User guide
Contents
vi
Chapter 8 Security Management 201
Security Settings........................................................................................................................202
Logon Limitations.......................................................................................................................203
Strong Passwords......................................................................................................................204
User Blocking.............................................................................................................................205
Encryption & Share....................................................................................................................207
Checking Your Browser for AES Encryption .............................................................................209
Configuring IP Access Control...................................................................................................210
Chapter 9 Maintenance 213
Audit Log....................................................................................................................................213
Device Information.....................................................................................................................214
Backup and Restore ..................................................................................................................215
USB Profile Management ..........................................................................................................217
Handling Conflicts in Profile Names ................................................................................218
Upgrading CIMs.........................................................................................................................218
Upgrading Firmware ..................................................................................................................219
Upgrade History.........................................................................................................................221
Rebooting...................................................................................................................................221
Stop CC-SG Management.........................................................................................................223
Chapter 10 Diagnostics 225
Network Interface Page .............................................................................................................225
Network Statistics Page.............................................................................................................226
Ping Host Page..........................................................................................................................228
Trace Route to Host Page .........................................................................................................228
Device Diagnostics ....................................................................................................................230
Chapter 11 Command Line Interface (CLI) 232
Overview....................................................................................................................................232
Accessing the Dominion KX II Using CLI...................................................................................233
SSH Connection to the Dominion KX II .....................................................................................233
SSH Access from a Windows PC....................................................................................233
SSH Access from a UNIX/Linux Workstation..................................................................234
Telnet Connection to the Dominion KX II...................................................................................234
Enabling Telnet................................................................................................................234
Accessing Telnet from a Windows PC ............................................................................234
Access Telnet from a Windows PC .................................................................................235
Logging On ................................................................................................................................235
Navigation of the CLI .................................................................................................................236
Completion of Commands...............................................................................................237
CLI Syntax -Tips and Shortcuts.......................................................................................237
Common Commands for All Command Line Interface Levels ........................................237