724-746-5500 | blackbox.com
Pag e 11
Table of Contents
15.6.3 Installing the SSH Public/Private Keys (Clustering) .................................................................................286
15.6.4 Installing SSH Public Key Authentication (Linux) ...................................................................................286
15.6.5 Generating public/private keys for SSH (Windows) ...............................................................................288
15.6.6 Fingerprinting........................................................................................................................................290
15.6.7 SSH tunneled serial bridging .................................................................................................................290
15.6.8 SDT Connector Public Key Authentication ............................................................................................ 293
15.7 Secure Sockets Layer (SSL) Support ................................................................................................................... 293
15.8 HTTPS .............................................................................................................................................................294
15.8.1 Generating an encryption key ...............................................................................................................294
15.8.2 Generating a self-signed certificate with OpenSSL................................................................................294
15.8.3 Installing the key and certificate............................................................................................................294
15.8.4 Launching the HTTPS Server ................................................................................................................. 295
15.9 Power Strip Control ........................................................................................................................................... 295
15.9.1 The PowerMan tool .............................................................................................................................. 295
15.9.2 The pmpower tool ................................................................................................................................ 297
15.9.3 Adding new RPC devices ...................................................................................................................... 297
15.10 IPMItool ...........................................................................................................................................................298
15.11 Custom Development Kit (CDK) ..................................................................................................................... 301
15.12 Scripts for Managing Slaves ............................................................................................................................ 302
15.13 SMS Server Tools ............................................................................................................................................302
15.14 Multicast .........................................................................................................................................................303
15.15 Bulk Provisioning ............................................................................................................................................. 303
15.16 Zero Touch Provisioning .................................................................................................................................. 304
15.16.1 Preparation ...........................................................................................................................................304
15.16.2 Example ISC DHCP server configuration ...............................................................................................304
15.16.3 Setup for an untrusted LAN .................................................................................................................. 305
15.16.4 How it works ........................................................................................................................................ 305
APPENDIX A: Linux Commands & Source Code ............................................................................................................... 307
APPENDIX B: Hardware Specification ............................................................................................................................... 313
APPENDIX C: Safety & Certifications ................................................................................................................................ 314
APPENDIX D: Connectivity, TCP Ports & Serial I/O ........................................................................................................... 315
APPENDIX E: Terminology ................................................................................................................................................ 324