IBM 17352GX User Guide - Page 47
Connecting to target devices, Session sharing options, Automatic Sharing, Exclusive Connections
View all IBM 17352GX manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 47 highlights
Chapter 3: Using the Web Interface 31 Connecting to target devices When the Connections tab is clicked, the window displays a list of target devices that are directly connected and daisy chained to the GCM2 or GCM4 appliance and that are connected or daisy chained to any cascade device. A user creates a KVM session by clicking on the name of a target device. Session sharing options Session sharing can be configured by Admin and other users with Appliance Administrator or User Administrator rights. The first user with a KVM session with a target device is called the primary user. If another (secondary) user attempts to start a KVM session the same target device, options for the secondary user depend on the following two conditions: • The access rights of the users • Whether an administrator has configured global connection sharing Automatic Sharing, Exclusive Connections, and Stealth Connections all are configurable options that require Sharing to be enabled. Table 3.2: Session sharing definitions Term Definition Automatic Sharing Secondary users can share a KVM session without first requesting permission from primary users. Exclusive Connections Primary users can designate a KVM session as an exclusive connection that cannot be shared. Stealth Connections Stealth connections allow undetected viewing of KVM sessions. Secondary users with Appliance Administrator rights can create stealth connections to any KVM session. Secondary users with User Administrator rights can create stealth connections when their access rights are the same as or higher than the rights of the primary user. Stealth permissions follow preemption permissions. Preempt mode Secondary users with Appliance Administrator rights can preempt sessions. Secondary users with User Administrator rights can preempt sessions only when their access rights are the same as or higher than the rights of the primary user. For more information about access rights and session types, see "Configuring users and user access rights" on page 39. To connect to target devices using the Web interface, complete the following steps: 1. Log into the Web interface as any user configured for access to one or more target devices. The Web interface appears with the Connections tab active. 2. Click the name of a target device. A Video Session Viewer information dialog briefly appears followed by a status dialog.