Home > Tripp Lite > Switch > Tripp Lite 0 Idades Manual

Tripp Lite 0 Idades Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Tripp Lite 0 Idades Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 7 Tripp Lite manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							81
     
    • Find the Source Network to be routed, and then tick the relevant Destination Network to enable Forwarding 
    For example to configure a dual Ethernet device such as a B096-048, B09\
    6-032 or B096-016 Console Server Management 
    Switch:
    • The Source Network would the Network Interface and the Destination Network would be Management L AN
    IP Masquerading is generally required if the Console Server will be rout\
    ing to the Internet, or if the external network being 
    routed to does not have routing information about the internal network b\
    ehind the Console Server. 
    IP Masquerading performs Source Network Address Translation (SNAT) on outgoing packets, to make them appear like they've 
    come from the Console Server (rather than devices on the internal netwo\
    rk). When response packets come back devices on 
    the external network, the Console Server will translate the packet addre\
    ss back to the internal IP, so that it is routed correctly. 
    This allows the Console Server to provide full outgoing connectivity for\
     internal devices using a single IP Address on the 
    external network.
     
    By default IP Masquerading is disabled for all networks. To enable masquerading:  
    • Select Forwarding & Masquerading panel on the System: Firewall menu
    • Check Enable IP Masquerading (SNAT) on the network interfaces where masquerading is be enabled
    Generally this masquerading would be applied to any interface that is co\
    nnecting with a public network such as the Internet.
    Chapter 5: Firewall, Failover and Out-of-Band  
    						
    							82
    5.5.2 Configuring client devices
    Client devices on the local network must be configured with Gateway and DNS settings. This can be done statically on each 
    device, or using DHCP
    Manual Configuration:
    Manually set a static gateway address (being the address of the Console\
     Server) and set the DNS server address to be the 
    same as used on the external network i.e. if the Console Server is actin\
    g as an internet gateway or a cellular router, then use 
    the ISP provided DNS server address.
    DHCP Configuration:
    • Navigate to the System:IP page
    • Click the tab of the interface connected to the internal network. To use DHCP, a static address must be set; check that the 
    static IP and subnet mask fields are set.
    • Click on the Disabled link next to DHCP Server which will bring up the S\
    ystem: DHCP Server page
    • Check Enable DHCP Server 
    • To configure the DHCP server, tick the Use interface address as gateway check box
    • Set the DNS server address(es), lease times, allocation pools and pre-\
    assigned IP addresses; as detailed previously in 
    Chapter 3.6.2
    Once applied, devices on the internal network will be able to access res\
    ources on the external network.
    Chapter 5: Firewall, Failover and Out-of-Band  
    						
    							83
    5.5.3 Port/Protocol Forwarding 
    When using IP Masquerading, devices on the external network cannot initi\
    ate connections to devices on the internal network. 
    To work around this, Port Forwards can be set up to allow external  users to connect to a specific port,\
     or range of ports on the 
    external interface of the Console Server, and have the Console Server redirect the data to a specified interna\
    l address and port 
    range.
    To setup a port forward:
    • Navigate to the System: Firewall page, and click on the Port Forwarding tab
    • Click Add New Port Forward
    • Fill in the following fields:
    Name:   Name for the port forward. This should describe the target and the servi\
    ce that the port forward is used to 
    access
    Input Interface:  This allows the user to only forward the port from a specific interfac\
    e. In most cases, this should be left 
    as "Any"
    Source Address/
    Address Range: This allows the user to restrict access to a port forward to a specifi\
    c source IP address or IP address 
    range of the data. This may be left blank. IP address ranges use the for\
    mat ip/netmask (where netmask is 
    in bits 1-32).
    Input Port Range:   The range of ports to forward to the destination IP. These will be the port(s) specified when accessing the 
    port forward. These ports need not be the same as the output port range.\
    Protocol:    The protocol of the data being forwarded. The options are TCP or UDP, TCP and UDP, ICMP or ESP or GRE 
    or Any.  
    Output Address:  The target of the port forward. This is an address on the internal netwo\
    rk where packets sent to the Input 
    Interface on the input port range are sent.
    Output Port Range:  The port or ports that the packets will be redirected to on the Output A\
    ddress.
    Chapter 5: Firewall, Failover and Out-of-Band
     
    For example, to forward port 8443 to an internal HTTPS server on 192.168.10.2, the following settings would be used:
             Input Interface: Any
             Input Port Range: 8443
             Protocol: TCP
             Output Address: 192.168.10.2
             Output Port Range: 443  
    						
    							84
    5.5.4 Firewall Rules
    Firewall rules can be used to block or allow traffic through an interf\
    ace based on port number, direction (ingress or egress) and 
    protocol. This can be used to allow custom on box services, or block tra\
    ffic based on policy.
    Chapter 5: Firewall, Failover and Out-of-Band
    To setup a firewall rule:
    • Navigate to the System: Firewall page, and click on the Firewall Rules tab
    • Click Add New Firewall Rule
    • Fill in the following fields:
    Name:    Name the firewall rule. This name should describe the policy the port \
    rule is being used to implement 
    (e.g. block ftp)
    Interface:  Select the interface that the firewall rule will be applied to (i.e. \
    Any, Dialout/Cellular, VPN, Network 
    Interface, Dial-in etc)
    Port Range:   Specify the port or range of ports (e.g. 1000 – 1500) that the rule\
     will apply to. This may be left blank for Any
    Source MAC 
    address:  Specify the source MAC address to be matched. This may be left blank for\
     any. MAC addresses use the 
    format XX:XX:XX:XX:XX:XX, where XX are hex digits
    Source Address 
    Range:  Specify the source IP address (or address range) to match. IP address \
    ranges use the format ip/netmask 
    (where netmask is in bits 1-32). This may be left blank for Any
    Destination Range:  Specify the destination IP address/address range to match. IP address ra\
    nges use the format ip/netmask 
    (where netmask is in bits 1-32). This may be left blank.
    Protocol:  Select if the firewall rule will apply to TCP or UDP
    Direction:  Select the traffic direction that the firewall rule will apply to (\
    Ingress = incoming or Egress)
    Action:   Select the action (Accept or Block) that will be applied to the packets detected that match the Interface\
    + 
    Port Range + Source/destination Address Range + Protocol+ Direction 
    For example, to block SSH traffic from leaving Dialout Interface, the following settings can \
    be used:
             Interface: Dialout
             Port Range: 22
             Protocol: TCP
             Direction: Egress
             Action: Block  
    						
    							85
    Chapter 5: Firewall, Failover and Out-of-Band
    The firewall rules are processed in a set order- from top to bottom. So rule placement is important. For example with the 
    following rules, all traffic coming in over the Network Interface is blocked except when it comes from two nominated IP 
    addresses (SysAdmin and Tony):
    To allow all incoming traffic on all 
    interfaces from the SysAdmin: 
    To allow all incoming 
    traffic from Tony:
    To block all incoming traffic 
    from the Network Interface:
    InterfaceAnyAnyNetwork Interface
    Port RangeAnyAnyAny
    Source MACAnyAnyAny
    Source IPIP address of SysAdminIP address of TonyAny
    Destination IPAnyAnyAny
    ProtocolTCPTCPTCP
    DirectionIngressIngressIngress
    ActionAcceptAcceptBlock
    However, if the Rule Order above was to be changed so the “Block Everyone Else” rule was second on the list, then the traffic 
    coming in over the Network Interface from Tony would be blocked. 
    5.6 Internal Cellular Modem Connection 
    5.6.1  Connecting to a 4G LTE carrier network 
    The B094-008-2E-V has an internal cellular modem that will connect to Verizon’s 4G LTE network (USA).
    • Before powering on the B094-008-2E-V, you must first install the SIM card provided by your cellular carrie\
    r and attach the 
    external aerial antenna.
    •  Select Internal Cellular Modem panel on the System: Dial menu.
    •  Check Enable Dial-Out Settings.  
    						
    							86
    Chapter 5: Firewall, Failover and Out-of-Band
    Note:  Your 4G LTE carrier may have provided you with details for configuring the conn\
    ection, including APN (Access Point 
    Name), PIN code (optional PIN code that may be required to unlock the \
    SIM card), Username/Password, etc. In most cases, 
    you will only need to enter your cellular provider’s APN, leaving the\
     other fields blank.
    • Enter the carrier’s APN. 
    • If the SIM card is configured with a PIN code, you will be required to\
     enter a PIN code to unlock the card.
    You may also need to set Override DNS to use alternate DNS servers from t\
    hose provided by your carrier.
    • To enable Override DNS, check the Override returned DNS Servers box. Enter the IP addresses of the DNS servers into 
    the spaces provided.
    • Check Apply to establish a radio connection with your cellular carrier.
    5.6.2  Verifying the cellular connection   
    Out-of-band access is enabled by default and the cellular modem connection sho\
    uld be established. 
    • You can verify the connection status from the Status: Statistics screen:
     o Select the Cellular tab. When in Service Availability, verify that Mode is set to Online.
     o Select Failover & Out-of-Band. The Connection Status will read Connected. 
     o Check your allocated IP address:  
    						
    							87
    Chapter 5: Firewall, Failover and Out-of-Band
    • You can measure the received signal strength from the Cellular Statistics\
     page on the Status: Statistics screen. This will 
    display the current state of the cellular modem, including the Received \
    Signal Strength Indicator (RSSI) 
    Note: Received Signal Strength Indicator (RSSI) is a measurement of the Radio Frequency (RF) power present in a r\
    eceived 
    radio signal on a mobile device. It is expressed in Decibel-milliwatts (\
    dBm). The best throughput will result in placing the 
    device in an area with the highest RSSI. 
    -100 dbm or less = Unacceptable coverage 
    -99 dbm to -90 dbm = Weak Coverage 
    -89 dbm to -70 dbm = Medium to High Coverage
    -69 dbm or greater = Strong Coverage 
    • With the cellular modem connection on, you can also check the connection \
    status from the LEDs located on top of unit.
    5.6.3  Cellular modem watchdog 
    When you select Enable Dial-Out on the System: Dial menu, you will be given the option to configure a cellar modem 
    watchdog service. This service will periodically ping a configurable I\
    P address. If a threshold number of consecutive attempts 
    fail, the service will cause the unit to reboot. This can be used to for\
    ce a clean restart of the modem and create a workaround 
    for any carrier issues.  
    						
    							88
    Chapter 5: Firewall, Failover and Out-of-Band
    5.7 Cellular Operation
    When set up as a console server, the cellular modem can be set up to connect to the carrier in one of t\
    hree modes:
    • Cellular router mode – In this case, the dial-out connection to the carrier’s cellular\
     network is always on and IP traffic is 
    routed between the cellular connected network and the console server’\
    s local network ports. This is the default mode of 
    operation.
    • OOB mode – The dial-out connection to the carrier’s cellular network is al\
    ways on and awaiting any incoming access (from 
    a remote site seeking access to the console server or attached serial co\
    nsoles/network hosts). 
    • Failover mode – A dial-out cellular connection is established only in the event of\
     a ping failure.
    5.7.1  OOB access set up   
    In this mode, the dial-out connection to the carrier’s cellular netwo\
    rk is always on and awaiting any incoming traffic. By 
    default, the only traffic enabled are incoming SSH access to the console server and its serial ports, and incoming HTTPS 
    access to the console server. There is a low level of “keep-alive” and management traffic tr\
    ansmitted over the cellular network. 
    However, the status reports and site alerts are generally transmitted over the \
    main network. 
    OOB mode is typically used for out-of-band access to remote sites by directly accessed appliances requiring a\
     public IP 
    address. OOB mode is the default for B096-Series Multi-Port Serial Console/Terminal Servers with internal cellular modems. 
    Out-of-band access is enabled by default and the cellular modem connection is \
    always on. For direct access, the console 
    server requires a public IP address and must not have SSH access firewalled. 
    Almost all carriers offer corporate mobile data service/plans with a pub\
    lic (static or dynamic) IP address. These plans often 
    come with a service fee.
    • If you have a static public IP address plan, you can also try accessing \
    the console server using the public IP address 
    provided by the carrier. By default, only HTTPS and SSH access is enabled on the OOB connection (e.g., you can browse 
    to the console server, but cannot ping it).
    • If you have a dynamic public IP address plan, a DDNS service will need t\
    o be configured to enable the remote 
    administrator to initiate incoming access. Once this is done, you can tr\
    y accessing the console server using the allocated 
    domain name. 
    By default, most providers offer a consumer-grade service that delivers dynamic private IP address assignments to c\
    ellular 
    devices. This IP address is not visible across the Internet, but is gene\
    rally adequate for home and general business use. 
    • With a consumer-grade plan, the Failover & Out-of-Band tab on the Status: Statistics will display that your carrier has 
    allocated a private IP Address (i.e., within the range 10.0.0.0 – 10.255.255.255, 172.16.0.0 – \
    172.31.255.255 or 
    192.168.0.0 – 192.168.255.255).
    • For an inbound OOB connection with a consumer-grade plan, you will need to set up an outbound VPN.
    During out-of-band access mode, the internal cellular modem will continually stay con\
    nected. The alternative is to set up 
    Failover mode on the console server (as detailed in the following section).  
    						
    							89
    5.7.2 Cellular failover setup
    In this mode, a dial-out cellular connection is established only when th\
    e main network is disrupted. The cellular connection will 
    remain idle in a low power state and will only be activated in the event\
     of a ping failure. This standby mode is well suited for 
    remote sites with expensive power or extremely high cellular traffic c\
    osts. 
    In Cellular failover startup mode, the appliance will continually ping nominated probe addresses over the main network 
    connection. In the event of ping failure, the appliance dials out and sets up a dial-out ppp over the cellular modem. Access 
    is then switched to this network connection transparently. Access is switched back when the main network connection is 
    restored. Once the carrier connection has been configured, the cellula\
    r modem can be configured for failover.
    During Cellular failover setup mode, the cellular connection will remain idle and in a low power state.\
     If the primary and 
    secondary probe addresses are not available, it will reactivate the cell\
    ular network connection and reconnect with the cellular 
    carrier. 
    Chapter 5: Firewall, Failover and Out-of-Band
    • Navigate back to the Network Interface on the System: IP menu and specify Internal Cellular modem (cell modem 
    01) as the Failover Interface to be used when a fault has been detected. 
    • Specify the Probe Addresses of two sites (Primary and Secondary) that the console server is to ping to determine if the 
    principal network is still operational.
    • In the event of a principal network failure, the cellular network connec\
    tion is activated as the access path to the console 
    server (and Managed Devices). Only HTTPS and SSH access is enabled on the failover connection (doing this should 
    enable the administrator to connect and fix the problem).
    Note: By default, the console server supports automatic failure-recovery back to the original state prior to\
     failover. The console 
    server continually pings probe addresses throughout original and failover stat\
    es. The original state will automatically be set as 
    a priority and reestablished following three successful pings of the pro\
    be addresses during failover. The failover state will be 
    removed once the original state has been re-established.
    • You can check the connection status by selecting the Cellular panel on the Status: Statistics menu.
     o The Operational Status will change as the cellular modem finds a channel and connects to the \
    network.
    o The Failover & Out-of-Band screen displays information relating to a configured Failover/OOB interface and the 
    status of that connection. The IP Address of the Failover/ OOB interface will be presented in the Failover & Out-of-
    Band screen once the Failover/OOB interface has been triggered.
    5.7.3  Cellular routing
    Once you have configured your carrier connection, the cellular modem c\
    an be configured to route traffic through the console 
    server. This requires setting up forwarding and masquerading firewall rules as detailed in Chapter 5.  
    						
    							90
    Chapter 6: Secure SSH Tunneling & SDT Connector
    Each Console Server has an embedded SSH server and uses SSH tunneling. This enables one Console Server to securely 
    manage all the systems and network devices in the data center, using text-based console tools (such as SSH, Telnet, SoL) or 
    graphical desktop tools (VNC, RDP,  HTTPS, HTTP, X11, VMware, DRAC, iLO etc).
    To set up Secure Tunnel access, the computer being accessed can be located on the same loc\
    al network as the Console 
    Server, or attached to the Console Server via its serial COM port. The remote \
    User/Administrator then connects to the Console 
    Server through an SSH tunnel (via dial-up, wireless or ISDN modem); a broadband Internet \
    connection; an enterprise VPN 
    network or a local network.
     
    To set up the secure SSH tunnel from the Client computer to the Console Server, you must install and launch SSH client 
    software on the User/Administrator’s computer. It is recommended that you use the SDT Connector client software supplied 
    with the Console Server to do this. SDT Connector is simple to install and it auto-configures. It provides all your use\
    rs with 
    point-and-click access to all the systems and devices in the secure netw\
    ork. With one click, SDT Connector sets up a 
    secure SSH tunnel from the client to the selected Console Server and then establ\
    ishes a port forward connection to the 
    target network connected host or serial connected device. It will then e\
    xecute the client application that will be used in 
    communicating with the host. 
    This chapter details the basic SDT Connector operations:
    • Configuring the Console Server for SSH tunneled access to network attached hosts and setting up permitted Se\
    rvices and 
    Users access (Section 6.1)
    • Setting up the SDT Connector client with gateway, host, service and client application details and making connections 
    between the Client computer and hosts connected to the Console Server (\
    Section 6.2)
    • Using SDT Connector to browser access the Management Console (Section 6.3)
    • Using SDT Connector to Telnet or SSH connect to devices that are serially attached to the Console Server (\
    Section 6.4)
    The chapter then covers more advanced SDT Connector and SDT tunneling to\
    pics:
    • Using SDT Connector for out of band access (Section 6.5)
    • Automatic importing and exporting of configurations (Section 6.6)
    • Configuring Public Key Authentication (Section 6.7)
    • Setting up a SDT Secure Tunnel for Remote Desktop (Section 6.8)
    • Setting up a SDT Secure Tunnel for VNC (Section 6.9)
    • Using SDT to IP connect to hosts that are serially attached to the Conso\
    le Server (Section 6.10)  
    						
    All Tripp Lite manuals Comments (0)