The Lantronix Control Center is a single pane of glass for managing all LM-series devices as well as for automating management of each of the connected network infrastructure devices. It is a single source for secure access, AAA controls, creating power monitoring and action rules without scripting, centrally archiving configs and OS files and compliance reporting.
Deployed onsite on a dedicated server or as a VM, or in the cloud, the Lantronix Control Center is flexible and expandible to grow with your deployment of LM-Series devices. Enterprise high availability licenses are also available for the Lantronix Control Center.
The Lantronix Control Center provides a consistent, enterprise-wide point of control for configuring administrative policies for and scheduling all maintenance, management, configuration, and recovery tasks performed by LM-Series devices. It has a simple point-and-click interface for executing network-wide management tasks such as distributing patches, resetting password, or performing configuration changes.
Integrating with other centralized systems and network management consoles, the Lantronix Control Center connects to other management systems and solutions sending alarms and events that appear as if they came from a managed device itself even if the network connection to the devices is down or degraded.
The Control Center provides a simple interface for users to define custom actions for configuration management and recovery. It archives and stores configuration files for all managed devices and can quickly restore last known good configuration files to a managed device via the connected LM-Series connected device.
Manage access to LM-Series devices as well as the devices connected to them by creating users, roles and resources in the Lantronix Control Center. You can define groups and privileges through the Control Center at the individual user or device level or take advantage of features like inherited permissions that make it easier to standardize across an entire LM-Series deployment. Label ports throughout the deployment for an enterprise management environment that the whole network team can understand.
By customizing roles and assigning privileges, we can easily accomplish tasks including:
To summarize: when you add a user, you will be able to define which commands they can and cannot access on every system, modem and port resource in your entire deployment.
By limiting users to only the commands they need to perform their work, we add an extra layer of protection in the event their account credentials are compromised. Role-based Granular Authorization limits the exposure to only the resources for which they have privileges.
All session logs from LM-Series devices and the Control Center are archived for auditing and compliance.
By continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.