IBM 17352GX User Guide - Page 47

Connecting to target devices, Session sharing options, Automatic Sharing, Exclusive Connections

Page 47 highlights

Chapter 3: Using the Web Interface 31 Connecting to target devices When the Connections tab is clicked, the window displays a list of target devices that are directly connected and daisy chained to the GCM2 or GCM4 appliance and that are connected or daisy chained to any cascade device. A user creates a KVM session by clicking on the name of a target device. Session sharing options Session sharing can be configured by Admin and other users with Appliance Administrator or User Administrator rights. The first user with a KVM session with a target device is called the primary user. If another (secondary) user attempts to start a KVM session the same target device, options for the secondary user depend on the following two conditions: • The access rights of the users • Whether an administrator has configured global connection sharing Automatic Sharing, Exclusive Connections, and Stealth Connections all are configurable options that require Sharing to be enabled. Table 3.2: Session sharing definitions Term Definition Automatic Sharing Secondary users can share a KVM session without first requesting permission from primary users. Exclusive Connections Primary users can designate a KVM session as an exclusive connection that cannot be shared. Stealth Connections Stealth connections allow undetected viewing of KVM sessions. Secondary users with Appliance Administrator rights can create stealth connections to any KVM session. Secondary users with User Administrator rights can create stealth connections when their access rights are the same as or higher than the rights of the primary user. Stealth permissions follow preemption permissions. Preempt mode Secondary users with Appliance Administrator rights can preempt sessions. Secondary users with User Administrator rights can preempt sessions only when their access rights are the same as or higher than the rights of the primary user. For more information about access rights and session types, see "Configuring users and user access rights" on page 39. To connect to target devices using the Web interface, complete the following steps: 1. Log into the Web interface as any user configured for access to one or more target devices. The Web interface appears with the Connections tab active. 2. Click the name of a target device. A Video Session Viewer information dialog briefly appears followed by a status dialog.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136

Chapter 3: Using the Web Interface
31
Connecting to target devices
When the
Connections
tab is clicked, the window displays a list of target devices that are directly
connected and daisy chained to the GCM2 or GCM4 appliance and that are connected or daisy
chained to any cascade device. A user creates a KVM session by clicking on the name of a target
device.
Session sharing options
Session sharing can be configured by Admin and other users with Appliance Administrator or User
Administrator rights. The first user with a KVM session with a target device is called the primary
user. If another (secondary) user attempts to start a KVM session the same target device, options
for the secondary user depend on the following two conditions:
The access rights of the users
Whether an administrator has configured global connection sharing
Automatic Sharing, Exclusive Connections, and Stealth Connections all are configurable
options that require Sharing to be enabled.
For more information about access rights and session types, see "Configuring users and user access
rights" on page 39.
To connect to target devices using the Web interface, complete the following steps:
1.
Log into the Web interface as any user configured for access to one or more target devices. The
Web interface appears with the
Connections
tab active.
2.
Click the name of a target device. A Video Session Viewer information dialog briefly appears
followed by a status dialog.
Table 3.2: Session sharing definitions
Term
Definition
Automatic Sharing
Secondary users can share a KVM session without first requesting permission from
primary users.
Exclusive Connections
Primary users can designate a KVM session as an exclusive connection that cannot
be shared.
Stealth Connections
Stealth connections allow undetected viewing of KVM sessions. Secondary users
with Appliance Administrator rights can create stealth connections to any KVM
session. Secondary users with User Administrator rights can create stealth
connections when their access rights are the same as or higher than the rights of
the primary user. Stealth permissions follow preemption permissions.
Preempt mode
Secondary users with Appliance Administrator rights can preempt sessions.
Secondary users with User Administrator rights can preempt sessions only when
their access rights are the same as or higher than the rights of the primary user.