Usage; Prerequisites - LevelOne ACC-2000 User Manual

Kvm ip console module
Table of Contents

Advertisement

5. Usage

5.1 Prerequisites

The KVM IP Console Module features an embedded operating system and applications
offering a variety of standardized interfaces. This chapter will describe both these
interfaces, and the way to use them in a more detailed manner. The interfaces are
accessed using the TCP/IP protocol family, thus they can be accessed using the LAN port
of the device.
The following interfaces are supported:
HTTP/HTTPS
Full access is provided by the embedded web server. The KVM IP Console Module
environment can be entirely managed using a standard web browser. You can access
the KVM IP Console Module using the insecure HTTP protocol, or using the encrypted
HTTPS protocol. Whenever possible, use HTTPS.
Telnet
A standard Telnet client can be used to access an arbitrary device connected to the KVM
IP Console Module 's serial port via a terminal mode.
The primary interface of the KVM IP Console Module is the HTTP interface. This is
covered extensively in this chapter. Other interfaces are addressed in subtopics.
In order to use the Remote Console window of your managed host system, the browser
has to come with a Java Runtime Environment version 1.4.2 or above. If the browser has
no Java support (such as on a small handheld device), you are still able to maintain your
KVM IP Console Module using the administration forms displayed by the browser itself.
For an insecure connection to the KVM IP Console Module, we can recommend the
following browsers:
• Microsoft Internet Explorer version 6.0 or higher on Windows 2000 and Windows XP
• Netscape Navigator 7.0 or Mozilla 1.6 on Windows 2000, Windows XP, Unix, Linux and
UNIX-like Operating Systems
In order to access the remote host system using a securely encrypted connection, you
need a browser that supports the HTTPS protocol. Strong security is only assured by using
a key length of 256 Bit. Some of the old browsers do not have a strong 256 Bit encryption
algorithm.
Using the Internet Explorer, open the menu entry "?" and "Info" to read about the key
length that is currently activated. The dialog box contains a link that leads you to
information on how to upgrade your browser to a state of the art encryption scheme.
Figure 5-1 shows the dialog box presented by the Internet Explorer 6.0.
20 / 87
KVM IP Console Module

Advertisement

Table of Contents
loading

Table of Contents