KVM удлинитель DL-Vision(M/S) руководство по настройки устройства

Add to my manuals
92 Pages

advertisement

KVM удлинитель DL-Vision(M/S) руководство по настройки устройства | Manualzz

G&D DL-Vision(M/S)

»Config Panel« Web Application

About this manual

This manual has been carefully compiled and examined to the state-of-the-art.

G&D neither explicitly nor implicitly takes guarantee or responsibility for the quality, efficiency and marketability of the product when used for a certain purpose that differs from the scope of service covered by this manual.

For damages which directly or indirectly result from the use of this manual as well as for incidental damages or consequential damages, G&D is liable only in cases of intent or gross negligence.

Caveat Emptor

G&D will not provide warranty for devices that:

 Are not used as intended.

 Are repaired or modified by unauthorized personnel.

 Show severe external damages that was not reported on the receipt of goods.

 Have been damaged by non G&D accessories.

G&D will not be liable for any consequential damages that could occur from using the products.

Proof of trademark

All product and company names mentioned in this manual, and other documents you have received alongside your G&D product, are trademarks or registered trademarks of the holder of rights.

Imprint

© Guntermann & Drunck GmbH 2011. All rights reserved.

Version 1.10 28/06/2011

Firmware: 1.6.000 (02948)

Guntermann & Drunck GmbH

Dortmunder Str. 4a

57234 Wilnsdorf

Germany

Phone +49 2739 8901-100

Fax +49 2739 8901-120 http://www.GDsys.de [email protected]

i · G&D DL-Vision(M/S)

Contents

Contents

Chapter 1: Basic functions

System requirements ......................................................................................... 2

Supported web browsers .................................................................................... 2

Java Runtime Environment ............................................................................... 2

Configuring the network settings ..................................................................... 3

Getting started .................................................................................................. 4

Starting the web application ............................................................................... 4

Security instructions of the web browser ............................................................. 4

User login at the web application ....................................................................... 5

Operating the web application ............................................................................ 6

User interface ................................................................................................6

Frequently used buttons .................................................................................7

User logout ........................................................................................................ 7

Selecting the default language of the web application .......................................... 8

Showing the version number of the web application ............................................ 8

Basic configuration of the web application ....................................................... 9

Network settings ................................................................................................ 9

Configuring the network settings ....................................................................9

Configuring the global network settings ........................................................ 10

Increasing the reliability of network connections through link aggregation ..... 11

Creating and administrating netfilter rules ........................................................ 12

Creating a new netfilter rule ......................................................................... 13

Editing existing netfilter rules ....................................................................... 14

Deleting existing netfilter rules ..................................................................... 15

Changing the order/priority of existing netfilter rules .................................... 15

Creating an SSL certificate ............................................................................... 16

Special features for complex KVM systems................................................... 16

Creating a Certificate Authority.................................................................... 16

Creating any certificate ................................................................................ 17

Creating and signing the X509 certificate ...................................................... 18

Creating a PEM file ..................................................................................... 19

Updating the stored SSL certificate ................................................................... 19

Backup and restore function ............................................................................. 21

Firmware update ............................................................................................. 22

Restoring the default settings ............................................................................ 22

Network functions of the devices .................................................................... 23

NTP server ...................................................................................................... 23

Time sync with an NTP server ..................................................................... 23

Setting time and date manually .................................................................... 24

G&D DL-Vision(M/S) · ii

Contents

Logging syslog messages .................................................................................. 25

Locally logging the syslog messages ..............................................................25

Sending syslog messages to a server ..............................................................26

Viewing and saving local syslog messages .....................................................26

User authentication against directory services ................................................... 27

Monitoring functions ...................................................................................... 29

Viewing monitoring values ............................................................................... 30

Listing values by applying monitoring sets ....................................................30

Listing individual values of critical devices ....................................................30

Disabling the monitoring values ....................................................................... 30

Advanced function regarding the administration of critical devices ................... 31

Messages regarding the critical status of the devices.......................................31

Viewing the list of critical devices..................................................................31

Marking the messages from a critical device as read.......................................32

Administrating monitor groups ......................................................................... 33

Adding a monitoring group ..........................................................................33

Changing the name and/or comment of a monitoring group..........................34

Assigning members to a monitoring group ....................................................34

Duplicating a monitoring group ....................................................................35

Deleting a monitoring group .........................................................................35

Administrating monitoring sets ......................................................................... 36

Adding a monitoring set ...............................................................................36

Changing the name and/or comment of a monitoring set ..............................37

Assigning members to a monitoring set .........................................................37

Selecting a monitoring set in the folder configuration.....................................38

Duplicating a monitoring set.........................................................................38

Deleting a monitoring set..............................................................................39

Device monitoring via SNMP ......................................................................... 40

Practical use of the SNMP protocol .................................................................. 40

Configuring the SNMP agent ........................................................................... 40

Configuring SNMP traps .................................................................................. 42

Logbook .......................................................................................................... 45

The dialog entries of the logbook ...................................................................... 45

The »Logbook configuration« dialog .............................................................45

Viewing a logbook entry in detail ..................................................................46

Basic logbook functions .................................................................................... 46

Creating a new logbook entry .......................................................................46

Changing a logbook entry .............................................................................47

Deleting a logbook entry...............................................................................48

Advanced functions ......................................................................................... 48

Printing logbook entries................................................................................48

Exporting logbook entries .............................................................................49

Copying the logbook entries..........................................................................50

Shared editing ................................................................................................. 51

iii · G&D DL-Vision(M/S)

Contents

Users and Groups ........................................................................................... 52

Efficient rights administration .......................................................................... 52

The effective right ........................................................................................ 52

Efficient user group administration............................................................... 53

Administrating user accounts ........................................................................... 53

Creating a new user account......................................................................... 54

Renaming the user account .......................................................................... 55

Changing the user account password ............................................................ 55

Changing the user account rights .................................................................. 56

Changing a user account’s group membership............................................... 56

Enabling/Disabling a user account ............................................................... 57

Deleting a user account ................................................................................ 57

Administrating user groups .............................................................................. 58

Creating a new user group............................................................................ 58

Renaming a user group ................................................................................ 58

Changing the user group rights ..................................................................... 59

Administrating user group members ............................................................. 59

(De)activating a user group .......................................................................... 60

Deleting a user group ................................................................................... 60

System rights ................................................................................................... 60

Rights for full access (Superuser) .................................................................. 60

Changing the login right to the web application ............................................ 61

Rights to change your own password............................................................ 61

The »KVM combinations« folder .................................................................... 62

Folder administration ...................................................................................... 62

Creating a new folder................................................................................... 62

Assigning a device to a folder ....................................................................... 63

Deleting a device from a folder..................................................................... 63

Renaming a folder ....................................................................................... 64

Deleting a folder .......................................................................................... 64

Advanced functions of the KVM system ......................................................... 65

Temporarily (de)activating SNMP traps (Maintenance mode) ........................... 65

(De)activating the maintenance mode........................................................... 65

Viewing a list of devices in maintenance mode.............................................. 65

Identifying a device by activating the Identification LED .................................... 65

Saving and restoring the data of the KVM system ............................................. 66

Administration and use of EDID profiles ......................................................... 67

Importing the EDID profile of a monitor ...................................................... 67

Overview of the stored EDID profiles........................................................... 68

Activating the premium functions .................................................................... 68

Overview of the monitoring values ................................................................. 69

G&D DL-Vision(M/S) · iv

Contents

Chapter 2: KVM extenders

Basic configuration of KVM extenders ............................................................ 72

Renaming a KVM extender .............................................................................. 72

Changing the comment of a KVM extender ...................................................... 72

Deleting a KVM extender from the G&D system .............................................. 73

Configuration settings of KVM extenders ....................................................... 73

Enabling/Disabling the setup mode .................................................................. 73

Enabling/Disabling the hotkey delay ................................................................ 74

Changing the hotkey ........................................................................................ 74

Changing the setup scancode ............................................................................ 75

Changing the »Permanent Access« key .............................................................. 75

Changing the time span of the input lock .......................................................... 76

Authorisation for permanent console access ...................................................... 76

Changing the console video mode ..................................................................... 77

Selecting the EDID mode of the KVM extender ............................................78

Freeze mode ................................................................................................79

Starting the user module without keyboard....................................................80

Settings for special hardware ............................................................................ 80

Support for special Multimedia and Sun keys ................................................80

Support for special keyboards .......................................................................82

Changing the scancode set of a PS/2 keyboard..............................................82

Advanced functions for KVM extenders .......................................................... 83

Viewing the status information of a KVM extender ........................................... 83

Viewing information on the connection ............................................................ 84

v · G&D DL-Vision(M/S)

1

Basic functions

The

Config Panel

web application provides a graphical user interface to configure the matrix switches of the KVM system.

This application can be operated from any supported web browser (see page 2). It offers an alternative to configuring the devices connected to the system through the on-screen display of the different devices.

ADVICE:

The web application can be used in the entire network independently from the locations of the devices and consoles connected to the KVM system.

Thanks to its enhanced functions, the graphical user interface provides the following features for easy operation:

 clearly arranged user interface

 easy operation through the drag & drop function

 monitoring of various system features

 advanced network functions (netfilter, syslog, …)

 backup and restore function

G&D DL-Vision(M/S) · 1

System requirements

System requirements

The

Config Panel

web application is an application that runs on the Java platform. It can be applied on a computer with installed Java Runtime Environment. Use one of the supported web browsers to run this application.

IMPORTANT:

Before operating the web application via web browser, connect the device on which the web application is operated to the local network (see installation guide).

Now, adjust the network settings as described on page 3.

Supported web browsers

The following web browsers support the web application:

 Internet Explorer 7

 Internet Explorer 8

 Mozilla Firefox 3.6.9

Java Runtime Environment

The web application runs on Java Runtime Environment (JRE). Starting the web application requires the installation of version 6 (update 19).

A free download of this version is available at the following homepage:

http://java.sun.com/javase/downloads/

NOTE:

Mind the special instructions for running Java Runtime Environment on a 64bit browser for Windows:

http://www.java.com/en/download/faq/java_win64bit.xml

IMPORTANT:

The OpenJDK open source implementation of the Java platform is not supported.

2 · G&D DL-Vision(M/S)

Configuring the network settings

Configuring the network settings

To access the web application, the network settings of the device on which the web application is operated need to be configured.

The following table lists the default settings of the Network A network interface:

IP allocation:

static

IP address:

Subnet mask:

192.168.0.1

255.255.255.0

Connection type:

Auto

NOTE:

In the default, the Network B interface is deactivated.

How to configure the network settings before integrating the device into the local network:

1. Use a category 5 (or better) twisted pair cable to connect the network interface of any computer to the device’s Network A interface.

2. Ensure that the IP address of the computer’s network interface is part of the subnet to which the device’s IP address belongs to.

NOTE:

Use the IP address 192.168.0.100, for example.

3. Switch on the device.

4. Start the computer’s web browser and enter

192.168.0.1

in the address bar.

5. Configure the network interface(s) and the global network settings as described in

the paragraph Network settings on page 9 f.

IMPORTANT:

It is not possible to operate both network interfaces within one subnet!

6. Remove the twisted pair cable connection between computer and device.

7. Integrate the device into the local network.

G&D DL-Vision(M/S) · 3

Getting started

Getting started

This chapter describes how to operate the web application.

NOTE:

The following chapters give a detailed overview of all functions and configuration settings.

Starting the web application

The web application can be operated on a computer with installed Java Runtime Envi-

ronment. Use one of the supported web browsers to run this application.

NOTE:

Information regarding the system requirements of the web application are

provided on page 2.

How to start the web application:

1. Enter the following address to call the web application:

https://[ip address of the device]

NOTE:

If the web application is started via a “simple” http connection, a message informs the user that the connection can only be established via a secure https connection.

After 10 seconds, the user is automatically forwarded to a secure https connection.

Security instructions of the web browser

The device, on which the web application is operated, stores an SSL certificate that enables the user or the web browser to authenticate the opposite site.

The certificate contains the following features:

MD5 fingerprint:

47:F0:FF:87:96:84:D7:C8:63:43:6D:77:26:64:59:CD

SHA1 fingerprint:

68:92:9F:83:04:CD:7A:12:ED:2B:FE:34:0F:DF:BA:4B:0C:EF:47:30

IMPORTANT:

Replace the certificate that is included in the defaults of the matrix switch with an individual certificate, which is related to the device. Information on how to create such a certificate is given on page 17.

4 · G&D DL-Vision(M/S)

User login at the web application

After the certificates have been authenticated, the login window opens.

Getting started

How to log in to the web application:

1. Enter the following data in the login box:

Username:

Password:

Select language:

Enter your username.

Enter your user account password.

Select the language to be displayed on the user interface:

(Default):

apply default setting

German

English

2. Click the

Login

button.

IMPORTANT:

Change the preset password of the administrator account immediately.

Use the administrator account to log in to the web application and change the

password (see page 55).

