background image

 

45

 

5.5.7 Event Log  

 

 
Important  events  like  a  login  failure  or  a  firmware  update  are  logged  to  a  selection  of  logging 
destinations.  Each  of  those  events  belongs  to  an  event  group,  which  can  be  activated 
separately. 
 
In  the  Event  Log  Settings  you  can  choose  how  many  log  entries  are  shown  on  each  page. 
Furthermore, you can clear the log file here. 
 
List logging enabled 

 

46

 

The common way to log events is to use the internal log list of the KVM OVER IP SWITCH . To 
show the log list, click on Event Log on the Maintenance page. 
 
Since  the  KVM  OVER  IP  SWITCH  ’s  system  memory  is  used  to  save  all  the  information,  the 
maximum  number  of  possible  log  list  entries  is  restricted  to  1000  events.  Every  entry  that 
exceeds this limit overrides the oldest one. 

 

 
NFS Logging enabled 
Defines  an  NFS server to  write  all  logging data  to  a  file  that  is located  there.  To  write logging 
data from multiple KVM OVER IP SWITCH units to only one NFS share, you have to define a 
file name that is unique for each device. When you change the NFS settings and press Apply
the  NFS share  will be mounted immediately. That means, the NFS share and the  NFS  server 
must be filled with valid sources or you will get an error.  
 
SMTP Logging enabled 
With this option, the KVM OVER IP SWITCH is able to send Emails to an address given by the 
Email  address  text  field  in  the  Event  Log  Settings.  These  mails  contain  the  same  description 
strings as the internal log file and the mail subject is filled with the event group of the occurred 
log event. In order to use this log destination you have to specify an SMTP server that has to be 
reachable  from  the  KVM  OVER  IP  SWITCH  and  that  needs  no  authentication  at  all 
(<serverip>:<port>). 
 
SNMP Logging enabled 
If this is activated, the KVM OVER IP SWITCH sends an SNMP trap to a specified destination 
IP address every time a log event occurs. If the receiver requires a community string, you can 
set it in the appropriate text field. Most of the event traps only contain one descriptive string with 
all information about the log event. Only authentication and host power events have a trap class 
that  consists  of  several  fields  with  detailed  information  about  the  occurred  event.  To  receive 
these SNMP traps, any SNMP trap listener may be used. 

 

 
Warning In contrast to the internal log file on the KVM OVER IP SWITCH , the size of the NFS 
log  file  is  not  limited.  Every  log  event  will  be  appended  to  the  end  of  the  file  so  it  grows 
continuously, so you may have to delete it or move it from time to time. 
 

Note: If the reset button on the HTML front end is used to restart the IP ACCESS KVM 
SWITCH CLASSIC all logging information is saved permanently and is available after the IP 
ACCESS KVM SWITCH CLASSIC has been started. If the IP ACCESS KVM SWITCH 
CLASSIC loses power or a hard reset is performed, all logging data will be lost. To avoid this, 
use one of the log methods described below. 

Содержание 39414

Страница 1: ...certificate for the JAVA applet required to run the JAVA based browser tools to access the KVM Switch Since Oracle has issued the Java 7 51 update unsigned applets cannot be used any further VNC suppo...

Страница 2: ...9 4 USAGE 10 4 1 Prerequisites 10 4 2 Logging In 11 4 2 1 Login to the KVM OVER IP SWITCH 11 4 3 Navigation 12 4 3 1 Remote Console Main Window 13 4 3 2 Remote Console Control Bar 14 4 3 3 Remote Con...

Страница 3: ...ver IP and analogue telephone line requires modem BIOS level access also for remote computers 256 bit SSL encryption SSL Certificate Management No impact on server or network performance Automatically...

Страница 4: ...vides one RJ45 port The ports can be used with a 100Mbps 100Base TX connection or a 10Mbps 10Base T connection The KVM OVER IP SWITCH will sense the connection speed and automatically adjust to the ap...

Страница 5: ...ne has to be configured with the parameters given in this table When configuring with a serial terminal reset the KVM OVER IP SWITCH and immediately press the ESC key You will see some device informat...

Страница 6: ...an be checked using the KVM OVER IP SWITCH web front end 3 4 2 Remote Mouse Settings A common problem with KVM devices is the synchronization between the local and remote mouse cursors The KVM OVER IP...

Страница 7: ...embedded operating system offering a variety of standardized interfaces This section will describe these interfaces and the way to use them in a more detailed manner The interfaces are accessed using...

Страница 8: ...echnological progress The KVM over IP Module its software and firmware are subject to technological progress and are being continuously upgraded accordingly Therefore minor changes compared to the des...

