Raritan Computer DKX2-0E-E Server User Manual


 
Table of Figures
xii
Figure 38: Map Virtual Media CD/ISO Image..............................................................................
94
Figure 39: File Server Setup .............................................................................................................96
Figure 40: User List ............................................................................................................................99
Figure 41: User Page.........................................................................................................................100
Figure 42: User Group List..............................................................................................................102
Figure 43: Group Page .....................................................................................................................104
Figure 44: Group-based IP Access Control List..........................................................................107
Figure 45: IP ACL Example.............................................................................................................108
Figure 46: Modify Group ................................................................................................................109
Figure 47: Change Password ..........................................................................................................111
Figure 48: Authentication Settings ...............................................................................................113
Figure 49: Authentication Settings (LDAP).................................................................................115
Figure 50: Authentication Settings (RADIUS) ...........................................................................118
Figure 51: Network Settings...........................................................................................................122
Figure 52: Network Settings (Network Basic Settings).............................................................123
Figure 53: Network Settings (Network Miscellaneous Settings)............................................ 124
Figure 54: Network Settings (LAN Interface Settings) .............................................................125
Figure 55: Date/Time Settings........................................................................................................128
Figure 56: Event Management - Settings .....................................................................................130
Figure 57: Syslog Configuration.................................................................................................... 131
Figure 58: Event Management - Destinations.............................................................................132
Figure 59: Power Supply Setup .....................................................................................................136
Figure 60: Port Configuration ........................................................................................................138
Figure 61: Power Strip Connections ............................................................................................. 140
Figure 62: Port Page (power strips) ............................................................................................... 141
Figure 63: Port Page (KVM ports) .................................................................................................143
Figure 64: Port Page (Target Server Settings for D2CIM-VUSB)............................................ 145
Figure 65: Security Settings............................................................................................................147
Figure 66: Security Settings (Strong Passwords)........................................................................149
Figure 67: Security Settings (User Blocking) ..............................................................................151
Figure 68: Security Settings (Encryption & Share) ....................................................................151
Figure 69: Security Settings (Encryption Mode Warning Message).......................................152
Figure 70: IP Access Control...........................................................................................................154
Figure 71: Audit Log ........................................................................................................................157
Figure 72: Device Information.......................................................................................................159
Figure 73: Backup/Restore ..............................................................................................................160
Figure 74: CIM Upgrade from KX Flash ......................................................................................162
Figure 75: Firmware Upgrade ........................................................................................................163
Figure 76: Firmware Upgrade Review.......................................................................................... 164
Figure 77: Firmware Upgrade Successful ....................................................................................164
Figure 78: Upgrade Report.............................................................................................................. 165
Figure 79: Reboot..............................................................................................................................166