Chapter 3: Using the Web Interface
31
Connecting to target devices
When the
Connections
tab is clicked, the window displays a list of target devices that are directly
connected and daisy chained to the GCM2 or GCM4 appliance and that are connected or daisy
chained to any cascade device. A user creates a KVM session by clicking on the name of a target
device.
Session sharing options
Session sharing can be configured by Admin and other users with Appliance Administrator or User
Administrator rights. The first user with a KVM session with a target device is called the primary
user. If another (secondary) user attempts to start a KVM session the same target device, options
for the secondary user depend on the following two conditions:
•
The access rights of the users
•
Whether an administrator has configured global connection sharing
Automatic Sharing, Exclusive Connections, and Stealth Connections all are configurable
options that require Sharing to be enabled.
For more information about access rights and session types, see "Configuring users and user access
rights" on page 39.
To connect to target devices using the Web interface, complete the following steps:
1.
Log into the Web interface as any user configured for access to one or more target devices. The
Web interface appears with the
Connections
tab active.
2.
Click the name of a target device. A Video Session Viewer information dialog briefly appears
followed by a status dialog.
Table 3.2: Session sharing definitions
Term
Definition
Automatic Sharing
Secondary users can share a KVM session without first requesting permission from
primary users.
Exclusive Connections
Primary users can designate a KVM session as an exclusive connection that cannot
be shared.
Stealth Connections
Stealth connections allow undetected viewing of KVM sessions. Secondary users
with Appliance Administrator rights can create stealth connections to any KVM
session. Secondary users with User Administrator rights can create stealth
connections when their access rights are the same as or higher than the rights of
the primary user. Stealth permissions follow preemption permissions.
Preempt mode
Secondary users with Appliance Administrator rights can preempt sessions.
Secondary users with User Administrator rights can preempt sessions only when
their access rights are the same as or higher than the rights of the primary user.
Содержание 17352GX
Страница 2: ......
Страница 3: ...Global 2x16 Console Manager Global 4x16 Console Manager Installation and User s Guide...
Страница 4: ......
Страница 5: ......
Страница 7: ......
Страница 8: ......
Страница 16: ...xiv Global Console Manager Installation and User s Guide...
Страница 27: ...Chapter 2 Installation 11...
Страница 104: ...88 Global Console Manager Installation and User s Guide...
Страница 122: ...106 Global Console Switch Installer and User Guide Japanese Voluntary Control Council for Interference VCCI statement...
Страница 134: ...118 Global Console Switch Installer and User Guide...
Страница 135: ......
Страница 136: ...43V6037 590527501C...