Vertiv - Intellislot - Rdu101 (User Guide)
Vertiv - Intellislot - Rdu101 (User Guide)
Liebert®
IntelliSlot™ RDU101™ Communications Card
Installer/User Guide
The information contained in this document is subject to change
without notice and may not be suitable for all applications. While
every precaution has been taken to ensure the accuracy and
completeness of this document, Vertiv assumes no responsibility
and disclaims all liability for damages resulting from use of this
information or for any errors or omissions. Refer to other local
practices or building codes as applicable for the correct methods,
tools, and materials to be used in performing procedures not
specifically described in this document.
1 Introduction 1
1.1 Support for Liebert® SN Sensors 1
2 Installation 3
2.1 Installing the Card 4
2.1.1 Connecting Directly to Computer for Configuration 4
2.1.2 Determining the DHCP IP Address 5
2.1.3 Assigning a Static IP Address 6
2.2 Change User Names and Passwords Immediately 6
2.3 Configure the Card 6
2.4 Installing Multiple Cards in a System 7
2.5 Security Best Practices 7
3 Enable Communication Protocols 11
3.1 Enable the Protocol 11
3.1.1 Enable SNMP 11
3.2 Download Protocol Mappings 14
4 UNITY Web-page Layout 15
4.1 Web Page Sections 15
4.2 Help Text 16
4.3 Managed-device Tab Menu 17
4.4 Communications Tab Menu 17
4.5 Sensor Tab Menu 18
4.5.1 Sensor-tab Summary Page 19
4.5.2 Sensor-tab Summary Details Pane 19
4.5.3 Changing Sensor Order 20
5 Editing the Card Configuration 21
5.1 Communications-tab Menu Folders 21
5.2 Active Events Folder 21
5.3 Downloads Folder 21
5.4 Configuration Folder 22
5.4.1 System Folder 22
5.4.2 Local Users Folder 23
5.4.3 Remote Authentication Folder 23
5.4.4 Network Folder 29
5.4.5 Web Server Folder 32
5.4.6 LIFE™ Folder 36
5.4.7 Remote Services Folder 37
5.4.8 Velocity Protocol Folder 40
5.4.9 Messaging Folder 40
5.5 Protocols Folder 44
5.5.1 SNMP Folder 44
Each card employs the Velocity Protocol to monitor and manage a wide range of operating parameters,
alarms, and notifications. The card communicates with Building Management Systems and Network
Management Systems via SNMP and LIFE/Remote Services.
ITEM DESCRIPTION
3 Status LED
4 USB port
1 Introduction 1
This page intentionally left blank
WARNING! Risk of electric shock. Can cause equipment damage, injury or death.
Open all local and remote electric power supply disconnect switches and verify with a voltmeter
that power is off before working within any electric connection enclosures.
Service and maintenance work must be performed only by properly trained and qualified
personnel and in accordance with applicable regulations and manufacturers’ specifications.
Opening or removing the covers to any equipment may expose personnel to lethal voltages
within the unit even when it is apparently not operating and the input wiring is disconnected
from the electrical source.
NOTICE
Risk of improper installation. Can cause equipment damage. Only a qualified service
professional should install these products. We recommend that a Vertiv™ technician perform
the installation in large UPS system. Contact Vertiv™ at https://www.vertivco.com/en-
us/support/.
NOTICE
Risk of duplicate node IDs if two or more RDU101 cards are installed. Can cause network
conflicts.
An internal networking conflict will occur within a device when multiple communication cards
with duplicate Node IDs are installed in the device.
Each RDU101 card must have a unique node ID. This will not be a problem if only one card is
installed on your system. Duplicate node IDs are easily averted with the procedure detailed in
Installing Multiple Cards in a System on page 7.
NOTE: Restarting the RDU101 card will not restart the managed device.
2 Installation 3
2.1 Installing the Card
The RDU101 card may be installed at the factory or field-installed.
To perform a field installation:
1. Find the IntelliSlot bay on your equipment—It may have a plastic cover.
2. Insert the card into the bay.
NOTE: The card will only fit one way in the bay because the circuit board is not centered on the
faceplate. The slot in the bay also is not centered.
