background image

20

SECURITY CONFIGURATION (CONTINUED)

9.

HTTP Port Number: 80

Use this command to change the HTTP port number.

10.

HTTPS Port Number: 443

Use this command to change the HTTPS port number.

11.

Reset Web Server

Use this command to reset the web server.

12.

Idle Logout Time (Minutes): 30

Idle logout time is set in minutes. To change, enter new number of minutes.

13.

Telnet Server Port Number: 23

To change, enter new telnet server port number.

14.

Java Viewer Port Number (Clear): 123

To change, enter new java viewer port number.

15.

Java Viewer Port Number (SSL): 124

To change, enter new java viewer port number.

16.–20. Setting User Passwords (+ User #1, + User #2, etc.)

Choose these options to get to the “User settings” sub-menu (Fig. 16). This

process applies to all of the users that you will create for the Unit.

USER SETTINGS SUB-MENU
Flags
Not only is the administrator responsible for assigning user passwords and names, in

the “Flags” section, the administrator chooses how much authority to give the user.
Normal
“Normal” means the user can log in and use the Unit with full privileges.

Fig. 16
View Only
“View only” means the user can watch what the server is doing but cannot send

keyboard and mouse commands.

Disabled
In the “Disabled” mode, the Unit will not accept the login name or user ID.
To enable the new user name, you must change the value to “Normal” or

“View Only”.

User X Name: 

UserX

User X Password: 

******

User X Flags:

Normal

P74045-B-F1DE101N-man.qxd  5/21/02  4:11 PM  Page 20

Summary of Contents for OmniView F1DE101N

Page 1: ...13 OmniView Remote IP Console ENTERPRISE Series F1DE101N User Manual ...

Page 2: ...tallation 9 11 Local Console Operation 12 Network Configuration 13 Network Setup 14 Monitoring Settings 15 17 Security Configuration 18 20 Serial Port Functions 21 24 Virtual Network Computer 25 Browser Configuration 26 27 Security Settings 28 Remote Administration 29 30 Troubleshooting 31 32 Warranty FCC and CE Statements 33 ...

Page 3: ...t is a powerful yet easy to install and use remote solution that surpasses all other solutions with advanced features and functionality This manual will provide all the details you ll need about the Unit from installation to operation and troubleshooting in the unlikely event of a problem Thank you for purchasing the OmniView ENTERPRISE Series Remote IP Console We appreciate your business and are ...

Page 4: ...rotocol Internet Protocol used for data transmission over the Internet SMTP Simple Mail Transfer Protocol used in sending and receiving e mail UDP User Datagram Protocol offers a limited amount of service when messages are exchanged between computers in a network that uses the IP HTTPS Hyper Text Transfer Protocol over Secure socket layer encrypts and decrypts user page requests as well as the pag...

Page 5: ...te mouse keyboard and monitor The local port allows you to directly access and view the connected computer or KVM switch The Unit senses the controlled computer s video mode and digitizes and compresses the video using a proprietary compression algorithm It then sends the video to the local and remote consoles From the remote console the mouse and keyboard data is encrypted using 128 bit SSL and i...

Page 6: ...irtual Network Computing VNC for console interface One local port for direct keyboard video and mouse access to your server 128 bit SSL encryption 3 levels of security Relaxed Stealth and Turtle modes IntelliView On Screen Display OSD Flash upgradeability 10 user passwords Automatic server monitoring and notification Serial port monitoring and switching capability for serial devices SNMP compliant...

Page 7: ...Del doesn t work as well as access BIOS and make adjustments Security is guarded by multiple users passwords SSL encryption secure web control interface and public key certificate support for authentication optional in addition to passwords For use on the public Internet a number of specialized security features include Up to 10 unique passwords users Stealth mode prevents port scans and other net...

Page 8: ...onitor port HDDB15 male male with thumbscrews 16 PS 2 connector for keyboard 6 pin miniDIN female on the Unit for local console keyboard 17 PS 2 connector for mouse 6 pin miniDIN female on the Unit for local console mouse 18 VGA connector for monitor HDDB15 female on the Unit for local console monitor 19 Local Console Keyboard 20 Local Console Mouse 21 Local Console Monitor 22 Serial port 2 used f...

Page 9: ...CONNECTION DIAGRAM CONTINUED 7 Fig 1 Controlled Computer Power Source Local Console Monitor Local Console Mouse Local Console Keyboard Serial 1 Network A C in Reset Monitor Videos Serial 2 ...

Page 10: ...r used to create session keys and seed values 128 bit or 56 bit encryption for SSL v2 Supports RC4 and DES algorithms SPECIFICATION Part No F1DE101N Power 100 240VAC 50 60Hz 1A Max Number of Servers 256 Servers with KVM Network Connection 10 100Base T connection standard RJ45 connector Keyboard Emulation PS 2 Mouse Emulation PS 2 Monitors Supported Supports all VESA graphics modes and text modes M...

