Home
APC NetBotz 200
Contents
1. Firmware Upgrades Overview When you upgrade Main Module firmware any Expansion Modules are automatically updated If your network includes more than on Main Module you must perform the upgrade on all Main Modules Valid data is not available during the upgrade Q Never use the tool for one APC product to upgrade firmware of another How to Upgrade a Single Main Module Upgrading your Main Module requires you to transfer the latest firmware obtained from the APC Web site to your Main Module To upgrade the firmware of one Main Module use one of the following methods For a Main Module that is on your network From a networked computer running a Microsoft Windows operating system use the firmware upgrade tool included as part of the download from the APC Web site See Firmware upgrade tool From a networked computer on any supported operating system use FTP FTP or SCP Secure CoPy SCP e For a Main Module that is not on your network use XMODEM with a serial connection Secure CoPy SCP Wu o oc L N gt N Ses O am O a S 4 am N n e M Eae e3 Z Firmware upgrade tool FTP 1 Download the latest firmware release for your NetBotz Rack Monitor 200 NBRK0200 from www apc com tools download Make a note of the IP address of the Main Module To view the IP address from the Administration tab click Network then TCP IP Create a dir
2. SNMP traps Syslog notification To set up other types of active notification not included in the Event Action options see Beacon page and Relay Output page e Indirect notification through the event log Users must check the log to determine which events have occurred Other methods of indirect notification not included in the Event Action options are informational queries See Serial Modbus Administration gt General gt Serial Modbus to configure and use the request response structure of Modbus See SNMP for SNMP access types that enable an NMS to perform informational queries For SNMPv1 configuring the most restrictive SNMP access type READ enables informational queries without the risk of allowing remote configuration changes You can also log system performance data to use for device monitoring See Data log Logs gt Data gt options for information on how to configure and use this data logging option Configuring event actions Notification Parameters For events that have an associated clearing event you can also set the following parameters as you configure events individually or by group as described in the next two sections To access the parameters click the receiver or recipient name Parameter Description Delay x time before sending If the event persists for the specified time notification is sent If the condition clears before the time expires no notification is sent Repeat a
3. Minimum Temperature Threshold Set the minimum temperature threshold for this sensor If the temperature drops below this threshold an alarm occurs Low Temperature Threshold Set the low temperature threshold for this sensor If the temperature drops below this threshold an alarm occurs This threshold must be greater than Minimum Temperature Threshold High Temperature Threshold Set the high temperature threshold for this sensor If the temperature rises above this threshold an alarm occurs This threshold must be greater than the sum of Low Temperature Threshold and Temperature Threshold Hysteresis Maximum Temperature Threshold Set the maximum temperature threshold for this sensor If the temperature rises above this threshold an alarm occurs This threshold must be greater than High Temperature Threshold Temperature Threshold Hysteresis The difference between the temperature threshold violation and the clearing point Increasing this value prevents frequent alarms if temperature wavers slightly above and below the threshold before corrective actions restore the temperature to the clearing point Minimum Humidity Threshold Set the minimum humidity threshold for this sensor If the humidity drops below this threshold an alarm occurs Low Humidity Threshold Set the low humidity threshold for this sensor If the humidity drops below this threshold an alarm occurs This threshold must be high
4. Use the Module Identification option to view the model number serial number and hardware version of each Main Module or Expansion Module and the version of firmware it is running Configure the name and location of the device and for an Expansion Module cause the identification LED to blink Network menu Use the Network menu to complete the following tasks e Configure the TCP IP settings for the Main Module e Use the Ping utility available only through the control console e Define settings that affect the DNS FTP Telnet SSH Web interface SSL SNMPv1 SNMPv38 e mail Modbus and Syslog features of the Main Module System menu Use the System menu to complete the following tasks e Control Administrator and Device Manager access You cannot control Read Only User access through the control console e Define the system Name Contact and Location values e Set the Date and Time used by the Rack Monitor 200 e Through the Tools menu Restart the Main Module interface Reset parameters to their default values Delete SSH host keys and SSL certificates Upload an initialization file Transfer files e Through the RADIUS menu Define access primary and secondary servers and primary and secondary server secrets Set Timeout in seconds e Access system information about the Main Module Web Interface Introduction Overview The Web interface provides options to manage the Main Mod
5. N Saws O am O S 4 am N e O aa g c3 lt 119
6. Use FTP or SCP to upgrade multiple Main Modules To upgrade multiple Main Modules using an FTP client or using SCP write a script which automatically performs the procedure N O c O aw S 4 am N ai O an a za 106 How to Verify an Upgrade Verify the success or failure of the transfer To verify whether a firmware upgrade succeeded use the Network menu in the control console and select the FTP Server option to view the Last Transfer Result field or use an SNMP GET to the mfiletransferStatusLastTransferResult OID Last Transfer Result codes Code Description Successful The file transfer was successful Result not available There are no recorded file transfers Failure unknown The last file transfer failed for an unknown reason Server inaccessible The TFTP or FTP server could not be found on the network Server access denied The TFTP or FTP server denied access File not found The TFTP or FTP server could not locate the requested file File type unknown The file was downloaded but the contents were not recognized File corrupt The file was downloaded but at least one Cyclical Redundancy Check CRC failed Verify the version numbers of installed firmware Use the Web interface to verify the versions of the upgraded firmware modules by selecting the Administration tab General on the top menu bar and About on the left
7. e Critical Critical conditions Error Error conditions e Warning Warning conditions e Notice Normal but significant conditions Informational Informational messages Debug Debug level messages Following are the default settings for the Local Priority settings e Critical is mapped to Critical Warning is mapped to Warning e Informational is mapped to Info NOTE To disable Syslog messages see Configuring event actions N O O x O am N aid O Mm pa lt Syslog Test and Format Example Logs gt Syslog gt test Send a test message to the Syslog servers configured through the servers option 1 Select a severity to assign to the test message 2 Define the test message according to the required message fields The priority PRI The Syslog priority assigned to the message s event and the facility code of messages sent by the Main Module The Header A time stamp and the IP address of the Main Module The message MSG part The TAG field followed by a colon and space identifies the event type The CONTENT field is the event text followed optionally by a space and the event code For example APC Test Syslog is valid 75 Indirect Notification through Logs or Queries Event log Logs gt Events gt options Displaying and using the event log Logs gt Events gt log View or delete the event log By default the log displays all events recorded during
8. Do you have one or more Temperature Sensors with Digital Display AP9520T or Temperature Humidity Sensors with Digital Display AP9520TH connected to your Yes Older sensors with older firmware can cause Err to appear 1 To identify any older sensors e Check the serial number The serial number for older units will be less than ZA0635011 442 e Remove then reapply power by disconnecting then connecting the cable to the sensor in port Note whether the firmware version number appears during the start up sequence Older units will not display the software version number If v 1 2 3 or higher appears the sensor is running the new firmware and should work with your system 2 Remove any old sensors from your system The problem should be resolved when all older sensors with a digital display are removed from your system 3 Contact APC Worldwide Customer Support for further assistance For the older sensors be sure to have the model number and serial number available Sensors Connected but Software Interface Shows 0 Connected This problem can occur if you have one or more older remote sensors Temperature Sensors with Digital Display AP9520T or Temperature Humidity Sensors with Digital Display AP9520TH connected to your system If you have one or more remote sensors connected to your system follow the troubleshooting procedure under Software Interface Shows Err on page 29 to determine if you have an
9. Administration gt Security gt Remote Users gt RADIUS 47 Configuring the RADIUS Server 0200e cece eee eee 48 Summary of the configuration procedure 48 Configuring a RADIUS server on UNIX with shadow passwords 49 Supported RADIUS servers 49 Inactivity Timeout Administration gt Security gt Auto Log Off 49 Administration Network Features 50 TCP IP and Communication Settings 222 002eeeeeeee 50 TCP IP settings Administration gt Network gt TCP IP 50 DHCP response options 52 Port Speed Administration gt Network gt Port Speed 54 DNS Administration gt Network gt DNS gt options 00000008 55 Web Administration gt Network gt Web gt options 2 00200005 57 Console Administration gt Network gt Console gt options 59 SNMP ct het SEDER eed Dd Meow he eee ae 61 SNMPv1 Administration gt Network gt SNMPv1 gt options 61 SNMPv3 Administration gt Network gt SNMPv3 gt options 63 FTP Server Administration gt Network gt FTP Server 2055 65 Related topics sss e ce nets nda gene ewe wae eee eee 65 Administration Notification amp Logging 66 Event Actions Administration gt Notification gt Event Actions gt options 66 Types of notification 66 Configuring event actions 67 Active Automatic Direct Notification 0000 ee ueaeae 69 E mail notification 69 SNMP Traps 72 SNMP Trap Test Administration gt Notification gt SNMP Traps gt test 73 Syslog Logs gt Syslo
10. Show All e Events that you do not select from the Filter By Severity list never display in the filtered event log even if the event occurs in a category you selected from the Filter by Category list e Events that you do not select from the Filter by Category list never display in the filtered event log even if devices in the category enter an alarm state you selected from the Filter by Severity list e Deleting the event log To delete all events recorded in the log click Clear Event Log on the Web page that displays the log Deleted events cannot be retrieved Events are processed through the filter using OR logic To disable the logging of events based on their assigned severity level or their event category see Configuring by group For lists of all configurable events and their current configuration select the Administration tab Notification on the top menu bar and by event under Event Actions on the left navigation menu See Configuring by event Reverse Lookup Logs gt Events gt reverse lookup Reverse lookup is disabled by default Enable this feature unless you have no DNS server configured or have poor network performance because of heavy network traffic With reverse lookup enabled when a network related event occurs both the IP address and the domain name for the networked device associated with the event are logged in the event log If no domain name entry exists for the device only its IP address is l
11. TCP IP settings 91 System requirements 91 Installation 91 WSO the WAZA oa ca said Ge ik wl ec andy ae ow tar ae Launch the Wizard 92 Configure the basic TCP IP settings remotely 92 Configure or reconfigure the TCP IP settings locally 94 Exporting Configuration Settings 95 Retrieving and Exporting the ini File 2000 ee eee Summary of the procedure 95 Contents of the ini file 95 Detailed procedures 96 The Upload Event and Error Messages 25000008 The event and its error messages 99 Messages in config ini 100 Errors generated by overridden values 100 Related Topics iss ia sian die wa ee oe oe eee de cee eioe we ae Firmware Upgrades 101 OVENIEW ro 3000000200 5524 CHR RR De Or etin ta a eae How to Upgrade a Single Main Module 2 5000055 Firmware upgrade tool 102 FIP 102 Secure CoPy SCP 104 XMODEM 105 How to Upgrade Multiple Main Modules 5 How to Verify an Upgrade ociscciccawiiceiwiweeeevedeus Verify the success or failure of the transfer 107 Last Transfer Result codes 107 Verify the version numbers of installed firmware 107 N B O s c O a Q 4 oO N aaa O an ind Q Product Information 108 Two Year Factory Warranty 02 00 eee eee eee eee 108 Terms of warranty 108 Non transferable warranty 108 Exclusions 109 Warranty claims 110 Life Support Polley coir ve tandawioew eek teak Cena ows 111 General policy 111 Examples
12. alarm will occur if the temperature increases at a rate that is greater than the rate you have set Long term Decreasing Temperature Rate of Change Set the maximum long term decrease in temperature that you want your system to allow An alarm will occur if the temperature decreases at a rate that is greater than the rate you have set To configure all sensors or a defined group Follow this procedure to mass configure all sensors or a defined group of sensors You can mass configure temperature and humidity thresholds rate of change settings the alarm generation setting and the name and location When mass configuring Name and Location fields you can use wildcards so the system creates unique names and locations based on automatically detected data about the module to which the sensor is connected 1 Use filter settings to display the group of sensors to mass configure For information on setting filters see Tables 2 Click Mass Configuration Make selections then click Next Wu an TT N D N O c O a S 4 am N e M a o3 za 3 Enter data in fields If you chose Name or Location include wildcard characters change to your system upon which a wildcard character was based for If wildcards are used during a mass configuration and then you make a example redefining the module location you will have to repeat the mass configuration for the
13. and modify its parameters RADIUS Setting Definition RADIUS Server The server name or IP address of the RADIUS server NOTE RADIUS servers use port 1812 by default to authenticate users To use a different port add a colon followed by the new port number to the end of the RADIUS server name or IP address Secret The shared secret between the RADIUS server and the Main Module Timeout The time in seconds that the Main Module waits for a response from the RADIUS server Test Settings Enter the Administrator user name and password to test the RADIUS server path that you have configured Skip Test and Apply Do not test the RADIUS server path Switch Server Priority Change which RADIUS server will authenticate users if two configured servers are listed and RADIUS then Local Authentication or RADIUS Only is the enabled authentication method Configuring the RADIUS Server Summary of the configuration procedure You must configure your RADIUS server to work with the Main Module For examples of the RADIUS users file with Vendor Specific Attributes VSAs and an example of an entry in the dictionary file on the RADIUS server see the APC Security Handbook 1 Add the IP address of the Main Module to the RADIUS server client list file To use a different port add a colon followed by the new port OQ RADIUS servers use port 1812 by default to authenticate users number t
14. connection from a serial port of your computer to a Network Management Card or device to configure or reconfigure it System requirements The Wizard runs on computers with Microsoft Windows 2000 Windows Server 2003 or Windows XP operating systems Installation To install the Wizard from the NetBotz Rack Monitor 200 Utility CD 1 If autorun is enabled the user interface of the CD starts when you insert the CD Otherwise open the file contents htm on the CD 2 Click Device IP Configuration Wizard and follow the instructions To install the Wizard from a downloaded executable file 1 Go to www apc tools download 2 Download the Device IP Configuration Wizard 3 Run the executable file in the folder to which you downloaded it Use the Wizard Most software firewalls must be temporarily disabled for the Wizard to discover unconfigured Network Management Cards or devices Launch the Wizard The installation creates a shortcut link in the Start menu to launch the Wizard Configure the basic TCP IP settings remotely Prepare to configure the settings Before you run the Wizard 1 Contact your network administrator to obtain valid TCP IP settings 2 If you are configuring multiple unconfigured Network Management Cards or network enabled devices obtain the MAC address of each one to identify it when the Wizard discovers it The Wizard displays the MAC address on the screen on which you then enter the TCP IP settings e F
15. details see TCP IP settings Administration gt Network gt TCP IP Resets all event actions to their default configuration which includes logging for all events and for some events includes e mail notification For events with default e mail notification the notification settings include all recipients added to the system For details on event configuration see Configuring event actions Clears a lost communication or device disconnected alarm caused when communication is lost to a device for example when you intentionally remove a device from the system For troubleshooting details on this alarm see Device Disconnected or Lost Comm Alarms Clears an alarm caused when a temperature rate of change is exceeded For details on rate of change settings see Temperature amp Humidity page Configuring Links Administration gt General gt Quick Links Select the Administration tab the General option on the top menu bar and the Quick Links option on the left navigation menu to view the three URL links displayed at the bottom left of each page of the interface By default these links access the following Web pages e APC s Web Site The APC home page e Testdrive Demo A demonstration page where you can use samples of APC Web enabled products e APC Monitoring The home page of the APC Remote Monitoring Service To reconfigure a link click that link in the Display column and change any of the following e Displ
