CommandCenter® Secure Gateway (CC Secure Gateway) is a management appliance that provides unified, secure, browser-based access to KVM, serial and power control devices in data centers. Compatible with Raritan’s Dominion® Series, Paragon®, IP-Reach® and CommandCenter® NOC, CC Secure Gateway provides centralized policy and security management of users and devices connected to Raritan products, embedded solutions like HP iLO/RILOE, IPMI and in-band software solutions.

CC Secure Gateway delivers a secure, powerful, effective, and user-friendly management solution with features like 128-bit encryption, flexible authentication options (Active Directory®, LDAP, RADIUS and TACACS+), customizable views, comprehensive reporting, integration with CC-NOC and SNMP traps.

CC Secure Gateway aggregates console access to devices in multiple local or remote data centers, providing a simple, centralized gateway to diagnose and resolve problems quickly. When deployed with CommandCenter NOC, it delivers Raritan’s exclusive Hyper-Access — an email alert with diagnostic information about the device that triggered the alarm, plus one-click access to KVM or serial control of the distressed device.


User Interface Enhancements: Simplified view of nodes. All access methods to the node are easily identified as interfaces of the target. Includes KVM, serial and secure access methods such as VNC, RDP, SSH, as well as power management through iLO/RiLOE/RiLOEII, Dell DRAC4, or IBM RSAII and Raritan compatible power strips. Allows creation of more custom views within CC-SG that can be shared with all or selected users.

HTML Access Client: User access is available via an HTML Access Client that provides a simplified view to each user indicating only those nodes they are authorized to access or manage.

Integration With IBM RSA-II and Dell DRAC4: Supports power management for Dell and IBM servers with embedded management cards, via CC-SG’s authentication, authorization, and accounting.

Super-user Access: Allows the existing system admin ID to be renamed to meet IT security standards. Also allows identification of the system user ID after renaming.

Strong Password: Provides the ability to enforce strong password requirements for local authentication. Strong password includes:

  • Minimum and maximum character set
  • One or more character sets
  • System defined expiration date
  • “Password history depth” to prevent changing the password back and forth from A to B