These are the preset access data for the administrator account:

Username:

Password:

Admin

4658

G&D DL-Vision(M/S) · 5

Getting started

Operating the web application

User interface

The user interface of the web application consists of four main sections:

Figure 1: User interface

The different sectors of the user interface perform various tasks. The following table lists the intended use of each sector:

Toolbar :

Tree view :

Filter function :

Main view :

The toolbar allows you to exit the active session and access the basic configuration of the web application. It is also possible to use the third icon for viewing and editing the assignment of the

Dynamic Ports.

The tree view shows the setting options.

The filter function can be used to limit the elements that are displayed in the main view.

Enter a part of the name of the searched element into the text field. Now, the main view only displays names that contain this particular text.

Click

Delete

to cancel the filtering.

After you selected an element in the tree view , the main view displays the superior elements.

6 · G&D DL-Vision(M/S)

Getting started

Frequently used buttons

The user interface uses different buttons to carry out certain functions. The following table provides information on the names and functions of the buttons that are used in many interfaces.

Reload:

OK:

Apply:

Cancel:

Print:

Close:

Reload window values from the system’s database. Changes that have been carried out by the user are overwritten.

Save your settings.

Afterwards, the window closes.

Save your settings.

The window remains open.

Cancel your settings and close window.

Call print interface to select printer, page orientation and further settings.

After the settings have been selected, the interface information

(e.g., the cascade information) can be printed.

Close windows.

User logout

Use the Logout button to exit the current session within the web application.

IMPORTANT:

Always use the Logout function to exit your current session in order to protect the web application against unauthorised access.

How to exit the current session within the web application:

1. Click the

Logout

button (see figure on the right) to exit the current session within the web application.

After your logout, the login box is displayed.

G&D DL-Vision(M/S) · 7

Getting started

Selecting the default language of the web application

How to change the default language of the web application:

1. Click the

System

entry in the tree view.

2. Double-click on

Configuration

in the main view.

3. Click the

System

tab.

4. Use the

Language

entry to select the default language to be displayed to all users of the web application:

German

English

5. Click the

OK

button to save your settings.

Showing the version number of the web application

How to show the version number of the web application:

1. Click on

System > Information

in the tree view.

2. Double-click on

General

.

3. Click on

Close

to close the window.

8 · G&D DL-Vision(M/S)

Basic configuration of the web application

Basic configuration of the web application

The tool symbol in the toolbar can be used to access the basic configuration of the web application.

Here, you can change the network settings of the device on which the web application is operated as well as backup and restore these settings. Furthermore, a firmware update can be performed.

Network settings

The devices with integrated web application are provided with two network interfaces (Network A and Network B). These network interfaces enable you to integrate the device into up to two separate networks.

IMPORTANT:

Please mind the separate instructions regarding Configuring the

network settings on page 3.

Configuring the network settings

Configure the network settings to connect the device to a local network.

How to configure the settings of a network interface:

IMPORTANT:

It is not possible to operate both network interfaces within one subnet.

NOTE:

According to RFC 3330, the Link Local address space 169.254.0.0/16 is reserved for the internal communication between devices. An IP address of this address space cannot be assigned.

1. Click the tools symbol in the toolbar.

2. Click the

Configuration > Interfaces

tabs.

3. Use

Interface A

or

Interface B

paragraphs to enter the following data:

Operational

mode:

IP address:

Use the pull-down menu to select the operating mode of

Interface A

or

Interface B

:

Off:

switches off network interface.

Static:

uses static settings.

DHCP:

obtains the settings from a DHCP server.

Link aggregation active:

This interface was added to a group of network interfaces.

Use the »Link aggregation« tab to configure the network interfaces.

Only if the Static operating mode is selected: Enter the interface IP address.

G&D DL-Vision(M/S) · 9

Basic configuration of the web application

Netmask:

Connection

type:

Only if the Static operating mode is selected: Enter the network netmask.

Select if the network interface and the remote station are to negotiate the connection type automatically (

Auto

) or if one of the available types is to be applied.

4. Click

OK

to save the data.

Configuring the global network settings

Even in complex networks the global network settings ensure that the web application is available from all sub networks.

How to configure the global network settings:

1. Click the tools symbol in the toolbar.

2. Click the

Configuration > Interfaces

tabs.

3. Enter the following data in the

Global network settings

section:

Global preferences:

Use the pull-down menu to select the operating mode:

Static:

uses static settings.

DHCP:

obtains the settings from a DHCP server.

The following settings are automatically obtained in the DHCP operating mode. Inputs are not possible.

Hostname:

Domain:

Gateway:

DNS Server 1:

DNS Server 2:

Enter the device hostname.

Enter the domain the device is to belong to.

Enter the gateway IP address.

Enter the DNS server IP address.

Optionally, enter the IP address of another DNS server.

4. Click

OK

to save your data.

10 · G&D DL-Vision(M/S)

Basic configuration of the web application

Increasing the reliability of network connections through link aggregation

In the default settings, both network interfaces can be used at the same time to access the web application from two different network segments, for example.

To increase the reliability, the network interfaces can be grouped through link agg-

regation. Only one interface is active within the group. Another interface only becomes active if the active interface fails.

We provide two different modes to monitor the interfaces:

MII mode:

The carrier status of the network interface is monitored through the

Media Independent Interface. This mode only checks the function of the network interface.

ARP mode:

The address resolution protocol sends requests to an ARP target within the network. The answer of the ARP target confirms both the functionality of the network interface and the proper network connection to the ARP target.

If the ARP target is connected to the network but is temporarily offline, requests cannot be answered. Define multiple ARP targets to receive an answer from at least one target if an ARP target fails.

NOTE: MII

and

ARP mode

cannot be combined.

How to configure the settings of grouped network interfaces:

NOTE:

According to RFC 3330, the Link Local address space 169.254.0.0/16 is reserved for the internal communication between devices. An IP address of this addres space cannot be assigned.

1. Click the tools symbol in the toolbar.

2. Click the

Configuration > Link aggregation

tab.

3. Enter the following data into the

Network

paragraph:

Name:

Operational mode:

IP address:

Netmask:

Enter a name for the group of network interfaces.

Choose the operational mode for the grouped network interfaces:

Off:

disables link aggregation.

Use the »Interfaces« tab to configure the network interfaces.

Static:

A static IP address is assigned.

DHCP:

obtain IP address from a DHCP server.

Enter the IP address of the interface (only if you have selected the Static operational mode).

Enter the netmask of the network (only if you have selected the Static operational mode).

G&D DL-Vision(M/S) · 11

Basic configuration of the web application

4. Enter the following data in the

Parameter

paragraph:

Link monitoring:

MII down delay:

MII up delay:

ARP interval:

ARP validate:

ARP target:

Choose if you want the

MII

or

ARP mode

(description see below) to be used to monitor the interface.

Time delay in milliseconds before a failed network interface is disabled.

The value must be a multiple of 100 ms (the MII link monitoring frequency).

Time delay in milliseconds before a reset network interface is enabled.

The value must be a multiple of 100 ms (the MII link monitoring frequency).

Enter the interval (100 to 10,000 milliseconds) according to which the incoming ARP packets of the network interfaces are to be checked.

The validation ensures that the ARP packet for a particular network interface is generated by one of the listed ARP targets.

Choose if or what incoming ARP packets are to be validated:

None:

ARP packets are not validated (default).

Active:

Only the ARP packets of the active network interface are validated.

Backup:

Only the ARP packets of the inactive network interface are validated.

All:

The ARP packets of all network interfaces within the group are validated.

The table lists all configured ARP targets.

Use the

New

,

Edit,

and

Delete

buttons to administrate the ARP targets.

5. Click

OK

to save your settings.

Creating and administrating netfilter rules

In the default settings of the devices, all network computers have access to the

Config Panel

web application (open system access).

NOTE:

The open system access enables unrestricted connections via the following ports: 80/TCP (HTTP), 443/TCP (HTTPS) and 161/UDP (SNMP).

If you create a netfilter rule, the open system access is deactivated and all incoming data packets are compared to the netfilter rules. The list of the netfilter rules is processed according to the stored order. As soon as a rule applies, it is carried out and the following rules are ignored.

12 · G&D DL-Vision(M/S)

Basic configuration of the web application

Creating a new netfilter rule

How to create a new netfilter rule:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network

tab.

4. Click the

Netfilter

tab and enter the data described on the following page.

Interface:

Option:

IP address/

Netmask:

Use the pull-down menu to select on which network interfaces the data packets are to be trapped and manipulated:

All

Interface A

Interface B

[Name of a group of network interfaces]

Use the pull-down menu to select how the rule’s sender information are to be interpreted:

Normal:

The rule applies for data packets whose sender information does comply with the indicated IP address or

MAC address.

Inverted:

The rule applies for data packets whose sender information does not comply with the indicated IP address or MAC address.

Enter the data packet IP address or use the

Netmask

entry to enter the address space of the IP addresses.

Examples:

192.168.150.187:

for IP address 192.168.150.187

192.168.150.0/24:

IP addresses of section 192.168.150.x

192.168.0.0/16:

IP addresses of section 192.168.x.x

192.0.0.0/8:

IP addresses of section 192.x.x.x

0.0.0.0/0:

all IP addresses

NOTE:

The IP address and/or a MAC address can be specified within a rule.

MAC address:

Enter the MAC address to be considered in this filter rule.

NOTE:

The IP address and/or a MAC address can be specified within a rule.

Filter rule:

Drop:

Data packets whose sender information comply with the IP address or MAC address are not processed.

Accept:

Data packets whose sender information comply with the IP address or MAC address are processed.

G&D DL-Vision(M/S) · 13

Basic configuration of the web application

5. Click

Add

to save the data in a new filter rule.

The new filter rule is added to the end of the list of the existing filter rules.

6. Click

OK

to close the window.

Editing existing netfilter rules

How to edit an existing netfilter rule:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network >Netfilter

tabs.

4. Mark the rule to be changed in the list of the existing netfilter rules.

5. The current rule settings are displayed in the upper part of the window. Check and change the data described on the following page.

Interface:

Option:

IP address/

Netmask:

Use the pull-down menu to select on which network interfaces the data packets are to be trapped and manipulated:

All

Interface A

Interface B

Use the pull-down menu to select how the rule’s sender information are to be interpreted:

Normal:

The rule applies for data packets whose sender information does comply with the indicated IP address or

MAC address.

Inverted:

The rule applies for data packets whose sender information does not comply with the indicated IP address or MAC address.

Enter the data packet IP address or – using the

Netmask

entry

– the address space of the IP addresses.

Examples:

192.168.150.187:

for the IP address 192.168.150.187

192.168.150.0/24:

IP addresses of section 192.168.150.x

192.168.0.0/16:

IP addresses of section 192.168.x.x

192.0.0.0/8:

IP addresses of section 192.x.x.x

0.0.0.0/0:

all IP addresses

The IP address and/or a MAC address can be indicated within a rule.

MAC address:

Enter the MAC address to be considered in this filter rule.

The IP address and/or a MAC address can be indicated within a rule.

14 · G&D DL-Vision(M/S)

Basic configuration of the web application

Filter rule:

Drop:

Data packets whose sender information comply with the IP address or MAC address are not processed.

Accept:

Data packets whose sender information comply with the IP address or MAC address are processed.

6. Click

Change

to save the changed data.

7. Click

OK

to close the window.

Deleting existing netfilter rules

How to delete existing netfilter rules:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network >Netfilter

tabs.

4. Mark the rule to be deleted in the list of the existing netfilter rules.

5. Click

Remove

.

6. Confirm the confirmation prompt by pressing

Yes

or cancel the process by clicking

No

.

7. Click

OK

to close the window.

Changing the order/priority of existing netfilter rules

The netfilter rules are processed in the order they are stored. If a rule does apply, the respective action is carried out and all following rules are ignored.

IMPORTANT:

Please mind the order or priority of the single rules, especially when adding new rules.

How to change the order/priority of existing netfilter rules:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network >Netfilter

tabs.

4. Mark the rule whose order/priority is to be changed in the list of the existing netfilter rules.

5. Click the button (arrow up) to increase the priority or the button (arrow down) to decrease the priority.

6. Click

OK

to close the window.

G&D DL-Vision(M/S) · 15

Basic configuration of the web application

Creating an SSL certificate

Use the free implementation of the SSL/TLS protocol OpenSSL to create an SSL certificate.

The following websites provide detailed information about operating OpenSSL:

OpenSSL project:

http://www.openssl.org/

Win32 OpenSSL:

http://www.slproweb.com/products/Win32OpenSSL.html

OpenSSL manual:

http://www.absolute-cool.net/dokus/ssl/openssl/

IMPORTANT:

Creating an X509 certificate requires the software OpenSSL. If necessary, follow the instructions on the websites mentioned above to install the software.

The following pages give information on creating an X509 certificate.

Special features for complex KVM systems

If you want different devices to communicate within a KVM system, use the identi-

cal Certificate Authority (see page 16) to create certificates for those devices.

NOTE:

The identical PEM file (see page 19) can also be used for all devices. In this

case, all certificate features are identical.

