March 10, 2005
- Ease of Use:
- Value for Money:
- Overall Rating:
This is a simple device that can extend the use of existing equipment.
There might be problems with firewalls.
A simple solution to remote administration issues at smaller sites.
Adder Technology's AdderLink IP device allows existing KVM switches to be used remotely. The half-1U device sits between the KVM switch and the outside world and allows a remote connection to be established, either through its built-in 10/100 Base-T Ethernet port or through its standard serial comms port attached to a modem or an ISDN adapter.
Although the AdderLink IP device would normally be used to operate a KVM switch to control several servers, it can just as easily be connected to a single system, which in turn could use a variety of methods to control other devices.
The device can be placed anywhere on the network depending on the way you plan to use it. It can operate behind a firewall or in parallel with one. The device uses 128-bit encryption to protect remote links. Encryption can be enforced, in which case any connecting viewer must also support encryption, or optional, in which case encryption will operate if the connecting viewer requests it or disabled if it does not support it.
Setup is simple, although you will need to connect a keyboard, mouse and display unit to the device to set the various options.
The device can use DHCP to obtain its network addressing details, although assigning static IP address would be a wiser choice if you plan to use a Java-enabled browser to access it. The system uses RealVNC viewer software, and can use either Java or Windows versions as required.
In use the device is simple to operate, with everything accessible from the viewer. The device's configuration can be altered, hosts configured and users added as needed. The system allows up to 32 hosts to be configured, and up to 16 users can be set up, all of whom can have access controls applied to their connections.
There is no online help, but the documentation on the accompanying CD-Rom provides comprehensive information on setting up and using the device. It is possible to configure up to eight keystroke combinations as control commands that can be sent to the target system, so that the host system is not affected by them.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry