background image

Section 5                                                                         IP Access Configuration & Operation

 

62 

 

Certificate 

 

 

The  U8/16-IP  uses  the  Secure  Socket  Layer  (SSL)  protocol  for  any  encrypted  network  traffic 

between itself and a connected client. During the connection establishment the U8/16-IP has to 

expose its identity to a client using a cryptographic certificate.  

 

This certificate and the underlying secret key is the same for all U8/16-IP units and certainly will 

not  match  the  network  configuration  that  will  be  applied  to  the  U8/16-IP  by  its  user.  The 

certificate's underlying secret key is also used for securing the SSL handshake. Hence, this is a 

security risk (but far better than no encryption at all). 

 

However,  it  is  possible  to  generate  and  install  a  new  certificate  that  is  unique  for  a  particular 

U8/16-IP. In order to do this, the U8/16-IP is able to generate a new cryptographic key and the 

associated  Certificate  Signing  Request  (CSR)  that  needs  to  be  certified  by  a  certification 

authority (CA). A certification authority verifies that you are the person you claim you are, and 

signs and issues a SSL certificate to you. 

 

The following steps are necessary to create and install an SSL certificate for the U8/16-IP:  

 

1.  Create  an  SSL  Certificate  Signing  Request  using  the  panel  shown  in  the  screen  shot 

above. You need to fill out a number of fields that are explained on the next page. Once 

this  is  done,  click  on  the  Create  button  to  initiate  the  Certificate  Signing  Request 

generation.  The  CSR  can  be  downloaded  to  your  administration  machine  with  the 

Download CSR button (see the illustration on the next page). 

2.  Send the saved CSR to a CA for certification. You will get the new certificate from the CA 

after  a  more  or  less  complicated  traditional  authentication  process  (depending  on  the 

CA). 

3.  Upload the certificate to the U8/16-IP switch using the Upload button. 

Section 5                                                                         IP Access Configuration & Operation

 

63 

 

 

After completing these three steps, the U8/16-IP has its own certificate that is used to identify it 

to its clients. 

 

Common name 

This is the network name of the U8/16-IP once it is installed in the user's network It is identical 

to  the  name  that  is  used  to  access  the  U8/16-IP  with  a  web  browser  (without  the  “  http://  ” 

prefix). In case the name given here and the actual network name differ, the browser will pop up 

a security warning when the U8/16-IP is accessed using HTTPS. 

 

Organizational unit 

This  field  is  used  for  specifying  to  which  department  within  an  organization  the  U8/16-IP 

belongs. 

 

Organization 

The name of the organization to which the U8/16-IP belongs. 

 

Locality/City 

The city where the organization is located. 

 

State/Province 

The state or province where the organization is located. 

 

Country (ISO code) 

The  country  where  the  organization  is  located.  This  is  the  two-letter  ISO  code,  e.g.  DE  for 

Germany, or US for the USA. 

 

Challenge Password 

Some certification authorities require a challenge  password to authorize later changes  on the 

certificate  (e.g.  revocation  of  the  certificate).  The  minimal  length  of  this  password  is  4 

characters. 

 

Note:

 If you destroy the CSR on the U8/16-IP there is no way to get it back! In case you 

deleted it by mistake, you have to repeat the three steps as described previously. 

Summary of Contents for 32530

Page 1: ...he required optional IP or Cat 5 access modules can be purchased separately and are simply installed into the back of a U8 16 Modular KVM Switch This manual also covers the KVM Switch U8 16 C another...

Page 2: ...witch Operation 13 3 2 Keyboard Hotkey Selection 15 3 3 On Screen Display Menu OSD Port Selection 17 Section 4 19 4 1 Cat 5 KVM Extender Features 20 4 2 Cat 5 KVM Extender Installation 20 4 3 Cat 5 KV...

Page 3: ...6 IP Local Console Remote Access Remote local control of multiple computers Section 1 Introducing the U8 16 IP 5 The U8 16 IP provides a non intrusive solution for remote access and control because th...

Page 4: ...ically restored when switching between computers LED Display for easy status monitoring Buzzer sound for port switching confirmation Uses special single connector USB PS 2 VGA KVM cables with 15 Way H...

Page 5: ...or the attached computer is not switched on Shift Button This button allows ports 9 to 16 to be selected Bank Select Button Pressing this button switches banks and allows the computers connected to sl...

Page 6: ...to the console ports of the U8 16 MASTER KVM Switch Step 2 Connect the first Slave Use the daisy chain cable to connect the daisy chain port of the MASTER previous KVM Switch and the other end to the...

Page 7: ...itch without having to power it off as long as it is currently not connected to the console In most cases the PS 2 mouse and keyboard signals will be maintained and will not be lost b The mouse driver...

Page 8: ...the keyboard is in hotkey mode If you have not pressed any key in hotkey mode within 2 seconds the keyboard will return back to Operating System control status For the U series KVM switches it is pos...

Page 9: ...your password a STATUS OSD display will be displayed System 02 102 Bank 1 Port 02 System PC name Scroll Lock recent hotkey 02 selected port Auto LOGOUT function During normal operation if no input fro...

Page 10: ...users and their passwords For both up to 8 characters can be used Select 05 ACCESS LIST for Supervisor only to assign access restrictions to users for certain ports Default setting is no access restr...

Page 11: ...ing the dedicated KVM system cable included with the Cat 5 KVM Extender Finally connect the Cat 5 5e 6 cable and the power supply unit The KVM cable provided can be used to connect either PS 2 or USB...

