Black Box Explains...KVM tray technology.
KVM tray technology.
What we do that others don’t.
From the solid construction of our KVM trays, to unique features like LEDs on the ?front panel and integrated KVM switching, Black Box’s... more/see it nowKVM trays are miles ahead of the competition.
Nothing reduces clutter in a server room like KVM trays that are 1- or 2U high, and ?mount in a cabinet or rack. Here are some of the features that set our KVM trays apart.
TFT LCD support.
This type of monitor uses thin-film transistor (TFT) technology to improve image quality, resulting in higher resolutions, better image contrast, and addressability. All our KVM trays support TFT LCD panel monitors.
The screens on our KVM trays are viewable from nearly any angle. Because of the size of our screens, from 15" to 19", viewing angles vary from 140° x 120° all the way up to 160° x 160°, so you don’t always have to be standing directly in front of the monitor to see what’s happening on it.
Our ServTray Complete family of KVM trays (KVT417A-R2, etc.) has adjustable length instead of a variety of rear bracket sites. This universal rail rear bracket size fits racks with depths of 23.7" (60.2 cm) to 45.3" (115 cm). This simplifies ordering for you!
Dual rail technology.
This KVM tray technology enables the monitor drawer and the keyboard/mouse drawer to move independently of each other. It makes it easy to leave the monitor visible even when a server cabinet is closed and the keyboard/mouse drawer is fully retracted. Black Box has added switching controls to the monitor bezel that can be used to control an attached switch without pulling open the keyboard/mouse drawer for even more space-saving benefits.
Additionally, the dual rails provide a great monitoring environment without disturbing your cooling system.
You asked for it.
Our latest KVM trays, the ServView V KVM Drawer and ServView V KVM Drawer with Widescreen (KVT517A, etc.) were designed based on feedback we have received from some of our customers.
On the front panel of the tray, there is an LED panel, which helps you locate the ?drawer when it’s closed in a darkened data center. The tray only takes up 1U of rack space, and it features the dual rail technology described earlier.
We added front-panel controls for switching, so if you choose a model with an embedded KVM switch, you can use the buttons on the monitor bezel without pulling out the keyboard. Additionally, the top of the keyboard tray features a hideaway connection for USB wireless devices, such as RF- or Bluetooth® supported keyboards and mice. You can wirelessly access your attached targets, even without opening the cabinet door!
Another feature is the front-panel USB port, which provides crash cart access. If your keyboard or GlidePoint® mouse quit on you, simply use this port to attach a passthrough pointing device.
Finally, the widescreen version supports 1920 x 1080 resolutions and DVI connections — two firsts in the data center. collapse
Black Box Explains…TEMPEST.
TEMPEST is an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. It pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable... more/see it nowdata communication equipment by technical surveillance or eavesdropping.
What puts your data communication equipment at risk?
Many things. But first and foremost, its microchip.
Any device with a microchip generates an electromagnetic field, often called a “compromising emanation” by security experts. With the proper surveillance equipment, these emanations can be intercepted and the signal reconstructed and analyzed. Unprotected equipment can, in fact, emit a signal into the air like a radio station—and nobody wants to risk his or her job and a whole lot more by broadcasting national security or trade secrets to the wrong people.
Some of the most vulnerable devices are speakerphones, printers, fax machines, scanners, external disc drives, and other high-speed, high-bandwidth peripherals. If the snoop is using a high-quality interception device, your equipment’s signals can be acquired up to several hundred feet away.
Arguably one of the most vulnerable pieces of equipment is an analog VGA monitor. If a spy were to introduce a Trojan into your system, he or she could monitor and store key presses and passwords used during the day. When the system’s not in use at night, the spy could pulse the VGA screen with grayscale images that have a strong signal at particular frequencies. VGA uses single-ended signaling that has a high common-mode emission level not protected by cable shielding, and it’s possible to monitor these signals outside the secure zone using a radio receiver. Even without a Trojan, a sophisticated receiver located nearby picks up and views what’s on the VGA monitor.
What TEMPEST is and isn’t.
It should come as no surprise that the Federal government became concerned about signal leakage. In fact, its interest goes back to the days of World War I when the Army was trying to exploit weaknesses of enemy combat phones and radio transmitters. Since then, the scope of the government’s interests has broadened beyond battlefield equipment. In the last
40 years, the National Security Agency (NSA) has taken several industry measurement standards and greatly beefed them up. These enhanced criteria are commonly referred to as the TEMPEST standards (although the NSA also calls them EMSEC standards, short for “emissions security”).
