background image

get

ting

st

ar

ted

wel

c

ome



r

t

er

in

orma

tion

40

t

e

mana

ger

t

e

c

onnect

or

Appendix 1 - What are Secure Tickets?

The ADDER.NET application has been created to achieve a 
sensible balance between usability, flexibility and security. It 
needs to provide a quick and easy method for registered users 
to access a wide range of host computers while maintaining 
complete enterprise-level security. One of the unique solutions 
employed to make this possible is the system of Secure Tickets. 
On request, ADDER.NET will issue a time-restricted access 
permission to an eligible user, which permits KVM connection 
to a specific host. ADDER.NET also maintains a complete log of 
access attempts so that an audit trail is always available.     

Host

PC

KVM-over-IP

evice

d

ADDER.NET

User

1

2

3

4

5

Access

Log

Host

PC

ADMIT

ONE

ADMIT

ONE

1

 The user’s VNC Viewer 

requests access to a 
specific host computer. 

2

 ADDER.NET sends 

a secure ticket back 
to the user giving 
timed access to the 
host computer.

3

 User’s VNC viewer uses 

the ticket to automatically 
authenticate to the KVM-over-
IP appliance.

4

 A VNC session is 

established that 
provides access to 
the requested host 
computer. 

5

 All activities are 

fully logged within 
ADDER.NET 

Summary of Contents for ADDER.NET

Page 1: ...ADDER NET User Guide ADDER NET DEVICES HOSTS USERS PC PC PC PC KVM over IP device KVM over IP device Version 1 10...

Page 2: ...18 Hosts 18 Managing host entries 20 Host groups 22 Users 25 Adding new users 25 Managing user entries 26 User groups 27 Tools 30 Active Directory Import 31 Active Directory Import Options 32 Active D...

Page 3: ...onstituent parts of a typical KVM over IP system Device Any KVM over IP apparatus that allows remote access to one or more computer systems hosts Device cluster KVM over IP devices can be grouped toge...

Page 4: ...ely using a standard web browser Like all Adder KVM over IP products ADDER NET employs high specification security techniques to ensure that only authorised users may gain access ADDER NET has two mai...

Page 5: ...d requires you to specify how you will address the ADDER NET server when connecting through a browser This ensures that the correct security certificates are generated The system will generate a secur...

Page 6: ...later Firefox v3 1 or later Internet Explorer v7 or later Opera v10 or later Safari v5 or later Logging on The ADDER NET server uses standard HTML to produce a user interface that can be viewed with...

Page 7: ...ed Grey Device appears to be offline White No information is available about the status of this device Getting started with the Manager When commissioning a new installation the starting point usually...

Page 8: ...had its port number changed leave this option at 5900 If a device port number has been altered change this value to match Enter the number of IP addresses to check from the base address or enter the...

Page 9: ...of the device s that you wish to add and click the Add button The selected device s will be shown within the Device Browser page Any new KVM over IP devices will be shown with a white background cont...

Page 10: ...can be added or changed later The Status window initially shows Not acquired until a secure ticket has been configured between ADDER NET and the device Not shown for software servers Enter the relevan...

Page 11: ...word will be used once during the acquisition stage and then discarded from ADDER NET in order to maintain security If a password has not yet been configured within the device the password entered her...

Page 12: ...nal database of the device Not software servers Delete this device Remove the device from the ADDER NET database View log Downloads the status log from the device Not for software servers Advanced con...

Page 13: ...ports a modem connection the baud rate and initialisation strings may be modified here When set to 0 the device will not use DHCP When set to 1 the device will use DHCP When set to 1 the device will u...

Page 14: ...he Search button After a short delay the Device Search page will list all of the devices that match your criteria 5 Click the Manage button adjacent to the name of the required device to view the Devi...

Page 15: ...n Clickable action buttons for each outlet Switch On switch Off and power cycle Altering outlet allocation To alter the allocation of server and KVM devices to the power control outlets of the PCD cli...

Page 16: ...a cluster To create a device cluster 1 On the ADDER NET Manager menu bar place your mouse pointer over Devices and then choose Add Cluster from the drop down list The New Cluster page will be display...

Page 17: ...usters to which they have access are listed To view information for a user user group highlight the name and click the adjacent Manage button 4 When all details have been completed click the Submit Ch...

Page 18: ...locate a particular cluster 2 Click the Manage button adjacent to the required cluster name to display the Cluster Manager page 2 As required enter one or more search criteria for the host group The...

Page 19: ...Manage button see Managing host entries Note When a device is connected to just a single host it is still necessary to extract the single host from the device continued Hosts Hosts are computers that...

Page 20: ...the Device or Cluster to which the host is connected If the chosen device or cluster has more than one port enter either the port number to which the host is connected or the hotkey sequence that wil...

Page 21: ...ge have been completed click the Submit Changes button The details will be stored within the ADDER NET database Connect or SSH Click to link with the host Opens either a VNC window for a KVM connectio...

Page 22: ...t 3 Choose the search logic that you wish to apply Include hosts that meet ANY of your search criteria Include hosts that meet ALL of your search criteria Show hosts that DON T match your search crite...

Page 23: ...s If required one or more Host Groups can be included within other Host Groups to create staged layers of groupings To create a host group 1 On the ADDER NET Manager menu bar place your mouse pointer...

Page 24: ...determine which users and or user groups should be permitted to access this host group Highlight one or more items within the left hand box hold down the CTRL key to select more than one item then cli...

Page 25: ...short delay the Host Group Search page will list all of the groups that match your criteria 5 Click the Manage button adjacent to the name of the required host group to view the Host Group Manager pag...

Page 26: ...ck the Manage button for the required user to see further information Search Allows you to enter various criteria on which to search for a particular user Add Allows you to define the characteristics...

Page 27: ...permission means via the user s membership of a user group or via a target s membership of a host group This section allows you to control which targets this user can access To add a target Click on...

Page 28: ...match your criteria 5 Click the Manage button adjacent to the name of the user to view the User Manager page Click to show a list of all registered users Note can also be used as a wildcard character...

Page 29: ...Add button to transfer them to the right hand box When the list of available targets is long use the filtering tools to reduce the unwanted items within the list The filter box allows the list to be c...

Page 30: ...n all search criteria are in place click the Search button After a short delay the User Group Search page will list all of the user groups that match your criteria 5 Click the Manage button adjacent t...

Page 31: ...in minutes of inactivity after which ADDER NET will automatically logout for security purposes Determines the language that the system will use unless over ridden by user preference See note below Nu...

Page 32: ...ervice this option should be sufficient Bind with username and password If the Bind as Current User option does not work for any reason select this option to specify a username and password that can b...

Page 33: ...lue background until Submit Changes is clicked so that pending changes can be seen The Users and Groups checkboxes allow you to decide whether users and or groups respectively from the folders that ma...

Page 34: ...ate schedule 1 Within the Active Directory Import page click the Schedule automated imports link If one or more import schedules already exist they will be listed Either click the Edit button to chang...

Page 35: ...ER NET for further analysis or reporting Depending on the browser version this may bring up a dialog box asking you to save the file or the browser may produce a textual display of the data which can...

Page 36: ...added devices see note above The address 192 168 1 23 is used to link with KVM devices while 192 168 168 167 is used to communicate with WTI power control devices When adding multiple devices you shou...

Page 37: ...y Include items that meet ANY of your search criteria Include items that meet ALL of your search criteria Show items that DON T match your search criteria 4 When all search criteria are in place click...

Page 38: ...se within Shared mode and can be accessed Device is active in use within Private mode and cannot be accessed Device appears to be offline No information is available about the status of this device To...

Page 39: ...menu bar choose the Preferences option The Preferences page will be displayed 2 Click the Change button adjacent to the required option The chosen option will now allow you to alter its value 3 Alter...

Page 40: ...hority certificate on your computer a link to this is given on the ADDER NET login page I cannot make a connection to the required host Ensure that you have installed the VNC URI client on you compute...

Page 41: ...a time restricted access permission to an eligible user which permits KVM connection to a specific host ADDER NET also maintains a complete log of access attempts so that an audit trail is always avai...

Page 42: ...vice type First S3 version AdderLink IP Gold v2 1 AdderView CATxIP 5000 v1 11 Notes It is recommended that S3 is always used when managing the above devices Connections can still be made with other de...

Page 43: ...e ldif saves a file in the backup directory of the ADDER NET server documents name ldif saves file in the specified directory on server computer directory name ldif saves file on a remote computer in...

Page 44: ...phic keys these are all the files in the keys directory typically C program files adder net keys To fully recover an ADDER NET installation the following steps are necessary 1 Install ADDER NET 2 Stop...

Page 45: ...hin the database 5 Select the required upgrade s The page will display information about the upgrade and will also list all of the registered devices to which this upgrade is applicable If an upgrade...

Page 46: ...necessary to click on Change Settings 3 Select the Exceptions tab In this tab you need to add a total of five new ports each using the following procedure 4 Click the Add port button 5 Fill in Name a...

Page 47: ...ails on how to do this within the AdderView CATxIP 5000 user guide Locate the section entitled Console server configuration and follow it through to the Console server port configuration page where ea...

Page 48: ...uished Name 31 F Favourites list adding to 37 Firewalls configuring 45 Firmware revisions minimums 5 Firmware Upgrades 30 44 G Glossary of terms 2 H Hardware Manager 12 Host groups 22 add new 22 manag...

Page 49: ...ology House Trafalgar Way Bar Hill Cambridge CB23 8SQ United Kingdom Tel 44 0 1954 780044 Fax 44 0 1954 780081 Adder Corporation 350R Merrimac Street Newburyport MA 01950 United States of America Tel...

Reviews: