Control Center
Advanced Out-of-Band Management for LM-Series Devices & Connected Network Infrastructure
The Lantronix Control Center is a single pane of glass for managing all LM-series devices as well as for automating management of each of the connected network infrastructure devices. It is a single source for secure access, AAA controls, creating power monitoring and action rules without scripting, centrally archiving configs and OS files and compliance reporting.
Deployed onsite on a dedicated server or as a VM, or in the cloud, the Lantronix Control Center is flexible and expandible to grow with your deployment of LM-Series devices. Enterprise high availability licenses are also available for the Lantronix Control Center.
Single Interface for Out-of-Band Management
The Lantronix Control Center provides a consistent, enterprise-wide point of control for configuring administrative policies for and scheduling all maintenance, management, configuration, and recovery tasks performed by LM-Series devices. It has a simple point-and-click interface for executing network-wide management tasks such as distributing patches, resetting password, or performing configuration changes.
Integrating with other centralized systems and network management consoles, the Lantronix Control Center connects to other management systems and solutions sending alarms and events that appear as if they came from a managed device itself even if the network connection to the devices is down or degraded.
The Control Center provides a simple interface for users to define custom actions for configuration management and recovery. It archives and stores configuration files for all managed devices and can quickly restore last known good configuration files to a managed device via the connected LM-Series connected device.
Control Center Overview
Granular authorization: Control and Know Who is Doing What
Manage access to LM-Series devices as well as the devices connected to them by creating users, roles and resources in the Lantronix Control Center. You can define groups and privileges through the Control Center at the individual user or device level or take advantage of features like inherited permissions that make it easier to standardize across an entire LM-Series deployment. Label ports throughout the deployment for an enterprise management environment that the whole network team can understand.
By customizing roles and assigning privileges, we can easily accomplish tasks including:
- Limit users to port-passthrough for a managed device (e.g., SSH to IP on port and get to router)
- Use labels to give a group access to all firewalls or switches throughout the deployment
- Limit administrative access by creating roles that deny those tasks and use them in conjunction with the admin role
- Give a user access to just one port
- Give a user access to the system and no ports
- Give read-only access to resources
- Assign privileges to multiple User groups and have user inherit those privileges when assigned to that User group
To summarize: when you add a user, you will be able to define which commands they can and cannot access on every system, modem and port resource in your entire deployment.
By limiting users to only the commands they need to perform their work, we add an extra layer of protection in the event their account credentials are compromised. Role-based Granular Authorization limits the exposure to only the resources for which they have privileges.
All session logs from LM-Series devices and the Control Center are archived for auditing and compliance.