background image

Section 5                                                                         IP Access Configuration & Operation

 

68 

 

Event Log 

 

 

Important events like a login failure or a firmware update are logged to a selection of logging 

destinations.  Each  of  those  events  belongs  to  an  event  group,  which  can  be  activated 

separately. 

 

In  the  Event  Log  Settings  you  can  choose  how  many  log  entries  are  shown  on  each  page. 

Furthermore, you can clear the log file here. 

 

List logging enabled 

The common way to log events is to use the internal log list of the U8/16-IP. To show the log 

list, click on Event Log on the Maintenance page. 

 

Since the U8/16-IP’s system memory is used to save all the information, the maximum number 

of  possible  log  list  entries  is  restricted  to  1000  events.  Every  entry  that  exceeds  this  limit 

overrides the oldest one.   

 

NFS Logging enabled 

Defines an NFS server to write all logging data to a file that is located there. To write logging 

data from multiple U8/16-IP units to only one NFS share, you have to define a file name that is 

unique for each device. When you change the NFS settings and press Apply, the NFS share 

will  be  mounted  immediately.  That  means,  the  NFS  share  and  the  NFS  server  must  be  filled 

with valid sources or you will get an error.  

 

Note:

 If the reset button on the HTML front end is used to restart the U8/16-IP all logging 

information is saved permanently and is available after the U8/16-IP has been started. If the 

U8/16-IP loses power or a hard reset is performed, all logging data will be lost. To avoid this, 

use one of the log methods described below.

 

Section 5                                                                         IP Access Configuration & Operation

 

69 

 

SMTP Logging enabled 

With this option, the U8/16-IP is able to send Emails to an address given by the Email address 

text  field  in  the  Event  Log  Settings.  These  mails  contain  the  same  description  strings  as  the 

internal log file and the mail subject is filled with the event group of the occurred log event. In 

order to use this log destination you have to specify an SMTP server that has to be reachable 

from the U8/16-IP and that needs no authentication at all (<serverip>:<port>). 

 

SNMP Logging enabled 

If this is activated, the U8/16-IP sends an SNMP trap to a specified destination IP address every 

time  a  log  event  occurs.  If  the  receiver  requires  a  community  string,  you  can  set  it  in  the 

appropriate  text  field.  Most  of  the  event  traps  only  contain  one  descriptive  string  with  all 

information about the log event. Only authentication and host power events have a trap class 

that  consists  of  several  fields  with  detailed  information  about  the  occurred  event.  To  receive 

these SNMP traps, any SNMP trap listener may be used. 

 

 

Warning In contrast to the internal log file on the U8/16-IP, the size of the NFS log file is not 

limited. Every log event will be appended to the end of the file so it grows continuously, so you 

may have to delete it or move it from time to time. 

Summary of Contents for 32530

Page 1: ...he required optional IP or Cat 5 access modules can be purchased separately and are simply installed into the back of a U8 16 Modular KVM Switch This manual also covers the KVM Switch U8 16 C another...

Page 2: ...witch Operation 13 3 2 Keyboard Hotkey Selection 15 3 3 On Screen Display Menu OSD Port Selection 17 Section 4 19 4 1 Cat 5 KVM Extender Features 20 4 2 Cat 5 KVM Extender Installation 20 4 3 Cat 5 KV...

Page 3: ...6 IP Local Console Remote Access Remote local control of multiple computers Section 1 Introducing the U8 16 IP 5 The U8 16 IP provides a non intrusive solution for remote access and control because th...

Page 4: ...ically restored when switching between computers LED Display for easy status monitoring Buzzer sound for port switching confirmation Uses special single connector USB PS 2 VGA KVM cables with 15 Way H...

Page 5: ...or the attached computer is not switched on Shift Button This button allows ports 9 to 16 to be selected Bank Select Button Pressing this button switches banks and allows the computers connected to sl...

Page 6: ...to the console ports of the U8 16 MASTER KVM Switch Step 2 Connect the first Slave Use the daisy chain cable to connect the daisy chain port of the MASTER previous KVM Switch and the other end to the...

Page 7: ...itch without having to power it off as long as it is currently not connected to the console In most cases the PS 2 mouse and keyboard signals will be maintained and will not be lost b The mouse driver...

Page 8: ...the keyboard is in hotkey mode If you have not pressed any key in hotkey mode within 2 seconds the keyboard will return back to Operating System control status For the U series KVM switches it is pos...

Page 9: ...your password a STATUS OSD display will be displayed System 02 102 Bank 1 Port 02 System PC name Scroll Lock recent hotkey 02 selected port Auto LOGOUT function During normal operation if no input fro...

Page 10: ...users and their passwords For both up to 8 characters can be used Select 05 ACCESS LIST for Supervisor only to assign access restrictions to users for certain ports Default setting is no access restr...

Page 11: ...ing the dedicated KVM system cable included with the Cat 5 KVM Extender Finally connect the Cat 5 5e 6 cable and the power supply unit The KVM cable provided can be used to connect either PS 2 or USB...

Page 12: ...U processing time Transporting large amounts of data over TCP IP requires a high bandwidth connection Limited bandwidth may restrict or limit the possible screen resolutions and colour depths which ca...

