Apc Ap4421 - Ug Ats
Apc Ap4421 - Ug Ats
990-5844A-001
Publication Date: 11/2018
Au
Transtom ati
fer Swc
itch
Network
- Overload
- Warning
- OK
by Schneider E l e c t r i c
10/100
USB
Reset
Serial
Au
Transtom ati
fer Swc
pdu0393c
itch
Network
- Overload
- Warning
- OK
by Schneider E l e c t r i c
10/100
USB
Reset
Serial
APC by Schneider Electric Legal Disclaimer
The information presented in this manual is not warranted by the APC by Schneider Electric to be authoritative,
error free, or complete. This publication is not meant to be a substitute for a detailed operational and site
specific development plan. Therefore, APC by Schneider Electric assumes no liability for damages, violations of
codes, improper installation, system failures, or any other problems that could arise based on the use of this
Publication.
The information contained in this Publication is provided as is and has been prepared solely for the purpose of
evaluating data center design and construction. This Publication has been compiled in good faith by APC by
Schneider Electric. However, no representation is made or warranty given, either express or implied, as to the
completeness or accuracy of the information this Publication contains.
Copyright, intellectual, and all other proprietary rights in the content (including but not limited to software, audio,
video, text, and photographs) rests with APC by Schneider Electric or its licensors. All rights in the content not
expressly granted herein are reserved. No rights of any kind are licensed or assigned or shall otherwise pass to
persons accessing this information.
Web UI....................................................................................................... 70
Log on to the Web UI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
URL address formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Home Tab.................................................................................................. 73
Troubleshooting..................................................................................... 127
Rack ATS Access Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
SNMP Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128
The addition of this symbol to a Danger or Warning safety label indicates that an electrical
hazard exists which will result in personal injury if the instructions are not followed.
This is the safety alert symbol. It is used to alert you to potential personal injury hazards.
Obey all safety messages that follow this symbol to avoid possible injury or death.
DANGER
DANGER indicates an imminently hazardous situation which, if not avoided, will result in death
or serious injury.
WARNING
WARNING indicates a potentially hazardous situation which, if not avoided, can result in death
or serious injury.
CAUTION
CAUTION indicates a potentially hazardous situation which, if not avoided, can result in minor or
moderate injury.
NOTICE
NOTICE addresses practices not related to physical injury including certain environmental
hazards, potential damage or loss of data.
Product Features
The Rack ATS has these additional features:
• LED indicators on the front panel of the unit indicate operation conditions such as preferred
source, overload current, and Web connectivity. These conditions can also be monitored via the
CLI and Web UI.
• Various levels of access: Super User, Administrator, Device User, Read-Only, and Network-Only
User. (These have user name and password requirements.)
• A multiple-user login feature, which allows up to four users to be logged in simultaneously.
• Event and data logging. The event log is accessible by Telnet, Secure CoPy (SCP), File Transfer
Protocol (FTP), serial connection, or Web browser (using HTTPS access with SSL/TLS, or using
HTTP access). The data log is accessible by Web browser, SCP, or FTP.
• SNMP traps, Syslog messages, and e-mail notifications based on the severity level or category of
the Rack ATS and NMC system event.
• Security protocols for authentication and encryption.
• The ability to monitor sources and set source-transfer parameters via Web and CLI interfaces.
• Set alarm thresholds that provide network and visual alarms to help you prevent overloaded
circuits.
• Internal protection measures against short circuits. (See “Internal Protection Measures” on page 3
for details.)
NOTE: It is always recommended that you connect each ATS source to a Double Conversion
On-Line Uninterruptible Power Supply (UPS).
ATS 2
• Two or four
non-replaceable fuses Attached
Source A
(depending on the equipment
model) help to protect
the ATS from short
circuits (ATS 2). Source B
ATS 3
• Some 2U models have
circuit breakers to help
Attached
protect against bank Source A equipment
overload (ATS 3).
Source B
pdu0777a
The rack ATS does not include power surge protection. To help protect your ATS from external power
surges, it is always recommended that you connect each ATS source to a Double Conversion On-Line
Uninterruptible Power Supply (UPS).
Watchdog Features
To detect internal problems and recover from unanticipated inputs, the Rack ATS uses internal, system-
wide watchdog mechanisms. When it restarts to recover from an internal problem, a Network Interface
Restarted event is recorded in the event log.
NOTE: Do NOT use the loopback address (127.0.0.1) as the default gateway. Doing so disables the
network connection of the Rack ATS. To enable the network connection again, you must log on using a
serial connection and reset the TCP/IP settings to their defaults.
For detailed information on how to use a DHCP server to configure the TCP/IP settings at a Rack ATS,
see.“DHCP response options” on page 90
When Installed, the Device IP configuration Wizard is available through the Windows Start menu
options.
The Device IP Configuration Wizard can discover Rack ATS units that do not have an IP address
assigned. Once discovered, you can configure the IP address settings for the Network Management
Cards (NMCs).You can also search for devices already on the network by entering an IP range to define
the search. The Utility scans the IP addresses in the defined range and discovers Rack ATS units that
already have a DHCP-assigned IP address.
NOTE: For detailed information on the Utility, see FAQ article FA156064: go to www.apc.com, navigate
to Support > Resources & Tools > FAQS, then enter the article number in the search bar.
NOTE: To use the DHCP Option 12 (AOS 5.1.5 or higher), see FAQ article FA156110.
A user configuration (INI) file can function as a BOOTP or DHCP boot file. For more information, see
“Create and import settings with the config file” on page 108.
BOOTP
For the Rack ATS to use a BOOTP server to configure its TCP/IP settings, it must find a properly
configured RFC951-compliant BOOTP server.
1. In the BOOTPTAB file of the BOOTP server, enter the Rack ATS’s MAC address, IP address,
subnet mask, and default gateway, and, optionally, a bootup file name. Look for the MAC address
on the bottom of the Rack ATS.
2. When the Rack ATS reboots, the BOOTP server provides it with the TCP/IP settings.
– If you specified a bootup file name, the Rack ATS attempts to transfer that file from the
BOOTP server using TFTP or FTP. The Rack ATS assumes all settings specified in the bootup
file.
– If you did not specify a bootup file name, you can configure the other settings of the Rack ATS
remotely through its Web UI (see “Web UI” on page 70) or CLI (see “Remote access to the
CLI” on page 9) The default user name and password are apc for both interfaces. To create a
bootup file, see your BOOTP server documentation.
You can use an RFC2131/RFC2132-compliant DHCP server to configure the TCP/IP settings for the
Rack ATS.
1. The Rack ATS sends out a DHCP request that uses the following to identify itself:
– A Vendor Class Identifier (APC by default)
– A Client Identifier (by default, the MAC address of the Rack ATS)
– A User Class Identifier (by default, the identification of the application firmware installed on the
Rack ATS)
– A Host Name (by default, apcXXYYZZ with XXYYZZ being the last six digits of the ATS serial
number). This is known as DHCP Option 12.
2. A properly configured DHCP server responds with a DHCP offer that includes all the settings that
the Rack ATS needs for network communication. The DHCP offer also includes the Vendor
Specific Information option (DHCP option 43). The Rack ATS can be configured to ignore DHCP
offers that do not encapsulate the APC cookie in DHCP option 43 using the following
hexadecimal format. (The Rack ATS does not require this cookie by default.)
Option 43 = 01 04 31 41 50 43
– The first byte (01) is the code.
– The second byte (04) is the length.
– The remaining bytes (31 41 50 43) are the APC cookie.
See your DHCP server documentation to add code to the Vendor Specific Information option.
NOTE: By selecting the Require vendor specific cookie to accept DHCP Address check
box in the Web UI, you can require the DHCP server to provide an “APC” cookie, which
supplies information to the Rack ATS.
NOTE: After the IP address of the Rack ATS is configured, you can access the Rack ATS using Telnet or
SSH, without first using ARP and Ping. You must enable SSH before using it, so Telnet is required for
initial CLI configuration.
1. Use ARP to define an IP address for the Rack ATS and use the MAC address of the Rack ATS in
the ARP command. For example, to define an IP address of 156.205.14.141 for a Rack ATS that
has a MAC address of 00 c0 b7 63 9f 67, use one of the following commands:
– Windows command format:
arp -s 156.205.14.141 00-c0-b7-63-9f-67
– LINUX command format:
arp -s 156.205.14.141 00:c0:b7:63:9f:67
NOTE: The MAC address can be found on the bottom of the ATS.
2. Use Ping with a size of 113 bytes to assign the IP address defined by the ARP command. For
example:
– Windows command format:
ping 156.205.14.141 -l 113
– LINUX command format:
ping 156.205.14.141 -s 113
3. Use Telnet to access the Rack ATS at its newly assigned IP address. (For example:
telnet 156.205.14.141) Use apc for both user name and password.
(See “Remote access to the CLI” on page 17)
See “Configure TCP/IP settings in the CLI” on page 9 to finish the configuration.
- Over o
- Warning
- OK
l ad
A/B x 10 /100
USB
Reset
Preference
B
Serial
pdu0733b
NOTE: Your Rack ATS is configured so the display back light turns off after 10 minutes of inactivity.
Press any display navigation button to illuminate the back light.
Item Function
Preference A/B Button Press to set a preferred source: the first press sets source A, the second
press sets source B, and the third press sets no preference.
Source A and B LEDs Indicate preferred source. If no source is preferred, both LEDs are
illuminated. You can also see preferred source on the LCD Display.
Input Connector LEDs Provide information about input voltage from each source. If the RMS
input voltage and measured frequency are within the selected tolerance
range, the corresponding indicator will be illuminated. In a normal
operating condition (full source redundancy) both sets of LEDs are
illuminated.
Output Connector LEDs Indicate which source is being used for the output (only one path will be
illuminated at any time). Together, the Source Preference LEDs, the
Connector LEDs, and the Output LED show the power flow through the
ATS.
Output LED Shows that voltage is available at the output of the ATS.
LCD Display View ATS status, settings, and product information. See “LCD Display
Screens” on page 13 for more information on LCD display screens.
Display navigation buttons On the LCD Display, icons indicate the purpose of adjacent buttons.
Home: Press to move through default screens or return to default
screens from menu screens.
Down: Press to move through default screens, menu items, or menu
screens.
Select: Press to navigate to the main menu from default screens,
select menu items, or return to the main menu from menu screens.
See “LCD Display Screens” on page 13 for more information.
USB port Use a USB drive to upgrade the firmware or download log files.
Serial port Connect your computer to the ATS for local access to the CLI. Use the
supplied Serial Communication cable (APC by Schneider Electric part
number 940-0144A).
Condition Description
Green The Rack ATS current is below the Near Overload Warning threshold.
Yellow The Rack ATS current is above the Near Overload Warning threshold.
Red The Rack ATS current is above the Overload Alarm threshold.
Condition Description
Off One or more of the following situations exists:
• The Rack ATS is not receiving input power.
• The cable that connects the Rack ATS to the network is disconnected
or defective.
• The device that connects the Rack ATS to the network is off or not
operating correctly.
• The Rack ATS is connected to an unknown network.
• The Rack ATS is not operating properly. It may need to be repaired or
replaced. Contact customer support at www.apc.com/support.
Flashing green The Rack ATS is receiving data packets from the network at 10 Megabits
per second (Mbps).
Flashing orange The Rack ATS is receiving data packets from the network at 100
Megabits per second (Mbps).
Solid green or orange The Rack ATS is receiving no network traffic.
Condition Description
Off One or more of the following situations exists:
• The Rack ATS is not receiving input power.
• The cable that connects the Rack ATS to the network is disconnected or
defective.
• The device that connects the Rack ATS to the network is disconnected or
defective.
• The device that connects the Rack ATS to the network is turned off.
• The Rack ATS is connected to an unknown network.
• The Rack ATS is not operating properly. It may need to be repaired or
replaced. Contact customer support at www.apc.com/support.
Solid green The Rack ATS has valid TCP/IP settings.
Flashing green The Rack ATS does not have valid TCP/IP settings.*
Solid orange A hardware failure has been detected in the Rack ATS.
Flashing orange The Rack ATS is making BOOTP requests.
Flashing orange and green The Rack ATS is making DHCP requests.
(alternating)
*If you do not use a BOOTP or DHCP server, see “TCP/IP Configuration Methods” on page 6 for more
options.
After 30 seconds without activity, the LCD display will revert to the default screens. You can also press
Home to return to the default screens.
