Raritan Engineering Command Center CC-SG User Manual

Page 20

Advertising
background image

4 C

OMMAND

C

ENTER

S

ECURE

G

ATEWAY

A

DMINISTRATOR

G

UIDE

CIM (Computer Interface Module)—is the hardware used to connect a target server and a

Raritan device. Each target requires a CIM, except for the Dominion KX101 which is
attached directly to one target and therefore, does not require a CIM. Targets servers should
be powered on and connected to CIMs and CIMs should be connected to the Raritan Device
BEFORE adding the ports in CC-SG. Otherwise, the blank CIM name will overwrite the CC-
SG port name. Servers need to be rebooted after connecting to a CIM.

CommandCenter NOC (CC-NOC)—is a network monitoring appliance that audits and

monitors the status of servers, equipment, and Raritan devices that CC-SG manages.

Device Group—a defined group of devices (see the Devices definition) that are accessible to

a user. Device groups are used when creating a policy to control access to the devices in the
group.

Devices—are Raritan products such as Dominion KX116, Dominion SX48, Dominion

KSX440, IP-Reach, Paragon II System Controller, Paragon II UMT832 with USTIP, etc. that
are managed by CC-SG. These devices control the target servers and systems that are
connected to them.

Elements—are the values of a category. For example, the “New York City” element belongs

to the “Location” category. Or, the “Windows” element belongs to the “OS Type” category.

Generic Devices—a device, such as a hub, Windows server, or Cisco router, that can be

managed by CC-SG. Generic devices cannot be discovered by CC-SG; they have to be
manually added—see section Add Device in Chapter 5: Adding Devices and Device
Groups
.

Ghosted Ports—a ghosted port can occur when managing Paragon devices and when a CIM

or target server is removed from the system or powered off (manually or accidentally). Refer
to Raritan’s Paragon II User Manual for additional information.

Hostname—A hostname can be used if DNS server support is enabled (see section Network

Configuration in Chapter 12: Advanced Administration for additional information). The
hostname and its Fully-Qualified Domain Name (FQDN = Hostname + Suffix) cannot exceed
257 characters. It can consist of any number of components, as long as they are separated by
“.”. Each component has a maximum size of 63 characters and the first character must be
alphabetic. The remaining characters can be alphabetic, numeric, or “-“ (hyphen or minus).
The last character of a component may not be “-”. While the system preserves the case of the
characters entered into the system, the FQDN is case-insensitive when used.

iLO/RILOE—Hewlett Packard’s Integrated Lights Out/Remote Insight Lights Out servers

that can be managed by CC-SG. Data between CC-SG and iLO/RILOE device is SSL
encrypted. Targets of an iLO/RILOE device are powered on/off and recycled directly.
iLO/RILOE devices cannot be discovered by CC-SG; they have to be manually added—see
section Add Device in Chapter 5: Adding Devices and Device Groups.

In-band Access—going through the TCP/IP network to correct or troubleshoot a target in

your network. KVM, Serial, and Generic devices can be accessed via these in-band
applications: RemoteDesktop Viewer, SSH Client, VNC Viewer.

IPMI Servers (Intelligent Platform Management Interface)—servers that can be controlled

by CC-SG. IPMI are discovered automatically but can be added manually as well—see
section Add Device in Chapter 5: Adding Devices and Device Groups.

Out-of-Band Access—using applications such as Raritan Remote Console (RRC), Raritan

Console (RC), or Multi-Platform Client (MPC) to correct or troubleshoot a KVM or serial
managed target in your network.

Policies—define the permissions, type of access, and to which ports and/or devices a user

group has access to. Policies are applied to a user group and have several control parameters
to determine the level of control, such as date and time of access.

Port Groups—a defined group of ports that are accessible to a user. Port groups are used

when creating a policy to control access to the ports in the group.

Advertising