Страница 9: ...English counterpart i e Z Y and Y Z You can circumvent such problems by adjusting the keyboard of your remote system to the same mapping as your local one Also see OSD KVM Settings Keyboard Mouse and...

Страница 10: ...1 2 or higher offers the full list Video Settings Opens a panel for changing the KVM OVER IP SWITCH video settings The KVM OVER IP SWITCH features two different dialogs which influence the video sett...

Страница 11: ...e Remote Console Norm means a standard connection without encryption SSL indicates a secure connection Furthermore both the incoming In and the outgoing Out network traffic are visible in kb s If comp...

Страница 12: ...rd discs CD ROMs and other removable devices like USB sticks can be redirected It is even possible to enable a write support so that for the remote machine it is possible to write data to your local d...

Страница 13: ...command dd if dev cdrom of tmp cdrom image dd reads the entire disc from the device dev cdrom and saves the output in the specified output file tmp cdrom image Adjust both parameters exactly to your...

Страница 14: ...ur client PC you must create an image of your floppy disk which can be uploaded to the KVM OVER IP SWITCH s built in memory UNIX and UNIX like OS To create an image file make use of dd This is one of...

Страница 15: ...em by clicking the Download button Clicking Discard removes the virtual floppy image from the KVM OVER IP SWITCH and from the hosts system 5 2 4 Virtual Drive Options This option allows you to disable...

Страница 16: ...on to see the user information New User name The new user name for the selected account Password The password for the login name It must be at least four characters long Confirm password Confirmation...

Страница 17: ...identical Java Virtual Machine across different platforms The Remote Console software is optimized for Sun JVM versions and offers wider range of functionality when run with JVM The KVM Java applet is...

Страница 18: ...en you will have no remote keyboard access during the boot process of the host If USB and PS 2 are both connected and you selected Auto as host interface then USB will be selected if available otherwi...

Страница 19: ...d Please make sure youtr firewall does not block the relevant ports We have tested Tight VNC that works without any problems Most common VNC viewers can be used however some may use special settings I...

Страница 20: ...aximum network traffic generated through the KVM OVER IP SWITCH s Ethernet device Value in Kbit s Enable Telnet access Set this option to allow access to ARA express using the Telnet Gateway see the S...

Страница 21: ...ing again to the Dynamic DNS server by the KVM OVER IP SWITCH 38 5 5 3 Security Force HTTPS If this option is enabled access to the web front end is only possible using an HTTPS connection The KVM OVE...

Страница 22: ...ation that will be applied to the KVM OVER IP SWITCH by its user The certificate s underlying secret key is also used for securing the SSL handshake Hence this is a security risk but far better than n...

Страница 23: ...you have to repeat the three steps as described previously 42 Confirm Challenge Password Confirmation of the Challenge Password Email The email address of a contact person that is responsible for the...

Страница 24: ...console computer The default value will work in most cases Modem client IP address This IP address will be assigned to your console computer during the PPP handshake Since it is a point to point IP c...

Страница 25: ...Settings These mails contain the same description strings as the internal log file and the mail subject is filled with the event group of the occurred log event In order to use this log destination y...

Страница 26: ...support information This is an XML file with certain customized support information like the serial number etc You can send this information if you contact LINDY technical support It may help us solve...

Страница 27: ...valid firmware file and whether there were any transmission errors In case of any error the Upload Firmware function will be aborted Update January 2014 Due to the large size of these upgrade files th...

Страница 28: ...er name is super and the password is pass Furthermore your browser must be configured to accept cookies Q 004 The Remote Console window can t connect to the KVM OVER IP SWITCH A 004 Possibly a firewal...

Страница 29: ...eds to be disabled 54 7 Key Codes This table shows the key codes used to define keystrokes or hotkeys for several functions Please note that these key codes do not necessarily represent key characters...

Страница 30: ...telephone line modem needed Firmware Upgrade Port 1 x Serial DB9 Pin Max Video Resolution Local 1600 x 1200 Remote 1280 x 1024 OS Compatibility MS Windows family Unix Sum Solaris Linux Mac OSX Browse...

Страница 31: ...over TCP Samba Service source port 162 SNMP over TCP SNMP trap reception port 1024 SNMP over TCP SNMP source port 443 RFB over TCP Remote Keyboard and Mouse data 58 Remark for older versions purchase...

Страница 32: ...tatement Shielded cables must be used with this equipment to maintain compliance with radio frequency energy emission regulations and ensure a suitably high level of immunity to electromagnetic distur...

Отзывы: