2 usage, 1 prerequisites – Raloy IP Functions for KVM User Manual
Page 9

6
2 Usage
2-1 Prerequisites
The IP module features an embedded operating system and applications offering a variety of standardized
interfaces. This chapter will describe both these interfaces, and the way to use them in a more detailed
manner. The interfaces are accessed using the TCP/IP protocol family, thus they can be accessed using the
LAN port of the device.
The following interfaces are supported:
HTTP/HTTPS
Full access is provided by the embedded web server. The IP module environment can be entirely managed
using a standard web browser. You can access the IP module using the insecure HTTP protocol, or using
the encrypted HTTPS protocol. Whenever possible, use HTTPS.
Telnet
A standard Telnet client can be used to access an arbitrary device connected to the IP module’s serial
port via a terminal mode. The primary interface of the IP module is the HTTP interface. This is covered
extensively in this chapter. Other interfaces are addressed in subtopics.
In order to use the Remote Console window of your managed host system, the browser has to come with a
Java Runtime Environment version 1.4.2 or above. If the browser has no Java support (such as on a small
handheld device), you are still able to maintain your IP module using the administration forms displayed by the
browser itself.
Note: We recommend installing a Sun JVM 1.5.0.4.
For an insecure connection to the IP module, we can recommend the following browsers:
■ Microsoft Internet Explorer version 6.0 or higher on Windows 2000 and Windows XP
■ Netscape Navigator 7.0 or Mozilla 1.6 on Windows 2000, Windows XP, Unix, Linux and UNIX-like Operating
Systems
In order to access the remote host system using a securely encrypted connection, you need a browser that
supports the HTTPS protocol. Strong security is only assured by using a key length of 128 Bit. Some of the old
browsers do not have a strong 128 Bit encryption algorithm.
Using the Internet Explorer, open the menu entry “?” and “Info” to read about the key length that is currently
activated. The dialog box contains a link that leads you to information on how to upgrade your browser to a
state of the art encryption scheme. The image below shows the dialog box presented by the Internet Explorer
6.0.
Newer web browsers generally support strong encryption on default.