
154
To backup to the USB enter a brief
Description
of the backup in the Local Configuration Backups
menu and select
Save Backup
The Local Configuration Backup menu will display all the configuration backup files you have
stored onto the USB flash
To restore a backup from the USB simply, select
Restore
on the particular backup you wish to
restore and click
Apply
After saving a local configuration backup, you may choose to use it as the alternate default
configuration. When the Console Server is reset to factory defaults, it will then load your alternate
default configuration instead of its factory settings:
To set an alternate default configuration, check
Load On Erase
and click
Apply
Note:
Before selecting
Load On Erase
please ensure you have tested your alternate default
configuration by clicking Restore.
If for some reason your alternate default configuration causes the
Console Server
to become
unbootable recover your unit to factory settings using the following steps:
-
If the configuration is stored on an external USB storage device, unplug the storage device
and reset to factory defaults as per section 11.1 of the owner’s manual
-
If the configuration is stored on an internal USB storage device, reset to factory defaults using
a specially prepared USB storage device:
o
The USB storage device must be formatted with a Windows FAT32/VFAT file system
on the first partition or the entire disk, most USB thumb drives are already formatted
this way
o
The file system must have the volume label: OPG_DEFAULT
o
Insert this USB storage device into an external USB port on the
Console Server
and
reset to factory defaults as per section 11.1
- After recovering your
Console Server
, ensure the problematic configuration is no longer selected
for Load On Erase.
11.5 FIPS Mode
(B095-004/003 only)
Note
The US National Institute of Standards and Technology (NIST) publishes the FIPS (Federal
Information Processing Standard) series of standards. FIPS 140-1 and FIPS 140-2 are both
technical standards and worldwide de-facto standards for the implementation of cryptographic
modules. These standards and guidelines are issued by NIST for use government-wide. NIST
develops FIPS when there are compelling Federal Government requirements such as for security
and interoperability and there are no acceptable industry standards or solutions.
Console Servers with Revision 3.0.1 firmware (or later) use an embedded OpenSSL
cryptographic module that has been validated to meet the FIPS 140-2 standards and has
received Certificate #1051. This firmware is only currently available on B095-004-1E / B095-003-
1E-M Console Servers.
When configured in FIPs mode, all SSH, HTTPS and SDTConnector access to all services on the Console
Servers will use the embedded FIPS compliant cryptographic module. To connect you must also be using
cryptographic algorithms that are FIPs approved in your browser or client or the connection will fail.
Содержание B092-016
Страница 67: ...67...
Страница 166: ...166...
Страница 242: ...Tripp Lite World Headquarters 1111 W 35th Street Chicago IL 60609 USA www tripplite com support 2 201001079 93 2879 EN...