Chapter 7 Setup
>
7.2 Basic Setup
ETERNUS DX60/DX80/DX90 Disk storage system User Guide
148
Copyright 2010 FUJITSU LIMITED
P3AM-3042-07ENZ0
Figure 7.10 [Setup Network Environment] screen
A confirmation screen appears.
7-2
Click the [OK] button.
The Network Environment is set, and the [Finish] screen appears.
•
Disabling unused protocols is a standard security measure. If
the following "Interface" fields are set to "Disable", network
access to the ETERNUS DX60/DX80/DX90 via the services
that use these protocols is blocked.
-
"http", "https"
To block GUI access.
-
"telnet", "SSH"
To block CLI access.
-
"Maintenance", "Maintenance-Secure"
To block monitoring software access.
-
"ICMP"
To block "ping" requests.
•
The appropriate IP address or network address must be set in
the "Allowed IP List" to allow access from a device in a
network other that in which the ETERNUS DX60/DX80/DX90
resides. Devices in the same network as the ETERNUS DX60/
DX80/DX90 are allowed access even if not set in the "Allowed
IP List".