VERTIV AVOCENT ADX MP1000 Management Platform User Guide

June 5, 2024
VERTIV

VERTIV logo

Avocent® ADX MP1000 Management Platform
Installer/User Guide

The information contained in this document is subject to change without notice and may not be suitable for all applications. While every precaution has been taken to ensure the accuracy and completeness of this document, Vertiv assumes no responsibility and disclaims all liability for damages resulting from use of this information or for any errors or omissions. Refer to other local practices or building codes as applicable for the correct methods, tools, and materials to be used in performing procedures not specifically described in this document. The products covered by this instruction manual are manufactured and/or sold by Vertiv. This document is the property of Vertiv and contains confidential and proprietary information owned by Vertiv. Any copying, use or disclosure of it without the written permission of Vertiv is strictly prohibited. Names of companies and products are trademarks or registered trademarks of the respective companies. Any questions regarding usage of trademark names should be directed to the original manufacturer.
Technical Support Site
If you encounter any installation or operational issues with your product, check the pertinent section of this manual to see if the issue can be resolved by following outlined procedures. Visit https://www.vertiv.com/en- us/support/ for additional assistance.

Getting Started

1.1 Product Overview
The Avocent® ADX MP1000 Management Platform is a secure centralized enterprise management solution that allows you to remotely access, manage, monitor and control target devices through managed appliances. You can also launch a session to a target device with a single point of access. The management platform provides simplified management and control of both virtual and physical infrastructure. It provides efficient, secure and auditable access to devices for your IT operators.
Figure 1.1 Avocent® ADX MP1000 Management Platform

VERTIV AVOCENT ADX MP1000 Management Platform

Table 1.1 Avocent® ADX MP1000 Management Platform Descriptions

Item Description Item Description
1 Removable front bezel 7 Console port
2 Optional optic drive 8 1G uplink ports
3 USB 2.0 port 9 Redundant dual power supplies
4 Power button 10 USB 3.0 ports for mouse and keyboard
S Release latch 11 Management port
6 35′ hard drive bays 12 VGA port

1.2 Features and Benefits

The Avocent® ADX MP1000 Management Platform provides the following benefits for your data center:

  • Provides and combines the control of your KVM over IP, service processor, and virtual machine devices to manage your entire infrastructure across enterprise and edge sites.
  • Designed for scalability so that you can easily scale from small to large and uniform complex infrastructure with a single management platform.
  • Simplifies your infrastructure and improves productivity with automation of deployment and configuration tasks on your IT equipment.
  • Improves efficiency by standardizing your management of service processors and using a common set of APIs to manage your entire IT infrastructure.
  • Enhances security with centralized firmware updates and safeguarding access to your IT devices.
  • Minimizes service disruption by being able to always remotely access your IT infrastructure.
  • Control and restrict operations to your devices and keep track of detailed user history.
  • Minimizes downtime for upgrades.
  • With a cloud-based structure, will grow to fit your business needs.

1.3 Installation and Initial Setup
For installation and initial setup instructions, see the VertivTM Avocent® ADX MP1000 Management Platform Quick Installation Guide that shipped with your management platform. The Quick Installation Guide can also be found at the product page at vertiv.com.
1.3.1 Assigning an IP address
The management platform uses IP addresses to uniquely identify itself to IP- based target devices. It supports both Dynamic Host Configuration Protocol (DHCP) and static IP addresses. By default, an IP address is obtained via DHCP.
Before you access the management platform for the first time, you will need to access it via its console menu to view the DHCP-assigned IP address or configure a static IP address.
To view or configure the IP address of the management platform:

  1. From the console menu, log in using admin as the username and password. You are prompted to change the password.

  2. Select the option to show or configure network settings.

  3. Select the eno1 option.
    NOTE: The IP address assigned by the DHCP server is visible once this option is selected. This address can be entered into a web browser to access the web user interface (UI).

  4. To assign a static IP address, select the applicable option and follow the on-screen prompts to configure the IP, subnet and gateway.

  5. Type 0 (zero) and press Enter to exit the main menu.

  6. Select the option to reboot the management platform.

  7. Once the management platform reboots, enter the static IP address into a web browser to access the web UI.

For information on configuring your network from the web user interface, see Network Configuration on page 20.

 Web User Interface

Once you have connected the Avocent® ADX MP1000 Management Platform to a network and configured its IP address, you can access the management platform with its web user interface (UI). The web UI provides direct access to the management platform and its appliances.
The web interface is compatible with the latest 32- and 64-bit versions of the following browsers:

  • Microsoft Edge
  • Mozilla Firefox
  • Google Chrome
  • Apple Safari

To log into the web UI:

  1. Open a web browser to the address of the management platform http://<appliance.IP>using the IP address for eno1 you configured from the console menu.
  2. At the login screen, enter your username and password.
  3. After logging in, you are on the Targets List screen.

Figure 2.1 Web UI Overview

VERTIV AVOCENT ADX MP1000 Management Platform - fig1

Table 2.1 Web UI Overview Descriptions

Item Description
1 Sidebar
2 Content Area
3  User Preferences

2.1 Targets

When logging into the management platform, the Targets List screen displays a list of targets connected to the management platform.

The following target types can be managed:

  • IP KVM devices
  • Service processors
  • Virtual machines
  • Serial devices
  • RM1048P rack managers

You can manage targets from the management platform through a VertivTM Avocent® ADX RM1048 rack manager and then enroll the rack manager into your management platform. You can also discover and manage KVM devices connected via a VertivTM Avocent® ADX IPIQ IP KVM device or VertivTM Avocent® ADX IPUHD 4K IP KVM device. Serial devices can be discovered and managed via an Avocent® ACS 800/8000 Advanced Console System. The management platform can manage service processors logically over the network or via an SP connected to an enrolled rack manager.
To enroll a single rack manager into the management platform:

  1. From the Management screen, click the plus (+) icon.
  2. Click Add Device.
  3. Enter the IP address for the rack manager and click Add Device. You can also assign a name to the rack manager from this screen.

To discover a range of rack managers:

  1. From the Management screen, click the plus (+) icon.
  2. Click IP Range Discovery.
  3. Use the IP From and IP To fields to enter a range for your rack managers to be discovered on the network.
  4. Check the box to add and manage the discovered rack managers. If checked, all discovered rack managers are automatically added to the list as managed devices.
  5. Click Start Discovery.

NOTE: It may take 10-15 minutes for the rack manager to be fully enrolled. Once it is fully enrolled, the rack manager and all its targets are visible in the web UI of the management platform.
NOTE: Once enrolled, a rack manager is only accessible from the web UI of the management platform. To access a rack manager from its own web UI again, you will have to unenroll the rack manager from the management platform.
To unenroll a rack manager:

  1. From the Management screen, move your mouse to the row with the rack manager you want to delete and check the box next to the rack manager.
    -or-
    Click the ellipses at the far right of the row with the rack manager you want to delete.

  2. Click the Delete icon.

NOTE: It may take 10-15 minutes for the rack manager to unenroll from the management platform.
Connected targets display in a table in the content area. Click the vertical ellipses icon to configure the table.
To add a single target:

  1. From the Targets List screen, click the plus (+) icon.
  2. Click Add Device.
  3. Enter the IP address for the device and click Add Device. You can also assign a name to the target.

To discover a range of targets:

  1. From the Targets List screen, click the plus (+) icon.

  2. Click IP Range Discovery.

  3. Use the IP Start and IP End fields to enter a range for your targets to be discovered on the network.

  4. Use the drop-down menu to select the type of target and enter your username and password in the appropriate fields.
    -or
    For service processors and virtual machines, use the drop-down menu to select your credential profile. For more information, see Credential Profile on page

  5. Check the box to add and manage the discovered devices. If checked, all discovered devices are automatically added to the list as managed devices.

  6. Click Discover.

NOTE: For service processors and virtual machines, you are required to enter the credential profile to add or discover it.
2.1.1 Target properties
Click a target to open its Properties sidebar. From here you can view the target properties and network configuration. Click the Edit icon to change the name or serial number of the target.
2.1.2 Merge targets
You can merge multiple target devices into a single merged target device. This provides you a convenient method to launch actions on a set of targets that are really the same target. You can merge KVM, SP, and serial targets. You cannot merge virtual machines.
To merge targets:

  1. From the Target List screen, select the targets you want to merge by hovering your mouse over each target and clicking the box to the left of each one.
  2. Click Merge Targets, then click Apply. A plus (+) icon displays to show the merged targets. Click the icon to expand the merged target and show each individual target.

To unmerge targets:

  1. Click the checkbox next to the merged target.
  2. Click the Unmerge icon to unmerge all the targets.
    -or
    If you have more than two targets merged, click the vertical ellipses next to the individual target you want to unmerge and click Unmerge to remove just that target.

2.1.3 Resource groups
Resource groups may be used to organize your targets. You may create nested resource groups (groups within groups) to organize targets hierarchically. Targets may belong to multiple groups.

Nested groups
To create a resource group:

  1. From the Resource Groups screen, click the plus (+) icon.

  2. Enter a name for your resource group.

  3. Click a target to add it to the group. -check the Select All box to add all targets to the group.
    NOTE: You can use the search field to filter targets.

  4. Click Add Resource Group when you are finished adding targets.

To delete a resource group:
You can either click the vertical ellipses to the right of the group or check the box next to the group folder and then click the delete icon. You can delete multiple groups at the same time by checking the boxes next to the group name and then clicking the delete icon.
2.2 KVM Management
The Avocent® ADX MP1000 Management Platform provides flexible, centralized control of data center servers and virtual media of remote branch offices where trained operators may be unavailable. KVM over IP gives you flexible target device management control and secure remote access from anywhere at anytime. The KVM over IP functionality of the appliance provides enterprise customers with the following features and options:

  • Keyboard, video, and mouse (KVM) capabilities, configurable for digital (remote) connectivity
  • HTML5 KVM Viewer
  • Serial Viewer
  • Session management
  • Session sharing
  • Screen capture
  • Screen recording
  • Control over color depth
  • Zoom
  • Virtual keyboard
  • Copy and paste
  • Network bandwidth optimization
  • Macros
  • Virtual media

2.2.1 Video Viewer
The management platform is used to conduct a KVM session with one or more target devices attached to one or more KVM switches. When you connect to a device using the management platform, the target device’s desktop appears in a separate window. The management platform allows you to control the target server as if you were sitting on site. When you connect to the management platform, your session can be confined to a window on your desktop or expanded to fit your entire desktop. You have the ability to manage computer settings, access files and launch virtual media sessions from the client. You can use the menu located along the top of the window to access features such as screen capture, refresh and virtual keyboard. Although you can use the virtual keyboard to enter text to the target server, you can use the macros feature to send multi-key commands to make sure the command string is accurate. The options for commands you can send will change based on the operating system you select in the Macros settings. You can also configure the settings of the management platform using the Settings icon.
2.2.2 HTML5 Session
The web-based HTML5 Video Viewer is compatible with the latest versions of the following browsers:

  • Microsoft Edge
  • Mozilla Firefox
  • Google Chrome
  • Apple Safari

To launch an HTML5 session, you must have assigned rights or belong to a user group that has assigned rights.
2.2.3 Launching an HTML5 Video Viewer Session
Using the web user interface (UI), you can connect to each target, access target server files, manage software updates and execute operating system commands. Each target server has a device information panel that contains data about the device. NOTE: You may need to disable your browser’s pop-up blocker to launch an HTML5 session. To launch a video viewer session:
1. From the sidebar of the management platform, click Targets List. 2. Hover your mouse over the row with the target you want to access and click the Launch Session icon.
-or
Click on the target you want to access to open its Properties sidebar. Then click the Launch Session icon.
To close a video viewer session:
Click the user icon in the upper right-hand corner and select Exit Viewer.
Session sharing
When you connect to a target server that is currently being accessed by another user, the video viewer presents you with options that allow you to choose how to connect to the server. The four options include:

  • Active Sharing – You, as well as other users, interaction with the target.
  • Passive Sharing – Grants access to the target in read-only mode. The other user knows you are viewing the session.
  • Preempt – Interrupts and terminates the previous user’s session.
  • Stealth – Grants access to the target as a viewer only. The other user does not know you are viewing the session.

If you are currently connected to a target server and another user attempts to share the session with you, the video viewer allows you to select how you want the user to connect. You have the option to:

  • Approve
  • Reject
  • Allow as read-only

Launching an exclusive HTML5 session
An exclusive connection is used when you need to access a target while excluding all other users. When a target is selected with the Exclusive Mode setting enabled, no other user in the system can switch to that target.
To enable an exclusive session:
Launch a session and click Tools – Exclusive Mode.
2.2.4 Video viewer menu
From the menu at the top of the screen you can configure your video viewer session.
File menu
From the File menu, you can copy text and paste it to the target. You can also open a server-side recording file.
View options
Click View to configure display options for the video viewer as well as enable full-screen and single-cursor modes. You can also view KVM statistics and display or hide the status bar at the bottom of the screen.
Video options
You can display more colors for the best fidelity, or fewer colors to reduce the volume of data transferred on the network. The choices range from Grayscale 16 Shades (maximum speed) to Color 24 bit (maximum video quality). You can also enable noise reduction for VGA or disable it for a digital video source.
To select a color depth for the video viewer:

  1. From the toolbar, click View.
  2. Click Video Options.
  3. Use the slider to select the color depth.
  4. Click the radio button to enable or disable noise reduction.
  5. Click Apply.

Scaling
From the Scaling tab, you can adjust the appearance of the target’s screen in the KVM Viewer. When Maintain Aspect Ratio is enabled, the target’s aspect ratio is maintained. When Stretch to Window is selected, the window stretches to fit your display. When Zoom is selected, use the drop-down menu to select the zoom percentage of the display.
Max Resolution
From the Max Resolution tab, you can select the maximum target resolution for your KVM session. This setting affects all sessions and remains until changed again.
NOTE: This setting causes a change of the actual video resolution on your target system’s OS.
Macros
The Macros tab provides access to a list of supported operating systems that your target device may use. After you select the applicable operating system, you can access the list of command strings that are valid for the selected operating system.
NOTE: It is recommended that you use the macros feature to send a command string to a server. Using the macros feature when sending a command string such as Ctrl-Alt-Delete to a target device will not affect your client server. Selecting from the available keystrokes saves time and eliminates the risk of errors.
Tools
From the Tools tab, you can select the keyboard language, capture a screenshot, send an instant message, select the mouse mode, reset the keyboard and mouse and enable a virtual keyboard. You can also enable exclusive mode, optimize network bandwidth and choose when to reduce the update rate.
Virtual Keyboard
When the virtual keyboard is enabled, the keyboard is displayed on the client’s workstation and can be positioned anywhere inside the window. The up and down directional arrows in the top right corner of the virtual keyboard are used to increase or decrease the size of the keyboard, respectively.
2.2.5 Macros
From the Macros section of the status bar, you can send a string of commands with one click to the target computer. The options in the drop-down list are predetermined based on the macro set you select by accessing the Macros tab. If you are looking for a command string that does not appear in the list, be sure to verify that you have the correct operating system selected in the Macro Manage drop-down list. You can also define macros using the Manage Macros tab.

To send a command to the target computer:

  1. Click the Macros drop-down list at the top of the screen and select a command string from the Static Macros list.
  2. Click Send.

2.2.6 Virtual Media
Use the virtual media feature on the client workstation to map a physical drive on the client machine as a virtual drive on a target device. You can also use the client workstation to add and map a .iso or .img file as a virtual drive on the target device.
Requirements
The virtual media feature has the following requirements:

  • The target device must be connected to a KVM switch that supports virtual media with an IQ module that supports virtual media.
  • The target device must be able to use the types of USB2-compatible media that you virtually map.
  • If the target device does not support a portable USB memory device, you cannot map it on a client machine as a virtual media drive on the target device.
  • The user (or user group to which the user belongs) must have permission to establish virtual media sessions and/or reserved virtual medial sessions to the target device.
  • Only one virtual media session can be active on a target device at one time.

To map a virtual media drive:

  1. In the virtual media section of the client navigational toolbar, click Connect.

  2. After the virtual media session is activated, use the Virtual Media drop-down menu to select the type of file to map. Select Map ISO image to map a .iso file or select either Map Removable Disk or Map Floppy Disk to map a .img file.

  3. Select a file from the Open dialog box with a .iso or .img file extension, depending on your selection in step 2, then click Open.

  4. If you wish to limit the mapped drive to read-only access, click the Read Only checkbox in the Virtual Disk Management dialog box.
    NOTE: If the virtual media session settings were previously configured so that all mapped drives must be read-only, the Read Only checkbox will already be enabled and cannot be changed. You might wish to enable the checkbox if the session settings enabled to read and write access, but you wish to limit a particular drive’s access to read-only.

  5. Click Map Drive, then click Close.
    NOTE: After a physical drive or image is mapped, it can be used on the target device. To unmap a virtual media drive: 1. From the Virtual Media menu, click the mapped drive to unmap that drive. -click Deactivate to unmap all the drives. 2. At the prompt, click Yes to unmap the drive.

2.3 Service Processor (SP) Management
A service processor (SP) can be connected physically via a rack manager or logically over a network to the management platform. The management platform can discover SPs over the network, provided the SPs have an IP address and are connected to the same network as the management platform.
NOTE: Users that do not have Administrator access will only see devices to which they have access.
The management platform and rack manager support the following SPs:

  • Dell iDRAC 7, 8 and 9
  • HPE iLO4 and iLO5
  • Lenovo XCC

2.3.1 SP Metrics
Once discovered, an SP displays in the Target List with its SP type and IP address. Click an SP to view its metrics. From the Metrics screen, you can view the SPs status, temperature, fan speed, power, and properties. You can also upgrade the SP firmware and change the boot order. Drag and drop to re- arrange the boot order as desired. At the confirmation screen, click Yes, Update.
NOTE: Depending on the model, the SP may need to be rebooted for the re- order to take effect.
2.3.2 SP Control
From the Metrics page, you can also control the LED and power functions of the SP as well as reboot the SP or go to the SP web UI. From the upper right-hand corner, click LED to view the LED controls. From here, you can turn the LED on or off or make it blink. Click Power to view the power controls. From here, you can perform a graceful shutdown, turn off the system or power cycle the system. Click the vertical ellipses to view more control options. From here, you can reboot the SP or go to its web page.
2.4 Serial Management
The management platform provides serial management via an Avocent ACS 800/8000 Advanced Console System and an Avocent® ADX IPUHD 4K IP KVM device.
NOTE: Note: The ACS console system should not be enrolled with any other platform, such as the DSView software when enrolling with a management platform. To launch a serial session:

  1. From the Targets List screen, under Serial Interfaces, move your mouse over the device you want to access.
  2. On the right of the column, click the Launch Console icon.
    -or
    Click the vertical ellipses and select whether to launch the serial session in a new tab or new window.

