Network Computing is part of the Informa Tech Division of Informa PLC
Remote Management In-Reach
I connected several Cisco Systems routers and switches--a Catalyst 6500, a 2948G-L3 switch, a 7401ASR and a Catalyst 4500--to the LX-4048S before pulling up the Web console to begin configuration for each port. The Web console requires JRE (Java Runtime Environment) 1.3.0+ for unencrypted access and JRE 1.4.1 for encrypted access. A link on the main page connects you to Sun Microsystems' site, where you can download 1.4.0 JRE. I accessed the Web console using both Microsoft Internet Explorer 6 and Netscape 7.02 without a problem.
Although you can name each of the ports to help manage which device is connected to which port, this data is not reflected in the port list; you must track port and device associations on your own. Aside from this small drawback, which MRV says will be addressed in a fourth-quarter release, the device offers options galore. From standard serial settings and telnet options to access modes, the LX-4048S covers nearly every scenario you'd find in your data center.
Setting up serial console access to the routers, including authentication options, was a breeze. RADIUS, TACACS+ and SecurID are offered, but I was unable to take advantage of these options because we don't use them in the lab. Once the port configuration was complete, I clicked a button in the Java administration console to connect to the LX-4048S.
Connecting to a device requires two authentication steps, however: one to the LX-4048S and another to the device. The Java applet providing access can use telnet or SSH (configurable on a per-connect basis) to connect to the LX-4048S, then it links to the device on your behalf. Each port can be configured with its own security features including multilevel passwords and access control lists, making it possible to limit access to individual ports by IP address.
Recommended For You
From infrastructure to app delivery, from data to applications, it’s past time to modernize your practices, processes, and providers to ensure you’re able to take advantage of AI and whatever comes next.
What skills do network managers really need to properly secure industrial networks? What new protocols, frameworks, and regulations are important? And what conferences and certifications can help? Here are five tips to get started.
A full-stack approach to retail edge offers retailers a way to optimize operations and adapt to changes in a post-pandemic world.