background image

 

11 

Figure 2-9 System management 

 

Table 2-4 Description 

Operation 

Description 

Reboot 

Save system data before reboot. 

Shut down 

Save system data before shutting down.   

Password 

Reset current password. 

Reset Firewall 

Enable SSH (22) port to avoid whitelist configuration error of the Config 
System or access failure to the platform. 

Version 

View product model, product serial number, product ID and system 
version. 

Summary of Contents for DSS7016D-S2

Page 1: ...DSS7016D S2 Quick Start Guide V1 0 0...

Page 2: ...lated regions For detailed information see the paper User s manual CD ROM QR code or our official website If there is inconsistency between paper User s manual and the electronic version the electroni...

Page 3: ...under the allowed humidity and temperature conditions Electrical Safety Improper battery use might result in fire explosion or inflammation When replacing battery make sure the same model is used Use...

Page 4: ...2 1 Front Panel 2 1 2 2 Rear Panel 3 1 3 Connecting Cables 4 2 Local Applications 5 2 1 Function Architecture 5 2 2 System Configuration 6 2 2 1 Basic Settings 6 2 2 2 Network Settings 6 2 3 Operation...

Page 5: ...ed pair 6 Mouse 1 USB 2 0 interface box packed 7 Terminal Board 1 bag 2 with 12 columns 2 with 8 columns 8 Panel Key 2 Universal for series product After confirming that the material and accessories a...

Page 6: ...ght flashes during disk reading 3 Alarm indicator light The blue light flashes when the server triggers an alarm 4 Network indicator light The blue light flashes when network is well connected 5 USB 2...

Page 7: ...efault port 4 SAS port Used to connect to expansion cabinet 5 eSATA port Supports eSATA device access 6 USB 3 0 port Two USB 3 0 ports for USB device access 7 Audio input or output port Blue RS 232 po...

Page 8: ...4 1 3 Connecting Cables Connect cables according to port introduction and then connect the server to power...

Page 9: ...Function Architecture The section introduces the local applications of the device See Figure 2 1 The local interface is displayed after the server is started See Figure 2 2 Figure 2 1 Local functions...

Page 10: ...p it the same as local time Date Format Date and time format of the local system Date Separator Time Format Device Name It is the current product mode name by default Standby Time Set the inactivity d...

Page 11: ...er one will automatically take over the job to ensure network stability Load balancing Multiple NICs share one IP and work at the same time to share the network load providing greater network capacity...

Page 12: ...ay preferred DNS server address and alternate DNS server address Subnet Mask Preferred DNS Default Gateway Alternate DNS 2 3 Operation Management 2 3 1 Operation Analysis View the status of platform s...

Page 13: ...9 Figure 2 6 Operation Analysis 2 Figure 2 7 Operation Analysis 3...

Page 14: ...pper and lower flow of physical network port HDD Detection Real time detection of disk capacity temperature I O load and health Environment Detection Real time detection of CPU temperature usage fan s...

Page 15: ...before reboot Shut down Save system data before shutting down Password Reset current password Reset Firewall Enable SSH 22 port to avoid whitelist configuration error of the Config System or access fa...

Page 16: ...age map database and security For details see User s Manual Enter http IP config in the address bar of browser to go to the Config System The login interface is displayed See Figure 3 1 Server default...

Page 17: ...s function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to impr...

Page 18: ...TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PSK encryption mode and set up strong passwords 11 Audio and Video Encrypted Transmission If your audio...

Page 19: ...LAN network GAP and other technologies to partition the network so as to achieve the network isolation effect Establish the 802 1x access authentication system to reduce the risk of unauthorized acces...

Reviews: