Lindy 32531 manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 40 pages
- 3.24 mb
Aller à la page of
Les manuels d’utilisation similaires
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Lindy 32531. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Lindy 32531 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Lindy 32531 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Lindy 32531 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Lindy 32531
- nom du fabricant et année de fabrication Lindy 32531
- instructions d'utilisation, de réglage et d’entretien de l'équipement Lindy 32531
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Lindy 32531 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Lindy 32531 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Lindy en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Lindy 32531, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Lindy 32531, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Lindy 32531. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
© LINDY ELECTRONICS LIMITED & LINDY-ELEKTRONIK GMBH - FIRST EDITION (NOV 2007) U8/16-Mo dular KV M Switch with modu les: Cat.5 Ext ender an d IP Acce ss Modules User Manual English LINDY No. 32530, 32531 www.lindy.com For Commercial Use Only Tested to comply with FCC Standards 1 The modular LINDY KVM Switch series U8/16 The U8/16 KVM switch se[...]
-
Page 2
2 Contents Section 1 .................................................................................. 3 1.1 About the U 8/16 concept ................................................................... 4 1.2 U8/16-Modu lar IP Access module: U8/16-IP ..................................... 4 1.3 U8/16-Modular with Cat.5 Access module: U8/16-C5 ......[...]
-
Page 3
Section 1 Introducing the U8/16-IP 4 1.1. About the U8/16 concept The U8/16 series KVM switch supports traditional PS/2 mouse and keyboard connections as well as modern USB connections. The U8/16 series supports the following computer platforms, PC, Mac and SUN. Combined KVM cables are used to connect the servers to the KVM switch’s computer port[...]
-
Page 4
Section 1 Introducing the U8/16-IP 6 1.5. Product Features 8/16 port KVM switch in a 1U, 19” rackmount size design Built-in daisy chain port allows daisy chaining of up to 8 LINDY KVM switches U or P series to be connected to support up to 128 computers Local console operation plus optional KVM over IP or KVM over Cat.5 control Re[...]
-
Page 5
8 Section 2 Hardware Installation Section 2 Hardware Installation 9 2.1. Product Information & Connection Guide Make your connections to the switch as detailed below. Ensure all devices are switched of f before connecting. Once all connections have been made, power on the switch, your monitor, and then the connected computers in that order. Opt[...]
-
Page 6
Section 2 Hardware Installation 10 2.2. Rackmount Installation Before you start installation please verify that all parts are included according to the package contents. If you want to install the KVM Switch in a 19” server rack please attach the enclosed 19” rackmount brackets using the screws provided. 2.3. Cascading / Daisy Chaining of multi[...]
-
Page 7
12 Section 3 KVM Switch Operation Section 3 KVM Switch Operation 13 3.1. KVM Switch Operation 3.1.1. Password Security When you power on the U8/16 it will ask you for a user name and a password. The default user name and default password for both is eight zeros –“00000000” . Please key in eight zeros in the password field. You may use the “[...]
-
Page 8
Section 3 KVM Switch Operation 14 3.1.3. Computer / Port Selecti on You can select the computer you want to access in one of three different ways: Front panel push button selection Keyboard hotkey selection On screen display menu selection 3.1.4. Port LED Display The front panel of the switch has two LEDs for each port. When the LED lab[...]
-
Page 9
Section 3 KVM Switch Operation 16 KVM Switch / Bank Selection: The U8/16 supports daisy chaining of up to 8 KVM Switches (Banks). Therefore, when using direct hotkey port selection you must include the key sequence for the KVM Switch/Bank: + + + Example: T o access a computer attache d to Port 6 of the first KVM Switch you should press the followin[...]
-
Page 10
Section 3 KVM Switch Operation 18 The OSD Menu displays further OSD configuration menus when selecting F1 from the main OSD menu. From the F1 Menu further submenus can be selected to configure the switch settings. In the submenus you can either use the cursor up/down keys or the mouse for navigation or simply press the number of the further option [...]
-
Page 11
Section 4 CAT. 5 Extender Access & Operation 20 4.1. Cat.5 KVM Extender Features The modular KVM switch U8/16 offers the option to use it with or without a remote console access module. This module may either be a Cat.5 Extender or IP Access solution. The Cat.5 Extender solution provides real time KVM access via a dedicated Cat5e/6 cable with a[...]
-
Page 12
22 Section 5 IP Access Configuration & Operation Section 5 IP Access Configuration & Operation 23 5.0.1. KVM over IP Access Features The IP access module provides remote KVM over IP access to the KVM switch U8/16. It converts all keyboard video and mouse signals and sends them as TCP/IP signals over your LAN/WAN connection. The KVM switch U[...]
-
Page 13
Section 5 IP Access Configuration & Operation 24 5.1. Configuration The U8/16-IP’s comm unication interfaces are all based on TCP/IP. The switch comes pre-configured with the following IP configuration shown here: If this initial configuration does not meet your requirements, the following sec tion describes the configuration that is necessar[...]
-
Page 14
Section 5 IP Access Configuration & Operation 26 Authentication To adjust the authentication settings, enter your login as a super user and change your password. Super user login Enter the login name of the super user . The initial value is "super" . All of the characters ar e lower case. Super user password Enter the current password[...]
-
Page 15
Section 5 IP Access Configuration & Operation 28 Host System Mouse Settings The host' s operating system obtains various settings from the mouse driver. Special Mouse Driver There are mouse drivers which influence the synchronization process and lead to desynchronized m ouse point ers. I f t his happens, make sure yo u do not use a speci a[...]
-
Page 16
Section 5 IP Access Configuration & Operation 30 5.4. Usage Prerequisites The U8/16-IP f eatures an embedded operating system offering a variety of standardized interfaces. This section wi ll describe t hese interfaces, and the way to use them in a more detailed manner. The interfaces are accessed using the TCP/IP protocol family. The following[...]
-
Page 17
Section 5 IP Access Configuration & Operation 32 5.6. Navigation Once logged into the U8/16-IP successfully, the main page appears. This page consists of three parts; each of them contains specific information. The buttons in the upper ar ea allow you to navigate within the front end. The lower left area contains a navigation bar and allows you[...]
-
Page 18
Section 5 IP Access Configuration & Operation 34 Note: Your local keyboard changes its keyboard layout according to the remote host system. If you use a German administration system and your host system uses a US English k eyboard layout for instance, some special keys on the German keyboard will not work as expected. Instead, the keys wil l re[...]
-
Page 19
Section 5 IP Access Configuration & Operation 36 Video Settings through the remote console: Brightness Controls the brightness of the picture Contrast Controls the contrast of the picture Clock Defines the horizontal frequency for a video line and depend s on the vi deo mode. Different video card types may require different values here. The def[...]
-
Page 20
Section 5 IP Access Configuration & Operation 38 Remote Console Status Line Status line Shows both console and the connection st ate. The size of the remote screen is displayed. The example below was taken from a Remote Console with a resolution of 1024 x 768 pixels. The value in brackets describes the connection to the Remote Console. Norm mea[...]
-
Page 21
Section 5 IP Access Configuration & Operation 40 Telnet Console The U8/16-IP firmware features a Telnet server that enables a user to connect via a standard Telnet client . If the Telnet program is using a VT 100, VT 102 or VT 220 terminal or appr opriate emulation, it is even possible to perform a console re direction, as long as t he U8/16-IP[...]
-
Page 22
Section 5 IP Access Configuration & Operation 42 5.7.2 . Virtual Media One of the computers connected to the U8/16-IP can also be set up for rem ote mass storage via a USB connection. Files can be uploaded t o the switch, which the host computer ‘sees’ as virtual drives. This means the r emote operator can remotely install software, drivers[...]
-
Page 23
Section 5 IP Access Configuration & Operation 44 Create a CD-ROM/ISO Image Follow t he procedure below to create a CD-ROM image which can be accessed by the host system via the U8/16-IP. The image file must be an ISO file format! First, on your client PC you must create an image of your CD which can be accessed by the host system. UNIX and UNIX[...]
-
Page 24
Section 5 IP Access Configuration & Operation 46 7. You will see the dialog below detailing the active image: 8. Click Reactivate . Access the console window and you will see that another CD drive has been installed on the host computer. This is the virtual drive you have just set up. You can access the uploaded CD image as though it were a reg[...]
-
Page 25
Section 5 IP Access Configuration & Operation 48 2. Click on the Search for new devices icon - The U8/16-IP will be detected as an Unconfigured device and its MAC address will be displayed in the left panel. Double click on the MAC address to launch the Device Configuration Wizard . 3. Follow the on-screen instructions. You will be asked t o in[...]
-
Page 26
Section 5 IP Access Configuration & Operation 50 5.7.3. User Management Change Password To change your password, enter the new password in the upper entry field. Retype the password in the lower field. Click Apply to submit your changes. Section 5 IP Access Configuration & Operation 51 Users And Groups The U8/16-IP comes with 2 pre-configur[...]
-
Page 27
Section 5 IP Access Configuration & Operation 52 5.7.4. KVM Settings User Console The following settings are user specific. This means the sup er user can customize these settings for individual users separately. Changing the settings for one user does not affect the settings for the other users. User select Unit This box displays t he user ID [...]
-
Page 28
Section 5 IP Access Configuration & Operation 54 Sun Microsystems Java Browser Plug-in Instructs the web browser of your administration system to use Sun’s JVM. The JVM in the browser is used to run the code for t he Remote Console window which is actually a Java Applet. If you check t his box for the first time on y our administratio n syste[...]
-
Page 29
Section 5 IP Access Configuration & Operation 56 USB Mouse Type Enables USB mouse type. Choose between MS Windows 2000 or new er for MS Windows 2000 or Windows XP, or Other Operating Systems for MS Windows NT, Linux, or OS X. In MS Windows 2000 or newer mod e the remote mouse is always synchronized with the local mouse. Mouse Speed Auto mou[...]
-
Page 30
Section 5 IP Access Configuration & Operation 58 IP auto configuration With this option you can control if the U8/16-IP should obtain its network settings from a DHCP or BOOTP ser ver. For DHCP, select dhcp , and for BOOTP select bootp . If you choose none then IP auto configuration is disabled. IP address IP address in the usual dot notation. [...]
-
Page 31
Section 5 IP Access Configuration & Operation 60 Note: The U8/16-IP has its own independent real time clock. Make sure the time setting of the U8/16-IP switch is correct. (See the Section called Date and Time on page 63) Enable Dynamic DNS Enables the Dynamic DNS service. This requires a configured DNS server IP address. Dynamic DNS server This[...]
-
Page 32
Section 5 IP Access Configuration & Operation 62 Certificate The U8/16-I P uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. During the conn ection establishment the U8/16-IP has to expose its identity to a client using a cryptographic certificate. This certificate and the under[...]
-
Page 33
Section 5 IP Access Configuration & Operation 64 Confirm Challenge Password Confirmation of the Challenge Password Email The email address of a contact person that is responsible for the U8/16-IP and its security. Key length This is the length of t he generat ed key in bits. 1024 bits are sufficient for most cases. Longer keys may result in slo[...]
-
Page 34
Section 5 IP Access Configuration & Operation 66 Modem Init String The initialization string used by the U8/16-I P to initialize the modem. The default value will work with all modern standard modems directly connected to a t elephone line. In case you have a special mode m or the modem is co nnected to a local telephone switch that require[...]
-
Page 35
Section 5 IP Access Configuration & Operation 68 Event Log Important events like a login failure or a firmware update are logged to a selection o f logging destinations. Each of those events belongs to an event group, which can be activated separately. In the Event Log Settings you can choose how many log entries are shown on each page. Further[...]
-
Page 36
Section 5 IP Access Configuration & Operation 70 5.7.6. Maintenance Device Information This section contains a summary showing various information about the U8/16-IP and its current firmware. It also allows you to reset the unit. View the data file for support Allows you to download the U8/16-IP data file with sp ecific support inform ation. Th[...]
-
Page 37
Section 5 IP Access Configuration & Operation 72 A new firmware update is a binary file w hich can be sent to you by email o r which you can download from our website www.lindy.com . Updating the firmware is a four stage process: 1. The new firmware file is uploaded to the U8/16-IP. In order to do this you need to select the file on your local [...]
-
Page 38
Troubleshooting 74 Troubleshooting If none of the LED displays on the KVM Switch are illuminated, please check that the power adapter is connected and switched on at the mains. Before you check any further please make sure that all cables are well connected! KVM Switch Troubleshooting If the KVM Switch reacts to keyboard input from the SCROLL LOCK [...]
-
Page 39
Technical Information 76 Key Codes This table shows the key codes used to defines k eystrokes or hotkeys for several functions. Please note that these key codes do not nec essarily re present key characters that are used on international keyboards. They name a key on a standard 104 key PC keyboard with US English language mapping. 0 - 9 A - Z , TIL[...]
-
Page 40
Technical Information 78 Video Modes The table below lists the video modes that t he U8/16-IP remote console s upports. Please do not use any other custom video settings; the U8/16-IP may not be able to detect them. Resolution (x, y) Refresh Rates (Hz) 640 x 350 70, 85 640 x 400 56, 70, 85 640 x 480 60, 67, 72, 75, 85, 90, 100, 120 720 x 400 70, 85[...]