Ir a la página of
manuales de instrucciones parecidos
-
Switch
Lindy 39322
2 páginas 0.19 mb -
Switch
Lindy 32512
71 páginas 0.91 mb -
Switch
Lindy CONNECTION PERFECTION 32797
9 páginas 0.22 mb -
Switch
Lindy 32 983
2 páginas 0.05 mb -
Switch
Lindy CPU Switch Duo
4 páginas 0.18 mb -
Switch
Lindy 25040
2 páginas 0.17 mb -
Switch
Lindy iSWITCH
52 páginas 0.89 mb -
Switch
Lindy 32503
71 páginas 0.91 mb
Buen manual de instrucciones
Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Lindy 32530. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Lindy 32530 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.
¿Qué es un manual de instrucciones?
El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Lindy 32530 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.
Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Lindy 32530, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.
Entonces, ¿qué debe contener el manual de instrucciones perfecto?
Sobre todo, un manual de instrucciones Lindy 32530 debe contener:
- información acerca de las especificaciones técnicas del dispositivo Lindy 32530
- nombre de fabricante y año de fabricación del dispositivo Lindy 32530
- condiciones de uso, configuración y mantenimiento del dispositivo Lindy 32530
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas
¿Por qué no leemos los manuales de instrucciones?
Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Lindy 32530 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Lindy 32530 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Lindy en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Lindy 32530, como se suele hacer teniendo una versión en papel.
¿Por qué vale la pena leer los manuales de instrucciones?
Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Lindy 32530, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.
Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Lindy 32530. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.
Índice de manuales de instrucciones
-
Página 1
© LINDY ELECTRONICS LIMITED & LINDY-ELEKTRONIK GMBH - FIRST EDITION (NOV 2007) U8/16-Mo dular KV M Switch with modu les: Cat.5 Ext ender an d IP Acce ss Modules User Manual English LINDY No. 32530, 32531 www.lindy.com For Commercial Use Only Tested to comply with FCC Standards 1 The modular LINDY KVM Switch series U8/16 The U8/16 KVM switch se[...]
-
Página 2
2 Contents Section 1 .................................................................................. 3 1.1 About the U 8/16 concept ................................................................... 4 1.2 U8/16-Modu lar IP Access module: U8/16-IP ..................................... 4 1.3 U8/16-Modular with Cat.5 Access module: U8/16-C5 ......[...]
-
Página 3
Section 1 Introducing the U8/16-IP 4 1.1. About the U8/16 concept The U8/16 series KVM switch supports traditional PS/2 mouse and keyboard connections as well as modern USB connections. The U8/16 series supports the following computer platforms, PC, Mac and SUN. Combined KVM cables are used to connect the servers to the KVM switch’s computer port[...]
-
Página 4
Section 1 Introducing the U8/16-IP 6 1.5. Product Features 8/16 port KVM switch in a 1U, 19” rackmount size design Built-in daisy chain port allows daisy chaining of up to 8 LINDY KVM switches U or P series to be connected to support up to 128 computers Local console operation plus optional KVM over IP or KVM over Cat.5 control Re[...]
-
Página 5
8 Section 2 Hardware Installation Section 2 Hardware Installation 9 2.1. Product Information & Connection Guide Make your connections to the switch as detailed below. Ensure all devices are switched of f before connecting. Once all connections have been made, power on the switch, your monitor, and then the connected computers in that order. Opt[...]
-
Página 6
Section 2 Hardware Installation 10 2.2. Rackmount Installation Before you start installation please verify that all parts are included according to the package contents. If you want to install the KVM Switch in a 19” server rack please attach the enclosed 19” rackmount brackets using the screws provided. 2.3. Cascading / Daisy Chaining of multi[...]
-
Página 7
12 Section 3 KVM Switch Operation Section 3 KVM Switch Operation 13 3.1. KVM Switch Operation 3.1.1. Password Security When you power on the U8/16 it will ask you for a user name and a password. The default user name and default password for both is eight zeros –“00000000” . Please key in eight zeros in the password field. You may use the “[...]
-
Página 8
Section 3 KVM Switch Operation 14 3.1.3. Computer / Port Selecti on You can select the computer you want to access in one of three different ways: Front panel push button selection Keyboard hotkey selection On screen display menu selection 3.1.4. Port LED Display The front panel of the switch has two LEDs for each port. When the LED lab[...]
-
Página 9
Section 3 KVM Switch Operation 16 KVM Switch / Bank Selection: The U8/16 supports daisy chaining of up to 8 KVM Switches (Banks). Therefore, when using direct hotkey port selection you must include the key sequence for the KVM Switch/Bank: + + + Example: T o access a computer attache d to Port 6 of the first KVM Switch you should press the followin[...]