TEMPEST disciplines involve designing circuits to minimize emanations and the application of appropriate shielding, grounding, and bonding. Some methods used include radiation screening, alarms, and isolation.
A TEMPEST-approved device resembles its non-secure version with a few key differences. If it’s a network component such as a switch, it comes in a heavy metal case. It also has special shielding, a modified power supply, and perhaps a few other modifications from the standard model. If you need to open the device’s case,
a special torque wrench for use with TEMPEST-only products is required.
TEMPEST test equipment is very expensive and is sold exclusively to government agencies. Nobody can sell you commercial TEMPEST testing equipment. And if someone offers you a “TEMPEST surveillance system,” you need to be aware of two things: First, TEMPEST is counter-surveillance science and the offer is a fraud; second, the salesperson is committing a federal felony.
If you buy surveillance equipment—authentic or not—then you have also commited a felony. Construction of, possession of, attempting a sale of, or attempting a purchase of said surveillance equipment is illegal. Even if the product purchased is a hoax, the law will take your intentions into account as much as the salesperson’s. Don’t be surprised if you
both go to jail.
In the United States, you can learn about TEMPEST testing only in special schools sanctioned by, if not run by, the NSA. Courses to earn the TEMPEST Technician or TEMPEST Engineer certifications are very expensive. These classes are offered to a limited number of people who have a very high level of security clearance and who will be working on TEMPEST-approved equipment all the time.
All TEMPEST-approved communication devices have a rating based on their application and/or environment.
Type 1: This rating is for classified cryptographic equipment used for national security purposes. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of classified or sensitive U.S. Government information.
Type 2: This rating is for unclassified cryptographic equipment used by U.S. Government agencies, state and local governments, and sponsored U.S. Government contractors. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of unclassified but sensitive information, such as contract bids.
Type 3: This rating is for unclassified commercial cryptographic equipment that implements an algorithm registered with the National Institute of Standards and Technology (NIST). It’s for use in protecting sensitive information, like a corporation’s network communications. collapse
Black Box Explains…HDMI
The High-Definition Multimedia Interface (HDMI®) is the first digital interface to combine uncompressed high-definition video, up to eight channels of uncompressed digital audio, and intelligent format and command data in... more/see it nowa single cable. It is now the de facto standard for consumer electronics and high-definition video and is gaining ground in the PC world.
HDMI supports standard, enhanced, and high-definition video. It can carry video signals at resolutions up to and beyond 1080p at 60 Hz (Full HD). The latest version eve support 4K video resolutions.
HDMI offers an easy, standardized way to set up home theaters and AV equipment over one cable. Use it to connect audio/video equipment, such as DVD players, set-top boxes, and A/V receivers with an audio and/or video equipment, such as a digital TVs, PCs, cameras, and camcorders. It also supports multiple audio formats from standard stereo to multichannel surround sound. Plus it provides two-way communications between the video source and the digital TV, enabling simple remote, point-and-click configurations.
NOTE: HDMI also supports HDCP (High-bandwidth Digital Content Protection), which prevents the copying of digital audio and video content transmitted over HDMI able. If you have a device between the source and the display that supports HDMI but not HDCP, your transmission won't work, even over an HDMI cable.
HDMI offers significant benefits over older analog A/V connections. It's backward compatible with DVI equipment, such as PCs. TVs, and other electronic devices using the DVI standard. A DVI-to-HDMI adapter can be used without a loss of video quality. Because DVI only supports video signals, no audio, the DVI device simply ignores the extra audio data.
The HDMI standard was introduced in December 2002. Since then, there have been a number of versions with increasing bandwidth and/or transmission capabilities.
With the introduction of HDMI (June 2006), more than doubled the bandwidth from 4.95 Gbps to 10.2 Gbps (340 MHz). It offers support for 16-bit color, increased refresh rates, and added support for 1440p WQXGA. It also added support for xvYCC color space and Dolby True HD and DTS-HD Master Audio standards. Plus it added features to automatically correct audio video synchronization. Finally, it added a mini connector.
HDMI 1.3a (November 2006), HDMI 1.3b (March 2007, HDMI 1.3b1 (November 2007), and 1.3c (August 2008) added termination recommendations, control commands, and other specification for testing, etc.
HDMI 1.4 (May 2009) increased the maximum resolution to 4Kx 2K (3840 x 2160 p/24/25/30 Hz). It added an HDMI Ethernet channel for a 100-Mbps connection between two HDMI devices. Other advancements include: an Audio Return Channel, stereoscopic 3D over HDMI (HDMI 1.3 devices will only support this for 1080i), an automotive connection system, and the micro HDMI connector.
HDMI 1.4a (March 2010) adds two additional 3D formats for broadcast content.
HDMI 2.0 (August 2013), which is backwards compatible with earlier versions of the HDMI specification, significantly increases bandwidth up to 18 Gbps and adds key enhancements to support market requirements for enhancing the consumer video and audio experience.
HDMI 2.0 also includes the following advanced features:
Resolutions up to 4K@50/60 (2160p), which is four times the clarity of 1080p/60 video resolution, for the ultimate video experience.
Up to 32 audio channels for a multi-dimensional immersive audio experience.
Up to 1536Hz audio sample frequency for the highest audio fidelity.
Simultaneous delivery of dual video streams to multiple users on the same screen.
Simultaneous delivery of multi-stream audio to multiple users (up to four).
Support for the wide angle theatrical 21:9 video aspect ratio.
Dynamic synchronization of video and audio streams.
CEC extensions provide more expanded command and control of consumer electronics devices through a single control point.
There are four HDMI connector types. Type A and Type B are defined in the HDMI 1.0 specification. Type C is defined in HDMI 1.3, and Type D is defined in HDMI 1.4.
Type A: 19 pins. It supports all SDTV, EDTV, and HDTV modes. It is electrically compatible with single-link DVI-D.
Type B: 29 pins. Offers double the video bandwidth of Type A. Use for very high-resolution displays such as WQUXGA. It's electronically compatible with dual-link DVI-D.
Type C Mini: 19 pins. This mini connector is intended for portable devices. It is smaller than Type A but has the same pin configuration and can be connected to Type A cable via an adapter or adapter cable.
Type D Micro: 19 pins. This also has the 19-pin configuration of Type A but is about the size of a micro-USB connector.
Recently, HDMI Licnsing, LLC announced that all able would be tested as either Standard or High-Speed cables. Referring to cables based on HDMI standard (e.g. 1.2, 1.3 etc.) is no longer allowed.
Standard HDMI cable is designed for use with digital broadcast TV, cable TV, satellites TV, Blu-ray, and upscale DVD payers to reliably transmit up to 1080i or 720p video (or the equivalent of 75 MHz or up to 2.25 Gbps).
High-Speed HDMI reliably transmits video resolutions of 1080p and beyond, including advanced display technologies such as 4K, 3D, and Deep Color. High-Speed HDMI is the recommended cable for 1080p video. It will perform at speeds of 600 MHz or up to 18 Gbps, the highest bandwidth urgently available over an HDMI cable.
Additional resources and licensing information is available at HDMI.org. collapse
Black Box Explains... Multiplatform cabling environments.
When using a ServSwitch™ with multiple computer platforms, choosing which peripherals to use to control your diverse group of CPUs can be confusing. Because of the wide variation in connector... more/see it nowtypes and compatibilities, there is a hierarchy to follow when choosing your user station keyboard, monitor, and mouse.
1. If you have at least one Sun® computer in your application, you should use a Sun keyboard and mouse to control your CPUs.
2. If you have a mixture of PCs and Mac® computers, use your PC-style keyboard and mouse to control your CPUs. collapse
Black Box Explains...Multicasting video over a LAN: Use the right switch.
In KVM extension applications where you want to distribute HD video across a network, you need to understand how it works and what kind of networking equipment to use with... more/see it nowyour extenders.
Think of your network as a river of data with a steady current of data moving smoothly down the channel. All your network users are like tiny tributaries branching off this river, taking only as much water (bandwidth) as they need to process data. When you start to multicast video, data, and audio over the LAN, those streams suddenly become the size of the main river. Each user is then basically flooded with data and it becomes difficult or impossible to do any other tasks. This scenario of sending transmissions to every user on the network is called broadcasting, and it slows down the network to a trickle. There are network protocol methods that alleviate this problem, but it depends on the network switch you use.
Unicast vs. multicasting, and why a typical Layer 2 switch isn’t sufficient.
