Raritan Computer DOMINION KX II DKX2-0E-E User Manual

Page 12

Advertising
background image

Table of Figures

xii

Figure 38: Map Virtual Media CD/ISO Image.............................................................................. 94

Figure 39: File Server Setup ............................................................................................................. 96

Figure 40: User List ............................................................................................................................ 99

Figure 41: User Page......................................................................................................................... 100

Figure 42: User Group List.............................................................................................................. 102

Figure 43: Group Page ..................................................................................................................... 104

Figure 44: Group-based IP Access Control List.......................................................................... 107

Figure 45: IP ACL Example............................................................................................................. 108

Figure 46: Modify Group ................................................................................................................ 109

Figure 47: Change Password .......................................................................................................... 111

Figure 48: Authentication Settings ............................................................................................... 113

Figure 49: Authentication Settings (LDAP)................................................................................. 115

Figure 50: Authentication Settings (RADIUS) ........................................................................... 118

Figure 51: Network Settings........................................................................................................... 122

Figure 52: Network Settings (Network Basic Settings)............................................................. 123

Figure 53: Network Settings (Network Miscellaneous Settings)............................................ 124

Figure 54: Network Settings (LAN Interface Settings) .............................................................125

Figure 55: Date/Time Settings........................................................................................................ 128

Figure 56: Event Management - Settings ..................................................................................... 130

Figure 57: Syslog Configuration.................................................................................................... 131

Figure 58: Event Management - Destinations............................................................................. 132

Figure 59: Power Supply Setup ..................................................................................................... 136

Figure 60: Port Configuration ........................................................................................................ 138

Figure 61: Power Strip Connections ............................................................................................. 140

Figure 62: Port Page (power strips) ............................................................................................... 141

Figure 63: Port Page (KVM ports) ................................................................................................. 143

Figure 64: Port Page (Target Server Settings for D2CIM-VUSB) ............................................ 145

Figure 65: Security Settings............................................................................................................ 147

Figure 66: Security Settings (Strong Passwords)........................................................................ 149

Figure 67: Security Settings (User Blocking) .............................................................................. 151

Figure 68: Security Settings (Encryption & Share) .................................................................... 151

Figure 69: Security Settings (Encryption Mode Warning Message)....................................... 152

Figure 70: IP Access Control........................................................................................................... 154

Figure 71: Audit Log ........................................................................................................................ 157

Figure 72: Device Information ....................................................................................................... 159

Figure 73: Backup/Restore .............................................................................................................. 160

Figure 74: CIM Upgrade from KX Flash ......................................................................................162

Figure 75: Firmware Upgrade ........................................................................................................ 163

Figure 76: Firmware Upgrade Review.......................................................................................... 164

Figure 77: Firmware Upgrade Successful .................................................................................... 164

Figure 78: Upgrade Report.............................................................................................................. 165

Figure 79: Reboot.............................................................................................................................. 166

Advertising