IT Products and Systems
- Integrated Systems
- Client Computing Devices
- Peripheral Devices
- Product Support Services
PRIMEQUEST ManageMent Board (MMB) manages the entire server. With dedicated CPUs and memory, the MMB can provide server control functions even if the server fails. The independent monitoring and integrated Web-based GUI helps control the server from a remote site.
* Please notice MMB based administration is only available for PRIMEQUEST 1800E. For monitoring PRIMEQUEST 1800E2, you need to install Server View Operating Manager.
PRIMEQUEST 1800E MMB based administration include:
The above functions are enabled by MMB inter-working with the system board management agent: PRIMEQUEST 1800E Server Agent (PSA). The PSA resides in each partition and manages server resources such as CPUs, memory, and I/O.
MMB can be redundantly configured by addition of a second MMB.
PRIMEQUEST 1800E can also be integrated with 3rd party system management products by defining SNMP Traps in the corresponding software configuration.
Even from a remote site, you can access each PRIMEQUEST 1800E partition.
BIOS view is also visible from the PC screen.
PRIMEQUEST 1800E has a solid security system. External communications can be encrypted. Even if a user account is stolen, the danger can be minimized. If someone tries to exploit the stolen account, any malicious actions can be prevented. Three major security features ensure such safe administration.
|1||Security of communications|
|All data transmitted to/from administrators is rigorously encrypted. Secured Socket Layer (SSL) is used for https communication. Secured SHell (SSH) is used to encrypt data for shell script execution.
|2||Minimization of allowable operations|
|There are three types of system resource actions.
- Viewing system status or configuration
- Activating or deactivating system resources. Starting or stopping system services
- Modifying system configurations
Administrators need only the first and second items. The 3rd item is not required. So, privileges such as Operator and Partition Operator, which administrators commonly use, do not include a privilege for system configuration changes.
This proper separation of privileges minimizes risk of malicious modification of system configurations. All the operations for the 3rd type can be executable only by privileged administrators.
|3||IP address restriction|
|Even the worst possible case is countermeasure protected.
If privileged administrator account information is stolen, it is still possible to prevent malicious actions by making sufficient preparation -- in particular, restrict accessible IP addresses to MMB view.
This makes it practically impossible to steal such an IP address. Even if the intruder knew it, they could not change the IP address of their PC.
Dela med andra