IP KVM User Manual
IP KVM User Manual
IP-KVM 1001
KVM over IP Switch
User Manual
Rev: 1.0
Information in this document is subject to change without notice and does not represent a commitment on
the part of Opengear. Opengear provides this document “as is,” without warranty of any kind, expressed or
implied, including, but not limited to, the implied warranties of fitness or merchantability for a particular
purpose.
Opengear may make improvements and/or changes in this manual or in the product(s) and/or the
program(s) described in this manual at any time. This product might include technical inaccuracies or
typographical errors. Changes are periodically made to the information herein; these changes may be
incorporated in new editions of the publication.
Notice to Users
Proper back-up systems and necessary safety devices should be utilized to protect against injury, death or
property damage due to system failure. Such protection is the responsibility of the user.
Any changes or modifications made to this device without the explicit approval or consent of Opengear will
void Opengear of any liability or responsibility of injury or loss caused by any malfunction.
This equipment is for indoor use and all the communication wirings are limited to inside of the building.
Manual Conventions
This manual uses different fonts and typefaces to show specific actions:
Text presented like this highlights important issues and it is essential you read
and take head of these warnings
Text presented with an arrow head indent indicates an action you should take as part of the
procedure
Publishing history
Date Revision Update details
April 2009 1.0 Initial release document
1.1 Introduction
Opengear’s KVM-over-IP switch (referred to generically in this manual as the IP-KVM) redirects local
keyboard, mouse and video data to a remote administration console. It allows you to control one
or many computers locally at the server site or remotely via the Internet using a standard browser.
You can securely gain BIOS level access to systems for maintenance, support, or failure recovery
over the Internet. Communication is secured via SSL authentication and encryption. The IP-KVM
can also be used in conjunction with a KVM switch for multiple-server access.
The IP-KVM provides convenient remote KVM access and control via LAN or Internet. It captures,
digitizes and compresses video signal and transmits it with keyboard and mouse signals to and
from a remote computer. IP-KVM provides a non-intrusive solution for remote access and control.
Remote access and control software runs on its embedded processor only but not on
mission-critical servers, so that there is no interference with server operation or impact on
network performance.
Feature Description
1x Attached 3-in-1 integrated cable and K/V/M connectors (HDDB15 male plus two
mini din 6-pin PS/2 connectors)
Target Server Side
1x USB 2.0 mini receptacle
1x RJ-45 Serial Port
1x 3-in-1 VGA connector (HDDB15 female)
Local Console Side
2x USB type-A connectors
Remote Console Side 2x Standard RJ-45 Connectors (LAN ports)
LED Indicators 2x LEDs: Power (red), Ready (green)
Push Button 1x Reset push button
up to 2048 x 1536 @60Hz (Local Console)
Video Resolution
up to 1600 x 1200 @60Hz (Remote Console)
Protocols TCP, IP, ARP, ICMP, HTTP/HTTPS, SSL, Telnet, DHCP, PPP, SMTP, NTP, DDNS
AES 256-bit encryption for all transmitted data
Security RSA 2048-bit encryption for authentication
SSHv2
Authentication SSL / Certificate, RADIUS, LDAP
Floppy/CD/DVD/USB/HD drive redirection
Virtual Media
Floppy/CD/DVD/ISO Image redirection
DC Power 12VDC, 1A
Operation Temperature 0 ~ 50 ℃ (32 ~ 122 ℉)
Humidity 0~80% RH
Housing Metal
Dimension (mm) 103 x 87 x 28.5
Weight 1000g
Introduction
This chapter overviews the general installation and configuration of your IP-KVM and steps through
in detail the physical installation and connection to controlled devices
USB (Host)
3-in-1 Integrated KVM Cable (Host)
Reset
Power Jack Serial Port
Software
Item Description
Local Host side <No additional software necessary>
(1) Java Runtime Environment (see Note)
Remote Console side (2) Browser: Microsoft Internet Explorer (v6.0 or above), Netscape,
Mozilla, Safari, Firefox, Avant, World, Opera, and others.
Note The Remote Console browser needs to JRE (Java Runtime Environment) v5.0 (version 1.5) or above.
You can get the Java Software from the website http://www.java.com/en/download/.
It’s recommended to install newer Java version (e.g. version 6 update 11 or above) for better
performance.
Slide the unit into the rack and secure it to the rack
When connecting cables ensure the IP-KVM and host computer are powered off
Connect the VGA and PS/2 connectors of the attached 3-in-1 Integrated Host Cable to the
Host computer
Connect the 3-in-1 Integrated Adapting Cable to the Local DB-15 connector of IP-KVM
Connect one end of Ethernet cable to LAN1 or LAN 2 jack of IP-KVM, and the other end to
the Remote Console computer
Apply power to the Host and IP-KVM. It will take about 60 seconds to complete its startup
processes and enter normal running state
Connect the VGA of the attached 3-in-1 Integrated Host Cable to the Host computer
Connect the USB connectors of USB A-mini cable to the host computer and the IP-KVM
module while for remote mass storage control
Connect the 3-in-1 Integrated Adapting Cable to the Local DB-15 connector of IP-KVM
Connect one end of Ethernet cable to LAN1 or LAN 2 jack of IP-KVM, and the other end to
the Remote Console computer (over your IP network)
The IP-KVM has a built-in Ethernet hub so it is simple to cascade multiple IP-KVM devices to
control multiple host computers:
Connect one end of the Ethernet cable to LAN1 or LAN 2 jack of one of the IP-KVM devices
and the other end to the Remote Console computer
The installation procedures are as for stand-alone computer, except that the host signals are
connected to the PS/2 Local Console of the KVM Switch.
Introduction
This chapter provides step-by-step instructions for the initial network configuration and the keyboard,
video and mouse communications settings. The IP-KVM can be set up:
Make sure to change the super user password immediately after you have
installed and accessed your IP-KVM for the first time. Not changing this
password for the super user is a severe security risk and might result in
unauthorized access to the IP-KVM and to the host system
Click Refresh Devices and psetup will detect any network connected IP-KVM devices and
display them by their MAC addresses
You can click Query Device and it will show the current IP configuration of the selected
MAC address device (i.e. IP address 192.168.0.70)
Enter the Super User login name. The initial name is super with all lower case characters
Enter the current Super User password. This initial value is pass again all lower case
Enter a New Super User password and re-type the New password confirmation
Press the OK button to accept these changes. This will close the window and you will need
to reload psetup
The psetup tool can configure the IP-KVM with a fixed IP address:
Click Refresh Devices and psetup will detect any network connected IP-KVM devices and
display them by their MAC addresses
For Authentication enter the Super User login name (super) and the new Super User
password
Set IP auto configuration as “None” and enter the new IP address and Subnet mask (and
optionally enter the IP address of the Gateway for the network segment)
Click Setup Device. If super login was authenticated, it’ll show Successfully configured
device. Otherwise it’ll show Permission Denied
Alternately you can use psetup to set the IP-KVM in DHCP mode:
Before you connect the device to your local subnet, be sure to complete the corresponding
configuration of your DHCP server. It is recommended to configure a fixed IP assignment to
the MAC address of the IP-KVM. You can find the MAC address labeled on the bottom side
of the metal housing
If you have installed the IP-KVM on a network with DHCP enabled when you plug the Ethernet
cable to IP-KVM it will be assigned an IP address via DHCP. You can use psetup to find out this IP:
Click Refresh Devices button to detect connected IP-KVM devices and select MAC address
of the IP-KVM in Device MAC address box. You can find the MAC address labeled on the
bottom side of the IP-KVM unit. MAC address is detected as connection from computer and
IP-KVM is valid through USB or network
Click Query Device to find the IP configuration of the selected IP-KVM unit
Note You can nominate IP addresses to be assigned by BOOTP or DHCP. BOOTP is a static
configuration protocol that uses a table to maps IP addresses to physical addresses. DHCP is an
extension to BOOTP that dynamically assigns configuration information.
DHCP: Disable
Using your favorite web browser you can access the IP-KVM from the Remote Console computer that you
have IP connected to LAN1 (or LAN2):
Note Your web browser must be enabled to accept cookies, or else login is not possible
This will lead you to the IP-KVM login page as shown below:
Log in using the default system user name super and the default password pass
When connecting to the IPK-KVM unit, the IPK-KVM system (web server, Telnet server or SSH
server) will prompt user to enter the user name and password in order to access to the system.
If this is the first time logging in, log in with the factory default username and password, you will
be prompted to change the default password.
Make sure to change the super user password immediately after you have
installed and accessed your IP-KVM for the first time. Not changing this
password for the super user is a severe security risk and might result in
unauthorized access to the IP-KVM and to the host system
Select Device Settings: Network and under Network Basic Settings you can set new IP
address or enable DHCP/BOOTP
Note: To configure using the web browser, the Remote Console computer must have an IP address in the
same network range as the IP-KVM (i.e.it must have an address 192.168.0.0 - 192.168.0.255). If
setting up the Remote Console computer in this range is not convenient you can as an alternate set
the IP-KVM IP address using the psetup program or using a serial console
Reset the IP-KVM and immediately press the ESC key. You will see some device information,
and a => prompt
Enter config then press Enter key and wait for a few seconds for the configuration
questions to appear
As you proceed the following questions will appear on the screen. To accept the default
values shown in square brackets below, press Enter key:
IP auto-configuration: With this option you can specify whether the IP-KVM should
get its network settings from a DHCP or BOOTP server. For DHCP, enter dhcp and for
BOOTP enter bootp. If you do not specify any of these, the IP auto-configuration is
disabled and subsequently you will be asked for the following network settings
Net mask: The net mask of the connected IP subnet. This option is only available if
IP auto-configuration is disabled
Gateway address: The IP address of the default router for the connected IP subnet.
If you do not have a default router, enter 0.0.0.0. This option is only available if IP
auto-configuration is disabled
The IP-KVM settings for the host's keyboard type have to be corrected in order to make the
remote keyboard work properly. Check the settings in the IP-KVM Web front-end for details.
A common seen problem with KVM devices is the synchronization between the local and remote
mouse cursors. The IP-KVM addresses this situation with an intelligent synchronization algorithm.
There are two mouse modes available on the IP-KVM:
• Auto mouse speed The automatic mouse speed mode tries to detect the speed and
acceleration settings of the host system automatically. See the section below for a more
detailed explanation.
• Fixed mouse speed This mode just translates the mouse movements from the Remote
Console in a way that one pixel move will result in n-pixel moves on the remote system.
The automatic mouse speed mode performs the speed detection during mouse synchronization.
Whenever the local and remote mouse cursors move synchronously or not, there are two ways for
re-synchronizing local and remote mouse cursors:
• Fast Sync The fast synchronization is used to correct a temporary, but fixed skew. Choose
the option using the Remote Console options menu or press the mouse synchronization
hotkey sequence in case you defined one
• Intelligent Sync If the fast sync does not work or the mouse settings have been changed on
the host system, use the intelligent resynchronization. This method takes more time than
the fast one and can be accessed with the appropriate item in the Remote Console option
menu. The intelligent synchronization requires a correctly adjusted picture. Use the auto
adjustment function to setup the picture, and make sure that there are no window at the
top left corner of the remote desktop that are able to change the mouse cursor shape from
the normal state. The Sync mouse button on top of the Remote Console can behave
differently, depending on the current state of mouse synchronization. Usually pressing this
button leads to a fast sync, except in situations where the KVM port or the video mode
changed recently
Note: At first start, if the local mouse pointer is not synchronized with the remote mouse pointer, press the
Auto Adjust Button once
The host's operating system knows various settings from the mouse driver.
Note: The following limitations do not apply in case of USB and Mouse Type Windows >= 2000,
MacOSX
While the IP-KVM works with accelerated mice and is able to synchronize the local with the
remote mouse pointer, there are the following limitations, which may prevent this synchronization
from working properly:
• Special Mouse Driver There are mouse drivers that influence the synchronization
process and lead to desynchronized mouse pointers. If this happens, make sure you
do not use a special vendor-specific mouse driver on your host system
• Windows XP Mouse Settings Windows XP knows a setting named “improve mouse
acceleration”, which has to be deactivated
Navigate your mouse pointer into the upper-left corner of the applet screen and
move it slightly forth and back. Thus the mouse will be resynchronized. If
re-synchronizing fails, disable the mouse acceleration and repeat the procedure.
• SUN Solaris Adjust the mouse settings either via xset m 1 or use the CDE Control Panel
to set the mouse to 1:1, no acceleration. As an alternative you may also use the Single
Mouse Mode
Introduction
The IP-KVM features an embedded operating system and applications offering a variety of
standardized interfaces. This chapter describes using these interfaces.
4.1 Prerequisites
The interfaces are accessed using the TCP/IP protocol family, thus they can be accessed using
either LAN port on the device. The following interfaces are supported:
• HTTP/HTTPS This provides full access to the embedded web server so the IP-KVM
environment can be managed using a standard web browser. You can access the IP-KVM
using the insecure HTTP protocol, or using the encrypted HTTPS protocol. It is
recommended whenever possible to use HTTPS. HTTP/HTTPS is the primary interface of
the IP-KVM and it is covered extensively in this chapter
• Telnet A standard Telnet client can also be used to access an arbitrary device connected to
the IP-KVM's serial port via a terminal mode. However this is not the primary interface and
is addressed in subtopics
4.1.1 Browser
In order to use the Remote Console window of your managed host system, the browser has to
come with a Java Runtime Environment version 1.5 or above. If the browser has no Java support
(such as on a small handheld device), you are still able to maintain your IP-KVM using the
administration forms displayed by the browser itself.
