Intel P4304BT User Guide - Page 20
Intel, RMM4 Features, Supported Operating Systems and Internet Browsers
View all Intel P4304BT manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 20 highlights
Intel® Remote Management Module 4 Overview Intel® Remote Management Module 4 and Integrated BMC Web Console User Guide Figure 2: Intel® Dedicated Server Management NIC 2.2 Intel® RMM4 Features The Intel® RMM4 add-on offers convenient, remote KVM access and control through LAN or Internet. It captures, digitizes, and compresses video and transmits it with keyboard and mouse signals to and from a remote computer. Remote access and control software runs in the Integrated Baseboard Management Controller, utilizing expanded capabilities enabled by the Intel® RMM4 hardware. Key features of the Intel® RMM4 add-on card are: KVM redirection from either the RMM4 NIC or the baseboard NIC used for management traffic; up to two simultaneous KVM sessions. Media redirection - The media redirection feature is intended to allow system administrators or users to mount a remote IDE or USB CD-ROM, floppy drive, or a USB flash disk as a remote device to the server. Once mounted, the remote device appears just like a local device to the server, allowing system administrators or users to install software (including operating systems), copy files, update BIOS, and so on, or boot the server from this device. KVM - Automatically senses video resolution for best possible screen capture, highperformance mouse tracking and synchronization. It allows remote viewing and configuration in pre-boot POST and BIOS setup. 2.3 Supported Operating Systems and Internet Browsers The Intel® RMM4 enabled features run independent of the host operating system on the server where it is installed except during Remote Console (KVM) connections. During Remote Console connections the Keyboard, Mouse and Video of the console system operate just as if you were at the server where the Intel® RMM4 is connected. During Remote Console connections, the interaction with the host operating system limits the support to operating systems that have been validated. Those operating systems are listed in the following sub sections. 8 Revision 2.4