CPU IP Access Switch Lite User Manual English LINDY No. 39405 www.lindy.
Contents 1. INTRODUCTION ..................................................................................................................... 1 1.1 Features ................................................................................................................................ 2 1.2 Package Contents ................................................................................................................ 2 1.3 Technical Specifications ..........................................................
.3 Navigation........................................................................................................................... 15 4.3.1 Remote Console Main Window ..................................................................................... 16 4.3.2 Remote Console Control Bar......................................................................................... 17 4.3.3 Remote Console Status Line .........................................................................................
1. Introduction Thank you for purchasing the LINDY CPU IP ACCESS SWITCH LITE. This device allows operators to monitor and access their computers from remote locations. The IP ACCESS SWITCH LITE connects to the internet, intranet, LAN or WAN using standard CAT5 or higher cable, then uses a KVM cable to connect a local KVM switch or server. The IP ACCESS SWITCH LITE combines convenient digital remote KVM access and control with integrated system management.
1.
1.
2. Hardware Installation 2.1 Operation Overview The pictures below show the connection options of the IP ACCESS SWITCH LITE. The IP ACCESS SWITCH LITE redirects local keyboard, mouse, and video signals to a remote administration console. All data is transmitted using the TCP/IP protocol. Server (Host) IP Access Switch Lite IP Network Administrator (Client) Controlling a single computer The IP ACCESS SWITCH LITE can be used in a multi administrator and multi server environment as well.
2.2 Connections 2.2.1 Host Connection Side Use the supplied 3-in-1 combined KVM cable and USB cable to make the connections to the host computer. The DC power supply connection is also made here. Mouse port connection Keyboard port connection VGA port connection Reset switch USB port connection DC power supply socket 1. Plug the power adapter into the mains and connect the jack to the DC power supply socket 2. Connect the VGA port connection to the VGA port on the host computer 3.
2.2.3 Network Connection The IP ACCESS SWITCH LITE provides an RJ-45 port for an Ethernet connection. The port can be used with a 100Mbps, 100Base-TX connection or a 10Mbps, 10Base-T connection. The IP ACCESS SWITCH LITE will sense the connection speed and automatically adjust to the appropriate operation mode. 10Mbps Connection For 10Base-T Ethernet networks, the Ethernet adapter should use Category 3, 4, 5 or 6 UTP cable. To establish a 10Mbps connection, the cable must be connected to a 10Base-T hub.
3. Configuration The CPU IP ACCESS SWITCH LITE’s Parameter communication interfaces are all based on IP auto configuration TCP/IP. The switch comes pre-configured IP-Address with the IP configuration detailed here: Net-mask Default-Gateway Value DHCP 255.255.255.0 none Note: If the DHCP connection fails on boot-up, the IP ACCESS SWITCH LITE will not have an IP address.
3.3 IP ACCESS SWITCH LITE Setup Tool 3.3.1 MAC Address Detection Connect the IP ACCESS SWITCH LITE to your computer either via a local network, or via USB. If you use a USB connection Windows will detect the IP ACCESS SWITCH LITE as a ‘Removable Disk’ and an appropriate drive letter will be assigned. Start the setup tool from the CD ROM. A window opens as shown below: On the upper left corner, the MAC address of the IP ACCESS SWITCH LITE is displayed.
3.3.2 Authentication To adjust the authentication settings, enter your login as a super user and change your password. Super user login Enter the login name of the super user. The initial value is super. All of the characters are lower case. Super user password Enter the current password for the super user. This initial value is pass. All of the characters are lower case. New super user password Enter the new password for the super user. New password (confirm) Re-type the new password for the super user.
3.4 Keyboard, Mouse and Video configuration Between the IP ACCESS SWITCH LITE and the host, there are two interfaces available for transmitting keyboard and mouse data: USB and PS/2. The correct operation of the remote mouse depends on several settings which will be discussed in the following subsections. 3.4.1 IP ACCESS SWITCH LITE Keyboard Settings The IP ACCESS SWITCH LITE settings for the host's keyboard type have to be correct in order to make the remote keyboard work properly.
3.4.3 Host System Mouse Settings The host's operating system obtains various settings from the mouse driver. Note: The following limitations do not apply when using USB mice and Windows 2000 and higher! Special Mouse Driver There are mouse drivers which influence the synchronization process and lead to desynchronized mouse pointers. If this happens, make sure you do not use a special vendorspecific mouse driver on your host system.
