Basic Configuration

SYSLOG Address: The IP Address or domain name (up to 64 characters) for the Syslog Daemon that will receive log records generated by the MPC. For more information, please refer to Section 11. (Default = undefined.)

Ping Access: Enables/Disables response to the ping command. When Disabled, the MPC will not respond to Ping commands. Note that disabling Ping Access at the Network Port will not effect the operation of the Ping-No-Access Alarm. (Default = On.)

5.9.3.IP Security

The IP Security feature allows the MPC to restrict unauthorized IP addresses from establishing inbound Telnet connections to the unit. This allows you to grant Telnet access to only a specific group of IP addresses, or block a particular IP address completely. In the default state, the MPC accepts incoming IP connections from all hosts.

In the Text Interface, IP Security parameters are defined via item 5 in the Network Configuration menu (Figure 5.17.) In the Web Browser Interface, these parameters are found by clicking the "IP Security" link on the left hand side of the screen. In the default state, IP Security is disabled.

The IP Security Function employs a TCP Wrapper program which allows the use of standard, Linux operators, wild cards and net/mask pairs to create a host based access control list.

The IP Security configuration menus include "hosts.allow" and "hosts.deny" client lists. Basically, when setting up IP Security, you must enter IP addresses for hosts that you wish to allow in the Allow list, and addresses for hosts that you wish to deny in the Deny list. Since Linux operators, wild cards and net/mask pairs are allowed, these lists can indicate specific addresses, or a range of addresses to be allowed or denied.

When the IP Security feature is properly enabled, and a client attempts to connect, the MPC will perform the following checks:

1.If the client’s IP address is found in the "hosts.allow" list, the client will be granted immediate access. Once an IP address is found in the Allow list, the MPC will not check the Deny list, and will assume you wish to allow that address to connect.

2.If the client’s IP address is not found in the Allow list, the MPC will then proceed to check the Deny list.

3.If the client’s IP Address is found in the Deny list, the client will not be allowed to connect.

5-51

Page 82
Image 82
Western Telematic MPC-20VS20-2, MPC-20VD20-2, MPC-20VD20-1, MPC-20V-1 MPC-8H-2, MPC-20VD16-3, MPC-20VS16-3 manual IP Security

MPC-20VS20-1, MPC-8H-1, MPC-20VS16-3, MPC-20VD16-3, MPC-20V-1 MPC-8H-2 specifications

The Western Telematic MPC series is renowned for its robust and versatile remote power management solutions. Among its offerings, the MPC-20VS16-3, MPC-20VD16-3, MPC-20VD20-2, MPC-20VS20-1, and MPC-20VS20-2 stand out as exceptional products tailored to meet the demands of modern telecommunications and data center environments.

One of the key features across this series is the ability to monitor and control up to 20 power outlets, which allows for efficient resource management and reduces downtime. Each model in the series accommodates various configurations, including both switched and non-switched outlets. This flexibility makes it easier for operators to manage power distribution according to their specific needs.

The integration of real-time monitoring capabilities is another highlight of the MPC series. Users can track power consumption, voltage, and current for each outlet, enabling better decision-making to optimize energy usage. This feature contributes significantly to the overall efficiency of operations, ensuring that resources are utilized effectively.

Communication is seamless with the Western Telematic MPC series, as these models are equipped with multiple network connectivity options. They support both SNMP (Simple Network Management Protocol) and Telnet, facilitating easy integration with existing network management systems. Additionally, the devices can send alerts and notifications via email or SMS, keeping operators informed about any changes in power status or potential issues.

The MPC models are designed with redundancy and reliability in mind. They come equipped with advanced surge protection, ensuring sensitive equipment remains safe from power spikes. The rugged construction of the units ensures they can withstand the rigors of data center environments, with an emphasis on heat dissipation and airflow management.

Security features are also a priority. The MPC series includes user authentication and access control to prevent unauthorized users from manipulating power settings. The ability to set user permissions ensures that only designated personnel can operate sensitive components, enhancing operational security.

Energy efficiency is a guiding principle in the design of the MPC series. By providing tools for monitoring and controlling power usage, these devices contribute to a reduction in energy costs, aligning with sustainability goals sought by modern enterprises.

In conclusion, the Western Telematic MPC-20VS16-3, MPC-20VD16-3, MPC-20VD20-2, MPC-20VS20-1, and MPC-20VS20-2 are exemplary models in the field of remote power management. With features such as comprehensive outlet control, real-time monitoring, robust communication options, security protocols, and a focus on energy efficiency, these units are engineered to meet the rigorous demands of the telecommunications and data center sectors. By implementing these advanced technologies, operators can enhance their operational capabilities while also contributing to long-term sustainability.