3. Secure the card with the screws used for the cover plate.
4. Connect an active Ethernet cable to the card’s Ethernet RJ-45 port.
5. Allow about 1 minute for the card to acquire an address if connecting to a DHCP network.
6. If using a DHCP network and the DHCP address is known, browse to the address and configure
the card as needed. You may need to contact your network administrator to obtain the DHCP
address. When contacting the administrator, please provide the MAC address from the label on
the card faceplate.
7. Depending on the type of address that you are using, proceed to:
• Assigning a Static IP Address on page 6, to configure a static IP
-or-
• Determining the DHCP IP Address on the facing page, to determine the DHCP address
via a direct computer connection.
2.1.1 Connecting Directly to Computer for Configuration
Before you can make any configuration changes like configuring the static-IP settings, you must access
the card's web server via Ethernet.
To connect to the card:
If necessary, use the Windows Command Prompt to verify the computer's IP-address settings:
• Press the Windows key+R, and enter cmd, and click OK.
• Type ipconfig /all and press Enter, then verify the following, see Figure 2.1 on the facing
page:
ITEM DESCRIPTION
1 Autoconfiguration Enabled
3 Subnet Mask
If the DHCP administrator is not available or if there is not a convenient way of determining the IP address
assigned by the DHCP server, use a computer with a direct Ethernet connection to the card, and the
Autoconfiguration IPv4 Address convention described in Connecting Directly to Computer for
Configuration on the previous page, to access the card’s Web page.
To see the card’s last DHCP-assigned IP address:
1. Click the Communications tab, then on the left-side menu, select Support > Active Networking.
2. Check the Last DHCP/BOOTP Address field, which shows the last IP address assigned by the
DHCP server. The card may retain that IP address when it reconnects to the DHCP network
because most DHCP systems reuse the same IP address for the same device.
2 Installation 5
2.1.3 Assigning a Static IP Address
To assign a static IP address:
The factory-default administrator user is "Local Users [1]" with the user name Liebert and default
password Liebert (both case-sensitive).
The factory-default general user is "Local Users [2]" with the user name User and default password User
(both case-sensitive).
To change the user names and passwords, see the steps in Local Users Folder on page 23.
Before beginning installation of a second RDU101 card, verify that the first card functions properly.
If the first card is an IntelliSlot card, but not an RDU101 card, and if both cards connect to the same
Ethernet network, then you should disable the router function on the first card. This will avoid circular
routes. Follow instructions in the user manual for the first card.
If the first and second cards are both RDU101 cards, steps must be taken to avoid duplicate Velocity
Protocol MSTP node IDs. By default, the two cards would use the same node ID, and one or both cards
would report a duplicate node error and fail to communicate with the system.
The default node ID for an RDU101 card is 0, so the second card should use 1. A third card should use 2. A
fourth card should use 100 to 127. Contact your system administrator about the proper node ID for the
second card, then perform the following steps.
2 Installation 7
Table 2.1 below, provides a list of items to review. Each should be reviewed, configured based on the
operational needs for managing the equipment, and verified that the settings support the desired
operational functionality without adding unnecessary or unauthorized access to critical infrastructure
equipment. A reference to the proper section in this document is provided for configuring each item.
For added security, the local network firewall and gateway may be restricted to allow only the necessary
traffic on the required network ports. The ports used by the RDU101 card are listed in the following table.
Some port settings may be changed by the administrator.
SNMP UDP 161, 162 Yes Only trap port 162 may be changed
Details for configuration of all options are provided in the remainder of this guide.
2 Installation 9
This page intentionally left blank
NOTE: Some building-management systems (BMS) can be configured to send continuous updates for
device setpoints, usually setting the same value. The BMS should be configured to send, on a
sustained average, no more than two writes per second to the device. This will allow the device to catch
up after a burst of updates when necessary, while allowing other communication with the device to
proceed.
The required changes vary according to the type of SNMP protocol used:
By default, the Engine ID is automatically generated using the MAC address. Optionally, you can select a
text-based ID instead.
NOTE: If the format type or text for the Engine ID are incomplete or invalid, the Engine ID is generated
based on the MAC Address.
NOTE: The settings must be made for each user who will receive notifications.
1. On the Communications tab, select Protocols > SNMP > SNMPv1 Trap (20).
NOTE: The settings must be made for each user who will receive notifications.
NOTE: Selecting the SNMPv1/v2c Access folder, displays only the settings that are available for
configuration.
The SNMP MIB files are available for download from the www.vertivco.com.
NOTE: The Edit button is grayed-out if the settings on a menu cannot be changed.
• Identification panel
• Status panel
• Tab-menu panel
• Detail area
Managed-device tab displays information about the monitored and controlled equipment. Refer to Managed-device Tab
1
Menu on the facing page for details. The tab label names the type of Liebert® unit in which the card is installed.
Communications tab displays information about the card, such as the overall event status of the equipment and
2 communication interface, logs of third-party information, communication settings, third-party protocol settings and system
status. Refer to Communications Tab Menu on the facing page for details.
Details area displays detailed information about the device based on the tab-menu selection. Edits to the device and its
3
configuration are made in this section.
Selected-tab menu. By default, the Web UI always displays two tabs, the managed-device tab and the Communications tab.
4
A third tab, the Sensor tab, appears if Liebert® SN sensors have been installed.
Status panel displays the status of the monitored equipment, the RDU101 card, and any Liebert® SN sensors connected to
5
the card.
6 Identification panel displays the System Name, System Location, and System Description.
Event Normal
Event Information
Event Alarm
Event Warning
Event Critical
Tool Tip
When Liebert® SN sensors are installed and connected to the sensor port on the card, the Sensor tab
appears.
ITEM DESCRIPTION
4 Icons indicate sensor status readings for example: cable fault or door open/closed depending on sensor function.
Displays a list of currently discovered sensors, with their status and values. Also displays a
Summary
detail section about the sensor that is currently selected
Active Events Displays a list of sensor events that are currently active.
Displays a list of text files that can be downloaded. The files available are dependent on
Downloads
the current state of the card.
Lists events showing sensors that have been added or removed. If the list has any
entries, an Acknowledge button appears. Clicking the Acknowledge button clears the
Sensor Change
list. The Acknowledge button on this page has the same behavior as the Acknowledge
button on the Sensor Server page.
Displays a list of sensors, and allows setting the order in which the sensors are displayed
Sensor Order
on the Summary page.
Selecting a sensor permits changing its settings at the lower part of the window.
• Temperature
• Humidity
• Door Closure
• Contact Closure
• Leak Detection
When a sensor is selected, the details for that sensor display in this pane. The content of the details
section is specific to the type of sensor selected. For example, a temperature sensor shows the
temperature readings and a door sensor shows whether or not the door is open.
The Unit of Measure used for temperature values is defined in the Display Temperature Units setting on
the Communications tab. See System Folder on page 22.
Details for the sensors include the current state or reading, event status and whether the reading is
above or below the threshold established in the Settings pane.
URL, Hostname, or IP address of the primary NTP time source. 64-character maximum.
URL, Hostname, or IP address of the back-up NTP time source. 64-character maximum.
The rate at which time will be synchronized with the Network Time Protocol server, if NTP is the
external time source.
Time Zone
Rate at which time will be written to the managed device, if an external time source has been
selected.
No Access None The No Access level is enforced when "Password Protected Site" is enabled.
Able to edit settings using the assigned password, which is always required to edit
settings/configuration.
Administrator Read/Write By default, Local User [1] is Liebert with the default password Liebert (both are case-sensitive). The
Authorization (access type) for Local User [1] is "Administrator." Be sure that you always have one
administrator user, so you can access and modify configuration and other settings.
IMPORTANT! Record user names and passwords and save them in a secure place where they can be
found if forgotten. A lost password cannot be retrieved from the card. If the administrator password is
lost, the card must be reset to factory defaults and reconfigured.
To change the user names and passwords:
NOTE: 30-character maximum. All printable characters are valid except: \ : ’ < > ~ ? " #
1. On the Communications tab, select Configuration > Local Users, then select the folder of the
user to configure.
2. Click Edit and enter the administrator user name and password, then click OK.
3. Enter a new user name and password.
4. Re-enter the password to confirm it.
5. In Authorization for User, select the type of access, see Table 5.1 above.
6. Click Save to confirm the changes or Cancel to discard them.
RADIUS Authentication
Authentication and authorization is provided by the remote RADIUS server.
