26
Chapter 3
Initial Setup and Web Management
Chapter contents
..............................................................................................................................................................27
........................................................................................................................................27
Accessing the SmartNode via the Console Management Port
..........................................................................27
Logging into the SmartNode Console
.......................................................................................................27
............................................................................................................................28
Setting the IP address to DHCP
................................................................................................................28
Accessing the SmartNode via the Ethernet Management Port
.........................................................................29
Accessing and Navigating the Web Interface
........................................................................................................30
Connecting to the Web Server and Logging on to the Web Portal
..................................................................30
....................................................................................................................30
...................................................................................................................30
..............................................................................................................................30
Navigation and Information Panels
...........................................................................................................30
............................................................................................................................31
....................................................................................................................................................32
Understanding User Access Levels
...................................................................................................................32
......................................................................................................................................32
.......................................................................................................................................33
...............................................................................................................................................33
....................................................................................................................................................34
............................................................................................................................34
Carrying out a First Database Backup
.............................................................................................................34
....................................................................................................................35
Uploading a Database Backup
........................................................................................................................35
..........................................................................................................................36
...............................................................................................................................36
...................................................................................................................................36
Viewing the List of Installed Applications
.................................................................................................36
.............................................................................................................................37
Verifying that an Application is Operating
................................................................................................38
Verifying the Application Path
..................................................................................................................39
..........................................................................................................................39
.........................................................................................................................................41
................................................................................................................................43
......................................................................................................................................44