3.4.5 Recommended Mouse Settings For the different operating systems we can give the following advice... MS Windows 2000/2003 (Professional and Server), XP In general, we recommend the use of a USB mouse. Choose USB without Mouse Sync. For a PS/2 mouse choose Auto Mouse Speed. For XP disable the option called enhance pointer precision in the Control Panel. SUN Solaris Adjust the mouse settings either via xset m 1 or use the CDE Control Panel to set the mouse to 1:1, no acceleration.
4. Usage 4.1 Prerequisites The IP ACCESS SWITCH LITE features an embedded operating system offering a variety of standardized interfaces. This section will describe these interfaces, and the way to use them in a more detailed manner. The interfaces are accessed using the TCP/IP protocol family. The following interfaces are supported: Telnet A standard Telnet client can be used to access an arbitrary device connected to the IP ACCESS SWITCH LITE’s serial port via a terminal.
4.2 Logging In 4.2.1 Login to the IP ACCESS SWITCH LITE Launch your web browser. Direct it to the address of your IP ACCESS SWITCH LITE which you configured during the installation process. The address used might be a plain IP address or a host and domain name if you have given your IP ACCESS SWITCH LITE switch a symbolic name in the DNS.
4.3 Navigation Once logged into the IP ACCESS SWITCH LITE successfully, the main page appears. This page consists of three parts; each of them contains specific information. The buttons in the upper area allow you to navigate within the front end. The lower left area contains a navigation bar and allows you to switch between the different sections of the IP ACCESS SWITCH LITE. Within the main area, task-specific information is displayed.
The Remote Console is the redirected screen, keyboard and mouse of the remote host system that the IP ACCESS SWITCH LITE switch controls. Selecting this button opens the Remote Console Main Window. The Remote Console window is a Java Applet that establishes its own TCP connection to the IP ACCESS SWITCH LITE. The protocol that runs over this connection is neither HTTP nor HTTPS, but RFB (Remote Frame Buffer Protocol). RFB needs to establish a connection to port number 443.
Note: Your local keyboard changes its keyboard layout according to the remote host system. If you use a German administration system and your host system uses a US English keyboard layout for instance, some special keys on the German keyboard will not work as expected. Instead, the keys will result in their US English counterpart. You can circumvent such problems by adjusting the keyboard of your remote system to the same mapping as your local one.
Options Opens the Options menu. A short description of the each of the options follows: Monitor Only Toggles the ‘Monitor Only’ filter on or off. If the filter is switched on, no remote console interaction is possible but monitoring is. Exclusive Access If a user has the appropriate permission, he can force the Remote Consoles of all other users to close. No one can open the Remote Console at the same time again until this user disables the exclusive access, or logs off.
Video Settings through the remote console: Brightness Controls the brightness of the picture Contrast Controls the contrast of the picture Clock Defines the horizontal frequency for a video line and depends on the video mode. Different video card types may require different values here. The default settings in conjunction with the auto adjustment procedure should be adequate for most common configurations.
Soft Keyboard Opens up the sub-menu for the Soft-Keyboard: Show Pops up the Soft-Keyboard. The Soft-Keyboard is necessary in case your host system runs a completely different language and country mapping than your administration machine. Mapping Used for choosing the language and country mapping of the Soft-Keyboard. Local Keyboard Used to change the language mapping of your browser running the Remote Console Applet. Normally, the applet determines the correct value automatically.
4.3.3 Remote Console Status Line Status line Shows both console and the connection state. The size of the remote screen is displayed. The example below was taken from a Remote Console with a resolution of 1024 x 768 pixels. The value in brackets describes the connection to the Remote Console. Norm means a standard connection without encryption, SSL indicates a secure connection. Furthermore, both the incoming (In:) and the outgoing (Out:) network traffic are visible (in kb/s).
5. Menu Options 5.1 Remote Control 5.1.1 KVM Console To open the KVM console, click either the menu entry on the left or on the console picture on the right. To refresh the picture, click on the Refresh button. For the Remote Power settings see Section 2.2.5 on page 6.
5.1.2 Telnet Console The IP ACCESS SWITCH LITE firmware features a Telnet server that enables a user to connect via a standard Telnet client. If the Telnet program is using a VT 100, VT 102 or VT 220 terminal or appropriate emulation, it is even possible to perform a console redirection, as long as the IP ACCESS SWITCH LITE host is using a text mode screen resolution. Connecting to the IP ACCESS SWITCH LITE is done as usual and as required by the Telnet client, for instance in a UNIX shell: telnet 192.168.
The following list shows the command mode syntax and their usage. Help Displays the list of possible commands Cls Clears the screen Quit Exits the current session and disconnects from the client Version Displays the release information Terminal Starts the terminal pass-through mode for the serial port. The key sequence ‘esc exit’ switches back to the command mode.
5.2 Virtual Media 5.2.1 Floppy Disk Follow the steps below to upload a virtual floppy image to the IP ACCESS SWITCH LITE and create a virtual floppy drive on the host system Create a Floppy Image First, on your client PC you must create an image of your floppy disk which can be uploaded to the IP ACCESS SWITCH LITE’s built in memory. UNIX and UNIX-like OS To create an image file, make use of dd. This is one of the original UNIX utilities and is included in every UNIX-like OS (UNIX, Sun Solaris, Linux).
Windows Windows users should use the tool RawWrite for Windows which is included on the supplied CD. Launch RawWrite, you will see the window opposite: Insert your floppy disk into your floppy drive. Click the Read tab and then click on Select a name and destination for the floppy image file and click the Read button. As the image is written, you will see the progress as a percentage figure in the bottom left hand corner. When the image has been written you can upload it to the IP ACCESS SWITCH LITE.
5.2.2 Create a CD-ROM/ISO Image Follow the procedure below to create a CD-ROM image which can be accessed by the host system via the IP ACCESS SWITCH LITE. First, on your client PC you must create an image of your CD which can be accessed by the host system. UNIX and UNIX-like OS To create an image file, make use of dd. This is one of the original UNIX utilities and is included in every UNIX-like OS (UNIX, Sun Solaris, Linux). To create a CDROM image file, copy the contents of the CD-ROM to a file.
Windows To create the image file, use your favourite CD imaging tool. Copy the whole contents of the disc into one single image file on your hard disk. For example, with ‘Nero’ you choose ‘Copy and Backup’. Then, navigate to the ‘Copy Disc’ section. Select the CD ROM or DVD drive you would like to create an image from. Specify the filename of the image, and save the CD ROM content in that file. Example: 1. Create a CD image and name it image.iso 2. Create a folder on your client PC and name it Test.
7. You will see the dialog below detailing the active image: 8. Click Reactivate. Access the console window and you will see that another CD drive has been installed on the host computer. This is the virtual drive you have just set up. You can access the uploaded CD image as though it were a regular CD. Click Unset to remove the image. SAMBA If you would like to access the share via SAMBA, SAMBA must be set up properly. You may either edit the SAMBA configuration file /etc/samba/smb.
5.2.3 Drive Redirection The Drive Redirection feature allows the host system to access the CD-Rom drives, hard drives, floppy drives etc. on your client PC. To use this feature you need the Drive Redirection Tool which is part of the KVM Vision Viewer application included on the supplied CD. 1. To set up Drive Redirection, first install KVM Vision Viewer. After installation launch the application: 2.
3. Follow the on-screen instructions. You will be asked to input your user name (default is super) and password (default is pass). 4. Continue with the Wizard until the device is correctly configured.
5. Choose the drive you wish to redirect from the drop-down list. Enter your user name and password and click OK. Warning: Please be aware that if Allow Write Support is selected, data on the shared media may be lost! 6. Access the host computer from the Remote Console window. You will see that the redirected drive will now be shown in Windows Explorer: IMPORTANT 1. Drive Redirection is only possible with Windows 2000 and later versions. 2. Drive Redirection works on a low SCSI level.
5.3 User Management 5.3.1 Change Password To change your password, enter the new password in the upper entry field. Retype the password in the lower field. Click Apply to submit your changes.
5.3.2 Users And Groups The IP ACCESS SWITCH LITE comes with 2 pre-configured user accounts that have fixed permissions. The super account has all possible rights to configure the device and to use all functions. The user account has only the permission to open and use the Remote Console. The default password for both accounts is pass. Ensure you change the passwords as soon as you have installed and accessed the IP ACCESS SWITCH LITE for the first time.
5.4 KVM Settings 5.4.1 User Console The following settings are user specific. This means the super user can customize these settings for individual users separately. Changing the settings for one user does not affect the settings for the other users. User select box This box displays the user ID for which the values are shown and for which the changes will take effect. You may change the settings of other users if you have the necessary access rights.
are very time consuming, they should not be used when several users are accessing the IP ACCESS SWITCH LITE simultaneously. The standard colour depth is 16 bit (65536 colours). The other colour depths are intended for slower network connections in order to allow a faster transmission of data. Therefore compression level 0 (no compression) uses only 16 bit colour depth. At lower bandwidths only 4 bit (16 colours) and 2 bit (4 grey scales) are recommended for typical desktop interfaces.
Miscellaneous Remote Console Settings Start in Monitor Mode Sets the initial value for the monitor mode. By default the monitor mode is off. In case you switch it on, the Remote Console window will be started in a read only mode. Start in Exclusive Access Mode Enables the exclusive access mode immediately at Remote Console startup. This forces the Remote Consoles of all other users to close. No one can open the Remote Console at the same time again until this user disables the exclusive access or logs off.
5.4.2 Keyboard/Mouse Host Interface Enables the interface the mouse is connected to. You can choose between Auto for automatic detection, USB for a USB mouse, or PS/2 for a PS/2 mouse. Note: To use the USB and/or PS/2 interface you need the correct cabling between the managed host and the managing device. If the managed host has no USB keyboard support in the BIOS and you have connected the USB cable only, then you will have no remote keyboard access during the boot process of the host.
Mouse Speed Auto mouse speed Use this option if the mouse settings on the host use an additional acceleration setting. The IP ACCESS SWITCH LITE tries to detect the acceleration and speed of the mouse during the mouse sync process. Fixed mouse speed Use a direct translation of mouse movements between the local and the remote pointer. You may also set a fixed scaling which determines the amount the remote mouse pointer is moved when the local mouse pointer is moved by one pixel.
5.5 Device Settings 5.5.1 Network The Network Settings panel allows network related parameters to be changed. Each parameter will be explained below. Once applied the new network settings will immediately come into effect. Note: The initial IP configuration is usually done directly at the host system using the special procedure described in Section 3, page 7. Changing the network settings of the IP ACCESS SWITCH LITE might result in losing connection to it.
Primary DNS Server IP Address IP address of the primary Domain Name Server in dot notation. This option may be left empty; however, the IP ACCESS SWITCH LITE will not be able to perform name resolution. Secondary DNS Server IP Address IP address of the secondary Domain Name Server in dot notation. It will be used in case the Primary DNS Server cannot be contacted. Remote Console and HTTPS port Port number at which the IP ACCESS SWITCH LITE’s Remote Console server and HTTPS server are listening.
5.5.2 Dynamic DNS A freely available Dynamic DNS service (dyndns.org) can be used in the following scenario (see illustration below) The IP ACCESS SWITCH LITE is reachable via the IP address of the DSL router, which is dynamically assigned by the provider. Since the administrator does not know the IP address assigned by the provider, the IP ACCESS SWITCH LITE connects to a special dynamic DNS server in regular intervals and registers its IP address there.
Enable Dynamic DNS Enables the Dynamic DNS service. This requires a configured DNS server IP address. Dynamic DNS server This is the server name where the IP ACCESS SWITCH LITE registers itself in regular intervals. At the time of writing, this is a fixed setting since only dyndns.org is currently supported. Hostname This is the hostname of the IP ACCESS SWITCH LITE that is provided by the Dynamic DNS Server. (Use the whole name including the domain, e.g. testserver.dyndns.org not just the actual hostname).
5.5.3 Security Force HTTPS If this option is enabled, access to the web front-end is only possible using an HTTPS connection. The IP ACCESS SWITCH LITE will not listen on the HTTP port for incoming connections. If you want to create your own SSL certificate that is used to identify the IP ACCESS SWITCH LITE please refer to the section called Certificate on page 45. KVM encryption This option controls the encryption of the RFB protocol.
5.5.4 Certificate The IP ACCESS SWITCH LITE uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. During the connection establishment the IP ACCESS SWITCH LITE has to expose its identity to a client using a cryptographic certificate. This certificate and the underlying secret key is the same for all IP ACCESS SWITCH LITE units and certainly will not match the network configuration that will be applied to the IP ACCESS SWITCH LITE by its user.
After completing these three steps, the IP ACCESS SWITCH LITE has its own certificate that is used to identify it to its clients. Note: If you destroy the CSR on the IP ACCESS SWITCH LITE there is no way to get it back! In case you deleted it by mistake, you have to repeat the three steps as described previously.
Confirm Challenge Password Confirmation of the Challenge Password Email The email address of a contact person that is responsible for the IP ACCESS SWITCH LITE and its security. Key length This is the length of the generated key in bits. 1024 bits are sufficient for most cases. Longer keys may result in slower response time by the IP ACCESS SWITCH LITE during connection establishment.
5.5.5 Serial Port The IP ACCESS SWITCH LITE Serial Settings allow you to specify what device is connected to the serial port and how to use it. Configuration or console login Do not use the serial port for any special function; use it only for the initial configuration Modem The IP ACCESS SWITCH LITE offers remote access using a telephone line in addition to the standard access over the built-in Ethernet adapter. The modem needs to be connected to the serial interface of the IP ACCESS SWITCH LITE.
Modem Init String The initialization string used by the IP ACCESS SWITCH LITE to initialize the modem. The default value will work with all modern standard modems directly connected to a telephone line. In case you have a special modem or the modem is connected to a local telephone switch that requires a special dial sequence in order to establish a connection to the public telephone network, you can change this setting by entering a new string. Refer to your modem’s manual about the AT command syntax.
5.5.6 Date And Time Here you can set the internal real-time clock of the IP ACCESS SWITCH LITE. You can adjust the clock manually or use an NTP timeserver. Without a timeserver your time setting will be lost if the IP ACCESS SWITCH LITE is powered down for more than a few minutes. To avoid this, you can use an NTP timeserver which sets up the internal clock automatically to the current UTC time.
5.5.7 Event Log Important events like a login failure or a firmware update are logged to a selection of logging destinations. Each of those events belongs to an event group, which can be activated separately. In the Event Log Settings you can choose how many log entries are shown on each page. Furthermore, you can clear the log file here. List logging enabled The common way to log events is to use the internal log list of the IP ACCESS SWITCH LITE.
SMTP Logging enabled With this option, the IP ACCESS SWITCH LITE is able to send Emails to an address given by the Email address text field in the Event Log Settings. These mails contain the same description strings as the internal log file and the mail subject is filled with the event group of the occurred log event. In order to use this log destination you have to specify an SMTP server that has to be reachable from the IP ACCESS SWITCH LITE and that needs no authentication at all (:).
5.6 Maintenance 5.6.1 Device Information This section contains a summary with various information about the IP ACCESS SWITCH LITE and its current firmware. It also allows you to reset the unit. View the data file for support Allows you to download the IP ACCESS SWITCH LITE data file with specific support information. This is an XML file with certain customized support information like the serial number etc. You can send this information if you contact LINDY technical support.
5.6.2 Event Log Displays the log list including the events that are logged by the IP ACCESS SWITCH LITE. 5.6.3 Update Firmware The IP ACCESS SWITCH LITE is a complete standalone computer. The software it runs is called the firmware. The firmware of the IP ACCESS SWITCH LITE can be updated remotely in order to install new functionality or special features.
A new firmware update is a binary file which can be sent to you by email or which you can download from our website www.lindy.com. Updating the firmware is a three-stage process: 1. The new firmware file is uploaded to the IP ACCESS SWITCH LITE. In order to do this you need to select the file on your local system using the Browse button on the Upload Firmware panel. Once the firmware file has been uploaded it is checked whether it is a valid firmware file and whether there were any transmission errors.
5.6.4 Unit Reset This section allows you to reset specific parts of the device. This involves the keyboard and mouse, the video engine and the IP ACCESS SWITCH LITE itself. Resetting the unit itself is mainly needed to activate a newly updated firmware. It will close all current connections to the administration console and to the Remote Console. The whole process will take about half a minute. Resetting sub devices (e.g.
6. Troubleshooting Q 001: The remote mouse doesn’t work or is not synchronized A 001: Make sure the mouse settings in IP ACCESS SWITCH LITE match the mouse model. Use the Intelligent Sync option from the Mouse Handling sub menu of the Remote Console Options menu. Q 002: The video quality is bad or the picture is grainy A 002: Try to correct the brightness and contrast settings (see Page 19) until they are out of a range where the picture looks grainy.
Q 009: Using MacOS X an HTTPS connection fails A 009: You have to install the IP ACCESS SWITCH LITE certificate using our certificate installer, available on the utility CD. Please refer to the instructions on this CD for further information on how to install the certificate. Q 010: Can’t upload the signed certificate in Mac OS X A 010: If an ‘internal error’ occurs while uploading the signed certificate either change the extension of the file to .
7. Key Codes This table shows the key codes used to defines keystrokes or hotkeys for several functions. Please note that these key codes do not necessarily represent key characters that are used on international keyboards. They name a key on a standard 104 key PC keyboard with US English language mapping. Key (and aliases) 0-9 A-Z , TILDE -, MINUS =, EQUALS ; ’ <, LESS , .
The layout for this keyboard is also shown. However, most modifier keys and other alphanumeric keys used for hotkey purposes in application programs are in an identical position, no matter what language mapping you are using. Some of the keys have aliases also; they can be named by 2 key codes (separated by a comma in the previous table).
8. Video Modes The table below lists the video modes that the IP ACCESS SWITCH LITE supports. Please do not use any other custom video settings; the IP ACCESS SWITCH LITE may not be able to detect them.
9.
10. Radio Frequency Energy, Certifications CE Conformity This equipment has been tested and found to comply with the relevant European Community Directive 93/68/EEC for Electromagnetic Compatibility for Information Technology Equipment. FCC Warning This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.