EasyManua.ls Logo

Black Box LES1508A - Page 11

Black Box LES1508A
334 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
724-746-5500 | blackbox.com
Pag e 11
Table of Contents
15.6.3 Installing the SSH Public/Private Keys (Clustering) .................................................................................286
15.6.4 Installing SSH Public Key Authentication (Linux) ...................................................................................286
15.6.5 Generating public/private keys for SSH (Windows) ...............................................................................288
15.6.6 Fingerprinting........................................................................................................................................290
15.6.7 SSH tunneled serial bridging .................................................................................................................290
15.6.8 SDT Connector Public Key Authentication ............................................................................................ 293
15.7 Secure Sockets Layer (SSL) Support ................................................................................................................... 293
15.8 HTTPS .............................................................................................................................................................294
15.8.1 Generating an encryption key ...............................................................................................................294
15.8.2 Generating a self-signed certificate with OpenSSL................................................................................294
15.8.3 Installing the key and certificate............................................................................................................294
15.8.4 Launching the HTTPS Server ................................................................................................................. 295
15.9 Power Strip Control ........................................................................................................................................... 295
15.9.1 The PowerMan tool .............................................................................................................................. 295
15.9.2 The pmpower tool ................................................................................................................................ 297
15.9.3 Adding new RPC devices ...................................................................................................................... 297
15.10 IPMItool ...........................................................................................................................................................298
15.11 Custom Development Kit (CDK) ..................................................................................................................... 301
15.12 Scripts for Managing Slaves ............................................................................................................................ 302
15.13 SMS Server Tools ............................................................................................................................................302
15.14 Multicast .........................................................................................................................................................303
15.15 Bulk Provisioning ............................................................................................................................................. 303
15.16 Zero Touch Provisioning .................................................................................................................................. 304
15.16.1 Preparation ...........................................................................................................................................304
15.16.2 Example ISC DHCP server configuration ...............................................................................................304
15.16.3 Setup for an untrusted LAN .................................................................................................................. 305
15.16.4 How it works ........................................................................................................................................ 305
APPENDIX A: Linux Commands & Source Code ............................................................................................................... 307
APPENDIX B: Hardware Specification ............................................................................................................................... 313
APPENDIX C: Safety & Certifications ................................................................................................................................ 314
APPENDIX D: Connectivity, TCP Ports & Serial I/O ........................................................................................................... 315
APPENDIX E: Terminology ................................................................................................................................................ 324

Table of Contents

Other manuals for Black Box LES1508A

Related product manuals