M86 Security 350 User manual

M86 Web Filter and Reporter
INSTALLATION GUIDE
Models: 350, 550
Software Version: 2.0.10
Document Version: 06.22.10

II M86 SECURITY INSTALLATION GUIDE
M86 WEB FILTER AND REPORTER INSTALLATION GUIDE
FOR 350, 550 MODELS
© 2010 M86 Security
All rights reserved. Printed in the United States of America
Local: 714.282.6111 • Domestic U.S.: 1.888.786.7999 • International: +1.714.282.6111
This document may not, in whole or in part, be copied, photocopied, reproduced, trans-
lated, or reduced to any electronic medium or machine readable form without prior writ-
ten consent from M86 Security.
Every effort has been made to ensure the accuracy of this document. However, M86
Security makes no warranties with respect to this documentation and disclaims any
implied warranties of merchantability and fitness for a particular purpose. M86 Security
shall not be liable for any error or for incidental or consequential damages in connec-
tion with the furnishing, performance, or use of this manual or the examples herein.
Due to future enhancements and modifications of this product, the information
described in this documentation is subject to change without notice.
Trademarks
Other product names mentioned in this manual may be trademarks or registered trade-
marks of their respective companies and are the sole property of their respective man-
ufacturers.
Part# WFR-IG-100622

M86 SECURITY INSTALLATION GUIDE III
CONTENTS
M86 WFR A
PPLIANCE
I
NTRODUCTION
.............................................................1
About this Document...................................................................................................... 2
Conventions Used in this Document. ........................................................................... 2
S
ERVICE
I
NFORMATION
....................................................................................3
M86 Security Corporate Headquarters (USA)............................................................... 3
M86 Security Taiwan....................................................................................................... 3
Procedures. .....................................................................................................................3
P
RELIMINARY
S
ETUP
P
ROCEDURES
.................................................................4
Unpack the Unit from the Carton................................................................................... 4
Select a Site for the Server............................................................................................. 5
300 Series Server Setup Procedures .......................................................................................5
Set Top Applications ..........................................................................................................5
Optional 1U 2-Unit Tray Kit Applications ........................................................................... 5
Rack Mount the Server. .................................................................................................. 6
Rack Setup Precautions ...........................................................................................................6
Rack Mount Instructions for 500 Series Servers ......................................................................7
Rack Setup Suggestions ................................................................................................... 7
Install the Inner Slides .......................................................................................................7
Install the Outer Slides ......................................................................................................7
Install the Slide Assemblies to the Rack ............................................................................8
Install the Chassis into the Rack . ......................................................................................9
Install the Bezel on the 500 Series Chassis ........................................................................... 10
Check the Power Supply. ............................................................................................. 11
Power Supply Precautions .....................................................................................................11
General Safety Information. ......................................................................................... 12
Server Operation and Maintenance Precautions ................................................................... 12
AC Power Cord and Cable Precautions .................................................................................13
Electrical Safety Precautions .................................................................................................13
Motherboard Battery Precautions .......................................................................................... 14
I
NSTALL
THE
S
ERVER
....................................................................................15
Step 1: Setup Procedures. ........................................................................................... 15
Quick Start Setup Requirements ............................................................................................ 15
LCD Panel Setup Requirements ............................................................................................15
Step 1A: Quick Start Setup Procedures...................................................................... 16
Link the Workstation to the WFR ...........................................................................................16
Monitor and Keyboard Setup ...........................................................................................16
Serial Console Setup .......................................................................................................16
Power on the WFR .................................................................................................................17

