1-26 System Overview

Summary of Software Security Features

The table below lists the software security features and describes what protection each offers. In general, to enable or set the features listed here, you must run the BIOS Setup and go to the Security Subsystem Group, menu. The table also refers to the Setup utility.

 

Software Security Features

 

 

Feature

Description

Secure mode

How to enter secure mode:

 

Setting and enabling passwords automatically places the system in

 

secure mode.

 

If you set a hot-key combination (through Setup), you can secure the

 

system simply by pressing the key combination. This means you do not

 

have to wait for the inactivity time-out period.

 

When the system is in secure mode:

 

The server can boot and run the operating system, but mouse and

 

keyboard input is not accepted until the user password is entered.

 

At boot time, if a CD is detected in the CD-ROM drive or a diskette in

 

drive A, the system prompts for a password. When the password is

 

entered, the server boots from CD or diskette and disables the secure

 

mode.

 

If there is no CD in the CD-ROM drive or diskette in drive A, the server

 

boots from drive C and automatically goes into secure mode. All enabled

 

secure mode features go into effect at boot time.

 

To leave secure mode: Enter the correct password(s).

 

 

Disable writing to

In secure mode, the server will not boot from or write to a diskette unless

diskette

a password is entered.

 

To write protect access to diskette whether the server is in secure mode

 

or not, use the Setup main menu, Floppy Options, and specify Floppy

 

Access as read only.

Set a time out

Specify and enable an inactivity time out period of from 1 to 120 minutes.

period so that

If no keyboard or mouse action occurs for the specified period, attempted

keyboard and

keyboard and mouse input will not be accepted.

mouse input are not

The monitor display will go blank, and the diskette drive will be write

accepted.

protected (if these security features are enabled through Setup).

Also, screen can be

To resume activity: Enter the correct password(s).

blanked, and writes

to diskette can be

 

inhibited

 

Control access to

To control access to setting or changing the system configuration, set a

using the BIOS

supervisor password and enable it through Setup.

Setup: set

If both the supervisor and user passwords are enabled, either can be

supervisor

used to boot the server or enable the keyboard and/or mouse, but only

password

the supervisor password will allow Setup to be changed.

 

 

To disable a password, change it to a blank entry or press CTRL-D in the

 

Change Password menu of the Supervisor Password Option menu found

 

in the Security Subsystem Group.

 

To clear the password if you cannot access Setup, change the Clear

 

Password jumper (see Chapter 3).

 

 

Page 40
Image 40
NEC 5800 manual Software Security Features, Feature Description

5800 specifications

The NEC 5800 series is a line of highly regarded enterprise servers that have made a significant impact in the data center landscape. Known for their robustness, scalability, and efficient performance, these servers are designed to meet the growing needs of businesses across various sectors. The NEC 5800 series incorporates a range of cutting-edge technologies and features that cater to both high-performance computing and data-intensive applications.

One of the standout features of the NEC 5800 is its modular design. This architecture allows organizations to customize their server configurations according to specific requirements, making it a versatile choice for a diverse range of workloads. The scalability provided by the NEC 5800 enables businesses to expand their operations easily, whether through adding additional resources or integrating new technologies as demands evolve.

The NEC 5800 series utilizes advanced Intel Xeon processors, delivering exceptional computing power and multitasking capabilities. This ensures that mission-critical applications operate seamlessly, even under heavy workloads. Additionally, the integration of large memory capacities allows for efficient processing of big data analytics and virtualization, enabling businesses to harness the full potential of their data assets.

Another notable characteristic of the NEC 5800 series is its energy efficiency. With rising concerns about power consumption and operational costs, NEC has incorporated green technologies within their servers. The series features power-saving components and intelligent cooling systems that optimize energy usage, providing significant cost savings over time while minimizing environmental impact.

In terms of reliability, the NEC 5800 series comes equipped with a comprehensive set of features aimed at maintaining uptime and data integrity. This includes advanced RAID configurations, redundant power supplies, and hot-swappable components that allow for maintenance without downtime. Such features are critical for organizations that require continuous access to their applications and data.

Security is another essential aspect of the NEC 5800 series. It incorporates various security measures, including hardware-based authentication and encryption, to protect sensitive information. With the increasing number of cyber threats, these security features ensure that organizations can operate confidently without compromising their data integrity.

In conclusion, the NEC 5800 serves as a testament to NEC's commitment to delivering high-performance, reliable, and secure server solutions tailored to meet the demands of modern businesses. With its blend of scalability, energy efficiency, and robust security, it continues to be a preferred choice for enterprises aiming to leverage technology for growth and innovation.