291-Console Servers
Or call us on

Infrastructure Management

Remote Management is an MRV solution that provides secure remote service port access and remote power control to devices in an organization's networks and infrastructures, including data centers, remote sites, and test labs. MRV solutions reduce costs and improve service levels by providing access to critical IT resources from any location.

Console / Terminal Servers

The LX Series Console Servers support 4, 8, 16, 32 or 48 RS232 serial ports with an optional v.92 modem, dual Ethernet, and multiple AC/DC power options. Rich security and management features are supported, in addition to distributed clustering, sophisticated automation capabilities, very strong encryption, and U.S. government FIPS 140-2 security certification.

Power Management

The LX Power Control Series provides the ability to enable or disable power to managed devices, to reset equipment, enhance troubleshooting, enable redundant equipment, or control power access. The Trigger/Action feature of the LX Series allows site administrators and lab personnel to easily automate power, physical and security infrastructure control. This feature not only enhances troubleshooting but also allows managers to reduce utilities costs by turning off unused equipment extending equipment life span and reducing cooling costs.

Features:

  • LX-1000T

    The LX 1004T family of LX Series Console Servers supports 4 ports of RS-232 connectivity, AC, DC, and Integrated Modem. Small form factor configuration can be deployed in virtually any application to fit any size installation while providing high levels of availability.

  • Ease of Use and Configuration

  • Multiple User Interface Options: A wide range of configuration options provide multiple levels of configuration and monitoring support via an industry familiar Command Line Interface(CLI), easy to use web-based GUI interface, andor SNMP manager, minimizing training time and streamlining provisioning and monitoring tasks.
  • Operating System Independence: Remote out-of-band management and connectivity compatible with Sun Solaris, Linux, Microsoft Windows, MAC OS, and others. Allows console server to be deployed easily in any multi-system environment to provide a consistent and consolidated access method for multiple devices.
  • Standards based protocol support: While network environments vary widely, most networks are based on standards based protocols. Support for NTP, FTP, TFTP, Telnet, SSHv2, SFTP, SNMP, DHCP, and PPP and more allows the LX Series to be deployed in virtually any network configuration and environment, utilizing standards based IP implementations.
  • High Reliability

  • Internal Modem Option: Modem connectivity provides access for locations without Ethernet connectivity and\or backup access method for in-band network failures.
  • Wide operating environmental range, high reliability: Wide environmental operations range allows unit to be deployed in almost any network environment. Convection cooled system supports small thermal footprint while increasing reliability by eliminating electro-mechanical components such as fans.
  • Security

  • Multiple Authentication & Authorization Methods: System supports many authentication mechanisms, offering a wide range of deployment capabilities. RADIUS, TACACS+, SecureID, KERBEROS and LDAP allow integration with the most popular authentication methods.
  • Data Encryption: Device Configuration, logging and user data are protected by a number of security mechanisms and protocols. SSHv2, Secure Socket Layer (SSL), SNMPv3 and SFTP are used to secure system logs, management traffic and device access data transport through the network.
  • Dial Back with PPP: Using dial back access ensures remote access to network resources in a cost effective and secure way. Dialback PPP provides the security benefits of dialback and supports IP transport across the link.
  • Caller ID: Ensure that access to the console server is only granted to specific user location combinations.
  • Integrated IP Filtering: Limiting access to the console server from specific devices and\or networks provides an additional layer of security beyond user credentials.
  • Local Subscriber Database: On-board database serves as a backup when network access to RADIUS, TACACS+ or other authentication servers is unavailable ensuring secure access during network failures.
  • Automated Event Detection and Notification

  • Alarm Contact, Sensor, and Power: Trigger conditions may be defined and associated with corresponding actions. This capability can be used to enhance security, reduce incident response times, ensure scheduled tests are completed and aid in disaster recovery efforts. Triggers can be based on a number of data points including serial character strings, alarm contact closures, time of day rules, power and\or environmental conditions. Actions can include sending a notification, disabling a port, enabling a power outlet, starting a dial up sessions, or enabling a relay.
  • Automated Response: Increase safety and avoid or reduce the impact of disasters or outages with automated response to an emergency. With up to 255 trigger conditions and 255 actions, this self-healing feature enhances the reliability and availability of mission-critical network operation and ensures highly predictable fault management.
  • Serial String Monitoring and Detection: Save time and increase troubleshooting efficiency by monitoring for specific data strings sent to a port. Triggering pre-set actions based on key data, for example, a system crash message, gives the ability to automatically react the moment the event occurs, not hours after the failure has caused an outage, or respond to a problem before users even know it occurs.
  • Facilities, Environmental and Power Monitoring and Control

  • Integrated Infrastructure Management: Integrating facility resources such as power, heatingcooling, and physical plant attributes into existing management framework of network infrastructure devices reduces cost and improves technical staff efficiency. Managing network equipment and facilities resources from a single IP based management system provides a singular view of the entire communications or lab infrastructure.
  • Logging and Auditing

  • Syslog Support: Collecting system events such as log-ins, file transfers, and configuration changes are not only critical to troubleshooting but are also required by directives such as Sarbanes-Oxley, HIPAA, GLBA, NIPSOM Chapter 8 and California Bill 1386. Robust logging support and capabilities lower the risk of non-compliance, providing a detailed audit trail.
  • Data logging, Command Logging, DataBuffer Logging: Troubleshooting devices can often require specialized equipment to track and store activity. Embedded support to log all data to and from a specific device or port including keystrokes and error messages reduces the need for external devices and provides direct easy access.
  • Subscriber Provisioning and Access

    Subscriber Profiles: Administrators, developers, help desk personnel, third party support operators, lab personnel and test/service technicians all need to access various pieces of equipment remotely with varying levels of access and privileges. Multi subscriber support enables this capability providing almost unlimited access flexibility

  • LX-4000T

    The family of LX Series Console Servers supports 1-48 ports of RS-232 connectivity, AC, DC, Redundant Power, Integrated Modem, NEBS Level 3 and worldwide certifications. Standard 1U configuration can be deployed in virtually any applications to fit any size installation while providing high levels of availability.

  • Wide Range of Applications

    Enterprise data centers, Remote/branch offices, Telco central and remote facilities, Utilities, Test and development labs

  • Remote console connectivity

    Access equipment from any location, most equipment has a serial port

    24 x 7 Lights out management

    Provide for unmanned, remote service, or automated testing

    Automated Notification and Actions

    Enhance response time and increase system availability and simplifies operations

    Power, Environmental, Infrastructure Management

    Monitor and control resources via a single management interface

    Industry-leading security

    High level of encryption and secure access methods including FIPS 140-2 Certification

    Ease of Configuration

    CLI, SNMP, and Web based management interfaces

    Connectivity via Ethernet, Serial, and dial-up

    Multi-level user profiles

    Allow user experience customization or manage equipment sharing

  • Ease of Use and Configuration Multiple User Interface Options

    A wide range of configuration options provide multiple levels of configuration and monitoring support via an industry familiar Command Line Interface(CLI), easy to use web-based GUI interface, andor SNMP manager, minimizing training time and streamlining provisioning and monitoring tasks.

  • Operating System Independence

    Remote out-of-band management and connectivity compatible with Sun Solaris, Linux, Microsoft Windows, MAC OS, and others. Allows console server to be deployed easily in any multi-system environment to provide a consistent and consolidated access method for multiple devices.

  • Standards based protocol support

    While network environments vary widely, most networks are based on standards based protocols. Support for NTP, FTP, TFTP, Telnet, SSHv2, SFTP, SNMP, DHCP, and PPP and more allows the LX Series to be deployed in virtually any network configuration and environment, utilizing standards based IP implementations.

    High Reliability Dual Power Inputs and Ethernet Connectivity

    Ensures connectivity for situations with any combination of network and power system failures. Dual Ethernet port access provides connectivity to redundant network interfaces for mission critical applications.

    Internal Modem Option

    Modem connectivity provides access for locations without Ethernet connectivity and\or backup access method for in-band network failures. Land line and cellular modem options are available.

  • Wide operating environmental range, high reliability

    Wide environmental operations range allows unit to be deployed in almost any network environment. Convection cooled system supports small thermal footprint while increasing reliability by eliminating electro-mechanical components such as fans.

    Security Multiple Authentication & Authorization Methods

    System supports many authentication mechanisms, offering a wide range of deployment capabilities. RADIUS, TACACS+, SecureID, KERBEROS and LDAP allow integration with the most popular authentication methods.

    Data Encryption

    Device Configuration, logging and user data are protected by a number of security mechanisms and protocols. SSHv2, Secure Socket Layer (SSL), SNMPv3 and SFTP are used to secure system logs, management traffic and device access data transport through the network.

  • Dial Back with PPP

    Using dial back access ensures remote access to network resources in a cost effective and secure way. Dialback PPP provides the security benefits of dialback and supports IP transport across the link.

    Caller ID

    Ensure that access to the console server is only granted to specific userslocation combinations.

    Integrated IP Filtering

    Limiting access to the console server from specific devices andor networks provides an additional layer of security beyond user credentials.

  • Local Subscriber Database

    On-board database serves as a backup when network access to RADIUS, TACACS+ or other authentication servers is unavailable ensuring secure access during network failures.

    NIST FIPS 140-2 Certified

    FIPS 140-2 certification is required for the sale of products implementing cryptography to the US or Canada Federal Government. FIPS 140-2 certification by government approved labs ensures that the LX Series Console Server provides the highest level of security and encryption possible.

    Automated Event Detection and Notification Alarm Contact, Sensor, and Power

    Trigger conditions may be defined and associated with corresponding actions. This capability can be used to enhance security, reduce incident response times, ensure scheduled tests are completed and aid in disaster recovery efforts. Triggers can be based on a number of data points including serial character strings, alarm contact closures, time of day rules, power and\or environmental conditions. Actions can include sending a notification, disabling a port, enabling a power outlet, starting a dial up sessions, or enabling a relay.

  • Automated Response

    Increase safety and avoid or reduce the impact of disasters or outages with automated response to an emergency. With up to 255 trigger conditions and 255 actions, this self-healing feature enhances the reliability and availability of mission-critical network operation and ensures highly predictable fault management.

    Serial String Monitoring and Detection

    Save time and increase troubleshooting efficiency by monitoring for specific data strings sent to a port. Triggering pre-set actions based on key data, for example, a system crash message, gives the ability to automatically react the moment the event occurs, not hours after the failure has caused an outage, or respond to a problem before users even know it occurs.

    Facilities, Environmental and Power Monitoring and Control Integrated Infrastructure Management

    Integrating facility resources such as power, heating\cooling, and physical plant attributes into existing management framework of network infrastructure devices reduces cost and improves technical staff efficiency. Managing network equipment and facilities resources from a single IP based management system provides a singular view of the entire communications or lab infrastructure.

  • Logging and Auditing Syslog Support

    Collecting system events such as log-ins, file transfers, and configuration changes are not only critical to troubleshooting but are also required by directives such as Sarbanes-Oxley, HIPAA, GLBA, NIPSOM Chapter 8 and California Bill 1386. Robust logging support and capabilities lower the risk of non-compliance, providing a detailed audit trail.

    Data logging, Command Logging, DataBuffer Logging

    Troubleshooting devices can often require specialized equipment to track and store activity. Embedded support to log all data to and from a specific device or port including keystrokes and error messages reduces the need for external devices and provides direct easy access.

  • Subscriber Provisioning and Access Subscriber Profiles

    Administrators, developers, help desk personnel, third party support operators, lab personnel and test/service technicians all need to access various pieces of equipment remotely with varying levels of access and privileges. Multi subscriber support enables this capability providing almost unlimited access flexibility.

Where to Find Us

linkedin

Our Partners Include

virgin airbus gas international

Request a Callback