Select Page

How to launch the administrative interface in your StoneFly Storage Concentrator

This is the introductory article in the StoneFly Storage Concentrator™ Series. The series is meant to help users understand the process of deploying different features of StoneFly’s virtual storage solution SCVM™ (Storage Concentrator Virtual Machine).

This article intends to help users launch the StoneFly Storage Concentrator™’s administrative interface .

The StoneFly Storage Concentrator™ appliance software provides the interface through which a system administrator can configure and monitor different parts of their system operation like: 

The subsequent articles in the Stonefly Storage Concentrator Series will discuss each part or segment of GUI step by step. This introductory article will cover how users can launch the administrative interface in their StoneFly Storage Concentrator.

To begin, it is important to notice that the administrative interface resides on the Storage Concentrator. It is run from a network computer via a browser that can access the network where the Storage Concentrator is located.

Supported browsers include:

  • Netscape 4.7 or later (Windows PC and Linux)
  • Internet Explorer 5.0 or later (Windows PC only)
  • Mozilla Firefox

To access the administrative interface, follow the steps below:

  1. Launch your web browser.
  2. Type the IP address for the Management Port of the Storage Concentrator in the address field of the browser. For more information, refer to the Setup Guide, “Configuring the Network Settings.”

Note : The address field in the browser must include https:// to access the administrative interface.

The following login screen should appear : 

How to launch the administrative interface in your StoneFly Storage Concentrator

Accessing System Management Functions

To perform system management functions, you must log in with a user ID and password that is configured with administrative privileges.

Passwords must be between 6 to 15 alphanumeric characters long and contain at least one number. Passwords cannot be the same as the corresponding username. StoneFly only validates the first eight characters during login. Characters after 8 are ignored, but supported for user convenience. For more information on creating users, please refer to:  “Adding Users”

When logging in for the first time, the administrator can use the following: User ID: stonefly. Password: stonefly. It is strongly recommended that the stonefly password be changed at the initial configuration. It is also recommended that each system administrator have an individual user ID and password. For more information on designing user logins, please refer to  “Adding Users”.

1 Enter your User ID

2 Enter your Password

3 Press Enter or click Submit. The Storage Concentrator home screen should appear.

If you attempt to log in with an administrator user ID and password that are already in use, a warning message dialog box will appear.

How to launch the administrative interface in your StoneFly Storage Concentrator

If this screen appears, choose one of the following options:

1. Click OK – This logs you in and logs off the user who is logged in with the same user ID and password you entered.

2. Click Cancel – The initial login screen appears. Repeat steps 1-3 using a different user ID and password.

And with that you have successfully launched the administrative interface for the Stonefly Storage Concentrator. The next article will cover the GUI’s home page and images as well as the Master Storage Concentrator’s menu.

If you have any lingering questions, don’t hesitate to our storage experts and request for their assistance. 

Conti Ransomware: In-Depth Technical Breakdown

Conti Ransomware: In-Depth Technical Breakdown

Conti ransomware has earned notoriety, notably for its involvement in the Costa Rican government hack. Operating as a ransomware-as-a-service (RaaS) group, Conti specializes in infiltrating networks, encrypting crucial data, and extorting exorbitant sums of money. In...

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply chain attacks have emerged as a formidable threat vector in the landscape of cybercrime, posing significant risks to enterprises of all sizes and industries. Among the various tactics employed by threat actors, ransomware attacks leveraging supply chain...

How to Set Up S3 Object Storage for Veeam Data Platform

How to Set Up S3 Object Storage for Veeam Data Platform

Veeam v12 introduced Direct-to-Object storage, enabling S3 object storage as the primary backup repository. Prior to this, S3 object storage integration relied on Veeam's Scale-Out Backup Repository (SOBR), using a performance tier and a capacity tier, which extended...

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering hole attacks, akin to their namesake in the natural world where predators strategically position themselves near watering holes to intercept prey, have become a significant peril in the digital realm. In the vast landscape of cybersecurity, understanding the...

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

In the fast-paced arena of enterprise-level digital operations, the looming threat of cyber vulnerabilities demands our undivided attention. Among these threats, the Man-in-the-Middle (MitM) attack emerges as a silent, yet formidable, adversary capable of infiltrating...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email