CONTENTS
iv M86 SECURITY INSTALLATION GUIDE
Power up a 300 Series Model .........................................................................................17
Power up a 500 Series Model .........................................................................................17
HyperTerminal Setup Procedures ..........................................................................................18
Login screen ...........................................................................................................................21
Quick Start menu screen ........................................................................................................21
Quick Start menu: administration menu ................................................................................. 22
Change filtering mode . .................................................................................................... 23
Configure network interface LAN1 ................................................................................... 23
Configure network interface LAN2 ................................................................................... 23
Configure default gateway ...............................................................................................23
Configure DNS servers ....................................................................................................23
Configure host name ....................................................................................................... 24
Time Zone regional setting ..............................................................................................24
Configure setup wizard user ............................................................................................24
Non-Quick Start procedures or settings ........................................................................... 25
Reboot system ...........................................................................................................25
Change Quick Start password ...................................................................................25
Reset admin console account ....................................................................................25
System Status screen ............................................................................................................26
Log Off, Disconnect the Peripherals ......................................................................................26
Step 1B: LCD Panel Setup Procedures....................................................................... 27
LCD Panel ..............................................................................................................................27
LCD panel keypad ...........................................................................................................27
LCD Menu .......................................................................................................................27
M86 menu ..............................................................................................................................28
WF Filter Mode . ...............................................................................................................29
IP / LAN1 and 2 ...............................................................................................................29
Gateway ..........................................................................................................................29
DNS 1 and 2 ....................................................................................................................30
Host Name .......................................................................................................................30
Regional Setting (Time Zone, date, time) ........................................................................30
TAR GUI Wizard User .....................................................................................................31
Non-Quick Start procedures or settings ........................................................................... 31
WFR Patch Level ....................................................................................................... 31
Reset WF Admin Console Password ......................................................................... 31
Reset ER Admin Console Password..........................................................................31
Reboot .......................................................................................................................32
Shutdown ...................................................................................................................32
LCD Options menu .................................................................................................................33
Heartbeat .........................................................................................................................33
Backlight ..........................................................................................................................33
LCD Controls ...................................................................................................................33
Step 2: Physically Connect the Unit to the Network.................................................. 34
Step 3: Register the WFR and its Applications.......................................................... 35
Access the WFR via its LAN 1 IP Address .............................................................................35
Accept the Security Certificate in Firefox ...............................................................................36
Temporarily Accept the Security Certificate in IE ...................................................................38
Accept the Security Certificate in Safari ................................................................................. 39
Accept the End User License Agreement ..............................................................................40
Log in to the Threat Analysis Reporter Wizard ...................................................................... 41
Use the TAR Wizard to Specify Application Settings .............................................................42
Enter Main Administrator Criteria ..................................................................................... 42
Enter Bandwidth Range ................................................................................................... 42
Setup Criteria for an Additional Web Filter . ..................................................................... 43

CONTENTS
M86 SECURITY INSTALLATION GUIDE v
Enterprise Reporter registration, Save settings ...............................................................43
Step 4: Generate SSL Certificate................................................................................. 44
Generate a Self-Signed Certificate for the WFR .................................................................... 44
IE Security Certificate Installation Procedures ....................................................................... 46
Accept the Security Certificate in IE ................................................................................46
Windows XP or Vista with IE 7 or 8............................................................................ 46
Windows 7 with IE 8...................................................................................................50
Map the WFR’s IP Address to the Server’s Host Name .................................................. 51
Step 5: Test Filtering or the Mobile Client Connection. ............................................ 53
Test Filtering on the Web Filter ..............................................................................................53
Test the Mobile Client Connection .........................................................................................53
Step 6: Set Library Updates. ........................................................................................ 54
Activate the Web Filter ...........................................................................................................54
Log in to the Web Filter ..........................................................................................................55
Perform a Complete Library Update ...................................................................................... 56
Monitor the Library Update Process .......................................................................................57
Step 7: Set Self-Monitoring. ......................................................................................... 58
Step 8: Verify Web Filter Log Transfer........................................................................ 60
Single Sign-On Access, Default Username/Password. ............................................. 61
Access WFR Applications from the TAR User Interface ........................................................61
Default Usernames and Passwords for WFR Applications .................................................... 61
C
ONCLUSION
................................................................................................62
B
EST
F
ILTERING
AND
R
EPORTING
P
RACTICES
...............................................63
Web Filter Usage Scenarios......................................................................................... 64
I. Threats/Liabilities ...............................................................................................................65
1. Category block ............................................................................................................65
2. Rule block ...................................................................................................................65
3. X-Strike on blocked categories ...................................................................................65
4. Custom Lock, Block, Warn, X Strikes, Quota pages .................................................. 66
5. URL Keywords ............................................................................................................66
6. Search Engine Keywords ........................................................................................... 66
7. Custom Category (blocked) . ....................................................................................... 67
8. Minimum Filtering Level .............................................................................................. 67
9. Override Account bypass ...........................................................................................67
10. Exception URL bypass . ............................................................................................. 68
11. Proxy Patterns ...........................................................................................................68
12. File type blocking ....................................................................................................... 68
II. Bandwidth/Productivity ......................................................................................................69
1. Time Quota/Hit Quota .................................................................................................69
2. Overall Quota .............................................................................................................69
3. Time Based Profiles ...................................................................................................69
4. Warn option with low filter settings . ............................................................................70
5. Warn-strike .................................................................................................................70
6. P2P patterns ...............................................................................................................70
7. IM patterns ..................................................................................................................71
8. Game patterns ............................................................................................................71
9. Streaming Media patterns ..........................................................................................71

CONTENTS
vi M86 SECURITY INSTALLATION GUIDE
10. Remote Access patterns . ..........................................................................................72
11. HTTPS settings .........................................................................................................72
12. Category block ...........................................................................................................72
13. Rule block ..................................................................................................................73
14. SE Keywords .............................................................................................................73
15. URL Keywords ...........................................................................................................73
16. Custom Block/Warn/X Strikes/Quota pages . .............................................................74
17. Real Time Probe information .....................................................................................74
III. General/Productivity .......................................................................................................... 75
1. Warn Feature with higher thresholds ..........................................................................75
2. Warn-strike with higher thresholds .............................................................................75
3. Time Quota/Hit Quota .................................................................................................76
4. Time Based Profiles ...................................................................................................76
5. Overall Quota .............................................................................................................76
6. Customize an M86 Supplied Category . ......................................................................77
7. Local category adds/deletes .......................................................................................77
8. Custom Block/Warn/X Strikes/Quota pages ...............................................................77
IV. Pass/Allow ........................................................................................................................78
1. Always Allow Custom Category ..................................................................................78
2. URL exceptions ..........................................................................................................78
3. IP exceptions ..............................................................................................................78
4. Override Accounts . .....................................................................................................79
5. Pattern detection bypass ............................................................................................79
Threat Analysis Reporter Usage Scenarios. .............................................................. 80
I. Screen navigation exercise .................................................................................................80
Step A: Navigate panels in the Gauges section ..............................................................80
Step B: Navigate panels in the Policy section .................................................................81
Step C: Navigate panels in the Report/Analysis section ..................................................81
Step D: Navigate panels in the Administration section ....................................................81
II. Drill down into a gauge exercise ........................................................................................82
Step A: Select the gauge with the highest score ............................................................. 82
Step B: Investigate a user’s activity in a specified gauge ................................................84
Step C: Investigate the user’s Internet activity in other gauges ....................................... 85
III. Create a gauge exercise ...................................................................................................86
Step A: Access the Add/Edit Gauges panel ....................................................................86
Step B: Add a URL Gauge ..............................................................................................87
IV. Create an email alert exercise ..........................................................................................89
Step A: Add a new alert ...................................................................................................89
Step C: Select Email Alert Action ....................................................................................91
Step D: Receiving an email alert .....................................................................................92
Enterprise Reporter Usage Scenarios. ....................................................................... 93
I. Executive Report and Drill Down Report exercise ..............................................................93
Step A: Start with the dashboard for a high level activity overview ................................93
Step B: Further investigate using a Summary Drill Down Report ...................................94
Step C: Create a New Report using yesterday’s date scope ........................................... 95
Step D: Create a double-break report with two sets of criteria .......................................95
Step E: Create a Detail Drill Down Report to obtain a list of URLs ..................................96
II. Double-break Report and Export Report exercise .............................................................97
Step A: Drill down to view the most visited sites in a category ........................................97
Step B: Modify the report view to only display top 10 site records .................................. 98
Step C: Export the report view in the .PDF output format ............................................... 99
III. Save and schedule a report exercise ..............................................................................101
Step A. Save a report ....................................................................................................101
Step B. Schedule a recurring time for the report to run .................................................102
IV. Create a custom category group and generate reports ..................................................104

CONTENTS
M86 SECURITY INSTALLATION GUIDE vii
Step A: Create a custom category group ......................................................................104
Step B: Run a report for a specified category group .....................................................104
V. Create a custom user group and generate reports ..........................................................105
Step A: Create a custom user group .............................................................................105
Step B: Generate a report for a custom user group ......................................................105
Summary Report ......................................................................................................105
Detail Report ...........................................................................................................106
I
MPORTANT
I
NFORMATION
ABOUT
USING
THE
ER
IN
THE
E
VALUATION
M
ODE
107
Evaluation Mode Pop-Ups.......................................................................................... 107
Administrator Console, Expiration Screen............................................................... 107
ER Web Client, ER Server Information Window....................................................... 108
LED I
NDICATORS
AND
B
UTTONS
.................................................................109
Front Control Panel on 500 Series Unit. ................................................................... 109
Front Control Panel on a 300 Series Unit. ................................................................ 110
R
EGULATORY
S
PECIFICATIONS
AND
D
ISCLAIMERS
(500 S
ERIES
) ..................111
Declaration of the Manufacturer or Importer............................................................ 111
Safety Compliance ...............................................................................................................111
Electromagnetic Compatibility (EMC) ..................................................................................111
Federal Communications Commission (FCC) Class A Notice (USA) ..................................111
FCC Declaration of Conformity ............................................................................................111
Electromagnetic Compatibility Class A Notice .....................................................................111
Industry Canada Equipment Standard for Digital Equipment (ICES-003) .....................111
EC Declaration of Conformity ...............................................................................................112
European Community Directives Requirement (CE) .....................................................112
I
NDEX
.........................................................................................................113

CONTENTS
viii M86 SECURITY INSTALLATION GUIDE

M86 WFR APPLIANCE INTRODUCTION
M86 SECURITY INSTALLATION GUIDE 1
M86 WFR APPLIANCE INTRODUCTION
Thank you for choosing to install and evaluate the M86 Web Filter and Reporter
appliance. M86’s Web Filtering and Reporting Suite (WFR) consists of the best in
breed of the M86 Professional Edition, consolidated into one unit.
M86 Security’s Web Filter offers an enhanced solution for Internet filtering on a
network. The Web Filter tracks each user’s online activity, and can be configured
to block specific Web sites or service ports, thereby protecting your organization
against lost productivity, network bandwidth issues, and possible legal problems
that can result from the misuse of Internet resources.
M86's Threat Analysis Reporter (TAR) provides administrators or management
personnel dynamic, real time graphical snapshots of network Internet traffic,
supported by remediation tools to manage and control user-generated Web
threats. Working in conjunction with the Web Filter, TAR interprets end user
Internet activity from the Web Filter’s logs and supplies data that can be viewed via
an easy-to-read dashboard of gauges the administrator can drill down into, thereby
identifying the source of the threat.
Data from the Web Filter is fed into M86 Security’s Enterprise Reporter (ER),
giving you the ability to interrogate massive datasets through flexible drill-down
technology, until the desired view is obtained. This “view” can then be memorized
and saved to a user-defined report menu for repetitive, scheduled execution and
distribution.
Using the WFR Suite, threats to your network are quickly identified, thus arming
you with the capability to take immediate action to halt the source and secure your
network.
Quick setup procedures—to implement the best filtering and reporting practices
are included in the Best Filtering and Reporting Practices section that follows the
Conclusion of this guide.

M86 WFR APPLIANCE INTRODUCTION ABOUT THIS DOCUMENT
2M86 SECURITY INSTALLATION GUIDE
About this Document
This document is divided into the following sections:
•Introduction - This section is comprised of an overview of the WFR product
and how to use this document
•Service Information - This section provides M86 Security contact information
•Preliminary Setup Procedures - This section includes instructions on how to
physically set up the WFR appliance in your network environment
•Install the Server - This section explains how to configure the WFR for filtering
and reporting
•Conclusion - This section indicates that the installation steps have been
completed
•Best Filtering and Reporting Practices - This section is comprised of
suggested best practices for implementing and using the Web Filter, Threat
Analysis Reporter, and Enterprise Reporter.
•Evaluation Mode - This section gives information on using the ER applications
in the evaluation mode
•LED Indicators and Buttons - This section explains how to read LED indica-
tors and use LED buttons for troubleshooting the unit
•Regulatory Specifications and Disclaimers - This section cites safety and
emissions compliance information for the WFR appliance models referenced
therein
•Index - An alphabetized list of some topics included in this document
Conventions Used in this Document
The following icons are used throughout this document to call attention to impor-
tant information pertaining to handling, operation, and maintenance of the server;
safety and preservation of the equipment, and personal safety:
NOTE: The “note” icon is followed by additional information to be considered.
WARNING: The “warning” icon is followed by information alerting you to a potential situa-
tion that may cause damage to property or equipment.
CAUTION: The “caution” icon is followed by information warning you that a situation has
the potential to cause bodily harm or death.
IMPORTANT: The “important” icon is followed by information M86 Security recommends
that you review before proceeding with the next action.
The “book” icon references the WFR User Guide. This icon is found in the Best Filtering
and Reporting Practices section of this document.

SERVICE INFORMATION M86 SECURITY CORPORATE HEADQUARTERS (USA)
M86 SECURITY INSTALLATION GUIDE 3
SERVICE INFORMATION
The user should not attempt any maintenance or service on the unit beyond the
procedures outlined in this document.
Any initial hardware setup problem that cannot be resolved at your internal organi-
zation should be referred to an M86 Security solutions engineer or technical
support representative.
M86 Security Corporate Headquarters (USA)
Local : 714.282.6111
Domestic US : 1.888.786.7999
International : +1.714.282.6111
M86 Security Taiwan
Taipei Local : 2397-0300
Domestic Taiwan : 02-2397-0300
International : 886-2-2397-0300
Procedures
When calling M86 Security regarding a problem, please provide the representative
the following information:
• Your contact information.
• Serial number or original order number.
• Description of the problem.
• Network environment in which the unit is used.
• State of the unit before the problem occurred.
• Frequency and repeatability of the problem.
• Can the product continue to operate with this problem?
• Can you identify anything that may have caused the problem?

PRELIMINARY SETUP PROCEDURES UNPACK THE UNIT FROM THE CARTON
4M86 SECURITY INSTALLATION GUIDE
PRELIMINARY SETUP PROCEDURES
Unpack the Unit from the Carton
Inspect the packaging container for evidence of mishandling during transit. If the
packaging container is damaged, photograph it for reference.
Carefully unpack the unit from the carton and verify that all accessories are
included. Save all packing materials in the event that the unit needs to be returned
to M86 Security.
The carton should contain the following items:
• 1 Web Filter and Reporter appliance (WFR)
• 1 serial port cable
• 1 CD-ROM containing supplemental product applications and EULA
NOTES:
For 500 series models, the following items are also included in the carton:
• 1 AC power cord for 500 series models
• 1 bezel to be installed on the front of the chassis
• 1 set of rack mounting rails
For 300 series models, the following items are also included in the carton:
• 1 power adapter with power cord
• 1 set of 4 pressure sensitive feet to be affixed to the bottom corners of a non-rack
mounted unit
For 300 series models, If you have purchased the optional 1U two-unit tray for mounting
the half-U server(s) in a rack, this item will be shipped in a separate carton.
Inspect the server and accessories for damage. If the contents appear damaged, file
a damage claim with the carrier immediately.
WARNING: To avoid danger of suffocation, do not leave plastic bags used for packaging
the server or any of its components in places where children or infants may play with
them.
TIP: Please consult the Web Filtering and Reporting User Guide for information about
RAID and hardware maintenance. User Guides for the WFR product can be obtained from
http://www.m86security.com/support/wfr/documentation.asp.

PRELIMINARY SETUP PROCEDURES SELECT ASITE FOR THE SERVER
M86 SECURITY INSTALLATION GUIDE 5
Select a Site for the Server
The server operates reliably within normal office environmental limits. Select a site
that meets the following criteria:
• Clean and relatively free of excess dust.
• Well-ventilated and away from sources of heat, with the ventilating openings on
the server kept free of obstructions.
• Away from sources of vibration or physical shock.
• Isolated from strong electromagnetic fields and noise caused by electrical
devices such as elevators, copy machines, air conditioners, large fans, large
electric motors, radio and TV transmitters, and high-frequency security devices.
• Access space provided so the server power cord can be unplugged from the
power supply or the wall outlet—this is the only way to remove the AC power
cord from the server.
• Clearance provided for cooling and airflow: Approximately 30 inches (76.2 cm)
in the back and 25 inches (63.5 cm) in the front.
• Located near a properly earthed, grounded, power outlet.
300 Series Server Setup Procedures
Set Top Applications
If you have a 300 series server you do not wish to rack mount, apply the pressure
sensitive feet (that came with the server) to the bottom corners of the unit, and then
place the unit in a location that meets server site selection criteria.
Optional 1U 2-Unit Tray Kit Applications
If you have purchased the optional 1U 2-unit tray kit for rack mounting one or two
300 series servers, proceed to the instructional “300 Series Appliance Tray Instal-
lation” document packaged within the 1U 2-unit tray kit’s shipping carton.
When you have finished installing the 300 series server(s) in your server rack,
continue to the Install the Server section of this Installation Guide.