Default screens
Bank 1 load 1
Bank 2 load 2
Black line =
load
Total load T
Source Status
Preferred Source
Primary source Source A
Secondary source Source B
None
Bank 1 load 1
Bank 2 load 2
Total load T
pdu0589b
Main menu
Feed Info
Network
Software Info
SKU/Serial #
Alarm Status
Log to Flash
Feed Info View information for each power source (Feed A and Feed B), or view the
Preferred Source (in green text).
Network View the IPv4 Address, the IPv6 Address, or the MAC Address.
Software info
View the current software View the model and serial
SKU/Serial#
version for each firmware number for your ATS.
module.
Log to Flash Use a USB drive at the USB port to download compressed log files.
Extract the files on your computer to view the logs.
Idle State
No Has export
recorded?
Yes
Export Started
Log to Flash Press “Select”
Press “Select” to start No USB Flash
Failed
No USB Detected detected?
Yes
pdu0589c
pdu0589d
If the Rack ATS uses a non-default port number (from 5000 to 32768), you must include a colon
or a space, depending on your Telnet client, between the IP address (or DNS name) and the port
number. (These are commands for general usage; some clients do not allow you to specify the
port as an argument and some types of Linux might require extra commands).
2. Enter the user name and password (by default, apc and apc for the Super User and
Administrator, or device and apc for a Device User).
3. If you cannot remember your user name or password, see “Recover from a Lost Password” on
page 10.
apc>
• Two fields identify the operating system (AOS) and application (APP) firmware versions. The
application firmware name identifies the type of device that connects to the network (for example,
a Rack ATS).
Network Management Card AOS vx.x.x
ATS4g APP vx.x.x
• Three fields identify the system name, contact person, and location of the Rack ATS.
Name : Test Lab
Contact : Don Ad ams
Location : Building 3
• An Up Time field reports how long the Rack ATS Management Interface has been running since it
was last turned on or reset.
Up Time: 0 Days, 21 Hours, 21 Minutes
• Two fields identify when you logged in, by date and time.
Date: 11/2/2018
Time: 09:06:45
• The User field identifies whether you logged in through the Super User, Administrator, Device
User, Read-Only, or Network-Only account.
User: Administrator
NOTE: If P+ is not displayed, contact the APC by Schneider Electric Customer Care Center at
www.apc.com/support.
In this example, the ftp command accepts the option -p, which defines the port number, and the option
-S, which enables or disables the FTP feature.
In this example, the option -p accepts only three arguments: all, warning, or critical. For example,
to view the number of active critical alarms, type:
alarmcount -p critical
The command will fail if you type an argument that is not specified.
The CLI reports all command operations with the following format:
Code Message
E000 Success
E001 Successfully Issued
E002 Reboot required for change to take effect
E100 Command failed
E101 Command not found
E102 Parameter Error
Reported when there is any problem with the arguments supplied to the command:
too few, too many, wrong type, etc.
E103 Command Line Error
E104 User Level Denial
E105 Command Prefill
E106 Data Not Available
E200 Input error. Only reported when an error occurs during the execution of a command.
E201 No Response. Reported when a sensor fails to respond.
E202 User already exists
E203 User does not exist
E204 User does not have access to this command.
Description: View a list of all the CLI commands available to your account type, or view help text for a
specific command.
Parameters: [<command>]
Example 1:
apc> ?
System Commands:
-----------------------------------------------------------------------
For command help: command ?
Device Commands:
---------------------------------------------------------------------------
aboutATS atsMeasure atsStatus bkLowLoad bkNearOver bkOverLoad
bkPeakLoad bkReading freqDeviat eventCounts frontPanel lcd
lcdBlink lineVRMS prodInfo sourceAName sourceBName sourcePref
vMediumLmt vNarrowLmt vSensitvty vWideLmt vXferRange
Example 2:
apc> boot help
Usage: boot -- Configuration Options
boot [-b <dhcp | Bootp | manual>] (IPv4 Boot Mode)
[-c <enable | disable>] (Require DHCP Cookie)
[-v <vendor class>]
[-i <client id>]
[-u <user class>]
Description: Displays system information (Model Number, Serial Number, Manufacture Dates, etc.)
Parameters: None
Example:
apc> about
E000: Success
Hardware Factory
---------------
Model Number: AP44XX
Serial Number: ST181313012345
Hardware Revision: R05
Manufacture Date: 05/06/07
MAC Address: 00 C0 B7 18 00 01
Management Uptime: 0 Days 1 Hour 42 Minutes
Application Module
---------------
Name: ats4g
Version: v6.6.4
Date: Sep 19 2018
Time: 18:46:52
APC OS(AOS)
---------------
Name: aos
Version: v6.6.4
Date: Aug 3 2018
Time: 16:00:07
Description: Displays alarms present in the system. Information about the alarms is provided in the
event log.
Parameters:
Option Argument Description
-p all View the total number of active alarms reported by the Rack ATS.
warning View the number of any kind of active alarm reported by the Rack ATS.
critical
informational
Description: Allows the user to get/set the network startup configuration of the device, such as setting
boot mode.
Parameters:
Option Argument Description
-b <dhcp | bootp | manual> Define how the TCP/IP settings will be configured when the
Rack ATS turns on, resets, or restarts. See “Configure TCP/IP
and communication settings for IPv4 and IPv6” on page 90 for
information about each boot mode setting.
-c <enable | disable> dhcp boot mode only: Enable or disable the requirement that
the DHCP server provide the APC cookie.
-v <vendor class> dhcp boot mode only: the Vendor Class is APC.
-i <client id> dhcp boot mode only: the MAC address of the NMC, Which
uniquely identifies it on the network.
-u <user class> dhcp boot mode only: the name of the application firmware
module.
DHCP Settings
-------------
Retry then stop: 4
DHCP cookie is: enable
BOOTP Settings
--------------
Retry then fail: never
On retry failure: prevSettings
Parameters: None
Example:
apc> exit
Bye
cd
Access: Super User, Administrator, Device User, Read Only
Description: Allows the user to set the working directory of the file system. The working directory is set
back to the root directory ‘/’ when the user logs out of the CLI.
Example:
apc> cd logs
E000: Success
apc> cd /
E000: Success
Description: Enable or disable cryptographic algorithms for Web UI sessions. You cannot enable or
disable these algorithms directly from the Web UI. You must reboot your appliance after enabling or
disabling algorithms for changes to take effect.
There are three categories of algorithms: Authentication algorithms, Block Cipher algorithms, and MAC
algorithms. Available and Blocked Cipher Suites are also listed.
NOTE: Disabling the only algorithm will block all SSL/TLS sessions.
NOTE: The status of an algorithm is toggled when the cipher command is executed. It is recommended
that you check the status of an algorithm before enabling or disabling it.
Parameters:
Option Description
-3des Triple-DES
-rc4 RC4
-aes AES
-dh DH
-rsake RSA Key Exchange
-rsaau RSA Authentication
-md5 MD5
-sha1 SHA
-sha2 SHA256
Authentication Algorithms
-------------------------
(Warning: disabling the only algorithm in category
will block all SSL/TLS sessions)
MAC Algorithms
--------------
MD5 enabled
SHA enabled
SHA256 enabled
Parameters: None
Example: None
console
Access: Super User, Administrator
Description: Define whether users can access the CLI using Telnet, which is enabled by default, or
Secure SHell (SSH), which transmits user names, passwords, and data in encrypted form. You can
change the Telnet or SSH port setting for additional security. Alternately, disable network access to the
CLI.
Parameters:
Option Argument Description
-t <enable | disable> Enable or disable Telnet.
-s <enable | disable> Enable or disable SSH. Enabling SSH enables SCP and
disables Telnet.
-pt <telnet port> Define the Telnet port used to communicate with the Rack ATS
(23 by default, optional 5000–32768).
-ps <SSH port> Define the SSH port used to communicate with the Rack ATS
(22 by default, optional 5000–32768).
-b <2400 | 9600 | 19200 | Configure the speed of the serial port connection (serial baud
38400> rate) in bits per second (bps). The default is 9600 bps.
Description: Get and set the date and time of the system. To configure an NTP server to define the
date and time for the Rack ATS, see “Configure date, time, and daylight savings” on page 107.
Parameters:
Option Argument Description
-d <“datestring”> Set the current date. The format must match the current -f setting.
-t <00:00:00> Configure the current time, in hours, minutes, and seconds. Use the 24-hour
clock format.
-f <mm/dd/yy| Select the numerical format in which to display all dates in this user interface.
dd.mm.yyyy| Each letter m (for month), d (for day), and y (for year) represents one digit.
mmm-dd-yy| Single-digit days and months are displayed with a leading zero.
dd-mmm-yy|
yyyy-mm-dd>
-z <time zone Set the difference with GMT in order to specify your time zone. This enables
offset> you to synchronize with other people in different time zones.
Example 2: To define the date as November 3, 2018 using the yyyy/mm/dd format:
date -d “2018/11/03”
delete
Access: Super User, Administrator
Parameters:
Argument Description
<file name> Type the name of the file to delete.
Example:
apc> delete /db/prefs.dat
E000: Success
Parameters
Argument Description
<all | dir | name> Show the contents of the current (or specified) directory.
Example:
apc> dir
E000: Success
2978816 Aug 3 17:46 apc_hw05_aos_664.bin
1803460 Sep 19 17:44 apc_hw05_ats4g_664.bin
45000 Nov 2 7:45 config.ini
0 Oct 31 14:04 db/
0 Oct 31 14:04 ssl/
0 Oct 31 14:04 ssh/
0 Oct 31 14:04 logs/
0 Oct 31 14:04 sec/
0 Oct 31 14:04 dbg/
0 Oct 31 14:04 fwl/
0 Oct 31 14:04 email/
0 Oct 31 14:04 lang/
0 Oct 31 14:04 rms/
Parameters
Option Argument Description
-OM <enable | disable> Override the manual DNS.
-p <primary DNS server> Set the primary DNS server.
-s <secondary DNS server> Set the secondary DNS server.
-d <domain name> Set the domain name.
-n <domain name IPv6> Set the domain name IPv6.
-h <host name> Set the host name.
-y <enable | disable> System-host name sync
Example:
apc> dns
E000: Success
Active Primary DNS Server: x.x.x.x
Active Secondary DNS Server: x.x.x.x
Parameters:
Option Argument Description
-g[n] <enable | disable> Enable/disable generation.
-t[n] <To Address> Set the To address.
-o[n] <long | short> Set the format (long or short).
-l[n] <Language Code> Set the language code; this should be
supported by current language pack.
-r[n] <Local | recipient | custom> Set the route (local, recipient, or custom).
Custom Route Option
-f[n] <From Address> Set the From address.
-s{n} <SMTP Server> Set the smtp server address.
-p[n] <Port> Set the port.
-a[n] <enable | disable> Enable/disable authentication.
-u[n] <User Name> Set the user name.
-w[n] <Password> Set the password.
-e[n] <none | ifsupported | always | Set the encryption.
implicit>
-c[n] <enable | disable > Enable/disable the requiring of certificates.
-i[n] <Certificate File Name> Set the certificate file name.
n = Email Recipient Number (1,2,3 or 4)
Example:
apc> email
E000: Success
Recipient: 1
Generation: enabled
Address: [email protected]
Format: long
Language: enUs - English
Route: local
Description: View the date and time you retrieved the event log, the status of the Rack ATS, and the
status of sensors connected to the Rack ATS. View the most recent device events and the date and time
they occurred. Use the following keys to navigate the event log:
Key Description
ESC Close the event log and return to the CLI.
ENTER Update the log display. Use this command to view events that were recorded after you last
retrieved and displayed the log.
SPACEBAR View the next page of the event log.
B View the preceding page of the event log. This command is not available at the main page of
the event log.
D Delete the event log. Follow the prompts to confirm or deny the deletion. Deleted events cannot
be retrieved.
Example:
apc> eventlog
---- Event Log -----------------------------------------------------
Date: 11/02/2018 Time: 09:06:45
------------------------------------
Automatic Transfer Switch: Source B selected, Switchover Possible
exit
See “bye, exit, or quit” on page 26.
Description: Establishes a barrier between a trusted, secure internal network and another network.
Parameters:
Option Argument Description
-S <enable | disable> Enable or disable the Firewall.
-f <file name to activate> Name of the firewall to activate.
-t <file name to test> Name of firewall to test and
<duration time in minutes> duration time in minutes.
-fe No argument. List only Shows active file errors.
-te No argument. List only Shows test file errors.
