36SwitchView IP 1020 Remote Access Device Installer/User Guide

Table 4.3: Descriptions for Figure 5.3

Number

Description

 

 

1

Remote Cursor

 

 

2

Local Cursor

 

 

The Cursor mode status of the Video Viewer window displays in the title bar, including the keystroke that will exit Single Cursor mode. You can define the keystroke that will exit Single Cursor mode in the Session Options dialog box.

NOTE: When using a device that captures keystrokes before they reach the client, you should avoid using those keys to restore the mouse pointer.

To enter Single Cursor mode:

Select Tools - Single Cursor Mode from the Video Viewer window menu.

-or-

Click the Single Cursor Mode button.

The local cursor does not appear and all movements are relative to the target device.

To select a key for exiting Single Cursor mode:

1.Select Tools - Session Options from the Video Viewer window menu. -or-

Click the Session Options button.

The Session Options dialog box appears.

2.Click the Mouse tab.

3.Select a terminating keystroke from the drop-down menu in the Single Cursor mode area.

4.Click OK to save settings.

When you enable Single Cursor mode, you can press the specified key to return to Regular Desktop mode.

To exit Single Cursor mode:

Press the key on the keyboard that is identified in the title bar.

To change the mouse cursor setting:

1.Select Tools - Session Options from the Video Viewer window menu. -or-

Click the Session Options button.

Page 48
Image 48
Avocent IP 1020 To enter Single Cursor mode, To select a key for exiting Single Cursor mode, To exit Single Cursor mode

IP 1020 specifications

The Avocent IP 1020 is a robust remote management solution designed for data centers requiring high availability and secure access to critical infrastructure. As an integral component of the Avocent product line, the IP 1020 provides users with seamless control over servers and IT equipment from virtually any location, enhancing operational efficiency and reducing downtime.

One of the key features of the Avocent IP 1020 is its capability for remote access. Users can connect to their systems securely over the internet using standard web browsers. This functionality is crucial for IT administrators who need to perform routine maintenance, troubleshoot issues, or manage systems in real-time without being physically present.

The device supports both KVM (Keyboard, Video, Mouse) over IP and a wide range of operating systems, ensuring compatibility with diverse IT environments. With high-resolution video output, the IP 1020 guarantees clear and responsive visual access, enhancing user experience during management tasks. Additionally, it supports multiple video resolutions, catering to varied user preferences and requirements.

Security is a fundamental aspect of the Avocent IP 1020. It features advanced encryption protocols to protect data transmitted between the device and remote users. This includes support for SSL/TLS, ensuring that all communications remain secure and compliant with data protection regulations. Moreover, the device incorporates user authentication mechanisms and access controls to prevent unauthorized access, making it suitable for sensitive operational contexts.

The IP 1020 also integrates environmental monitoring capabilities. Users can establish alerts and notifications for temperature and humidity fluctuations, which are critical for data center operations. This ensures that IT personnel can take proactive measures to maintain optimal operating conditions.

With its user-friendly interface, the Avocent IP 1020 streamlines management tasks, allowing IT staff to efficiently handle multiple systems from a single console. It supports various connectivity options, including serial connections for legacy devices, ensuring that even older equipment can be effectively managed.

In conclusion, the Avocent IP 1020 is a versatile and secure remote management solution tailored for data centers. Its combination of reliable KVM access, robust security features, environmental monitoring, and ease of use makes it an indispensable tool for IT administrators focused on maintaining the integrity and performance of their IT infrastructure.