Its ability to combine KVM with VPN facilities is an unusual and useful feature.
The lack of specific Windows authentication support may deter Windows users.
The system is of particular interest to sites that need both remote management and VPN facilities.
This device is unusual in that it offers not only SSL VPN facilities, but can support remote keyboard/video/ mouse (KVM) access to servers, combining two major sets of remote functions in one connection. This has several advantages, since it reduces the number of possible entry points to a secure system. In turn, this can reduce the number of firewall rules needed, which often improves firewall performance. Network administration and technical support can also be simplified with fewer resources needed for control and auditing.
Installing the 1U height device is straightforward. The initial configuration is carried out using the four buttons located on the faceplate to set the initial IP address and net mask before rebooting the system. All other operations can then be performed using a web browser. System configuration and administration tasks are assigned to separate user accounts to give extra security and prevent inadvertent configuration changes.
User authentication can be based on either Radius or local database data, but there is no provision for other methods.
Access to services is controlled by making associations between devices, services and users, giving each user bespoke access to resources from a single log-in screen. Because the system deals with devices as well as services, it can also be set up to provide remote access facilities for technical staff, so they can manage individual hosts and KVM devices without the need for special software or hardware.
The system provides detailed logging and reporting facilities, with options to generate email alerts for situations such as forced account deactivation or specific user sign-on. Log files can be archived and exported for storage and analysis elsewhere as required.
Users gain access to the system using a Java-enabled web browser over an SSL connection to the device. All the user's allocated resources are displayed in a system-generated web page, and all communication between the user and the selected resource is carried out through the secure link.