16. displayed in the TH Sensors table for the Main Module details even if they are connected to an A Link port of an Expansion Module To change a module name or location Click the module name The system automatically detects all modules and displays them in the Web interface with default names shown in the table below Change the Name and Location then click Apply Type of module Default Name Main Module MM Expansion Exp XX where XX Identifier Module To blink the identifier number LED on an Expansion Module Click the module name Set the length of time for which you want the LED to blink Select the Blink Identifier checkbox and then click Apply To configure a device connected to the module Click the module name Then click the sensor or output to configure Another page appears where you can configure the device For further assistance go to Temperature amp Humidity page Dry Contact Inputs page Beacon page Relay Output page or Switched Outlet page Alarm Status page Use the Alarm Status page to view all active alarms for temperature and humidity sensors dry contact sensors a beacon the relay output and the switched outlet For each category an icon reports the status e The Normal icon if no alarms exist e One or both of the other icons Critical and Warning if any alarms exist and after each icon the number of active alarms of that severity If communication is lost to a device or if a
17. generation dry contact sensors 40 e mail to a recipient 71 encryption algorithms for SSH 59 reverse lookup 77 Telnet 59 use of aproxy server 17 Web interface 57 DNS define host and domain names 55 query types 56 specify DNS servers by IP address 55 Dry Contact Inputs configure 40 Dry Contact Inputs page 40 E E mail configure notification parameters 69 configure recipients 71 for paging 71 test message 71 Enable access to FTP server 65 alarm generation digital sensors 40 alarm generation dry contact sensors 40 e mail forwarding to external SMTP servers 71 e mailto arecipient 71 encryption algorithms for SSH 59 JavaScript for Web browser 17 reverse lookup 77 Telnet 59 versions of SSH 59 Web interface 57 Encryption algorithms SSH 59 Error messages See also Alarms 0 connected 30 for Web access attempts 19 from overridden values in ini file 100 Ethernet port speed 54 Event actions 66 configure by event 67 configure by group 68 Event log access from control console 13 display and use 76 errors from overridden values in ini file 100 use FTP del command 84 use FTP or SCP to retrieve 82 event ixt file contents 82 import into spreadsheet 82 Expansion Module 2 F Facility Code Syslog setting 74 Factory information 90 File transfers See Firmware Firmware benefits of upgrading 101 file transfer methods firmware upgrade tool 102 FTP orSCP 102 obtain the latest version 102 104 105 APC
18. it was not delayed and that it was not copied and sent again later at an inappropriate time Privacy Passphrase A phrase of 15 to 32 ASCII characters ape crypt passphrase by default that ensures the privacy of the data by means of encryption that an NMS is sending to this device or receiving from this device through SNMPv3 Authentication Protocol The APC implementation of SNMPv3 supports MD5 authentication Authentication will not occur unless MD5 is selected as the authentication protocol Privacy Protocol The APC implementation of SNMPv3 supports DES as the protocol for encrypting and decrypting data Privacy of transmitted data requires that DES is selected as the privacy protocol Note You cannot select the privacy protocol if no authentication protocol is selected Option Description access control You can configure up to four access control entries to specify which NMSs have access to this device The opening page for access control by default assigns one entry to each of the four user profiles but you can edit these settings to apply more than one entry to any user profile to grant access by several specific IP addresses host names or IP address masks e If you leave the default access control entry unchanged for a user profile all NMSs that use that profile have access to this device If you configure multiple access entries for one user profile the limit of four entries requires t
19. of life support devices 111 Index 112 vi Introduction Product Description The American Power Conversion APC NetBotz Rack Monitor 200 software interface provides the information you need to monitor and control your environment Depending on the protocol you use to access the Rack Monitor 200 one of two software interfaces opens the control console or the Web interface Each software interface allows you to configure your system monitor the physical environment view logs and graphs and perform administration tasks such as set up users and user notifications Document Overview This document provides complete details on how to use the NetBotz Rack Monitor 200 software interface Additional Documentation Unless otherwise noted the following documentation is available on the CD provided with the appliance or on the applicable product page on the APC Web site www apc com To quickly find a product page enter the product name or part number in the Search field NetBotz Rack Monitor 200 Installation and Quick Configuration Manual includes a physical description system installation procedures configuration instructions access instructions specifications warranty and life support details for the NetBotz Rack Monitor 200 NBRK0200 NetBotz Rack Sensor Pod 150 Installation Manual includes a physical description installation procedures configuration instructions specifications warranty and life support detail
20. older sensor If you do not have any remote sensors connected to your system contact APC Worldwide Customer Support for further assistance Wu o oc L N gt N Ses O am O a S 4 am N n e M Eae e3 Z Operation and Monitoring Commonly Performed Tasks This chapter describes the Home Sensors and Outputs tabs of the Web interface From these tabs you perform most of your daily tasks involving monitoring the system Through these tabs you also access configuration pages for modules and sensors To configure a module see Module View page To configure a sensor see Temperature amp Humidity page or Dry Contact Inputs page Home Tab Overview page The Overview page appears at initial login Use the Overview page to view system status To change the page that displays at login see System Preferences Administration gt General gt Preferences The Overview page displays the number of devices connected to the system the ten most recent active alarms and the five most recent device events in reverse chronological order Normally the top half of this page includes five regions titled Temperature amp Humidity Sensors Dry Contact Input Sensors Beacon Relay Output and Switched Outlet However if a hardware alarm occurs for a module or if an A Link Power Overload Alarm occurs another region will appear displaying the alarm details If communication
21. temperature sensor s rate of change is exceeded in addition to an alarm a Reset Alarms link will appear To clear a device disconnected lost comm or rate of change alarm Click the Reset Alarms link if for example you intentionally disconnected a sensor or you want to acknowledge a rate of change The Administration tab s General page appears where you can reset the alarm For additional details on how to clear the alarm see How to Reboot Reset Settings and Clear Alarms Administration gt General gt Reset Reboot If you have a Sensor Disconnected alarm and did not intentionally disconnect a sensor see Device Disconnected or Lost Comm Alarms for troubleshooting details Normally the top half of this page includes five regions titled Temperature amp Humidity Sensors Dry Contact Input Sensors Beacon Relay Output and Switched Outlet However if a hardware alarm occurs for a module or if an A Link Power Overload Alarm occurs another region will appear displaying the alarm details Sensors Tab Temperature amp Humidity page Use the Temperature amp Humidity page to view current readings for all temperature and humidity sensors connected to the system and to configure sensors To change readings to Celsius or to Fahrenheit Click the thermometer icon in the upper right corner of the table To permanently change the temperature units see Changing the default temperature scale You perform the followi
22. the communication speed of the TCP IP port e For Auto negotiation the default Ethernet devices negotiate to transmit at the highest possible speed but if the supported speeds of two devices are unmatched the slower speed is used e Alternatively you can choose either 10 Mbps or 100 Mbps each with the option of half duplex for communication in only one direction at a time or full duplex for communication simultaneously in both directions on the same channel Arc Arc DNS Administration gt Network gt DNS gt options Use the options under DNS on the left navigation menu to configure and test the Domain Name System DNS Servers Select servers to specify the IP addresses of the primary and optional secondary DNS server For the Main Module to send e mail at least the IP address of the primary DNS server must be defined The Main Module waits up to 15 seconds for a response from the primary DNS server or the secondary DNS server if a secondary DNS server is specified If the Main Module does not receive a response within that time e mail cannot be sent Therefore use DNS servers on the same segment as the Main Module or on a nearby segment but not across a wide area network WAN To verify that DNS is working correctly after you define the IP addresses of the DNS servers see Test Naming Select naming to define the Main Module host name and domain name e Host Name After you configure a host name here and a d
23. the last two days in reverse chronological order Displaying the event log You can view the event log as a page of the Web interface the default view or to see more of the listed events without scrolling click Launch Log in New Window from that page to display a full screen view of the log In your browser s options JavaScript must be enabled for you to use the Launch Log in New Window button You can also use FTP or Secure CoPy SCP to view the event log See Using FTP or SCP to retrieve log files Filtering the log by date or time To display the entire event log or to change the number of days or weeks for which the log displays the most recent events select Last Select a time range from the drop down menu then click Apply The filter configuration is saved until the device restarts To display events logged during a specific time range select From Specify the beginning and ending times using the 24 hour clock format and dates for which to display events then click Apply The filter configuration is saved until the device restarts Filtering the log by event To specify the events that display in the log click Filter Log Clear the checkbox of an event category or alarm severity level to remove it from view Text at the upper right corner of the event log page indicates that a filter is active The filter is active until you clear it or the device restarts To remove an active filter click Filter Log then Clear Filter
24. time e Disabled No GETS or SETS at any time SNMPv3 Administration gt Network gt SNMPv3 gt options For SNMP GETs SETs and trap receivers SNMPvs uses a system of user profiles to identify users An SNMPv3 user must have a user profile assigned in the MIB software program to perform GETs and SETs browse the MIB and receive traps To use SNMPv3 you must have a MIB program that supports SNMPvs3 The Main Module supports only MD5 authentication and DES encryption Option Description access SNMPv3 Access Enables SNMPv3 as a method of communication with this device user By default lists the settings of four user profiles configured with the user names apc profiles snmp profile1 through apc snmp profile4 and no authentication and no privacy no encryption To edit the following settings for a user profile click a user name in the list User Name The identifier of the user profile SNMPv3 maps GETs SETs and traps to a user profile by matching the user name of the profile to the user name in the data packet being transmitted A user name can have up to 32 ASCII characters Authentication Passphrase A phrase of 15 to 32 ASCII characters apc auth passphrase by default that verifies that the NMS communicating with this device through SNMPv3 is the NMS it claims to be that the message has not been changed during transmission and that the message was communicated in a timely manner indicating that
25. transferred over the network as plain text If your network requires the high security of encryption disable SNMP access or set the access for each community to Read A community with Read access can receive status information and use SNMP traps When using InfraStruXure Manager to manage the Main Module on the public network of an InfraStruXure system you must have SNMP enabled in the Main Module interface Read access will allow InfraStruXure Manager to receive traps from a Main Module but Write access is required while you use the interface of the Main Module to set InfraStruXure Manager as a trap receiver For detailed information on enhancing and managing the security of your system see the Security Handbook available on the NetBotz Rack Monitor 200 Utility CD or from the APC Web site www apc com Option Description access Enable SNMPv1 Access Enables SNMP version 1 as a method of communication with this device access You can configure up to four access control entries to specify which Network control Management Systems NMSs have access to this device The opening page for access control by default assigns one entry to each of the four available SNMPv1 communities but you can edit these settings to apply more than one entry to any community to grant access by several specific IP addresses host names or IP address masks To edit the access control settings for a community click its communit
26. upgrade multiple Main Modules 106 verify upgrade 107 versions displayed control console 11 versions displayed Web interface 90 firmware upgrade tool 102 From Address SMTP setting 70 FTP server settings 65 transfer firmware files 102 use to retrieve event or data log 82 G Graph logged data 79 H Hardware alarms 24 information 90 Help control console 13 Web interface 21 Home tab 31 Host keys add or replace 60 status 60 Host name of trap receivers 72 Identification fields on main screen 11 Inactivity timeout 49 ini files See User configuration files Inputs 40 J JavaScript enable for Web browser 17 required to launch log in new window 76 K Keywords in user configuration file 95 L Last Transfer Result codes 107 Launch Log in New Window JavaScript requirement 76 Life support policy 111 Local SMTP Server define by IP address or DNS name 70 recommended option for routing e mail 71 Local Users set user access 45 Location system value 85 Log on control console 8 DNS Name or IP address matched to common name 18 error messages for Web interface 19 Web interface 17 18 Login date and time in control console 11 Loopback address not allowed as default gateway 4 Lost Comm alarm 26 Main Module 2 Main screen 10 information and status fields 11 Menus control console 14 General 85 Logs 66 Network 50 Security 45 Message Generation Syslog setting 74 APC MIB II Identification variables 85 M
27. uploads of data to the file Maximum Retries The maximum number of times the upload will be attempted after initial failure Failure Wait Time How long in minutes before an attempt to upload data times out 81 Using FTP or SCP to retrieve log files An Administrator or Device User can use FTP or SCP to retrieve a tab delineated event log file event txt or data log file data txt and import it into a spreadsheet The file reports all of the events or data recorded since the log was last deleted or for the data log truncated because it reached maximum size The file includes information that the event log or data log does not display The version of the file format first field The date and time the file was retrieved The Name Contact and Location values and IP address of the Main Module The unique Event Code for each recorded event event txt file only need to select a four digit date format in your spreadsheet Q The Main Module uses a four digit year for log entries You may application to display all four digits of the year If you are using the encryption based security protocols for your system use Secure CoPy SCP to retrieve the log file If you are using unencrypted authentication methods for the security of your system use FTP to retrieve the log file See the Security Handbook available on the NetBotz Rack Monitor 200 Utility CD and on the APC Web site www apc com f
28. your Rack Monitor 200 and is also available on the APC Web site WWW apc com N Ses O am O a S 4 am N n e M Eae e3 Z Wu o oc L N gt does not resolve the problem contact APC Worldwide Customer OQ If at any time you need assistance or if performing these steps Support for further assistance 1 Make sure your system setup does not exceed the number of allowable devices that can be cascaded from the A Link ports 2 Make sure all cables for devices connected to A Link ports are connected correctly 3 Disconnect cables from one or both A Link ports of the Rack Monitor 200 as applicable e If the alarm remains a hardware problem exists with the Rack Monitor 200 e If the alarm cleared reconnect cables to the A Link ports and continue this procedure 4 To find the device with the hardware problem a Remove the A Link terminator from the last device on the A Link chain b Disconnect the cable from the A Link out port of the second to last device and install in its place the A Link terminator you removed If the alarm cleared the device that you disconnected has a hardware problem c If the error did not clear remove the A Link terminator and repeat step a and step b shortening the chain by one more device until all devices have been tested Device Disconnected or Lost Comm Alarms This section applies to the following devices and device alarms Devic
29. 18 URL address formats 19 OVENVIEW Page idccie ce anaana eean Overview 20 Quick status icons 20 Recent Device Events 21 Help 21 How to Use the Tabs Menus Tables and Links Tabs 21 Menus 22 Tables 22 Quick Links 23 How to Troubleshoot 24 Overview esic ide da eine he See ae oe ede Shere Se ee eee A Link Power Overload Alarm 0 000 c eee e eee e eee Device Disconnected or Lost Comm Alarms 2 0000085 Software Interface Shows Err 2 000 c eee es Sensors Connected but Software Interface Shows 0 Connected Operation and Monitoring 31 Commonly Performed Tasks 0200 e eect eee ee eee eee HOME Tab sais nea einai ae Wo ein ae Oars eee Gana aati ae Overview page 31 System View page 32 Module View page 33 Alarm Status page 35 Sensors Taba cians ce est Se so ewdneeeenn eee Sean cece aa we Temperature amp Humidity page 36 Dry Contact Inputs page 40 N Saws O ie O a Q 4 am N E O aa g c3 Outputs Tab ccce cscs vesarsecacacuweters den dacd coe aa ee 42 Beacon page 42 Relay Output page 43 Switched Outlet page 44 Administration Security 45 Local USTs cyccicds tn oe Seas odd ee oe Se ena 45 Setting user access Administration gt Security gt Local Users gt options 45 Remote USerS ciciscviws eee ne coda dace nee eee eee ees DE 46 Authentication Administration gt Security gt Remote Users gt Authentication 46 RADIUS
30. Contents Introduction 1 Product DeScription is sickens c ed ee cdkede denne aes ine me 1 Document Overview 26 6606 ssc c cee eee eee ee eee eve eee ees 1 Additional Documentation 000 cee eee es 1 TEMMNOOGY isos oe cee a eK eee eh Se Cee ew eRe 2 ACCESS Proc dures cciccccictees animan siaaa ears adele i 3 Overview 3 Initial setup 4 Access priority for logging on 4 Types of user accounts 5 Recovering From a Lost Password 0000 cee ee eeeeenes 6 Watchdog Features s6610 cs ce ciceae Dopor nr n 4440s bone ew owe 7 Overview 7 Network interface watchdog mechanism 7 Resetting the network timer 7 Control Console 8 HOW to Log ONiaieiakkevdsi ot daes cede dnd nia e e a aa 8 Overview 8 Remote access to the control console 8 Local access to the control console 9 M in Sereen cosan adaa a heh ee Sa we A 10 Sample main screen 10 Information and status fields 11 Control Console Menus 0000 eee e eee eee eee 13 How to use control console menus 13 Control console structure 14 Main menu 14 Device Manager menus 15 Network menu 16 System menu 16 N b O am O mi S am N a O aa _ cb Z N B O y O wi Q 4 am N E O an eos Web Interface 17 Introductio em Bia ait ah tee re aaa Gat en ska ace tb ees a oe aa eee Overview 17 Supported Web browsers 17 How t bog Ofscia cece eudwwne cn ta ne ce noes sine wre onee de Overview
31. E OR INSTALLATION OF THE PRODUCTS WHETHER SUCH DAMAGES ARISE IN CONTRACT OR TORT IRRESPECTIVE OF FAULT NEGLIGENCE OR STRICT LIABILITY OR WHETHER APC HAS BEEN ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH DAMAGES SPECIFICALLY APC IS NOT LIABLE FOR ANY COSTS SUCH AS LOST PROFITS OR REVENUE LOSS OF EQUIPMENT LOSS OF USE OF EQUIPMENT LOSS OF SOFTWARE LOSS OF DATA COSTS OF SUBSTITUENTS CLAIMS BY THIRD PARTIES OR OTHERWISE NO SALESMAN EMPLOYEE OR AGENT OF APC IS AUTHORIZED TO ADD TO OR VARY THE TERMS OF THIS WARRANTY WARRANTY TERMS MAY BE MODIFIED IF AT ALL ONLY IN WRITING SIGNED BY AN APC OFFICER AND LEGAL DEPARTMENT Warranty claims Customers with warranty claims issues may access the APC customer support network through the Support page of the APC Web site www apc com support Select your country from the country selection pull down menu at the top of the Web page Select the Support tab to obtain contact information for customer support in your region N O c O a S 4 am N e M a o3 za Wu o or L N gt Life Support Policy General policy American Power Conversion APC does not recommend the use of any of its products in the following situations e In life support applications where failure or malfunction of the APC product can be reasonably expected to cause failure of the life support device or to affect significantly its safety or effectiveness e In d
32. Module must wait after an IP address lease is assigned before it can request a renewal of that lease e Rebinding Time T2 option 59 The time that the Main Module must wait after an IP address lease is assigned before it can seek to rebind that lease Other options The Main Module also uses the following options within a valid DHCP response All of these options except the last are described in RFC2132 e Network Time Protocol Servers option 42 Up to two NTP servers primary and secondary that the Main Module can use Time Offset option 2 The offset of the Main Module s subnet in seconds from Coordinated Universal Time UTC Domain Name Server option 6 Up to two Domain Name System DNS servers primary and secondary that the Main Module can use Host Name option 12 The host name that the Main Module will use 82 character maximum length Domain Name option 15 The domain name that the Main Module will use 64 character maximum length Boot File Name from the file field of the DHCP response described in RFC2131 The fully qualified directory path to an APC user configuration file ini file to download The siaddr field of the DHCP response specifies the IP address of the server from which the Main Module will download the ini file After the download the Main Module uses the ini file as a boot file to reconfigure its settings Port Speed Administration gt Network gt Port Speed The Port Speed setting defines
33. P server uses both the specified port and the port one number lower than the specified port You can change the Port setting to the number of any unused port from 5001 to 32768 for added security Users must then use a colon to specify the non default port number For example for port 5001 and the IP address 152 214 12 114 the command would be ftp 152 214 12 114 5001 FTP server and transfer files with Secure CoPy SCP Selecting and OQ FTP transfers files without encryption For higher security disable the configuring Secure SHell SSH enables SCP automatically Related topics See these related topics Console Administration gt Network gt Console gt options to configure SSH e Using FTP or SCP to retrieve log files to obtain a text version of the event or data log N O c O a S 4 am N e M a o3 za Wu o or L N gt Wu oc TT N gt N Ses O am O a Q 4 am N n e M Eae e3 Z Administration Notification amp Logging Event Actions Administration gt Notification gt Event Actions gt options Types of notification You can configure event actions to occur in response to an event or a group of events These actions notify specified users in any of several ways e Active automatic notification The following actions notify specified users or monitoring devices directly E mail notification
34. When the Main Module reboots it will request its network assignment first from a BOOTP server and then if necessary from a DHCP server A data value of 2 disables the option Remain in DHCP amp BOOTP mode after accepting TCP IP settings The TCP IP Configuration setting switches to DHCP when the Main Module accepts this DHCP response Thereafter whenever the Main Module reboots it will request its network assignment from a DHCP server only Following in hexadecimal format is an example of the Vendor Specific Information option that contains the APC cookie and the data value to disable the Remain in DHCP amp BOOTP mode after accepting TCP IP settings Option 43 0x01 0x04 0x31 0x41 0x50 0x43 0x02 0x01 0x01 TCP IP options The Main Module uses the following options within a valid DHCP response to define its TCP IP settings All of these options except the first are described in RFC2132 IP Address from the yiaddr field of the DHCP response described in RFC2131 The IP address that the DHCP server is leasing to the Main Module e Subnet Mask option 1 The Subnet Mask value that the Main Module needs to operate on the network e Router i e Default Gateway option 3 The default gateway address that the Main Module needs to operate on the network e IP Address Lease Time option 51 The time duration for the lease of the IP Address to the Main Module e Renewal Time T1 option 58 The time that the Main
35. X X NetBotz 200 App VX X X Three fields identify the system name contact person and location of the Main Module To set these values at the control console select the System menu then Identification Name myMgmt System Contact Eileen Jenson Location Testing lab 1 The Up Time field reports how long the Main Module has been running since it was last reset or since power was applied Up Time 0 Days 19 Hours 28 Minutes Two fields identify the most recent date and time the screen was refreshed Date 07 29 2007 Time 10 06 10 The User field identifies whether you logged on through the Administrator or Device Manager account The Read Only User account cannot access the control console User Administrator Main screen status fields A Stat field reports the Main Module status Stat P N A P The APC operating system AOS is functioning properly NOTE If the AOS status is not P contact APC Worldwide Customer Support even if you can still access the Main Module N The network is functioning properly N A BOOTP request cycle is in progress N The Main Module failed to connect to the network N Another device is using the IP address of the Main Module A The application is functioning properly A The application has a bad checksum A The application is initializing A The application is not compatible with the AOS Status fields The status field
36. affected sensors Wildcard Description Character m The identification number of the Expansion Module to which the sensor is connected or MM for all remote sensors or sensors connected to the Main Module p The port number from 1 to 6 for sensors connected to a universal sensor port or for remote sensors a number from 1 to 8 as defined by the remote sensor s DIP switch settings 1 The Location field of the module to which the sensor is connected 4 Click Apply then click Finish Dry Contact Inputs page Use the Dry Contact Inputs page to configure and to view the current status and state for all dry contact sensors including APC door contact sensors connected to your system To configure a sensor Click the name of the sensor to modify Change settings then click Apply Setting Description Normal State Set this contact to either normally open or normally closed Severity Informational Warning device status requires attention or Critical device status requires immediate attention Selecting the Informational severity setting causes all devices to display a status of Normal even if devices are in an alarm state Alarm Generation Enable or disable this sensor s ability to send alarms To configure all sensors or a defined group Follow this procedure to mass configure all sensors or a defined group of sensors When mass configuring Name and Location fields you ca
37. ago or 1 2 or 4 weeks ago The graph will end at the most recent data record From To customize the time period for the logged data records to graph enter the beginning and end date and time For the date each letter m for month d for day and y for year represents one digit For the time each letter h for hour and m for minute represents one digit Single digit hours minutes days and months are displayed with a leading zero Click Apply to view the graph or click Cancel to discard the changes Click Launch Graph in New Window to display the graph in a new browser window that provides a full screen view The graph legend shows the color of the graph line for each selected data item If the data items do not have the same unit of measurement the units are displayed in the legend If the data items do have the same units the unit is displayed on the left side of the graph Move the mouse pointer over any horizontal line to view the date time and Y axis value for that data record Use the Zoom menu to increase or decrease the magnification of the graph The blue bar at the top left corner of the graph changes size to indicate the number of total data records being displayed and the relative location of the displayed data records To re center the graph click any point on the graph or the blue bar Setting the data collection interval Logs gt Data gt interval Define how frequently data is sampled and s
38. al voltage or connection inappropriate on site operation conditions corrosive atmosphere repair installation exposure to the elements Acts of God fire theft or installation contrary to APC recommendations or specifications or in any event if the APC serial number has been altered defaced or removed or any other cause beyond the range of the intended use THERE ARE NO WARRANTIES EXPRESS OR IMPLIED BY OPERATION OF LAW OR OTHERWISE OF PRODUCTS SOLD SERVICED OR FURNISHED UNDER THIS AGREEMENT OR IN CONNECTION HEREWITH APC DISCLAIMS ALL IMPLIED WARRANTIES OF MERCHANTABILITY SATISFACTION AND FITNESS FOR A PARTICULAR PURPOSE APC EXPRESS WARRANTIES WILL NOT BE ENLARGED DIMINISHED OR AFFECTED BY AND NO OBLIGATION OR LIABILITY WILL ARISE OUT OF APC RENDERING OF TECHNICAL OR OTHER ADVICE OR SERVICE IN CONNECTION WITH THE PRODUCTS THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES AND REMEDIES THE WARRANTIES SET FORTH ABOVE CONSTITUTE APC S SOLE LIABILITY AND PURCHASER S EXCLUSIVE REMEDY FOR ANY BREACH OF SUCH WARRANTIES APC WARRANTIES EXTEND ONLY TO PURCHASER AND ARE NOT EXTENDED TO ANY THIRD PARTIES N S O c O wi S 4 am N Ee e M Ea o3 za Wu o oc TT N gt IN NO EVENT SHALL APC ITS OFFICERS DIRECTORS AFFILIATES OR EMPLOYEES BE LIABLE FOR ANY FORM OF INDIRECT SPECIAL CONSEQUENTIAL OR PUNITIVE DAMAGES ARISING OUT OF THE USE SERVIC
39. ase and to submit customer support requests www apc com Corporate Headquarters Connect to localized APC Web sites for specific countries each of which provides customer support information WWW apc com support Global support searching APC Knowledge Base and using e support e Contact an APC Customer Support center by telephone or e mail Regional centers Direct InfraStruXure 1 877 537 0607 Customer Support toll free Line APC headquarters 800 800 4272 1 U S Canada toll free Latin America 1 401 789 5735 USA Europe Middle 353 91 702000 East Africa Ireland Western Europe 800 0272 0272 including Scandinavia Japan 0 36402 2001 Australia 1 800 652 725 toll free New Zealand 0 800 333 373 toll free Local country specific centers go to www apc com support contact for contact information Contact the APC representative or other distributor from whom you purchased your APC product for information on how to obtain local customer support Copyright Entire contents copyright 2008 American Power Conversion Corporation All rights reserved Reproduction in whole or in part without permission is prohibited APC the APC logo NetBotz and InfraStruXure are trademarks of American Power Conversion Corporation All other trademarks product names and corporate names are the property of their respective owners and are used for informational purposes only 990 3284 04 2008
40. ated in the previous step You will download to the Main Module two files extracted the APC Operating System AOS file and the NetBotz application file When a window opens and prompts you for the IP Address close the window For a successful firmware upgrade you must first transfer the AOS file and then transfer the application file 4 Use an SCP command line to transfer the APC Operating System AOS to the Main Module the file name you enter must match the name of the binary AOS file you extracted In the example below x s were substituted for version numbers scp apc hw03 aos xxx bin apc 158 205 6 185 apc hw03 aos xxx bin 5 Use an SCP command line with the name of the application file to transfer the application file to the Main Module scp apc hw03 nb200 xxx bin apc 158 205 6 185 apc hw03 nb200 xxx bin XMODEM 1 11 12 Download the latest firmware release for your NetBotz Rack Monitor 200 NBRK0200 from www apc com tools download Create a directory to which you will extract the files Double click the file you downloaded from the APC Web site and follow the prompts to extract the files to the folder created in the previous step You will download to the Main Module two files extracted the APC Operating System AOS file and the NetBotz application file When a window opens and prompts you for the IP Address close the window Select a serial port at the local computer and disable any service usi
41. ay The short link name displayed on each interface page e Name A name that fully identifies the target or purpose of the link e Address Any URL for example the URL of another device and server About the Main Module Administration gt General gt About The hardware information is especially useful to APC Customer Support in helping to troubleshoot problems with the Main Module The serial number and MAC address accessible through the About menu option are also available on the Main Module itself Firmware information listed under Application Module and APC OS AOS indicates the name firmware version number and the date and time each firmware module was created This information may also be useful in troubleshooting and enables you to determine quickly if updated firmware is available to download from the APC Web site Arc APC Device IP Configuration Wizard Capabilities Requirements and Installation How to use the Wizard to configure TCP IP settings The APC Device IP Configuration Wizard configures the IP address subnet mask and default gateway of one or more Network Management Cards or APC network enabled devices devices containing an embedded Network Management Card You can use the Wizard in either of the following ways e Remotely over your TCP IP network to discover and configure unconfigured Network Management Cards or devices on the same network segment as the computer running the Wizard e Through a direct
42. b access is disabled or the URL was not correct URL format examples e Fora DNS name of Web1 http Web1 if HTTP is your access mode https Web1 if HTTPS is your access mode e For a System IP address of 198 168 6 133 when the Main Module uses the default Web server port 80 http 198 168 6 133 if HTTP is your access mode https 198 168 6 133 if HTTPS is your access mode e For a System IP address of 198 168 6 133 when the Main Module uses a non default Web server port 5000 in this example http 198 168 6 133 5000 if HI TP is your access mode https 198 168 6 133 5000 if HTTPS is your access mode Overview Page Overview The first time you log on at the Web interface the Home tab Overview page shows a summary of active alarm conditions and the most recent events recorded in the event log To change the page that displays at login see System Preferences Administration gt General gt Preferences Quick status icons One or more icons and accompanying text indicate the current operating status of the devices connected to the Main Module Critical A critical alarm exists which requires immediate action Warning An alarm condition requires attention and could jeopardize your data or equipment if its cause is not addressed gt Normal No alarms are present The Main Module and all connected devices are operating normally At the
43. certificate 18 priority for logging on 4 Web interface 57 Alarm mapping beacon 42 relay outputs 43 Alarm Status page 35 Alarms 24 Alink Power Overload 24 Device Disconnected 26 Err displayed 29 Lost Comm 26 A Link alarm message 24 clearing alarms 24 27 Apply Local Computer Time 85 Authenticate Traps setting 72 Authenticate users through RADIUS 46 Automatic log off for inactivity 49 Beacon alarm mapping 42 configure 42 test 42 Beacon page 42 BOOTP request cycle in progress 12 TCP IP settings 50 Browsers supported 17 C Certificate SSL add replace or remove 58 view 58 Community Name trap receivers 72 config ini file See User configuration files Configure proxy server 17 RADIUS authentication 46 Contact information 85 Control console configure access 59 Device Manager menu 15 main screen 10 navigate menus 13 Network menu 16 refresh menus 13 System menu 16 D Data log display and use 78 graph data records 79 import into spreadsheet 82 retrieve with FTP or SCP 82 rotation archiving 80 Date amp Time settings 85 Date format 85 Daylight Saving Time configuration 86 Device disconnected alarm 26 Device IP Configuration Wizard installation and system requirements 91 local configuration 94 remote configuration 92 Device Manager menu control console 15 DHCP APC cookie 52 response options 52 TCP IP settings 50 Disable access to FTP server 65 alarm generation digital sensors 40 alarm
44. ct System then User Manager Select Administrator and change the User Name and Password settings both of which are now defined as apc Select Accept changes Press CTRL C log off reconnect any serial cable you disconnected and restart any service you disabled Watchdog Features Overview To detect internal problems and recover from unanticipated inputs the Main Module uses internal system wide watchdog mechanisms When it restarts to recover from an internal problem a System Warmstart event is recorded in the event log Network interface watchdog mechanism The Main Module implements internal watchdog mechanisms to protect itself from becoming inaccessible over the network For example if the Main Module does not receive any network traffic for 9 5 minutes either direct traffic such as SNMP or broadcast traffic such as an Address Resolution Protocol ARP request it assumes that there is a problem with its network interface and restarts Resetting the network timer To ensure that the Main Module does not restart if the network is quiet for 9 5 minutes the Main Module attempts to contact the Default Gateway every 4 5 minutes If the gateway is present it responds to the Main Module and that response restarts the 9 5 minute timer If your application does not require or have a gateway specify the IP address of a computer that is running on the network most of the time and is on the same subnet The network tra
45. d verify password against etc passwd The following example is for users bconners and thawk bconners Auth Type System APC Service Type Admin thawk Auth Type System APC Service Type Device Supported RADIUS servers APC supports FreeRADIUS and Microsoft Windows IAS Server Other commonly available RADIUS applications may work but have not been fully tested by APC Inactivity Timeout Administration gt Security gt Auto Log Off Use this option to configure the time 3 minutes by default that the system waits before logging off an inactive user Administration Network Features TCP IP and Communication Settings TCP IP settings Administration gt Network gt TCP IP The TCP IP option on the left navigation menu selected by default when you choose Network on the top menu bar displays the current IP address subnet mask default gateway and MAC address of the Main Module On the same page TCP IP Configuration provides the following options for how the TCP IP settings will be configured when the Main Module turns on resets or restarts Manual BOOTP DHCP and DHCP amp BOOTP For information on DHCP and BOOTP options see RFC2131 and RFC2132 LLI gt U an LLI N D N Ses O am O aw S 4 am N si e M Eae c3 Z Setting Description Manual The IP address subnet mask and default gateway must be configured manually Click Next gt gt and enter the n
46. e if needed and for system setup details The NetBotz Rack Monitor 200 Installation and Quick Configuration Manual was provided with your Rack Monitor 200 and is also available on the APC Web site Www apc com For additional assistance or if performing these steps does not resolve the problem contact APC Worldwide Customer Support Device Connection Procedure Universal Sensor Port or Beacon port 1 2 Make sure the device cable connection is secure and that the cable has not been damaged Replace the device with a known good device of the same type Did an alarm appear for the known good device No The device was bad Yes There is a problem with the Main Module or Expansion Module to which the device is connected A Link port Make sure cables are correctly and securely connected to the in and out ports of all devices on the A Link bus Make sure A Link terminators are securely installed in unused A Link ports Make sure the maximum combined length of all A Link cables does not exceed 1000 m 3 280 ft NOTE When one remote sensor or Expansion Module has a problem that causes a Device Disconnected alarm all devices cascaded from the output port of the device will also report a Device Disconnected alarm 4 lf more than one Device Disconnected alarm exists for devices that connect to A Link ports starting from the Main Module identify the first device on the A Link chain with
47. e Alarm Temperature Sensor Disconnected Sensor Temperature and Humidity Sensor Dry Contact Sensor Remote Temperature and Humidity Sensor Main Module Expansion Module Lost Comm Expansion Module Beacon Beacon Lost Comm or Beacon Disconnected For a Sensor Disconnected alarm the module to which the sensor is connected will report a Status of Critical on the Module View page If you click the module name to view the module details Lost Comm will be displayed as the Status for the sensor with the alarm Causes of this alarm include e An improper connection A disconnected device e A faulty device A bad cable N O c O a S 4 am N e M a o3 za Wu o an TT N D can clear the Sensor Disconnected alarm from the Administration gt General gt Reset Reboot page From the Overview page or the Alarm Status page perform the following 1 Click the Reset Alarms link to go to the Reset Reboot page 2 Select Reset Only If you intentionally disconnected a sensor module or beacon you 3 Select the Lost Communication Alarms checkbox 4 Click Apply Perform the following steps until the alarm is cleared This procedure requires you to troubleshoot your setup on site while monitoring the Web interface or control console See the NetBotz Rack Monitor 200 Installation and Quick Configuration Manual for local access to the control consol
48. e State will be On To turn off the beacon Select Turn Beacon Off then click Apply To change the Name or Location information for the beacon Click the appropriate field make changes then click Apply To test the beacon Select Turn Beacon On Then click Apply To stop the beacon select Turn Beacon Off Then click Apply To map alarm conditions to activate the beacon You can configure your system so that the beacon turns on when an alarm condition occurs for one many or all temperature and humidity sensors connected to the system 1 In the section Mapping Alarm Reaction select types of alarms that will activate the beacon 2 If for a particular alarm you do not want all applicable sensors to activate the beacon click the alarm Deselect sensors as desired and then click Apply Modules Under Expansion Modules select the Any sensor checkbox so that all sensors connected to all Expansion Modules will activate the beacon for the alarm Deselect the Any sensor checkbox so that no sensors connected to Expansion Modules will activate the beacon for the alarm You cannot select or deselect specific sensors connected to Expansion 3 Click Apply again Relay Output page Select the Outputs tab and then the top menu item Relay Output to configure the relay output Enter the name and location in the appropriate fields Set the normal state of the output open or closed To change the state of the output manually select th
49. e setting in the Control field To map a device alarm to activate a relay The relay can be activated only by the alarm states of sensors connected to the Main Module 1 In the section Mapping Alarm Reaction select the alarm states that will activate the relay 2 By default all sensors connected to the Main Module are mapped to activate the relay output when in an abnormal state Click the name of the abnormal state to view the sensors connected to the module 3 Select devices to include in the alarm Any selected device in its abnormal state activates the relay 4 Click Apply N O c O a S 4 am N e M a o3 za Wu an TT N D Switched Outlet page Select the Outputs tab and then the top menu item Switched Outlet to configure the switched outlet Enter the name and location in the appropriate fields Set the normal state of the outlet on or off To change the state of the outlet manually select the setting in the Control field To map a device alarm to activate an outlet The outlet can only be activated by the alarm states of sensors on the Main Module 1 In the section Mapping Alarm Reaction select the alarm states that will activate the outlet 2 By default all sensors connected to the Main Module are mapped to activate the switched outlet when in an abnormal state Click the name of the abnormal state to view the sensors connected to the module 3 Select device
50. e setting will receive authentication traps traps generated by invalid attempts to log on to this device To disable that ability clear the checkbox SNMPv3 option Select the identifier of the user profile for this trap receiver To view the settings of the user profiles identified by the user names selectable here choose Network on the top menu bar and user profiles under SNMPv3 on the left navigation menu See SNMPv3 Administration gt Network gt SNMPv3 gt options for information on creating user profiles and selecting authentication and encryption methods SNMP Trap Test Administration gt Notification gt SNMP Traps gt test Last Test Result The result of the most recent SNMP trap test A successful SNMP trap test verifies only that a trap was sent it does not verify that the trap was received by the selected trap receiver A trap test succeeds if all of the following are true e The SNMP version SGNMPv1 or SNMPv3 configured for the selected trap receiver is enabled on this device e The trap receiver is enabled e If a host name is selected for the To address that host name can be mapped to a valid IP address To Select the IP address or host name to which a test SNMP trap will be sent If no trap receiver was ever configured a link to the Trap Receiver configuration page is displayed Syslog Logs gt Syslog gt options The Main Module can send messages to up to four Syslog servers when an event occur
51. each page of the interface there are three configurable links By default the links access the URLs for these Web pages e Link 1 The home page of the APC Web site e Link 2 A demonstration page where you can use samples of APC Web enabled products Link 3 Information about APC Remote Monitoring Services To reconfigure the links see Configuring Links Administration gt General gt Quick Links N S O pa O wi Q 4 or N aaa O aa eos c3 a 23 How to Troubleshoot Overview This section covers how to troubleshoot problems related to the physical system setup including Alarms that appear in the Overview page and the Alarm Status page of the Web interface Problems that you may notice when viewing the software interface A Link Power Overload Alarm An A Link Power Overload alarm occurs due to the following Too many devices connected to the A Link ports A hardware problem e An improper device connected to the A Link bus Perform the following steps until the alarm condition is corrected and the alarm clears This procedure requires you to troubleshoot your setup on site while monitoring the Web interface or control console See the NetBotz Rack Monitor 200 Installation and Quick Configuration Manual for local access to the control console if needed and for system setup details The NetBotz Rack Monitor 200 Installation and Quick Configuration Manual was provided with
52. ectory to which you will extract the files Double click the file you downloaded from the APC Web site and follow the prompts to extract the files to the folder created in the previous step and then to upgrade your Main Module The upgrade tool starts automatically Download the latest firmware release for your NetBotz Rack Monitor 200 NBRKO200 from www apc com tools download From the NetBotz Rack Monitor 200 software interface check the FTP Server settings e From the Administration tab click Network then FTP Server to verify that the Access option is enabled e Note whether the Port setting has changed from the default value of 21 Create a directory to which you will extract the files Double click the file you downloaded from the APC Web site and follow the prompts to extract the files to the folder created in the previous step You will download to the Main Module two files extracted the APC Operating System AOS file and the NetBotz application file When a window opens and prompts you for the IP Address close the window Open a command prompt window of a computer on the network Go to the directory that contains the extracted files and list the files C gt cd ape C ape gt dir Open an FTP client session C ape gt ftp 7 10 11 12 13 Type open and the Main Module IP address then press ENTER If the port setting for the FTP Server has changed from its default of 21 use the non defa
53. er than Minimum Humidity Threshold High Humidity Threshold Set the high humidity threshold for this sensor If the humidity rises above this threshold an alarm occurs This threshold must be higher than the sum of Low Humidity Threshold and Humidity Threshold Hysteresis Maximum Humidity Threshold Set the maximum humidity threshold for this sensor If the humidity rises above this threshold an alarm occurs This threshold must be greater than High Humidity Threshold Humidity Threshold Hysteresis The difference between the humidity threshold violation and the clearing point Increasing this value prevents frequent alarms if humidity wavers slightly above and below the threshold before corrective actions restore the humidity to the clearing point Rate of Change Settings Short term Increasing Temperature Rate of Change Set the maximum short term increase in temperature that you want your system to allow An alarm will occur if the temperature increases at a rate that is greater than the rate you have set Short term Decreasing Temperature Rate of Change Set the maximum short term decrease in temperature that you want your system to allow An alarm will occur if the temperature decreases at a rate that is greater than the rate you have set Long term Increasing Temperature Rate of Change Set the maximum long term increase in temperature that you want your system to allow An
54. ers by account type apc for an Administrator e device for a Device User e readonly for a Read Only User The default password is apc for all three account types compared with information in a server certificate If the certificate was created with the APC Security Wizard and an IP address was specified as the common name in the certificate you must use an IP address to log on to the Main Module If a DNS name was specified as the common name on the certificate you must use a DNS name to log on If you are using HTTPS as your access protocol your login credentials are For information about the Web page displayed when you log on see Overview Page N O c O a S 4 am N e M a o3 za Wu an TT N D URL address formats Type the DNS name or IP address of the Main Module in the Web browser s URL address field and press ENTER When you specify a non default Web server port in Internet Explorer you must include http or https in the URL Common browser error messages at log on Error Message Browser Cause of the Error You are not authorized to view this page or Someone is currently logged in Internet Explorer Netscape Firefox Someone else is logged on The connection was refused Netscape This page cannot be displayed Internet Explorer Unable to connect Firefox We
55. ettings until it is restarted To change these values click Next gt gt to access the DHCP Configuration page Require vendor specific cookie to accept DHCP Address Disable or enable the requirement that the DHCP server provide the APC cookie Maximum retries Enter the number of retries that will occur when no valid response is received or zero 0 for an unlimited number of retries 1 The default values for these three settings on the configuration pages generally do not need to be changed Vendor Class APC Client ID The MAC address of the Main Module which uniquely identifies it on the local area network LAN User Class The name of the application firmware module Setting Description DHCP amp The default setting The Main Module tries to obtain its TCP IP settings from a BOOTP BOOTP server first and then if it cannot discover a BOOTP server from a DHCP server If it obtains its TCP IP settings from either server it switches this setting to BOOTP or DHCP depending on the type of server that supplied the TCP IP settings to the Main Module Click Next gt gt to configure the same settings that are on the BOOTP Configuration and DHCP Configuration pages and to specify that the DHCP and BOOTP setting be retained after either type of server provides the TCP IP values 1 The default values for these three settings on the configuration pages generally do not need to be changed Vendor C
56. ew values BOOTP A BOOTP server provides the TCP IP settings At 32 second intervals the Main Module requests network assignment from any BOOTP server If the Main Module receives a valid response it starts the network services e If the Main Module finds a BOOTP server but the request to that server fails or times out the Main Module stops requesting network settings until it is restarted e By default if previously configured network settings exist and the Main Module receives no valid response to five requests the original and four retries it uses the previously configured settings so that it remains accessible Click Next gt gt to access the BOOTP Configuration page to change the number of retries or the action to take if all retries fail Maximum retries Enter the number of retries that will occur when no valid response is received or zero 0 for an unlimited number of retries If retries fail Select Use prior settings the default or Stop BOOTP request DHCP At 32 second intervals the Main Module requests network assignment from any DHCP server By default the number of retries is unlimited If the Main Module receives a valid response by default it requires the APC cookie from the DHCP server in order to accept the lease and start the network services If the Main Module finds a DHCP server but the request to that server fails or times out the Main Module stops requesting network s
57. fect E mail Generation Enables by default or disables sending e mail to the recipient E mail test Administration gt Notification gt E mail gt test Use this option to send a test message to a configured recipient SNMP Traps Trap Receivers Administration gt Notification gt SNMP Traps gt trap receivers View trap receivers by NMS IP Host Name You can configure up to six trap receivers e To open the page for configuring a new trap receiver click Add Trap Receiver e To modify or delete a trap receiver first click its IP address or host name to access its settings If you delete a trap receiver all notification settings configured under Event Actions for the deleted trap receiver are set to their default values e To specify the trap type for a trap receiver select either the SNMPv1 or SNMPv3 radio button For an NMS to receive both types of traps you must configure two trap receivers for that NMS one for each trap type ltem Definition Trap Generation Enable the default or disable trap generation for this trap receiver NMS IP Host The IP address or host name of this trap receiver The default 0 0 0 0 Name leaves the trap receiver undefined SNMPv1 option Community Name The name public by default used as an identifier when SNMPv1 traps are sent to this trap receiver Authenticate When this option is enabled the default the NMS identified by the NMS Traps IP Host Nam
58. ffic of that computer will restart the 9 5 minute timer frequently enough to prevent the Main Module from restarting Control Console How to Log On Overview You can use either a local serial connection or a remote Telnet or SSH connection with a computer on the same network LAN as the Main Module Rack Monitor 200 to access the control console Use case sensitive User Name and Password entries to log on by default apc and apc for an Administrator or device and apc for a Device Manager which is the same user account as Device User in the Web interface A Read Only User has no access to the control console If you cannot remember your user name or password see Recovering From a Lost Password Remote access to the control console An Administrator can access the control console through Telnet or SSH Telnet is enabled by default Enabling SSH automatically disables Telnet To enable or disable these access methods e In the Web interface on the Administration tab select Network on the top menu bar then the access option under Console on the left navigation menu e In the control console choose the Network menu then the Telnet SSH option Telnet for basic access Telnet provides the basic security of authentication by user name and password but not the high security benefits of encryption To use Telnet to access the control console 1 From a computer on the same network as the Main Module at a command p
59. file to multiple Main Modules To export the ini file to multiple Main Modules e Use FTP or SCP but write a script that incorporates and repeats the steps used for exporting the file to a single Main Module e Use a batch processing file and the APC ini file utility To create the batch file and use the utility see Release Notes ini File Utility version 1 0 on the NetBotz Rack Monitor 200 Utility CD The Upload Event and Error Messages The event and its error messages The following event occurs when the receiving Main Module completes using the ini file to update its settings Configuration file upload complete with number valid values If a keyword section name or value is invalid the upload by the receiving Main Module succeeds and additional event text states the error Event text Description Configuration file warning Invalid A line with an invalid keyword or value is ignored keyword on line number Configuration file warning Invalid value on line number Configuration file warning Invalid If a section name is invalid all keyword value pairs in that section on line number section are ignored Configuration file warning A keyword entered at the beginning of the file i e before Keyword found outside of a any section headings is ignored section on line number Configuration file warning If the file is too large an incomplete upload occurs Reduce Configuration file exceeds t
60. g System event entries and configuration change entries do not change color Text Color Alarm Severity Red Critical A critical alarm exists which requires immediate action Orange Warning An alarm condition requires attention and could jeopardize your data or equipment if its cause is not addressed Green Normal No alarms are present The Main Module and all connected devices are operating normally Changing the default temperature scale Select the temperature scale Fahrenheit or Celsius in which to display all temperature measurements in this user interface Configuring the default Home page To change the Web page that displays by default at login select a Web page from the Log On Start Page drop down menu Serial Modbus Administration gt General gt Serial Modbus To configure Modbus select the Administration tab General on the top menu bar and Serial Modbus on the left navigation menu You can enable or disable Modbus choose a baud rate and specify a unique identifier Modbus defines a request response message structure for a client server environment The APC implementation of Modbus uses Remote Terminal Unit RTU mode You can use Modbus to view the Main Module through your building management system interface It is read only e The Modbus interface supports 2 wire RS 485 e Modbus runs at 9600 or 19200 bps The Modbus register map for the Main Module defines the data type location a
61. g gt options 73 Indirect Notification through Logs or Queries 00 65 76 Event log Logs gt Events gt options 76 Data log Llogs gt Data gt options 78 Using FTP or SCP to retrieve log files 82 Queries Modbus requests and SNMP GETs 84 Administration General Options 85 Identification Administration gt General gt Identification 85 Set the Date and Time sic d ees keke ss tse eee eek eee neia 85 Method Administration gt General gt Date amp Time gt mode 85 Daylight Saving Administration gt General gt Date amp Time gt daylight saving 86 Format Administration gt General gt Date amp Time gt date format 86 System Preferences Administration gt General gt Preferences 87 Color coding events in the event log 87 Changing the default temperature scale 87 Configuring the default Home page 87 Serial Modbus Administration gt General gt Serial Modbus 88 How to Reboot Reset Settings and Clear Alarms Administration gt General gt Reset Reboot 0000055 89 Configuring Links Administration gt General gt Quick Links 90 About the Main Module Administration gt General gt About 90 N O O x O am N aid O Mm pa lt N O c O aw S 4 am N ai O an a za APC Device IP Configuration Wizard 91 Capabilities Requirements and Installation How to use the Wizard to configure
62. ge address e View the result of the test DNS request in the Last Query Response field N Saws O ie O a Q 4 am N E O aa g c3 Web Administration gt Network gt Web gt options Option Description access To activate changes to any of these selections log off from the Main Module e Disable Disables access to the Web interface You must use the control console to re enable access Select Network and Web SSL TLS For HTTP access select Access and Enabled For HTTPS access also select Web SSL and Enabled Enable HTTP the default Enables Hypertext Transfer Protocol HTTP which provides Web access by user name and password but does not encrypt user names passwords and data during transmission e Enable HTTPS Enables Hypertext Transfer Protocol over Secure Sockets Layer HTTPS to provide Web access Secure Sockets Layer SSL encrypts user names passwords and data during transmission and authenticates the Main Module by digital certificate When HTTPS is enabled your browser displays a small lock icon See Creating and Installing Digital Certificates in the Security Handbook on the NetBotz Rack Monitor 200 Utility CD to choose among the several methods for using digital certificates HTTP Port The TCP IP port 80 by default used to communicate by HTTP with the Main Module HTTPS Port The TCP IP port 443 by default used to communicate by HTTPS wi
63. hared among APC network enabled devices and the menu structure in the control console ensures compatibility with scripts and programs that may rely on that structure Main menu Use the Main menu to access the management features of the control console 1 Device Manager 2 Network 3 System 4 Logout When you log on as Device Manager you can access only the Device Manager menus and the Logout option Device Manager menus Use the Device Manager menu to select the components to manage For example 1 T H Sensors 2 Input Sensors 3 Outputs 4 Module Identification Use the T H Sensors option to view the temperature humidity if applicable and alarm status recorded by each temperature and humidity sensor connected to the system This option also allows users to configure temperature thresholds and rate of change settings enable or disable alarm generation and reset rate of change alarms Use the Input Sensors option to view the name status location and identification information for each dry contact sensor connected to the system and to configure dry contact sensors See Dry Contact Inputs page for information about configuration settings Use the Outputs option to view information about the beacon the switched outlet or the relay output Configure the identification information and normal state of the output devices map alarms that will activate the output device and manually change the state of the device
64. hat one or more of the other user profiles must have no access control entry If no access control entry is listed for a user profile no NMS that uses that profile has any access to this device To edit the access control settings for a user profile click its user name Access Mark the Enable checkbox to activate the access control specified by the parameters in this access control entry User Name Select from the drop down list the user profile to which this access control entry will apply The choices available are the four user names that you configure through the user profiles option on the left navigation menu NMS IP Host Name The IP address IP address mask or host name that controls access by the NMS A host name or a specific IP address such as 149 225 12 1 allows access only by the NMS at that location An IP address mask that contains 255 restricts access as follows e 149 225 12 255 Access only by an NMS on the 149 225 12 segment e 149 225 255 255 Access only by an NMS on the 149 225 segment e 149 255 255 255 Access only by an NMS on the 149 segment 0 0 0 0 the default setting which can also be expressed as 255 255 255 255 Access by any NMS on any segment FTP Server Administration gt Network gt FTP Server The FTP Server settings enable by default or disable access to the FTP server and specify the TCP IP port 21 by default that the FTP server uses for communication with the Main Module The FT
65. he Network Management Card or device whose MAC address is currently displayed click Cancel Configure or reconfigure the TCP IP settings locally 1 2 Contact your network administrator to obtain valid TCP IP settings Connect the provided serial configuration cable from an available communications port on your computer to the serial port of the Network Management Card or device Make sure no other application is using the computer port From the Start menu launch the Wizard application If the Network Management Card or network enabled device is not configured wait for the Wizard to detect it Otherwise click Next gt Select Locally through the serial port and click Next gt Enter the system IP subnet mask and default gateway for the Network Management Card or device and click Next gt On the Transmit Current Settings Remotely screen if you select Start a Web browser when finished the default Web browser connects to the Network Management Card or device after the Wizard transmits the settings Click Finish to transmit the TCP IP settings If the IP address you entered is in use on the network the Wizard prompts you to enter an IP address that is not in use Enter a correct IP address and click Finish If you selected Start a Web browser when finished in step 7 you can now configure other parameters through the Web interface of the Network Management Card or device Exporting Configura
66. he event log or data log to your local drive ftp gt get event txt or ftp gt get data txt 4 You can use the del command to clear the contents of the event log or data log ftp gt del event txt or ftp gt del data txt You will not be asked to confirm the deletion e If you clear the data log the event log records a deleted log event e If you clear the event log a new event txt file is created to record the deleted log event 5 Type quit at the tp gt prompt to exit from FTP Queries Modbus requests and SNMP GETs See Serial Modbus Administration gt General gt Serial Modbus for information on configuring and using the request response structure of Modbus and see SNMP for a description of SNMPv1 and SNMPv3 settings that enable an NMS to perform informational queries With SNMPv1 which does not encrypt data before transmission configuring the most restrictive SNMP access type READ enables informational queries without allowing remote configuration changes N O c O a S 4 am N e M a o3 za Wu an TT N D Administration General Options Identification Administration gt General gt Identification Define values for the Name the device name Location the physical location and Contact the person responsible for the device used by the Main Module s SNMP agent These settings are the values used for the MIB II sysName sysContact and sysLocation Ob
67. he size of the file or divide it into two files and try maximum size uploading again Messages in config ini A device associated with the Main Module from which you download the config ini file must be discovered successfully in order for its configuration to be included If the device is not present or for another reason is not discovered the config ini file contains a message under the appropriate section name instead of keywords and values If you did not intend to export the configuration of the device as part of the ini file import ignore these messages Errors generated by overridden values The Override keyword and its value will generate error messages in the event log when it blocks the exporting of values See Contents of the ini file for information about which values are overridden Because the overridden values are device specific and not appropriate to export to other Main Modules ignore these error messages To prevent these error messages you can delete the lines that contain the Override keyword and the lines that contain the values that they override Do not delete or change the line containing the section heading Related Topics On Windows operating systems instead of transferring ini files you can use the APC Device IP Configuration Wizard to update the basic TCP IP settings of Main Modules and configure other settings through their user interface See APC Device IP Configuration Wizard
68. ice settings Menus Top menu bar The row of buttons underneath the tabs Once you have selected a tab use the top menu bar to begin navigating the tab Clicking an option from the top menu bar changes the current page The Logs tab does not have a top menu bar Left navigation menu The Logs and Administration tabs have navigation menus along the left side of the page A bold heading is a navigational link only if it does not have indented option names listed below it Tables Tables in the Web interface share some common functionality To sort By default rows in a table are typically sorted according to the left most column as indicated by a small triangle next to the column name To sort by another column click the column name To change the sort order from ascending or descending click the triangle next to the column name To filter Some tables include filter buttons above or below the table that allow you to specify which records in the table you would like to view For example you can use a filter to configure a specific group of sensors When you use the filtering feature a funnel symbol appears at the top of any columns to which filter criteria applies Filter settings are cleared when you log out To modify filter settings Click the filter symbol in a column heading or click the Filter button again To clear filter settings and display all records Click the Clear Filter button Quick Links At the lower left on
69. ification gt SNMP Traps gt trap receivers Configuring by group To configure a group of events simultaneously 1 2 Select the Administration tab Notification on the top menu bar and by group under Event Actions on the left navigation menu Choose how to group events for configuration e Choose Grouped by severity and then select all events of one or more severity levels You cannot change the severity of an event e Choose Grouped by category and then select all events in one or more pre defined categories Click Next gt gt to move from page to page to do the following a Select event actions for the group of events e To choose any action except Logging the default you must first have at least one relevant recipient or receiver configured e If you choose Logging and have configured a Syslog server select Event Log or Syslog or both on the next page b Select whether to leave the newly configured event action enabled for this group of events or to disable the action Active Automatic Direct Notification E mail notification Overview of setup Use the Simple Mail Transfer Protocol SMTP to send e mail to up to four recipients when an event occurs To use the e mail feature you must define the following settings The IP addresses of the primary and optionally of the secondary Domain Name System DNS servers See DNS Administration gt Network gt DNS gt options The IP address or DNS name f
70. irect patient care APC will not knowingly sell its products for use in such applications unless it receives in writing assurances satisfactory to APC that a the risks of injury or damage have been minimized b the customer assumes all such risks and c the liability of APC is adequately protected under the circumstances Examples of life support devices The term life support device includes but is not limited to neonatal oxygen analyzers nerve stimulators whether used for anesthesia pain relief or other purposes autotransfusion devices blood pumps defibrillators arrhythmia detectors and alarms pacemakers hemodialysis systems peritoneal dialysis systems neonatal ventilator incubators ventilators for adults and infants anesthesia ventilators infusion pumps and any other devices designated as critical by the U S FDA Hospital grade wiring devices and leakage current protection may be ordered as options on many APC UPS systems APC does not claim that units with these modifications are certified or listed as hospital grade by APC or any other organization Therefore these units do not meet the requirements for use in direct patient care Wu o oc L N gt N Sess O am O O 4 am N n e M c3 Z A About control console 16 Web interface 90 Access account types 5 control console 59 event log from control console 13 FTP server 65 method determined by SSL
71. is lost to a device or if a temperature sensor s rate of change is exceeded in addition to an alarm a Reset Alarms link will appear To clear a device disconnected lost comm or rate of change alarm Click the Reset Alarms link if for example you intentionally disconnected a sensor or you want to acknowledge a rate of change The Administration tab s General page appears where you can reset the alarm For additional details on how to clear the alarm see How to Reboot Reset Settings and Clear Alarms Administration gt General gt Reset Reboot If you have a Sensor Disconnected alarm and did not intentionally disconnect a sensor see Device Disconnected or Lost Comm Alarms for troubleshooting details System View page Use the System View page to view all sensors currently connected to the system and the status of outputs beacon relay and switched outlet To view the most recent data from each sensor see Temperature amp Humidity page and Dry Contact Inputs page Any sensors with a Sensor Disconnected alarm will not be displayed in the System View page N O c O a S 4 am N e M a o3 za LLI U or T T gt The System View page displays the following information about system devices e Status Critical a device connected to this module is reporting an alarm that requires immediate action Warning a device requires attention or Normal no device ala
72. ity gt Local Users gt options Recovering From a Lost Password Use a local computer connected to the Main Module to access the control console 1 Select a serial port at the local computer disable any service that uses the port 2 Connect the serial cable APC part number 940 0024 or 940 1524 to the selected port on the computer and to the RS 232 Console Port at the Main Module Run a terminal program such as HyperTerminal on your computer and configure the selected port to have 9600 bps 8 data bits no parity 1 stop bit and no flow control Press ENTER repeatedly if necessary to display the User Name prompt If you are unable to display the User Name prompt verify the following e The serial port is not in use by another application e The terminal settings are correct as specified in step 3 e The correct cable is being used as specified in step 2 Press the Reset button on the front of the Main Module The Status LED will flash alternately orange and green Press the Reset button a second time immediately while the LED is flashing to reset the user name and password to their defaults temporarily Press ENTER as many times as necessary to redisplay the User Name prompt then use the default apc for the user name and password If you take longer than 30 seconds to log on after the User Name prompt is redisplayed you must repeat step 5 and log on again From the Control Console menu sele
73. ject Identifications OIDs For more information about the MIB II OIDs see the PowerNet SNMP Management Information Base MIB Reference Guide provided on the NetBotz Rack Monitor 200 Utility CD and on the APC Web site WWW apc com Set the Date and Time Method Administration gt General gt Date amp Time gt mode Set the time and date used by the Main Module You can change the current settings manually or through a Network Time Protocol NTP Server e Manual Do one of the following Enter the date and time for the Main Module Select Apply Local Computer Time to match the date and time settings of the computer you are using and click Apply e Synchronize with NTP Server Have an NTP Server define the date and time for the Main Module Setting Definition Primary NTP Server Enter the IP address or domain name of the primary NTP server Setting Definition Secondary NTP Server Enter the IP address or domain name of the secondary NTP server when a secondary server is available Time Zone Select a time zone The number of hours preceding each time zone in the list is the offset from Coordinated Universal Time UTC formerly Greenwich Mean Time Update Interval Define how often in hours the Main Module accesses the NTP Server for an update Minimum 1 Maximum 8760 1 year Update Using NTP Now Initiate an immediate update of date and time by the NTP Ser
74. lass APC Client ID The MAC address of the Main Module which uniquely identifies it on the local area network LAN User Class The name of the application firmware module DHCP response options Each valid DHCP response contains options that provide the TCP IP settings that the Main Module needs to operate on a network plus other information that affects Main Module operation Vendor Specific Information option 43 The Main Module NetBotz Rack Monitor 200 requires option 43 in a DHCP response to determine whether the DHCP response is valid This option contains up to two APC specific options in a TAG LEN DATA format the APC Cookie and the Boot Mode Transition To disable the requirement for an APC cookie see DHCP e APC Cookie Tag 1 Len 4 Data 1APC Option 43 communicates to the Main Module that a DHCP server is configured to service APC devices By default the DHCP response must contain the APC Cookie for the Main Module to accept the lease Arc Following in hexadecimal format is an example of a Vendor Specific Information option that contains the APC cookie Option 43 0x01 0x04 0x31 0x41 0x50 0x43 Boot Mode Transition Tag 2 Len 1 Data 1 2 Boot Mode Transition enables or disables the Main Module option Remain in DHCP amp BOOTP mode after accepting TCP IP settings which is disabled by default A data value of 1 enables the option Remain in DHCP amp BOOTP mode after accepting TCP IP settings
75. ltGateway and BootMode Detailed procedures Retrieving To set up and retrieve an ini file to export 1 If possible use the interface of a Main Module to configure it with the settings to export Directly editing the ini file risks introducing errors 2 To use FIP to retrieve config ini from the configured Main Module a Open a connection to the Main Module using its IP address ftp gt open ip address b Log on using the Administrator user name and password c Retrieve the config ini file containing the Main Module s settings ftp gt get config ini The file is written to the folder from which you launched FTP To retrieve configuration settings from multiple Main Modules and export them to other Main Modules see Release Notes ini File Utility version 1 0 available on the NetBotz Rack Monitor 200 Utility CD and at www apc com N O c O a S 4 am N e M a o3 za Wu o an TT N D Customizing You must customize the file before you export it 1 Use a text editor to customize the file Section headings keywords and pre defined values are not case sensitive but string values that you define are case sensitive Use adjacent quotation marks to indicate no value For example LinkURL1 indicates that the URL is intentionally undefined Enclose in quotation marks any values that contain leading or trailing spaces or are already enclosed in quotation marks To ex
76. more protection than version 1 from attempts to intercept forge or alter data during transmission There is a noticeable delay as you log on Configure the TCP IP ports to be used by these protocols e Telnet Port The Telnet port used to communicate with the Main Module 23 by default You can change the port setting to any unused port from 5000 to 32768 for additional security Users must then use a colon or a space as required by your Telnet client program to specify the non default port For example for port 5000 and an IP address of 152 214 12 114 your Telnet client requires one of the these commands telnet 152 214 12 114 5000 telnet 152 214 12 114 5000 SSH Port The SSH port used to communicate with the Main Module 22 by default You can change the port setting to any unused port from 5000 to 32768 for additional security See the documentation for your SSH client for the command line format required to specify a non default port ssh encryption Enable or disable encryption algorithms block ciphers compatible with SSH version 1 or version 2 clients If your SSH v1 client cannot use Blowfish you must also enable DES Your SSH v2 client selects the enabled algorithm that provides the highest security If the client cannot use the default algorithms 3DES or Blowfish enable an AES algorithm that it can use AES 128 or AES 256 Option Description ssh host key Status indicates
77. n use wildcards so the system creates unique names and locations based on automatically detected data about the module to which the sensor is connected 1 Use filter settings to display the group of sensors to mass configure For information on setting filters see Tables 2 Click Mass Configuration Make selections then click Next Wu an TT N D N O c O a S 4 am N e M a o3 za 3 Enter data in fields If you chose Name or Location include wildcard characters as desired change to your system upon which a wildcard character was based for If wildcards are used during a mass configuration and then you make a example redefining the module location you will have to repeat the mass configuration for the affected sensors Wildcard Description Character m The identification number of the Expansion Module to which the sensor is connected or MM for all remote sensors or sensors connected to the Main Module p The port number from 1 to 6 for sensors connected to a universal sensor port or for remote sensors a number from 1 to 8 as defined by the remote sensor s DIP switch settings 1 The Location field of the module to which the sensor is connected 4 Click Apply then click Finish Outputs Tab Beacon page Use the beacon page to manage a beacon if installed When the beacon is on the Alarm Status will be Abnormal State and th
78. navigation menu or use an SNMP GET to the MIB II sysDescr OID Product Information Two Year Factory Warranty This warranty applies only to the products you purchase for your use in accordance with this manual Terms of warranty APC warrants its products to be free from defects in materials and workmanship for a period of two years from the date of purchase APC will repair or replace defective products covered by this warranty This warranty does not apply to equipment that has been damaged by accident negligence or misapplication or has been altered or modified in any way Repair or replacement of a defective product or part thereof does not extend the original warranty period Any parts furnished under this warranty may be new or factory remanufactured Non transferable warranty This warranty extends only to the original purchaser who must have properly registered the product The product may be registered at the APC Web site www apc com Wu U an TT T D N Ses O am O a S 4 am N n e M Eae e3 Z Exclusions APC shall not be liable under the warranty if its testing and examination disclose that the alleged defect in the product does not exist or was caused by end user s or any third person s misuse negligence improper installation or testing Further APC shall not be liable under the warranty for unauthorized attempts to repair or modify wrong or inadequate electric
79. nd valid responses available through Modbus To download the Modbus register map or any updates to this register map go to the APC Web site www apc com search by part number for NBRKO200 and click the link to the register map in the list of documentation Check the publication date at the start of the file For more information on Modbus see the Modbus Standard Library at www modbus org How to Reboot Reset Settings and Clear Alarms Administration gt General gt Reset Reboot Use the radio buttons and checkboxes on the Reset Reboot Network Interface page to perform the functions described below Exclude TCP IP Option Description Reboot Management Restarts the Main Module All configuration settings are retained Interface Reset All Resets all configuration settings to system defaults and clears all alarms Configuration settings and alarms include the following TCP IP Event Configuration Lost Communication Alarms Temperature Rate Of Change Alarms Module Configuration Including Identifier Numbers See the next row of this table for details Select this option to exclude TCP IP settings when the Reset All function is executed Reset Only TCP IP Event Configuration Lost Communication Alarms Temperature Rate Of Change Alarms Resets only the options below that you select Resets the TCP IP configuration method to DHCP amp BOOTP and all other TCP IP settings to system defaults For
80. ng tasks by first clicking the sensor name from the Temperature amp Humidity page to display sensor details Note that you can also display sensor details and perform the tasks in this section by clicking a sensor name anywhere in the Web interface when it is shown underlined To change a sensor s name or location Click the sensor name Change the Name and Location then click Apply The system assigns any detected sensors a default name For any remote sensors connected to A Link ports the default name includes Rem For sensors connected to universal sensor ports the default name includes the module to which the sensor is connected and the universal sensor port number For example Sensor Exp03 4 is a sensor connected to universal sensor port 4 of Expansion Module 3 To enable or disable alarm generation Click the sensor name Select or deselect the Enable checkbox then click Apply When alarm generation is enabled for a sensor the sensor reports an alarm for a threshold violation and the alarm is recorded in the event log When alarm generation is disabled the sensor continues to monitor the temperature of the surrounding air but does not generate an alarm if the temperature violates a threshold setting To configure a sensor s threshold or rate of change settings Click the sensor name Click Threshold Settings or Rate of Change Settings alter the settings see descriptions below then click Apply Threshold Settings
81. ng the port Connect the provided RS 232 configuration cable to the selected port and to the serial port at the Main Module Run a terminal program such as HyperTerminal and configure the selected port for 9600 bps 8 data bits no parity 1 stop bit and no flow control Press ENTER to display the User Name prompt Enter the Administrator user name and password apc by default for both From the Control Console menu select System then Tools then File Transfer then XMODEM and type Yes at the prompt to continue Select a baud rate change the terminal program s baud rate to match your selection and press ENTER A higher baud rate causes faster upgrades For a successful firmware upgrade you must first transfer the AOS file and then transfer the application file From the terminal program s menu select and transfer the binary AOS file using XMODEM CRC After the XMODEM transfer is complete set the baud rate to 9600 The Main Module automatically restarts Repeat siep 6 through step 11 to install the application module In step 11 use the application file name not the AOS file name How to Upgrade Multiple Main Modules Export configuration settings You can create batch files and use an APC utility to retrieve configuration settings from multiple Main Modules and export them to other Main Modules See Release Notes ini File Utility version 1 0 available on the NetBotz Rack Monitor 200 Utility CD
82. nts If you install an invalid certificate or if no certificate is loaded when you enable SSL the Main Module generates a default certificate a process which delays access to the interface for up to five minutes You can use the default certificate for basic encryption based security but a security alert message displays whenever you log on Add or Replace Certificate File Enter or browse to the certificate file created with the Security Wizard See Creating and Installing Digital Certificates in the Security Handbook on the NetBotz Rack Monitor 200 Utility CD to choose a method for using digital certificates created by the Security Wizard or generated by the Main Module Remove Delete the current certificate Console Administration gt Network gt Console gt options Option Description access Choose one of the following for access by Telnet or Secure SHell SSH e Disable Disables all access to the control console Enable Telnet the default Telnet transmits user names passwords and data without encryption e Enable SSH v1 v2 Do not enable both versions 1 and 2 of Secure SHell SSH unless you require both Security protocols use extensive processing power e Enable SSH v1 only SSH version 1 encrypts user names passwords and data for transmission There is little or no delay as you log on Enable SSH v2 only SSH version 2 transmits user names passwords and data in encrypted form with
83. o the end of the RADIUS server name or IP address 2 Users must be configured with Service Type attributes unless Vendor Specific Attributes VSAs are defined If no Service Type attributes are configured the user will have read only access on the Web interface only See your RADIUS server documentation for information about the RADIUS users file and see the APC Security Handbook for an example 3 Vendor Specific Attributes VSA can be used instead of the Service Type attributes provided by the RADIUS server VSAs require a dictionary entry and a RADIUS users file In the dictionary file define the names for the ATTRIBUTE and VALUE keywords but not for the numeric values If you change numeric values RADIUS authentication and authorization will fail VSAs take precedence over standard RADIUS attributes For examples of the RADIUS users file with VSAs and an example of an entry in the dictionary file on the RADIUS server see the APC Security Handbook Configuring a RADIUS server on UNIX with shadow passwords If UNIX shadow password files are used etc passwd with the RADIUS dictionary files the following two methods can be used to authenticate users e If all UNIX users have administrative privileges add the following to the RADIUS user file To allow only Device Users change the APC Service Type to Device DEFAULT Auth Type System APC Service Type Admin e Add user names and attributes to the RADIUS user file an
84. odbus configuration 88 register map 88 Module 2 Module configuration 33 Module View page 33 N NetBotz Rack Monitor 200 2 NetBotz Rack Sensor Pod 150 2 Network Time Protocol NTP 85 NMS IP Host Name for trap receivers 72 Notification 66 delaying or repeating 67 O Outputs beacons 42 relay output 43 switched outlet 44 Outputs tab 42 Override keyword user configuration file 95 Overview page 31 P Page by e mail 71 Passwords default for all account types 45 define for each account type 45 for data log repository 80 recover from lost password 6 shadow passwords with RADIUS on UNIX 49 Port speed configure for Ethernet 54 Ports FTP server 65 HTTP and HTTPS 57 RADIUS server 47 Telnet and SSH 59 Primary NTP Server 85 Proxy servers configure not to proxy the Main Module 17 disable use of 17 Q Quick links 23 configuration 90 R Rack Monitor 200 2 Rack Sensor Pod 150 2 RADIUS server configuration 48 settings 47 supported servers 49 RADIUS Server setting 47 Rate of change settings for sensors 38 Reboot Management Interface 89 Recipient SMTP server 71 Relay outputs configure 43 Remote Monitoring Service 90 Remote sensor 2 Remote users 46 authentication 46 set user access 48 Reset Only Event Configuration 89 Reset Only TCP IP to Defaults 89 Reset to Defaults 89 Reset to Defaults Except TCP IP 89 Reverse lookup 77 S SCP for high security file transfer 65 transfer firmware files 102 use to
85. ogged with the event Since domain names generally change less frequently than IP addresses enabling reverse lookup can improve the ability to identify addresses of networked devices that are causing events Data log Logs gt Data gt options Displaying and using the data log Logs gt Data gt log View a log that stores periodic measurements of the ambient temperature and relative humidity for each sensor managed by the Main Module and its Expansion Module Each entry is listed by the date and time the data was recorded e Displaying the data log You can view the data log as a page of the Web interface the default view or to see more of the data without scrolling click Launch Log in New Window from that page to display a full screen view of the log In your browser s options JavaScript must be enabled for you to use the Launch Log in New Window button Alternatively you can use FTP or Secure CoPy SCP to view the data log See Using FTP or SCP to retrieve log files e Filtering the log by date or time To display the entire data log or to change the number of days or weeks for which the log displays the most recent events select Last Select a time range from the drop down menu then click Apply The filter configuration is saved until the device restarts To display data logged during a specific time range select From Specify the beginning and ending dates and times for which to display data then click Apply The filte
86. omain name in the Domain Name field users can enter a host name in any field in the Main Module interface except e mail addresses that accepts a domain name Domain Name You need to configure the domain name here only In all other fields in the Main Module interface except e mail addresses that accept domain names the Main Module adds this domain name when only a host name is entered To override all instances of the expansion of a specified host name by the addition of the domain name set the domain name field to its default somedomain com orto 0 0 0 0 To override the expansion of a specific host name entry for example when defining a trap receiver include a trailing period The Main Module recognizes a host name with a trailing period such as mySnmpServer as if it were a fully qualified domain name and does not append the domain name Test Select test to send a DNS query that tests the setup of your DNS servers As Query Type select the method to use for the DNS query by Host the URL name of the server by FQDN the fully qualified domain name by IP the IP address of the server by MX the Mail Exchange used by the server e In the Query Question field identify the value to be used for the selected query type Query Type Selected Query Question to Use by Host the URL by FQDN the fully qualified domain name my_server my_domain by IP the IP address by MX the Mail Exchan
87. or SMTP Server and the From Address setting for SMTP You can use the To Address setting of the recipients option to send e mail to a text based pager N Saws O ie O a Q 4 am N E O aa g c3 69 N Baws O E G O wi S 4 am N oe O aa c3 SMTP Administration gt Notification gt E mail gt server Setting Description Local The IP address or if DNS is configured the DNS name of the local SMTP server ee NOTE This definition is required only when SMTP Server is set to Local when evel e mail recipients are being configured See E mail recipients Administration gt Notification gt E mail gt recipients From The contents of the From field in the format user P_address if an IP address is Address specified as Local SMTP Server or user domain com if DNS is configured and the DNS name is specified as Local SMTP Server in the e mail messages sent by the Main Module NOTE The local SMTP server s configuration may require that you use a valid user account on the server for this setting See the server s documentation for more information 70 E mail recipients Administration gt Notification gt E mail gt recipients Use this option to identify up to four e mail recipients Setting Description To Address Defines the user and domain names of the recipient To use e mail for paging use the e mail address for that
88. or a Network Management Card that you install the MAC address is on a label on the bottom of the card e For a network enabled device with an embedded Network Management Card the MAC address is on a label on the device e You can also obtain the MAC address from the Quality Assurance slip that came with the Network Management Card or device Run the Wizard to perform the configuration To discover and configure unconfigured Network Management Cards or network enabled devices over the network 1 From the Start menu launch the Wizard The Wizard detects the first Network Management Card or network enabled device that is not configured Select Remotely over the network and click Next gt Enter the system IP subnet mask and default gateway for the Network Management Card or device identified by the MAC address Click Next gt On the Transmit Current Settings Remotely screen if you select Start a Web browser when finished the default Web browser connects to the Network Management Card or device after the Wizard transmits the settings Click Finish to transmit the settings If the IP address you entered is in use on the network the Wizard prompts you to enter an IP address that is not in use Enter a correct IP address and click Finish If the Wizard finds another unconfigured Network Management Card or device it displays the screen to enter TCP IP settings Repeat this procedure beginning at step 3 or to skip t
89. or information on the available protocols and methods for setting up the type of security you need To use SCP to retrieve the files To use SCP to retrieve the event ixt file use the following command scp username hostname_or ip address event txt event txt To use SCP to retrieve the data txt file use the following command scp username hostname_or_ip address data txt data txt To use FTP to retrieve the files To use FTP to retrieve the event txt or data txt file 1 Ata command prompt type tp and the Main Module s IP address and press ENTER If the Port setting for the FTP Server option which you select on the Network menu of the Administration tab has been changed from its default value 21 you must use the non default value in the FTP command For Windows FTP clients use the following command including spaces For some FTP clients you must use a colon instead of a space between the IP address and the port number Etp gt open ip address port number To set a non default port value to enhance security for the FTP Server see FTP Server Administration gt Network gt FTP Server You can specify any port from 5001 to 32768 2 Use the case sensitive user name and password for Administrator or Device User to log on For Administrator apc is the default for user name and password For the Device User the defaults are device for user name and apc for password 3 Use the get command to transmit the text version of t
90. otz Rack Monitor 200 Utility CD and available on the APC Web site at www apc com APC supports the authentication and authorization functions of RADIUS Remote Authentication Dial In User Service e When a user accesses the Main Module with RADIUS enabled an authentication request is sent to the RADIUS server to determine the user s permission level e RADIUS user names used with the Main Module are limited to 32 characters Select one of the following e Local Authentication Only RADIUS is disabled Local authentication is enabled e RADIUS then Local Authentication RADIUS and local authentication are enabled Authentication is requested from the RADIUS server first If the RADIUS server fails to respond local authentication is used e RADIUS Only RADIUS is enabled Local authentication is disabled improperly identified or improperly configured you must use a serial connection to the control console and change the Access setting to Local Authentication Only or RADIUS then Local Authentication to regain access If RADIUS Only is selected and the RADIUS server is unavailable RADIUS Administration gt Security gt Remote Users gt RADIUS Use this option to do the following e List the RADIUS servers a maximum of two available to the Main Module and the time out period for each e Click Add Server and configure the parameters for authentication by anew RADIUS server e Click a listed RADIUS server to display
91. oubleshoot 24 A Link alarm 24 Device Disconnected alarm 26 Lost Comm alarm 26 problems logging on to Web interface 18 proxy server problems 17 Types of user accounts 5 U Up time on control console main screen 11 Update Interval Date amp Time setting 86 Update Using NTP Now Date amp Time setting 86 Upload event 99 URL address formats 19 User access identification control console main screen 11 User configuration files contents 95 customize 97 export system time separately 97 messages for undiscovered devices 100 override device specific values 95 retrieve and export 95 upload event and error messages 99 use file transfer protocols to transfer 98 using the APC utility to retrieve and transfer the files 96 106 User names define for each account type 45 maximum number of characters 45 maximum number of characters for RADIUS 46 V Verify firmware upgrades 107 W Watchdog features 7 Web browsers supported 17 Web interface Alarm Status page 35 basic navigation 21 Beacon page 42 configure access 57 Dry Contact Inputs page 40 Home tab 31 logon 17 logon error messages 19 Module View page 33 Overview page 20 31 quick links 23 Sensors tab 36 Switched Outlet page 44 System View page 32 URL address formats 19 APC Worldwide Customer Support Customer support for this or any other APC product is available at no charge in any of the following ways e Visit the APC Web site to access documents in the APC Knowledge B
92. port scheduled events configure the values directly in the ini file To export a system time with the greatest accuracy if the receiving Main Modules can access a Network Time Protocol server configure enabled for NTPEnable NTPEnable enabled Alternatively reduce transmission time by exporting the SystemDate Time section as a separate ini file To add comments start each comment line with a semicolon 2 Copy the customized file to another file name in the same folder The file name can have up to 64 characters and must have the ini suffix Retain the original customized file for future use The file that you retain is the only record of your comments Transferring the file to a single Main Module To transfer the ini file to another Main Module do either of the following e From the Web interface of the receiving Main Module select the Administration tab General on the top menu bar and User Config File on the left navigation menu Enter the full path of the file or use Browse e Use any file transfer protocol supported by Main Modules i e FTP FTP Client SCP or TFTP The following example uses FTP a From the folder containing the copy of the customized ini file use FTP to log in to the Main Module to which you are exporting the ini file ftp gt open ip address b Export the copy of the customized ini file to the root directory of the receiving Main Module ftp gt put filename ini Exporting the
93. r configuration is saved until the device restarts Q Enter the time using the 24 hour clock format e Deleting the data log To delete all data recorded in the log click Clear Data Log on the Web page that displays the log Deleted data cannot be retrieved Graphing the data log Logs gt Data gt graphing Use this option to display the logged data records in a graph enhancement JavaScript must be enabled in your browser Alternatively you can use FTP or SCP to import the data log into a spreadsheet application and then graph data in the spreadsheet For FTP and SCP instructions see Using FTP or SCP to retrieve log files How the graphing enhancement displays data and how efficiently it performs will vary depending on computer hardware computer operating system and the Web browser used to access the interface of the unit Reducing the number of data points or data lines being graphed may improve performance Data log graphing is an enhancement of the data log feature To use this Parameter Description Graph Data Graph up to 4 data items To graph multiple data items hold down the CTRL key or the Command key for Macintosh computers then select the data items that correspond to the abbreviated column headings in the data log Graph Time Specify the time period for which the data items will be graphed e Last Select the beginning time from which to graph the data records 2 4 or 8 hours ago 1 2 or 4 days
94. recipient s pager gateway account for example myacct1l00 skytel com The pager gateway will generate the page You can bypass the DNS lookup of the mail server s IP address by using the IP address in brackets instead of the e mail domain name For example use jsmith xxx xxx x xxx instead of jsmith company com This is useful when DNS lookups are not working correctly NOTE The recipient s pager must be able to use text based messaging SMTP Server Selects one of the following methods for routing e mail e Local Through the Main Module s SMTP server the recommended setting This option ensures that the e mail is sent before the Main Module s 20 second time out and if necessary is retried several times Also do one of the following e Enable forwarding at the Main Module s SMTP server so that it can route e mail to external SMTP servers Typically SMTP servers are not configured to forward e mail Always check with the administrator of your SMTP server before changing the configuration of the SMTP server to allow forwarding e Set up a special e mail account for the Main Module to forward e mail to an external mail account e Recipient Directly to the recipient s SMTP server On a busy remote SMTP server the time out may prevent some e mail from being sent because with this option the Main Module tries to send the e mail only once When the recipient uses the Main Module s SMTP server this setting has no ef
95. retrieve event or data log 82 Secondary NTP Server 86 Section headings user configuration file 95 Secure SHell 9 Security menu 45 Sensor humidity 36 temperature 36 Sensors tab 36 Serial Modbus See Modbus Setup initial 4 Severity Mapping Syslog setting 74 SMTP server select for e mail recipients 71 settings 70 SNMP access and access control SNMPv1 62 SNMPv3 63 authentication traps 72 disabling SNMPv1_ 61 SSH 9 client programs 60 encryption algorithms 59 host key 60 SSL certificates 58 configure cipher suites 58 Status control console main screen 12 Status symbols Web interface 20 Switched outlet 44 Switched Outlet page 44 Synchronize with NTP Server Date amp Time 85 Syslog identify the Syslog server and port 73 mapping event severity to Syslog priorities 74 settings 74 test 75 System Name 85 System view 32 System View page 32 T TCP IP configuration 50 restore default settings 89 TCP IP and communication settings 50 Telnet 8 Temperature scale Fahrenheit or Celsius 87 Temperature Humidity Sensors configure 36 mass configuration 38 40 rate of change 37 38 Terminology 2 Test DNS query 56 e mail recipient settings 71 RADIUS server path 47 Syslog 75 trap receiver 73 Threshold settings 37 temperature humidity sensors 36 Time setting 85 Time Zone for synchronizing with NTP server 86 Timeout setting for RADIUS 47 To Address E mail Recipients 71 Traps trap generation 72 trap receivers 72 Tr
96. rms are detected Name tThe name of the device Click the device name to view or configure its settings Location The physical location of the device Type tThe type of device connected to the system Module Name tThe name of the module to which the device is connected Click the name of a module to view or configure its settings Module View page Use the Module View page to view your system setup and to configure modules The Module View page displays the following information for each module in your system Status Critical a device connected to this module is reporting an alarm that requires immediate action Warning a device requires attention or Normal no device alarms are detected Module Name The name of the module Module ID MM for the Main Module For Expansion Modules the number displayed on the Identifier LED Location The physical location of the module You perform the following tasks by first clicking the module name from the Q Module View page to display module details Note that you can also display module details and perform the tasks in this section by clicking a module name anywhere in the Web interface when it is shown underlined To view details for a module Click the module name to view all devices connected to the module the module model and serial numbers and the module hardware and firmware versions Any temperature and humidity sensors connected to an A Link port will be Q
97. rolled Types of user accounts The Main Module has three levels of access Administrator Device User and Read Only User all of which are protected by user name and password requirements e An Administrator can use all of the menus in the Web interface and control console The default user name and password are both apc e A Device User can access only the following menus In the Web interface the menus on the Home Sensors and Outputs tabs and the event and data logs accessible under Events and Data left navigation menu options of the Logs tab In the control console the equivalent features and options The Device User account type is called Device Manager in the control console The default user name is device and the default password is apc e A Read Only User has the following restricted access Access through the Web interface only Access to the same tabs and menus as the Device User but without the capability to change configurations control devices delete data or use file transfer options Links to configuration options are visible but disabled and the event and data logs display no buttons to clear the logs or to open them in another window The default user name is readonly and the default password is apc Q You must use the Web interface to configure values for the Read Only User To set User Name and Password values for the three account types see Setting user access Administration gt Secur
98. rompt type telnet and the system IP address for the Main Module when the Main Module uses the default Telnet port of 23 and press ENTER For example telnet 198 168 6 133 32768 you must include a colon or a space depending on your OQ If the Main Module uses a non default port number from 5000 to Telnet client between the IP address and the port number 2 Enter the user name and password by default apc and apc for an Administrator or device and apc for a Device Manager SSH for high security access If you use the high security of SSL for the Web interface use Secure SHell SSH for access to the control console SSH encrypts user names passwords and transmitted data The interface user accounts and user access rights are the same whether you access the control console through SSH or Telnet but to use SSH you must first configure SSH and have an SSH client program installed on your computer Local access to the control console For local access to the control console use a computer that connects to the Main Module through the serial port on the front of the unit 1 Select a serial port at the computer and disable any service that uses the port 2 Connect the supplied serial cable APC part number 940 0103 from the selected port on the computer to the serial port on the front of the Main Module 3 Run a terminal program e g HyperTerminal on your computer and configure the selected port for 9600 bps 8 data bi
99. rowser see the PowerNet SNMP Management Information Base MIB Reference Guide which is provided on the NetBotz Rack Monitor 200 Utility CD Initial setup You must define the following three TCP IP settings for the Main Module before it can operate on the network e IP address of the Main Module e Subnet mask e IP address of the default gateway Do not use the loopback address 127 0 0 1 as the default gateway address for the Main Module Doing so disables the Main Module You must then log on using a serial connection and reset TCP IP settings to their defaults To configure the TCP IP settings see the NetBotz Rack Monitor 200 Installation and Quick Configuration Manual provided in printed form and in PDF form on the NetBotz Rack Monitor 200 Utility CD For detailed information on how to use a DHCP server to configure the TCP IP settings at the Main Module see TCP IP and Communication Settings Access priority for logging on Only one user at a time can log on to the Main Module to use its interface The priority for access beginning with the highest priority is as follows e Local access to the control console from a computer with a direct serial connection to the Main Module e Telnet or Secure SHell SSH access to the control console from a remote computer Web access either directly or through the InfraStruXure Central or InfraStruXure Manager See SNMP for information about how SNMP access to the Main Module is cont
100. s The Syslog servers record events that occur at network devices in a log that provides a centralized record of events This user s guide does not describe Syslog or its configuration values in detail See RFC3164 for more information about Syslog Identifying Syslog Servers Logs gt Syslog gt servers Setting Definition Syslog Uses IP addresses or host names to identify from one to four servers to receive Server Syslog messages sent by the Main Module Port The user datagram protocol UDP port that the Main Module will use to send Syslog messages The default is 514 the UDP port assigned to Syslog LLI o or T T gt N O c O a S 4 am N e M a o3 za Syslog Settings Logs gt Syslog gt settings Setting Definition Message Enables by default or disables the Syslog feature Generation Facility Selects the facility code assigned to the Main Module s Syslog messages User Code by default NOTE User best defines the Syslog messages sent by the Main Module Do not change this selection unless advised to do so by the Syslog network or system administrator Severity Maps each severity level of Main Module events to available Syslog priorities You Mapping should not need to change the mappings The following definitions are from RFC3164 e Emergency The system is unusable e Alert Action must be taken immediately
101. s display the status of each device connected to the Main Module or an Expansion Module Normal Warning or Critical is displayed Wu o oc TT N D N Shes O c O aw S 4 am N s e aa Eas o3 Z Control Console Menus How to use control console menus The menus in the control console list options by number and name To use an option type the option s number and press ENTER then follow any on screen instructions If you use an option that changes a setting or value select Accept Changes to save your changes before you exit the menu While using a menu you can also do the following Type and press ENTER to access brief menu option descriptions if help exists for the menu e Press ENTER to refresh the menu e Press ESC to go back to the menu from which you accessed the current menu e Press CTRL C to return to the main Control Console menu e Press CTRL D to toggle through the T H Sensors Input Sensors Outputs and Module Identification menus e Press CTRL L to access the event log N O c O a S 4 am N e M a o3 za Wu an TT N D N Saws O ie O a Q 4 am N E O aa g c3 Control console structure For menus that are not specific to the Main Module or Expansion Modules option names and location of options may be different from the Web interface These menu items are s
102. s for the NetBotz Rack Sensor Pod 150 NBPD0150 Terminology Below are key terms used throughout this document Familiarize yourself with the terminology below before reading further Expansion Module Term used throughout this document and in the software interface to refer to the Rack Sensor Pod 150 Main Module Term used throughout this document and in the software interface to refer to the Rack Monitor 200 module Term used to refer to either a Main Module and any Expansion Modules NetBotz Rack Sensor Pod 150 The actual name for the Expansion Modules NetBotz Rack Monitor 200 The actual name for the Main Module remote sensor Any sensor in the system connected to an A Link port system The Rack Monitor 200 and all connected sensors Rack Sensor Pod 150s and any other devices N O c O aw S 4 am N e M a 0 za Wu o an TT Y D N Saws O ie O a Q 4 am N E O aa g c3 Access Procedures Overview Two interfaces Web interface and control console provide menus with options that allow you to manage the Main Module For more information about the internal user interfaces see Control Console or Web Interface The Simple Network Management Protocol SNMP interface allows you to use an SNMP browser with the PowerNet Management Information Base MIB to manage the Main Module To use the PowerNet MIB with an SNMP b
103. s to include in the alarm Any selected device in its abnormal state activates the outlet 4 Click Apply N O c O a S 4 am N e M a o3 za Wu an TT N D Administration Security Local Users Setting user access Administration gt Security gt Local Users gt options You set the user name and password for each of the account types in the same manner The maximum length of the user name is 10 characters the maximum length of the password is 32 characters Blank passwords passwords with no characters are not allowed For information on the permissions granted to each account type Administrator Device User and Read Only User see Types of user accounts Wu o oc TT N gt N O am O wi Q 4 am N e aa ad e3 a Account Type Default User Name Default Password Permitted Access Administrator apc apc Web interface and control console Device User device apc Read Only User readonly apc Web interface only Remote Users Authentication Administration gt Security gt Remote Users gt Authentication Use this option to select how to administer remote access to this Main Module For information about local authentication authentication that can be administered without the centralized authentication provided by a RADIUS server see the Security Handbook provided on the NetB
104. t an interval of x time The notification is sent at the specified interval e g every 2 minutes Up to x times During an active event the notification repeats for this number of times Until condition clears The notification is sent repeatedly until the condition clears or is resolved Configuring by event To define event actions for an individual event 1 Select the Administration tab Notification on the top menu bar and by event under Event Actions on the left navigation menu 2 In the list of events review the marked columns to see whether the action you want is already configured By default logging is configured for all events 3 To view or change the current configuration such as recipients to be notified by e mail or paging or Network Management Systems NMSs to be notified by SNMP traps click on the event name If no Syslog server is configured items related to Syslog configuration are not displayed When viewing details of an event s configuration you can change the configuration enable or disable event logging or Syslog or disable notification for specific e mail recipients or trap receivers but you cannot add or remove recipients or receivers To add or remove recipients or receivers see the following e Identifying Syslog Servers Logs gt Syslog gt servers e E mail recipients Administration gt Notification gt E mail gt recipients Trap Receivers Administration gt Not
105. th the Main Module For either of these ports you can change the port setting to any unused port from 5000 to 32768 for additional security Users must then use a colon in the address field of the browser to specify the port number For example for a port number of 5000 and an IP address of 152 214 12 114 http 152 214 12 114 5000 https 152 214 12 114 5000 Option Description ssl cipher Enable or disable any of the SSL encryption ciphers and hash algorithms suites e DES A block cipher that provides authentication by Secure Hash Algorithm e RC4_MD5 enabled by default A stream cipher that provides authentication by MD5 hash algorithm e RC4_SHA enabled by default A stream cipher that provides authentication by Secure Hash Algorithm e 3DES A block cipher that provides authentication by Secure Hash Algorithm ssl Add replace or remove a security certificate certificate Status e Not installed A certificate is not installed or was installed by FTP or SCP to an incorrect location Using Add or Replace Certificate File installs the certificate to the correct location sec on the Main Module e Generating The Main Module is generating a certificate because no valid certificate was found Loading A certificate is being activated on the Main Module e Valid certificate A valid certificate was installed or was generated by the Main Module Click on this link to view the certificate s conte
106. the alarm Make sure the cable to the device input port has not been damaged Disconnect cables from one or both A Link ports on the Main Module Rack Monitor 200 as applicable Did the alarm go away No A hardware problem exists with the Rack Monitor 200 Yes Re connect cables to the A Link ports and continue this procedure Replace the device with a known good device Did the alarm go away No Replace the cable to the device input connector Yes The device that was removed was bad Software Interface Shows Err Use the following instructions if Err appears anywhere in the software interface This procedure requires you to troubleshoot your setup on site while monitoring the Web interface or control console See the NetBotz Rack Monitor 200 Installation and Quick Configuration Manual for local access to the control console if needed and for system setup details The NetBotz Rack Monitor 200 Installation and Quick Configuration Manual was provided with your Rack Monitor 200 and is also available on the APC Web site WwwW apc com Do you have one or more Temperature Sensors with Digital Display AP9520T or Temperature Humidity Sensors with Digital Display AP9520TH connected to your system No Contact APC Worldwide Customer Support for further assistance N O c O a S 4 am N e M a o3 za Wu an TT N D system
107. the status of the host key private key e SSH Disabled No host key in use When disabled SSH cannot use a host key e Generating The Main Module is creating a host key because no valid host key was found Loading A host key is being activated on the Main Module e Valid One of the following valid host keys is in the sec directory the required location on the Main Module A 1024 bit host key created by the APC Security Wizard A 768 bit RSA host key generated by the Main Module Add or Replace Browse to and upload a host key file created by the Security Wizard If you use FTP or Secure CoPy SCP instead to transfer the host key file you must specify the sec directory as the target location in the command To use the APC Security Wizard see the Security Handbook on the NetBotz Rack Monitor 200 Utility CD NOTE To reduce the time required to enable SSH create and upload a host key in advance If you enable SSH with no host key loaded the Main Module takes up to 5 minutes to create a host key and the SSH server is not accessible during that time Remove Remove the current host key To use SSH you must have an SSH client installed Most Linux and other UNIX platforms include an SSH client but Microsoft Windows operating systems do not SSH clients are available from various vendors SNMP SNMPv1 Administration gt Network gt SNMPv1 gt options All user names passwords and community names for SNMP are
108. tion Settings Retrieving and Exporting the ini File Summary of the procedure An Administrator can retrieve the ini file of a Main Module and export it to another Main Module or to multiple Main Modules 1 Configure a Main Module to have the settings you want to export 2 Retrieve the ini file from that Main Module 3 Customize the file to change at least the TCP IP settings 4 Use a file transfer protocol supported by the Main Module to transfer a copy to one or more other Main Modules For a transfer to multiple Main Modules use an FTP or SCP script or the APC ini file utility Each receiving Main Module uses the file to reconfigure its own settings and then deletes it Contents of the ini file The config ini file you retrieve from a Main Module contains the following e section headings and keywords only those supported for the device from which you retrieve the file Section headings are category names enclosed in brackets Keywords under each section heading are labels describing specific Main Module settings Each keyword is followed by an equals sign and a value either the default or a configured value e The Override keyword With its default value this keyword prevents the exporting of one or more keywords and their device specific values e g in the NetworkTCP IP section the default value for Override the MAC address of the Main Module blocks the exporting of values for the SystemIP SubnetMask Defau
109. tored in the data log and view the calculation of how many days of data the log can store based on the interval you selected When the log is full the older entries are deleted To avoid automatic deletion of older data enable and configure data log rotation described in the next section Configuring data log rotation Logs gt Data gt rotation Set up a password protected data log repository on a specified FTP server Enabling rotation causes the contents of the data log to be appended to the file you specify by name and location Updates to this file occur at the upload interval you specify Parameter Description Data Log Rotation Enable or disable the default data log rotation FTP Server Address The location of the FTP server where the data repository file is stored User Name The user name required to send data to the repository file This user must also be configured to have read and write access to the data repository file and the directory folder in which it is stored Password The password required to send data to the repository file File Path The path to the repository file N B O y O wi Q 4 or N aaa O an eos Parameter Description Filename The name of the repository file an ASCII text file Delay X hours The number of hours between uploads of data to the file between uploads Upload every X minutes The number of minutes between
110. ts no parity 1 stop bit and no flow control 4 Press ENTER repeatedly if necessary to display the User Name prompt 5 Enter your user name and password Main Screen Sample main screen Following is an example of the screen displayed when you log on to the control console at a Main Module American Power Conversion Network Management Card AOS VXXX c Copyright 2007 All Rights Reserved NetBotz 200 App VX X X Name myMgmt System Date 07 29 2007 Contact Eileen Jenson Time 10 06 10 Location Testing lab 1 User Administrator Up Time 0 Days 19 Hours 28 Minutes Stat P N A T H Sensors Normal Outputs Normal Input Sensors Normal Module Critical SS ase Ss Control Console ss sssssss sos ose sSe see sees Sess ss Sse esse sss css esessesses 1 Device Manager 2 Network 3 System 4 Logout lt ESC gt Main Menu lt ENTER gt Refresh lt CTRL L gt Event Log The module name appears only when an A Link Power Overload alarm exists N B O y O wi Q 4 or N aaa O an eos c3 a Information and status fields Main screen information fields Two fields identify the APC operating system AOS and application APP firmware versions The application firmware name identifies the type of device that connects to the network In the preceding example Sample main screen the application firmware for the Main Module NetBotz 200 App is displayed Network Management Card AOS VX
111. ule Rack Monitor 200 the Rack Sensor Pod 150 connected to the Main Module and other supported devices See Web Administration gt Network gt Web gt options for information on how to select enable and disable the protocols that control access to the Web interface and to define the Web server ports for the protocols Supported Web browsers You can use Microsoft Internet Explorer IE 5 5 and higher on Windows operating systems only Firefox version1 x by Mozilla Corporation on all operating systems or Netscape 7 x and higher on all operating systems to access the Main Module through its Web interface Other commonly available browsers also may work but have not been fully tested by APC your Web browser It is recommended however for optimal functioning of the Q To use the Web interface it is not required that you enable JavaScript for interface In addition the Main Module cannot work with a proxy server Therefore before you can use a Web browser to access the Web interface you must do one of the following e Configure the Web browser to disable the use of a proxy server for the Main Module e Configure the proxy server so that it does not proxy the specific IP address of the Main Module How to Log On Overview You can use the DNS name or System IP address of the Main Module for the URL address of the Web interface Use your case sensitive user name and password to log on The default user name diff
112. ult port number you obtained in step 2 in the FTP command e For Windows FTP clients separate a non default port number from the IP address by a space For example ftp gt open 150 250 6 10 21000 e Some FTP clients require a colon instead of a space before the non default port number Log on to the NetBotz Rack Monitor 200 as Administrator apc is the default user name and password For a successful firmware upgrade you must first transfer the AOS file and then transfer the application file Upgrade the AOS the file name you enter must match the name of the binary AOS file you extracted In the example below x s were substituted for version numbers ftp gt bin ftp gt put apc hwxx aos xxx bin When FTP confirms the transfer type quit to close the session After 20 seconds repeat step 6 through step 8 Upgrade the application file the file name you enter must match the name of the binary application file you extracted In the example below x s were substituted for version numbers ftp gt bin ftp gt put apc hwxx nb200 xxx bin When FTP confirms the transfer type quit to close the session Secure CoPy SCP 1 Download the latest firmware release for your NetBotz Rack Monitor 200 NBRK0200 from www apc com tools download 2 Create a directory to which you will extract the files 3 Double click the file you downloaded from the APC Web site and follow the prompts to extract the files to the folder cre
113. upper right corner of every page the Web interface displays the same icons to report the status of the devices connected to the Main Module The Normal icon if no alarms exist e One or both of the other icons Critical and Warning if any alarms exist and after each icon the number of active alarms of that severity To return to the Overview page to view a summary of the Main Module status including the active alarms click a quick status icon on any page of the interface Recent Device Events On the Overview page Recent Device Events displays in reverse chronological order the events that occurred most recently and the dates and times they occurred Click More Events to view the entire event log Help Click Help located in the upper right hand corner of the Web interface to view context sensitive information How to Use the Tabs Menus Tables and Links Tabs In addition to the tab for the Home page the following tabs are available Click a tab to display a set of menu options e Home view a summary of active alarm or warning conditions this tab is displayed at login Sensors view the status of temperature and humidity sensors and dry contact sensors and configure sensors for alarm conditions Outputs view the status of and configure the beacon relay output and switched outlet Logs view and configure event and data logs Administration configure security network connection notification and dev
114. ver Daylight Saving Administration gt General gt Date amp Time gt daylight saving Enable either traditional United States Daylight Saving Time DST or enable and configure a customized daylight saving time to match how Daylight Saving Time is implemented in your local area DST is disabled by default When customizing Daylight Saving Time DST If the local DST always starts or ends on the fourth occurrence of a specific weekday of a month for example the fourth Sunday choose Fourth Last If a fifth Sunday occurs in that month in a subsequent year the time setting still changes on the fourth Sunday If the local DST always starts or ends on the last occurrence of a specific weekday of a month whether it is the fourth or the fifth occurrence choose Fifth Last Format Administration gt General gt Date amp Time gt date format Select the numerical format in which to display all dates in this interface In the selections each letter m for month d for day and y for year represents one digit Single digit days and months are displayed with a leading zero Wu o or L N gt N O c O a S 4 am N e M a o3 za System Preferences Administration gt General gt Preferences Color coding events in the event log This option is disabled by default Select the Event Log Color Coding checkbox to enable color coding of alarm text recorded in the event lo
115. y name If you leave the default access control entry unchanged for a community that community has access to this device from any location on the network If you configure multiple access control entries for one community name the limit of four entries requires that one or more of the other communities must have no access control entry If no access control entry is listed for a community that community has no access to this device Community Name The name that an NMS must use to access the community The maximum length is 15 ASCII characters and the default community names for the four communities are public private public2 and private2 NMS IP Host Name The IP address IP address mask or host name that controls access by NMSs A host name or a specific IP address such as 149 225 12 1 allows access only by the NMS at that location IP addresses that contains 255 restrict access as follows e 149 225 12 255 Access only by an NMS on the 149 225 12 segment e 149 225 255 255 Access only by an NMS on the 149 225 segment e 149 255 255 255 Access only by an NMS on the 149 segment 0 0 0 0 the default setting which can also be expressed as 255 255 255 255 Access by any NMS on any segment Access Type The actions an NMS can perform through the community e Read GETS only at any time e Write GETS at any time and SETS when no user is logged onto the Web interface or control console Write GETS and SETS at any
Download Pdf Manuals
Related Search
Related Contents
UVR全りん分解試薬 使用法 lien vers notice Trixie Allora User's Manual The Eisbach User Manual - Isabelle Manuale di istruzioni IM FC405MB-MW-MS-IM notice BF OK RT3000 User Manual - Geo OM, Gardena, Programmateur electronic T 1030, Art 01805 Newscaster - Winnipeg Amateur Radio Club Copyright © All rights reserved.
Failed to retrieve file