Black Box ACR1000A-CTL-24 24-Endpoint KVM-over-IP Matrix iPATH Controller

Part Number:
Call for stock
Intuitive user interface delivers secure access and communications
24/7 reliability and operation
Easy centeralized management
Three connection modes, View only, Shared or Exclusinve
Payment by Check or Wire Transfer
Call to place an order

The Agility IP-Based KVM Switching and Extension system incorporates a management system to scale from a point-to-point extension and switching system to a digital KVM matrix system that works over a local area network (LAN). The iPATH management system controls transmitters, receivers, users, passwords, and access rights over a single IP network.

The Agility system uses standard Ethernet protocol to operate. Since Agility operates over a LAN, it does not need to support encryption; no outside access is granted. The network should support IGMP snooping, which reduces unwanted traffic that would slow down the network.

The channel is a virtual transmitter
In most cases, video, audio, and USB streams will originate from a single transmitter. However, with a management controller, you can arrange for the video and USB streams to come from one source, and audio to stream from another source. You could also have two channels coming from a host computer with different access rights.

Setting up groups.
In order to accommodate poteBlack Boxally large numbers of users and devices, iPATH uses a system of groups: User Groups, Receiver Groups, and Channel Groups. Groups enable the system administrators to apply collective settings to all members, and for those members to benefit from settings and permissions in other groups where appropriate. This benefit saves administrators time.

Active Directory
To streamline administration further, iPATH supports Active Directory. By synchronizing with an LDAP/Active Directory server, users' details (including usernames, passwords, and group memberships) can be securely synchronized from existing databases. This minimized initial configurations and streamlines ongoing updates.

Administration Rights The admin is able to add, edit, and remove users, passwords, and access rights via the Agility controller unit. The admin can designate a hotkey sequence that users use a login. Once the user is logged in, they are able to see the target computers that are available to them. The admin can see who is actively logged into the system, and also force a user to switch to a computer port.

This product is non-returnable & non-refundable!