Basic Configuration

4.If the client’s IP Address is not found in the Deny list, the client will be allowed to connect, even if the address was not found in the Allow list.

Notes:

If the MPC finds an IP Address in the Allow list, it will not check the Deny list, and will allow the client to connect.

If both the Allow and Deny lists are left blank, then the IP Security feature will be disabled, and all IP Addresses will be allowed to connect (providing that the proper password and/or SSH key is supplied.)

When the Allow and Deny lists are defined, the user is only allowed to specify the Client List; the Daemon List and Shell Command cannot be defined.

5.9.3.1. Adding IP Addresses to the Allow and Deny Lists

To add an IP Address to the Allow or Deny list, and begin configuring the IP Security feature, proceed as follows.

Notes:

Both the Allow and Deny list can include Linux operators, wild cards, and net/mask pairs.

In some cases, it is not necessary to enter all four "digits" of the IP Address. For example, if you wish to allow access to all IP addresses that begin with "192," then you would only need to enter "192."

The IP Security Configuration menu is only available when the Administrator Mode is active.

1.Access the IP Security Configuration Menu.

a)Text Interface: Type /N [Enter] to display the Network Configuration Menu. From the Network Configuration Menu, type 5 [Enter] to display the IP Security Menu.

b)Web Browser Interface: Place the cursor over the "Network Configuration" link on the left hand side of the screen. When the fly-out menu appears, click on the "IP Security" Link to display the IP Security Menu.

2.Allow List: Enter the IP Address(es) for the clients that you wish to allow. Note that if an IP Address is found in the Allow list, the client will be allowed to connect, and the MPC will not check the Deny list.

a)Text Interface: Note the number for the first empty field in the Allow list, then type that number at the command prompt, press [Enter], and then follow the instructions in the resulting submenu.

b)Web Browser Interface: Place the cursor in the first empty field in the parameters menu, then key in the desired IP Address, operators, wild cards, and/or net/mask pairs.

3.Deny List: Enter the IP Address(es) for the clients that you wish to deny. Note that if the client’s IP Address is not found in the Deny List, that client will be allowed to connect. Use the same procedure for entering IP Addresses described in Step 2 above.

5-54

Page 85
Image 85
Western Telematic MPC-20VD20-2, MPC-20VS20-2, MPC-20VD16-3, MPC-20VS16-3, MPC-8H-1, MPC-20VS20-1 manual Basic Configuration

MPC-18H-2, MPC-20V-2, MPC-20VS32-3, MPC-20VD32-3, MPC-16H-2 specifications

The Western Telematic MPC series is renowned for its robust and versatile remote power management solutions. Among its offerings, the MPC-20VS16-3, MPC-20VD16-3, MPC-20VD20-2, MPC-20VS20-1, and MPC-20VS20-2 stand out as exceptional products tailored to meet the demands of modern telecommunications and data center environments.

One of the key features across this series is the ability to monitor and control up to 20 power outlets, which allows for efficient resource management and reduces downtime. Each model in the series accommodates various configurations, including both switched and non-switched outlets. This flexibility makes it easier for operators to manage power distribution according to their specific needs.

The integration of real-time monitoring capabilities is another highlight of the MPC series. Users can track power consumption, voltage, and current for each outlet, enabling better decision-making to optimize energy usage. This feature contributes significantly to the overall efficiency of operations, ensuring that resources are utilized effectively.

Communication is seamless with the Western Telematic MPC series, as these models are equipped with multiple network connectivity options. They support both SNMP (Simple Network Management Protocol) and Telnet, facilitating easy integration with existing network management systems. Additionally, the devices can send alerts and notifications via email or SMS, keeping operators informed about any changes in power status or potential issues.

The MPC models are designed with redundancy and reliability in mind. They come equipped with advanced surge protection, ensuring sensitive equipment remains safe from power spikes. The rugged construction of the units ensures they can withstand the rigors of data center environments, with an emphasis on heat dissipation and airflow management.

Security features are also a priority. The MPC series includes user authentication and access control to prevent unauthorized users from manipulating power settings. The ability to set user permissions ensures that only designated personnel can operate sensitive components, enhancing operational security.

Energy efficiency is a guiding principle in the design of the MPC series. By providing tools for monitoring and controlling power usage, these devices contribute to a reduction in energy costs, aligning with sustainability goals sought by modern enterprises.

In conclusion, the Western Telematic MPC-20VS16-3, MPC-20VD16-3, MPC-20VD20-2, MPC-20VS20-1, and MPC-20VS20-2 are exemplary models in the field of remote power management. With features such as comprehensive outlet control, real-time monitoring, robust communication options, security protocols, and a focus on energy efficiency, these units are engineered to meet the rigorous demands of the telecommunications and data center sectors. By implementing these advanced technologies, operators can enhance their operational capabilities while also contributing to long-term sustainability.