
XTENSYS INSTALLATION AND OPERATIONS MANUAL
7
System security
Security is a very important concern, especially in the environments most Xtensys switches are commonly installed
in, such as data centers and server rooms. The Xtensys system can be secured with a unique configuration
password allowing only authorized personnel access to the configuration menus and the system set-up functions,
including creating and assigning users, profiles, and groups. Each user can be assigned a unique password that
controls the type of access to the connected equipment. The user access levels are view, share, control, and
private.
User profiles set to the View mode allow users to switch to any computer, but have only view privileges.
User profiles set to the Share mode allow users to take keyboard and mouse control of a computer on a first
come, first serve basis. Control of the computer is based on the time-out value.
User profiles set to the Control mode allow users to take exclusive control of a computer. No time-out value is
invoked. Other users that try to connect to the same computer can only view the video. They have no keyboard
or mouse control until the user with the control disconnects from the computer.
The Private mode is the same as the control mode except other users cannot view the video or access the
computer.
Site planning
Organizing your site and planning the placement of the computers, the User stations, the Xtensys switches, and the
routing of the cables is a key part in the installation and configuration process. Care should be taken when
connecting the computers, user stations, and the Xtensys switches. Locate the Xtensys as close as possible to the
computers so the cables are as short as possible but still give some freedom of movement. Up to a total of 1,000
feet of CAT5, CAT5e, or CAT6 industry standard cables can be used. The unique feature of Xtensys is that the
length and type of cable will be automatically compensated for and the skew (optional), equalization and gain
automatically adjusted to provide the clearest possible display with no manual adjustments.
The Xtensys switch can be rack mounted with Rose Electronics rack mount kit. Wherever the Xtensys is located, it
should be on a secure surface, free from obstructions and objects that may cause damage to the Unit or an
individual.
Following are a few items to consider prior to installing or configuring the Xtensys switch:
Determine which computer will be connected to CPU port #1, #2, #3, etc
Pre-plan the CATx cable routing
Identify which CPU ports will be connected to a serial device and configure that port for serial.
Each computer can be assigned a unique computer name. Names like staff, marketing, and finance make it easy
to identify and connect to.
The default computer names are Computer x (x = 1 – 1,000)
Access to the system set-up and configuration menus can be limited by assigning a configuration password.
Access to the computers can be limited by assigning each user a unique user ID and password and configuring
the switch to require a login.
Pre-plan the expansion cable routing for expanded systems.
Comentários a estes Manuais