Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

SecPoint Products / Penetrator /

Quick Install Guide

Dear Sir/Madam,

Thanks for choosing SecPoint and congratulations with your new Penetrator!

By using the product you agree to the provided Terms and Conditions.

Always check: https://www.secpoint.com/support.html for support.

 

1.   Penetrator Network Connection.

 

Penetrator S7 Appliance

     Port E0 is Lan. (Port to the left)


 

 

Penetrator S7 SFF (Back Side):

     Port A is Lan. (Port in the lower middle)

 

 
 
 

 
 
   

2.   Penetrator Power Connection

 

Penetrator S7 has the power plug and button on the back side.

 

Please connect the power cable and power it on.

 

It is highly recommended to always have a backup power UPS device powering the unit!

 

 

3.   The web interface of the Penetrator

 

The Penetrator is born with the IP address of 192.168.1.2 subnet mask 255.255.255.0 gateway 192.168.1.1 Name server (DNS) 192.168.1.1 that will fit most networks.

 

For this connection please point your web browser to https://192.168.1.2/

 

Please login at the login screen with the password on the welcome letter.

 

4.   Quick Setup Wizard

After you login please click Quick Setup Wizard in right top.

 

 

5.   Step 1 of 3 – Change Date and Time

Please set your Time, Date, Time Zone and click Next

 

 

6.   Step 2 of 3 –  IP, Gateway and DNS

Please setup the IP address, Subnet, Gateway and DNS that fits to your network setup and click Next. Please choose an IP address that is freely available on your network and not occupied by another system.

 

Please note that the values on the screenshots are for demonstration only, you have to change them to suit your network configuration.

 

7.   Step 5 of 5 – System registration

Please register your product here.

 

 

➤ Related pages
About Vulnerability Assessment
Cloud Vulnerability Node Scan Distribution
How to connect Penetrator Vulnerability Scanning Appliance
Information Vulnerability Scanner
Latest Penetrator Change Log
Network Security Scanner
Network security vulnerabilities
On Demand Vulnerability Management
Penetrator Awards and Reviews
Penetrator Comparison
Penetrator Models
Penetrator Questions FAQ
Penetrator Quick Setup Guide
Penetrator S7 Appliance
Penetrator Scanner Sitemap
Penetrator Scanner Visio Stencils
Pricing of a Vulnerability Scanner?
The Best #1 Security Scanner
Vulnerability Management Benefits
Vulnerability Scan Wordpress
Vulnerability Scanning Methodology
Vulnerability Scanning ROI

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef