First Computer R02501 SERVER User Manual USERS MANUAL 2
First International Computer Inc SERVER USERS MANUAL 2
Contents
- 1. USERS MANUAL 1
- 2. USERS MANUAL 2
USERS MANUAL 2
6.2.4 Cache Peer In the “Cache Peer” screen of “Cache”, we can configure to communicate with other Proxy Servers. This configuration is possible for the communication with proxy servers on upper levels or on the same level. 6.2.5 Multi Router Traffic Grapher (MRTG) In general, Multi Router Traffic Grapher (MRTG) graphically shows performance analysis of cache service, including analysis of cacheServerRequests, cacheServerErrors, cacheServerInKb, cacheServerOutKb, and CPU utilization. As shown in the figure below: In addition, if you click any small graph in All targets Overview, the cache traffic analysis on daily, weekly, monthly, and annual basis will display as shown in the figure below: 6.2.6 Cache Management You can check whether the cache is operating properly via Cache Manager Interface. Click “Statistics” in Cache service menu. The following screen will appear: Click “Continue” button directly (it is unnecessary to complete Manager name and Password since the system will enter the data automatically). The options of Cache Manager will appear as shown in the figure below, wherein “IP Cache Stats and Contents” and “Cache Client List” are frequently used by managers, and thus the rest of the Cache Manager options will not be described here. 1. IP Cache Stats and Contents – shows all of the websites visited by the client-end and the corresponding IP addresses, plus the log data of pre-caching, as shown in the figure below: 2. Cache Client List – shows all of the Client-end information on the used cache service, as shown in the figure below: 6.3 DHCP Service DHCP (Dynamic Host Configuration Protocol) is a communication protocol used to distribute IP addresses and other configurations between Client PSs and DHCP server. It mainly features to enable one computer broadcasts through its own MAC address to obtain configurations related to IP, Netmask, Default Gateway and DNS. Thus a network administrator only needs to configure DHCP server, so that Client PC can automatically obtain IP related configurations through DHCP protocol, saving efforts to configure on each client PC.DHCP and NAT (transferred Virtual IP to legal IP) are not directly related. Please make sure not to error. DHCP servers are all easy to use and set up. Therefore, if your PC fails to obtain an IP address, the problem generally originates in such PC devices as network cabling, NIC of PCs, HUB, switches, NT servers, printer servers, or / and interweaving of internal and external networks. 6.3.1 Steps of DHCP Configuration 1. Enable DHCP Click “Service” in the “System Management Tools” screen and select Enable for “DHCP” as shown in the figure below: 2. Default Value of DHCP Service Configuration Then click “DHCP” in the “Service” screen. A NIC screen showing that DHCP is enabled will appear as shown in the figure below: The above figure shows that the NIC (eth1) had enabled DHCP. If you want to use other NICs to enable DHCP, you can select “Enable” for the specified NIC on the “Configuration” screen as shown in the figure below: 3. Change in NIC Configurations of DHCP In the “Configure” screen of “DHCP”, we can choose to carry out related configurations for the NIC that starts the DHCP. As shown in the figure below, check the Sub-domain “192.168.2.0” (pointed out by the arrow) to enter the configuration screen of that NIC. In the NIC Configure screen with DHCP of 192.168.2.0 as shown below, we have set up such parameters as “172.16.100.1” for the server, “172.16.100.1” for the router, and the IP-address range available in the DHCP server. These settings are related information provided by the DHCP server when DHCP clients request the server for an IP address. 6.3.2 DHCP Client-End Configuration Client-end configurations are very simple, just requiring a few of steps as shown below: 1. DHCP Configuration (Microsoft Windows 2000 taken as an example here) Click the right mouse button on “My Network Places” and select “Properties”. Then select “TCP / IP” Æ NIC (e.g. NE2000). Except selecting “Automatic Obtain IP Address” (Shown as in the figure above) on “IP Address”, you do not need to configure related options. Click on “OK”, Client PC will reboot. After rebooting computer, you can use command winipcfg to check if a set of IP values automatically obtained. 6.3.3 DHCP Logging After selecting “Logging” of “DHCP”, the system will display the utilization status of DHCP clients, such as IP addresses and lease time, MAC addresses, and host names of the client PC, so that MIS staffs are able to conduct related administration, as shown in the figure below: 6.4 DNS Select “DNS” in “Service”: (Related configurations below are for demonstration only) As shown in the figure above, configuration list for “DNS” appears. The list shows all current configurations of “DNS”. 6.4.1 Configurations The configurations allow administrators to add primary domain or sub-domain. Select “New Master Zone” to add a new primary domain: Note: 1. (master) eflash.com.tw, (master) 192.168.2, (master) 172.16: are the Forward and Reverse of DNS. “(master) eflash.com.tw” is the Forward Domain Name Analysis of this domain, while “(master) 192.168.2” and “(master) 172.163” are its Reverse Domain Name Analysis. The two figures above are the detailed configurations of the Forward Domain Name Analysis of “(master)eflash.com.tw”. 2. The two figures above are the detailed configurations of the Reverse Domain Name Analysis of “(master)172.16”. The system will automatically apply newly configured DNS configurations after you make a change in all of the aforementioned settings. 6.5 FTP Actually, FTP stands for “File Transfer Protocol”, which allows LAN or Internet users to upload and download files and data in a snap, and thereby makes network HD storage and resource sharing possible. 6.5.1 Steps of FTP Configuration 1. Enable FTP Click “Service” in the “System Management Tools” screen, select “Enable” FTP as shown in the figure below: 2. FTP Configuration Then click “FTP” in the “Service” screen, and you will see a FTP service default offered by the system. As shown in the figure below, the system has enabled FTP server, disabled root user, enabled Anonymous and disabled Anonymous Incoming: A click of “Configuration” in the “FTP” screen enables you to change FTP configurations. If you want to enable ROOT user to use FTP as well, check “Enable” for root user, as shown in the figure below: 10 6.5.2 Anonymous Configuration Click “Anonymous FTP” in the “FTP” screen. As shown in the figure above, configuration list for “Anonymous FTP” appears. This list shows all the applied configurations of “Anonymous FTP”. This item is used to enable each configuration. ※ Note: “Anonymous FTP” means that the FTP is obtainable via universal user account, requiring no account authentication. Whether to enable this function depends on “Anonymous FTP status”. The universal user account here only has permission of reading files, and it is the “Anonymous FTP Incoming” that decides whether granting permission of writing files. 6.6 Mail In generally, Mail configurations refer to the files under the directories of /etc/mail/sendmail.cf, /etc/aliases, and /etc/mail. If you fail in receiving any mails, it is often a result of incorrect DNS settings or inconsistency between the Forward and Reverse Domains of the domain name you have applied. However, the failure may be 11 sometimes caused by the mistakes of these configuration files’ content or those of file permissions. 6.6.1 Mail Configuration It is mainly used to configure email size limit. Please select “Configure” in “Mail Service” interface. Then a screen will appear as follows: Now you can configure mail size; if you do not specify, mail size will be 0 Bytes. (Note: The unit is Bytes. So if you want to configure as 1MB, you should configure as 1024000 Bytes.) 6.6.2 Mail Alias Click on “Mail Alias” you can specify the alias for whom to receive the mail. For example; If you specify “Johnny, Richard, James” as the alias for “Sales Team”. All the mail to “Sales Team” will be forwarded to Johnny, Richard and James. The screen will appear as follows: 6.6.3 Mail Access List Configuration In general, the settings configure the accessible IP address block or domain name for the mail. During installation, the management interface will automatically set up a default value for the properties here. Therefore, in general, it is unnecessary to change these settings unless you want to edit, add or delete some DNS configurations yourself. Please select “Mail Access List Configuration” in “Mail” of the “Service” interface. Then a screen will appear as follows: 12 You can configure accessed domain range for mail service. Access service is not available for those not listed on the Access List. The range can be Domain Name or IP address. (Note: The rule fields of the system allow continuous entry of data, without any limitation on the space shown in the screen.) 6.6.4 Configure Mail Domain for Localhost Here you can configure the domain names or other names that are available in the host, with default values automatically configured during installation. Therefore, in general, it is unnecessary to change these settings unless you want to edit, add or delete some DNS settings by yourself. Select “Localhost” in “Mail” of the “Service” interface. Then a screen will appear as follows: 13 (Note: The rule fields of the system allow continuous entry of data, without any limitation on the space shown in the screen.) 6.6.5 Configure Email-Relay Domain Here you can configure the domain or IP address block to have the mail service accept relayed emails. During installation, the management interface will automatically configure a default value for the properties here. Therefore, in general, it is unnecessary to change these configurations unless you want to edit, add or delete some DNS configurations yourself. Please select “Email-relay Domain” in “Mail” of the “Service” interface. Then a screen will appear as follows: 14 The range here can be on a basis of domain names or IP addresses. (Note: The rule fields of the system allow continuous entry of data, without any limitation on the space shown in the screen.) In order to prevent from any unauthorized utilization of mail relay. Maat system included an authentication facility to challenge user with user ID and password. When user’s domain that is not in “Relay” list, system will prompt for user ID and password. User will be denied if authentication does not successful. If user wants to enable the authentication facility please refer to related Email application (such as Outlook Express) to make appropriate configuration. 6.6.6 Configure Group Mail Domain In general, you can have emails sent in groups by configuring the settings here. In other words, whenever you send a mail within a domain, the mail will be delivered to every body of the same group as long as you keyed in a “group name @ mail server name” for the mail. Of course, you have to know the group’s name before doing so. Please select “Group Mail Domain” in “Mail” of the “Service” interface. Then a screen will appear as follows: 15 The range here can be on a basis of domain names or IP addresses. (Note: The rule fields of the system allow continuous entry of data, without any limitation on the space shown in the screen.) 6.6.7 Mail Queue The main function of Mail Queue is to display all mails waiting for sent (shown as follows). You can click “Delete all mail in queue” to delete all mails waiting in queue. 6.6.8 Mail Logging(SendMail) By clicking “Logging(SendMail)” of “Mail”, you can view whether the mail service is operating normally, whether there is a person delivering junk mails, or whether there are jammed mail boxes, so that you can take countermeasures in time, as shown in the figure below: 16 6.6.9 Mail Logging(Simple) By clicking “Mail Logging(Simple)” of “Mail”, you can view the mail service in simpler format, It include “From” , “To” , “ID” , “Size” and “Subject” as shown in the figure below: 6.6.10 Mail for root & sysop Managers After you finish configuring the system, “rootalias” will be set up automatically as a default account and there is no way to delete it. This account is mainly used to receive mails for sysop and root; in other words, whenever there are mails sent to the mailbox of sysop or root, the mails will be delivered to the rootalias account. Therefore the root and sysop managers are expected to use this account to receive mails. Please be kept in mind to periodically clean the mail for “rootalias”. The “System Logging” in “System” GUI will come up with message as “save email panic and reject anywhere” if mailbox for “rootalias” became full. But this would not interfere other mail operation of Maat system. 6.6.11 Mail Tools Every Maat user have requirement to change their owned password and other action on mailbox. They will connect to Maat home page through the URL as http:// Maat’ IP Address. The diagram show as below: 17 Click on “Mail Tool” button on the upper right side of screen. The Mail Tool management screen show as below: Change Password: It allows you to change user password. Mail Forward Setup: It allows you to set mail forwarding to another mail account. Mail Box Quota Check: It allows you to check status of mail quota. Clean Mail Box: It allows you to clean up mailbox content. 6.7 MRTG (Multi Router Traffic Grapher) Traffic Monitoring MRTG (Multi Router Traffic Grapher) – MRTG is the web traffic statistics software with high popularity. One of its features is that it can draw a web-traffic statistic chart at anytime. We can use MRTG retrieve the SNMP information from such network equipments as routers and switches, and thereby enable MRTG to generate traffic information. 6.7.1 MRTG Configuration To configure MRTG is quite easy. If you want to perform MRTG traffic monitoring on host, you only need to enter IP address. Remember to enable SNMP function. (Note: The 18 system default is “Enabled” SNMP. If not, please enable on “System Management” of “System Management Tool”.) Click on “MRTG” from “Service” to begin traffic monitoring, and then click on “Configure”. As shown in the figure below, full in IP address in the “MRTG Target” field, and then click on “MRTG Rebuild” to complete the configuration. (Note: Here the MRTG address stands for local host or other node needing traffic monitoring.) 6.7.2 MRTG Logging In essence, MRTG operates like a kind of simple network management software. It uses SNMP to detect (or query) the network equipments with SNMP you specified, and compile statistics the traffic of these equipments every five minutes, based on which a statistics graph is generated. The most fascinating feature of MRTG is that we can easily comprehend the actual web traffic from the statistics graph alone. Here you can see its exhaustive traffic graphs. Click on “Logging” from “MRTG”, you can see basic description of host system and a traffic chart. The chart shows only some representations. (If the network facility is only a NIC, you will see a chart representing the traffic on the NIC ) as shown in the figure below: 19 Click one of the traffic graphs above and then a screen will be shown as follows: The figure above displays MRTG traffic monitoring, which generate traffic graphs on a basis of days, weeks, months, and years. In addition, it separately presents a graph of Max In / Out, Average In / Out, and Current In / Out, offering administrators with referential data to conduct system tuning and improve network performance. 6.8 NAT NAT (Network Address Translation) allows you to define a virtual IP address in a private network whenever you need to do so, without the hassle of applying for a realistic one. Each PC in a private network communicates with each other via a private (i.e., virtual) IP address. When you want a private PC to communicate with the public Internet, you can use a NAT-enabled device (such as routers or the host itself) to translate the private IP address into a legal IP address (i.e., an officially applied IP address) to conduct communications. NAT can resolve most of the problems of moving private data 20 transparently across the Internet. 6.8.1 Configuration It is also very simple to configure NAT in this host. To start, please click “Service” and “NAT” from “System Management Tools”. Then click “Configurations” to configure which NIC is for the public network and whether to enable NAT and whether to log, and log directory、size and times as shown in the figure below: 6.8.2 Port Redirection Port Redirection function can redirected the packet externally connected to specified port number to specified host. This makes server for intranet available for external use. Also, it prevents server for intranet from direct exposure and attack from outside. Click “Redirec Port” from “NAT” as shown in the figure below: Click the “Insert New Rule” and input the detail information as shown in the figure below: 21 6.8.3 NAT Logging Click ”Logging” from “NAT”, then you can see the user records of NAT as shown in the figure below: 6.9 NetBios Services NetBios Services features to make all users using Windows operating system see and share local file services on My Network Places. 6.9.1 NetBios Configuration Click “Service” from “System Management Tool”, then click “Configure” from “NetBios Services”. You can configure the following item: Netbios Name: It’s the host name configuring from “Network Interface”. Comment: The “Comment” is not mandatory. Allow Hosts/Networks: It’s to designate the host or network that allow to access this 22 Maat file server. Netbios Interface: It’s to activate the network interface for file share function. Workgroup: It is the workgroup name that designate in Microsoft network environment. Share Printer: It allowed you to “Enable” or “Disable” the printer share function. Codepage: It’s to define the language code that you using in your nation. For example, in Japan area you will choose the “Japanese” to correctly show any file name that in Japanese word. 6.9.2 Volume Management Click on the “Volume Management” you will see as follow: Choose the Volume Name you going to configure. Here to choose “pub”. The screen show as below: 23 You are allowed to modify the parameter for specific volume. There is default value shown as above. 6.9.3 Connection Click “Connection” from “NetBios Services”; you can see the whole user connections established as shown in the figure below. They include “Volume Name”, “Machine”, “IP” and “Date”. 