You can manage access to your server’s IPMI from the Internet in your Account at Host-telecom.com. Access restriction is implemented due to security reasons.
Here’s what you can do:
- Completely block access to the IPMI address
- Allow access from specific IP(s) and set the expiration time.
- Allow access from specific IP(s) permanently (no expiration date)
- Add both temporary and permanent access rules
- Allow unrestricted access (we strictly do not recommend this option due to security reasons!)
Once you logged in your Account you can use
"IPMI management" menu (picture 1).
You get a list of all your servers equipped with IPMI controller and can select a checkbox for the server you want to change access to. To open the access configuration please click on
"Open/prolong access" button (picture 2).
Please note that servers without IPMI controller are not displayed on this page.
You can choose between the temporary, permanent or unlimited type of access (1) to be open and also input the IP address (2). The system automatically fills out your current IP for your convenience. You can manually set any other IP though (picture 3).
You can add multiple IPs - one in a row, or add (/24) subnet if you provide 3 out of 4 octets (for instance,
After you click on the
"Run" button, all changes take place after 1 minute.
Set the period of time (3) for the temporary access (by default it’s 30 minutes, the maximum is 24 hours).
Please note that for your convenience you can create lists of IP address and then use it for providing/revoking access in bulk (4).
You can also update the list of IPs and extend access time if it’s already configured for some server. ‘New’ time is added to the remainder and applied to the whole IP address list.
Be careful! Technically you can allow unrestricted access to your server’s IPMI, but we strongly recommend not to do that because of security reasons. In this case, your IPMI address is accessible from any IP on the Internet.
You can combine temporary (if it’s required occasionally) and permanent (for IPs that you constantly use to operate the server) types of access for a server.
If you configure both temporary and permanent access to your server from the same IP, it’s granted with permanent access.
To revoke any type of access, please select server(s) and click on
"Close access" button. Changes take place after 1 minute (picture 4).
You can use SuperMicro IPMIView app to work with IPMI KVM-console. It has a richer feature set compared to web-interface. It’s available for Linux and Windows and as a cross-platform Java app.
The tool is available on the official SuperMicro website (sign in required) or FTP: ftp:// ftp.supermicro.com/utility/IPMIView/
You need Java support on your machine to use KVM console, no matter what you use - web-interface or IPMIView.
DDoS protection is NOT included with any standard plan. It’s an additional paid service. The cost for anti-DDoS is individual and depends on many factors (because DDoS attacks are also unique).
Comprehensive DDoS protection may include a combination of the following: simple static traffic processing rules, sophisticated firewalling by special devices and/or self-learning systems, DNS solutions, geolocation load balancing and CDN, cooperation with backbone carriers, security companies and law enforcement agencies.
Unlike some other companies, we do not claim we provide a complete protection from any threat for free.
However, we have relevant experience and resources to mitigate entry- and mid-level DDoS attacks.
Sure, you can put a tamper-evident numbered seal on your rack. We can sign a formal note with a reference to the seal’s number. You get a hard copy of the note and we store another copy in the data-center.
Absolutely. You can provide your keys to us in person or ship it to the data-center. Our technicians will install it in your server free of charge.
If you need your keys back you can just get it in person in our office or we can ship it to you.
Our data-centers are operating all over the clock and authorized persons can visit it any time. Clients can use a dedicated room for equipment configuration and maintenance.
We do not verify if the apps you install are properly licensed.
However, we strictly recommend using only legal software to get critical updates and support in time and avoid copyright infringement claims.
You can rent software through us - it allows you to get a fully legitimate product and at the same time avoid significant investment.
You can also order additional services including OS installations and further OS and software maintenance by our professional engineering team.
You can find a complete list of all services in your Account.
Just check in in the list services you are going to renew and click on "Renew" button.
A new bill will be generated and you can then pay it using any available payment method.
Data-center security including your racks and equipment, is protected with electronic keys access control system, video surveillance and strictly followed policies.
On top of that, you can put a tamper evident numbered seal on your rack. We can sign a formal note with a reference to seal’s number. You get your hard copy of the note and we store another copy in the data-center.
If you order a server on a standard plan you will get all credentials (including IPs and IPMI access) on the same or next business day once we received the payment.
Standard servers (including ones on sale) are usually ready to use in 2 hours.
We can also prepare an individual server for you - it usually takes 3-7 days.
We offer plans that are a good balance between server capacity and uplink. It can be a specific amount of data or bandwidth available per month.
The following plans are available right now:
- unlimited data on 100 Mbit/s link - works for rack and dedicated server;
- 10Tb data on 1 Gbit/s link for a dedicated server;
- 20 Tb on 1 Gbit/s link or 10 Tb data on 10Gbit/s link for a rack.
We do not count european or international traffic. You should not maintain a specific rate of incoming/outgoing traffic.
If you’re on a limited plan - it means your incoming and outgoing traffic are summed up.
If you reached the limit - dont worry, we will not block or throttle you.
We will let you know beforehand that you’re approaching the limit. You’ll have time to decide - either to get more traffic or switch to an unlimited plan.
If you got unlimited plan - you have ‘all you can eat’ data limited only by your port speed.
We do not have any type of traffic limits, including shapers, FUP (fair usage policy) and network oversell.
Our ultimate goal is to grow together with our customers and hence we’re not interested in one-time tricks.
We have open peering policy and are seeking for the best connectivity.
Unfortunately, we cannt guarantee bandwidth in public Internet (between our datacenters and your endpoint). It’s just not possible because it depends on many different carriers.
In our internal network as well as between our data-centers, all traffic is free and unlimited.