User guide

Index
242
Connecting Third-Party Detectors/Switches to
DPX-CC2-TR • 22
Connection Ports • 30
Contact Closure Sensor LEDs • 24
Copying a Dominion PX Configuration • 129
Copying Configurations with Bulk
Configuration • 127
Creating a Certificate Signing Request • 85
Creating a Role • 68, 71, 213
Creating a Self-Signed Certificate • 87
Creating a User Profile • 39, 66, 69, 70, 71, 130,
139, 206
Creating Actions • 105
Creating an Event Rule • 104
Creating Firewall Rules • 74, 75
Creating Role Based Access Control Rules • 81,
82
Creating Rules • 106
D
Data Pane • 47
Deleting a Role • 72, 216
Deleting a User Profile • 69, 212
Deleting an Event Rule or Action • 111
Deleting an IP Access Control Rule • 174
Deleting Firewall Rules • 78
Deleting Ping Monitoring Settings • 115
Deleting Role Based Access Control Rules • 84
Deleting the LDAP Server Settings • 94
Describing the Sensor Location • 118, 120
Device Management • 52
Diagnostic Commands • 219
Different CLI Modes and Prompts • 145, 146,
147
Disabling the LDAP Authentication • 95
Displaying the Asset Sensor Information • 126
Displaying the PDU Information • xii, 53, 96
Dominion PX Explorer Pane • 43
Downloading Diagnostic Information • xii, 132
Downloading Key and Certificate Files • 89
Downloading SNMP MIB • 60, 139, 140, 141
E
Editing Firewall Rules • 77
Editing Ping Monitoring Settings • 115
Editing Role Based Access Control Rules • 83
Editing the LDAP Server Settings • 94
Enabling Data Logging • 63
Enabling LDAP and Local Authentication
Services • 95
Enabling Login Limitations • 79
Enabling or Disabling Data Logging • 161
Enabling Password Aging • 81
Enabling SNMP • 63, 138
Enabling Strong Passwords • 80
Enabling the Feature • 81
Enabling the Firewall • 74
Enabling User Blocking • 79
Entering the Configuration Mode • 147, 160
Entering the Diagnostic Mode • 147, 219
Environmental Sensor Configuration
Commands • 181
Environmental Sensor Information • 155
Environmental Sensors • xii, 115
Equipment Setup Worksheet • 11, 226
Example • 161, 162, 163, 164, 165, 166, 167,
168, 169, 170, 171, 172, 173, 174, 176, 177,
179, 180, 181, 182, 183, 184, 185, 186, 187,
188, 189, 190, 192, 193, 194, 195, 196, 197,
198, 199, 200, 201, 202, 203, 204, 205, 206,
207, 212, 213, 214, 215, 216, 220, 221, 222
When Hysteresis is Useful • 103
When to Disable Hysteresis • 103
Example 1 - Basic Network Information • 158
Example 1 - Combination of IP, Subnet Mask
and Gateway Parameters • 216
Example 2 - Combination of Upper Critical and
Upper Warning Settings • 217
Example 2 - In-Depth Network Information •
159
Example 3 - Basic PDU Information • 159
Example 4 - In-Depth PDU Information • 160
Examples • 158
Existing Roles • 157
Existing User Profiles • 156
Expanding the Tree • 43, 44, 96, 97, 98, 99,
100, 101, 117, 118, 121, 124
External Sensor Information • 153
F
Filling Out the Equipment Setup Worksheet •
11
Firmware Upgrade • xii, 129, 133
Forcing HTTPS Encryption • 58, 73, 85
Full Disaster Recovery • 135
G
Gathering the LDAP Information • 90