Slk Configurations; Connecting To The Same Network And Switch As The Server; Figure 2-1. Connecting To The Same Network And Switch As The Server - Lantronix SecureLinx SLK Series User Manual

Table of Contents

Advertisement

Introduction
users/passwords and upgradeable public-key certificates. VPN and SSH environments
can be used to provide external encryption to support existing security policies. In addi-
tion, the SLK provides "Turtle Mode" and "Stealth Mode." These automated security
features serve to hide the SLK on a network and provide the ability to shut down the
SLK if it is attacked by hackers.
Superior Performance
SecureLinx SLK Remote KVMs deliver unparalleled performance through state-of-the-
art compression algorithms, low bandwidth consumption, and high-performance mouse
tracking and synchronization. They also monitor servers and notify users if a connected
server encounters problems.
Easy Setup
SecureLinx SLK Remote KVMs offer true plug-and-play simplicity. They are compatible
with most KVM switches and operating systems.
Configuration is performed through an intuitive web interface, with point-and-click
access to all servers through a web browser.

SLK Configurations

The following sections illustrate the various network configurations in which the SLKs
can be used.

Connecting to the Same Network and Switch as the Server

Figure 2-1

Figure 2-1. Connecting to the Same Network and Switch as the Server

2-4
shows an SLK connected to the same Ethernet and Switch as the server.
SecureLinx SLK Remote KVM

Advertisement

Table of Contents
loading

This manual is also suitable for:

Securelinx slk1Securelinx slk8Securelinx slk16

Table of Contents