Fundamentals
About OP5 Appliance System
OP5 Appliance System uses 6 as the operating system. is an enterprise-class distribution derived from Red Hat Enterprise sources. This means that 6 is binary compatible with Enterprise 6. The OP5 Appliance System contains a basic but minimal server installation as a base. On top of that we add common tools and applications needed by OP5 Appliance System products. The OP5 Appliance System also contains a number of custom-made tools and applications.
All applications are distributed as RPM packages, and made available to customers on the ITRS Support site and in our yum repositories.
System access
There are three ways to access an OP5 Appliance System system:
- Direct access to the console by connecting a monitor and a keyboard.
- Using SSH.
- By HTTPS using a standard web browser.
The portal page
The third way, HTTPS access, is used to access the OP5 Monitor product and portal page. You can use the portal page to configure your system, gather information about installed software, and retrieve information regarding new patches from ITRS Support web. You can reach the portal by directing your web browser to OP5 Monitor, https://<server-address>
. The portal page also contains links to any installed OP5 Appliance System products.
Note: The portal page is only available on Red Hat Enterprise version 6.
Console and SSH access
To use SSH, you must install SSH client software on your computer. Most
distributions come with an SSH client, and there are several SSH clients available free of charge for .We recommend PuTTY, which you can find on the PuTTY website.
You need to access the system through the console or SSH to install upgrades and patches.
System accounts
To change the configuration of OP5 Appliance System, you need to log on. The root account is the superuser of the system and equal to the Administrator account in .
The default password for user root
is monitor
. You need to change the root
password as soon as possible after installation, to block unauthorised access.
Note that when you are logged on to the system as root
, you have the power to wipe the system out, so we recommend you take a backup before performing any changes. For more information about backups, see Back up the system.