Chapter 2: Installation

9

 

 

The LongView IP KVM extender has been pre-configured with factory-default network settings. If you install multiple extenders on the same subnet, you will need to assign a unique IP address to each extender via the serial port.

Table 2.1: Default Network Settings

 

 

 

Default

 

Component

IP Address

Type

Gateway

Subnet Mask

 

 

 

 

 

Receiver

192.168.13.1

static

0.0.0.0

255.255.255.0

 

 

 

 

 

Transmitter

192.168.13.2

static

0.0.0.0

255.255.255.0

 

 

 

 

 

To install the LongView IP KVM extender on a network:

1.Connect the transmitter to the remote workstation as described previously in Point-to-point installation on page 6. Connect one end of the UTP cable to the transmitter’s RJ-45 connector and the other end to the Ethernet network.

2.Connect the receiver to the peripherals as described above in Point-to-point installation on page 6. Use a length of UTP cable to connect the receiver to the Ethernet network via the RJ- 45 connector on the rear of the receiver.

3.Turn on the receiver.

4.Use the serial menu to re-configure the network settings for the transmitter and then the receiver. See Configuring Network Settings on page 13 for more information.

NOTE: If the receiver and transmitter are to be located on different subnets, configure their network settings before you connect to the network. If there are already transmitter/receiver pairs operating on the subnet, configure network settings of new transmitter/receiver pairs before connecting them to the network.

5.Repeat this procedure for each transmitter and receiver pair you wish to install on the network.

Page 19
Image 19
Avocent manual To install the LongView IP KVM extender on a network

LongView IP specifications

The Avocent LongView IP is a highly regarded solution for remote access and management of computer systems, designed for IT professionals seeking efficiency and control over their data centers or network environments. This device bridges the gap between remote users and critical infrastructure, enhancing productivity while ensuring robust security measures.

One of the standout features of the Avocent LongView IP is its ability to provide secure IP access to servers and other devices. This is achieved through an intuitive web interface that simplifies user experience, allowing for easy navigation and control. The device supports multiple users and can manage several sessions simultaneously, making it ideal for team environments where collaboration and rapid response to issues are essential.

The LongView IP is built with advanced technologies that facilitate high-quality video output and responsiveness. Users can expect superior resolution, enabling them to manage graphical applications effectively. The device utilizes video compression technologies that guarantee minimal latency during remote sessions, making it a powerful tool for critical operations that require real-time feedback.

Another significant characteristic of the LongView IP is its compatibility with a wide range of operating systems and hardware. This versatility ensures that IT teams can integrate the device into existing frameworks without the need for extensive modifications. Furthermore, the device supports various connection protocols, making it adaptable to many network environments.

Security is paramount in the design of the Avocent LongView IP. The device features strong encryption protocols to protect sensitive data transmitted over networks. Additionally, it offers robust authentication mechanisms, ensuring that only authorized users can gain access to systems. This is particularly important for organizations that handle sensitive information and require stringent compliance protocols.

The Avocent LongView IP also boasts an energy-efficient design, making it an eco-friendly option for modern data centers. Its low power consumption translates to cost savings while meeting the demands of today’s intensive IT operations.

In summary, the Avocent LongView IP is a comprehensive solution that combines security, high-performance access, and adaptability. With its array of features and technologies, it is an essential tool for professionals looking to optimize their IT management processes while maintaining control and security over their infrastructure.