KVM: is the abbreviation of Keyboard Video Mouse. KVM switches allow you to access and control your computer by directly connecting keyboard, video, and mouse (KVM) ports. KVM technology does not require the target server to modify the software.
This means that the target computer can be accessed at any time in the BIOS environment. KVM provides true motherboard-level access and supports multi-platform servers and serial devices. KVM technology has evolved from the original basic SOHO office type to an enterprise IT basic computer room facility management system. You can easily and directly access servers and devices located in multiple remote locations from the kvm client management software.
The KVM over IP solution has a complete multi-site failover function, a direct interface compliant with IPMI, and the function of mapping local storage media to remote locations. The key points of the security access of the KVM device itself worthy of attention include: whether the KVM device software or system manufacturer supports continuous version upgrades, which tests the manufacturer’s R&D capabilities and sense of responsibility. Can KVM equipment integrate a variety of commonly used security authentication solutions such as Radius, LDAP, AD, and TACACS+ (CC)?
Can KVM equipment set simple network rules to shield illegal access? Specifically, whether there is ACL function. Whether KVM equipment can be managed in groups of multiple users and rights management. Whether the KVM device supports the VPN function. Does the KVM device have a sufficiently powerful log audit function? Can KVM cooperate with third-party products to do better in terms of identity authentication, security audit, log playback, and real-time alarm.
Of course, if the manufacturer is serious enough, features such as anti-DDOS design should also be considered.