What's New in the EMX User Guide Chapter 1 Introduction Overview ............................1 Product Models ..........................2 EMX2-111..........................2 EMX2-888..........................3 Package Contents.......................... 3 APIPA and Link-Local Addressing....................4 Chapter 2 Rack Mounting an EMX Mounting a Zero U EMX ........................ 6 Mounting a 1U EMX........................
Page 4
Overview of the LCD Display.....................67 Control Buttons ........................68 Operating the LCD Display....................68 EMX2-888 Contact Closure Sensor Termination ................76 Connecting Contact Closure Sensors to EMX2-888 ............77 EMX2-888 Contact Closure Sensor LEDs ................81 Reset Button ..........................82 Beeper ............................82 Chapter 6 Using the Web Interface Supported Web Browsers......................
Page 5
Contents Naming the EMX ......................110 Modifying the Network Configuration................110 Modifying Network Service Settings ................120 Setting the Date and Time....................127 Setting Default Measurement Units.................131 Configuring the Feature Port ...................132 Configuring the Auxiliary Port ..................133 Configuring the Serial Port ....................135 Setting the Cascading Mode ...................136 Specifying the Device Altitude ..................143 Setting Data Logging .......................144 Configuring SMTP Settings .....................145...
Page 6
Contents Managing Event Logging ......................232 Viewing the Local Event Log ...................232 Viewing the Wireless LAN Diagnostic Log ..............233 Clearing Event Entries.....................234 Viewing Connected Users ......................234 Monitoring Server Accessibility....................235 Adding IT Devices for Ping Monitoring ................235 Editing Ping Monitoring Settings..................238 Deleting Ping Monitoring Settings ...................238 Checking Server Monitoring States .................239 Environmental Sensors and Actuators ..................239 Identifying Environmental Sensors and Actuators............240...
Page 7
Contents Network Diagnostics ........................293 Pinging a Host .........................293 Tracing the Network Route....................294 Listing TCP Connections ....................294 Downloading Diagnostic Information ..................294 Rebooting the EMX........................295 Accessing the Help ........................296 Retrieving Software Packages Information ..............296 Browsing through the Online Help...................296 Chapter 7 Using SNMP Enabling SNMP..........................298 Configuring Users for Encrypted SNMP v3 ................299 Configuring SNMP Notifications ....................300...
Page 8
Contents Blade Extension Strip Settings ..................330 Event Log.........................331 Wireless LAN Diagnostic Log ..................332 Server Reachability Information ..................332 Command History......................334 History Buffer Length.......................334 Reliability Data.........................334 Reliability Error Log ......................334 Examples .........................335 Clearing Information........................336 Clearing Event Log ......................337 Clearing WLAN Log......................337 Configuring the EMX Device and Network ................337 Entering Configuration Mode...................338 Quitting Configuration Mode....................338 Device Configuration Commands..................339...
Page 9
Logging out of CLI........................439 Appendix A Specifications Maximum Ambient Operating Temperature ................440 EMX2-111 Feature RJ-45 Port Pinouts ..................440 EMX2-888 Feature RJ-45 Port Pinouts ..................441 Sensor RJ-12 Port Pinouts ......................441 Serial RS-232 Port Pinouts......................441 RS-485 Port Pinouts ........................442 Appendix B Configuration or Firmware Upgrade with a USB Drive System and USB Requirements ....................444...
Page 10
Contents Firmware Upgrade via USB .......................453 Appendix C Bulk Configuration or Firmware Upgrade via DHCP/TFTP Bulk Configuration/Upgrade Procedure ..................454 TFTP Requirements........................455 DHCP IPv4 Configuration in Windows..................456 DHCP IPv6 Configuration in Windows..................466 DHCP IPv4 Configuration in Linux.....................473 DHCP IPv6 Configuration in Linux.....................475 Appendix D Resetting to Factory Defaults Using the Reset Button ......................477 Using the CLI Command ......................478...
Page 11
Ways to Probe Existing User Profiles ..................539 Truncated Data in the Web Interface..................540 Raritan Training Website ......................540 Connecting Contact Closure Sensors to OLD EMX2-888 ............541 Appendix J Integrating Asset Management Sensors with Other Products Asset Management Sensors and Raritan PDUs ...............543 Asset Management Sensors and dcTrack.................543...
Page 12
What's New in the EMX User Guide Important: Raritan disables SSL 3.0 and uses TLS for releases 3.0.4, 3.0.20 and later releases due to published security vulnerabilities in SSL 3.0. Make sure your network infrastructure, such as LDAP and mail services, uses TLS rather than SSL 3.0.
Page 13
MAC Address (on page 74) USB-Cascaded Device's Position (on page 76) EMX2-888 Contact Closure Sensor Termination (on page 77) Connecting Contact Closure Sensors to EMX2-888 (on page 81) EMX2-888 Contact Closure Sensor LEDs (on page 82) Beeper (on page 83)
Page 14
Sensor Threshold Settings (on page 536) PDView App for Viewing the EMX (on page Connecting Contact Closure Sensors to OLD EMX2-888 541) Please see the Release Notes for a more detailed explanation of the changes applied to this version of EMX.
IT devices to administer. The following items are required for setting up the asset management system: Raritan asset tags: You tag an IT device by sticking an electronic asset tag on it. Raritan asset management sensors (asset sensors): Each asset sensor transmits the tag and position information to the EMX.
EMX2-111 EMX2-888 All models are functionally identical, but vary in the dimension and total number of ports. Note: For a list of available asset sensor kits and tags, visit the Raritan website's Product Selector page (http://www.findmypdu.com/). EMX2-111 EMX2-111 has the following ports and components: ...
Contact closure sensor termination For details on each port, see (on page 64). Connection Ports Note: If your EMX is EMX2-888, which contains built-in contact closure sensor terminals, see Connecting Contact Closure Sensors to OLD EMX2-888 (on page 541) and...
Chapter 1: Introduction APIPA and Link-Local Addressing The EMX supports Automatic Private Internet Protocol Addressing (APIPA) as of release 3.2.0. With APIPA, your EMX automatically configures a link-local IP address and a link-local host name when it cannot obtain a valid IP address from any DHCP server in the TCP/IP network.
Page 19
Chapter 1: Introduction Retrieval of the link-local IPv4 address: (on page 72). IPv4 Address...
Rack Mounting an EMX Chapter 2 Depending on the model you purchased, the way to mount an EMX device varies. In This Chapter Mounting a Zero U EMX ................6 Mounting a 1U EMX ..................7 Mounting a Zero U EMX This section describes how to mount a Zero U EMX device using L-brackets and two buttons.
Chapter 2: Rack Mounting an EMX 4. After both L-brackets are installed, you can choose either of the following ways to mount the device in the rack. Using rack screws, fasten the device to the rack through two identical holes near the edge of each L-bracket. Mount the device by screwing a mounting button in the back ...
Page 22
Chapter 2: Rack Mounting an EMX 3. Secure with the provided end cap screws. 4. Fasten the rackmount brackets' ears to the rack using your own fasteners.
1. Install the cable retention clip by inserting both ends into the tiny holes on two hexagon screws adjacent to the power socket. 2. Plug one end of the Raritan-provided power cord into the power socket, and press the cable retention clip toward the power cord until...
Chapter 3: Installation and Configuration 3. Connect the other end of the power cord to an appropriate power source. Configuring the EMX You can initially configure the EMX by connecting it to a computer, or to a TCP/IP network that supports DHCP. Configuration over a DHCP-enabled network: 1.
USB-B port (male) RS-232 serial port (male) EMX2-111: EMX2-888: To use the command line interface (CLI) for configuration, establish an RS-232 or USB connection. To use a web browser for configuration, make a network connection to the computer. The EMX is automatically configured with the following link-local addressing in any network without DHCP available: ...
A USB-to-serial driver named "Dominion EMX Serial Console" is required for Microsoft Windows operating systems. ® ® Download the USB serial console driver from the Raritan website's (http://www.raritan.com/support/). The driver contains Support page the dominion-serial.inf, dominion-serial.cat and dominion-serial-setup-<n>.exe files. Note: <n> in the filename of "dominion-serial-setup-<n>.exe" represents the file's version number.
Page 27
Chapter 3: Installation and Configuration 3. Connect the EMX to the computer via a USB cable. The driver is automatically installed. ® Manual driver installation in Windows 1. Make sure the EMX has been connected to the computer via a USB cable.
Chapter 3: Installation and Configuration Connecting the EMX to Your Network To remotely administer the EMX, you must connect the EMX to your local area network (LAN). The EMX can be connected to a wired or wireless network. Note: If your EMX will be used as a master device in the USB-cascading configuration where the bridging mode applies, make a wired connection.
A/B/G/N Raritan USB WIFI A/B/G/N Note: To use the Edimax EW-7722UnD or Raritan USB WIFI wireless LAN adapter to connect to an 802.11n wireless network, the handshake timeout setting must be changed to 500 or greater, or the wireless connection will fail.
Page 30
4. The EMX prompts you to log in. Both user name and password are case sensitive. a. Username: admin b. Password: raritan (or a new password if you have changed it). 5. If prompted to change the default password, change or ignore it. ...
Page 31
Chapter 3: Installation and Configuration Tip: You can combine multiple commands to configure multiple parameters at a time. For example, network interface LANInterfaceSpeed <option> LANInterfaceDuplexMode <mode> c. For the wireless network mode, you must configure the Service Set Identifier (SSID) parameter. To set Use this command SSID...
Page 32
Chapter 3: Installation and Configuration To set Use this command EAP passord network wireless eapPassword When prompted to enter the password for EAP authentication, type the password. EAP CA network wireless certificate eapCACertificate When prompted to enter the CA certificate, open the certificate with a text editor, copy and paste the content into the communications program.
Page 33
Chapter 3: Installation and Configuration To set Use this command IP protocol network ip proto <protocol> <protocol> = v4Only, v6Only or both IP address network ip returned by dnsResolverPreference the DNS <resolver> server <resolver> = preferV4 or preferV6 e. After enabling the IPv4 or IPv6 protocol in the earlier step, configure the IPv4 or IPv6 network parameters.
Page 34
Chapter 3: Installation and Configuration For static IP configuration, configure these parameters. To set Use this command Static IPv4 or network <version> ipAddress <ip IPv6 address address> <ip address> = static IP address IPv4 subnet network ipv4 subnetMask mask <netmask>...
Chapter 3: Installation and Configuration Tip: You can type "show network wireless" to display a shortened version of wireless settings. 11. If all are correct, type exit to log out of the EMX. If any are incorrect, repeat Steps 7 to 10 to change network settings. The IP address configured may take seconds to take effect.
Chapter 3: Installation and Configuration Cascading the EMX via USB You can use USB cables to cascade up to eight Raritan devices. All devices in the USB-cascading chain share the Ethernet connectivity. Different Raritan models can be cascaded as long as they are running an appropriate firmware.
Page 37
Chapter 3: Installation and Configuration 4. Connect the USB-A port of the master device to the USB-B port of an additional EMX via a USB cable. This additional device is Slave 1. 5. Connect Slave 1's USB-A port to the USB-B port of an additional EMX via a USB cable.
Page 38
Identifying Cascaded Devices (on page 107). Tip: The USB-cascading configuration can be a combination of diverse Raritan products that support the USB-cascading feature, including PX2, PX3, PX3TS, EMX and BCM. See the USB-Cascading Solution Guide on Raritan website's Support page...
Raritan asset sensors: An asset sensor transmits the asset management tag's ID and positioning information to the EMX. Raritan asset tags: An asset tag is adhered to an IT device. The asset tag uses an electronic ID to identify and locate the IT device.
The difference between the master and slave asset sensors is that the master asset sensor has an RJ-45 connector while the slave does not. The following diagram illustrates some asset sensors. Note that Raritan provides more types of asset sensors than the diagram.
Page 41
Chapter 4: Connecting External Equipment (Optional) Make sure that the U-shaped sheet metal adjacent to the male DIN connector is inserted into the rear slot of the master asset sensor. Screw up the U-shaped sheet metal to reinforce the connection.
Chapter 4: Connecting External Equipment (Optional) Introduction to Asset Tags You need both asset sensors and asset tags for tracking IT devices. Asset tags provide an ID number for each IT device. The asset tags are adhered to an IT device at one end and plugged in to an asset sensor at the other.
The FEATURE port of EMX2-111 supports 5 volts of power only, which is insufficient for connecting an asset sensor at a distance between 1 and 10 meters. Therefore, the use of a Raritan X cable is required for EMX2-111 to connect an asset sensor whose cabling distance is over 1 meter.
Page 44
FEATURE port on the EMX2-111. MASTER asset sensor Asset tags IT devices Raritan X cable Note: To connect Raritan's environmental sensor packages to EMX2-111, connect them to the female RJ-12 connector of the X cable. For details, Using an X Cable (on page 37).
Chapter 4: Connecting External Equipment (Optional) EMX2-888 Connection Unlike EMX2-111, EMX2-888 does NOT need to use a Raritan X cable because its FEATURE port supports 12 volts of power. To connect a regular asset sensor assembly to EMX2-888: 1. Assemble regular asset sensors according to your needs. See (on page 26).
For blade servers, which are contained in a single chassis, you can use a blade extension strip to track individual blade servers. Raritan's blade extension strip functions similar to a Raritan asset sensor but requires a tag connector cable for connecting it to a tag port on the regular or composite asset sensor.
Page 47
Chapter 4: Connecting External Equipment (Optional) Tag ports Cable socket(s) for connecting the tag connector cable Note: Each tag port on the blade extension strip is labeled a number, which is displayed as the slot number in the EMX device's web interface. To install a blade extension strip: 1.
Page 48
Chapter 4: Connecting External Equipment (Optional) a. Affix the adhesive part of the asset tag to one side of a blade server through the tag's tape. b. Plug the tag connector of the asset tag into a tag port on the blade extension strip.
Chapter 4: Connecting External Equipment (Optional) Connecting Composite Asset Sensors (AMS-Mx-Z) A composite asset sensor is named AMS-Mx-Z, where x is a number, such as AMS-M2-Z or AMS-M3-Z. It is a type of asset sensor that functions the same as regular MASTER asset sensors except for the following differences: ...
The maximum cable length between composite asset sensors is 2 meters, but the total cable length cannot exceed 10 meters. The maximum number of composite asset sensors that can be daisy chained vary according to the Raritan device. Raritan devices Maximum sensors per chain EMX2-111,...
Page 51
PMC (BCM2 series) Tip: To increase the maximum number of composite asset sensors attached to a Raritan PX2 PDU or EMX2-111, you can use Raritan's X cable to enhance the power supply to the asset sensor chain. See Using an X Cable (on page 37).
Page 52
Chapter 4: Connecting External Equipment (Optional) 2. Plug the male phone connector of the X cable into the RJ-12 SENSOR port of the EMX device. This step is required for enhancing the power supply to asset sensors. 3. Plug the male RJ-45 connector at the longer end of the X cable into the RJ-45 port labeled "Input"...
Chapter 4: Connecting External Equipment (Optional) 4. Connect any Raritan environmental sensor package or sensor hub to the female RJ-12 sensor port of the X cable if environmental sensor packages are needed. Note that a DX or DPX3 sensor requires an RJ-12 to RJ-45 adapter to connect the X cable.
EMX2-111 This model has only one SENSOR port so it can manage up to 32 sensors and/or actuators. EMX2-888 This model has 8 SENSOR ports, which can manage up to 128 sensors and/or actuators in total. In addition, it has two built-in contact closure terminals to connect two contact closure sensors.
Page 55
EMX. To connect a DPX differential air pressure sensor: 1. Plug one end of a Raritan-provided phone cable into the IN port of a differential air pressure sensor. 2. Plug the other end of this phone cable into the RJ-12 SENSOR port on the EMX.
Chapter 4: Connecting External Equipment (Optional) Using an Optional DPX-ENVHUB4 Sensor Hub Optionally, you can connect a Raritan DPX-ENVHUB4 sensor hub to the EMX. This allows you to connect up to four DPX sensor packages to the EMX via the hub.
Chapter 4: Connecting External Equipment (Optional) Using an Optional DPX-ENVHUB2 cable A Raritan DPX-ENVHUB2 cable doubles the number of connected environmental sensors per SENSOR port. This cable supports DPX sensor packages only. Do NOT connect DPX2, DPX3 or DX sensor packages to it.
Chapter 4: Connecting External Equipment (Optional) 2. The cable has two RJ-12 sensor ports. Connect DPX sensor packages to the cable's sensor ports. 3. Repeat the above steps if there are additional SENSOR ports on your EMX.
Sensor Connection Restrictions: Connect a DPX sensor package to the EMX using the sensor cable pre-installed (or provided) by Raritan. You MUST NOT extend or modify the sensor cable's length by using any tool other than the Raritan's sensor hubs.
RJ-12 connector and one to three head connectors. You have to connect DPX2 sensor packages to the sensor cable. For more information on DPX2 sensor packages, access the Environmental Sensors Guide or Online Help on Raritan website's (http://www.raritan.com/support/). Support page Item...
Page 61
Chapter 4: Connecting External Equipment (Optional) The following procedure illustrates a DPX2 sensor cable with three head connectors. Your sensor cable may have fewer head connectors. Warning: If there are free head connectors between a DPX2 sensor cable's RJ-12 connector and the final attached DPX2 sensor package, the sensor packages following the free head connector(s) on the same cable do NOT work properly.
Chapter 4: Connecting External Equipment (Optional) 3. Plug the RJ-12 connector of the DPX2 sensor cable into the RJ-12 SENSOR port on the EMX. OR you can directly connect the DPX2 sensor package to a DX sensor chain without using any RJ-12 to RJ-45 adapter. See (on page 52).
Chapter 4: Connecting External Equipment (Optional) To connect DPX3 sensor packages to the EMX: 1. Connect an RJ-12 to RJ-45 adapter cable to the DPX3 sensor package. Connect the adapter's RJ-45 connector to either RJ-45 port of the DPX3 sensor package. 2.
Chapter 4: Connecting External Equipment (Optional) Connecting a DPX2 Sensor Package to DPX3 You can connect only one DPX2 sensor package to the "end" of a DPX3 sensor chain. It is strongly recommended to use an RJ-12 to RJ-45 adapter for connecting the DPX2 to the final DPX3 in the chain. The maximum number of DPX3 sensor packages in the chain must be less than 12 when a DPX2 sensor package is involved.
Most DX sensor packages contain terminals for connecting detectors or actuators. For information on connecting actuators or detectors to DX terminals, refer to the Environmental Sensors Guide or Online Help on Raritan website's (http://www.raritan.com/support/). Support page You can cascade up to 12 DX sensor packages.
Page 66
Chapter 4: Connecting External Equipment (Optional) 2. If you want to cascade DX packages, get an additional standard network patch cable (CAT5e or higher) and then: a. Plug one end of the cable into the remaining RJ-45 port on the prior DX package.
Plug the RJ-45 connector of this cable into the IN port (Port 1) of the hub. b. Plug the RJ-12 connector of this cable into the RJ-12 SENSOR port of the EMX. 2. Connect the Raritan sensor packages to any of the four OUT ports on the hub.
Page 68
An RJ-12 to RJ-45 adapter is required for connecting a DPX or DPX2 sensor package to the hub. This diagram illustrates a configuration with a sensor hub connected. The EMX RJ-12 to RJ-45 adapter cable DPX3-ENVHUB4 sensor hub Any Raritan sensor packages...
Chapter 4: Connecting External Equipment (Optional) Mixing Diverse Sensor Types You can mix DPX, DPX2, DPX3 and DX sensor packages on any sensor port of the EMX2-888 or EMX2-111 according to the following sensor combinations. In some scenarios, the DPX3-ENVHUB4 sensor hub is required.
Page 70
Chapter 4: Connecting External Equipment (Optional) An RJ-12 to RJ-45 adapter is recommended to connect a DPX or DPX2 sensor package to DPX3-ENVHUB4. In the following diagrams, the sensor package in "green" can be replaced by a DPX2 sensor package. The sensor package in "blue" can be one DPX2, DPX3 or DX sensor package.
Chapter 4: Connecting External Equipment (Optional) Mix DPX3 and DX in a sensor chain: Any DX sensor package in a chain can be replaced by a DPX3 sensor package. For example, the following diagram shows a sensor chain comprising both DX and DPX3 sensor packages. The total number of sensor packages in this chain cannot exceed 12.
Logitech QuickCam Communicate MP, Model 960-000240 Logitech C200, C210, C270 and C920 Other UVC-compliant webcams may work. However, Raritan has neither tested them nor claimed that they will work properly. More information about the scores of UVC-compliant webcams can be found at http://www.ideasonboard.org/uvc...
NETCOMM IG6000 Industrial Grade SmartModem US Robotics 56K modem The EMX may also support other analog modems which Raritan did not test. Note that the EMX does NOT support dial-out or dial-back operations via the modem. To connect an analog modem: 1.
Chapter 4: Connecting External Equipment (Optional) You need to enable the modem dial-in support to take advantage of this feature, see (on page 135). Configuring the Serial Port Connecting an External Beeper The EMX supports the use of an external beeper for audio alarms. External beepers that are supported include but may not be limited to the following: ...
Page 76
Chapter 4: Connecting External Equipment (Optional) To connect an SHX-30 heat exchanger: 1. Plug one end of the Schroff adapter cable into the RS-485 port on the Schroff SHX heat exchanger. 2. Plug the other end of the adapter cable into one of available RS-485 ports on your EMX.
Note: EMX2-888 does not support the PowerLogic PM710. This device is only supported when plugged into the RS485 port using a PM710 supported cable (not provided by Raritan with the EMX). Refer to your Schneider Electric PowerLogic PM710 documentation for information on the pinouts for the meter.
Chapter 5 In This Chapter Power Switch...................64 Connection Ports ..................64 LCD Display Panel ..................66 EMX2-888 Contact Closure Sensor Termination ........76 Reset Button....................82 Beeper .....................82 Power Switch A power switch turns on or off the EMX. EMX2-111 front panel power switch:...
Page 79
Used for... SENSOR (RJ-12) Connection to one of the following devices: Raritan's environmental sensor package(s). Raritan's sensor hub, which expands the number of a sensor port to four ports. RS-485 Connection to an electrical device with the RS-485 interface.
Establishing a USB connection between a computer and the EMX for using the command line interface or performing the disaster recovery. For disaster recovery instructions, contact Raritan Technical Support. LCD Display Panel The LCD display panel shows the sensor reading or status, asset management states and the device's IP or MAC address.
A discrete (on/off) sensor enters the alarmed state. NO asset tag is detected on the selected rack unit. Note: For the Raritan asset sensor, a rack unit refers to a tag port. The measurement unit of the displayed data, such as % This section indicates: ...
Chapter 5: Using the EMX Control Buttons There are four control buttons. Up and Down buttons for selecting a specific target, which can be an environmental sensor's ID number or an asset sensor's port number MODE button for switching between various modes, including: - Sensor mode - Asset Sensor mode, indicated by the word ASSET, for showing the asset sensor information...
Page 83
Chapter 5: Using the EMX Number Example information The selected environmental sensor's reading is 22 The word "MASTER" indicates the EMX is the master device in a USB-cascading configuration. See Cascading (on page 22). the EMX via USB Note: For a standalone EMX, this word is NOT displayed. For a slave device, it shows "SLAVE"...
Page 84
Chapter 5: Using the EMX States Description The actuator is turned on. The actuator is turned off. Note: Numeric sensors show both numeric readings and sensor states to indicate environmental or internal conditions while discrete (on/off) sensors show sensor states only to indicate state changes. 4.
Page 85
Asset Sensor Information The LCD display can show the asset sensor state on each FEATURE port as well as the asset tag state of each rack unit. For the Raritan asset sensor, a rack unit refers to a tag port.
Page 86
Chapter 5: Using the EMX If no asset sensor is physically connected to the selected FEATURE port, the term "nA" appears. 3. Press the FUNC button. When a blinking double-arrow symbol appears to the left of the LCD display, press the Up or Down button to select the desired rack unit on the asset sensor.
Page 87
Chapter 5: Using the EMX If you connect your EMX to the wireless network, a Wi-Fi icon is displayed at the bottom-right corner. To display the IPv4 address: 1. Press the MODE button to enter the Device mode, indicated by an alphabet "d"...
Chapter 5: Using the EMX Section Example information The word "MASTER" indicates the EMX is the master device in a USB-cascading configuration. See (on page 22). Cascading the EMX via USB Note: For a standalone EMX, this word is NOT displayed. For a slave device, it shows "SLAVE"...
Page 89
Chapter 5: Using the EMX Section Example information "d" means the LCD display has entered the Device mode. "CA" indicates that the USB-cascading information is being displayed. "SLAVE" indicates that this EMX is a slave device. Note: For a master device, it shows the word "MASTER" instead.
Connect third-party detectors/switches to the CC sensor termination on your EMX2-888. Exception: Older EMX2-888 models have the "spring-loaded" CC sensor termination built into EMX2-888 so they do not use a detachable terminal module. See Connecting Contact Closure Sensors to OLD EMX2-888 (on page 541).
To set to Normally Open (N.O), press the button to turn it up. Tip: Alternatively, third-party CC switches can be connected to Raritan's DPX-CC2-TR or DX sensor package, which is then connected to a SENSOR port on the EMX. For sensor information, refer to the...
Page 92
Chapter 5: Using the EMX The two termination points to the right are associated with channel 1 (CC1 as indicated in the panel), and the two to the left are associated with channel 2 (CC2). With this design, there are two ways to plug discrete detectors/switches: ...
Page 93
Chapter 5: Using the EMX 3. Use a screwdriver with a 2.5 mm wide shaft to tighten the screws above each termination point to secure the wires, using a torque of 0.196 N·m (2 kgf·cm). To make connections when the terminal module is separated from the EMX: 1.
Page 94
Chapter 5: Using the EMX 3. Strip the insulation and insert each wire of both detectors/switches into each termination point. 4. Use a screwdriver with a 2.5 mm wide shaft to tighten the screws above each termination point to secure the wires, using a torque of 0.196 N·m (2 kgf·cm).
6. Tighten the two screws on two sides of the module to secure it. EMX2-888 Contact Closure Sensor LEDs Two LEDs that show the states of corresponding CC sensor channels are located on the leftmost of the EMX2-888 panel. The upper LED is for CC2.
Chapter 5: Using the EMX For Raritan's DPX water sensors, the Normal state must be set to Normally Open (N.O). The following is the correct LED behavior based on proper dip switch settings. Sensor state No water detected Water detected Reset Button The reset button is located inside a small hole which is labeled RESET.
Chrome 32 and later ® ® Android 4.2 and later IOS 7.0 Windows Edge ® Note: Tablets such as iPad are supported but not recommended for use with EMX2-888. Smartphones are not supported for use with EMX2-888.
The first time you log in to the EMX, use the default user name (admin) and password (raritan). For details, see the Quick Setup Guide accompanying the product. After successfully logging in, you can create user profiles for your other users.
Page 99
Chapter 6: Using the Web Interface 3. Type your user name in the User Name field, and password in the Password field. Both the user name and password are case sensitive. Note: If needed, click Clear to clear either the inputs or any error message that appears.
Page 100
Chapter 6: Using the Web Interface Note: The IP address to access a slave device in the USB-cascading configuration where the port forwarding mode is applied is a combination of the IP address and the port number. See Port Forwarding Examples (on page 141).
Chapter 6: Using the Web Interface Changing Your Password You must have the Change Own Password permission to change your own password. See (on page 154). Setting Up Roles You must have Administrator Privileges to change other users' passwords. See (on page 152).
Chapter 6: Using the Web Interface Close the web browser by clicking the Close button ( ) on the top-right corner of the browser. Close the web browser by choosing File > Close, or File > Exit. The command varies according to the version of the browser you use.
Chapter 6: Using the Web Interface Data pane Dashboard * The Setup button is not available on some pages, such as the Dashboard page. For detailed information about these web interface elements, see the sections that follow. Menus User Management contains user profiles, permissions, and password settings.
Page 104
Chapter 6: Using the Web Interface First level Second level Third level Auxiliary Ports (RS-485) If one of the following is connected: LHX-20 SHX-30 LHX-40 PowerLogic PM710 Snapshots **Webcam Snapashots Webcam...
Page 105
Chapter 6: Using the Web Interface *The EMX folder is named "EMX" by default. The name can be customized. See (on page 110). Naming the EMX ** A Webcam icon appears only when a supported Logitech webcam is ® connected to the EMX. See (on page Connecting a Logitech Webcam 59).
Page 106
Chapter 6: Using the Web Interface Expanding the Tree The icons representing all components implemented on or connected to the EMX device are expanded by default. If they are hidden, you may expand the tree manually to show all component icons. To expand the tree: 1.
Page 107
Chapter 6: Using the Web Interface 3. Repeat Step 2 for other component groups you want to expand. The expanded tree looks similar to this image.
Page 108
Chapter 6: Using the Web Interface Collapsing the Tree You can collapse the whole tree structure or a specific component group to hide all or partial tree items. To collapse the whole tree: Click the black, gradient arrow prior to the EMX folder icon, or double-click the folder.
Page 109
Chapter 6: Using the Web Interface 2. Select the number of the port that you want to configure, and click Setup. Or you can simply double-click that port number. The Feature Port Setup dialog for the selected port appears. 3. In the Detection Mode field, select the way to display connected asset sensors.
Chapter 6: Using the Web Interface 3. In the Detection Mode field, select the way to display connected LHX/SHX heat exchangers. Disabled: When applied, disables to port and nothing connected to the port is detected. Auto: An icon is displayed for this port only when the EMX device detects the physical connection of the LHX/SHX heat exchanger on this port.
Chapter 6: Using the Web Interface Login name: This is the user name you used to log in to the web interface. Last login time: This shows the date and time this login name was used to log in to this EMX device last time.
Chapter 6: Using the Web Interface 2. Click a tree item whose data page you want to open. The data of the selected tree item is then displayed on the blank page. 3. To open more data pages, repeat the above steps. All tabs representing opened pages are shown across the top of the page.
Chapter 6: Using the Web Interface 2. When the mouse pointer turns into a two-way arrow, drag the border horizontally to widen or shrink the pane. More Information This section explains additional web interface elements or operations that are useful. Warning Icon If the value you entered in a specific field is invalid, a red warning icon appears to the right and the field in question is surrounded by a red...
Page 114
Chapter 6: Using the Web Interface The Yellow- or Red-Highlighted Sensors When a numeric sensor's reading enters the warning or critical range, the background color of the sensor row turns to yellow or red for alerting you. For a discrete (on/off) sensor, the row changes the background color when the sensor enters the abnormal state.
Page 115
Chapter 6: Using the Web Interface To find the exact meaning of the alert, read the information shown in the State (or Status) column: below lower critical: The numeric sensor's reading drops below the lower critical threshold. below lower warning: The numeric sensor's reading drops below the lower warning threshold.
Page 116
Chapter 6: Using the Web Interface Browser-Defined Shortcut Menu A shortcut menu, which is built in the web browser, may appear when right-clicking anywhere in the EMX web interface. The shortcut menu functions are defined by the browser. For example, the Back command on the Internet Explorer (IE) shortcut menu works ®...
Chapter 6: Using the Web Interface Dashboard When you log in to the web interface, the Dashboard page is displayed by default. This page provides an overview of the EMX device's status.
Page 118
Chapter 6: Using the Web Interface The page is divided into several sections according to connected equipment, such as asset sensors and environmental sensors. Double-clicking any item on the Dashboard page opens the data page specific to the selected item. Note: If a sensor reading row is colored, it means the sensor reading already crosses one of the thresholds, or at least one LHX built-in sensor fails on the heat exchanger.
Chapter 6: Using the Web Interface Alarms List You can create event rules that request users to acknowledge certain alerts, and resend alert notifications if the acknowledgment action is not taken yet. See (on page 188). Creating Actions If any of these alerts has not been acknowledged since its occurrence, the Alarms section on the dashboard shows this alert until it is acknowledged.
Chapter 6: Using the Web Interface Column Description Details Click "Details" to trigger a dialog showing both the alarm details and the acknowledgment button. Only users who have the Acknowledge Alarms permission can manually acknowledge an alarm. To acknowledge an alarm: 1.
Page 121
For information on how to cascade devices using USB cables, see (on page 22). Cascading the EMX via USB Note: For more information on the USB-cascading configuration, see the USB-Cascading Solution Guide, which is available from Raritan website's Support page (http://www.raritan.com/support/).
Page 122
Chapter 6: Using the Web Interface Fields Description Cascade Position Indicates the position of the EMX in the USB-cascading configuration. 0 (zero) represents the master device. A non-zero number represents a slave device. 1 is Slave 1, 2 is Slave 2, 3 is Slave 3 and so on. This field is NOT available on a standalone EMX.
Page 123
Chapter 6: Using the Web Interface The following diagram shows 1, indicating it is the first slave - Slave 1. The final slave device shows a non-zero number which indicates its position in the Cascade Position field and no in the Cascaded Device Connected field.
Chapter 6: Using the Web Interface The following diagram shows 2, indicating it is the second slave - Slave 2. The Cascaded Device Connected field shows no, indicating that it is the final one in the chain. Naming the EMX To change the device name: 1.
Page 125
Chapter 6: Using the Web Interface Modifying Network Interface Settings The EMX supports two types of network interfaces: wired and wireless. You should configure the network interface settings according to the networking mode that applies. See Connecting the EMX to Your (on page 14).
Page 126
Chapter 6: Using the Web Interface Wireless Network Settings Wireless SSID, PSK and BSSID parameters were set during the installation and configuration process. You can change them later. Note for USB-cascading configuration: Port forwarding mode over wireless LAN is supported as of release 3.1.0. You must upgrade all devices in the chain to version 3.1.0 or higher if wireless networking is preferred.
Page 127
Chapter 6: Using the Web Interface Options Description EAP - PEAP PEAP stands for Protected Extensible Authentication Protocol. Enter the following authentication data: Inner Authentication: Only Microsoft's Challenge Authentication Protocol Version 2 (MSCHAPv2) is supported, allowing authentication to databases that support MSCHAPv2.
Page 128
Chapter 6: Using the Web Interface Modifying Network Settings The EMX was configured for network connectivity during the installation and configuration process. See (on page 10). If Configuring the EMX necessary, you can modify any network settings later. Selecting the Internet Protocol The EMX device supports two types of Internet protocols -- IPv4 and IPv6.
Page 129
Chapter 6: Using the Web Interface Modifying IPv4 Settings You must enable the IPv4 protocol before you can modify the IPv4 network settings. See (on page 114). Selecting the Internet Protocol To modify IPv4 settings: 1. Choose Device Settings > Network. The Network Configuration dialog appears.
Page 130
Chapter 6: Using the Web Interface Option Description mask using the format "IP address/subnet mask." Next Hop: IP address of the next hop router. (on page 118) for illustrations. Static Route Examples 4. Click OK. Note: The EMX supports a maximum of 3 DNS servers. If two IPv4 DNS servers and two IPv6 DNS servers are available, the EMX only uses the primary IPv4 and IPv6 DNS servers.
Page 131
Chapter 6: Using the Web Interface Option Description IP address Default gateway Primary DNS server Secondary DNS server (optional) DNS Suffix (optional) If your local network contains two subnets and IP forwarding has been enabled, you can click Append to add static routes so that your EMX can communicate with the other subnet.
Page 132
Chapter 6: Using the Web Interface Static Route Examples This section has two static route examples: IPv4 and IPv6. Both examples assume that two network interface controllers (NIC) have been installed in one network server, leading to two available subnets, and IP forwarding has been enabled.
Page 133
Chapter 6: Using the Web Interface In this example, NIC-2 (192.168.100.88) is the next hop router for your EMX to communicate with any device in the other subnet 192.168.200.0. In the IPv4 "Append new Route" dialog, you should specify: Destination: 192.168.200.0/24 ...
In addition, the EMX also supports the SNMP and Modbus/TCP protocols. Changing HTTP(S) Settings Important: Raritan disables SSL 3.0 and uses TLS for releases 3.0.4, 3.0.20 and later releases due to published security vulnerabilities in SSL 3.0. Make sure your network infrastructure, such as LDAP and mail...
Page 135
Chapter 6: Using the Web Interface HTTPS uses Transport Layer Security (TLS) technology to encrypt all traffic to and from the EMX device so it is a more secure protocol than HTTP. By default, any access to the EMX device via HTTP is automatically redirected to HTTPS.
Page 136
Chapter 6: Using the Web Interface Configuring SNMP Settings You can enable or disable SNMP communication between an SNMP manager and the EMX device. Enabling SNMP communication allows the manager to retrieve information or configure the EMX. Besides, you may need to configure the SNMP destination(s) if the built-in "System SNMP Notification Rule"...
Page 137
Chapter 6: Using the Web Interface To configure SNMP notification destinations: 1. Click the Notifications tab in the same SNMP dialog. 2. Select the Enabled checkbox. 3. Select an SNMP notification type - SNMP v2c Trap, SNMP v2c Inform, SNMP v3 Trap, and SNMP v3 Inform. 4.
Page 138
Chapter 6: Using the Web Interface Changing Telnet Settings You can enable or disable the Telnet access to the command line interface, or change the default TCP port for the Telnet service. To change Telnet service settings: 1. Choose Device Settings > Network Services > Telnet. The Telnet Settings dialog appears.
Page 139
Chapter 6: Using the Web Interface c. Connect the RS232-to-USB adapter to the USB-A port on the EMX. Note: DO NOT connect the Modbus RTU device or Modbus bus to the RS485 ports on the EMX, which is NOT supported. 2.
Page 140
Chapter 6: Using the Web Interface TCP Port - Required Use the default port 503, or assign a different port. Valid range is 1 to 65535. Port 502 is the default Modbus/TCP port for EMX, so you cannot use that port for the Modbus Gateway. Parity and Line Speed - Required Use the default settings, or update if the Modbus RTU devices are using different communication parameters.
Chapter 6: Using the Web Interface Enabling Service Advertisement The EMX advertises all enabled services that are reachable using the IP network. This feature uses DNS-SD (Domain Name System-Service Discovery) and mDNS (multicastDNS). The advertised services are discovered by clients that have implemented DNS-SD and mDNS. The advertised services include the following: ...
Page 142
Chapter 6: Using the Web Interface If the daylight saving time rules are not available for the selected time zone, the checkbox is not configurable. 4. Choose one of the methods to set the date and time: To customize the date and time, select the User Specified Time radio button, and then enter the date and time in appropriate fields.
Page 143
Chapter 6: Using the Web Interface How to Use the Calendar The calendar icon next to the Date field is a convenient tool to quickly change the year, month and date. To select a date using the calendar: 1. To change the year shown in the calendar, do either of the following: ...
Page 144
Chapter 6: Using the Web Interface Click on the top of the calendar to switch between months. Click , which is adjacent to the year, to show a list of years and months. Select the desired month from the list to the left and click OK.
Chapter 6: Using the Web Interface Setting Default Measurement Units Default measurement units are applied to the EMX web and CLI interfaces across all users, including users accessing the device via external authentication servers. Default units apply before users set their own preferred measurement units or the administrator changes preferred units for any user.
Chapter 6: Using the Web Interface Configuring the Feature Port The EMX device supports connecting one of the following devices to its FEATURE port: Raritan asset management sensors (asset sensors). See (on page 25). Connecting Asset Management Sensors External beeper. See...
Chapter 6: Using the Web Interface Device type Description LHX 20 Schroff LHX-20 heat exchanger. ® All Schroff SHX/LHX device types are available only ® after the LHX/SHX support is enabled. See Enabling and Disabling Schroff LHX/SHX Heat Exchanger (on page 273). Support SHX 30 Schroff...
Page 148
Chapter 6: Using the Web Interface LHX-20 SHX-30 LHX-40 PowerLogic PM710...
Note: The serial port bit-rate change is needed when the EMX works in conjunction with Raritan's Dominion LX KVM switch. The Dominion LX only supports 19200 bps for communications over the serial interface. You can set diverse bit-rate settings for console and modem operations.
Chapter 6: Using the Web Interface To configure the analog modem settings: 1. Click the Analog Modem tab. 2. Select the "Answer incoming calls" checkbox to enable the remote access via a modem. Otherwise, deselect this checkbox. 3. Specify the number of rings the EMX must wait before answering the call.
Page 151
Chapter 6: Using the Web Interface 3. Verify that the "Position in cascaded chain" field shows 0 (Master), indicating that this EMX is the master device. 4. Select the preferred cascading mode in the "Cascading mode" field. Bridging: Each device in the USB-cascading configuration is accessed with a different IP address.
Page 152
Chapter 6: Using the Web Interface Overview of the Cascading Modes You must apply a cascading mode to the USB-cascading configuration. (on page 136). Setting the Cascading Mode Overview: The Bridging mode supports the wired network only while the Port Forwarding mode supports both wired and wireless networks.
Page 153
Chapter 6: Using the Web Interface "Port Forwarding" mode: The DHCP server communicates with the master device only and assigns one IP address. All slave devices use the same IP address as the master device. You must specify a 5XXXX port number (where X is a number) when remotely accessing any slave device through the network.
Page 154
Chapter 6: Using the Web Interface Position Slave 2 Slave 3 Slave 4 Slave 5 Slave 6 Slave 7 For example, to access the Slave 4 device via Modbus/TCP, the port number is 50604. See (on page 141) for Port Forwarding Examples further illustrations.
Page 155
Slave device: Assign proper 5NNXX port numbers. Assumption: The Port Forwarding mode is applied to a USB-cascading configuration comprising three Raritan products. The IP address is 192.168.84.77. Master device: Position code for the master device is 00 so each port number is 5NN00 as shown below.
Page 156
Chapter 6: Using the Web Interface Slave 1 device: Position code for Slave 1 is 01 so each port number is 5NN01 as shown below. Protocols Port numbers HTTPS 50001 HTTP 50101 50201 TELNET 50301 SNMP 50501 MODBUS 50601 Examples: ...
-p 50202 192.168.84.77 Specifying the Device Altitude You must specify the EMX device's altitude above sea level if a Raritan's DPX differential air pressure sensor is attached. This is because the device's altitude is associated with the altitude correction factor. See (on page 539).
Chapter 6: Using the Web Interface Setting Data Logging The EMX can store 120 measurements for each sensor in a memory buffer. This memory buffer is known as the data log. Sensor readings in the data log can be retrieved using SNMP. You can configure how often measurements are written into the data log using the Measurements Per Log Entry field.
High priority type: Sensor readings or states are updated in a shorter interval, which is less than or equal to 3 seconds. Raritan contact closure sensors belong to this type. Configuring SMTP Settings The EMX can be configured to send alerts or event messages to a specific administrator by email.
Page 160
Chapter 6: Using the Web Interface 7. If your SMTP server requires password authentication, do this: a. Select the Server Requires Authentication checkbox. b. Type a user name in the User Name field. c. Type a password in the Password field. 8.
Chapter 6: Using the Web Interface Configuring Data Push Settings If any Raritan asset sensors have been connected to EMX, you can push the asset sensor data to a remote server for data synchronization. The data will be sent in JSON format using HTTP POST requests. You need to set up the destination and authentication for data push on the EMX.
Chapter 6: Using the Web Interface To remove the asset sensor, select it in the Selected list box and click (Remove) or (Remove All). 7. Click OK. Checking the Internal Beeper State The internal beeper of the EMX always turns OFF if there are no event rules that involve this beeper.
Chapter 6: Using the Web Interface User and Role Management The EMX is shipped with one built-in user profile: admin, which is used for initial login and configuration. This profile has full system permissions, and should be reserved for the system administrator.
Page 164
Chapter 6: Using the Web Interface Field Type this... Case sensitive 4. Select the Enabled checkbox. Enabled users can log in to the EMX device. 5. Select the "Force password change on next login" checkbox if you prefer a password change by the user when the user logs in for the first time after this checkbox is enabled.
Page 165
Chapter 6: Using the Web Interface Field Description printable characters. Confirm Re-type the same authentication pass phrase for Authentication confirmation. Pass Phrase Use Authentication This checkbox is configurable only if AuthPriv is Pass Phrase as selected. Privacy Pass When the checkbox is selected, the privacy pass Phrase phrase is identical to the authentication pass phrase.
Chapter 6: Using the Web Interface If no roles meet your needs, you can: Modify the permissions of an existing role: To modify the permissions of any role, double-click the role or highlight it and then click Edit Role. See (on page Modifying a Role 155).
Chapter 6: Using the Web Interface 5. To change the SNMPv3 access permissions, click the SNMPv3 tab and make necessary changes. For details, see Step 6 of Creating a (on page 149). User Profile 6. To change the permissions, click the Roles tab and do one of these: Select or deselect any role's checkbox.
Chapter 6: Using the Web Interface Note: The measurement unit change only applies to the web interface and command line interface. Setting your preferences does not change the default measurement units, which apply to all users before any individual user or the administrator sets preferred measurement units on a per-user basis.
Chapter 6: Using the Web Interface Creating a Role Create a new role when you need a new combination of permissions. To create a role: 1. Choose User Management > Roles. The Manage Roles dialog appears. Tip: You can also access the Manage Roles dialog by clicking the Manage Roles button in the Edit User 'XXX' dialog.
Chapter 6: Using the Web Interface 4. Modify the text shown in the Description field if necessary. 5. To change the permissions, click the Privileges tab. Note: You cannot change the Admin role's permissions. 6. To delete any permissions, do this: a.
Chapter 6: Using the Web Interface 2. Select the role you want to delete by clicking it. To make multiple selections, press Ctrl+click or Shift+click to highlight multiple ones. 3. Click Delete. 4. A message appears, prompting you to confirm the operation. Click Yes to confirm the deletion.
Page 172
Chapter 6: Using the Web Interface Enabling the Firewall The firewall rules, if any, take effect only after the firewall is enabled. To enable the EMX firewall: 1. Choose Device Settings > Security > IP Access Control. The Configure IP Access Control Settings dialog appears. 2.
Page 173
Chapter 6: Using the Web Interface b. Ensure the Enable IPv6 Access Control checkbox is selected. c. Locate the Default Policy field in the Inbound Rules section. d. The default policy is shown in the Default Policy field. To change it, select a different policy from the drop-down list.
Page 174
Chapter 6: Using the Web Interface Note: Valid IPv4 addresses range from 0.0.0.0 through 255.255.255.255. Make sure the IPv4 addresses entered are within the scope. To create firewall rules: 1. Choose Device Settings > Security > IP Access Control. The Configure IP Access Control Settings dialog appears.
Page 175
Chapter 6: Using the Web Interface Action Procedure Insert a rule between two Select the rule above which you want to insert a new rule. For existing rules example, to insert a rule between rules #3 and #4, select #4. ...
Page 176
Chapter 6: Using the Web Interface 6. When finished, the rules appear in the Configure IP Access Control Settings dialog. 7. Click OK. The rules are applied. Editing Firewall Rules When an existing firewall rule requires updates of IP address range and/or policy, modify them accordingly.
Page 177
Chapter 6: Using the Web Interface 2. To modify the IPv4 firewall rules, click the IPv4 tab. To modify the IPv6 firewall rules, click the IPv6 tab. 3. Ensure the Enable IPv4 Access Control checkbox is selected on the IPv4 tab, or the Enable IPv6 Access Control checkbox is selected on the IPv6 tab.
Chapter 6: Using the Web Interface 3. Ensure the Enable IPv4 Access Control checkbox is selected on the IPv4 tab, or the Enable IPv6 Access Control checkbox is selected on the IPv6 tab. 4. Select the rule that you want to delete. To make multiple selections, press Ctrl+click or Shift+click to highlight multiple ones.
Page 179
Chapter 6: Using the Web Interface X min: This type of option sets the time limit to X minutes, where X is a number. X h: This type of option sets the time limit to X hours, where X is a number.
Page 180
Chapter 6: Using the Web Interface Enabling Strong Passwords Use of strong passwords makes it more difficult for intruders to crack user passwords and access the EMX device. By default, strong passwords should be at least eight characters long and contain upper- and lower-case letters, numbers, and special characters, such as @ or &.
Page 181
Chapter 6: Using the Web Interface Tip: If the desired time option is not listed, you can manually type the desired time in this field. For example, you can type "9 d" to set the password aging time to 9 days. 4.
Chapter 6: Using the Web Interface If the Restricted Service Agreement feature is enabled, the Restricted Service Agreement is displayed when any user logs in to the EMX. Do either of the following, or you cannot successfully log in to the EMX: ...
Page 183
Chapter 6: Using the Web Interface Changing the Default Policy The default policy is to accept all traffic from all IP addresses regardless of the role applied to the user. To change the default policy: 1. Choose Device Settings > Security > Role Based Access Control. The Configure Role Based Access Control Settings dialog appears.
Page 184
Chapter 6: Using the Web Interface 3. Ensure the "Enable Role Based Access Control for IPv4" checkbox is selected on the IPv4 tab, or the "Enable Role Based Access Control for IPv6" checkbox is selected on the IPv6 tab. 4. Create specific rules: Action Do this...
Page 185
Chapter 6: Using the Web Interface Action Do this... role Click OK. The system inserts the rule and automatically renumbers the following rules. 5. Click OK. Editing Role-Based Access Control Rules You can modify existing rules when these rules do not meet your needs. To modify a role-based access control rule: 1.
7. Click OK. Setting Up a TLS Certificate Important: Raritan disables SSL 3.0 and uses TLS for releases 3.0.4, 3.0.20 and later releases due to published security vulnerabilities in SSL 3.0. Make sure your network infrastructure, such as LDAP and mail...
Chapter 6: Using the Web Interface Having an X.509 digital certificate ensures that both parties in an TLS connection are who they say they are. To obtain a certificate for the EMX, create a Certificate Signing Request (CSR) and submit it to a certificate authority (CA). After the CA processes the information in the CSR, it provides you with a certificate, which you must install on the EMX device.
Page 188
Chapter 6: Using the Web Interface Field Type this information Common Name The fully qualified domain name (FQDN) of your EMX device. Email Address An email address where you or another administrative user can be reached. Note: All fields in the Subject section are mandatory, except for the Organization, Organizational Unit and Email Address fields.
Chapter 6: Using the Web Interface Installing a CA-Signed Certificate After the CA provides a signed certificate according to the CSR you submitted, you must install it on the EMX device. To install the certificate: 1. Choose Device Settings > Security > SSL Certificate. The Manage SSL Certificate dialog appears.
Page 190
Chapter 6: Using the Web Interface Field Type this information Key Length Select the key length (bits) from the drop-down list in this field. A larger key length enhances the security, but slows down the EMX device's response. Self Sign Ensure this checkbox is selected, which indicates that you are creating a self-signed certificate.
Chapter 6: Using the Web Interface Installing Existing Key and Certificate Files If the TLS certificate and private key files are already available, you can install them directly without going through the process of creating a CSR or a self-signed certificate. Note: If you are using a TLS certificate that is part of a chain of certificates, each part of the chain is signed during the validation process.
Only users who have the "Change Authentication Settings" permission can set up or modify the authentication settings. Important: Raritan disables SSL 3.0 and uses TLS for releases 3.0.4, 3.0.20 and later releases due to published security vulnerabilities in SSL 3.0. Make sure your network infrastructure, such as LDAP and mail services, uses TLS rather than SSL 3.0.
Page 193
Chapter 6: Using the Web Interface Gathering the LDAP Information It requires knowledge of your LDAP server and directory settings to configure the EMX for LDAP authentication. If you are not familiar with the settings, consult your LDAP administrator for help. To configure LDAP authentication, you need to check: ...
Chapter 6: Using the Web Interface Adding Authentication Servers Add all external AA servers that you want to use to the EMX. Later you can use the sequence of the server list to control the AA servers' access priority. Adding LDAP Server Settings To activate and use external LDAP/LDAPS server authentication, enable LDAP authentication and enter the information you have gathered for any LDAP/LDAPS server.
Page 195
Chapter 6: Using the Web Interface None 7. Port (None/StartTLS) - The default Port is 389. Either use the standard LDAP TCP port or specify another port. 8. Port (TLS) - The default is 636. Either use the default port or specify another port.
Page 196
LDAP/LDAPS (up to 31 characters), and where in the database to begin searching for the specified Base DN. An example Base Search value might be: cn=Users,dc=raritan,dc=com. Consult your AA server administrator for the appropriate values to enter into these fields.
Page 197
Chapter 6: Using the Web Interface Note: If the EMX clock and the LDAP server clock are out of sync, the installed TLS certificates, if any, may be considered expired. To ensure proper synchronization, administrators should configure the EMX and the LDAP server to use the same NTP server(s).
Chapter 6: Using the Web Interface 10. To verify if the authentication configuration is set correctly, you may click Test Connection to check whether the EMX can connect to the remote authentication server successfully. Tip: You can also do this by using the Test Connection button in the Authentication Settings dialog.
Chapter 6: Using the Web Interface Editing Authentication Server Settings If the configuration of any external authentication server has been changed, such as the port number, you must modify the authentication settings on the EMX device accordingly, or the authentication fails. To modify the external authentication configuration: 1.
Chapter 6: Using the Web Interface Enabling External and Local Authentication Services To make authentication function properly all the time - even when external authentication is not available, you can enable both the local and remote authentication services. When both authentication services are enabled, the EMX follows these rules for authentication: ...
Chapter 6: Using the Web Interface Event Rules and Actions A benefit of the product's intelligence is its ability to notify you of and react to a change in conditions. This event notification or reaction is an "event rule." The EMX is shipped with four built-in event rules, which cannot be deleted.
Chapter 6: Using the Web Interface Creating an Event Rule The best way to create a new set of event rules in sequence is to: Create actions for responding to one or multiple events Create rules to determine what actions are taken when these events occur Creating Actions The EMX comes with three built-in actions:...
Page 203
Chapter 6: Using the Web Interface Action Function Execute an action Creates a group of actions comprising existing group actions. See (on page 190). Action Group Alarm Requires the user to acknowledge the alert when it is generated. If needed, you can have the alert notifications regularly generated until a person takes the acknowledgment action.
Page 204
Chapter 6: Using the Web Interface Action Function Switch LHX/SHX Switches on or off the LHX/SHX device. See (on page 205). Switch LHX/SHX This option is available only when the Schroff LHX/SHX support has been enabled. Record snapshots to Makes a connected webcam start or stop webcam storage taking snapshots.
Page 205
Chapter 6: Using the Web Interface 7. To remove an action from the action group, select it from the Used Actions list box, and click to move it to the Available Actions list box. To make multiple selections, press Ctrl+click or Shift+click to highlight multiple ones.
Page 206
Chapter 6: Using the Web Interface b. Click to add the selected method to the Alarm Notifications list box. c. Repeat the above steps to add more methods if needed. To remove any method from the Alarm Notifications list box, select that method and click 6.
Page 207
Chapter 6: Using the Web Interface 3. In the "Action name" field, type a new name for the action. The default name is New Action <number>, where <number> is a sequential number starting at 1. 4. In the Action field, click the drop-down arrow and select the desired action: External beeper.
Page 208
Chapter 6: Using the Web Interface Push Out Sensor Readings If you have connected Raritan's asset sensors to the EMX, you can configure the EMX to push asset sensor data to a remote server after a certain event occurs. Before creating this action, make sure that you have properly defined the destination servers and the sensor data type in the Data Push dialog.
Page 209
Chapter 6: Using the Web Interface Request LHX/SHX Maximum Cooling If Schroff LHX/SHX Support is enabled, the LHX/SHX-related actions will be available. See Enabling and Disabling Schroff LHX/SHX Heat (on page 273). Exchanger Support The "Request LHX/SHX Maximum Cooling" action applies the maximum cooling to the SHX-30 device only.
Page 210
Chapter 6: Using the Web Interface To use a different SMTP server, select the Use Custom SMTP Settings checkbox. If the SMTP server settings are not configured yet, click Configure. (on page 145) for the information Configuring SMTP Settings of each field. 8.
Page 211
Chapter 6: Using the Web Interface 4. In the "Action name" field, type a new name for the action. The default name is New Action <number>, where <number> is a sequential number starting at 1. 5. In the Action field, click the drop-down arrow and select the desired action: Send email.
Page 212
Chapter 6: Using the Web Interface 5. In the Action field, click the drop-down arrow and select the desired action: Send SNMP notification. 6. Select the type of SNMP notification. See either procedure below according to your selection. To send SNMP v2c notifications: 1.
Page 213
Chapter 6: Using the Web Interface b. In the Number of Retries field, enter the number of times you want to resend the inform communication if it fails. For example, inform communications are resent up to 5 times when the initial communication fails.
Page 214
Chapter 6: Using the Web Interface Syslog Message Use this action to automatically forward event messages to the specified syslog server. Determine the syslog transmission mechanism you prefer when setting it up - UDP, TCP or TLS over TCP. The EMX may or may not detect the syslog message transmission failure. If yes, it will log this syslog failure as well as the failure reason in the event log.
Page 215
Overcurrent protector sensors, including RMS current and tripping state. Peripheral device sensors, which can be any Raritan environmental sensor packages connected to the EMX, such as temperature or humidity sensors. To configure a sensor report action: 1. Choose Device Settings > Event Rules. The Event Rules Settings dialog opens.
Page 216
Chapter 6: Using the Web Interface 4. In the "Action name" field, type a new name for the action. The default name is New Action <number>, where <number> is a sequential number starting at 1. 5. In the Action field, click the drop-down arrow and select the desired action: Send sensor report.
Page 217
Chapter 6: Using the Web Interface 10. To save this action, click OK. Note: When intending to send a sensor report using custom messages, use the placeholder [SENSORREPORT] to report sensor readings. See Email and SMS Message Placeholders (on page 224). Send SMS Message You can configure emails to be sent when an event occurs and can customize the message.
Page 218
Chapter 6: Using the Web Interface Note: Only the 7-bit ASCII charset is supported for SMS messages. 8. Click OK. Internal Beeper You can have the built-in beeper of the EMX turned on or off when a certain event occurs. To switch the internal beeper: 1.
Page 219
Chapter 6: Using the Web Interface Turn On: Turns on the selected actuator. Turn Off: Turns off the selected actuator. 6. To select the actuator where this action will be applied, select it from the Available Actuators list and click to add it to the Switched Actuators list box.
Page 220
Chapter 6: Using the Web Interface Record Snapshots to Webcam Storage This option allows you to define an action that starts or stops a specific webcam from taking snapshots. To configure a record snapshot to webcam storage action: 1. Choose Device Settings > Event Rules. The Event Rules Settings dialog opens.
Page 221
Chapter 6: Using the Web Interface Creating Rules After required actions are available, you can create event rules to determine what actions are taken to respond to specific events. By default, the EMX provides the following built-in event rules: System Event Log Rule ...
Page 222
Chapter 6: Using the Web Interface Event types Radio buttons Numeric sensor Available radio buttons include "Asserted," threshold-crossing "Deasserted" and "Both." events, or the Asserted: The EMX takes the action only occurrence of the when the event occurs. This means the selected event -- status of the described event transits from true or false...
Page 223
Chapter 6: Using the Web Interface Event types Radio buttons Network interface Available radio buttons include "Link state is link state up," "Link state is down" and "Both." Link state is up: The EMX takes the action only when the network link state changes from down to up.
Page 224
Chapter 6: Using the Web Interface Event types Radio buttons Server monitoring Available radio buttons include "Monitoring event started," "Monitoring stopped," and "Both." Monitoring started: The EMX takes the action only when the monitoring of any specified server starts. ...
Page 225
Chapter 6: Using the Web Interface 11. Click Close to quit the dialog. Note: Asset management sensor event rules must be recreated after an EMX firmware upgrade. Scheduling an Action An action can be regularly performed at a preset time interval instead of being triggered by a specific event.
Page 226
Chapter 6: Using the Web Interface Time options Frequency settings The frequency in minutes ranges from every minute, every 5 Minutes minutes, every 10 minutes and so on until every 30 minutes. The hourly option sets the timing to either of the following: Hourly ...
Page 227
Chapter 6: Using the Web Interface To remove all actions, click 9. Click OK. Send Sensor Report Example Below is an example of a scheduled action set to send a temperature sensor report via email hourly. In this example, a.
Page 228
Chapter 6: Using the Web Interface You must create the destination action as illustrated below prior to creating the 'Send Hourly Temperature Sensor Readings' action. For details, see (on page 196). Send EMail 2. Create the 'Send sensor report' action -- Send Hourly Temperature Sensor Readings.
Page 229
Chapter 6: Using the Web Interface Type the action's name -- Send Hourly Temperature Sensor Readings. Select the 'Send sensor report' action. Select the destination action 'Send Sensor Temp Report Email'. Add the desired temperature sensor(s) from the Available Sensors list to the Report Sensors box.
Page 230
Chapter 6: Using the Web Interface Type the timer name -- Hourly Sensor Temperature Readings. Select the Enabled checkbox. Select Hourly, and set the Minute to 30. Select the 'Send Hourly Temperature Sensor Readings' action. c. Click OK. For details, see (on page 211).
Page 231
Chapter 6: Using the Web Interface Event/Context Default Assertion Message when Default Assertion Message the Event = TRUE when the Event = FALSE* Asset Management > Rack Unit Asset tag with ID '[TAGID]' connected Asset tag with ID '[TAGID]' > * > Tag Connected at rack unit [RACKUNIT], slot disconnected at rack unit [RACKSLOT] of asset strip [STRIPID]...
Page 232
Chapter 6: Using the Web Interface Event/Context Default Assertion Message when Default Assertion Message the Event = TRUE when the Event = FALSE* Device > Firmware validation Firmware validation failed by user failed '[USERNAME]' from host '[USERIP]'. Device > Firmware update Firmware upgrade started from version started '[OLDVERSION]' to version...
Page 233
Chapter 6: Using the Web Interface Event/Context Default Assertion Message when Default Assertion Message the Event = TRUE when the Event = FALSE* Device > Sending SNMP inform Sending SNMP inform to manager failed or no response [SNMPMANAGER]:[SNMPMANAGER PORT] failed or no response. [ERRORDESC].
Page 234
Chapter 6: Using the Web Interface Event/Context Default Assertion Message when Default Assertion Message the Event = TRUE when the Event = FALSE* Peripheral Device Slot > * > Peripheral device Peripheral device Numeric Sensor > Below lower '[EXTSENSORNAME]' in slot '[EXTSENSORNAME]' in slot warning '[EXTSENSORSLOT]' asserted 'below...
Page 235
Chapter 6: Using the Web Interface Event/Context Default Assertion Message when Default Assertion Message the Event = TRUE when the Event = FALSE* Power Logic Device > * > Sensor '[PLSENSORNAME]' on Power Sensor '[PLSENSORNAME]' on Sensor > * > Above upper Logic Device at [PORTTYPE] port Power Logic Device at warning...
Page 236
Chapter 6: Using the Web Interface User Administration > User User '[TARGETUSER]' modified by modified user '[USERNAME]' from host '[USERIP]'. User Administration > User User '[TARGETUSER]' deleted by user deleted '[USERNAME]' from host '[USERIP]'. User Administration > Password Password of user '[TARGETUSER]' changed changed by user '[USERNAME]' from host '[USERIP]'.
Page 237
Chapter 6: Using the Web Interface LHX / SHX > * > Sensor > Sensor '[LHXSENSORID]' on LHX at Sensor '[LHXSENSORID]' on LHX Below lower warning threshold [PORTTYPE] port '[PORTID]' asserted at [PORTTYPE] port '[PORTID]' 'below lower warning'. deasserted 'below lower warning'. LHX / SHX >...
Page 238
Chapter 6: Using the Web Interface LHX / SHX > * > Threshold Air The air outlet temperature threshold on The air outlet temperature on LHX Outlet LHX at [PORTTYPE] port '[PORTID]' at [PORTTYPE] port '[PORTID]' is was crossed. within thresholds. LHX / SHX >...
Page 239
Chapter 6: Using the Web Interface Placeholder Description [AMSRACKUNITPOSITION] The (vertical) rack unit position, an action applies to [AMSSTATE] The human readable state of an asset strip [AMSTAGID] The asset tag ID [CONFIGPARAM] The name of a configuration parameter [CONFIGVALUE] The new value of a parameter [DATETIME] The human readable timestamp of the event...
Chapter 6: Using the Web Interface Placeholder Description [SENSORREADINGUNIT] The unit of a sensor reading [SENSORREADING] The value of a sensor reading [SENSORREPORT] The formatted sensor report contents [SENSORSTATENAME] The human readable state of a sensor [SMTPRECIPIENTS] The list of recipients, an SMTP message was sent to [SMTPSERVER] The name or IP address of an SMTP server [SYSCONTACT]...
Page 241
Chapter 6: Using the Web Interface 3. From the Event drop-down, select Device > "Network interface link state is up". These selections indicate we are specifying an event regarding asset sensor management, and we want the EMX to respond to the event related to physical connections and/or disconnections.
Chapter 6: Using the Web Interface 3. Select "Numeric Sensor" to indicate the sensor is a numeric sensor. Note: A numeric sensor uses numeric values to indicate the environmental condition while a discrete (on/off) sensor uses alphabetical characters to indicate the sensor state. 4.
Chapter 6: Using the Web Interface Example 1 This example illustrates an event rule which continuously causes the EMX to send out email messages. Event selected Action included Device > Sending SMTP message Send email failed Example 2 This example illustrates an event rule which continuously causes the EMX to send out SMTP messages when one of the selected events listed on the Device menu occurs.
Page 244
Chapter 6: Using the Web Interface For example, in a user activity event rule for the "admin" user, you can click the "admin" tab to display a pull-down submenu showing all user names, and then select a different user name or all users (shown as <Any user>).
Chapter 6: Using the Web Interface Modifying an Action An existing action can be changed so that all event rules where this action is involved change their behavior accordingly. Exception: The built-in actions "System Event Log Action" and "System Tamper Alarm" are not user-configurable. To modify an action: 1.
Chapter 6: Using the Web Interface c. Click Delete. d. Click Yes on the confirmation message. 4. Click Close to quit the dialog. A Note about Untriggered Rules In some cases, a measurement exceeds a threshold causing the EMX to generate an alert.
Chapter 6: Using the Web Interface Note: Sometimes when the dialog is too narrow, the icon takes the place of the Show Details button. In that case, click select Show Details to view details. Click to view the latest events. ...
Chapter 6: Using the Web Interface 2. Click Yes on the confirmation message. Clearing Event Entries If it is not necessary to keep existing event history, you can remove all of it from the local log. To delete all event entries: 1.
Chapter 6: Using the Web Interface Column Description Idle Time The length of time for which a user remains idle. The unit "min" represents minutes. 2. To disconnect any user, click the corresponding Disconnect button. a. A dialog appears, prompting you to confirm the operation. b.
Page 250
Chapter 6: Using the Web Interface 2. Click New. The Add New Server dialog appears. 3. By default, the "Enable ping monitoring for this server" checkbox is selected. If not, select it to enable this feature. 4. Provide the information required. Field Description IP address/hostname IP address or host name of the IT...
Page 251
Chapter 6: Using the Web Interface Example: Ping Monitoring and SNMP Notifications In this illustration, it is assumed that a significant PDU (IP address: 192.168.84.95) shall be monitored by your EMX to make sure that PDU is properly operating all the time, and the EMX must send out SNMP notifications (trap or inform) if that PDU is declared unreachable due to power or network failure.
Chapter 6: Using the Web Interface 3. In the "Rule name" field, type "Send SNMP notifications for PDU (192.168.84.95) inaccessibility." 4. Select the Enabled checkbox to enable this new rule. 5. In the Event field, choose Server Monitoring > 192.168.84.95 > Unreachable.
Chapter 6: Using the Web Interface 4. Click Yes on the confirmation message. 5. Click Close to quit the dialog. Checking Server Monitoring States Server monitoring results are available in the Server Reachability dialog after specifying IT devices for the EMX device to monitor their network accessibility.
Environmental Sensors or Actuators include: a. Name the sensor or actuator. b. If the connected sensor is a Raritan contact closure sensor, specify an appropriate sensor type. c. Mark the sensor or actuator's physical location on the rack or in the room.
Page 255
Chapter 6: Using the Web Interface Matching the Serial Number A DPX environmental sensor package includes a serial number tag on the sensor cable. A DPX2, DPX3 or DX sensor has a serial number tag attached to its rear side. The serial number for each sensor or actuator appears listed in the web interface after each sensor or actuator is detected by the EMX.
Page 256
Chapter 6: Using the Web Interface Matching the Position DPX2, DPX3 and DX sensor packages can be daisy chained. The EMX can indicate each sensor or actuator's position by showing the sensor port where the environmental sensor package is connected as well as its sequence in a sensor daisy chain.
Page 257
Chapter 6: Using the Web Interface For example, if a DPX sensor package is connected to the SENSOR port numbered 1, its Position column only shows "Port 1" no matter a DPX3-ENVHUB4 sensor hub is used or not. Note: For the EMX devices with only one SENSOR port, it always shows "Port 1."...
Chapter 6: Using the Web Interface Managing Environmental Sensors or Actuators The EMX starts to retrieve an environmental sensor's reading and/or state and records the state transitions after the environmental sensor is managed. To control an actuator, you also need to have it managed. The EMX device can manage a maximum of 32 environmental sensors or actuators.
Page 259
Unmanaging Environmental Sensors or Actuators (on page 256). Special note for a Raritan humidity sensor: As of release 3.1.0, a Raritan humidity sensor is able to provide two measurements in the user interface - relative and absolute humidity values. ...
Chapter 6: Using the Web Interface Configuring Environmental Sensors or Actuators You can change the default name to easily identify the managed sensor or actuator, and describe its location with X, Y and Z coordinates. To configure environmental sensors or actuators: 1.
Page 261
Chapter 6: Using the Web Interface 5. If the selected sensor is a numeric sensor, its threshold settings are displayed in the dialog. See (on page Sensor Threshold Settings 529) for detailed information. There are two types of thresholds: sensor-specific thresholds and default thresholds.
Page 262
Chapter 6: Using the Web Interface 2. Click Setup on the Settings page. The Setup dialog appears. 3. In the Peripheral Device Z Coordinate Format field, click the drop-down arrow and select an option from the list. Rack Units: The height of the Z coordinate is measured in standard rack units.
Page 263
Chapter 6: Using the Web Interface Changing Default Thresholds The default thresholds are the initial threshold values that automatically apply to numeric environmental sensors. These values are configured on a sensor type basis, which include: Temperature sensors Humidity sensors (both relative and absolute humidity) ...
Page 264
Chapter 6: Using the Web Interface 6. Click OK. Setting Thresholds for Multiple Sensors You can configure thresholds for multiple environmental sensors of the same type at a time. For example, if you want all temperature sensors to have identical upper and lower thresholds, follow the procedure below to set up all temperature sensors together.
Chapter 6: Using the Web Interface To select all of those listed on the Peripheral Devices page, simply select the checkbox in the header row. 3. Click Setup. Note that the Setup button is disabled if any of the selected sensors belongs to a different type.
Page 266
Chapter 6: Using the Web Interface Information of each managed sensor and actuator, including: - Name - Position - Reading (for numeric sensors) - State To view both managed and unmanaged ones: Click Peripheral Devices in the left pane. Detailed information for each connected sensor or actuator is displayed, including: ...
Page 267
Chapter 6: Using the Web Interface Sensor state Applicable to below lower warning Numeric sensors above upper warning Numeric sensors above upper critical Numeric sensors "unavailable" State The unavailable state means the connectivity or communications with the sensor is lost. The EMX pings all managed sensors at regular intervals in seconds.
Page 268
If the normal state is set to Normally Open, the normal state means the contact closure switch is open. For a Raritan's DPX floor water sensor, the normal state must be set to Normally Closed, which means no water is detected.
Page 269
Chapter 6: Using the Web Interface "below lower critical" State This state means a numeric sensor's reading is below the lower critical threshold as indicated below: Reading < Lower Critical Threshold "below lower warning" State This state means a numeric sensor's reading is below the lower warning threshold as indicated below: Lower Critical Threshold <= Reading <...
Chapter 6: Using the Web Interface Unmanaging Environmental Sensors or Actuators When it is unnecessary to monitor a particular environmental factor, you can unmanage or release the corresponding environmental sensor so that the EMX device stops retrieving the sensor's reading and/or state. This procedure also applies if you want to unmanage an actuator.
Chapter 6: Using the Web Interface Disabling the Automatic Management Function The factory default is to enable the automatic management feature for environmental sensors and actuators. Therefore, when the total number of managed sensors and actuators has not reached 32 yet, the EMX automatically brings newly-connected environmental sensors and actuators under management after detecting them.
Chapter 6: Using the Web Interface Asset Management Configure the asset management settings only when an asset sensor is physically connected to the EMX device. Note: To set up an asset management system, see Connecting Asset Management Sensors (on page 25). Configuring the Asset Sensor The EMX cannot detect how many rack units (tag ports) a connected asset management sensor supports, so you must provide this...
Page 273
Chapter 6: Using the Web Interface Bottom-Up: The rack units are numbered in the descending order from the highest to the lowest rack unit. 9. In the Numbering Offset field, select the starting number. For example, if you select 3, the first rack unit is numbered 3, the second is numbered 4, the third is numbered 5, and so on until the final number.
Chapter 6: Using the Web Interface 12. Click OK. Setting Asset Sensor LED Colors Each LED on the asset sensor indicates the presence and absence of a connected asset tag by changing its color. By default the LED color of the tag ports with tags connected is green, and the color of the tag ports without tags connected is red.
Chapter 6: Using the Web Interface Note: You can also access this dialog by double-clicking the asset sensor shown on the Dashboard page. 3. Click Setup on the asset sensor page. The setup dialog for that asset sensor appears. 4. To change the LED color denoting the presence of a tag, either click a color in the color palette or type the hexadecimal RGB value of the color in the "Color with connected Tag"...
Chapter 6: Using the Web Interface LED Mode: Select On to have the LED stay lit, Off to have it stay off, "Slow blinking" to have it blink slowly, or "Fast blinking" to have it blink quickly. LED Color: If you select On, "Slow blinking" or "Fast blinking" in the LED Mode field, select an LED color by either clicking a color in the color palette or typing the hexadecimal RGB value of a color in the accompanying text box.
Chapter 6: Using the Web Interface 3. Double-click that rack unit or click the white arrow prior to the folder icon. The arrow then turns into a black, gradient arrow , and all tag ports of the blade extension strip appear below the folder. To collapse a blade extension strip: ...
Chapter 6: Using the Web Interface Webcam Management With a Logitech webcam connected to the EMX device, you can visually ® monitor the environment around the EMX via snapshots or videos captured by the webcam. To view snapshots and videos, you need the permission of either "Change Webcam Configuration"...
Chapter 6: Using the Web Interface a. Video - the webcam is in video mode. Set the Framerate (frames per second) rate. b. Snapshot - the webcam displays images from the webcam. Set the "Time between Snapshots" rate as measured in seconds. 7.
Chapter 6: Using the Web Interface 3. By default, Local, meaning the EMX, is the designated default storage. 4. Select CIFS/Samba as the storage location. 5. Enter the server where to store the images. 6. If needed, enter the share drive/folder to store the images in. 7.
Chapter 6: Using the Web Interface Viewing Webcam Snapshots or Videos You can switch between snapshots or live videos being captured by a webcam. The snapshot or video is displayed either in the EMX web interface or in a Primary Standalone Live Preview window that you open. You can open a maximum of five Primary Standalone Live Preview windows.
Chapter 6: Using the Web Interface To change any image settings, click Setup . See (on page 264) or Configuring Webcams Adjusting Image (on page 266). Properties To save the snapshot being displayed, click the "Store Snapshot to Webcam Storage" icon .
Chapter 6: Using the Web Interface 3. Click on the Snapshots icon in the navigation tree to verify that those snapshots are successfully saved and listed on the Snapshots page. Tip: To store snapshots on a remote server rather than the EMX, see Configuring Webcam Storage (on page 265).
Chapter 6: Using the Web Interface Neither the Primary Standalone Live Preview window nor any remote session based on the same URL remains open, but the idle timeout period has not expired yet since the last Live Preview window session was closed.
Page 285
Chapter 6: Using the Web Interface Snapshot: displays the image of the snapshot being selected. Details: shows the information which had been entered when the snapshot was saved, including resolution and location settings. Tip: To save more than 10 snapshots, save snapshots onto a remote server.
Chapter 6: Using the Web Interface Managing the Schroff LHX/SHX Heat Exchanger The EMX supports monitoring and administering the Schroff LHX-20, ® LHX-40 and SHX-30 heat exchanger if this device is connected to the EMX. From the EMX, you can do the following remotely: ...
Chapter 6: Using the Web Interface Enabling and Disabling Schroff LHX/SHX Heat Exchanger Support By default, Schroff LHX/SHX Heat Exchanger support is disabled. As such, support needs to be enabled before the device appears in the navigation tree or on the dashboard. Additionally, Schroff LHX/SHX Heat Exchanger support must be enabled in order for the LHX-MIB to be accessible through SNMP.
Chapter 6: Using the Web Interface Configuring the LHX/SHX After enabling the LHX/SHX support on the EMX, the EMX should automatically detect the connected LHX/SHX device and display it under the Auxiliary Ports or the Feature Ports folder, depending on the port it is connected to.
Page 289
Chapter 6: Using the Web Interface Setting Up an LHX/SHX Once a Schroff LHX/SHX heat exchanger is connected, you can set up the device by giving it a name, and configure its setpoint air outlet and default fan speed. To set up the LHX/SHX: 1.
Page 290
Chapter 6: Using the Web Interface 7. Click OK. Configuring Temperature and Fan Thresholds An LHX/SHX heat exchanger is implemented with various sensors for detecting the air temperature, water temperature, and fan speed. You can set thresholds for these sensors so that the EMX alerts you when any sensor readings are getting close to a critical condition.
Chapter 6: Using the Web Interface 4. Adjust the threshold and deassertion hysteresis settings. The Upper Critical and Lower Critical values are points at which the EMX considers the operating environment critical and outside the range of the acceptable threshold. ...
Page 292
Chapter 6: Using the Web Interface 2. Locate the LHX/SHX Heat Exchanger section where the LHX/SHX summary is shown. LHX/SHX summary on the Ports page: Click the Auxiliary Ports folder in the EMX Explorer pane. - OR - Click the Feature Ports folder.
Page 293
Chapter 6: Using the Web Interface Viewing Details An LHX/SHX heat exchanger page shows detailed information, including: Device information and settings, such as the LHX/SHX device name The air outlet temperature The default fan speed Readings and states of all LHX/SHX built-in sensors ...
Page 294
Chapter 6: Using the Web Interface 2. Click the desired LHX/SHX device. Its page opens in the right pane. Device States and Icon Variations The EMX web interface changes icons to represent different statuses of the connected LHX/SHX heat exchanger. Icons Device status The heat exchanger is turned ON and operating...
Page 295
Chapter 6: Using the Web Interface To identify the cause of a critical state, refer to: (on page 277) Viewing the Summary (on page 281) Alert States and LHX Event Log Alert States and LHX Event Log Remote Alert Acknowledgment is supported by the LHX-20 and LHX-40. The SHX-30 does not support Remote Alert Acknowledgment.
Chapter 6: Using the Web Interface Operating Hours Operating hours are the accumulative time since the LHX/SHX heat exchanger is first connected to the EMX device and turned ON. The EMX web interface displays the operating hours both for the heat exchanger and its fans.
Page 297
Chapter 6: Using the Web Interface In the Information section, click either Switch Off or Switch On. 3. If you clicked Switch Off, a dialog appears, prompting you to confirm the operation. Click Yes to turn it off or No to abort the operation. The heat exchanger's icon changes after being turned on or off.
Chapter 6: Using the Web Interface Requesting Maximum Cooling for an SHX-30 The EMX allows you to remotely activate the Schroff SHX-30's maximum cooling feature. The LHX-20 and LHX-40 do not support remote activation of maximum cooling. When you click Request Maximum Cooling on the EMX web interface, the SHX-30 enters into emergency cooling mode and runs at its maximum cooling level of 100% in order to cool the device.
Chapter 6: Using the Web Interface Resetting the PM710 Minimum and Maximum Values The PM710 saves readings when they reach their highest and lowest value. The highest value and lowest value are the minimum and maximum values, which can be reset as needed. Review your PM710 documentation for additional information.
Chapter 6: Using the Web Interface Bulk Configuration The Bulk Configuration feature lets you save the settings of a configured EMX device to your PC. You can use this configuration file to copy that configuration to other EMX devices of the same model and firmware version.
Chapter 6: Using the Web Interface Saving the EMX Configuration A source device is an already configured EMX device that is used to create a configuration file containing the settings that can be shared between EMX devices. These settings include user and role configurations, event rules, security settings, and so on.
Chapter 6: Using the Web Interface Copying the EMX Configuration A target device is the EMX device that loads another EMX device's configuration file. Copying a source EMX device's configuration to a target device adjusts the target EMX device's settings to match those of the source EMX device.
Chapter 6: Using the Web Interface Backup and Restore of EMX Device Settings Different from the Bulk Configuration file, the backup file contains device-specific data like network settings. To back up or restore EMX device settings, you should perform the Backup/Restore feature. All EMX information is captured in the XML backup file except for the device logs and TLS certificate.
Before starting the upgrade, read the release notes downloaded from the Raritan website's (http://www.raritan.com/support/). If Support page you have any questions or concerns about the upgrade, contact Raritan Technical Support BEFORE upgrading. Warning: Do NOT perform the firmware upgrade over a wireless network connection.
Chapter 6: Using the Web Interface 7. When the update is complete, a message appears, indicating the update is successful. 8. The EMX resets, and the Login page re-appears. You can now log in and resume your operation. Note 1: The other logged-in users are also logged out when the firmware update is complete.
Raritan. Contact Raritan Technical Support for the recovery utility, which works in Windows XP/Vista/7 and Linux. In addition, an appropriate EMX firmware file is required in the recovery procedure.
1. Choose Maintenance > Network Diagnostics > List TCP Connections. The TCP Connections window appears. 2. Click Close to quit the dialog. Downloading Diagnostic Information Important: This function is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support.
1. Choose Maintenance > Download Diagnostic Information. You are then prompted to save or open the file. 2. Click Save to save the file. 3. E-mail this file as instructed by Raritan Technical Support. Rebooting the EMX You can remotely reboot the EMX device via the web interface.
Chapter 6: Using the Web Interface Accessing the Help The Help menu provides: Current firmware and software packages information A link to the EMX help Retrieving Software Packages Information You can check the current firmware version and the information of all open source packages embedded in the EMX device through the web interface.
Page 311
"Email this page" icon in the toolbar. 9. To email your comments or suggestions regarding the online help to Raritan, click the "Send feedback" icon 10. To print the currently selected topic, click the "Print this page" icon...
Using SNMP Chapter 7 This SNMP section helps you set up the EMX for use with an SNMP manager. The EMX can be configured to send traps or informs to an SNMP manager, as well as receive GET and SET commands in order to retrieve status and configure some basic settings.
Chapter 7: Using SNMP 2. Select the "enable" checkbox in the "SNMP v1 / v2c" field to enable communication with an SNMP manager using SNMP v1 or v2c protocol. Type the SNMP read-only community string in the Read Community String field. Usually the string is "public." ...
Chapter 7: Using SNMP 5. Click OK. The user is now set up for encrypted SNMP v3 communication. Configuring SNMP Notifications The EMX automatically keeps an internal log of events that occur. See (on page 187). These events can also be Event Rules and Actions used to send SNMP v2c or v3 notifications to a third-party destination.
Chapter 7: Using SNMP SNMPv2c Notifications To configure the EMX to send SNMP notifications: 1. Choose Device Settings > Network Services > SNMP. The SNMP Settings dialog appears. 2. On the Notifications tab, select the Enabled checkbox to enable the SNMP notification feature.
Page 316
Chapter 7: Using SNMP 3. From the Notification Type drop-down, select the type of SNMP notification. 4. For SNMP INFORM communications, leave the resend settings at their default or: a. In the Timeout (sec) field, enter the interval of time, in seconds, after which a new inform communication is resent if the first is not received.
Chapter 7: Using SNMP SNMPv3 Notifications To configure the EMX to send SNMPv3 notifications: 1. Choose Device Settings > Network Services > SNMP. The SNMP Settings dialog appears. 2. On the Notifications tab, select the Enabled checkbox to enable the SNMP notification feature.
Page 318
Chapter 7: Using SNMP 3. From the Notification Type drop-down, select the type of SNMP notification. 4. For SNMP TRAPs, the engine ID is prepopulated. 5. For SNMP INFORM communications, leave the resend settings at their default or: a. In the Timeout (sec) field, enter the interval of time, in seconds, after which a new inform communication is resent if the first is not received.
Chapter 7: Using SNMP Security level Description "noAuthNoPriv" Select this if no authorization or privacy protocols are needed. "authNoPriv" Select this if authorization is required but no privacy protocols are required. Select the authentication protocol - MD5 or Enter the authentication passphrase and then confirm the authentication passphrase "authPriv"...
Chapter 7: Using SNMP The EMX MIB The SNMP MIB file is required for using your EMX device with an SNMP manager. An SNMP MIB file describes the SNMP functions. Downloading SNMP MIB The SNMP MIB file for the EMX can be easily downloaded from the web interface.
Page 321
Chapter 7: Using SNMP Layout Opening the MIB reveals the custom objects that describe the EMX system. As standard, these objects are first presented at the beginning of the file, listed under their parent group. The objects then appear again individually, defined and described in detail.
Chapter 7: Using SNMP A Note about Enabling Thresholds When enabling previously disabled thresholds via SNMP, make sure you set a correct value for all thresholds that are supposed to be enabled prior to actually enabling them. Otherwise, you may get an error message.
Using the Command Line Interface Chapter 8 This section explains how to use the command line interface (CLI) to administer a EMX device. In This Chapter About the Interface ................309 Logging in to CLI ...................310 Help Command..................314 Querying Available Parameters for a Command........315 Showing Information................315 Clearing Information ................336 Configuring the EMX Device and Network ..........337...
Chapter 8: Using the Command Line Interface Logging in to CLI Logging in via HyperTerminal over a local connection is a little different than logging in using SSH or Telnet. If a security login agreement has been enabled, you must accept the agreement in order to complete the login.
Chapter 8: Using the Command Line Interface 5. Type a password and press Enter. The password is case sensitive. After properly entering the password, the # or > system prompt appears. See (on page 313) in Different CLI Modes and Prompts the User Guide for more information.
Chapter 8: Using the Command Line Interface Tip: The "Last Login" information, including the date and time, is also displayed if the same user profile was used to log in to this product's web interface or CLI. 6. You are now logged in to the command line interface and can begin administering the EMX.
Chapter 8: Using the Command Line Interface Different CLI Modes and Prompts Depending on the login name you use and the mode you enter, the system prompt in the CLI varies. User Mode: When you log in as a normal user, who may not have full permissions to configure the EMX device, the >...
Chapter 8: Using the Command Line Interface Help Command The help (?) command shows a list of main CLI commands available for the current mode. This is helpful when you are not familiar with CLI commands. Help command under the administrator mode: Help command under the configuration mode: config:# Help command under the diagnostic mode:...
Chapter 8: Using the Command Line Interface Querying Available Parameters for a Command If you are not sure what commands or parameters are available for a particular type of CLI command or its syntax, you can have the CLI show them by adding a space and the help command (?) to the end of that command.
Chapter 8: Using the Command Line Interface Network Configuration This command shows all network configuration, such as the IP address, networking mode, and MAC address. show network IP Configuration This command shows the IP-related configuration only, such as IPv4 and IPv6 configuration, address(es), gateway, and subnet mask.
Page 331
Chapter 8: Using the Command Line Interface Networking Mode This command shows whether the current networking mode is wired or wireless. show network mode Note: If the EMX is a slave device connected to the LAN via the master EMX device, the show network mode command displays wired(USB) instead of wired.
Chapter 8: Using the Command Line Interface Option Description https Only displays the TCP port for the HTTPS service. telnet Only displays the settings of the Telnet service. Only displays the settings of the SSH service. snmp Only displays the SNMP settings. modbus Only displays the settings of the Modbus/TCP service.
Chapter 8: Using the Command Line Interface Default Measurement Units This command shows the default measurement units applied to the EMX web and CLI interfaces across all users, especially those users authenticated through remote authentication servers. show user defaultPreferences Note: If a user has set his/her own preferred measurement units or the administrator has changed any user's preferred units, the web and CLI interfaces show the preferred measurement units for that user instead of the default ones after that user logs in to the EMX.
Chapter 8: Using the Command Line Interface Environmental Sensor Information This command syntax shows the environmental sensor's information. show externalsensors <n> To show detailed information, add the parameter "details" to the end of the command. show externalsensors <n> details External sensor 3 ('Temperature 1') Sensor type: Temperature Reading: 31.8 deg C (normal)
Page 335
Chapter 8: Using the Command Line Interface * The environmental sensor number is the ID number assigned to the sensor, which can be found on the Peripheral Devices page of the EMX web interface. Displayed information: Without the parameter "details," only the sensor ID, sensor type and reading are displayed.
Chapter 8: Using the Command Line Interface Environmental Sensor Package Information Different from the "show externalsensors" commands, which show the reading, status and configuration of an individual environmental sensor, the following command shows the information of all connected environmental sensor packages, each of which may contain more than one sensor or actuator.
Chapter 8: Using the Command Line Interface Actuator Information This command syntax shows an actuator's information. show actuators <n> To show detailed information, add the parameter "details" to the end of the command. show actuators <n> details Variables: <n> is one of the options: all, or a number. Option Description Displays the information for all actuators.
Chapter 8: Using the Command Line Interface Environmental Sensor Threshold Information This command syntax shows the specified environmental sensor's threshold-related information. show sensor externalsensor <n> To show detailed information, add the parameter "details" to the end of the command. show sensor externalsensor <n> details External sensor 3 (Temperature): Reading: 31.8 deg C State:...
Chapter 8: Using the Command Line Interface Variables: <n> is the environmental sensor number. The environmental sensor number is the ID number assigned to the sensor, which can be found on the Peripheral Devices page of the EMX web interface. Displayed information: ...
Chapter 8: Using the Command Line Interface Displayed information: Without the parameter "details," only the default upper and lower thresholds, deassertion hysteresis and assertion timeout settings of the specified sensor type are displayed. With the parameter "details," the threshold range is displayed in addition to default thresholds settings.
Chapter 8: Using the Command Line Interface Existing User Profiles This command shows the data of one or all existing user profiles. show user <user_name> To show detailed information, add the parameter "details" to the end of the command. show user <user_name> details Variables: ...
Chapter 8: Using the Command Line Interface Existing Roles This command shows the data of one or all existing roles. show roles <role_name> Variables: <role_name> is the name of the role whose permissions you want to query. The variable can be one of the following options: Option Description This option shows all existing roles.
1. Rack Unit Settings of an Asset Sensor For the Raritan asset sensor, a rack unit refers to a tag port. This command shows the settings of a specific rack unit or all rack units on an asset sensor, such as a rack unit's LED color and LED mode.
Chapter 8: Using the Command Line Interface Option Description A specific Displays the settings of the specified rack unit on number the specified asset sensor. Use the index number to specify the rack unit. The index number of each rack unit is available on the Asset Strip page of the web interface.
Chapter 8: Using the Command Line Interface Event Log The command used to show the event log begins with show eventlog. You can add either the limit or class parameters or both to show specific events. Show the last 30 entries: show eventlog Show a specific number of last entries in the event log: show eventlog limit <n>...
Chapter 8: Using the Command Line Interface Event type Description assetManagement Raritan asset management events, such as asset tag connections or disconnections. Schroff LHX/SHX heat exchanger events. ® modem Modem-related events. timerEvent Scheduled action events. webcam Events for webcam management, if available.
Page 347
Chapter 8: Using the Command Line Interface Server Reachability Information for a Specific Server To show the server reachability information for a certain IT device only, use the following command. show serverReachability server <n> To show detailed information, add the parameter "details" to the end of the command.
Chapter 8: Using the Command Line Interface Command History This command syntax shows the command history for current connection session. show history Displayed information: A list of commands that were previously entered in the current session is displayed. History Buffer Length This command syntax shows the length of the history buffer for storing history commands.
Chapter 8: Using the Command Line Interface Option Description A specific Displays the specified number of last entries in the integer number reliability error log. Examples This section provides examples of the show command. Example 1 - Basic Security Information The diagram shows the output of the show security command.
Chapter 8: Using the Command Line Interface Example 2 - In-Depth Security Information More information is displayed when typing the show security details command. Clearing Information You can use the clear commands to remove unnecessary data from the EMX. After typing a "clear" command, press Enter to execute it. Note: Depending on your login name, the # prompt may be replaced by the >...
Chapter 8: Using the Command Line Interface Clearing Event Log This command removes all data from the event log. clear eventlog -- OR -- clear eventlog /y If you entered the command without "/y," a message appears, prompting you to confirm the operation. Type y to clear the event log or n to abort the operation.
Chapter 8: Using the Command Line Interface Entering Configuration Mode Configuration commands function in configuration mode only. To enter configuration mode: 1. Ensure you have entered administrator mode and the # prompt is displayed. Note: If you enter configuration mode from user mode, you may have limited permissions to make configuration changes.
Chapter 8: Using the Command Line Interface Device Configuration Commands A device configuration command begins with emd. You can use the device configuration commands to change the settings that apply to the whole EMX device. Configuration commands are case sensitive so ensure you capitalize them correctly.
Page 354
This command specifies your EMX device's altitude above sea level (in meters). You must specify the EMX device's altitude above sea level if a Raritan's DPX differential air pressure sensor is attached. This is because the device's altitude is associated with the altitude correction factor.
Chapter 8: Using the Command Line Interface Option Description freeForm Any alphanumeric string can be used for specifying the Z coordinate. Note: After determining the format for the Z coordinate, you can set a value for it. See Setting the Z Coordinate (on page 410).
Page 356
Chapter 8: Using the Command Line Interface Setting the Networking Mode If your EMX device is implemented with both wired and wireless networking mechanisms, you must determine which mechanism is enabled for network connectivity before further configuring networking parameters. This command enables the wired or wireless networking mode. config:# network mode <mode>...
Page 357
Chapter 8: Using the Command Line Interface Mode Description v6Only Enables IPv6 only on all interfaces. both Enables both IPv4 and IPv6 on all interfaces. Selecting IPv4 or IPv6 Addresses This command determines which IP address is used when the DNS server returns both of IPv4 and IPv6 addresses.
Page 358
Chapter 8: Using the Command Line Interface Setting the SSID This command specifies the SSID string. config:# network wireless SSID <ssid> Variables: <ssid> is the name of the wireless access point, which consists of: - Up to 32 ASCII characters - No spaces - ASCII codes 0x20 ~ 0x7E Setting the Authentication Method...
Page 359
Chapter 8: Using the Command Line Interface Setting EAP Parameters When the wireless authentication method is set to EAP, you must configure EAP authentication parameters, including outer authentication, inner authentication, EAP identity, password, and CA certificate. Determine the outer authentication protocol: config:# network wireless eapOuterAuthentication <outer_auth>...
Page 360
Chapter 8: Using the Command Line Interface config:# network wireless allowConnectionWithIncorrectClock <option3> Variables: The value of <outer_auth> is PEAP because EMX only supports Protected Extensible Authentication Protocol (PEAP) as the outer authentication. The value of <inner_auth> is MSCHAPv2 because EMX only supports Microsoft's Challenge Authentication Protocol Version 2 (MSCHAPv2) as the inner authentication.
Page 361
Chapter 8: Using the Command Line Interface EAP CA Certificate Example This section provides a CA certificate example only. Your CA certificate contents should be different from the contents displayed in this example. To provide a CA certificate: 1. Make sure you have entered the configuration mode. See Entering (on page 338).
Page 362
Chapter 8: Using the Command Line Interface MIICjTCCAfigAwIBAgIEMaYgRzALBgkqhkiG9w0BAQQwRTELMAk GA1UEBhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aW NzIGFuZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjAmFxE5NjA1MjgxM zQ5MDUrMDgwMBcROTgwNTI4MTM0OTA1KzA4MDAwZzELMAkGA1UE BhMCVVMxNjA0BgNVBAoTLU5hdGlvbmFsIEFlcm9uYXV0aWNzIGF uZCBTcGFjZSBBZG1pbmlzdHJhdGlvbjEgMAkGA1UEBRMCMTYwEw YDVQQDEwxTdGV2ZSBTY2hvY2gwWDALBgkqhkiG9w0BAQEDSQAwR gJBALrAwyYdgxmzNP/ts0Uyf6BpmiJYktU/w4NG67ULaN4B5CnE z7k57s9o3YY3LecETgQ5iQHmkwlYDTL2fTgVfw0CAQOjgaswgag wZAYDVR0ZAQH/BFowWDBWMFQxCzAJBgNVBAYTAlVTMTYwNAYDVQ QKEy1OYXRpb25hbCBBZXJvbmF1dGljcyBhbmQgU3BhY2UgQWRta W5pc3RyYXRpb24xDTALBgNVBAMTBENSTDEwFwYDVR0BAQH/BA0w C4AJODMyOTcwODEwMBgGA1UdAgQRMA8ECTgzMjk3MDgyM4ACBSA wDQYDVR0KBAYwBAMCBkAwCwYJKoZIhvcNAQEEA4GBAH2y1VCEw/ A4zaXzSYZJTTUi3uawbbFiS2yxHvgf28+8Js0OHXk1H1w2d6qOH H21X82tZXd/0JtG0g1T9usFFBDvYK8O0ebgz/P5ELJnBL2+atOb EuJy1ZZ0pBDWINR3WkDNLCGiTkCKp0F5EWIrVDwh54NNevkCQRZ ita+z4IBO 6. Paste the contents in the terminal. 7. Press Enter. 8. Verify whether the system shows the following command prompt, indicating the provided CA certificate is valid.
Page 363
Chapter 8: Using the Command Line Interface Setting the IPv4 Configuration Mode This command determines the IP configuration mode. config:# network ipv4 ipConfigurationMode <mode> Variables: <mode> is one of the modes: dhcp or static. Mode Description dhcp The IPv4 configuration mode is set to DHCP. static The IPv4 configuration mode is set to static IP address.
Page 364
Chapter 8: Using the Command Line Interface Setting the IPv4 Subnet Mask After selecting the static IP configuration mode, you can use this command to define the subnet mask. config:# network ipv4 subnetMask <netmask> Variables: <netmask> is the subnet mask address. The value ranges from 0.0.0.0 to 255.255.255.255.
Page 365
Chapter 8: Using the Command Line Interface Setting the IPv4 Secondary DNS Server After selecting the static IP configuration mode, you can use this command to specify the secondary DNS server. If you have selected the DHCP configuration mode, you still can manually specify DNS servers with this command and then override the DHCP-assigned DNS servers.
Page 366
Chapter 8: Using the Command Line Interface Setting IPv4 Static Routes If the IPv4 network mode is set to static IP and your local network contains two subnets, you can configure static routes to enable or disable communications between the EMX and devices in the other subnet.
Page 367
Chapter 8: Using the Command Line Interface Setting the IPv6 Configuration Mode This command determines the IP configuration mode. config:# network ipv6 ipConfigurationMode <mode> Variables: <mode> is one of the modes: automatic or static. Mode Description automatic The IPv6 configuration mode is set to automatic. static The IPv6 configuration mode is set to static IP address.
Page 368
Chapter 8: Using the Command Line Interface Setting the IPv6 Gateway After selecting the static IP configuration mode, you can use this command to specify the gateway. config:# network ipv6 gateway <ip address> Variables: <ip address> is the IP address of the gateway. This value uses the IPv6 address format.
Page 369
Chapter 8: Using the Command Line Interface Overriding the IPv6 DHCP-Assigned DNS Server After specifying the primary/secondary DNS server, you can use this command to override the DHCP-assigned DNS server with the one you specified. config:# network ipv6 overrideDNS <option> Variables: ...
Page 370
Chapter 8: Using the Command Line Interface config:# network ipv6 staticRoutes modify <route_ID> <dest-2> <hop> Variables: <dest-1> is the IP address and prefix length of the subnet where the EMX belongs. The format is IP address/prefix length. <hop> is the IP address of the next hop router. ...
Page 371
Chapter 8: Using the Command Line Interface Changing the LAN Duplex Mode This command determines the LAN interface duplex mode. config:# network interface LANInterfaceDuplexMode <mode> Variables: <mode> is one of the modes: auto, half or full. Option Description auto The EMX selects the optimum transmission mode through auto-negotiation.
Page 372
Chapter 8: Using the Command Line Interface Setting the HTTP Port The commands used to configure the HTTP port settings begin with network services http. Change the HTTP port: config:# network services http port <n> Enable or disable the HTTP port: config:# network services http enabled <option>...
Page 373
Chapter 8: Using the Command Line Interface Setting the HTTPS Port The commands used to configure the HTTPS port settings begin with network services https. Change the HTTPS port: config:# network services https port <n> Enable or disable the HTTPS access: config:# network services https enabled <option>...
Page 374
Chapter 8: Using the Command Line Interface Changing the Telnet Port This command changes the Telnet port. config:# network services telnet port <n> Variables: <n> is a TCP port number between 1 and 65535. The default Telnet port is 23. Changing the SSH Configuration You can enable or disable the SSH service, or change its TCP port using the CLI commands.
Page 375
Chapter 8: Using the Command Line Interface Determining the SSH Authentication Method This command syntax determines the SSH authentication method. config:# network services ssh authentication <auth_method> Variables: <option> is one of the options: passwordOnly, publicKeyOnly or passwordOrPublicKey. Option Description passwordOnly Enables the password-based login only.
Page 376
Chapter 8: Using the Command Line Interface Enabling or Disabling SNMP v3 This command enables or disables the SNMP v3 protocol. config:# network services snmp v3 <option> Variables: <option> is one of the options: enable or disable. Option Description enable The SNMP v3 protocol is enabled.
Page 377
Chapter 8: Using the Command Line Interface Setting the sysName Value This command sets the SNMP MIB-II sysName value. config:# network services snmp sysName <value> Variables: <value> is a string comprising 0 to 255 alphanumeric characters. Setting the sysLocation Value This command sets the SNMP MIB-II sysLocation value.
Page 378
Chapter 8: Using the Command Line Interface Enabling or Disabling the Read-Only Mode This command enables or disables the read-only mode for the Modbus agent. config:# network services modbus readonly <option> Variables: <option> is one of the options: true or false. Option Description true...
Chapter 8: Using the Command Line Interface Examples This section illustrates several network configuration examples. Example 1 - Networking Mode The following command enables the wired networking mode. config:# network mode wired Example 2 - Enabling Both IP Protocols The following command determines that both IPv4 and IPv6 protocols are enabled.
Page 380
Chapter 8: Using the Command Line Interface Mode Description The date and time settings synchronize with a specified NTP server. Setting NTP Parameters A time configuration command that is used to set the NTP parameters begins with time ntp. Specifying the Primary NTP Server This command specifies the primary time server if synchronization with the NTP server is enabled.
Page 381
Chapter 8: Using the Command Line Interface Overriding DHCP-Assigned NTP Servers This command determines whether the customized NTP server settings override the DHCP-specified NTP servers. config:# time ntp overrideDHCPProvidedServer <option> Variables: <option> is one of these options: true or false. Mode Description true...
Page 382
Chapter 8: Using the Command Line Interface Customizing the Date and Time If intending to manually configure the date and time, use the following CLI commands to specify them. Note: You shall set the time configuration method to "manual" prior to customizing the date and time.
Chapter 8: Using the Command Line Interface Examples This section illustrates several time configuration examples. Example 1 - Time Setup Method The following command sets the date and time settings by using the NTP servers. config:# time method ntp Example 2 - Primary NTP Server The following command sets the primary time server to 192.168.80.66.
Chapter 8: Using the Command Line Interface Security Configuration Commands A security configuration command begins with security. Firewall Control You can manage firewall control features through the CLI. The firewall control lets you set up rules that permit or disallow access to the EMX device from a specific or a range of IP addresses.
Page 385
Chapter 8: Using the Command Line Interface config:# security ipAccessControl ipv6 defaultPolicyIn <policy> Determine the default IPv6 firewall control policy for outbound traffic: config:# security ipAccessControl ipv6 defaultPolicyOut <policy> Variables: <option> is one of the options: true or false. Option Description true...
Page 386
Chapter 8: Using the Command Line Interface config:# security ipAccessControl ipv4 rule add <direction> <ip_mask> <policy> Add a new IPv4 rule by inserting it above or below a specific rule: config:# security ipAccessControl ipv4 rule add <direction> <ip_mask> <policy> <insert> <rule_number>...
Page 387
Chapter 8: Using the Command Line Interface <ip_mask> is the combination of the IP address and subnet mask values (or prefix length), which are separated with a slash. For example, an IPv4 combination looks like this: 192.168.94.222/24. <policy> is one of the options: accept, drop or reject. Policy Description accept...
Page 388
Chapter 8: Using the Command Line Interface config:# security ipAccessControl ipv4 rule modify <direction> <rule_number> ipMask <ip_mask> policy <policy> IPv6 commands Modify an IPv6 rule's IP address and/or prefix length: config:# security ipAccessControl ipv6 rule modify <direction> <rule_number> ipMask <ip_mask>...
Page 389
Chapter 8: Using the Command Line Interface Option Description reject Discards traffic from/to the specified IP address(es), and an ICMP message is sent to the source or destination host for failure notification. Deleting a Firewall Rule The following commands remove a specific IPv4 or IPv6 rule from the list.
Page 390
Chapter 8: Using the Command Line Interface Enabling or Disabling the Restricted Service Agreement This command activates or deactivates the Restricted Service Agreement. config:# security restrictedServiceAgreement enabled <option> Variables: <option> is one of the options: true or false. Option Description true Enables the Restricted Service Agreement...
Page 391
Chapter 8: Using the Command Line Interface If the content is successfully entered, the CLI displays this message "Successfully entered Restricted Service Agreement" followed by the total number of entered characters in parentheses. Note: The new content of Restricted Service Agreement is saved only after typing the apply command.
Page 392
Chapter 8: Using the Command Line Interface Password Aging This command enables or disables the password aging feature, which controls whether the password should be changed at a regular interval: config:# security loginLimits passwordAging <option> Variables: <option> is one of the options: enable or disable. Option Description enable...
Page 393
Chapter 8: Using the Command Line Interface User Blocking There are different commands for changing different user blocking parameters. These commands begin with security userBlocking. You can combine multiple commands to modify the user blocking parameters at a time. See (on page 431).
Page 394
Chapter 8: Using the Command Line Interface Enabling or Disabling Strong Passwords This command enables or disables the strong password feature. config:# security strongPasswords enabled <option> Variables: <option> is one of the options: true or false. Option Description true Enables the strong password feature.
Page 395
Chapter 8: Using the Command Line Interface config:# security strongPasswords enforceAtLeastOneLowerCaseCharacter <option> Variables: <option> is one of the options: enable or disable. Option Description enable At least one lowercase character is required. disable No lowercase character is required. Uppercase Character Requirement This command determines whether a strong password includes at least a uppercase character.
Page 396
Chapter 8: Using the Command Line Interface Special Character Requirement This command determines whether a strong password includes at least a special character. config:# security strongPasswords enforceAtLeastOneSpecialCharacter <option> Variables: <option> is one of the options: enable or disable. Option Description enable At least one special character is required.
Page 397
Chapter 8: Using the Command Line Interface config:# security roleBasedAccessControl ipv4 enabled <option> Determine the IPv4 role-based access control policy: config:# security roleBasedAccessControl ipv4 defaultPolicy <policy> IPv6 commands Enable or disable the IPv6 role-based access control feature: config:# security roleBasedAccessControl ipv6 enabled <option> Determine the IPv6 role-based access control policy: config:# security roleBasedAccessControl ipv6 defaultPolicy <policy>...
Page 398
Chapter 8: Using the Command Line Interface Managing Role-Based Access Control Rules You can add, delete or modify role-based access control rules. An IPv4 role-based access control command for managing rules begins with security roleBasedAccessControl ipv4 rule. An IPv6 role-based access control command for managing rules begins with security roleBasedAccessControl ipv6 rule.
Page 399
Chapter 8: Using the Command Line Interface config:# security roleBasedAccessControl ipv6 rule add <start_ip> <end_ip> <role> <policy> <insert> <rule_number> Variables: <start_ip> is the starting IP address. <end_ip> is the ending IP address. <role> is the role for which you want to create an access control rule. ...
Page 400
Chapter 8: Using the Command Line Interface config:# security roleBasedAccessControl ipv4 rule modify <rule_number> role <role> Modify an IPv4 rule's policy: config:# security roleBasedAccessControl ipv4 rule modify <rule_number> policy <policy> Modify all contents of an existing IPv4 rule: config:# security roleBasedAccessControl ipv4 rule modify <rule_number> startIpAddress <start_ip>...
Page 401
Chapter 8: Using the Command Line Interface config:# security roleBasedAccessControl ipv6 rule modify <rule_number> startIpAddress <start_ip> endIpAddress <end_ip> role <role> policy <policy> Variables: <rule_number> is the number of the existing rule that you want to modify. <start_ip> is the starting IP address. ...
Page 402
Chapter 8: Using the Command Line Interface config:# security ipAccessControl ipv4 enabled true defaultPolicyIn accept defaultPolicyOut accept Results: The IPv4 access control feature is enabled. The default policy for inbound traffic is set to "accept." The default policy for outbound traffic is set to "accept." Example 2 - Adding an IPv4 Firewall Rule The following command adds a new IPv4 access control rule and specifies its location in the list.
Chapter 8: Using the Command Line Interface Example 4 - Adding an IPv4 Role-based Access Control Rule The following command creates a newIPv4 role-based access control rule and specifies its location in the list. config:# security roleBasedAccessControl ipv4 rule add 192.168.78.50 192.168.90.100 admin deny insertAbove 3 Results: ...
Page 404
Chapter 8: Using the Command Line Interface <roles> is a role or a list of comma-separated roles assigned to the specified user profile. Modifying a User Profile A user profile contains various parameters that you can modify. Tip: You can combine all commands to modify the parameters of a specific user profile at a time.
Page 405
Chapter 8: Using the Command Line Interface Modifying a User's Personal Data You can change a user's personal data, including the user's full name, telephone number, and email address. Various commands can be combined to modify the parameters of a specific user profile at a time.
Page 406
Chapter 8: Using the Command Line Interface Enabling or Disabling a User Profile This command enables or disables a user profile. A user can log in to the EMX device only after that user's user profile is enabled. config:# user modify <name> enabled <option> Variables: ...
Page 407
Chapter 8: Using the Command Line Interface Modifying SNMPv3 Settings There are different commands to modify the SNMPv3 parameters of a specific user profile. You can combine all of the following commands to modify the SNMPv3 parameters at a time. See Multi-Command Syntax (on page 431).
Page 408
Chapter 8: Using the Command Line Interface config:# user modify <name> userPasswordAsAuthenticationPassphrase <option3> Variables: <name> is the name of the user whose settings you want to change. <option3> is one of the options: true or false. Option Description true Authentication passphrase is identical to the password.
Page 409
Chapter 8: Using the Command Line Interface Determine the privacy passphrase: config:# user modify <name> privacyPassPhrase <privacy_passphrase> Variables: <name> is the name of the user whose settings you want to change. <privacy_passphrase> is a string used as a privacy passphrase, comprising 8 to 32 ASCII printable characters.
Page 410
Chapter 8: Using the Command Line Interface Changing the Role(s) This command changes the role(s) of a specific user. config:# user modify <name> roles <roles> Variables: <name> is the name of the user whose settings you want to change. ...
Page 411
Chapter 8: Using the Command Line Interface Set the preferred length unit: config:# user modify <name> preferredLengthUnit <option2> Variables: <name> is the name of the user whose settings you want to change. <option2> is one of the options: meter or feet. Option Description meter...
Page 412
Chapter 8: Using the Command Line Interface d. Press Enter. To remove an existing SSH public key: 1. Type the same command as shown above. 2. When the system prompts you to input the contents, press Enter without typing or pasting anything. Example The following procedure illustrates how to change the SSH public key for the user "assistant."...
Page 413
Chapter 8: Using the Command Line Interface 2. Type the following command and press Enter. config:# password 3. Type the existing password and press Enter when the following prompt appears. Current password: 4. Type the new password and press Enter when the following prompt appears.
Page 414
Chapter 8: Using the Command Line Interface config:# user defaultpreferences preferredLengthUnit <option2> Variables: <option2> is one of the options: meter or feet. Option Description meter This option displays the length or height in meters. feet This option displays the length or height in feet. Set the default pressure unit: config:# user defaultpreferences preferredPressureUnit <option3>...
Page 415
Chapter 8: Using the Command Line Interface Example 1 - Creating a User Profile The following command creates a new user profile and sets two parameters for the new user. config:# user create May enable admin Results: A new user profile "May" is created. ...
Chapter 8: Using the Command Line Interface config:# user defaultpreferences preferredTemperatureUnit F preferredLengthUnit feet preferredPressureUnit psi Results: The default temperature unit is set to Fahrenheit. The default length unit is set to feet. The default pressure unit is set to psi. Role Configuration Commands A role configuration command begins with role.
Page 417
Chapter 8: Using the Command Line Interface config:# role create <name> <privilege1>:<argument1>,<argument2>...; <privilege2>:<argument1>,<argument2>...; <privilege3>:<argument1>,<argument2>...; Variables: <name> is a string comprising up to 32 ASCII printable characters. <privilege1>, <privilege2>, <privilege3> and the like are names of the privileges assigned to the role. Separate each privilege with a semi-colon.
Page 418
Chapter 8: Using the Command Line Interface Privilege Description changeUserSettings Change Local User Management changeWebcamSettings Change Webcam Configuration clearLog Clear Local Event Log firmwareUpdate Firmware Update performReset Reset (Warm Start) switchActuator** Switch Actuator viewEventSetup View Event Settings viewEverything Unrestricted View Privileges viewLog View Local Event Log viewSecuritySettings...
Page 419
Chapter 8: Using the Command Line Interface Modifying a Role You can modify diverse parameters of an existing role, including its privileges. Modify a role's description: config:# role modify <name> description "<description>" Variables: <name> is a string comprising up to 32 ASCII printable characters. ...
Page 420
Chapter 8: Using the Command Line Interface config:# role modify <name> addPrivileges <privilege1>:<argument1>,<argument2>...; <privilege2>:<argument1>,<argument2>...; <privilege3>:<argument1>,<argument2>...; Variables: <name> is a string comprising up to 32 ASCII printable characters. <privilege1>, <privilege2>, <privilege3> and the like are names of the privileges assigned to the role. Separate each privilege with a semi-colon.
Chapter 8: Using the Command Line Interface Deleting a Role This command deletes an existing role. config:# role delete <name> Example - Creating a Role The following command creates a new role and assigns privileges to the role. config:# role create tester firmwareUpdate;viewEventSetup Results: ...
Page 422
Specifying the CC Sensor Type Raritan's contact closure sensor (DPX-CC2-TR) supports the connection of diverse third-party or Raritan's detectors/switches. You must specify the type of connected detector/switch for proper operation. Use this command when you need to specify the sensor type.
Page 423
Chapter 8: Using the Command Line Interface Type Description vibration The connected detector/switch is for detection of the vibration. Setting the X Coordinate This command specifies the X coordinate of an environmental sensor. config:# externalsensor <n> xlabel "<coordinate>" Variables: <n>...
Page 424
Chapter 8: Using the Command Line Interface Setting the Z Coordinate This command specifies the Z coordinate of an environmental sensor. config:# externalsensor <n> zlabel "<coordinate>" Variables: <n> is the ID number of the environmental sensor that you want to configure.
Page 425
Chapter 8: Using the Command Line Interface Using Default Thresholds This command determines whether default thresholds, including the deassertion hysteresis and assertion timeout, are applied to a specific environmental sensor. config:# externalsensor <n> useDefaultThresholds <option> Variables: <n> is the ID number of the environmental sensor that you want to configure.
Chapter 8: Using the Command Line Interface Example 1 - Environmental Sensor Naming The following command assigns the name "Cabinet humidity" to the environmental sensor with the ID number 4. config:# externalsensor 4 name "Cabinet humidity" Example 2 - Sensor Threshold Selection The following command sets the environmental sensor #1 to use the default thresholds, including the deassertion hysteresis and assertion timeout, as its threshold settings.
Page 427
Chapter 8: Using the Command Line Interface config:# defaultThresholds <sensor type> lowerWarning <value> Set the Default Deassertion Hysteresis for a specific sensor type: config:# defaultThresholds <sensor type> hysteresis <hy_value> Set the Default Assertion Timeout for a specific sensor type: config:# defaultThresholds <sensor type>...
Chapter 8: Using the Command Line Interface Example - Default Upper Thresholds for Temperature It is assumed that your preferred measurement unit for temperature is set to degrees Celsius. Then the following command sets the default Upper Warning threshold to 20 and Upper Critical threshold to 24 for all temperature sensors.
Page 429
Chapter 8: Using the Command Line Interface config:# sensor externalsensor <n> <sensor type> lowerWarning <option> Set the deassertion hysteresis for an environmental sensor: config:# sensor externalsensor <n> <sensor type> hysteresis <hy_value> Set the assertion timeout for an environmental sensor: config:# sensor externalsensor <n>...
Page 430
Chapter 8: Using the Command Line Interface Example The following command sets the Upper Critical threshold of the environmental "temperature" sensor with the ID number 2 to 40 degrees Celsius. It also enables the upper critical threshold if this threshold has not been enabled yet.
Chapter 8: Using the Command Line Interface Actuator Configuration Commands An actuator configuration command begins with actuator. You can configure the name and location parameters of an individual actuator. You can configure various parameters for one actuator at a time. See (on page 431).
Chapter 8: Using the Command Line Interface Note: To specify the Z coordinate using the rack units, see Setting the Z Coordinate Format for Environmental Sensors (on page 340). <description> is a sentence or paragraph comprising up to 64 ASCII printable characters, and it must be enclosed in quotes.
Page 433
Chapter 8: Using the Command Line Interface <succ_ping> is the number of successful pings for declaring the monitored device "Reachable." Valid range is 0 to 200. <fail_ping> is the number of consecutive unsuccessful pings for declaring the monitored device "Unreachable." Valid range is 1 to 100.
Page 434
Chapter 8: Using the Command Line Interface config:# serverReachability modify <n> ipAddress <IP_host> Enable or disable the ping monitoring feature for the device: config:# serverReachability modify <n> pingMonitoringEnabled <option> Modify the number of successful pings for declaring "Reachable": config:# serverReachability modify <n> numberOfSuccessfulPingsToEnable <succ_number>...
Page 435
Chapter 8: Using the Command Line Interface config:# serverReachability modify <n> numberOfFailuresToDisable <disable_count> Variables: <n> is a number representing the sequence of the IT device in the server monitoring list. <IP_host> is the IP address or host name of the IT device whose settings you want to modify.
Chapter 8: Using the Command Line Interface USB-Cascading Configuration Commands A USB-cascading configuration command begins with cascading. You can set the cascading mode on the master device. Note: You CANNOT change the cascading mode on slave devices. Configuring the Cascading Mode This command determines the cascading mode.
Page 437
EMX device. config:# assetStrip <n> numberOfRackUnits <number> Note: For the Raritan asset sensor, a rack unit refers to a tag port. Variables: <n> is the number of the FEATURE port where the selected asset sensor is physically connected.
Page 438
Chapter 8: Using the Command Line Interface Specifying the Rack Unit Numbering Mode This command syntax specifies the numbering mode of rack units on the asset sensors connected to the EMX device. The numbering mode changes the rack unit numbers. config:# assetStrip <n>...
Page 439
Chapter 8: Using the Command Line Interface Specifying the Asset Sensor Orientation This command syntax specifies the orientation of the asset sensors connected to the EMX device. Usually you do not need to perform this command unless your asset sensors do NOT come with the tilt sensor, causing the EMX unable to detect the asset sensors' orientation.
Page 440
<color> is the hexadecimal RGB value of a color in HTML format. The <color> variable ranges from #000000 to #FFFFFF. Rack Unit Configuration For the Raritan asset sensor, a rack unit refers to a tag port. A rack unit configuration command begins with rackUnit. Naming a Rack Unit This command syntax assigns or changes the name of the specified rack unit on the specified asset sensor.
Page 441
Chapter 8: Using the Command Line Interface Setting the LED Operation Mode This command syntax determines whether a specific rack unit on the specified asset sensor follows the global LED color settings. config:# rackUnit <n> <rack_unit> LEDOperationMode <mode> Variables: <n>...
Page 442
Chapter 8: Using the Command Line Interface Setting an LED Color for a Rack Unit This command syntax sets the LED color for a specific rack unit on the specified asset sensor. You need to set a rack unit's LED color only when the LED operation mode of this rack unit has been set to "manual."...
Chapter 8: Using the Command Line Interface Mode Description blinkFast This mode has the LED blink quickly. Examples This section illustrates several asset management examples. Example 1 - Asset Sensor LED Colors for Disconnected Tags This command syntax sets the LED color for all rack units on the asset sensor #1 to BLACK (that is, 000000) to indicate the absence of a connected asset tag.
Page 444
The following commands set the baud rate (bps) of the serial port labeled CONSOLE / MODEM on the EMX device. Change the baud rate before connecting it to the desired device, such as a computer, a Raritan's P2CIM-SER, or a modem, through the serial port, or there are communications errors.
Chapter 8: Using the Command Line Interface Option Description forceGsmModem The port enters the GSM modem state. Example The following command sets the CONSOLE baud rate of the EMX device's serial port to 9600 bps. config:# serial consoleBaudRate 9600 Setting the History Buffer Length This command syntax sets the history buffer length, which determines the amount of history commands that can be retained in the buffer.
Chapter 8: Using the Command Line Interface config:# network ipv4 ipAddress 192.168.84.225 subnetMask 255.255.255.0 gateway 192.168.84.0 Results: The IP address is set to 192.168.84.225. The subnet mask is set to 255.255.255.0. The gateway is set to 192.168.84.0. Example 2 - Combination of SSID and PSK Parameters This multi-command syntax configures both SSID and PSK parameters simultaneously for the wireless feature.
Chapter 8: Using the Command Line Interface Switching On an Actuator This command syntax turns on one actuator. control actuator <n> on To quicken the operation, you can add the parameter "/y" to the end of the command, which confirms the operation. control actuator <n>...
Chapter 8: Using the Command Line Interface If you entered the command without "/y", a message appears, prompting you to confirm the operation. Then: Type y to confirm the operation, OR Type n to abort the operation Example - Turning On a Specific Actuator The following command turns on the actuator whose ID number is 8.
Chapter 8: Using the Command Line Interface Restarting the Device This command restarts the EMX device. It is not a factory default reset. To restart the EMX device: 1. Ensure you have entered administrator mode and the # prompt is displayed.
Chapter 8: Using the Command Line Interface Entering Diagnostic Mode Diagnostic commands function in the diagnostic mode only. To enter the diagnostic mode: 1. Enter either of the following modes: Administrator mode: The # prompt is displayed. User mode: The > prompt is displayed. 2.
Page 451
Chapter 8: Using the Command Line Interface Showing Network Connections This command syntax displays network connections and/or status of ports. diag> netstat <option> Variables: <option> is one of the options: ports or connections. Option Description ports Shows TCP/UDP ports. connections Shows network connections.
Chapter 8: Using the Command Line Interface Options Description timeout <number3> Determines the waiting period before timeout. <number3> is an integer number in seconds ranging from 1 to 600. The command looks like the following when it includes all options: diag>...
Chapter 8: Using the Command Line Interface Automatically Completing a Command A CLI command always consists of several words. You can easily enter a command by typing first word(s) or letter(s) and then pressing Tab or Ctrl+i instead of typing the whole command word by word. To have a command completed automatically: 1.
Appendix A Specifications In This Chapter Maximum Ambient Operating Temperature ..........440 EMX2-111 Feature RJ-45 Port Pinouts..........440 EMX2-888 Feature RJ-45 Port Pinouts..........441 Sensor RJ-12 Port Pinouts ..............441 Serial RS-232 Port Pinouts..............441 RS-485 Port Pinouts................442 Maximum Ambient Operating Temperature The maximum ambient operating temperature (TMA) for the EMX is the same for all models regardless of the certification standard (CE or UL).
Appendix A: Specifications EMX2-888 Feature RJ-45 Port Pinouts RJ-45 Pin/signal definition Pin No. Signal Direction Description Output Reserved ― Signal Ground ― Fuse protected Warning: Pin 3 is only intended for use with Raritan devices. Output Transmit Data (Data out)
Appendix A: Specifications RS-232 Pin/signal definition Pin No. Signal Direction Description Input Data Input Receive data (data in) Output Transmit data Output Data terminal ready ― Signal ground Input Data set ready Output Request to send Input Clear to send Input Ring indicator RS-485 Port Pinouts...
Appendix B Configuration or Firmware Upgrade with a USB Drive You can accomplish part or all of the following tasks simultaneously by plugging a USB flash drive which contains one or several special configuration files into the EMX. Configuration changes ...
EMX system requirements: There is at least one USB-A port available on your Raritan device. Your EMX must be version 2.2.13 or later. Note that the EMX interpreted the USB drive contents using the firmware which was running when plugging the USB drive into the EMX, not the new firmware after firmware upgrade.
Page 459
Appendix B: Configuration or Firmware Upgrade with a USB Drive Raritan provides a Mass Deployment Utility, which helps you to quickly generate all configuration files for your EMX. See Creating (on page 452). Configuration Files via Mass Deployment Utility...
EMX. The specified firmware file must be compatible with your EMX and have an official Raritan signature. If the specified firmware file is the same as the current firmware version of your EMX, no firmware upgrade is performed unless you have set the option "force_update"...
Page 461
Appendix B: Configuration or Firmware Upgrade with a USB Drive If this option is set to true, the firmware upgrade is always performed even though your EMX is running the same firmware version as the specified firmware file. This option CANNOT break other constraints like the minimum downgrade version.
Page 462
Appendix B: Configuration or Firmware Upgrade with a USB Drive The EMX utters a short beep when writing the diagnostic data to the USB drive. factory_reset Supported as of release 3.0.0. If this option is set to true, the EMX will be reset to factory defaults. ...
EMX model. You can use Raritan's Mass Deployment Utility to create this file by yourself, or contact Raritan to get a device configuration file specific to your EMX model and firmware version.
Page 464
Appendix B: Configuration or Firmware Upgrade with a USB Drive Special configuration keys: There are 3 special configuration keys that are prefixed with magic:. A special key that sets a user account's password without knowing the firmware's internal encryption/hashing algorithms is implemented as of release 2.2.13.
Appendix B: Configuration or Firmware Upgrade with a USB Drive devices.csv If there are device-specific settings to configure, you must create a device list configuration file - devices.csv, to store unique data of each EMX. This file must be: An excel file in the CSV format.
After entering required information, you can generate all configuration files with only one click, including fwupdate.cfg, config.txt and devices.csv. To use the Mass Deployment Utility: 1. Download the Mass Deployment Utility from the Raritan website. The utility is named mass_deployment-xxx (where xxx is the version number).
6. When the firmware upgrade finishes, the front panel display indicates the firmware upgrade result. =-] (happy smiley): Successful. =-[ (sad smiley): Failed. Check the log file in the USB drive or contact Raritan Technical Support to look into the failure cause.
Steps of using DHCP/TFTP for bulk configuration/upgrade: 1. Create configuration files specific to your EMX models and firmware versions. See (on page 444) or contact Raritan Configuration Files Technical Support to properly prepare some or all of the following files: ...
Note: Supported syntax of "fwupdate.cfg" and "config.txt" may vary based on different firmware versions. If you have existing configuration files, it is suggested to double check with Raritan Technical Support for the correctness of these files prior to using this feature.
Windows Server 2012 system. ® Required Windows IPv4 settings in DHCP: 1. Add a new vendor class for Raritan EMX under IPv4. a. Right-click the IPv4 node in DHCP to select Define Vendor Classes. b. Click Add to add a new vendor class.
Page 471
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP The vendor class is named "Raritan PDU" in this illustration. 2. Define one DHCP standard option - Vendor Class Identifier. a. Right-click the IPv4 node in DHCP to select Set Predefined...
Page 472
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP b. Select DHCP Standard Options in the "Option class" field, and Vendor Class Identifier in the "Option name" field. Leave the String field blank. 3. Add three options to the new vendor class "Raritan PDU" in the same dialog.
Page 473
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP a. Select Raritan PDU in the "Option class" field. b. Click Add to add the first option. Type "pdu-tftp-server" in the Name field, select IP Address as the data type, and type 1 in the...
Page 474
Name field, select String as the data type, and type 3 in the Code field. 4. Create a new policy associated with the "Raritan PDU" vendor class. a. Right-click the Policies node under IPv4 to select New Policy. b. Specify a policy name, and click Next.
Page 475
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP The policy is named "PDU" in this illustration. c. Click Add to add a new condition.
Page 476
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP d. Select the vendor class "Raritan PDU" in the Value field, click Add and then Ok. e. Click Next.
Page 477
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP Select DHCP Standard Options in the "Vendor class" field, select "060 Vendor Class Identifier" from the Available Options list, and type "Raritan PDU 1.0" in the "String value" field.
Page 478
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP g. Select the "Raritan PDU" in the "Vendor class" field, select "001 pdu-tftp-server" from the Available Options list, and type your TFTP server's IPv4 address in the "IP address" field.
Page 479
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP h. Select "002 pdu-update-control-file" from the Available Options list, and type the filename "fwupdate.cfg" in the "String value" field. Select "003 pdu-update-magic" from the Available Options list, and type any string in the "String value" field. This third option/code is the magic cookie to prevent the fwupdate.cfg commands from being executed repeatedly.
For those EMX devices using IPv6 addresses, follow this procedure to configure your DHCP server. The following illustration is based on Microsoft Windows Server 2012 system. ® Required Windows IPv6 settings in DHCP: 1. Add a new vendor class for Raritan EMX under IPv6.
Page 481
Click Add to add a new vendor class. c. Specify a unique name for the vendor class, type "13742" in the "Vendor ID (IANA)" field, and type the binary codes of "Raritan PDU 1.0" in the New Class dialog.
Page 482
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP 2. Add three options to the "Raritan PDU 1.0" vendor class. a. Right-click the IPv6 node in DHCP to select Set Predefined Options.
Page 483
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP b. Select Raritan PDU 1.0 in the "Option class" field. c. Click Add to add the first option. Type "pdu-tftp-server" in the Name field, select IP Address as the data type, and type 1 in the...
Page 484
Click Add to add the third one. Type "pdu-update-magic" in the Name field, select String as the data type, and type 3 in the Code field. 3. Configure server options associated with the "Raritan PDU 1.0" vendor class. a. Right-click the Server Options node under IPv6 to select Configure Options.
Page 485
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP c. Select "Raritan PDU 1.0" in the "Vendor class" field, select "00001 pdu-tftp-server" from the Available Options list, and type your TFTP server's IPv6 address in the "IPv6 address" field.
Page 486
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP d. Select "00002 pdu-update-control-file" from the Available Options list, and type the filename "fwupdate.cfg" in the "String value" field. e. Select "00003 pdu-update-magic" from the Available Options list, and type any string in the "String value" field. This third option/code is the magic cookie to prevent the fwupdate.cfg commands from being executed repeatedly.
Modify the "dhcpd.conf" file for IPv4 settings when your DHCP server is running Linux. Required Linux IPv4 settings in DHCP: 1. Locate and open the "dhcpd.conf" file of the DHCP server. 2. The EMX will provide the following value of the vendor-class-identifier option (option 60). vendor-class-identifier = "Raritan PDU 1.0"...
Page 488
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP Configure the same option in DHCP accordingly. The EMX accepts the configuration or firmware upgrade only when this value in DHCP matches. 3. Set the following three sub-options in the "vendor-encapsulated-options" (option 43). ...
13742 (Raritan's IANA number) Raritan PDU 1.0 15 (the length of the above string "Raritan PDU 1.0") 3. Set the following three sub-options in the "vendor-opts" (option 17). code 1 (pdu-tftp-server) = the TFTP server's IPv6 address...
Page 490
Appendix C: Bulk Configuration or Firmware Upgrade via DHCP/TFTP code 2 (pdu-update-control-file) = the name of the control file "fwupdate.cfg" code 3 (pdu-update-magic) = any string This third option/code is the magic cookie to prevent the fwupdate.cfg commands from being executed repeatedly. It does NOT matter whether the IPv6 magic cookie is identical to or different from the IPv4 magic cookie.
Using the Reset Button An RS-232 serial connection to a computer is required for using the reset button. The following diagrams show the reset button on EMX2-111 and EMX2-888. EMX2-111: EMX2-888: To reset to factory defaults using the reset button: 1.
Appendix D: Resetting to Factory Defaults 3. Press (and release) the Reset button of the EMX device while pressing the Esc key of the keyboard several times in rapid succession. A prompt (=>) should appear after about one second. 4. Type defaults to reset the EMX to its factory defaults. 5.
Page 493
Appendix D: Resetting to Factory Defaults To reset to factory defaults without logging in to the CLI: The EMX provides an easier way to reset the product to factory defaults in the CLI prior to login. 1. Connect to the EMX and launch a terminal emulation program as described in the above procedure.
Appendix E Available SCP Commands You can perform a Secure Copy (SCP) command to update the EMX firmware, do bulk configuration, or back up and restore the configuration. In This Chapter Firmware Update via SCP ..............480 Bulk Configuration via SCP ..............481 Backup and Restore via SCP ..............482 Firmware Update via SCP Same as any EMX firmware update, all user management operations are...
Appendix E: Available SCP Commands SCP command example: scp emx-ecx-030200-42396.bin admin@192.168.87.50:/fwupdate Tip: The PSCP works in a similar way to the SCP so the PSCP syntax is similar. pscp <firmware file> <user name>@<device ip>:/fwupdate Bulk Configuration via SCP Like performing bulk configuration via the web interface, there are two steps with the bulk configuration using the SCP commands: a.
Appendix E: Available SCP Commands 3. The system copies the configuration included in the file "bulk_config.xml" to another EMX, and displays the following message. Starting restore operation. The connection will be closed now. SCP command examples: Save operation's example: scp admin@192.168.87.50:/bulk_config.xml ...
Page 497
Appendix E: Available SCP Commands scp backup_settings.xml <user name>@<device ip>:/settings_restore <user name> is the "admin" or any user profile with the administrator privileges. <device ip> is the IP address of the EMX that you want to update. 2. Type the password when the system prompts you to type it. 3.
Configure LDAP authentication on the EMX device d. Configure roles on the EMX device Important: Raritan disables SSL 3.0 and uses TLS for releases 3.0.4, 3.0.20 and later releases due to published security vulnerabilities in SSL 3.0. Make sure your network infrastructure, such as LDAP and mail services, uses TLS rather than SSL 3.0.
Appendix F: LDAP Configuration Illustration Step B. Configure User Groups on the AD Server You must create the groups (roles) for the EMX on the AD server, and then make appropriate users members of these groups. In this illustration, we assume: ...
Page 500
Appendix F: LDAP Configuration Illustration 3. Add the emxuser and userb accounts to the EMX_Admin group. 4. Verify whether each group comprises correct users.
Appendix F: LDAP Configuration Illustration Step C. Configure LDAP Authentication on the EMX Device You must enable and set up LDAP authentication properly on the EMX device to use external authentication. In the illustration, we assume: The DNS server settings have been configured properly. See (on page 114) and Modifying Network Settings Role of a DNS...
Page 502
Appendix F: LDAP Configuration Illustration Base DN for Search - Type dc=techadssl,dc=com as the starting point where your search begins on the AD server. Login Name Attribute - Ensure the field is set to sAMAccountName because the LDAP server is Microsoft Active Directory.
Appendix F: LDAP Configuration Illustration 5. Click OK. The LDAP server is saved. 6. Click OK. The LDAP authentication is activated. Note: If the EMX clock and the LDAP server clock are out of sync, the installed TLS certificates, if any, may be considered expired. To ensure proper synchronization, administrators should configure the EMX and the LDAP server to use the same NTP server(s).
Page 504
Appendix F: LDAP Configuration Illustration c. Click Add. 6. Click OK. The EMX_User role is created. 7. Keep the Manage Roles dialog opened to create the EMX_Admin role. To create the EMX_Admin role with full permissions assigned: 1. Click New. The Create New Role dialog appears. 2.
Page 505
Appendix F: LDAP Configuration Illustration 3. Type a description for the EMX_Admin role in the Description field. In this example, we type "The role includes all privileges" to describe the role. 4. Click the Privileges tab to select the Administrator permission. The Administrator permission allows users to configure or change all EMX settings.
Page 506
Appendix F: LDAP Configuration Illustration 5. Click OK. The EMX_Admin role is created. 6. Click Close to quit the dialog.
Appendix G Updating the LDAP Schema In This Chapter Returning User Group Information ............493 Setting the Registry to Permit Write Operations to the Schema ...494 Creating a New Attribute ...............494 Adding Attributes to the Class ...............495 Updating the Schema Cache..............497 Editing rciusergroup Attributes for User Members ........497 Returning User Group Information Use the information in this section to return User Group information (and...
Appendix G: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1.
Appendix G: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
Page 510
Appendix G: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
Appendix G: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1.
Page 512
Appendix G: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
Page 513
Appendix G: Updating the LDAP Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
Page 514
Appendix G: Updating the LDAP Schema 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user role (created in the EMX) in the Edit Attribute field. Click OK.
Appendix H RADIUS Configuration Illustration This section provides illustrations for configuring RADIUS authentication. One illustration is based on the Microsoft Network Policy Server (NPS), ® and the other is based on a non-Windows RADIUS server, such as FreeRADIUS. The following steps are required for any RADIUS authentication: 1.
Appendix H: RADIUS Configuration Illustration Step A: Add Your EMX as a RADIUS Client The RADIUS implementation on a EMX follows the standard RADIUS Internet Engineering Task Force (IETF) specification so you must select "RADIUS Standard" as its vendor name when configuring the NPS server.
Page 517
Appendix H: RADIUS Configuration Illustration 2. Right-click NPS (Local), and select Properties. Verify the authentication and accounting port numbers shown in the properties dialog are the same as those specified on your EMX. In this example, they are 1812 and 1813. Then close this dialog.
Page 518
Appendix H: RADIUS Configuration Illustration 3. Under "RADIUS Clients and Servers," right-click RADIUS Client and select New RADIUS Client. The New RADIUS Client dialog appears. 4. Do the following to add your EMX to NPS: a. Verify the "Enable this RADIUS client" checkbox is selected. b.
Appendix H: RADIUS Configuration Illustration Type the shared secret in the "Shared secret" and "Confirm shared secret" fields. The shared secret must be the same as the one specified on your EMX. 5. Click OK. Step B: Configure Connection Request Policies You need to configure the following for connection request policies: a.
Page 520
Appendix H: RADIUS Configuration Illustration b. Connection request forwarding method c. Authentication method(s) d. Standard RADIUS attributes In the following illustration, we assume: Local NPS server is used IP address of your EMX: 192.168.56.29 RADIUS protocol selected on your EMX: CHAP ...
Page 521
Appendix H: RADIUS Configuration Illustration 2. Right-click Connection Request Policies and select New. The New Connection Request Policy dialog appears. 3. Type a descriptive name for identifying this policy in the "Policy name" field.
Page 522
Appendix H: RADIUS Configuration Illustration You can leave the "Type of network access server" field to the default -- Unspecified.
Page 523
Appendix H: RADIUS Configuration Illustration 4. Click Next to show the "Specify Conditions" screen. Click Add. 5. The "Select condition" dialog appears. Click Add.
Page 524
Appendix H: RADIUS Configuration Illustration 6. The NAS IPv4 Address dialog appears. Type the EMX IP address -- 192.168.56.29, and click OK. 7. Click Next in the New Connection Request Policy dialog. 8. Select "Authenticate requests on this server" because a local NPS server is used in this example.
Page 525
Appendix H: RADIUS Configuration Illustration Note: Connection Request Forwarding options must match your environment. 9. When the system prompts you to select the authentication method, select the following two options: Override network policy authentication settings CHAP -- the EMX uses "CHAP" in this example...
Page 526
Appendix H: RADIUS Configuration Illustration Note: If your EMX uses PAP, then select "PAP."...
Page 527
Appendix H: RADIUS Configuration Illustration 10. Select Standard to the left of the dialog and then click Add.
Page 528
Appendix H: RADIUS Configuration Illustration 11. Select Filter-Id from the list of attributes and click Add.
Page 529
Appendix H: RADIUS Configuration Illustration 12. In the Attribute Information dialog, click Add. 13. Select String, type Raritan:G{Admin} in the text box, and then click...
Page 530
Appendix H: RADIUS Configuration Illustration Admin inside the curved brackets {} is the existing role on the EMX. It is recommended to use the Admin role to test this configuration. The role name is case sensitive.
Page 531
Appendix H: RADIUS Configuration Illustration 14. The new attribute is added. Click OK.
Page 532
Appendix H: RADIUS Configuration Illustration 15. Click Next to continue.
Page 533
Appendix H: RADIUS Configuration Illustration 16. A summary showing connection request policy settings is displayed. Click Finish to close the dialog.
Appendix H: RADIUS Configuration Illustration Step C: Configure a Vendor-Specific Attribute You must specify a vendor-specific attribute (VSA) for Raritan on Windows 2008 NPS. Raritan's vendor code is 13742. In the following illustration, we assume: There are three roles available on your EMX: Admin, User, and SystemTester.
Page 535
Type 26 in the "Vendor-assigned attribute number" field. b. Select String in the "Attribute format" field. c. Type Raritan:G{Admin User SystemTester} in the "Attribute value" field. In this example, three roles are specified inside the curved brackets {} -- Admin, User and SystemTester.
Appendix H: RADIUS Configuration Illustration AD-Related Configuration When RADIUS authentication is intended, make sure you also configure the following settings related to Microsoft Active Directory (AD): Register the NPS server in AD Configure remote access permission for users in AD The NPS server is registered in AD only when NPS is configured for the FIRST time and user accounts are created in AD.
Page 537
Appendix H: RADIUS Configuration Illustration 3. Click OK, and then OK again. To grant EMX users remote access permission: 1. Open Active Directory Users and Computers. 2. Open the properties dialog of the user whom you want to grant the access permission.
Page 538
Appendix H: RADIUS Configuration Illustration 3. Click the Dial-in tab and select the "Allow access" checkbox. To enable reversible encryption for CHAP authentication: 1. Open Active Directory Users and Computers. 2. Open the properties dialog of the user that you want to configure.
Non-Windows RADIUS Server For a non-Windows RADIUS server, such as FreeRADIUS, a vendor-specific dictionary file is required. Dictionary File Create a vendor-specific dictionary file for Raritan and add the following information to it. Raritan's vendor code is 13742.
Raritan-Vendor-Specific string END-VENDOR Raritan Note that "string" in the above contents must be replaced by Raritan:G{roles}, where "roles" are one or multiple roles to which the user belongs. For more details, see (on page Format of the "string" 526). Format of the "string"...
Page 541
Appendix H: RADIUS Configuration Illustration Therefore, in Raritan's dictionary file, the attribute line is like the following: ATTRIBUTE Raritan-Vendor-Specific 26 Raritan:G{Admin User SystemTester}...
Ways to Probe Existing User Profiles............539 Truncated Data in the Web Interface ............540 Raritan Training Website ...............540 Connecting Contact Closure Sensors to OLD EMX2-888.....541 Reserving IP Addresses in Windows DHCP Servers The EMX uses its serial number as the client identifier in the DHCP request.
Appendix I: Additional EMX Information Field Description MAC address Enter the ASCII codes of the EMX serial number. Do NOT contain spaces in the ASCII codes. In this example, enter 50454731413030303033 Other fields Configure them according to your needs. Sensor Threshold Settings This section explains the thresholds settings in a threshold setup dialog for a numeric internal or external sensor.
Appendix I: Additional EMX Information Thresholds and Sensor States A numeric sensor has four threshold settings: Lower Critical, Lower Warning, Upper Warning and Upper Critical. The threshold settings determine how many sensor states are available for a certain sensor and the range of each sensor state. The diagram below shows how each threshold relates to each state.
Page 545
Appendix I: Additional EMX Information When a sensor only has the Upper Critical threshold enabled, it has two sensor states: normal and above upper critical. When a sensor has both the Upper Critical and Upper Warning thresholds enabled, it has three sensor states: normal, above upper warning, and above upper critical.
Appendix I: Additional EMX Information "To Assert" and Assertion Timeout If multiple sensor states are available for a specific sensor, the EMX asserts a state for it whenever a bad state change occurs. To assert a state: To assert a state is to announce a "worse" new state. Below are bad state changes that cause the EMX to assert.
Page 547
Appendix I: Additional EMX Information Note: For most sensors, the measurement unit in the "Assertion Timeout" field is sample. Because the EMX measures each sensor every second, timing of a sample is equal to a second. How "Assertion Timeout" is helpful: If you have created an event rule that instructs the EMX to send notifications for assertion events, setting the "Assertion Timeout"...
Appendix I: Additional EMX Information "To De-assert" and Deassertion Hysteresis After the EMX asserts a worse state for a sensor, it may de-assert the same state later on. To de-assert a state: To de-assert a state is to announce the end of the previously asserted worse state.
Page 549
Appendix I: Additional EMX Information This function is similar to a thermostat, which instructs the air conditioner to turn on the cooling system when the temperature exceeds a pre-determined level. "Deassertion Hysteresis" instructs the EMX to de-assert the worse state for a sensor only when that sensor's reading hits the pre-determined "deassertion"...
PDView App for Viewing the EMX Raritan has developed an app that can turn your iOS or Android mobile device into a local display for the EMX. This app is called PDView and it can be downloaded for free.
Page 551
Appendix I: Additional EMX Information 2. After installing the PDView, launch it. Below illustrates the PDView for Android devices. 3. Connect your mobile device to the USB port of the EMX. Your mobile device type determines which USB port on the EMX shall be used to connect the mobile device.
Page 552
Appendix I: Additional EMX Information The PDView shows a "Connected" message when it detects the physical connection to the EMX. 4. Log in to the PDView app at the login prompt. Now you can view limited EMX information or even change some settings. Tip: To skip the final login step, you can click the upper right icon of PDView to save one or multiple user credentials.
Appendix I: Additional EMX Information Altitude Correction Factors If a Raritan differential air pressure sensor is attached to your device, the altitude you enter for the device can serve as an altitude correction factor. That is, the reading of the differential air pressure sensor will be multiplied by the correction factor to get a correct reading.
Use of other interfaces, such as the CLI or SNMP, to view the data in these fields Raritan Training Website Raritan offers free training materials for various Raritan products on the http://www.raritantraining.com. The Raritan Raritan training website products introduced on this website include the intelligent PDU, dcTrack ®...
Follow the steps below to connect Raritan's or third-party contact closure detectors/switches to the termination points labeled CONTACT SENSOR if your EMX is the old EMX2-888 with a built-in spring-loaded terminal module. It is not guaranteed that all third-party detectors/switches are compatible with the EMX.
Page 556
Appendix I: Additional EMX Information 4. Release the tiny rectangular buttons after inserting the wires properly. 5. Verify that these wires are firmly fastened. 6. By default, the open status of the detector/switch is considered normal. To set the "normal" setting to "closed" , press down the corresponding button adjacent to the termination points.
PX3 PDUs PX3TS transfer switches For information on setting up asset sensors to work with each product, refer to its User Guide or Online Help on the Raritan website's Support (http://www.raritan.com/support/). page Asset Management Sensors and dcTrack If any asset sensors are connected to the EMX, the EMX can transmit their information to Sunbird's dcTrack.
Page 558
Appendix J: Integrating Asset Management Sensors with Other Products Each IT item connected to the asset sensor via an asset tag must exist in dcTrack. You do not need to manually enter the asset tag IDs for IT items that already exist in dcTrack as long as these items are in the Installed status.
Changing the Sensor Description • 410 Asset Management Sensors and dcTrack • Changing the Sensor Name • 408 Changing the SSH Configuration • 360 Asset Management Sensors and Raritan Changing the SSH Port • 360 PDUs • 544 Changing the Telnet Configuration • 359 Asset Sensor Information •...
Page 560
Configuration or Firmware Upgrade with a Connecting Contact Closure Sensors to OLD USB Drive • xiv, 21, 287, 443, 453, 454 EMX2-888 • xiv, 3, 76, 77, 542 Configuring a Specific Rack Unit • 261 Connecting Environmental Sensor Packages •...
Page 561
Determining How to Display Tree Items • 94, EMX2-888 • 3 EMX2-888 Connection • xii, 31 Determining the SSH Authentication Method • EMX2-888 Contact Closure Sensor LEDs • xiii, xiv, 361 Determining the Time Setup Method • 365, EMX2-888 Contact Closure Sensor Termination •...
Page 562
Index Enabling or Disabling SSH • 360 Example 1 - Combination of IP, Subnet Mask Enabling or Disabling Strong Passwords • 380 and Gateway Parameters • 431 Enabling or Disabling Telnet • 359 Example 1 - Creating a User Profile • 401 Enabling or Disabling the Read-Only Mode •...
Page 563
Index Logging out of CLI • 439 Login • xiii, 10, 12, 84, 150 Login Limitation • 377 Gathering the External Authentication Logout • 87 Information • 178 Lowercase Character Requirement • 380 Gathering the LDAP Information • 179 Gathering the RADIUS Information • 179 MAC Address •...
Page 564
Naming the EMX • 91, 92, 94, 96, 110, 143, RADIUS Configuration Illustration • xiv, 183, 148, 247, 257 Network Configuration • 316 Raritan Training Website • 541 Network Configuration Commands • 341 Rebooting the EMX • 295 Network Diagnostics • 293 Record Snapshots to Webcam Storage •...
Page 565
Index Sample Event Rules • 226 Setting the Automatic Daylight Savings Time • Sample Sensor-Level Event Rule • 227 Sample User-Activity-Level Event Rule • 228 Setting the Baud Rates • xiv, 430 Saving Snapshots • 264, 268, 270 Setting the BSSID • 348 Saving the EMX Configuration •...
Index Setting Up Your Preferred Measurement Units Supported Maximum DPX Sensor Distances • • 131, 152, 153 41, 45 Setting Wireless Parameters • 343 Supported Web Browsers • xiii, 83 Setup Button • 96 Supported Wireless LAN Configuration • 15 Showing Information •...
Page 567
Index Using an Optional DPX-ENVHUB4 Sensor Hub • 42 Using an X Cable • 30, 37 Using Default Thresholds • 411 Using SNMP • 292, 298 Using the CLI Command • 435, 478 Using the Command Line Interface • 120, 248, 309, 478 Using the EMX •...
For CommandCenter Secure Gateway: Press 6, then Press 2 Phone: +31-10-2844040 Fax: 732-764-8887 Email: tech.europe@raritan.com Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m. GMT China Phone +44(0)20-7090-1390...
Need help?
Do you have a question about the EMX2-888 and is the answer not in the manual?
Questions and answers