TABLE OF CONTENTS
CONFIGURATION FROM THE COMMAND LINE ..................................................................................................... 6
1.1 Accessing config from the command line ................................................................................................. 6
1.1.1 Serial Port configuration ...................................................................................................................................... 8
1.1.2 Adding and removing Users ............................................................................................................................... 11
1.1.3 Adding and removing user Groups ..................................................................................................................... 12
1.1.4 Authentication .................................................................................................................................................... 13
1.1.5 Network Hosts .................................................................................................................................................... 14
1.1.6 Trusted Networks ................................................................................................................................................ 15
1.1.7 Cascaded Ports .................................................................................................................................................. 16
1.1.9 RPC Connections................................................................................................................................................ 17
1.1.10 Environmental .................................................................................................................................................... 18
1.1.11 Managed Devices ............................................................................................................................................... 19
1.1.12 Port Log ............................................................................................................................................................. 19
1.1.13 Port Log Password Obfuscation ......................................................................................................................... 20
1.1.14 Alerts .................................................................................................................................................................. 21
1.1.15 SMTP & SMS ..................................................................................................................................................... 23
1.1.16 SNMP ................................................................................................................................................................. 24
1.1.17 Administration .................................................................................................................................................... 24
1.1.18 IP settings ........................................................................................................................................................... 24
1.1.19 Date & Time settings .......................................................................................................................................... 25
1.1.20 Dial-in settings ................................................................................................................................................... 26
1.1.21 DHCP server ...................................................................................................................................................... 26
1.1.22 Services .............................................................................................................................................................. 27
1.1.23 NAGIOS ............................................................................................................................................................. 28
ADVANCED CONFIGURATION .............................................................................................................................. 30
2.1 Custom Scripting ..................................................................................................................................... 30
2.1.1 Custom script to run when booting ..................................................................................................................... 30
2.1.2 Running custom scripts when alerts are triggered .............................................................................................. 31
2.1.3 Example script - Power cycling on pattern match .............................................................................................. 31
2.1.4 Example script - Multiple email notifications on each alert .............................................................................. 32
2.1.5 Deleting configuration values from the CLI ....................................................................................................... 32
2.1.6 Power cycle any device upon a ping request failure ........................................................................................... 35
2.1.7 Running custom scripts when a configurator is invoked ..................................................................................... 36
2.1.8 Backing-up the configuration and restoring using a local USB stick ................................................................. 37
2.1.9 Backing-up the configuration off-box ................................................................................................................. 37
2.2 Advanced Portmanager .......................................................................................................................... 38
2.2.1 Portmanager commands ..................................................................................................................................... 38
2.2.2 External Scripts and Alerts ................................................................................................................................. 42
2.3 Raw Access to Serial Ports ...................................................................................................................... 43
2.3.1 Access to serial ports .......................................................................................................................................... 43
2.3.2 Accessing the console/modem port ..................................................................................................................... 44
2.4 IP Filtering ............................................................................................................................................... 44
2.5 SNMP Status Reporting .......................................................................................................................... 45
2.5.1 Retrieving status information using SNMP ......................................................................................................... 45
2.5.2 Check firewall rules ............................................................................................................................................ 45
2.5.3 Enable SNMP Service ......................................................................................................................................... 45
2.5.4 Adding multiple remote SNMP managers ........................................................................................................... 50
2.6 Secure Shell (SSH) Public Key Authentication ......................................................................................... 51
2.6.1 SSH Overview ..................................................................................................................................................... 51
2.6.2 Generating Public Keys (Linux) ......................................................................................................................... 52
2.6.3 Installing the SSH Public/Private Keys (Clustering) ........................................................................................... 52
2.6.4 Installing SSH Public Key Authentication (Linux) .............................................................................................. 53
2.6.5 Generating public/private keys for SSH (Windows) ............................................................................................ 54
2.6.6 Fingerprinting .................................................................................................................................................... 56
2.6.7 SSH tunneled serial bridging .............................................................................................................................. 57
2.6.8 SDT Connector Public Key Authentication ......................................................................................................... 59