Apc NETBOTZ NBRK0200 User Manual Page 25

  • Download
  • Add to my manuals
  • Print
  • Page
    / 36
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 24
21NetBotz Rack Monitor 200 Installation and Quick Configuration Manual
Telnet for basic access. Telnet provides the basic security of authentication by user name and
password, but not the high-security benefits of encryption. To use Telnet to access the control console of
the Rack Monitor 200:
1. At a command prompt, use the following command line, and press
ENTER:
telnet address
As addr ess, use the IP address of the Rack Monitor 200 (or DNS name if configured).
2. Enter the user name and password (by default, apc and apc for an Administrator, or device and
apc for a Device User).
SSH for high-security access. If you use the high security of SSL for the Web interface, use Secure
SHell (SSH) for access to the control console. SSH encrypts user names, passwords, and transmitted
data.
The interface, user accounts, and user access rights are the same whether you access the control console
through SSH or Telnet, but to use SSH, you must first configure SSH and have an SSH client program
installed on your computer.
See the NetBotz Rack Monitor 200 User’s Guide for more information on configuring and
using SSH. For details on how to access the users guide, see “Additional Documentation” on
page 1.
Simple Network Management Protocol (SNMP)
SNMPv1 only. After you add the PowerNet
®
MIB to a standard SNMP MIB browser, you can use that
browser to access the Rack Monitor 200. All user names, passwords, and community names for SNMP
are transferred over the network as plain text. The default read community name is public; the default
read/write community name is private.
SNMPv3 only. For SNMP GETs, SETs, and trap receivers, SNMPv3 uses a system of user profiles to
identify users. An SNMPv3 user must have a user profile assigned in the MIB software program to
perform GETs and SETs, browse the MIB, and receive traps. The default settings are no authentication
and no privacy.
Note: To use SNMPv3, you must have a MIB program that supports SNMPv3. The Rack
Monitor 200 supports only MD5 authentication and DES encryption.
SNMPv1 and SNMPv3. To use InfraStruXure Central or InfraStruXure Manager to manage the Rack
Monitor 200 on the public network of an InfraStruXure system, you must have SNMPv1 enabled in the
unit interface. Read access allows InfraStruXure devices to receive traps from the Rack Monitor 200.
Write access is required while you set the InfraStruXure device as a trap receiver.
To enable or disable SNMP access, you must be an Administrator. Select the Administration tab, select
the Network menu on the top menu bar, and use the access option under SNMPv1 or SNMPv3 on the
left navigation menu.
Page view 24
1 2 ... 20 21 22 23 24 25 26 27 28 29 30 ... 35 36

Comments to this Manuals

No comments