Page 11: ...uded brackets to the side of the Unit with the provided Phillips screws Fig 2 3 Mount the Unit to the rack rail assembly Note Mounting screws for the rack are not included Please use the specified screws from your rack s manufacturer Cautions and Warnings Before attempting to connect anything to the Unit or your computer s please ensure that everything is powered off Belkin Components is not respo...

Page 12: ...sing the provided PS 2 KVM Cable Kit connect one end of the VGA and PS 2 cables to your server Connect the other end to the CPU KVM ports on the back of the Unit Fig 4 Fig 4 CPU KVM Console Reset Serial 02 Serial 01 Network HARDWARE INSTALLATION CONTINUED 10 1 2 3 4 5 6 7 8 9 0 num lock cap lock pg up return shift clt alt delete P L K 0 9 8 PG UP PG DN HOME HELP CAPS ESC OPT PC F9 F10 F11 7 6 5 4 ...

Page 13: ...RK Connect the Unit to the network using RJ45 Category 5 network cable Fig 6 Fig 6 POWERING UP THE UNIT Attach the IEC power cable to the power connector located on the rear of the Unit Fig 7 CPU KVM Console Reset Serial 02 Serial 01 Network console USB flash bank select reset PS 2 daisy chain OUT daisy chain IN CPU 01 02 CPU 03 04 CPU 05 06 CPU 07 08 90 264 VAC 47 63 Hz 1 2 3 4 CPU KVM Console Re...

Page 14: ...ress Enter to change a value Use the left arrow key to return to the root menu Use the right arrow key to advance to a sub menu Single Server Mode The Unit can be connected directly to a single computer as shown in Fig 8 To configure the Unit you must connect a keyboard monitor and a mouse to the Unit s local ports After setup you may leave the local port connected or unconnected Fig 8 ENTERPRISE ...

Page 15: ...this example the Unit will continue to monitor the servers even if the firewall fails or the connection to the firewall goes down as shown in Fig 9 Fig 9 The Unit and server connected to different hubs as shown in Fig 10 Fig 10 Another application for the Unit would be to connect a computer that does not have a network connection on the Web as shown in Fig 11 Firewall Server 1 Server 2 Server 3 Se...

Page 16: ...text string identifies this machine To change the machine name type in a new name up to 15 characters long 3 Accessing the Ethernet Address MAC Address This is the hardware address of the Ethernet interface on the Unit It is assigned by the factory to uniquely identify this Unit and it cannot be changed You may need this number to configure other software on your network such as DHCP servers hubs ...

Page 17: ...il address used in outgoing e mail when the monitoring function detects a failure 2 SMTP Relay Destination IP Address The SMTP relay destination is the IP address numeric for the SMTP server to use to send the e mail This server must be willing to relay to the above e mail address or else be the mail server for that domain Disable this by setting address to 0 0 0 0 Monitoring settings 1 Alert emai...

Page 18: ...DPMS may trigger this falsely To enable select Yes To disable select No 7 Alert If No NumLock Toggle If this is enabled then the Unit will simulate the Num Lock key being pressed regularly every few seconds If at any time the Num Lock light does not toggle in response to a Num Lock key press then the software on the controlled computer is assumed to have crashed and this error condition will be ac...

Page 19: ...address does not need to be the controlled computer but might be a border router or other important component of your network To enable enter an IP address to ping To disable use 0 0 0 0 14 HTTP Ping This Address The number designated for HTTP pings of addresses should be an IP address of a web HTTP server The server will be asked to get the root page If nothing is returned zero length or the conn...

Page 20: ...It requires all connections to use encryption Passwords are not visible to network sniffers but the Unit does not try to conceal its presence on the network For Use on the Public Internet This is the recommended setting if the Unit is outside of a firewall and is visible to the public Internet Non standard values are used for web server TCP IP ports 8888 for HTTP 4444 for HTTPS but you should chan...

Page 21: ...rver port number should be changed from the default as well user configurable Operation of the Unit by legitimate users who know both the IP address and web server port number will be as normal However outsiders who might be searching for the Unit will not be able to detect it on the network unless they correctly guess both the IP address and port number SECURITY SETTINGS 1 Change Overall Security...

Page 22: ...20 Setting User Passwords User 1 User 2 etc Choose these options to get to the User settings sub menu Fig 16 This process applies to all of the users that you will create for the Unit USER SETTINGS SUB MENU Flags Not only is the administrator responsible for assigning user passwords and names in the Flags section the administrator chooses how much authority to give the user Normal Normal means the...

