Table of contents
iii · G&D MUX-NT series
Creating an SSL certificate ............................................................................... 24
Special features for complex KVM systems ................................................... 25
Creating a Certificate Authority.................................................................... 25
Creating any certificate................................................................................. 27
Creating and signing an X509 certificate ....................................................... 28
Creating a PEM file ..................................................................................... 28
Selecting an SSL certificate .............................................................................. 29
Firmware update ............................................................................................. 31
Firmware update of a single device ............................................................... 31
Restoring the system defaults ........................................................................... 32
Restarting the device ........................................................................................ 32
Network functions of the devices .................................................................... 33
NTP server ...................................................................................................... 33
Time sync with an NTP server...................................................................... 33
Manual setting of time and date....................................................................34
Logging syslog messages .................................................................................. 35
Local logging of syslog messages .................................................................. 35
Sending syslog messages to a server .............................................................. 36
Viewing and saving local syslog messages ..................................................... 37
User authentication with directory services ....................................................... 37
Setting up two-factor authentication on the device ........................................... 40
Monitoring functions ...................................................................................... 42
Viewing all monitoring values .......................................................................... 42
Enabling/disabling monitoring values .............................................................. 43
Advanced features for managing critical devices ............................................... 44
Displaying the list of critical monitoring values ............................................. 44
Confirm the alarm of a critical device ........................................................... 44
Monitoring devices via SNMP ........................................................................ 45
Practical use of the SNMP protocol .................................................................. 45
Configuring an SNMP agent ............................................................................ 45
Adding and Configuring SNMP traps ............................................................... 48
Users and groups ............................................................................................. 50
Efficient rights administration .......................................................................... 50
The effective right ........................................................................................ 50
Efficient user group administration ............................................................... 51
Administrating user accounts ........................................................................... 52
Creating a new user account......................................................................... 52
Activating two-factor authentication .............................................................53
Renaming a user account ............................................................................. 56
Changing the password of a user account......................................................56
Changing the user account rights .................................................................. 57
Changing a user account’s group membership............................................... 58
Enabling or disabling a user account ............................................................. 59
Deleting a user account ................................................................................59