Control servers and computers either locally via control port or remotely via optional modules through the module expansion slot
F eatures an expansion slot for flexible installation with optional module choices
Flexible auto-scan mode for flexible PC monitoring
Built-in daisy chain port for cascading with KVM-0830/0831 or KVM-1630/1631 up to 8 units
High video display quality up to 1920×1440
Support Windows, NetWare, Unix, Linux, Mac OS and Sun Microsystems
Web based User-interface
The LevelOne KVM-1631 16-port combo KVM switch enables users to control and
manage a server farm or computers connected to the KVM switch with either the
local console or remote console port.
Local Console
The LevelOne KVM-1631 Combo KVM Switch is easy to connect to a PS/2 or USB
enabled keyboard and mouse with a VGA monitor through the local console port.
This enables a user to control systems connected to the KVM switch directly.
Remote Console
In order to make use of the remote control feature, the KVM-1631 provides users
with a greater variety of connectivity options through its expansion slot for optional modules.
LevelOne has available an optional Cat.5 Console Module for this purpose. The
ACC-1000 Cat.5 Console Module allows for the transmission of a Cat.5 signal to
from the controlling unit to units or computers connected to via Cat.5 cabling to
the KVM-1631. The ACC-1000 Cat.5 Module converts the Cat.5 signal into a computer signal to give users the ability to control servers and PCs from a remote location up
to 300 meters away.
Large System Management
By making use of a Daisy chain, up to 128 computers can be connected to the KVM
switch by cascading 8 KVM-0830/0831/0841/1630/1631/1641 together. This gives
network administrator the ability to control larger groups of servers or systems from
one console without the need to switching between different console stations.
The friendly user interface makes management of the KVM switch and systems
connected to it, easy manageable. It also has security measures in place to protect
systems from unauthorized access.