Table of Figures
xii
Figure 38: Map Virtual Media CD/ISO Image.............................................................................. 94
Figure 39: File Server Setup ............................................................................................................. 96
Figure 40: User List ............................................................................................................................ 99
Figure 41: User Page......................................................................................................................... 100
Figure 42: User Group List.............................................................................................................. 102
Figure 43: Group Page ..................................................................................................................... 104
Figure 44: Group-based IP Access Control List.......................................................................... 107
Figure 45: IP ACL Example............................................................................................................. 108
Figure 46: Modify Group ................................................................................................................ 109
Figure 47: Change Password .......................................................................................................... 111
Figure 48: Authentication Settings ............................................................................................... 113
Figure 49: Authentication Settings (LDAP)................................................................................. 115
Figure 50: Authentication Settings (RADIUS) ........................................................................... 118
Figure 51: Network Settings........................................................................................................... 122
Figure 52: Network Settings (Network Basic Settings)............................................................. 123
Figure 53: Network Settings (Network Miscellaneous Settings)............................................ 124
Figure 54: Network Settings (LAN Interface Settings) .............................................................125
Figure 55: Date/Time Settings........................................................................................................ 128
Figure 56: Event Management - Settings ..................................................................................... 130
Figure 57: Syslog Configuration.................................................................................................... 131
Figure 58: Event Management - Destinations............................................................................. 132
Figure 59: Power Supply Setup ..................................................................................................... 136
Figure 60: Port Configuration ........................................................................................................ 138
Figure 61: Power Strip Connections ............................................................................................. 140
Figure 62: Port Page (power strips) ............................................................................................... 141
Figure 63: Port Page (KVM ports) ................................................................................................. 143
Figure 64: Port Page (Target Server Settings for D2CIM-VUSB) ............................................ 145
Figure 65: Security Settings............................................................................................................ 147
Figure 66: Security Settings (Strong Passwords)........................................................................ 149
Figure 67: Security Settings (User Blocking) .............................................................................. 151
Figure 68: Security Settings (Encryption & Share) .................................................................... 151
Figure 69: Security Settings (Encryption Mode Warning Message)....................................... 152
Figure 70: IP Access Control........................................................................................................... 154
Figure 71: Audit Log ........................................................................................................................ 157
Figure 72: Device Information ....................................................................................................... 159
Figure 73: Backup/Restore .............................................................................................................. 160
Figure 74: CIM Upgrade from KX Flash ......................................................................................162
Figure 75: Firmware Upgrade ........................................................................................................ 163
Figure 76: Firmware Upgrade Review.......................................................................................... 164
Figure 77: Firmware Upgrade Successful .................................................................................... 164
Figure 78: Upgrade Report.............................................................................................................. 165
Figure 79: Reboot.............................................................................................................................. 166
Summary of Contents for DOMINION KX II DKX2-0E-E
Page 14: ......
Page 103: ...Chapter 7 Virtual Media 89 Figure 35 Virtual Media Connection...
Page 118: ...Add New User Group 104 Click the Add button from the User Group List page Figure 43 Group Page...
Page 250: ......
Page 256: ......