Raritan Engineering KX2-832 Switch User Manual


 
Appendix D: FAQs
305
The encryption level that is autonegotiated is dependent on the browser
in use.
Manageability
Can the Dominion KX II be remotely managed and configured via
web browser?
Yes, the Dominion KX II can be completely configured remotely via web
browser. Note that this does require that the workstation have an
appropriate Java Runtime Environment (JRE) version installed.
Besides the initial setting of the Dominion KX II's IP address, everything
about the solution can be completely set up over the network. (In fact,
using a crossover Ethernet cable and the Dominion KX II's default IP
address, you can even configure the initial settings via web browser.)
Can I backup and restore the Dominion KX II's configuration?
Yes, the Dominion KX II's device and user configurations can be
completely backed up for later restoration in the event of a catastrophe.
The Dominion KX II's backup and restore functionality can be used
remotely over the network or via the Remote Console.
What auditing or logging does the Dominion KX II offer?
For complete accountability, the Dominion KX II logs all major user and
system events with a date and time stamp. For instance, reported events
include (but are not limited to): user login, user log off, user access of a
particular server, unsuccessful login, configuration changes, and so forth.
Can the Dominion KX II integrate with Syslog?
Yes. In addition to the Dominion KX II's own internal logging capabilities,
the Dominion KX II can send all logged events to a centralized Syslog
server.
Can the Dominion KX II integrate with SNMP?
Yes. In addition to the Dominion KX II's own internal logging capabilities,
the Dominion KX II can send SNMP traps to SNMP management
systems like HP Openview and Raritan's CC-NOC.
Can the Dominion KX II's internal clock be synchronized with a
timeserver?
Yes, the Dominion KX II supports the industry-standard NTP protocol for
synchronization with either a corporate timeserver or with any public
timeserver (assuming that outbound NTP requests are allowed through
the corporate firewall).