Plug in the dongle server, USB server, and after the beep sound, connect the network cable to it and the server (computer or laptop) and find the initial IP of the device.
Put the server’s IP in the same range as the device and connect to the device’s web page by entering the IP in the browser. Now, from the manufacturer’s website, select the management software according to your operating system. .
SEH company has made the use of hardware locks in the network very easy by producing Promax Server Dongle, USB Dongle, so that it is no longer necessary to separate the hardware lock or dongle from the server during the migration of the server and to the new server. connect
Dongle server Promax, USB Dongle .SEH, allows the dongles to be applicable through IP in the entire network platform.
USB Dongle Server Dongle Server is most used in the following organizations:
Companies producing hardware locks and cloud space.
Organizations and large companies that have a large number of hardware locks and virtual machines.
Organizations with a large number of servers and a large volume of consumers use hardware locks.
The Dongleserver ProMAX USB Server is designed for rack mount, it offers more reliability and redundancy thanks to two internal power supplies and two network connections with 100BaseTX/1000BaseT (IEEE 802.3). It is possible to back up settings to an SD card. Equipped with 20 USB ports, including 5 USB 3.0 ports (Super Speed) and 15 USB 2.0 ports (Hi-speed) along with a memory card slot. This server dongle is also equipped with a display that provides a detailed report related to various parts and the errors that occur. A practical feature that allows monitoring its performance in the server room in the simplest way
Dongle server Dogle Server Promax
- Creating redundant systems and increasing security
- Ensuring the warranty format and advancing Serviceplus hardware replacement
- Ready to install directly in a 19″ server rack.
- Ideal for Windows, Mac OS X and Linux!
- Saving time and money: USB dongles are safe from theft, wear and tear and damage
- Automatic configuration backup with SD card
- Reduced IT support, simplified operations