User`s guide

Table Of Contents
Pipeline User’s Guide Preliminary January 30, 1998 8-1
8
Pipeline System Administration
This chapter includes the following topics:
Overview of administration functions
The Pipeline provides the following administrative functions:
Overview of administration functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Activating administrative privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
Configuring administration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
Using the Pipeline status windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
Performing system administration operations . . . . . . . . . . . . . . . . . . . . . . 8-10
Using the terminal server interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-17
Accessing a local Pipeline via Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-21
Security profiles These use password security to protect the unit from
unauthorized access. (See “Activating administrative
privileges” on page 8-3 and Chapter 7, “Setting Up Pipeline
Security.”)