Your web browser also must be configured to accept cookies or else login is not possible.
In order to access the remote host system using a securely encrypted connection you need a
browser that supports the HTTPS protocol. Strong security is only assured by using a key length of
128 bit and some of the old browsers do not have a strong 128 bit encryption algorithm. You
should check your browser (e.g. for Internet Explorer select Help:About)
For secure connection to the IP-KVM, we recommend using Microsoft Internet Explorer version
6.0 (or higher), Netscape Navigator 7.0 (or higher) or Mozilla 1.6 (or higher). Newer web browsers
generally support strong encryption on default.
These users are created (and removed) by the super user (refer Chapter 5.3 User Management)
and the permission items for each user level are detailed in Appendix C.
To log in:
Launch your web browser and direct it to the address of your IP-KVM. This address used
can be an IP address or a domain name (in the case where you have given your IP-KVM a
symbolic name in the DNS):
Type in http://<IP address of IP-KVM> for a insecure connection, or
type in http://<IP address of IP-KVM> for a secure connection
This will lead you to the IP-KVM login page as shown below:
Make sure to change the super user password immediately after you have
installed and accessed your IP-KVM for the first time. Not changing this
password for the super user is a severe security risk and might result in
unauthorized access to the IP-KVM and to the host system
Having logged into the IP-KVM successfully, the main page of the IP-KVM appears. This page
consists of three parts:
The buttons on the left hand side which allow you to navigate within the front end
Note: If there is no activity for 30 minutes, the IP-KVM will log you out, automatically. A click on
one of the links will bring you back to the login screen
Within the right frame the task-specific information is displayed that depends on the
section you have chosen before
Click on Click to open to start the remote console redirection
Click on Refresh to refresh the picture
This link logs out the current user and presents a new login screen. Please note
that an automatic logout will be performed in case there is no activity for 30
minutes.
The Remote Console is the redirected screen, keyboard and mouse of the remote host system that
IP-KVM controls.
The Remote Console window is a Java Applet that tries to establish its own TCP connection to the
IP-KVM. The protocol that is running over this connection is neither HTTP nor HTTPS, but RFB
(Remote Frame Buffer Protocol). As default, RFB tries to establish a connection to TCP port
number 443. Your local network environment has to allow this connection to be made, i.e. your
firewall and, in case you have a private internal network, your NAT (Network Address Translation)
settings have to be configured accordingly.
In case the IP-KVM is connected to your local network environment and your connection to the
Internet is available using a proxy server only without NAT being configured, the Remote Console
is very unlikely to be able to establish the desired connection. This is because today's web proxies
are not capable of relaying the RFB protocol.
In case of problems, please consult your network administrator in order to provide an appropriate
networking environment.
To open the KVM console either click on the icon Console or Remote Control > KVM
Console of the menu entry on the left or Click to open of the console picture on the right
Note: The Remote Console window on your local window system is just one window among
others. In order to make keyboard and mouse work, your Remote Console window must
have the local input focus
• Auto Adjust Video If the video display is of bad quality or distorted in some way,
press this button and wait a few seconds while the IP-KVM tries to detect the video mode
of VGA port to the controlled host and adjust itself for the best possible video quality
• Single/Double mouse mode Switches between the Single Mouse Mode (where
only the remote mouse pointer is visible) and the Double Mouse Mode (where remote and
local mouse pointers are visible and need to be synchronized). Single mouse mode is only
available if using SUN JVM 1.5 or higher
2. If mouse pointers are not in sync, click on Sync button or Options > Mouse Handling >
Intelligent Sync
- Mouse Handling The submenu for mouse handling offers two options for synchronizing
the local and the remote mouse cursors:
i. Fast Sync -- The fast synchronization is used to correct a temporary, but fixed
skew
ii. Intelligent Sync -- Use this option if the fast sync does not work or the mouse
settings have been changed on the host system
- Local Cursor Offers a list of different cursor shapes to choose from for the local mouse
pointer. The selected shape will be saved for the current user and activated the next
time this user opens the Remote Console. The number of available shapes depends on
the Java Virtual Machine (version of 1.5 or above offers the full list)
- Video Settings Opens a panel for changing the IP-KVM video settings. IP-KVM features
two different dialogs, which for adjusting the video settings:
i. Video Settings through the HTML-Frontend To enable local video port, select
this option. This option decides if the local video output of IP-KVM is active and
passing through the incoming signal from the host system.
The option Noise Filter defines how IP-KVM reacts to small changes in the video
input signal. Turning on the noise filter can help reduce video flickering that is
often caused by distortions, as well as lowering unnecessary bandwidth
consumption. A large filter setting needs less network traffic and leads to a
faster video display, but small changes in some display regions may not be
recognized immediately. A small filter displays all changes instantly but may
lead to a constant amount of network traffic even if display content is not really
changing (depending on the quality of the video input signal). All in all the
default setting should be suitable for most situations.
Clock Defines the horizontal frequency for a video line and depends
on the video mode. Different video card types may require different
values here. The default settings in conjuction with the auto
adjustment procedure should be adequate for all common
configurations. If the picture quality is still bad after auto adjustment
you may try to change this setting together with the sampling phase
to achieve a better quality.
Phase Defines the phase for video sampling, used to control the
display quality together with the setting for sampling clock.
Horizontal Position Use the left and right buttons to move the
picture in horizontal direction while this option is selected.
Vertical Position Use the left and right buttons to move the picture
in vertical direction while this option is selected.
Reset this Mode Reset mode specific settings (Clock , Phase and
Position) to the factory-made defaults.
- Refresh Video Click to run this menu item for retrieving the whole video again from the
controlled host and displayed on Remote Console. In normal situation, only changed
- Hotkeys Opens a list of hotkeys defined before. Choose one entry, the command will
be sent to the host system. A confirmation dialog can be added that will be displayed
before sending the selected command to the remote host. Select “OK” to execute the
command on the remote host
- Encoding These options are used to adjust the encoding level in terms of compression
and color depth. They are only available unless "Transmission Encoding" is determined
manually (select Manually in KVM Settings > User Console > Transmission Encoding of
web page).
Compression Level You may select a value between 1 and 9 for the desired
compression level with level 1 enabling the fastest compression and level 9 the
Color Depth Set the desired color depth. You may select between 8 or 16 bit for
Video Optimized/compression level 0, or between 1 and 8 bit for compression
level 1 to 9. The higher the color depth, the more video information has to be
captured and to be transferred.
Note: If displaying motion pictures on a connection with low speed you may achieve an
improvement regarding the video transfer rate by lowering the color depth and disabling the option
"Video Optimized". As a general result, the data rate is reduced (less bits per color). Furthermore,
the IP-KVM will not have to do any video compression. In total, this will lead to less transfer time of
the motion picture.
The status line shows both console and the connection state. The size of the remote screen is
displayed. Figure 4.15 belowwas taken from a Remote Console with a resolution of 800x600 pixels.
H
The value in brackets describes the connection to the Remote Console. Norm indicates a standard
connection without encryption whereas SSL means a secure connection.
Furthermore, both the incoming (In:) and the outgoing (Out:) network traffic are visible (in kb/s). If
compressed encoding is enabled, a value in brackets displays the compressed transfer rate:
Introduction
This chapter details the main menu options of the IP-KVM. The menu buttons on the left hand side
of the main screen allow you to navigate Keyboard, Mouse and Video settings; configure the
network and serial port; access the KVM console; set up users and use Virtual Media.
click on the icon Console or Remote Control > KVM Console of the menu entry on the left
or
Click to open of the console picture on the right
Replace the IP address by the one that is actually assigned to the IP-KVM. This will prompt for
username and password in order to log into the device. The credentials that need to be
entered for authentication are identical to those of the web interface. So the user
management of the Telnet interface is entirely controlled with the according functions of the
web interface.
Once you have successfully logged into the IP-KVM a command line will be presented and you
can enter according management commands.
The following list shows the according command mode command syntax and their usage.
quit Exits the current session and disconnects from the client
terminal Starts the terminal passthrough mode for RS-232 serial port. This mode provides
Serial over IP function. The key sequence ESC + exit switches back to the command
mode.
• SSH Console
The IP-KVM supports SSH security protocol. The SSHv2 will encryption the transferred data so
as to keep the data communication secured. Basically the SSH’s configuration interface is the
same as Telnet console, except that SSH is data encrypted and secured (and can be accessed
using SSH-supported terminal emulation programs such as PuTTY).
Note Drive Redirection supports only Windows as the client computer since it redirects based on a drive
letter.
Before using Virtual Media connect the USB cable from IP-KVM to host computer. After connecting
the USB cable you can see a new removable risk on the host computer (e.g. the host computer
screen below shows a new CD Drive F)
Drive Redirection works on a level below the operating system. That means that neither the local
nor the remote operating system is aware that the drive is currently redirected. This may lead to
inconsistent data as soon as one of the operating systems (either from the local machine, or from
the remote host) is writing data on the device. If write support is enabled the remote computer
might damage the data and the file system on the redirected device. On the other hand, if the
local operating system writes data to the redirected device the drive cache of the operating
system of the remote host might contain older data. This may confuse the remote host’s operating
system. We recommend you use the Drive Redirection with care, especially the write support.
To use Drive Redirection
Click Virtual Media and select Drive Redirection. Drive Redirection (read only) is enabled
by default
Force read-only connections if enabled switches off the write support for the Drive
Redirection is (so it is not possible to write on a redirected device)
If unset, and no file image will be found it may happen that the host system will hang on boot
due to changes in the boot order, or the boot manager (LILO, GRUB). This case was reported for
some Windows versions (2000, XP), other OS might not be fully excluded. This behavior
depends on the BIOS version used in that machine.
Note
1. The output image extension file name has to be ‘iso’, e.g. CD-Rom_vir.iso.
2. You may create an ISO image size up to 650Mb (for CD-ROM). This drive would be in read-only
mode and would not allow you to write any information on this drive but copying only. This
drive would be bootable under DOS mode if the motherboard/BIOS on the host computer
supports USB BOOTABLE function. For emulating DVD Drive, please use Drive Redirection
function.
3. The above information has to be given from the point of view of IP-KVM with correct IP
address and device name. Administrative permission is required as regular user may not have
the right to access. Please login as a system administrator (or as “root” on UNIX systems).
4. The specified image file is supposed to be accessible from the IP-KVM. The information above
has to be given from the point of view of the IP-KVM. It is important to specify correct IP
addresses, and device names. Otherwise, IP-KVM may not be able to access the referenced
image file properly, leave the given file unmounted and will display an according error
message, instead. So, we recommend to state correct values and repeat this step if necessary.
5. Furthermore, the specified share has to be configured correctly. Therefore, administrative
permissions are required. As a regular user you may not have these permissions. You should
either login as a system administrator (or as “root” on UNIX systems), or ask your system
administrator for help to complete this task.
Run Nero (or any similar CD/DVD imaging tool) to create the CD/DVD ISO image
Create a folder and share this folder in the PC that shares out the image file. Copy the
CD/DVD ISO image file to this sharing folder. (Make sure password has to be setup with the
authorized user during Sharing-Permission settings)
For Windows
Open the Explorer, navigate to the directory (or share) and press the right mouse button to open the
context menu. Select Sharing to open the configuration dialog
Fill in the sharing information on Image on Windows Share, click on the Set button.
… open the remote console and you can see the virtual CD as pictured below
Operation Procedures
You need to create the floppy image file first (Please refer to the section “Creating a floppy
image”). For this example, we use RawWrite software (or any other image-creator software)
to create floppy image. Locate where the image file you create is saved
Open the browser to log into the IP-KVM. Click Virtual Media and select Floppy Disk
Click on the button Upload to initiate the transfer of the chosen image file into the IP-KVM
module’s on-board memory. After you uploading the image file, you will see the
information below
You may create a floppy image size up to 1.44Mb. This drive would be in read-only mode and
would not allow you to write any information on this drive but copying only. This drive would be
bootable under DOS mode if the motherboard/BIOS on the host computer supporting USB
BOOTABLE function. The maximum image size is limited to 1.44MB. To use a larger image mount
this image via Windows Share (or SAMBA).
Notes:
1. If using other image-creator software, the output image extension file name has to be ‘img’, e.g.
floppy_vir.img.
2. The uploaded image file will be kept in the onboard memory of the IP-KVM until the end of the
current session, as you logged out, or initiated a reboot of the IP-KVM.
For Windows
You can use the tool “Raw Write for Windows”. You can get the RawWrite software from the
website http://www.chrysocome.net/rawwrite.
From the menu, select the tab “Read”. Enter (or choose) the name of the file in which you
would like to save the floppy content. Click on the button “Copy” to initiate the image
creation process.
For Windows
To create the image file, use your favorite CD imaging tool. Copy the whole contents of the
disc into one single image file on your hard disk.
For example, with “Nero” you choose “Copy and Backup”. Then, navigate to the “Copy Disc”
section. Select the CD-ROM or DVD drive you would like to create an image from. Specify the
filename of the image, and save the CD-ROM content in that file.
dd [ if=/dev/cdrom ] [ of=/tmp/cdrom.image ]
dd reads the entire disc from the device /dev/cdrom, and saves the output in the specified
output file /tmp/cdrom.image. Adjust both parameters exactly to your needs (input device
etc.).
