Avocent Acs 6000 Advanced Console Server Installeruser Guide
Avocent Acs 6000 Advanced Console Server Installeruser Guide
Console Server
Installer/User Guide
Technical Support Site
If you encounter any installation or operational issues with your product, check the pertinent section of
this manual to see if the issue can be resolved by following outlined procedures. Visit
https://www.VertivCo.com/en-us/support/ for additional assistance.
TABLE OF CONTENTS
1 Introduction 1
1.1 Features and Benefits 1
1.1.1 Access options 1
1.1.2 Web manager 1
1.1.3 IPv4 and IPv6 support 2
1.1.4 Flexible users and groups 2
1.1.5 Security 2
1.1.6 Authentication 2
1.1.7 VPN based on IPSec 3
1.1.8 Packet filtering 3
1.1.9 SNMP 3
1.1.10 Data logging, notifications, alarms and data buffering 3
1.1.11 Power management 3
1.1.12 Auto discovery 3
1.1.13 FIPS module 3
2 Installation 5
2.1 Getting Started 5
2.1.1 Supplied with the console server 5
2.1.2 Additional items needed 5
2.2 Rack Mounting 5
2.3 Connecting the Hardware 6
2.3.1 Connecting device consoles or modems to serial ports 8
2.4 Turning On the Console Server 9
2.4.1 AC power 10
2.4.2 DC power 10
2.5 Configuring a Console Server 11
2.5.1 Using Telnet or SSH 11
3 Accessing the Console Server via the Web Manager 13
3.1 Web Manager Overview for Administrators 13
3.2 Wizard Mode 14
3.3 Expert Mode 16
3.4 Access 16
3.5 System Tools 17
3.5.1 Upgrading firmware 17
3.5.2 Upgrading the bootcode 18
3.5.3 Configuration files 19
3.5.4 Configuration Integrity 19
3.6 System 20
3.6.1 Security 20
3.6.2 HTTPS Certificate 22
NOTE: Unless noted, references to a console server refer to all models in the 60XX series.
Console servers provide secure local (console port) and remote (IP and dial-up) access. The console
servers run the Linux® operating system with a persistent file system in Flash memory, and can be
upgraded from either FTP or a DSView™ 4 management software server.
NOTE: Unless otherwise noted, all references to DSView software in this document refer to version 4 or
greater.
Multiple administrators can be logged into the console server at the same time and can use the web
manager, the Command Line Interface (CLI utility) or DSView software to access and configure the
console server.
One USB port supports modem (V.92), storage devices and USB hubs. Two fast Ethernet ports support
connections to more than one network or configuration of Ethernet bonding (failover) for redundancy
and greater reliability. For dial-in and secure dial-back with Point-to-Point Protocol (PPP), optional internal
modems can be factory installed, or you can use external modems.
More than one administrator can log into the console server and have an active CLI or web manager
session. All sessions receive the following warning message when the configuration is changed by another
administrator or by the system: The appliance configuration has been altered from outside of your
session. Upon receipt of this message, each administrator needs to verify that changes made during the
session were saved.
• DHCP
• Dial-in and dial-out sessions (PPP links)
• DSView software integration
• eth0 and eth1 Ethernet interfaces
• Firewall (IP tables)
• HTTP/HTTPs
• Linux kernel
• Remote authentication: Radius, Tacacs+ and LDAP servers
• SNMP
• SSH and Telnet access
• Syslog server
NOTE: Remote authentication NFS and IPSec are not supported with IPv6.
1.1.5 Security
Security profiles determine which network services are enabled on the console server. Administrators can
either allow all users to access enabled ports or allow the configuration of group authorizations to restrict
access. You can also select a security profile, which defines which services (FTP, ICMP, IPSec, SNMP and
Telnet) are enabled and SSH and HTTP/HTTPS access. The administrator can select either a
preconfigured security profile or create a custom profile. For more information, see Security on page 20.
1.1.6 Authentication
Authentication can be performed locally, with One Time Passwords (OTP), a remote LDAP, RADIUS,
TACACS+ authentication server or a DSView server. The console server also supports remote group
authorizations for the LDAP, RADIUS and TACACS+ authentication methods. Fallback mechanisms are
also available.
Any authentication method configured for the console server or the ports is used for authentication of
any user who attempts to log in through Telnet, SSH or the web manager. For more information, see
Authentication on page 54.
1.1.9 SNMP
If SNMP is enabled in the selected security profile, an administrator can configure the Simple Network
Management Protocol (SNMP) agent on the console server to answer requests sent by an SNMP
management application.
The console server SNMP agent supports SNMP v1/v2 and v3, MIB-II and Enterprise MIB. For more
information, see SNMP Configuration on page 39.
NOTE: The text files with the Enterprise MIB (ACS6000-MIB.asn) and the TRAP MIB (ACS6000-
TRAP-MIB.asn) are available in the appliance under the /usr/local/mibs directory.
The console server uses an embedded cryptographic module that is based on the FIPS 140-2 validated
cryptographic module(s) (certificate number 1747) running on a Linux PPC platform. For more
information, see FIPS module on page 21.
2 LEDs. See the following table for individual LED descriptions. 6 Serial ports.
The console server supports the Cisco® serial port pinout configuration, which is disabled by default. If a
Cisco cable is connected to a port, an administrator must enable the Cisco pinout for the port. An
administrator can select Expert - Ports - Serial Ports - (SetCAS or SetPower) - Physical to open the
Physical Settings screen, then check Enable Cisco RJ Pin-Out.
1 RTS OUT
2 DTR OUT
3 TxD OUT
4 GND N/A
5 CTS IN
6 RxD IN
7 DCD/DSR IN
8 Not Used N/A
1 CTS IN
2 DCD/DSR IN
3 RxD IN
4 GND N/A
5 Not Used N/A
6 TxD OUT
7 DTR OUT
8 RTS OUT
NOTE: To comply with EMC requirements, use shielded cables for all port connections.
WARNING! Do not turn on the power on the connected devices until after the console server is
turned on.
NOTE: Daisy chaining is not possible with SPC PDUs. ServerTech PDUs will allow only one level (Master
and Slave) of daisy chaining.
1. Connect one end of a UTP cable with RJ-45 connectors to the OUT port of the connected PDU.
2. Connect the other end of the cable to the IN port of the chained PDU. Repeat both steps until
you have connected the desired number of PDUs.
NOTE: For performance reasons, Avocent recommends connecting no more than 128 outlets per serial
port.
WARNING! Always execute the shutdown command through the web manager, CLI or DSView
software under the Overview/Tools node before turning the console server off, then on again.
This will ensure the reset doesn't occur while the file system in Flash is being accessed, and it
helps avoiding Flash memory corruptions.
NOTE: By default, dual power supply units require both supplies to be plugged in; otherwise an audible
alarm will sound when the console server is turned on. This feature can be disabled from the web
manager.
To disable the dual power supply audible alarm:
1. From the sidebar of the Expert tab, click Events and Logs - Sensors.
2. Use the drop-down menu to Disable the Dual Power Supply Fault Audible Alarm.
2.4.2 DC power
DC power is connected to DC-powered console servers by way of three wires: Return (RTN), Ground
(GND) and -48 VDC.
WARNING! It is critical that the power source supports the DC power requirements of your
console server. Make sure that your power source is the correct type and that your DC power
cables are in good condition before proceeding. Failure to do so could result in personal injury
or damage to the equipment.
NOTE: To configure using DSView software, see the DSView Software Installer/User Guide. To
configure using the console server’s web manager, see Chapter 3. To configure using Telnet or SSH,
see the ACS6000 Command Reference Guide.
To connect a terminal to the console server:
1. Using a null modem cable, connect a terminal or a PC that is running terminal emulation
software (such as HyperTerminal®) to the CONSOLE port on the back panel of the console
server. An RJ-45 to DB9 (female) cross adaptor is provided.
The terminal settings are 9600 bits per second (bps), 8 bits, 1 stop bit, no parity and no flow
control.
2. Turn on the console server. When the console server completes initialization, the terminal will
display the login banner plus the login prompt.
2.5.1 Using Telnet or SSH
An authorized user can use a Telnet or SSH client to make a connection directly to the console of a device
if all of the following are true:
To use a Telnet client, enter the information in the dialog boxes of the client.
-or-
To use an SSH client, enter the information in the dialog boxes of the client.
-or-
NOTE: For instructions on accessing the console server via the CLI or DSView software see the
Cyclades ACS6000 Command Reference Guide or the DSView Software Installer/User Guide.
The following figure shows a typical web manager screen for an administrator.
By default, the first time an administrator accesses the console server through the web manager, the
Wizard will be displayed. Subsequent log-ins will open in Expert mode, and once the console server has
been configured, Expert mode becomes the default mode. An administrator can toggle between Expert
and Wizard modes by clicking the tab bar on the web manager administrator screen.
The following image shows a typical screen when an administrator is in Wizard mode.
The following procedures describe how to configure the console server from the Wizard.
To configure security parameters and select a Security Profile:
WARNING! For security reasons, it is recommended you change the default password for both
root and admin users immediately.
NOTE: By default, all configured users can access all enabled ports. Additional configuration is needed
if your site security policy requires you to restrict user access to ports.
3.4 Access
Click Access to view all the devices connected to the console server.
The following table describes the available buttons in the Java applet.
SendBreak
To send a break to the terminal
Disconnect
To disconnect from the Java applet
To view the console server's current firmware version, from the sidebar of the Expert tab, click System-
Information.
To upgrade a console server's firmware:
1. From http://www.vertivco.com, browse to the product updates section and find the firmware for
your console server.
-or-
a. Type the filename for the new firmware or click Browse to open a window and browse to
the file.
5. Click Download. The console server will download the firmware from the specified site and will
display a message when the download is complete.
6. Click Install.
7. Once the new firmware is installed, reboot the console server.
NOTE: If the page after installation displays empty or blank values, there was not enough memory to
upgrade the firmware. Reboot the console server and upgrade the firmware again.
-or-
a. Type the filename for the new bootcode or click Browse to open a window and browse to
the file.
-or-
a. Click the radio button next to Local File, then enter the filename.
-or-
Save the file to your computer by clicking the radio button next to My Computer. The file will
be saved in your Downloads folder.
5. Click Save.
To restore a previous configuration:
1. From the sidebar of the Expert tab, click System Tools.
2. Click Restore Configuration.
3.5.4 Configuration Integrity
In order to ensure configuration integrity, the console server permits an administrator to generate and
verify a digital signature (MD5) of the console server's configuration. The console server compares its MD5
checksum value against a known MD5 checksum value to verify its configuration and keep it protected
from corruption.
An administrator can specify a running configuration as trusted and instruct the console server to
generate an MD5 tag for the trusted configuration. An administrator can also verify the configuration by
comparing it to another known or trusted configuration. The console server will declare the configuration
to either be Unchanged or Modified after the verification is complete.
