Tripp Lite 0 Idades Manual
Have a look at the manual Tripp Lite 0 Idades Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 7 Tripp Lite manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
171 Chapter 10: Nagios Integration define service { service_description Host Ping host_name server use generic-service check_command check_ping_via_tripplite } define service { service_description host-ping-server host_name server use generic-service check_command check_ping_via_tripplite active_checks_enabled 0 passive_checks_enabled 1 } define servicedependency{ name tripplite_nrpe_daemon_dep host_name tripplite dependent_host_name server dependent_service_description Host Ping service_description NRPE Daemon execution_failure_criteria w,u,c } ; SSH Port define command{ command_name check_conn_via_tripplite command_line $USER1$/check_nrpe -H 192.168.254.147 -p 5666 -c\ host_$HOSTNAME$_$ARG1$_$ARG2$ } define service { service_description SSH Port host_name server use generic-service check_command check_conn_via_tripplite!tcp!22 } define service { service_description host-port-tcp-22-server ; host-port--- host_name server use generic-service check_command check_conn_via_tripplite!tcp!22 active_checks_enabled 0 passive_checks_enabled 1 } define servicedependency{ name tripplite_nrpe_daemon_dep host_name tripplite dependent_host_name server dependent_service_description SSH Port service_description NRPE Daemon execution_failure_criteria w,u,c }
172 Chapter 10: Nagios Integration 10.4.2 Basic Nagios plug-ins Plug-ins are compiled executables or scripts that can be scheduled to be\ run on the Console Server to check the status of a connected host or service. This status is then communicated to the upstr\ eam Nagios server which uses the results to monitor the current status of the distributed network. Each Console Server is pr\ econfigured with a selection of the checks that are part of the Nagios plug-ins package: check_tcp and check_udp are used to check open ports on network hosts check_ping is used to check network host availability check_nrpe is used to execute arbitrary plug-ins in other devices Each Console Server is also preconfigured with two checks that are spe\ cific to the Console Server: check_serial_signals is used to monitor the handshaking lines on the serial ports check_port_log is used to monitor the data logged for a serial port. 10.4.3 Additional plug-ins Additional Nagios plug-ins (listed below) are available for all the Tripp Lite Console Servers: check_apt check_by_ssh check_clamd check_dig check_dns check_dummy check_fping check_ftp check_game check_hpjd check_http check_imap check_jabber check_ldap check_load check_mrtg check_mrtgtraf check_nagios check_nntp check_nntps check_nt check_ntp check_nwstat check_overcr check_ping check_pop check_procs check_real check_simap check_smtp check_snmp check_spop check_ssh check_ssmtp check_swap check_tcp check_time check_udp check_ups check_users There also are bash scripts which can be downloaded and run (primarily check_log.sh). • To configure additional checks, the downloaded plug-in program must be \ saved in the tftp addins directory on the USB flash and the downloaded text plug-in file saved in /etc/config • To enable these new additional checks, you select Serial&Network: Network Port, then you Edit the Network Host to be monitored, and select New Checks. The additional check option will have been included in the updated Nagios Checks list. You can again customize the arguments
173 Chapter 11: System Management This chapter describes how the Administrator can perform a range of gene\ ral system administration and configuration tasks on the Console Server, such as: • Applying Soft and Hard Resets to the gateway • Re-flashing the firmware • Configuring the Date, Time and NTP • Setting up Backup of the configuration files (B095-004/003 only) • Configuring the console server in FIPS mode(B095-004/003 only) • Delayed configuration commits System administration and configuration tasks covered elsewhere includ\ e: • Resetting the System Password and entering a new System Name and Description for the Console S\ erver (Chapter 3.2) • Setting the Console Server’s System IP Address (Chapter 3. 3) • Setting the permitted Services used to access the Console Server (Chapter 3.4) • Setting up OoB Dial-in (Chapter 5) Configuring the Dashboard (B095-004/003 only) (Chapter 12) 11.1 System Administration and Reset The Administrator can reboot or reset the gateway to default settings. A soft reset is affected by: • Selecting Reboot in the System: Administration menu and clicking Apply The Console Server reboots with all settings (e.g. the assigned network IP address) preserved. However this soft reset does disconnect all users and ends any SSH sessions that had been established. A soft reset will also be affected when you switch OFF power from the Console \ Server, and then switch the power back ON. However if you cycle the power while the unit is writing to flash you \ could corrupt or lose data, so the software reboot is the safer option. A hard erase (hard reset) is effected by: • Pushing the Erase button on the rear panel twice. A ball point pen or bent paper clip is a suitable tool for performing \ this procedure. Do not use a graphite pencil. Depress the button gently twice (within a couple of second period) while the unit is powered ON. This will reset the Console Server back to its factory default settings \ and clear the Console Server’s stored configuration information (i.e. the IP address will be reset to 192.168.0.1). You will be prompted to log in and must enter the default administration username and administration password (Username: root Password: default).
174 Chapter 11: System Management 11.2 Upgrade Firmware Before upgrading you should ascertain if you are already running the mos\ t current firmware in your gateway. Your Console Server will not allow you to upgrade to the same or an earlier version. \ • The Firmware version is displayed in the header of each page • Or select Status: Support Report and note the Firmware Version • To upgrade, you must first download the latest firmware image from http://www.tripplite.com/EN/support/downloads/driver-firmware-downloads.cfm • Save this downloaded firmware image file on to a system on the same \ subnet as the Console Server • Also download and read the release_notes.txt for the latest information • To then upload the firmware image file to your Console Server, select System: Firmware • Specify the address and name of the downloaded Firmware Upgrade File, or\ Browse the local subnet and locate the downloaded file • Click Apply and the Console Server appliance will undertake a soft reboot and comme\ nce upgrading the firmware. This process will take several minutes • After the firmware upgrade has completed, click here to return to the Management Console. Your Console Server will have retained all its pre-upgrade configuration information
175 Chapter 11: System Management 11.3 Configure Date and Time It is recommended that you set the local Date and Time in the Console Se\ rver as soon as it is configured. Features such as Syslog and NFS logging use the system time for time-stamping log entries\ , while certificate generation depends on a correct Timestamp to check the validity period of the certificate. • Select the System: Date & Time menu option • Manually set the Year, Month, Day, Hour and Minute using the Date and Time selection boxes, then click Set Time The gateway can synchronize its system time with a remote time server us\ ing the Network Time Protocol (NTP). Configuring the NTP time server ensures that the Console Server clock will be accurate s\ oon after the Internet connection is established. Also if NTP is not used, the system clock will be reset randomly every time t\ he Console Server is powered up. To set the system time using NTP: • Select the Enable NTP checkbox on the Network Time Protocol page • Enter the IP address of the remote NTP Server • If your external NTP server requires authentication, you need to specify\ the NTP Authentication Key and the Key Index to use when authenticating with the NTP server • Click Apply Settings You must now also specify your local time zone so the system clock can sh\ ow local time (and not UTP): • Set your appropriate region/locality in the Time Zone selection box and \ click Set Timezone The Time Zone can also be set to UCT (Coordinated Universal Time) which replaced Greenwich Mean Time as the World standard for time in 1986:
176 Chapter 11: System Management 11.4 Configuration Backup It is recommended that you back up the Console Server configuration wh\ enever you make significant changes (such as adding new Users or Managed Devices) or before performing a firmware upgrade\ . • Select the System: Configuration Backup menu option or click the icon Note: The configuration files can also be backed up from the command lin\ e (refer Chapter 14) You can save the backup file remotely on your PC and you can restore co\ nfigurations from remote locations: • Click Save Backup in the Remote Configuration Backup menu • The config backup file (System Name_date_config.opg) will be downloaded to your PC and saved in the location you nominate To restore a remote backup: • Click Browse in the Remote Configuration Backup menu and select the Backup File you wish to restore • Click Restore and click OK. This will overwrite all the current configuration settings in your C\ onsole Server Alternately you can save the backup file locally onto the USB storage.\ To do this your Console Server must support USB and you must have an internal or external USB flash drive installed. To backup and restore using USB: • Ensure the USB flash is the only USB device attached to the Console Se\ rver • Select the Local Backup tab and click here to proceed. This will set a Volume Label on the USB storage device. This preparation step is only necessary the first time, and will not affect\ any other information you have saved onto the USB storage device. However it is recommended that you back up any critical \ data from the USB storage device before using it with your Console Server. If there are multiple USB devices installed you will be warned to remo\ ve them. • To backup to the USB enter a brief Description of the backup in the Local Backup menu and select Save Backup • The Local Backup menu will display all the configuration backup file\ s you have stored onto the USB flash • To restore a backup from the USB simply select Restore on the particular backup you wish to restore and click Apply
177 Chapter 11: System Management After saving a local configuration backup, you may choose to use it as\ the alternate default configuration. When the Console Server is reset to factory defaults, it will then load your alternate de\ fault configuration instead of its factory settings: • To set an alternate default configuration, check Load On Erase and click Apply Note: Before selecting Load On Erase please ensure you have tested your alternate default configuration by\ clicking Restore If for some reason your alternate default configuration causes the Con\ sole Server to become unbootable recover your unit to factory settings using the following steps: • If the configuration is stored on an external USB storage device, unpl\ ug the storage device and reset to factory defaults as per section 11.1 of the user manual • If the configuration is stored on an internal USB storage device reset\ to factory defaults using a specially prepared USB storage device: o The USB storage device must be formatted with a Windows FAT32/VFAT file system on the first partition or the entire disk, most USB thumb drives are already formatted this way o The file system must have the volume label: OPG_DEFAULT o Insert this USB storage device into an external USB port on the Console \ Server and reset to factory defaults as per section 11.1 After recovering your Console Server, ensure the problematic configuration is no longer selected for Load \ On Erase 11.5 Delayed Configuration Commit The Delayed Config Commit mode allows the grouping or queuing of confi\ guration changes and the simultaneous application of these changes to a specific device. For example, changes to authentication methods or user accounts may be gr\ ouped and run once to minimize system downtime. To enable: • Check the Delayed Config Commits button under System: Administration • Click Apply • The Commit Config icon will now be displayed in top right-hand corner of the screen between the\ Backup and Log Out icons To queue then run configuration changes: • Firstly apply all the required changes to the configuration e.g. modif\ y user accounts, amend authentication method, enable OpenVPN tunnel or modify system time • Click the Commit Config button. This will generate the System: Commit Configuration screen displaying all the configurators to be run
178 Chapter 11: System Management • Click Apply to run all the configurators in the queue • Alternately click Cancel and this will discard all the delayd configuration changes Note: All the queued configuration changes will be lost if Cancel is selec\ ted To disable the Delayed Configuration Commits mode: • Uncheck the Delayed Config Commits button under System: Administration and click Apply • Click the Commit Config button in top right-hand corner of the screen to display the System: Commit Configuration screen • Click Apply to run the systemsettings configurator The Commit Config button will no longer be displayed in the top right-hand corner of the \ screen and configurations will no longer be queued. 11.6 FIPS Mode Note: The US National Institute of Standards and Technology (NIST) publishes the FIPS (Federal Information Processing Standard) series of standards. FIPS 140-1 and FIPS 140-2 are both techn\ ical standards and worldwide de-facto standards for the implementation of cryptographic modules. These standards and guideli\ nes are issued by NIST for use government-wide. NIST develops FIPS when there are compelling Federal government requirem\ ents such as for security and interoperability and there are no acceptable industry standards or solutions. Console Servers with Revision 3.0.1 firmware (or later) use an embed\ ded OpenSSL cryptographic module that has been validated to meet the FIPS 140-2 standards and has received Certificat\ e #1051. This firmware is only currently available on B095-004-1E / B095-003-1E-M Console Servers When configured in FIPs mode all SSH, HTTPS and SDTConnector access to all services on the Console Servers will use the embedded FIPS compliant cryptographic module. To connect you must also be using cryptographic algorithms that are FIPs approved in your browser or client or the connection will fail. • Select the System: Administration menu option • Check FIPS Mode to enable FIPS mode on boot, and check Reboot to safely reboot the console server • Click Apply and the Console Server will now reboot. It will take several minutes to\ reconnect as secure communications with your browser are validated, and when reconnected it will display “\ FIPs mode: Enabled” in the banner Note: To enable FIPS mode from the command line, login and run these commands: config -s config.system.fips=on touch /etc/config/FIPS chmod 444 /etc/config/FIPS flatfsd -b The final command saves to flash and reboots the unit. The unit wil\ l take a few minutes to boot into FIPS mode. To disable FIPS mode: config -d config.system.fips rm /etc/config/FIPS flatfsd –b
179 Chapter 12: Status Reports This chapter describes the dashboard feature and the status reports that\ are available: • Port Access and Active Users • Statistics • Support Reports • Syslog • Dashboard The UPS, RPC and Environmental Status reports are covered in Chapter 8 12.1 Port Access and Active Users The Administrator can see which Users have access privileges with which \ serial ports: • Select the Status: Port Access The Administrator can also see the current status as to Users who have a\ ctive sessions on those ports: • Select the Status: Active Users With firmware v3.11 and later, the Status: Active Users menu has been extended to enable Administrators to selectively terminate serial sessions. Connection types telnet, SSH, raw TCP and unauthenticated telnet can be disconnected. However, an RFC2217 session cannot be disconnected. The root user (or any user in the admin group) can access the Active Users page. The Active Users page shows a snapshot of the connected sessions indicated by the timestamp displayed at the to\ p of the page. Note that this page only shows the local console ports and does not include any cascaded ports. There are “Disconnect Sessions” buttons along the right side of the table that list active users. These\ buttons disconnect all sessions from their corresponding Port. If the port is not set up in Console Server mode, the user will see a pop-up error informing them that they need to configure the port as Console Server mode before they can proceed to connect and disconnect. After pressing the buttons, the selected sessions will be disconnected a\ nd the number of disconnect sessions will be displayed to the user. To allow more detailed control of whom to disconnect, a table with drop d\ own lists is located at the bottom of the page for all connected users and all connected ports that allow the user to choos\ e from whom to disconnect. For example, if you wish to disconnect the user ‘tester’ from all ports, choose ‘tester’ in the Users box, and All ports in the Ports box. Then click the Disconnect Sessions button. Note: You can also disconnect serial sessions from the command line using the --disconnect option with the pmusers command.
180 Chapter 12: Status Reports 12.2 Statistics The Statistics report provides a snapshot of the status, current traffi\ c and other activities and operations of your Console Server: • Select the Status: Statistics 12.3 Support Reports The Support Report provides useful status information that will assist t\ he Tripp Lite technical support team to resolve any issues you may experience with your Console Server. If you do experience an issue and have to contact Support, ensure you in\ clude the Support Report with your email support request. The Support Report should be generated when the issue is occurr\ ing, and attached in plain text format. • Select Status: Support Report and you will be presented with a status snapshot • Save the file as a text file and attach it to your support email