-c No argument. List only Cancel a firewall test.
-r No argument. List only Shows active firewall rules.
-l No argument. List only Shows firewall activity log.
-Y No argument. Skip firewall test prompt.
Example 1:
apc> firewall -S enable
Firewall should be tested with “firewall -t example.fwl” before
enabling it. Are you sure you want to enable it now?
Enter ‘YES’ to continue or <ENTER> to cancel : YES
E000: Success
Example 2:
apc> firewall -S enable -Y
E000: Success
format
Access: Super User, Administrator
Description: Allows the user to format the FLASH file system. This will delete all configuration data,
event and data logs, certificates and keys.
Parameters: None
Example:
apc> format
Format FLASH file system
Warning: This will delete all configuration data,
event and data logs, certs and keys.
Enter 'YES' to continue or <ENTER> to cancel:
apc> YES
Parameters:
Option Argument Description
-p <port number> Define the TCP/IP port that the FTP server uses to communicate with
the Rack ATS (21 by default). The FTP server uses both the specified
port and the port one number lower than the specified port. Valid
values are 21 and 5000-32768.
-S <enable | disable> Configure access to the FTP server.
apc> ftp
E000: Success
Service: Enabled
Ftp Port: 5001
apc> ftp -p 21
E000: Success
Reboot required for change to take effect
help
See “? or help” on page 22.
lang
Access: Super User, Administrator, Device User, Read Only
Parameters: None
Example:
apc> lang
E000: Success
Languages
enUs - English
Parameters: None
Example:
apc> lastrst
04 Requested Reset
E000: Success
ledblink
Access: Super User, Administrator, Device User
Parameters:
Argument Description
<duration time in minutes> Set the number of minutes for the LED to blink.
Example:
apc> ledblink 2
E000 Success
logzip
Access: Super User, Administrator, Device User
Parameters:
Option Argument Description
-m <email recipient> Email recipient number (1-4)
Example:
apc> logzip -m 1
Generating files
Compressing files into /dbg/debug_ZA1023006009.tar
E000: Success
Parameters: None
Example:
apc> netstat
Current IP Information:
ntp
Access: Super User, Administrator
Parameters
Option Argument Description
-OM <enable | disable> Override the manual settings.
-p <primary NTP server> Specify the primary server.
-s <secondary NTP Specify the secondary server.
server>
Parameters
Argument Description
<IP address or DNS name> Type an IP address with the format xxx.xxx.xxx.xxx, or the DNS name
configured by the DNS server.
Example:
apc> ping 192.168.1.50
E000: Success
Reply from 192.168.1.50: time(ms)= <10
Reply from 192.168.1.50: time(ms)= <10
Reply from 192.168.1.50: time(ms)= <10
Reply from 192.168.1.50: time(ms)= <10
portSpeed
Access: Super User, Administrator
Parameters
Option Argument Description
-s <auto | 10H | 10F Define the communication speed of the Ethernet port. The auto
| 100H | 100F> command enables the Ethernet devices to negotiate to transmit at the
highest possible speed. See “Configure network port speed” on
page 92 for more information about the port speed settings.
H = Half Duplex 10 = 10 Meg Bits
F = Full Duplex 100 = 100 Meg Bits
Example:
apc> portspeed
E000: Success
Port Speed: Auto_negotiation
Current Port Speed: 100 Full_Duplex
Parameters
Option Argument Description
-s long The prompt includes the account type of the currently logged-in user.
short The default setting. The prompt is four characters long: APC>
Example:
apc> prompt –s long
E000: Success
apc>_
pwd
Access: Super User, Administrator, Device User, Read Only
Parameters: None
Example:
apc> pwd
/
apc> cd logs
E000: Success
apc> pwd
/logs
Description: View the existing RADIUS settings, enable or disable RADIUS authentication, and
configure basic authentication parameters for up to two RADIUS servers.
For a summary of RADIUS server configuration and a list of supported RADIUS servers, see “Configure
the RADIUS server” on page 86.
Additional authentication parameters for RADIUS servers are available at the Web UI of the Rack ATS.
See “Manage remote user settings” on page 85 for more information.
For detailed information about configuring your RADIUS server, see the Security Handbook, available at
www.apc.com.
Parameters
Option Argument Description
-a <local | Configure RADIUS authentication:
radiusLocal • local: RADIUS is disabled. Local authentication is enabled.
| radius> • radiusLocal: RADIUS, then Local Authentication. RADIUS and local
authentication are enabled. Authentication is requested from the RADIUS
server first. If the RADIUS server fails to respond, local authentication is used.
• radius: RADIUS is enabled. Local authentication is disabled.
-p1 <server IP> The server name or IP address of the primary or secondary RADIUS server.
-p2 NOTE: RADIUS servers use port 1812 by default to authenticate users. To use a
different port, add a colon followed by the new port number to the end of the
RADIUS server name or IP address. The Rack ATS supports ports 1812, 5000 to
32768.
-o1 <server The port for the primary or secondary RADIUS sever.
-o2 port>
-s1 <server The shared secret between the primary or secondary RADIUS server and the
-s2 secret> Rack ATS.
-t1 <server The time in seconds that the Rack ATS waits for a response from the primary or
-t2 timeout> secondary RADIUS server.
Example 1: To view the existing RADIUS settings for the Rack ATS, type radius and press ENTER.
apc> radius
E000: Success
Access: Local Only
Primary Server: 0.0.0.0
Primary Server Port: 1812
Primary Server Secret: <Password Hidden>
Primary Server Timeout: 5
Secondary Server: 0.0.0.0
Secondary Server Port: 1812
Secondary Server Secret: <Password Hidden>
Secondary Server Timeout: 5
Description: Restart the NMC interface of the Rack ATS only. Forces the network device to reboot. User
must confirm this operation by entering a “YES” after the command has been entered.
Parameters:
Option Description
-Y Skip confirmation prompt. (Uppercase Y only.)
Example 1:
apc> reboot
E000: Success
Reboot Management Interface
Enter 'Y' to continue or <ENTER> to cancel : <user enters ‘YES’>
Rebooting...
Example 2:
apc> reboot -Y
E000: Success
Reboot Management Interface
Rebooting...
resetToDef
Access: Super User, Administrator
Parameters:
Option Argument Description
-p <all | keepip> • all: all configuration data, including the IP address.
• keepip: all configuration data, except the IP address.
Reset all configuration changes, including event actions, device settings,
and, optionally, TCP/IP configuration settings.
Example: To reset all of the configuration changes except the TCP/IP settings for the Rack ATS, type:
resetToDef -p keepip
Enter 'YES' to continue or <ENTER> to cancel : : <user enters ‘YES’>
all User Names, Passwords.
Please wait...
Description: Records who is logged in, the serial, time and ID.
Parameters:
Option Argument Description
-d <session ID> End user session.
-m <enable | disable> Allow multiple users to be logged on at once.
-a <enable | disable> Enable or disable Serial Remote Authentication
Override, which allows users to Bypass RADIUS by
using a serial connection to the CLI.
Example:
apc> session
User Interface Address Logged In Time ID
--------------------------------------------------------------------
apc Web x.x.x.x 00:00:08 156
apc Telnet x.x.x.x 00:00:02 157
E000: Success
Parameters:
Option Argument Description
-f <From Address> Set e-mail From address.
-s <SMTP Server> Set the SMTP server address.
-p <Port> Set e-mail recipient port number. Options
include 25, 2525, 465, 587, and 5000 to
32768.
-a <enable | disable> Enable or disable authentication
-u <User Name> Set user name for authentication.
-w <Password> Set e-mail password for authentication.
-e <none | ifavail | always | implicit> Define when to use encryption.
-c <enable | disable> Enable or disable certificate requirement.
-i <Certificate File Name> Set the certificate file name.
Example:
apc> smtp
E000: Success
From: [email protected]
Server: mail.example.com
Port: 25
Auth: disabled
User: User
Password: <not set>
Encryption: none
Req. Cert: disabled
Cert File: <n/a>
Description: Enable or disable SNMPv1. Set configuration for up to 4 Access Control groups.
Parameters:
Option Argument Description
-S <enable | disable> Enable or disable SNMPv1.
-c[n] <Community> Identify the group of Rack ATS units for
access control.
-a[n] <read | write | writeplus | disable> Set the access level.
-n[n] <IP or Domain Name> Set the host’s name or address
[n] = Access Control # (1, 2, 3, or 4)
Example:
apc> snmp
E000: Success
SNMPv1: enabled
Access Control #: 2
Community: private
Access Type: write +
Address: 0.0.0.0
Access Control #: 3
Community: public2
Access Type: disabled
Address: 0.0.0.0
Access Control #: 4
Community: private2
Access Type: disabled
Address: 0.0.0.0
Parameters
Option Argument Description
-S <enable | disable> Enable or disable SNMPv3.
-u[n] <User Name> Set the User Name for access control.
-c[n] <Crypt Phrase> Set the encryption phrase for access control.
-a[n] <Auth Phrase> Set the authentication phrase for access control.
-n[n] <IP or Domain Name> Set the host’s name or address for access control.
-ap[n] <sha | md5 | none> Set the authentication protocol for access control.
-pp[n] <aes | des | none> Set the privacy protocol for access control.
-ac[n] <enable | disable> Enable or disable access for this user profile.
-au[n] <Nms IP> Set NMS IP for access control.
[n] = Access Control # (1, 2, 3, or 4)
Example:
apc> snmpv3
E000: Success
SNMPv3 Configuration
SNMPV3: disabled
Index: 1
User Name: apc snmp profile1
Authentication: None
Encryption: None
Index: 2
User Name: apc snmp profile2
Authentication: None
Encryption: None
Index: 1
User Name: apc snmp profile1
Access: disabled
NMS IP/Host Name: 0.0.0.0
Index: 2
User Name: apc snmp profile2
Access: disabled
NMS IP/Host Name: 0.0.0.0
Parameters:
Option Argument
-c[n] <Community> Set the community for the trap receiver.
-r[n] <Receiver NMS IP> Set the NMS IP address for the trap receiver.
-l[n] <Language> Enter the language code for the trap receiver.
-t[n] <snmpV1 | snmpV3> Set the trap type for the trap receiver.
-g[n] <enable | disable> Enable or disable trap generation for the trap receiver.
-a[n] <enable | disable> Enable or disable trap authentication traps for the trap
receiver.
-u[n] <profile1 | profile2 | Set the user name for a trap receiver profile.
profile3 | profile4>
[n] = Trap receiver # (1,2,3,4,5 or 6)
Example:
apc> snmptrap
E000: Success
Index: 1
Receiver IP: x.x.x.x
Community: public
Trap Type: SNMPV1
Generation: disabled
Auth Traps: enabled
User Name: apc snmp profile1
Language: enUs - English
Description: View and set the system name, the contact, the location and view up time as well as the
date and time, the logged-on user, and the high-level system status P, N, A (see “About the Main Screen”
on page 18 for more information about system status).
Parameters:
Optio
n Argument Description
-n <system-name> Define the device name, the name of the person responsible for the
device, and the physical location of the device. These values are also
-c <system-contact> used by StruxureWare Data Center Expert, EcoStruxure IT, and the
-l <system-location> Rack ATS’s SNMP agent.
NOTE: If you define a value with more than one word, you must
enclose the value in quotation marks.
-m <system-message> When defined, a custom message will appear on the log on screen for
all users.
-s <enable | disable>] Allow the host name to be synchronized with the system name so both
fields automatically contain the same value.
NOTE: When enabling this feature, the system name identifier can no
longer contain a space character (since it will be synchronized to the
host name field).
Example 1:
apc> system
E000: Success
Host Name Sync: Disabled
Name: apcB76B83
Contact: Unknown
Location: Unknown
Message:
DateTime: 11/02/2018:09:06:45
User: apc
Up Time: 5 Days 2 Hours 35 Minutes
Stat: P+ N4+ N6+ A+
Bootmon: bootmon:v1.0.8
AOS: aos:v6.6.4
App: ats4g:v6.6.4
Description: View and manually configure these network settings for the Rack ATS.
Parameters:
Option Argument Description
-i <IPv4 address> Enter the IPv4 address of the Rack ATS, using the format
xxx.xxx.xxx.xxx
-s <subnet mask> Enter the subnet mask for the Rack ATS.
-g <gateway> Enter the IP address of the default gateway. Do not use the loopback
address (127.0.0.1) as the default gateway.
-d <domain name> Enter the DNS name configured by the DNS server.
-h <host name> Enter the host name that the Rack ATS will use.
-S <enable | disable> Enable or disable IPv4.
Example 1: To view the network settings of the Rack ATS, type tcpip and press ENTER.
apc> tcpip
E000: Success
Example 2: To manually configure an IP address of 150.250.6.10 for the Rack ATS, type:
apc> tcpip -i 150.250.6.10
E000: Success
Description: Enable IPv6 and view and manually configure network settings for the Rack ATS.
Parameters:
Option Argument Description
-S <enable | disable> Enable or disable IPv6.
-man <enable | disable> Enable or disable manual addressing for the IPv6 address.
-auto <enable | disable> Enable or disable automatic configuration for the IPv6 address.
-i <IPv6 address> Set the IPv6 address of the Rack ATS.
-g <IPv6 gateway> Set the IPv6 address of the default gateway.
-d6 <router | stateful Set the DHCPv6 mode:
| stateless | • router: DHCPv6 is controlled by the flags received in IPv6 router
never> advertisements.
• statefull: DHCPv6 is used to obtain addresses AND other
configuration settings.
• stateless: DHCPv6 is used to configure settings other than
addresses.
• never: Disable DHCP.
Example: To view the network settings of the Rack ATS, type tcpip6 and press ENTER.
apc> tcpip6
E000: Success
IPv6: enabled
Manual Settings: disabled
Description: Configure individual user accounts. All users must have a user name, password, and
account type. You can edit a user account, but not a user name. You must delete the account and then
create a new user. User values left unconfigured will be controlled by the userdflt command. For
information on the permissions granted to each account type, see “Types of User Accounts” on page 5.
Parameters
Option Argument Description
-n <user> Set user name, or define the user for whom you are changing
settings.
-cp <current password> Required to create a Super User account.
-pw <user password> Set a new user password.
-pe <Administrator | Set the user permission level.
Device | Read-Only |
Network-Only>
-d <user description> Provide additional details about the user.
-e <enable | disable> Enable or disable access to the ATS.
-st <session timeout> Specify how long a session waits before logging off a user when
the keyboard is idle.
-sr <enable | disable> Enable or disable Serial Remote Authentication Override, which
allows users to Bypass RADIUS by using a serial connection to
the CLI.
-el <enable | disable> Enable or disable Event Log color coding.
-lf <tab | csv> Set the format for exporting a log file.
-ts <us | metric> Set the temperature scale: Fahrenheit or Celsius.
-df <mm/dd/yyyy | Set a date format.
dd.mm.yyyy | mmm-dd-
yy | dd-mmm-yy |
yyyy-mm-dd>
-lg <language code> Set the user language.
-del <user name> Delete a user.
-l none Show the current user list.
Example:
apc> user -n apc
E000: Success
Access: Enabled
User Name: apc
Password: <hidden>
User Permission: Super User
User Description: User Description
Session Timeout: 3 minutes
Serial Remote Authentication Override: Disabled
Event Log Color Coding: Enabled
Export Log Format: Tab
Temperature Scale: Metric
Date Format: mm/dd/yyyy
Language: English (enUs)
Description: Complimentary function to “user” establishing default user preferences. There are two
main features for the default user settings:
• Determine the default values to populate in each of the fields when the Super User or
Administrator-level account creates a new user. These values can be changed before the settings
are applied to the system.
• For remote users (user accounts not stored in the system that are remotely authenticated such as
RADIUS) these are the values used for those that are not provided by the authenticating server.
For example, if a RADIUS server does not provide the user with a temperature preference, the
value defined in this section will be used.
Parameters:
Options Argument Description
-e <enable | disable> By default, user will be enabled or disabled upon creation.
-pe <Administrator | Device | Specify the default permission level and account type.
Read-Only | Network-Only>
-d <user description> Provide additional details about the user.
-st <session timeout> Enter the number of minutes the ATS waits before logging
out an inactive user.
-bl <bad login attempts> Number of incorrect login attempts allowed. Upon reaching
this limit, a message is displayed saying the account has
been locked. The Super User or an Administrator-level
account is needed to re-enable the account.
Example:
apc> userdflt
E000: Success
Access: Disabled
User Permission: Administrator
User Description: User Description
Session Timeout: 3 minutes
Bad Login Attempts: 0
Event Log Color Coding: Enabled
Export Log Format: Tab
Temperature Scale: Metric
Date Format: mm/dd/yyyy
Language: English (enUs)
Strong Passwords: Disabled
Require Password Change: 0 day(s) (Disabled)
For additional security, you can change the port setting for HTTP and HTTPS to any unused port from
5000 to 32768. Users must then use a colon (:) in the address field of the browser to specify the port
number. For example, for a port number of 5000 and an IP address of 152.214.12.114, type:
http://152.214.12.114:5000
Parameters:
Option Argument Description
-h <enable | disable> Enable or disable HTTP.
-s <enable | disable> Enable or disable HTTPS. When HTTPS is enabled, data is
encrypted during transmission and authenticated by a
digital certificate.
-ph <http port #> Specify the TCP/IP port used by HTTP to communicate
with the Rack ATS (80 by default). The other available
range is 5000–32768.
-ps <https port #> Specify the TCP/IP port used by HTTPS to communicate
with the Rack ATS (443 by default). The other available
range is 5000–32768.
-mp <SSL3.0 | TLS1.0 | TLS1.1 Enter the minimum security protocol.
| TLS1.2>
whoami
Access: Super User, Administrator, Device Only, Read Only
Parameters: None
Example:
apc> whoami
E000: Success
admin
Description: Use XMODEM to upload an .ini file to the NMC while you are accessing the CLI through a
serial connection. After the upload completes:
• If there are any system or network changes, the CLI restarts and you must log on again.
• If you selected a baud rate for the file transfer that is not the same as the default baud rate for the
Rack ATS, you must reset the baud rate to the default to reestablish communication with the Rack
ATS.
Parameters: None
Example:
apc> xferINI
Enter 'YES' to continue or <ENTER> to cancel : <user enters ‘YES’>
------- File Transfer Baud Rate------------------------------
1- 2400
2- 9600
3- 19200
4- 38400
> <user enters baudrate selection>
Transferring at current baud rate (9600), press <ENTER>...
<user presses <ENTER>>
Start XMODEM-CRC Transfer Now!
CC
<user starts sending INI>
150 bytes have successfully been transmitted.
apc>
xferStatus
Access: Super User, Administrator
Description: View the result of the last file transfer. See “Verifying Upgrades and Updates” on page 126
for descriptions of the transfer result codes.
Parameters: None
Example:
apc> xferStatus
E000: Success
Result of last file transfer: OK
aboutATS
Access: Super User, Administrator, Device User, Read Only User
Parameters: None
Example:
apc> aboutATS
E000: Success
Model: AP4450
Firmware Rev: 6.2.3
Firmware Date: 02/13/18
Hardware Rev: R01
Manufacture Date: 03/29/17
Serial Number: 5AXXXXXXXXX
Downloader Rev: 4.0
atsStatus
Access: Super User, Administrator, Device User, Read Only User
Parameters: None
Example:
apc> atsStatus
E000: Success
Communication Status: OK
Selected Source: Source B
Preferred Source: Source B
Switch Status: OK
Front Panel: Unlocked
Source A: OK
Source B: Selected
Phase Synchronization: Sync
Source A 24V Power Supply: OK
Source B 24V Power Supply: OK
Source A 24V Boost Voltage: OK
Source B 24V Boost Voltage: OK
3.3V Power Supply: OK
1.0V Power Supply: OK
Parameters: None
Example:
apc> atsMeasure
E000: Success
Source A Freq: 60 Hz
Source A Voltage: 121 V
Source B Freq: 60 Hz
Source B Voltage: 121 V
Total Output Power: 1.00 kVA
Source A 24V Power Supply: 24 V
Source B 24V Power Supply: 24 V
Source A Boost Voltage: 40 V
Source B Boost Voltage: 40 V
3.3 V Power Supply: 3.3 V
1.0 V Power Supply: 1.0 V
Description: Set or view the bank low-load threshold current in amps. Only single phase SKUs with two
or more circuit breakers support this command.
Parameters:
Argument Description
<all | bank#> • all: all bank numbers
• bank#: A single number, a range of numbers separated with a dash, or a
comma-separated list of single bank number and/or number ranges.
<current> The new bank threshold (Amps)
NOTE: The maximum bank number is 3. If the ATS has only two circuit breakers, a total load for the two circuit
breakers is provided.
Example:
apc> bkLowLoad all
E000: Success
1: 0 A
2: 0 A
total: 0 A
apc> bkLowLoad 1
E000: Success
1: 0 A
apc> bkLowLoad 1 1
E000: Success
Description: Set or view the bank near-overload threshold current in amps. Only single phase SKUs
with two or more circuit breakers support this command.
Parameters:
Argument Description
<all | bank#> • all: all bank numbers
• bank#: A single number, a range of numbers separated with a dash, or a
comma-separated list of single bank number and/or number ranges.
<current> The new bank threshold (Amps)
NOTE: The maximum bank number is 3. If the ATS has only two circuit breakers, a total bank threshold is
provided.
Example:
apc> bkNearOver all 10
E000: Success
apc> bkNearOver 1
E000: Success
1: 10 A
apc> bkNearOver 1 12
E000: Success
Description: Set or view the bank overload threshold current in amps. Only single phase SKUs with two
or more circuit breakers support this command.
Parameters:
Argument Description
<all | bank#> • all: all bank numbers
• bank#: A single number, a range of numbers separated with a dash, or a
comma-separated list of single bank number and/or number ranges.
<current> The new bank threshold (Amps)
NOTE: The maximum bank number is 3. If the ATS has only two circuit breakers, a total bank threshold is
provided.
Example:
apc> bkOverLoad all
E000: Success
1: 14 A
2: 14 A
total: 24 A
apc> bkOverLoad 1
E000: Success
1: 14 A
apc> bkOverLoad 1 16
E000: Success
Description: Display the peak load measurement from a bank(s). Only single phase SKUs with two or
more circuit breakers support this command.
Parameters:
Argument Description
<all | bank#> • all: all bank numbers
• bank#: A single number, a range of numbers separated with a dash, or a
comma-separated list of single bank number and/or number ranges.
NOTE: The maximum bank number is 3. If the ATS has only two circuit breakers, a total bank threshold is
provided.
Example:
apc> bkPeakLoad all
E000: Success
1: 5.0 A
2: 5.0 A
total: 11.0 A|
apc> bkPeakLoad 1
E000: Success
1: 5.0 A
Description: View the current reading (measurement) in amps for a bank. Only single phase SKUs with
two or more circuit breakers support this command.
Parameters:
Argument Description
<all | bank#> • all: all bank numbers
• bank#: A single number, a range of numbers separated with a dash, or a
comma-separated list of single bank number and/or number ranges.
NOTE: The maximum bank number is 3. If the ATS has only two circuit breakers, a total bank threshold is
provided.
Example:
apc> bkReading 1
E000: Success
1: 6.3 A
Description: Display or clear the event counts reported from the ATS controller.
Example:
apc> eventCounts
E000: Success
Event Counts
------------
Redundancy Loss: 15
Source Switch: 80
Over Current: 0
Source Preference Change: 7
Spike/Dropout: 95
Surge/Droop: 0
Frequency out of Range: 9
freqDeviat
Access: Super User, Administrator, Device User
Parameters:
Argument Description
<3 | 5 | 10> The new range of acceptable frequency deviation: 3, 5, or 10 Hz above or
below the nominal frequency.
If the Frequency (see “atsMeasure” on page 56) is at 50 Hz and vSensitvty (page 68) is set to High, freqDeviat
should be 3 or 5.
Example:
apc> freqDeviat
E000: Success
Frequency Deviation: 3 Hz
Description: Set or view control for the source button on the front panel.
Parameters:
Argument Description
<locked | unlocked> Lock or unlock the front panel for use.
Example:
apc> frontPanel
E000: Success
Front Panel: unlocked
lcd
Access: Super User, Administrator, Device User
Example:
apc> lcd off
E000: Success
lcdBlink
Access: Super User, Administrator
Description: Specify a number of minutes to blink the display. This command can be canceled by
pressing a button on the LCD. Valid range is [1-10].
Parameters: <time>
Example:
apc> lcdBlink 2
E000: Success
Description: Read or set the nominal source line voltage (V). Acceptable values depend on the SKU# of
your ATS.
