User Manual
ACM5000 Remote Site Managers ACM5500 Management Gateways
ACM7000 Resilience Gateways
IM7200 & IM4200 Infrastructure Managers
CM7100 Console Servers
- Revision 4.32
- 2019-4-10
Table of Contents
Safety
Please take care to follow the safety precautions below when installing and operating the console server:
-
Do not remove the metal covers. There are no operator serviceable components inside. Opening or removing the cover may expose you to dangerous voltage which may cause fire or electric shock. Refer all service to Opengear qualified personnel.
--
To avoid electric shock the power cord protective grounding conductor must be connected through to ground.
Always pull on the plug, not the cable, when disconnecting the power cord from the socket.
Do not connect or disconnect the console server during an electrical storm. Also it is recommended you use a surge suppressor or UPS to protect the equipment from transients.
FCC Warning Statement
This device complies with Part 15 of the FCC rules. Operation of this device is subject to the following
conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference that may cause undesired operation.
Proper back-up systems and necessary safety devices should be utilized to protect against injury, death or property damage due to system failure. Such protection is the responsibility of the user.
This console server device is not approved for use as a life-support or medical system. Any changes or modifications made to this console server device without the explicit approval or consent of Opengear will void Opengear of any liability or responsibility of injury or loss caused by any malfunction.
This equipment is for indoor use and all the communication wirings are limited to inside of the building.
2
Data Center and Remote Site Management - User Manual
User Manual
Copyright
© Opengear Inc. 2019. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on the part of Opengear. Opengear provides this document “as is,” without warranty of any kind, expressed or implied, including, but not limited to, the implied warranties of fitness or merchantability for a particular purpose.
Opengear may make improvements and/or changes in this manual or in the product(s) and/or the program(s) described in this manual at any time. This product could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes may be incorporated in new editions of the publication.
Table of Contents
TABLE OF CONTENTS
THIS MANUAL INSTALLATION
12 15 15
16 17 17 18
2.1
2.1.1
Models
ACM5000 kit components
2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.1.7
ACM5500 kit components ACM7004-2, ACM7004-5, ACM7008-2 kit components ACM7005-4 Remote Site Gateway kit components IM4208-2, IM4216-2, IM4232-2, IM4248-2 and IM4216-34 kit components IM7208-2, IM7216-2, IM7216-2-24U-DAC, IM7232-2 and IM7248-2 kit components CM7116-2, CM7132-2 and CM7148-2 kit components
Power Connection
18 19 19
20
20 20 21 21
22 23
25 25 26
26 27
28 28 29 29 30 31 31
32 32 32
32 33
35
35 36 36
37
38 39
40
44
45
45 45 46
46
46 48 50 51 52 56
58
2.2
2.2.1 2.2.2 2.2.3 2.2.4
All IM7200, IM4200 and CM7100 -DAC models All ACM5000 and ACM7000 models All ACM5500 models IM7200-DDC and IM4200-DDC power
Network Connection Serial Port Connection
2.3 2.4
- 2.4.1
- Opengear Classic RJ45 pinout (option –X0)
Cisco Rolled (Cyclades) RJ45 pinout (option -X1) Cisco RJ45 pinout (option -X2)
2.4.2 2.4.3
2.5 2.6
2.6.1
USB Port Connection Fitting Cellular SIM and Antennas
ACM5004 -G and -L models
2.6.2 2.6.3 2.6.4 2.6.5 2.6.6 2.6.7
ACM5500 -G models ACM5500 -L models ACM7000 -L models IM4200 -G models All IM7200 models IM7200 -L models
- 2.7
- Digital I/O and Environmental Sensors
SYSTEM CONFIGURATION 3.1
3.1.1 3.1.2
3.2
Management Console Connection
Connected computer set up Browser connection
Administrator Set up
Change default root System Password Set up a new Administrator Name the System
3.2.1 3.2.2 3.2.3
- 3.3
- Network Configuration
- IPv6 configuration
- 3.3.1
- 3.3.2
- Dynamic DNS (DDNS) configuration
Services and Service Access
Brute Force Protection
Communications Software
SDT Connector
3.4
3.4.1
3.5
3.5.1 3.5.2 3.5.3
PuTTY SSHTerm
- 3.6
- Management Network Configuration
Enable the Management LAN Configure the DHCP server
3.6.1 3.6.2 3.6.3 Select Failover or broadband OOB 3.6.4 3.6.5 3.6.6
Aggregating the network ports Wi-Fi Wireless LAN Static routes
SERIAL PORT, HOST, DEVICE & USER CONFIGURATION
4
Data Center and Remote Site Management - User Manual
User Manual
- 4.1
- Configure Serial Ports
- 58
59 60 66 66 67 67 68 68
4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.1.6 4.1.7 4.1.8 4.1.9
Common Settings Console Server Mode SDT Mode Device (RPC, UPS, EMD) Mode Terminal Server Mode Serial Bridging Mode Syslog NMEA Streaming
- Cisco USB console connection
- 70
- 4.1.10 USB Consoles
- 71
- 4.2
- Add and Edit Users
- 71
4.2.1 4.2.2
- Set up new Group
- 73
- Set up new Users
- 74
- 4.3
- Authentication
- 76
4.4 4.5 4.6
- Network Hosts
- 76
- Trusted Networks
- 77
Serial Port Cascading
Automatically generate and upload SSH keys Manually generate and upload SSH keys Configure the slaves and their serial ports Managing the slaves
78
- 4.6.1
- 79
4.6.2 4.6.3 4.6.4
80 81 83
- 4.7
- Serial Port Redirection (PortShare)
Managed Devices
83
4.8 4.9
84
- IPsec VPN
- 87
- 87
- 4.9.1
- Enable the VPN gateway
- 4.10 OpenVPN
- 90
- 90
- 4.10.1 Enable the OpenVPN
4.10.2 Configure as Server or Client 4.10.3 Windows OpenVPN Client and Server set up
4.11 PPTP VPN
91 94
99
- 99
- 4.11.1 Enable the PPTP VPN server
- 4.11.2 Add a PPTP user
- 101
101
103
103 104 106
106
107 107 107 108 108 108
109 111 111 112 112
112 115 115 115 116
116
116
4.11.3 Set up a remote PPTP client
4.12 Call Home
4.12.1 Set up Call Home candidate 4.12.2 Accept Call Home candidate as Managed Console Server on CMS 4.12.3 Calling Home to a generic central SSH server
4.13 IP Passthrough
4.13.1 Downstream Router Setup 4.13.2 IP Passthrough Pre-Configuration 4.13.3 IP Passthrough Configuration 4.13.4 Service Intercepts 4.13.5 IP Passthrough Status 4.13.6 Caveats
4.14 Configuration over DHCP (ZTP) 4.15 Enrollment into Lighthouse 5 FIREWALL, FAILOVER & OOB ACCESS 5.1 5.2
Dialup Modem Connection OOB Dial-In Access
- 5.2.1
- Configure Dial-In PPP
Using SDT Connector client Set up Windows XP or later client Set up earlier Windows clients Set up Linux clients
5.2.2 5.2.3 5.2.4 5.2.5
5.3
5.3.1
Dial-Out Access
Always-on dial-out
Table of Contents
- 5.3.2
- Failover dial-out
- 117
119 120 122
122 124 126 127 128 128 129 130
132
132 133 135 135
136
138 139 141 143
145 146 147
147 148 149 150 151 152 154 155
156 157 158 160 160 161
161 162
165
165 166
5.4 5.5 5.6
OOB Broadband Ethernet Access Broadband Ethernet Failover Cellular Modem Connection
Connecting to a GSM HSUPA/UMTS carrier network Connecting to a CDMA EV-DO carrier network Connecting to a 4G LTE carrier network Verifying the cellular connection Cellular modem watchdog
5.6.1 5.6.2 5.6.3 5.6.4 5.6.5 5.6.6 5.6.7 5.6.8
Dual SIM failover Automatic SIM Slot Detection Multi-carrier cellular support
- Cellular Operation
- 5.7
5.7.1 5.7.2 5.7.3 5.7.4
OOB access set up Cellular failover setup Cellular routing Cellular CSD dial-in setup
- 5.8
- Firewall & Forwarding
5.8.1 5.8.2 5.8.3 5.8.4
Configuring network forwarding and IP masquerading Configuring client devices Port / Protocol forwarding Firewall rules
SSH TUNNELS & SDT CONNECTOR 6.1 6.2
Configuring for SSH Tunneling to Hosts SDT Connector Client Configuration
- 6.2.1
- SDT Connector client installation
6.2.2 6.2.3 6.2.4 6.2.5 6.2.6 6.2.7 6.2.8
Configuring a new gateway in the SDT Connector client Auto-configure SDT Connector client with the user’s access privileges Make an SDT connection through the gateway to a host Manually adding hosts to the SDT Connector gateway Manually adding new services to the new hosts Adding a client program to be started for the new service Dial in configuration
- 6.3
- SDT Connector to Management Console
6.4 6.5 6.6 6.7 6.8
SDT Connector: telnet or SSH connect to serially attached devices Using SDT Connector for out-of-band connection to the gateway Importing (and exporting) preferences SDT Connector Public Key Authentication Setting up SDT for Remote Desktop access
Enable Remote Desktop on the target Windows computer to be accessed Configure the Remote Desktop Connection client
SDT SSH Tunnel for VNC
6.8.1 6.8.2
6.9
6.9.1 6.9.2
Install and configure the VNC Server on the computer to be accessed Install, configure and connect the VNC Viewer
6.10 Using SDT to IP connect to hosts that are serially attached to the gateway
6.10.1 Establish a PPP connection between the host COM port and console server 6.10.2 Set up SDT Serial Ports on console server 6.10.3 Set up SDT Connector to ssh port forward over the console server Serial Port
6.11 SSH Tunneling using other SSH clients (e.g. PuTTY) ALERTS, AUTO-RESPONSE AND LOGGING
168
168 171 172
172 176 176 178
178 179 179 180 180 181
7.1 7.2
Configure Auto-Response Check Conditions
- 7.2.1
- Environmental
7.2.2 7.2.3 7.2.4 7.2.5 7.2.6
Alarms and Digital Inputs UPS/Power Supply UPS Status Serial Login, Signal or Pattern USB Console Status
6
Data Center and Remote Site Management - User Manual
User Manual
7.2.7 7.2.8 7.2.9
ICMP Ping Link Layer Discovery Protocol (LLDP) Cellular Data
181 182 183 183 184 185 185 186 187
188
188 189 189 190 190 190 190
191 191
191 192 194 197
197
197 198 198 199 199
201 201
201 205 205 206
208
208 211 213 213 213 215
217
217 218 221 222 222
224
224 225 225 226
227 227
228 228
7.2.10 Custom Check 7.2.11 SMS Command 7.2.12 CLI Log In/Out Check 7.2.12 Web UI Log In/Out Check 7.2.13 Network Interface Event 7.2.14 Routed Data Usage Check
- 7.3
- Trigger Actions
7.3.1 7.3.2 7.3.3 7.3.4 7.3.5 7.3.6 7.3.7
Send Email Send SMS Perform RPC Action Run Custom Script Send SNMP Trap Send Nagios Event Perform Interface Action
Resolve Actions Configure SMTP, SMS, SNMP and/or Nagios service for alert notifications
Send Email alerts
7.4 7.5
7.5.1 7.5.2 7.5.3 7.5.4
Send SMS alerts Send SNMP Trap alerts Send Nagios Event alerts
- Logging
- 7.6
7.6.1 7.6.2 7.6.3 7.6.4 7.6.5
Log storage Serial port logging Network TCP and UDP port logging Auto-Response event logging Power device logging
POWER, ENVIRONMENT & DIGITAL I/O 8.1
8.1.1
Remote Power Control (RPC)
RPC connection
8.1.2 8.1.3 8.1.4
RPC access privileges and alerts User power management RPC status
- 8.2
- Uninterruptible Power Supply Control (UPS)
Managed UPS connections Remote UPS management Controlling UPS powered computers UPS alerts
8.2.1 8.2.2 8.2.3 8.2.4 8.2.5 8.2.6
UPS status Overview of Network UPS Tools (NUT)
Environmental Monitoring
Connecting the EMD and its sensors Connecting sensors to ACM5000s, ACM5500s, and ACM7000s Adding EMDs and configuring the sensors Environmental alerts
8.3
8.3.1 8.3.2 8.3.3 8.3.4
- 8.3.5
- Environmental status
- Digital I/O Ports
- 8.4
8.4.1 8.4.2 8.4.3 8.4.4
Digital I/O Output Configuration Digital I/O Input Configuration High Voltage Outputs DIO SNMP status
AUTHENTICATION 9.1
9.1.1 9.1.2
Authentication Configuration
Local authentication TACACS authentication
Table of Contents
9.1.3 9.1.4 9.1.5 9.1.6 9.1.7 9.1.8 9.1.9
RADIUS authentication LDAP authentication
229 230 233 234 235 236 238 239 239 239
240 241 245 245 246
246 247 248 248 249 250
251
251 254 254 255 256
259 259 260 261 262 264 266 268 268 269 270 271 271
272 274
275 275 276 276
276 278
279 280 280
282 285 286 287 288 289 290
RADIUS/TACACS user configuration Group support with remote authentication Remote groups with RADIUS authentication Remote groups with LDAP authentication Remote groups with TACACS+ authentication
9.1.10 Idle timeout 9.1.11 Kerberos authentication 9.1.12 Authentication testing
9.2 9.3
PAM (Pluggable Authentication Modules) SSL Certificate
NAGIOS INTEGRATION 10.1 Nagios Overview 10.2 Configuring Nagios distributed monitoring
10.2.1 Enable Nagios on the console server 10.2.2 Enable NRPE monitoring 10.2.3 Enable NSCA monitoring 10.2.4 Configure selected Serial Ports for Nagios monitoring 10.2.5 Configure selected Network Hosts for Nagios monitoring 10.2.6 Configure the upstream Nagios monitoring host
10.3 Advanced Distributed Monitoring Configuration
10.3.1 Sample Nagios configuration 10.3.2 Basic Nagios plug-ins 10.3.3 Additional plug-ins 10.3.4 Number of supported devices 10.3.5 Distributed Monitoring Usage Scenarios
SYSTEM MANAGEMENT 11.1 System Administration and Reset 11.2 Upgrade Firmware 11.3 Configure Date and Time 11.4 Configuration Backup 11.5 Delayed Configuration Commit 11.6 FIPS Mode STATUS REPORTS 12.1 Port Access and Active Users 12.2 Statistics 12.3 Support Reports 12.4 Syslog 12.5 Dashboard
12.5.1 Configuring the Dashboard 12.5.2 Creating custom widgets for the Dashboard
MANAGEMENT 13.1 Device Management 13.2 Port and Host Logs 13.3 Terminal Connection
13.3.1 Web Terminal 13.3.2 SDT Connector access
13.4 Power Management CONFIGURATION FROM THE COMMAND LINE 14.1 Accessing config from the command line
14.1.1 Serial Port configuration 14.1.2 Adding and removing Users 14.1.3 Adding and removing user Groups 14.1.4 Authentication 14.1.5 Network Hosts 14.1.6 Trusted Networks 14.1.7 Cascaded Ports