1101 and 1102 Secure Device Servers
724-746-5500 | blackbox.com
6
6
6.7 SDT Connector Public Key Authentication .................................................................................................................................................... 52
6.8 Setting Up SDT for Remote Desktop Access ................................................................................................................................................. 53
6.8.1 Enable Remote Desktop on the Target Windows Computer to be Accessed ................................................................................ 53
6.8.2 Configure the Remote Desktop Connection Client .......................................................................................................................... 54
6.9 SDT SSH Tunnel for VNC ................................................................................................................................................................................ 56
6.9.1 Install and Configure the VNC Server on the Computer to be Accessed........................................................................................ 56
6.9.2 Install, Configure, and Connect the VNC Viewer ............................................................................................................................. 58
6.10 Using SDT to Connect to Hosts that are Serially Attached to the Gateway ............................................................................................. 59
6.10.1 Establish a PPP Connection between the Host COM Port and the Console Server ..................................................................... 60
6.10.2 Setup SDT Serial Ports on the Console Server ................................................................................................................................. 62
6.10.3 Setup SDT Connector to SSH Port Forward over the Console Server Serial Port.......................................................................... 63
6.10.4 SSH Tunneling Using Other SSH Clients (for example, PuTTY) ...................................................................................................... 63
7. Alerts and Logging..................................................................................................................................................................................................... 67
7.1 Configure SMTP/SMS/SNMP/Nagios Alert Service........................................................................................................................................ 67
7.1.1 Email Alerts........................................................................................................................................................................................... 67
7.1.2 SMS Alerts ............................................................................................................................................................................................ 68
7.1.3 SNMP Alerts ......................................................................................................................................................................................... 68
7.1.4 Nagios Alerts ........................................................................................................................................................................................ 69
7.2 Activate Alert Events and Notifications.......................................................................................................................................................... 69
7.2.1 Add a New Alert .................................................................................................................................................................................. 70
7.2.2 Configuring General Alert Types ........................................................................................................................................................ 70
7.2.3 Configuring Power Alert Type ............................................................................................................................................................ 72
7.3 Remote Log Storage........................................................................................................................................................................................ 73
7.4 Serial Port Logging .......................................................................................................................................................................................... 73
7.5 Network TCP or UDP Port Logging ................................................................................................................................................................ 73
8. Power Management .................................................................................................................................................................................................. 75
8.1 Remote Power Control (RPC) ......................................................................................................................................................................... 75
8.1.1 RPC Connection................................................................................................................................................................................... 75
8.1.2 RPC Access Privileges and Alerts......................................................................................................................................................... 77
8.1.3 User Power Management ................................................................................................................................................................... 77
8.1.4 RPC Status ............................................................................................................................................................................................ 78
8.2 Uninterruptible Power Supply Control (UPS)................................................................................................................................................. 78
8.2.1 Managed UPS Connections ................................................................................................................................................................ 79
8.2.2 Remote UPS Management.................................................................................................................................................................. 82
8.2.3 Controlling UPS Powered Computers................................................................................................................................................ 83
8.2.4 UPS Alerts ............................................................................................................................................................................................. 83
8.2.5 UPS Status ............................................................................................................................................................................................ 83
8.2.6 Overview of Network UPS Tools (NUT) .............................................................................................................................................. 84
9. Authentication ........................................................................................................................................................................................................... 87
9.1 Authentication Configuration ........................................................................................................................................................................ 87
9.1.1 Local Authentication............................................................................................................................................................................ 87
9.1.2 TACACS Authentication ..................................................................................................................................................................... 87
9.1.3 RADIUS Authentication ....................................................................................................................................................................... 88
9.1.4 LDAP Authentication ........................................................................................................................................................................... 89
9.1.5 RADIUS/TACACS User Configuration ................................................................................................................................................ 89
9.2 Pluggable Authentication Modules (PAM) .................................................................................................................................................... 90
9.3 SSL Certificate.................................................................................................................................................................................................. 91
10. Nagios Integration ................................................................................................................................................................................................... 94
10.1 Nagios Overview............................................................................................................................................................................................ 94
10.2 Central Management and Setting Up SDT for Nagios............................................................................................................................... 95
10.2.1 Setup Central Nagios Server ............................................................................................................................................................. 96
10.2.2 Setup Distributed Console Servers ................................................................................................................................................... 96
10.3 Configuring Nagios Distributed Monitoring ............................................................................................................................................... 98
10.3.1 Enable Nagios on the Console Server .............................................................................................................................................. 98
10.3.2 Enable NRPE Monitoring ................................................................................................................................................................... 99
10.3.3 Enable NSCA Monitoring.................................................................................................................................................................. 99
10.3.4 Configure Selected Serial Ports for Nagios Monitoring ..................................................................................................................100
10.3.5 Configure Selected Network Hosts for Nagios Monitoring............................................................................................................100
10.3.6 Configure the Upstream Nagios Monitoring Host..........................................................................................................................100
10.4 Advanced Distributed Monitoring Configuration .......................................................................................................................................100
10.4.1 Sample Nagios Configuration...........................................................................................................................................................100
10.4.2 Basic Nagios Plug-Ins .........................................................................................................................................................................103
10.4.3 Number of Supported Devices .........................................................................................................................................................103
10.4.4 Distributed Monitoring Usage Scenarios .........................................................................................................................................104