Logging In to a Server Using the Independent Remote Console (Windows)
Scenarios
Use the independent remote console to remotely access a server from a client running Windows.
Prerequisites
Conditions
The client (for example, a PC) is connected to the iBMC management network port of the server to be accessed.
Data
- iBMC management network port IP address and port number
- User name and password for logging in to the iBMC
Software
You have downloaded the independent remote console software package to the client (PC) and decompressed it.
Procedure
- Configure an IP address for the client (PC) to enable communication between the client and the iBMC.
- Double-click KVM.exe.
The independent remote console interface is displayed, as shown in Figure 7-2.
- Enter the network address, user name, and password.
The network address can be in any of the following formats:
- iBMC [IPv6 address]:Port number or iBMC IPv4 address:Port number
For example, [fc00::64]:444 or 192.168.100.1:444
- iBMC domain name address:Port number
- The iBMC support logins of local and LDAP domain users.
- Port number indicates the HTTPS port number (preferred) or the RMCP+ port number.
- The IPv6 address must be included in square brackets ([ ]), for example, [fc00::64]:444. Do not include the IPv4 address, for example, 192.168.100.1:444.
- If the default port number is used, you do not need to enter the port number.
- iBMC [IPv6 address]:Port number or iBMC IPv4 address:Port number
- Select the login mode, and click Connect.
- Shared Mode: allows two users to access and manage a server at the same time. The two users can see each other's operations.
- Private Mode: allows only one user to access and manage a server.
Information shown in Figure 7-3 is displayed.
If no CA certificate is installed, click Import CA to import a CA certificate (*.cer, *.crt, or *.pem). After the CA certificate is imported, the security risk dialog box will no longer be displayed.
- Click Yes to open the remote console.
The Remote Virtual Console of the server is displayed, as shown in Figure 7-4.
For security purposes, periodically update the certificate.