6.9.4 NetBios Logging Click “Logging” from “NetBios Services”; you can see if NetBios starts normally as shown in the figure below: 24 6.10 PostgreSQL PostgreSQL is a powerful object associated database containing many support capabilitites that are not provided by other databases. PostgreSQL features its support to various programming languages and provides commonly used accesses such as ODBC and JDBC. It also provides excellent support to Chinese. For the information of technical support, please refer to our official website: www.postgresql.org. 6.10.1 Database Admin This system provides a simple and easy-to-use database administration system phpPgAdmin. To create a new database, or select or insert views in the database or table, users need only to click their mice several times and enter the required name as shown in the following figure. 6.10.2 Server Access Admin This function is used to configure who may connect to PostgreSQL to use the database. To execute the configuration, select the database you want to configure and enter the address and netmask. You may then select trust to pass the configuration or select reject to block it in Authentication Mode. 25 6.11 MySQL The Maat supported MySQL database from release of v3.01. MySQL database is more friendly and simple for programmers even their functions are very similar to PostgreSQL. The programmers can use PHP script language and MySQL to build a database function of web page. Any further questions please refer to the URL: www.mysql.com. As the same as phpPgAdmin in PostgreSQL, The Maat also provided phpMyAdmin for MySQL database management. It is very simple and easy to create, select or insert the database table. Please refer to the following screen: 6.12 SSH SSH is a simple way to provided secure transmission of remote login session. It encrypted the command word and transmission data to prevent from any data monitoring. We are recommend you to use the SSH instead of Telnet to benefit the better security communication. 6.12.1 SSH Configuration Click “Configure” from “SSH” service. You have choice to select “Enable” or “Disable” the SSH function. (For security issue, we recommended you to “Enable” the SSH 26 function) 6.13 TELNET Telnet is a host, enabling login into remote-end host from near-end terminal (For example using Windows built-in telnet or other Terminal Freeware such as NetTerm or MultiTerm.) 6.13.1 TELNET Configuration Click “TELNET” from “System Management Tools”. After clicking “TELNET Configure” you can optionally choose to start this function or not (For safety consideration it is recommended to close this function.) As shown in the figure below: 6.14 Web Mail Open WebMail basically provides the same functions as other mail servers. The only difference is that it shows mails on web pages, which provides access flexibility for any location, any time and easy-use. No matter where users are, they need only browser at hand, then they can send and receive their own mail as they like. 27 6.14.1 Operation Procedure to enter Open WebMail Open browser directly to enter the system’s “hostname•domain” or “IP” in the web address column. Remember not to add “10000” and directly enter the system’s main screen. Click on “Web Mail” of “Service” , main screen of Web Mail appears as shown in Figure below: Here are basic instructions to use Open WebMail. If you want to configure or view other functions, you can click to login your User ID and password. As shown in the figure below: Click “Web Mail” from “Mail Tool” to enter the Open WebMail login screen. Use your user ID and password to login. If you are a new user or using the account for the first time, the following screen appears, indicating personal data and configurations are required. Click “Continue” to proceed. 28 6.14.2 User Preferences Now configure personal data and personalized settings: Click “Save” to save the configurations: After clicking “Continue”, you can enter the Open WebMail screen. Select the folder on the upper left to enter the desired working mailbox, and then use tool icons on the Tool Bar to continue operation. As shown in the figure below: 29 6.14.3 Compose Message Click on “Compose Message” icon (shown as the Figure above) on the upper left to display new Compose Window. Its usage is similar to other e-mail software. After composing a new mail, click “Send” below the screen. As shown in the figure below: 6.14.4 Check Mails Click “Refresh” icon to receive your new mails. Remember to go to “Inbox” to view the received mails. As shown in the figure below: 6.14.5 Delete Mails In any mailbox you only need to click on the checkbox on the right side of the mails, or 30 if you want to select all mails, click on “All”. Then click on “Move” to move these mails to “Trash” (at this time these mails are not really deleted yet.). Go to “Trash” to make sure you want to delete the mails, click on “Empty Trash” icon, you can delete these emails permanently. As shown in the figure below: 6.14.6 Address Book Click on “Address Book” icon, you will enter “Edit Address Book”. You can input data manually or import data. As shown in the figure below: In “Edit Address Book” you can see your personal address book. If you want to modify, you can click on name you want to modify. You can also import from exist file by click on “Import Addresses”. In Open WebMail the available formats are Outlook Express 5 and Netscape Mail 4.x. Noted that you should have files to be exported in Outlook Express 5 or Netscape Mail 4.x, then you can import to Open WebMail. As shown in the figure below: 31 6.14.7 Web Mail Configure Click “Configure” under “Web Mail” on “Service” of system management tool interface to set up language and domain name used on Open WebMail. The properties are automatically generated by the management interface when installing. Except to be used in modifying settings of DNS, normally they do not need to be modified. (Note: This is closely related to mail services mentioned above. If the mail services are not activated, you cannot receive and send web-based mails either. ) As shown in the figure below: 6.14.8 Web Mail Logging Click on “Web Mail” under “Service” from system management interface, and then click on “Logging”. You can view log file to analyze who the frequent users are and if there are any unauthorized users. 32 6.15 Web Service “Web Service” provides WWW Services. System presetting is “On”. If not activated, please click on “Service” on system management tool to change activation status. 6.15.1 Web Port Configure Click on “Configure” you are allowed to configure “Port Number” for the web traffic. The default number is “80”. 6.15.2 Web Service Logging Click on “Web Service” under “Service” of system management tool, and then click on ‘Logging” to view the use of web services, and to check if there is any abnormal accesses. 33 6.15.3 Place Homepage 1. Place System Homepage To place the finished homepage to Maat server, you must be administrator sysop, then you can use ftp to upload. For example, if the established web page is named index.htm(or index.html) and the host name is test.steptech.com.tw. Open a DOS Prompt (MS-DOS Mode) on Windows NT or Windows 9X. C:\> ftp test.steptech.com.tw User (test.steptech.com.tw:(none)): sysop Password: steptech ftp>put index.htm /www/data/index.htm ftp>bye C:\> Note: The preset homepage name is index.htm or index.html for the host. 2. Place Personal Homepage Supposed the personal user name is marx1976 and the host name is test.steptech.com.tw. Open a DOS Prompt (MS-DOS Mode) on Windows NT or Windows 9X. C:\> ftp test.steptech.com.tw User (test.steptech.com.tw:(none)): marx1976 Password: xxx ftp>put index.htm /www/index.htm 34 ftp>bye C:\> Note: The preset homepage name is index.htm or index.html for the host. In addition to using standard ftp command mode to upload web pages, you can also make use of various FTP package available on the market to meet your need and to upload more easily and quickly. 3. Show Web Page We can enter “http://your host name” in browser web address column, then we can see your system main pages. For each user’s personal main page, enter “http://your host/~user account/”; for example, the preset location of main page is http://test.steptech.com.tw and user web page is “http://test.steptech.com.tw/~marx1976/”. 4. Supplement ▲ System main page location is under /home/www/data/. location is placed under users’ personal directory www. Each user’s web page ▲ When using ftp to upload, enter different account and password, the system will switch automatically to correct directory to avoid unnecessary troubles. 35 Chapter 7 Firewall Maat system provided packet filter function for user to filter specific traffics. It allows user to define firewall rules by IP, port, protocol and direction of packet. This firewall function provided user a basic security infrastructure. Please click on “Configure” of “Firewall”. The diagram show as below: Click on “Enable” to activate the firewall function. 7.1 Allow Port Configure Maat system allows user to define their firewall rule depend on port, protocol (TCP or UDP) and direction of packet (Input or Output). System has pre-defined port number and protocol into the configuration table. User can click on desired item to enable (or disable) required configuration. Please click on “Config Allow Port”, the table show as below: 36 7.2 Deny IP Configure System allows user to deny single or multiple IP connections. User can input rules by IP address, Domain Name or Network. For example: 192.168.2.10, 172.16.0.0/16 or www.hinet.net. The input field will automatic expand without limitation. Please click on “Config Deny IP” the diagram show as below: 37 Chapter 8 Timefinder Timefinder is mainly used to backup and recover system data files. As for user data (such as homepage and mails) tape driver and disk array are needed to provide protection. The focus of host system design is an Internet Server, not a File Server. So the major function of Timefinder is to protect system’s data files. Timefinder features four main operations. The functions are divided into backup and recovery as shown in the Figure below: Among them, “Timefinder from Browser” enables users to automatically upload data (browserÆ host)after clicking, especially when using uploaded function of browser. If you have any difficulty when operating Timefinder, it is mostly because MIME of your current browser is modified. Please reinstall browser. Usually when you modified system settings or used management interface to change various functions and tested, you need to backup your Timefinder. If you are still at testing period, please do not backup the system data; otherwise the system will be unstable. That is why Timefinder did not activate automatic backup. Timerfinder needs 200-300K to backup, Though the space is not considerably large, backup can include the settings of the whole system (except homepage and mail) and automatically keep ten times. The old ones will be automatically deleted when the system is restarted next time. Timefinder’s recovery function can not only recover the system settings, but also correct user directory with kernel (in case that accounts of system password files exceeded the number stored in current hard disk). Also it can correct the causes resulting in shutdown of system, such as /tmp、/var、/lost+found.(Note: The function enhancement of Maat kernel is finished. But these are not the original kernel functions for FreeBSD.) 38 The following operations are quite easy. Flow chart and figures are provided to help users understand. 8.1 Backup to Host Select “To Host” on “Timefinder” of management interface, as shown in the figure below: Click “OK” to complete backup. 8.2 Backup and Download Select “To browser” on “Timefinder” of management interface, as shown in the figure below: You can change directory and name and click “Save”. 39 Click “Save” as shown below: Now “Backup to Current Computer” is completed. Please remember the saved directory and file names for next restore. 8.3 Timefinder from Host Select “From Host” on “Timefinder” of management interface, as shown in the figure below: 40 Click on the time you want to restore and click ” Submit”. This means “Timefinder from Host” is completed. The system will be rebooted and restored to your selected time point. 8.4 Timefinder from Browser When you select “From Browser” from “Timefinder” as shown in the Figure below: Click “Browse”, the Figure below appears. Select restored file as shown in the Figure below: 41 Click ” Submit” to begin restoring files. When it has finished, the system will reboot. 42 CHAPTER 9 Online Help In this version of Maat is capable to support Online Help function. User just click on “Online Help” in left side of the GUI screen. The user manual’s text will pop on as shown as picture below: Click on the text will link to the section that you required. If you finished to view the Online Help just close the screen box. If any further questions please contact with your local representatives for technical support. 43 WARNING: FCC Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiated radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -Reorient or relocate the receiving antenna. -Increase the separation between the equipment and receiver. -Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -Consult the dealer or an experienced radio/TV technician for help. Changes or modifications not expressly approved by the party responsible for compliance could void the user‘s authority to operate the equipment. This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches) during normal operation. The antenna(s) used for this transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 44
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No Create Date : 2003:10:27 10:55:48+08:00 Modify Date : 2003:10:27 10:55:48+08:00 Page Count : 44 Creation Date : 2003:10:27 02:55:48Z Mod Date : 2003:10:27 02:55:48Z Producer : Acrobat Distiller 5.0.5 (Windows) Metadata Date : 2003:10:27 02:55:48ZEXIF Metadata provided by EXIF.tools