RADIUS Settings
[Enable/Disable selection]
Secret
The shared secret that serves as a password between the client and the server.
Timeout
Retries
Number of times to attempt contact before trying a different server. Range: 0 to 65535
unity_group=unityadmin;
– or –
unity_group=unityuser;
• The attributes are in a config file or a GUI interface depend on the authentication server
implementation.
• The unity_group=unityuser; can be used in the same manner as unity_group=unityadmin; .
• The unity_group=unityadmin; and unity_group=unityuser; string must be terminated with a
semicolon.
NOTE: If you are using an out-of-the-box Linux OpenLDAP installation, you must add the
"Info" attribute to specify the RDU101-group authorization, or the LDAP authorization will not work.
See Adding "Info" Attribute to LDAP Schema for Linux OpenLDAP on the next page.
LDAP Settings
[Enable/Disable selection]
LDAP Server
LDAP Base
LDAP Secure
SSL mode.
Database UserName
Bind Distinguished Name, the service account used to access the LDAP server.
Database Password
Password for the service account that accesses the LDAP server.
Login Attributes
unity_group=unityadmin;
– or –
unity_group=unityuser;
• The attributes are entered into a config file or a GUI interface depending on the authentication
server implementation.
• The unity_group=unityuser; can be used in the same manner as unity_group=unityadmin; .
• The unity_group=unityadmin; and unity_group=unityuser; string must be terminated with a
semicolon.
The RDU101 card obtains group authorization information from a remote LDAP server for an LDAP user
via the “Info” attribute in the user’s remote LDAP user account. The “Info” attribute specifies group
authorization using “unity_group=<x>;” where <x> is “unityadmin” or “unityuser”. However, the user
account of an out-of-the-box Linux OpenLDAP installation does not provide the “Info” attribute so remote
LDAP support will not work until support for the “Info” attribute is added to LDAP user accounts.
The LDAP schema for a Linux OpenLDAP installation is defined and exists at “/etc/ldap/schema.” The
LDAP schema for a user account exists in the “nis.ldif” file and is specified in an objectClass named
“posixAccount.”
Add the the “Info” attribute as a member of “posixAccount” MUST attribute so that it is always considered
for specifying for a user. The “Info” attribute already exists in the LDAP schema, but it is not assigned to
anything in the default schema.
To add the "Info" attribute on a brand new OpenLDAP installation:
Before starting OpenLDAP, refer to the following to edit the “nis.ldif” file:
Use “ldapmodify” or other LDAP administrator tool to add the “Info” attribute to the user accounts.
TACACS+ Settings
[Enable/Disable selection]
Secret
The shared secret that serves as a password between the client and the server.
Timeout
Retries
Version
Minor version.
The config file contains the unity_group=unityadmin; string in the raccess field.
user = tacacsAdmin {
service = raccess {
unity_group=unityadmin;
– or –
The config file contains the unity_group=unityuser; string in the raccess field.
user = tacacsAdmin {
service = raccess {
unity_group=unityuser;
• The attributes are in a config file or a GUI interface depend on the authentication server
implementation.
• The unity_group=unityuser; can be used in the same manner as unity_group=unityadmin; .
• The unity_group=unityadmin; and unity_group=unityuser; string must be terminated with a
semicolon.
[Enable/Disable selection]
Server (Realm)
Domain Name
Speed Duplex
Selects the speed and duplex configuration of the card’s Ethernet port. It is set to Auto by default. If
it requires changing, contact the system administrator for the proper settings.
Hostname
Listing of domain name suffixes for resolution of host names. If it requires changing, contact the
system administrator for the proper setting.
Telnet Server
Enables/Disables telnet access to the card to prevent unauthorized changes. The default setting
disables telnet access.
SSHv2 Server
Enables/Disables SSHv2 (Secure SHell) access to the card to prevent unauthorized changes. The
default setting disables SSHv2 access.
IPv4 Settings
IPv4 Protocol
IP Address Method
Mode the card boots into to be a network ready device (Static, DHCP, BootP). Default = DHCP.
Static IP Address
Subnet Mask
Network mask for the interface which divides a network into manageable segments
Default Gateway
IP address of the gateway for network traffic destined for other networks or subnets
IPv6 Settings
IPv6 Protocol
IP Address Method
Mode the card boots into to be a network ready device (Static, Auto). Default = Auto.
Static IP Address
Prefix Length
Prefix length for the address that divides a network into manageable segments.
IP address of the gateway for network traffic destined for other networks or subnets. Default = 64.
Type of Query
Query Value
Value for the domain name server (DNS) to resolve. Example: gxtwebdemo.liebert.com
SSDP Settings
Receive M-SEARCH
Send NOTIFY
NOTIFY Destination
Selects the type of destination address, multicast or a specific network address, for the Notify
message.
NOTIFY IP ADDRESS
NOTIFY Rate
Select the operation mode of the Web Server (HTTP, HTTPS). Default = HTTP.
HTTP Port
Standard web port not encrypted. Required if HTTP is enabled as Web Server Protocol. Default = 80.
HTTPS Port
Standard secure Web port; all communication is encrypted. Required if HTTPS is enabled as Web
Server Protocol. Default = 443.
When enabled, a log-in session is required before any device information is displayed to the user.
User level credentials will allow only viewing of device information. Administrator level credentials are
required to make any changes.
When enabled, all web browsers have write access to data on all card web pages when the user is
logged-in with Administrator credentials. When disabled, write access is restricted to web browsers
connected via IPv4 Auto-configuration address at 169.254.24.7. For additional information, see
Connecting Directly to Computer for Configuration on page 4.
NOTE: When Remote Write Access is disabled, an indicator is displayed in the upper right corner of the
web page as a reminder, shown in the following figure.
NOTE: Only disable remote-write access if you are absolutely sure that you do not need to administer
the managed device or the Unity card through a remote web-browser session. A local direct connection
to 169.254.24.7 is required to enable this setting.
The interval the software will wait before logging off a user unless there is user activity (Default is 5
min.)
Certificate Folder
When the Web Server Protocol is configured to use HTTPS communications, all web-server
communication with all browsers is encrypted and validated based upon the security algorithms and
validity checks specified in the SSL certificate that is currently-installed in the card. By default, the card
generates its own unique, self-signed SSL certificate when it is first powered up. However, many
installations want to install and use SSL certificate files that were generated by their own Certificate
Authority (CA).
Selections in Certificate provide commands to Upload SSL Certificate PEM Files or Generate Self-Signed
SSL Certificate.
Certificate Commands
Uploads and installs a PEM-encoded SSL key file and certificate file that were generated by a
trusted Certificate Authority and that conform to the Apache mod_ssl module’s SSL
CertificateKeyFile and SSLCertificateFile directives. See Uploading SSL Certificate PEM Files on
page 35.
Generates and installs a new self-signed certificate based on the mode selected for Generate Self-
Signed SSL Certificate Mode. See Generating a Self-signed SSL Certificate on page 35.
• Use Default Values = the values used in place of the user-configurable fields are the same as
those used when the original SSL certificate was generated by the card on first power-up. The
default values are not displayed.
• Use Configured Settings = the user-entered values in the configurable fields are used to
generate the certificate.
NOTE: When using configured settings, all of the configurable fields, described below, must have an
entry to successfully generate a certificate.
Common Name
Fully-qualified domain name that browser clients will use to reach the card’s web server when it is
running with the certificate generated with the name entered here.
Organization
Organizational Unit
Organizational unit or company division of the organization identified as the owner of the generated
certificate.
City or Locality
City or locality of the organization identified as the owner of the generated certificate.
State or Province
State or province of the organization identified as the owner of the generated certificate.
Country Code
Country-code (2-letter abbreviation) of the organization identified as the owner of the generated
certificate.
Email Address
Email-address of the contact within the organization identified as owner of the generated certificate.
1. On the Communications tab, select Configuration > Web Server > Certificate.
2. In Commands, click Enable, then click Upload next to Upload SSL Certificate PEM Files.
The upload dialog opens. See the following figure.
3. Follow the instructions in the dialog to select and upload the appropriate files.
Figure 5.2 Upload SSL Key & Certificate PEM Files dialog
1. On the Communications tab, select Configuration > Web Server > Certificate.
2. In the Settings section:
a. Click Edit.
b. In Generate Self-Signed SSL Certificate Mode, select the mode to use.
• If you select User Configured Settings, make entries in all of the configurable-value fields
(required), then click Save.
The LIFE subfolder contains settings that affect use of the Vertiv™ LIFE Technology, a remote monitoring
and diagnostic service for Vertiv™ units. The LIFE settings are for use by trained Vertiv™ personnel only
and require no user changes. The following tables provide reference information about the LIFE settings.
For support, contact Vertiv™ Technical Support for LIFE Services at 1-800-435-7250, option 3.
Enable Date and Time The date and time that LIFE Technology support was enabled.
Settings Description
When enabled, A user configured System Serial Number will override a Serial Number configured
System Serial Number Override
in the device ,
System Serial Number System serial number, obtained from the unit automatically
Answer Incoming Call Enable answering of LIFE Watch Station incoming calls
Next Call Date and Time Date and Time of next call to make to the LIFE Watch Station server
Call Interval Days Days between routine calls to LIFE Watch Station
Call Interval Hours Number of hours between LIFE Watch Station routine calls
Number of minutes between routine LIFE Watch Station calls. This value is used in conjunction
Call Interval Minutes
with val_life_callInterval_hours.
Call Trials Number The number of attempts to retry a call after it fails before rescheduling the call.
Primary Mains Restored SMS Send SMS when Primary Mains are restored
Primary Mains Restored SMS Value Value sent via SMS when Primary Mains are restored
Primary Mains Failure SMS Send SMS when Primary Mains fail
Primary Mains Failure SMS Value Value sent via SMS when Primary Mains fail
Bypass Mains Fail SMS Send SMS when Bypass Mains fail
Bypass Mains Failure SMS Value Value sent via SMS when Bypass Mains fail
The amount of time to delay sending an SMS after a Load is on Bypass if the condition
Load On Bypass SMS Delay
still exists.
Serial number obtained from the managed device. Identifies the device to the system unless Device
Serial Number Override is enabled.
Enables/Disables use of the serial number obtained from the managed device.
Site Identifier
Device Instance ID
Test Connectivity
URL address of the remote-service platform. Do not enter the "http://" or "https://" prefix.
Length of time to attempt reconnection in the event of a communication failure. Range: 30 to 600
seconds.
Proxy Enable
Proxy Address
URL address of the remote-service cloud. Do not enter the "http://" or "https://" prefix.
Communication Status
Most-recent communication error message since reboot with date and time stamp.
Details about the remote-service rule file in effect for the monitored device.
NOTE: With the exception of changing the node ID when multiple cards are used or when disabling
Velocity-Protocol IP access, the settings in the Velocity Protocol sub-folders should not be modified
unless directed by a Vertiv™ representative.
When disabled, prevents access from a remote, IP-based system using the Velocity Protocol. Default
= Disabled.
Messaging options
SMS
Email
Selections in Email determine how the card sends emails about events.
Email Settings
Sender’s email address. In most cases this will be the email address of the person to whom replies
should be sent. Example [email protected]
Email To Address
Email address of the recipient. Multiple email addresses are separated by a semicolon.
Subject of the email. This value will default to the event description, unless customized by entering
Custom Subject Text.
The editable subject of the message. Defaults to event description if nothing is entered.
Fully-qualified domain name or IP address of the server used for relaying email messages.
NOTE: If using a server name, a DNS server may need to be configured under Network Settings.
SMTP Connection
SMTP server connection type. Determines the capabilities of the SMTP server. Options are:
SMTP Authentication
Enable or disable email SMTP authentication. An email account must be provided for the SMTP
service provider to authenticate.
NOTE: Some email servers may require account-configuration changes to allow communication with
the RDU101 card. For example, Gmail only recognizes Google applications as being secure. However,
they provide an account setting that allows authentication with what they consider “less-secure apps.”
Please see your network administrator or service provider for configuration details.
SMTP Username
Username of the email account to use when email SMTP authentication is enabled.
SMTP Password
Password for the email account to use when email SMTP authentication is enabled.
If checked, the IP Address of the agent card will be included in outgoing messages.
If checked, a Web link to the agent card and Web Server listening port number will be included in
outgoing messages.
If Event Consolidation is enabled, a message will be sent when 'Consolidation Time Limit' in seconds
has passed since the first buffered event was received.