-
Página 10
Section 3 KVM Switch Operation 18 The OSD Menu displays further OSD configuration menus when selecting F1 from the main OSD menu. From the F1 Menu further submenus can be selected to configure the switch settings. In the submenus you can either use the cursor up/down keys or the mouse for navigation or simply press the number of the further option [...]
-
Página 11
Section 4 CAT. 5 Extender Access & Operation 20 4.1. Cat.5 KVM Extender Features The modular KVM switch U8/16 offers the option to use it with or without a remote console access module. This module may either be a Cat.5 Extender or IP Access solution. The Cat.5 Extender solution provides real time KVM access via a dedicated Cat5e/6 cable with a[...]
-
Página 12
22 Section 5 IP Access Configuration & Operation Section 5 IP Access Configuration & Operation 23 5.0.1. KVM over IP Access Features The IP access module provides remote KVM over IP access to the KVM switch U8/16. It converts all keyboard video and mouse signals and sends them as TCP/IP signals over your LAN/WAN connection. The KVM switch U[...]
-
Página 13
Section 5 IP Access Configuration & Operation 24 5.1. Configuration The U8/16-IP’s comm unication interfaces are all based on TCP/IP. The switch comes pre-configured with the following IP configuration shown here: If this initial configuration does not meet your requirements, the following sec tion describes the configuration that is necessar[...]
-
Página 14
Section 5 IP Access Configuration & Operation 26 Authentication To adjust the authentication settings, enter your login as a super user and change your password. Super user login Enter the login name of the super user . The initial value is "super" . All of the characters ar e lower case. Super user password Enter the current password[...]
-
Página 15
Section 5 IP Access Configuration & Operation 28 Host System Mouse Settings The host' s operating system obtains various settings from the mouse driver. Special Mouse Driver There are mouse drivers which influence the synchronization process and lead to desynchronized m ouse point ers. I f t his happens, make sure yo u do not use a speci a[...]
-
Página 16
Section 5 IP Access Configuration & Operation 30 5.4. Usage Prerequisites The U8/16-IP f eatures an embedded operating system offering a variety of standardized interfaces. This section wi ll describe t hese interfaces, and the way to use them in a more detailed manner. The interfaces are accessed using the TCP/IP protocol family. The following[...]
-
Página 17
Section 5 IP Access Configuration & Operation 32 5.6. Navigation Once logged into the U8/16-IP successfully, the main page appears. This page consists of three parts; each of them contains specific information. The buttons in the upper ar ea allow you to navigate within the front end. The lower left area contains a navigation bar and allows you[...]
-
Página 18
Section 5 IP Access Configuration & Operation 34 Note: Your local keyboard changes its keyboard layout according to the remote host system. If you use a German administration system and your host system uses a US English k eyboard layout for instance, some special keys on the German keyboard will not work as expected. Instead, the keys wil l re[...]
-
Página 19
Section 5 IP Access Configuration & Operation 36 Video Settings through the remote console: Brightness Controls the brightness of the picture Contrast Controls the contrast of the picture Clock Defines the horizontal frequency for a video line and depend s on the vi deo mode. Different video card types may require different values here. The def[...]
-
Página 20
Section 5 IP Access Configuration & Operation 38 Remote Console Status Line Status line Shows both console and the connection st ate. The size of the remote screen is displayed. The example below was taken from a Remote Console with a resolution of 1024 x 768 pixels. The value in brackets describes the connection to the Remote Console. Norm mea[...]
-
Página 21
Section 5 IP Access Configuration & Operation 40 Telnet Console The U8/16-IP firmware features a Telnet server that enables a user to connect via a standard Telnet client . If the Telnet program is using a VT 100, VT 102 or VT 220 terminal or appr opriate emulation, it is even possible to perform a console re direction, as long as t he U8/16-IP[...]
-
Página 22
Section 5 IP Access Configuration & Operation 42 5.7.2 . Virtual Media One of the computers connected to the U8/16-IP can also be set up for rem ote mass storage via a USB connection. Files can be uploaded t o the switch, which the host computer ‘sees’ as virtual drives. This means the r emote operator can remotely install software, drivers[...]
-
Página 23
Section 5 IP Access Configuration & Operation 44 Create a CD-ROM/ISO Image Follow t he procedure below to create a CD-ROM image which can be accessed by the host system via the U8/16-IP. The image file must be an ISO file format! First, on your client PC you must create an image of your CD which can be accessed by the host system. UNIX and UNIX[...]
-
Página 24
Section 5 IP Access Configuration & Operation 46 7. You will see the dialog below detailing the active image: 8. Click Reactivate . Access the console window and you will see that another CD drive has been installed on the host computer. This is the virtual drive you have just set up. You can access the uploaded CD image as though it were a reg[...]
-
Página 25
Section 5 IP Access Configuration & Operation 48 2. Click on the Search for new devices icon - The U8/16-IP will be detected as an Unconfigured device and its MAC address will be displayed in the left panel. Double click on the MAC address to launch the Device Configuration Wizard . 3. Follow the on-screen instructions. You will be asked t o in[...]
-
Página 26
Section 5 IP Access Configuration & Operation 50 5.7.3. User Management Change Password To change your password, enter the new password in the upper entry field. Retype the password in the lower field. Click Apply to submit your changes. Section 5 IP Access Configuration & Operation 51 Users And Groups The U8/16-IP comes with 2 pre-configur[...]
-
Página 27
Section 5 IP Access Configuration & Operation 52 5.7.4. KVM Settings User Console The following settings are user specific. This means the sup er user can customize these settings for individual users separately. Changing the settings for one user does not affect the settings for the other users. User select Unit This box displays t he user ID [...]
-
Página 28
Section 5 IP Access Configuration & Operation 54 Sun Microsystems Java Browser Plug-in Instructs the web browser of your administration system to use Sun’s JVM. The JVM in the browser is used to run the code for t he Remote Console window which is actually a Java Applet. If you check t his box for the first time on y our administratio n syste[...]
-
Página 29
Section 5 IP Access Configuration & Operation 56 USB Mouse Type Enables USB mouse type. Choose between MS Windows 2000 or new er for MS Windows 2000 or Windows XP, or Other Operating Systems for MS Windows NT, Linux, or OS X. In MS Windows 2000 or newer mod e the remote mouse is always synchronized with the local mouse. Mouse Speed Auto mou[...]
-
Página 30
Section 5 IP Access Configuration & Operation 58 IP auto configuration With this option you can control if the U8/16-IP should obtain its network settings from a DHCP or BOOTP ser ver. For DHCP, select dhcp , and for BOOTP select bootp . If you choose none then IP auto configuration is disabled. IP address IP address in the usual dot notation. [...]
-
Página 31
Section 5 IP Access Configuration & Operation 60 Note: The U8/16-IP has its own independent real time clock. Make sure the time setting of the U8/16-IP switch is correct. (See the Section called Date and Time on page 63) Enable Dynamic DNS Enables the Dynamic DNS service. This requires a configured DNS server IP address. Dynamic DNS server This[...]
-
Página 32
Section 5 IP Access Configuration & Operation 62 Certificate The U8/16-I P uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. During the conn ection establishment the U8/16-IP has to expose its identity to a client using a cryptographic certificate. This certificate and the under[...]
-
Página 33
Section 5 IP Access Configuration & Operation 64 Confirm Challenge Password Confirmation of the Challenge Password Email The email address of a contact person that is responsible for the U8/16-IP and its security. Key length This is the length of t he generat ed key in bits. 1024 bits are sufficient for most cases. Longer keys may result in slo[...]
-
Página 34
Section 5 IP Access Configuration & Operation 66 Modem Init String The initialization string used by the U8/16-I P to initialize the modem. The default value will work with all modern standard modems directly connected to a t elephone line. In case you have a special mode m or the modem is co nnected to a local telephone switch that require[...]
-
Página 35
Section 5 IP Access Configuration & Operation 68 Event Log Important events like a login failure or a firmware update are logged to a selection o f logging destinations. Each of those events belongs to an event group, which can be activated separately. In the Event Log Settings you can choose how many log entries are shown on each page. Further[...]
-
Página 36
Section 5 IP Access Configuration & Operation 70 5.7.6. Maintenance Device Information This section contains a summary showing various information about the U8/16-IP and its current firmware. It also allows you to reset the unit. View the data file for support Allows you to download the U8/16-IP data file with sp ecific support inform ation. Th[...]
-
Página 37
Section 5 IP Access Configuration & Operation 72 A new firmware update is a binary file w hich can be sent to you by email o r which you can download from our website www.lindy.com . Updating the firmware is a four stage process: 1. The new firmware file is uploaded to the U8/16-IP. In order to do this you need to select the file on your local [...]
-
Página 38
Troubleshooting 74 Troubleshooting If none of the LED displays on the KVM Switch are illuminated, please check that the power adapter is connected and switched on at the mains. Before you check any further please make sure that all cables are well connected! KVM Switch Troubleshooting If the KVM Switch reacts to keyboard input from the SCROLL LOCK [...]
-
Página 39
Technical Information 76 Key Codes This table shows the key codes used to defines k eystrokes or hotkeys for several functions. Please note that these key codes do not nec essarily re present key characters that are used on international keyboards. They name a key on a standard 104 key PC keyboard with US English language mapping. 0 - 9 A - Z , TIL[...]
-
Página 40
Technical Information 78 Video Modes The table below lists the video modes that t he U8/16-IP remote console s upports. Please do not use any other custom video settings; the U8/16-IP may not be able to detect them. Resolution (x, y) Refresh Rates (Hz) 640 x 350 70, 85 640 x 400 56, 70, 85 640 x 480 60, 67, 72, 75, 85, 90, 100, 120 720 x 400 70, 85[...]