Casio ACS V6000 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Casio ACS V6000, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Casio ACS V6000 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Casio ACS V6000. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Casio ACS V6000 should contain:
- informations concerning technical data of Casio ACS V6000
- name of the manufacturer and a year of construction of the Casio ACS V6000 item
- rules of operation, control and maintenance of the Casio ACS V6000 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Casio ACS V6000 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Casio ACS V6000, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Casio service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Casio ACS V6000.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Casio ACS V6000 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    A C S v 6 0 0 0 In s ta lla tio n /A dmini str ati on /U se r G uid e[...]

  • Page 2

    [...]

  • Page 3

    ACS v60 00 I nsta l latio n / Admin i str atio n / Us er Gu i d e Avo ce nt, the A vo c e nt log o, T he P o we r o f Be ing Ther e , D SV ie w a nd C ycla des a r e tr a d emar ks o r r e g i ster e d tr ademar ks o f A vo c e n t Corpo r ati o n o r its af f ilia te s in th e U. S. and o t h e r cou ntr ie s. M ic r oso f t a nd Inter net E xp lo[...]

  • Page 4

    T A B L E  O F  C O N T E N T S Intr oduc tion 1 Feat u res a nd Bene fi t s 1 Access op t i o ns 1 Web Man a g er 2 I Pv4 a n d I Pv6 sup p ort 2 Flex ib l e users a nd g rou p s 2 Se cu rit y 3 Aut h en t ic at i o n 3 VPN b a sed o n IP S ec wi th NAT tra versal 3 Pack et f il t erin g 3 SN MP 3 D at a lo g g in g , n o t if i ca t i on s,[...]

  • Page 5

    Se t ti n g s 2 2 D evi ces 2 2 I Pv4 a n d I Pv6 sta t ic rou t es 22 H ost s 2 3 Firewa l l 2 3 I PS ec(VP N ) 25 SN MP Co n fi g u rat i on 27 Ports 2 8 Se ria l p o rts 28 CAS Profi l e 32 Aut h en t ic at i o n 3 5 App l i an ce a u t h en t ic at i o n 36 Aut h en t ic at i o n servers 36 U sers A c co un t s a n d U ser G rou p s 38 L o ca l[...]

  • Page 6

    I n t ro d u c t i o n 1 1 The A v oc en t A CS v 6 0 0 0 v i r t u al a dv a nc ed co n sol e ser v er serves as a sin g le p o i nt f o r ac cess an d ad mini st r at i o n o f co n n ect ed vi rtu al machi n es. V i r t u al co nso l e s er v er s sup po rt secure rem o t e d at a cen t er manag ement a n d ou t -of -ban d mana ge ment o f I T a[...]

  • Page 7

    Web Manag er U ser s a n d ad min ist r a to rs can pe r for m most ta sks t h rou gh th e w eb man ag er (accessed wi t h H TTP or H TTP S) . Th e w eb manag e r r u n s i n t h e Mi crosoft ® I n te r n et Ex p lo rer ® 6 .0 and 7 .0 in t er n et brow ser, and t h e Mo zi ll a ® F i ref o x ® 2 an d 3 in t ernet b row ser o n an y su p po rte[...]

  • Page 8

    ad mini st r at o r ca n assig n t o cu sto m u ser g r o u p s. F o r more i n f o r mati o n , see Users Acco u nt s a n d U ser Gro u ps o n p a ge 3 8 . S ecu ri ty S e cu r i t y p r o fil es d et erm i n e wh i ch n et w o r k servi ces a r e en ab l ed o n th e v irtu al co n sol e ser v er . A dmin i strato rs can ei th e r all ow al l u se[...]

  • Page 9

    D ata l o gg i n g , no t i fi c ati on s, alar ms and d ata bu f fer ing A n ad min ist r a to r ca n set u p d at a lo g g i n g, no t ificat i o n s a nd al ar ms t o al ert ad m in i strato rs of prob l ems w i th email , SMS , SNM P trap o r D S V i ew 3 softw are n o t i f i cat i o n s. An ad mini st r at o r can a lso st ore b u ff er ed d [...]

  • Page 10

    I n s t a l l a t i o n 2 5 ACS  v 60 00 vi r t ua l co nso l e se r ver r eq ui r em ent s The v i r t u al co nso le server r u n s as a vi r t u al mach in e a nd it r eq u i r es a VM wa r e ® ES X ® o r ES X i ® ser v er run ni n g v ers i o n 4 .1 and o n e vCen t er ser v e r . A c li en t PC run n in g t h e VM w ar e in fr astruct u [...]

