Fujitsu M8000 Home Theater Server User Manual


 
3-4 SPARC Enterprise M8000/M9000 Servers Overview Guide December 2010
3.2.1.2 Browser-Based User Interface (XSCF Web)
XSCF Web is a browser-based user interface that can be used from a terminal, such
as a personal computer or workstation, connected to the server through an Ethernet
connection.
However, the XSCF Web cannot be used through a serial connection. If the browser
function of a terminal is used for a connection to the XSCF, BUI operations can be
performed.
3.2.2 XSCF Functional Overview
This section provides an overview of the main functions supported by the XSCF.
For details on each function, see the SPARC Enterprise
M3000/M4000/M5000/M8000/M9000 Servers XSCF User’s Guide.
3.2.2.1 System Management
The main tasks of the XSCF are control and monitoring of the entire system, such as
configuration management and monitoring of the server’s cooling components (FAN
units), domain status monitoring, power-on and power-off of peripheral units, and
error monitoring. Also, the XSCF provides a partitioning function for domain
configuration and management.
The XSCF constantly monitors the server status so that the system can operate stably.
When any error is detected in the system, the system status monitoring mechanism
immediately collects error information about the hardware (hardware log) and
analyzes it to identify the error location and check the error status. The XSCF
displays the status, and it degrades the relevant component or domain as necessary
or it resets the system, thereby preventing the error from occurring again.
The XSCF provides high reliability, high availability, and high serviceability for the
entire system.
3.2.2.2 Security Management
The XSCF manages user accounts for the XSCF. The operating range in the XSCF
Shell and XSCF Web can be limited based on user account types and settings.
Moreover, the XSCF provides an IP address filtering function for permitting access to
the XSCF and an encryption function using SSH and SSL. Operator errors and
unauthorized access during system operation are recorded in a log. The system
administrator can use these functions to investigate the cause of a system problem.