Raritan Computer CC-SG User Manual

Page 16

Advertising
background image

2 C

OMMAND

C

ENTER

S

ECURE

G

ATEWAY

A

DMINISTRATOR

G

UIDE

are managed by CC-SG. These devices control the target servers and systems that are
connected to them.

Director Client—A Java-based client for CC-SG useable by both normal access users and

administrators. It is the only client that permits administration.

Elements—are the values of a category. For example, the “New York City” element belongs

to the “Location” category. Or, the “Windows” element belongs to the “OS Type” category.

Ghosted Ports—a ghosted port can occur when managing Paragon devices and when a CIM

or target server is removed from the system or powered off (manually or accidentally). Refer
to Raritan’s Paragon II User Manual for additional information.

Hostname—A hostname can be used if DNS server support is enabled. Please refer to

Network Configuration in Chapter 12: Advanced Administration for additional
information. The hostname and its Fully-Qualified Domain Name (FQDN = Hostname +
Suffix) cannot exceed 257 characters. It can consist of any number of components, as long as
they are separated by “.”. Each component has a maximum size of 63 characters and the first
character must be alphabetic. The remaining characters can be alphabetic, numeric, or “-
“ (hyphen or minus). The last character of a component may not be “-”. While the system
preserves the case of the characters entered into the system, the FQDN is case-insensitive
when used.

iLO/RILOE—Hewlett Packard’s Integrated Lights Out/Remote Insight Lights Out servers

that can be managed by CC-SG. Targets of an iLO/RILOE device are powered on/off and
recycled directly. iLO/RILOE devices cannot be discovered by CC-SG; they have to be
manually added as nodes.

In-band Access—going through the TCP/IP network to correct or troubleshoot a target in

your network. KVM and Serial devices can be accessed via these in-band applications:
RemoteDesktop Viewer, SSH Client, RSA Client, VNC Viewer.

IPMI Servers (Intelligent Platform Management Interface)—servers that can be controlled

by CC-SG. IPMI are discovered automatically but can be added manually as well.

Out-of-Band Access—using applications such as Raritan Remote Console (RRC), Raritan

Console (RC), or Multi-Platform Client (MPC) to correct or troubleshoot a KVM or serial
managed node in your network.

Policies—define the permissions, type of access, and to which nodes and devices a user

group can access. Policies are applied to a user group and have several control parameters to
determine the level of control, such as date and time of access.

Nodes—are the target systems, such as servers, desktop PCs, or other networked equipment,

that CC-SG users can access.

Interfaces—Interfaces are ways a Node can be accessed, whether through an out-of-band

solution such as a Dominion KX101 connection, or through an in-band solution such as a
VNC server.

Node Groups—a defined group of nodes that are accessible to a user. Node groups are used

when creating a policy to control access to the nodes in the group.

Ports—are connection points between a Raritan Device and a Node. Ports only exist on

Raritan devices and identify a pathway from that device to a node.

SASL—(Simple Authentication and Security Layer). A method for adding authentication

support to connection-based protocols.

SSH—Clients, such as Putty or OpenSSH, that provide a command line interface to CC-SG.

Only a subset of CC-SG commands is provided via SSH to administer devices and CC-SG
itself. Please refer to Chapter 12: Advanced Administration for additional information.

User Groups—sets of users that share the same level of access and privileges. For example,

the default user group System Administrators has full access to all configuration tasks and
target nodes.

Advertising