PRELIMINARY SETUP PROCEDURES RACK MOUNT THE SERVER
6M86 SECURITY INSTALLATION GUIDE
Rack Mount the Server
Rack Setup Precautions
WARNING:
Before rack mounting the server, the physical environment should be set up to
safely accommodate the server. Be sure that:
• The weight of all units in the rack is evenly distributed. Mounting of the equip-
ment in the rack should be such that a hazardous condition is not achieved due
to uneven mechanical loading.
• The rack will not tip over when the server is mounted, even when the unit is fully
extended from the rack.
• For a single rack installation, stabilizers are attached to the rack.
• For multiple rack installations, racks are coupled together.
• Reliable earthing of rack-mounted equipment is maintained at all times. Partic-
ular attention should be given to supply connections other than direct connec-
tions to the branch circuit (e.g. use of power strips).
• A power cord will be long enough to fit into the server when properly mounted in
the rack and will be able to supply power to the unit.
• The connection of the server to the power supply will not overload any circuits.
Consideration should be given to the connection of the equipment to the supply
circuit and the effect that overloading of the circuits might have on overcurrent
protection and supply wiring. Appropriate consideration of equipment name-
plate ratings should be used when addressing this concern.
• The server is only connected to a properly rated supply circuit. Reliable earthing
(grounding) of rack-mounted equipment should be maintained.
• The air flow through the server’s fan or vents is not restricted. Installation of the
equipment in a rack should be such that the amount of air flow required for safe
operation of the equipment is not compromised.
• The maximum operating ambient temperature does not exceed 104°F (40°C). If
installed in a closed or multi-unit rack assembly, the operating ambient temper-
ature of the rack environment may be greater than room ambient. Therefore,
consideration should be given to installing the equipment in an environment
compatible with the maximum ambient temperature (Tma) specified by the
manufacturer.
WARNING: Extend only one component at a time. Extending two or more components
simultaneously may cause the rack to become unstable.

PRELIMINARY SETUP PROCEDURES RACK MOUNT THE SERVER
M86 SECURITY INSTALLATION GUIDE 7
Rack Mount Instructions for 500 Series Servers
Rack Setup Suggestions
• Determine the placement of each component in the rack before you install the
rails.
• Install the heaviest server components on the bottom of the rack first, and then
work up.
Install the Inner Slides
1. Locate the right inner slide, (the slide that will be used on the right side of
chassis when facing the front panel of the chassis).
2. Align the four (4) square holes on the right inner slide against the hooks on the
right side of the chassis as show below on the left.
3. Securely attach the slide to the chassis with two M4 flat head screws and repeat
the steps 1-3 to install the left inner slide to the left side of the chassis.
Install the Outer Slides
1. Measure the distance from the front rail of the rack to the rear rail of the rack.
2. Attach a short bracket to the rear side of the right outer slide, and a long bracket
to the front side of the right outer slide as shown above on the right.
3. Adjust the short and long brackets to the proper distance so that the chassis can
snugly fit into the rack.
4. Secure the slides to the cabinet with screws.
5. Repeat steps 1-4 for the left outer slide.

PRELIMINARY SETUP PROCEDURES RACK MOUNT THE SERVER
8M86 SECURITY INSTALLATION GUIDE
Install the Slide Assemblies to the Rack
1. After you have installed the short and long brackets to the outer slides, you are
ready to install the whole slide assemblies (outer slides with short and long
brackets attached) to the rack. (See the previous page.)
2. Use M5 screws and washers to secure the slide assemblies into the rack as
shown below:

PRELIMINARY SETUP PROCEDURES RACK MOUNT THE SERVER
M86 SECURITY INSTALLATION GUIDE 9
Install the Chassis into the Rack
1. Push the inner slides, which are attached to the chassis, into the grooves of the
outer slide assemblies that are installed in the rack as shown below:
2. Push the chassis all the way to the back of the outer slide assemblies as shown
below:

PRELIMINARY SETUP PROCEDURES RACK MOUNT THE SERVER
10 M86 SECURITY INSTALLATION GUIDE
Install the Bezel on the 500 Series Chassis
After rack mounting a 500 series server, the bezel should be installed on the front
end of the chassis.
NOTE: This portion of the installation process requires you to unpack the bezel. The bezel
has been packaged separately from the unit to prevent damage during shipping.
A. Hold the bezel upright and facing towards you (Fig. 1).
Fig. 1 - Front of bezel
B. Note the short pair of end pins on the left side (Fig. 2), and the longer pair of
fixed pins on the inside top towards the middle (Fig. 3).
Fig. 2 - Pins on the left end Fig. 3 - Pins on the inside at the top of the bezel
C. Note the end pin holes (Fig. 5) on the inside of the U-shaped, aluminum rail
handles on both ends of the chassis rails (Fig. 4: U-shaped handles). Note also
that the holes for the longer pair of pins are located on the front of the chassis
above the third hard drive bay (Fig. 4: holes).
Fig. 4 - Front of chassis with U-shaped handles and holes above third hard drive identified
D. Insert the end pins into the holes of the left U-shaped handle (Fig. 5).
Fig. 5 - Holes in handle Fig. 6 - Release knob
E. Align the bezel with the front of the chassis, and then gently push the bezel
towards the front of the chassis, inserting the pins on the inside of the bezel
(Fig. 3) into the holes on the front of the chassis (Fig. 4: holes).
F. Press in the release knob on the right side of the bezel to retract the end pins on
that side (Fig. 6), and then release the knob to let the end pins extend into the
holes of the right U-shaped handle (Fig. 4: U-shaped handles).
holes
U-shaped handles

PRELIMINARY SETUP PROCEDURES CHECK THE POWER SUPPLY
M86 SECURITY INSTALLATION GUIDE 11
Check the Power Supply
This server is equipped with a universal power supply that handles 100-240 V, 50/
60 Hz. A standard power cord interface (IEC 950) facilitates power plugs that are
suitable for most European, North American, and Pacific Rim countries.
Power Supply Precautions
WARNING:
• Use a regulating uninterruptible power supply (UPS) to protect the server from
power surges, voltage spikes and to keep the server operating in case of a
power failure.
• In geographic regions that are susceptible to electrical storms, M86 Security
highly recommends plugging the AC power cord for the server into a surge
suppressor.
• Use appropriately rated extension cords or power strips only.
• Allow power supply units to cool before touching them.

PRELIMINARY SETUP PROCEDURES GENERAL SAFETY INFORMATION
12 M86 SECURITY INSTALLATION GUIDE
General Safety Information
Server Operation and Maintenance Precautions
WARNING:
Observe the following safety precautions during server operation and mainte-
nance:
WARNING: If the server is used in a manner not specified by the manufacturer, the protec-
tion provided by the server may be impaired.
WARNING: M86 Security is not responsible for regulatory compliance of any server that
has been modified. Altering the server’s enclosure in any way other than the installation
operations specified in this document may invalidate the server’s safety certifications.
CAUTION: Never pile books, papers, or other objects on the chassis, drop it, or subject it
to pressure in any other way. The internal circuits can be damaged, and the battery may
be crushed or punctured. Besides irreparable damage to the unit, the result could be
dangerous heat and even fire.
CAUTION: There are no user-serviceable components inside the chassis. The chassis
should only be opened by qualified service personnel. Never disassemble, tamper with, or
attempt to repair the server. Doing so may cause smoke, fire, electrical shock, serious
physical injury, or death.
• Do not insert objects through openings in the chassis. Doing so could result in
a short circuit that might cause a fire or an electrical shock.
• Do not operate the server in an explosive atmosphere, in the presence of flam-
mable gases.
• To ensure proper cooling, always operate the server with its covers in place. Do
not block any openings on the chassis. Do not place the server near a heater.
• Always exit the software application properly before turning off the server to
ensure data integrity.
• Do not expose the server to rain or use near water. If liquids of any kind should
leak into the chassis, power down the server, unplug it, and contact M86 Secu-
rity technical support.
• Disconnect power from the server before cleaning the unit. Do not use liquid or
aerosol cleaners.
Other manuals for 350
1
This manual suits for next models
1
Table of contents
Other M86 Security Network Hardware manuals