CommandCenter Secure Gateway ® CC-SG Administrator Guide Release 3.0 Copyright © 2006 Raritan, Inc.
This page intentionally left blank.
Copyright and Trademark Information This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc. © Copyright 2006 Raritan, CommandCenter, RaritanConsole, Dominion, and the Raritan company logo are trademarks or registered trademarks of Raritan, Inc. All rights reserved.
Safety Guidelines To avoid potentially fatal shock hazard and possible damage to Raritan equipment: • Do not use a 2-wire power cord in any product configuration. • Test AC outlets at your computer and monitor for proper polarity and grounding. • Use only with grounded outlets at both the computer and monitor. When using a backup UPS, power the computer, monitor and appliance off the supply.
CONTENTS i Contents Chapter 1: Introduction ....................................................................................................1 Prerequisites ..............................................................................................................................1 Intended Audience .....................................................................................................................1 Product Photos.......................................................................
ii CONTENTS Copy Device Configuration ..............................................................................................................57 Upgrade Device ...............................................................................................................................57 Ping Device .....................................................................................................................................58 Restart Device ....................................................
CONTENTS iii Edit Policy......................................................................................................................................111 Delete Policy..................................................................................................................................112 Chapter 9: Configuring Remote Authentication ........................................................113 Authentication and Authorization ..............................................................
iv CONTENTS Inactivity Timer Configuration ........................................................................................................164 Time/Date Configuration................................................................................................................165 Modem Configuration ....................................................................................................................166 Connection Mode..................................................................
CONTENTS v CC-SG & SNMP ............................................................................................................................234 CC-SG & CC-NOC ........................................................................................................................234 CC-SG Internal Ports.....................................................................................................................234 CC-SG Access via NAT-enabled Firewall........................................
vi FIGURES Figures Figure 1 CC-SG Front View ......................................................................................................................... 1 Figure 2 CC-SG - Rear Panel ...................................................................................................................... 1 Figure 3 Security Alert Window.................................................................................................................... 7 Figure 4 Login Window .....................
FIGURES Figure 52 Add Device Selection Screen .................................................................................................... 51 Figure 53 Add Device Screen for PowerStrip............................................................................................. 51 Figure 54 Add Device Screen for Raritan Devices..................................................................................... 52 Figure 55 Add Device Screen for iLO, RILOE.............................................
viii FIGURES Figure 105 Configure Ports Screen for IPMI Server................................................................................... 84 Figure 106 Configure Outlet Port Screen ................................................................................................... 85 Figure 107 Delete Port Screen................................................................................................................... 86 Figure 108 Bulk Copy Screen ..........................................
FIGURES Figure 158 Generate Certificate Signing Request Screen ....................................................................... 132 Figure 159 Certificate Request Generated............................................................................................... 132 Figure 160 Generate Self Signed Certificate Window.............................................................................. 133 Figure 161 Security Manager IP-ACL Screen ..........................................................
x FIGURES Figure 211 Configuration Settings Device Settings Screen...................................................................... 174 Figure 212 Configuration Settings Device Settings Screen...................................................................... 175 Figure 213 Security Manager General Screen......................................................................................... 176 Figure 214 Lockout Settings ..........................................................................
FIGURES Figure 264 Selecting Network Interface Configuration............................................................................. 209 Figure 265 Editing Network Interfaces ..................................................................................................... 210 Figure 266 Pinging a Target..................................................................................................................... 211 Figure 267 Performing Traceroute on a Target.................................
CHAPTER 1: INTRODUCTION 1 Chapter 1: Introduction Congratulations on your purchase of CommandCenter Secure Gateway (CC-SG), Raritan’s convenient and secure method for managing various UNIX servers, firewalls, routers, load balancers, Power Management devices, and Windows servers. CC-SG provides central management and administration, using a set of serial and KVM appliances.
2 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Product Features and Benefits • • • • • • Seamless Management CC-SG offers seamless management of Dominion series and Paragon® management appliances through Paragon remote User Stations (UST1R/UST2R) – leverage your embedded base with a CC-SG to draw substantial incremental value: − Constantly updated to keep up with changing needs. − Streamlines, provides wider process focus and offers productivity improvements, organization wide.
CHAPTER 1: INTRODUCTION • • • • • • • • 3 Comprehensive Logging − Logs events locally. − Can use an external syslog server for event logs (events are immediately posted or exported) and the ability to have other Raritan products use it as a syslog server. − Provides full auditing and tracking capabilities. − Keeps an audit trail for tracking user activity. Support for SNMP Agents and Traps − Provides SNMP GET/SET operations with third-party enterprise Management Solutions, such as HP OpenView.
4 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE • CIM (Computer Interface Module)—is the hardware used to connect a target server and a Raritan device. Each target requires a CIM, except for the Dominion KX101 which is attached directly to one target and therefore, does not require a CIM. Targets servers should be powered on and connected to CIMs and CIMs should be connected to the Raritan Device BEFORE adding the ports in CC-SG. Otherwise, the blank CIM name will overwrite the CCSG port name.
CHAPTER 1: INTRODUCTION • • • • • 5 Ports—are connection points between a Raritan Device and a target system or server. Or, a port can be a device that is directly connected to a LAN/CC-SG via In-band access. In CCSG, you click on a port to access and manage the target. The port is essentially the destination system and should be named appropriately for that system, for example, NYC_SunSRV1. SASL—(Simple Authentication and Security Layer).
6 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE New 3.0 Features These administrator features are now available in CC-SG 3.0: Note: If viewing a PDF file, click on the page number to navigate to the location in the document where the feature is described.
CHAPTER 2: ACCESSING CC-SG 7 Chapter 2: Accessing CC-SG Once you have configured CC-SG with an IP address and have defined at least one user, as described in Raritan’s CommandCenter Secure Gateway Setup Guide, the CC-SG unit can be placed at its final destination. Make all necessary hardware connections to make the unit operational.
8 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. You will be warned if you are using an unsupported Java Runtime Environment version on your machine. From the window that pops up, select whether you will download the correct JRE version from the CC-SG server (if available), download it from the Sun Microsystems web site, or continue with the incorrect version, and click OK. The Login window appears. Figure 4 Login Window 3. Type your Username and Password and click Login. 4.
CHAPTER 2: ACCESSING CC-SG 9 Standalone Client Access The standalone CC-SG client allows you to connect to CC-SG servers by launching a Java application instead of running an applet through a Web browser. 1. Install the standalone CC-SG client located on the included CD ROM onto your PC. 2. Double-click on the CC Application icon on your desktop to launch the CC-SG client. An address specification window appears. Figure 6 IP Specification Window 3.
10 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 3. Click Update Configuration to submit the changes. A confirmation window asks if you wish to restart CC-SG in order to apply changes. 4. Click OK to log out from your current session and restart CC-SG. 5. Access CC-SG using the new IP address. Check and Upgrade CC-SG Firmware Version Note: Before you can upgrade CC-SG, you must be in Maintenance Mode. See section Maintenance Mode in Chapter 11: System Maintenance for additional information. 1. 2. 3.
CHAPTER 2: ACCESSING CC-SG 11 2. Select an application from the pull-down menu and note the number in the version field. If the firmware needs upgrading, see the previous section Check and Upgrade CC-SG Firmware Version and continue to step 3. 3. Select the application name that needs to be upgraded. 4. Click Browse. Figure 10 CC-SG Application Search Window 5. Click on the Look In drop-down menu and navigate to locate the application on your PC where the new firmware resides.
12 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE To access a remote target device that is connected via a serial port, click on the appropriate device in the Devices selection tree, under the Devices tab. If the port is configured for a console application, a Security Warning appears, indicating that the console applet is a signed applet from Raritan Systems. Click Yes and the console port appears.
CHAPTER 2: ACCESSING CC-SG 13 Power Down CC-SG If running CC-SG on the V1 platform and if it loses AC power while it is up and running, the V1 unit remembers its last power state. Once AC power is restored, the V1 unit automatically reboots. However, if a V1 unit loses AC power when it is turned OFF, the V1 unit will remain powered off when AC power is restored. Important: Do not hold the POWER button for four or more seconds to forcibly power down CC-SG, particularly when CC-SG is up and running.
14 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Note: To make ports easier to find, right-click on the tree and select the desired listing method under Port Sorting Options. Ports sorted by name will be listed alphabetically; ports sorted by status will be grouped in the order of: Available Ports, Busy Ports, Unavailable Ports, and listed alphabetically within each group. On the Devices tab, devices are sorted and their respective ports are sorted underneath. 4.
CHAPTER 2: ACCESSING CC-SG 15 Main Window Components Menu Bar (Operation and Configuration commands) Toolbar (shortcuts for commands) Selection tabs (Ports, Users, and Devices) Screen Display Area Selection tree (expandable / collapsible using + and – signs) Figure 13 CC-SG Application Window The CC-SG menu bar displays all operations and configuration commands. Active commands are based upon the privileges of the user, as established by the CC-SG Administrator.
16 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Configuring CC-SG Manager Components In order to use CC-SG effectively, you must complete the following configuration steps, as described in this and the next chapter: • Configure and install Dominion series and IP-Reach appliances (both serial and KVM devices). − Configure the devices and establish them on your network. − Load and associate customized applications for serial ports. − Load and associate customized applications for KVM ports.
CHAPTER 2: ACCESSING CC-SG 17 Compatibility Matrix The Compatibility Matrix lists the firmware versions of Raritan devices and software versions of applications that are compatible with the current version of CC-SG. To view the Compatibility Matrix, on the Devices menu, click Compatibility Matrix. Figure 14 Compatibility Matrix CC-SG checks against this data whenever you add a device, upgrade device firmware, or select an application for use.
18 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 19 Chapter 3: Example Configuration Workflow Create Associations The Association Wizard guides you through steps to create categories and their associated elements. The Wizard then automatically creates a port group for each element and a policy for each port group. 1. On the Associations menu, click Association Wizard. The Association Wizard screen appears.
20 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. After reading the overview, click Next. The Create Category and Elements screen of the Wizard appears. Figure 16 Association Wizard - Category and Elements Screen 3. Type the name of a category you wish to organize your ports by (for example: Location) in the Category field. 4. Type the name of each element in that category in the Elements fields below.
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 21 5. To create another category, click Add Another Category and repeat steps 3 and 4. To review categories and elements you have created, click Previous or Next to cycle through them. Figure 17 Adding Another Category 6. When you are done creating categories, click Next at the bottom of the screen. The Confirm Choices screen of the Wizard appears. Figure 18 Association Wizard - Confirm Choices 7.
22 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 8. CC-SG will show a progress bar while it is creating the associations, port groups and policies. When this is complete, the Association Wizard Summary screen appears displaying the list what was created. Click Done to exit the wizard. Figure 19 Association Wizard - Summary Screen The Association Wizard has now created a port group for each element, and a policy for each port group.
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 23 4. Click Next to proceed. The Add Device description screen appears. Depending on the type of device you selected, you will see slightly different Add Device screens. Figure 21 Add Device PowerStrip Figure 22 Add Device SX 5. Type the device name in the Device Name field. Do not use spaces. 6. Type the device description in the Description field. 7.
24 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Device Created successfully message confirms that device has been added. This step is very important. Make sure you select the correct associations and elements for the device. Some devices such as SX may take up to a minute to add. 9. Repeat steps 1 through 8 to add additional devices. Configure Ports You must now add ports for each device you just added. The port is the connection to the actual target system or server.
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 25 3. Click Configure next to the serial port line item you wish to configure. The Configure Serial Port screen appears. Figure 24 Configure Serial Ports 4. Type a port name in Port Name field. Typically, you should name the port after the target server the device connects to, for example, NYC_MsSrv1. 5. Click on the Application Name drop-down menu and select an application name.
26 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE KVM Port 1. Click on the Devices tab and select a KVM device, for example, Dominion KX, from the Devices tree. 2. On the Devices menu, click Port Manager, and then click Configure Ports. Alternatively, you can right-click on the device and select Configure Ports. The Configure Ports screen appears. Figure 25 Configure Ports 3. Click Configure next to the KVM port line item you wish to configure. The Configure KVM Port screen appears.
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 27 5. Click on the Application Name drop-down menu and select name. This application, for example, Raritan Remote Console (RRC), is used to manage the target system. All ports should use RRC except for those on an SX. 6. Select the associated category and element from the Port Associations table by doubleclicking the element field. 7. Click OK to save the KVM port configuration. A Port Configured Successfully message confirms that port has been created. 8.
28 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 5. If using local authentication, type the new password into the Password field (6-16 characters, alphanumeric characters and underscores). 6. If using local authentication, re-type password in Retype Password field. 7. Type a dial back number in the Dial Back Number field, if needed. 8. Check the Login Enabled check box to authenticate against the system (if not, user cannot enter the system). 9.
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 29 2. On the Users menu, click Add User Group. Alternatively, right-click on a user group and select Add User Group. The Add User Group screen appears. Figure 28 Add User Group Screen 3. Type the group name in the User Group Name field (1-16 characters, alphanumeric characters and underscores). 4. Type the group description (for example, based on department, region, or assignment) in the Description field. 5.
30 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Create/Edit Port Groups CC-SG uses port groups to control user access. Policies can be applied to specific user groups that allow only access to those ports specified in the port group. For example, if you wanted to restrict user access to only UNIX ports, you would create a port group that included only UNIX ports. Then you would create a policy that included this port group and apply it to the desired user group.
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 31 6. If needed, enter the Boolean logic to apply additional rules in the Validate panel. Example: use (Rule0 & Rule1) for AND or use (Rule0 | Rule1) for OR. Additional combinations can be used. 7. Click Validate then Update. 8. Click Close to close Port Groups Manager screen. 9. Repeat steps 1 through 8 to add other port groups. Create/Edit Policies Polices specify the devices and ports a user can access as well as when they can be accessed.
32 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Sundays, and Custom to manually choose the days policy to be applied. If you choose Custom, check on the days of the week to apply the policy. 9. Click on a Permission value to select a permission type: Deny, or Control. 10. Click Update to add the policy. The Update Policy window appears. Figure 32 Update Policy Window 11. Click Yes to add the policy or No to close the window. 12. Click Close to close the Policy Manager screen. 13.
CHAPTER 3: EXAMPLE CONFIGURATION WORKFLOW 33 6. Click OK to add the policy or policies to the group. A Group Policies Updated successfully message confirms that policies have been updated. 7. Repeat steps 1 through 6 to edit other groups’ policies. Add Users to User Group You now need to add users or drag and drop an existing user to the user group that has just been assigned a policy.
34 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 12. Type an email address for this user in the Email Address field, if desired. 13. Click OK to add this user to the system. A User Created successfully message indicates the user has been added to the system. 14. Drag the new user icon to the desired user group. 15. Repeat steps 1 through 14 to add additional users.
CHAPTER 4: CREATING ASSOCIATIONS 35 Chapter 4: Creating Associations Associations CC-SG provides powerful, highly customizable organizational capabilities. Associations provide this organizational capability and are used to organize your equipment. For example, you may have Raritan devices that manage target servers in a New York data center and a Philadelphia data center. Associations help in grouping and displaying Raritan device and target systems in the CC-SG web interface.
36 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Other examples of typical Association configurations of Category and Elements are as follows: CATEGORY ELEMENTS Location New York City, Philadelphia, DC1 OS Type Unix, Windows, Linux Department Sales, IT, Engineering Port Type KVM, Serial, Power Association configurations should be kept simple to accomplish server/port organizational objectives and user access objectives.
CHAPTER 4: CREATING ASSOCIATIONS • • 37 Devices—are Raritan products such as Dominion KX116, Dominion SX48, Dominion KSX440, IP-Reach, Paragon II System Controller, Paragon II UMT832 with USTIP, etc. that are managed by CC-SG. These devices control the target servers and systems that are connected to them. Ports—are connection points between a Raritan Device and a target system or server. Or, a port can be a device that is directly connected to a LAN/CC-SG via In-band access.
38 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Add Category 1. On the Associations menu, click Association Manager. The Association Manager screen appears. Figure 36 Association Manager Screen 2. Click Add in the Category panel to add a new category. The Add Category window appears. Figure 37 Add Category Window 3. Type a category name in the Category Name field. Maximum length is 31 characters. 4. Click on the Value Type drop-down arrow to select a value type of String or Integer. 5.
CHAPTER 4: CREATING ASSOCIATIONS 39 Edit Category 1. On the Associations menu, click Association Manager. The Association Manager screen appears. 2. Click on the Category Name drop-down arrow and select the category to be edited. 3. Click Edit in the Category panel of the screen to edit the category. The Edit Category window appears. Figure 38 Edit Category Window 4. Type the new category name in Category Name field. 5.
40 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Add Element 1. On the Associations menu, click Association Manager. The Associations Manager screen appears. Figure 40 Association Manager Screen 2. Click Add in the Element for Category panel to add a new element. The Add Element window appears. Figure 41 Add Element Window 3. Type the new element name in the Enter Value for Element field. 4. Click OK to add the element or Cancel to exit the window.
CHAPTER 4: CREATING ASSOCIATIONS 41 Edit Element 1. On the Associations menu, click Association Manager. The Association Manager screen appears. 2. Select the element to be edited from the Element For Category list and click Edit in the Elements For Category panel. The Edit Element window appears. Figure 42 Edit Element Window 3. Type the new name of the element in the Enter New Value for Element field. 4. Click OK to update the element or Cancel to close the window.
42 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Association Wizard The Association Wizard guides you through steps to create categories and their associated elements, as described in the Association Manager section above, then automates the creation of related Port Groups and Policies for those elements. 1. On the Associations menu, click Association Wizard. The Association Wizard screen appears. Figure 44 Association Wizard Overview 2. After reading the overview, click Next.
CHAPTER 4: CREATING ASSOCIATIONS 43 5. If you wish to create another category, click Add Another Category and repeat steps 3 and 4. Figure 46 Adding Another Category 6. When you are done creating categories, click Next at the bottom of the screen. The Confirm Choices screen of the Wizard appears. Figure 47 Association Wizard - Confirm Choices 7. Review the list of categories and associated elements that will be created. Click Previous if you need to go back and make changes.
44 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 8. CC-SG will show a progress bar while it is creating the associations, port groups and policies. When this is complete, the Association Wizard Summary screen appears displaying the list what was created. Click Done to exit the wizard. Figure 48 Association Wizard - Summary Screen 9. The Association Wizard has now created a port group for each element, and a policy for each port group.
CHAPTER 4: CREATING ASSOCIATIONS 45 Import Categories, Devices, Ports from CSV File To expedite configuration, you can import pre-defined categories, elements of those categories, and the ports and devices to which the categories apply from a CSV file. After importing, you can have CC-SG validate the file to ensure the file was formatted properly. If errors are discovered, they are displayed.
46 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE CSV File Format The entries in the CSV file are case-sensitive and each row in the CSV file has this format: {tag},{value}[,{value},….
CHAPTER 4: CREATING ASSOCIATIONS 47 Once successfully imported, you should see something like: Figure 50 Analysis Report Screen If necessary, refer to Appendix F: Troubleshooting for problem resolution.
48 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 49 Chapter 5: Adding Devices and Device Groups Device Manager Device Manager commands allow you to configure Dominion series and IP-Reach units and their individual ports. From a CC-SG perspective, connection to a remote target device is made via a serial or KVM port. You can configure the system on a port-by-port basis in order to easily access remote target devices.
50 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Device Icons ICON MEANING Device available Port available KVM port connected – in current user session Port paused – because device is paused Port unavailable – because device is unavailable Port busy – other user connected to port Serial port available – not connected Serial port connected – in current user session Serial port busy – other user connected to port Serial port unavailable – device is down and unavailable Serial port paused – because devi
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 51 Add Device Use this command to add a new device to the system. 1. Click on the Devices tab. 2. On the Devices menu, click Device Manager, and then click Add Device. The Add Device selection screen appears. Figure 52 Add Device Selection Screen 3. Click on the Device Type drop-down arrow and select a type of device from the list. 4. Click Next to proceed. The Add Device description screen appears.
52 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Figure 54 Add Device Screen for Raritan Devices Figure 55 Add Device Screen for iLO, RILOE
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 53 Figure 56 Add Device Screen for IPMI Server (v 1.5) Figure 57 Add Device Screen for Generic Device 5. Type the new device name in the Device name field. 6. Type the IP Address or Hostname of the new device in the Device IP or Hostname field. For hostname rules, see Terminology/Acronyms in Chapter 1: Introduction. 7. The TCP/UDP port number value will be populated automatically based on the device type.
54 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE KX Devices with Encryption CC-SG supports adding and managing Dominion KX devices, such as KX101, that have been configured with: • SSL authentication and no data encryption • SSL authentication and data encryption • SSL authentication and SSL data encryption • No authentication and no encryption Refer to Raritan’s Dominion KX User Guide for definitions of these encryption modes.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 55 Delete Device 1. Click on the Devices tab and select a device from Devices tree. 2. On the Devices menu, click Device Manager, and then click Delete Device. The Delete Device screen appears. Figure 59 Delete Device Screen 3. Click OK to delete the device or Cancel to exit without deleting. A Device Deleted Successfully message confirms that the device has been deleted. 4. Repeat steps 1 through 3 to delete other devices.
56 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Backup Device Configuration Use this command to back up all user configuration and system configuration files. If anything happens to your system, you can restore your previous configurations from memory. Note: Only for Dominion SX 2.5 devices or later, network settings, such as IP address, subnet mask, IP gateway are not included in the backup file. 1. Click on the Devices tab and select a device from the Devices tree. 2.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 57 Copy Device Configuration This command allows you to copy configurations from one device to another or multiple devices. Note: Configuration can only be copied between Dominion SX units and DSX units that have the same number of ports. 1. Click on the Devices tab and select the device whose configuration you wish to copy to other devices from the Devices tree. 2. On the Devices menu, click Device Manager, and then click Copy Device Configuration.
58 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE If the firmware version of the device is not compatible with CC-SG, a message will alert you and ask if you want to proceed (please see Chapter 2: Accessing CC-SG for additional information). Click Yes to upgrade the device, or No to cancel the operation. 5. A Restart message appears; click Yes to restart the device or No to close the window without restarting. 6. A Device Upgraded Successfully message confirms that the device has been upgraded. 7.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 59 Pause Device You can pause a device to temporarily suspend CC-SG’s control of it without losing any of the configuration data stored within the CC-SG Server. 1. Click on the Devices tab and select a device from the Devices tree. 2. On the Devices menu, click Device Manager, and then click Pause Management. The indicator of the device being paused is its icon changing from a grey ‘active’ state to a red ‘paused’ state in the Devices tree.