Parameters: [<voltage>]
SKU Acceptable values
AP4421, AP4422, AP4423, AP4424 230
AP4430, AP4432 200 or 208
AP4431, AP4433, AP4434 208
AP4450 100 or 120
AP4452, AP4453 120
AP4452J 100
Example:
apc> lineVRMS
E000: Success
Nominal Line Voltage: 120
phLowLoad
NOTE: Only units without circuit breakers are supported by this command.
Parameters: <current>
Example:
apc> phLowLoad
E000: Success
0 A
apc> phLowLoad 3
E000: Success
Parameters: <current>
Example:
apc> phNearOver
E000: Success
8 A
apc> phNearOver 9
E000: Success
phOverLoad
NOTE: Only units without circuit breakers are supported by this command.
Parameters: <current>
phPeakLoad
NOTE: Only units without circuit breakers are supported by this command.
Parameters: None
Example:
apc> phPeakLoad
E000: Success
4.0 A
Parameters: None
Example:
apc> phReading
E000: Success
4.0 A
prodInfo
Access: Super User, Administrator, Device User, Read Only
Parameters: None
Example: To view the product information for this Rack ATS, type:
apc> prodInfo
E000: Success
AOS: 6.6.4
APP 6.6.4
Model: AP4450
Name: apcRack_01
Location: Data Center Row 3
Contact: Don Adams
Outlets: 10
Rated Load: 12 A
Phases: 1
Uptime: 15 Days 1 Hours 8 Minutes
Network Link: Link Active
sourceAName
Access: Super User, Administrator, Device User
Parameters: <sourcAName>
Example:
apc> sourceAName
E000: Success
Wall Box Phase L1
Parameters: <sourceBName>
Example:
apc> sourceBName
E000: Success
Wall Box Phase L2
sourcePref
Access: Super User, Administrator, Device User
vMediumLmt
Access: Super User, Administrator, Device User
Description: Set or view the voltage range to use when the Voltage Transfer Range is set to Medium.
This value must be greater than the Narrow Transfer Limit and less than the Wide Limit (V).
Parameters: [<limit>]
The value range depends on the SKU:
SKU Acceptable values
AP4421, AP4422, AP4423, AP4424 16–25
AP4430, AP4432, AP4433, AP4434 15–30
AP4452J 10–15
AP4450, AP4452, AP4453 10–23
Example:
apc> vMediumLmt
E000: Success
Voltage Medium Limit: 12 V
apc> vMediumLmt 14
E000: Success
Description: Set or view the voltage range to use when the Voltage Transfer Range is set to Narrow.
This value must be less than the Medium Limit.
Parameters: [<limit>]
The value range depends on the SKU:
SKU Acceptable values
AP4421, AP4422, AP4423, AP4424 16–25
AP4430, AP4432, AP4433, AP4434 15–30
AP4452J 10–15
AP4450, AP4452, AP4453 10–23
Example:
apc> vNarrowLmt
E000: Success
Voltage Narrow Limit: 15 V
vSensitvty
Access: Super User, Administrator, Device User
Parameters:
Argument Description
<High | Low> Set the sensitivity of the ATS.
• High: The ATS will switch power sources after 2ms when there is a
disturbance in the power supply.
• Low: The ATS will switch sources after 4ms when there is a disturbance in
the power supply
NOTE: If the Frequency is at 50 Hz (see “atsMeasure” on page 56) and FreqDeviat is set to 10, vSensitvty
should be set to Low.
Example:
apc> vSensitvty
E000: Success
Voltage Sensitivity: Low
Description: Set or view the voltage range to use when Voltage Transfer Range is set to Wide. This
value must be greater than the Medium Limit.
Parameters: [<limit>]
Example:
apc> vWideLmt
E000: Success
Voltage Wide Limit: 20
apc> vWideLmt 24
E000: Success
vXferRange
Access: Super User, Administrator, Device User
Description: Set or view the Voltage Transfer Range. If the voltage of an ATS exceeds the Transfer
Range, it generates an alarm.
Parameters:
Argument Description
<Wide | Medium | Set the Voltage transfer range.
Narrow> • Wide: corresponds to configured values for vWideLmt.
• Medium: corresponds to configured values for vMediumLmt.
• Narrow: corresponds to configured values for vNarrowLmt.
Example:
apc> vXferRange
E000: Success
Voltage Transfer Range: Medium
apc> vXferRange Wide
E000: Success
To access the Web UI on any operating system, use the latest releases of Mozilla Firefox®, or
Google Chrome®. Other commonly available browsers also may work but have not been fully tested by
APC by Schneider Electric.
The ATS cannot work with a proxy server. Before accessing the Web UI of the ATS, do one of the
following:
• Configure the browser to disable the use of a proxy server for your ATS.
• Configure the proxy server so that it does not proxy the specific IP address of your ATS.
NOTE: If you are using HTTPS (SSL/TLS) as your access protocol, your login credentials are compared
with information in a server certificate. If the certificate was created with the Security Wizard, and an IP
address was specified as the common name in the certificate, you must use an IP address to log on to
the Rack ATS.
If a DNS name was specified as the common name on the certificate, you must use a DNS name to log
on.
Web UI Features
Read the following to familiarize yourself with basic Web UI features for your Rack ATS.
Tabs
The following tabs are available:
• Home: Appears when you log on. View active alarms, the load status of the Rack ATS, and the
most recent Rack ATS events. For more information, see “Home Tab” on page 73.
NOTE: Home is the default tab when you log on. To change the login page, go to the desired
login page and then click the green pushpin at the top right of the browser window.
• Status: Gives the user the status of the ATS and Network. The ATS tab covers the status of
Alarms, Device, Unit, Load, and Measurement. The Network tab covers just the Network. For
more information, see “Status Tab” on page 74.
• Control: The Control tab covers Security and Network. Much more information is covered
under these tabs and will be described under “Control Tab” on page 77.
• Configuration: The Configuration tab covers ATS, Security, Network, Notification, General
and Logs. Much more information is covered under each of these tabs and will be under
“Configuration Tab” on page 78.
• Tests: The Tests tab covers ATS and Network. The ATS tab covers LCD Blink and the Network
tab covers LED Blink. Both will be further described under “Tests Tab” on page 111.
• Logs: The Logs section covers Event, Data and Firewall. The Event and Data tabs cover more
information which will be further discussed under “Logs Tab” on page 112.
• About: The About section covers ATS, Network, and Support, which will be further discussed
under “About Tab” on page 117.
Warning: An alarm condition requires attention and could jeopardize your data or equipment if
its cause is not addressed.
No Alarms: No alarms are present, and the Rack ATS and NMC are operating normally.
At the upper right corner of every page, the Web UI displays the same icons currently displayed on the
Home page to report Rack ATS status:
• The No Alarms icon if no alarms exist.
• One or both of the other icons (Critical and Warning) if any alarms exist, and after each icon, the
number of active alarms of that severity.
Quick Links
At the lower left on each page of the interface, there are three configurable links. By default, the links
access the URLs for these Web pages:
• Link 1: The home page of APC by Schneider Electric website
• Link 2: Demonstrations of Schneider Electric Web-enabled products
• Link 3: Information on Schneider Electric Remote Monitoring Service
Switch/Source Status: shows the selected source and whether switchover is possible.
Load Status: View the load for the device in kVA and the load for the phases and banks in A, as
applicable. The meter shows the current load status: normal (green), near overload (yellow), or overload
(red). To see the Device Status, click the More button.
NOTE: If a low load threshold is configured, the meter will also include a blue segment on the left.
Parameters
• Name: The configured name for the Rack ATS
• Location: The physical location of the Rack ATS
• Contact: The person responsible for the Rack ATS
• Model Number: Also called SKU number. Acceptable voltage configurations are specific to model
numbers. For details, see the Specification Sheet for your ATS model on www.apc.com.
• Rating: Provides the number of metered phases and banks on the unit, in addition to the phase
rating of the ATS.
• User Type: Type of user account accessing the Rack ATS. Your user type defines what
permissions you have. See “Types of User Accounts” on page 5 for details.
• Uptime: Amount of time the Rack ATS has been operating since the last reboot from either a
power cycle or a reboot of the Management Interface
Recent Device Events: View the most recent Events, including the dates and times they occurred. A
maximum of five Events are shown at one time. Click More Events to go to the Logs tab and view the
entire event log.
View the following Event counts: Redundancy Loss, Source Switch, Over Current, Source
Preference Change, Spike/Dropout, Surge/Droop, and Frequency Out of Range. To reset these
counts to 0, select Reset Event Count and click Apply.
Default Gateway: The IP address of the router used to connect to the network.
Mode: How the IPv4 settings are assigned: Manual, DHCP, or BOOTP.
DHCP Server: The IP address of the DHCP server. This is only displayed if Mode is DHCP.
Lease Acquired: The date/time that the IP address was accepted from the DHCP server.
Lease Expires: The date/time the IP address from the DHCP server expires and will need to be
renewed.
Active Secondary DNS Server: The IP address of the secondary DNS server.
Active Host Name: The host name of the active DNS server.
Active Domain Name (IPv4/IPv6): The IPv4/IPv6 domain name that is currently in use.
Active Domain Name (IPv6): The IPv6 domain name that is currently in use.
Port Speed
Current Speed: The current speed assigned to the Ethernet port in Mbps.
NOTE: Rebooting only restarts the Rack ATS’s Network Management Interface; it does not affect the
ON/Off status of the ATS.
Reset All: Clear the Exclude TCP/IP check box to reset all configuration values; select the Exclude
TCP/IP check box to reset all configuration values except TCP/IP settings.
Name: Enter a descriptive name for the ATS. This will appear on the Home tab.
Location: Enter the physical location of the ATS. This will appear on the Home tab.
Contact: Enter the person responsible for the ATS. This will appear on the Home tab.
Source A Name, Source B Name: Enter names of your choice for Source A and Source B.
Preferred Source: Select the power source the ATS will draw from when both sources are available.
DANGER
HAZARDOUS VOLTAGE
Do not operate the Rack ATS outside Rated Voltage (+/- 10%). Voltage limits and transfer
ranges represent software control of switching behavior, not input voltages for use.
Failure to follow these instructions will result in death or serious injury.
Frequency Deviation: Frequency deviation beyond the set value will cause the Rack ATS to switch
power sources.
NOTE: If the frequency is at 50 Hz (see “View power measurements” on page 74) and the Sensitivity is
set to High, this value should be 3 or 5.
Line VRMS: Rated voltage for the Rack ATS (also called Nominal Input). VRMS limits and transfer
ranges are based on this value.
Sensitivity: Control how much power fluctuation the Rack ATS tolerates before switching to the
secondary power source. With a Low sensitivity, the Rack ATS waits 4 milliseconds (ms) before
switching to the alternate power source. (This can help prevent excessive switching if your source
voltage has excessive or frequent fluctuation.) With a High sensitivity, the Rack ATS waits 2 ms before
switching to the alternate power source.
NOTE: If the frequency is at 50 Hz and the Frequency Deviation is set to 10, Sensitivity should be set
to Low.
Limits and Transfer Range: The Transfer Range is the Line VRMS plus or minus a configured Limit
(Wide, Medium, or Narrow). The Transfer Range determines the switching behavior for the Rack ATS
based on source voltage: when the source voltage moves outside the Transfer Range, the Rack ATS
switches to the secondary power source.
• VRMS Wide, Medium, and Narrow Limit: set configuration options for the Transfer Range.
• Transfer Range: Decide whether the Rack ATS will switch power sources based on the Wide,
Medium, or Narrow VRMS Limit. The Transfer Range can only be set to one Limit at a time.
The ATS will switch sources when the voltage goes below 198 VRMS or above 218 VRMS (208 ±10
VRMS).
NOTE: The Voltage Transfer Range and Limit must remain within the absolute maximum ratings of the
Rack ATS: 85–265 VRMS. At any voltage below 85 VRMS or above 265 VRMS, the Rack ATS will
switch power sources regardless of configuration.
Status: View the current in A, and the Peak Current in kVA, for the device, phases, and banks. The
indicator in the green, yellow, and red meter shows the load status: normal, near overload, or overload.
Warning Thresholds: The Rack ATS generates an alarm when any bank exceeds its rated value. Set
the number of amps to trigger a Low Load Warning, Near Overload Warning, and Overload Alarm.
NOTE: If a circuit breaker trips, there is no definitive indication that the circuit breaker is open. However,
the current for that bank will drop. Set the Low Load Warning to 1 amp for these reasons :
• The default setting for the Low Load Warning is 0 amps. This effectively disables the warning; with
this setting, the Web UI will not indicate that a circuit breaker may have been tripped.
• A 1-amp detection threshold for the Low Load Warning will help to indicate that a circuit breaker
may have tripped.
Remote Authentication Override: The Rack ATS supports RADIUS storage of passwords on a server.
However, if you enable this override, the Rack ATS will allow a local user to log on using the password
stored locally on the Rack ATS. See also “Manage local user settings” on this page and “Manage remote
user settings” on page 85”.
Click Add User to add a new user, or select a User Name to edit that user’s configuration:
• Access: Select the Enable check box to allow access to the ATS.
• User Name: Enter a new user name.
• Current Password, New Password, Confirm Password: Enter a new password in both the New
Password and Confirm Password fields. You must enter a password for new users. Blank
passwords, (passwords with no characters) are not allowed.
NOTE: The maximum length for both the name and password is 64 bytes, with less than 64
characters for multi-byte characters. Values greater than 64 bytes for Name and Password may
be truncated. To change an Administrator/Super User setting, you must enter all three fields.
• User Type: Select the user type from the drop-down list.
– Administrator: Read-write access to all menus.
– Device: Read-write access to device-related menus. Can be enabled or disabled by
Administrators.
– Read-Only: Read-only access. Can be enabled or disabled by Administrators.
– Network-Only: Read-write access to network-related menus. Can be enabled or disabled by
Administrators.
• User Description: Enter any additional identification details here.
• Session Timeout: Enter the number of minutes (3 by default) the ATS waits before logging off an
inactive user. If you change this value, you must log off for the change to take effect.
NOTE: If a user closes the Web UI without logging off, they are still considered logged on for the
time specified in the Session Timeout field. This can help prevent other users from taking the
place of a user who leaves the Web UI.
– Export Log Format: Configure which format the event log should be displayed in when
exported (downloaded). Tab (default) allows fields to be tab-delimited whereas CSV is
comma-separated.
– Temperature scale: Select the default temperature scale, US Customary (Fahrenheit) or
Metric (Celsius).
– Date Format: Select the numerical format in which to display all dates in this user interface. In
the selections, each letter (m for month, d for day, and y for year) represents one digit. Single-
digit days and months are displayed with a leading zero.
– Language: Select the user interface display languages from the drop-down box.
Click Next, and then click Apply to save or Cancel to return to the User Management Configuration
page.
– Export Log Format: Configure which format the event log should be displayed in when
exported (downloaded). Tab (default) allows fields to be tab-delimited whereas CSV is
comma-separated.
– Temperature scale: Select the default temperature scale, US Customary (Fahrenheit) or
Metric (Celsius).
– Date Format: Select the numerical format in which to display all dates in this user interface. In
the selections, each letter (m for month, d for day, and y for year) represents one digit. Single-
digit days and months are displayed with a leading zero.
• Password Requirements:
– Strong Passwords: Configure whether new passwords created for user accounts will require
at least one lowercase character, one uppercase character, one number, and one symbol.
– Password Policy: Enter the number of days after which users will be required to change their
passwords. A value of 0 days (the default) disables this feature.
For information about local authentication (not using the centralized authentication of a RADIUS server),
see the Security Handbook on www.apc.com.
RADIUS
Path: Configuration > Security > Remote Users > RADIUS
The authentication and authorization functions of RADIUS (Remote Authentication Dial-In User Service)
is supported. When a user accesses the Rack ATS or other network-enabled device that has RADIUS
enabled, an authentication request is sent to the RADIUS server to determine the User permission level.
RADIUS user names used with the Rack ATS are limited to 32 characters.
You must configure your RADIUS server to work with the Rack ATS.
For examples of the RADIUS users file with Vendor Specific Attributes (VSAs) and an example of an
entry in the dictionary file on the RADIUS server, see the Security Handbook on www.apc.com.
1. Add the IP address of the Rack ATS to the RADIUS server client list (file).
2. Users must be configured with Service-Type attributes unless Vendor Specific Attributes (VSAs)
are defined. If no Service-Type attributes are configured, users will have read-only access (on the
Web UI only).
3. See your RADIUS server documentation for information about the RADIUS users file, and see
the Security Handbook (www.apc.com) for an example.
4. VSAs can be used instead of the Service-Type attributes provided by the RADIUS server. VSAs
require a dictionary entry and a RADIUS users file. In the dictionary file, define names for
ATTRIBUTE and VALUE keywords, but not for numeric values. If you change numeric values,
RADIUS authentication and authorization will fail. VSAs take precedence over standard RADIUS
attributes.
If UNIX shadow password files are used (/etc/passwd) with the RADIUS dictionary files, the following two
methods can be used to authenticate users:
• If all UNIX users have administrative privileges, add the following to the RADIUS “user” file. To
allow only Device Users, change the APC-Service-Type to Device.
DEFAULTAuth-Type = System
APC-Service-Type = Admin
• Add user names and attributes to the RADIUS “user” file, and verify the password against /etc/
passwd. The following example is for users bconners and thawk:
bconnersAuth-Type = System
APC-Service-Type = Admin
thawkAuth-Type = System
APC-Service-Type = Device
NOTE: While deleting an active enabled firewall policy cannot be done, editing a running policy can be
done but is not recommended as changes are applied immediately. Instead, disable the firewall, edit the
policy, test it, and then re-enable the policy.
Click Add Policy, and type in the file name for the new firewall file. The filename should have a .fwl file
extension. If left without a file extension, .fwl will be appended to the name automatically.
• Click Apply: If the filename is legal, the empty file firewall policy file will be created. It will be
located in the /fwl folder with the other policies on the system.
• Click Cancel to return to the previous page without creating a new firewall file.
Select Edit Policy to go to the edit page. You can edit an firewall policy which is not active.
Warning page: If you attempt to edit the active enabled policy, a warning page will open. “Editing the
active firewall policy will cause all changes made to be applied immediately. It is recommended
to disable the firewall and test the policy before enabling it.
– Click Apply to leave the Warning page and return to the Edit Policy page.
– Click Cancel to leave the Warning page and return to the Create/Edit Policy page.
1. Select the policy you want to edit from the Policy Name drop-down list, and click Edit Policy.
2. Click Add Rule or select the Priority of an existing rule to go to the Edit Rule page. From this
page, you can change the rule settings or delete the selected rule.
Setting Description
Priority If 2 rules conflict, the rule with the higher priority will determine what
happens. The highest priority is 1; the lowest is 250.
Type host: In the IP/any field, you will enter a single IP address.
subnet: In the IP/any field, you will enter a subnet address.
range: In the IP/any field, you will enter a range of IP addresses.
IP/any Specify the IP address or range of addresses this rule applies to, or select
one of the following:
any: The rule applies regardless of the IP address.
anyipv4: The rule applies for any IPv4 address.
anyipv6OCP The rule applies for any IPv6 address.
Port Specify a port the rule will apply to.
• None: The rule will apply to any port.
• Common Configured ports: Select a standard port.
• Other: Specify a non-standard port number.
Protocol Specify which protocol the rule applies to.
• any: any protocol.
• tcp: used for more reliable information transfer between applications.
• udp: alternative to TCP using for faster, lower bandwidth information.
transfer. Though it has fewer delays, UDP is less reliable than TCP.
• icmp: used to report errors for troubleshooting.
• icmpv6: used to report errors for troubleshooting on applications using
IPv6.
Action allow: Allow the packet that matches this rule.
discard: Discard the packet that matches this rule.
Log If this rule applied to a packet, regardless of whether the packet is blocked or
allowed, this will add an entry to the Firewall Log (see “Firewall log” on
page 115).
Delete a policy:
Click Apply to confirm and the selected firewall file is removed from the file system.
Require vendor specific cookie to accept DHCP Address: By selecting this check box, you can
require the DHCP server to provide a cookie which supplies information to the Rack ATS.
NOTE: The default values for these three settings on configuration pages generally do not need to be changed:
• Vendor Class: APC
• Client ID: The MAC address of the ATS, which uniquely identifies it on the local area network (LAN)
• User Class: The name of the application firmware module
Each valid DHCP response contains options that provide the TCP/IP settings that the Rack ATS needs
to operate on a network, and other information that affects the operation of the Rack ATS.
The Rack ATS uses this option in a DHCP response to determine whether the DHCP response is valid.
This option contains an APC-specific option in a
TAG/LEN/DATA format, called the APC Cookie. This is disabled by default.
• APC Cookie. Tag 1, Len 4, Data “1APC”
Option 43 communicates to the Rack ATS that a DHCP server is configured to service devices.
Following, in hexadecimal format, is an example of a Vendor Specific Information option that contains the
APC cookie:
Option 43 = 0x01 0x04 0x31 0x41 0x50 0x43
The Rack ATS uses the following options within a valid DHCP response to define its TCP/IP settings. All
of these options except the first are described in RFC2132.
• IP Address (from the yiaddr field of the DHCP response, described in RFC2131): The IP address
that the DHCP server is leasing to the Rack ATS.
• Subnet Mask (option 1): The Subnet Mask value that the Rack ATS needs to operate on the
network.
• Router, i.e., Default Gateway (option 3): The default gateway address that the Rack ATS needs to
operate on the network.
• IP Address Lease Time (option 51): The time duration for the lease of the IP Address to the Rack
ATS.
• Renewal Time, T1 (option 58): The time that the Rack ATS must wait after an IP address lease is
assigned before it can request a renewal of that lease.
• Rebinding Time, T2 (option 59): The time that the Rack ATS must wait after an IP address lease
is assigned before it can seek to rebind that lease.
Other options
The Rack ATS also uses these options within a valid DHCP response. All of these options except the last
are described in RFC2132.
• Network Time Protocol Servers (option 42): Up to two NTP servers (primary and secondary)
that the Rack ATS can use.
• Time Offset (option 2): The offset of the Rack ATS's subnet, in seconds, from Coordinated
Universal Time (UTC).
• Domain Name Server (option 6): Up to two Domain Name System (DNS) servers (primary and
secondary) that the Rack ATS can use.
• Host Name (option 12): The host name that the Rack ATS will use (32-character maximum
length).
• Domain Name (option 15): The domain name that the Rack ATS will use (64-character maximum
length).
• Boot File Name (from the file field of the DHCP response, described in RFC2131): The fully
qualified directory-path to a user configuration file (.ini file) to download. The siaddr field of the
DHCP response specifies the IP address of the server from which the Rack ATS will download
the .ini file. After the download, the .ini file is used as a boot file to reconfigure the settings.
Address and Other Information: With this radio box selected, DHCPv6 is used to obtain
addresses AND other configuration settings. This is known as DHCPv6 stateful.
Non-Address Information Only: With this radio box selected, DHCPv6 will be used to
configure "other" settings (such as location of DNS servers), but NOT to provide addresses.
This is known as DHCPv6 stateless.
Status:
• Not installed: A certificate is not installed, or was installed by FTP or SCP to an incorrect
location. Using Add or Replace Certificate File installs the certificate to the correct location, /ssl
on the Rack ATS.
• Generating: The Rack ATS is generating a certificate because no valid certificate was found.
• Loading: A certificate is being activated on the Rack ATS.
• Valid certificate: A valid certificate was installed or was generated by the Rack ATS. Select this
link to view the contents of the certificate.
NOTE: If you install an invalid certificate, or if no certificate is loaded when you enable SSL/TLS, the
Rack ATS generates a default certificate, a process which delays access to the interface for up to one
minute. You can use the default certificate for basic encryption-based security measures, but a security
alert message displays whenever you log on.
Certificate Action:
• Add or Replace: Enter or browse to the certificate file created with the Security Wizard.
See “Creating and Installing Digital Certificates” in the Security Handbook, available at
www.apc.com, to choose a method for using digital certificates created by the Security Wizard or
generated by the Rack ATS.
• Remove: Delete the current certificate.
Enable SSH: SSH transmits user names, passwords, and data in encrypted form, which helps to protect
against attempts to intercept, forge, or alter data during transmission.
Telnet Port: The Telnet port (23 by default) is used to communicate with the Rack ATS. You can change
the port setting to any unused port from 5000 to 32768 for additional security. Users must then use a
colon (:) or a space, as required by your Telnet client program, to specify the non-default port. For
example, for port 5000 and an IP address of 152.214.12.114, your Telnet client requires one of the these
commands:
telnet 152.214.12.114:5000
telnet 152.214.12.114 5000
SSH Port: The SSH port (22 by default) is used to communicate with the Rack ATS. You can change the
port setting to any unused port from 5000 to 32768 for additional security. See the documentation for
your SSH client for the command line format required to specify a non-default port.
Certificate Action:
• Add or Replace: Browse to and upload a host key file created by the Security Wizard.
To use the Security Wizard, see the Security Handbook, available at www.apc.com.
NOTE: To reduce the time required to enable SSH, create and upload a host key in advance. If
you enable SSH with no host key loaded, the Rack ATS takes up to one minute to create a host
key, and the SSH server is not accessible during that time.
• Remove: Remove the current host key.
NOTE: To use SSH, you must have an SSH client installed. Most Linux and other UNIX platforms
include an SSH client, but Microsoft Windows operating systems do not. Clients are available
from various vendors.
SNMP options
All user names, passwords, and community names for SNMPv1 are transferred over the network as
plain text. If your network requires the high security of encryption, disable SNMPv1 access and use
SNMPv3 instead.
When using StruxureWare to manage a Rack ATS on the public network, you must have the same
version of SNMP (1 or 3) enabled on both the Rack ATS interface and the StruxureWare interface. Read
access will allow the StruxureWare to receive traps from the Rack ATS, but Write access is required
while you set the StruxureWare as a trap receiver.
For detailed information on enhancing and managing the security of your system, see the Security
Handbook, available at www.apc.com.
Community Name: The name that an NMS must use to access the community. The maximum length is
15 ASCII characters. The default community names for the four communities are public, private,
public2, and private2.
NMS IP/Host Name: The IPv4 or IPv6 address, IP address mask, or host name that controls access by
NMSs. A host name or a specific IP address (such as 149.225.12.1) allows access only by the NMS at
that location. IP addresses that contain 255 restrict access as follows:
• 149.225.12.255: Access only by an NMS on the 149.225.12 segment.
• 149.225.255.255: Access only by an NMS on the 149.225 segment.
• 149.255.255.255: Access only by an NMS on the 149 segment.
• 0.0.0.0 (the default) or 255.255.255.255: Access by any NMS on any segment.
Access Type: The actions an NMS can perform through the community.
• Read: GETs only, at any time
• Write: GETs at any time, and SETs when no user is logged onto the Web UI or CLI.
• Write+: GETs and SETs at any time.
• Disable: No GETs or SETs at any time.
SNMPv3
For SNMP GETs, SETs, and trap receivers, SNMPv3 uses a system of user profiles to identify users. An
SNMPv3 user must have a user profile assigned in the MIB software program to perform GETs and
SETs, browse the MIB, and receive traps.
NOTE: To use SNMPv3, you must have an MIB program that supports SNMPv3.
User Name: The identifier of the user profile. SNMPv3 maps GETs, SETs, and traps to a user profile by
matching the user name of the profile to the user name in the data packet being transmitted. A user
name can have up to 32 ASCII characters.
Authentication Protocol: The APC by Schneider Electric implementation of SNMPv3 supports SHA
and MD5 authentication. Authentication will not occur unless an authentication protocol is selected.
Privacy Protocol: The implementation of SNMPv3 supports AES and DES as the protocols for
encrypting and decrypting data. Privacy of transmitted data requires that a privacy protocol is selected
and that a privacy passphrase is provided in the request from the NMS. When a privacy protocol is
enabled but the NMS does not provide a privacy passphrase, the SNMP request is not encrypted.
NOTE: You cannot select the privacy protocol if no authentication protocol is selected.
To edit the access control settings for a user profile, select its user name.
Access: Select the Enable check box to activate the access control specified by the parameters in this
access control entry.
User Name: From the drop-down list, select the user profile to which this access control entry will apply.
The choices available are the four user names that you configure on the user profiles page (see “Path:
Configuration > Network > SNMPv3 > User Profiles” on page 98).
NMS IP/Host Name: The IP address, IP address mask, or host name that controls access by the NMS.
A host name or a specific IP address (such as 149.225.12.1) allows access only by the NMS at that
location. An IP address mask that contains 255 restricts access as follows:
• 149.225.12.255: Access only by an NMS on the 149.225.12 segment.
• 149.225.255.255: Access only by an NMS on the 149.225 segment.
• 149.255.255.255: Access only by an NMS on the 149 segment.
• 0.0.0.0 (the default) or 255.255.255.255: Access by any NMS on any segment.
Port: specify the TCP/IP port (21 by default) that the FTP server uses to communicate with the ATS. The
FTP server uses both the specified port and the port one number lower than the specified port.
You can change the Port setting to the number of any unused port from 5001 to 32768 for added
security. Users must then use a colon (:) to specify the non-default port number. For example, for port
5001 and IP address 152.214.12.114, the command would be ftp 152.214.12.114:5001.
NOTE: FTP transfers files without encryption. For higher security, disable the FTP server, and transfer
files with SCP. Selecting and configuring Secure SHell (SSH) enables SCP automatically.
NOTE: You can use FTP or SCP to configure and update the ATS with StruxureWare Data Center Expert
or EcoStruxure IT as long as the same protocol is enabled on both the ATS and StruxureWare or
EcoStruxure. See your StruxureWare Data Center Expert or EcoStruxure IT documentation for details.
For detailed information on enhancing and managing the security of your system, see the Security
Handbook, available at www.apc.com.
Notification parameters
These configuration fields define e-mail parameters for sending notifications of events. They are usually
accessed by selecting the receiver or recipient name.
Field Description
Delay n time before If the event persists for the specified time, the notification is sent. If the condition
sending clears before the time expires, no notification is sent.
Repeat at an interval of n The notification is sent repeatedly at the specified interval (the default is every 2
minutes until the condition clears).
Up to n times During an active event, the notification repeats for this number of times.
or
Until condition clears The notification is sent repeatedly until the condition clears or is resolved.
NOTE: For events that have an associated clearing event, you can also set these parameters.
Advanced
• Use SSL/TLS: Select when encryption is used.
– Never: The SMTP server does neither requires nor supports encryption.
– If Supported: The SMTP server advertises support for STARTTLS but doesn't require the
connection to be encrypted. The STARTTLS command is sent after the advertisement is
given.
– Always: The SMTP server requires the STARTTLS command to be sent on connection to it.
– Implicitly: The SMTP server only accepts connections that begin encrypted. No STARTTLS
message is sent to the server.
• Require CA Root Certificate: This should only be enabled if the security policy of your
organization does not allow for implicit trust of SSL/TLS connections. If this is enabled, a valid
root CA certificate must be loaded onto the ATS for encrypted e-mails to be sent.
• File Name: This field is dependent on the root CA certificates installed on the ATS and whether or
not a root CA certificate is required.
E-mail Recipient
• Generation: Enable (default) or disable sending e-mail to the recipient.
• To Address: The user name and domain name of the recipient. To use e-mail for paging, use the
e-mail address for the recipient’s pager gateway account (for example,
[email protected]). The pager gateway will generate the page.
To bypass the DNS lookup of the IP address of the mail server, type the IP address in brackets
instead of the e-mail domain name, e.g., use jsmith@[xxx.xxx.x.xxx] instead of
[email protected]. This is useful when DNS lookups are not working correctly.
• Format: The long format contains name, location, contact, IP address, serial number of the
device, date and time, event code, and event description. The short format provides only the
event description.
• Language: The language the e-mail notification will be sent in. This depends on the installed
language pack (if applicable).
• Server: Select one of the following methods for routing e-mail:
– Local: This is through the site-local SMTP server. This recommended setting uses a
site-local SMTP server to send e-mail. Choosing this setting limits delays and network outages
and retries sending e-mail for many hours. When choosing the Local setting you must also
enable forwarding at the SMTP server of your device and set up a special external e-mail
account to receive the forwarded e-mail. Check with your SMTP server administrator before
making these changes.
– Recipient: This is the SMTP server of the recipient. The ATS performs an MX record look-up
on the recipients e-mail address and uses that as its SMTP server. The e-mail is only sent
once so it could easily be lost.
– Custom: This setting enables each e-mail recipient to have its own server settings. These
settings are independent of the settings given under “SMTP Server” above.
When installed, the certificate details also display here. An invalid certificate will display “n/a” for all fields
except File Name.
Certificates can be deleted using this screen. Any e-mail recipients using the certificate should be
manually modified to remove reference to this certificate.
Path: Configuration > Notification > SNMP Traps > Trap Receivers
The trap receivers are displayed by NMS IP/Host Name, (NMS stands for Network Management
System). You can configure up to six trap receivers. To configure a new trap receiver, click Add Trap
Receiver. To edit (or delete) a trap receiver, select its IP address/host name.
Trap Generation: Enable (the default) or disable trap generation for this trap receiver.
NMS IP/Host Name: The IPv4/ IPv6 address or host name of this trap receiver. The default, 0.0.0.0,
leaves the trap receiver undefined.
Language: Select a language from the drop-down list. This can differ from the Web UI and from other
trap receivers.
Select either SNMPv1 or SNMPv3 to specify the trap type. For an NMS to receive both types of traps,
you must separately configure two trap receivers for that NMS, one for each trap type.
If you delete a trap receiver, all notification settings configured under “Configuring event actions” for the
deleted trap receiver are set to their default values.
To: Select the IP address or host name to which a test SNMP trap will be sent. If no trap receiver is
configured, a link to the Trap Receiver configuration screen (snmp receiver) is displayed.
To purchase the RMS service, contact your vendor or select the link on bottom of this screen: Schneider
Electric RMS website.
Registration: To activate RMS for the Rack ATS, choose between Register Company and Device and
Register Device Only. complete the form, and click Apply. Then select Enable Remote Monitoring
Service.
Reset Remote Monitoring Service Registration: Select the check box to discontinue the service,
whether permanently or temporarily (for example, if you are moving a Rack ATS).
Configure identification
Path: Configuration > General > Identification
Host Name Synchronization: Allows the host name to be synchronized with the system name so both
fields automatically contain the same value.
NOTE: When enabling this feature, the system name identifier can no longer contain a space character
(since it will be synchronized to the host name field).
Name, Contact, and Location: Define the Name, the Contact (the person responsible for the device),
and the Location (the physical location), used by the SNMP agent of the ATS and StruxureWare.
These fields are used by the sysName, sysContact, and sysLocation object identifiers (OIDs) in the
SNMP agent of the Rack ATS. For more information about MIB-II OIDs, see the PowerNet® SNMP
Management Information Base (MIB) Reference Guide, available at www.apc.com.
The Name and Location fields also identify the device when you register for the Remote Monitoring
Service.
System Message: When defined, a custom message will appear on the log on screen for all users.
Time Zone: This is your local time difference with Coordinated Universal Time (UTC), also known as
Greenwich Mean Time (GMT).
Synchronize with NTP Server: Have an NTP (Network Time Protocol) Server define the date and time
for the ATS. By default, any ATS on the private side of StruxureWare Server obtains its time settings by
using StruxureWare as an NTP server.
• Override Manual NTP Settings: If you select this, data from other sources (typically DHCP) take
precedence over the NTP configurations you set here.
• Primary NTP Server: Enter the IP address or domain name of the primary NTP server.
• Secondary NTP Server: Enter the IP address or domain name of the secondary NTP server,
when a secondary server is available.
• Update Interval: Define, in hours, how often the ATS accesses the NTP Server for an update.
Minimum: 1; Maximum: 8760 (1 year).
• Update Using NTP Now: Initiate an immediate update of the date and time by the NTP Server.
When customizing DST, the system puts the clock forward by an hour when the time and date you
specify under Start is reached, and puts the clock back an hour when the time and date you specify
under End is reached.
• If your local DST always starts or ends on the fourth occurrence of a specific weekday of a month
(e.g., the fourth Sunday), choose Fourth/Last. If a fifth Sunday occurs in that month, you should
still choose Fourth/Last.
• If your local DST always starts or ends on the last occurrence of a specific weekday of a month,
whether it is the fourth or the fifth occurrence, choose Fifth/Last.
To retrieve and customize the file of a configured ATS, see “How to Export Configuration Settings” on
page 118. Instead of uploading the file to one ATS, you can export the file to multiple ATS units by using
an FTP or SCP script.
Configure links
Path: Configuration > General > Quick Links
View and change the URL links displayed at the bottom left of each page of the interface.
By default, these links access the following Web pages:
• Link 1: The home page of the APC by Schneider Electric website.
• Link 2: Demonstrations of APC by Schneider Electric web-enabled products.
• Link 3: Information on APC by Schneider Electric Remote Monitoring Service.
Syslog Server: Uses IPv4/ IPv6 addresses or host names to identify from one to four servers to receive
Syslog messages sent by the ATS.
Port: The port that the ATS will use to send Syslog messages. The default UDP port assigned to
Syslog is 514.
Facility Code: Selects the facility code assigned to the Syslog messages of the ATS (User, by default).
NOTE: User best defines the Syslog messages sent by the ATS. Do not change this selection unless
advised to do so by the Syslog network or system administrator.
Severity Mapping: This section maps each severity level of the ATS or environment events to available
Syslog priorities. The local options are Critical, Warning, and Informational. You should not need to
change the mappings.
• Emergency: The system is unusable
• Alert: Action must be taken immediately
• Critical: Critical conditions
• Error: Error conditions
• Warning: Warning conditions
• Notice: Normal but significant conditions
• Info: Informational messages
• Debug: Debug-level messages
Select a severity to assign to the test message and then define the test message. Format the message
to consist of the event type (for example, APC, System, or Device) followed by a colon, a space, and the
event text. The message can have a maximum of 50 characters.
• The priority (PRI): the Syslog priority assigned to the message event, and the facility code of
messages sent by the ATS.
• The Header: a time stamp and the IP address of the ATS.
• The message (MSG) part.
• The TAG field, followed by a colon and space, identifies the event type.
• The CONTENT field is the event text, followed (optionally) by a space and the event code.
Example: APC: Test Syslog is valid.
Additionally, the log records any event that sends an SNMP trap, except SNMP authentication failures,
and abnormal internal system events.
You can enable color coding for events on the Local User Management screen (see “Manage local user
settings” on page 82).
To open the log in a text file or to save the log to a disk, click on the floppy disk on the same line as
the Event Log heading.
To see the events listed together on a Web page, click Launch Log in New Window.
You can also use FTP or Secure CoPy (SCP) to view the event log. See “Use FTP or SCP to retrieve log
files” on page 115.
Event Log Filtering: Use filtering to omit information you don’t want to display.
• Filter the log by date or time: Use Last or From to define the time in which the events were
logged. (The filter configuration is saved until the ATS restarts.)
• Filter the log by event severity or category:
a. Click Filter Log.
b. Clear a check box to remove it from view.
c. After you click Apply, text at the upper right corner of the Event Log page indicates that a
filter is active. The filter is active until you clear it or until the ATS restarts.
d. As a Super User or Administrator, click Save As Default to save this filter as the new
default log view for all users.
• Remove an active filter:
a. Click Filter Log.
b. Click Clear Filter (Show All).
Clear Log: To delete all events, click Clear Log. Deleted events cannot be retrieved.
To disable the logging of events based on their assigned severity level or their event category, see
“Configure Notifications” on page 100
Since domain names generally change less frequently than IP addresses, enabling reverse lookup can
improve the ability to identify addresses of networked devices that are causing events.
Reverse lookup is disabled by default. You should not need to enable it if you have no DNS server
configured or have poor network performance because of heavy network traffic.
NOTE: When you resize the event log in order to specify a maximum size, all existing log entries are
deleted. When the log subsequently reaches the maximum size, the older entries are deleted.
The steps to display and resize the data log are the same as for the event log, except that you use menu
options under Data instead of Events.
Clear Data Log: Delete all data log records. Deleted data log records cannot be retrieved.
Launch Log in New Window: View the log on a separate Web page.
Filter the graph by date or time: Use Last or From to define the time in which the events were logged.
Click Apply to save your changes. (The filter configuration is saved until the ATS restarts.)
Launch Graph in New Window: View the graph on a separate Web page.
NOTE: Because the interval specifies how often the data is recorded, small intervals will cause data to
be recorded more quickly and thus to hold entries for shorter periods of time.
Click Apply to save these settings, Cancel to erase your changes, or Upload Now! to rotate log data.
NOTE: When you change the maximum log size, all existing entries are deleted. When the log
subsequently reaches the maximum size, the older entries are deleted.
Firewall log
Path: Logs > Firewall
If you create a firewall policy (see “Configure firewalls” on page 87), firewall events will be logged here.
The information in the log can be useful to help the technical support team solve problems. Log entries
contain information about the traffic and the rules action (allowed or discarded). When logged here,
these events are not logged in the main Event Log (see “View and configure the Event Log” on
page 112).
A firewall log contains up to 50 of the most recent events. The firewall log is cleared when the
management interface reboots.
NOTE: The ATS uses a four-digit year for log entries. You may need to select a four-digit date
format in your spreadsheet application to display all four digits.
If you are using the encryption-based security protocols for your system, use SCP to retrieve the log file.
If you are using unencrypted authentication methods for the security of your system, use FTP to retrieve
the log file.
See the Security Handbook on www.apc.com for information on available security protocols and
methods.
To use SCP to retrieve the data.txt file, use the following command:
scp username@hostname_or_ip_address:data.txt ./data.txt
The hardware information is useful to APC by Schneider Electric Customer Support for troubleshooting
problems with the ATS. The serial number and MAC address are also available on the ATS itself.
Management Uptime is the length of time the network management interface has been running
continuously.
Support resources
Path: About > Support
This page provides links to multiple support resources:
• Knowledge Base: Direct link to FAQs on the APC by Schneider Electric website.
• Company Contact Information: Provides phone numbers for multiple support services provided
by APC by Schneider Electric.
• Software & Firmware Downloads: Download software upgrades for your product.
You can also generate and download a file of data needed for technical support. The data included in the
file will be compiled from existing logs and will depend on your current log configurations (see Logs,
page 109).
NOTE: Managing Users via the config.ini - Users are no longer managed via the config.ini in any form.
Users are now managed via a separate file with the .csf extension. For further information on this topic,
refer to FAQ article FA176542: go to www.apc.com, navigate to Support > Resources & Tools >
FAQs, then enter the article number in the search bar.
Detailed procedures
Retrieve .ini file
To set up and retrieve an .ini file:
1. If possible, use the interface of an ATS to configure it with the settings to export. (Directly editing
the .ini file risks introducing errors).
2. Use FTP to retrieve config.ini from the configured ATS:
a. Open a connection to the ATS using its IP address:
ftp> open ip_address
b. Log on using the Super User/Administrator user name and password.
c. Retrieve the config.ini file containing the settings of the ATS:
ftp> get config.ini
The file is written to the folder from which you launched the FTP.
To export configuration settings to multiple ATS units, see FAQ article FA156117: go to www.apc.com,
navigate to Support > Resources & Tools > FAQS, then enter the article number in the search bar.
If a keyword, section name, or value is invalid, the upload by the receiving ATS succeeds, and additional
event text states the error.
Event text Description
Configuration file warning: A line with an invalid keyword or value is ignored.
Invalid keyword on line
number.
Configuration file warning:
Invalid value on line number.
Configuration file warning: If a section name is invalid, all keyword/value pairs in that section
Invalid section on line are ignored.
number.
Configuration file warning: A keyword entered at the beginning of the file (i.e., before any
Keyword found outside of a section headings) is ignored.
section on line number.
Configuration file warning: If the file is too large, an incomplete upload occurs. Reduce the size
Configuration file exceeds of the file, or divide it into two files, and try uploading again.
maximum size.
Messages in config.ini
A Rack ATS from which you download the config.ini file must be discovered successfully in order for its
configuration to be included. If the ATS is not present or is not discovered, the config.ini file contains a
message under the appropriate section name, instead of keywords and values. For example: Rack
ATS not discovered
If you did not intend to export the ATS configuration as part of the .ini file import, ignore these messages.
Because the overridden values are device-specific and not appropriate to export to other ATS units,
ignore these error messages. To prevent these error messages, delete the lines that contain the
Override keyword and the lines that contain the values that they override. Do not delete or change the
line containing the section heading.
Related Topics
On Windows operating systems, instead of transferring .ini files, you can use the Device IP Configuration
Wizard to update the basic TCP/IP settings of the ATS and configure other settings through its user
interface. See “Device IP Configuration Wizard” on page 7.
Keeping the firmware versions consistent across your network helps ensure that all ATS units support
the same features in the same manner. Here, upgrading simply means placing the module files on the
ATS; there is no installation required. Check regularly on www.apc.com for any new upgrades
(Each module contains one or more Cyclical Redundancy Checks (CRCs) to help protect its data from
corruption).
The boot monitor module, the AOS, and the application file names share the same basic format:
apc_hardware-version_type_firmware-version.bin
• apc: Indicates the context.
• hardware-version:hw0n where n identifies the hardware version on which you can use this
file.
• type: Identifies which module.
• version: The version number of the file.
• bin: Indicates that this is a binary file.
Obtain the free, latest firmware version from the APC by Schneider Electric website. To upgrade the
firmware of one or more ATS units, use 1 of these 5 methods:
• On a Windows operating system, use the Firmware Upgrade Utility downloaded from the
website www.apc.com.
• On any supported operating system, use FTP or SCP to transfer the individual AOS and
application firmware modules.
• For a Rack ATS that is NOT on your network, use XMODEM through a serial connection to
transfer the individual firmware modules from your computer to the Rack ATS.
• Use a USB drive to transfer the individual firmware modules from your computer.
• For upgrades to multiple ATS units, see “How to upgrade multiple ATS units” on page 125.
On any supported Windows operating system, the Firmware Upgrade Utility automates the transferring
of the firmware modules in the correct module order.
Unzip the downloaded firmware upgrade file and double-click the .exe file. Then enter the IP address,
the user name, and the password in the dialog fields and click Upgrade Now. You can use the Ping
button to test your entered details.
On non-Windows operating systems, the Firmware Upgrade Utility extracts the individual firmware
modules, but does not upgrade the Rack ATS. See “Firmware File Transfer Methods” on page 122 for
the different upgrade methods after extraction.
NOTE: The following procedure assumes the bootmon file does not need upgrading. It is always
necessary to upgrade the other two firmware module files.
SCP
To use Secure CoPy (SCP) to upgrade firmware for the Rack ATS, follow these steps (this procedure
assumes bootmon does not need upgrading, it is always necessary to upgrade the other two though):
1. Locate the firmware modules, see “Use the Utility for manual upgrades, primarily on Linux” on
page 122.
2. Use an SCP command line to transfer the AOS firmware module to the Rack ATS. The following
example uses nnn to represent the version number of the AOS module:
scp apc_hw05_aos_nnn.bin [email protected]:apc_hw05_aos_nnn.bin
3. Use a similar SCP command line, with the name of the application module, to transfer the
application firmware module to the Rack ATS. (Always upgrade the AOS before the application
module).
To transfer the files (this procedure assumes bootmon does not need upgrading, it is always necessary
to upgrade the other two though):
1. Select a serial port at the local computer and disable any service that uses the port.
2. Connect the provided serial configuration cable (part number 940-0144A) to the selected port
and to the RJ-12 style serial port at the Rack ATS.
3. Run a terminal program such as HyperTerminal, and configure the selected port for 57600 bps, 8
data bits, no parity, 1 stop bit, and no flow control.
4. Press the Reset button on the Rack ATS, then immediately press the Enter key twice, or until the
Boot Monitor prompt displays: BM>
5. Type XMODEM, then press ENTER.
6. From the terminal program’s menu, select XMODEM, then select the binary AOS firmware file to
transfer using XMODEM. After the XMODEM transfer is complete, the Boot Monitor prompt
returns.
NOTE: Always upgrade the AOS before the application module.
7. To install the application module, repeat step 5 and step 6. In step 6, use the application module
file name.
8. Type reset or press the Reset button to restart the Rack ATS’s management interface.
NOTE: To find an FAQ article, go to www.apc.com, navigate to Support > Resources & Tools > FAQs,
then enter the article number in the Search bar.
Code Description
Successful The file transfer was successful.
Result not There are no recorded file transfers.
available
Failure unknown The last file transfer failed for an unknown reason.
Server The TFTP or FTP server could not be found on the network.
inaccessible
Server access The TFTP or FTP server denied access.
denied
File not found The TFTP or FTP server could not locate the requested file.
File type unknown The file was downloaded but the contents were not recognized.
File corrupt The file was downloaded but at least one Cyclical Redundancy Check (CRC)
failed.
Copyright © 1990, 1993, 1994 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: This product includes software developed by the University of California,
Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
© 2018 APC by Schneider Electric. APC, PowerNet, and StruxureWare are trademarks owned by
Schneider Electric, S.A.S. All other trademarks are property of their respective owners.
990-5844A-001 11/2018