Dell PowerEdge M915 릴리스 정보 - 페이지 9

{카테고리_이름} Dell PowerEdge M915에 대한 릴리스 정보을 온라인으로 검색하거나 PDF를 다운로드하세요. Dell PowerEdge M915 27 페이지. Dell poweredge blade servers getting started guide
Dell PowerEdge M915에 대해서도 마찬가지입니다: 매뉴얼 (25 페이지), 사용자 설명서 (23 페이지), 중요 정보 매뉴얼 (35 페이지), 시작하기 매뉴얼 (12 페이지), 시작하기 매뉴얼 (12 페이지), 소유자 매뉴얼 (3 페이지), 포트폴리오 매뉴얼 (27 페이지), 시작하기 매뉴얼 (14 페이지), 시작하기 매뉴얼 (12 페이지)

Dell PowerEdge M915 릴리스 정보
PowerConnect M6220/M6348/8024/8024F/M8024/M8024-k/
7024/7048/7024P/7048P/7024F/7048R/7048R-RA Release Notes
 Management IP Address Conflict Detection
Management IP address conflict detection actively looks for duplicate IP address assignment and logs conflicts. Only
the last identified IPv4 address conflict is retained for display by a show command. Administrators may examine the
in- memory logs or the output from a SYSLOG server to identify the historical IP address conflicts. If console logging
is enabled for traps, a message will appear on the console indicating that an address conflict has occurred.
 Email Alerting
Email alerting allows administrators to be notified regarding system events. Multiple email addresses can be
configured. The system will attempt to resolve mail servers specified with a DNS FQDN immediately and, if
successful, store the mail-server as an IP address. If a new IP address is subsequently assigned to the mail server, the
operator will need to re-assign the email address on the switch.
Only the Mail User Agent functionality of RFC 4409 is implemented. The PowerConnect switch does not implement
SMTP server functionality.
 802.1x Monitor Mode
Monitor mode is a special debug mode that assists network administrators in configuring new authentication servers.
Users attempting to authenticate using the authentication server are always granted access when monitor mode is
enabled. All interactions with the supplicant and the authentication server are logged.
Administrators are cautioned against enabling monitor mode in a deployed network where 802.1x users may gain
access to sensitive network resources.
 Time Controlled ACLs
Time controlled ACLs allow administrators to apply ACLs based on the time of day. Both periodic and absolute time
periods may be configured.
Administrators are cautioned that invalid (overlapping) periodic entries within a time range will cause the time range to
not be applied. Administrators are advised to test their periodic entries and validate that they become active as expected
before deploying the time ranges in a production network. Administrators can check if a time range is active by using
the show time-range command.
It is recommended to enable ACL logging to ensure notice of ACL activation and de-activation.
 SNTP over IPv6
SNTP operates over IPv4 and IPv6 and may be configured using IPv4 or IPv6 addresses or DNS.
 Strong Passwords
The strong passwords feature allows administrators to specify that switch administrator passwords meet certain
characteristics considered to enhance network security.
Administrators are advised that the minimum character classes configuration must be enabled (value equal to 1 or
greater) along with enabling the strong password feature before the other minimum character class configurations are
enforced. These character class configuration are:
Minimum number of uppercase letters.
Minimum number of lowercase letters.
Minimum number of numeric characters.
Minimum number of special characters
The password strength restrictions do not apply to users configured for the internal authentication server.
System Firmware Version 4.1.0.6
Page 7