Security Settings

SSL Settings

Force HTTPS

If this option is enabled access to the Web front-end is only possible using an HTTPS connection. The SmartView World won’t listen on the HTTP port for incoming connections.

KVM encryption

This option controls the encryption of the RFB protocol, the protocol used by the Remote Console to transmit the screen data to the administrator machine and keyboard and mouse data back to the host.

If set to ‘Off’ no encryption will be used.

If set to ‘Try’ the applet tries to make an encrypted connection. In case connection establishment fails for any reason an unencrypted connection will be used.

If set to ‘Force’ the applet tries to make an encrypted connection. An error will be reported in case connection establishment fails.

Telnet Settings

Enable Telnet access

If this option is enabled, access over Telnet client is possible. For higher security we recommend to disable Telnet access.

IP Access Control

This section explains the settings related to IP access control. It is used to limit access to a distinguished number of clients only. These clients will be identified by their IP address, from which they are trying to build up a connection.

Note: The IP access control settings apply to the LAN interface only. Enable IP Access Control

Enables access control based on IP source addresses.

Default policy

This option controls what to do with arriving IP packets that don’t match any of the configured rules. They can be accepted or dropped.

IMPORTANT: If you set this to DROP and you have no ACCEPT rules configured, access to the Web front-end over LAN is actually disabled. To enable access again you can change the security settings via modem or ISDN dial in or by temporarily disabling IP access control with the initial configuration procedure.

Rule Number

This should contain the number of a rule for which the following commands will apply. This field will be ignored, in case of appending a new rule.

IP/Mask

Specifies the IP address or IP address range for which the rule applies.

Examples (the number concatenated to an IP address with a ‘/’ is the number of valid bits that will be used of the given IP address):

192.168.1.22/32 matches the IP Address 192.168.1.22

192.168.1.0/24 matches all IP packets with source addresses from 192.168.1.0 to 192.168.1.255

0.0.0.0/0 matches any IP packet

Policy

The policy determines what to do with matching packets. They can be accepted or dropped.

Note: The order of the rules is important. The rules are checked in ascending order until a rule matches. All the rules below the matching one will be ignored. The default policy applies if no match has been found.

Appending a rule

Enter the IP/Mask and set the policy. Finally, press ‘Append’.

Inserting a rule

Enter the rule number, the IP/Mask and set the policy. Finally, press ‘Insert’.

Replacing a rule

Enter the rule number, the IP/Mask and set the policy. Finally, press ‘Replace’.

Deleting a rule

Enter the rule number and press ‘Delete’.

   



56

Page 57
Image 57
Adder Technology Switch manual Security Settings, SSL Settings, Telnet Settings, IP Access Control

Switch specifications

Adder Technology is a leading provider of high-performance video and audio equipment, specializing in KVM (Keyboard, Video, Mouse) solutions. Among its array of advanced products, the Adder Technology Switch stands out for its unique features and cutting-edge technologies that cater to the needs of various industries, especially for those engaged in broadcast, media, and IT applications.

One of the main features of the Adder Technology Switch is its ability to enable seamless switching between multiple computers using a single keyboard and monitor. This functionality not only enhances productivity but also simplifies workspace management by reducing the clutter caused by multiple peripherals. Users can easily toggle between different sources, allowing for greater efficiency when handling multiple tasks.

The Adder Technology Switch employs high-performance video technologies, ensuring that the image quality remains pristine, even at high resolutions. It supports various video standards, including 4K and HD, providing crystal-clear visuals that are vital for applications requiring critical monitoring, such as video editing and live broadcasting. The low latency performance of this switch guarantees real-time interaction, an essential feature when working in fast-paced environments.

In terms of connectivity, the Adder Technology Switch offers a versatile range of input and output options. It supports various interfaces, including HDMI, DisplayPort, and USB, which means it is compatible with a wide variety of devices and setups. This flexibility allows users to integrate the switch into existing workflows with ease.

Another critical characteristic of the Adder Technology Switch is its robust build quality. Designed for heavy-duty use, it is engineered to withstand the demanding conditions often found in professional environments. Additionally, the switch often features advanced remote access capabilities, allowing users to operate and control their systems from different locations, further enhancing flexibility.

Security is also a focal point with the Adder Technology Switch. It incorporates the latest security protocols to safeguard sensitive data while ensuring that users can maintain productivity without compromising information integrity.

In summary, the Adder Technology Switch combines advanced switching technology with high-quality video performance and robust connectivity options. Its features cater specifically to professional users who require reliable, efficient, and secure solutions for managing multiple computer systems in various demanding environments. Whether in a broadcast studio, control room, or a corporate IT setting, the Adder Technology Switch stands as a pivotal tool for enhancing operational efficiency and performance.