Page 23: ... See Monitoring Settings section to configure what happens with the alert Watchdog timeout Period of time during which a matching string must be seen before an error condition is considered to have occurred Used only with Watchdog mode Alert if missing 4 Power Control connects to a serial device to turn off on power to the controlled device This feature is ideal for controlling power bars with ser...

Page 24: ...URATION To access the Serial port RS 232 config menu Fig 20 call up the main menu by hitting the appropriate hot key combination the default is Print Screen Print Screen and selecting Serial Port RS 232 config Fig 20 To configure the serial port choose the desired baud rate parity data bits stop bits and hardware flow control configuration Fig 21 Fig 21 Serial port RS 232 config 1 Port 1 Baud rate...

Page 25: ...ll be logged in Watchdog mode If this field is empty then all lines will be logged 6 PX Watchdog Timeout This is the period of time during which a matching string must be seen before an error condition is considered to have occurred It should be used only with Watchdog mode Alert if missing Local User Control To access the Local User Control menu below call up the main menu by hitting the appropri...

Page 26: ...cked out AND the screen is blacked out so a local user cannot see the screen when a remote user is logged in 7 Kill the Power to Attached Host Turns off and on the relay for the power bar that is connected to the breakout cable RJ11 dataprobe 8 Local Port 8 1 1 2 3 4 5 6 7 8 Change local port number 1 8 9 Remote Port 8 1 1 2 3 4 5 6 7 8 Change remote port number 1 8 10 Clear Memory Log Buffer Fig ...

Page 27: ... 2Kbps This is a read only value 4 Max Resolution Expected The initial size of the VNC client window is controlled here Most users will want to leave this control at auto which picks the highest resolution the Unit has ever observed from the server 5 VNC Escape Key The VNC escape key cannot be changed from the local console You must use the web interface instead This key is used to escape normal o...

Page 28: ...This simple text string identifies this machine To change the machine name type in a new name up to 15 characters long Accessing the Ethernet Address MAC Address This is the hardware address of the Ethernet interface on the Unit It is assigned by the factory to uniquely identify this Unit and it cannot be changed You may need this number to configure other software on your network such as DHCP ser...

Page 29: ...nly means the user can watch what the server is doing but cannot send keyboard and mouse commands Disabled In the Disabled mode the Unit will not accept the login name or user ID To enable the new user name you must change the value to Normal or View Only Adjust Time Date Date and time is stored internally in UTC Coordinated Universal Time sometimes called GMT or Zulu time When times are shown in ...

Page 30: ...nsole This does not affect the passwords used for remote access For instructions on creating remote access user names and passwords see page 26 Local User Exclude Explanation of Settings 0 Share access local user can type when the remote user is connected and also controlling the same machine 1 No keyboard local keyboard is locked out when remote user connects 2 Blank screen keyboard local keyboar...

Page 31: ...an also access a log of recent activity The Event Log The log will appear indicating the time level and a brief description of all failed log in attempts Fig 26 Fig 26 Taking Control of the Target Computer Follow the instructions on the Unit s home page to view the current screen contents and take control of the host s keyboard and mouse You can open a new window to view the screen contents or sta...

Page 32: ...lly tunes the video picture for sharpness Send Key s Use this menu to send key combinations commands to the target computer If you press any of these key combinations on the computer running the browser the computer will process the commands locally instead of sending them to the target computer Power Cycle Controls a relay of a power bar connected to the server using an optional breakout cable co...

Page 33: ...y video is being delivered to the Unit 2 From VNC use the optimize video command a Press Print Screen twice quickly b Press A c Wait a second or two for screen re draw This tunes the video settings to what is currently coming from the computer Changing the video cables will affect this tuning This tuning operation is performed automatically whenever the video mode changes so performing this operat...

Page 34: ...oximation of what the new position will look like 1 You can fine tune the position by observing the remote mouse position relative to the VNC local cursor small box When they are precisely aligned on top of each other you should have the optimal screen position The new X Y position will be remembered automatically on this Unit This process may need to be repeated for other video modes When I conne...

Page 35: ...ty period with transportation charges prepaid to the authorized Belkin dealer from whom you purchased the product Proof of purchase may be required This warranty does not apply if the product has been damaged by accident abuse misuse or misapplication if the product has been modified without the written permission of Belkin or if any Belkin serial number has been removed or defaced THE WARRANTY AN...

Page 36: ...34 ...

Page 37: ...en NN10 6GL United Kingdom Tel 44 0 1933 35 2000 Fax 44 0 1933 31 2000 Belkin Components 501 West Walnut Street Compton CA 90220 USA Tel 310 898 1100 Fax 310 898 1111 2002 Belkin Components All rights reserved All trade names are registered trademarks of respective manufacturers listed Belkin Components Ltd 7 Bowen Cresent West Gosford NSW 2250 Australia Tel 61 2 4372 8600 Fax 61 2 4325 4277 P7404...

Reviews: