Ease of Use and Configuration
* Multiple User Interface Options: A wide range of configuration options provide multiple levels of configuration and monitoring support via an industry familiar Command Line Interface(CLI), easy to use web-based GUI interface, andor SNMP manager, minimizing training time and streamlining provisioning and monitoring tasks.
* Operating System Independence: Remote out-of-band management and connectivity compatible with Sun Solaris, Linux, Microsoft Windows, MAC OS, and others. Allows console server to be deployed easily in any multi-system environment to provide a consistent and consolidated access method for multiple devices.
* Standards based protocol support: While network environments vary widely, most networks are based on standards based protocols. Support for NTP, FTP, TFTP, Telnet, SSHv2, SFTP, SNMP, DHCP, and PPP and more allows the LX Series to be deployed in virtually any network configuration and environment, utilizing standards based IP implementations.
* Dual Power Inputs and Ethernet Connectivity: Ensures connectivity for situations with any combination of network and power system failures. Dual Ethernet port access provides connectivity to redundant network interfaces for mission critical applications.
* Internal Modem Option: Modem connectivity provides access for locations without Ethernet connectivity andor backup access method for in-band network failures. Land line and cellular modem options are available.
* Wide operating environmental range, high reliability: Wide environmental operations range allows unit to be deployed in almost any network environment. Convection cooled system supports small thermal footprint while increasing reliability by eliminating electro-mechanical components such as fans.
* Multiple Authentication & Authorization Methods: System supports many authentication mechanisms, offering a wide range of deployment capabilities. RADIUS, TACACS+, SecureID, KERBEROS and LDAP allow integration with the most popular authentication methods.
* Data Encryption: Device Configuration, logging and user data are protected by a number of security mechanisms and protocols. SSHv2, Secure Socket Layer (SSL), SNMPv3 and SFTP are used to secure system logs, management traffic and device access data transport through the network.
* Dial Back with PPP: Using dial back access ensures remote access to network resources in a cost effective and secure way. Dialback PPP provides the security benefits of dialback and supports IP transport across the link.
* Caller ID: Ensure that access to the console server is only granted to specific userslocation combinations.
* Integrated IP Filtering: Limiting access to the console server from specific devices andor networks provides an additional layer of security beyond user credentials.
* Local Subscriber Database: On-board database serves as a backup when network access to RADIUS, TACACS+ or other authentication servers is unavailable ensuring secure access during network failures.
* NIST FIPS 140-2 Certified: FIPS 140-2 certification is required for the sale of products implementing cryptography to the US or Canada Federal Government. FIPS 140-2 certification by government approved labs ensures that the LX Series Console Server provides the highest level of security and encryption possible.
* JITC Certified: The Joint Interoperability Test Command (JITC) is an independent test lab which performs evaluations of information systems deployed within the United States Department of Defense (DOD) . The organization ensures protocol compliance, stability, scalability, management, and security interoperability between equipment vendors.
* Expandability: Network infrastructures are very fluid and devices are constantly added, removed, and reconfigured. The ability to react quickly to expand networks andor add new staff members is an import aspect of managing a network. The LX Series allows easy management of high density installations from a single IP address.
* Peer to Peer Architecture: The powerful clustering capability requires no special software licenses or additional hardware appliances or devices. The peer-to-peer implementation eliminates a single point of failure and the need for redundant devices to ensure resilient operation.
* Logical and Physical Network Boundary Crossing: Cluster member units are not limited by subnet or physical network boundaries and can span multiple physical and logical locations. A system administrator can have any number of console servers share configuration data, even those that are separated by a switch, router or WAN.
* Software and Configuration Distribution: Software and configuration updates may be rapidly deployed across a cluster, and time-of-day rules allows scheduled updates. Any configuration attributes may be shared or not shared with units in a cluster.
* Device and Port Search: It can be difficult to remember the type of port andor name of a port attached to a specific device. Search capabilities allow the user to easily find devices based on partial andor full port type and name information.
Automated Event Detection and Notification
* Alarm Contact, Sensor, and Power: Trigger conditions may be defined and associated with corresponding actions. This capability can be used to enhance security, reduce incident response times, ensure scheduled tests are completed and aid in disaster recovery efforts. Triggers can be based on a number of data points including serial character strings, alarm contact closures, time of day rules, power andor environmental conditions. Actions can include sending a notification, disabling a port, enabling a power outlet, starting a dial up sessions, or enabling a relay.
* Automated Response: Increase safety and avoid or reduce the impact of disasters or outages with automated response to an emergency. With up to 255 trigger conditions and 255 actions, this self-healing feature enhances the reliability and availability of mission-critical network operation and ensures highly predictable fault management.
* Serial String Monitoring and Detection: Save time and increase troubleshooting efficiency by monitoring for specific data strings sent to a port. Triggering pre-set actions based on key data, for example, a system crash message, gives the ability to automatically react the moment the event occurs, not hours after the failure has caused an outage, or respond to a problem before users even know it occurs.
Facilities, Environmental and Power Monitoring and Control
* Integrated Infrastructure Management: Integrating facility resources such as power, heatingcooling, and physical plant attributes into existing management framework of network infrastructure devices reduces cost and improves technical staff efficiency. Managing network equipment and facilities resources from a single IP based management system provides a singular view of the entire communications or lab infrastructure.
* Integrated DC Digital Volt Meter: Monitoring DC power rails for both "A" and "B" feed power levels is critical to the operation of carrier, utility and telecommunications infrastructures. By providing detailed power information, the LX Series eliminates the need for external power meters requiring visual inspection andor specialized cabling/protocol support.
Logging and Auditing
* Syslog Support: Collecting system events such as log-ins, file transfers, and configuration changes are not only critical to troubleshooting but are also required by directives such as Sarbanes-Oxley, HIPAA, GLBA, NIPSOM Chapter 8 and California Bill 1386. Robust logging support and capabilities lower the risk of non-compliance, providing a detailed audit trail.
* Data logging, Command Logging, DataBuffer Logging: Troubleshooting devices can often require specialized equipment to track and store activity. Embedded support to log all data to and from a specific device or port including keystrokes and error messages reduces the need for external devices and provides direct easy access.
Subscriber Provisioning and Access
* Subscriber Profiles: Administrators, developers, help desk personnel, third party support operators, lab personnel and test/service technicians all need to access various pieces of equipment remotely with varying levels of access and privileges. Multi subscriber support enables this capability providing almost unlimited access flexibility.
* Customized Subscriber Menus: With users of varying access levels and technical aptitudes accessing network equipment, per subscriber menus customize the subscriber's user experience including access to specific physical ports and readwrite access. Nested menus support multiple menu levels providing almost unlimited flexibility.