Contents
3.5
Logs & Reports .......................................................................................... 3-5
3.5.1
3.5.2
3.5.3
3.5.4
3.6
Settings ....................................................................................................... 3-9
3.6.1
3.6.2
3.6.3
3.6.4
3.6.5
3.6.6
3.6.7
3.6.8
3.6.9
3.6.10
3.6.11
3.6.12
3.6.13
3.6.14
3.7
Remote Control ........................................................................................ 3-19
3.7.1
3.8
Image Redirection .................................................................................... 3-22
3.9
Power Control ........................................................................................... 3-22
3.10
Maintenance ............................................................................................. 3-23
A.1
A.2
Troubleshooting ........................................................................................ A-3
A.3
Sensor Table.............................................................................................. A-4
iv
IPMI Event Log............................................................................ 3-6
System Log ................................................................................. 3-7
Audit Log ..................................................................................... 3-8
Video Log .................................................................................... 3-8
Date & Time ................................................................................ 3-9
KVM Mouse Setting .................................................................. 3-11
Log Settings .............................................................................. 3-11
Network Settings ....................................................................... 3-13
Services .................................................................................... 3-15
SMTP ........................................................................................ 3-15
SSL Settings ............................................................................. 3-16
System Firewall ......................................................................... 3-17
User Management..................................................................... 3-17
Video Recording........................................................................ 3-18