The KVM is a 1U rack-mountable device that serves as a single access point for administering and using servers and other devices through out-of-band access methods.You use the KVM ports on the left and middle back of the KVM to connect servers. You can use the AUX port on the right back to connect AlterPath PMs or an optional external modem. You use the management ports on the right back to connect to the KVM and to its connected devices.Depending on the model, the KVM comes with either 16- or 32-KVM ports to connect from 16 to 32 servers with KVM connections.The KVM can be used to manage power of up to 128 devices when the devices are plugged into up to 32 daisy-chained AlterPath PM intelligent power distribution units that are connected to the AUX port on the KVM.KVM administrators and users who are authorized to access connected devices can connect locally or remotely from LANs, WANs, or other dial-in connections through the Ethernet port or through an optional external modem.For extended local administration, administrators can connect the Cyclades AlterPath KVM Expander (purchased separately) to the KVM with a CAT5 cable of up to 500 feet in length.Note: The 500-foot limit includes the distance of the User 2 from the KVM and the distance of the most remote system connected to a KVM port.Secondary KVM units such as the Cyclades AlterPath KVM Expander or another AlterPath KVM can be cascaded for extended KVM server connections. A maximum of 32 secondary KVM devices can be cascaded from the primary KVM extending the number of KVM ports to a maximum of 512 for two-user configuration (i.e. two connections to each cascaded device), or 1024 for a one-user configuration.If multiple KVM units are installed in multiple remote locations, a Cyclades AlterPath Manager (purchased separately) can manage all the KVM units together with other Cyclades products and their connected devices through a single IP address.Access to the KVM for administration is separate from access to connected devices. Only the KVM administrator can configure access to the KVM and to the connected devices.Both KVM administrators and users authorized to access connected devices can use the WMI from a browser. Authorized users can log in to devices, manage power, and change their own passwords, but they do not have access to the KVM screens for configuring users or ports.All logins to the KVM are subject to authentication. The KVM administrator can restrict access to each of the connected devices by choosing among authentication methods for logins to the KVM and to its ports. Authentication can be local to the KVM or through an authentication server.The KVM administrator can further control access by controlling which ports are assigned to each user name.The KVM administrator can configure event logging, alarms, and notifications, set up encryption, and data buffering.