To end a serial session:
Click the user icon in the upper right-hand corner and select Exit Serial Viewer.
2.5 Administration
When logging in as an Administrator, you will have access to the Administration screen. From this screen, you can configure and manage the appliance and its associated targets.
2.5.1 User Management
Access to ports can be optionally restricted, based on permissions an administrator can assign to custom user groups. The management platform has a default user of admin and four predefined user groups (system-administrator, system maintainer, user-administrator, and user).
Users
When the Users tab is selected, all of the users for the management platform are displayed. Click a user to open its properties sidebar. Clicking the vertical ellipses gives you the option to change a user’s password or delete or disable a user. From this sidebar, you can also view user properties and groups. Click the Edit icon to configure the user’s name, email and enable account and password expiration rules. Click Groups to assign the user to groups.

To create a new user:

  1. From the User Management screen, select the Users tab.
  2. Click the Plus (+) symbol to add a new user.
  3. Enter the full name, user name and temporary password for the user.
  4. Click Add User.

To delete a user:

  1. Check the box next to the user you want to delete.
  2. Click the Delete icon above the list of users.
  3. At the confirmation screen, click Yes, Delete.

User groups
When the Groups tab is selected, all of the groups for the management platform are displayed. A user group defines the view and what the user can do within the web UI and CLI, regarding appliance settings and administration. Click a group to open its properties sidebar. Clicking the vertical ellipses gives you the option to delete the selected user group. Click Group Properties to view and configure the group. From here, you can name the group and assign both the pre-emption level and system role for the group. Expand the Users drop-down menu to view users assigned to the selected group. Click the Edit icon to assign more users to the group.

To create a new group:

  1. From the User Management screen, select the Groups tab.
  2. Click the Plus (+) symbol to add a new group.
  3. Enter the name for the group and check the boxes for each user you want to add to the group.
  4. Click Add Group.

To delete a group:

  1. Check the box next to the group you want to delete.
  2. Click the Delete icon above the list of groups.
  3. At the confirmation screen, click Yes, Delete.

2.5.2 Roles and Permissions
The Roles and Permissions screen display target and system roles and permissions. A permission is an individual operating a user can have on a target or system. A role is a collection of those permissions. A role is a convenient way to assign a set of permissions to a user group. Roles can also be assigned to the binding between user groups and resource groups. Target roles are a set of permissions applied to a target device. For example, launching a KVM session. System roles are a set of permissions applicable to the management platform. For example, changing the password for a user on the management platform.

The management platform has four system roles by default.

  • System-Administrator
  • System-Maintainer
  • User-Administrator
  • User-Role

Click a role to open its properties sidebar.
To add a new role:

  1. From the Roles & Permissions screen, select the Target Roles tab to create a target role.
    -or
    Select the System Roles tab to create a new system role.

  2. Click the plus icon (+).

  3. Enter a name and description for the role.

  4. Check the boxes to add desired permissions.
    -or
    Click Select All to add all permissions.

  5. Click Add Role.

To configure an existing role:

  1. Click a role to open its Properties sidebar.
  2. Under the Properties drop-down menu, click the Edit icon to configure the description for the role.
  3. Under the Permissions drop-down menu, click the Edit icon to configure the permissions for the role.
    NOTE: You can only view properties and permissions for the four default system roles. You cannot edit them.

To delete a role:

  1. Check the box next to the role you want to delete.
  2. Click the Delete icon above the list of roles.
  3. At the confirmation screen, click Yes, Delete.
    NOTE: You cannot delete the four default system roles.

2.5.3 Credential Profile
An administrator can view and create profiles to access your targets. A credential profile stores the user ID and password for a single user and can be used across different target device types. Credential profiles are required for SPs. Before enrolling a rack manager with an SP, you must define the credential profile for each one with unique credentials.
To create a credential profile:

  1. From the sidebar, click Administration – Credential Profile.
  2. Click the plus (+) icon in the upper right.
  3. Create a name for the profile, then enter the username and password.
  4. Click Add credential profile.

