This User Guide provides installation and operation instructions for the AccessIT
Manager system produced by Minicom Advanced Systems. It is intended for
system administrators and network managers, and assumes that readers have
general understanding of networks, LDAP, hardware and software.
All information in this User Guide is subject to change without prior notice.
User Guide Feedback
Your feedback is very important to help us improve our documentation. Please
email any comments to: ug.comments@minicom.com
Please include the following information: Guide name, part number and version
number (as appears on the front cover).
AccessIT is an appliance based application that provides IT staff with secure and
centralized management of all remote access services in the organization. It
operates in both Windows and Linux environments and is accessible from Internet
Explorer and Firefox.
AccessIT is a web-based management solution that consolidates in-band and outof-band remote access services onto one user-friendly web portal. It provides a
unified point and click view of all IT assets together with their assigned remote
access services. AccessIT is a single sign-in solution making it simple and easy for
IT staff to enter the system regardless of their location at any given moment.
AccessIT manages remote access to up to 250 mission-critical IT and network
devices of the business whether they are inside the server room or distributed
around the organization or branch offices. These can include: servers, virtual
servers, IP-enabled KVM switches, routers, firewalls, serial console servers,
network switches, printers, power distribution units (PDUs), environmental devices
(sensors), surveillance IP cameras and more.
AccessIT provides unique seamless (one-click) access to IT assets through a select,
predefined list of Access Services™ that include: RDP, VNC, VMware ESX
Server, VMware Server 1x and 2x, SSH, Telnet, HP iLO and KVM (Minicom or
3rd party). You can also customize any other remote access method in a few simple
steps.
1.1 Key features
IT Management - AccessIT centralizes the management of all devices,
authentication and global operation from a Web browser. The local administrator
can monitor, control and manage the various devices, user accounts and
authorization from one Web interface.
Automatic Discovery - Minicom IP devices are discovered automatically by the
AccessIT Manager.
Access Services - Connect to a variety of both hardware and software external
resources such as: ILO, RDP, SSH, VNC and web pages etc, from the AccessIT
interface.
Security - AccessIT provides a secure environment, adhering to the most stringent
industry standards.
Availability - Maximizes uptime by centralizing management and allowing
immediate and effective maintenance.
7
AccessIT
Virtual Media - Virtual Media is a very useful tool for those who need to manage
large numbers of computers such as commercial IT data center managers. A Target
computer can be made to boot to one of many virtual disks that can perform any
variety of tasks such as virus scans of the Target’s physical drive or patch
management or even complete installation of the operating system on a Target
computer.
1.2 System components
The AccessIT Manager system comes with the following:
· AccessIT Manager appliance
· Rack mounting kit
1.3 Terminology
Below are some terms and their meanings used in this guide.
Term Meaning
Targets Computers/servers and other services e.g. printers, firewalls, PDUs etc. that
Client computer
Remote session The process of accessing and controlling Targets connected to a KVM/IP
are accessed remotely via the AccessIT.
The PC running a remote AccessIT session
device from a Client computer
8
USER GUIDE
1.4 System diagram
The diagram below gives a brief outline of the AccessIT system setup. Section 3 on
page 12 explains the system setup in more detail.
AccessIT
Users login to AccessIT and choose
their preferred method of accessing
their server
DXUIP II
Smart 216/32IP
SmartRack 116IP
Smart 116 IP
PX
IP Control
3.3V/2A
KVM In
Serial
Go LocalPower
IPCONTROL
LAN
Minicom IP Solutions
Seamless Management & Access
AccessIT Manager
KVM.net
LAN / WAN / VPN
VMware Server
SSH
Telnet
VNC
Remote Desktop
Applications
Applications
Hardware
Built-in Access Services
Seamless/Integrated Access
Figure 1 System diagram
HP ILO
PowerEdge
1950
Virtual Machines
Power Distr. Units
Terminal Access
Client/Server Apps
Third Party IP devices
16IP/IPLink/MXIP
www.mi n i com.com
COMPUTER
10 11 12 13 14 15 169
POWER
100-250 VAC 50/60 Hz
1 2 3 4 5 6 7 8
Custom Defined Access Services
Integrated or non-Integrated Access
ISDN
SERIAL 1 SERIAL 2
ETHERNET
9
AccessIT
2. Pre-installation guidelines
Prepare a list of all AccessIT system components. You will need this information
to configure the system.
Appendix A on page 134 contains 2 lists of the details you need to prepare for
Minicom KVM/IP devices and PX units (not PX Serial). Photocopy or print out
Appendix A. For other access services see section 2.1 below.
The lists should include the IP device name and MAC address, KVM switch and
the Target details.
For each Target, list:
· A unique and clearly identifiable name
· The operating system
· Non-default mouse settings. Default mouse settings do not need to be
listed
Note! For Windows XP and later
(Relevant to all IP devices except PX USB)
For Windows XP and later deactivate Enhanced pointer precision. To do so:
From the Control Panel select Printers and Other Hardware. Click the Mouse
icon. The Mouse Properties box appears. See Figure 2. Select the Pointer Options
tab.
Figure 2 Pointer tab
The Motion section slider bar must be in the center, and the Enhanced pointer
precision checkbox must be unchecked. Click OK to save changes.
10
USER GUIDE
2.1 Access services details
Besides the Minicom KVM/IP devices mentioned above, you can connect to
Targets via the following Access services through AccessIT:
· Minicom’s PX Serial
· Web
· ILO
· RDP
· SSH
· VNC
· Telnet
· VMware Server
These services are elaborated on in the section 3.6.
All service applications must be installed on the local (client) computers.
See section 10.3 on page 55 which sets out the details required for each of the
above Access service.
2.1.1 Adding user defined Access services
You can also add your own access services, explained on page 65.
11
AccessIT
3. Understanding the system – an overview
The figure below shows a typical AccessIT application.
Figure 3 AccessIT typical application
The system works as follows:
Data centers in locations throughout the world are connected to Minicom IP
devices and to other 3rd party access services. The Minicom IP devices are
Centralized Management enabled allowing AccessIT to access/control the Targets
connected to all IP devices via IP.
Users access the AccessIT web interface and depending on their level of access
permissions can access and control the Targets.
12
USER GUIDE
3.1 Creating users
An Administrator can create users with 2 different possible permission types:
· Administrator
· User
These permission types are explained fully in section 6. In the example below 4
users are created with various permission types.
User
PhilSidDaveJon
Administrator
User
Administrator
Figure 4 Users with different permissions
Once an Administrator creates Targets or sets of Targets (explained below) in the
system, users can be assigned access to individual Targets or sets of Targets.
3.2 Forming users into Groups
You can form users into Groups. In the example below 3 users are formed into the
Finance group. Note! Groups can contain users with different levels of user
permissions.
UserAdministrator
PhilSidDaveJon
User Administrator
Finance Group
Sid
Figure 5 Forming users into groups
UserAdministrator
Administrator
DaveJon
3.3 Creating Targets
An Administrator creates Targets corresponding to the physical servers connected
to the IP devices, explained in section 7, and also to Targets corresponding to e.g.
printers, firewalls, PDUs and IDSs etc accessed via Access Services™ - see page
15. In the example below, four Targets are created and given identifying names.
They can be named by location, server type or operating system or any other
unique feature associated with that particular server.
13
AccessIT
Target servers
Dell
#1
Dell
#2
Figure 6 Created Targets
Dell
#3
Dell
#4
3.4 Forming Targets into sets
Targets can be formed into sets. You can for example create a set of all financial
servers. In the example below 3 Targets are formed into Target Set - Finance.
Target servers
Dell
#1
Dell
#2
Dell
#3
Figure 7 Forming Targets into sets
Dell
#4
Target Set - Finance
Dell#1Dell#2Dell
#3
3.5 Associating a User Group with a Target Set
You can then associate the User Group with the Target Set, thus giving access
rights to all the Targets in the Set to all members of the Group.
Finance Group
UserAdministratorAdministrator
SidDaveJon
Figure 8 User Group - Target Set association
Target Set - Finance
Dell#1Dell#2Dell
#3
In the example above the Finance Group is associated with the Target Set –
Finance.
14
USER GUIDE
This means that:
· The Finance Group has access rights to Target Set - Finance.
· Any user added to the Finance Group will automatically have access rights
to Target Set - Finance.
Note! Users can be members of many different groups. In the example below Sid
belongs to the Finance Group and also to the Marketing Group.
Marketing Group Finance Group
Administrator
SidDaveJon
ViewOnly
User
Administrator
UserAdministrator
PhilSid
Figure 9 Same user in different Groups
The Marketing Group could be associated with Targets or Target Sets that the
Finance Group is not. Sid being a member of both Groups has access to Targets
both Groups are associated with. Phil only has access to Targets associated with the
Marketing Group. Dave and Jon only have access to Targets associated with the
Finance Group.
3.6 Access services
The Access Services™ feature supports a wide range of remote access
technologies. This enables the assignment of multiple services to a single Target,
so you have the option of in-band or out-of-band access to the same device.
KVM/IP is a hardware method of accessing and controlling a Target. The other
Access Services encompass gaining remote access and control of a Target through
the internet or LAN network via Minicom’s PX Serial or 3rd party software. Both
hardware and software methods of access are managed by AccessIT.
AccessIT also enables you to effortlessly integrate any new remote access
technology into the remote access portal.
15
AccessIT
Besides the Minicom KVM/IP devices, you can connect to Targets via the
following Access services through AccessIT:
· Minicom’s PX Serial - PX Serial is a one-port RS232/422/485 to
Redundant Ethernet device server.
· Web – Browser based web service
· ILO - HP Integrated Lights-Out (iLO). HP ILO gives seamless access to
HP servers.
· RDP - Remote Desktop Protocol. RDP is a multi-channel protocol that
allows a user to connect to a computer running Microsoft Terminal Services.
· SSH - Secure Shell. SSH is a network protocol that allows data to be
exchanged using a secure channel between two computers. An SSH client
program is typically used for establishing connections to an SSH daemon.
· VNC - Virtual Network Computing. VNC is a graphical desktop sharing
system which uses the RFB protocol. VNC is platform-independent — a
VNC viewer on any operating system usually connects to a VNC server on
any other operating system. There are clients and servers for almost all GUI
operating systems.
· Telnet - TELecommunication NETwork. TELNET is a network
protocol used on the Internet or LAN connections.
· VMware Server - VMware Server is a free virtualization product for
Windows and Linux servers with enterprise-class support. It enables
companies to partition a physical server into multiple virtual machines and
to start experiencing the benefits of virtualization. VMware Server gives
seamless access to virtual machines.
16
USER GUIDE
4. Setting up the system
Set up the Minicom IP device systems according to their User Guide instructions.
In order to be managed by AccessIT, all Minicom IP devices must be configured to
be Centralized Management enabled. This is done from the Network Configuration
page of each IP device. For example, see the Centralized Management section in
Figure 10, Centralized Management is enabled by selecting the Enable Centralized Management checkbox.
Figure 10 Network Configuration page sample
Also in the Centralized Management section in Figure 10, specify how the
AccessIT Manager detects the IP device. This can be done either by:
Manager Auto Discovery – when checked, AccessIT automatically detects the IP
device if it resides on the same network segment.
Manager IP – If the IP device resides on a different segment, type the static IP
address of the AccessIT Manager. (We advise typing the static IP address of the
AccessIT Manager even if the IP device resides on the same network segment as
the AccessIT Manager).
Install 3rd party access services in all client workstations according to their own
installation and configuration instructions. See section 10.3 on page 55 for details
required for the integration of the Access services into the AccessIT system.
4.1 Connecting the AccessIT Manager
1. Connect the AccessIT Manager to the network as follows: On the rear panel
connect an Ethernet cable to LAN 1. Connect the other end of the Ethernet
cable to the network switch.
2. Connect the AccessIT Manager to a power supply outlet.
17
AccessIT
4.2 AccessIT Manager’s default IP address
Each AccessIT Manager unit comes with the following default values:
IP address - 192.168.1.250.
Subnet mask - 255.255.255.0
Gateway - 192.168.1.1
If these values are not suitable for your network, follow the steps in the section
below to display the AccessIT interface. You can then change the IP address of the
AccessIT Manager in the Network tab under Settings/Unit Maintenance, see
section 16.2 on page 106.
4.2.1 Changing the AccessIT Manager network parameters
1. Open your Web browser (Internet Explorer version 6.0 - Firefox 3 or higher
versions).
2. Type in the IP address of the AccessIT Manager (default IP address
https://192.168.1.250) and press Enter. (Change your computer network
settings, if necessary). The Login page appears.
3. Type the login name admin and password access.
4. Navigate to the Network tab under Settings/Unit Maintenance and change the
network parameters to suit your network configuration.
5. Press Save and restart the AccessIT Manager.
6. Wait for the system to restart and login with the new IP address.
18
USER GUIDE
5. Displaying the AccessIT web interface
To display the Web interface:
1. Open your Web browser (Internet Explorer version 6.0 or Firefox 3 or higher)
versions.
2. Type in the IP address of the AccessIT Manager (default IP address
https://192.168.1.250) and press Enter.
Note! The IP address must begin with https:// and not http://. The Login page
appears. Bookmark it for easy reference.
3. Type the login name and password. Default username is admin and password is
access.
4. Press Enter. The Web interface appears, see Figure 11.
To sort the devices in
alphabetical order A-Z or
Z-A, click the top of the
name column
Menu section
New devices identified
with their MAC address
Click a name to edit the
devices properties
Figure 11 Devices page
To search for a device
type name here
IP device type
Once devices are
identified by a
name they appear
here in the Devices
section
Click the arrows to show
or hide New Devices/
Devices section
Note! On first connection the AccessIT GUI prompts you to install the AccessIT
client software, see Figure 12. Click Install.
Note! In Firefox, the client plugin is installed when you navigate to the Access
section.
19
AccessIT
Figure 12 AccessIT client
5.1 Menu section
The menu section on the left, see Figure 11 is sub-divided into 3 sections:
Management, which includes the configuration pages for IP devices, PDUs, Serial
Console servers, Targets and Users/Groups.
Access, which contains access pages to all allowed Targets and Target Groups.
Settings which contains 3 configuration sections: Application, Attached Devices
and Maintenance.
This Guide explains the menu sections from the point of view of first setting up the
system and then operating it.
So the guide explains in the following order how to:
· Create Users
· Configure Targets
· Configure Devices
· Configure Other Devices
· Configure Settings
· Configure Access Services
· Access the system
· Configure Advanced settings
20
USER GUIDE
6. Creating users
There are two possible methods of inputting users into the system. When using
local authentication (see page 55) users and groups are created in the AccessIT
GUI. When using an LDAP authentication server (see page 81) users and groups
are imported from a Windows Active Directory. With both authentication methods,
an Administrator can grant users different access permissions as follows:
Administrator - An Administrator can view, modify, manage and control all
AccessIT Manager configuration settings, including creating new users.
User – A User cannot access or change any of the AccessIT Manager configuration
settings. When a User logs in, only the Targets that the user has permission to
access appear.
With local authentication, once you have created users you can form them into
Groups, making management changes easier by e.g. adding or deleting permitted
Targets per Group rather than per individual user. Creating Groups is explained in
section 6.5 on page 25.
In LDAP mode go to section 6.1 below.
To create a new user (in local authentication mode):
1. From the Management menu, select Users. The Users page appears showing
the default Administrator (admin) at the top of the list, see Figure 13.
Click a name to edit user
properties
Figure 13 Users page
The columns show the following:
·Name – User’s login name. You can search for a user by typing the login
name in the Search a user field. You can sort the names out in alphabetical
order A-Z or Z-A by clicking the top of the Name column.
· Member of – groups the user is a member of.
· Permission Level – Administrator or User. You can sort the users out in
Permission Level order - Administrators then Users or Users then
Administrators - by clicking the top of the Permission Level column.
·Full Name – Full User name.
21
AccessIT
2. Click . The following appears.
Figure 14 New User
6.1 General tab
Fill in the following details:
User name - type a login name. A User name cannot be identical to any other
existing User name. It can contain uppercase or lowercase characters except for the
following:
: ; ? & < > ”
A User name cannot include spaces.
Full Name - type the User’s real name
Password / Retype Password - type a password.
E-mail address, Phone number, Description – these are optional fields.
Block Account - To prevent a user from entering the system, select the Block Account checkbox. To re-enable the account, unselect the checkbox.
Permission – select the accounttype as outlined above on page 21.
6.2 User Group tab
Once you have created users you can put them into existing Groups. This gives
users the access rights of that User Group. Section 6.5 on page 25 explains how to
create a User Group.
To add a User to an existing User Group or Groups:
1. Press the Users Group tab, Figure 15 appears. All existing Groups appear in
the All User Groups list.
22
USER GUIDE
Once selected, User
Groups appear here
Figure 15 User Group tab
All User Groups in the
system appear here
2. Select the Groups that the new User will be a member of. The Groups appear in
the Member of list.
6.2.1 Removing Users from a Group
To remove Users from a Group:
In the All UserGroups section, unselect the Group’s checkbox. The Group is
removed from the Member of list.
6.3 Access Permissions tab
You can choose which Targets and Target sets the user has permission to access.
Notes:
· A User can have access to a Target as an individual User or as a Group
member.
· A User or Group of Users can be associated with several Target Sets.
· When a User logs into the AccessIT web interface he sees only Targets and
Target Sets that he has been associated with. See section 18 on page 124.
To choose which Targets / Target Sets the user will have access to:
1. Press the Access Permissions tab. The following appears.
23
AccessIT
Targets and Target Sets
that the new user has
permission to access
appear here
Select from the All
Targets and All Target
Sets lists those which
the new user will have
permission to access
Figure 16 Access Permissions tab
The All Targets and All Target Sets lists show the Targets and All Target sets in
the system.
2. Select the checkboxes of the desired Targets / Target sets. They appear in the
Targets and Target Sets: list.
To disassociate a User/Group from a Target:
Unselect the Targets / Target Sets checkbox from the relevant list.
6.4 Saving a user
Click . The user’s details are now in the system.
Repeat this process to add more users. When finished, click . All
users appear on the Users page. The number of users appears in brackets after
Users in the menu, see Figure 17. User Groups appear as a sub-folder in the menu.
Creating user groups is explained below.
Number of users in the system
Click a name to edit
User properties
Figure 17 Users in the system
24
USER GUIDE
By clicking a user name, an Administrator can access the General, User Group
and Access Permissions tabs of this user and change any of the parameters.
6.4.1 Deleting a user
Deleting a user, instantly removes the user’s authorization from the AccessIT
system and all IP devices.
To delete a user:
1. On the Users page select the checkboxes of the users to be deleted.
2. Press . The user is removed. Press to select or
deselect all checkboxes with one click.
6.5 Creating a User Group
Once you have created users you can form them into Groups. You then give the
same access permissions to the entire group without having to go through the
process for each individual user.
To create a User group:
1. From the menu, click Users or User Groups. On either of these pages, click
. The New User Group page appears, see Figure 18.
Users that are members
of this Group appear
here
Figure 18 New User Group - Members tab
25
All users in the system
appear here
AccessIT
2. Name: Type a unique name for the Group. You can add a description.
3. Select the checkboxes of the users to be part of the Group. They appear in the
Group members list.
You can access the User Properties page by clicking a user name in the Group members list.
6.5.1 Access Permissions tab
Click the Access Permissions tab, Figure 19 appears.
Targets and Target Sets
that the new Group has
permission to access
appear here
Select from the All
Targets and All Target
Sets lists those which
the new Group will have
permission to access
Figure 19 Access Permissions tab
From the All Targets and All Target Sets lists select the checkboxes of those
which the new User Group will have permission to access. When selected the
Target/Set appears in the Targets and Target Sets list.
To remove Targets/Sets, unselect the checkboxes.
26
USER GUIDE
6.5.2 Allowed Services tab
Click the Allowed Services tab. The following appears.
Figure 20 Allowed Services tab
Here you assign Access Services to Group members. If a Group member has
permission to access a Target, but there are no assigned Access Services for the
Group, then the Group member will not be able to access the Target.
Select the checkboxes of all access services allowed to this Group.
6.5.3 Saving the new Group
Click . The Group’s details are now in the system.
Repeat this process to add more Groups. When finished, click .
All Groups appear on the User Groups page, see Figure 21.
Tip! The allowed services appear as icons. To see which service the icon
represents, hold the mouse over the icon and a tooltip appears with the name of the
service.
You can create different access profiles. You can give permission to Targets and
define different access rights through the Allowed Services.
27
AccessIT
Icons of access services
User Groups
Figure 21 User Groups page
allowed appear here
6.5.4 Deleting a User Group
To delete a Group:
1. On the Users Group page select the checkboxes of the Groups to be deleted.
2. Press . The Groups are removed. Press to select or
deselect all checkboxes with one click.
Note: Deleting a Group will not delete the individual users.
28
USER GUIDE
7. Configuring Targets
You must input the de tails of all the Targets physically connected to the system’s
IP devices / KVM switches. This includes giving each Target a unique name and
other relevant details.
As mentioned in the pre-installation guidelines, Appendix A on page 134 contains
2 lists of all the details you need to prepare.
To configure a Target:
1. From the Management menu, select Targets the Targets page appears see
Figure 22.
Click here to display
the Targets page
Total number of
Targets in the
system
Click a name to edit
Target properties
Figure 22 Target page
The columns display the following information:
·Name – Name of Target. You can search for a Target by typing the Target
name in the Find a Target field. You can sort the names out in alphabetical
order A-Z or Z-A by clicking the top of the Name column. You can also
select which Targets to display from the Show by Service drop-down list.
You can show all Targets or just show Targets with a particular Access
Service, to do so choose the desired service from the Show byService dropdown list.
·KVM/IP Device – The name of the Minicom KVM/IP device, the target is
connected to.
·Access Services - Icons of Access services available to access the target.
To see which service the icon represents, hold the mouse over the icon and
a tooltip appears with the name of the service.
29
Loading...
+ 107 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.