0

Out of 0 Ratings

Owner's of the APC Computer Accessories Apc Switched PDU gave it a score of 0 out of 5. Here's how the scores stacked up:
  • Reliability

    0 out of 5
  • Durability

    0 out of 5
  • Maintenance

    0 out of 5
  • Performance

    0 out of 5
  • Ease of Use

    0 out of 5
of 186
 
®
USER’S GUIDE
Switched Rack PDU
179
123
Secondary NTP Server 106
Secondary Server for RADIUS 102
Secondary Server Secret for RADIUS
102
Section headings, user configuration
file 154
Secure CoPy. See SCP.
Secure Hash Algorithm (SHA) 92
Secure SHell. See SSH.
Secure Sockets Layer. See SSL.
Security
authentication
authentication vs. encryption 120
through digital certificates with SSL
124
certificate-signing requests 125
disabling less secure interfaces 123
encryption with SSH and SCP 122
how certificates are used 134
How SSH host keys are used 135
immediately changing username and
password
119
options for each interface 117
planning and implementing 117, 120
SCP as alternative to FTP 123
SSL
choosing a method to use certificates
126
CipherSuite algorithms and ciphers
125
supported SSH clients 79
using non-standards ports as extra
passwords
120
Security Wizard 134
creating certificates
without a Certificate Authority 137
creating server certificates
to use with a Certificate Authority 142
creating signing requests 142
creating SSH host keys 146
Send DNS Query 76
Server certificates
creating to use with a
Certificate Authority
142
creating without a Certificate Authority
137
Severity levels of events 61
events with no severity level 61
mapping event severity to Syslog
priorities.
87
Signing requests
creating 142
SMTP
From Address 65
Server 65
server 67
SMTP Server 65
SNMP
Access Type setting 85
Authentication Traps 63
Community Name setting 84
NMS IP/Domain Name setting 85
SNMP traps option 62
SSH
enabling 78
encryption 122
fingerprints, displaying and comparing
79
host key
as identifier that cannot be falsified 122
creating 146
file name 83
file status 83
transferring to the PDU 79
modifying the Port setting 81, 91
obtaining an SSH client 79
server configuration 82
v1 Encryption Algorithms 82
v2 Encryption Algorithms 82
SSL