Cyclades User's Guide Switch User Manual


 
iv AlterPath KVM/net Installation, Administration, and User’s Guide
Decision 1: Check User’s KVM Port Permissions ...............................26
Decision 2: Check Group’s KVM Port Permissions .............................27
Decision 3: Check Generic User’s KVM Port Permissions ..................27
Decision 4: Check User’s Default Permissions ....................................28
Decision 5: Check Group’s Default Permissions ..................................28
Decision 6: Check Generic User’s Default Permissions .......................29
Server Access: Inband and Out of Band .......................................................29
Determining the Connection Type and its Supported Functionality ........31
Administering Users of Connected Servers ..................................................33
Types of Access to Ports ...........................................................................33
Tasks Related to Access to Connected Devices .......................................33
Redefining Keyboard Shortcuts (Hot Keys) .................................................35
Redefining KVM Connection Hot Keys ...................................................35
Redefining Sun Keyboard Equivalent Hot Keys ......................................35
Summary of Tasks for Redefining Hot Keys ............................................36
Disabling Mouse Acceleration ......................................................................36
Screen Resolution and Refresh Rate .............................................................37
Packet Filtering on the KVM/net ..............................................................38
Power Management ......................................................................................40
Options for Managing Power ....................................................................40
Controlling Power Through the Web Manager IPDU Power Management
Forms ....................................................................................................41
Controlling Power While Connected to KVM Ports ............................41
Setting Up and Configuring Power Management .....................................42
Security .........................................................................................................44
Security Profiles ........................................................................................44
Encryption .................................................................................................45
Authentication ...........................................................................................45
Choosing Among Authentication Methods ..........................................45
Tools for Specifying Authentication Methods ......................................48
Lockout Macro ..........................................................................................49
Notifications, Alarms, and Data Buffering ...................................................53
Syslog Servers ...........................................................................................54
Prerequisites for Logging to Syslog Servers .........................................54
Facility Numbers for Syslog Messages .................................................54
Example of Using Facility Numbers .....................................................54
SNMP Traps ..............................................................................................55
Configuring Logging, Alarms, and SNMP Traps .....................................55
VPN and the KVM/net .................................................................................56