60 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Custom View You can customize the Devices tree by organizing devices to appear in a particular format. You might want to view devices by Country, by Time Zone, or by any other option that helps you differentiate between them. Set up a Custom View using the next few sessions. Please also see section Association Manager in Chapter 4: Creating Associations for more details on adding Categories to CC-SG. 1. Click on the Devices tab. 2.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 61 Add Custom View 1. Click on the Devices tab. 2. On the Devices menu, click Change View, and then click Custom View. The Custom View screen appears. 3. In the Custom View panel, click Add. An Add Custom View window appears. Figure 69 Add Custom View Window 4. Type a new custom view name and click OK or click Cancel to close the window. The new view name appears in the Name field. 5.
62 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 5. In the Custom View Details panel, click on the drop-down arrow at the bottom of the panel. This list contains categories that you can use to filter custom views. Select a detail from the drop-down list and click Add to add the detail to the Custom View Details panel. Select as many details as needed. 6.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 63 Topological View Use the Topological View command to view the structural setup of all the connected appliances in your configuration. 1. Click on the Devices tab and select a device from the Devices tree. 2. On the Devices menu, click Topological View. The Topological View for the selected device appears. Figure 73 Topological View Screen 3.
64 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Special Access to Paragon II System Devices Paragon II System Controller (P2-SC) Paragon II System Integration users can add their P2-SC devices to the CC-SG Devices tree and configure them via the P2-SC Admin application from within CC-SG. For more detailed directions on using P2-SC Admin, please see Raritan’s Paragon II System Controller User Guide.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 65 IP-Reach and UST-IP Administration You can also perform administrative diagnostics on IP-Reach and UST-IP devices connected to your Paragon System setup directly from the CC-SG interface. After adding the Paragon System device to CC-SG, it appears in the Devices tree. Right-click on the device icon in the Devices tree and select Remote User Station Admin. The Remote User Station Admin screen appears, listing all connected IP-Reach and UST-IP units.
66 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Device Power Manager Before using the Device Power Manager view, make a physical connection of a PowerStrip to a Dominion SX or Dominion KSX unit. When you add the PowerStrip device, define this connection in CC-SG. Once the PowerStrip is added, you can associate it with the Dominion SX serial ports or with Dominion KSX dedicated power ports.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 67 Discover Devices Use this command to initiate a search for all devices on your system. The search will automatically detect all newly attached, and previously existing Raritan devices on your network, including Paragon, P2-SC, IP-Reach, Dominion KX, Dominion KSX units, IPMI servers, and CC-SGs. After locating the devices, you may connect them to your CC-SG system if they are not already connected.
68 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 7. Select a device from the list and click Add to add the device to CC-SG or click Close to exit without adding the device. If you clicked Add, the Add Device screen appears. Figure 81 Add Device Screen Type the user name and password (that were created specifically for CC-SG in the device) in the Username and Password fields to allow CC-SG to authenticate the device when communicating with it in the future.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 69 Device Group Manager Use the Device Groups Manager screen to add, edit, assign, and remove device groups and the rules that govern them. First add a Device Group, then add a Device Rule(s) to make working with and viewing devices easier. Add Device Group 1. On the Associations menu, click Groups Manager, and then click Device Group Manager. The Device Group Manager screen appears. Figure 82 Device Groups Manager Screen 2. Click Add in the Groups panel.
70 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Edit Device Group Name 1. On the Associations menu, click Groups Manager, and then click Device Group Manager. The Device Group Manager screen appears. Figure 84 Device Groups Manager Screen 2. Click on the Groups drop-down arrow and select the group to be edited from the list. Click Edit and the Edit Device Group window appears. Figure 85 Edit Device Group Window 3. Type the new name for the device group in the Enter New Name for Device Group field.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 71 Delete Device Group 1. On the Associations menu, click Groups Manager, and then click Device Group Manager. The Device Groups Manager screen appears. Figure 86 Device Groups Manager Screen 2. Click on the Group Names drop down arrow and select the device group to be deleted. Click Delete and the Delete Device Group window appears. Figure 87 Delete Device Group Window 3. Click Yes to delete the group or No to Cancel and close the window. 4.
72 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Important: You can combine the application of two or more rules by using operators such as ‘&’ meaning ‘and’ or ‘ ⎜’ (vertical bar that shares the <\> key on your keyboard) meaning ‘or.’ Note: When you select a category, make sure you select a proper operator that relates to the element in order for the rule to take effect.
CHAPTER 5: ADDING DEVICES AND DEVICE GROUPS 73 Search for Devices CC-SG can search for a device name that satisfies the text entered in the search box. Searches are case-insensitive. 1. Click on the Devices tab. Figure 91 Search for Devices 2. At the bottom of the window, enter a search string in Search For Device. 3. Click Go or press ENTER. Navigation Tips • • • When a device has been found and is highlighted in the Devices tree, use the ↓ and ↑ keys to navigate to the next device.
74 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Examples are as follows: EXAMPLE DESCRIPTION KX? Locates KX1, and KXZ, but not KX1Z. KX* Locates KX1, KX, KX1, and KX1Z. KX[0-9][0-9]T Locates KX95T, KX66T, but not KXZ and KX5PT. Disconnect Users Administrators can terminate any user's session with a device.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 75 Chapter 6: Configuring Ports and Port Groups This chapter discusses how to configure and edit ports and port groups. Procedures on how to use ports (connect, disconnect, bookmark ports, search for ports, create views, use port power management, use port chat) are described in Raritan’s CommandCenter Secure Gateway User Guide.
76 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE When you click on the Ports tab, the Ports tree displays information about the Ports connected with CC-SG. Clicking on a port causes the View Port screen to appear. Ports are arranged alphabetically by name, or grouped by availability status. Ports arranged by status are sorted alphabetically within their availability grouping.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 77 Port Icons For easier identification, different ports have different icons in the tree. In addition, availability status of each port also has a different icon. For a description of what the icons represent, please see the table below. ICON MEANING Device available Port available Ghosted Port – a ghosted port can occur when managing Paragon devices and when a CIM or target server is removed from the system or powered off but a record of it remains.
78 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Configure Port Configure a Serial Port Click on the Devices tab and select a serial device from the Devices tree. 1. On the Devices menu, click Port Manager, and then click Configure Ports. The Configure Ports screen appears. Figure 94 Configure Ports Screen 2. To make ports easier to find, click on a column header to sort the ports by that attribute in ascending order. Click on the header again to sort the ports in descending order.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 79 3. Click the Configure button that corresponds to the serial port line item you wish to configure. The Configure Serial Port screen appears. Figure 95 Configure Serial Ports Screen 4. Type a port name in Port Name field. For ease of use, you should name the port after the server that is connected to the port. 5. Click on the Application Name drop-down arrow and select an application name. 6. Click on the Baud Rate drop-down arrow and select a rate. 7.
80 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 11. Click In-Band Parameters if you want to allow in-band access for this Serial port. Figure 97 In-Band Parameters 12. Click on the In-band application drop-down arrow and select either RemoteDesktop Viewer, SSH Client, VNC Viewer.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 81 Configure a KVM Port 1. Click on the Devices tab and select a KVM device from the Devices tree. 2. On the Devices menu, click Port Manager, and then click Configure Ports. The Configure Ports screen appears. Figure 98 Configure Ports Screen 3. To make ports easier to find, click on a column header to sort the ports by that attribute in ascending order. Click on the header again to sort the ports in descending order. 4.
82 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 5. Type a port name in the Port Name field. For ease of use, you should name the port after the server that is connected to the port. 6. Click on the Application Name drop-down arrow and either use the default application as configured in Application Manager or select another application if desired. 7. Select the associated category and element from the Port Associations table. 8.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 83 Configure a Generic Port with In-Band Access In-band access to Generic devices, such as hubs, Windows servers, CISCO routers, can be managed with one of these in-band applications: • Windows Remote Desktop (RDP) • Secure Shell (SSH) • Virtual Network Computer (VNC) 1. Click on the Devices tab and select a Generic device from the Devices tree. 2. On the Devices menu, click Port Manager, and then click Configure Ports. The Configure Ports screen appears.
84 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 7. Type a Target Username that the application will use as a Start-up parameter. If a target name is supplied, then only a password is required when accessing a target. 8. Select the associated category and element from the Port Associations table. 9. Click OK to configure the Generic port or Cancel to exit with configuring. A Port Configured Successfully message confirms that port has been created. 10.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 85 3. Click the Configure button that corresponds to the outlet port line item you wish to configure. A Configure Outlet Port screen appears. Figure 106 Configure Outlet Port Screen 4. Type the port name in the Port Name field. For ease of use, you should name the port after the server that is connected to the port. 5. If you want to associate this port with another port, click on the Associated Port drop-down arrow and select a port name.
86 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Delete Ports Delete a port to remove the port entry from the Ports tree and Cancel all accessibility of the remote target device. 1. Click on the Ports tab and select a port to be deleted. 2. On the Devices menu, click Port Manager, and then click Delete Port. The Delete Port screen appears. Figure 107 Delete Port Screen 3. Click OK to delete the port or Cancel to exit without deleting.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 87 Bulk Copy To save time, use the Bulk Copy command to duplicate Port names or associations to other ports. 1. Click on the Ports tab and select a port whose data you want to copy to another. 2. On the Ports menu, click Bulk Copy. The Bulk Copy screen appears. Figure 108 Bulk Copy Screen 3. In the All Ports list select the port name(s) that will be adopting the profile of the port listed in the Port Name field above. 4.
88 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Edit Port Edit a Serial Port 1. Click on the Ports tab and select a serial port to be edited. 2. On the Ports menu, click Edit Port. The Edit Serial Port screen appears. Figure 109 Edit Serial Port Screen 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Type the new port name in the Port Name field. Click on the Application Name drop-down arrow and select a new application name. Click on the Baud Rate drop-down arrow and select a new rate.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 89 Edit a KVM Port 1. Click on the Ports tab and select a KVM port to be edited. 2. On the Ports menu, click Edit Port. The Edit KVM Port screen appears. Figure 110 Edit KVM Port Screen 3. 4. 5. 6. Type a new port name in the Port Name field. Click on the Application Name drop-down arrow and select an application from the list. Select a new category and element from the Port Associations table.
90 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Edit a Generic Port 1. Click on the Ports tab and select a Generic port to be edited. 2. On the Ports menu, click Edit Port. The Edit Generic Port screen appears. Figure 111 Edit Generic Port Screen 3. Type a new port name in the Port Name field. 4. Click on the In-band application name drop-down arrow and select an application from the list. 5. Type a new port number in the TCP port number field. 6. Type a new username in the Target Username field. 7.
CHAPTER 6: CONFIGURING PORTS AND PORT GROUPS 91 Port Group Manager Add Port Group 1. On the Associations menu, click Groups Manager and then click Port Group Manager. The Port Groups Manager screen appears. Figure 112 Port Groups Manager Screen 2. Click Add in the Group panel to add a new group. The Add Port Group window appears. Figure 113 Add Port Group Window 3. 4. 5. 6. Type the name for the new Port Group in the Enter Name for Port Group field.
92 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Edit Port Group 1. On the Associations menu, click Groups Manager and then click Port Group Manager. The Port Groups Manager screen appears. 2. Click on the Group Name drop-down arrow and select a group to edit. Click Edit in the Group panel. The Edit Port Group window appears. Figure 114 Edit Port Group Window 3. 4. 5. 6. Type a new name for the group in the Enter New Name for Port Group field.
CHAPTER 7: ADDING USERS AND USER GROUPS 93 Chapter 7: Adding Users and User Groups User Manager commands are listed in the Users menu and allow you to define the CC-SG user list and assign user privileges for performing various functions. CC-SG maintains a centralized user access list. Only an Administrator (a user with Administrator privileges) can manage user accounts.
94 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 8. Check the Force Change Password on Next Login check box if you want this user to be forced to change password the next time he or she logs in to CC-SG. 9. Check the Force Change Password Periodically check box if you want this user to have to change his or her password from time to time. Either type the expiration period (in days) for this user’s password in the Expiration Period field or select a date in Expiration Date.
CHAPTER 7: ADDING USERS AND USER GROUPS 95 5. Check the Force Change Password Periodically check box if you want this user to have to change his or her password from time to time and specify an expiration period for this user’s password in the Expiration Period field. 6. Check the Force strong password check checkbox if you want to enforce strong passwords for this user–see Strong Password Rules in Chapter 12: Advanced Administration for additional information. 7. Type an email address for the user. 8.
96 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. 3. 4. 5. Type your old password in the Old Password field. Type your new password in the Password field. You cannot re-use your old password. Re-type your password in the Retype Password field. Click OK to change your password or Cancel to exit without saving. A User Profile Updated Successfully message confirms that your password has been changed. 6. Repeat steps 1 through 4 to change your password whenever necessary.
CHAPTER 7: ADDING USERS AND USER GROUPS 97 Logoff User(s) Use this command to disconnect any logged-in user from CC-SG. 1. Click on the Users tab and select a user from the Users tree. Note: To select more than one user, hold the CTRL key and click on additional users. 2. On the Users menu, click Logoff User(s). The Logoff Users screen appears. Figure 121 Logoff Users Screen 3. Click OK to disconnect the users or Cancel to exit without disconnecting users.
98 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Bulk Copy To save time, use the Bulk Copy command to duplicate user profiles or port assignments when creating new users. 1. Click on the Users tab and select a user from the Users tree whose properties you want to copy to another user(s). 2. On the Users menu, click Bulk Copy. The Bulk Copy screen appears. Figure 122 Bulk Copy Screen 3.
CHAPTER 7: ADDING USERS AND USER GROUPS 99 Add User to Group To manage users with similar privileges, you can assign them to groups. When you add a user to any group, you are assigning the group’s privileges to that user (please see the section Add User Group in this chapter for more information about groups). 1. Click on the Users tab and select a group (the Group icon displays multiple people and a User icon displays a single person). 2. On the Users menu, click Add User To Group.
100 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Add User Group Use the Add User Group command to create specific groups and assign them different privileges, depending on the needs of your work environment. Groups can help you keep your system organized. Assign privileges, or features, to Groups upon creating them. These Select Privileges are privileges of either a command type or an event type. Command type privileges permit users to see and execute commands.
CHAPTER 7: ADDING USERS AND USER GROUPS 101 Edit User Group This command allows you to rename group and modify its Features. Important: Please remember that you must be an Administrator to modify User Groups. The category Users Not In Group cannot be modified. Members of that group have observation rights only. 1. Click on the Users tab and select a group. 2. On the Users menu, click Edit User Group. The Edit User Group screen appears. Figure 126 Edit User Group Screen 3.
102 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Apply (Edit) User Group Policies Groups can be assigned policies, or permissions, that allow them to view and/or control devices and ports. Depending on which policies are assigned to them, groups might have: No Rights, Some Rights, Control Rights, or Full Administration Rights. Policies can be set up using Policy Manager commands, as described in the section Policy Manager, later in this chapter. 1. Click on the Users tab and select a group. 2.
CHAPTER 7: ADDING USERS AND USER GROUPS 103 Delete User Group This command allows you to remove a group name from the system. Users from the deleted group will be re-assigned to the category Users Not In Group, displayed at the base of the Users tree. 1. Click on the Users tab and select a group. 2. On the User menu, click Delete User Group. The Delete User Group screen appears. Figure 128 Group Delete User Group Screen 3. Click OK to delete the group or Cancel to exit without deleting.
104 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 6. Click OK to assign users to the group or Cancel to exit without saving. A Users Assigned Successfully message confirms that users have been assigned. 7. Repeat steps 1 through 6 to assign users to other groups. Search for Users CC-SG can search for a user that satisfies the text entered in the search box. Searches are caseinsensitive. 1. Click on the Users tab. Figure 130 Search for Users 2.
CHAPTER 7: ADDING USERS AND USER GROUPS 105 Supported Wildcards These wildcards are supported: WILDCARD ? [-] * DESCRIPTION Indicates any character. Indicates a character in range. Indicates zero or more characters. Example: EXAMPLE DESCRIPTION root? Locates root1, and rootN, but not root1N. ccroot* Locates ccroot2SX, ccroot12KX. admin[0-9][0-9] Locates admin11, but not admin112.
106 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
CHAPTER 8: CREATING POLICIES 107 Chapter 8: Creating Policies Controlling User Access with Policies Using policies to control user access to ports is entirely optional. You could decide to assign all users to the default System Administrators user group, which grants full access to all configuration tasks, devices, ports, target systems and servers. If you do want to control user access to target servers, you need to create user groups and apply policies to them.
108 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE User Groups User groups are used to define a group of users and CC-SG privileges they possess. When a user logs on, they will see the CC-SG interface. The user group privileges define what the user can do with CC-SG. The default System Administrators user group has access to all managed devices and ports as well as all CC-SG functions. A user may just be allowed access to ports and devices or have access to all of the tools of CC-SG.
CHAPTER 8: CREATING POLICIES 109 Policies Policies define what you can do, what you can do it to, and when you can do it. Policies allow specification of days and times, port/device access, and if it was granted control access (Read/Write), or deny access (None). Policies specify a port group or device group, which defines the ports or devices a user will have access to (or not). It is important to remember that polices do not specify the user group.
110 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Policy Manager Policy Manager commands allow you to add, edit, delete, and assign policies to Device and Port groups. Policies give users rights to allow or deny access to groups. Please see Appendix C: Initial Setup Process Overview for more information on using policies. Add Policy 1. On the Associations menu, click Policy Manager. The Policy Manager screen appears. Figure 132 Policy Manager Screen 2. Click Add to add a new policy.
CHAPTER 8: CREATING POLICIES 111 10. Click Update to add the policy. The Update Policy window appears Figure 134 Update Policy Window 11. Click Yes to add the policy or No to close the window. 12. Click Close to close the Policy Manager screen. 13. Repeat steps 1 through 12 to add other policies. Edit Policy 1. On the Associations menu, click Policy Manager. The Policy Manager screen appears. 2. Click on the Name drop-down arrow to select a policy to edit. Click Edit to edit the policy.
112 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Delete Policy 1. On the Associations menu, click Policy Manager. The Policy Manager screen appears. 2. Click on the Name drop-down arrow to select a policy to be deleted. Click Delete to delete the policy. The Delete Policy window appears. Figure 137 Delete Appliance Policy Window 3. Click Yes to delete the policy or No to close the window. 4. Click Close to close the Policy Manager screen. 5. Repeat steps 1 through 4 to delete other policies.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 113 Chapter 9: Configuring Remote Authentication Authentication and Authorization Users of CC-SG can be locally authenticated and authorized on the CC-SG or remotely authenticated using the following supported directory servers: • Microsoft Active Directory (AD) • Netscape’s Lightweight Directory Access Protocol (LDAP) • TACACS+ • RADIUS Any number of remote RADIUS, TACACS+, and LDAP servers can be used for external authentication.
114 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Establish Order of Authentication Databases The General properties allow you to set the order of your authentication databases. If the first checked option is unavailable, CC-SG will try the second, then the third, and so on, until it is successful. 1. On the Setup menu, click Security Manager. When the Security Manager screen appears, click on the General tab. Figure 138 Security Manager General Screen 2.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 115 Base DN You also enter a Distinguished Name (DN) to specify where the search for users begins. Enter a DN in the Base DN field to specify an Active Directory container in which the users can be found. For example, entering: ou=DCAdmins,ou=IT,dc=xyz,dc=com will search all users in the DCAdmins and IT organizational units under the xyz.com domain.
116 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. On the Active Directory server, set up your users under the Users organizational unit (ou). These users will log into the CC-SG but are authenticated on the Active Directory server. Note that the display name of joe raritan can be different from the CC-SG login user name, for example jraritan. Figure 140 Active Directory Users 3. On the Active Directory server, assign CC-SG users to a group, such as CC Users.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 117 Setup on CC-SG 1. On CC-SG, click Security Manager from the Setup menu. When the Security Manager screen appears, click Add External AA Server. 2. In the Add Module screen, select AD from the Module Type pulldown menu. Figure 142 Specifying a Name for Active Directory Server 3. Specify a name for the Active Directory server in Module name. The name is optional and is specified only to distinguish this server from any others that may be configured.
118 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE General Settings on CC-SG 1. Type the IP Address/Hostname of the Active Directory server. For hostname rules, see Terminology/Acronyms in Chapter 1: Introduction. Figure 143 Specifying General Values for Active Directory Server 2. Check Anonymous Bind if you want to connect to the Active Directory server without specifying a username and password. If checking this option, ensure your Active Directory server allows anonymous queries.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 119 Advanced Settings on CC-SG 1. If you want to configure advanced settings, click on the Advanced tab. Figure 144 Specifying Advanced Values for Active Directory Server 2. Specify a port (default is 389) on which the Active Directory server is listening. 3. Optionally, check Secure Connection for LDAP if you want to use a secure channel for the connection. If checked, CC-SG uses Simple Authentication and Security Layer (SASL) with Digest-MD5 authentication.
120 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 5. Specify a Base DN (directory level/entry) under which the authentication search query will be executed. EXAMPLE DESCRIPTION The search query for the user entry dc=raritan,dc=com will be made over the whole directory structure. cn=Administrators,cn=Users,dc=raritan,dc=com The search query for the user entry will be performed only in the Administrators sub-directory (entry). 6.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 121 Group Settings on CC-SG Use to retrieve groups from the AD server and import into CC-SG local database for authorization purposes. 1. Click on the Groups tab. Figure 145 Specifying Group Values for Active Directory Server 2. Specify a Base DN (directory level/entry) under which the groups, containing the user to be authorized, will be searched.
122 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 5. On CC-SG, in the Security Manager screen, click Import Groups… to retrieve a list of user group values stored on the Active Directory server. If any of the user groups are not already on the CC-SG, you can import them here and assign them an access policy. Figure 146 Importing Groups from Active Directory Server 6. Check the boxes next to the groups you wish to import to CC-SG, such as CC Users.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 123 10. Verify the policy of the group that was imported by clicking the Users tab, right-clicking on the group and selecting Edit User Group Policies. Look under Selected Policies to confirm the policy that the correct policy was assigned to the group. Figure 148 Viewing Policy of Imported Group 11.
124 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE LDAP (Netscape) Once the CC-SG applet is started and a user name and password are entered, a query is forwarded either through CC-SG or directly to the LDAP server. If the username and password match those in the LDAP directory, the user is authenticated. The user will then be authorized against the local user groups on the LDAP server. 1. On the Setup menu, click Security Manager.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 125 2. In Add Module screen, select LDAP from the pulldown menu, specify a name for the server, and click Next. Figure 151 Security Manager LDAP Screen General Tab 3. Type the IP address or hostname of the LDAP server in the IP Address/Hostname field. For hostname rules, see Terminology/Acronyms in Chapter 1: Introduction. 4. Type the port value in the Port field. The default port is 389. 5.
126 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 11. Click Test Connection to test the LDAP server using the given parameters. You should receive a confirmation of a successful connection. If not, review the settings carefully for errors and try again. 12. Click on the Advanced tab to set advanced configuration options for the LDAP server. Figure 152 Security Manager LDAP Screen Advanced Tab 13.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 127 Sun One LDAP (iPlanet) Configuration Settings If using a Sun One LDAP server for remote authentication, use this example for parameter settings: PARAMETER NAME SUN ONE LDAP PARAMETERS IP Address/Hostname User Name CN= Password BaseDN Filter Passwords (Advanced Screen) Password Default Digest (Advanced) Use Bind Use Bind After Search O= (objectclass=person) Plain Text SHA unchecked Checke
128 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE TACACS+ CC-SG users who are remotely authenticated by a TACACS+ server need to be created on the TACACS+ server and on CC-SG. The user’s user name on the TACACS+ server and on CC-SG must be the same, although the passwords may be different. Please see Chapter 7: Adding Users and User Groups for additional information on adding users who will be remotely authenticated. 1. On the Setup menu, click Security Manager.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 129 2. In the Add Module screen, select TACACS+ from the pulldown menu, specify a name for the server, and click Next. Figure 154 Specifying a TACACS+ Server 3. Type the IP address or hostname of the TACACS+ server in the IP Address/Hostname Name field. For hostname rules, see Terminology/Acronyms in Chapter 1: Introduction. 4. Type the port number in the Port Number field. 5. Type the authentication port in the Authentication Port field. 6.
130 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE RADIUS CC-SG users who are remotely authenticated by a RADIUS server need to be created on the RADIUS server and on CC-SG. The user’s user name on the RADIUS server and on CC-SG must be the same, although the passwords may be different. Please see Chapter 7: Adding Users and User Groups for additional information on adding users who will be remotely authenticated. 1. On the Setup menu, click Security Manager.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 131 3. Type the IP address or hostname of the RADIUS server in the IP Address/Hostname field. For hostname rules, see Terminology/Acronyms in Chapter 1: Introduction. 4. Type the port number in the Port Number field. 5. Type and confirm the shared key into the Shared Key field. 6. Click OK to update changes. Certificate Options in this window can be used to generate a certificate signing request (also CSR or certification request).
132 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Generate Certificate Signing Request The following explains how to generate a CSR and a private key on CC-SG. The CSR will be submitted to the Certificate Server who will issue a signed certificate. A root certificate will also be exported from the Certificate Server and saved in a file. The signed certificate, root certificate, and private key will then be imported. 1. Click Generate Certificate Signing Request and click Generate.
CHAPTER 9: CONFIGURING REMOTE AUTHENTICATION 133 11. Type raritan in the Password field if the CSR was generated by CC-SG. If a different application generated the CSR, use that password for that application. Note: If the imported certificate is signed by a root and subroot CA (certificate authority), using only a root or subroot certificate will fail. To resolve this, copy and paste both root and subroot certificate into one file and then import it.
134 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE IP-ACL This feature restricts access to CC-SG based on IP addresses. Specify an IP-access control list (IP-ACL) by entering an IP address range, the group to which it applies, and an Allow/Deny privilege. 1. On the Setup menu, click Security Manager. When the Security Manager screen appears, click on the IP-ACL tab. Figure 161 Security Manager IP-ACL Screen 2.
CHAPTER 10: GENERATING REPORTS 135 Chapter 10: Generating Reports Reports can be sorted by clicking on the column headers. Click on a column header such as User Name, Access Time, etc., to sort report data by that value. The data will refresh in ascending order alphabetically, numerically, or chronologically. Click on the column header again to sort in descending order. Please note the arrowhead pointing upwards or down next to the cell name, indicating how the report is sorted.
136 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 3. Click Manage Report Data… to save or print the report. Click Save to save the report to a location of your choice or Print to print the report. Figure 163 Manage Report Window 4. Click Close to close the Manage Report window. 5. Click Close to close the Active Users report. Active Ports Report The Active Ports report displays ports that are currently in use. You can view or disconnect ports from this report. 1.
CHAPTER 10: GENERATING REPORTS 137 Asset Management Report The Asset Management report displays data on current devices. 1. On the Reports menu click Asset Management Report. The Asset Management report is generated. Figure 165 Asset Management Report 2. Click on the Device Type drop-down arrow to display a list of possible devices for which to run the report. Select one and click Apply to run the report. 3. Press Refresh to update the query and generate a new report.
138 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Audit Trail Report The Audit Trail report displays audit logs and access in CC-SG. It captures actions such as adding, editing, or deleting devices or ports, and other modifications. CC-SG maintains an Audit Trail of the following events: • When CC-SG is launched • When CC-SG is stopped • When a user logs on CC-SG • When a user logs off CC-SG • When a user starts a port connection 1. On the Reports menu, click Audit Trail.
CHAPTER 10: GENERATING REPORTS 139 6. The Audit Trail report is generated, displaying data about sessions that occurred during the designated time period. Figure 167 Audit Trail Report 7. Click Manage Report Data… to save or print the report. Click Save to save the records that are displayed to a CSV file or click Save All to save all records. Click Print to print the records that are displayed or Print All to print all records. Click Close to close the window. 8.
140 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Error Log Report CC-SG stores error messages in a series of Error Log files, which can be brought up and used to help troubleshoot system problems. You can filter the search criteria by date, message type, username, class, host, and level. Messages can be grouped by fatal, error and warning level. Once filters are selected, you can view the report results and take precautionary actions. 1. On the Reports menu, click Error Log.
CHAPTER 10: GENERATING REPORTS 141 6. The Error Log report is generated, displaying data about sessions that occurred during the designated time period. Figure 169 Error Log Report 7. Click Manage Report Data… to save or print the report. Click Save to save the records that are displayed to a CSV file or click Save All to save all records. Click Print to print the records that are displayed or Print All to print all records. Click Close to close the window. 8.
142 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Ping Report The Ping Report displays the status of all connections, showing devices by name and IP address. This report gives you the full accessibility picture for all devices on your system, and will supply information that could be useful in case troubleshooting is necessary. 1. On the Reports menu, click Ping Report. The Ping Report is generated. Figure 170 Ping Report 2. Click Manage Report Data… to save or print the report.
CHAPTER 10: GENERATING REPORTS 143 Accessed Devices Report Run the Accessed Devices report to view information about any accessed devices, when they were accessed, and the user who accessed them. Filters will help you define the search criteria for a more concise report. 1. On the Reports menu, click Accessed Devices. The Accessed Devices screen appears. Figure 171 Accessed Devices Screen 2.
144 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 5. Click OK to run the report. Figure 172 Accessed Devices Report 6. The Accessed Devices report is generated, displaying data about devices accessed during the designated time period. 7. Click Manage Report Data… to save or print the report. Click Save to save the records that are displayed to a CSV file or click Save All to save all records. Click Print to print the records that are displayed or Print All to print all records.
CHAPTER 10: GENERATING REPORTS 145 Group Data Report The Group Data report displays user, port, and device Group information. View user groups by name and description, view port groups by name, and view device groups by name, all in one screen. 1. On the Reports menu, click Group Data. The Groups report is generated. Use the scroll bars to scroll through the lists and view all entries. Figure 173 Groups Report 2.
146 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE User Data Report The User Data report displays certain data on all users in the CC-SG database. From User Name field you can see names of users currently in session and view details of users currently not in session. From Phone field you can see user dial back telephone number. From Enabled field you can see information if check box Login is enabled. From Password Expiration you can see password expiration period in days. 1.
CHAPTER 10: GENERATING REPORTS 147 Users In Groups Report The Users In Group report displays data on users and the groups with which they are associated. 1. On the Reports menu, click Users In Groups. The Users In Groups report is generated. Use the scroll bar to scroll through the list and view all entries. Figure 175 Users In Groups Report 2. Click Manage Report Data… to save or print the report. Click Save to save the report to a location of your choice or Print to print the report.
148 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Query Port Report The Query Port Report displays all ports according to port status. 1. On the Reports menu, click Query Port. The Query Port screen appears. Figure 176 Query Port Report 2. Click on one or more checkboxes to customize the port information you want to see in the report.
CHAPTER 10: GENERATING REPORTS 149 View Stored Reports The View Stored Reports displays reports that were scheduled in the Task Managersee section Task Manager in Chapter 12: Advanced Administration. 1. On the Reports menu, click View Stored Reports. Figure 177 View Stored Reports 2. Click Get Reports to view the entire list of all scheduled reports that were created by all owners. By default, all reports that were scheduled an hour ago to the current time are displayed. 3.
150 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Locked Out Users Report The Locked Out Users report displays users who are currently locked out of CC-SG. You can unlock them from this report. 1. On the Reports menu, click Locked Out Users. Figure 178 Locked Out Users Report 2. Highlight the user you want to unlock and click Unlock User. An email notification is sent to the email address that was specified during lockout configuration.
CHAPTER 10: GENERATING REPORTS 151 CC-NOC Synchronization Report The CC-NOC Synchronization report lists all targets, along with their IP addresses, that the CCSG subscribes to and are monitored by a CC-NOC given a particular discovery date. Any new targets that are discovered in the configured range are displayed here as well. See Add a CCNOC in Chapter 12: Advanced Administration for details. You can also purge targets from the CC-SG database from this report. 1.
152 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
CHAPTER 11: SYSTEM MAINTENANCE 153 Chapter 11: System Maintenance Reset CC-SG Use the Reset CommandCenter command to reset CC-SG database data – please note that this command will not reset system configuration data, such as the IP address of CC-SG. 1. On the Setup menu, click Reset CommandCenter. Figure 180 Reset CC-SG Screen 2. Type your CC-SG password. 3. Either accept the current Broadcast message or edit to create one of your own. 4.
154 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Restore CC-SG 1. On the Setup menu, click Restore CommandCenter. 2. When the Restore CommandCenter screen appears, choose if you want to click on the backup that you want to restore to your CC-SG unit, and then click OK. Figure 182 Restore CC-SG Screen 3. When the Restore CommandCenter screen appears, check Do not restore logs if you do not want the log files restored.
CHAPTER 11: SYSTEM MAINTENANCE 155 Saving and Uploading Backup Files You can also save and load CC-SG backups to and from your local PC using the Restore CommandCenter screen. 1. Click on the backup you wish to save to your PC, and then click Download. 2. Specify a location to save your CC-SG backup file. 3. To upload a backup to a CC-SG unit, click Upload on the Restore CommandCenter screen and browse your system for the backup of your CC-SG configuration.
156 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Refresh CC-SG Display Any edits or modifications made to users, ports, categories, elements, and other system components are not reflected in the system until the database is updated. If you are logged in while another user is updating the database, you will not see these changes unless you refresh your screen (or log out of CC-SG and log back in). 1. Click on the Refresh shortcut button in the CC-SG toolbar to refresh your browser.
CHAPTER 11: SYSTEM MAINTENANCE 157 Upgrade CC-SG Note: If you are operating a CC-SG cluster, you must remove the cluster first and upgrade each node separately.Before you can upgrade CC-SG, you must be in Maintenance Mode. See section Maintenance Mode in Chapter 11: System Maintenance for additional information. 1. On the Setup menu, click Upgrade CommandCenter. The Upgrade CommandCenter screen appears. Figure 185 Upgrade CC-SG Screen 2.
158 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 5. Click OK to restart CC-SG or Cancel to exit the screen without restarting. Once you restart CC-SG, your Broadcast Message appears. Figure 187 Info Window 6. Click OK to restart CC-SG. 7. CC-SG will restart, and is ready for use. Shut Down CC-SG These are the recommended methods for Administrators to shut down and restart CC-SG. 1. On the Setup menu, click Shutdown CommandCenter. The Shutdown CommandCenter screen appears.
CHAPTER 11: SYSTEM MAINTENANCE 159 End CC-SG Session Log Out To exit CC-SG at the end of a session, or to refresh the database in case you or another user has made changes while you were logged in, log off from CC-SG entirely, then log in again. 1. On the Session menu, click Logout. The Logout window appears. Figure 189 Logout Window 2. Click Yes to log out of CC-SG or No to close the window. Once you log out, the CC-SG login window appears. 3.
160 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Scheduled Tasks Scheduled tasks cannot execute while CC-SG is in Maintenance Mode─please see section Task Manager in Chapter 12: Advanced Administration for additional information on scheduled tasks. When CC-SG exits Maintenance Mode, scheduled tasks will be executed as soon as possible. Entering Maintenance Mode To enter Maintenance Mode: 1. On the Setup menu, click Maintenance Mode. 2. Click Enter Maintenance Mode.
CHAPTER 12: ADVANCED ADMINISTRATION 161 Chapter 12: Advanced Administration Configuration Manager Network Configuration 1. On the Setup menu, click Configuration Manager. When the Configuration Manager screen appears, click on the Network Setup tab. Figure 192 Configuration Manager Network Settings Screen 2. Type the CC-SG hostname in the Host Name field. For hostname rules, see Terminology/Acronyms in Chapter 1: Introduction.
162 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE A. Choose Primary/Backup mode to implement network failover and redundancy. In this mode, only one NIC is active at a given point of time and only one network IP address assignment is possible. Figure 193 Primary/Backup Network Typically, both NICs are attached to the same LAN sub-network, but different switches (or hubs) may be used for reliability. When both NICs are used, a level of network redundancy is provided.
CHAPTER 12: ADVANCED ADMINISTRATION 163 In this mode, CC-SG acts as a “router” or “traffic cop” between two separate IP domains; particularly when Proxy mode is being used (please see Connection Mode, later in this chapter, for additional information). In Proxy mode, Active/Active mode is required so CC-SG routes proxied PC client sessions to their respective end-points. It is recommended that Raritan-controlled devices be connected to LAN1 while proxied PC client connections are connected to LAN2.
164 3. 4. 5. 6. COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Click on the Level to Forward drop-down arrow to select a level. Repeat steps 2 and 3 for Secondary Server fields (note that Secondary Server is optional). Click Update Configuration to save the server addresses to the system. Click Close to close the Configuration Manager screen. Inactivity Timer Configuration Use this screen to time out inactive user sessions. 1. On the Setup menu, click Configuration Manager.
CHAPTER 12: ADVANCED ADMINISTRATION 165 Time/Date Configuration CC-SG’s Time and Date stamps must be accurately maintained in order to provide credibility for its device-management capabilities. Important! This time is used when scheduling tasks in Task Manager⎯see section Task Manager in Chapter 12: Advanced Administration. The time set on the client may be different than the time set on CC-SG. Only Administrators and ccroot users can synchronize Time and Date. 1.
166 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Modem Configuration Use this screen to access CC-SG from a client machine over a dial-up connection. This method of accessing CC-SG can be used in emergency situations. Note: A modem is not available and cannot be configured on the V1 platform. Configure CC-SG 1. On the Setup menu, click Configuration Manager. When the Configuration Manager screen appears, click on the Modem tab. Figure 198 Configuration Manager Modem Screen 2.
CHAPTER 12: ADVANCED ADMINISTRATION 167 4. Click on the Advanced tab. Figure 200 Extra Initialization Commands 5. Type an initialization command in Extra initialization commands that will be used by your modem to set the “Carrier detection” flag. For example, type at&c for a SoftK56 Data Fax modem. This is necessary to tell Windows not to close the started Modem connection process when the modem connection is closed from the other (dialed-in) side. Click OK to save the settings.
168 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 4. Click Next. Figure 202 New Connection Wizard 5. Click Connect to the network at my workplace. 6. Click Dial-up connection. 7. Type a name for CC-SG, for example CommandCenter. Figure 203 Connection Name 8. Type the phone number used to connect to CC-SG and click Next. This is NOT the dial-back number that was configured as the Client phone under the Modem tab in Configuration Manager on CC-SG. Figure 204 Phone Number to Dial 9.
CHAPTER 12: ADVANCED ADMINISTRATION 169 10. In the next screen, typically you want to click My use only in the next screen to make the connection available only to yourself. 11. Click Finish in the last screen to save the connection settings. Configure the Call-back Connection If the CC-SG uses a call-back connection, you need to use a script file that is described below. To supply the script file for call-back: 1. On the start menu, click My Network Places. 2.
170 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE transmit "ccclient^M" endproc Connect to CC-SG with Modem To connect to CC-SG: 1. On the start menu, click My Network Places. 2. Click view network connections under Network Tasks. 3. Double-click on the CommandCenter connection. Figure 206 Connecting to CC-SG 4. Type a username of ccclient and password of cbupass. Figure 207 Entering username and password 5. If not filled in already, enter the phone number used to connect to CC-SG.
CHAPTER 12: ADVANCED ADMINISTRATION 171 7. If Show terminal window was checked as described in section Configure the Call-back Connection earlier in this chapter, then a window similar to the one below will be displayed: Figure 208 After Dial Terminal 8. Wait 1 or 2 minutes and in a supported browser, enter the IP address of CC-SG that was configured as the Server address under the Modem tab in Configuration Manager on CCSG and login to CC-SG.
172 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Connection Mode When connected to a device, you have the option to pass data back and forth directly with that device (Direct Mode) or to route all the data through your CC-SG unit (Proxy Mode). While Proxy Mode increases the bandwidth load on your CC-SG server, you only need to keep the CCSG TCP ports (80, 443, and 2400) open in your firewall. See Raritan’s Digital Solution Deployment Guide for additional information. 1.
CHAPTER 12: ADVANCED ADMINISTRATION iii. 173 Click the Add button to add the Net Address and Mask to the screen.
174 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Device Settings 1. On the Setup menu, click Configuration Manager. When the Configuration Manager screen appears, click on the Device Settings tab. 2. To update device Default Port, select a Device Type in the table and double-click on the Default Port value. Type the new Default Port value and press the Enter key. 3. To update device timeout duration, double-click on the Heartbeat (sec) value at the bottom of the screen.
CHAPTER 12: ADVANCED ADMINISTRATION 175 SNMP Simple Network Management Protocol allows CC-SG to push SNMP traps (event notifications) to an existing SNMP manager on the network. Only a CC-SG Administrator trained in handling an SNMP infrastructure should configure CC-SG to work with SNMP. CC-SG also supports SNMP GET/SET operations with third-party enterprise Management Solutions, such as HP OpenView.
176 6. 7. 8. 9. COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE System Log traps, which include notifications for the status of the CC unit itself, such as a hard disk failure, and Application Log traps for notifications generated by events in the CC application, such as modifications to a user account. To enable traps by type, check the boxes marked System Log and Application Log.
CHAPTER 12: ADVANCED ADMINISTRATION 177 Strong Password Rules Strong password rules require users to observe strict guidelines when creating passwords, which makes the passwords more difficult to guess and, in theory, more secure. Administrators can enable or disable this feature ⎯ see the previous section Configure Security. When strong passwords are enabled, a password change will be rejected unless it meets the following criteria: • Passwords must be at least six characters long.
178 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 6. Type an email address in Lockout notification email so notification is sent to the address informing the recipient that lockout has occurred. If the field is blank, notification is not sent. 7. Type a phone number in Administrator’s Phone if the administrator needs to be contacted. 8. Click Update to save configuration settings.
CHAPTER 12: ADVANCED ADMINISTRATION 179 4. Click OK to add the new application or Cancel to close the window. If you clicked OK, a search window appears. Figure 218 Search Window 5. Click on the Look In drop-down arrow and navigate to locate the application in your system. When you find the application, select it, and click Open. The application name will appear in the Location field in the Application Manager screen. 6. Click Upload to upload the application.
180 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 6. Modify parameters in the Parameters panel and click the Update button in the Details panel of the screen. The parameters will be updated. 7. Click Close to close the Application Manager screen. Delete Application Deleting an application from the Application Manager removes it from the CC-SG database, although it is still retained in the local directory. When you delete a custom application, the serial port reverts to using RaritanConsole. 1.
CHAPTER 12: ADVANCED ADMINISTRATION 181 2. Click Add to add a new firmware file. A search window appears. Figure 222 Search Window 3. Click on the Look In drop-down arrow and navigate to locate the firmware file in your system. When you find the firmware, select it, and click Open. The firmware name will appear in the Firmware Name field. 4. Click Close to close the Firmware Manager screen. Delete Firmware 1. On the Setup menu, click Firmware Manager. The Firmware Manager screen appears. 2.
182 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Add a CC-NOC Note: To create a valid connection, the time settings on both the CC-NOC and CC-SG should be synchronized. The best method of achieving this synchronization, it to use a common NTP (Network Time Protocol) server. For this reason, the CC-NOC and CC-SG are required to be configured to use an NTP server. 1. On the CommandCenter NOC menu, click Configuration. The CC-NOC Configuration screen appears. Figure 224 CC-NOC Configuration Screen 2.
CHAPTER 12: ADVANCED ADMINISTRATION 183 3. Select a software version of CC-NOC you want to add and click Next. Version 5.1 has fewer integration features than 5.2 and only requires adding a name and an IP address. For additional information on CC-NOC 5.1, please see www.raritan.com/support. Click on Product Documentation, then CommandCenter NOC. Figure 226 Add CC-NOC Configuration Screen 4. Type a descriptive name of the CC-NOC in the Name field. Maximum length is 50 alphanumeric characters. 5.
184 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE To stop CC-NOC from monitoring a device, it can be unmanaged – see the CommandCenter NOC Administrator Guide. Note: Use the CC-NOC Synchronization Report to view targets that the CC-SG is subscribing to. The report also displays any new targets that have been discovered by CC-NOC. See Chapter 10: Generating Reports, CC-NOC Synchronization Report for additional information. 7.
CHAPTER 12: ADVANCED ADMINISTRATION 185 Important: To increase security, you must enter the passcodes in CC-NOC within five minutes after they are generated on CC-SG. This will minimize the window of opportunity for intruders to breach the system with a brute-force attack. Avoid transmitting the passcodes over email or other electronic means to avoid a possible interception by automated systems.
186 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. Highlight a CC-NOC in the list and click Edit. The Edit CC-NOC Configuration screen appears. Figure 229 Edit CC-NOC Configuration Screen 3. Refer to the previous section Add a CC-NOC for field details. Launch CC-NOC To launch CC-NOC from CC-SG: 1. In the CC-NOC Configuration screen, highlight an available CC-NOC. 2. Click Launch. This will connect you to a configured CC-NOC.
CHAPTER 12: ADVANCED ADMINISTRATION 187 Delete a CC-NOC To remove and unregister a CC-NOC in CC-SG, do the following. 1. On the CommandCenter NOC menu, click Configuration. The CC-NOC Configuration screen appears. Figure 231 Delete CC-NOC Screen 2. Highlight a CC-NOC in the list and click Delete. You are prompted to confirm the deletion. 3. Click Yes to delete the CC-NOC or No to exit without deleting. A CC-NOC Deleted Successfully message confirms that CC-NOC has been deleted. 4.
188 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Create a Cluster In the event of a failover, the administrator should send an email to all CC-SG users, notifying them to use the IP address of the “new” Primary CC-SG node. Important: It is recommended to backup your configuration on both nodes before setting up a cluster configuration. Set Primary CC-SG Node 1. On the Setup menu, click Cluster Configuration. The Cluster Configuration screen appears. 2.
CHAPTER 12: ADVANCED ADMINISTRATION 189 Set Secondary CC-SG Node 1. Click Discover CommandCenters to scan and display all CC-SG appliances on the same subset as your one you are currently using. Alternatively, you can add a CC-SG, perhaps from a different subnet, by specifying an IP address in CommandCenter address in the bottom of the window. Click Add CommandCenter. Note: Adding a backup CC-SG from a different subnet or network may avoid issues affecting a single network or physical location. 2.
190 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Remove Secondary CC-SG Node 1. To remove Secondary Node status from a CC-SG unit and reassign it to a different unit in your configuration, select the Secondary CC-SG Node in the Cluster Configuration table and click Remove “Backup” Node. 2. When the confirmation message appears, click Yes to remove Secondary Node status, or click No to cancel.
CHAPTER 12: ADVANCED ADMINISTRATION 191 Set Advanced Settings To configure advanced settings of a cluster configuration: 1. Select the Primary node just created. 2. Click Advanced. The Advanced Settings window appears. Figure 236 Cluster Configuration Advanced Settings 3. For Time Interval, enter how often CC-SG should check its connection with the other node. Note: Setting a low Time Interval will increase the network traffic generated by heartbeat checks.
192 • • • COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Outlet Port Power Management (Power On/Off/Recycle Outlet ports) Generate all Reports (HTML or CSV formats) Purge Logs Scheduling Sequential Tasks You may want to schedule tasks sequentially to confirm that expected behavior was actually carried out.
CHAPTER 12: ADVANCED ADMINISTRATION 193 Create a New Task To schedule a new task: 1. On the Setup menu, click Task Manager. New Button Server Time Figure 237 Task Manager 2. Click New. Figure 238 Create Task 3. In the Main tab, type a name (1-32 characters, alphanumeric characters or underscores, no spaces) and description for the task.
194 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 4. Click on the Task Data tab and from the pulldown menu, select the task to be scheduled, such as Upgrade Device Firmware. Note that the fields requiring data will vary according to the task selected. With the exception of Restart Device and Restore Device, a single device or devices in a group can be selected for tasks involving devices.
CHAPTER 12: ADVANCED ADMINISTRATION 195 8. Change Own Password in Chapter 7: Adding Users and User Groups. If an email was not configured, then this field is blank. By default, email is sent if the task was successful. To notify the recipient of failed tasks, click the On Failure checkbox. Figure 241 Specifying Task Email Notification 9. To send email to additional recipients, click Add. Enter a valid email address and click OK.
196 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 4. To view the history of a task, select a task and click Task History. Figure 243 Task History 5. To view details of a task, double-click on a task. Figure 244 Task Details Note: If a task is changed or updated, its prior history no longer applies and the “Last Execution Date” will be blank.
CHAPTER 12: ADVANCED ADMINISTRATION 197 Notification Manager Use Notification Manager to configure an external SMTP server so notifications can be sent from CC-SG. Notifications are used to email reports that have been scheduled, email reports if users are locked out, email status of failed or successful scheduled tasks─please see section Task Manager earlier in this chapter for additional information.
198 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE SSH Access to CC-SG Use Secure Shell (SSH) clients, such as Putty or OpenSHH Client, to access a command line interface to SSH (v2) server on CC-SG. Only a subset of CC-SG commands is provided via SSH to administer devices and CC-SG itself. The SSH client user is authenticated by the CC-SG in which existing authentication and authorization policies are applied to the SSH client.
CHAPTER 12: ADVANCED ADMINISTRATION 199 4. A shell prompt appears. Type ls to display all commands available from SSH. Figure 248 CC-SG Commands via SSH 5. Typing help or ? provides the syntax and description of all available commands.
200 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 6. Typing the command with the –h switch displays help for that command, such as listfirmwares –h. Figure 250 SSH listfirmwares Help Command Tips The following describes several nuances of the SSH commands: • For commands that pass an IP address, such as upgradedevice, you can substitute the hostname for an IP address. For hostname rules, see Terminology/Acronyms in Chapter 1: Introduction.
CHAPTER 12: ADVANCED ADMINISTRATION 201 Create a SSH Connection to an SX Device You can create an SSH connection to an SX device to perform administrative operations on the device. Once connected, the administrative commands supported by the SX device are available. Note: Before you can connect, ensure that the SX device has been added to the CC-SG. 1. Type listdevices to ensure the SX has been added to CC-SG. Figure 251 Listing Devices on CC-SG 2.
202 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Connect to a Serial Port Connect to a serial port to access a target server. You can access serial ports on a SX, KSX, or IPReach device. The SSH connection to the serial ports are in proxy mode. 1. Type listports to view the port ids. Figure 253 Listing Ports on CC-SG 2. Type connect –p to connect to the target server associated with the port.
CHAPTER 12: ADVANCED ADMINISTRATION 203 3. Once connected to the port, type the default Escape keys of ‘~’ followed by a dot ‘.’. An intermediate prompt, typically named after port name, is displayed, for example testport>. At this intermediate prompt, you can enter specific commands or aliases as described below: COMMAND ALIAS quit get_write q gw get_history gh send_break sb help ?,h DESCRIPTION Terminates Port Connection and returns to SSH prompt. Gets Write Access.
204 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Diagnostic Console The Diagnostic Console is a standard, non-graphical interface that provides local access to CCSG. It can be accessed from a serial or KVM port, or from Secure Shell (SSH) clients, such as Putty or OpenSSH Client. Two logins are provided⎯one is status and the other is admin. Default password for admin is raritan. All login usernames and passwords are case-sensitive.
CHAPTER 12: ADVANCED ADMINISTRATION 205 Accessing Status Console Entering a password to access the Status Console is not required, but can be enforced if desired. 1. After login as:, type status. Figure 256 Login to Status Console The read-only status console is displayed. This screen dynamically displays information to help you determine the health of your system and if CC-SG and its sub-components are working.
206 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Accessing Administrator Console At the time of logging into Administrator Console, all information displayed is “static”. If configuration changes occur through the CC-SG GUI or the Diagnostic Console, you need to relogin to Administrator Console after the changes have taken effect to view the changes in Administrator Console. 1. After login as:, type admin. Pre-Login Message Figure 258 Login to Administrator Console 2.
CHAPTER 12: ADVANCED ADMINISTRATION 207 Navigating Administrator Console PRESS.. CTRL+C or CTRL+Q CTRL+L TAB SPACE Arrow Keys Mouse TO… To exit Diagnostic Console. Refresh screen and update information. Move to next available option. Select current option. Allows you to move to various options. Allows you to point and select an option.
208 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 3. Click Save as Default at the bottom of the screen or press the TAB key and press Enter once Save as Default is highlighted. Press ^Q or ^C to exit. The Pre-Login and Message of the Day have three separate buffers or areas: • Admin Console Screen – starts with a copy of the Active Message and can be edited by this user / session. • A system buffer that is held across system resets.
CHAPTER 12: ADVANCED ADMINISTRATION 209 Port Number for Diagnostic Console Figure 263 Edit Status Console Config 3. Click Save at the bottom of the screen or press the TAB key and press Enter once Save is highlighted. Press ^Q or ^C to exit. Editing Network Interfaces Configuration (Network Interfaces) In Network Interface Configuration, you can perform initial setup tasks such as setting the hostname and IP address of the CC-SG.
210 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. If this is the first time accessing CC-SG and the network interfaces have not been configured, it is strongly recommended to use CC-SG GUI to configure them instead of configuring them here. If the network interfaces have already been configured, you will see a Warning message, stating that you should use the CC-SG GUI to configure the interfaces. If you want to continue, click YES. Figure 265 Editing Network Interfaces 3.
CHAPTER 12: ADVANCED ADMINISTRATION 211 Ping an IP Address (Network Interfaces) Use ping to check that the connection between your computer and a particular IP address (domain) is working correctly. 1. To ping an IP address or hostname, click Operation, Network Interfaces, then Ping. Figure 266 Pinging a Target 2. Enter the IP address or hostname of the target you wish to check in the Ping Target field. 3.
212 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Using Traceroute (Network Interfaces) Traceroute is often used for network troubleshooting. By showing a list of routers traversed, it allows you to identify the path taken from your computer to reach a particular destination on the network. It will list all the routers it passes through until it reaches its destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from router to router takes.
CHAPTER 12: ADVANCED ADMINISTRATION 213 Active/Active network settings where each interface is attached to a separate IP domain-see section Network Configuration in Chapter 12: Advanced Administration for additional information. Click with the mouse or use the TAB, ↓↑ keys to navigate and press the Enter key to select a value. 1. To view or change static routes, click Operation, Network Interfaces, then Static Routes. Figure 268 Selecting Static Routes 2. The current IP routing table is displayed.
214 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. Click with the mouse or use the ↓↑ keys to navigate and press the Enter key to select a log file (marked with an X). More than one log file can be viewed at a time. (Some log files are not available; a warning dialog will appear and the item will be de-selected for you.) Figure 271 Selecting Log Files to View OPTION Individual Windows Merged Windows Initial Buffer Export View DESCRIPTION Display the selected logs in separate windows.
CHAPTER 12: ADVANCED ADMINISTRATION 215 3. When View is selected with Merged Windows, the LogViewer displays: Figure 272 Selecting Log Files to View 4. While viewing log files, type CTRL+C to return to the previous screen. 5. If desired, you can change colors in a log file to highlight what is important. Type c to change colors of a log file and select a log from the list if you have chosen to view several. Once color choices are displayed, type q to exit the window.
216 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 7. If desired, you can filter the log file with a regular expression. Type e to add or edit a regular expression and select a log from the list if you have chosen to view several. Figure 275 Adding Expressions in Log Files 8. Type a to add a regular expression. For example, if you want to display information on the pam process in /var/log/messages log file, enter pam and select match.
CHAPTER 12: ADVANCED ADMINISTRATION 217 9. Select F1 to get help on all LogViewer options. Pressing CTL+C and CTL+Q (as well as a plain q) terminates this LogViewer session. Figure 277 Getting Help (F1) Restarting CC-SG (Admin) You can restart CC-SG, which will log off all current CC-SG users and terminate their sessions to remote target servers. Important: It is is HIGHLY recommended to restart CC-SG in the CC-SG GUI instead, unless it is absolutely necessary to restart it here.
218 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. Either click Restart CC-SG Application or press ENTER. Figure 279 Restarting CC-SG in Diagnostic Console Rebooting CC-SG (Admin) This option will reboot the entire CC-SG, which simulates a power cycle. Users will NOT receive a notification at all. CC-SG, SSH, and Diagnostic Console users (including this session) will be logged off. Any connections to remote target servers will also be terminated. 1.
CHAPTER 12: ADVANCED ADMINISTRATION 219 2. Either click REBOOT System or press ENTER to reboot CC-SG. A screen to confirm this action appears and needs to be acknowledged before this operation will commence.
220 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE In Password Configuration, enter the number of passwords that will be remembered. This is the password history, which discourages password reuse and ensures that the new password has not been used within the specified number of previous password changes. Default is 5. With a setting of 5, the new password could not have been used within the last 5 password changes.
CHAPTER 12: ADVANCED ADMINISTRATION 221 Account Configuration By default, the status account does not require a password, but you can configure it to have one here. Other aspects of the admin password can be configured and the Field Support accounts can be enabled or disabled. 1. To configure accounts, click Operation, Admin, Change Passwords, then Account Configuration. Figure 284 Account Configuration 2. View the settings for each account, that is Status, Admin, FS1 and FS2.
222 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 4. For the Admin and Status accounts, you can configure: SETTING DESCRIPTION This is the current user name or ID for this account. (This may be User \ User Name operator changeable in a future release.) Last Changed Expire Mode (Read-only). This is the date of the last password change for this account. (Read-only). Tells the day that this account must change its password.
CHAPTER 12: ADVANCED ADMINISTRATION 223 2. Either click Refresh or press Enter to refresh the display. Refreshing the display is especially useful when upgrading or installing and you want to see the progress of the RAID disks as they are being rebuilt and being synchronized.
224 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE 2. View the total running, sleeping, total number and processes that have stopped. Figure 289 Displaying CC-SG Processes in Diagnostic Console 3. Type h to bring up an extensive help screen for the top command. The standard F1 help key is not operational at this point. To return to the Admin Console, use the standard CTL+Q or CTL+C.
APPENDIX A: SPECIFICATIONS 225 Appendix A: Specifications (G1, V1) G1 Platform General Specifications 1U 22.1”x 17.32” x 1.75” 563mm x 440mm x 44mm 24.07lb (10.92kg) Redundant, hot-swappable power supplies, auto-sensing 110/220 V – 2.
226 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE NON-OPERATING Temperature Humidity Altitude Vibration Shock 0 - 30 deg C; 32 – 104 deg F 10% - 90% RH Operate properly at any altitude between 0 to 10,000 feet, storage 40,000 feet (est.) 5-55-5 HZ, 0.
APPENDIX A: SPECIFICATIONS 227 V1 Platform General Specifications 1U 24.21”x 19.09” x 1.75” 615mm x 485mm x 44mm 23.80lb (10.80kg) Form Factor Dimensions (DxWxH) Weight Single Supply (1 x 300 watt) Power Operating Temperature Mean Time Between (MTBF) KVM Admin Port Serial Admin Port Console Port 10℃- 35℃ (50℉- 95℉) 36,354 hours Failure (DB15 + PS2 or USB Keyboard/Mouse) DB9 2 x USB 2.
228 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE NON-OPERATING Temperature Humidity Altitude Vibration Shock -40 - +60 (-40 -140 ) 5% - 95% RH Operate properly at any altitude between 0 to 10,000 feet, storage 40,000 feet (Estimated) 5-55-5 HZ, 0.
APPENDIX B: CC-SG AND NETWORK CONFIGURATION 229 Appendix B: CC-SG and Network Configuration Introduction This appendix discloses network requirements (addresses, protocols and ports) of a typical CommandCenter Secure Gateway (CC-SG) deployment. It provides what you need to know and how to configure your network for both external access (if desired) and internal security and routing policy enforcement (if used).
230 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE CC Clients Internet (Unsecured Network) CC-NOC CC Clients CC-SG Cluster Peer Firewall Internal Network VPN CC-SG Raritan Device KVM Serial Out-of-Band Target Access Internal Network Raritan Device Figure 290 CC-SG Deployment Elements In-Band Access
APPENDIX B: CC-SG AND NETWORK CONFIGURATION 231 CC-SG Communication Channels The communication channels are partitioned as follows: • CC-SG ↔ Raritan Devices • CC-SG ↔ CC-SG Clustering (optional) • CC-SG ↔ Infrastructure Services • Clients ↔ CC-SG • Clients ↔ Targets (Direct Mode) • Clients ↔ Targets (Proxy Mode) • Clients ↔ Targets (In-Band) • CC-SG ↔ CC-NOC For each communication channel, the tables in the sections that follow: • Represents the symbolic IP Addresses used by the communicating parties.
232 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Each CC-SG in the cluster may be on a separate LAN. However, the inter-connection between the units should be very reliable and not prone to periods of congestion.
APPENDIX B: CC-SG AND NETWORK CONFIGURATION 233 The first mode is the primary means for users and administrators to connect to CC-SG. The other two modes are less frequently used.
234 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE CC-SG & SNMP Simple Network Management Protocol (SNMP) allows CC-SG to push SNMP traps (event notifications) to an existing SNMP manager on the network. CC-SG also supports SNMP GET/SET operations with third-party Enterprise Management Solutions, such as HP OpenView.
APPENDIX B: CC-SG AND NETWORK CONFIGURATION 235 Security and Open Port Scans As part of the CC-SG Quality Assurance process, several open port scanners are applied to the product and Raritan Computer makes certain that its product is not vulnerable to these known attacks. All the open or filtered/blocked ports are listed in the above sections.
APPENDIX C: INITIAL SETUP PROCESS OVERVIEW Appendix C: Initial Setup Process Overview Pre-requisites: • Add Devices with Category/Element clearly identified. • Add Ports with Category/Element clearly identified. Create Group(s)/Add User(s) 1. Add Device Group with rule based on Category/Element 2. Add Port Group with rule based on Category/Element 3. Add Policy (links 2 and 3 together; controls access time and permission) 4.
238 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
APPENDIX D: USER GROUP PRIVILEGES 239 Appendix D: User Group Privileges USERS GROUP PRIVILEGE CC Setup And Control Device Configuration And Upgrade Management AVAILABLE COMMANDS Application Manager USER CAPABILITY Users are able to add new application to CC-SG. Security Manager Users are able to configure security parameters. Configuration Manager Users are able to make general configuration of CC-SG. Restart CommandCenter Users are able to restart CC-SG. Shutdown Users are able to shutdown CC-SG.
240 USERS GROUP PRIVILEGE Device And Port Management Ports Access COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE AVAILABLE COMMANDS USER CAPABILITY Configuration Manager Users are able to change general device settings configuration of CC-SG. Add Device Users are able to add new devices. Edit Device Users are able to modify devices name and parameters. Delete Device Users are able to delete devices. Bulk Device Copy Users are able to copy device parameters to other devices.
APPENDIX D: USER GROUP PRIVILEGES USERS GROUP PRIVILEGE 241 AVAILABLE COMMANDS USER CAPABILITY Users are able to associate categories User Security Management Association Manager *Note that this privilege is not and elements. configurable and is only Device Group Manager Users are able to rename groups and assigned to the System add rules to device groups. Administrator user group by Port Group Manager Users are able to rename groups and default. . add rules to port groups.
242 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
APPENDIX E: SNMP TRAPS 243 Appendix E: SNMP Traps CC-SG provides the following traps: SNMP TRAP CCDeviceUpgrade CCImageUpgradeResults CCImageUpgradeStarted CCIncompatibleDeviceFirmware CCLeafNodeAvailable CCLeafNodeUnavailable CCPortConnectionStarted CCPortConnectionStopped CCPortConnectionTerminated CCRootPasswordChanged CCUserAdded CCUserAuthenticationFailure CCUserDeleted CCUserLogin CCUserLogout CCUserModified CCAvailable CCDeviceAddedAfterCCNOCNotifica tion CCDiagnosticConsole CCDiagnosticConsoleLogo
244 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
APPENDIX F: TROUBLESHOOTING 245 Appendix F: Troubleshooting • • • • • In order to launch CC-SG from your web browser, it requires a Java plug-in. If your machine has an incorrect version, CC-SG will guide you through the installation steps. If your machine does not have a Java plug-in, CC-SG cannot automatically launch. In this case, you must uninstall or disable your old Java version and provide serial port connectivity to CC-SG to ensure proper operation.
246 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE Port and Policy Group Creation Failure The default port groups and policies created in the Association Wizard are named after the elements of a category. If the element names are not unique, the default port groups and policies cannot be created (see the screen below) and will appear in red. Rename the elements of the category so they are unique.
APPENDIX G: FAQS 247 Appendix G: FAQs QUESTION General What is CC-SG? Why would I need CC-SG? What is CommandCenter NOC? Which Raritan products does CC-SG support? How does CC-SG integrate with other Raritan Products? Is PDA access possible? Is the status of CC-SG limited by the status of the devices which it proxies? Can I upgrade to newer versions of CC-SG software as they become available? How many target devices (ports) and/or Dominion units and/or IP-Reach units can be connected to CCSG? Is ther
248 QUESTION to add a console/serial port to CC-SG? Which version of Java will Raritan’s CC-SG be supporting? An administrator added a new port to the CC-SG database and assigned it to me, how can I see it in my Ports tree? How will the Windows desktop be supported in the future? COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE ANSWER the following conditions are met: - The Dominion unit is active. - The Dominion unit has not reached the maximum number of configured user accounts.
APPENDIX G: FAQS QUESTION If we had more than 1,000 users, how would this be managed? That is, do you support Active Directory? What options are available for authentication with directory services and security tools such as LDAP, AD, RADIUS, etc. Security Sometimes when I try to log on, I receive a message that states my “login is incorrect” even though I am sure I am entering the correct User Name and Password.
250 QUESTION track down to who switched on or off a power plug? Performance As a CC-SG Administrator, I added over 500 ports and assigned all of them to me. Now it takes a long time to log on to CC-SG. What is the bandwidth usage per client? Particularly as they aggregate up over many systems.
APPENDIX G: FAQS QUESTION or simply box level? How would I mitigate the restriction of four simultaneous paths through any IP-Reach box, including the roadmap for the potential 8-path box? Will the current Paragon boxes work with CC-SG? If not, what is the upgrade path? Authorization Can authorization be achieved via RADIUS/TACACS/ LDAP? User Experience How will I know if someone else is logged in to leaf nodes? Does CC-SG have the ability to look at multiple screens for devices? Regarding console managem
252 255-80-5140-00 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
APPENDIX G: FAQS 253
North American Headquarters Raritan 400 Cottontail Lane Somerset, NJ 08873 U.S.A. Tel. (732) 764-8886 or (800) 724-8090 Fax (732) 764-8887 Email: sales@raritan.com Website: Raritan.com Raritan NC 4901 Waters Edge Dr. Suite 101 Raleigh, NC 27606 Tel. (919) 277-0642 Email: sales.nc@raritan.com Website: Raritan.com Raritan Canada 4 Robert Speck Pkwy, Suite 1500 Mississauga, ON L4Z 1S1 Canada Tel. (905) 949-3650 Fax (905) 949-3651 Email: sales.canada@raritan.com Website: Raritan.