2 usage, 1 prerequisites – Raloy IP Functions for KVM User Manual

Page 9

Advertising
background image

6

2 Usage

2-1 Prerequisites

The IP module features an embedded operating system and applications offering a variety of standardized

interfaces. This chapter will describe both these interfaces, and the way to use them in a more detailed

manner. The interfaces are accessed using the TCP/IP protocol family, thus they can be accessed using the

LAN port of the device.

The following interfaces are supported:

HTTP/HTTPS

Full access is provided by the embedded web server. The IP module environment can be entirely managed

using a standard web browser. You can access the IP module using the insecure HTTP protocol, or using

the encrypted HTTPS protocol. Whenever possible, use HTTPS.

Telnet

A standard Telnet client can be used to access an arbitrary device connected to the IP module’s serial

port via a terminal mode. The primary interface of the IP module is the HTTP interface. This is covered

extensively in this chapter. Other interfaces are addressed in subtopics.

In order to use the Remote Console window of your managed host system, the browser has to come with a

Java Runtime Environment version 1.4.2 or above. If the browser has no Java support (such as on a small

handheld device), you are still able to maintain your IP module using the administration forms displayed by the

browser itself.

Note: We recommend installing a Sun JVM 1.5.0.4.

For an insecure connection to the IP module, we can recommend the following browsers:

■ Microsoft Internet Explorer version 6.0 or higher on Windows 2000 and Windows XP

■ Netscape Navigator 7.0 or Mozilla 1.6 on Windows 2000, Windows XP, Unix, Linux and UNIX-like Operating

Systems

In order to access the remote host system using a securely encrypted connection, you need a browser that

supports the HTTPS protocol. Strong security is only assured by using a key length of 128 Bit. Some of the old

browsers do not have a strong 128 Bit encryption algorithm.

Using the Internet Explorer, open the menu entry “?” and “Info” to read about the key length that is currently

activated. The dialog box contains a link that leads you to information on how to upgrade your browser to a

state of the art encryption scheme. The image below shows the dialog box presented by the Internet Explorer

6.0.

Newer web browsers generally support strong encryption on default.

Advertising