Creating a Certificate Authority

A Certificate Authority enables the owner to create digital certificates (e. g. for the matrix switch

CATCenter NEO

).

How to create a key for the Certificate Authority:

IMPORTANT:

The following steps describe how to create keys that are not coded.

If necessary, read the OpenSSL manual to learn how to create a coded key.

1. Enter the following command into the command prompt and press

Enter

:

openssl genrsa -out ca.key 2048

2. OpenSSL creates the key and stores it in a file named ca.key.

16 · G&D DL-Vision(M/S)

Basic configuration of the web application

How to create the Certificate Authority:

1. Enter the following command into the command prompt and press

Enter

:

openssl req -new -x509 -days 365 -key ca.key -out ca.crt

2. Now, OpenSSL queries the data to be integrated into the certificate.

The following table shows the different fields and an exemplary entry:

Field

Country Name (2 letter code)

State or Province Name

Locality Name (e.g., city)

Organization Name (e.g., company)

Organizational Unit Name

(e.g., section)

Common Name (e.g., YOUR name)

Email Address

Example

DE

NRW

Wilnsdorf

Guntermann & Drunck GmbH

Guntermann & Drunck GmbH

Enter the data you want to state and confirm each entry by pressing

Enter

.

3. OpenSSL creates the key and stores it in a file named ca.crt.

Creating any certificate

How to create a key for the certificate to be created:

IMPORTANT:

The following steps describe how to create keys that are not coded.

If necessary, read the OpenSSL manual to learn how to create a coded key.

1. Enter the following command into the command prompt and press

Enter

:

openssl genrsa -out server.key 2048

2. OpenSSL creates the key and stores it in a file named server.key

G&D DL-Vision(M/S) · 17

Basic configuration of the web application

How to creat the certificate:

1. Enter the following command into the command prompt and press

Enter

:

openssl req -new -key server.key -out server.csr

2. Now, OpenSSL queries the data to be integrated into the certificate.

The following table shows the different fields and an exemplary entry:

Field

Country Name (2 letter code)

State or Province Name

Locality Name (e.g., city)

Organization Name (e.g., company)

Organizational Unit Name

(e.g., section)

Common Name (e.g., YOUR name)

Email Address

Example

DE

NRW

Wilnsdorf

Guntermann & Drunck GmbH

192.168.0.10

IMPORTANT:

Enter the IP address of the device on which the certificate is to be installed into the row Common Name.

Enter the data you want to state, and confirm each entry by pressing

Enter

.

3. If desired, the Challenge Password can be defined. This password is needed if you have lost the secret key and the certificate needs to be recalled.

4. Now, the certificate is created and stored in a file named server.csr.

Creating and signing the X509 certificate

1. Enter the following command into the command prompt and press

Enter

:

openssl x509 -req -days 365 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out server.crt

18 · G&D DL-Vision(M/S)

Basic configuration of the web application

2. Now, OpenSSL queries the data to be integrated into the certificate.

The following table shows the different fields and an exemplary entry:

Field

Country Name (2 letter code)

State or Province Name

Locality Name (e.g., city)

Organization Name (e.g., company)

Organizational Unit Name

(e.g., section)

Common Name (e.g., YOUR name)

Email Address

Example

DE

NRW

Wilnsdorf

Guntermann & Drunck GmbH

Guntermann & Drunck GmbH

Enter the data you want to state and confirm each entry by pressing

Enter

.

3. OpenSSL creates the certificate and stores it in a file named server.crt.

Creating a PEM file

1. Enter the following command(s) into the prompt and press

Enter

: a. Linux

cat server.crt > gdcd.pem

cat server.key >> gdcd.pem

cat ca.crt >> gdcd.pem

b. Windows

copy server.crt + server.key + ca.crt gdcd.pem

2. The gdcd.pem file is created during the copying. It contains the created certificate and its key as well as the Certificate Authority.

Updating the stored SSL certificate

An SSL-secured connection connects the web browser to the web application. The device on which the web application is operated stores an SSL certificate, which enables the user or the web browser to authenticate the opposite site.

If the device’s IP address differs from the IP address given in the certificate, the web browser sends a message. It is therefore recommended to import an individual certificate in order to ensure that the device IP address complies with the IP address given in the certificate.

G&D DL-Vision(M/S) · 19

Basic configuration of the web application

The certificate given by the certificate authority or one that is created by the user can be imported (e.g. with the open source toolkit OpenSSL).

NOTE:

The required .pem file contains the following three components:

 server certificate

 private server key

 certificate of the certification authority

If these three components are available separately, enter them successively to the

Clear text entry before updating the certificate stored in the device.

How to update the SSL certificate stored in the device:

1. Click the tools symbol in the toolbar.

2. Click the

Configuration > Certificate

tabs.

3. Copy the certificate’s content or import the .pem file in the interface

Clear text:

Copy the clear text of the server certificate, the private server key, and the certificate of the certification authority to this text field.

ADVICE:

If the certificates and the private key are provided in a .pem file, use the Import certificate from file... function described below.

Import certificate from file...

Click this interface if the certificates and the key are provided in a .pem file. Select the .pem file in the file window.

The clear text of the feature key is automatically displayed in the Clear text entry.

4. Click

Update now.

5. Click

OK

to leave the interface.

20 · G&D DL-Vision(M/S)

Basic configuration of the web application

Backup and restore function

The network settings of the device on which the web application is operated can be stored using the backup function. The restore function enables the user to restore the saved data.

NOTE:

The chapter Saving and restoring the data of the KVM system on page 66 pro-

vides information regarding saving and restoring the system settings.

How to backup the network settings:

1. Click the tools symbol in the toolbar.

2. Click the

Tools > Backup/Restore

tabs.

3. Click the

Backup

button and, if desired, enter a Comment and a Password to secure the backup file.

4. Click

OK

.

5. Use the date window to define the location and the

File name

of the backup file.

6. Click

Save

.

7. Click

OK

to close the window.

How to restore the network settings:

1. Click the tools symbol in the toolbar.

2. Click the

Tools > Backup/Restore

tabs.

3. Enter the storage location and the name of the backup file into the

Path

entry.

ADVICE:

Use the file button to select the storage location and the name of the backup file in the file interface.

4. Click on

Check file

to check the validity of the backup file.

IMPORTANT:

Use the information provided in the Date and Comment entries to check if you selected the correct backup file.

5. Click on

Restore.

6. Click

OK

to leave the interface.

G&D DL-Vision(M/S) · 21

Basic configuration of the web application

Firmware update

The firmware of each device can be easily updated via the web application.

IMPORTANT:

This function only updates the firmware of the device on which the web application has been started!

How to update the firmware:

1. Open the web application of the device whose firmware you want to update.

2. Click the tools symbol in the toolbar.

3. Click the

Tools > Firmware update

tabs.

4. Enter the storage location and the name of the backup file into the

Path

entry.

IMPORTANT:

Use the information provided in the Device and Comment entries to check if you selected the correct device file.

ADVICE:

Use the file dialog to select the location and the name of the update file.

5. Click on

Update now

.

6. Click

OK

to leave the interface.

Restoring the default settings

This function enables the user to restore the default settings of the device on which the web application is operated.

How to restore the default settings:

IMPORTANT:

All settings are reset.

1. Click the tools symbol in the toolbar.

2. Click the

Tools > System defaults

tabs.

IMPORTANT:

Use the information provided in the Date and Comment entries to check if you have selected the correct backup file.

3. Disable the

Delete IP addresses

option to maintain the configuration of the network interfaces.

4. Click on

System Defaults

to reset the current configuration.

5. Click

OK

to leave the interface.

22 · G&D DL-Vision(M/S)

Network functions of the devices

Network functions of the devices

The different devices within the KVM system (e.g. extenders and matrix switches) provide separate network functions.

The following function can be configured for every device within the KVM system:

Authentication against directory services (LDAP, Active Directory, RADIUS,

TACACS+)

Time synchronisation via NTP server

Forwarding of log messages to syslog servers

monitoring and controlling of computers and network devices via Simple Network

Management Protocol (see page 43 ff.)

NTP server

The device’s time and date settings can either adjust be adjusted manually or automatically by synchronizing the settings with an NTP server (Network Time Protocol).

Time sync with an NTP server

How to change the NTP time sync settings:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network

tab.

4. Click the

NTP server

tab and enter the following data:

NTP time sync:

NTP server 1:

NTP server 2:

Time zone:

Select the respective entry from the pull-down menu to

(de)activate the time sync:

Disabled

Enabled

Enter the IP address of a time server.

Optionally enter the IP address of a second time server.

Use the pull-down menu to select the time zone of your location.

5. Click

OK

to close the window.

G&D DL-Vision(M/S) · 23

Network functions of the devices

Setting time and date manually

How to manually set the time and date of the KVM matrix system:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network > NTP server

tabs.

4. If necessary, disable the

NTP time sync

option. Otherwise, you might not be able to set time and date manually.

5. Use the

Time

entry to enter the current time (hh:mm:ss).

6. Use the

Date

entry to enter the current time (DD.MM.YYYY).

ADVICE:

Click on

Accept local date

to accept the current system date of the computer on which the

Config Panel

web application has been started.

7. Click

OK

.

24 · G&D DL-Vision(M/S)

Network functions of the devices

Logging syslog messages

The syslog protocol is used to transmit log messages in networks. The log messages are transmitted to a syslog server that logs the log messages of many devices in the computer network.

Among other things, eight different severity codes have been defined to classify the log messages:

0:

Emergency

1:

Alert

2:

Critical

3:

Error

4:

Warning

5:

Note

6:

7:

Info

Debug

The web application enables you to configure whether the syslog messages are to be locally logged or sent to up to two syslog servers.

Locally logging the syslog messages

How to locally log the syslog messages:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network

tab.

4. Click the

Syslog

tab and enter the following data in the

Syslog local

section:

Syslog server:

Log Level:

Select the respective entry from the pull-down menu to define whether syslog messages are to be sent to a server:

Disabled

Enabled

Use the pull-down menu to select from which severity code on a log message is to be logged.

The selected severity code and all lower severity codes are logged.

If you selected the severity code 2 - Critical, messages for this code as well as for the severity codes 1 - Alert and 0 - Emergency are logged.

5. Click

OK

to close the window.

G&D DL-Vision(M/S) · 25

Network functions of the devices

Sending syslog messages to a server

How to send syslog messages to a server:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network

tab.

4. Click the

Syslog

tab and enter the following data in the

Syslog server 1

or

Syslog server 2

section:

Syslog server:

Log Level:

Select the respective entry from the pull-down menu to define whether syslog messages are to be sent to a server or not:

Disabled

Enabled

Use the pull-down menu to select from which severity code on a log message is to be logged.

The selected severity code and all lower severity codes are logged.

If you selected the severity code 2 - Critical, messages for this code as well as for the severity codes 1 - Alert and 0 - Emergency are being logged.

IP address/

DNS name:

Port:

Protocol:

Enter the IP address or the server name to which the syslog messages are to be sent.

Enter the port – usually 514 – on which the server receives the incoming messages.

Select the protocol – usually UDP – on which the server receives the incoming messages:

TCP

UDP

5. Click

OK

to close the window.

Viewing and saving local syslog messages

If the function to log the local syslog messages is activated, these syslog messages can be viewed and, if necessary, stored in the information window.

How to view and store the local syslog messages:

1. Click on

System > Information

in the tree view.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Double-click on

Syslog

in the main view.

26 · G&D DL-Vision(M/S)

Network functions of the devices

4. Click the

Fetch syslogs

tab.

The matrix switch calls the local syslog messages, which are now displayed in the text field.

ADVICE:

If necessary, click

Save

to save these messages in a text file. The opening file window enables you to select the location and a file name.

Afterwards, click

Save

.

5. Click

OK

to close the window.

User authentication against directory services

In in-house networks, the user accounts of different users are often administrated by a directory service. The device can access such a directory service and authenticate users against the directory service.

NOTE:

If the Admin user account cannot be authenticated by the directory service, the user account is authenticated by the device’s data base.

The directory service is exclusively used to authenticate a user. The user rights are assigned within a database of the KVM system. The following paragraphs describe the different scenarios:

The user account exists within the directory service and the KVM system

The user can log in with the password stored in the directory service. After the login, the user is assigned with the rights of the correspondent account in the

KVM system.

NOTE:

The password which the user used to log in, is taken over into the database of the KVM system.

The user account exists within the directory service, but not within the KVM system

A user that has been successfully authenticated against the directory service, but does not have an account of the same name within the database of the KVM system, is assigned with the rights of the RemoteAuth user.

If required, change the rights of this particular user account to set the rights for users without a user account.

ADVICE:

Deactivate the RemoteAuth user to prevent users without user accounts to log in to the KVM system.

The user account exists within the KVM system, but not within the directory service

If the directory service is available, it reports that the user account does not exist.

The access to the KVM system is denied to the user.

G&D DL-Vision(M/S) · 27

Network functions of the devices

If the server is not available, but the fallback system is active (see below), the user can log in with the password that is stored within the KVM system.

