
CONTENTS CONTENTS
9 Protecting web access via SSL 23
9.1 Installing a certificate ........................................... 23
9.1.1 Creating a new certificate and having it signed ........................ 23
9.1.2 Creating a new certificate and signing it yourself ...................... 24
9.1.3 Uploading existing certificate ................................... 25
9.2 Configuring access types ......................................... 25
9.3 Displaying current configuration/certificates ............................. 26
10Device control 27
10.1Restarting / Shutting down ........................................ 27
10.2Switching on device via Wake-on-LAN ................................. 28
10.3Restoring factory configuration ..................................... 28
11Backup 30
11.1Automatic backup .............................................. 30
11.2Configuring the backup .......................................... 30
11.3Backup format ................................................ 32
11.4Encryption .................................................. 32
11.5Compression ................................................. 33
11.6Recovery ................................................... 34
11.6.1Disaster recovery .......................................... 35
11.7Monitoring .................................................. 35
11.8Special features with clusters ...................................... 35
12Mounting network file systems 36
12.1Mounting a network file system ..................................... 36
13Failover cluster 38
13.1Prerequisites ................................................. 38
13.2Migration of existing installations .................................... 39
13.3Configuration of the cluster ........................................ 39
13.3.1Network configuration ....................................... 39
13.3.2Host names .............................................. 43
13.3.3Connecting the cluster ....................................... 43
13.4The state of the cluster .......................................... 45
13.5Special cases in the cluster ........................................ 46
13.5.1Access to resources ......................................... 46
13.5.2Device settings ........................................... 47
13.5.3IP addresses or host names of the nodes ............................ 47
13.5.4Administrating Check_MK versions and monitoring instances ............... 47
©Copyright Mathias Kettner GmbH 2018 mathias-kettner.de