Jumpers JP1 and JP2 set the KVM assignments for the UM8 and UM16 models. On the UM8 model, setting jumpers JP1 and JP2 in the “DOWN” position sets the KVM ports for that Unit to KVM
On the UM16 model, setting jumpers JP1 and JP2 to the “DOWN” position on the bottom expansion card sets the KVM ports to KVM
In a typical UM8 expanded system, JP1 and JP2 are usually set for:
Unit #1 to KVMs
Unit #2 to KVMs
Unit #3 to KVMs
Unit #4 to KVMs
A typical UM16 expanded system, JP1 and JP2 are usually set for:
Unit #1 to KVMs
RS232 port
All UltraMatrix switches are equipped with an RS232 serial port for each installed system CPU card. These ports are RJ12,
The RS232 serial port enables you to:
Upgrade the system firmware
Restore the unit to its factory default settings
Configure an expansion switch
Switch any KVM station to any CPU port
An adapter and serial cable are provided for serial interface.
Firmware cannot be upgraded from a computer terminal.
Cabling
KVM stations, computers and servers, and expansion units are easily connected to the UltraMatrix switch with the proper cables. Cables are usually purchased along with the UltraMatrix to provide quick,
Avoid routing cables close to fluorescent lights, air compressors, high voltage power sources and machinery that may create electrical noise or interference with the operation of the UltraMatrix switch.
System security
Security is a very important concern, especially in the environments most UltraMatrix switches are commonly installed in, such as data centers and server rooms. The UltraMatrix system can be secured with a unique configuration password allowing only authorized personnel access to the configuration menus and the system
The KVM stations can also be secured by assigning user access names and passwords that restrict access to certain computers or servers that contain sensitive information or restricted applications.
Other security functions include the flexibility of assigning certain computers or servers to a unique Group. This feature allows you to group computers or servers together for access by defined “Profiles”. These profiles can be
The security functions, “Users”, “Profiles”, and “Groups” are configured from the main configuration menu and when
8 |