advertisement
G&D DL-Vision(M/S)
»Config Panel« Web Application
About this manual
This manual has been carefully compiled and examined to the state-of-the-art.
G&D neither explicitly nor implicitly takes guarantee or responsibility for the quality, efficiency and marketability of the product when used for a certain purpose that differs from the scope of service covered by this manual.
For damages which directly or indirectly result from the use of this manual as well as for incidental damages or consequential damages, G&D is liable only in cases of intent or gross negligence.
Caveat Emptor
G&D will not provide warranty for devices that:
Are not used as intended.
Are repaired or modified by unauthorized personnel.
Show severe external damages that was not reported on the receipt of goods.
Have been damaged by non G&D accessories.
G&D will not be liable for any consequential damages that could occur from using the products.
Proof of trademark
All product and company names mentioned in this manual, and other documents you have received alongside your G&D product, are trademarks or registered trademarks of the holder of rights.
Imprint
© Guntermann & Drunck GmbH 2011. All rights reserved.
Version 1.10 – 28/06/2011
Firmware: 1.6.000 (02948)
Guntermann & Drunck GmbH
Dortmunder Str. 4a
57234 Wilnsdorf
Germany
Phone +49 2739 8901-100
Fax +49 2739 8901-120 http://www.GDsys.de [email protected]
i · G&D DL-Vision(M/S)
Contents
Contents
Chapter 1: Basic functions
Selecting the default language of the web application .......................................... 8
Showing the version number of the web application ............................................ 8
Basic configuration of the web application ....................................................... 9
Configuring the global network settings ........................................................ 10
Increasing the reliability of network connections through link aggregation ..... 11
Changing the order/priority of existing netfilter rules .................................... 15
Special features for complex KVM systems................................................... 16
Creating and signing the X509 certificate ...................................................... 18
G&D DL-Vision(M/S) · ii
Contents
Locally logging the syslog messages ..............................................................25
Sending syslog messages to a server ..............................................................26
Viewing and saving local syslog messages .....................................................26
Listing values by applying monitoring sets ....................................................30
Listing individual values of critical devices ....................................................30
Advanced function regarding the administration of critical devices ................... 31
Messages regarding the critical status of the devices.......................................31
Marking the messages from a critical device as read.......................................32
Changing the name and/or comment of a monitoring group..........................34
Assigning members to a monitoring group ....................................................34
Changing the name and/or comment of a monitoring set ..............................37
Assigning members to a monitoring set .........................................................37
Selecting a monitoring set in the folder configuration.....................................38
The »Logbook configuration« dialog .............................................................45
iii · G&D DL-Vision(M/S)
Contents
Changing the user account password ............................................................ 55
Changing a user account’s group membership............................................... 56
Enabling/Disabling a user account ............................................................... 57
Administrating user group members ............................................................. 59
Changing the login right to the web application ............................................ 61
Rights to change your own password............................................................ 61
Advanced functions of the KVM system ......................................................... 65
Temporarily (de)activating SNMP traps (Maintenance mode) ........................... 65
(De)activating the maintenance mode........................................................... 65
Viewing a list of devices in maintenance mode.............................................. 65
Identifying a device by activating the Identification LED .................................... 65
Saving and restoring the data of the KVM system ............................................. 66
Administration and use of EDID profiles ......................................................... 67
Importing the EDID profile of a monitor ...................................................... 67
Overview of the stored EDID profiles........................................................... 68
G&D DL-Vision(M/S) · iv
Contents
Chapter 2: KVM extenders
Basic configuration of KVM extenders ............................................................ 72
Changing the comment of a KVM extender ...................................................... 72
Deleting a KVM extender from the G&D system .............................................. 73
Configuration settings of KVM extenders ....................................................... 73
Authorisation for permanent console access ...................................................... 76
Selecting the EDID mode of the KVM extender ............................................78
Starting the user module without keyboard....................................................80
Support for special Multimedia and Sun keys ................................................80
Changing the scancode set of a PS/2 keyboard..............................................82
Advanced functions for KVM extenders .......................................................... 83
Viewing the status information of a KVM extender ........................................... 83
v · G&D DL-Vision(M/S)
1
Basic functions
The
Config Panel
web application provides a graphical user interface to configure the matrix switches of the KVM system.
This application can be operated from any supported web browser (see page 2). It offers an alternative to configuring the devices connected to the system through the on-screen display of the different devices.
ADVICE:
The web application can be used in the entire network independently from the locations of the devices and consoles connected to the KVM system.
Thanks to its enhanced functions, the graphical user interface provides the following features for easy operation:
clearly arranged user interface
easy operation through the drag & drop function
monitoring of various system features
advanced network functions (netfilter, syslog, …)
backup and restore function
G&D DL-Vision(M/S) · 1
System requirements
System requirements
The
Config Panel
web application is an application that runs on the Java platform. It can be applied on a computer with installed Java Runtime Environment. Use one of the supported web browsers to run this application.
IMPORTANT:
Before operating the web application via web browser, connect the device on which the web application is operated to the local network (see installation guide).
Now, adjust the network settings as described on page 3.
Supported web browsers
The following web browsers support the web application:
Internet Explorer 7
Internet Explorer 8
Mozilla Firefox 3.6.9
Java Runtime Environment
The web application runs on Java Runtime Environment (JRE). Starting the web application requires the installation of version 6 (update 19).
A free download of this version is available at the following homepage:
http://java.sun.com/javase/downloads/
NOTE:
Mind the special instructions for running Java Runtime Environment on a 64bit browser for Windows:
http://www.java.com/en/download/faq/java_win64bit.xml
IMPORTANT:
The OpenJDK open source implementation of the Java platform is not supported.
2 · G&D DL-Vision(M/S)
Configuring the network settings
Configuring the network settings
To access the web application, the network settings of the device on which the web application is operated need to be configured.
The following table lists the default settings of the Network A network interface:
IP allocation:
static
IP address:
Subnet mask:
192.168.0.1
255.255.255.0
Connection type:
Auto
NOTE:
In the default, the Network B interface is deactivated.
How to configure the network settings before integrating the device into the local network:
1. Use a category 5 (or better) twisted pair cable to connect the network interface of any computer to the device’s Network A interface.
2. Ensure that the IP address of the computer’s network interface is part of the subnet to which the device’s IP address belongs to.
NOTE:
Use the IP address 192.168.0.100, for example.
3. Switch on the device.
4. Start the computer’s web browser and enter
192.168.0.1
in the address bar.
5. Configure the network interface(s) and the global network settings as described in
the paragraph Network settings on page 9 f.
IMPORTANT:
It is not possible to operate both network interfaces within one subnet!
6. Remove the twisted pair cable connection between computer and device.
7. Integrate the device into the local network.
G&D DL-Vision(M/S) · 3
Getting started
Getting started
This chapter describes how to operate the web application.
NOTE:
The following chapters give a detailed overview of all functions and configuration settings.
Starting the web application
The web application can be operated on a computer with installed Java Runtime Envi-
ronment. Use one of the supported web browsers to run this application.
NOTE:
Information regarding the system requirements of the web application are
How to start the web application:
1. Enter the following address to call the web application:
https://[ip address of the device]
NOTE:
If the web application is started via a “simple” http connection, a message informs the user that the connection can only be established via a secure https connection.
After 10 seconds, the user is automatically forwarded to a secure https connection.
Security instructions of the web browser
The device, on which the web application is operated, stores an SSL certificate that enables the user or the web browser to authenticate the opposite site.
The certificate contains the following features:
MD5 fingerprint:
47:F0:FF:87:96:84:D7:C8:63:43:6D:77:26:64:59:CD
SHA1 fingerprint:
68:92:9F:83:04:CD:7A:12:ED:2B:FE:34:0F:DF:BA:4B:0C:EF:47:30
IMPORTANT:
Replace the certificate that is included in the defaults of the matrix switch with an individual certificate, which is related to the device. Information on how to create such a certificate is given on page 17.
4 · G&D DL-Vision(M/S)
User login at the web application
After the certificates have been authenticated, the login window opens.
Getting started
How to log in to the web application:
1. Enter the following data in the login box:
Username:
Password:
Select language:
Enter your username.
Enter your user account password.
Select the language to be displayed on the user interface:
(Default):
apply default setting
German
English
2. Click the
Login
button.
IMPORTANT:
Change the preset password of the administrator account immediately.
Use the administrator account to log in to the web application and change the
These are the preset access data for the administrator account:
Username:
Password:
Admin
4658
G&D DL-Vision(M/S) · 5
Getting started
Operating the web application
User interface
The user interface of the web application consists of four main sections:
Figure 1: User interface
The different sectors of the user interface perform various tasks. The following table lists the intended use of each sector:
Toolbar :
Tree view :
Filter function :
Main view :
The toolbar allows you to exit the active session and access the basic configuration of the web application. It is also possible to use the third icon for viewing and editing the assignment of the
Dynamic Ports.
The tree view shows the setting options.
The filter function can be used to limit the elements that are displayed in the main view.
Enter a part of the name of the searched element into the text field. Now, the main view only displays names that contain this particular text.
Click
Delete
to cancel the filtering.
After you selected an element in the tree view , the main view displays the superior elements.
6 · G&D DL-Vision(M/S)
Getting started
Frequently used buttons
The user interface uses different buttons to carry out certain functions. The following table provides information on the names and functions of the buttons that are used in many interfaces.
Reload:
OK:
Apply:
Cancel:
Print:
Close:
Reload window values from the system’s database. Changes that have been carried out by the user are overwritten.
Save your settings.
Afterwards, the window closes.
Save your settings.
The window remains open.
Cancel your settings and close window.
Call print interface to select printer, page orientation and further settings.
After the settings have been selected, the interface information
(e.g., the cascade information) can be printed.
Close windows.
User logout
Use the Logout button to exit the current session within the web application.
IMPORTANT:
Always use the Logout function to exit your current session in order to protect the web application against unauthorised access.
How to exit the current session within the web application:
1. Click the
Logout
button (see figure on the right) to exit the current session within the web application.
After your logout, the login box is displayed.
G&D DL-Vision(M/S) · 7
Getting started
Selecting the default language of the web application
How to change the default language of the web application:
1. Click the
System
entry in the tree view.
2. Double-click on
Configuration
in the main view.
3. Click the
System
tab.
4. Use the
Language
entry to select the default language to be displayed to all users of the web application:
German
English
5. Click the
OK
button to save your settings.
Showing the version number of the web application
How to show the version number of the web application:
1. Click on
System > Information
in the tree view.
2. Double-click on
General
.
3. Click on
Close
to close the window.
8 · G&D DL-Vision(M/S)
Basic configuration of the web application
Basic configuration of the web application
The tool symbol in the toolbar can be used to access the basic configuration of the web application.
Here, you can change the network settings of the device on which the web application is operated as well as backup and restore these settings. Furthermore, a firmware update can be performed.
Network settings
The devices with integrated web application are provided with two network interfaces (Network A and Network B). These network interfaces enable you to integrate the device into up to two separate networks.
IMPORTANT:
Please mind the separate instructions regarding Configuring the
Configuring the network settings
Configure the network settings to connect the device to a local network.
How to configure the settings of a network interface:
IMPORTANT:
It is not possible to operate both network interfaces within one subnet.
NOTE:
According to RFC 3330, the Link Local address space 169.254.0.0/16 is reserved for the internal communication between devices. An IP address of this address space cannot be assigned.
1. Click the tools symbol in the toolbar.
2. Click the
Configuration > Interfaces
tabs.
3. Use
Interface A
or
Interface B
paragraphs to enter the following data:
Operational
mode:
IP address:
Use the pull-down menu to select the operating mode of
Interface A
or
Interface B
:
Off:
switches off network interface.
Static:
uses static settings.
DHCP:
obtains the settings from a DHCP server.
Link aggregation active:
This interface was added to a group of network interfaces.
Use the »Link aggregation« tab to configure the network interfaces.
Only if the Static operating mode is selected: Enter the interface IP address.
G&D DL-Vision(M/S) · 9
Basic configuration of the web application
Netmask:
Connection
type:
Only if the Static operating mode is selected: Enter the network netmask.
Select if the network interface and the remote station are to negotiate the connection type automatically (
Auto
) or if one of the available types is to be applied.
4. Click
OK
to save the data.
Configuring the global network settings
Even in complex networks the global network settings ensure that the web application is available from all sub networks.
How to configure the global network settings:
1. Click the tools symbol in the toolbar.
2. Click the
Configuration > Interfaces
tabs.
3. Enter the following data in the
Global network settings
section:
Global preferences:
Use the pull-down menu to select the operating mode:
Static:
uses static settings.
DHCP:
obtains the settings from a DHCP server.
The following settings are automatically obtained in the DHCP operating mode. Inputs are not possible.
Hostname:
Domain:
Gateway:
DNS Server 1:
DNS Server 2:
Enter the device hostname.
Enter the domain the device is to belong to.
Enter the gateway IP address.
Enter the DNS server IP address.
Optionally, enter the IP address of another DNS server.
4. Click
OK
to save your data.
