APC NBRK0200 configurationmanual Simple Network Management Protocol Snmp

Page 25

Telnet for basic access. Telnet provides the basic security of authentication by user name and password, but not the high-security benefits of encryption. To use Telnet to access the control console of the Rack Monitor 200:

1.At a command prompt, use the following command line, and press ENTER: telnet address

As address, use the IP address of the Rack Monitor 200 (or DNS name if configured).

2.Enter the user name and password (by default, apc and apc for an Administrator, or device and apc for a Device User).

SSH for high-security access. If you use the high security of SSL for the Web interface, use Secure SHell (SSH) for access to the control console. SSH encrypts user names, passwords, and transmitted data.

The interface, user accounts, and user access rights are the same whether you access the control console through SSH or Telnet, but to use SSH, you must first configure SSH and have an SSH client program installed on your computer.

See the NetBotz Rack Monitor 200 User’s Guide for more information on configuring and using SSH. For details on how to access the user’s guide, see “Additional Documentation” on page 1.

Simple Network Management Protocol (SNMP)

SNMPv1 only. After you add the PowerNet® MIB to a standard SNMP MIB browser, you can use that browser to access the Rack Monitor 200. All user names, passwords, and community names for SNMP are transferred over the network as plain text. The default read community name is public; the default read/write community name is private.

SNMPv3 only. For SNMP GETs, SETs, and trap receivers, SNMPv3 uses a system of user profiles to identify users. An SNMPv3 user must have a user profile assigned in the MIB software program to perform GETs and SETs, browse the MIB, and receive traps. The default settings are no authentication and no privacy.

Note: To use SNMPv3, you must have a MIB program that supports SNMPv3. The Rack Monitor 200 supports only MD5 authentication and DES encryption.

SNMPv1 and SNMPv3. To use InfraStruXure Central or InfraStruXure Manager to manage the Rack Monitor 200 on the public network of an InfraStruXure system, you must have SNMPv1 enabled in the unit interface. Read access allows InfraStruXure devices to receive traps from the Rack Monitor 200.

Write access is required while you set the InfraStruXure device as a trap receiver.

To enable or disable SNMP access, you must be an Administrator. Select the Administration tab, select the Network menu on the top menu bar, and use the access option under SNMPv1 or SNMPv3 on the left navigation menu.

NetBotz Rack Monitor 200 Installation and Quick Configuration Manual

21

Image 25
Contents Installation Quick Configuration Manual Manual em Português está disponível no CD-ROM em anexo Contents Access the Rack Monitor Product Description IntroductionDocument Overview Additional DocumentationInventory Receiving InspectionInfraStruXure-certified Additional OptionsPhysical Description InstallationRear FrontDescription Toolless peg-mount installation How to Install the Rack MonitorRack-mount installation Power cord and network cable connections How to Install the Temperature/Humidity Sensor How to Connect Sensors to Universal Sensor Ports How to Connect an Alarm Beacon and Other Optional Devices How to Cascade Devices to A-Link Ports How to Wire to the Modbus Interface Server type Procedure Quick ConfigurationHow to disable the cookie requirement How to set up optionDhcp Server How to Update the Bootptab File Important Information about the Default GatewayHow to Use the APC Device IP Configuration Wizard Use apc for both User Name and Password How to Use ARP, Ping, and TelnetControl Console How to access the control consoleWeb Interface Access the Rack MonitorTelnet and SSH Simple Network Management Protocol Snmp Modbus How to Recover from a Lost PasswordNetBotz Rack Monitor 200 NBRK0200 SpecificationsSystem Specifications Temperature/Humidity Sensor AP9335THTwo-Year Factory Warranty Warranty and Life SupportTerms of warranty Non-transferable warranty ExclusionsWarranty claims Obtaining service General policy Life Support PolicyExamples of life-support devices Page Page Page Canada-ICES Radio Frequency InterferenceJapan-VCCI Taiwan-BSMI2008 990-3283-001