
Contents
vii
Setting the Date and Time.................................................................................................69
Setting Default Measurement Units...................................................................................73
Specifying the Device Altitude ...........................................................................................73
Setting Data Logging .........................................................................................................74
Configuring SMTP Settings ...............................................................................................75
Setting the EnergyWise Configuration ..............................................................................76
Rebooting the PXE Device ................................................................................................77
Resetting All Active Energy Readings...............................................................................77
Internal Beeper State.........................................................................................................78
User Management .......................................................................................................................78
Creating a User Profile ......................................................................................................78
Modifying a User Profile ....................................................................................................81
Deleting a User Profile.......................................................................................................82
Changing the User List View .............................................................................................82
Setting Up Your Preferred Measurement Units................................................................. 83
Setting Up Roles ..........................................................................................................................83
Creating a Role..................................................................................................................84
Modifying a Role................................................................................................................84
Deleting a Role ..................................................................................................................86
Changing the Role List View .............................................................................................86
Forcing HTTPS Encryption .......................................................................................................... 86
Access Security Control...............................................................................................................86
Configuring the Firewall.....................................................................................................87
Setting Up User Login Controls .........................................................................................93
Setting Up Role-Based Access Control Rules .................................................................. 97
Setting Up an SSL Certificate ....................................................................................................101
Certificate Signing Request .............................................................................................102
Creating a Self-Signed Certificate ...................................................................................104
Installing Existing Key and Certificate Files.....................................................................105
Downloading Key and Certificate Files............................................................................106
Setting Up External Authentication ............................................................................................106
Gathering the External Authentication Information..........................................................107
Adding Authentication Servers ........................................................................................108
Sorting the Access Order ................................................................................................112
Testing the Server Connection ........................................................................................ 112
Editing Authentication Server Settings ............................................................................112
Deleting Authentication Server Settings..........................................................................113
Disabling External Authentication....................................................................................113
Enabling External and Local Authentication Services.....................................................114
Outlet Management ...................................................................................................................114
Naming Outlets................................................................................................................114
Checking Outlet-Specific Data.........................................................................................115
Inlet and Overcurrent Protector Management ...........................................................................115
Naming the Inlet ..............................................................................................................116
Monitoring the Inlet ..........................................................................................................116
Naming Overcurrent Protectors.......................................................................................117
Resetting Inlet Active Energy Readings ..........................................................................117
Disabling an Inlet (for Multi-Inlet PDUs) ..........................................................................118
Setting Power Thresholds..........................................................................................................119
Setting Inlet Thresholds...................................................................................................119
Event Rules and Actions............................................................................................................121
Components of an Event Rule.........................................................................................121