10 · G&D DL-Vision(M/S)
Basic configuration of the web application
Increasing the reliability of network connections through link aggregation
In the default settings, both network interfaces can be used at the same time to access the web application from two different network segments, for example.
To increase the reliability, the network interfaces can be grouped through link agg-
regation. Only one interface is active within the group. Another interface only becomes active if the active interface fails.
We provide two different modes to monitor the interfaces:
MII mode:
The carrier status of the network interface is monitored through the
Media Independent Interface. This mode only checks the function of the network interface.
ARP mode:
The address resolution protocol sends requests to an ARP target within the network. The answer of the ARP target confirms both the functionality of the network interface and the proper network connection to the ARP target.
If the ARP target is connected to the network but is temporarily offline, requests cannot be answered. Define multiple ARP targets to receive an answer from at least one target if an ARP target fails.
NOTE: MII
and
ARP mode
cannot be combined.
How to configure the settings of grouped network interfaces:
NOTE:
According to RFC 3330, the Link Local address space 169.254.0.0/16 is reserved for the internal communication between devices. An IP address of this addres space cannot be assigned.
1. Click the tools symbol in the toolbar.
2. Click the
Configuration > Link aggregation
tab.
3. Enter the following data into the
Network
paragraph:
Name:
Operational mode:
IP address:
Netmask:
Enter a name for the group of network interfaces.
Choose the operational mode for the grouped network interfaces:
Off:
disables link aggregation.
Use the »Interfaces« tab to configure the network interfaces.
Static:
A static IP address is assigned.
DHCP:
obtain IP address from a DHCP server.
Enter the IP address of the interface (only if you have selected the Static operational mode).
Enter the netmask of the network (only if you have selected the Static operational mode).
G&D DL-Vision(M/S) · 11
Basic configuration of the web application
4. Enter the following data in the
Parameter
paragraph:
Link monitoring:
MII down delay:
MII up delay:
ARP interval:
ARP validate:
ARP target:
Choose if you want the
MII
or
ARP mode
(description see below) to be used to monitor the interface.
Time delay in milliseconds before a failed network interface is disabled.
The value must be a multiple of 100 ms (the MII link monitoring frequency).
Time delay in milliseconds before a reset network interface is enabled.
The value must be a multiple of 100 ms (the MII link monitoring frequency).
Enter the interval (100 to 10,000 milliseconds) according to which the incoming ARP packets of the network interfaces are to be checked.
The validation ensures that the ARP packet for a particular network interface is generated by one of the listed ARP targets.
Choose if or what incoming ARP packets are to be validated:
None:
ARP packets are not validated (default).
Active:
Only the ARP packets of the active network interface are validated.
Backup:
Only the ARP packets of the inactive network interface are validated.
All:
The ARP packets of all network interfaces within the group are validated.
The table lists all configured ARP targets.
Use the
New
,
Edit,
and
Delete
buttons to administrate the ARP targets.
5. Click
OK
to save your settings.
Creating and administrating netfilter rules
In the default settings of the devices, all network computers have access to the
Config Panel
web application (open system access).
NOTE:
The open system access enables unrestricted connections via the following ports: 80/TCP (HTTP), 443/TCP (HTTPS) and 161/UDP (SNMP).
If you create a netfilter rule, the open system access is deactivated and all incoming data packets are compared to the netfilter rules. The list of the netfilter rules is processed according to the stored order. As soon as a rule applies, it is carried out and the following rules are ignored.
12 · G&D DL-Vision(M/S)
Basic configuration of the web application
Creating a new netfilter rule
How to create a new netfilter rule:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network
tab.
4. Click the
Netfilter
tab and enter the data described on the following page.
Interface:
Option:
IP address/
Netmask:
Use the pull-down menu to select on which network interfaces the data packets are to be trapped and manipulated:
All
Interface A
Interface B
[Name of a group of network interfaces]
Use the pull-down menu to select how the rule’s sender information are to be interpreted:
Normal:
The rule applies for data packets whose sender information does comply with the indicated IP address or
MAC address.
Inverted:
The rule applies for data packets whose sender information does not comply with the indicated IP address or MAC address.
Enter the data packet IP address or use the
Netmask
entry to enter the address space of the IP addresses.
Examples:
192.168.150.187:
for IP address 192.168.150.187
192.168.150.0/24:
IP addresses of section 192.168.150.x
192.168.0.0/16:
IP addresses of section 192.168.x.x
192.0.0.0/8:
IP addresses of section 192.x.x.x
0.0.0.0/0:
all IP addresses
NOTE:
The IP address and/or a MAC address can be specified within a rule.
MAC address:
Enter the MAC address to be considered in this filter rule.
NOTE:
The IP address and/or a MAC address can be specified within a rule.
Filter rule:
Drop:
Data packets whose sender information comply with the IP address or MAC address are not processed.
Accept:
Data packets whose sender information comply with the IP address or MAC address are processed.
G&D DL-Vision(M/S) · 13
Basic configuration of the web application
5. Click
Add
to save the data in a new filter rule.
The new filter rule is added to the end of the list of the existing filter rules.
6. Click
OK
to close the window.
Editing existing netfilter rules
How to edit an existing netfilter rule:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network >Netfilter
tabs.
4. Mark the rule to be changed in the list of the existing netfilter rules.
5. The current rule settings are displayed in the upper part of the window. Check and change the data described on the following page.
Interface:
Option:
IP address/
Netmask:
Use the pull-down menu to select on which network interfaces the data packets are to be trapped and manipulated:
All
Interface A
Interface B
Use the pull-down menu to select how the rule’s sender information are to be interpreted:
Normal:
The rule applies for data packets whose sender information does comply with the indicated IP address or
MAC address.
Inverted:
The rule applies for data packets whose sender information does not comply with the indicated IP address or MAC address.
Enter the data packet IP address or – using the
Netmask
entry
– the address space of the IP addresses.
Examples:
192.168.150.187:
for the IP address 192.168.150.187
192.168.150.0/24:
IP addresses of section 192.168.150.x
192.168.0.0/16:
IP addresses of section 192.168.x.x
192.0.0.0/8:
IP addresses of section 192.x.x.x
0.0.0.0/0:
all IP addresses
The IP address and/or a MAC address can be indicated within a rule.
MAC address:
Enter the MAC address to be considered in this filter rule.
The IP address and/or a MAC address can be indicated within a rule.
14 · G&D DL-Vision(M/S)
Basic configuration of the web application
Filter rule:
Drop:
Data packets whose sender information comply with the IP address or MAC address are not processed.
Accept:
Data packets whose sender information comply with the IP address or MAC address are processed.
6. Click
Change
to save the changed data.
7. Click
OK
to close the window.
Deleting existing netfilter rules
How to delete existing netfilter rules:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network >Netfilter
tabs.
4. Mark the rule to be deleted in the list of the existing netfilter rules.
5. Click
Remove
.
6. Confirm the confirmation prompt by pressing
Yes
or cancel the process by clicking
No
.
7. Click
OK
to close the window.
Changing the order/priority of existing netfilter rules
The netfilter rules are processed in the order they are stored. If a rule does apply, the respective action is carried out and all following rules are ignored.
IMPORTANT:
Please mind the order or priority of the single rules, especially when adding new rules.
How to change the order/priority of existing netfilter rules:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network >Netfilter
tabs.
4. Mark the rule whose order/priority is to be changed in the list of the existing netfilter rules.
5. Click the button (arrow up) to increase the priority or the button (arrow down) to decrease the priority.
6. Click
OK
to close the window.
G&D DL-Vision(M/S) · 15
Basic configuration of the web application
Creating an SSL certificate
Use the free implementation of the SSL/TLS protocol OpenSSL to create an SSL certificate.
The following websites provide detailed information about operating OpenSSL:
OpenSSL project:
http://www.openssl.org/
Win32 OpenSSL:
http://www.slproweb.com/products/Win32OpenSSL.html
OpenSSL manual:
http://www.absolute-cool.net/dokus/ssl/openssl/
IMPORTANT:
Creating an X509 certificate requires the software OpenSSL. If necessary, follow the instructions on the websites mentioned above to install the software.
The following pages give information on creating an X509 certificate.
Special features for complex KVM systems
If you want different devices to communicate within a KVM system, use the identi-
cal Certificate Authority (see page 16) to create certificates for those devices.
NOTE:
The identical PEM file (see page 19) can also be used for all devices. In this
case, all certificate features are identical.
Creating a Certificate Authority
A Certificate Authority enables the owner to create digital certificates (e. g. for the matrix switch
CATCenter NEO
).
How to create a key for the Certificate Authority:
IMPORTANT:
The following steps describe how to create keys that are not coded.
If necessary, read the OpenSSL manual to learn how to create a coded key.
1. Enter the following command into the command prompt and press
Enter
:
openssl genrsa -out ca.key 2048
2. OpenSSL creates the key and stores it in a file named ca.key.
16 · G&D DL-Vision(M/S)
Basic configuration of the web application
How to create the Certificate Authority:
1. Enter the following command into the command prompt and press
Enter
:
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
2. Now, OpenSSL queries the data to be integrated into the certificate.
The following table shows the different fields and an exemplary entry:
Field
Country Name (2 letter code)
State or Province Name
Locality Name (e.g., city)
Organization Name (e.g., company)
Organizational Unit Name
(e.g., section)
Common Name (e.g., YOUR name)
Email Address
Example
DE
NRW
Wilnsdorf
Guntermann & Drunck GmbH
Guntermann & Drunck GmbH
Enter the data you want to state and confirm each entry by pressing
Enter
.
3. OpenSSL creates the key and stores it in a file named ca.crt.
Creating any certificate
How to create a key for the certificate to be created:
IMPORTANT:
The following steps describe how to create keys that are not coded.
If necessary, read the OpenSSL manual to learn how to create a coded key.
1. Enter the following command into the command prompt and press
Enter
:
openssl genrsa -out server.key 2048
2. OpenSSL creates the key and stores it in a file named server.key
G&D DL-Vision(M/S) · 17
Basic configuration of the web application
How to creat the certificate:
1. Enter the following command into the command prompt and press
Enter
:
openssl req -new -key server.key -out server.csr
2. Now, OpenSSL queries the data to be integrated into the certificate.
The following table shows the different fields and an exemplary entry:
Field
Country Name (2 letter code)
State or Province Name
Locality Name (e.g., city)
Organization Name (e.g., company)
Organizational Unit Name
(e.g., section)
Common Name (e.g., YOUR name)
Email Address
Example
DE
NRW
Wilnsdorf
Guntermann & Drunck GmbH
192.168.0.10
IMPORTANT:
Enter the IP address of the device on which the certificate is to be installed into the row Common Name.
Enter the data you want to state, and confirm each entry by pressing
Enter
.
3. If desired, the Challenge Password can be defined. This password is needed if you have lost the secret key and the certificate needs to be recalled.
4. Now, the certificate is created and stored in a file named server.csr.
Creating and signing the X509 certificate
1. Enter the following command into the command prompt and press
Enter
:
openssl x509 -req -days 365 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out server.crt
18 · G&D DL-Vision(M/S)
Basic configuration of the web application
2. Now, OpenSSL queries the data to be integrated into the certificate.
The following table shows the different fields and an exemplary entry:
Field
Country Name (2 letter code)
State or Province Name
Locality Name (e.g., city)
Organization Name (e.g., company)
Organizational Unit Name
(e.g., section)
Common Name (e.g., YOUR name)
Email Address
Example
DE
NRW
Wilnsdorf
Guntermann & Drunck GmbH
Guntermann & Drunck GmbH
Enter the data you want to state and confirm each entry by pressing
Enter
.
3. OpenSSL creates the certificate and stores it in a file named server.crt.
Creating a PEM file
1. Enter the following command(s) into the prompt and press
Enter
: a. Linux
cat server.crt > gdcd.pem
cat server.key >> gdcd.pem
cat ca.crt >> gdcd.pem
b. Windows
copy server.crt + server.key + ca.crt gdcd.pem
2. The gdcd.pem file is created during the copying. It contains the created certificate and its key as well as the Certificate Authority.
Updating the stored SSL certificate
An SSL-secured connection connects the web browser to the web application. The device on which the web application is operated stores an SSL certificate, which enables the user or the web browser to authenticate the opposite site.
If the device’s IP address differs from the IP address given in the certificate, the web browser sends a message. It is therefore recommended to import an individual certificate in order to ensure that the device IP address complies with the IP address given in the certificate.
G&D DL-Vision(M/S) · 19
Basic configuration of the web application
The certificate given by the certificate authority or one that is created by the user can be imported (e.g. with the open source toolkit OpenSSL).
NOTE:
The required .pem file contains the following three components:
server certificate
private server key
certificate of the certification authority
If these three components are available separately, enter them successively to the
Clear text entry before updating the certificate stored in the device.
How to update the SSL certificate stored in the device:
1. Click the tools symbol in the toolbar.
2. Click the
Configuration > Certificate
tabs.
3. Copy the certificate’s content or import the .pem file in the interface
Clear text:
Copy the clear text of the server certificate, the private server key, and the certificate of the certification authority to this text field.
