Cyclades User's Guide User Manual
Page 4
iv
AlterPath KVM/net Installation, Administration, and User’s Guide
Decision 1: Check User’s KVM Port Permissions ............................... 26
Decision 2: Check Group’s KVM Port Permissions ............................. 27
Decision 3: Check Generic User’s KVM Port Permissions .................. 27
Decision 4: Check User’s Default Permissions .................................... 28
Decision 5: Check Group’s Default Permissions .................................. 28
Decision 6: Check Generic User’s Default Permissions ....................... 29
Server Access: Inband and Out of Band ....................................................... 29
Determining the Connection Type and its Supported Functionality ........ 31
Administering Users of Connected Servers .................................................. 33
Redefining Keyboard Shortcuts (Hot Keys) ................................................. 35
Redefining KVM Connection Hot Keys ................................................... 35
Redefining Sun Keyboard Equivalent Hot Keys ...................................... 35
Summary of Tasks for Redefining Hot Keys ............................................ 36
Disabling Mouse Acceleration ...................................................................... 36
Screen Resolution and Refresh Rate ............................................................. 37
Packet Filtering on the KVM/net .............................................................. 38
Options for Managing Power .................................................................... 40
Setting Up and Configuring Power Management ..................................... 42
Security Profiles ........................................................................................ 44
Encryption ................................................................................................. 45
Authentication ........................................................................................... 45
Choosing Among Authentication Methods .......................................... 45
Tools for Specifying Authentication Methods ...................................... 48
Notifications, Alarms, and Data Buffering ................................................... 53