Cyclades User's Guide User Manual

Page 4

Advertising
background image

iv

AlterPath KVM/net Installation, Administration, and User’s Guide

Decision 1: Check User’s KVM Port Permissions ............................... 26
Decision 2: Check Group’s KVM Port Permissions ............................. 27
Decision 3: Check Generic User’s KVM Port Permissions .................. 27
Decision 4: Check User’s Default Permissions .................................... 28
Decision 5: Check Group’s Default Permissions .................................. 28
Decision 6: Check Generic User’s Default Permissions ....................... 29

Server Access: Inband and Out of Band ....................................................... 29

Determining the Connection Type and its Supported Functionality ........ 31

Administering Users of Connected Servers .................................................. 33

Types of Access to Ports ........................................................................... 33
Tasks Related to Access to Connected Devices ....................................... 33

Redefining Keyboard Shortcuts (Hot Keys) ................................................. 35

Redefining KVM Connection Hot Keys ................................................... 35
Redefining Sun Keyboard Equivalent Hot Keys ...................................... 35
Summary of Tasks for Redefining Hot Keys ............................................ 36

Disabling Mouse Acceleration ...................................................................... 36
Screen Resolution and Refresh Rate ............................................................. 37

Packet Filtering on the KVM/net .............................................................. 38

Power Management ...................................................................................... 40

Options for Managing Power .................................................................... 40

Controlling Power Through the Web Manager IPDU Power Management
Forms .................................................................................................... 41
Controlling Power While Connected to KVM Ports ............................ 41

Setting Up and Configuring Power Management ..................................... 42

Security ......................................................................................................... 44

Security Profiles ........................................................................................ 44
Encryption ................................................................................................. 45
Authentication ........................................................................................... 45

Choosing Among Authentication Methods .......................................... 45
Tools for Specifying Authentication Methods ...................................... 48

Lockout Macro .......................................................................................... 49

Notifications, Alarms, and Data Buffering ................................................... 53

Syslog Servers ........................................................................................... 54

Prerequisites for Logging to Syslog Servers ......................................... 54
Facility Numbers for Syslog Messages ................................................. 54
Example of Using Facility Numbers ..................................................... 54

SNMP Traps .............................................................................................. 55
Configuring Logging, Alarms, and SNMP Traps ..................................... 55

VPN and the KVM/net ................................................................................. 56

Advertising