User manual

70 IP-REACH USER MANUAL
QUESTION: ANSWER:
How Is IP-Reach
administration carried
out?
Administrators access IP-Reach through a connected IP-Reach Admin Console. A
simple keyboard driven interface of menus offers straightforward access to IP-Reach
setup and control. User profiles, security settings, configuration and diagnostics are
just a few of the options available. The IP-Reach Admin Console can be removed
from the server room once initial IP-Reach setup is complete, after which all
configuration may be performed remotely via web browser.
Are there security features
to protect my Target
Servers from an
unauthorized remote
connection?
Yes. IP-Reach provides many layers of security. IP-Reach can be configured to
provide high-level connection authentication and video data transfer security during
a remote session. User names, passwords, private-keys, and Secure Socket Layer
(SSL) 128-bit encryption are all available. IP-Reach can also function as a RADIUS
client. In addition, all Raritan KVM Switches that feature an On-Screen User
Interface (OSUI) come with a complete security scheme, requiring user name and
password access to Servers as designated by the network administrator.
Can I customize IP-Reach
to enhance performance
relative to my specific
KVM configuration?
Yes. A variety of fine-tuning procedures are available. Automatic Color calibration,
KVM On-Screen Display tuning, and Target Mouse Pointer adjustments all serve to
enhance IP-Reach performance.
Can I customize IP-Reach
to enhance performance
with regard to different
remote access methods
and situations?
Yes. IP-Reach offers a variety of performance enhancements to optimize a chosen
connection method. Color Depth, Progressive Update, and Internet Flow Control are
just a few of the adjustment options available to speed response time. Color Depth,
for example, can be adjusted all the way down to black and white to decrease the
data load during an emergency midnight modem connection to mission-critical
servers over low-bandwidth.
Can I use IP-Reach in a
VPN?
Yes. IP-Reach fits into most any network configuration utilizing standard TCP/IP.
The network administrator simply adds IP-Reach as a node on the network via the
IP-Reach Admin Console.
What is the slowest
connection IP-Reach can
handle?
IP-Reach offers scalable performance based on bandwidth available, down to
20kbps.
Can I perform a Dial-up
modem connection to IP-
Reach over a PBX line?
No. Modems require an analog telephone line.
Can I use IP-Reach within
my local network?
IP-Reach can be used in any computer network that supports TCP/IP.
When does IP-Reach use
TCP? UDP?
Both TCP and UDP are used by IP-Reach. However, TCP is essential, whereas UDP
is optional.
UDP is used only for one IP-Reach feature, automatic detection (“browse”) of IP-
Reach units in a subnet (see Chapter 3: Raritan Remote Client, RRC Navigator).
If you do not employ the browse feature (and by extension, are not using DHCP),
then IP-Reach will only communicate using TCP.