IMPORTANT:

Mind the following safety instructions to prevent a locked or deactivated user from logging in to the system in case the connection to the directory service fails:

 If a user account is deactivated or deleted in the directory service, this action can also be carried out within the user database of the KVM system.

 Only activate the fallback system in reasonable exceptional cases.

How to configure the user account authentication:

NOTE:

If no directory service is applied, the user accounts are administered by the device.

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now, click the

Configuration

entry in the context menu.

3. Click the

Network > Authentication

tabs and enter the following data:

Auth. Server:

Select the

Local

option if the user administration is to be carried out by the KVM system.

If a particular directory service is to be applied, select the respective entry from the pull-down menu:

LDAP

Active Directory

Radius

TACACS+

ADVICE:

After the directory service has been selected, collect the settings of the directory service server in the

Server settings

.

Fallback:

Activate this option if the local user administration of the

KVM system is to be applied in case the directory service is temporarily not available.

IMPORTANT:

Mind the following safety instructions to prevent a locked or deactivated user from logging in to the system in case the connection to the directory service fails:

If a user account is disabled or deleted in the directory service, this action can also be carried out within the user database of the KVM system.

Only activate the fallback system in reasonable exceptional cases.

4. Click

OK

to close the window.

28 · G&D DL-Vision(M/S)

Monitoring functions

Monitoring functions

The current monitoring values of all devices within the KVM system can be viewed in the device-specific branches (e.g. KVM matrix systems) as well as in the KVM Combina-

tions and Critical Devices branches of the tree view.

The various information regarding a device can either be displayed in individual val-

ues or in monitoring groups, which are sorted according to topic. The following exemplary figure shows the Status values and three different monitoring groups:

Figure 2: Detailed view of an exemplary monitoring table

Individual values (the Status value in the figure above) immediately show if the status is correct (green) or deviating from the normal operating value (red). The text in the column also provides information about the current status.

Monitoring groups allow you to group various individual values. The column of a monitoring group shows if all values are within range (OK) or if at least one value is deviating from the normal operating values (Error).

Clicking the arrow in the column opens a separate window, which displays the individual values of the group.

G&D DL-Vision(M/S) · 29

Monitoring functions

Viewing monitoring values

NOTE:

An overview of the possible monitoring values of all different device types

is given on page 69 ff.

By applying different monitoring sets, the monitoring values are displayed in the different branches of the tree view.

Several branches (e.g. Critical devices) provide another view to enable the user to detect critical monitoring values as fast as possible.

Listing values by applying monitoring sets

A monitoring set defines which individual values and groups are to be displayed.

The column, which shows the individual values, enables you to read the status and check whether it is deviating from the normal operating values.

Monitoring groups allow you to group various individual values. The column of a monitoring group shows if all values are within range (OK) or if at least one value is deviating from the normal operating values (Error).

Clicking the arrow in the column opens a window, which contains detailed information regarding the individual values of the group.

ADVICE:

The following pages of this chapter provide detailed information regarding monitoring groups and monitoring sets.

Listing individual values of critical devices

If a device shows a value that deviates from the normal operating values, the device is additionally listed in the Critical devices branch. This branch displays all deviating

(red) values in tabular form. This way, deviating values can be detected as fast as possible.

NOTE:

To be able to find deviant values as fast as possible, monitoring sets are not applied here.

Disabling the monitoring values

Any monitoring value can be disabled. After disabling, the monitoring values are no longer shown in the web application.

IMPORTANT:

Critical values are no longer shown for any disabled values.

How to enable/disable the monitoring values:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now, click the

Configuration

entry in the context menu.

30 · G&D DL-Vision(M/S)

Monitoring functions

3. Click the

Monitoring

tab.

Two tables list the montitoring values of the KVM system:

Enabled:

Disabled:

lists all active monitoring values.

lists all inactive monitoring values.

To give you a faster overview, the values are grouped in both columns.

4. Mark the monitoring values to be enabled/disabled.

5. Click the button (right arrow key) to disable the monitoring value or

(left arrow key) for enabling.

6. Click

OK

to save your settings.

Advanced function regarding the administration of critical devices

The Critical Devices branch lists the devices that show at least one value that exceeds the normal operating values.

NOTE:

A sub-branch is displayed for each device class in the KVM system (e. g.

KVM matrix systems).

Messages regarding the critical status of the devices

If one value exceeds the normal operating values, the branch is marked red. A blinking message under the main view points to this condition.

ADVICE:

If the blinking message appears on your screen, press

Ctrl+Space

to open the Critical devices branch.

Click on the blinking message to show the list of the deviating values in a separate window.

Viewing the list of critical devices

How to view the list of critical devices:

1. Click on the

System monitoring > Critical Devices

folders in the tree view.

The main view lists all affected devices. The critical values are displayed in the table.

ADVICE:

Click a sub-branch of the folder in order to only list the devices of a particular device class.

G&D DL-Vision(M/S) · 31

Monitoring functions

Marking the messages from a critical device as read

Many messages require immediate actions from the administrator. Other messages

(e.g. the break-down of the redundant power supply), however, point to possibly uncritical conditions.

In such a case, all peculiar values of a device can be marked as read, which causes the following:

A device whose deviating values have been marked as read shows no blinking status bar.

The cells, info dialogs, and monitoring windows of all “read” devices are highlighted in yellow.

If a monitoring group contains critical values, which have been marked as read, the column displays Error. In addition, the cell is highlighted in yellow.

NOTE:

The system only highlights values that have been deviating from the normal operating values at the time the function has been executed. The web application shows if another monitoring value of such a device deviates from the normal operating values.

How to mark the Monitoring messages of a device as read:

1. Click on the

System monitoring > Critical Devices

folders in the tree view.

2. Right-click the desired device. Now click the

Acknowledge

entry of the context menu.

32 · G&D DL-Vision(M/S)

Monitoring functions

Administrating monitor groups

IMPORTANT:

Any recently created monitoring groups are only available in the branch in which they were created.

If a monitoring group was created in a device-specific branch, it is no longer available in the KVM combinations branch.

The

Config Panel

web application already provides several preconfigured monitoring groups. Those groups can neither be edited nor deleted, but they can be duplicated and individually adjusted to your wishes.

All groups that were preconfigured or created are shown in the monitoring table as

long as they are contained in the applied monitoring set (see page 38 ff.):

Figure 3: Status of different devices in the »Group #2« monitoring group

ADVICE:

Due to the high amount of individual values, it is recommended to display the most important values as individual values and group the rest in groups according to topic.

This provides a quick overview and the values are displayed in a space-saving way.

Adding a monitoring group

How to add a new monitoring group:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring groups

entry in the context menu.

3. Click

New

.

4. Enter the name and an optional comment for the new group.

5. Click

OK

to create the group.

G&D DL-Vision(M/S) · 33

Monitoring functions

Changing the name and/or comment of a monitoring group

How to change the name and/or comment of a monitoring group:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring groups

entry in the context menu.

3. Select the group to be edited and click

Edit

.

4. Change the name and/or the optional comment of the group.

5. Click

OK

to save your settings.

Assigning members to a monitoring group

How to assign members to a monitoring group:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring groups

entry in the context menu.

3. Select the group to be edited and click

Edit

.

4. Click the

Member

tab.

Now you have the possibility to add members to or delete them from a monitoring group.

The window consists of two tables, which list the monitoring values of the KVM system:

Unassigned:

Assigned:

lists monitoring values that are not assigned to this group lists monitoring values that are assigned to this group

5. Mark the monitoring value you want to add to or delete from the group.

6. Click (right arrow) to add the monitoring value to the group or (left arrow) to delete it from the member list.

7. Click

OK

to save your settings.

34 · G&D DL-Vision(M/S)

Monitoring functions

Duplicating a monitoring group

The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. These groups are displayed in light grey.

IMPORTANT:

It is not possible to edit or delete a preconfigured monitoring group.

If you want to create a new group based on an already existing group, simply duplicate the existing group and edit the duplicate.

How to duplicate a monitoring group:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring groups

entry in the context menu.

3. Select the group to be duplicated and click

Edit

.

4. Enter the name and an optional comment for the group.

5. Click

Duplicate

to duplicate the existing group.

6. Edit the new group as described on the previous page or click

Close

to close the window.

Deleting a monitoring group

The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. These groups are displayed in light grey.

IMPORTANT:

It is not possible to edit or delete a preconfigured monitoring group.

How to delete a monitoring group:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring groups

entry in the context menu.

3. Select the group to be deleted and click

Delete

.

4. Confirm the confirmation prompt be clicking

Yes

or cancel the task by clicking

No

.

5. Click

Close

to save your settings.

G&D DL-Vision(M/S) · 35

Monitoring functions

Administrating monitoring sets

A monitoring set defines the individual values and the groups to be displayed in a subfolder of the KVM combinations branch or a device-specific branch:

Figure 4: Status of the individual Status value and three groups of a monitoring set

The

Config Panel

web application already provides several preconfigured monitoring groups. The groups can neither be edited nor deleted, but they can be duplicated and individually adjusted to your wishes.

It is also possible to create and configure a new group.

IMPORTANT:

The created monitoring sets are only displayed in the branch in which they have been created.

If a monitoring set has been created in a device-specific branch, it is no longer displayed in the KVM combinations branch!

Adding a monitoring set

How to add a monitoring set:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring set

entry in the context menu.

3. Click

New

.

4. Enter the name and an optional comment for the new set.

5. Click

OK

to create the set.

36 · G&D DL-Vision(M/S)

Monitoring functions

Changing the name and/or comment of a monitoring set

How to change the name and/or comment of a monitoring set:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring sets

entry in the context menu.

3. Select the set to be edited and click

Edit

.

4. Enter the name and an optional comment for the set.

5. Click

OK

to save your settings.

Assigning members to a monitoring set

IMPORTANT:

It is important to define your desired monitoring groups (see page 33 ff.) before creating a monitoring set.

How to assign members to a monitoring set:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring sets

entry in the context menu.

3. Select the set to be edited and click

Edit

.

4. Click the

Member

tab.

Now you have the possibility to add members to or delete them from a monitoring set.

The entry consists of two tables which list the monitoring values of the KVM system. The values are the divided into the sub categories

Individual values and Groups (Columns).

NOTE:

Click on the

[-]

in the category header to hide the content of this category. Clicking on

[+]

shows the contents.

The different values are either listed in the left or the right-hand table:

Unassigned:

Assigned:

lists monitoring values that are not assigned to this set lists monitoring values that are assigned to this set

5. Mark the monitoring value you want to add to or delete from the group.

6. Click (right arrow) to add the monitoring value to the set or (left arrow) to delete it from the member list.

7. Click

OK

to save your settings.

G&D DL-Vision(M/S) · 37

Monitoring functions

Selecting a monitoring set in the folder configuration

After a monitoring set has been created, it can be activated in the configuration of one (or more) folders of the tree view.

How to activate a monitoring set:

1. Right-click a subfolder of a device-specific branch (e.g. KVM extender) or the KVM

combinations branch in the tree view.

2. Click the

Configuration

entry in the context menu.

3. Use the

Monitoring set

entry to select the desired set.

IMPORTANT:

The created monitoring sets are only displayed in the branch in which they have been created.

If a monitoring set has been created in the KVM extenders branch, it is no longer displayed in the KVM combinations branch!

4. Click

OK

to activate the selected set.

Duplicating a monitoring set

The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. Those groups are displayed in light grey.

IMPORTANT:

It is not possible to edit or delete those groups.

If you want to create a new set based on an already existing set, simply duplicate the existing set and edit the duplicate.

How to duplicate a monitoring set:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring sets

entry in the context menu.

3. Select the set to be duplicated and click

Edit

.

4. Enter the name and an optional comment for the set.

5. Click

Duplicate

to duplicate the existing set.

6. Edit the new set as described on the previous page or click

Close

to close the window.

38 · G&D DL-Vision(M/S)

Monitoring functions

Deleting a monitoring set

The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. These groups are displayed in light grey.

IMPORTANT:

These groups cannot be edited or deleted.

How to delete a monitoring set:

1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the

KVM combinations branch in the tree view.

2. Click the

Monitoring sets

entry in the context menu.

3. Select the set to be deleted and click

Delete

.

4. Confirm the confirmation prompt be clicking

Yes

or cancel the task by clicking

No

.

5. Click

Close

to save your settings.

G&D DL-Vision(M/S) · 39

Device monitoring via SNMP

Device monitoring via SNMP

The Simple Network Management Protocol (SNMP) is used to monitor and control computers and network devices.

Practical use of the SNMP protocol

A Network Management System (NMS) is used to monitor and control computers and network devices. The system queries and collects data from the agents of the monitored devices.

NOTE:

An Agent is a program, which runs on the monitored device and detects its status. Via SNMP, the detected data are transmitted to the Network Management System.

If an Agent detects a severe failure within the device, it can send a Trap packet to the

Network Management System. This way, the administrator is directly informed about such occurrences.

Configuring the SNMP agent

How to configure the SNMP agent:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network> SNMP Agent

tabs.

4. Enter the following data in the Global paragraph:

Status:

Protocol:

Port:

SysContact:

SysName:

SysLocation:

Select the particular entry to either switch the SNMP agent off (

Off

) or on (

Enabled

).

Select the protocol (

TCP

or

UDP

) – normally UDP – via which the SNMP packets are to be transmitted.

Define the port – normally 161 – on which the incoming

SNMP packets are to be accepted.

Enter the admin’s contact data (e.g. direct dial or email address).

Enter the device name.

Enter the location of the device.

5. If you want to process the packets of the

SNMPv2c

protocol version, enter the following data in the paragraph of the same name:

40 · G&D DL-Vision(M/S)

Device monitoring via SNMP

Access:

Source:

Read-only

community:

Activate the View access (

View

) or deny the access (

No

) via

SNMPv2c protocol.

Enter the IP address or the address space of the addresses of incoming SNMP packets.

Examples:

192.168.150.187:

Only IP address 192.168.150.187

192.168.150.0/24:

IP addresses of space 192.168.150.x

192.168.0.0/16:

IP addresses of space 192.168.x.x

192.0.0.0/8:

IP addresses of space 192.x.x.x

Enter the name of the Community which has also been selected in the Network Management System.

IMPORTANT:

The transfer of the packet password (Community) of the SNMPv2c protocol version is not encrypted. Therefore, it can be easily tapped!

If required, use the SNMPv3 protocol version (see below) and a high Securitiy

level to ensure a secure data transfer.

6. If you want to process the packets of the

SNMPv3

protocol version, enter the following data in the respective paragraph:

Access:

User:

Authentication

protocol

Authentication passphrase

Security level

Privacy protocol:

Privacy passphrase:

Activate the View access (

View

) or deny the access (

No

) via

SNMPv3 protocol.

Enter the username for the communication with the Net-

work Management System.

Select the authentication protocol (

MD5

or

SHA

) which has been activated in the Network Management System.

Enter the authentication passphrase for the communication with the Network Management System.

Select between one of the following options:

NoAuthNoPriv:

user authentication and Privacy protocol deactivated

AuthNoPriv:

user authentication activated, Privacy protocol deactivated

AuthPriv:

user authentication and Privacy protocol activated

Select the Privacy protocol (

DES

or

AES

) which has been activated in the Network Management System.

Enter the privacy passphrase for secure communication with the Network Management System.

7. Click

OK

to save your settings and to leave the window.

G&D DL-Vision(M/S) · 41

Device monitoring via SNMP

Configuring SNMP traps

How to add a new trap or edit an existing trap:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network > SNMP trap

tabs.

4. Click

Add

or

Edit

.

5. Enter the following data in the

Global

paragraph:

Server:

Protocol:

Port:

Retries:

Enter the IP address of the Network Management Servers.

Select the protocol (

TCP

or

UDP

) – normally UDP – via which the SNMP packets are to be transmitted.

Define the port – normally 162 – on which the outgoing

SNMP packets are to be accepted.

Enter the number of retries to send an SNMP Inform.

NOTE:

Inputs are only possible if the Inform option has been selected in the

Notification type entry.

Timeout:

Enter the time (in seconds) after which an SNMP Inform is to be sent again if you have received no confirmation.

NOTE:

Inputs are only possible if the Inform option has been selected in the

Notification type entry.

Log level:

Select from which severity level an SNMP trap is to be sent.

The selected severity level and all lower severity levels are logged.

NOTE:

If you select the 2 - Critical, severity level SNMP traps are sent for occurences from this level and from the 1 - Alarm and 0 - Emergency severity levels.

Version:

Notification type:

Select if the traps are to be created and sent according to the

SNMPv2c (v2c) or SNMPv3 (v3) protocol.

Select if the occurrences are sent as Trap or Inform packet.

NOTE:

Inform packets require a confirmation of the Network Management Sys-

tem. If this confirmation is not available, the transmission is repeated.

42 · G&D DL-Vision(M/S)

Device monitoring via SNMP

6. If you use the

SNMPv2c

protocol version, use the respective paragraph to enter the same Community name as selected in the Network Management System.

IMPORTANT:

The transfer of the packet password (Community) of the SNMPv2c protocol version is not encrypted. Therefore, it can be easily tapped!

If required, use the SNMPv3 protocol version (see below) and a high Security level to ensure a secure data transfer.

7. If you decided to use the

SNMPv3

protocol version, use the respective paragraph to enter the following data:

User:

Authentication protocol

Authentication passphrase

Security level

Privacy protocol:

Privacy passphrase:

Engine ID:

Enter the username for communication with the Network

Management System an.

Select the authentication protocol (

MD5

or

SHA

) which has been activated in the Network Management System.

Enter the authentication passphrase for the communication with the Network Management System.

Select between one of the following options:

NoAuthNoPriv:

deactivated user authentication and Privacy protocol

AuthNoPriv:

activated user authentication, deactivated Pri-

vacy protocol

AuthPriv:

activated user authentication and Privacy protocol

Select the privacy protocol (

DES

or

AES

) which has been activated in the Network Management System.

Enter the privacy passphrase for secure communication with the Network Management System.

Enter an Engine ID which clearly identifies the SNMP agent within the network.

8. Click

OK

to save your settings and to leave the window.

G&D DL-Vision(M/S) · 43

Device monitoring via SNMP

How to delete an existing trap:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network > SNMP trap

tabs.

4. Select the receiver to be deleted and click

Delete

.

5. Click

OK

to save your settings and to leave the window.

How to generate a test event:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device to be configured. Now click the

Configuration

entry in the context menu.

3. Click the

Network > SNMP trap

tabs.

4. Click on

Generate test event

.

5. Click

OK

to save your settings and to leave the window.

NOTE:

If properly configured, the Trap message is displayed within your Network

Management System.

44 · G&D DL-Vision(M/S)

Logbook

Logbook

The Logbook of a device of the KVM system allows you to collect any information.

ADVICE:

Write down if you plan on changing the configuration of the device and assign the entry with a status (»Open«).

After these changes have been carried out, assign the »Closed« status to the logbook entry. This way you can refer to the logbook to look up the times at which the changes have been made.

If you want to save the logbooks or edit them with other programs, the logbooks of the different devices can be printed, copied to the clipboard, or exported to a file.

The dialog entries of the logbook

After the logbook has been called up, the »Logbook configuration« dialog shows an overview of all logbook entries that have been saved so far.

All details regarding the entry are shown by double-clicking.

The »Logbook configuration« dialog

The Logbook configuration dialog shows a table with all logbook entries that have been made until then.

The table displays the Subject and Status (»Open« or »Closed«) as well as the Date the entry has been last edited.

NOTE:

By default, the table is sorted in descending order according to the contents of the »Status« column. This order is indicated by a small triangle in the column header.

If you want to sort the entries according to the contents of another column, click the header of the desired column. Another click reverses the sort sequence.

The following actions can be carried out in the logbook:

New:

create a new logbook entry

Edit:

update an existing logbook entry

Delete:

delete a logbook entry

Print:

print a logbook entry

Export:

export the data of the logbook entry to csv file

Copy:

copy the details of the logbook entry to the clipboard

G&D DL-Vision(M/S) · 45

Logbook

Viewing a logbook entry in detail

Double-click a logbook entry to show its details. The overview provides the following information:

Subject:

Body:

Status:

Creator:

Created:

Last editor:

Last edited:

short description (max. 128 characters) that allows a quick overview in the table and on the print-out detailed description (max. 1.024 characters) current status (»Open« or »Closed«) user name of the person who created the logbook entry date and time the entry has been originally created user name of the person who last changed the entry date and time the entry has been last changed

The upper part of the dialog shows several buttons that provide the following functions:

(left arrow):

shows the previous logbook entry (if available)

Print:

print logbook entry

Export:

export the data of the logbook entry to csv file

Copy:

copy the details of the logbook entry to the clipboard

(right arrow):

shows the last logbook entry (if available)

NOTE:

The functions of the Print, Export and Copy buttons correspond to the entries of the same name in the context menu of the logbook entries.

These functions are described on the following pages.

Basic logbook functions

The basic logbook functions enable you to create new or edit and delete the existing logbook entries.

IMPORTANT:

Any device within a KVM system provides a separate logbook.

Creating a new logbook entry

How to create a new logbook entry for a device:

1. Click on the folder that contains the device whose logbook you want to open.

2. Right-click on the desired device and click on

Logbook

in the context menu.

3. Click on

New

.

46 · G&D DL-Vision(M/S)

Logbook

4. Enter the

Status

(max. 128 characters) of the logbook entry.

ADVICE:

The subject is shown in the overview of the logbook entries and allows a quick overview of the entries.

5. If necessary, use the

Body

entry to change the detailed description (max. 1.024 characters) of the logbook entry.

6. Click

OK

to save the logbook entry.

Changing a logbook entry

How to change the logbook entry of a device:

1. Click on the folder that contains the device whose logbook entry you want to change.

2. Right-click on the desired device and click on

Logbook

in the context menu.

3. Click the entry to be edited and click on

Edit

.

4. If necessary, change the

Subject

(max. 128 characters) of the logbook entry.

ADVICE:

The subject is shown in the overview of the logbook entries and allows a quick overview of the entries.

5. If necessary, use the

Body

entry to change the detailed description (max. 1.024 characters) of the logbook entry.

6. Use the

Status

button to select between the »Open« and »Closed« options.

7. The following information are provided in this dialog:

Creator:

Created:

Last editor:

Last edited:

user name of the person that created the logbook entry date and time the entry has been originally created user name of the person that last changed the entry date and time the entry has been last changed

8. Click

OK

to save the logbook entry.

G&D DL-Vision(M/S) · 47

Logbook

Deleting a logbook entry

How to delete the logbook entry of a device:

1. Click on the folder that contains the device whose logbook entry you want to delete.

2. Right-click on the desired device and click on

Logbook

in the context menu.

3. Click the entry to be deleted and click on

Delete

.

4. Confirm the confirmation prompt by clicking

Yes

or cancel the process by clicking

No

.

Advanced functions

The advanced functions allow you to print or export the logbook entries. The data of a logbook entry can also be copied to the clipboard.

The advanced functions can either be called up via the buttons in the detail dialog of the logbook or the context menu of the »Logbook configuration« dialog.

NOTE:

The functions of several logbook entries can only be applied if they have been called up via the context menu.

Printing logbook entries

How to print one or several logbook entries:

1. Click on the folder that contains the device whose logbook entry you want to change.

2. Right-click on the desired device and click on

Logbook

in the context menu.

3. Mark one or several existing logbook entries.

NOTE:

To select several logbook entries, press the

Ctrl

key and select the different entries by mouse.

4. Right-click one of the marked entries and click on

Print

.

5. Select the

Printer

on which the document is to be printed.

NOTE:

If desired, you can also adjust the headline, the number of copies, the page layout and the frame settings.

6. Click on

Print

.

48 · G&D DL-Vision(M/S)

Logbook

Exporting logbook entries

Use the export function to export the data of a logbook entry to a CSV file.

This file format is usually used for exchanging data between different programs. A

CSV file that has been created with the

Config Panel

web application can be read with all common spreadsheet programs, for example.

NOTE:

CSV is short for Comma-Separated Values.

How to export one or several logbook entries:

1. Click on the folder that contains the device whose logbook entry you want to change.

2. Right-click on the desired device and click on

Logbook

in the context menu.

3. Mark one or several existing logbook entries.

NOTE:

To select several logbook entries, press the

Ctrl

key and select the different entries by mouse.

4. Right-click one of the marked entries and click on

Export

.

5. Use the

File Name

section to select the location and the file name of the file to be created.

6. The configuration section offers the following settings:

Column

headings:

Delimiter:

Select if the column headings (Subject, Body, …) are to be output in the CSV file.

Options:

Yes

,

No

Select the desired delimiter between the different data fields in the CSV file.

Options:

Tabulator

,

Semicolon

,

Comma

,

Space

7. Click on

Export

.

G&D DL-Vision(M/S) · 49

Logbook

Copying the logbook entries

As an alternative to the export function, which creates a CSV file, the copy function can be used to copy logbook entries to the clipboard of the operating system.

The copied data can be pasted to any application that has access to the clipboard.

How to copy one or several logbook entries:

1. Click on the folder that contains the device whose logbook entry you want to change.

2. Right-click on the desired device and click on

Logbook

in the context menu.

3. Mark one or several existing logbook entries.

NOTE:

To select several logbook entries, press the

Ctrl

key and select the different entries by mouse.

4. Right-click one of the marked entries and click on

Copy

.

5. Open a document in the application to which you want to copy the data and press

Ctrl+V

.

50 · G&D DL-Vision(M/S)

Shared editing

Shared editing

The web application enables two users with the respective rights to edit settings at the same time.

For example, if two users simultaneously change the user account settings, the web application informs the other user about these changes:

A message in purple appears in the upper row of the footer and highlights the other user’s changes.

The changed setting or the menu item in the submenu, which contains this setting, is displayed in green.

The following options are provided to process the collected data:

Discard data:

Overwrite all data:

Only save own changes:

1. Click on

Reload

to read the current values of the dialogue from the database.

1. Click on

Accept

.

2. Click on

Overwrite all data

.

1. Click on

Accept

.

2. Click on

Only save own changes

.

G&D DL-Vision(M/S) · 51

Users and Groups

Users and Groups

Efficient rights administration

The web application administrates up to 256 user accounts as well as the same amount of user groups. Any user within the system can be a member of up to 20 groups.

The user accounts and the user groups can be provided with different rights to operate the system.

ADVICE:

The rights administration can almost be carried out completely through user groups. Therefore, the user groups and the assigned rights have to be planned and implemented beforehand.

This way, the user rights can be quickly and efficiently changed.

The effective right

The effective right determines the right for a particular operation.

IMPORTANT:

The effective right is the maximum right, which consists of the user account’s individual right and the rights of the assigned group(s).

EXAMPLE:

The user JDoe is member of the Office and TargetConfig groups.

The following table shows the user account rights, the rights of the assigned groups, and the resulting effective right:

Right

Target config

Change own password

Target access

User

JDoe

No

No

Group

Office

No

Yes

Group

TargetConfig

Yes

No

Effective right

Yes

Yes

Full

View No

Full

The settings of the Target config and Change own password rights result from the rights assigned to the user groups. The Target access right which, in this case, enables full access, was given directly in the user account.

The dialogue windows of the web application additionally display the effective right for every setting.

ADVICE:

Click the

Details

button to get a list of the groups and rights that are assigned to the user account.

52 · G&D DL-Vision(M/S)

Users and Groups

Efficient user group administration

User groups enable the creation of a shared right profile for several users with identical rights. Furthermore, the user accounts that are included in the member list can be grouped and therefore no longer have to be individually configured. This facilitates the rights administration within the matrix system.

If the rights administration takes place within the user groups, the user profile only stores general data and user-related settings (key combinations, language settings, …).

When initiating the matrix system, it is recommended to create different groups for users with different rights (e. g., »Office« and »IT«) and assign the respective user accounts to these groups.

EXAMPLE:

Creat more groups if the user rights are to be further divided. If, for example, some users of the »Office« group are to be provided with the multi-access right, a respective user group can be created:

Create a user group (e. g., »Office_MultiAccess«) with identical settings for the »Office« group. The multi-access right is set to full. Assign the respective user accounts to this group.

Create a user group (e. g., »MultiAccess«) and only set the multi-access right to Yes. In addition to the »Office« group, also assign the respective user accounts to this group.

In both cases, the user is provided with the full effective right for multi-access.

ADVICE:

The user profile offers the possibility to provide extended rights to a group member.

Administrating user accounts

User accounts enable you to define individual rights for every user.

IMPORTANT:

The administrator and any user that holds the Superuser right are permitted to create and delete user accounts and edit rights and user-related settings.

G&D DL-Vision(M/S) · 53

Users and Groups

Creating a new user account

The web application administrates up to 256 user accounts. Any user account is provided with individual login data, rights and user-related settings for the KVM system.

How to create a new user account:

1. Click on

User area > User

in the tree view.

2. Right-click the display range and afterwards the

New

entry in the context menu.

3. Enter the following information within the interface:

Name:

Password:

Repeat password:

Clear text:

Full name:

Comment:

Enabled:

Enter the desired username.

Enter the user account password.

Repeat the password.

If necessary, mark this entry to view and control both passwords.

If desired, enter the user’s full name.

If desired, enter a comment regarding the user account.

Click this entry to activate the user account.

If the user account is deactivated, the user is not able to access the KVM system.

4. Click

OK

to save the entered data.

IMPORTANT:

After the user account has been created, it is assigned with no rights.

Add the user account to an existing user group or provide it with individual rights

(see page 56).

54 · G&D DL-Vision(M/S)

Users and Groups

Renaming the user account

How to rename a user account:

1. Click on

User area > User

in the tree view.

2. Right-click the user account to be edited and click the

Configuration

entry in the context menu.

3. Enter the new username in the

Name

entry.

4. Optional: Enter the user’s full name in the

Full name

entry

5. Click

OK

to save your settings.

Changing the user account password

How to change the user account password:

1. Click on

User area > User

.

2. Right-click the user account to be edited and click the

Configuration

entry in the context menu.

3. Click on

Change password

.

4. Change the following data within the entry mask:

New password:

Confirm password:

Clear text:

Enter the new password.

Repeat the new password.

Mark this entry to view and control both entered passwords.

5. Click

OK

to save the new password.

6. Click

OK

to save your settings.

G&D DL-Vision(M/S) · 55

Users and Groups

Changing the user account rights

Any user account can be assigned with different rights.

The following table lists the different user rights. Further information on the rights can be found on the indicated pages.

Name

Change own password

Superuser right

WebIf login

Right

Change own password

Unrestricted access to the configuration of the system

Login to the

Config Panel

web application

Page

page 61

page 60

page 61

Changing a user account’s group membership

NOTE:

Any user within the system can be a member of up to 20 user groups.

How to change a user account’s group membership:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the user group to be edited and click the

Configuration

entry in the context menu.

3. Click the

Members

tab.

Now you can easily add members to or delete them from any user group.

The window consists of two tables. These tables list the user accounts of the

KVM matrix system:

Unassigned:

Assigned group members:

lists all user accounts that are not assigned to this group lists all user accounts that are assigned to this group

4. Mark the user account you want to add to or delete from the group.

5. Click the button (right arrow) to add the user account to the group or the button (left arrow) to delete it from the list.

56 · G&D DL-Vision(M/S)

Users and Groups

Enabling/Disabling a user account

IMPORTANT:

If the user account is disabled, the user has no access to the KVM system.

How to enable/disable a user account:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the user account you want to enable/disable and click the

Configuration

entry in the context menu.

3. Click the

Enabled

entry to enable the user account.

Disable the entry if you want to lock the access to the system for this user account

4. Click the

OK

button to save your settings.

Deleting a user account

How to delete a user account:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the user account you want to delete and click the

Delete

entry in the context menu.

3. Click

OK

to confirm the confirmation prompt.

G&D DL-Vision(M/S) · 57

Users and Groups

Administrating user groups

User groups enable the user to create a common rights profile for several users with the same rights and to add user accounts as members of this group.

This way, the rights of these user accounts do not have to be individually configured, which facilitates the rights administration within the KVM system.

NOTE:

The administrator and any user with the Superuser right are authorised to create and delete user groups as well as edit the rights and the member list.

Creating a new user group

The user can create up to 256 user groups within the system.

How to create a new user group:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the display range and click the

New

entry in the context menu.

3. Enter the following data in the entry mask:

Name:

Enabled:

Enter the name of the user group.

Activate this entry to enable the user group.

NOTE:

If the user group is disabled, the group rights do not apply to the assigned members.

Comment:

If necessary, enter a comment regarding the user group.

4. Click

OK

to save your settings.

IMPORTANT:

Directly after the new user group has been created, it contains no rights within the system

Renaming a user group

How to rename a user group:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the user account you want to rename and click the

Configuration

entry in the context menu.

3. Use the

Name

entry to enter the new name of the user group.

4. Click

OK

to save your settings.

58 · G&D DL-Vision(M/S)

Users and Groups

Changing the user group rights

The various user groups can be assigned with different rights.

The following table lists the different user rights. Further information about the rights is given on the indicated pages

Name

Change own password

Superuser right

WebIf login

Right

Change own password

Unrestricted access to the configuration of the system

Login to the

Config Panel

web application

Page

page 61

page 60

page 61

Administrating user group members

How to administrate user group members:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the user group to be edited and click the

Configuration

entry in the context menu.

3. Click the

Members

tab.

Members can now easily be added to or deleted from the user groups.

The window consists of two tables. These tables list the user accounts of the

KVM system:

Unassigned:

Assigned group members:

lists all user accounts that are not assigned to this group lists all user accounts that are assigned to this group

4. Mark the user account you want to add to or delete from the group.

5. Mark the user account you want to add to or delete from the group. Now click the button (right arrow) to add the user account to the group or the button

(left arrow) to delete it from the list.

G&D DL-Vision(M/S) · 59

Users and Groups

(De)activating a user group

How to (de)activate a user group:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the user group you want to (de)activate and click the

Configuration

entry in the context menu.

3. Activate the

Enabled

entry to activate the user group.

If you want to lock the access to the KVM system for members of this user group, deactivate the entry.

4. Click the

OK

button to save your settings.

Deleting a user group

How to delete a user group:

1. Click on the

User area > User groups

entries in the tree view.

2. Right-click the user group you want to delete and click the

Delete

entry in the context menu.

3. Confirm the confirmation prompt by clicking

Yes

or cancel the process by clicking

No

.

System rights

Rights for full access (Superuser)

The Superuser right enables you to fully access and configure the KVM system.

NOTE:

The information about the user rights, which have been assigned before, are still stored when the Superuser right is activated. After the Superuser right has been withdrawn, the saved rights do apply again.

How to change the Superuser right:

1. If you want to change this right of a user account, click the

User area > Users

entries in the tree view.

For changing the rights for a user group, click the

User area > User groups

entries.

2. Right-click the user account or the user group you want to configure and click the

Configuration

entry in the context menu.

3. Click the

System rights

tab.

60 · G&D DL-Vision(M/S)

Users and Groups

4. Use the

Superuser

entry to select between the following options:

Yes:

No:

allows full access to the KVM system and the connected devices denies full access to the KVM system and the connected devices

5. Click

OK

to save your settings.

Changing the login right to the web application

How to change the login right to the web application:

1. If you want to change this right of a user account, click the

User area > Users

entries in the tree view.

For changing the rights for a user group, click the

User area > User groups

entries.

2. Right-click the user account or the user group you want to configure and click the

Configuration

entry in the context menu.

3. Click the

System rights

tab.

4. Use the

Web Interface Login

entry to select between the following options:

Yes:

No:

enables access to web application denies access to web application

5. Click

OK

to save your settings.

Rights to change your own password

How to change the right to change your own password:

1. If you want to change this right of a user account, click the

User area > Users

entries in the tree view.

For changing the rights for a user group, click the

User area > User groups

entries.

2. Right-click the user account or the user group you want to configure and click the

Configuration

entry in the context menu.

3. Click the

System rights

tab

.

4.

Use the

Change own password

entry to select between the following options:

Yes:

No:

allows the user to change the user account password denies the user to change the user account password

5. Click

OK

to save your settings.

G&D DL-Vision(M/S) · 61

The »KVM combinations« folder

The »KVM combinations« folder

The KVM combinations folder enables you to group different devices in any folders.

Especially in larger system, this folder provides better orientation.

The devices can be grouped according to locations (e. g. server room) or other features (e. g. the operating system of the connected computer).

ADVICE:

The devices of different classes – e.g. the target modules of a matrix system or an extender – can be grouped within one folder.

Folder administration

The KVM combinations folder provides the following system folders:

[Unassigned]:

[All devices]:

This folder lists all devices that are not assigned to any KVM combination.

This folder lists all devices of the KVM system.

NOTE:

The system folders can neither be deleted nor renamed.

Creating a new folder

How to create an empty folder:

1. Right-click on

KVM combination

in the tree view and click on

New folder

in the context menu.

ADVICE:

If you want to create a subfolder, right-click the main directory and click on

New folder

.

2. Use the

Name

entry to enter the desired name.

3. Optional: Use the

Comment

entry to enter a comment.

4. Click

OK

to create the folder.

62 · G&D DL-Vision(M/S)

The »KVM combinations« folder

Assigning a device to a folder

NOTE:

Each device can be listed in any number of subfolders.

How to group the connected devices in a new folder:

1. Click on

KVM combinations > [All devices]

in the tree view.

2. Right-click a connected device and click on

Group connected devices

in the context menu.

3. Use the

Name

entry to enter the desired name.

4. Optional: Use the

Comment

entry to enter a comment.

5. Click

OK

to group the devices in the new folder.

How to assign a device to an existing folder:

1. Click on

KVM combinations > [All devices]

in the tree view.

2. Right-click the device to be assigned and click on

Copy device

in the context menu.

3. Open the folder to which the device is to be assigned to.

4. Right-click the main view and click on

Paste device

in the context menu.

Deleting a device from a folder

A device can be deleted from the folder by moving it to the [Unassigned] group or by selecting the

Remove from folder

entry in the context menu.

How to cancel a target module’s assignment to a folder:

1. Click on

KVM combinations > [All devices]

in the tree view.

2. Open the folder to which the device is assigned to.

Right-click the device whose assignment you want to delete and click on 

Remove from folder

in the context menu.

G&D DL-Vision(M/S) · 63

The »KVM combinations« folder

Renaming a folder

How to rename a folder:

1. Click on

KVM combinations > [All devices]

in the tree view.

2. Right-click the folder to be renamed and click on

Rename folder

in the context menu.

3. Edit the name and press

Enter

.

Deleting a folder

Any created folders can be deleted at any time.

If a folder contains devices while it is deleted, these devices are automatically moved to the [Unassigned] group.

NOTE:

The system folders [Unassigned] and [All devices] are administrated by the web application and cannot be deleted.

How to delete a folder:

1. Click on

KVM combinations > [All devices]

in the tree view.

2. Right-click the folder to be deleted and click on

Delete folder

in the context menu.

3. Confirm the confirmation prompt by clicking

Yes

or cancel the task by clicking

No

.

64 · G&D DL-Vision(M/S)

Advanced functions of the KVM system

Advanced functions of the KVM system

Temporarily (de)activating SNMP traps

(Maintenance mode)

By activating the maintenance mode, the user is enabled to deactivate SNMP traps

(see page 42), e.g. for devices that are occupied for reasons of maintenance.

The status messages are displayed again after the maintenance mode has been deactivated.

(De)activating the maintenance mode

How to (de)activate a device’s maintenance mode:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device and click on 

Maintenance > On

or

Maintenance > Off

in the context menu.

Viewing a list of devices in maintenance mode

How to display the list of devices in maintenance mode:

1. Click on the

System monitoring > Maintenance

folders in the tree view.

The main view lists the respective devices.

ADVICE:

The devices in Maintenance mode are always displayed in yellow.

Identifying a device by activating the Identification LED

Some devices provide an Identification LED on the front panel.

Use the web application to switch the device LEDs on or off in order to identify the devices in a rack, for example.

How to (de)activate the Identification LED of a device:

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device and click on 

Identification LED > On

or

Identification LED > Off

in the context menu.

G&D DL-Vision(M/S) · 65

Advanced functions of the KVM system

Saving and restoring the data of the KVM system

All system settings – except the network settings of the devices – can be saved with this backup function.

The saved data can be restored by using the restore function.

NOTE:

The Backup and restore function paragraph on page 21 describes how to save

and restore the network settings of a device of the KVM system.

How to save the system settings of the KVM system:

1. Click on

System

in the tree view.

2. Right-click on

System

in the display range and click on

Backup/Restore

in the context menu.

3. Click

Backup

.

4. Optional: Enter a

Comment

and/or a

Password

to secure the backup file.

5. Click

OK

.

6. Use the file window to define the location and the

File name

of the backup file.

7. Click

Save

.

8. Click

OK

to leave the window.

How to restore the system settings of the KVM system:

1. Click on

System

in the tree view.

2. Right-click on

System

in the display range and click on

Backup/Restore

in the context menu.

3. Enter the location and the name of the backup file in the

Path

entry.

ADVICE:

Use the file button to select the name and the location of the backup file via the file window.

4. Optional: Click

Check file

to check the validation of the backup file.

5. Use the information in the

Date

and

Comment

entries to check if you selected the desired backup file.

6. Click

Restore

.

7. Click

OK

to leave the window.

66 · G&D DL-Vision(M/S)

Advanced functions of the KVM system

Administration and use of EDID profiles

The EDID information (Extended Display Identification Data) of a monitor inform the graphics card of a connected computer about various technical features of the device.

A special EDID mode can be activated if the computer connected to the KVM extender is assembled with a

Barco PVS

graphics card. This mode considers the special treatment of EDID data by the graphics card.

Some resolutions can be selected using a special GUD profile. The profile names refer to the resolution that is transmitted to the monitor when using this profile.

ADVICE:

In some cases it is recommended to read out the EDID profile of the console monitor (see page 77) and activate the configuration of the target module afterwards.

Importing the EDID profile of a monitor

NOTE:

An EDID profile can either be imported from a bin file or directly from a monitor that is connected to the KVM switch.

How to import the EDID profile of a connected monitor:

1. Click on

System > Edid profiles

in the tree view.

2. Right-click in the display area and click on

New

in the context menu.

3. Click on

Learn

.

4. Mark the user module to which the monitor whose EDID information you want to import is connected.

NOTE:

Click the

[+]

icon to display a list of all user modules that are connected to the matrix switch.

5. Click

Ok

.

NOTE:

The

Name

and

Comment

entries are automatically filled out and the contents of the EDID information is displayed.

6. If desired, change the information in the

Name

and/or

Comment

entries.

7. Click

OK

to save your settings.

How to import the EDID profile of a monitor from a file:

1. Click on

System > Edid profiles

in the tree view.

2. Right-click in the display area and click on

New

in the context menu.

3. Click on

Search

.

G&D DL-Vision(M/S) · 67

Advanced functions of the KVM system

4. Use the file dialogue to choose the bin file you want to import and click on

Open

.

NOTE:

The

Name

and

Comment

entries are automatically filled out and the contents of the EDID information is displayed.

5. If desired, change the information in the

Name

and/or

Comment

entries.

6. Click

OK

to save your settings.

Overview of the stored EDID profiles

The

System > Edid profiles

branch of the tree view provides an overview of the EDID profiles that are stored within the KVM system.

Use the context menu the Add or Delete and Change the profiles added by the user.

NOTE:

Add, Delete and Change the profiles as described on the previous pages.

HINWEIS:

Information on choosing and enabling an EDID profile for a particular

video channel is given on page 78.

Activating the premium functions

After a premium function has been purchased, the user receives a feature key. This file contains a key to activate the purchased function(s).

The premium function(s) is/are activated by importing this key to the web application.

How to import a feature key to activate the purchased function(s):

1. Use the tree view to click on

KVM Extenders > [All extenders]

.

2. Right-click the device whose feature key is to be imported.

3. Click the

Configuration

entry in the context menu.

4. Click the

Features

tab.

5.

Click on

Import feature key from file...

and import the feature key (file) via the file interface.

After the file has been loaded, the clear text of the feature key is displayed in the text field.

NOTE:

The clear text of the feature key can also be copied into the text field.

6. Click

OK

to close the window.

68 · G&D DL-Vision(M/S)

Overview of the monitoring values

Overview of the monitoring values

The device-specific branches as well as the KVM combinations and the Critical devices branch of the tree view enable you to view information on the current status of the different devices in the KVM system.

The following pages list the various monitoring values.

»DL-Vision« KVM extender

NOTE:

This placeholder

[y]

symbolises the number of the video channels of multichannel devices.

Feature

CPU power

CPU PS/2

CPU USB 2.0

CPU USB HID

CPU USB K/M

Status

Off

On

Keyboard

Keyboard/Mouse BothPS/2 interfaces of the computer module are connected to the computer.

Mouse The PS/2 mouse interface of the computer module is connected to the computer.

None

Connected

The PS/2 interfaces of the computer module are not connected to the computer.

The »USB 2.0« interface of the computer module is connected to the computer.

Disconnected

Meaning

The computer connected to the computer module is turned off.

The computer connected to the computer module is turned on.

The PS/2 keyboard interface of the computer module is connected to the computer.

Connected

Disconnected

Initialized

The »USB 2.0« interface of the computer module is not connected to the computer.

Established connection between computer and 

USB HID emulation

No connection between computer and 

USB HID emulation

Initialized connection between computer and 

USB HID emulation

Connected

Disconnected

The »USB K/M« interface of the computer module is connected to the computer.

The »USB K/M« interface of the computer module is not connected to the computer.

G&D DL-Vision(M/S) · 69

Overview of the monitoring values

Feature

CPU access

Status

Local

Local excl.

Remote

Remote excl.

Display [y]

Display type [y]

DVI cable CPU [y]

DVI signal CPU [y]

DL-DVI

None

Fan speed 1|2

SL-DVI

[Value]

Freeze [y]

Link 1|2

Active

Inactive

Crossed connected disconnected

[Value]

Connected

Connected

Disconnected

Disconnected

Main power

Network A|B

PS/2 Con

Redundant power

Meaning

The local console operates the computer.

The local console operates the computer exclusively.

The remote console operates the computer.

The remote console operates the computer exclusively.

A monitor is connected.

No monitor is connected.

Show EDIDinformation

Monitor connected.

Monitor connected.

No monitor connected.

No monitor connected.

Dual link video signal detected.

No video signal detected

Single link video signal detected.

Rotations per minute

Down

Up

Active freeze mode

Inactive freeze mode

Crossed cable connection between user module and computer module.

Ch e ck the cable connection and ensure that the cable connects interfaces with the same designation.

Cable connection to other module,  inactive connection

Cable connection to other module,  active connection

Off

On

Down

Up

»Main power« power pack is turned off

»Main power« power pack is turned on

No connection to network

Established connection to network

Keyboard A PS/2 keyboard is connected to the user module.

Keyboard/Mouse Both PS/2 mouse and PS/2 keyboard are connected to the user module.

Mouse

None

Off

A PS/2 mouse is connected to the user module.

No PS/2 devices are connected to the user module.

»Red. power« power pack is turned off

On »Red. power« power pack is turned on

70 · G&D DL-Vision(M/S)

Feature

SFP module [y]

Voltage

Status

Current

Temperature

USB Con

USB link

Overview of the monitoring values

Status

Down

Meaning

Cable connection to other module,  inactive connection

Disabled module Module deactivated

No module

Up

[Value]

Offline

Offline

Online

Online

No module employed.

Cable connection to other module,  active connection electric voltage (V)

The device is turned off.

The device is turned off.

The device is turned on.

The device is turned on.

[Value]

[Value]

Current (A)

Current temperature within the device

Keyboard A USB keyboard is connected to the user module.

Keyboard/Mouse Both USB mouse and USB keyboard are connected to the user module.

Mouse A USB mouse is connected to the user module.

None

Down

Module deactivated

No module

Up

No USB devices are connected to the user module.

Cable connection to other module,  inactive connection

The device transmits transparent USB signals.

The function has been disabled.

The device does not transmit transparent USB signals.

Cable connection to other module,  inactive connection

G&D DL-Vision(M/S) · 71

2

KVM extenders

The KVM extenders entry in the tree directory of the web application enables you to configure different settings of the KVM extender and to view the status information of the device.

NOTE:

The chapter Overview of the monitoring values on page 69 ff. explains the dif-

ferent information.

Basic configuration of KVM extenders

Renaming a KVM extender

How to rename a KVM extender:

1. Click on

KVM extenders > [All extenders]

in the tree view.

2. Right-click the user module or the computer module to be edited. Now, click on the

Configuration

entry in the context menu.

3. Use the

Name

entry to enter the new extender name.

4. Click

OK

to save your settings.

Changing the comment of a KVM extender

The list field of the web application not only displays the extender name but also the entered comment.

ADVICE:

Use the comment to note the KVM extender’s location, for example.

How to change the comment of a KVM extender:

1. Click on

KVM extenders > [All extenders]

in the tree view.

2. Right-click the user module or the computer module to be edited. Now, click on the

Configuration

entry in the context menu.

3. Use the

Comment

entry to enter any comment.

4. Click

OK

to save your settings.

72 · G&D DL-Vision(M/S)

Configuration settings of KVM extenders

Deleting a KVM extender from the G&D system

If the system is not able to detect an already known KVM extender, the system defines the device as being switched off.

Therefore, delete the list entry of the KVM extender that you want to permanently remove from the system.

NOTE:

Only switched-off target modules can be deleted.

How to delete a KVM extender that is switched off or disconnected from the system:

1. Click on

KVM extenders > [All extenders]

in the tree view.

2. Right-click the user module or computer module you want to delete and click the

Delete

entry in the context menu.

3. Confirm the security request by clicking

Yes

or cancel the process by clicking

No.

Configuration settings of

KVM extenders

Enabling/Disabling the setup mode

In the default settings of the KVM extender, the configuration can either be changed in the setup mode or via web application.

If desired, the setup mode can also be completely disabled.

How to (enable/disable the setup mode:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

4. Select the

Setup Mode

entry and choose between the following options:

Enabled:

Disabled:

enables setup mode disables setup mode

5. Click

OK

to save your changes.

G&D DL-Vision(M/S) · 73

Configuration settings of KVM extenders

Enabling/Disabling the hotkey delay

Press the

Hotkey+Backspace

(default:

Ctrl+Backspace

) key combination for seven seconds in order to start the setup mode.

You can disable the hotkey delay if you want to start the setup mode directly after pressing the key combination.

How to enable/disable the hotkey delay:

ADVICE:

The web application can be used to adjust the delay within a time span between 1 and 60 seconds.

1. Use the tree view to click on

KVM extenders > [All extenders

]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

4. Select the

Hotkey Delay Seconds

entry to enter the desired delay in seconds.

NOTE:

The maximum time span for the delay is 60 seconds. Entering the value

0

deactivates the delay.

5. Click

OK

to save your changes.

Changing the hotkey

If many application programs with key combinations are operated on one computer or if different G&D devices are used in one cascade, the number of available key combinations might be restricted.

If an application program or another KVM device within the cascade uses the same hotkey, the hotkey can be changed.

NOTE:

Select your desired key or key combination from the keys Ctrl, Alt, Alt Gr,

Win or Shift.

How to change the current double hotkey:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

4. Select the row

Hotkey modifier

to choose at least one of the mentioned modifiers

(Ctrl, Alt, Alt Gr, Win or Shift) by clicking the particular entry(es).

