Raritan Computer TR361 Switch User Manual


 
68 IP-REACH USER MANUAL
QUESTION: ANSWER:
How Is IP-Reach
administration carried
out?
Administrators access IP-Reach through a connected IP-Reach Admin
Console. A simple keyboard driven interface of menus offers
straightforward access to IP-Reach setup and control. User profiles,
security settings, configuration and diagnostics are just a few of the options
available. The IP-Reach Admin Console can be removed from the server
room once initial IP-Reach setup is complete, after which all configuration
may be performed remotely via web browser.
Are there security features
to protect my Target
Servers from an
unauthorized remote
connection?
Yes. IP-Reach provides many layers of security. IP-Reach can be
configured to provide high-level connection authentication and video data
transfer security during a remote session. User names, passwords, private-
keys, and Secure Socket Layer (SSL) 128-bit encryption are all available.
IP-Reach can also function as a RADIUS client. In addition, all Raritan
KVM Switches that feature an On-Screen User Interface (OSUI) come with
a complete security scheme, requiring user name and password access to
Servers as designated by the network administrator.
Can I customize IP-Reach
to enhance performance
relative to my specific
KVM configuration?
Yes. A variety of fine-tuning procedures are available. Automatic Color
calibration, KVM On-Screen Display tuning, and Target Mouse Pointer
adjustments all serve to enhance IP-Reach performance.
Can I customize IP-Reach
to enhance performance
with regard to different
remote access methods
and situations?
Yes. IP-Reach offers a variety of performance enhancements to optimize a
chosen connection method. Color Depth, Progressive Update, and Internet
Flow Control are just a few of the adjustment options available to speed
response time. Color Depth, for example, can be adjusted all the way down
to black and white to decrease the data load during an emergency midnight
modem connection to mission-critical servers over low-bandwidth.
Can I use IP-Reach in a
VPN?
Yes. IP-Reach fits into most any network configuration utilizing standard
TCP/IP. The network administrator simply adds IP-Reach as a node on the
network via the IP-Reach Admin Console.
What is the slowest
connection IP-Reach can
handle?
IP-Reach offers scalable performance based on bandwidth available, down
to 20kbps.
Can I perform a Dial-up
modem connection to IP-
Reach over a PBX line?
No. Modems require an analog telephone line.
Can I use IP-Reach within
my local network?
IP-Reach can be used in any computer network that supports TCP/IP.
When does IP-Reach use
TCP? UDP?
Both TCP and UDP are used by IP-Reach. However, TCP is essential,
whereas UDP is optional.
UDP is used only for one IP-Reach feature, automatic detection (“browse”)
of IP-Reach units in a subnet (see Chapter 3: Raritan Remote Client,
RRC Navigator).
If you do not employ the browse feature (and by extension, are not using
DHCP), then IP-Reach will only communicate using TCP.