NOTE: In order to use configuration integrity, you must save the configuration using the compressed
file option. The compressed file format captures more configuration data to ensure the accuracy of the
configuration integrity results. Saving the configuration in either the CLI script or XML file formats will
produce invalid configuration integrity results.
The console server generates an event notification each time an MD5 tag is generated. For more
information about events, see Event List on page 64.
To generate an MD5 tag:
1. From the sidebar of the console server's web manager, click System Tools and then click
Configuration Integrity.
2. Click the Generate MD5 Tag for the Running Configuration radio button and click Execute.
To verify an MD5 tag:
1. From the sidebar of the console server's web manager, click System Tools and then click
Configuration Integrity.
2. Click the Verify Running Configuration radio button.
3. Leave the MD5 field blank to verify the running configuration.
-or-
4. Click Execute.
3.6 System
Click System to display information about the console server and allow an administrator to configure the
console server’s system parameters. The following tabs are listed under System in the side navigation bar.
3.6.1 Security
Security Profile
A Security Profile determines which services are enabled on the console server.
During initial configuration, the console server administrator must configure security parameters to
conform with the site security policy. The following security features can be configured either in the web
manager, CLI or the DSView software:
The administrator can select either a preconfigured Security Profile or create a custom profile.
NOTE: This value applies to any user session to the appliance via HTTP, HTTPS, SSH, Telnet or
CONSOLE port. It will not overwrite the value configured for the user's authorization group. The new
idle time-out will be applied to new sessions only.
3. Under the Enabled Services section, enable or disable the RCP checkbox.
4. Under the Serial Devices heading, select whether port access is controlled by user group
authorization or configure port access settings to apply to all users.
5. Under Bootp Configuration retrieval, enable or disable the service.
6. Select the checkbox for Custom, Moderate, Open or Secure under the Security Profile heading.
7. Enable/disable SSH authentication via username/password.
8. Click Save.
FIPS module
The console server uses an embedded cryptographic module that is based on the FIPS 140-2 validated
cryptographic module(s) (certificate number 1747) running on a Linux PPC platform.
If an administrator enables the FIPS module, the console server will use the FIPS Object Module to perform
encryption operations. The FIPS module is disabled by default.
When the FIPS module is enabled, the Monitoring - FIPS mode page will show what service (SSHv2,
HTTPS, SNMPv3 and ADSAP2) is in FIPS mode. All security functions and cryptographic algorithms used
by the service are performed in FIPS 140-2 Approved mode.
To enable the FIPS module:
1. Select System - Security - FIPS 140.
2. Check the box to Enable the FIPS 140-2 Module and click Save.
Triple-DES CBS and AES 128/192/256 are the only encryption ciphers that will be accepted.
HMAC-SHA1 and HMAC-SHA1-96 are the only message integrity algorithms that will be accepted.
HTTPS sessions will accept only the SSL v 3.1(TLSv1) protocol to establish the SSL tunnel with
one of the following encryption ciphers:
AES-256-SHA
AES-128-SHA
-or-
To download a signed certificate from an FTP server, click the radio button next to Remote
Server and enter all information about the FTP server: IP Address, Username, Password, File
Directory and File Name.
-or-
To download a certificate from your desktop, click the radio button next to Download
Certificate From My Computer, click Choose File, browse to where the file is saved and click
Open.
NOTE: All http/https sessions will close, and the user will need to re-establish the connection.
-or-
Use the list_configuration command to get the CLI template scripts, edit the configuration of
the console server and save it as a text file.
-or-
-or-
Ensure the box next to Enable Live Configuration is checked. The saved configuration will be
retrieved and applied on the next IP renewal.
NOTE: You must configure your DHCP server in order to transfer the configuration file to your console
server.
NOTE: Disabling the console port may make the console server inaccessible. It is recommended only
experienced administrators perform this operation for security reasons.
To disable the console port:
1. From the sidebar of the Expert tab, click System - Security - Security Profile.
2. Under the Local Console Access heading, check the Disable Console Port box.
3. Click Save, then confirm you want to disable the console port.
NOTE: If the bootcode is not upgraded to version 2.0.3.0, the boot messages and access to the U-boot
prompt will still be enabled. For more information on upgrading the bootcode, see Upgrading the
bootcode on page 18.
An administrator can re-enable console access by unchecking the Disable Console Port box. However, if
the console port is disabled and network access is lost, preventing opening a web UI or CLI session, access
to the console port can still be recovered.
After four partial reboots, a fifth reboot that is completed will reset the console server to its factory default
configuration with the console port enabled.
NOTE: Restoring to the factory default state will delete all user configuration.
NOTE: Fully rebooting the console server before the fifth reboot will reset the counter and the console
port will remain disabled.
To recover console port access:
1. Turn the console server off.
2. Turn the console server back on. Wait five seconds, then turn it off again.
3. Repeat steps 1 and 2 three more times.
4. After four partial reboots, allow the console server to fully reboot the fifth time.
CAUTION: During the fifth reboot, the console server will clear its flash and restore factory
defaults. Turning the console server off during the fifth reboot may corrupt the flash and
render the console server inoperable.
NOTE: The Current Time displayed in the Date & Time screen shows only the time when the screen was
opened. It does not continue to update in real time.
To set the time and date using NTP:
1. Click System - Date And Time.
2. Select Enable network time protocol.
3. Enter the NTP server site of your choice and click Save.
To set the time and date manually:
1. Click System - Date And Time.
2. Select Set manually.
3. Using the drop-down menus, select the required date and time and click Save.
To set the time zone using a predefined time zone:
1. Click System - Date And Time - Time Zone.
2. Select Predefined.
3. Select the required time zone from the drop-down menu and click Save.
To define custom time zone settings:
1. Click System- Date And Time - Time Zone.
Online help
When the online help feature is configured for your console server, clicking the Help button from any form
on the web manager opens a new window and redirects its content to the configured path for the online
help product documentation.
NOTE: Using the online help feature from the Avocent/Cyclades server is not always possible due to
firewall configurations, nor is it recommended. It is generally advisable for you to use the online help
system provided with the product or download the online help .zip file and run it from a local server.
The system administrator can download the online help from Avocent. For more information on
downloading the online help, contact Technical Support.
Once the online help file is obtained (in zip format), the files must be extracted and put in to a user-
selected directory under the web server’s root directory. The web server must be publicly accessible.
3.6.6 General
An administrator can configure a login banner to display when a user begins a SSHv2, Telnet, Console or
web manager session.
To create a login banner:
1. Click System - General in the side navigation bar.
2. Check the box to enable the login banner.
3. Enter the text you want displayed upon login in the Login Banner field and click Save.
3.6.7 Boot Configuration
Boot configuration defines the location from which the console server loads the operating system. The
console server can boot from its internal firmware or from the network. By default, the console server boots
from Flash memory. Clicking System- Boot Configuration will display the Boot Configuration screen.
If you need to boot from the network, make sure the following prerequisites are met:
-or-
• Appliance IP Address: Enter the fixed IP address or a DHCP assigned IP address to the
console server.
• TFTP Server IP: Enter the IP address of the TFTP boot server.
• Filename: Enter the filename of the boot firmware.
3. Using the drop-down menu, select whether the Watchdog Timer is enabled. If the Watchdog
Timer is enabled, the console server reboots if the software crashes.
4. Using the drop-down menu, select one of the following speeds for both Ethernet 0 Mode and
Ethernet 1 Mode: 100BT full, 100BT half, 10BT full, 10BT half or Auto.
5. Using the drop-down menu, select the console port speed and click Save.
NOTE: Ethernet Mode will be affected after saving. The rest of the configuration will be applied after
rebooting.
3.6.8 Information
Click System - Information to view the console server’s identity, versions, power and CPU information.
3.6.9 Usage
Click System - Usage to view memory and Flash usage.
3.7 Network
Click Network to view and configure the Hostname, DNS, IPv6, Bonding, IPv4 and IPv6 static routes, Hosts,
Firewall, IPSec (VPN) and SNMP network options.
3.7.1 Settings
Click Network - Settings to make changes to the configured network settings.
From this page, an administrator can configure the console server's hostname and DNS settings, which
includes the primary and secondary DNS, domain and search addresses. An administrator can also enable
IPv6 and configure it to get the DNS and/or domain from DHCPv6. Once the eth0 and eth1 ports are
configured and enabled, an administrator can enable bonding to configure two networks, one for each
interface (eth0 and eth1) with its own default gateway.
DHCP
DHCP is set as the default method for eth0 while Static is the default method for eth1. If a DHCP server is
not present when the console server is first booted up, it will configure a default static IP address of
192.168.161.10.
The DCHP client on the console server was modified to enable it to automatically obtain an IP address
from a DHCP server, whenever the DHCP server becomes available.
Routing type
The console server supports multiple routing tables for flexible policy routing. Multiple routing tables can
not be enabled at the same time network failover is enabled.
To enable multiple routing tables:
1. Click Network - Settings.
2. Under Routing Type, click the Enable IPv4 Multiple Routing Tables radio button.
3.7.2 Link Layer Discovery Protocol
The Link Layer Discovery Protocol (LLDP) is a neighbor discovery protocol that enables network devices
to advertise information about themselves to other devices on the network.
The Avocent® implements LLDP and utilizes it to transmit its configuration information to neighboring
devices. This will enable customers to identify and correct any misconfiguration and discrepancies
associated with the console server.
Configuration information is transmitted using LLDP Data Units (LLDPDUs). Each LLDPDU is a sequence
of type-length-value (TLV) structures.
Operating modes
The LLDP agent operates in one of three modes:
• Transmit-only mode: The agent can only transmit the information about the capabilities and
the current status of the local system.
• Receive-only mode: The agent can only receive information about the capabilities and the
current status of the remote systems.
• Transmit and Receive mode: The agent can transmit the local system capabilities and status
information and receive the remote system's capabilities and status information.
The console server implements an LLDP agent that operates in Transmit-only mode. When enabled, the
LLDP agent only transmits the configuration information of the console server to its neighboring devices.
It does not receive and process LLDP packets from other devices.
Through the LLDP agent, the console server can transmit the configuration information listed in the
following table.
TYPE DESCRIPTION
Mandatory TLVs
Chassis The Chassis ID TLV identifies the console server containing the transmitting LLDP agent. The MAC address of the device is used as a
Identifier Chassis ID.
Port The Port ID identifies the console server port from which the LLDP packets are sent. The MAC address of the device is used as a Port
Identifier ID.
Time-to- The Time-to-Live (TTL) value is the length of time the receiving device should keep the information acquired through LLDP in its MIB.
Live The console server sets the TTL default value to 120 seconds (two minutes). This value is not configurable.
Optional TLVs
System The system name corresponds to the name defined with the Command Line Interface (CLI) command host name. By default, the
Name system name is automatically advertised when LLDP is enabled. This value is not configurable.
System The system description includes information about the underlying Kernel, host name, kernel distribution version and the date of the
Description firmware build.
System
The system capabilities TLV identifies the primary functions of the device and indicates whether these primary functions are enabled.
Capabilities
Port The port description provides information about the port from which the LLDP packets were sent on the console server. The console
Description server uses the port type interface and the interface number (eth0, eth1).
Management
The management IP address TLV lists the IP address of the console server port from which the LLDP packets were sent.
IP Address
LLDP configuration
All LLDP parameters (TLVs) are set to their default values/settings on the console server. An
administrator has the ability to modify only the LLDP admin state, which can be accomplished through
the CLI or the Web User Interface (web UI) of the console server. This admin state indicates if the LLDP
agent is enabled or disabled. When enabled, the LLDP agent on the console server is ready for
transmission of LLDPDUs. No other configuration parameters can be modified.
To enable LLDP from the web UI:
1. From the Wizard tab, click Network.
-or-
--:--/cli-> cd network/settings/
--:--settings cli-> set enable_lldp=yes (to enable, or "no" to disable)
--:--settings cli-> commit
Using DSView software with a console server will ensure the console server can always be accessible when
in a failover situation, because the console server will "phone home" and update its IP address within the
DSView software.
From the Network-Settings page, an administrator can configure a secondary network interface to be
used for failover. The primary interface sets the system default gateway while the secondary interface is
used when the primary interface is not available. The eth0 or eth1 interface can be used as the primary or
secondary interface. An administrator can also select one of four triggers that enable the failover:
If the IPSec tunnel has been configured (see IPSec (VPN) on page 32), an administrator can configure the
IPSec tunnel to be established over the secondary interface when it is up.
To enable Network Failover:
1. From the sidebar of the Expert tab, click Network-Settings.
2. Under the Network Failover heading, click the box to enable Network Failover.
3. Use the drop-down menus to select the primary and secondary interfaces as well as the
VPN connection name.
4. Click the radio button next to the trigger you want to use to initiate the failover.
5. Click Save.
3.7.4 Devices
An administrator can select, enable and configure the IP addresses assigned to the network interfaces
and view the MAC address.
To configure a network device:
1. Select Network - Devices. The Devices screen appears with a list of network interfaces and
their status (enabled or disabled).
2. Click the name of the network device to configure.
3. Check the box if you want to set the network device as the primary interface. By default, eth0 is
set as the primary interface.
4. Select the status (either Enabled or Disabled) from the drop-down menu.
5. Select one of the following IPv4 method options:
• Select DHCP to have the IPv4 IP address set by the DHCP server.
• Select Static to enter the IPv4 IP address, subnet mask and gateway address manually.
• Select IPv4 address unconfigured to disable IPv4.
6. Select one of the following IPv6 method options:
• Select Stateless if the link is restricted to the local IP address.
• Select DHCPv6 to have the IPv6 IP address set by the DHCP server.
• Select Static to enter the IPv6 IP address and prefix length manually.
NOTE: The MAC Address for the device will be displayed after this option.
-or-
Enter the required Destination IP/Mask Bits with the syntax <destination IP>/<CIDR> in the
Destination IP/Mask Bits field.
Firewall configuration is available by clicking on Network - Firewall. Separate but identical configuration
screens are available from either the IPv4 Filter Table or IPv6 Filter Table menu options.
Only the policy can be edited for a default chain; default chain policy options are ACCEPT and DROP.
If LOG is selected from the Target pull-down menu, the administrator can configure a Log Level, a Log
Prefix and whether the TCP sequence, TCP options and IP options are logged in the Log Options Section.
If REJECT is selected from the Target pull-down menu, the administrator can select an option from the
Reject with pull-down menu; the packet is dropped and a reply packet of the selected type is sent.
Protocol options
Different fields are activated for each option in the Protocol pull-down menu.
If Numeric is selected from the Protocol menu, enter a Protocol Number in the text field.
If TCP is selected from the Protocol menu, a TCP Options Section is activated for entering source and
destination ports and TCP flags.
If UDP is selected from the Protocol menu, the UDP section is activated for entering source and
destination ports.
Source Port - or -
A single IP address or a range of IP addresses.
Destination Port
[TCP only] SYN (synchronize), ACK (acknowledge), FIN (finish), RST (reset), URG (urgent) and PSH (push). The conditions
TCP Flags
in the pull-down menu for each flag are: Any, Set or Unset.
If ICMP is selected from the Protocol menu, the ICMP Type pull-down menu is activated.
If an administrator enters the Ethernet interface (eth0 or eth1) in the input or output interface fields and
selects an option (2nd and further packets, All packets and fragments or Unfragmented packets and 1st
packets) from the Fragments pull-down menu, the target action is performed on packets from or to the
specified interface if they meet the criteria in the selected Fragments menu option.
To add a chain:
1. Select Network - Firewall.
2. Select either IPv4 Filter Table or IPv6 Filter Table as needed.
3. Click Add.
4. Enter the name of the chain to be added.
5. Click Save.
You can add a new VPN connection by clicking Add, edit an existing connection by clicking on the
connection or delete a connection by clicking Delete.
NOTE: To run IPSec (VPN), you must enable IPSec under the custom Security Profile.
The remote gateway is referred to as the remote or right host and the console server is referred to as the
local or left host.
A fully qualified domain name may be indicated in the ID fields for both the local (left) host and the remote
(right) host where the IPSec negotiation takes place, but is not required. The ID field can be any name or
left blank.
The following table describes the fields and options on the IPSec(VPN) - Add screen. The information
must match exactly on both ends for local and remote.
Connection
Any descriptive name you wish to use to identify this connection.
Name
The Internet Key Exchange (IKE) protocol version used to set up the security association. If you are using an RSA key, the version
IKE Version
should be IKEv2. If you are using a pre-shared secret, the version should be IKEv1. The default is IKEv2.
Boot Action The boot action configured for the host, either Ignore or Start.
Aggressive Select Yes or No to enable or disable aggressive mode. If you are using IKEv2, aggressive mode must be disabled. The default is No.
Enter the required address or text for each of the four fields for both Remote Side and Local Side:
ID: This is the hostname that a local system and a remote system use for IPSec negotiation and authentication. It can be a fully
Remote (Right) qualified domain name preceded by @. For example: @hostname.xyz.com. It can also be any string or left blank.
Side - and - IP Address: The IP address of the host.
Local (Left) Side Virtual IP: For the left side, enter the virtual IP address. If you are using dial-up mode, enter %config. The default is left blank.
SubNet: The netmask of the subnetwork where the host resides. Use CIDR notation. The IP number followed by a slash and the
number of ‘one’ bits in the binary notation of the netmask. For example, 192.168.0.0/24 indicates an IP address where the first 24
bits are used as the network address. This is the same as 255.255.255.0.
IPSec (VPN)
Authentication method used, either RSA Key or Secret.
Authentication
RSA Key (If RSA For IPSec(VPN) authentication, you need to generate a public key for the console server and find out the key used on the remote
Key is selected) gateway. Then upload the key from the Systems page.
Pre-Shared
Secret (If Secret Pre-shared password between left and right users. Enter the key, XAuth username and XAuth password.
is selected)
IPSec tunnels
Internet Protocol Security (IPSec) has been enhanced on the Avocent® ACS6000 Advanced Console
Server. With a console server located on a separate network behind a router, it establishes an IPSec tunnel
using a x.509 certificate to a Fortinet® firewall.
To configure the Fortinet® Fortigate firewall, you need to create an internal Certificate of Authority
(CA) server that generates RSA certificates the console server uses for authentication.
For information on configuring other types of firewalls, see the documentation for your firewall.
PKCS12 files
The x.509 certificate chain and its corresponding private key are stored in a PKCS12 file that can be
downloaded to the console server. Multiple certificates may be stored in a PKCS12 file.
To download a PKCS12 file:
1. From the sidebar of the Expert tab, click System Tools.
2. In the content area, click IPSec(PKCS12) Files.
3. Click the Remote Server radio button and enter the protocol, IP address, username, password,
file directory and filename of the server where the file is stored.
-or-
Click the My Computer radio button, browse to where the file is served on your local machine
and click Choose File.
4. Click Download. The file will be checked to verify it is a PKCS12 formatted file.
-or-
NOTE: The following table displays parameter examples for a dial-up tunnel configuration. Actual
parameters will depend on your network environment.
PARAMETER VALUE
Network
Interface wan1
IP Version IPv4
NAT Traversal Enabled
Authentication
Method Signature
IKE Version 2
Phase 1 Proposal
Encryption AES256
Authentication SHA512
Diffie-Hellman Group 14
Local ID C=<country> S=<state> L=<city> O=<organization>
Edit Phase 2
Name <name>
Comments <comments>
Phase 2 Proposal
Encyption AES256
Authentication SHA512
Diffie-Hillman Group 14
Seconds 43200
4. From the Policy & Objects tab, click Objects - Addresses to create a VPN range with the
following settings, then click OK.
Table 3.7 VPN Range Configuration
PARAMETER VALUE
Name ipsec_vpn_range
Type IP Range
Interface Any
5. From the Policy & Objects tab, click Objects - Addresses to create a Local LAN range with the
following settings, then click OK.
Table 3.8 Local LAN Range Configuration
PARAMETER VALUE
Name local_lan
Type IP / Netmask
Interface internal
6. From the Policy & Objects tab, click Policy - IPv4 to create Firewall Policy 1 with the following
settings, then click OK.
PARAMETER VALUE
Schedule always
Service ALL
Action ACCEPT
NAT ON
Security Profiles
Traffic Shaping
Logging Options
Comments <Comments>
7. From the Policy & Objects tab, click Policy - IPv4 to create Firewall Policy 2 with the following
settings, then click OK.
PARAMETER VALUE
Schedule always
Service ALL
Action ACCEPT
NAT ON
Security Profiles
Traffic Shaping
Logging Options
Comments <Comments>
8. From the Policy & Objects tab, click Policy - IPv4 to create Firewall Policy 3 with the following
settings, then click OK.
Table 3.11 Firewall Policy 3 Configuration
PARAMETER VALUE
Action DENY
Logging Options
Certificate fallback
Clicking Enable Failover under the IPSec(VPN) Authentication heading enables the console server to fall
back to the previously configured certificate if the new certificate fails to establish the tunnel. If the tunnel
is established with the new certificate, the fallback operation is canceled.
Fallback only applies to RSA configured tunnels. Both the previous and the new PKCS12 files must be
present on the console server.
To enable IPSec on the console server:
1. From the sidebar of the Expert tab, click System - Security - Security Profile.
2. Click the Custom radio button under Security Profile.
3. Check the Enable IPSec box, then click Save.
Verification
Verification tests can be performed to ensure the IPSec configuration was successful.
To verify the IPSec status:
From the sidebar of the Expert tab, click Monitoring - IPSec Tunnel Status. A list of IPSec tunnels and their
status display in the content area.
