OSD Operation (continued)

Security (continued)

Login String

The Login String allows the KVMs IP address to be more secure by adding extra text to the end of it. When text is entered into the Login String field, users will need to include a forward slash (/) and the Login String at the end of the URL to access the KVM switch. For example, if a Login String of abcdefg is entered, the user must enter a URL such as 192.168.0.126/abcdefg.

The following characters are allowed in the login string:

0 through 9, a through z, A through Z, ~ ! @$^&*()_+’<>,.

The following characters are not allowed: %”:/?#\[Space]

Note: If a Login String is not entered, anyone can access the KVM switch using the IP Adress alone, making the installation less secure.

Account Policy

MAC Filtering

To add a MAC filter:

1. Click Add. A dialog box similar to the one below appears:

2.Type in the desired MAC address and click OK.

3.Repeat these steps for any additional MAC addresses you want to filter.

To delete a MAC filter:

Select the desired MAC filter from the list and click Remove.

To modify a MAC filter:

1.Select the desired MAC filter from the list and click Edit. An Edit dialog box box appears.

2.Delete the old address and replace it with the new one. Click OK.

Note: To block a computer from accessing the B064-Series KVM Switch, you do not need to filter both its IP address and its MAC address. Any computer blocked by a MAC filter will be denied access to the KVM switch, even if the computer is allowed to access the KVM switch under the IP filters that are set up.

If any filters have been configured, they appear in the IP Filter and/or MAC Filter list boxes.

The Account Policy section allows rules for usernames and passwords to be regulated. The settings in this section are described in the table below.

Item

Description

 

 

Minimum Username Length

Sets the minimum number of characters required for each username. Values from 1 to 16 can be entered.

 

 

Minimum Password Length

Sets the minimum number of characters required for each password. Values can be from 0 to 16.

 

 

 

Password Must Contain

One­

Upper Case – Checking this box will require that each password contain one upper case letter

at Least

One Lower Case – Checking this box will require that each password contain one lower case letter

 

One Number – Checking this box will require that each password contain one number

 

Note: Current usernames and passwords are not affected when these settings are changed. Only usernames and

 

passwords that are created after these settings have been changed must follow the rules.

 

 

Disable Duplicate Login

Checking this box will prevent users from logging in with the same username and password to open more than one

 

session at the same time.

 

 

 

Encryption

This section allows you to set different encryption settings for the Keyboard/Mouse, Video and Virtual Media functions of the KVM switch. You can choose any combination of encryption methods (DES, 3DES, AES and/or RC4), you can choose to randomly switch between them or you can choose no encryption at all. Although enabling encryption will add more security to you installation, it can also slow down system performance (mouse, keyboard, video), with the following having the most impact:

RC4 impacts performance the least out of the four encryption methods. DES is second to least in impact, followed by 3DES and AES.

Of all the possible combinations, a combination of RC4 and DES impacts performance the least.

47

Page 47
Image 47
Tripp Lite B064-016-02-IPG, B064-032-04-IPG, B064-032-02-IPG Login String, Account Policy MAC Filtering, Encryption

B064-016-02-IPG, B064-032-02-IPG, B064-016-04-IPG, B064-032-04-IPG specifications

The Tripp Lite B064-032-04-IPG is a highly efficient and versatile KVM switch that offers seamless control over multiple computers or servers from a single console. This device is engineered for professionals and IT administrators who require robust management of servers or machines located in different physical locations, particularly in demanding environments like data centers or server rooms.

One of the standout features of the B064-032-04-IPG is its ability to facilitate access to up to 32 computers using a single set of keyboard, video monitor, and mouse. This not only streamlines workflows but also reduces clutter, as users no longer need multiple sets of peripherals for each machine. The switch supports both USB and PS/2 connection types, making it compatible with a wide range of devices.

The B064-032-04-IPG leverages advanced technology to offer a responsive and high-resolution video output, supporting resolutions up to 1920 x 1200. This ensures that users can easily view and interact with multiple systems without sacrificing visual quality. Additionally, the switch features a built-in web interface that allows administrators to configure settings with ease, enabling effective management in remote or local scenarios.

Security is a top priority with the B064-032-04-IPG, which supports user authentication and multi-level password protection. This guarantees that only authorized personnel can access sensitive systems, bolstering the overall security posture of the network. Furthermore, the switch includes features for firmware updates, ensuring that it stays current with the latest security protocols and enhancements.

Another key characteristic of this KVM switch is its support for hot-swappable functionality, which allows users to add or remove servers without needing to power down the entire system. This greatly enhances operational efficiency and minimizes downtime during maintenance or upgrades.

Built with a sturdy and reliable design, the Tripp Lite B064-032-04-IPG is suitable for various environments, including those that require ruggedness and durability. Its compact form factor makes installation straightforward, and its fanless design ensures silent operation, which is ideal for noise-sensitive areas.

In conclusion, the Tripp Lite B064-032-04-IPG is a powerful KVM switch that combines multiple advanced features, technologies, and characteristics, making it an excellent choice for large-scale server management. With its ease of use, security features, and high performance, it provides a seamless solution for IT professionals looking to optimize their hardware management in complex environments.