5. Click

OK

to save your changes.

74 · G&D DL-Vision(M/S)

Configuration settings of KVM extenders

Changing the setup scancode

The hotkey to call the setup mode consists of at least one hotkey modifier (see

Changing the hotkey on page 74) and an additional setup key, which can be selected

by the user.

You can change both thehotkey modifier

Ctrl

and the setup key

Num

.

How to change the current setup scancode:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

4. Select the desired key in the

Setup key

entry.

The following keys are provided: Backspace, Print, Scroll, Num, Pause, Insert, Delete,

Pos 1, End, PgUp, PgDn and Space.

5. Click

OK

to save your changes.

Changing the »Permanent Access« key

After you have pressed the key combination to operate the system exclusively, the input devices at the concurrent console are disabled.

Only after the key combination has been pressed again at the active console, both consoles can operate the KVM extender again.

The key combination for the exclusive operation consists of at least a hotkey modi-

fier (see Changing the hotkey on page 74) and an additional »Permanent Access« key,

which can be selected by the user.

You can change the hotkey modifier

Ctrl

as well as the »Permanent Access« key

PrtScr

.

How to change the »Permanent Access« key:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

4. Select the desired key in the

Permanent Access key

entry.

The following keys are provided: Backspace, Print, Scroll, Num, Pause, Insert, Delete,

Pos 1, End, PgUp, PgDn and Space.

5. Click

OK

to save your changes.

G&D DL-Vision(M/S) · 75

Configuration settings of KVM extenders

Changing the time span of the input lock

If the user carries out keyboard or mouse inputs at a console, the KVM extender automatically locks the input devices of the concurrent console. The lock is lifted if no input is made at the active console within the adjusted timing of the input lock

(default: 1 second).

After the lock has been lifted, both users can operate the computer again.

The time span of the input lock can be adjusted between 1 and 90 seconds.

How to change the time span of the input lock:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

4. Use the

Multiuser input lock

entry to enter the time span of the input lock in seconds.

NOTE:

The maximal time span of the input lock is 90 seconds.

5. Click

OK

to save your changes.

Authorisation for permanent console access

If no inputs are being made at the active console during the adjusted time span of the automatic input lock (default: 1 second), the default settings of the KVM extender permit the other console to operate the connected computer.

If the function to permenantly access the console is activated in the web application, the user is enabled to exclusively operate the KVM extender by pressing the key combination

Hotkey+PrtScr

(default:

Ctrl+PrtScr

).

Pressing this key combination disables the input devices of the concurrent console.

By pressing the key combination again at the active console, both consoles can operate the

DL-Vision

system again.

NOTE:

After the exclusive operation of the KVM extender has been activated at a user console, the Caps Lock, the Num as well as the Scroll Lock LEDs are alternately blinking at the keyboard of the locked user console.

The blinking Scroll Lock LED at the user console indicates that the KVM extender is exclusively operated.

The blinking Scroll LEDs at both console keyboards indicate that the exclusive operation of the KVM matrix system has been activated.

76 · G&D DL-Vision(M/S)

Configuration settings of KVM extenders

How to select the right for permanent console access:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

Console

tab.

4. Use the

Permanent Access mode

entry in the local console or

remote console

paragraphs to select between the following options:

Enabled:

Disabled:

enables permanent access denies permanent access

5. Click

OK

to save your changes.

Related topics:

Changing the console video mode on page 77

Changing the console video mode

In the standard configuration of the KVM extender, the computer’s image is output at the monitor of the active console as well as at the monitor of the concurrent console.

This setting enables you to define if the image of the other console is to be switched off during inputs at a console.

The image is displayed on the other monitor as soon as the user at the concurrent console finishes their inputs.

How to select the video mode for the local console:

1. Use the tree view to click on

KVM Extenders > [All Extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

Console

tab.

4. Use the

local > Image display

entries to select between the following options:

Always on

Off for actions at remote console

5. Click

OK

to save your changes.

G&D DL-Vision(M/S) · 77

Configuration settings of KVM extenders

How to select the video mode for the remote console:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

Console

tab.

4. Use the

remote > Image display

entries to select between the following options:

Always on

Off for actions at local console

5. Click

OK

to save your changes.

Related topics:

Changing the time span of the input lock on page 76

Authorisation for permanent console access on page 76

Selecting the EDID mode of the KVM extender

The EDID information (Extended Display Identification Data) of a monitor inform the graphics card of a connected computer about different technical device features. The information are usually transmitted via Enhanced-DDC (Enhanced Display Data Chan-

nel) from KVM extender to the computer without alteration.

A special EDID mode can be activated if the computer connected to the KVM extender is assembled with a

Barco PVS

graphics card. This mode considers the special treatment of EDID data by the graphics card.

Some resolutions can be selected using a special GUD profile. The profile names refer to the resolution that is transmitted to the monitor when using this profile

Alternatively, the EDID profile of a monitor can be read in. The extender transmits the profile to the connected computer. Detailed information about this topic is given in a sparate chapter on page 70 ff.

IMPORTANT:

It might be possible that Barco PVS graphics cards do not create an image in the Auto mode.

How to select the EDID mode of the KVM extender:

1. Use the tree view to double-click on

KVM Extenders > [All Extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

78 · G&D DL-Vision(M/S)

Configuration settings of KVM extenders

4. Use the

EDID mode

field to select between the following options:

[Auto]:

[BARCO PVS]:

GUD DVI …:

Name:

SUN DE:

standard keymode automatic treatment of EDID data (default) special mode for Barco PVS graphics cards

G&D profile for a particular resolution

EDID profile read in by user

5. Click

OK

to save your settings.

NOTE:

Please mind the activation sequence recommended in the installation guide when initiating or connecting another monitor.

Freeze mode

If the cable connection between computer and user module fails during operation, the

KVM extender no longer displays an image at the console monitor.

Enable the Freeze mode if you want the last available image at the user module to be displayed after the connection was interrupted. The image will be displayed until the connection is re-established.

TIPP:

To highlight a failure in the connection, the last available image can be displayed either with a coloured frame and/or the popup stating

Frozen

.

How to configure the freeze mode:

1. Click on

KVM Extenders > [All Extenders]

in the tree view.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

Console

tab.

The Freeze mode can be disabled/enabled for each video channel of the user module. The following options can be adjusted separately for each video channel of multi-channel devices.

4. Use the

Freeze mode

box to choose between the following options:

Disabled:

Enabled:

show no image when disconnected (default).

show last available image when disconnected.

G&D DL-Vision(M/S) · 79

Configuration settings of KVM extenders

5. If the Freeze mode is disabled, you can use the

Freeze visualization

box to disable the following options.

Frame:

OSD:

Apple:

shows a coloured frame when disconnected.

shows Frozen when disconnected.

keymode for Apple computers

6. Click

OK

to save your settings.

Starting the user module without keyboard

The module stops the start-up and shows a message if no keyboard is connected a user module.

Disable the keyboard support to start the module without keyboard.

How to disable/enable keyboard support for the user module:

1. Click on

KVM Extenders > [All Extenders]

in the tree view.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

Console

tab.

4. Use the

Remote > Keyboard required

box to choose between the following options:

Enabled:

Disabled:

interrupt start-up if keyboard cannot be detected (default).

continue start-up without keyboard.

5. Click

OK

to save your settings.

Settings for special hardware

Support for special Multimedia and Sun keys

Various manufacturers added special keys to the standard keyboards.

Some keyboards are provided with multimedia keys through which it is possible to comfortably operate special multimedia functions of the computer. For example, the keyboard of the Apple Mac mini is provided with a key to open the DVD drive.

Compared to standard keyboards, Sun desktops and servers are provided with separate keys (Solaris Shortcut Keys) to operate special system functions. After the keyboard mode for Sun desktops and servers has been activated, the Solaris Shortcut Keys can be used at the console. If the console only provides a standard keyboard, several key combinations can be applied to emulate the Solaris Shortcut Keys (see page 81).

Several USB keymodes are provided to use the special keys of such keyboards.

80 · G&D DL-Vision(M/S)

Configuration settings of KVM extenders

How to enable/disable the support for Multimedia or Sun special keys:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

General

tab.

4. Use the

USB Keymode

entry in the Configuration paragraph to select between the following options:

PC Standard:

PC Multimedia:

Apple:

SUN US:

SUN DE:

standard keymode support for Multimedia special keys keymode for Apple computers

Sun keymode (American layout)

Sun keymode (German layout)

5. Click

OK

to save your changes.

If the console is provided with a Sun keyboard, use the Solaris Shortcut Keys of this keyboard after enabling. When using a standard keyboard, these functions can be performed by using the key combinations listed below:

Key combination

Ctrl+Alt+F2

Ctrl+Alt+F3

Ctrl+Alt+F4

Ctrl+Alt+F5

Ctrl+Alt+F6

Ctrl+Alt+F7

Ctrl+Alt+F8

Ctrl+Alt+F9

Ctrl+Alt+F10

Ctrl+Alt+F11

Ctrl+Alt+F12

Ctrl+Alt+NUM+

Ctrl+Alt+NUM-

Ctrl+Alt+NUM*

Ctrl+Alt+Pause

Pause+A

Solaris Shortcut Key of Sun keyboard

Again

Props

Undo

Front

Copy

Open

Paste

Find

Cut

Help

Mute

Loud

Quiet

Compose

Shutdown

Stop

G&D DL-Vision(M/S) · 81

Configuration settings of KVM extenders

Support for special keyboards

The KVM extender supports the special functions of keyboards PixelPower Clarity

(blue) and SKIDATA1 keyboards.

If you want to apply such a keyboard, enable its support.

How to (enable/disable the support for special keyboards:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

Console

tab.

4. Use the

local > PS/2 keyboard type

entries and/or the

local > PS/2 leyboard type

entries to select between the following options:

PixelPower Blue:

SKIDATA1:

Standard:

enables support for PixelPower Blue keyboards enables support for SKIDATA1 keyboards disables support for special keyboardss

5. Click

OK

to save your changes.

Changing the scancode set of a PS/2 keyboard

If a key is pressed on the PS/2 keyboard, the keyboard processor sends a data packet called scancode. The two common scancode sets (sets 2 and 3) contain different scancodes.

In the standard configuration, the KVM extender interprets all PS/2 keyboard inputs with the scancode set 2.

If the pipe (“|”) cannot be input or if the arrow keys of the keyboard do not function as expected, it is recommended to switch to scancode set 3.

How to change the settings of the scancode set:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Double-click the computer module of the KVM extender to be configured.

3. Click the

Console

tab.

4. Use the

local > Scancode Set

entries and/or the the

local > Scancode Set

entries to select between the following options:

Set 2:

Set 3:

enables scancode set 2 for PS/2 keyboard inputs enables scancode set 2 for PS/2 keyboard inputs

5. Click

OK

to save your changes.

6. Restart the KVM extender. After the restart, the keyboard is initialised and the selected scancode set does apply.

82 · G&D DL-Vision(M/S)

Advanced functions for KVM extenders

Advanced functions for KVM extenders

Viewing the status information of a KVM extender

The context menu of a KVM extender enables you to call a interface with various status information of the KVM extender.

How to view the status information of a KVM extender:

1. Use the tree view to click on

KVM extenders > [All extenders]

.

2. Right-click the user module or the computer module whose status information you want to view and click on

Information

in the context menu.

3. The appearing interface provides the following information:

KVM Extender

Name:

Device ID:

Status:

Comment:

KVM extender name physical ID of KVM extender current status ( on or off) of KVM extender user comment regarding the KVM extender

Device information

Firmware name:

MAC address A:

MAC address B:

Firmware revision:

Serial number:

U-Boot version:

Transparent USB:

IP address A:

IP address B:

displays the firmware name

MAC address of Network A interface

MAC address of Network B interface

Firmware version serial number of KVM extender boot loader version support of transparent USB signal (

on

or

off

)

IP address of Network A interface

IP address of Network B interface

4. Click

Close

to leave the window.

G&D DL-Vision(M/S) · 83

Advanced functions for KVM extenders

Viewing information on the connection

The connection information provides you with an overview of the physical connections between computer module and user modules.

This overview also displays the physical ID of the devices, the occupied Transmission interfaces as well es the device status.

How to view the connection information:

1. Use the tree view to click on

KVM Extenders > [All Extenders]

.

2. Right-click the desired user module or the computer module and click on

Connections

in the context menu to view information on the connection:

NOTE:

The computer module or the user module via whose context menu the connection information has been called is highlighted in red.

3. The connection information provides the following information:

 Names and physical device ID of the connected KVM extenders

Designations of interfaces of devices that are interconnected.

 switching status (On or Off) of the KVM extender

4. Click

Close

to leave the window.

84 · G&D DL-Vision(M/S)

Notes

G&D DL-Vision(M/S) · 85

Guntermann & Drunck GmbH

Dortmunder Str. 4a

57234 Wilnsdorf

Germany

Phone +49 2739 8901-100

Fax +49 2739 8901-120 http://www.GDsys.de [email protected]

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents