Select Page

How to launch the administrative interface in your StoneFly Storage Concentrator

This is the introductory article in the StoneFly Storage Concentrator™ Series. The series is meant to help users understand the process of deploying different features of StoneFly’s virtual storage solution SCVM™ (Storage Concentrator Virtual Machine).

This article intends to help users launch the StoneFly Storage Concentrator™’s administrative interface .

The StoneFly Storage Concentrator™ appliance software provides the interface through which a system administrator can configure and monitor different parts of their system operation like: 

The subsequent articles in the Stonefly Storage Concentrator Series will discuss each part or segment of GUI step by step. This introductory article will cover how users can launch the administrative interface in their StoneFly Storage Concentrator.

To begin, it is important to notice that the administrative interface resides on the Storage Concentrator. It is run from a network computer via a browser that can access the network where the Storage Concentrator is located.

Supported browsers include:

  • Netscape 4.7 or later (Windows PC and Linux)
  • Internet Explorer 5.0 or later (Windows PC only)
  • Mozilla Firefox

To access the administrative interface, follow the steps below:

  1. Launch your web browser.
  2. Type the IP address for the Management Port of the Storage Concentrator in the address field of the browser. For more information, refer to the Setup Guide, “Configuring the Network Settings.”

Note : The address field in the browser must include https:// to access the administrative interface.

The following login screen should appear : 

How to launch the administrative interface in your StoneFly Storage Concentrator

Accessing System Management Functions

To perform system management functions, you must log in with a user ID and password that is configured with administrative privileges.

Passwords must be between 6 to 15 alphanumeric characters long and contain at least one number. Passwords cannot be the same as the corresponding username. StoneFly only validates the first eight characters during login. Characters after 8 are ignored, but supported for user convenience. For more information on creating users, please refer to:  “Adding Users”

When logging in for the first time, the administrator can use the following: User ID: stonefly. Password: stonefly. It is strongly recommended that the stonefly password be changed at the initial configuration. It is also recommended that each system administrator have an individual user ID and password. For more information on designing user logins, please refer to  “Adding Users”.

1 Enter your User ID

2 Enter your Password

3 Press Enter or click Submit. The Storage Concentrator home screen should appear.

If you attempt to log in with an administrator user ID and password that are already in use, a warning message dialog box will appear.

How to launch the administrative interface in your StoneFly Storage Concentrator

If this screen appears, choose one of the following options:

1. Click OK – This logs you in and logs off the user who is logged in with the same user ID and password you entered.

2. Click Cancel – The initial login screen appears. Repeat steps 1-3 using a different user ID and password.

And with that you have successfully launched the administrative interface for the Stonefly Storage Concentrator. The next article will cover the GUI’s home page and images as well as the Master Storage Concentrator’s menu.

If you have any lingering questions, don’t hesitate to our storage experts and request for their assistance. 

8Base Ransomware: Detection, Prevention, and Mitigation

8Base Ransomware: Detection, Prevention, and Mitigation

8Base ransomware is a rapidly growing cyber threat targeting businesses across various sectors. Known for its sophisticated tactics and double extortion model, it encrypts critical data and steals sensitive information, demanding ransom for both. As the risk of 8Base...

Inside Rhysida Ransomware: Infiltration, Impact, and Prevention

Inside Rhysida Ransomware: Infiltration, Impact, and Prevention

Rhysida ransomware is a dangerous cyber threat that has been disrupting organizations since May 2023. Known for its double extortion tactics, Rhysida encrypts files and exfiltrates sensitive data, pressuring victims to pay or face public exposure. It infiltrates...

Turla Ransomware: Comprehensive Analysis of the Russian APT

Turla Ransomware: Comprehensive Analysis of the Russian APT

Turla ransomware is a sophisticated cyber threat known for its stealthy operations and advanced infiltration techniques. Leveraging custom malware, zero-day vulnerabilities, and highly targeted attacks, Turla poses a significant risk to corporate networks across...

What is Black Basta Ransomware and How to Defend Against it

What is Black Basta Ransomware and How to Defend Against it

Black Basta, a sophisticated ransomware group, has become a major threat to organizations globally, targeting industries ranging from healthcare to financial services. Known for using double-extortion tactics, Black Basta not only encrypts critical data but also...

S3 Object Storage Cost Comparison: Cloud vs Data Center

S3 Object Storage Cost Comparison: Cloud vs Data Center

S3 object storage cost comparisons between public cloud options and private data centers reveal crucial differences in long-term expenses and scalability. Public cloud providers offer readily available infrastructure and flexibility, but data storage and retrieval...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email