Ebook Remote Server Management
Ebook Remote Server Management
5 KVM-over-IP Switches
Software-based remote access systems Computer embedded service processors Out-of-band KVM-over-IP switches
(e.g. RDP, VNC) (e.g. iLO, DRAC and RSA) (e.g. Dominion KX3 from Raritan)
While these categories merely describe how the tool itself is physically deployed, it is critical to understand
the inherent advantages and limitations of the tools in each category in getting the job done.
How to make the best choice?
Four Criteria for Selecting your Remote Server
2
Management tool
Fortunately, these tools have been deployed for several years, so there is an abundance of real life expe-
rience and data to draw upon. There are four basic criteria to always consider when selecting a Remote
Access and Control tool.
Is it..?
Reliable will my remote access and control work when I need it most?
Secure is my remote access and control tool safe from hackers and cyber attack?
Manageable is my remote access and control tool easy to manage and maintain?
Power can I access and control all my devices wherever they are and perform all my day-to-day tasks?
But consider …
• Software must be installed and maintained on every computer to be accessed
• Requires the Target Computer OS and production network to be running properly
• Does not provide BIOS-level access, which may be required for reboot or other emergency action
• Competes with production applications for system resources
• Well-documented security risks.
○ Poorly configured remote access is responsible for 62% of security breaches
○ 83 million open VNC ports and 230 million open RDP ports
Bottom Line
• Although commonly used, it has limited capabilities and presents security issues
4 Embedded Service Processors
Overview
• Hardware-based remote access built into the computer
○ Examples: HP iLO, Dell DRAC, IBM RSA
○ Provides BIOS level access, virtual media and power control
○ Can be an out-of-band solution using a separate LAN port
But consider …
• Must pay a license fee for advanced features standard on KVM-over-IP switches
• Requires an additional LAN port for out-of-band access
• Difficult to manage 100’s of service processors
• Nightmare to manage with multi-vendor systems and service processors
• Recent research has highlighted shocking vulnerabilities
○ Possible to login with no authentication, cleartext passwords, etc.
○ Department of Homeland Security issued CERT Alert (TA13-207A)
Bottom Line
• Good performance, but hidden costs, difficult to manage and presents security issues
5 KVM-over-IP Switches
Overview
• Hardware switches that physically connect to KVM ports of servers and computers
• Models to connect to 1, 8, 16, 32 and 64 servers, scalable to thousands
○ One-time cost and hardware installation
But consider …
• True out-of-band, BIOS-level remote access to multi-vendor servers
• Virtual media, including remote booting
• No hardware/software agents on computers - no reduction in production efficiency
• Secure access – no use of production network and independent of target servers OS
• Easier to configure and manage
Bottom Line
Highest performance, most reliable, secure, and easy to manage.
6 Remote Server Management Tools
Secure
Performance
Reliable
Manageable
Why KVM-over-IP Switches Should Be Your
7
Remote Server Management Tool
High Performance - just like being there Secure - the most secure remote access method
Reliable - reliable when you need it most Manageable - easy to manage and maintain
Explore Raritan’s Dominion KX III Understand the true cost of embedded service processors
Understand the security risks of software remote access Understand the security risks of embedded service processors