptors with standard UTP Cat 5 cable.
To connect the LOCAL console ports to modems (for out of band access) use the 319004 adaptor with standard UTP Cat
5 cable.
Each Opengear console server is supplied with UTP Cat 5 cables.
The RS232 pinout standards for the DB9 (and DB25) connectors are tabled below:
FEMALE MALE
25 pin DB25
9 pin DB9
8 pin RJ45
The ACM5000, ACM5500 and IM7200 families, and the IM4208/16/32/48-X2 and IM4216-34-X2, have the Cisco pinout by
default and ship with “cross-over”/ “straight” RJ45-DB9 connectors:
DB9F-RJ45S straight
connector
Part # 319014
DB9F-RJ45S cross-
over connector
Part # 319015
The CM4116/4132/4148 and IM4208/16/32/48-X0(Classic) all have the Opengear Classic pinout and ship with a “cross-
over” and a “straight” RJ45-DB9 connector for connecting to other vendor’s products: E
DB9F-RJ45S straight
connector
Part # 319000
DB9F-RJ45S cross-
over connector
Part # 319001
Opengear also supplies a range of cables and adapters that will enable you to easily connect to the more popular servers
and network appliances. More detailed information can be found online at http://www.opengear.com/cabling.html
For Local/Console connection:
These adapters connect the console server LOCAL/Console port (via standard UTP Cat 5 cable) to modem devices (for
out-of-band access):
319000 DB9F to RJ45 straight console server LOCAL Console Port to Modem
319002 DB25M to RJ45 straight console server LOCAL Console Port to Modem
For console server Serial Port connection:
The Opengear connectors and adapters tabulated below are specified to work with standard UTP Cat 5 cable.
For console servers with Opengear Classic pinouts:
319000 DB9F to RJ45 straight Console server with Opengear classic pinout to IP Power and other serial device
319001 DB9F to RJ45 crossover DCE Adapter - Console server with Opengear classic pinout to X86 and other
319002 DB25M to RJ45 straight DTE Adapter for console server with Opengear classic pinout
319003 DB25M to RJ45 crossover DCE Adapter - Console server with Opengear classic pinout to Sun and other
319004 DB9M to RJ45 straight DTE Adapter - Console server with Opengear classic pinout to Netscreen and
Dell; and OOB modem connection
319005 DB25F to RJ45 crossover DCE Adapter - Console server with Opengear classic pinout to Cisco 7200 AUX
440016 5ft Cat5 RJ-45 to RJ-45 Extension cables
cables
449016 RJ-45 plug to RJ-45 jack Adapter for console server with Opengear classic pinout to Cisco console (and to
Netscreen with reversing cable)
449017 RJ-45 plug to RJ-45 jack Adapter for console server with Opengear classic pinout to Rackable Systems
console
319014 DB9F to RJ45 straight Console server with Cisco pinout to IP Power and other serial device
319015 DB9F to RJ45 DCE Adapter - Console server with Cisco pinout to X86 and other
crossover
319016 DB9M to RJ45 straight DTE Adapter - Console server with Cisco pinout to Netscreen and Dell
319004 DB9M to RJ45 straight DTE Adapter - Console server OOB modem connection
Port numbers are divided into three ranges: Well Known Ports, Registered Ports and Dynamic and/or Private Ports. Well
Known Ports are those from 0 through 1023. Registered Ports are those from 1024 through 49151. Dynamic and/or
Private Ports are those from 49152 through 65535.
Well Known Ports are assigned by IANA, and on most systems, can only be used by system processes or by programs
executed by privileged users. Table below shows some of the well-known port numbers. For more details, please visit the
IANA website: http://www.iana.org/assignments/port-numbers
Port
Protocol TCP/UDP
Number
21 FTP (File Transfer Protocol) TCP
22 SSH (Secure Shell) TCP
23 Telnet TCP
25 SMTP (Simple Mail Transfer Protocol) TCP
37 Time TCP, UCP
39 RLP (Resource Location Protocol) UDP
49 TACACS, TACACS+ UDP
53 DNS UDP
67 BOOTP server UDP
68 BOOTP client UDP
v69 TFTP UDP
70 Gopher TCP
79 Finger TCP
80 HTTP TCP
110 POP3 TCP
119 NNTP (Network News Transfer Protocol) TCP
161/162 SNMP UDP
443 HTTPS TCP
Each serial RJ-45 ports on these models can be software selected to be RS-232, RS-422 or RS-485.
For RS232 they have the Cisco pinout
For the RS-485 option, to provide half duplex ‘party-line’ communications over a 2-wire bus (D+/D-), two short
cable loops are required between the RX+/TX+ pins (pins 1 and 6) and RX-/TX- pins (pins 3 and 8) on the serial
RJ-45 cable connector. This is because the -I model uses universal differential transceivers that support 4-wire
(RS-422) and 2-wire (RS-485) operation. In RS-485 mode, the -I model listens on the 2-wire bus for receive data
until it is required to send data. In RS-485 send mode it stops receiving, enables its transmitters when there is
data to be sent, transmits the data and returns to receive mode. This eliminates the possibility of collisions with
other devices which share the RS-485 bus and avoids receiving bogus stale echoed data.
The SD4002 supports (by default) two RS232 ports on Port 1 and Port 2 DB9 connectors. Port 2 on the SD4002 can also
be software selected to be an RS485 or RS422 port connected through the screw terminal block (shown below):
1 +V DC IN
2 GND
3 RX+
4 RX-
5 TX+
6 TX-
7 +3.3V DC OUT
8 GND
RS-422 uses a full duplex transmit on TX+/TX- pair, receive on RX+/RX- pair
RS-485 uses half duplex over single pair. The SD4002 supports half duplex ‘party-line’ communications over a 2-
wire RS-485 bus (D+/D-). This is enabled by choosing the RS-485 option (instead of RS-232 or RS-422) for
“Signaling Protocol” from the “Serial Port: Configuration” link on the Web management console. In addition two
short cable loops are required between the RX+/TX+ pins and RX-/TX- pins. This is because the SD4002 uses
universal differential transceivers that support 4-wire (RS-422) and 2-wire (RS-485) operation. In RS-485 mode,
Port2 on the SD4002 listens on the 2-wire bus for receive data until it is required to send data. In RS-485 send
mode it stops receiving, enables its transmitters when there is data to be sent, transmits the data and returns to
receive mode. This eliminates the possibility of collisions with other devices which share the RS-485 bus and
avoids receiving stale echoed data.
The SD4001 has one DB9 serial port that can selected to be an RS232, RS485 or RS422 port. By default the SD4001
is configured in RS232 mode (with a vertical jumper in place on the left hand SEL pins).
To set the port in RS422 or RS485 mode you must remove the SEL jumper and then configure the Signaling Protocol
using the Management Console.
The DB9 pin-out is:
Pin: RS232 RS422 RS485
1 DCD DCD+ -
2 RXD RX - -
3 TXD TX + D+
4 DTR DTR+ -
5 GND GND GND
6 DSR RX + -
7 RTS TX - D-
8 CTS DCD- -
9 - DTR- -
RS-485 uses half duplex over single pair. For RS-485 which is a 2-wire bus that drives D+ and D- from a native 4-wire
interface you need to loop 3-6 and 2-7 on the DB-9.
TERM MEANING
3G Third-generation cellular technology. The standards that determine 3G call for greater bandwidth and higher
speeds for cellular networks
AES The Advanced Encryption Standard (AES) is a new block cipher standard to replace DES, developed by NIST,
the US National Institute of Standards and Technology. AES ciphers use a 128-bit block and 128-, 192-, or 256-
bit keys. The larger block size helps resist birthday attacks while the large key size prevents brute force attacks.
APN Access Point Name (APN) is used by carriers to identify an IP packet data network that a mobile data user
wants to communicate with and the type of wireless service
Authentication Authentication is the technique by which a process verifies that its communication partner is who it is supposed
to be and not an imposter. Authentication confirms that data is sent to the intended recipient and assures the
recipient that the data originated from the expected sender and has not been altered on route
BIOS Basic Input/Output System is the built-in software in a computer that are executed on startup (boot) and that
determine what the computer can do without accessing programs from a disk. On PCs, the BIOS contains all
the code required to control the keyboard, display screen, disk drives, serial communications, and a number of
miscellaneous functions
Bonding Ethernet Bonding or Failover is the ability to detect communication failure transparently, and switch from one
LAN connection to another.
BOOTP Bootstrap Protocol. A protocol that allows a network user to automatically receive an IP address and have an
operating system boot without user interaction. BOOTP is the basis for the more advanced DHCP
Certificates A digitally signed statement that contains information about an entity and the entity's public key, thus binding
these two pieces of information together. A certificate is issued by a trusted organization (or entity) called a
Certification Authority (CA) after the CA has verified that the entity is who it says it is.
Certificate A Certificate Authority is a trusted third party, which certifies public key's to truly belong to their claimed owners.
It is a key part of any Public Key Infrastructure, since it allows users to trust that a given public key is the one
Authority
they wish to use, either to send a private message to its owner or to verify the signature on a message sent by
that owner.
Certificate A list of certificates that have been revoked by the CA before they expired. This may be necessary if the private
key certificate has been compromised or if the holder of the certificate is to be denied the ability to establish a
Revocation List
connection to the console server.
CHAP Challenge-Handshake Authentication Protocol (CHAP) is used to verify a user's name and password for PPP
Internet connections. It is more secure than PAP, the other main authentication protocol.
DES The Data Encryption Standard is a block cipher with 64-bit blocks and a 56-bit key.
DHCP Dynamic Host Configuration Protocol. A communications protocol that assigns IP addresses to computers when
they are connected to the network.
DNS Domain Name System that allocates Internet domain names and translates them into IP addresses. A domain
name is a meaningful and easy to remember name for an IP address.
Encryption The technique for converting a readable message (plaintext) into apparently random material (ciphertext) which
cannot be read if intercepted. The proper decryption key is required to read the message.
Firewall A network gateway device that protects a private network from users on other networks. A firewall is usually
installed to allow users on an intranet access to the public Internet without allowing public Internet users access
to the intranet.
Gateway A machine that provides a route (or pathway) to the outside world.
Hub A network device that allows more than one computer to be connected as a LAN, usually using UTP cabling.
Internet A worldwide system of computer networks - a public, cooperative, and self-sustaining network of networks
accessible to hundreds of millions of people worldwide. The Internet is technically distinguished because it uses
the TCP/IP set of protocols.
IPMI Intelligent Platform Management Interface (IPMI) is a set of common interfaces to a computer system which
system administrators can use to monitor system health and manage the system. The IPMI standard defines the
protocols for interfacing with a service processor embedded into a server platform.
LDAP The Lightweight Directory Access Protocol (LDAP) is based on the X.500 standard, but significantly simpler and
more readily adapted to meet custom needs. The core LDAP specifications are all defined in RFCs. LDAP is a
protocol used to access information stored in an LDAP server.
MAC address Every piece of Ethernet hardware has a unique number assigned to it called its MAC address. Ethernet is used
locally to connect the console server to the Internet, and it may share the local network with many other
appliances. The MAC address is used by the local Internet router in order to direct console server traffic to it
rather than somebody else in the local area. It is a 48-bit number usually written as a series of 6 hexadecimal
octets, e.g. 00:d0:cf:00:5b:da. A console server has a MAC address listed on a label underneath the device.
MSCHAP Microsoft Challenge Handshake Authentication Protocol (MSCHAP) is authentication for PPP connections
between a computer using a Microsoft Windows operating system and a network access server. It is more
secure than PAP or CHAP, and is the only option that also supports data encryption.
NAT Network Address Translation. The translation of an IP address used on one network to an IP address on
another network. Masquerading is one particular form of NAT.
Net mask The way that computers know which part of a TCP/IP address refers to the network, and which part refers to the
host range.
NFS Network File System is a protocol that allows file sharing across a network. Users can view, store, and update
files on a remote computer.
NTP Network Time Protocol (NTP) used to synchronize clock times in a network of computers
OUT OF BAND Out-of-Band (OOB) management is any management done over channels and interfaces that are separate from
those used for user/customer data. Examples would include a serial console interface or a network interface
connected to a dedicated management network that is not used to carry customer traffic, or to a BMC/service
processor. Any management done over the same channels and interfaces used for user/customer data is In
Band.
PAP Password Authentication Protocol (PAP) is the usual method of user authentication used on the internet:
sending a username and password to a server where they are compared with a table of authorized users. Whilst
most common, PAP is the least secure of the authentication options.
PPP Point-to-Point Protocol. A networking protocol for establishing simple links between two peers.
RADIUS The Remote Authentication Dial-In User Service (RADIUS) protocol was developed by Livingston Enterprises as
an access server authentication and accounting protocol. The RADIUS server can support a variety of methods
to authenticate a user. When it is provided with the username and original password given by the user, it can
support PPP, PAP or CHAP, UNIX login, and other authentication mechanisms.
Router A network device that moves packets of data. A router differs from hubs and switches because it is "intelligent"
and can route packets to their final destination.
SIM Subscriber Identity Module (SIM) card stores unique serial numbers and security authentication used to identify
a subscriber on mobile telephony devices
SMASH Systems Management Architecture for Server Hardware is a standards-based protocols aimed at increasing
productivity of the management of a data center. The SMASH Command Line Protocol (SMASH CLP)
specification provides an intuitive interface to heterogeneous servers independent of machine state, operating
system or OS state, system topology or access method. It is a standard method for local and remote
management of server hardware using out-of-band communication
SMTP Simple Mail Transfer Protocol. console server includes, SMTPclient, a minimal SMTP client that takes an email
message body and passes it on to a SMTP server (default is the MTA on the local host).
SOL Serial Over LAN (SOL) enables servers to transparently redirect the serial character stream from the baseboard
universal asynchronous receiver/transmitter (UART) to and from the remote-client system over a LAN. With
SOL support and BIOS redirection (to serial) remote managers can view the BIOS/POST output during power
on, and reconfigured.
SSL Secure Sockets Layer is a protocol that provides authentication and encryption services between a web server
and a web browser.
TACACS+ The Terminal Access Controller Access Control System (TACACS+) security protocol is a more recent protocol
developed by Cisco. It provides detailed accounting information and flexible administrative control over the
authentication and authorization processes. TACACS+ allows for a single access control server (the TACACS+
daemon) to provide authentication, authorization, and accounting services independently. Each service can be
tied into its own database to take advantage of other services available on that server or on the network,
depending on the capabilities of the daemon. There is a draft RFC detailing this protocol.
TCP/IP Transmission Control Protocol/Internet Protocol. The basic protocol for Internet communication.
TCP/IP address Fundamental Internet addressing method that uses the form nnn.nnn.nnn.nnn.
UTP Unshielded Twisted Pair cabling. A type of Ethernet cable that can operate up to 100Mb/s. Also known as
Category 5 or CAT 5.
VNC Virtual Network Computing (VNC) is a desktop protocol to remotely control another computer. It transmits the
keyboard presses and mouse clicks from one computer to another relaying the screen updates back in the other
direction, over a network.
VPN Virtual Private Network (VPN) a network that uses a public telecommunication infrastructure and Internet, to
provide remote offices or individual users with secure access to their organization's network
WINS Windows Internet Naming Service (WINS) that manages the association of workstation names and locations
with IP addresses
JSch License
SDT Connector includes code from JSch, a pure Java implementation of SSH2. JSch is licensed under BSD style license and it is:
Copyright (c) 2002, 2003, 2004 Atsuhiko Yamanaka, JCraft,Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. The names of the authors may not be used to endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL JCRAFT, INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be
distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work
based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the
Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is
included without limitation in the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of
running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the
Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the
notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this
License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a
fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and
distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part
thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such
interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that
there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,
and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such
an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and
can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work
based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend
to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to
exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a
volume of a storage or distribution medium does not bring the other work under
the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the
terms of Sections 1 and 2 above provided that you also do one of the following:
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of
physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under
the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is
allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer,
in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete
source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to
control compilation and installation of the executable. However, as a special exception, the source code distributed need not include
anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access
to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to
copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt
otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as
such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or
distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and
all its terms and conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the
original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further
restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to
this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do
not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent
license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then
the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to
apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such
claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by
public license practices. Many people have made generous contributions to the wide range of software distributed through that system
in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software
through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the
original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding
those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates
the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new
versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and
"any later version", you have the option of following the terms and conditions either of that version or of any later version published by
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the
author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software
Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all
derivatives of our free software and
of promoting the sharing and reuse of software generally.
