Rose electronic CrystalView Network Card User Manual


 
INTRODUCTION
CRYSTALVIEW INSTALLATION AND OPERATIONS MANUAL
1
Disclaimer
While every precaution has been taken in the preparation of this
manual, the manufacturer assumes no responsibility for errors or
omissions. Neither does the manufacturer assume any liability for
damages resulting from the use of the information contained herein.
The manufacturer reserves the right to change the specifications,
functions, or circuitry of the product without notice.
The manufacturer cannot accept liability for damages due to misuse
of the product or other circumstances outside the manufacturer’s
control. The manufacturer will not be responsible for any loss,
damage, or injury arising directly or indirectly from the use of this
product.
System introduction
Thank you for choosing the Rose Electronics
CrystalView KVM
station extender. The CrystalView is the result of Rose Electronics
commitment to providing state-of-the-art solutions for today’s
demanding workplace. The CrystalView has proven to be a
valuable investment for any business, big or small, that has a need
to access CPUs from Remote locations.
The CrystalView is available in four models, the PC, SUN, MINI and
the PC-Serial/Audio model. All models are available in a single or
dual version. The dual version allows an additional KVM station to
be connected to the Local Unit.
The CrystalView system consists of two Units, a Local Unit and a
Remote Unit. The Local Unit connects to your CPU or a Rose
switch and the Remote Unit connects to a keyboard, video monitor
and mouse or KVM station. The Local and Remote Units are
connected together with industry standard CAT-5 shielded or
unshielded, solid core twisted-pair cable terminated with RJ45
connectors. The PC, SUN, and PC-Serial/Audio models can extend
the distance from the CPU with up to 1,000 feet of CAT-5 cable.
The MINI model has a distance of 150 feet. CAT-5 cable can be
ordered from Rose Electronics in 25-1,000 foot lengths.
Using the CrystalView to remotely access your computer has
several applications that make it convenient for the users. You can
locate your computers in a secure area and access them from other
unsecured areas. Computers used in hazardous industrial
environments can be accessed remotely, keeping the users safe
and unexposed to any hazards.