Table of FiguresxiiFigure 38: Map Virtual Media CD/ISO Image.............................................................................. 94Figure 39: File Server Setup ............................................................................................................. 96Figure 40: User List ............................................................................................................................ 99Figure 41: User Page......................................................................................................................... 100Figure 42: User Group List.............................................................................................................. 102Figure 43: Group Page ..................................................................................................................... 104Figure 44: Group-based IP Access Control List.......................................................................... 107Figure 45: IP ACL Example............................................................................................................. 108Figure 46: Modify Group ................................................................................................................ 109Figure 47: Change Password .......................................................................................................... 111Figure 48: Authentication Settings ............................................................................................... 113Figure 49: Authentication Settings (LDAP)................................................................................. 115Figure 50: Authentication Settings (RADIUS) ........................................................................... 118Figure 51: Network Settings........................................................................................................... 122Figure 52: Network Settings (Network Basic Settings)............................................................. 123Figure 53: Network Settings (Network Miscellaneous Settings)............................................ 124Figure 54: Network Settings (LAN Interface Settings) .............................................................125Figure 55: Date/Time Settings........................................................................................................ 128Figure 56: Event Management - Settings ..................................................................................... 130Figure 57: Syslog Configuration.................................................................................................... 131Figure 58: Event Management - Destinations............................................................................. 132Figure 59: Power Supply Setup ..................................................................................................... 136Figure 60: Port Configuration ........................................................................................................ 138Figure 61: Power Strip Connections ............................................................................................. 140Figure 62: Port Page (power strips) ............................................................................................... 141Figure 63: Port Page (KVM ports) ................................................................................................. 143Figure 64: Port Page (Target Server Settings for D2CIM-VUSB) ............................................ 145Figure 65: Security Settings............................................................................................................ 147Figure 66: Security Settings (Strong Passwords)........................................................................ 149Figure 67: Security Settings (User Blocking) .............................................................................. 151Figure 68: Security Settings (Encryption & Share) .................................................................... 151Figure 69: Security Settings (Encryption Mode Warning Message)....................................... 152Figure 70: IP Access Control........................................................................................................... 154Figure 71: Audit Log ........................................................................................................................ 157Figure 72: Device Information ....................................................................................................... 159Figure 73: Backup/Restore .............................................................................................................. 160Figure 74: CIM Upgrade from KX Flash ......................................................................................162Figure 75: Firmware Upgrade ........................................................................................................ 163Figure 76: Firmware Upgrade Review.......................................................................................... 164Figure 77: Firmware Upgrade Successful .................................................................................... 164Figure 78: Upgrade Report.............................................................................................................. 165Figure 79: Reboot.............................................................................................................................. 166