Set Up a Bare Metal Server

1.
Log in to the Customer Portal

Log in to the Customer Portal with the credentials you received via email when your account was initially created.

2.
Find your system in the Device List

Click here to see the Device List in the Customer Portal. All of your devices are detailed in the Device List, where you can manage devices, upgrade devices, or generate bandwidth usage charts.

3.
Choose to manage your server in Snapshot View or on the Device Details screen

You can interact with servers in the Customer Portal in both the Snapshot view (a summary of your device) and on the Device Details screen (a fully detailed list).

To view and interact with your server in the Snapshot View, click the arrow next to the Device Name to expand the view.

To view and interact with your server on the Device Details screen, click the Device Name of the server.

4.
Record the IP addresses and credentials for the server

Recording your device’s IPs and credentials in a safe location allows the details to be accessed quickly without having to log in to the Customer Portal each time you need them. Recording these details can be done for both an individual device and for all devices associated with your account.

Individual device IPs are viewable from the Device List.

Individual device root passwords are viewable in the device’s Snapshot View.

Multiple device IPs are viewable using the Download CSV action within the Device List. Select Download CSV from the Settings cog to download a full list of devices and details in spreadsheet format.

5.
Update credentials for operating systems and other software

All software loaded onto your device during the provisioning process was assigned temporary credentials by our systems.  These credentials are viewed and managed on the Passwords tab of each device in the Customer Portal.  Use these temporary credentials to access your software for the first time.  As a best practice, change the password to your software after accessing it for the first time.  We recommend using a strong password that is comprised of a combination of letters, numbers and symbols.  Optionally, password updates may be stored on the Passwords tab for each device; however, understand that when storing passwords within the Portal, any person with access to the account and appropriate permissions may view passwords stored on the Passwords screen.

Refer to Add, Delete and Update Software Users and Passwords in KnowledgeLayer for detailed instructions on viewing and managing your software credentials.

6.
Access your server on the private network

Our private network is the precursor to interacting with your devices through remote desktop (RDP) via SSH and KVM over IP. Our VPN Access tool allows for private network connection to either the closest SSL VPN endpoint or to the endpoint of your choice. VPN access is also required to interact with several services we offer. To access the private network, edit the user’s VPN access from the User List. Use the instructions on the Virtual Private Network page to connect to one of the various VPN options.

7.
Set up monitoring

Monitoring is primarily used as a resource to check your server’s uptime, but it can also be useful for knowing when to scale. We offer both Standard Monitoring and Nimsoft Monitoring services to cover a variety of monitoring needs. Standard Monitoring, sometimes referred to as “Basic Monitoring,” is generally used in the ping-and-respond method through the use of either a slow or service ping initiated using the Customer Portal. Nimsoft Monitoring is also referred to as “Advanced Monitoring” and is available in three tiers: Basic, Advanced, and Premium. This service is also accessible through the Customer Portal. To learn more about how you can keep tabs on your system through monitoring, refer to the Monitoring topic page in KnowledgeLayer.

8.
Secure your system

Hardware firewalls are available to ensure your device is secure at all times. Hardware firewalls are provisioned on demand with no downtime and, if rules are established properly, can protect your server from unwanted activity. After ordering your firewall, it must be enabled and rules must be set. Learn how to get the best out of the firewalls that you have ordered on the Firewall topic page in KnowledgeLayer.

9.
Schedule backups

Backups ensure that your data is safely stored outside of your device and protects it in the event it is lost. We offer a variety of backup services that store your data in a secure location in case you ever need to reload your information onto your device.

EVault Backup is our automated, agent-based backup system. This is a popular “set-and-forget” solution for managing your device. It is compatible with Microsoft software including Exchange and SQL through additional plug-ins. EVault users interact with this service through EVault’s WebCC Web-based application. For more information, see the EVault topic page in KnowledgeLayer.

R1Soft Continuous Data Protection (CDP) is backup software that can be installed on your server or self-managed virtual machine. It is recommended for customers looking for a single interface to manage all of your backups. You interact with R1Soft CDP through your proprietary management system, which allows agents to be installed on virtual machines and offers database plug-ins for additional functionality.

chat

Contact info

SUPPORT
 
866.403.7638
 
SALES
 
866.398.7638
 
ACCOUNT & BILLING
 
214.442.0604