ADVICE:
If the certificates and the private key are provided in a .pem file, use the Import certificate from file... function described below.
Import certificate from file...
Click this interface if the certificates and the key are provided in a .pem file. Select the .pem file in the file window.
The clear text of the feature key is automatically displayed in the Clear text entry.
4. Click
Update now.
5. Click
OK
to leave the interface.
20 · G&D DL-Vision(M/S)
Basic configuration of the web application
Backup and restore function
The network settings of the device on which the web application is operated can be stored using the backup function. The restore function enables the user to restore the saved data.
NOTE:
The chapter Saving and restoring the data of the KVM system on page 66 pro-
vides information regarding saving and restoring the system settings.
How to backup the network settings:
1. Click the tools symbol in the toolbar.
2. Click the
Tools > Backup/Restore
tabs.
3. Click the
Backup
button and, if desired, enter a Comment and a Password to secure the backup file.
4. Click
OK
.
5. Use the date window to define the location and the
File name
of the backup file.
6. Click
Save
.
7. Click
OK
to close the window.
How to restore the network settings:
1. Click the tools symbol in the toolbar.
2. Click the
Tools > Backup/Restore
tabs.
3. Enter the storage location and the name of the backup file into the
Path
entry.
ADVICE:
Use the file button to select the storage location and the name of the backup file in the file interface.
4. Click on
Check file
to check the validity of the backup file.
IMPORTANT:
Use the information provided in the Date and Comment entries to check if you selected the correct backup file.
5. Click on
Restore.
6. Click
OK
to leave the interface.
G&D DL-Vision(M/S) · 21
Basic configuration of the web application
Firmware update
The firmware of each device can be easily updated via the web application.
IMPORTANT:
This function only updates the firmware of the device on which the web application has been started!
How to update the firmware:
1. Open the web application of the device whose firmware you want to update.
2. Click the tools symbol in the toolbar.
3. Click the
Tools > Firmware update
tabs.
4. Enter the storage location and the name of the backup file into the
Path
entry.
IMPORTANT:
Use the information provided in the Device and Comment entries to check if you selected the correct device file.
ADVICE:
Use the file dialog to select the location and the name of the update file.
5. Click on
Update now
.
6. Click
OK
to leave the interface.
Restoring the default settings
This function enables the user to restore the default settings of the device on which the web application is operated.
How to restore the default settings:
IMPORTANT:
All settings are reset.
1. Click the tools symbol in the toolbar.
2. Click the
Tools > System defaults
tabs.
IMPORTANT:
Use the information provided in the Date and Comment entries to check if you have selected the correct backup file.
3. Disable the
Delete IP addresses
option to maintain the configuration of the network interfaces.
4. Click on
System Defaults
to reset the current configuration.
5. Click
OK
to leave the interface.
22 · G&D DL-Vision(M/S)
Network functions of the devices
Network functions of the devices
The different devices within the KVM system (e.g. extenders and matrix switches) provide separate network functions.
The following function can be configured for every device within the KVM system:
Authentication against directory services (LDAP, Active Directory, RADIUS,
TACACS+)
Time synchronisation via NTP server
Forwarding of log messages to syslog servers
monitoring and controlling of computers and network devices via Simple Network
Management Protocol (see page 43 ff.)
NTP server
The device’s time and date settings can either adjust be adjusted manually or automatically by synchronizing the settings with an NTP server (Network Time Protocol).
Time sync with an NTP server
How to change the NTP time sync settings:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network
tab.
4. Click the
NTP server
tab and enter the following data:
NTP time sync:
NTP server 1:
NTP server 2:
Time zone:
Select the respective entry from the pull-down menu to
(de)activate the time sync:
Disabled
Enabled
Enter the IP address of a time server.
Optionally enter the IP address of a second time server.
Use the pull-down menu to select the time zone of your location.
5. Click
OK
to close the window.
G&D DL-Vision(M/S) · 23
Network functions of the devices
Setting time and date manually
How to manually set the time and date of the KVM matrix system:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network > NTP server
tabs.
4. If necessary, disable the
NTP time sync
option. Otherwise, you might not be able to set time and date manually.
5. Use the
Time
entry to enter the current time (hh:mm:ss).
6. Use the
Date
entry to enter the current time (DD.MM.YYYY).
ADVICE:
Click on
Accept local date
to accept the current system date of the computer on which the
Config Panel
web application has been started.
7. Click
OK
.
24 · G&D DL-Vision(M/S)
Network functions of the devices
Logging syslog messages
The syslog protocol is used to transmit log messages in networks. The log messages are transmitted to a syslog server that logs the log messages of many devices in the computer network.
Among other things, eight different severity codes have been defined to classify the log messages:
0:
Emergency
1:
Alert
2:
Critical
3:
Error
4:
Warning
5:
Note
6:
7:
Info
Debug
The web application enables you to configure whether the syslog messages are to be locally logged or sent to up to two syslog servers.
Locally logging the syslog messages
How to locally log the syslog messages:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network
tab.
4. Click the
Syslog
tab and enter the following data in the
Syslog local
section:
Syslog server:
Log Level:
Select the respective entry from the pull-down menu to define whether syslog messages are to be sent to a server:
Disabled
Enabled
Use the pull-down menu to select from which severity code on a log message is to be logged.
The selected severity code and all lower severity codes are logged.
If you selected the severity code 2 - Critical, messages for this code as well as for the severity codes 1 - Alert and 0 - Emergency are logged.
5. Click
OK
to close the window.
G&D DL-Vision(M/S) · 25
Network functions of the devices
Sending syslog messages to a server
How to send syslog messages to a server:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network
tab.
4. Click the
Syslog
tab and enter the following data in the
Syslog server 1
or
Syslog server 2
section:
Syslog server:
Log Level:
Select the respective entry from the pull-down menu to define whether syslog messages are to be sent to a server or not:
Disabled
Enabled
Use the pull-down menu to select from which severity code on a log message is to be logged.
The selected severity code and all lower severity codes are logged.
If you selected the severity code 2 - Critical, messages for this code as well as for the severity codes 1 - Alert and 0 - Emergency are being logged.
IP address/
DNS name:
Port:
Protocol:
Enter the IP address or the server name to which the syslog messages are to be sent.
Enter the port – usually 514 – on which the server receives the incoming messages.
Select the protocol – usually UDP – on which the server receives the incoming messages:
TCP
UDP
5. Click
OK
to close the window.
Viewing and saving local syslog messages
If the function to log the local syslog messages is activated, these syslog messages can be viewed and, if necessary, stored in the information window.
How to view and store the local syslog messages:
1. Click on
System > Information
in the tree view.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Double-click on
Syslog
in the main view.
26 · G&D DL-Vision(M/S)
Network functions of the devices
4. Click the
Fetch syslogs
tab.
The matrix switch calls the local syslog messages, which are now displayed in the text field.
ADVICE:
If necessary, click
Save
to save these messages in a text file. The opening file window enables you to select the location and a file name.
Afterwards, click
Save
.
5. Click
OK
to close the window.
User authentication against directory services
In in-house networks, the user accounts of different users are often administrated by a directory service. The device can access such a directory service and authenticate users against the directory service.
NOTE:
If the Admin user account cannot be authenticated by the directory service, the user account is authenticated by the device’s data base.
The directory service is exclusively used to authenticate a user. The user rights are assigned within a database of the KVM system. The following paragraphs describe the different scenarios:
The user account exists within the directory service and the KVM system
The user can log in with the password stored in the directory service. After the login, the user is assigned with the rights of the correspondent account in the
KVM system.
NOTE:
The password which the user used to log in, is taken over into the database of the KVM system.
The user account exists within the directory service, but not within the KVM system
A user that has been successfully authenticated against the directory service, but does not have an account of the same name within the database of the KVM system, is assigned with the rights of the RemoteAuth user.
If required, change the rights of this particular user account to set the rights for users without a user account.
ADVICE:
Deactivate the RemoteAuth user to prevent users without user accounts to log in to the KVM system.
The user account exists within the KVM system, but not within the directory service
If the directory service is available, it reports that the user account does not exist.
The access to the KVM system is denied to the user.
G&D DL-Vision(M/S) · 27
Network functions of the devices
If the server is not available, but the fallback system is active (see below), the user can log in with the password that is stored within the KVM system.
IMPORTANT:
Mind the following safety instructions to prevent a locked or deactivated user from logging in to the system in case the connection to the directory service fails:
If a user account is deactivated or deleted in the directory service, this action can also be carried out within the user database of the KVM system.
Only activate the fallback system in reasonable exceptional cases.
How to configure the user account authentication:
NOTE:
If no directory service is applied, the user accounts are administered by the device.
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now, click the
Configuration
entry in the context menu.
3. Click the
Network > Authentication
tabs and enter the following data:
Auth. Server:
Select the
Local
option if the user administration is to be carried out by the KVM system.
If a particular directory service is to be applied, select the respective entry from the pull-down menu:
LDAP
Active Directory
Radius
TACACS+
ADVICE:
After the directory service has been selected, collect the settings of the directory service server in the
Server settings
.
Fallback:
Activate this option if the local user administration of the
KVM system is to be applied in case the directory service is temporarily not available.
IMPORTANT:
Mind the following safety instructions to prevent a locked or deactivated user from logging in to the system in case the connection to the directory service fails:
If a user account is disabled or deleted in the directory service, this action can also be carried out within the user database of the KVM system.
Only activate the fallback system in reasonable exceptional cases.
4. Click
OK
to close the window.
28 · G&D DL-Vision(M/S)
Monitoring functions
Monitoring functions
The current monitoring values of all devices within the KVM system can be viewed in the device-specific branches (e.g. KVM matrix systems) as well as in the KVM Combina-
tions and Critical Devices branches of the tree view.
The various information regarding a device can either be displayed in individual val-
ues or in monitoring groups, which are sorted according to topic. The following exemplary figure shows the Status values and three different monitoring groups:
Figure 2: Detailed view of an exemplary monitoring table
Individual values (the Status value in the figure above) immediately show if the status is correct (green) or deviating from the normal operating value (red). The text in the column also provides information about the current status.
Monitoring groups allow you to group various individual values. The column of a monitoring group shows if all values are within range (OK) or if at least one value is deviating from the normal operating values (Error).
Clicking the arrow in the column opens a separate window, which displays the individual values of the group.
G&D DL-Vision(M/S) · 29
Monitoring functions
Viewing monitoring values
NOTE:
An overview of the possible monitoring values of all different device types
By applying different monitoring sets, the monitoring values are displayed in the different branches of the tree view.
Several branches (e.g. Critical devices) provide another view to enable the user to detect critical monitoring values as fast as possible.
Listing values by applying monitoring sets
A monitoring set defines which individual values and groups are to be displayed.
The column, which shows the individual values, enables you to read the status and check whether it is deviating from the normal operating values.
Monitoring groups allow you to group various individual values. The column of a monitoring group shows if all values are within range (OK) or if at least one value is deviating from the normal operating values (Error).
Clicking the arrow in the column opens a window, which contains detailed information regarding the individual values of the group.
ADVICE:
The following pages of this chapter provide detailed information regarding monitoring groups and monitoring sets.
Listing individual values of critical devices
If a device shows a value that deviates from the normal operating values, the device is additionally listed in the Critical devices branch. This branch displays all deviating
(red) values in tabular form. This way, deviating values can be detected as fast as possible.
NOTE:
To be able to find deviant values as fast as possible, monitoring sets are not applied here.
Disabling the monitoring values
Any monitoring value can be disabled. After disabling, the monitoring values are no longer shown in the web application.
IMPORTANT:
Critical values are no longer shown for any disabled values.
How to enable/disable the monitoring values:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now, click the
Configuration
entry in the context menu.
30 · G&D DL-Vision(M/S)
Monitoring functions
3. Click the
Monitoring
tab.
Two tables list the montitoring values of the KVM system:
Enabled:
Disabled:
lists all active monitoring values.
lists all inactive monitoring values.
To give you a faster overview, the values are grouped in both columns.
4. Mark the monitoring values to be enabled/disabled.
5. Click the button (right arrow key) to disable the monitoring value or
(left arrow key) for enabling.
6. Click
OK
to save your settings.
Advanced function regarding the administration of critical devices
The Critical Devices branch lists the devices that show at least one value that exceeds the normal operating values.
NOTE:
A sub-branch is displayed for each device class in the KVM system (e. g.
KVM matrix systems).
Messages regarding the critical status of the devices
If one value exceeds the normal operating values, the branch is marked red. A blinking message under the main view points to this condition.
ADVICE:
If the blinking message appears on your screen, press
Ctrl+Space
to open the Critical devices branch.
Click on the blinking message to show the list of the deviating values in a separate window.
Viewing the list of critical devices
How to view the list of critical devices:
1. Click on the
System monitoring > Critical Devices
folders in the tree view.
The main view lists all affected devices. The critical values are displayed in the table.
ADVICE:
Click a sub-branch of the folder in order to only list the devices of a particular device class.
G&D DL-Vision(M/S) · 31
Monitoring functions
Marking the messages from a critical device as read
Many messages require immediate actions from the administrator. Other messages
(e.g. the break-down of the redundant power supply), however, point to possibly uncritical conditions.
In such a case, all peculiar values of a device can be marked as read, which causes the following:
A device whose deviating values have been marked as read shows no blinking status bar.
The cells, info dialogs, and monitoring windows of all “read” devices are highlighted in yellow.
If a monitoring group contains critical values, which have been marked as read, the column displays Error. In addition, the cell is highlighted in yellow.
NOTE:
The system only highlights values that have been deviating from the normal operating values at the time the function has been executed. The web application shows if another monitoring value of such a device deviates from the normal operating values.
How to mark the Monitoring messages of a device as read:
1. Click on the
System monitoring > Critical Devices
folders in the tree view.
2. Right-click the desired device. Now click the
Acknowledge
entry of the context menu.
32 · G&D DL-Vision(M/S)
Monitoring functions
Administrating monitor groups
IMPORTANT:
Any recently created monitoring groups are only available in the branch in which they were created.
If a monitoring group was created in a device-specific branch, it is no longer available in the KVM combinations branch.
The
Config Panel
web application already provides several preconfigured monitoring groups. Those groups can neither be edited nor deleted, but they can be duplicated and individually adjusted to your wishes.
All groups that were preconfigured or created are shown in the monitoring table as
long as they are contained in the applied monitoring set (see page 38 ff.):
Figure 3: Status of different devices in the »Group #2« monitoring group
ADVICE:
Due to the high amount of individual values, it is recommended to display the most important values as individual values and group the rest in groups according to topic.
This provides a quick overview and the values are displayed in a space-saving way.
Adding a monitoring group
How to add a new monitoring group:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring groups
entry in the context menu.
3. Click
New
.
4. Enter the name and an optional comment for the new group.
5. Click
OK
to create the group.
G&D DL-Vision(M/S) · 33
Monitoring functions
Changing the name and/or comment of a monitoring group
How to change the name and/or comment of a monitoring group:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring groups
entry in the context menu.
3. Select the group to be edited and click
Edit
.
4. Change the name and/or the optional comment of the group.
5. Click
OK
to save your settings.
Assigning members to a monitoring group
How to assign members to a monitoring group:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring groups
entry in the context menu.
3. Select the group to be edited and click
Edit
.
4. Click the
Member
tab.
Now you have the possibility to add members to or delete them from a monitoring group.
The window consists of two tables, which list the monitoring values of the KVM system:
Unassigned:
Assigned:
lists monitoring values that are not assigned to this group lists monitoring values that are assigned to this group
5. Mark the monitoring value you want to add to or delete from the group.
6. Click (right arrow) to add the monitoring value to the group or (left arrow) to delete it from the member list.
7. Click
OK
to save your settings.
34 · G&D DL-Vision(M/S)
Monitoring functions
Duplicating a monitoring group
The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. These groups are displayed in light grey.
IMPORTANT:
It is not possible to edit or delete a preconfigured monitoring group.
If you want to create a new group based on an already existing group, simply duplicate the existing group and edit the duplicate.
How to duplicate a monitoring group:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring groups
entry in the context menu.
3. Select the group to be duplicated and click
Edit
.
4. Enter the name and an optional comment for the group.
5. Click
Duplicate
to duplicate the existing group.
6. Edit the new group as described on the previous page or click
Close
to close the window.
Deleting a monitoring group
The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. These groups are displayed in light grey.
IMPORTANT:
It is not possible to edit or delete a preconfigured monitoring group.
How to delete a monitoring group:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring groups
entry in the context menu.
3. Select the group to be deleted and click
Delete
.
4. Confirm the confirmation prompt be clicking
Yes
or cancel the task by clicking
No
.
5. Click
Close
to save your settings.
G&D DL-Vision(M/S) · 35
Monitoring functions
Administrating monitoring sets
A monitoring set defines the individual values and the groups to be displayed in a subfolder of the KVM combinations branch or a device-specific branch:
Figure 4: Status of the individual Status value and three groups of a monitoring set
The
Config Panel
web application already provides several preconfigured monitoring groups. The groups can neither be edited nor deleted, but they can be duplicated and individually adjusted to your wishes.
It is also possible to create and configure a new group.
IMPORTANT:
The created monitoring sets are only displayed in the branch in which they have been created.
If a monitoring set has been created in a device-specific branch, it is no longer displayed in the KVM combinations branch!
Adding a monitoring set
How to add a monitoring set:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring set
entry in the context menu.
3. Click
New
.
4. Enter the name and an optional comment for the new set.
5. Click
OK
to create the set.
36 · G&D DL-Vision(M/S)
Monitoring functions
Changing the name and/or comment of a monitoring set
How to change the name and/or comment of a monitoring set:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring sets
entry in the context menu.
3. Select the set to be edited and click
Edit
.
4. Enter the name and an optional comment for the set.
5. Click
OK
to save your settings.
Assigning members to a monitoring set
IMPORTANT:
How to assign members to a monitoring set:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring sets
entry in the context menu.
3. Select the set to be edited and click
Edit
.
4. Click the
Member
tab.
Now you have the possibility to add members to or delete them from a monitoring set.
The entry consists of two tables which list the monitoring values of the KVM system. The values are the divided into the sub categories
Individual values and Groups (Columns).
NOTE:
Click on the
[-]
in the category header to hide the content of this category. Clicking on
[+]
shows the contents.
The different values are either listed in the left or the right-hand table:
Unassigned:
Assigned:
lists monitoring values that are not assigned to this set lists monitoring values that are assigned to this set
5. Mark the monitoring value you want to add to or delete from the group.
6. Click (right arrow) to add the monitoring value to the set or (left arrow) to delete it from the member list.
7. Click
OK
to save your settings.
G&D DL-Vision(M/S) · 37
Monitoring functions
Selecting a monitoring set in the folder configuration
After a monitoring set has been created, it can be activated in the configuration of one (or more) folders of the tree view.
How to activate a monitoring set:
1. Right-click a subfolder of a device-specific branch (e.g. KVM extender) or the KVM
combinations branch in the tree view.
2. Click the
Configuration
entry in the context menu.
3. Use the
Monitoring set
entry to select the desired set.
IMPORTANT:
The created monitoring sets are only displayed in the branch in which they have been created.
If a monitoring set has been created in the KVM extenders branch, it is no longer displayed in the KVM combinations branch!
4. Click
OK
to activate the selected set.
Duplicating a monitoring set
The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. Those groups are displayed in light grey.
IMPORTANT:
It is not possible to edit or delete those groups.
If you want to create a new set based on an already existing set, simply duplicate the existing set and edit the duplicate.
How to duplicate a monitoring set:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring sets
entry in the context menu.
3. Select the set to be duplicated and click
Edit
.
4. Enter the name and an optional comment for the set.
5. Click
Duplicate
to duplicate the existing set.
6. Edit the new set as described on the previous page or click
Close
to close the window.
38 · G&D DL-Vision(M/S)
Monitoring functions
Deleting a monitoring set
The KVM combinations branch as well as many other device-specific branches contain several preconfigured groups. These groups are displayed in light grey.
IMPORTANT:
These groups cannot be edited or deleted.
How to delete a monitoring set:
1. Right-click the top level of a device-specific branch (e.g. KVM extender) or the
KVM combinations branch in the tree view.
2. Click the
Monitoring sets
entry in the context menu.
3. Select the set to be deleted and click
Delete
.
4. Confirm the confirmation prompt be clicking
Yes
or cancel the task by clicking
No
.
5. Click
Close
to save your settings.
G&D DL-Vision(M/S) · 39
Device monitoring via SNMP
Device monitoring via SNMP
The Simple Network Management Protocol (SNMP) is used to monitor and control computers and network devices.
Practical use of the SNMP protocol
A Network Management System (NMS) is used to monitor and control computers and network devices. The system queries and collects data from the agents of the monitored devices.
NOTE:
An Agent is a program, which runs on the monitored device and detects its status. Via SNMP, the detected data are transmitted to the Network Management System.
If an Agent detects a severe failure within the device, it can send a Trap packet to the
Network Management System. This way, the administrator is directly informed about such occurrences.
Configuring the SNMP agent
How to configure the SNMP agent:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network> SNMP Agent
tabs.
4. Enter the following data in the Global paragraph:
Status:
Protocol:
Port:
SysContact:
SysName:
SysLocation:
Select the particular entry to either switch the SNMP agent off (
Off
) or on (
Enabled
).
Select the protocol (
TCP
or
UDP
) – normally UDP – via which the SNMP packets are to be transmitted.
Define the port – normally 161 – on which the incoming
SNMP packets are to be accepted.
Enter the admin’s contact data (e.g. direct dial or email address).
Enter the device name.
Enter the location of the device.
5. If you want to process the packets of the
SNMPv2c
protocol version, enter the following data in the paragraph of the same name:
40 · G&D DL-Vision(M/S)
Device monitoring via SNMP
Access:
Source:
Read-only
community:
Activate the View access (
View
) or deny the access (
No
) via
SNMPv2c protocol.
Enter the IP address or the address space of the addresses of incoming SNMP packets.
Examples:
192.168.150.187:
Only IP address 192.168.150.187
192.168.150.0/24:
IP addresses of space 192.168.150.x
192.168.0.0/16:
IP addresses of space 192.168.x.x
192.0.0.0/8:
IP addresses of space 192.x.x.x
Enter the name of the Community which has also been selected in the Network Management System.
IMPORTANT:
The transfer of the packet password (Community) of the SNMPv2c protocol version is not encrypted. Therefore, it can be easily tapped!
If required, use the SNMPv3 protocol version (see below) and a high Securitiy
level to ensure a secure data transfer.
6. If you want to process the packets of the
SNMPv3
protocol version, enter the following data in the respective paragraph:
Access:
User:
Authentication
protocol
Authentication passphrase
Security level
Privacy protocol:
Privacy passphrase:
Activate the View access (
View
) or deny the access (
No
) via
SNMPv3 protocol.
Enter the username for the communication with the Net-
work Management System.
Select the authentication protocol (
MD5
or
SHA
) which has been activated in the Network Management System.
Enter the authentication passphrase for the communication with the Network Management System.
Select between one of the following options:
NoAuthNoPriv:
user authentication and Privacy protocol deactivated
AuthNoPriv:
user authentication activated, Privacy protocol deactivated
AuthPriv:
user authentication and Privacy protocol activated
Select the Privacy protocol (
DES
or
AES
) which has been activated in the Network Management System.
Enter the privacy passphrase for secure communication with the Network Management System.
7. Click
OK
to save your settings and to leave the window.
G&D DL-Vision(M/S) · 41
Device monitoring via SNMP
Configuring SNMP traps
How to add a new trap or edit an existing trap:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network > SNMP trap
tabs.
4. Click
Add
or
Edit
.
5. Enter the following data in the
Global
paragraph:
Server:
Protocol:
Port:
Retries:
Enter the IP address of the Network Management Servers.
Select the protocol (
TCP
or
UDP
) – normally UDP – via which the SNMP packets are to be transmitted.
Define the port – normally 162 – on which the outgoing
SNMP packets are to be accepted.
Enter the number of retries to send an SNMP Inform.
NOTE:
Inputs are only possible if the Inform option has been selected in the
Notification type entry.
Timeout:
Enter the time (in seconds) after which an SNMP Inform is to be sent again if you have received no confirmation.
NOTE:
Inputs are only possible if the Inform option has been selected in the
Notification type entry.
Log level:
Select from which severity level an SNMP trap is to be sent.
The selected severity level and all lower severity levels are logged.
NOTE:
If you select the 2 - Critical, severity level SNMP traps are sent for occurences from this level and from the 1 - Alarm and 0 - Emergency severity levels.
Version:
Notification type:
Select if the traps are to be created and sent according to the
SNMPv2c (v2c) or SNMPv3 (v3) protocol.
Select if the occurrences are sent as Trap or Inform packet.
NOTE:
Inform packets require a confirmation of the Network Management Sys-
tem. If this confirmation is not available, the transmission is repeated.
42 · G&D DL-Vision(M/S)
Device monitoring via SNMP
6. If you use the
SNMPv2c
protocol version, use the respective paragraph to enter the same Community name as selected in the Network Management System.
IMPORTANT:
The transfer of the packet password (Community) of the SNMPv2c protocol version is not encrypted. Therefore, it can be easily tapped!
If required, use the SNMPv3 protocol version (see below) and a high Security level to ensure a secure data transfer.
7. If you decided to use the
SNMPv3
protocol version, use the respective paragraph to enter the following data:
User:
Authentication protocol
Authentication passphrase
Security level
Privacy protocol:
Privacy passphrase:
Engine ID:
Enter the username for communication with the Network
Management System an.
Select the authentication protocol (
MD5
or
SHA
) which has been activated in the Network Management System.
Enter the authentication passphrase for the communication with the Network Management System.