You can either redirect a local drive (only available under Windows) or redirect an ISO CD/DVD
image.
click OK
Select the drive you would like to redirect. All available devices (drive letters) are
shown here. Please note that the whole drive is shared with the remote computer,
not only one partition. If you have a hard disc with more than one partition all drive
letters that belong to this disc will be redirected. The Refresh button may be used
to regenerate the list of drive letters, especially for an USB stick.
Please be cautious if “Allow Write Support” is selected. All data on the shared
media can be destroyed
Write Support This feature may be enabled here. Write support means that the
remote computer is allowed to write on your local drive. As you can imagine, this is
very dangerous. If both the remote and the local system try to write data on the
same device, this will certainly destroy the file system on the drive. Please use this
only when you exactly know what you are doing.
Device Authentication The factory default Username is “super” and the default
Password is “pass”.
click Connect to redirect drive
Note: Drive Redirection is only possible with Windows 2000 or later versions.The Drive Redirection works
on a low SCSI level and the SCSI protocol cannot recognize partitions; therefore the whole drive
selected will be shared instead of any particular partition.
While connecting to a legacy KVM switch, please select PS/2 mouse for Keyboard/Mouse setting
from webpage. Otherwise you will not be able to use Hot-key.
click on Connect ISO then select the ISO image file and click Open
Open My Computer and you will see the virtual drive appears on the remote host PC
window
Clicking on the Disconnect button will disconnect the Drive Redirection connection.
Note: Virtual Drive creation is by Device manner not by Partition. Which means it looks for I/O in BIOS and
sends the corresponding signal to host computer. This way, you are sending the entire hard drive (may
consist of ‘X’ numbers of partitions) and emulate whatever number of partitions on host computer. You may
also emulate a DVD-Drive with the same procedure. However, this DVD-Drive Does NOT support Bootable
function like Floppy and CD-ROM emulation.
The IP-KVM comes with one pre-configured user account that has all possible rights to configure
the device and to use all functions IP-KVM offers. Upon delivery the account super has the
password pass. Make sure to change password immediately after you have installed and on initial
access of your IP-KVM.
Role Each user can be a member of a group (named a “role” ). There are three kinds of
roles. Super has all possible rights to configure the device. Administrator has partial rights
to change configuration apart from critical settings. User has permission to access basic
function of open Remote Console. You can choose the desired level from the Role selection
box
Click the Create button and the displayed new user profile settings will be saved
Select an Existing user and click the Lookup button to see the exisiting user profile
Modily the user profile (e.g. Change New User name, Password etc)
Click the Modify button and the displayed user profile settings will be saved
Note: The IP-KVM is equipped with an host-independent processor and memory unit which both have a
limitation in terms of the processing instructions and memory space. To guarantee an acceptable
response time we recommend not to exceed the number of 15 users connected to the IP-KVM at the
same time. The memory space that is available onto the IP-KVM mainly depends on the configuration
and the usage of the IP-KVM (log file entries etc.). That’s why we recommend not to store more than
150 user profiles.
Manually Allows to adjust both compression rate and the colour depth individually.
Depending on the selected compression rate the data stream between the IP-KVM and the
Remote Console will be compressed in order to save bandwidth. Since high compression rates
consum more computing power of IP-KVM, they should not be used while several users are
accessing the IP-KVM simultaneously.
The standard color depth is 16 Bit (65536 colors). The other color depths are intended for
slower network connections in order to allow a faster transmission of data. Therefore
compression level 0 (no compression) uses only 16 Bit color depth. At lower bandwidths only
4 Bit (16 colors) and 2 Bit (4 gray scales) are recommended for typical desktop interfaces.
Photo-like pictures have best results with 4 Bit (16 gray scales). 1 Bit color depth (black/white)
should only be used for extremely slow network connections
Remote Console Type Specifies, which Remote Console Viewer to use:
Default Java-VM
Uses the default Java Virtual Machine of your Browser. This may be the Microsoft
JVM for the Internet Explorer, or the Sun JVM if it is configured this way. Use of the
Sun JVM may also be forced (see below).
Sun Microsystems Java Browser Plugin
Instructs the web browser of your administration system to use the JVM of Sun
Microsystems. The JVM in the browser is used to run the code for the Remote
Console window, which is actually a Java Applet. If you check this box for the first
time on your administration system and the appropriate Java plug-in is not already
installed on your system, it will be downloaded and installed automatically. However,
in order to make the installation possible, you still need to answer the according
dialogs with yes. The download volume is around 11 Mbytes. The advantage of
downloading Sun's JVM lays in providing a stable and identical Java Virtual Machine
across different platforms. The Remote Console software is optimized for this JVM
Mouse hotkey Allows to specify a hotkey combination which starts either the mouse
synchronization process if pressed in the Remote Console, or is used to leave the single
mouse mode
Remote Console Button Keys Button Keys allow simulating keystrokes on the remote system
that cannot be generated locally. The reason for this might be a missing key or the fact, that
the local operating system of the Remote Console is unconditionally catching this keystroke
already. Typical examples are Control+Alt+Delete on Windows or Control+Backspace on Unix
or Unix-like OS. The syntax to define a new Button Key is as follows:
[confirm] <keycode>[+|-[*]<keycode>]*
confirm requests confirmation by a dialog box before the key strokes will be sent to the
remote host.
keycode is the key to be sent. Multiple key codes can be concatenated with a plus, or a
minus sign. The plus sign builds key combinations, all keys will be pressed until a minus
sign or the end of the combination is encountered. In this case all pressed keys should be
released in reversed sequence. The minus sign builds single, separate key presses and
releases. The star inserts a pause with duration of 100 milliseconds.
PS/2 Keyboard Model Enables a certain keyboard layout. You can choose between
“Generic 101-Key PC” for a standard keyboard layout, “Generic 104-Key PC” for a standard
keyboard layout extendend by three additional windows keys, “Generic 106-Key PC” for a
japanese keyboard, and “Apple Macintosh” for the Apple Macintosh.
Keyboard timeout Recommanded as “enable” for keyboard timeout when host is UNIX or
UNIX-like OS
USB Mouse Type Enables USB mouse type. Choose between “Windows >= 2000 , MacOSX”
for MS Windows 2000 or Windows XP, Mac OSX or “Other Operating Systems” for MS
Windows NT, Unix or Unix-like OS, or OS X. In “Windows >= 2000 , MacOSX” mode the
remote mouse is always synchronized with the local mouse.
Mouse Speed
Auto mouse speed - Use this option if the mouse settings on host use an additional
acceleration setting. The IP-KVM tries to detect the acceleration and speed of the
mouse during the mouse sync process.
5.4.3 Video
Force Composite Sync (Required for Sun Computers) When connecting the device
directly to legacy Sun computer (with composite sync as the video output, it may be
possible that IP-KVM don’t recognize the composite sync automatically. To support
signal transmission from a Sun machine, enable this option. If not enabled the picture
of the remote console will not be visible.
5.5.1 Network
The Network Settings panel allows changing network related parameters. Once applied the new
network settings will immediately come into effect.
Select Device Settings: Network and under Network Basic Settings you can set new IP
address or enable DHCP/BOOTP
Preferred host name Preferred host name to request from DHCP server. Whether
the DHCP server takes the IP-KVM suggestion into account or not depends on the
server configuration
Gateway IP address In case the IP-KVM should be accessible from networks other
than the local one, this IP address must be set to the local network router's IP
address
Primary DNS Server IP Address IP address of the primary Domain Name Server in
dot notation. This option may be left empty, however the IP-KVM will not be able to
perform name resolution
Secondary DNS Server IP Address IP address of the secondary Domain Name Server
in dot notation. It will be used in case the Primary DNS Server cannot be contacted
Under Network Basic Settings you can set the ports that are to be used by the various
TCP/IP services
Remote Console and HTTPS port Port number at which the IP-KVM's Remote
HTTP port Port number at which the IP-KVM's HTTP server is listening. If left empty
the default value will be used
Telnet port Port number at which the IP-KVM's Telnet server is listening. If left
empty the default value will be used
SSH port Port number at which the IP-KVM SSH (Secure SHell) server is listening to.
If left empty the default value (port 22) will be used
Bandwidth limitation The maximum network traffic generated through the IP-KVM
ethernet device. Value in Kbit/s
Enable SSH access This enables the SSH (Secure SHell) function
Disable Setup Protocol Enable this option to exclude the IP-KVM from the
setup protocol Setup protocol is a proprietary layer-2 MAC-based protocol to allow
some configuration software to detect IP-KVM devices in the network, even
without IP address, and then config network related settings to IP-KVM
Under LAN Interface Settings the Autodetect will set the ethernet speed to the fastest
possible value supported by both endpoints of the link.
For example if you use a 10Mb half duplex HUB this speed will be auto-selected. If this
option does not work with some network device (HUB, switches, and routers), you can set
the Ethernet interface speed of IP-KVM manually to the values as supported by the
network device
NOTE: Changing the network settings of the IP-KVM might result in losing connection to it. In case you
change the settings remotely make sure that all the values are correct and you still have an option to access
the IP-KVM.
When users connect their IP-KVM to a DSL line or use a DHCP configuration, their IP address might
be changed whenever it reconnects to the network. So it can become very difficult to post all
related contacts for each new IP address. Also if the remote administrator only has access through
the remote console they have no way to know if an IP-KVM IP address has changed and if it has
what the new IP address is.
The solution is the Dynamic DNS service which is provided by various ISPs and organizations. Using
the Dynamic DNS service users can access the IP-KVM through the hostname registered in the
Dynamic DNS Server regardless of any IP address change.
The remote administrator does not know the IP address assigned by the provider, however the
IP-KVM connects to the dynamic DNS server in regular intervals and registers its IP address there.
So the administrator can contact this server as well and pick up the same IP address relating to his
IP-KVM unit.
Make sure that the LAN interface of the IP-KVM is properly configured
Enable Dynamic DNS and change the settings according to your needs (as shown in Figure
5.17):
Enable Dynamic DNS This enables the Dynamic DNS service. This requires a configured DNS
server IP address
Dynamic DNS server This is the server name where IP-KVM registers itself in regular
intervals. Currently, this is a fixed setting since only dyndns.org is supported for now
DNS System Choose Dynamic for free DNS service. Custom for your own domain
Hostname This is the hostname of the IP-KVM that is provided by the Dynamic DNS Server.
(use the whole name including the domain, e.g. testserver.dyndns.org , not just the
actual hostname)
Username You have registered this username during your manual registration with the
Dynamic DNS Server. Spaces are not allowed in the Nickname
Password You have used this password during your manual registration with the Dynamic
DNS Server
Check time The IP-KVM registers itself for initiating the IP address of IP-KVM stored in the
Dynamic DNS server at this time
Check interval This is the interval for reporting again to the Dynamic DNS server for
updating the IP address associated with the Domain Name of the IP-KVM
Note: The IP-KVM has its own independent real time clock. Make sure the time setting of the IP-KVM is
correct (see the Section Date and Time)
HTTPS Encryption
If this option is enabled access to the web front-end is only possible using an HTTPS
connection. The IP-KVM will not listen on the HTTP port for incoming connections. (And if you
want to create your own SSL certificate that is used to identify the IP-KVM refer the Certificate
section in this manual
KVM encryption
This controls the encryption of the RFB protocol. RFB is used by the Remote Console to
transmit both the screen data to the administrator machine and keyboard and mouse data
back to the host. If set to Off no encryption will be used. If set to Try the applet tries to make
an encrypted connection. In case connection establishment fails for any reason an
unencrypted connection will be used.
If set to Force the applet tries to make an encrypted connection with certificate. An error will
be reported in case connection establishment fails.
The rule can be configured to apply to any particular Group level (All, User, Super or
Administrator).
When the IP-KVM receives a TCP packet, it will process the packet with the chain rule
depicted below. The process ordering is important as the packet will enter the chain Rule 1
first and if it meets the rule then it will take Action 1 directly; otherwise go to chain rule 2.
Add a new IP filtering rule by setting the properties at adding line by Append or Insert.
User can remove a rule by Remove or Delete
5.5.4 Certificate
The IP-KVM uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between
itself and a connected client. During the connection establishment the IP-KVM has to expose its
However, it is possible to generate and install a new base64 X.509 certificate that is unique for a
particular IP-KVM.
In order to do that, the IP-KVM must be enabled to generate a new cryptographic key and the
associated Certificate Signing Request (CSR) that needs to be certified by a certification
authority (CA). A certification authority verifies that you are the person who you claim you
are, and signs and issues a SSL certificate to you.
To create and install a SSL certificate for the IP-KVM:
Create a SSL Certificate Signing Request using the panel shown in Figure 5.22. To do
this you will need to fill out a number of fields as explained below.
Common name This is the network name of the IP-KVM once it is installed in the
user's network (usually the fully qualified domain name). It is identical to the name
that is used to access the IP-KVM with a web browser (without the “http://” prefix). In
Organizational unit This field is used for specifying to which department within an
organization the IP-KVM belongs
Country (ISO code) The country where the organization is located. This is the
two-letter ISO code, e.g. DE for Germany, or US for the USA. (Note: the country code
has to be entered in CAPITAL LETTERS)
Email The email address of a contact person that is responsible for the IP-KVM and
its security
Key length This is the length of the generated key in bits. 1024 Bits are supposed to
be sufficient for most cases. Longer keys may result in slower response time of the
IP-KVM during connection establishment
Once this is done, click on the button Create which will initiate the Certificate Signing
Request generation. The CSR can be downloaded to your administration machine with
the Download CSR button
Send the saved CSR string to a CA for certification. You will get the new certificate from
the CA after a more or less complicated traditional authentication process (depending on
the CA)
Upload the certificate to the IP-KVM using the Upload button as shown below
After completing these three steps, the IP-KVM has its own certificate that is used for
identifying the IP-KVM to its clients.