Unicasting is sending data from one network device to another (point to point); in a typical unicast network, Layer 2 switches easily support these types of communications. But multicasting is transmitting data from one network device to multiple users. When multicasting with Layer 2 switches, all attached devices receive the packets, whether they want them or not. Because a multicast header does NOT have a destination IP address, an average network switch (a Layer 2 switch without supported capabilities) will not know what to do with it. So the switch sends the packet out to every network port on all attached devices. When the client or network interface card (NIC) receives the packet, it analyzes it and discards it if not wanted.
The solution: a Layer 3 switch with IGMPv2 or IGMPv3 and packet forwarding.
Multicasting with Layer 3 switches is much more efficient than with Layer 2 switches because it identifies the multicast packet and sends it only to the intended receivers. A Layer 2 switch sends the multicast packets to every device and, If there are many sources, the network will slow down because of all the traffic. And, without IGMPv2 or IGMPv3 snooping support, the switch can handle only a few devices sending multicasting packets.
Layer 3 switches with IGMP support, however, “know” who wants to receive the multicast packet and who doesn’t. When a receiving device wants to tap into a multicasting stream, it responds to the multicast broadcast with an IGMP report, the equivalent of saying, “I want to connect to this stream.” The report is only sent in the first cycle, initializing the connection between the stream and receiving device. If the device was previously connected to the stream, it sends a grafting request for removing the temporary block on the unicast routing table. The switch can then send the multicast packets to newly connected members of the multicast group.
Then, when a device no longer wants to receive the multicast packets, it sends a pruning request to the IGMP-supported switch, which temporarily removes the device from the multicast group and stream.
Therefore, for multicasting, use routers or Layer 3 switches that support the IGMP protocol. Without this support, your network devices will be receiving so many multicasting packets, they will not be able to communicate with other devices using different protocols, such as FTP. Plus, a feature-rich, IGMP-supported Layer 3 switch gives you the bandwidth control needed to send video from multiple sources over a LAN.
Black Box Explains...Stream mode vs. burst mode/prompt mode.
Computers and mice must communicate with each other in order to operate properly. Most computers and mice communicate via a method called “stream mode”—as a mouse is being moved, it... more/see it nowsends the coordinates of its new position in a constant stream of information.
However, some computers communicate via a method known as “burst” or “prompt” mode. With this method, the mouse holds its data until the CPU sends a request (or “prompt”) for it. This mode of communication presents a problem for many KVM switches, as they normally pass along mouse coordinates in a stream mode. This results in a CPU receiving data when it isn’t expecting it, and the mouse simply won’t function properly.
All ServSwitch™ products contain support for stream-mode CPUs, and several ServSwitch products support both stream and burst/prompt modes. Call our FREE Tech Support about requirements for your application. collapse
Black Box Explains...Multi-user ServSwitch products vs. multipoint access ServSwitch products.
A multi-user ServSwitch, such as the Matrix ServSwitch, enables two or more users to access different servers at the same time. So, for instance, one user can access “Server A”... more/see it nowwhile another user accesses “Server B.” This is considered a “true two-channel” architecture because two users have independent access to CPUs. It should be pointed out that multiple users cannot access the same server at the same time.
A multipoint access ServSwitch, such as the ServSwitch Duo, provides two access points for control stations but requires that both users view the same server at the same time. So, if one user is accessing “Server A” on his screen, the other user is also seeing “Server A” on his screen. If the second user switches to “Server B,“ the first user will also switch to “Server B.” Only one of these users is actually in control. The user in control stays in control until his workstation is inactive for a period of time (selectable). Then the other station can take control.
A multipoint access ServSwitch is useful when simultaneous, independent access is not required—just the ability to access CPUs from more than one place.
Black Box Explains...Category 5, 5e, and 6 copper wiring standards.
The ABCs of standards
There are two primary organizations dedicated to developing and setting structured cabling standards. In North America, standards are issued by the Telecommunications Industry Association (TIA),... more/see it nowwhich is accredited by the American National Standards Institute (ANSI). The TIA was formed in April 1988 after a merger with the Electronics Industry Association (EIA). That’s why its standards are commonly known as ANSI/TIA/EIA, TIA/EIA, or TIA.
Globally, the organizations that issue standards are the International Electrotechnical Commission (IEC) and the International Organization for Standardization (ISO). Standards are often listed as ISO/IEC. Other organizations include the Canadian Standards Association (CSA), CENELEC (European Committee for Electrotechnical Standardizations), and the Japanese Standards Association (JSA/JSI).
The committees of all these organizations work together and the performance requirements of the standards are very similar. But there is some confusion in terminology.
The TIA cabling components (cables, connecting hardware, and patch cords) are labeled with a ”category.” These components together form a permanent link or channel that is also called a ”category.” The ISO/IEC defines the link and channel requirements with a ”class” designation. But the components are called a ”category.”
Category 5 (CAT5), ratified in 1991, was the de facto standard for 100-Mbps networks during the 1990s. It is no longer recognized by the TIA/EIA for use in data networking.
Category 5e (CAT5e)–ISO/IEC 11801 Class D, ratified in 1999, is designed to enable twisted-pair cabling to support full-duplex, 4-pair transmission in 100-MHz applications. The CAT5e standard added more headroom and established new requirements to support Gigabit Ethernet over a worst case four-connector channel. These include stricter specs for Near-End Crosstalk (NEXT) and Return Loss (RL). The standard also introduced the required measurements for Power Sum Near-End Crosstalk (PS-NEXT), Equal-Level Far-End Crosstalk (EL-FEXT), and Power Sum Equal-Level Far-End Crosstalk (PS-ELFEXT). CAT5e is still used in many organizations, although it is no longer recognized for new installations.
Category 6 (CAT6)–Class E has a specified frequency of 250 MHz, significantly improved bandwidth capacity over CAT5e, and easily handles Gigabit Ethernet transmissions. In recent years, it has been the cable of choice for new structured cabling systems. CAT6 supports 1000BASE-T and, depending on the installation, 10GBASE-T (10-GbE).
10-GbE over CAT6 introduces the problem of Alien Crosstalk (ANEXT), the unwanted coupling of signals between adjacent pairs and cables. Because ANEXT in CAT6 10-GbE networks is so dependent on installation practices, TSB-155 qualifies 10-GbE over CAT6 up to 55 meters and requires it to be 100% tested. To mitigate ANEXT in CAT6, it is recommended that you unbundle the cables and increase the separation between the cables.
Augmented Category 6 (CAT6a)–Class Ea was ratified in February 2008. This standard calls for 10-Gigabit Ethernet data transmission over a 4-pair copper cabling system up to 100 meters. CAT6a extends CAT6 electrical specifications from 250 MHz to 500 MHz. It introduces the ANEXT requirement. It also replaces the term Equal Level Far-End Crosstalk (ELFEXT) with Attenuation to Crosstalk Ratio, Far-End (ACRF) to mesh with ISO terminology. CAT6a provides improved insertion loss over CAT6. It is a good choice for noisy environments with lots of EMI. CAT6a is also well-suited for use with PoE+.
CAT6a UTP cable is significantly larger than CAT6 cable. It features larger conductors, usually 22 AWG, and is designed with more space between the pairs to minimize ANEXT. The outside diameter of CAT6a cable averages 0.29–0.35" compared to 0.21–0.24" for CAT6 cable. This reduces number of cables you can fit in a conduit. At a 40% fill ratio, you can run three CAT6a cables in a 3/4" conduit vs. five CAT6 cables.
There are two types of CAT6a cable, UTP and F/UTP. For a discussion of the differences, see the white paper in our Resources section.
Category 7 (CAT7)–Class F was published in 2002 by the ISO/IEC. It is not a TIA recognized standard. Class 7 specifies minimum performance standards for fully shielded cable (individually shielded pairs surrounded by an overall shield) transmitting data at rates up to 600 MHz. It offers greater capacity for demanding applications such as broadband video. It’s also well suited for applications where fiber optic cable would typically be used—but it costs less. Because each CAT7 pair is fully shielded, it's ideal for areas prone to EMI/RFI. Class 7 cable offers two connector styles: the standard RJ plug and a non-RJ-style plug and socket interface specified in IEC 61076-2-104:2.
Category 7a (CAT7a)–Class Fa is currently in ISO standards for channel performance in Amendment 1, recently component performance has been ratified in Amendment 2. The formal names are ISO 11801 Amendment 1 (2008) and ISO 11801 Amendment 2 (2010). Class Fa cable is a fully shielded cable that extends frequency from 600 MHz to 1000 MHz. It can easily handle 10-GbE and offers users a lifespan of 15 years or more. It has even been discussed that Class Fa cable is the future for 40GBASE-T or more.
For a comparison chart of category performance standards, see the Buyer's Guide in the Resources section.
Black Box Explains... Coax cables for ServSwitch products.
Whats the difference between standard and coax cables for ServSwitch™ products? Performance! Coax cables are made with premium-gauge wire, so they can be made in longer lengths. That means you... more/see it nowcan move your workstation up to 100 feet (30.4 m) from your ServSwitch. Plus coax cables have even more shielding to maintain the signal quality and strength you need. If you require high-resolution video or long distances, this is the cable you need! collapse
Black Box Explains...KVMoIP access technology.
KVMoIP access technology extends keyboard, video, and mouse (KVM) signals from any computer or server over TCP/IP via a LAN, WAN, or Internet connection. Through this KVM over IP (KVMoIP)... more/see it nowconnection, remote users can access and control a number of servers simultaneously from wherever they are, inside or outside the organization, and anywhere in the world. This technology works in diverse hardware environments and is ideal for managing multilocation data centers and branch offices.
These capabilities translate into real savings for companies having to deal with the proliferation of servers in many offices, particularly for corporations and government agencies required to deliver 24/7 uptime and real-time access to mission-critical servers 365 days a year.
KVMoIP products combine the advantages of remote access software with the benefits of KVM switching technology. Like most KVM switches, KVMoIP products don’t require any software to be loaded on the host computers. They interface directly with the keyboard, monitor, and mouse connectors of the host computer or KVM switch. Circuitry within the KVMoIP device digitizes the incoming video signal and processes it into digital data that is communicated to a viewer program running on a remote client computer over a LAN/WAN or the public Internet.
By addressing network issues from a remote location, you can simply manage issues from your desk, or even save yourself the hassle of traveling to a site in the middle of the night. Use a browser-based connection, even a cell phone or PDA, to reboot or administer a roomful of servers remotely—a real convenience.
KVMoIP products that feature virtual media technology take that convenience further. They enable a remote user to effortlessly move files from a mass storage device—a USB flash drive or CD-ROM drive, for instance—from your location to the computer on which you’re working. Cost savings are realized through reduced downtime and less travel. Plus, in some cases, there‘s no to need replace existing KVM switches with proprietary ones to get a KVMoIP server-control solution.
The Black Box difference
Black Box® ServSwitch™ KVMoIP solutions go further than many other KVMoIP products on the market. They not only enable you to access remote servers, but they do this at the BIOS level—important when you go need to troubleshoot from off-site and don’t want to a dispatch
a technician. Install or recover software applications and install OS patches from your location anywhere in the world. Plus, this BIOS-level control is possible regardless of the server’s brand or model and even works if the operating system is down.
The ServReach™ system is also designed for IT managers seeking global centralized KVM management in a world of mushrooming servers and complexity. This global platform works by consolidating all server access and devices via locally connected KVMoIP devices. All this hardware is then united under a single management appliance or software “umbrella” providing global, yet fully secure, out-of-band control.
The ServReach system works seamlessly with more than 500 variations of analog KVM switches from a multitude of vendors and manufacturers. Because it’s vendor independent, you don’t need to replace your data center’s entire KVM infrastructure. ServReach simply
grafts global centralized KVM management onto the existing server room/data center, aligning with third-party KVM switches already in place. This is done with the ServReach KVMGate (KVIP1000A), an IP gateway device designed to connect to each of the legacy KVM devices to provide global centralized KVM management for a fraction of the cost of competitive systems, ensuring a faster and greater ROI.
If you’re planning on opening or acquiring a new data center or a large number of new servers, the ServReach KVManager (KVMGR) is the answer. It can provide any-by-any access via the ServReach KVMCube (KVIP1001A), a compact, rackmountable, digital matrix IP device that gives fully secure, non-blocking access for any of the users to any of the servers simultaneously.
In addition, the servers controlled by legacy KVM switches via KVMGate can still be managed by the ServReach KVManager at
the same time as the new servers controlled through a gateway. With all the servers under the same KVManager umbrella, data centers can now easily acquire new servers and devices without having to worry about how to incorporate the new infrastructure with the old.
For more information on Black Box KVMoIP solutions, visit blackbox.com/go/ServReach. Find out more by watching a KVMoIP demo and accessing related white papers. collapse