  • Page 11

    7. I n th e N u m b e r of N ICs fiel d , t y pe 1 . Con fir m th e n et w ork i s VM N et w o r k an d t h e ad ap t o r is F l ex i b le , th en cl ic k Ne xt . 8. Co n f i rm th e Di sk S iz e is 2 GB , t he n cl i ck N ext . 9. Cl i ck Fin i sh to c ompl et e t h e co n f i g u r a ti o n o f th e vi rtu al c o nso le server on t h e ES X or ES[...]

  • Page 12

    3. Cl i ck Edi t Vi rtu a l Mac h in e S et ti n g s fr om t h e G et ti n g Started t ab . 4. Cl i ck Add , cl i ck S eri a l Port an d t he n cl ic k N ex t. 5. Cl i ck Co n n ect Vi a N et wo rk in t h e S e le ct Por t Typ e fiel d, t h en cl ic k Nex t . 6. Cl i ck Proj ect . I n t h e Por t UR I  fiel d , en t er t he serial p o r t o n t [...]

  • Page 13

    To us e Telne t to c onne ct t o a dev ice t hrou gh a s er i al po rt : F o r thi s proce du re, yo u n e ed t h e u ser n ame co nfig u r e d t o a ccess th e ser i al p o rt, t he p o rt na m e ( for ex ampl e, 1 4 -35 - 6 0 -p- 1 ), dev i ce n ame (f o r ex ampl e, t t y S 1 ), TCP po rt ali as ( f o r ex ampl e, 70 0 1 ) o r I P p ort al ia s [...]

  • Page 14

    - o r- ss h -l use rn ame: TCP _P ort_ Ali as [ hostna me | IP _addre s s] - o r- ss h -l username IP_Port_Alias To clos e an SSH s es sion: A t t h e b eg in n i n g o f a lin e, ent er th e h ot k ey de f i n ed for t h e S SH cl i en t fol l ow e d b y a p erio d . The d efaul t i s ~ . O r , en t er t h e tex t sessio n h o t ke y for th e CLI [...]

  • Page 15

    10 A C S v 60 0 0 Insta ll at i o n /A d min i strati o n/ U ser G u id e[...]

  • Page 16

    A c c e s s i n g a V ir t u a l C o n s o l e S e r v e r v i a t h e W e b M a n a ge r 3 11 O nc e yo u ’ v e con n ect ed y ou r A CS v 6 0 0 0 v i r t u al c on so le ser v er t o a ne tw o rk, y o u ca n acc ess t h e vi rtu al co n so le server v ia t h e w eb m a na ge r . The w eb mana g er prov i d es di r e ct a ccess to t h e v i r t [...]

  • Page 17

    F ig u re 3.1: A d m in ist rat o r Web Ma n ag er Screen Nu m b er D escrip t io n 1 T op opti on bar . T he nam e of the appl ianc e and of the logged i n us er appear on the left s ide. Ref r esh, Print, Logout and H elp buttons appear on t he r ight. 2 T ab bar . Dis p l a y s wh ether th e admin is i n Exper t or Wi zard mo de. 3 Si de N avi g[...]

  • Page 18

    CA S P r o fil e and set t he S ecu rity Pr o f il e, Net w o r k , U sers S et t i n gs and ad d l i cen ses u sin g t h e W i zard. By d efaul t , t h e f i rs t t i me an ad min ist r a to r accesses th e v i r tu a l co n sol e ser v er th rou g h t h e W eb Man ag er, th e W iz ar d w il l b e di spl ay e d. Sub seq u en t lo g -in s w i l l o[...]

  • Page 19

    3. I f d esi r e d, un ch eck th e b ox (es) to d i sabl e Bo o t p Co n f i g u r at i on Ret r ie v al an d / o r Liv e Co n f i g u r a ti o n Re triev al . 4. I f yo u are no t u sin g DSVi ew 3 so f t w are to mana ge t h e ap p l i an ce, un ch eck th e Al lo w App l i an ce t o be Ma n a ge d b y D S Vie w box. 5. Cl i ck Nex t to co nfig u [...]

  • Page 20

    5. Cl i ck Nex t to co nfig u r e u ser s or cl i ck on th e Net wo rk , S ecu rit y, Lice n se o r U sers li n k to op e n t h e ap p r o p riat e scr ee n. To co nfigur e use rs a nd cha nge t he de fa ult us er pa ss wo rds : WAR N IN G: For security re asons , it is re c omme nded you c h ange the d efault pa ss w or d for bot h r oot and a dmi[...]

  • Page 21

    is a u th o rized t o a ccess. 2. S e le ct S eria l Vi ewe r f rom t he A ct i o n co l u m n . A Jav a app l et v i ew er ap p ea r s. I n a gray ar e a at t h e t o p o f t h e vi ew e r , th e Co n n ect ed t o mes sag e sho w s th e IP ad d res s o f t h e v i r t u al co n sol e ser v er foll o w ed by th e d ef au l t p ort nu mber o r a li [...]

  • Page 22

    • A ll o w a ll users to acce ss en ab l ed p o r t s o r al l o w t h e con fig u r at i o n o f g r o up au th o rizat i o ns to restr ic t acce ss • Enab l e or d i sabl e Bo ot P Co n fig urati o n Ret riev al an d / o r Liv e Con fig urati o n Ret riev al • S e le ct a S ecu rity P rofil e, w h ic h d efine s: • Enab l ed ser v i ces ([...]

  • Page 23

    D ate and T im e The v irtu al c o nso l e s er v er p r o v i d es t w o o p t i o ns f o r sett i n g t h e dat e an d t i me. I t c an retriev e th e da t e an d t i m e f rom a net w o r k ti me proto c ol ( N TP ) ser v er o r yo u c an set t h e d at e an d t i me m an u al ly so th a t t h e v irtu al co n so le server’ s in te r n al c lo[...]

  • Page 24

    w eb ser v er i n t he O n l in e H el p U R L fiel d . Cl i ck S a ve . O nli ne he l p W h en t h e o n li n e h el p featu re is con fig ured for y ou r vi r t u al c on so le server, cl i ck i n g t h e H el p bu t t o n fr om a ny f o rm on t h e we b manag er o p en s a n ew w in d o w an d r ed i rects it s co n t en t t o t h e co n f i g u[...]

  • Page 25

    2. U se t h e S e arch F i l te r to f i n d al l V i rtu al M ach i ne s t h at h av e ser i al po rts a va il ab l e f o r associ at i on an d t h at al so h av e th e sear ch st r i n g fil te r . C li ck Next . 3. I n th e V i r tu a l Ma ch i ne ID fiel d, select th e v i r t u al ser v er y ou w an t t o assoc ia te . 4. I n t h e Vi rtu al P[...]

  • Page 26

    NOT E: Wi th out the configura ti on of vCenter , the confi g ur ation of ass oci ations v i a the vi r tua l consol e ser v e r and the pow er acti on o f tar gets vi a t he vi r tual consol e ser v e r wil l no t be avai labl e . T he pass w or d w il l be e ncrypted and s tor ed in t he appli an c e . T he vi r tua l c onsol e ser ver w i l l be[...]

  • Page 27

    S ett i ng s Cl i ck Net wo rk - Se tt i n gs to make ch an g es to t he co n f i g u r ed n et w o r k set t in g s. D evi ces A n ad min i strato r can sel ect , enab l e an d c o nfig u r e t h e IP ad d r e ss es ass i g n ed t o t h e n et w o r k in t erf ace s an d v i ew t h e M A C ad dress . To co nfigur e a net w ork d ev i c e : 1. S e [...]

  • Page 28

    4. Ent er the IP a dd ress of the g a te w ay i n t h e G at ew ay f i el d . 5. Ent er the n u mber of ho p s to t h e d esti n at i o n i n t h e Me tric fiel d , th e n cl i ck S a ve . H os ts A n ad mini st r at o r can c on fig u r e a tab l e of h o st names, IP a dd ress es and h o st ali a ses f o r t h e lo cal ne t wo rk. To ad d a hos t[...]

  • Page 29

    I f LOG i s s el ect ed f rom t he Target pu l l - d o w n menu , th e ad min ist r a to r can co n f ig u re a L o g Leve l, a Lo g Pr ef i x an d w h et he r th e TCP seq ue nc e, TCP o p t io n s a n d I P o p t i o ns ar e l o gg e d i n th e Log O pt i o n s S e ct io n . I f REJECT i s s el ec te d fr o m th e Target p u l l - d o w n menu , [...]

  • Page 30

    NOT E: Spaces are n ot all ow ed in the chain nam e. 6. A dd on e o r mor e rul es t o c ompl et e t h e cha in co nfig u r a ti o n . To ch ang e t he poli cy f or a de fa ult cha i n: NOT E: User - defined chai ns c a nnot be e di ted. T o r enam e a user- a dded chai n, delete i t a nd crea te a new one. 1. S e le ct Net wo rk - Firewa l l . 2. [...]

  • Page 31

    U se th e Add b u t to n t o ad d a V P N c on n ec ti o n o r cl ic k on a n ex i sti ng c o nn ec ti o n n ame t o ed i t on e a lread y i n t h e l ist . Cl i ck t h e D el et e b u tt o n t o d e le te an ex ist in g co nn ec ti o n . If NA T sett i n gs nee d t o b e ch an g ed , cl ic k t h e Con f i g u re N AT button. W h en y o u c li ck t[...]

  • Page 32

    F ield N ame De f in it io n Re mote (R ight) Si de - and - Local ( Left) Side Enter the r eq uired ad dr ess or te x t f or each of the four fiel d s f or both R emo te Si de a nd Local Side: ID: T h i s i s the hostname that a loc a l sy stem and a r emot e s ys tem use for IPSec n egotiati o n and auth entic ation. It can be a ful ly quali fied [...]

  • Page 33

    6. I f th e r eq u i r ed SNM P ve r sio n is v1 or v2 , cl i ck t h e Vers io n v1 , v2 b u t to n , t h en e n te r th e sou r ce ( v al i d en t ry i s t h e su b ne t ad d r e ss ) . - o r- I f th e r eq u i r ed SNM P ve r sio n is v1 or v2 u sin g an IP v 6 n et w o rk, cl i ck t h e Versio n v1 ,v2 f o r IP v 6 n et wo rk b u t to n , th en [...]

  • Page 34

    d. Ent er the t ex t ses si o n an d po w er s e ss i o n h o t k ey s in t h e ap p r o priat e fiel d s. e. Ent er the TCP po r t al ia s in t h e ap p r o p riat e f ie ld . f . En t er th e IP v 4 o r IP v6 al ia s and i t s in t er face i n t h e ap p r o p riat e f i el d . g. To al lo w a s essio n o n ly if D C D i s o n an d t o en ab l e [...]

  • Page 35

    Param et er D es crip t io n Enable A uto D i sc overy T h e tar get na me w i l l be dis cov e r ed and w il l be ass oci a ted w i th this s er ial por t. If it fail s, t he Por t N ame w il l be used. Def ault: D is abled. Pr otocol T he pr o tocol that wil l be used to a c cess the ser ial por t/tar ge t. SSH - Author iz ed user s c an use SSH [...]

  • Page 36

    Param et er D es crip t io n DT R Off Inter val Inter val i n sec ond s used by D T R Mo de Off In ter val i n mil li sec onds. De fault: 100. Line Fe ed Suppr ess ion Enables the suppr ess ion of the LF char acter after th e CR char acter. De fault: Dis abled. Nu l l Afte r CR Suppr ess ion Enables the suppr ess ion of the N U LL chara c t er afte[...]

  • Page 37

    To co py/clone t he c onf i gur a tion of one po rt t o oth er port s : 1. S e le ct Port s - S eri a l Port s . 2. Cl i ck t h e ch ec kb o x for t he serial p o rt yo u w a nt to cl on e . 3. Cl i ck t h e Cl o n e button. 4. Ent er the serial p o rt( s) to b e co nfig u r e d i n t h e Co p y C on fig u r at i o n To fiel d a nd cl ic k S a ve .[...]

  • Page 38

    The match strin gs ar e r e gu l ar exp r e ss io n s wh ere “%H” i s a pl ace ho l d er f or th e ta r g et na m e y o u w an t t o d et ect , suc h as: “ (.* )( %H) (. *) ” or ju st “xx x%H yyy” . The f irst on e wi l l ex t ract ta r g et na m e fr o m th i n g s suc h as: na nana (my Targ et) : à resu lts : myTa rge t jh d[...]

  • Page 39

    To d el et e an a ut o i n p u t a nd ou t p u t st r i n g , sele ct t h e ch eck b o x n ex t t o th e strin g y o u w an t t o d el et e. Cl i ck D e le te , th e n cl i ck S a ve . Pool of CA S por ts A n ad mini st r at o r can c r e at e a p o o l of serial p o r t s wh er e each ser i al p o rt in t he p oo l sh ar es a po o l n ame, TCP P o[...]

  • Page 40

    Param et er D es crip t io n Pool Na me T he nam e of the poo l . T he poo l n ame is man dator y and shoul d fo l low ho s t name guidel ines, not exc e ed 64 char acters a nd start w ith a letter . T C P Por t Al ias T he T C P Por t Al ias whe r e the poo l r esponds. T his par ame ter is opti o nal. Pool IPv 4 Al ias T he IPv4 addr ess us ed b [...]

  • Page 41

    au t he nt i cat i o n meth o d t h at i s co n fig ured f o r th e v i r t u al c on so le ser v er or th e po rts i s u sed f o r au t he nt i cat i o n o f an y u ser w h o at t empt s t o l o g i n t h rou gh Teln et , SS H o r t h e we b manag e r . A pp li anc e au t he nti ca t ion The v irtu al c o nso l e s er v er au t he n ti ca te s for[...]

  • Page 42

    4. Ent er y o u r secret wo rd or p assph r a se i n t h e S ecret f i el d ( a p pl i es to bo t h fir st an d seco n d au t he nt i cat i o n an d acco u n ti n g servers ), th en r e-ent er t h e secr e t w o r d or p assph ras e in th e Co n f i rm S ecret f i el d . 5. Ent er the d e sir e d n u mber of secon d s f o r ser v er t ime- o u t i [...]

  • Page 43

    6. Ent er yo ur Dat ab ase P asswo r d , th en re- t y p e th e d at ab ase p asswo r d in th e C on firm Pas swo rd f i el d . 7. Ent er y o u r d esired Log i n A t trib u t es. 8. Cl i ck S av e . To co nfigur e a K erb er os a ut hen tica t i on s e rv er : 1. S e le ct Aut h en t i ca ti o n - Au t he n ti ca t i o n S ervers - Ke rbero s. 2. [...]

  • Page 44

    Lo cal a cco un ts The ad min an d roo t a r e eq u i va le nt users bu t n amed d iff erent l y t o ad d res s u sers f amili ar w i th ei th e r Av o ce nt or C y cl ad es™ a p pl i an ces. R eg ul ar u ser s c an b e g r an t ed pe r missio n s b y ad mini st r at o rs at an y t i me. The v irtu al c on so le ser v er h as t h ree u ser acc o [...]

  • Page 45

    • W arnin g Da y s: Ent er t h e nu mber of d ay s th at a w arni n g i s issued to th e u ser prio r t o ex p irati o n . Ent erin g 0 w i ll cau se th e w arni ng to be i ssued on th e ex p i r at io n da y. A ne g at iv e v al u e o r no va lu e mean s th at n o w a r n i n g w i l l b e i ssued . 7. Ent er t h e de sir ed A cc ou n t Ex p ira[...]

  • Page 46

    co n f i g u r e p orts and ad d u ser s. NOT E: T he only c o nfigura tion all ow ed for the admin gr oup is adding or de l e ting mem ber s. To vie w admin Appli anc e A c ce ss Ri ght s : 1. Cl i ck U sers - Aut h o rizat i o n - G rou p s . The G r o u p N ames screen is di spl ay ed , sh o wi n g t h e th ree d efaul t u ser grou ps a lo n g w[...]

  • Page 47

    a ppli anc e -a dmi n gro up Members o f t he ap p l i an ce-admin g rou p h av e acce ss r e strict ed t o t ask s for manag i n g o n l y t h e ap p li an ce . A p p li an ce - a dmin user g rou p mem b ers ha v e no a ccess t o th e ser i al p o rts, an d sha r e al l of t h e ap p li an c e access rig h t s as admin ex cep t for Co n f ig u re [...]

  • Page 48

    4. Mo v e u ser s f rom th e A v ai l ab l e U ser s bo x o n th e l eft to th e b o x o n t h e rig ht by do u b l e- cl ic k in g o n th e u ser n ame, o r by selec ti n g t h e n ame and c li ck i n g t h e Ad d bu t t o n . Yo u can r e m o v e an y n a m e s f r o m th e bo x on th e rig ht by do u b l e-cli ck i ng on th e n ame or by selec t[...]

  • Page 49

    Co m man d Des crip t io n - i6 Dis p l a y s loc al IPv6 ass igned to th e s e r ial por t - u <name> User nam e to be used i n t he tar ge t s ess ion - e <[^]c h ar > Es cape char acter used to cl ose the tar get sess ion. Defa ul t v alue: Ctr l-X - l S o r ted li sts por ts and exi t - r o Re ad- Onl y m ode <por tname > Conn[...]

  • Page 50

    To co nfigur e a group in a TAC A C S+ aut he nt i ca t i on s e rv er : 1. O n t h e ser v er, a d d raccess ser v i ce t o t h e u ser c o nfig u r a ti o n . 2. D ef i n e w h i ch g rou p(s) t he u ser b el o ng s to in th e raccess ser v i ce fol lo w i n g t h i s s y n t ax : gr oup_ nam e = <Gro up1 >[,< Gro up2, ... ,Gro upN >][...]

  • Page 51

    D urin g t h e au t h en ti ca ti o n p h ase, th e co nso l e ser v er w i ll r ec ei v e th e at t ribu t e Fr amedFI l te r ID f rom t h e RA D I U S server. The user regi n a bel o n g s t o a u th o rizat i o n g r o u p R A D I U S_1 an d RA D I U S_2 . a nd th e u ser speci al be lo n g s t o a u th o rizat i on g r o u p ad min . To co nfig[...]

  • Page 52

    3. S e le ct Rem o te S erver - I Pv4 t o en ab l e s y slo g mess ag es t o b e sent t o o ne o r m o re rem o t e I Pv4 sy slo g servers , a n d en t er t h e I Pv4 Ad dress o r Ho st na m e . S e pa r a te mul t i pl e ser v er ad d r esses b y co mm as. - o r- S e le ct Rem o te S erver - I Pv6 t o en ab l e s y slo g mess ag es t o b e sent t [...]

  • Page 53

    4. To co n f i g u r e d at a bu ff er sto rage o n a syslo g server i n t h e S y slo g Da ta Bu ff erin g Sett in g s secti o n ; sele ct a f aci l i t y nu mber fr o m th e d r o p -do wn m en u : Log Lo cal 0 , Lo g Loca l 1, L o g Loca l 2, L o g Lo cal 3 , Lo g Loca l 4 or Lo g Loc al 5 . 5. Cl i ck S av e . A pp li anc e Lo g ging To co nfig[...]

  • Page 54

    Screen Name De f in it io n Ne two r k - D evi ces Show s Ether net por ts and PC c ar d D evi ce N ame , Sta tus ( enab l e d/dis abled) , IPv 4 Add r ess , IPv4 Mas k and IPv 6 Addr ess . Ne two r k - IPv 4 R outing T a ble S how s D esti nation, Gateway, Genmask , F lags , M etr ic , R ef, U s e and lfac e . Ne two r k - IPv 6 R outing T a ble S[...]

  • Page 55

    F ig u re 3.3: Web Man ag er R eg u la r Use r Screen Nu m b er D escrip t io n 1 T op opt i o n bar . T he n ame of the vi r tual c onsol e ser ver an d the name o f the logged i n u s er appe ar s on the l eft si d e and R efr esh, Print, Logou t and H elp buttons appe ar on the r ight. 2 Si de n avi gation b ar . Acc ess and C ha nge Pass w or d[...]

  • Page 56

    51 App en di x A: Bo ot P Co nf i gu ra t i on Re t ri e va l The Bo o t P Co n f i g u r a ti o n R et r i ev al op t i o n al l o ws th e en t ire u n i t co n fig urati o n t o b e r e triev ed ov e r Bo ot P/TF TP d u r i n g b oo t an d d u ring D H C P r en ew a l. There ar e t w o w ay s to pu sh a c on fig u r at i o n d u r in g a DH C P r[...]

  • Page 57

    App en di x B: Tec hn i cal S upp or t O ur Tec hn i cal S u p p o r t staff is read y t o assist y ou w it h a n y i nst al l at io n o r o p erati o n al i ssues yo u en co u nt er w i t h y o u r A vo c en t p r o d u ct . If an issue sho u l d d ev el o p , fol lo w th e step s bel o w f o r t h e f ast est p ossib l e ser v i ce. To re solv e [...]

  • Page 58

    590-1034- 501B For T ec hnica l Suppor t: w ww .avo ce n t. co m/supp o rt[...]