APC ACRD500 Installationshandbuch Seite 48

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 60
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 47
InRow RD Operation and Maintenance40
Telnet for basic access. Telnet provides the basic security of authentication by user name and
password, but not the high-security benefits of encryption. To use Telnet to access the control console of
the Network Management Card:
1. At a command prompt, use the following command line, and press
ENTER:
telnet address
As address, use the IP address of the Network Management Card or DNS name (if
configured).
2. Enter the user name and password (by default, apc and apc for an Administrator, or device and
apc for a Device User).
SSH for high-security access. If you use the high security of SSL for the Web interface, use Secure
SHell (SSH) for access to the control console. SSH encrypts user names, passwords, and transmitted
data.
The interface, user accounts, and user access rights are the same whether you access the control console
through SSH or Telnet, but to use SSH, you must first configure SSH and have an SSH client program
installed on your computer.
See the Users Guide for more information on configuring and using SSH.
Simple Network Management Protocol (SNMP)
SNMPv1 only. After you add the PowerNet
®
MIB to a standard SNMP MIB browser, you can use that
browser to access the Network Management Card. All user names, passwords, and community names for
SNMP are transferred over the network as plain text. The default read community name is public; the
default read/write community name is private.
SNMPv3 only. For SNMP GETs, SETs, and trap receivers, SNMPv3 uses a system of user profiles to
identify users. An SNMPv3 user must have a user profile assigned in the MIB software program to
perform GETs and SETs, browse the MIB, and receive traps. The default settings are no authentication
and no privacy.
Note: To use SNMPv3, you must have a MIB program that supports SNMPv3.
Note: The Network Management Card supports only MD5 authentication and DES
encryption.
SNMPv1 and SNMPv3. To use InfraStruXure Central or InfraStruXure Manager to manage the
Network Management Card, you must have SNMPv1 enabled in the unit interface. Read access allows
InfraStruXure devices to receive traps. Write access is required while you set the InfraStruXure device as
a trap receiver.
To enable or disable SNMP access, you must be an Administrator. Select the Administration tab, select
the Network menu on the top menu bar, and use the access option under SNMPv1 or SNMPv3 on the
left navigation menu.
Seitenansicht 47
1 2 ... 43 44 45 46 47 48 49 50 51 52 53 ... 59 60

Kommentare zu diesen Handbüchern

Keine Kommentare