NO WARRANTY
The Opengear firmware includes 802.11 driver code which is used in various console server models. This code is:
Redistribution and use in binary form, without modification, are permitted provided that the following conditions are met:
- Redistributions must reproduce the above copyright notice and the following disclaimer in the documentation and/or other
materials provided with the distribution
- Neither the name of Ralink Technology Corporation nor the names of its suppliers may be used to endorse or promote
products derived from this software without specific prior written permission
- No reverse engineering, decompilation, or disassembly of this software is permitted
Ralink Technology Corporation grants a world-wide, royalty-free, non-exclusive license under patents it now or hereafter owns or
controls to make, have made, use, import, offer to sell and sell ("Utilize") this software, but solely to the extent that any such patent is
necessary to Utilize the software alone, or in combination with an operating system licensed under an approved Open Source license
as listed by the Open Source Initiative at http://opensource.org/licenses. The patent license shall not apply to any other combinations
which include this software. No hardware per se is licensed hereunder.
DISCLAIMER. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
STANDARD WARRANTY
Opengear, Inc., its parent, affiliates and subsidiaries, (collectively, "Opengear") warrant your Opengear product to be in
good working order and to be free from defects in workmanship and material (except in those cases where the materials
are supplied by the Purchaser) under normal and proper use and service for the period of four (4) years from the date of
original purchase from an Authorized Opengear reseller. In the event that this product fails to meet this warranty within the
applicable warranty period, and provided that Opengear confirms the specified defects, Purchaser's sole remedy is to have
Opengear, in Opengear's sole discretion, repair or replace such product at the place of manufacture, at no additional charge
other than the cost of freight of the defective product to and from the Purchaser. Repair parts and replacement products will
be provided on an exchange basis and will be either new or reconditioned. Opengear will retain, as its property, all replaced
parts and products. Notwithstanding the foregoing, this hardware warranty does not include service to replace or repair
damage to the product resulting from accident, disaster, abuse, misuse, electrical stress, negligence, any non- Opengear
modification of the product except as provided or explicitly recommended by Opengear, or other cause not arising out of
defects in material or workmanship. This hardware warranty also does not include service to replace or repair damage to
the product if the serial number or seal or any part thereof has been altered, defaced or removed. If Opengear does not find
the product to be defective, the Purchaser will be invoiced for said inspection and testing at Opengear's then current rates,
regardless of whether the product is under warranty.
If this product requires service during the applicable warranty period, a Return Materials Authorization (RMA) number
must first be obtained from Opengear. Product that is returned to Opengear for service or repair without an RMA number
will be returned to the sender unexamined. Product should be returned, freight prepaid, in its original or equivalent
packaging, to:
Proof of purchase date must accompany the returned product and the Purchaser shall agree to insure the product or assume
the risk of loss of damage in transit. Contact Opengear by emailing [email protected] for further information.
TECHNICAL SUPPORT
Purchaser is entitled to thirty (30) days free telephone support and twelve (12) months free e-mail support (worldwide) from
date of purchase provided that the Purchaser first register their product(s) with Opengear by filling in the on-line form
http://www.opengear.com/registration.html.
Direct telephone, help-desk and e-mail support is available from 9:00 AM to 5:00 PM, Mountain Time.
http://www.opengear.com/support.htm.l
Opengear's standard warranty includes free access to Opengear's Knowledge Base as well as any application notes, white
papers and other on-line resources that may become available from time to time.
Opengear reserves the right to discontinue all support for products that are no longer covered by warranty.
LIMITATION OF LIABILITY
No action, regardless of form, arising from this warranty may be brought by either party more than two (2) years after the
cause of action has occurred. Purchaser expressly agrees that Opengear's liability, if any, shall be limited solely to the
THE FOREGOING WARRANTIES ARE THE SOLE ANDEXCLUSIVE WARRANTIES GIVEN IN CONNECTION WITH THE
PRODUCT AND THE HARDWARE. OPENGEAR DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING WITHOUT LIMITATION, ANY WARRANTIES AS TO THE SUITABILITY OR MERCHANTABILITY OR
FITNESS FOR ANY PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. OPENGEAR
DOES NOT PROMISE THAT THE PRODUCT IS ERROR-FREE OR WILL OPERATE WITHOUT INTERRUPTION. IN NO
EVENT SHALL OPENGEAR BE LIABLE FOR ANY LOST OR ANTICIPATED PROFITS, OR ANY INCIDENTAL,
EXEMPLARY, SPECIAL OR CONSEQUENTIAL DAMAGES, REGARDLESS OF WHETHER OPENGEAR WAS ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES.