
Contents
ix
Access Security Control.............................................................................................................159
Forcing HTTPS Encryption..............................................................................................159
Configuring the Firewall...................................................................................................159
Setting Up User Login Controls .......................................................................................166
Setting Up Role-Based Access Control Rules ................................................................ 170
Setting Up a TLS Certificate ......................................................................................................174
Certificate Signing Request .............................................................................................175
Creating a Self-Signed Certificate ...................................................................................177
Installing Existing Key and Certificate Files.....................................................................179
Downloading Key and Certificate Files............................................................................179
Setting Up External Authentication ............................................................................................180
Gathering the External Authentication Information..........................................................180
Adding Authentication Servers ........................................................................................182
Sorting the Access Order ................................................................................................186
Testing the Server Connection ........................................................................................ 186
Editing Authentication Server Settings ............................................................................187
Deleting Authentication Server Settings..........................................................................187
Disabling External Authentication....................................................................................187
Enabling External and Local Authentication Services.....................................................188
Outlet Management ...................................................................................................................188
Naming Outlets................................................................................................................188
Checking Outlet-Specific Data.........................................................................................189
Outlet Switching...............................................................................................................189
Setting the Default Outlet State .......................................................................................192
Changing the Cycling Power-Off Period..........................................................................194
Setting the Initialization Delay .........................................................................................196
Setting the Inrush Guard Delay .......................................................................................197
Setting the Outlet Power-On Sequence ..........................................................................198
Setting the Outlet-Specific Power-On Delay ...................................................................199
Setting Non-Critical Outlets and Load Shedding Mode...................................................199
No Support for Front Panel Outlet Switching ..................................................................202
Inlet and Overcurrent Protector Management ...........................................................................202
Naming the Inlet ..............................................................................................................203
Naming Overcurrent Protectors.......................................................................................203
Monitoring the Inlet ..........................................................................................................203
Monitoring Overcurrent Protectors ..................................................................................204
Resetting Inlet Active Energy Readings ..........................................................................206
Disabling an Inlet (for Multi-Inlet PDUs) ..........................................................................207
Setting Power Thresholds..........................................................................................................208
Setting Inlet Thresholds...................................................................................................208
Setting an Overcurrent Protector's Thresholds ...............................................................209
Bulk Configuration for Overcurrent Protector Thresholds ...............................................210
Setting Thresholds for Total Active Energy or Power......................................................211
Event Rules and Actions............................................................................................................213
Components of an Event Rule.........................................................................................213
Creating an Event Rule ...................................................................................................213
Sample Event Rules ........................................................................................................257
A Note about Infinite Loop ...............................................................................................260
Modifying an Event Rule..................................................................................................261
Modifying an Action .........................................................................................................263
Deleting an Event Rule or Action.....................................................................................263
A Note about Untriggered Rules......................................................................................264