Chapter 4: The Video Viewer

29

2

3

4

5

6

7

1

8

9

Figure 4.1: Video Viewer Window (Normal Window Mode)

Table 4.1: Descriptions for Figure 5.1

Number Description

1Title Bar: Displays the name of the server being viewed. When in Full Screen mode, the title bar disappears and the server name appears between the menu and toolbar.

2Thumbtack: Locks the display of the menu and toolbar so that it is visible at all times.

3Menu and toolbar: Enables you to access many of the features in the Video Viewer window. The menu and toolbar is in a show/hide state if the thumbtack has not been used. Place your cursor over the toolbar to display the menu and toolbar. Up to ten commands and/or macro group buttons can be displayed on the toolbar. By default, the Single Cursor Mode, Refresh, Automatic Video Adjust and Align Local Cursor buttons appear on the toolbar. For more information, see Changing the toolbar on page 30 and Using Macros on page 38.

4Macro buttons: Commonly used keyboard sequences that can be sent to the target device.

5Minimize button: Minimizes the display of the Video Viewer window into the task bar at the bottom of the local computer.

6Maximize button: Changes the window to Full Screen mode, which expands the accessed device desktop to fill the entire screen. Expanding the window causes the following to occur:

The title bar disappears.

The server name appears between the menu and toolbar.

The Maximize button changes to a Normal Window Mode button and appears on the toolbar. Clicking the button toggles the Video Viewer window to Normal Window mode.

The Close button appears on the toolbar.

Page 41
Image 41
Avocent IP 1020 manual Video Viewer

IP 1020 specifications

The Avocent IP 1020 is a robust remote management solution designed for data centers requiring high availability and secure access to critical infrastructure. As an integral component of the Avocent product line, the IP 1020 provides users with seamless control over servers and IT equipment from virtually any location, enhancing operational efficiency and reducing downtime.

One of the key features of the Avocent IP 1020 is its capability for remote access. Users can connect to their systems securely over the internet using standard web browsers. This functionality is crucial for IT administrators who need to perform routine maintenance, troubleshoot issues, or manage systems in real-time without being physically present.

The device supports both KVM (Keyboard, Video, Mouse) over IP and a wide range of operating systems, ensuring compatibility with diverse IT environments. With high-resolution video output, the IP 1020 guarantees clear and responsive visual access, enhancing user experience during management tasks. Additionally, it supports multiple video resolutions, catering to varied user preferences and requirements.

Security is a fundamental aspect of the Avocent IP 1020. It features advanced encryption protocols to protect data transmitted between the device and remote users. This includes support for SSL/TLS, ensuring that all communications remain secure and compliant with data protection regulations. Moreover, the device incorporates user authentication mechanisms and access controls to prevent unauthorized access, making it suitable for sensitive operational contexts.

The IP 1020 also integrates environmental monitoring capabilities. Users can establish alerts and notifications for temperature and humidity fluctuations, which are critical for data center operations. This ensures that IT personnel can take proactive measures to maintain optimal operating conditions.

With its user-friendly interface, the Avocent IP 1020 streamlines management tasks, allowing IT staff to efficiently handle multiple systems from a single console. It supports various connectivity options, including serial connections for legacy devices, ensuring that even older equipment can be effectively managed.

In conclusion, the Avocent IP 1020 is a versatile and secure remote management solution tailored for data centers. Its combination of reliable KVM access, robust security features, environmental monitoring, and ease of use makes it an indispensable tool for IT administrators focused on maintaining the integrity and performance of their IT infrastructure.