Go to page of
Similar user manuals
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Lindy 32531, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Lindy 32531 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Lindy 32531. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Lindy 32531 should contain:
- informations concerning technical data of Lindy 32531
- name of the manufacturer and a year of construction of the Lindy 32531 item
- rules of operation, control and maintenance of the Lindy 32531 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Lindy 32531 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Lindy 32531, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Lindy service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Lindy 32531.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Lindy 32531 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
© LINDY ELECTRONICS LIMITED & LINDY-ELEKTRONIK GMBH - FIRST EDITION (NOV 2007) U8/16-Mo dular KV M Switch with modu les: Cat.5 Ext ender an d IP Acce ss Modules User Manual English LINDY No. 32530, 32531 www.lindy.com For Commercial Use Only Tested to comply with FCC Standards 1 The modular LINDY KVM Switch series U8/16 The U8/16 KVM switch se[...]
-
Page 2
2 Contents Section 1 .................................................................................. 3 1.1 About the U 8/16 concept ................................................................... 4 1.2 U8/16-Modu lar IP Access module: U8/16-IP ..................................... 4 1.3 U8/16-Modular with Cat.5 Access module: U8/16-C5 ......[...]
-
Page 3
Section 1 Introducing the U8/16-IP 4 1.1. About the U8/16 concept The U8/16 series KVM switch supports traditional PS/2 mouse and keyboard connections as well as modern USB connections. The U8/16 series supports the following computer platforms, PC, Mac and SUN. Combined KVM cables are used to connect the servers to the KVM switch’s computer port[...]
-
Page 4
Section 1 Introducing the U8/16-IP 6 1.5. Product Features 8/16 port KVM switch in a 1U, 19” rackmount size design Built-in daisy chain port allows daisy chaining of up to 8 LINDY KVM switches U or P series to be connected to support up to 128 computers Local console operation plus optional KVM over IP or KVM over Cat.5 control Re[...]
-
Page 5
8 Section 2 Hardware Installation Section 2 Hardware Installation 9 2.1. Product Information & Connection Guide Make your connections to the switch as detailed below. Ensure all devices are switched of f before connecting. Once all connections have been made, power on the switch, your monitor, and then the connected computers in that order. Opt[...]
-
Page 6
Section 2 Hardware Installation 10 2.2. Rackmount Installation Before you start installation please verify that all parts are included according to the package contents. If you want to install the KVM Switch in a 19” server rack please attach the enclosed 19” rackmount brackets using the screws provided. 2.3. Cascading / Daisy Chaining of multi[...]
-
Page 7
12 Section 3 KVM Switch Operation Section 3 KVM Switch Operation 13 3.1. KVM Switch Operation 3.1.1. Password Security When you power on the U8/16 it will ask you for a user name and a password. The default user name and default password for both is eight zeros –“00000000” . Please key in eight zeros in the password field. You may use the “[...]
-
Page 8
Section 3 KVM Switch Operation 14 3.1.3. Computer / Port Selecti on You can select the computer you want to access in one of three different ways: Front panel push button selection Keyboard hotkey selection On screen display menu selection 3.1.4. Port LED Display The front panel of the switch has two LEDs for each port. When the LED lab[...]
-
Page 9
Section 3 KVM Switch Operation 16 KVM Switch / Bank Selection: The U8/16 supports daisy chaining of up to 8 KVM Switches (Banks). Therefore, when using direct hotkey port selection you must include the key sequence for the KVM Switch/Bank: + + + Example: T o access a computer attache d to Port 6 of the first KVM Switch you should press the followin[...]
-
Page 10
Section 3 KVM Switch Operation 18 The OSD Menu displays further OSD configuration menus when selecting F1 from the main OSD menu. From the F1 Menu further submenus can be selected to configure the switch settings. In the submenus you can either use the cursor up/down keys or the mouse for navigation or simply press the number of the further option [...]
-
Page 11
Section 4 CAT. 5 Extender Access & Operation 20 4.1. Cat.5 KVM Extender Features The modular KVM switch U8/16 offers the option to use it with or without a remote console access module. This module may either be a Cat.5 Extender or IP Access solution. The Cat.5 Extender solution provides real time KVM access via a dedicated Cat5e/6 cable with a[...]
-
Page 12
22 Section 5 IP Access Configuration & Operation Section 5 IP Access Configuration & Operation 23 5.0.1. KVM over IP Access Features The IP access module provides remote KVM over IP access to the KVM switch U8/16. It converts all keyboard video and mouse signals and sends them as TCP/IP signals over your LAN/WAN connection. The KVM switch U[...]
-
Page 13
Section 5 IP Access Configuration & Operation 24 5.1. Configuration The U8/16-IP’s comm unication interfaces are all based on TCP/IP. The switch comes pre-configured with the following IP configuration shown here: If this initial configuration does not meet your requirements, the following sec tion describes the configuration that is necessar[...]
-
Page 14
Section 5 IP Access Configuration & Operation 26 Authentication To adjust the authentication settings, enter your login as a super user and change your password. Super user login Enter the login name of the super user . The initial value is "super" . All of the characters ar e lower case. Super user password Enter the current password[...]
-
Page 15
Section 5 IP Access Configuration & Operation 28 Host System Mouse Settings The host' s operating system obtains various settings from the mouse driver. Special Mouse Driver There are mouse drivers which influence the synchronization process and lead to desynchronized m ouse point ers. I f t his happens, make sure yo u do not use a speci a[...]
-
Page 16
Section 5 IP Access Configuration & Operation 30 5.4. Usage Prerequisites The U8/16-IP f eatures an embedded operating system offering a variety of standardized interfaces. This section wi ll describe t hese interfaces, and the way to use them in a more detailed manner. The interfaces are accessed using the TCP/IP protocol family. The following[...]
-
Page 17
Section 5 IP Access Configuration & Operation 32 5.6. Navigation Once logged into the U8/16-IP successfully, the main page appears. This page consists of three parts; each of them contains specific information. The buttons in the upper ar ea allow you to navigate within the front end. The lower left area contains a navigation bar and allows you[...]
-
Page 18
Section 5 IP Access Configuration & Operation 34 Note: Your local keyboard changes its keyboard layout according to the remote host system. If you use a German administration system and your host system uses a US English k eyboard layout for instance, some special keys on the German keyboard will not work as expected. Instead, the keys wil l re[...]
-
Page 19
Section 5 IP Access Configuration & Operation 36 Video Settings through the remote console: Brightness Controls the brightness of the picture Contrast Controls the contrast of the picture Clock Defines the horizontal frequency for a video line and depend s on the vi deo mode. Different video card types may require different values here. The def[...]
-
Page 20
Section 5 IP Access Configuration & Operation 38 Remote Console Status Line Status line Shows both console and the connection st ate. The size of the remote screen is displayed. The example below was taken from a Remote Console with a resolution of 1024 x 768 pixels. The value in brackets describes the connection to the Remote Console. Norm mea[...]
-
Page 21
Section 5 IP Access Configuration & Operation 40 Telnet Console The U8/16-IP firmware features a Telnet server that enables a user to connect via a standard Telnet client . If the Telnet program is using a VT 100, VT 102 or VT 220 terminal or appr opriate emulation, it is even possible to perform a console re direction, as long as t he U8/16-IP[...]
-
Page 22
Section 5 IP Access Configuration & Operation 42 5.7.2 . Virtual Media One of the computers connected to the U8/16-IP can also be set up for rem ote mass storage via a USB connection. Files can be uploaded t o the switch, which the host computer ‘sees’ as virtual drives. This means the r emote operator can remotely install software, drivers[...]
-
Page 23
Section 5 IP Access Configuration & Operation 44 Create a CD-ROM/ISO Image Follow t he procedure below to create a CD-ROM image which can be accessed by the host system via the U8/16-IP. The image file must be an ISO file format! First, on your client PC you must create an image of your CD which can be accessed by the host system. UNIX and UNIX[...]
-
Page 24
Section 5 IP Access Configuration & Operation 46 7. You will see the dialog below detailing the active image: 8. Click Reactivate . Access the console window and you will see that another CD drive has been installed on the host computer. This is the virtual drive you have just set up. You can access the uploaded CD image as though it were a reg[...]
-
Page 25
Section 5 IP Access Configuration & Operation 48 2. Click on the Search for new devices icon - The U8/16-IP will be detected as an Unconfigured device and its MAC address will be displayed in the left panel. Double click on the MAC address to launch the Device Configuration Wizard . 3. Follow the on-screen instructions. You will be asked t o in[...]
-
Page 26
Section 5 IP Access Configuration & Operation 50 5.7.3. User Management Change Password To change your password, enter the new password in the upper entry field. Retype the password in the lower field. Click Apply to submit your changes. Section 5 IP Access Configuration & Operation 51 Users And Groups The U8/16-IP comes with 2 pre-configur[...]
-
Page 27
Section 5 IP Access Configuration & Operation 52 5.7.4. KVM Settings User Console The following settings are user specific. This means the sup er user can customize these settings for individual users separately. Changing the settings for one user does not affect the settings for the other users. User select Unit This box displays t he user ID [...]
-
Page 28
Section 5 IP Access Configuration & Operation 54 Sun Microsystems Java Browser Plug-in Instructs the web browser of your administration system to use Sun’s JVM. The JVM in the browser is used to run the code for t he Remote Console window which is actually a Java Applet. If you check t his box for the first time on y our administratio n syste[...]
-
Page 29
Section 5 IP Access Configuration & Operation 56 USB Mouse Type Enables USB mouse type. Choose between MS Windows 2000 or new er for MS Windows 2000 or Windows XP, or Other Operating Systems for MS Windows NT, Linux, or OS X. In MS Windows 2000 or newer mod e the remote mouse is always synchronized with the local mouse. Mouse Speed Auto mou[...]
-
Page 30
Section 5 IP Access Configuration & Operation 58 IP auto configuration With this option you can control if the U8/16-IP should obtain its network settings from a DHCP or BOOTP ser ver. For DHCP, select dhcp , and for BOOTP select bootp . If you choose none then IP auto configuration is disabled. IP address IP address in the usual dot notation. [...]
-
Page 31
Section 5 IP Access Configuration & Operation 60 Note: The U8/16-IP has its own independent real time clock. Make sure the time setting of the U8/16-IP switch is correct. (See the Section called Date and Time on page 63) Enable Dynamic DNS Enables the Dynamic DNS service. This requires a configured DNS server IP address. Dynamic DNS server This[...]
-
Page 32
Section 5 IP Access Configuration & Operation 62 Certificate The U8/16-I P uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. During the conn ection establishment the U8/16-IP has to expose its identity to a client using a cryptographic certificate. This certificate and the under[...]
-
Page 33
Section 5 IP Access Configuration & Operation 64 Confirm Challenge Password Confirmation of the Challenge Password Email The email address of a contact person that is responsible for the U8/16-IP and its security. Key length This is the length of t he generat ed key in bits. 1024 bits are sufficient for most cases. Longer keys may result in slo[...]
-
Page 34
Section 5 IP Access Configuration & Operation 66 Modem Init String The initialization string used by the U8/16-I P to initialize the modem. The default value will work with all modern standard modems directly connected to a t elephone line. In case you have a special mode m or the modem is co nnected to a local telephone switch that require[...]
-
Page 35
Section 5 IP Access Configuration & Operation 68 Event Log Important events like a login failure or a firmware update are logged to a selection o f logging destinations. Each of those events belongs to an event group, which can be activated separately. In the Event Log Settings you can choose how many log entries are shown on each page. Further[...]
-
Page 36
Section 5 IP Access Configuration & Operation 70 5.7.6. Maintenance Device Information This section contains a summary showing various information about the U8/16-IP and its current firmware. It also allows you to reset the unit. View the data file for support Allows you to download the U8/16-IP data file with sp ecific support inform ation. Th[...]
-
Page 37
Section 5 IP Access Configuration & Operation 72 A new firmware update is a binary file w hich can be sent to you by email o r which you can download from our website www.lindy.com . Updating the firmware is a four stage process: 1. The new firmware file is uploaded to the U8/16-IP. In order to do this you need to select the file on your local [...]
-
Page 38
Troubleshooting 74 Troubleshooting If none of the LED displays on the KVM Switch are illuminated, please check that the power adapter is connected and switched on at the mains. Before you check any further please make sure that all cables are well connected! KVM Switch Troubleshooting If the KVM Switch reacts to keyboard input from the SCROLL LOCK [...]
-
Page 39
Technical Information 76 Key Codes This table shows the key codes used to defines k eystrokes or hotkeys for several functions. Please note that these key codes do not nec essarily re present key characters that are used on international keyboards. They name a key on a standard 104 key PC keyboard with US English language mapping. 0 - 9 A - Z , TIL[...]
-
Page 40
Technical Information 78 Video Modes The table below lists the video modes that t he U8/16-IP remote console s upports. Please do not use any other custom video settings; the U8/16-IP may not be able to detect them. Resolution (x, y) Refresh Rates (Hz) 640 x 350 70, 85 640 x 400 56, 70, 85 640 x 480 60, 67, 72, 75, 85, 90, 100, 120 720 x 400 70, 85[...]