NOTE: The Avocent ACS6000 Enterprise MIB text file is available in the appliance at:
/usr/local/mibs/ACS6000-MIB.asn. The Avocent ACS6000 Enterprise TRAP MIB text file is available
in the appliance at: /usr/local/mibs/ACS6000-TRAP-MIB.asn. Both files are also available at
www.avocent.com.
To configure SNMP:
1. Click Network - SNMP.
2. Click the System button.
a. Enter the SysContact information (email address of the console server’s administrator, for
example, [email protected]).
b. Enter the SysLocation information (physical location of the console server, for example,
Cyclades_ACS6000), then click Save to go back to the SNMP screen.
3. Click Add to add a new community or v3 user.
-or-
If the required SNMP version is v1 or v2 using an IPv6 network, click the Version v1,v2 for IPv6
network button, then enter the source (valid entry is the subnet address).
-or-
If the required SNMP version is v3, click the Version v3 button, then select the Authentication
Type (MD5 or SHA), enter the authentication passphrase or password, select the Encryption
Method (DES or AES), enter the privacy passphrase and select the Minimum Authentication
Level (NoAuthNoPriv, AuthNoPriv, AuthPriv).
7. Click Save.
NOTE: For SNMP v1/v2c, the console server will allow an administrator to configure the same
community name with different sources (filters) to have access to specific object identifiers (OIDs).
3.9 Ports
An administrator can enable and configure serial ports, auxiliary ports, the CAS Profile and the Dial-in
Profile from the Ports tab in the side navigation bar. On the auxiliary ports screen, you can enable the
auxiliary port and configure it based on the type of connected device.
The console server's serial ports may work in several different roles, depending on the profile configured
for a port.
NOTE: Auto speed detection requires additional configuration in the CAS Profile-Auto Discovery
Settings screen.
d. Use the appropriate drop-down menus to set the protocol and authentication type.
e. Enter the text session hotkey and power session hotkey in the appropriate fields.
f. Enter the TCP port alias for each protocol type (Telnet, SSH and Raw Mode) in the
appropriate field.
g. Enter the IPv4 or IPv6 alias and its interface in the appropriate field.
h. To allow a session only if DCD is on and to enable auto answer, check the appropriate
boxes.
i. Use the drop-down menu to select the DTR mode and enter the DTR off interval.
j. Use the drop-down menus to enable or disable line feed suppression and NULL after CR
suppression.
k. Enter the transmission interval, break sequence and break interval in the appropriate
fields.
l. Use the drop-down menu to enable or disable the Multi-Session Menu. For more
information, see Multi-Session Menu on page 46.
m. Use the drop-down menus to enable or disable log in/out multisession notification and
informational message notification.
5. Click Next or click the Data Buffering link and use the drop-down menus to enable and
configure data buffering.
6. Click Next or click the Alerts link.
a. Click Enable Alerts to enable detection of alerts.
b. Click Add to add an alert string. In the Alerts String field, enter the string. In the Script
field, enter the shell script that will run when the match happens. Click Next to return to
the Alerts screen.
NOTE: The console server allows an administrator to associate one shell script to the alert string. When
there is a match with the alert string, the console server will call the script passing the port number and
the line where the match occurs as arguments.
c. Check the box next to an existing alert and click Delete to delete the string.
d. Click Delete Any to delete all strings whether selected or not.
NOTE: Clicking Delete Any will delete all alert strings. Selecting all the alert strings and clicking Delete is
not the same functon as it will not delete alert strings not shown in the table.
8. Click Save.
Physical
Enable Cisco
Defines the serial port pinout. Default: Disabled.
RJ-45 Pin-Out
Status Defines the status of the serial port as either enabled or disabled. Default: Disabled.
Speed Defines the speed as 300, 1200, 2400, 4800, 9600, 19200, 38400, 57600, 115200 or 230400. Default: 9600.
Parity Defines the parity as either Even, Odd or None. Default: None.
Data Bits Defines the data bits as either 5, 6, 7 or 8. Default: 8.
Stop Bits Defines the stop bits as either 1 or 2. Default: 1.
Flow Control Defines the flow control as none, hardware, software, RxON software or TxON software. Default: None.
CAS
Port Name Name associated with the serial port (as an alias). Default: <appliance mac address>-p-<port number>.
Enable Auto
The target name will be discovered and will be associated with this serial port. If it fails, the Port Name will be used. Default: Disabled.
Discovery
Enable Speed Tries to discover the speed of the serial port. This feature requires additional configuration under the CAS Profile / Auto Discovery /
Auto Detection Settings page. Default: Disabled.
The protocol that will be used by authorized users to access the serial port/target. The console server accepts three protocols for
connection to the target: Telnet for telnet connection, SSH for secure connection and Raw Mode for raw socket connection. An
Protocol
administrator can configure the port to accept one, two or all three types. NOTE: Raw protocol requires the configuration of the Raw
Mode Port Alias. Default value: Telnet/SSH.
Authentication
Authentication type that will be used to authenticate the user during target session. Default: Local.
Type
Text Session Hotkey to suspend the target session and go to the CLI prompt. Not available for Raw. Default: Ctrl-Z.
Hot Key Note: The default escape character for ts_menu is Ctrl-X.
Hotkey to suspend the target session and display Power Management Menu to control the outlets merged to the target. Not available
Power Session
for Raw. Default: Ctrl-P.
Hot Key
NOTE: The default escape character for ts_menu is Ctrl-X.
Telnet Port Alias: TCP port to connect directly to a serial port using Telnet protocol for the connection. SSH Port Alias: TCP port to
TCP Port Alias connect directly to a serial port using SSH protocol for the connection/ Raw Mode Port Alias: TCP port to connect directly to a serial
port using raw socket for the connection.
Port IPv4/IPv6
IPv4/IPv6 address used to connect directly to a serial port. Default: not configured (empty).
Alias
Port IPv4/IPv6
Interface (eth0/eth1) associated with the IPv4/IPv6 alias. Default: eth0.
Alias Interface
Allow Session
Only if DCD is When the DCD is OFF, the appliance will deny access for this serial port. Default: Disabled (allow access if DCD is OFF).
On
Enable Auto When the input data matches one input string configured in Auto Answer, the output string will be transmitted to the serial port.
Answer Default: Disabled.
DTR Mode can be set to the following: Always On. Normal - the DTR status will depend on the existence of a CAS session. Off
DTR Mode
Interval - when the a CAS session is closed, the DTR will stay down during this interval. Default: Normal.
DTR Off
Interval in seconds used by DTR Mode Off Interval in milliseconds. Default: 100.
Interval
Line Feed
Enables the suppression of the LF character after the CR character. Default: Disabled.
Suppression
Null After CR
Enables the suppression of the NULL character after the CR character. Default: Disabled.
Suppression
Transmission
The interval the port waits to send data to a remote client in milliseconds. Default: 20.
Interval
Break An administrator can configure the control key as the break sequence, entering ^ before the letter. Not available for Raw. Default:
Sequence ~break.
Break Interval Interval for the break signal in milliseconds. Not available for Raw. Default: 500.
Log In/Out Multi
Session Enables the notification to multi-session users when a new user logs in or a user logs out. Not available for Raw. Default: Disabled.
Notification
Informational
Message Displays an information message when a target session is opened. Not available for Raw. Default: Enabled.
Notification
Data Buffering
Status Enables or disables data buffering. Default: Disabled.
Displays the type of data buffering: Local - stores the data buffering file in the local file system. NFS - stores the data buffering file in
Type
the NFS server. Syslog - sends the data to the syslog server. DSView - sends the data to the DSView software. Default: Local.
Time Stamp When enabled, adds the time stamp to the data buffering line for a Local or NFS database. Default: Disabled.
Log-in/out
Includes special notification for logins and logouts in data buffering. Default: Disabled.
Message
Serial Session
Enabled - stores data at all times. Disabled - stores data when a CAS session is not opened. Default: Enabled.
Logging
Alerts
Status A special event notification will be generated when input data matches one of the alert strings. Default: Disabled.
Alert Strings Strings used to generate event notifications. Default: Empty.
Name of shell script that will be called when there is match of the alert string in the line. The script will be called with two arguments:
Scripts
the port number and the line where the match happened.
To configure the Dial-in Profile for a serial port with a connected modem:
1. Select Ports - Serial Ports.
2. Click the checkbox for a serial port with a connected modem.
3. Click the Set Dial button and use the drop-down menus to configure the dial-in settings.
4. Configure the PPP parameters (address, authentication and so on) and click Save.
Table 3.13 Dial-in Parameters
PARAMETER
DESCRIPTION
Physical
Enable Cisco RJ-45 Pin-Out Defines the serial port pinout. Default: Disabled.
Status Defines the status of the serial port as either enabled or disabled. Default: Disabled.
Speed Defines the speed as 300, 1200, 2400, 4800, 9600, 19200, 38400, 57600 or 115200. Default: 9600.
Parity Defines the parity as either Even, Odd or None. Default: None.
Data Bits Defines the data bits as either 5, 6, 7 or 8. Default: 8.
Stop Bits Defines the stop bits as either 1 or 2. Default: 1.
Flow Control Defines the flow control as none, hardware, software, RxON software or TxON sofware. Default: None.
Power
Defines the type or vendor of the PDU connected to the serial port.
• Auto - the vendor will be detected.
• Avocent-Cyclades - Avocent-Cyclades PM PDU family.
PDU Type
• SPC - SPC power control device family.
• Server Tech - Server Tech family.
Default: Auto.
Enable Speed Auto Detection When enabled, detects the speed of the port. Default: Disabled.
Pooling Rate The interval in seconds to update information from the PDU. Default: 20.
For Avocent/Cyclades PDUs
Power Cycle Interval The interval in seconds between Off and On actions for the power cycle command. Default: 15.
Syslog When enabled, the PDU will send syslog messages to the appliance. Default: Enabled.
Buzzer Enables or disables the PDU’s buzzer. Default: Enabled.
SW Overcurrent Protection When enabled, the software’s overcurrent protection is on. Default: Disabled.
NOTE: If the selected port is configured as a CAS Profile, the following parameters will not be copied:
Port Name, TCP Port Alias, IPv4 Port Alias, IPv6 Port Alias and Power (merged outlets).
To reset one or more serial ports to their factory configuration:
1. Select Ports - Serial Ports.
2. Click the checkbox for one or more serial ports you want to reset to their factory configuration,
then click the Reset To Factory button.
NOTE: Serial ports are set to the CAS Profile and disabled in the factory configuration.
The Multi-Session Menu includes options that are dependent on the access rights of the user. If a user
does not have rights to an option, that option is not displayed. For example, Options 0, 2 and 5 from the
following table are displayed for a user who only has permission to open read-only sessions.
3 Send messages to another user Sends a message to all users who are sharing the serial port.
4 Kill session(s) Displays all sessions and asks to close one or more shared sessions.
6 Show Databuffering Shows the content of the target data buffering file.
7 Clean Databuffering Resets the content of the target data buffering file.
Auto discovery
The auto discovery feature will discover the target name of the server connected to the serial port. This
name will be used as the alias of the serial port.
When auto discovery is active for a certain serial device, upon target connection (DCD ON event), the
appliance will send probe strings and start analyzing target device answers using regular expressions.
There will be predefined probe and match strings as well as customer-defined ones.
For each probe string sent, all regular expressions defined by the match strings will be tested. After the
last cycle, the sequence restarts. This procedure will run for a certain period (given by the auto discovery
time-out parameter) or until the target is successfully detected. If auto discovery fails, the target name will
be reset to the configured target name or to the corresponding unique default target name.
NOTE: The configured target name will be used only after the auto discovery process fails.
NOTE: The auto discovery process starts when there is variation in the DCD signal from OFF to ON
(disconnect/connect the target's cable, turn off/on the target) and when the configuration of the
serial port goes from disabled to enabled and there is a target connected in the port.
The probe strings will be used to stimulate the server (such as “\n”: a single newline).
The match strings are regular expressions where “%H” is a placeholder for the target name you want to
detect, such as:
The first one will extract target name from things such as:
1. Select Ports - CAS Profile - Auto Discovery. The Settings, Probe Strings and Match Strings
options appear in the side navigation bar.
2. To change the default auto discovery time-out or probe time-out, perform the following steps.
a. Select Settings.
b. Enter a new value in the Auto Discovery Timeout and Probe Timeout fields.
c. Select a speed from the Default Speed on Auto Discovery Failure drop-down menu and
Probe Speed List.
d. Click Save.
3. To add a new probe or match string or delete an existing string, perform the following steps.
a. Select Probe Strings or Match Strings.
b. To add a string, click Add, enter a new string in the New Probe String or New Match
String field and click Save.
c. To delete a string, select the checkbox for the string and click Delete.
4. Click Save.
To configure the input/output strings used by auto answer:
1. Select Ports - CAS Profile - Auto Answer.
2. To add an auto answer input and output string, click Add. Enter a new string in the Input
String or Output String fields and click Save.
-or-
To delete an auto input and output string, select the checkbox next to the string you want to
delete. Click Delete, then click Save.
Pool of Ports
An administrator can create a pool of serial ports where each serial port in the pool shares a pool name,
Telnet Port Alias, SSH Port Alias, Raw Mode Port Alias, IPv4 Alias and IPv6 Alias. The first available port in
the pool is used as the serial port for connection.
NOTE: The multiple session access right does not have any effect when using a pool of CAS ports.
When all ports in the pool are taken, the connection to the pool is denied.
NOTE: All ports in the pool must share the same CAS protocol. The protocol is validated during the
connection to the serial port. If the protocol does not match, the connection will be denied.
To configure a pool of CAS ports:
1. Click Ports - Pool of Ports.
2. To create a pool, click the Add button.
- or -
To edit an existing pool, click the name of the pool you want to edit.
- or -
- or -
In the right side of the Pool Members field, select the ports to be removed from the pool and
click Remove.
5. Click Save.
NOTE: A serial port can only belong to one pool at a time, but a user can create an empty pool and add
ports to it later.
The name of the pool. The pool name is mandatory and should follow hostname guidelines, not exceed 64 characters and start
Pool Name
with a letter.
The Port Alias where the pool responds for each protocol.
l Telnet Port Alias for telnet protocol. It is optional.
Port Alias l SSH Port Alias for ssh protocol. It is optional.
l Raw Mode Port Alias for raw mode protocol.
l It is mandatory when Raw Mode is configured as protocol for the ports.
Pool IPv4 Alias The IPv4 address used by the pool. This parameter is optional.
Pool IPv4 Alias
The interface used by the IPv4 Alias. Default: eth0.
Interface
Pool IPv6 Alias The IPv6 address used by the pool. This parameter is optional.
Pool IPv6 Alias
The interface used by the IPv6 Alias. Default: eth0.
Interface
RESTful API
The console server supports a programmable RESTful API interface that provides access to resources
and functionality of the console server with the ability to support full GET and POST operations on
devices.
NOTE: URL options must be configured using either HTTP or HTTPS with the RESTful API menu.
To configure the RESTful API:
1. Click Ports - CAS Profile - RESTful Settings.
2. Enter the Action Name, URL, POST Data, Username and Password in the appropriate fields and
use the drop-down menu to select GET or POST as the HTTP Method for each RESTful option.
Click Save when finished.
Figure 3.4
NOTE: HTTP POSTs can sometimes use the HTTP request body to send appropriate information to
servers, usually coded as XML or JSON.
To enable the RESTful API:
1. If port access applies to all users, from the side navigation bar of the Expert tab, click System -
Security - Security Profile, then under Serial Devices, click the RESTful Menu checkbox and
click Save.
-or-
If port access is controlled by authorization assigned to users groups, from the side navigation
bar of the Expert tab, click Users - Authorization - Groups.
a. Click the group for which you want to enable the RESTful API.
b. From the side navigation bar, click Access Rights - Serial.
c. Click the port for which you want to enable the RESTful menu. Under Target Access
Rights, click the RESTful Menu box.
2. From the side navigation bar of the Expert tab, click Ports - Serial Ports.
3. Click the port for which you want to enable the RESTful menu and then click the CAS heading
at the top of the window.
4. In the RESTful Hot Key field, enter the hotkey you want to use to initiate the RESTful API and
click Save.
After opening a serial session, press the hot key to open the RESTful API interface for the current session.
Enter the number of the RESTful API request you want to perform. By default, Exit and Help are the first
two requests in the menu. You can configure up to eight additional requests from the web UI of the
console server.
---------------------------------------
RESTful Management Utility
----------------------------------------
1 - Exit
2 - Help
3 - Turn On Outlet
4 - Turn Off Outlet
5 - Twist
6 - Twist On
7-
8-
9-
10 -
Please choose an option:
NOTE: If pluggable devices are being used for dial-out, dial-in should be disabled.
To configure secure dial-in settings for ports with the Dial-in Profile:
1. Select Ports - Dial-In Profile - Settings.
2. To enable logging in to the console server through the modem and select a condition for which
logging in is allowed, perform the following steps.
a. To allow callback connections only, select Callback.
b. To allow any connection, select Enable.
3. To enable OTP authentication, select Enable from the OTP Login Authentication menu.
4. To enable and select a condition for PPP connections, perform the following steps.
a. To allow PPP callback connections only, select Callback.
b. To allow any connection, select Enable.
5. When the PAP authentication protocol is configured for the port, select the authentication
type from the PPP/PAP Authentication menu.
6. Click Save.
To configure callback users and phone numbers for ports with the Dial-in Profile:
1. Select Ports - Dial-In Profile - Secure Dial-In - Callback Users.
NOTE: This PPP OPT user will establish PPP connection after being successfully authenticated.
To configure EAP-TLS as PPP authentication for ports with the Dial-in Profile:
1. Select Ports - Serial Ports.
-or-
2. Check the box next to the port where the modem is connected and click Set Dial-In.
3. Configure the PPP Address settings. For example, set the PPP Address to Local Configuration
using 10.0.0.1 as the Local IPv4 Address and 10.0.0.2 as the Remote IPv4 Address.
4. For PPP Authenticaion, select the button next to By Appliance, and then select the button
next to EAP for the protocol. Click Save.
5. Select Ports - Dial-In Profile - Settings.
6. Use the drop-down menu to enable the PPP Connection and click Save.
7. Copy the certificates and keys to the /etc/ppp/cert file. They must be named server.crt (the
ACS6000 console server certificate), ca.crt (the Certificate Authority’s certificate) and
server.key (the ACS6000 console server asymmetric key).
3.9.6 Dial-out Profile
To configure the Dial-out Profile for a serial port with a connected modem:
1. Select Ports – Serial Ports.
2. Click the checkbox for a serial port with a connected modem.
3. Click the Set Dial-out button.
4. Use the drop-down to enable/disable the port.
5. Configure the phone number to dial on-demand in the field Phone No.
6. Use the drop-down to configure the modem speed.
7. Configure the initial chat with modem in the Init Chat field.
8. Configure the PPP parameters (address, authentication and so on) and click Save.
NOTE: The Dial-out profile will work only to establish PPP link on-demand. The administrator must
configure static route to have packages routed to the PPP interface.
PARAMETER DESCRIPTION
The speed that will be used to configure the serial device and
Speed
communicate with the connected modem.
PPP Authentication Protocol
Number of seconds being idle before PPP times out. Default: 0 (no time-
PPP Idle Timeout
out).
CHAP
To configure the Socket Client Profile for a serial port with a connected device:
1. Select Ports - Serial Ports.
2. Click the checkbox for a serial port with a connected device.
3. Click Set Socket Client and use the drop-down menus to configure the physical settings.
4. Configure the Socket Client Settings (remote server address, TCP port and event trigger) and
click Save.
Table 3.19 Socket Client Parameters
PARAMETER DESCRIPTION
Defines the speed as 300, 1200, 2400, 4800, 9600, 19200, 38400, 57600,
Speed
115200 or 230400. Default: 9600.
NOTE: When a pluggable device is not in the current list of supported pluggable devices, the console
server may attempt to configure the device with standard settings, allowing it to work normally. Also,
when a pluggable device is not listed in the internal database, the Device Info column may show no text
at all or show different text based on the type of card. One example is Unknown device f024 (rev 01).
NOTE: To disable pluggable device detection, click Disable Pluggable Device Detection.
To eject or delete a pluggable device:
1. From the side navigation bar, select Pluggable Devices.
2. Select the checkbox next to the pluggable device you want to eject, rename or delete.
3. Click Eject, Rename or Delete as desired. If renaming a device, enter the new name in Rename
field. Click Save.
NOTE: Always eject a pluggable device from the web manager. Any other method may cause a kernel
panic.
NOTE: Configuration of wireless devices takes effect only after the device is ejected and re-inserted.
To configure a pluggable device:
1. From the side navigation bar, click Pluggable Devices.
2. For a network device, click its name to configure its network parameters.
3. -or-
4. For a modem (V.92), click the box next to its name and then click either Set Dial-In or Set Dial-
Out to configure its dial-in or dial-out parameters.
3.11 Authentication
Authentication can be performed locally, with OTP, or on a remote LDAP, Radius or TACACS+
authentication server. If the console server is managed by a DSView server, DSView authentication is also
supported. The console server also supports remote group authorizations for the LDAP, Radius and
TACACS+ authentication methods.
Local authentication can be tried first, followed by remote, if the local authentication fails (Local/Remote_
Method).
-or-
-or-
Local authentication may be tried only if a remote authentication server is down (Remote_Method_Down_
Local).
NOTE: It is advised when using group authorization that you use the same authentication for both the
console server and all serial ports, or use Single Sign-on Authentication to facilitate group
authorization.
When Single Sign-on Authentication is disabled, the console server uses the individual configuration
based in the destination of the access: the console server itself or each serial port. Users must use their
password each time they access an individual port. If enabled, Single Sign-on Authentication will use the
authentication server you choose from the pull-down menu for all access and no further authentication
will be needed.
NOTE: Selecting unconfigured from the pull-down menu will allow the ports to continue to use
individual authentication servers, and will require your password the first time you access any port.
After that, the port will not require password authentication if Single Sign-on Authentication is
enabled.
To set authentication for the console server:
1. Click Authentication - Appliance Authentication.
2. Select the desired authentication server from the Authentication Type drop-down menu.
3. Select Enable fallback to Local type for root user in appliance console port when the remote
authentication fails and an administrator wants to access the appliance via console port as the
root user.
4. Select Enable single sign-on to enable single sign-on authentication, and select the desired
authentication server from the Authentication Type drop-down menu.
5. Click Save.
3.11.2 Authentication servers
When using an authentication server, you must configure its IP address and in most cases other
parameters before it can be used. The following authentication servers require configuration: RADIUS,
TACACS+, LDAP(S)|AD and DSView servers.
To configure a RADIUS authentication server:
1. Select Authentication - Authentication Servers - RADIUS.
2. Enter the IP addresses of the First Authentication Server and First Accounting Server.
3. If used, enter the IP addresses for the Second Authentication Server and Second Accounting
Server.
4. Enter your secret word or passphrase in the Secret field (applies to both first and second
authentication and accounting servers), then re-enter the secret word or passphrase in the
Confirm Secret field.
5. Enter the desired number of seconds for server time-out in the Timeout field.
6. Enter the desired number of retries in the Retries field.
Groups can also be authorized to manage power while connected to devices. The console server has two
default users (admin and root) and four pre-defined user groups: admin, appliance-admin, shell-login-
profile and user.
CAUTION: Change the default passwords for root and admin before you put the console server
into operation.
By default, all users have access to all ports on the console server. In order to authorize access via user
groups, an administrator must enable port access to be controlled by authorizations assigned to user
groups.
To enable port access to be controlled by authorizations assigned to user groups:
1. From the expert tab of the side navigation bar, click System - Security - Security Profile.
2. Under the Serial Devices heading, click the button next to Controlled by authorizations
assigned to user groups, then click Save.
3.12.1 Local accounts
The admin and root are equivalent users but named differently to address users familiar with either
Avocent equipment or the Cyclades families of console servers. Regular users can be granted permissions
by administrators at any time. The console server has two local user accounts by factory default.
• admin: Performs the initial network configuration. The factory default password for admin is
avocent. The admin user is a member of the admin group and can configure the console server
and ports as well as user and group authorizations.
• root: Has the same permissions as the admin user. The factory default password for root is linux.
The root user is a member of the admin and shell-login-profile groups. When a root user logs in
via the CONSOLE port, SSH or telnet, the session is pre-defined by the login profile to go
directly to shell. The login profile can be customized so that it does not go directly to shell.
To add new users:
1. Click Users - Local Accounts - User Names. The User Names screen is displayed with a list of all
users.
2. Click Add. The Local User Information screen is displayed.
3. Enter the new username and enter a password, then confirm the password.
4. Select or deselect User must change password at the next login checkbox.
5. To add the user to an available user group, select the user group name in the box on the left
and click Add (user is the default group). You can remove a user group from the box at right by
selecting it and clicking Remove.
6. Enter the desired parameters for Password Expiration.
• Min Days: Enter the minimum number of days allowed between password changes.
Password changes attempted sooner will be rejected. If not specified, -1 is the default
which disables the restriction.
• Max Days: Enter the maximum number of days a password is valid. After this period, a
password change will be forced. If not specified, -1 is the default which disables the
restriction.
If an administrator configures the console server to restrict user access to ports, the administrator can
assign users to groups that are authorized for port access. The administrator can also authorize groups
for power management and data buffer management.
This document and the software refer to users whose accounts are configured on remote authentication
servers as remote users. Remote users do not need local accounts.
Radius, TACACS+ and LDAP authentication services allow group configuration. If a remote user is
configured as a member of a remote group, the authentication server provides the group name to the
console server when it authenticates the user. A local group by the same name must also be configured
on the console server. If an authentication server authenticates a remote user but does not return a
group, then the remote user is, by default, assigned to the user group.
admin group
Members of the admin group have full administrative privileges that cannot be changed. They have the
same access and configuration authorizations as the default admin user. Administrators can configure
ports, add users and manage power devices connected to the console server.
NOTE: When any Group Name is selected, both the content area and side navigation bar change. The
side navigation bar will display specific menu options for Members and Access Rights (which include
Serial, Power and Appliance rights).
NOTE: The Serial and Power screens are read-only and cannot be changed.
4. In the side navigation bar, click on Access Rights - Appliance. The Appliance Access Rights
screen appears and lists all access rights available to a member belonging to the admin group.
All appliance access rights are shown enabled (checked). Available appliance access rights are:
• View Appliance Information
• Disconnect Sessions
• Reboot Appliance
• Appliance Flash Upgrade and Reboot Appliance
• Configure Appliance Settings
• Configure User Accounts
• Backup/Restore Configuration
• Shell Access
• Transfer Files
NOTE: The Appliance Access Rights screen for the admin and appliance-admin user groups is read-
only and cannot be changed. Unchecking any box and clicking Save will result in an error message. The
console server will maintain all rights selected.
appliance-admin group
Appliance-admin user group members have access to the serial ports and power management options,
unless that access is restricted by the security profile. Members of the group also share all of the
appliance access rights as admin except for Configure User Accounts and Shell Access, which are
permanently disabled for this group.
user group
User group members have access to target devices, unless that access is restricted by an administrator.
When a security profile restricts port access globally, an administrator may grant port access to members
of the user group. User group members have no access rights for the console server.
Administrators can add appliance access rights and permissions. Administrators can also add users to
custom user groups to add permissions and access rights as needed. By default, all selections on the
Appliance Access Rights screen will be disabled.
NOTE: The Appliance Access Rights screen for the user group can be changed at any time by an
administrator. This will change the access rights for all members of the console server’s user group.
shell-login-profile
Members of the shell-login-profile group have access to the shell after logging in. By default, the root user
belongs to this group. This is not a protected group and can be deleted.
-or-
Click CLI to use CLI when opening a session. Enter the CLI command in the CLI cmd field and
check the box if you want to exit after executing the command.
6. Click Save.
NOTE: If the user belongs to multiple groups, the login profile used will be the first enabled login profile
based on alphabetical order of the group.
NOTE: The custom PDU ID is for assigning user group authorization to manage PDUs that have not yet
been connected to the console server.
NOTE: Outlets can be specified individually, (for example 1,3,6,8) or as a range (for example 1-4) or a
combination of both, (for example 1-4,6,8 which assigns access to outlets 1, 2, 3, 4, 6 and 8).
8. If a custom PDU ID has been created for future use, and you want to pre-assign outlets, click
the Custom button to enter the custom PDU ID name and specify the outlets.
9. Click Save.
To assign appliance access rights for custom user groups:
1. Click Users - Authorization - Groups.
2. Click the new user group name.
3. In the side navigation bar, click Access Rights - Appliance.
4. Select the desired appliance access rights and click Save.
To configure a group in a TACACS+ authentication server:
1. On the server, add raccess service to the user configuration.
2. Define which group(s) the user belongs to in the raccess service following this syntax:
group_name = <Group1>[,<Group2,...,GroupN>];
For example:
In the console server, configure a new authorization group TACACS_1 , and configure the access rights for
this group. In the TACACS+ server, configure the user regina with the following attribute: raccess =
group_name=TACACS_1;
Then, configure the user special with the following attribute: raccess = group_name=admin;
During the authentication phase, the console server will receive the attribute raccess from the TACACS+
server. The user regina belongs to the authorization group TACACS_1 and the user special belongs to the
authorization group admin.
To configure a group in a RADIUS authentication server:
Define which group(s) the user belongs to in the attribute FRAMED_FILTER_ID with the following syntax:
[:group_name=]<acs6000_group1>[,<acs6000_group2>];
For example:
In the console server, configure new authorization groups RADIUS_1 and RADIUS_2, and configure the
access rights for these groups. In the Radius server, configure the user regina with the following attribute:
FramedFilterID = group_name=RADIUS_1,RADIUS_2;
-or-
FramedFilterID = RADIUS_1,RADIUS_2;
-or-
FramedFilterID = RADIUS_1;
FramedFilterID += RADIUS_2;
FramedFilterID = group_name=admin;
During the authentication phase, the console server will receive the attribute FramedFilterID from the
RADIUS server. The user regina belongs to authorization group RADIUS_1 and RADIUS_2. and the user
special belongs to authorization group admin.
To configure group an LDAP authentication server:
On the LDAP server, edit the info attribute for the user and add the following syntax.
info: group_name=<Group1>[,<Group2>,...,<GroupN>];
Select Remote Server - IPv4 to enable syslog messages to be sent to one or more remote IPv4
syslog servers, and enter the IPv4 Address or Hostname and the UPD port for each remote
syslog server.
-or-
Select Remote Server - IPv6 to enable syslog messages to be sent to one or more remote IPv6
syslog servers, and enter the IPv6 Address or Hostname and the UPD port for each remote
syslog server.
NOTE: RPC service must be enabled in the Security Profile screen before configuring NFS Data
Buffering Settings. NFS does not support IPv6.
4. To segment data buffering files every day based in hour, enter the time in the Close Log Files
and Open New Ones at Time (HH:MM) field. This will be valid for local and NFS data buffering.
5. To configure data buffer storage on a syslog server in the Syslog Data Buffering Settings
section; select a facility number from the drop-down menu: Log Local 0, Log Local 1, Log Local
2, Log Local 3, Log Local 4 or Log Local 5.
6. Click Save.
3.13.5 Appliance logging
To configure appliance logging:
1. Click Enable appliance session data logging.
a. Select the destination for appliance session data logs from the pull-down menu. Choices
are Local, NFS, Syslog and DSView.
b. Enable or disable timestamping the appliance session data logs.
2. Click Enable appliance session data logging alerts.
3. Enter the desired alert strings (up to ten) in the fields provided.
4. Click Save.
3.13.6 Sensors
The console server has sensors that monitor the internal temperature. You can specify an operating
range for the console server that fits its environment.
NOTE: The Maximum Temperature Threshold field will define a region around the maximum
temperature. When the temperature exceeds the Maximum Temperature plus Threshold, an event
notification will be generated. When the temperature falls below the Maximum Temperature minus
Threshold, an even notification that the console server has returned to normal operating temperature
will be generated. This is also true for setting the minimum temperature threshold.
4. In the Minimum Temperature field, enter the temperature in degrees Celsius that, if the
console server’s temperature falls below, will generate an event notification.
5. In the Minimum Temperature Threshold field, enter the temperature threshold in degrees
Celsius above the minimum temperature.
6. Click Save.
The following types of power devices can be connected to any serial port or to the AUX/Modem port (if an
internal modem is not installed):
• Vertiv™ MPH2 rack Power Distribution Units (PDUs) as well as MPX and MPH rack PDUs with
RPC2 cards installed.
• Cyclades PM Intelligent Power Distribution Units (IPDUs) - With Cyclades PM IPDUs, up to 128
outlets can be daisy-chained and managed from a single serial port.
• Avocent SPC power control devices.
• Server Technology Sentry™ family of Switched Cabinet Power Distribution Units (CDUs), Smart
Cabinet Power Distribution Units (Smart CDUs) and switched CDU Expansion Module (CW/CX)
power devices. One additional level of power devices can be daisy-chained with ServerTech
Expansion modules.
• Server Technology Sentry Power Tower XL™ (PTXL) and Power Tower Expansion Module
(PTXM) power devices.
NOTE: The term PDU refers to any of these types of power devices.
The console server automatically recognizes and supports Liebert RPC2 cards, Cyclades PM PDUs or
Avocent SPC devices when the corresponding serial port is configured for power management.
NOTE: The power controls (On, Off and Cycle) will be applied to all outlets of the PDU.
4. To change the PDU ID, click Rename and enter the name in the New PDU ID field.
5. Click Save.
To upgrade firmware:
1. Select the checkbox next to the PDU you want to upgrade and click the Upgrade Firmware
button.
2. Fill all fields with correct information and click Download to download the firmware to the
console server.
3. When the download finishes, the Install PM Firmware screen appears. If the version information
is correct, click Upgrade Now to start the upgrade of the firmware in the PDU.
4. When the upgrade finishes, the Finish Upgrade screen appears with the result of the upgrade
action. Click Finish.
NOTE: You can upgrade the firmware for multiple PDUs at the same time for Avocent PM PDUs only.
To view a PDU’s information and manage outlets:
1. Select Power Management - PDUs.
2. Click the name of the PDU you want to view or manage.
3. The Outlet Table with power controls window appears and the side navigation bar displays a
list of options.
4. To manage outlets of PDU:
a. Check the box(es) of the outlet number(s) you want to manage.
b. Click On, Off, Cycle, Lock or Unlock to perform that function for the selected outlet(s).
5. Click Information in the side navigation bar to view a PDU’s information.
6. Click Overview in the side navigation bar to view data monitoring information.
7. Click Current, Voltage, Power Consumption, Energy Consumption or Environment in the side
navigation bar to view a table with appropriate information. Click Reset Values to clear Max,
Min and Average values.
To configure a PDU:
1. Click Settings to expand the side navigation bar.
2. Click Outlets.
3. Click on an outlet number to change its settings. Click Save, then click Close.
-or-
Check two or more boxes next to the outlets for which you want to change settings. Click Edit
to change the settings for the outlets you selected. Click Save.
NOTE: The PDU model defines available parameters in the Settings window.
3.14.2 Login
An administrator can change the login password for a supported PDU type. This password is used by the
console server to communicate with the PDU. (Only one password is supported for all PDUs of the same
type.)
To change a PDU password:
1. Select Power Management - Login.
2. To change the password for an Avocent or Cyclades PDU, an Avocent SPC power control
device or a Server Tech PDU, enter the password in the appropriately labeled section.
3. Click Save.
3.14.3 Outlet Groups
By selecting the Outlet Groups tab, you can view status, outlet and power consumption for outlet groups,
as well as configure them. You can also turn on, turn off or cycle selected outlet groups.
To manage outlet groups:
-or-
4. Click Add to add an outlet group. The Add Group screen appears. Enter the name in the Group
Name field.
5. Click Save.
To view and change outlet group information:
1. Select Power Management - Outlet Groups.
2. Click the name of the outlet group you want to view or manage.
3. To add outlets, click Add to add a new outlet to the group. Fill the fields and click Save to
return to the Outlet Group Details table.
4. To delete outlets, check one or more boxes next to the outlet(s) you want to remove from the
group. Click Delete, then click Close when finished.
3.14.4 Network PDUs
Power devices connected to the network with SNMP (read/write) enabled can be used for remote power
management. The console server enables authorized users to turn power on and turn power off in devices
that are plugged into the network PDU.
The following type of power devices are support via network connection:
NOTE: SNMP needs to be enabled and have one community with write permission enabled in the PDU.
By selecting the Network PDUs node, an administrator can add new Network PDUs or edit configuration of
current ones.
The following functionalities are supported for Network PDUs:Power Control (turn on, turn off and
cycle/reboot) outlets, rename the PDU and rename the outlets
To add a network PDU
1. Select Power Management – Network PDUs.
2. Click Add.
3. Enter the IP address of the network PDU.
4. Select the PDU type: Net-ServerTech or Net-MPH/MPX.
5. Enter the interval to poll the PDU for the status of the outlets.
6. Enter the community name that has write permission in the PDU.
NOTE: The support for network PDUs is restricted to power operations (turn on, turn off, cycle
outlets), rename PDU and rename outlets.
NOTE: If you start another session with the console server while viewing this screen, it will not be
visible until you click Refresh at the top of the web manager window.
To kill an active session:
1. Click Active Sessions. The Active Sessions screen appears and lists all open sessions to the
console server by the user’s workstation IP.
2. Select the checkbox next to the session you want to kill, then click the Kill button. After a few
seconds, the Active Session screen will redisplay the open sessions, minus the one you killed.
3.16 Monitoring
When you click Monitoring, a variety of network and console port information is available for viewing. The
screens are only for viewing and have no interactivity with the user. The following table shows the types of
information available.
Network - Shows Ethernet ports, Device Name, Status (enabled/disabled), IPv4 Address, IPv4 Mask and IPv6 Address (not available on all
Devices models).
Network - IPv4
Shows Destination, Gateway, Genmask, Flags, Metric, Ref, Use and lface.
Routing Table
Network - IPv6
Shows Destination, NextHop, Flags, Metric, Ref, Use and lface.
Routing Table
Shows Device Name, Profile, Settings, Signals, TX Bytes, RX Bytes, Frame Error, Parity Error, Break and Overrun. The Reset
Serial Ports
Counter button allows administrators to reset the statistic counters for selected ports.
Fips Mode Shows Service Name and Mode Indication.
Displays all the devices the user can access. Click on Serial Viewer in a device’s Action column to launch a terminal session
Access
with that device.
Power Management Click PDUs to turn on, turn off, cycle, reboot, reset the HW overcurrent protection, returnt to factory defaults or rename PDUs
PDUs Outlet Groups connected to the console server. Click Outlet Groups to manage groups of outlets on connected PDUs.
Change Password Change your own password.
General Information
CPU PPC440EPx @ 533 MHz (PowerPC with Security Acceleration Engine)
Memory 256 MB DDR-2 / 128 MB NAND Flash (embedded ICs on motherboard)
2 Ethernet 10/100/1000BT on RJ-45 1 RS232 Console on RJ-45 1 AUX RS232 on RJ-45 or internal MODEM V.92 on RJ-45 (RJ11
Interfaces
compatible) RS232 Serial Ports on RJ-45 1 USB 2.0 Host on Type A connector
Power Information
Power Supply Internal 100-240 VAC, 50/60 HzOptional Dual entry, redundant power supplies-48 VDC option available
Nominal voltage 120 VAC: Typical 0.17 A, 20 W Maximum 0.25 A, 30 W
Power
Nominal voltage 230 VAC: Typical 0.1 A, 23 W Maximum 0.15 A, 35 W
Consumption
Nominal voltage -48 VDC (20% tolerance) Typical 0.5 A
Ambient Atmospheric Condition Ratings
Operating
32 oF to 122 oF (0o C to 50o C)
Temperature
Storage
-4 oF to 158 oF (-20o C to 70o C)
Temperature
Humidity 20% to 80% relative humidity (non-condensing) across the operating temperature range
Dimensions
Height x Width
1.715 x 17.250 x 9.50 in (4.3561 x 43.815 x 24.13 cm)
x Depth
Weight 6-7 pounds (2.722- 3.175 kg) depending on the model
NOTE: Zero-touch provisioning is not supported for console servers running firmware versions prior
to 3.1.x.
Setting up the DHCP/TFTP/configuration files should take only a few minutes and will potentially save
hours of configuration time for console servers subsequently added to your network. After the
provisioning step is completed, console servers can be accessed individually for any post-provision
configuration desired (for example, assigning a static IP and a hostname).
With zero-touch provisioning, console servers can be automatically configured and upgraded after they
are booted and initialized. This helps facilitate the introduction and installation of the console server into
the existing network.
An administrator can view a log of zero-touch configurations by clicking Monitoring-Zero-touch Log from
the sidebar of the Expert tab.
NOTE: Parameters in the configuration file will apply to all console servers receiving the file. If you do
not want a parameter to apply to all console servers, for example a host name, make sure you comment
it out by entering a pound sign (#) in front of the parameter.
NOTE: It is recommended you store the setup file in the root folder if you're storing it on a TFTP server.
ONE_TIME_CONFIG=YES
FIRMWARE_VERSION=1.0.1
FIRMWARE_FILENAME=/var/tftp/acs6000/acs6000_1.0.1.bin
FIRMWARE_SERVER_IP=192.168.100.2
FIRMWARE_SERVER_USERNAME=<the required username>
FIRMWARE_SERVER_PASSWORD=<the required password>
FIRMWARE_SERVER_PROTOCOL=SFTP
PARAMETER DESCRIPTION
ONE_TIME_ When the parameter is set to Yes, the configuration file is retrieved by the console server on the initial boot; it is not sent on
CONFIG subsequent boots. When set to No, the configuration file is retrieved by the console server each time it is booted.
FIRMWARE_
The version of the firmware to be sent to the appliance.
VERSION
FIRMWARE_
The path and file name of the firmware.
FILENAME
FIRMWARE_
The IP address or hostname of the server hosting the firmware.
SERVER_IP
FIRMWARE_
SERVER_
USERNAME
If the firmware is hosted on a secure server, the credentials to access the server.
FIRMWARE_
SERVER_
PASSWORD
FIRMWARE_
SERVER_ The protocol of the server used to host the firmware. Supported protocols include tftp, ftp, stfp, scp and wget.
PROTOCOL
CONFIG_
The path and file name of the of the configuration file.
FILENAME
CONFIG_
The IP address or hostname of the server hosting the configuration file.
SERVER_IP
CONFIG_
SERVER_
USERNAME
If the configuration file is hosted on a secure server, the credentials to access the server. In most cases, the credentials will be
CONFIG_ required. The username is plain text, however the password must be encrypted.
SERVER_
PASSWORD
CONFIG_
SERVER_ The protocol of the server used to host the configuration file. Supported protocols include ftp, stfp, scp and wget.