Select between one of the following options:
NoAuthNoPriv:
deactivated user authentication and Privacy protocol
AuthNoPriv:
activated user authentication, deactivated Pri-
vacy protocol
AuthPriv:
activated user authentication and Privacy protocol
Select the privacy protocol (
DES
or
AES
) which has been activated in the Network Management System.
Enter the privacy passphrase for secure communication with the Network Management System.
Enter an Engine ID which clearly identifies the SNMP agent within the network.
8. Click
OK
to save your settings and to leave the window.
G&D DL-Vision(M/S) · 43
Device monitoring via SNMP
How to delete an existing trap:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network > SNMP trap
tabs.
4. Select the receiver to be deleted and click
Delete
.
5. Click
OK
to save your settings and to leave the window.
How to generate a test event:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device to be configured. Now click the
Configuration
entry in the context menu.
3. Click the
Network > SNMP trap
tabs.
4. Click on
Generate test event
.
5. Click
OK
to save your settings and to leave the window.
NOTE:
If properly configured, the Trap message is displayed within your Network
Management System.
44 · G&D DL-Vision(M/S)
Logbook
Logbook
The Logbook of a device of the KVM system allows you to collect any information.
ADVICE:
Write down if you plan on changing the configuration of the device and assign the entry with a status (»Open«).
After these changes have been carried out, assign the »Closed« status to the logbook entry. This way you can refer to the logbook to look up the times at which the changes have been made.
If you want to save the logbooks or edit them with other programs, the logbooks of the different devices can be printed, copied to the clipboard, or exported to a file.
The dialog entries of the logbook
After the logbook has been called up, the »Logbook configuration« dialog shows an overview of all logbook entries that have been saved so far.
All details regarding the entry are shown by double-clicking.
The »Logbook configuration« dialog
The Logbook configuration dialog shows a table with all logbook entries that have been made until then.
The table displays the Subject and Status (»Open« or »Closed«) as well as the Date the entry has been last edited.
NOTE:
By default, the table is sorted in descending order according to the contents of the »Status« column. This order is indicated by a small triangle in the column header.
If you want to sort the entries according to the contents of another column, click the header of the desired column. Another click reverses the sort sequence.
The following actions can be carried out in the logbook:
New:
create a new logbook entry
Edit:
update an existing logbook entry
Delete:
delete a logbook entry
Print:
print a logbook entry
Export:
export the data of the logbook entry to csv file
Copy:
copy the details of the logbook entry to the clipboard
G&D DL-Vision(M/S) · 45
Logbook
Viewing a logbook entry in detail
Double-click a logbook entry to show its details. The overview provides the following information:
Subject:
Body:
Status:
Creator:
Created:
Last editor:
Last edited:
short description (max. 128 characters) that allows a quick overview in the table and on the print-out detailed description (max. 1.024 characters) current status (»Open« or »Closed«) user name of the person who created the logbook entry date and time the entry has been originally created user name of the person who last changed the entry date and time the entry has been last changed
The upper part of the dialog shows several buttons that provide the following functions:
(left arrow):
shows the previous logbook entry (if available)
Print:
print logbook entry
Export:
export the data of the logbook entry to csv file
Copy:
copy the details of the logbook entry to the clipboard
(right arrow):
shows the last logbook entry (if available)
NOTE:
The functions of the Print, Export and Copy buttons correspond to the entries of the same name in the context menu of the logbook entries.
These functions are described on the following pages.
Basic logbook functions
The basic logbook functions enable you to create new or edit and delete the existing logbook entries.
IMPORTANT:
Any device within a KVM system provides a separate logbook.
Creating a new logbook entry
How to create a new logbook entry for a device:
1. Click on the folder that contains the device whose logbook you want to open.
2. Right-click on the desired device and click on
Logbook
in the context menu.
3. Click on
New
.
46 · G&D DL-Vision(M/S)
Logbook
4. Enter the
Status
(max. 128 characters) of the logbook entry.
ADVICE:
The subject is shown in the overview of the logbook entries and allows a quick overview of the entries.
5. If necessary, use the
Body
entry to change the detailed description (max. 1.024 characters) of the logbook entry.
6. Click
OK
to save the logbook entry.
Changing a logbook entry
How to change the logbook entry of a device:
1. Click on the folder that contains the device whose logbook entry you want to change.
2. Right-click on the desired device and click on
Logbook
in the context menu.
3. Click the entry to be edited and click on
Edit
.
4. If necessary, change the
Subject
(max. 128 characters) of the logbook entry.
ADVICE:
The subject is shown in the overview of the logbook entries and allows a quick overview of the entries.
5. If necessary, use the
Body
entry to change the detailed description (max. 1.024 characters) of the logbook entry.
6. Use the
Status
button to select between the »Open« and »Closed« options.
7. The following information are provided in this dialog:
Creator:
Created:
Last editor:
Last edited:
user name of the person that created the logbook entry date and time the entry has been originally created user name of the person that last changed the entry date and time the entry has been last changed
8. Click
OK
to save the logbook entry.
G&D DL-Vision(M/S) · 47
Logbook
Deleting a logbook entry
How to delete the logbook entry of a device:
1. Click on the folder that contains the device whose logbook entry you want to delete.
2. Right-click on the desired device and click on
Logbook
in the context menu.
3. Click the entry to be deleted and click on
Delete
.
4. Confirm the confirmation prompt by clicking
Yes
or cancel the process by clicking
No
.
Advanced functions
The advanced functions allow you to print or export the logbook entries. The data of a logbook entry can also be copied to the clipboard.
The advanced functions can either be called up via the buttons in the detail dialog of the logbook or the context menu of the »Logbook configuration« dialog.
NOTE:
The functions of several logbook entries can only be applied if they have been called up via the context menu.
Printing logbook entries
How to print one or several logbook entries:
1. Click on the folder that contains the device whose logbook entry you want to change.
2. Right-click on the desired device and click on
Logbook
in the context menu.
3. Mark one or several existing logbook entries.
NOTE:
To select several logbook entries, press the
Ctrl
key and select the different entries by mouse.
4. Right-click one of the marked entries and click on
.
5. Select the
Printer
on which the document is to be printed.
NOTE:
If desired, you can also adjust the headline, the number of copies, the page layout and the frame settings.
6. Click on
.
48 · G&D DL-Vision(M/S)
Logbook
Exporting logbook entries
Use the export function to export the data of a logbook entry to a CSV file.
This file format is usually used for exchanging data between different programs. A
CSV file that has been created with the
Config Panel
web application can be read with all common spreadsheet programs, for example.
NOTE:
CSV is short for Comma-Separated Values.
How to export one or several logbook entries:
1. Click on the folder that contains the device whose logbook entry you want to change.
2. Right-click on the desired device and click on
Logbook
in the context menu.
3. Mark one or several existing logbook entries.
NOTE:
To select several logbook entries, press the
Ctrl
key and select the different entries by mouse.
4. Right-click one of the marked entries and click on
Export
.
5. Use the
File Name
section to select the location and the file name of the file to be created.
6. The configuration section offers the following settings:
Column
headings:
Delimiter:
Select if the column headings (Subject, Body, …) are to be output in the CSV file.
Options:
Yes
,
No
Select the desired delimiter between the different data fields in the CSV file.
Options:
Tabulator
,
Semicolon
,
Comma
,
Space
7. Click on
Export
.
G&D DL-Vision(M/S) · 49
Logbook
Copying the logbook entries
As an alternative to the export function, which creates a CSV file, the copy function can be used to copy logbook entries to the clipboard of the operating system.
The copied data can be pasted to any application that has access to the clipboard.
How to copy one or several logbook entries:
1. Click on the folder that contains the device whose logbook entry you want to change.
2. Right-click on the desired device and click on
Logbook
in the context menu.
3. Mark one or several existing logbook entries.
NOTE:
To select several logbook entries, press the
Ctrl
key and select the different entries by mouse.
4. Right-click one of the marked entries and click on
Copy
.
5. Open a document in the application to which you want to copy the data and press
Ctrl+V
.
50 · G&D DL-Vision(M/S)
Shared editing
Shared editing
The web application enables two users with the respective rights to edit settings at the same time.
For example, if two users simultaneously change the user account settings, the web application informs the other user about these changes:
A message in purple appears in the upper row of the footer and highlights the other user’s changes.
The changed setting or the menu item in the submenu, which contains this setting, is displayed in green.
The following options are provided to process the collected data:
Discard data:
Overwrite all data:
Only save own changes:
1. Click on
Reload
to read the current values of the dialogue from the database.
1. Click on
Accept
.
2. Click on
Overwrite all data
.
1. Click on
Accept
.
2. Click on
Only save own changes
.
G&D DL-Vision(M/S) · 51
Users and Groups
Users and Groups
Efficient rights administration
The web application administrates up to 256 user accounts as well as the same amount of user groups. Any user within the system can be a member of up to 20 groups.
The user accounts and the user groups can be provided with different rights to operate the system.
ADVICE:
The rights administration can almost be carried out completely through user groups. Therefore, the user groups and the assigned rights have to be planned and implemented beforehand.
This way, the user rights can be quickly and efficiently changed.
The effective right
The effective right determines the right for a particular operation.
IMPORTANT:
The effective right is the maximum right, which consists of the user account’s individual right and the rights of the assigned group(s).
EXAMPLE:
The user JDoe is member of the Office and TargetConfig groups.
The following table shows the user account rights, the rights of the assigned groups, and the resulting effective right:
Right
Target config
Change own password
Target access
User
JDoe
No
No
Group
Office
No
Yes
Group
TargetConfig
Yes
No
Effective right
Yes
Yes
Full
View No
Full
The settings of the Target config and Change own password rights result from the rights assigned to the user groups. The Target access right which, in this case, enables full access, was given directly in the user account.
The dialogue windows of the web application additionally display the effective right for every setting.
ADVICE:
Click the
Details
button to get a list of the groups and rights that are assigned to the user account.
52 · G&D DL-Vision(M/S)
Users and Groups
Efficient user group administration
User groups enable the creation of a shared right profile for several users with identical rights. Furthermore, the user accounts that are included in the member list can be grouped and therefore no longer have to be individually configured. This facilitates the rights administration within the matrix system.
If the rights administration takes place within the user groups, the user profile only stores general data and user-related settings (key combinations, language settings, …).
When initiating the matrix system, it is recommended to create different groups for users with different rights (e. g., »Office« and »IT«) and assign the respective user accounts to these groups.
EXAMPLE:
Creat more groups if the user rights are to be further divided. If, for example, some users of the »Office« group are to be provided with the multi-access right, a respective user group can be created:
Create a user group (e. g., »Office_MultiAccess«) with identical settings for the »Office« group. The multi-access right is set to full. Assign the respective user accounts to this group.
Create a user group (e. g., »MultiAccess«) and only set the multi-access right to Yes. In addition to the »Office« group, also assign the respective user accounts to this group.
In both cases, the user is provided with the full effective right for multi-access.
ADVICE:
The user profile offers the possibility to provide extended rights to a group member.
Administrating user accounts
User accounts enable you to define individual rights for every user.
IMPORTANT:
The administrator and any user that holds the Superuser right are permitted to create and delete user accounts and edit rights and user-related settings.
G&D DL-Vision(M/S) · 53
Users and Groups
Creating a new user account
The web application administrates up to 256 user accounts. Any user account is provided with individual login data, rights and user-related settings for the KVM system.
How to create a new user account:
1. Click on
User area > User
in the tree view.
2. Right-click the display range and afterwards the
New
entry in the context menu.
3. Enter the following information within the interface:
Name:
Password:
Repeat password:
Clear text:
Full name:
Comment:
Enabled:
Enter the desired username.
Enter the user account password.
Repeat the password.
If necessary, mark this entry to view and control both passwords.
If desired, enter the user’s full name.
If desired, enter a comment regarding the user account.
Click this entry to activate the user account.
If the user account is deactivated, the user is not able to access the KVM system.
4. Click
OK
to save the entered data.
IMPORTANT:
After the user account has been created, it is assigned with no rights.
Add the user account to an existing user group or provide it with individual rights
54 · G&D DL-Vision(M/S)
Users and Groups
Renaming the user account
How to rename a user account:
1. Click on
User area > User
in the tree view.
2. Right-click the user account to be edited and click the
Configuration
entry in the context menu.
3. Enter the new username in the
Name
entry.
4. Optional: Enter the user’s full name in the
Full name
entry
5. Click
OK
to save your settings.
Changing the user account password
How to change the user account password:
1. Click on
User area > User
.
2. Right-click the user account to be edited and click the
Configuration
entry in the context menu.
3. Click on
Change password
.
4. Change the following data within the entry mask:
New password:
Confirm password:
Clear text:
Enter the new password.
Repeat the new password.
Mark this entry to view and control both entered passwords.
5. Click
OK
to save the new password.
6. Click
OK
to save your settings.
G&D DL-Vision(M/S) · 55
Users and Groups
Changing the user account rights
Any user account can be assigned with different rights.
The following table lists the different user rights. Further information on the rights can be found on the indicated pages.
Name
Change own password
Superuser right
WebIf login
Right
Change own password
Unrestricted access to the configuration of the system
Login to the
Config Panel
web application
Page
Changing a user account’s group membership
NOTE:
Any user within the system can be a member of up to 20 user groups.
How to change a user account’s group membership:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the user group to be edited and click the
Configuration
entry in the context menu.
3. Click the
Members
tab.
Now you can easily add members to or delete them from any user group.
The window consists of two tables. These tables list the user accounts of the
KVM matrix system:
Unassigned:
Assigned group members:
lists all user accounts that are not assigned to this group lists all user accounts that are assigned to this group
4. Mark the user account you want to add to or delete from the group.
5. Click the button (right arrow) to add the user account to the group or the button (left arrow) to delete it from the list.
56 · G&D DL-Vision(M/S)
Users and Groups
Enabling/Disabling a user account
IMPORTANT:
If the user account is disabled, the user has no access to the KVM system.
How to enable/disable a user account:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the user account you want to enable/disable and click the
Configuration
entry in the context menu.
3. Click the
Enabled
entry to enable the user account.
Disable the entry if you want to lock the access to the system for this user account
4. Click the
OK
button to save your settings.
Deleting a user account
How to delete a user account:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the user account you want to delete and click the
Delete
entry in the context menu.
3. Click
OK
to confirm the confirmation prompt.
G&D DL-Vision(M/S) · 57
Users and Groups
Administrating user groups
User groups enable the user to create a common rights profile for several users with the same rights and to add user accounts as members of this group.
This way, the rights of these user accounts do not have to be individually configured, which facilitates the rights administration within the KVM system.
NOTE:
The administrator and any user with the Superuser right are authorised to create and delete user groups as well as edit the rights and the member list.
Creating a new user group
The user can create up to 256 user groups within the system.
How to create a new user group:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the display range and click the
New
entry in the context menu.
3. Enter the following data in the entry mask:
Name:
Enabled:
Enter the name of the user group.
Activate this entry to enable the user group.
NOTE:
If the user group is disabled, the group rights do not apply to the assigned members.
Comment:
If necessary, enter a comment regarding the user group.
4. Click
OK
to save your settings.
IMPORTANT:
Directly after the new user group has been created, it contains no rights within the system
Renaming a user group
How to rename a user group:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the user account you want to rename and click the
Configuration
entry in the context menu.
3. Use the
Name
entry to enter the new name of the user group.
4. Click
OK
to save your settings.
58 · G&D DL-Vision(M/S)
Users and Groups
Changing the user group rights
The various user groups can be assigned with different rights.
The following table lists the different user rights. Further information about the rights is given on the indicated pages
Name
Change own password
Superuser right
WebIf login
Right
Change own password
Unrestricted access to the configuration of the system
Login to the
Config Panel
web application
Page
Administrating user group members
How to administrate user group members:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the user group to be edited and click the
Configuration
entry in the context menu.
3. Click the
Members
tab.
Members can now easily be added to or deleted from the user groups.
The window consists of two tables. These tables list the user accounts of the
KVM system:
Unassigned:
Assigned group members:
lists all user accounts that are not assigned to this group lists all user accounts that are assigned to this group
4. Mark the user account you want to add to or delete from the group.
5. Mark the user account you want to add to or delete from the group. Now click the button (right arrow) to add the user account to the group or the button
(left arrow) to delete it from the list.
G&D DL-Vision(M/S) · 59
Users and Groups
(De)activating a user group
How to (de)activate a user group:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the user group you want to (de)activate and click the
Configuration
entry in the context menu.
3. Activate the
Enabled
entry to activate the user group.
If you want to lock the access to the KVM system for members of this user group, deactivate the entry.
4. Click the
OK
button to save your settings.
Deleting a user group
How to delete a user group:
1. Click on the
User area > User groups
entries in the tree view.
2. Right-click the user group you want to delete and click the
Delete
entry in the context menu.
3. Confirm the confirmation prompt by clicking
Yes
or cancel the process by clicking
No
.
System rights
Rights for full access (Superuser)
The Superuser right enables you to fully access and configure the KVM system.
NOTE:
The information about the user rights, which have been assigned before, are still stored when the Superuser right is activated. After the Superuser right has been withdrawn, the saved rights do apply again.
How to change the Superuser right:
1. If you want to change this right of a user account, click the
User area > Users
entries in the tree view.
For changing the rights for a user group, click the
User area > User groups
entries.
2. Right-click the user account or the user group you want to configure and click the
Configuration
entry in the context menu.
3. Click the
System rights
tab.
60 · G&D DL-Vision(M/S)
Users and Groups
4. Use the
Superuser
entry to select between the following options:
Yes:
No:
allows full access to the KVM system and the connected devices denies full access to the KVM system and the connected devices
5. Click
OK
to save your settings.
Changing the login right to the web application
How to change the login right to the web application:
1. If you want to change this right of a user account, click the
User area > Users
entries in the tree view.
For changing the rights for a user group, click the
User area > User groups
entries.
2. Right-click the user account or the user group you want to configure and click the
Configuration
entry in the context menu.
3. Click the
System rights
tab.
4. Use the
Web Interface Login
entry to select between the following options:
Yes:
No:
enables access to web application denies access to web application
5. Click
OK
to save your settings.
Rights to change your own password
How to change the right to change your own password:
1. If you want to change this right of a user account, click the
User area > Users
entries in the tree view.
For changing the rights for a user group, click the
User area > User groups
entries.
2. Right-click the user account or the user group you want to configure and click the
Configuration
entry in the context menu.
3. Click the
System rights
tab
.
4.
Use the
Change own password
entry to select between the following options:
Yes:
No:
allows the user to change the user account password denies the user to change the user account password
5. Click
OK
to save your settings.
G&D DL-Vision(M/S) · 61
The »KVM combinations« folder
The »KVM combinations« folder
The KVM combinations folder enables you to group different devices in any folders.
Especially in larger system, this folder provides better orientation.
The devices can be grouped according to locations (e. g. server room) or other features (e. g. the operating system of the connected computer).
ADVICE:
The devices of different classes – e.g. the target modules of a matrix system or an extender – can be grouped within one folder.
Folder administration
The KVM combinations folder provides the following system folders:
[Unassigned]:
[All devices]:
This folder lists all devices that are not assigned to any KVM combination.
This folder lists all devices of the KVM system.
NOTE:
The system folders can neither be deleted nor renamed.
Creating a new folder
How to create an empty folder:
1. Right-click on
KVM combination
in the tree view and click on
New folder
in the context menu.
ADVICE:
If you want to create a subfolder, right-click the main directory and click on
New folder
.
2. Use the
Name
entry to enter the desired name.
3. Optional: Use the
Comment
entry to enter a comment.
4. Click
OK
to create the folder.
62 · G&D DL-Vision(M/S)
The »KVM combinations« folder
Assigning a device to a folder
NOTE:
Each device can be listed in any number of subfolders.
How to group the connected devices in a new folder:
1. Click on
KVM combinations > [All devices]
in the tree view.
2. Right-click a connected device and click on
Group connected devices
in the context menu.
3. Use the
Name
entry to enter the desired name.
4. Optional: Use the
Comment
entry to enter a comment.
5. Click
OK
to group the devices in the new folder.
How to assign a device to an existing folder:
1. Click on
KVM combinations > [All devices]
in the tree view.
2. Right-click the device to be assigned and click on
Copy device
in the context menu.
3. Open the folder to which the device is to be assigned to.
4. Right-click the main view and click on
Paste device
in the context menu.
Deleting a device from a folder
A device can be deleted from the folder by moving it to the [Unassigned] group or by selecting the
Remove from folder
entry in the context menu.
How to cancel a target module’s assignment to a folder:
1. Click on
KVM combinations > [All devices]
in the tree view.
2. Open the folder to which the device is assigned to.
Right-click the device whose assignment you want to delete and click on
Remove from folder
in the context menu.
G&D DL-Vision(M/S) · 63
The »KVM combinations« folder
Renaming a folder
How to rename a folder:
1. Click on
KVM combinations > [All devices]
in the tree view.
2. Right-click the folder to be renamed and click on
Rename folder
in the context menu.
3. Edit the name and press
Enter
.
Deleting a folder
Any created folders can be deleted at any time.
If a folder contains devices while it is deleted, these devices are automatically moved to the [Unassigned] group.
NOTE:
The system folders [Unassigned] and [All devices] are administrated by the web application and cannot be deleted.
How to delete a folder:
1. Click on
KVM combinations > [All devices]
in the tree view.
2. Right-click the folder to be deleted and click on
Delete folder
in the context menu.
3. Confirm the confirmation prompt by clicking
Yes
or cancel the task by clicking
No
.
64 · G&D DL-Vision(M/S)
Advanced functions of the KVM system
Advanced functions of the KVM system
Temporarily (de)activating SNMP traps
(Maintenance mode)
By activating the maintenance mode, the user is enabled to deactivate SNMP traps
(see page 42), e.g. for devices that are occupied for reasons of maintenance.
The status messages are displayed again after the maintenance mode has been deactivated.
(De)activating the maintenance mode
How to (de)activate a device’s maintenance mode:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device and click on
Maintenance > On
or
Maintenance > Off
in the context menu.
Viewing a list of devices in maintenance mode
How to display the list of devices in maintenance mode:
1. Click on the
System monitoring > Maintenance
folders in the tree view.
The main view lists the respective devices.
ADVICE:
The devices in Maintenance mode are always displayed in yellow.
Identifying a device by activating the Identification LED
Some devices provide an Identification LED on the front panel.
Use the web application to switch the device LEDs on or off in order to identify the devices in a rack, for example.
How to (de)activate the Identification LED of a device:
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device and click on
Identification LED > On
or
Identification LED > Off
in the context menu.
G&D DL-Vision(M/S) · 65
Advanced functions of the KVM system
Saving and restoring the data of the KVM system
All system settings – except the network settings of the devices – can be saved with this backup function.
The saved data can be restored by using the restore function.
NOTE:
The Backup and restore function paragraph on page 21 describes how to save
and restore the network settings of a device of the KVM system.
How to save the system settings of the KVM system:
1. Click on
System
in the tree view.
2. Right-click on
System
in the display range and click on
Backup/Restore
in the context menu.
3. Click
Backup
.
4. Optional: Enter a
Comment
and/or a
Password
to secure the backup file.
5. Click
OK
.
6. Use the file window to define the location and the
File name
of the backup file.
7. Click
Save
.
8. Click
OK
to leave the window.
How to restore the system settings of the KVM system:
1. Click on
System
in the tree view.
2. Right-click on
System
in the display range and click on
Backup/Restore
in the context menu.
3. Enter the location and the name of the backup file in the
Path
entry.
ADVICE:
Use the file button to select the name and the location of the backup file via the file window.
4. Optional: Click
Check file
to check the validation of the backup file.
5. Use the information in the
Date
and
Comment
entries to check if you selected the desired backup file.
6. Click
Restore
.
7. Click
OK
to leave the window.
66 · G&D DL-Vision(M/S)
Advanced functions of the KVM system
Administration and use of EDID profiles
The EDID information (Extended Display Identification Data) of a monitor inform the graphics card of a connected computer about various technical features of the device.
A special EDID mode can be activated if the computer connected to the KVM extender is assembled with a
Barco PVS
graphics card. This mode considers the special treatment of EDID data by the graphics card.
Some resolutions can be selected using a special GUD profile. The profile names refer to the resolution that is transmitted to the monitor when using this profile.
ADVICE:
In some cases it is recommended to read out the EDID profile of the console monitor (see page 77) and activate the configuration of the target module afterwards.
Importing the EDID profile of a monitor
NOTE:
An EDID profile can either be imported from a bin file or directly from a monitor that is connected to the KVM switch.
How to import the EDID profile of a connected monitor:
1. Click on
System > Edid profiles
in the tree view.
2. Right-click in the display area and click on
New
in the context menu.
3. Click on
Learn
.
4. Mark the user module to which the monitor whose EDID information you want to import is connected.
NOTE:
Click the
[+]
icon to display a list of all user modules that are connected to the matrix switch.
5. Click
Ok
.
NOTE:
The
Name
and
Comment
entries are automatically filled out and the contents of the EDID information is displayed.
6. If desired, change the information in the
Name
and/or
Comment
entries.
7. Click
OK
to save your settings.
How to import the EDID profile of a monitor from a file:
1. Click on
System > Edid profiles
in the tree view.
2. Right-click in the display area and click on
New
in the context menu.
3. Click on
Search
.
G&D DL-Vision(M/S) · 67
Advanced functions of the KVM system
4. Use the file dialogue to choose the bin file you want to import and click on
Open
.
NOTE:
The
Name
and
Comment
entries are automatically filled out and the contents of the EDID information is displayed.
5. If desired, change the information in the
Name
and/or
Comment
entries.
6. Click
OK
to save your settings.
Overview of the stored EDID profiles
The
System > Edid profiles
branch of the tree view provides an overview of the EDID profiles that are stored within the KVM system.
Use the context menu the Add or Delete and Change the profiles added by the user.
NOTE:
Add, Delete and Change the profiles as described on the previous pages.
HINWEIS:
Information on choosing and enabling an EDID profile for a particular
video channel is given on page 78.
Activating the premium functions
After a premium function has been purchased, the user receives a feature key. This file contains a key to activate the purchased function(s).
The premium function(s) is/are activated by importing this key to the web application.
How to import a feature key to activate the purchased function(s):
1. Use the tree view to click on
KVM Extenders > [All extenders]
.
2. Right-click the device whose feature key is to be imported.
3. Click the
Configuration
entry in the context menu.
4. Click the
Features
tab.
5.
Click on
Import feature key from file...
and import the feature key (file) via the file interface.
After the file has been loaded, the clear text of the feature key is displayed in the text field.
NOTE:
The clear text of the feature key can also be copied into the text field.
6. Click
OK
to close the window.
68 · G&D DL-Vision(M/S)
Overview of the monitoring values
Overview of the monitoring values
The device-specific branches as well as the KVM combinations and the Critical devices branch of the tree view enable you to view information on the current status of the different devices in the KVM system.
The following pages list the various monitoring values.
»DL-Vision« KVM extender
NOTE:
This placeholder
[y]
symbolises the number of the video channels of multichannel devices.
Feature
CPU power
CPU PS/2
CPU USB 2.0
CPU USB HID
CPU USB K/M
Status
Off
On
Keyboard
Keyboard/Mouse BothPS/2 interfaces of the computer module are connected to the computer.
Mouse The PS/2 mouse interface of the computer module is connected to the computer.
None
Connected
The PS/2 interfaces of the computer module are not connected to the computer.
The »USB 2.0« interface of the computer module is connected to the computer.
Disconnected
Meaning
The computer connected to the computer module is turned off.
The computer connected to the computer module is turned on.
The PS/2 keyboard interface of the computer module is connected to the computer.
Connected
Disconnected
Initialized
The »USB 2.0« interface of the computer module is not connected to the computer.
Established connection between computer and
USB HID emulation
No connection between computer and
USB HID emulation
Initialized connection between computer and
USB HID emulation
Connected
Disconnected
The »USB K/M« interface of the computer module is connected to the computer.
The »USB K/M« interface of the computer module is not connected to the computer.
G&D DL-Vision(M/S) · 69
Overview of the monitoring values
Feature
CPU access
Status
Local
Local excl.
Remote
Remote excl.
Display [y]
Display type [y]
DVI cable CPU [y]
DVI signal CPU [y]
DL-DVI
None
Fan speed 1|2
SL-DVI
[Value]
Freeze [y]
Link 1|2
Active
Inactive
Crossed connected disconnected
[Value]
Connected
Connected
Disconnected
Disconnected
Main power
Network A|B
PS/2 Con
Redundant power
Meaning
The local console operates the computer.
The local console operates the computer exclusively.
The remote console operates the computer.
The remote console operates the computer exclusively.
A monitor is connected.
No monitor is connected.
Show EDIDinformation
Monitor connected.
Monitor connected.
No monitor connected.
No monitor connected.
Dual link video signal detected.
No video signal detected
Single link video signal detected.
Rotations per minute
Down
Up
Active freeze mode
Inactive freeze mode
Crossed cable connection between user module and computer module.
Ch e ck the cable connection and ensure that the cable connects interfaces with the same designation.
Cable connection to other module, inactive connection
Cable connection to other module, active connection
Off
On
Down
Up
»Main power« power pack is turned off
»Main power« power pack is turned on
No connection to network
Established connection to network
Keyboard A PS/2 keyboard is connected to the user module.
Keyboard/Mouse Both PS/2 mouse and PS/2 keyboard are connected to the user module.
Mouse
None
Off
A PS/2 mouse is connected to the user module.
No PS/2 devices are connected to the user module.
»Red. power« power pack is turned off
On »Red. power« power pack is turned on
70 · G&D DL-Vision(M/S)
Feature
SFP module [y]
Voltage
Status
Current
Temperature
USB Con
USB link
Overview of the monitoring values
Status
Down
Meaning
Cable connection to other module, inactive connection
Disabled module Module deactivated
No module
Up
[Value]
Offline
Offline
Online
Online
No module employed.
Cable connection to other module, active connection electric voltage (V)
The device is turned off.
The device is turned off.
The device is turned on.
The device is turned on.
[Value]
[Value]
Current (A)
Current temperature within the device
Keyboard A USB keyboard is connected to the user module.
Keyboard/Mouse Both USB mouse and USB keyboard are connected to the user module.
Mouse A USB mouse is connected to the user module.
None
Down
Module deactivated
No module
Up
No USB devices are connected to the user module.
Cable connection to other module, inactive connection
The device transmits transparent USB signals.
The function has been disabled.
The device does not transmit transparent USB signals.
Cable connection to other module, inactive connection
G&D DL-Vision(M/S) · 71
2
KVM extenders
The KVM extenders entry in the tree directory of the web application enables you to configure different settings of the KVM extender and to view the status information of the device.
NOTE:
The chapter Overview of the monitoring values on page 69 ff. explains the dif-
ferent information.
Basic configuration of KVM extenders
Renaming a KVM extender
How to rename a KVM extender:
1. Click on
KVM extenders > [All extenders]
in the tree view.
2. Right-click the user module or the computer module to be edited. Now, click on the
Configuration
entry in the context menu.
3. Use the
Name
entry to enter the new extender name.
4. Click
OK
to save your settings.
Changing the comment of a KVM extender
The list field of the web application not only displays the extender name but also the entered comment.
ADVICE:
Use the comment to note the KVM extender’s location, for example.
How to change the comment of a KVM extender:
1. Click on
KVM extenders > [All extenders]
in the tree view.
2. Right-click the user module or the computer module to be edited. Now, click on the
Configuration
entry in the context menu.
3. Use the
Comment
entry to enter any comment.
4. Click
OK
to save your settings.
72 · G&D DL-Vision(M/S)
Configuration settings of KVM extenders
Deleting a KVM extender from the G&D system
If the system is not able to detect an already known KVM extender, the system defines the device as being switched off.
Therefore, delete the list entry of the KVM extender that you want to permanently remove from the system.
NOTE:
Only switched-off target modules can be deleted.
How to delete a KVM extender that is switched off or disconnected from the system:
1. Click on
KVM extenders > [All extenders]
in the tree view.
2. Right-click the user module or computer module you want to delete and click the
Delete
entry in the context menu.
3. Confirm the security request by clicking
Yes
or cancel the process by clicking
No.
Configuration settings of
KVM extenders
Enabling/Disabling the setup mode
In the default settings of the KVM extender, the configuration can either be changed in the setup mode or via web application.
If desired, the setup mode can also be completely disabled.
How to (enable/disable the setup mode:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
4. Select the
Setup Mode
entry and choose between the following options:
Enabled:
Disabled:
enables setup mode disables setup mode
5. Click
OK
to save your changes.
G&D DL-Vision(M/S) · 73
Configuration settings of KVM extenders
Enabling/Disabling the hotkey delay
Press the
Hotkey+Backspace
(default:
Ctrl+Backspace
) key combination for seven seconds in order to start the setup mode.
You can disable the hotkey delay if you want to start the setup mode directly after pressing the key combination.
How to enable/disable the hotkey delay:
ADVICE:
The web application can be used to adjust the delay within a time span between 1 and 60 seconds.
1. Use the tree view to click on
KVM extenders > [All extenders
]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
4. Select the
Hotkey Delay Seconds
entry to enter the desired delay in seconds.
NOTE:
The maximum time span for the delay is 60 seconds. Entering the value
0
deactivates the delay.
5. Click
OK
to save your changes.
Changing the hotkey
If many application programs with key combinations are operated on one computer or if different G&D devices are used in one cascade, the number of available key combinations might be restricted.
If an application program or another KVM device within the cascade uses the same hotkey, the hotkey can be changed.
NOTE:
Select your desired key or key combination from the keys Ctrl, Alt, Alt Gr,
Win or Shift.
How to change the current double hotkey:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
4. Select the row
Hotkey modifier
to choose at least one of the mentioned modifiers
(Ctrl, Alt, Alt Gr, Win or Shift) by clicking the particular entry(es).
5. Click
OK
to save your changes.
74 · G&D DL-Vision(M/S)
Configuration settings of KVM extenders
Changing the setup scancode
The hotkey to call the setup mode consists of at least one hotkey modifier (see
Changing the hotkey on page 74) and an additional setup key, which can be selected
by the user.
You can change both thehotkey modifier
Ctrl
and the setup key
Num
.
How to change the current setup scancode:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
4. Select the desired key in the
Setup key
entry.
The following keys are provided: Backspace, Print, Scroll, Num, Pause, Insert, Delete,
Pos 1, End, PgUp, PgDn and Space.
5. Click
OK
to save your changes.
Changing the »Permanent Access« key
After you have pressed the key combination to operate the system exclusively, the input devices at the concurrent console are disabled.
Only after the key combination has been pressed again at the active console, both consoles can operate the KVM extender again.
The key combination for the exclusive operation consists of at least a hotkey modi-
fier (see Changing the hotkey on page 74) and an additional »Permanent Access« key,
which can be selected by the user.
You can change the hotkey modifier
Ctrl
as well as the »Permanent Access« key
PrtScr
.
How to change the »Permanent Access« key:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
4. Select the desired key in the
Permanent Access key
entry.
The following keys are provided: Backspace, Print, Scroll, Num, Pause, Insert, Delete,
Pos 1, End, PgUp, PgDn and Space.
5. Click
OK
to save your changes.
G&D DL-Vision(M/S) · 75
Configuration settings of KVM extenders
Changing the time span of the input lock
If the user carries out keyboard or mouse inputs at a console, the KVM extender automatically locks the input devices of the concurrent console. The lock is lifted if no input is made at the active console within the adjusted timing of the input lock
(default: 1 second).
After the lock has been lifted, both users can operate the computer again.
The time span of the input lock can be adjusted between 1 and 90 seconds.
How to change the time span of the input lock:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
4. Use the
Multiuser input lock
entry to enter the time span of the input lock in seconds.
NOTE:
The maximal time span of the input lock is 90 seconds.
5. Click
OK
to save your changes.
Authorisation for permanent console access
If no inputs are being made at the active console during the adjusted time span of the automatic input lock (default: 1 second), the default settings of the KVM extender permit the other console to operate the connected computer.
If the function to permenantly access the console is activated in the web application, the user is enabled to exclusively operate the KVM extender by pressing the key combination
Hotkey+PrtScr
(default:
Ctrl+PrtScr
).
Pressing this key combination disables the input devices of the concurrent console.
By pressing the key combination again at the active console, both consoles can operate the
DL-Vision
system again.
NOTE:
After the exclusive operation of the KVM extender has been activated at a user console, the Caps Lock, the Num as well as the Scroll Lock LEDs are alternately blinking at the keyboard of the locked user console.
The blinking Scroll Lock LED at the user console indicates that the KVM extender is exclusively operated.
The blinking Scroll LEDs at both console keyboards indicate that the exclusive operation of the KVM matrix system has been activated.
76 · G&D DL-Vision(M/S)
Configuration settings of KVM extenders
How to select the right for permanent console access:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
Console
tab.
4. Use the
Permanent Access mode
entry in the local console or
remote console
paragraphs to select between the following options:
Enabled:
Disabled:
enables permanent access denies permanent access
5. Click
OK
to save your changes.
Related topics:
Changing the console video mode on page 77
Changing the console video mode
In the standard configuration of the KVM extender, the computer’s image is output at the monitor of the active console as well as at the monitor of the concurrent console.
This setting enables you to define if the image of the other console is to be switched off during inputs at a console.
The image is displayed on the other monitor as soon as the user at the concurrent console finishes their inputs.
How to select the video mode for the local console:
1. Use the tree view to click on
KVM Extenders > [All Extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
Console
tab.
4. Use the
local > Image display
entries to select between the following options:
Always on
Off for actions at remote console
5. Click
OK
to save your changes.
G&D DL-Vision(M/S) · 77
Configuration settings of KVM extenders
How to select the video mode for the remote console:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
Console
tab.
4. Use the
remote > Image display
entries to select between the following options:
Always on
Off for actions at local console
5. Click
OK
to save your changes.
Related topics:
Changing the time span of the input lock on page 76
Authorisation for permanent console access on page 76
Selecting the EDID mode of the KVM extender
The EDID information (Extended Display Identification Data) of a monitor inform the graphics card of a connected computer about different technical device features. The information are usually transmitted via Enhanced-DDC (Enhanced Display Data Chan-
nel) from KVM extender to the computer without alteration.
A special EDID mode can be activated if the computer connected to the KVM extender is assembled with a
Barco PVS
graphics card. This mode considers the special treatment of EDID data by the graphics card.
Some resolutions can be selected using a special GUD profile. The profile names refer to the resolution that is transmitted to the monitor when using this profile
Alternatively, the EDID profile of a monitor can be read in. The extender transmits the profile to the connected computer. Detailed information about this topic is given in a sparate chapter on page 70 ff.
IMPORTANT:
It might be possible that Barco PVS graphics cards do not create an image in the Auto mode.
How to select the EDID mode of the KVM extender:
1. Use the tree view to double-click on
KVM Extenders > [All Extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
78 · G&D DL-Vision(M/S)
Configuration settings of KVM extenders
4. Use the
EDID mode
field to select between the following options:
[Auto]:
[BARCO PVS]:
GUD DVI …:
Name:
SUN DE:
standard keymode automatic treatment of EDID data (default) special mode for Barco PVS graphics cards
G&D profile for a particular resolution
EDID profile read in by user
5. Click
OK
to save your settings.
NOTE:
Please mind the activation sequence recommended in the installation guide when initiating or connecting another monitor.
Freeze mode
If the cable connection between computer and user module fails during operation, the
KVM extender no longer displays an image at the console monitor.
Enable the Freeze mode if you want the last available image at the user module to be displayed after the connection was interrupted. The image will be displayed until the connection is re-established.
TIPP:
To highlight a failure in the connection, the last available image can be displayed either with a coloured frame and/or the popup stating
Frozen
.
How to configure the freeze mode:
1. Click on
KVM Extenders > [All Extenders]
in the tree view.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
Console
tab.
The Freeze mode can be disabled/enabled for each video channel of the user module. The following options can be adjusted separately for each video channel of multi-channel devices.
4. Use the
Freeze mode
box to choose between the following options:
Disabled:
Enabled:
show no image when disconnected (default).
show last available image when disconnected.
G&D DL-Vision(M/S) · 79
Configuration settings of KVM extenders
5. If the Freeze mode is disabled, you can use the
Freeze visualization
box to disable the following options.
Frame:
OSD:
Apple:
shows a coloured frame when disconnected.
shows Frozen when disconnected.
keymode for Apple computers
6. Click
OK
to save your settings.
Starting the user module without keyboard
The module stops the start-up and shows a message if no keyboard is connected a user module.
Disable the keyboard support to start the module without keyboard.
How to disable/enable keyboard support for the user module:
1. Click on
KVM Extenders > [All Extenders]
in the tree view.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
Console
tab.
4. Use the
Remote > Keyboard required
box to choose between the following options:
Enabled:
Disabled:
interrupt start-up if keyboard cannot be detected (default).
continue start-up without keyboard.
5. Click
OK
to save your settings.
Settings for special hardware
Support for special Multimedia and Sun keys
Various manufacturers added special keys to the standard keyboards.
Some keyboards are provided with multimedia keys through which it is possible to comfortably operate special multimedia functions of the computer. For example, the keyboard of the Apple Mac mini is provided with a key to open the DVD drive.
Compared to standard keyboards, Sun desktops and servers are provided with separate keys (Solaris Shortcut Keys) to operate special system functions. After the keyboard mode for Sun desktops and servers has been activated, the Solaris Shortcut Keys can be used at the console. If the console only provides a standard keyboard, several key combinations can be applied to emulate the Solaris Shortcut Keys (see page 81).
Several USB keymodes are provided to use the special keys of such keyboards.
80 · G&D DL-Vision(M/S)
Configuration settings of KVM extenders
How to enable/disable the support for Multimedia or Sun special keys:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
General
tab.
4. Use the
USB Keymode
entry in the Configuration paragraph to select between the following options:
PC Standard:
PC Multimedia:
Apple:
SUN US:
SUN DE:
standard keymode support for Multimedia special keys keymode for Apple computers
Sun keymode (American layout)
Sun keymode (German layout)
5. Click
OK
to save your changes.
If the console is provided with a Sun keyboard, use the Solaris Shortcut Keys of this keyboard after enabling. When using a standard keyboard, these functions can be performed by using the key combinations listed below:
Key combination
Ctrl+Alt+F2
Ctrl+Alt+F3
Ctrl+Alt+F4
Ctrl+Alt+F5
Ctrl+Alt+F6
Ctrl+Alt+F7
Ctrl+Alt+F8
Ctrl+Alt+F9
Ctrl+Alt+F10
Ctrl+Alt+F11
Ctrl+Alt+F12
Ctrl+Alt+NUM+
Ctrl+Alt+NUM-
Ctrl+Alt+NUM*
Ctrl+Alt+Pause
Pause+A
Solaris Shortcut Key of Sun keyboard
Again
Props
Undo
Front
Copy
Open
Paste
Find
Cut
Help
Mute
Loud
Quiet
Compose
Shutdown
Stop
G&D DL-Vision(M/S) · 81
Configuration settings of KVM extenders
Support for special keyboards
The KVM extender supports the special functions of keyboards PixelPower Clarity
(blue) and SKIDATA1 keyboards.
If you want to apply such a keyboard, enable its support.
How to (enable/disable the support for special keyboards:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
Console
tab.
4. Use the
local > PS/2 keyboard type
entries and/or the
local > PS/2 leyboard type
entries to select between the following options:
PixelPower Blue:
SKIDATA1:
Standard:
enables support for PixelPower Blue keyboards enables support for SKIDATA1 keyboards disables support for special keyboardss
5. Click
OK
to save your changes.
Changing the scancode set of a PS/2 keyboard
If a key is pressed on the PS/2 keyboard, the keyboard processor sends a data packet called scancode. The two common scancode sets (sets 2 and 3) contain different scancodes.
In the standard configuration, the KVM extender interprets all PS/2 keyboard inputs with the scancode set 2.
If the pipe (“|”) cannot be input or if the arrow keys of the keyboard do not function as expected, it is recommended to switch to scancode set 3.
How to change the settings of the scancode set:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Double-click the computer module of the KVM extender to be configured.
3. Click the
Console
tab.
4. Use the
local > Scancode Set
entries and/or the the
local > Scancode Set
entries to select between the following options:
Set 2:
Set 3:
enables scancode set 2 for PS/2 keyboard inputs enables scancode set 2 for PS/2 keyboard inputs
5. Click
OK
to save your changes.
6. Restart the KVM extender. After the restart, the keyboard is initialised and the selected scancode set does apply.
82 · G&D DL-Vision(M/S)
Advanced functions for KVM extenders
Advanced functions for KVM extenders
Viewing the status information of a KVM extender
The context menu of a KVM extender enables you to call a interface with various status information of the KVM extender.
How to view the status information of a KVM extender:
1. Use the tree view to click on
KVM extenders > [All extenders]
.
2. Right-click the user module or the computer module whose status information you want to view and click on
Information
in the context menu.
3. The appearing interface provides the following information:
KVM Extender
Name:
Device ID:
Status:
Comment:
KVM extender name physical ID of KVM extender current status ( on or off) of KVM extender user comment regarding the KVM extender
Device information
Firmware name:
MAC address A:
MAC address B:
Firmware revision:
Serial number:
U-Boot version:
Transparent USB:
IP address A:
IP address B:
displays the firmware name
MAC address of Network A interface
MAC address of Network B interface
Firmware version serial number of KVM extender boot loader version support of transparent USB signal (
on
or
off
)
IP address of Network A interface
IP address of Network B interface
4. Click
Close
to leave the window.
G&D DL-Vision(M/S) · 83
Advanced functions for KVM extenders
Viewing information on the connection
The connection information provides you with an overview of the physical connections between computer module and user modules.
This overview also displays the physical ID of the devices, the occupied Transmission interfaces as well es the device status.
How to view the connection information:
1. Use the tree view to click on
KVM Extenders > [All Extenders]
.
2. Right-click the desired user module or the computer module and click on
Connections
in the context menu to view information on the connection:
NOTE:
The computer module or the user module via whose context menu the connection information has been called is highlighted in red.
3. The connection information provides the following information:
Names and physical device ID of the connected KVM extenders
Designations of interfaces of devices that are interconnected.
switching status (On or Off) of the KVM extender
4. Click
Close
to leave the window.
84 · G&D DL-Vision(M/S)
Notes
G&D DL-Vision(M/S) · 85
Guntermann & Drunck GmbH
Dortmunder Str. 4a
57234 Wilnsdorf
Germany
Phone +49 2739 8901-100
Fax +49 2739 8901-120 http://www.GDsys.de [email protected]
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 8 Supported web browsers
- 8 Java Runtime Environment
- 10 Starting the web application
- 10 Security instructions of the web browser
- 11 User login at the web application
- 12 Operating the web application
- 12 User interface
- 13 Frequently used buttons
- 13 User logout
- 14 Selecting the default language of the web application
- 14 Showing the version number of the web application
- 15 Network settings
- 15 Configuring the network settings
- 16 Configuring the global network settings
- 17 Increasing the reliability of network connections through link aggregation
- 18 Creating and administrating netfilter rules
- 19 Creating a new netfilter rule
- 20 Editing existing netfilter rules
- 21 Deleting existing netfilter rules
- 21 Changing the order/priority of existing netfilter rules
- 22 Creating an SSL certificate
- 22 Special features for complex KVM systems
- 22 Creating a Certificate Authority
- 23 Creating any certificate
- 24 Creating and signing the X509 certificate
- 25 Creating a PEM file
- 25 Updating the stored SSL certificate
- 27 Backup and restore function
- 28 Firmware update
- 28 Restoring the default settings
- 29 NTP server
- 29 Time sync with an NTP server
- 30 Setting time and date manually
- 31 Logging syslog messages
- 31 Locally logging the syslog messages
- 32 Sending syslog messages to a server
- 32 Viewing and saving local syslog messages
- 33 User authentication against directory services
- 36 Viewing monitoring values
- 36 Listing values by applying monitoring sets
- 36 Listing individual values of critical devices
- 36 Disabling the monitoring values
- 37 Advanced function regarding the administration of critical devices
- 37 Messages regarding the critical status of the devices
- 37 Viewing the list of critical devices
- 38 Marking the messages from a critical device as read
- 39 Administrating monitor groups
- 39 Adding a monitoring group
- 40 Changing the name and/or comment of a monitoring group
- 40 Assigning members to a monitoring group
- 41 Duplicating a monitoring group
- 41 Deleting a monitoring group
- 42 Administrating monitoring sets
- 42 Adding a monitoring set
- 43 Changing the name and/or comment of a monitoring set
- 43 Assigning members to a monitoring set
- 44 Selecting a monitoring set in the folder configuration
- 44 Duplicating a monitoring set
- 45 Deleting a monitoring set
- 46 Practical use of the SNMP protocol
- 46 Configuring the SNMP agent
- 48 Configuring SNMP traps
- 51 The dialog entries of the logbook
- 51 The »Logbook configuration« dialog
- 52 Viewing a logbook entry in detail
- 52 Basic logbook functions
- 52 Creating a new logbook entry
- 53 Changing a logbook entry
- 54 Deleting a logbook entry
- 54 Advanced functions
- 54 Printing logbook entries
- 55 Exporting logbook entries
- 56 Copying the logbook entries
- 58 Efficient rights administration
- 58 The effective right
- 59 Efficient user group administration
- 59 Administrating user accounts
- 60 Creating a new user account
- 61 Renaming the user account
- 61 Changing the user account password
- 62 Changing the user account rights
- 62 Changing a user account’s group membership
- 63 Enabling/Disabling a user account
- 63 Deleting a user account
- 64 Administrating user groups
- 64 Creating a new user group
- 64 Renaming a user group
- 65 Changing the user group rights
- 65 Administrating user group members
- 66 (De)activating a user group
- 66 Deleting a user group
- 66 System rights
- 66 Rights for full access (Superuser)
- 67 Changing the login right to the web application
- 67 Rights to change your own password
- 68 Folder administration
- 68 Creating a new folder
- 69 Assigning a device to a folder
- 69 Deleting a device from a folder
- 70 Renaming a folder
- 70 Deleting a folder
- 71 Temporarily (de)activating SNMP traps (Maintenance mode)
- 71 (De)activating the maintenance mode
- 71 Viewing a list of devices in maintenance mode
- 71 Identifying a device by activating the Identification LED
- 72 Saving and restoring the data of the KVM system
- 73 Administration and use of EDID profiles
- 73 Importing the EDID profile of a monitor
- 74 Overview of the stored EDID profiles
- 74 Activating the premium functions
- 78 Renaming a KVM extender
- 78 Changing the comment of a KVM extender
- 79 Deleting a KVM extender from the G&D system
- 79 Enabling/Disabling the setup mode
- 80 Enabling/Disabling the hotkey delay
- 80 Changing the hotkey
- 81 Changing the setup scancode
- 81 Changing the »Permanent Access« key
- 82 Changing the time span of the input lock
- 82 Authorisation for permanent console access
- 83 Changing the console video mode
- 84 Selecting the EDID mode of the KVM extender
- 85 Freeze mode
- 86 Starting the user module without keyboard
- 86 Settings for special hardware
- 86 Support for special Multimedia and Sun keys
- 88 Support for special keyboards
- 88 Changing the scancode set of a PS/2 keyboard
- 89 Viewing the status information of a KVM extender
- 90 Viewing information on the connection