If you destroy the CSR on the IP-KVM there is no way to get it back! In case you
deleted it by mistake, you have to repeat the three steps as described above
Configuration or console login Do not use the serial port for any special function, use it only
for the initial configuration
Modem The IP-KVM offers remote access using a telephone line in addition to the standard
access over the built-in Ethernet adapter. The modem needs to be connected to the serial
interface of the IP-KVM.
Logically, connecting to the IP-KVM using a telephone line means nothing else than building
up a dedicated point-to-point connection from your console computer to the IP-KVM. So the
IP-KVM acts as an Internet Service Provider (ISP) to which you can dial in. The connection is
established using the Point-to-Point Protocol (PPP). Before you connect to the IP-KVM, make
sure to configure your console computer accordingly. For instance, on Windows based
operating systems you can configure a dial-up network connection, which defaults to the
right settings like PPP.
The Modem Settings panel allows you to configure the remote access to the IP-KVM using a
modem. The meaning of each parameter will be described below. The modem settings are
part of the serial settings panel.
Important events like a login failure or a firmware update are logged to a selection of logging
destinations. Each of those events belongs to an event group, which can be activated separately.
This link enables you to set up the internal real-time clock of the IP-KVM. You have the possibility
to adjust the clock manually, or to use a NTP timeserver:
Without a timeserver, your time setting will not be persistent, so you have to adjust it again,
after IP-KVM loses power for more than a few minutes. To avoid this, you can use a NTP
timeserver, which sets up the internal clock automatically to the current UTC time. Because
NTP server time is always UTC, there is a setting that allows you to set up a static offset to get
your local time.
Note: There is currently no way to adjust the daylight saving time automatically. So you have to set up
the UTC offset twice a year properly to the local rules of your country
The common way to log events is to use the internal log list of the IP-KVM. These logs can be
viewed by selecting Event Log on the Maintenance page menu. To configure the event logs:
List logging enabled The common way to log events is to use the internal log list of the
IP-KVM . To show the log list, click on Event Log on the Maintenance page.
Since the IP-KVM's system memory is used to save all the information, the maximum
number of possible log list entries is restricted to 1,000 events. Every entry that exceeds
this limit overrides the oldest one, automatically.
If the reset button on the HTML frontend is used to restart the IP-KVM, all logging
information is saved permanently and is available after the IP-KVM has been started. If
the IP-KVM loses power or a hard reset is performed, all logging data will be lost. To
avoid this, use one of the following log methods:
Note: In contrast to the internal log file on the IP-KVM, the size of the NFS log file is not limited. Every
log event will be appended to the end of the file so it grows continuously and you may have to
delete it or move it away from time to time
5.5.8 Authentication
To log in to the IP-KVM a user must be authenticated by means of a password. By default this
authentication takes place locally with the user name and associated password being stored in the
IP-KVM’s internal database.
Alternately the IP-KVM can be configured to query a remote database server using RADIUS or
LDAP to determine if a given user may log in.
To configure authentication settings:
Select Device Settings: Authentication and check Local Authentication , LDAP or Radius
Local Authentication
When Local Authentication is selected, the IP-KVM will authenticate against its internal
database of users and passwords
Base DN of User LDAP Server Specify the distinguished name (DN) where the directory tree
starts in the user LDAP server. E.g.: dc=test, dc=domain, dc=com
Type of external LDAP Server With this option you set the type of the external LDAP server.
This is necessary since some server types require special handling. Additionally, the default
values for the LDAP scheme are set appropriately. You can choose between a Generic LDAP
Server, a Novell Directory Service and a Microsoft Active Directory. If you have neither a Novell
Directory Service nor a Microsoft Active Directory then choose a Generic LDAP Server and edit
the LDAP scheme used (as detailed below)
Name of login-name attribute This is the name of the attribute containing the unique login
name of a user. To use the default leave this field empty. The default depends on the selected
User search subfilter Here you can refine the search for users that should be known to the
IP-KVM
Active Directory Domain This option represents the active directory domain that is configured
in the Microsoft Active Directory server. This option is only valid if you have chosen a Microsoft
Active Directory as the LDAP server type e.g.: test.domain.com
RADIUS Access
RADIUS (Remote Authentication Dial In User Service) is a protocol specified by the Internet
Engineering Task Force (IETF) working group. There are two specifications that make up the
RADIUS protocol suite: Authentication and Accounting. These specifications aim to centralize
authentication, configuration and accounting for dial-in services to an independent server. The
RADIUS protocol exists in several implementations (such as freeRADIUS, openRADIUS or
RADIUS on UNIX systems). The RADIUS protocol itself is well specified and tested.
Note: The IP-KVM currently does not support challenge/response. An Access Challenge response is
seen and evaluated as an Access Reject.
Shared Secret A shared secret is a text string that serves as a password between the RADIUS
client and RADIUS server. In this case the IP-KVM acts as a RADIUS client. A shared secret is
used to verify that RADIUS messages are sent by a RADIUS-enabled device that is configured
with the same shared secret and to verify that the RADIUS message has not been modified in
transit (message integrity). Enter a maximum of 128 alphanumeric characters and symbols
such as an exclamation point (“!”) or an asterisk (“*”)
Auth. Port The authentication port the RADIUS server listens for authentication requests
(default value 1812)
Acc. Port The accounting port the RADIUS server listens for accounting requests. The default
value is 1813
5.5.9 USB
USB 2.0 is the default setting. However if the operating system of the managed computer does
not support USB 2.0 please force it to USB 1.1
On this screen you can specify where the IP-KVM will look in order to authenticate the users. You can use
"Local Authentication", this means you need to have created the user account on the IP-KVM and the
user/group information residing on the IP-KVM for authentication.
The other options allow you to specify an LDAP or a RADIUS Server to use for the login authentication.
These methods are very useful when you want to map users into specific groups which have certain
privileges. It is usually far easier and simpler to refer to already existing groups, rather than having to
re-enter everything into the IP-KVM.
Note: Whatever you configure, you can always login over the network as the superuser "super". The
superuser is always authenticated and authorized locally, so you always have a "back door" to the IP-KVM.
In order to configure the LDAP access, you can set the following options:
The IP-KVM is a complete standalone computer. The software it runs is called firmware and this
firmware can be updated remotely in order to install new functionality or special features.
A new firmware update is a binary file which will be sent to you by email or which you can
download from the Opengera web site. If the firmware file is compressed (file suffix .zip) then you
must unzip it before you can proceed. Under Windows you can use WinZip
(http://www.winzip.com) or similar for decompression. Other operating systems might provide a
program such as unzip.
Before you can start updating the firmware of your IP-KVM the new uncompressed firmware file
has to be accessible on the system that you use for connecting to the IP-KVM.
This process is not reversible and will take few minutes. During this upgrading
process you must not disconnect the power or the Ethernet cable as this may
cause upgrade failure and destroy the image in Flash memory
The IP-KVM will automatically initiate a self-reboot upon completion of upgrade process to make
newly upgraded firmware effective. At the end of countdown counter expires, the browser will
redirect user to the login homepage. Users shall refer to Maintenance: Device Information page to
check the firmware version and confirm the operation.
The IP-KVM will verify firmware checksum before proceed upgrade procedure.
The mechanism helps to prevent false firmware files from damaging the
IP-KVM. It also is crucial to keep a steady power supply during the procedure
otherwise the power-off event may damage the permanent storage and disable
the IP-KVM
In order to do that you need to select the file on your local system using the Browse
button. Click Upload. Once the firmware file has been uploaded, it is checked whether it is
a valid firmware file and whether there were any transmission errors. In case of any error
the Upload Firmware function will be aborted.
If everything went well, you see the Update Firmware panel
The panel shows you the version number of the currently running firmware and the
version number of the uploaded firmware. Pressing Update will store the new version and
substitute the old one completely
You will be advised when the firmware has updated successfully
The device will be rebooted and redirected to the login web page
To reset a certain IP-KVM functionality click on the appropriate Reset button. Clicking on
Reset of Reset Device will reboot the IP-KVM system. It will close all current connections to
the administration console and to the Remote Console. The whole process will take about one
minute. Resetting sub-devices (e.g. video engine) will take few seconds only and does not result in
closing connections.
Note: The unit will reboot after this command. All current settings will be lost
A. Key Codes
Table below shows the key codes used to defines keystrokes or hotkeys for several functions.
Please note that these key codes do not represent necessarily key characters that are used on
international keyboards. They name a key on a standard 104 key PC keyboard with an US English
language mapping. The layout for this keyboard is shown in figure below. However, most modifier
keys and other alphanumeric keys used for hotkey purposes in application programs are on an
identical position, no matter what language mapping you are using. Some of the keys have aliases
also, means they can be named by 2 key codes (separated by comma in the table).
Port
Number Protocol TCP/UDP
21 FTP (File Transfer Protocol) TCP
22 SSH (Secure Shell) TCP
23 Telnet TCP
25 SMTP (Simple Mail Transfer Protocol) TCP
37 Time TCP, UCP
39 RLP (Resource Location Protocol) UDP
49 TACACS, TACACS+ UDP
53 DNS UDP
67 BOOTP server UDP
68 BOOTP client UDP
69 TFTP UDP
70 Gopher TCP
79 Finger TCP
80 HTTP TCP
110 POP3 TCP
119 NNTP (Network News Transfer Protocol) TCP
161/162 SNMP UDP
443 HTTPS TCP
G. Protocol Glossary
Term Meaning
BOOTP Bootstrap Protocol is similar to DHCP, but for smaller networks.
Automatically assigns the IP address for a specific duration of time.
CHAP Challenge Handshake Authentication Protocol is a secure protocol for
connecting to a system; it is more secure than the PAP.
DHCP Dynamic Host Configuration Protocol is an Internet protocol for automating
H. Regulation Information
FCC This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a commercial installation. This equipment
generates, uses, and can radiate radio frequency energy and if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications.
Operation of this equipment in a residential environment may cause harmful interference.
STANDARD WARRANTY
Opengear, Inc., its parent, affiliates and subsidiaries, (collectively, "Opengear") warrant your
Opengear IP-KVM product to be in good working order and to be free from defects in
workmanship and material (except in those cases where the materials are supplied by the
Purchaser) under normal and proper use and service for the period of two (2) years from the date
of original purchase from an Authorized Opengear reseller. In the event that this product fails to
meet this warranty within the applicable warranty period, and provided that Opengear confirms
the specified defects, Purchaser's sole remedy is to have Opengear, in Opengear's sole discretion,
repair or replace such product at the place of manufacture, at no additional charge other than the
cost of freight of the defective product to and from the Purchaser. Repair parts and replacement
products will be provided on an exchange basis and will be either new or reconditioned. Opengear
will retain, as its property, all replaced parts and products. Notwithstanding the foregoing, this
hardware warranty does not include service to replace or repair damage to the product resulting
from accident, disaster, abuse, misuse, electrical stress, negligence, any non- Opengear
modification of the product except as provided or explicitly recommended by Opengear, or other
cause not arising out of defects in material or workmanship. This hardware warranty also does not
include service to replace or repair damage to the product if the serial number or seal or any part
thereof has been altered, defaced or removed. If Opengear does not find the product to be
defective, the Purchaser will be invoiced for said inspection and testing at Opengear's then current
rates, regardless of whether the product is under warranty.
TECHNICAL SUPPORT
Purchaser is entitled to thirty (30) days free telephone support (USA ONLY) and twelve (12) months
free e-mail support (world wide) from date of purchase provided that the Purchaser first register
their product(s) with Opengear by filling in the on-line form:
http://www.opengear.com/registration.html.
Telephone support is only available from 9:00 AM to 5:00 PM, Mountain Time USA.
Opengear's standard warranty also includes free access to Opengear's Knowledge Base as well as
any application notes, white papers and other on-line resources that may become available from
time to time.
Opengear reserves the right to discontinue all support for products that are no longer covered by
warranty.
LIMITATION OF LIABILITY
No action, regardless of form, arising from this warranty may be brought by either party more than
two (2) years after the cause of action has occurred. Purchaser expressly agrees that Opengear's
liability, if any, shall be limited solely to the replacement or repair of the product in accordance
with the warranties specifically and expressly set forth herein. The remedies of the Purchaser are
the exclusive and sole remedies available, and, in the event of a breach or repudiation of any
provision of this agreement by Opengear, the Purchaser shall not be entitled to receive any
incidental damages as that term is defined in Section 2-715 of the Uniform Commercial Code.
Opengear waives the benefit of any rule that disclaimer of warranty shall be construed against
Opengear and agrees that such disclaimers herein shall be construed liberally in favor of Opengear.
THE FOREGOING WARRANTIES ARE THE SOLE ANDEXCLUSIVE WARRANTIES GIVEN IN CONNECTION
WITH THE PRODUCT AND THE HARDWARE. OPENGEAR DISCLAIMS ALL OTHER WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES AS TO THE SUITABILITY
OR MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE AND NONINFRINGEMENT OF
THIRD PARTY RIGHTS. OPENGEAR DOES NOT PROMISE THAT THE PRODUCT IS ERROR-FREE OR
WILL OPERATE WITHOUT INTERRUPTION. IN NO EVENT SHALL OPENGEAR BE LIABLE FOR ANY LOST