If Event Consolidation is enabled, a message will be sent when the number of buffered events
reaches the ‘Consolidation Event Limit.’
SMS
Selections in SMS determine how the card sends text messages about events.
SMS Settings
Sender’s SMS address. In most cases this will be the SMS address of the person to whom replies
should be sent. For example: [email protected]
SMS To Address
SMS address of the recipient. Multiple SMS addresses are separated by a semicolon.
Subject of the SMS. Defaults to the event description unless customized using Custom Subject Text.
The editable subject of the message. Defaults to event description if nothing is entered.
Fully-qualified domain name or IP address of the server used for relaying SMS messages.
NOTE: If using a server name, a DNS server may need to be configured under Network Settings.
SMTP Connection
SMTP server connection type. Determines the capabilities of the SMTP server. Options are:
Enable or disable SMS SMTP authentication. An SMS account must be provided for the SMTP
service provider to authenticate.
NOTE: Some messaging servers may require account-configuration changes to allow communication
with the RDU101 card. For example, Gmail only recognizes Google applications as being secure.
However, they provide an account setting that allows authentication with what they consider “less-
secure apps.” Please see your network administrator or service provider for configuration details.
SMTP Username
Username of the SMS account to use when SMS SMTP authentication is enabled.
SMTP Password
Password for the SMS account to use when SMS SMTP authentication is enabled.
If checked the IP Address of the agent card will be included in outgoing messages.
If checked a Web link to the agent card and Web Server listening port number will be included in
outgoing messages.
If Event Consolidation is enabled, a message will be sent when “Consolidation Time Limit” in seconds
has passed since the first buffered event was received.
If Event Consolidation is enabled, a message will be sent when the number of buffered events
reaches the “Consolidation Event Limit.”
NOTE: To enable and configure the Vertiv™ Velocity protocol, see Velocity Protocol Folder on page 40.
SNMP Settings
SNMPv3 Engine ID
NOTE: The engine ID is based on the MAC address of the card by default.
SNMP v3 Enable
Authentication Traps
When enabled, an Authentication Trap is sent if an SNMP host tries to access the card via SNMP,
but either the host address is not in the SNMP Access Settings or it is using the wrong Community
String.
Enable or Disable and set interval 5 minutes, 30 minutes, 1 hour, 4 hours, 8 hours, 12 hours and 24
hours.
RFC-1628 MIB
Enable or Disable support for retrieval of data from the RFC-1628 MIB objects.
Enable or Disable support for sending RFC-1628 traps. The RFC-1628 MIB must be enabled for
RFC-1628 traps to operate.
Enable or Disable support for getting and setting data using the Liebert® Global Products MIB.
Enable or Disable support for Liebert® Global Products MIB traps. The LGP MIB must be enabled for
LGP traps to operate.
Enable or Disable support for the LGP System Notification trap. This is a single trap sent each time
an alarm or warning is added or removed from the conditions table. It provides a text description of
the event in a varbind of the trap message. The LGP MIB must be enabled for LGP Notify traps to
operate.
• MAC Address (default) = Engine ID built from the card’s MAC address.
• Text = Engine ID built from text entered in SNMPv3 Engine ID Text. See Select SNMPv3
Engine ID Format on page 12.
Text on which the engine ID is built when SNMPv3 Engine ID Format Type is Text.
NOTE: If this field is left blank, the engine ID is built from the card’s MAC address.
To display the settings, click on any of the SNMPv3 User links. After making any changes, click Save to
make the changes effective.
Select to enable read, write or sending notifications with the user's credentials.
SNMPv3 Username
The User name the authentication and privacy settings apply to. This string can be composed of
printable characters except colon, tab, double quote, and question mark.
SNMPv3 Authentication
Pass phrase or password used for SNMPv3 Get request. This string can be composed of printable
characters with the exception of colon, tab, double quote, and question mark. Note: The entry must
be 8 or more characters but not more than 64.
SNMPv3 Privacy
• None
• DES
• AES
Pass phrase or password used for SNMPv3 Get request. This string can be composed of printable
characters with the exception of colon, tab, double quote, and question mark. Note: The entry must
be 8 or more characters but not more than 64.
Network hosts that will receive SNMPv3 traps, identified with either a network name or IP address.
Multiple addresses must be separated by commas.
Port used by the target host for receiving SNMPv3 traps; default is 162.
1. Above the table, click Click here to edit columns displayed in this table.
2. Check the boxes next to the information to include in the table.
The choices let you show the same information in this screen as that displayed when folder or
link for a specific user is selected.
Configure network hosts that will receive alert notifications (i.e., SNMP Traps). The host can be
identified as either an IP address or the host’s network name.
Port used by the target host for receiving notifications; default is 162.
String identifying a 'secret' known only by those hosts that want to be notified of device status
changes. Default: public (case-sensitive).
Configure network hosts interested in device information access. The host can be identified as
either an IP address or the host’s network name
String identifying a 'secret' to allow read-only or write-only access. The default is read-only access:
public (case-sensitive). Write-only access: private (case-sensitive).
The folder also displays information about the card for help in troubleshooting, such as the card’s
firmware version, label, MAC address and related information.
Agent Model
GDD Version
The card’s GDD version, current when the card’s firmware was installed; the GDD is a proprietary
reference document for device data.
FDM Version
The card’s FDM version; the FDM is a data model document that defines data supported by devices
that use the Velocity Protocol.
Product Sequence ID
Commands
Enable/Cancel
Restart Card
Generate a file containing diagnostic information and download it with a Web browser.
IPv4 Address
Presently used IPv4 network address of the gateway for network traffic destined for other networks
or subnets
Primary DNS
Secondary DNS
IPv6 SLAAC is assigned automatically from Router Advertisement, if “A” flag is set, combining Prefix
with EUI-64 MAC
Link Local
Presently used IPv6 network address of the gateway for network traffic destined for other networks
or subnets
The folder supports updating the firmware of the RDU101 card or reverting to a previous version. If the
firmware has not been updated, then the previous version/configuration is not available to revert.
NOTE: If downgrading firmware to a previous version, a reset to factory defaults occurs if there are
feature in the current version that are not present in the older version. However, if downgrading using
an alternate image, no reset occurs.
Firmware Commands
Firmware Update
NOTE: Do not navigate away from the Firmware Update screen and do not close the browser once the
update begins. Either action will interrupt the download.
1. On the Communications tab, select Support > Firmware Update in the tab menu on the left
panel.
2. Click Edit and enter the administrator user name and password.
3. Click Run Alternate.
A confirmation dialog opens.
4. Click OK.
The card reboots. After reboot, the card is running the previous version of the firmware and
configuration. The replaced firmware and configuration are now stored in the alternate area.
Saves the RDU101-card configuration, which may be edited and used to import common settings to
other RDU101 cards. See Exporting and Modifying a Configuration File on the facing page, and
About the Exported Configuration File below.
Loads the RDU101-card configuration contained in a modified export file or a created file. The import
file is typically used to deploy common card settings. See Importing a Configuration File on page 54.
Security Considerations
Passwords and other secrets are not exported. Protected values are shown as asterisks and the lines are
commented-out. To use the file as a complete, importable back-up file, you must replace the asterisks (*)
with your password/secret values and un-comment the lines. You can also reference the header of the
export file for additional details.
NOTE: Do not import an un-modified export file from one card to another. This could cause a duplicate
IP address or other unintended duplications.
NOTE: If you add sensitive data such as passwords to the file, we recommend that you use an HTTPS
connection when importing to ensure that the file is encrypted when transmitted.
General Format
The exported file is self-describing using commented lines and includes the following format designations:
• # precedes comments.
• Settings and their values are not commented.
• A colon (:) separates the setting and value.
• Double quotes (") enclose all text-based values
• Numeric and enumerated values are not enclosed in double quotes
• Brackets ([ ]) indicate the folder that contains the settings
• User password and other secrets are hidden in the export file, and the line is commented to
prevent inadvertent import. To import a new password or other secret, un-comment the line
and enter the new password. Because this is a text string, it must be enclosed in double quotes
(").
If the export file will be used as a back-up, all of the passwords and secrets must be manually restored.
NOTE: Do not import an un-modified file. This could cause a duplicate IP address or other unintended
duplications.
In addition, the import file does not require comments, and needs only the date to update. For example,
you can change only the system name or a network address by editing the configuration file to contain
only those lines.
To import a configuration file: