Server Technology PT40 Installationshandbuch Seite 24

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 90
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 23
24 Operations Smart Cabinet Distribution Unit
Installation and Operations Manual
Setting the ‘To’ email address:
Enter the ‘to’ email address in the Primary or Secondary ‘Send To’ Address field and press Apply.
Enabling or disabling event type notifications:
Select Enabled or Disabled from the Include…Messages drop-down menus and press Apply.
Tools
The Tools section contains access to rebooting the unit, uploading new firmware as well as resetting the unit to
factory defaults. This section is available to administrative level users only.
Restart
Performing a warm boot:
Select the Restart from the Action drop-down menu and press Apply.
Note: System user/outlet/group configuration or outlet states are NOT changed or reset with this command.
Resetting to factory defaults:
See Chapter 5: for more information on resetting a Sentry to factory defaults from the HTML interface.
Uploading new firmware:
See Appendix B: for more information on uploading new firmware from the HTML interface.
Generating a new SSL X.509 certificate:
Select the Restart and generate a new X.509 certificate from the Action drop-down menu
and press Apply.
Computing new SSH security keys:
Select the Restart and compute new SSH keys from the Action drop-down menu and press Apply.
Ping
The Ping feature may be used to test the Sentry’s ability to contact another Ethernet enabled device’s IP
address. For LDAP support, it may also be used to test the configuration of the Domain Name server
IP address by testing for proper name resolution.
Change Password
The Change Password feature allows users to change their own password.
NOTE: An administrator can always assign a new password.
Changing a password:
Enter the current password, enter a new password and verify the new password. Press Apply.
View Log
The View Log feature enables viewing of the internal system log. This features logs all authentication
attempts, power actions, configuration changes and other system events. The system memory stores
more than 4000 entries in a continuously aging log. For permanent off-system log storage, the Syslog
protocol is supported. For additional information and configuration requirements for the system log
and Syslog support, see
Logging on page 73.
NOTE: The system log is viewable only by users with administrative privileges.
Reviewing the system log:
Click on the Previous 100 entries or Next 100 entries link to navigate through the log.
Seitenansicht 23
1 2 ... 19 20 21 22 23 24 25 26 27 28 29 ... 89 90

Kommentare zu diesen Handbüchern

Keine Kommentare