Chapter 5. usage, Prerequisites, Usage – Tripp Lite B050-000 User Manual
Page 35

Chapter 5. Usage
Prerequisites
The B050-000 features an embedded operating system and applications offering a
variety of standardized interfaces. This chapter will describe both these interfaces
and the way to use them in a more detailed manner. The interfaces are accessed using
the TCP/IP protocol family, thus they can be accessed using the built-in Ethernet
adapter.
The following interfaces are supported:
HTTP/HTTPS
Full access is provided by the embedded web server. The B050-000 environment
can be entirely managed using a standard web browser. You can access the B050-
000 using the insecure HTTP protocol or using the encrypted HTTPS protocol.
Whenever possible use HTTPS.
Telnet
A standard Telnet client can be used to access an arbitrary device connected to
the B050-000’s serial port via a terminal mode.
SSH
The B050-000 also offers SSH (Secure Shell) access as a secure alternative to Tel-
net.
The primary interface of the B050-000 is the HTTP interface. This is covered exten-
sively in this chapter. Other interfaces are addressed in subtopics.
In order to use the Remote Console window of your managed host system, the
browser has to come with a Java Runtime Environment version 1.1 or higher. If the
browser has no Java support (such as on a small handheld device), you are still able
to maintain your remote host system using the administration forms displayed by
the browser itself.
Important: We recommend to install a Sun JVM 1.4.
For an insecure connection to the B050-000 we can recommend the following web
browsers:
•
Microsoft Internet Explorer version 5.0 or higher on Windows 98, Windows ME,
Windows 2000 and Windows XP
•
Netscape Navigator 7.0, Mozilla 1.6 and Mozilla Firefox on Windows 98, Windows
ME, Windows 2000, Windows XP, Linux and other UNIX-like Operating Systems
In order to access the remote host system using a securely encrypted connection, you
need a browser that supports the HTTPS protocol. Strong security is only assured by
using a key length of 128 Bit. Some of the old browsers do not have a strong 128 Bit
encryption algorithm.
Using the Internet Explorer, open the menu entry “?” and “Info” to read about the
key length that is currently activated. The dialog box contains a link that leads you to
27