Page 13: ...Type config and press the Enter key Wait a few seconds for the configuration information to appear As you proceed the following questions will appear on the screen To accept the default values shown i...

Page 14: ...o the keyboard settings Remote Mouse Settings A common problem with KVM devices is the synchronization between the local and remote mouse cursors The U8 16 IP addresses this problem with an intelligen...

Page 15: ...Mode where only the remote mouse pointer is visible Activate this mode in the open Remote Console and click into the window area The local mouse pointer will be hidden and the remote one can be contro...

Page 16: ...e host system using a securely encrypted connection you need a browser that supports the HTTPS protocol Strong security is only assured by using a key length of 128 Bit Some older browsers do not have...

Page 17: ...that runs over this connection is neither HTTP nor HTTPS but RFB Remote Frame Buffer Protocol RFB needs to establish a connection to port number 443 Your local network environment has to allow this c...

Page 18: ...menu A short description of the each of the options follows Monitor Only Toggles the Monitor only filter on or off If the filter is switched on no remote console interaction is possible but monitoring...

Page 19: ...es Reset all settings to the factory made defaults Save Changes Save changes permanently Section 5 IP Access Configuration Operation 37 Undo Changes Restore last settings Soft Keyboard Opens up the su...

Page 20: ...oding is enabled a value in brackets displays the compressed transfer rate For more information about Monitor Only and Exclusive Access settings see the relevant sections on page 35 Section 5 IP Acces...

Page 21: ...t interface is entirely controlled with the appropriate functions of the web interface Once you have successfully logged into the U8 16 IP a command line will be presented and you can enter management...

Page 22: ...output in the specified output file tmp floppy image Adjust both parameters exactly to your needs input device etc Section 5 IP Access Configuration Operation 43 Windows Windows users should use the t...

Page 23: ...our hard disk For example with Nero choose Copy and Backup Then navigate to the Copy Disc section Select the CD ROM or DVD drive you would like to create an image from Specify the filename of the imag...

Page 24: ...SAMBA SAMBA must be set up properly You may either edit the SAMBA configuration file etc samba smb conf or use the Samba Web Administration Tool SWAT or WebMin to set the correct parameters Section 5...

Page 25: ...tion 49 1 Choose the drive you wish to redirect from the drop down list Enter your user name and password and click OK 2 Access the host computer from the Remote Console window You will see that the r...

Page 26: ...r account has only the permission to open and use the Remote Console The default password for both accounts is pass Ensure you change the passwords as soon as you have installed and accessed the U8 16...

Page 27: ...timized adjustment of compression and colour depth for the indicated network speed Section 5 IP Access Configuration Operation 53 Manually Allows adjustment of both compression rate and colour depth i...

Page 28: ...ly catching this keystroke already Typical examples are Control Alt Delete in Windows and DOS which is always caught or Control Backspace on Linux for terminating the X Server The syntax to define a n...

Page 29: ...nput signal A large filter setting needs less network traffic and leads to a faster video display but small changes in some display regions may not be recognized immediately A small filter displays al...

Page 30: ...ion The maximum network traffic generated through the U8 16 IP s Ethernet device Value in Kbit s Enable Telnet access Set this option to allow access to ARA express using the Telnet Gateway see the Se...

Page 31: ...rver Check time The U8 16 IP registers itself in the Dynamic DNS server at this time Check interval This is the interval for reporting again to the Dynamic DNS server by the U8 16 IP Section 5 IP Acce...

Page 32: ...n machine with the Download CSR button see the illustration on the next page 2 Send the saved CSR to a CA for certification You will get the new certificate from the CA after a more or less complicate...

Page 33: ...needs to be connected to the serial interface of the U8 16 IP Connecting to the U8 16 IP using a telephone line allows you to set up a dedicated point to point connection from your console computer to...

Page 34: ...virtually every IP address is possible but you must make sure it is not interfering with the IP settings of the U8 16 IP switch and your console computer The default value will work in most cases Pas...

Page 35: ...and is available after the U8 16 IP has been started If the U8 16 IP loses power or a hard reset is performed all logging data will be lost To avoid this use one of the log methods described below Se...

Page 36: ...ser s its IP address from which host the user comes from and its activity status is displayed RC means that the Remote Console is open If the Remote Console is opened in exclusive mode the term exclus...

Page 37: ...the appearance of the web interface is correct To do this in Internet Explorer select Tools Internet Options General Delete Files Tick the check box Delete all offline content and click OK Tip Should...

Page 38: ...guarantee that the U8 16 IP will work with all known mice especially those developed and produced after the U8 16 IP s introduction Avoid moving the mouse or pressing the mouse buttons when switching...

Page 39: ...F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 PRINTSCREEN SCROLL LOCK BREAK INSERT HOME PAGE UP DELETE END PAGE DOWN UP LEFT DOWN RIGHT NUM LOCK NUMPAD0 NUMPAD1 NUMPAD2 NUMPAD3 NUMPAD4 NUMPAD5 NUMPAD6 NUMPAD...

Page 40: ...pour le recyclage de tout quipement lectrique et lectronique Chaque Etat membre de l Union Europ enne a mis en application la nouvelle r glementation WEEE de mani res l g rement diff rentes Veuillez...

Reviews: