beautypg.com

Remote usage, 1 prerequisite – PLANET IKVM-17080 User Manual

Page 25

background image

 
 

4. Remote Usage

15B

4.1 Prerequisite

The IKVM-17080/IKVM-17160 feature an embedded operating system and applications
offering a variety of standardized interfaces. This chapter will describe both these
interfaces, and the way to use them in a more detailed manner. The interfaces are
accessed using the TCP/IP protocol family, thus they can be accessed using the built-in
Ethernet port.

The following interfaces are supported:

HTTP/HTTPS

The IKVM-17080 / IKVM-17160 can be entirely managed using a standard web browser.
You can access the IKVM-17080 /16010 using the insecure HTTP protocol, or using the
encrypted HTTPS protocol. Whenever possible, use HTTPS.

Telnet

A standard Telnet client can be used to access an arbitrary device connected to the
IKVM-17080 / IKVM-17160 port via a terminal mode.
The primary interface of the IKVM-17080 / IKVM-17160 is the HTTP interface. This is
covered extensively in this chapter. Other interfaces are addressed in subtopics.
In order to use the Remote Console window of your managed host system, the browser
has to come with a Java Runtime Environment version 1.1 or higher. If the browser has
no Java support (such as on a small handheld device), you are still able to maintain your
remote host system using the administration forms displayed by the browser itself.

Important: We recommend installing a Sun JVM 1.5 or above.
For an insecure connection to the IKVM-17080 / IKVM-17160, we can recommend the
following browsers:

• Microsoft Internet Explorer version 6.0 or higher on Windows 98, Windows ME,

Windows 2000, Windows XP, Windows Server 2003 and Win7.

• Netscape Navigator 7.0 or Mozilla 1.6 on Windows 98, Windows ME, Windows

2000, Windows XP, Windows Server 2003, Win7 and Linux and other UNIX-like
Operating Systems


In order to access the remote host system using a securely encrypted connection, you
need a browser that supports the HTTPS protocol. Strong security is only assured by
using a key length of 128 Bit. Some of the old browsers do not have a strong 128 Bit
encryption algorithm.

Using the Internet Explorer, open the menu entry “?” and “Info” to read about the key
length that is currently activated. The dialog box contains a link that leads you to
information on how to upgrade your browser to a state of the art encryption scheme.
The picture below shows the dialog box presented by the Internet Explorer 6.0.

19