PROTOCOL
Password encryption
An encrypted hash of a password should be created for the FIRMWARE_SERVER_PASSWORD or
CONFIG_SERVER_PASSWORD parameters. The hash needs to be generated from a Linux environment
running openSSL. Enter the following commands at a Linux command prompt or on a console server's
shell, as shown. Then enter the resulting hash password into the setup file for the defined server type.
Example: tftpd-hpa
Default TFTP root directory /var/lib/tftpboot
~$ sudo cp zerotouch.setup /var/lib/tftpboot
An administrator needs to configure two options. Option 66 defines the hostname or IP address of the
TFTP server where the setup file resides. Option 67 defines the name of the setup file (for example
acszero.cfg).
To configure Options 66 and 67:
1. Using the Windows Server Manager or DHCP tools snap-in Microsoft Management Console
(MMC), open your DHCP server console.
2. In the left panel of the DHCP server window, click IPv4.
3. Right-click on Server Options and click Configure Options to configure a global scope.
-or-
Right-click on Scope Options and click Configure Options to configure a single scope.
An administrator can use two additional DHCP options to filter zero-touch provisioning for select console
servers. Option 60 defines the vendor class, Avocent_ACS[[[Undefined variable Variables.16 - Model
Number]]]<serial number of the console server>. Option 61 defines the MAC address of the console server.
To create Options 60 and 61 (optional):
1. Using the Windows Server Manager or DHCP tools snap-in MMC, open your DHCP server
console.
2. In the left panel of the DHCP window, click IPv4.
3. From the tab bar, click Action, then click Set Predefined Options from the pull-down menu.
4. Under the Options Class, select DHCP Standard Options, then click Add.
5. Enter a name for the option in the Name field, select String from the Data type drop-down
menu, enter 060 in the Code field and enter a description for the option. Click OK.
6. Repeat step 5, entering 061 in the Code field.
DNS server
If the DNS scope option is not already defined on your DHCP server, and if the Option 66 entry is a
hostname instead of an IP address, you can configure the DNS server.
To configure the DNS server:
1. Using the Windows Server Manager or DHCP tools snap-in MMC, open your DHCP server
console.
2. In the left panel of the DHCP window, click IPv4.
3. Right-click on Server Options and click Configure Options.
4. Click Option 006 to define the DNS servers.
5. Enter the IP address in the appropriate field and click Add.
NOTE: If you enter the server name, the DNS server will resolve it.
Reservations
You can reserve IP addresses for each console server to be updated. A reservation is an IP address that
will be always be issued to a specified console server when it renews its DHCP lease.
To reserve an IP address:
1. Using the Windows® Server Manager or DHCP tools snap-in Microsoft® Management Console
(MMC), open your DHCP server console.
2. In the left panel of the DHCP window, click IPv4.
3. Right-click Reservations, then click New Reservation.
4. Enter a name for the reservation, the IP address to be assigned to the console server, the
MAC address for the console server and a description in the appropriate fields.
NOTE: The console server's MAC address can be found on the bottom of console server.
5. Under Supported types, use the radio button to select either Both or DHCP only.
6. Click Add. The reserved IP address will be displayed in the Reserve table.
The following ports in the DSView software can accept connections from the ACS6000 advanced console
server:
To ensure constant connectivity, a DSView server can be configured with an out of band (OOB) “back
door” that will allow it to call a console server via modem in the event of a network or Internet failure.
For this installation, the DSView server must be the central point of reception of both the packets leaving
the downloaded viewer and the console server. To ensure this, Proxy mode must be configured within the
DSView software. The viewer will then point to the DSView server (not the console server) to establish the
SSH connection. The DSView server would then route the packets by changing both the source and
destination IP addresses and act as a middle point of communication.
Under normal operating conditions, packets received from the Video Viewer would route through the
DSView server via Ethernet. In an error state, the DSView server would detect that the normal path to the
console server was interrupted and would dial out to the console server, pass authentication and establish
a PPP connection. Packets that would normally pass via Ethernet would instead be routed via PPP.
Because of the speed differences between Ethernet and dial-up, performance would be notably slower,
but still present. Multiuser connections would further degrade performance and are not recommended.
For this reason, dial-up backup is recommended as an emergency backup feature only.
-or-
For a modem attached to an auxiliary port, select Ports - Auxiliary Ports, then select the port.
Click Set Dial-In.
-or-
For an internal modem, select Ports - Auxiliary Ports and select the modem.
-or-
For a pluggable device modem, select Pluggable Devices, select the modem and click Save.
NOTE: The following step is only required if CHAP was selected in the PPP Auth Protocol field in the
DSView software Settings Dial-up window.
15. Log in to the CLI of the console server and access the Linux shell. Edit the /etc/ppp/chap-
secrets and add a line in the format, where the first column should have the PPP user and the
third column should have the PPP password as is shown in the following example:
pppuser * "ppppassword" *
Controlling the modem’s functions is done by using the “AT” commands. These commands are used to
instruct the modem to perform functions such as dialing or answering calls and are normally
automatically issued by communication software. However, for some applications, custom software may
have to be written due to the absence of a normal operating system.
The modem will automatically accept and process AT commands at most standard DTE (Data Terminal
Equipment) speeds and parity settings. For each command issued, the modem will respond with a result
code to inform you of the modem’s status. The format of a basic AT command and result code is as follows:
AT<Command><CR>
OK
AT = Attention.
OK = Result Code
ATDT7678900<CR> Instructs the modem to dial the number 7678900 and attempt to connect to the remote device.
ATS0=2<CR> Enables auto answer option. When the modem detects a ring, it will attempt to answer after two rings.
enforced or selected and dial tone is not detected, NO CARRIER will be reported instead of NO DIALTONE.
Enables monitoring of busy tones. Sends only OK, CONNECT, RING, NO CARRIER, ERROR, NO DIALTONE and CONNECT or
ATX3
CARRIER XXXX. If dial tone detection is enforced and dial tone is not detected, NO CARRIER will be reported.
ATX4 Enables monitoring of busy tones. Sends all messages (default).
ATZ0 Soft reset.
AT&C0 DCD remains on at all times.
AT&C1 DCD follows the state of the carrier (default).
AT&D0 Ignores DTR.
AT&D1 Enters the escape mode when ON-to-OFF transition is detected on DTR.
AT&D2 Hangs up, assumes command state and disables auto answer upon detecting ON-to-OFF transition of DTR (default).
AT&D3 ON-to-OFF transition causes the modem to perform a soft reset. It is the same as if an ATZ command is issued.
AT&F Restores factory configuration.
AT&G0 Disables guard tone (default).
AT&G1 Enables 550-Hz guard tone.
AT&G2 Enables 1800-Hz guard tone.
AT&K0 Disables flow control.
AT&K3 Enables RTS/CTS flow control (default for data modes).
AT&K4 Enables XON/XOFF flow control.
AT&K5 Supports transparent XON/XOFF flow control.
AT&P0 39/61 make/break ratio at 10 pulses per second (default).
AT&P1 33/67 make/break ratio at 10 pulses per second.
AT&P2 39/61 make/break ratio at 20 pulses per second.
AT&P3 33/67 make/break ratio at 20 pulses per second.
AT&Q0 Selects direct asynchronous operation.
AT&Q5 Modem will try an error-corrected link.
AT&Q6 Selects asynchronous operation in normal mode (allows speed buffering and flow control but no error correction).
Displays modem’s current configuration. When this command is entered, the modem will display its current command and register
AT&V
settings.
AT%C0 Disables data compression.
AT%C1 Enables MNP 5 data compression.
AT%C2 Enables V.42 bis data compression (sets S46 bit 1).
AT%C3 Enables V.42 bis and MNP 5 data compression (default).
AT%E0 Disables line quality monitor and auto-retrain.
AT%E1 Enables line quality monitor and auto-retrain.
AT%E2 Enables line quality monitor and fallback/fall-forward (default).
AT%L Line signal level. Returns a value that indicates the received signal level. Example, 009 = -9dBM.
Line signal quality. Reports line signal quality (DAA-dependent). Returns higher order byte of the EQM value. Based on EQM value,
AT%Q
retrain or fallback/fall-forward may be iniated if enabled with AT%E1 or AT%E2 commands.
AT+MS Select/force modulation.
If the line is in use and the modem receives an ATDT command to dial out, the modem will not go off hook
and will display the “LINE-IN-USE” result code. If the modem is off hook and the extension is picked up, the
modem will drop the connection and display the “OFF-HOOK INTRUSION” result code.
4.0.5 AT S registers
The S registers use the following format: ATSr=n<CR> where the “r” is the S register number and “n” is the
parameter to set it to. To read the current contents of an S register, issue an ATSr?<CR> command where
“r” is the register in question. The modem will then display the value of the S register.
S0 0-255 Rings 0 Ring to answer on. ATS0=1<CR> means answer call on first ring detected.
S1 0-255 Rings 0 Number of rings counted.
S2 0-127 ASCII 43 Escape code character.
S3 0-127 ASCII 13 Command terminator<CR>.
S4 0-127 ASCII 10 Line feed character.
S5 0-127 ASCII 8 Backspace character.
S6 2-255 Seconds 2 Wait time for dial-tone detection.
S7 1-255 Seconds 50 Wait time for carrier.
S8 0-255 Seconds 2 Pause time for coma in dial string.
S10 1-255 .1sec 14 Loss of carrier to hang up delay.
S11 50-255 .01sec 85 DTMF tone duration.
S12 0-127 1/50 sec 50 Escape code guard time.
S24 0-255 1sec 0 Sleep mode inactivity timer.
S29 0-255 10mS 70 Hook flash dial modifier time.
S30 0-255 10Sec 0 Inactivity disconnect timer.
S95 0 Result code control.
Resetting the modem’s power or toggling the Reset Line (Pin #12) will disconnect and put the modem
back into the OFF line state.
An ON to OFF transition of the DTR signal (Pin #4) will also disconnect the modem. If you use this method,
check to make sure that the DTR command is set to &D2 or &D3 and not forced (&D0).
The remote device can also cause the modem to disconnect. If the remote modem disconnects your
modem will automatically sense the loss of the carrier signal and return to the OFF line state.
The ATH or ATZ commands can also be used to disconnect a call. In order to issue a command to the
modem when it is On Line, the modem must be placed into the On Line Command State. This is
accomplished by issuing a special escape sequence. The default value of this three digit escape sequence
is the “+” character (see S2 to change). The “+++” is protected by a one-second delay before and after it is
sent (see S12 to change the time) When the modem detects the escape sequence, the OK result Result
OK
To view which countries are available in the modems firmware, enter AT+GCI=?<CR>.
The modem will display all of the possible two digit country codes available.
RING
DATE = 0513
TIME = 1346
The CID information can either be presented formatted as shown previously or unformatted. The +VCID
and +VRID commands control the modem CID option.