Introduction
users/passwords and upgradeable public-key certificates. VPN and SSH environments
can be used to provide external encryption to support existing security policies. In addi-
tion, the SLK provides "Turtle Mode" and "Stealth Mode." These automated security
features serve to hide the SLK on a network and provide the ability to shut down the
SLK if it is attacked by hackers.
Superior Performance
SecureLinx SLK Remote KVMs deliver unparalleled performance through state-of-the-
art compression algorithms, low bandwidth consumption, and high-performance mouse
tracking and synchronization. They also monitor servers and notify users if a connected
server encounters problems.
Easy Setup
SecureLinx SLK Remote KVMs offer true plug-and-play simplicity. They are compatible
with most KVM switches and operating systems.
Configuration is performed through an intuitive web interface, with point-and-click
access to all servers through a web browser.
SLK Configurations
The following sections illustrate the various network configurations in which the SLKs
can be used.
Connecting to the Same Network and Switch as the Server
Figure 2-1
Figure 2-1. Connecting to the Same Network and Switch as the Server
2-4
shows an SLK connected to the same Ethernet and Switch as the server.
SecureLinx SLK Remote KVM