Page 12: ...U processing time Transporting large amounts of data over TCP IP requires a high bandwidth connection Limited bandwidth may restrict or limit the possible screen resolutions and colour depths which ca...

Page 13: ...Type config and press the Enter key Wait a few seconds for the configuration information to appear As you proceed the following questions will appear on the screen To accept the default values shown i...

Page 14: ...o the keyboard settings Remote Mouse Settings A common problem with KVM devices is the synchronization between the local and remote mouse cursors The U8 16 IP addresses this problem with an intelligen...

Page 15: ...Mode where only the remote mouse pointer is visible Activate this mode in the open Remote Console and click into the window area The local mouse pointer will be hidden and the remote one can be contro...

Page 16: ...e host system using a securely encrypted connection you need a browser that supports the HTTPS protocol Strong security is only assured by using a key length of 128 Bit Some older browsers do not have...

Page 17: ...that runs over this connection is neither HTTP nor HTTPS but RFB Remote Frame Buffer Protocol RFB needs to establish a connection to port number 443 Your local network environment has to allow this c...

Page 18: ...menu A short description of the each of the options follows Monitor Only Toggles the Monitor only filter on or off If the filter is switched on no remote console interaction is possible but monitoring...

Page 19: ...es Reset all settings to the factory made defaults Save Changes Save changes permanently Section 5 IP Access Configuration Operation 37 Undo Changes Restore last settings Soft Keyboard Opens up the su...

Page 20: ...oding is enabled a value in brackets displays the compressed transfer rate For more information about Monitor Only and Exclusive Access settings see the relevant sections on page 35 Section 5 IP Acces...

Page 21: ...t interface is entirely controlled with the appropriate functions of the web interface Once you have successfully logged into the U8 16 IP a command line will be presented and you can enter management...

Page 22: ...output in the specified output file tmp floppy image Adjust both parameters exactly to your needs input device etc Section 5 IP Access Configuration Operation 43 Windows Windows users should use the t...

Page 23: ...our hard disk For example with Nero choose Copy and Backup Then navigate to the Copy Disc section Select the CD ROM or DVD drive you would like to create an image from Specify the filename of the imag...

Page 24: ...SAMBA SAMBA must be set up properly You may either edit the SAMBA configuration file etc samba smb conf or use the Samba Web Administration Tool SWAT or WebMin to set the correct parameters Section 5...

Page 25: ...tion 49 1 Choose the drive you wish to redirect from the drop down list Enter your user name and password and click OK 2 Access the host computer from the Remote Console window You will see that the r...

Page 26: ...r account has only the permission to open and use the Remote Console The default password for both accounts is pass Ensure you change the passwords as soon as you have installed and accessed the U8 16...

Page 27: ...timized adjustment of compression and colour depth for the indicated network speed Section 5 IP Access Configuration Operation 53 Manually Allows adjustment of both compression rate and colour depth i...

Page 28: ...ly catching this keystroke already Typical examples are Control Alt Delete in Windows and DOS which is always caught or Control Backspace on Linux for terminating the X Server The syntax to define a n...

Page 29: ...nput signal A large filter setting needs less network traffic and leads to a faster video display but small changes in some display regions may not be recognized immediately A small filter displays al...

Page 30: ...ion The maximum network traffic generated through the U8 16 IP s Ethernet device Value in Kbit s Enable Telnet access Set this option to allow access to ARA express using the Telnet Gateway see the Se...

Page 31: ...rver Check time The U8 16 IP registers itself in the Dynamic DNS server at this time Check interval This is the interval for reporting again to the Dynamic DNS server by the U8 16 IP Section 5 IP Acce...

Page 32: ...n machine with the Download CSR button see the illustration on the next page 2 Send the saved CSR to a CA for certification You will get the new certificate from the CA after a more or less complicate...

Page 33: ...needs to be connected to the serial interface of the U8 16 IP Connecting to the U8 16 IP using a telephone line allows you to set up a dedicated point to point connection from your console computer to...

Page 34: ...virtually every IP address is possible but you must make sure it is not interfering with the IP settings of the U8 16 IP switch and your console computer The default value will work in most cases Pas...

Page 35: ...and is available after the U8 16 IP has been started If the U8 16 IP loses power or a hard reset is performed all logging data will be lost To avoid this use one of the log methods described below Se...

Page 36: ...ser s its IP address from which host the user comes from and its activity status is displayed RC means that the Remote Console is open If the Remote Console is opened in exclusive mode the term exclus...

Page 37: ...the appearance of the web interface is correct To do this in Internet Explorer select Tools Internet Options General Delete Files Tick the check box Delete all offline content and click OK Tip Should...

Page 38: ...guarantee that the U8 16 IP will work with all known mice especially those developed and produced after the U8 16 IP s introduction Avoid moving the mouse or pressing the mouse buttons when switching...

Page 39: ...F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 PRINTSCREEN SCROLL LOCK BREAK INSERT HOME PAGE UP DELETE END PAGE DOWN UP LEFT DOWN RIGHT NUM LOCK NUMPAD0 NUMPAD1 NUMPAD2 NUMPAD3 NUMPAD4 NUMPAD5 NUMPAD6 NUMPAD...

Page 40: ...pour le recyclage de tout quipement lectrique et lectronique Chaque Etat membre de l Union Europ enne a mis en application la nouvelle r glementation WEEE de mani res l g rement diff rentes Veuillez...

Reviews: