unlocking the computer’s keylock) and change a jumper set- ting to temporarily disable the user password feature (see “Disabling a Forgotten Password” found later in this section). Note that you erase the supervisor password at the same time.

CAUTION: If you leave your system running and unattended, anyone can access the data stored in your system even with a user password assigned. To protect your system while it is running, you must use additional forms of protection, such as screensaver software protected by a password.

CAUTION: With the password features disabled, your system operates as if it did not contain pass- word features. If you leave your system running and unattended without having a system and/or supervisor password assigned or with the pass- word features disabled, anyone can assign a system and/or supervisor password that will be unknown to you.

NOTE: The system allows you three attempts to enter a password. After three failed attempts, the keyboard locks up and you must reboot the system before you can try entering a password again.

Assigning a User Password

NOTE: You cannot assign a user password until a super- visor password has been set.

When in the Set User Password category, you can press <Enter> to display a dialog box in which you can enter a user password. You can use up to seven alphanumeric characters in a password, and the password is not case sensitive (meaning that there is no difference between uppercase and lowercase characters).

When a user password is set, the status shown in the User Password Is category is Enabled.

With no user password assigned and with a jumper plug installed on the password jumper (PASSWD) on the sys- tem board (its default setting), the status shown in the User Password category is set to Disabled.

Keep the following tips in mind when setting your password:

You can use up to seven alphanumeric characters in your password (passwords are not case sensitive).

As you press each character key (or the <Spacebar> for a blank space), a placeholder appears in the field.

To erase a character when entering your password, press the <Backspace> key or the left-arrow key.

NOTES: The password assignment operation recognizes keys by their location on the keyboard, without distin- guishing between lowercase and uppercase characters. For example, if you have an M in your password, the system recognizes either M or m as correct.

Certain key combinations are not valid. If you enter one of these combinations, a beep sounds.

To exit the field without assigning a user password, press the up-arrow or down-arrow key to move the highlight to another field, or press the <Esc> key at any time before set- ting a new password.

Using Your User Password to Secure Your System

Each time you turn on your system, reboot the system, or press the reset button, the following prompt appears on the screen:

Enter password:

After you enter the correct user password and press <Enter>, your system boots and you can use the keyboard to operate your system as usual.

If a wrong or incomplete password is entered, the follow- ing message appears on the screen:

Warning, Invalid password.

Press <Enter> to continue

Enter the password again. If an incorrect or incomplete user password is entered again, the same message appears on the screen.

The third time an incorrect or incomplete password is entered, the keyboard locks up and displays the following message:

SYSTEM DISABLED

4-54 Dell PowerEdge 2100/180 and 2100/200 Systems User’s Guide

Page 54
Image 54
Dell 2100/180, 2100/200 manual Assigning a User Password, Using Your User Password to Secure Your System

2100/180, 2100/200 specifications

The Dell 2100/200 and Dell 2100/180 are innovative offerings from Dell that cater to the demands of a variety of users, ranging from small businesses to larger enterprises. Both models are designed to deliver high performance and reliability, making them indispensable tools in the modern computing environment.

The Dell 2100/200 features an impressive Intel processor that ensures fast and efficient performance, making it suitable for multitasking and handling complex applications. Coupled with a generous RAM configuration, this model can easily manage demanding workloads, resulting in smoother performance and faster processing times. In contrast, the Dell 2100/180, while slightly less powerful, still maintains robust performance levels that are well-suited for general productivity tasks and everyday use.

Both models come equipped with ample storage options, featuring hard disk drives that provide significant space for data and application storage. Users can choose between traditional HDDs and solid-state drives (SSDs), allowing them to prioritize speed and performance based on their specific needs. The flexibility in storage options ensures that users can customize their systems according to their requirements, enhancing the overall user experience.

Connectivity is another area where the Dell 2100 series excels. Both models come with a range of ports including USB, HDMI, and Ethernet, allowing for seamless connectivity with various peripherals and networks. This versatility makes the machines ideal for environments where multiple devices need to be connected simultaneously, whether for presentations, data transfer, or internet access.

In terms of energy efficiency, both the Dell 2100/200 and Dell 2100/180 incorporate advanced cooling technologies that minimize energy consumption while maximizing performance. This not only helps reduce operational costs but also contributes to a more sustainable computing environment.

The design of these models is another distinguishing feature. With a compact form factor, they fit easily into office spaces while maintaining a professional appearance. Their durable build quality ensures longevity, making them a worthwhile investment for businesses.

Overall, the Dell 2100/200 and Dell 2100/180 serve as powerful and reliable machines that combine advanced technologies and user-centric designs. Whether for business or personal use, these models provide a solid foundation for effective computing, ensuring that users can achieve their goals efficiently and effectively.