
CONTENTS CONTENTS
8 Protecting web access via SSL 22
8.1 Installing a certificate ........................................... 22
8.1.1 Creating a new certificate and having it signed ........................ 22
8.1.2 Creating a new certificate and signing it yourself ...................... 23
8.1.3 Uploading existing certificate ................................... 24
8.2 Configuring access types ......................................... 24
8.3 Displaying current configuration/certificates ............................. 25
9 Device control 26
9.1 Restarting / Shutting down ........................................ 26
9.2 Switching on device via Wake-on-LAN ................................. 27
9.3 Restoring factory configuration ..................................... 28
10Backup 29
10.1Automatic backup .............................................. 29
10.2Configuring the backup .......................................... 29
10.3Backup format ................................................ 31
10.4Encryption .................................................. 31
10.5Compression ................................................. 32
10.6Recovery ................................................... 33
10.6.1Disaster recovery .......................................... 34
10.7Monitoring .................................................. 34
10.8Special features with clusters ...................................... 34
11Mounting network file systems 35
11.1Mounting a network file system ..................................... 35
12Failover cluster 37
12.1Prerequisites ................................................. 37
12.2Migration of existing installations .................................... 38
12.3Configuration of the cluster ........................................ 38
12.3.1Network configuration ....................................... 38
12.3.2Host names .............................................. 42
12.3.3Connecting the cluster ....................................... 42
12.4The state of the cluster .......................................... 44
12.5Special cases in the cluster ........................................ 45
12.5.1Access to resources ......................................... 45
12.5.2Device settings ........................................... 46
12.5.3IP addresses or host names of the nodes ............................ 46
12.5.4Administrating Check_MK versions and monitoring instances ............... 46
©Copyright Mathias Kettner GmbH 2018 mathias-kettner.de