2.5.4 Events
When an event occurs, it is saved in the event log that can be viewed from the Events screen. Use the search bar to search for a specific event. Use the Filters drop-down menu to filter events by severity (info, warning or critical). Use the arrows next to each column heading to sort each event. Click on an event to open its properties sidebar.
2.5.5 Authentication Providers
From the sidebar, click Authentication Providers to view a list of configured authentication providers. Authentication can be performed locally or through AD/LDAP. The management platform supports remote group authorizations for the LDAP authentication method. The authentication method configured for the management platform is used for authentication of any user who attempts to log in through SSH or the web UI.
To add an authentication provider:

  1. From the Authentication Providers screen, click the plus (+) icon.
  2. Use the drop-down menu to select either LDAP or Active Directory (AD) as the authentication type.
  3. Enter the configuration information for your authentication server.
  4. If desired, use the slider to enable SSL mode to create a secure connection.
  5. Under the Advanced heading, you can also configure user- and group-based searches.
  6. When you are done, click Add Provider.

To configure an LDAP server

  1. Use the slider to enable LDAP.
  2. Enter the server address and server port in the appropriate fields. To add more than one server, click the plus (+) icon.
  3. Select the binding method for the LDAP service. Using the login credential uses the management platform credentials. To configure different credentials, select Use Configured Credential and enter the username and password.
  4. For search settings, enter the Base DN and UID attributes.
  5. Click Apply at the bottom of the screen.

NOTE: To delete an LDAP server, click the Delete icon under the Remove heading.
Active Directory
You can enable role-based security on the management platform to map your Active Directory remote group to a role on the management platform. When enabled and configured, logging in as a member of the Active Directory remote group gives you the same permissions as the mapped local role.

To enable role mapping:

  1. From the LDAP screen, use the slider under Active Directory Settings to enable role-based security.
  2. Click the plus (+) icon.
  3. Enter the name of your Active Directory remote group in the appropriate field.
  4. Use the drop-down menu to select the local role the remote group will be mapped with.
  5. Click Apply.

To delete a role mapping:
Click the Remove icon next to the group you want to remove.
2.5.6 Firmware updates
From the Firmware Updates screen you can view scheduled firmware updates. Click the refresh icon to refresh the page. For information on updating the firmware, see Firmware below.
2.5.7 System Settings
From the System Settings screen, you can view and configure system settings for the management platform.
Firmware
To update the firmware:

  1. Download the new firmware from the product page at Vertiv.com.
  2. Save the firmware to your local PC, FTP, HTTP or TFTP server.
  3. On the management platform, from the System Settings screen, click the Update Firmware icon.
  4. Select the firmware file and click Update.

Password Policy
You can configure global password rules for all user accounts. When the password policy is increased from a lower level to a higher one, all local user accounts are flagged to change the password at next login. Use the drop- down menus and sliders to set the global password policy. You can also configure account expiration settings. By default, eight characters is the minimum length for passwords and all other password and expiration rules are set to off.
FIPS Mode Settings
The FIPS mode of operation can be enabled or disabled via the web UI and is executed after a reboot.
The FIPS mode of operation is disabled by default and must be enabled to operate.
To enable or disable FIPS mode:
From the System Settings screen, under the FIPS Mode Settings heading, use the slider to enable or disable FIPS mode. The mode changes on the next reboot.
NOTE: The selected FIPS mode is persistent even after performing a factory reset.
Lockout Policy
An administrator can configure global lockout rules to all user accounts. When the lockout is enabled, a user will be locked out of the management platform. By default, the lockout is enabled on three failed log-in attempts, and accounts are automatically unlocked after 20 minutes. The log-in retry timeout is disabled by default.
Timeout
An administrator can configure the global inactivity timeout for the application and the viewer. When the inactivity threshold is reached, the user session will be disconnected. By default, both the application and viewer timeout is enabled with a time limit of 30 minutes.
Date and Time
Shows the current date and time. You can use an NTP service or manually configure the date and time.
Events Retention
Purge Events
Use the slider to determine the length of time in days (1-59) before events are purged from the system.
Events Archiving
Check the appropriate button to archive events before deleting or deleting them without archiving them.
2.5.8 License
This screen displays licensing information for the management platform. You can view the total number of licenses used and the total number of targets.
To add a license:
Click Add License and enter the license number.
2.5.9 User preferences
Click the icon in the upper right to open your user profile or log out of the management platform.
User profile
Enter the name and email address for the logged-in user.
Localization
Select measuring system, date format, time zone, language and time number separators.
Color theme
Select the color theme for the web UI.
2.5.10 Network Configuration
From this screen, you can view and configure network settings.
Network Settings
You can view the hostname, primary and secondary DNS addresses and the domain name under this tab.

Ethernet Interfaces

The management platform has two physical network interfaces (eno1, and eno2) . Each interface has an individual MAC address and can be assigned an IP address via DHCP or statically. To configure the ethernet interface:

  1. From the sidebar, click Network Configuration – Settings.
  2. Under the Ethernet Interfaces heading, click on the interface you want to configure to open its properties panel.
  3. Expand the Network Configuration to view the settings for the selected interface. Click the Edit icon to configure the selected interface.
  4. If assigning a static IP, enter the IP address, prefix length and gateway address in the appropriate fields and click Save.

Appendices

Appendix A: Technical Specifications

Table A.1 Avocent® ADX MP1000 Management Platform Technical Specifications

Item Value
Networking 2 x 1 GbE
Rear 2 x USB 3.0

1x VGA
1 x serial connector
Power
Power Supplies| Dual 350W (platinum) hot-plug redundant power supplies
Input Voltage| 100 to 240 VAC at 50/60Hz
Dimensions
Form Factor| Rack (1U)
Height x Width x Depth| 1.68 inches x 17.08 inches x 18.98 inches (428 mm x 434 mm x 482 mm)
Weight| 29.98 lbs (13.6 KG)
Security| Secure Boot
Environmental
Storage Temperature| -40° to 65° C (-40° to 149° F)
Operating Temperature| 10° to 35° C (50° to 95° F)
Storage Humidity| 5-95% relative humidity with 33°C (91° F) max dew point
Operating Humidity| 10-80% relative humidity with 29° C (84.2° F) max dew point
Safety and
EMC Standards, Approvals and Markings| Safety certifications and EMC certifications for this product are obtained under one or more of the following designations: CMN (Certification Model Number), MPN (Manufacturer’s Part Number) or Sales Level Model designation. The designation that is referenced in the EMC and/or safety reports and certificates are printed on the label applied to this product.
Warranty| Two years standard limited warranty
Maintenance (optional)| One. two or four years of Silver or Gold

Connect with Vertiv on Social Media
https://www.facebook.com/vertiv/
https://www.instagram.com/vertiv/
https://www.linkedin.com/company/vertiv/
https://www.twittencom/Vertiv/


Vertiv.com | Vertiv Headquarters, 1050 Dearborn Drive, Columbus, OH, 43085, USA
© 2022 Vertiv Group Corp. All rights reserved. VertivTM and the Vertiv logo are trademarks or registered trademarks of Vertiv Group Corp. All other names and logos referred to are trade names, trademarks or registered trademarks of their respective owners. While every precaution has been taken to ensure accuracy and completeness here, Vertiv Group Corp. assumes no responsibility, and disclaims all liability, for damages resulting from the use of this information or for any errors or omissions. Specifications, rebates, and other promotional offers are subject to change at Vertiv’s sole discretion upon notice 590-2355-501B

References

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

VERTIV User Manuals

Related Manuals