ATEN CC2000 User manual

Type
User manual
CC2000 Control Center Over the NET™
User Manual
www.aten.com
CC2000 User Manual
ii
FCC Information
FEDERAL COMMUNICATIONS COMMISSION INTERFERENCE STATEMENT:
This equipment has been tested and found to comply with the limits for a Class B digital
service, pursuant to Part 15 of the FCC rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. Any
changes or modifications made to this equipment may void the user’s authority to
operate this equipment. This equipment generates, uses, and can radiate radio frequency
energy. If not installed and used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the
equipment off and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party
responsible for compliance could void the user's authority to operate this equipment.
RoHS
This product is RoHS compliant.
CC2000 User Manual
iii
User Information
Online Registration
Be sure to register your product at our online support center:
Telephone Support
For telephone support, call this number:
User Notice
All information, documentation, and specifications contained in this manual
are subject to change without prior notification by the manufacturer. The
manufacturer makes no representations or warranties, either expressed or
implied, with respect to the contents hereof and specifically disclaims any
warranties as to merchantability or fitness for any particular purpose. Any of
the manufacturer's software described in this manual is sold or licensed as is.
Should the programs prove defective following their purchase, the buyer (and
not the manufacturer, its distributor, or its dealer), assumes the entire cost of all
necessary servicing, repair and any incidental or consequential damages
resulting from any defect in the software.
The manufacturer of this system is not responsible for any radio and/or TV
interference caused by unauthorized modifications to this device. It is the
responsibility of the user to correct such interference.
The manufacturer is not responsible for any damage incurred in the operation
of this system if the correct operational voltage setting was not selected prior
to operation. PLEASE VERIFY THAT THE VOLTAGE SETTING IS
CORRECT BEFORE USE.
International http://eservice.aten.com
International 886-2-8692-6959
China 86-400-810-0-810
Japan 81-3-5615-5811
Korea 82-2-467-6789
North America 1-888-999-ATEN ext 4988
1-949-428-1111
CC2000 User Manual
iv
Package Contents
The CC2000 package consists of:
1 CC2000 USB License Key
1 Software CD
1 User Instructions*
Check to make sure that all of the components are present and in good order.
If anything is missing, or was damaged in shipping, contact your dealer.
Read this manual thoroughly and follow the installation and operation
procedures carefully to prevent any damage to the switch or to any other
devices on the CC2000 installation.
* Features may have been added to the CC2000 since this manual was
published. Please visit our website to download the most up-to-date version.
Copyright © 2008–2019 ATEN® International Co., Ltd.
Manual Date: 2019/04/10
Altusen and the Altusen logo are registered trademarks of ATEN International Co., Ltd. All rights reserved. All
other brand names and trademarks are the registered property of their respective owners.
CC2000 User Manual
v
Contents
FCC Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
User Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
Online Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
Telephone Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
User Notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
Package Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
About this Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xiii
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xiii
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xiv
Product Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xiv
Important Note about Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xiv
Chapter 1.
Introduction
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Secure Centralized Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Powerful Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Server Management Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Server Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Client Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Device Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Secondaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Chapter 2.
CC2000 Server Installation
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
CC1000 Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Upgrading the CC1000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Uninstalling the CC1000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Windows Version Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Starting the Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Post-installation Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Linux Version Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Before you Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Post-installation Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Post-Installation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Uninstalling the CC2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
CC2000 User Manual
vi
Uninstalling from a Windows System . . . . . . . . . . . . . . . . . . . . . . . . . 21
Uninstalling from a Linux System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Upgrading the CC2000. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Preliminary Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
CC2000 Secondary Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
CC2000 Redundant Secondary Servers . . . . . . . . . . . . . . . . . . . . . . . . . 23
Chapter 3.
Browser Operation
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
The CC Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Screen Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
The Navigation Buttons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Tree View Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Interactive Display Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Selecting List Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Web Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Notifications and Message Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Chapter 4.
Port Access
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Table Headings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Action Buttons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Launch Multiviewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
The Sidebar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Sidebar Characteristics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Sidebar Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Port Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
CC Viewer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Web Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Power ON / OFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
SSH / Telnet Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Port Access Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Port View. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Target View. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Device View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Panel Array Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Department View. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Location View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Type View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Favorites View. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Adding a Favorite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Viewing a Favorite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Managing Favorites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
CC2000 User Manual
vii
User Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Port Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Alias. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
SN Ports Broadcast. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Chapter 5.
User Management
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Adding User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
User Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Group Membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Adding Device Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Modifying Device Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Removing Device Access . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Copy / Paste Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Deleting User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Importing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Unlocking User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Creating Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Adding Users to Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Removing Users from Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
User Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Type Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
System Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Custom Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Authentication Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
CC2000 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
External Authentication Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Adding an External Authentication Server . . . . . . . . . . . . . . . . . . 78
Service Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
Deleting an External Authentication Server . . . . . . . . . . . . . . . . . 82
Group Authorization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Chapter 6.
Device Management
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Preliminary Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Using VPN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
Menu Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Adding a Folder or Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Adding Folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
CC2000 User Manual
viii
Adding Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Adding an APC PDU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Adding an Aggregate Device . . . . . . . . . . . . . . . . . . . . . . . . . 102
Adding Ports to an Aggregate Device . . . . . . . . . . . . . . . . . . 106
Adding a Blade Chassis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Adding a Virtual Machine. . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Mapped IP Function. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Adding NRGence PDUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Adding a Generic Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Adding a Group Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Modifying Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Deleting Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Deleting Unused Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Detached Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Redundant Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Locking / Unlocking Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Locking / Unlocking Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Transfer Device Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Restoring Device Configurations . . . . . . . . . . . . . . . . . . . . . . . . 126
Default Access Rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Device Sync . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Auto Discovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Sidebar Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
KVM Devices and Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Properties Page Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . 133
Access Rights – KVM Devices . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Adding Users or Groups to the Device User/Group List . . . . 134
Modifying a User’s or Group’s Rights . . . . . . . . . . . . . . . . . . 135
Deleting a User’s or Group’s Rights . . . . . . . . . . . . . . . . . . . 135
Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Access Rights – KVM Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Adding Users or Groups to the Port User/Group List . . . . . . 136
Modifying a User’s or Group’s Rights . . . . . . . . . . . . . . . . . . 137
Deleting a User’s or Group’s Access Rights . . . . . . . . . . . . . 137
Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Copy-Paste Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Device Configuration (For KVM Devices) . . . . . . . . . . . . . . . . . . 138
Port Configuration (For Cat5e KVM Devices) . . . . . . . . . . . . . . 139
Power Devices, Stations, and Outlets. . . . . . . . . . . . . . . . . . . . . . . . 141
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Properties Page Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . 141
Access Rights – Power Devices, Stations, and Outlets . . . . . . . 142
Adding Users or Groups to the Device, Station, or Outlet Access
List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Modifying a User’s or Group’s Rights . . . . . . . . . . . . . . . . . . 142
Deleting a User’s or Group’s Rights . . . . . . . . . . . . . . . . . . . 142
Device Configuration (For Power Devices) . . . . . . . . . . . . . . . . 143
Station Configuration (For Power Devices) . . . . . . . . . . . . . . . . . 145
Port (Outlet) Configuration (For Power Devices). . . . . . . . . . . . . 147
CC2000 User Manual
ix
Port Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147
Schedule Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148
Serial Devices and Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150
SN device session history . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150
Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150
Adding Users or Groups to the Device or Port Access List . . 150
Modifying a User’s or Group’s Rights. . . . . . . . . . . . . . . . . . .151
Deleting a User’s or Group’s Rights. . . . . . . . . . . . . . . . . . . . 151
Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151
Device Configuration (For Serial Devices). . . . . . . . . . . . . . . . . . 152
Port Configuration (For Serial Devices) . . . . . . . . . . . . . . . . . . . . 153
Port Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153
Advanced Port Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154
Departments, Locations and Types . . . . . . . . . . . . . . . . . . . . . . . . . . . .155
Adding a Department Location or Type. . . . . . . . . . . . . . . . . . . . . . .155
Assigning Devices and Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155
Modifying a Department, Location, or Type . . . . . . . . . . . . . . . . . . . 156
Deleting a Department, Location, or Type. . . . . . . . . . . . . . . . . . . . .156
Online Devices Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Unsupported Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Chapter 7.
System Management
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Menu Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
CC Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161
CC Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161
Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163
Login Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Lockout Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163
User Role Restriction Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164
This Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166
Server Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166
Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Promote Role (Secondary to Primary) . . . . . . . . . . . . . . . . . . 168
Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170
SMTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
NTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .172
SNMP Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
SNMP Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174
SNMP Trap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
Dial In. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Dial Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178
Primary Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
CC2000 User Manual
x
VMware Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
IP Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
MAC Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Virtual Media Security Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Single Sign On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Changing a Self-Signed Certificate . . . . . . . . . . . . . . . . . . . . . . 186
Importing a Signed SSL Server Certificate . . . . . . . . . . . . . . . . . 188
Import Private Key and Certificate. . . . . . . . . . . . . . . . . . . . . . . . 189
License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Upgrading the License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
License Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
License Conflict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Adding a Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Backup the Primary Server Database . . . . . . . . . . . . . . . . . . . . . 196
Export Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Power Control a Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Upgrade Selected Appliance Firmware . . . . . . . . . . . . . . . . . . . 201
Backup Device Configuration/Account Information . . . . . . . . . . . 204
Export Device Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Export Session History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Editing a Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Deleting a Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Replicate Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Appliance Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Firmware Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Adding Firmware Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Deleting Firmware Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Deleting Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Sidebar Server Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Chapter 8.
Logs
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
CC Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
CC Log Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Notification Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Adding and Configuring Notification Users . . . . . . . . . . . . . . . . . 221
Modifying Notification Configurations . . . . . . . . . . . . . . . . . . . . . 222
Deleting Notification Configurations . . . . . . . . . . . . . . . . . . . . . . 222
Testing Event Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Export Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Import Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Advanced Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
CC2000 User Manual
xi
Device Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Device Log Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227
Device Log Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228
Session History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229
Session History Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Session History Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
SNMP Trap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231
SNMP Trap Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231
Search Condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231
SNMP Trap Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .232
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233
Access Per User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233
Device Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235
Port Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236
Device Access (Top 10) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .238
Port Access (Top 10). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240
Asset Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .241
Report Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Appendix A
Technical Information
Safety Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .243
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .243
Rack Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .245
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
International. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .246
North America . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
USB Authentication Key Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . 246
CC2000 Capable ATEN/Altusen IP Products . . . . . . . . . . . . . . . . . . . . . 247
Energy Intelligence Rack PDUs . . . . . . . . . . . . . . . . . . . . . . . . . 247
Supported KVM Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .249
Device ANMS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .249
VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .250
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251
CC2000 Proxy Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Name, Description and Range Parameters . . . . . . . . . . . . . . . . . . . . . .253
Trusted Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Self-Signed Private Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .262
Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Importing the Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .262
Appendix B
The CC2000 Utility
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
View License. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
CC2000 User Manual
xii
Appendix C
Authentication Key Utility
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Key Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Key Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Key Firmware Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Starting the Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Upgrade Succeeded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Key License Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Online Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Upgrade Succeeded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Offline Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Preliminary Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Performing the Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Offline Upgrade Failure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Order Expiration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Appendix D
External Authentication Services
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Approved Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
LDAP/LDAPS – OpenLDAP Setting Example . . . . . . . . . . . . . . . . . . . . 287
Active Directory Settings Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
RADIUS Settings Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
TACACS+ Settings Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
NT Domain Settings Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
LDAP Group Authorization Setting Examples . . . . . . . . . . . . . . . . . . . . 295
Example 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Example 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Active Directory Group Authorization Setting Example . . . . . . . . . . . . . 300
MOTP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Appendix E
SSO HTML Sample Codes
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
SSO HTML Sample Codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
CC2000 User Manual
xiii
About this Manual
This User Manual is provided to help you get the most from your CC2000
system. It covers all aspects of installation, configuration and operation. An
overview of the information found in the manual is provided below.
Generally speaking, chapters 1, 3, and 4 are sufficient for basic users. The other
chapters and appendixes are only required for specialized user types. For
example, System Administrators, should read the entire manual; Device
Administrators, chapters 6 and 8; User Managers, chapter 7. Custom user types
will want to read the chapters appropriate to their assigned roles.
Overview
Chapter 1, Introduction, introduces you to the CC2000 System. Its
purpose, features and benefits are presented, and its front and back panel
components are described.
Chapter 2, CC2000 Server Installation, provides step-by-step
instructions for installing the CC2000 on both a Windows and Linux system.
Chapter 3, Browser Operation, explains how to log into the CC2000 with
a browser, and describes how to work with the CC2000’s browser GUI
interface.
Chapter 4, Port Access, shows how to access and control the devices that
will be managed over the CC2000 network.
Chapter 5, User Management, describes how to: add, modify and delete
user accounts; create user groups and assign users to them; specify device
access rights for users and groups; and specify the user authentication method.
Chapter 6, Device Management, explains how to add, configure, and
organize the devices that will be managed over the CC2000 network.
Chapter 7, System Management, provides an overview of the CC2000
organizational concept, and demonstrates how to deploy, configure, and
manage the CC2000 primary and secondary servers on your installation.
Chapter 8, Logs, explains the CC2000’s logging function and how to
access, filter, and search the various logs that are kept by the CC2000.
Appendix A, Technical Information, provides technical as well as
troubleshooting information.
Appendix B, The CC2000 Utility, shows how to configure a number of the
CC2000’s parameters from the desktop of the computer that the CC2000 runs
on, without having to invoke the browser GUI.
CC2000 User Manual
xiv
Appendix C, Authentication Key Utility, describes how to access and
update the information contained in the CC2000 Authentication Key.
Appendix D, External Authentication Services, discusses the use of
authentication via external third party services. It also provides examples of
configuring OpenLDAP for CC2000 authentication, and configuring RADIUS
for CC2000 authentication in a Linux environment.
Conventions
This manual uses the following conventions:
Product Information
For information about all Altusen products and how they can help you connect
without limits, visit Altusen on the Web or contact an Altusen Authorized
Reseller. Visit Altusen on the Web for a list of locations and telephone
numbers:
Important Note about Firmware
Due to database changes that have been made with a previous firmware release
(V2.3.222), this version of CC2000 is not compatible with any previous
CC2000 releases. CC2000 firmware V2.7.264 supports Java Web Start
(JNLP).
Monospaced Indicates text that you should key in.
[ ] Indicates keys you should press. For example, [Enter] means
to press the Enter key. If keys need to be chorded, they appear
together in the same bracket with a plus sign between them:
[Ctrl+Alt].
1. Numbered lists represent procedures with sequential steps.
Bullet lists provide information, but do not involve sequential
steps.
Indicates selecting the option (on a menu or dialog box, for
example), that comes next. For example, Start
Run means
to open the Start menu, and then select Run.
Indicates critical information.
International http://www.aten.com
1
Chapter 1
Introduction
Overview
The CC2000 Control Center Over the NETprovides single portal, single
login, secure, centralized, access, administration and management of your
entire network – local and worldwide – anywhere; anytime.
The CC2000 offers a single, integrated browser-based interface to manage all
your devices. Users no longer need to learn the interface for each individual
device, making system management easier and more efficient.
The CC2000’s Primary / Secondary architecture allows multiple CC2000 units
to be linked in a communication network to create an integrated web of devices
– all of which can be accessed with a single login from a web browser. (The
diagram on the following page provides a CC2000 deployment example.)
The Primary-Secondary paradigm also safeguards your data transmissions
through its built-in redundancy factors including: automated database backup
of Primary, Secondaries and devices; and real-time database updating.
Redundancy ensures smooth, uninterrupted access management of all your
devices. Should any of the CC2000 servers go down, the CC2000 management
system keeps functioning since the redundant secondary unit takes over to
provide the required services until the downed unit comes back up.
By consolidating the management of your ATEN/ALTUSEN IT devices, the
CC2000 allows every device to be securely accessed and controlled by means
of a single IP address. Servers and network equipment are integrated into a
single tree view, making the CC2000 ideal for enterprises with data centers and
branch offices, located in several remote locations.
Recognizing the broad spectrum of computing environments, the CC2000’s
Java software implementation allows it to work with Sun Java Runtime
Environment (JRE) enabled operating systems – ensuring multi-platform
integration and mutual operability.
CC2000 User Manual
2
Deployment Example:
Primary
Secondary
Secondary
Secondary
Secondary
Secondary
Secondary
Secondary
Secondary
Devices
Chapter 1. Introduction
3
Features
Secure Centralized Management
Complete control of your enterprise – consolidates the management of all
ATEN/Altusen IT devices
Single portal, single sign-on, single IP address to securely access every
device on the installation
All devices are integrated into a single tree view for centralized access,
administration, and management of a worldwide network from anywhere
at anytime
Primary/Secondary topology provides redundancy – including real-time
database updating
Double Redundancy – the CC2000 not only provides a redundant
Secondary server for the Primary server, each Secondary server can also
have a redundant Secondary server.
Aggregate Device – The KVM port, serial port and power outlet of an IT
device can be associated and presented in the same web page, which
enables IT administrators to completely control an IT device from a single
user interface
Multiplatform installation support – Windows / Linux
Multiplatform client support (Windows, Mac OS X, Linux, Sun)
Multi-browser support – Internet Explorer, Chrome, Firefox, Safari,
Opera, Mozilla, Netscape
Email notification of specified system events
Automatic scheduling of system, configuration, and maintenance tasks
Logging and auditing of system events for the CC2000 and managed
devices
Session logs provide serial device keystroke history
ATEN/Altusen device auto-discovery with device-availability status, and
alarms
View, manage, and terminate active user sessions in real time
User level management identification
Browser-based GUI offers a multilanguage interface to minimize user
training time and increase productivity
Generic Device support – users can be redirected to 3rd party data center
devices from the CC2000
CC2000 User Manual
4
Flexible logging and report options
Blade Server Integration supports Centralized Server Control, Power
Management – to power on/off the server, Sensor and log Readings for
Service Processor Management
APC PDU (AP79xx, AP89xx, AP86xx) support
Supports single sign-on for Dell DRAC 5, iDRAC 6 (standard rack server
(monolithic) and blade server (modular)), IBM RSA II, IBM IMM, IBM
AMM, HP iLO 2, HP iLO 3, HP iLO 5,and IPMI
Energy Intelligence Rack PDU support
Integrates all access rights – Web, SSH/Telnet, VNC/RDP, IPMI/SPM,
KVM, serial, power to target device
Virtual Infrastructure includes VMware vSphere 5.5, 6.0, Windows Server
2008, 2012 & 2016, and Citrix XenServer 6.5
Panel DynaArray – view the output of multiple ports in individual panels
on the same screen
Power association with ATEN/Altusen PDU enables the switch’s KVM
ports to associate with the PDU’s power outlets for remote power
management of the servers from the switch’s interface
Web-based wizard to quickly install devices
Primary can pull device port names from Secondary servers; Primary can
push device port names to Secondary server
Advanced search function for log entries
Strong session management/Integrates multi-session (ATEN iKVM, Blade
server, VMware, PDU, and so on)
License Saving-use Aggregate Devices to consolidate multiple ports into a
single node license
Data export /import to remote server or local in real time or on schedule.
AES/DES encryption support for data export
OOBC, PAP and CHAP authentication
IPv6 support
NTS support – allow your device to get the accurate time from a server
that the administrator assigns
Chapter 1. Introduction
5
Powerful Security
Powerful security features include both internal and external
authentication – external authentication support includes LDAP, LDAPS,
Kerberos, Active Directory, RADIUS, TACACS+, and NT Domain
Option to force users of all CC managed devices to be authenticated
through the CC – users cannot log in to the devices directly
Compliant with the X.509 Digital Certificate Standard
Supports TLS 1.2 data encryption and RSA 2048-bit certificates to secure
users logging in from browsers
Flexible session time-outs
Configurable user and group permissions for server access and control
Supports password protection, SAS 70 compliance for configurable
amount of failed login attempts and user ID lock out parameters
Devices can identify themselves by Name, MAC address, or IP in the
browser
IP and MAC filtering
Private CA support
Server Management Features
BIOS level support
Flexible encryption design allows users to choose any combination of 56-
bit DES, 168-bit 3DES, 256-bit AES, 128-bit RC4, or Random for
independent KB/Mouse, video, and virtual media data encryption
Virtual Media – supports CAC/Smart Card readers, fingerprint readers,
DVD/CD drives, USB mass storage devices, PC hard drives and ISO
images
Exit Macro support
Mouse DynaSync – automatically synchronizes the local and remote
mouse movements
Panel Array Mode – simultaneous monitoring of the video output of the
installations’ servers
Message Box for Administrators to communicate with users
Message Board for communication among remote users
Scalable Video Display
CC2000 User Manual
6
Requirements
Server Requirements
Systems that the CC2000 server will be installed on should meet the following
requirements:
Hardware Requirements
CPU: Pentium 4, 2.60 GHz or higher
Memory: At least 512MB (1GB or more recommended)
Hard drive: 500MB or more free space
Ethernet: At least 1 Ethernet adapter (100Mbps or higher) – Giga LAN
recommended
Operating System Requirements
Windows: 2000, XP, 2000 Server, Server 2003, Server 2008, or
Windows Vista with Java Runtime Environment (JRE) 8 or higher
(with the latest service package for each installed)
Linux (with Java Runtime Environment (JRE) 8 or higher)
Red Hat Enterprise Linux V. 4
Novell SUSE Enterprise Server 9 and 10
Ubuntu 15.10 x64
Ubuntu 15.10 x86
Debian 8.2 x64
Fedora 23 x64
Fedora 23 x86
OpenSUSE 13.1 x64
CentOS 7 x64
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319

ATEN CC2000 User manual

Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI