ASUS ASMB10-iKVM is the latest server-management solution from ASUS, built upon the ASPEED 2600 chipset running on the latest AMI MegaRAC SP-X. The module provides various interfaces to enable out-of-band server management through WebGUI, Intelligent Platform Management Interface (IPMI) and Redfish® API.
Remote Management
Remote Update
Security Enhancement
ASMB10-iKVM Firmware Framework
ASMB10-iKVM delivers three essential features for server management – Remote management, remote update and security enhancement.
Remote Management
ASMB10-iKVM is an agentless management module to control ASUS servers securely and efficiently. When an ASUS server is connected to power and networking, ASMB10-iKVM enables that system to be monitored and fully managed – either directly in front of the server or remotely, over a network.
With ASMB10-iKVM it’s possible to monitor both system status and hardware-inventory information. It also includes the ASUS-exclusive Thermal Radar II solution to ensure ASUS servers operate in a power-efficient way. For added manage convenience, ASMB10-iKVM supports WebGUI, RESTful APIs such as Redfish and IPMI command for different use scenario, such as enterprise, data centers, cloud-service provision and more.
Remote Update
ASMB10-iKVM supports firmware updates via BIOS, BMC and DFU. It also supports remote BIOS updates, standalone KVM with HTML5 interface for simplified remote control and video recording with BSOD capture for easily trouble-shooting.
All this enables system admins to apply remote keyboard, video and mouse (KVM) control over a network through to provide out-of-band management for around-the-clock remote monitoring via an easy web-based interface – even if the server operating system is down.
Security Enhancement
ASUS servers integrate PFR FPGA as the platform Root-of-Trust solution for firmware resiliency to prevent hackers from gaining access to infrastructure. ASUS security solutions are fully compliant with the 2018 National Institute of Standards and Technology (NIST) SP 800 193 specification.
Detect
Detect configuration security breaches using a non-bypassable cryptographic hardware block.
Recover
Restore platform firmware code to the gold-disc image automatically when a breach is discovered in the active configuration.
Protect
Ensure the authenticity and integrity of platform firmware code updates to avoid corruption.
Features: “Sensor monitoring & reporting when exceeding thresholds/failure Fan and PSU monitoring and faillure alerting IPMI 2.0 compliant Cold boot HTML5 Virtual Console (no Java) SOL Support SSH (SMASH 2.0) support SNMP V3 Alerting Update BIOS, BMC firmware via Web console or Linux tool BIOS setting changing Component Inventory Management
*Some of key features requires cable connection from this card to motherboard or PSU. For more details, please refer to user manual“
Graphics: 1 x D-sub supports max. resolution 1920 x 1200 @ 60 Hz
External Connectors: 1 x D-Sub 1 x LAN (RJ45) port
Internal Connectors: 8 x fan headers 1 x 6-pin PSU connector 1 x BMC header 1 x SPI header 1 x PM_BUS header 1 x USB 2.0 connector 1 x VGA header 1 x Panel header(links to PWR/RST header) 3 x Tr sensor headers 1 x BMC switch jumper 1 x VGA switch jumper 1 x LOC switch jumper 1 x BMC Indicator LED
Operating System: “Windows 10 – 64 bit, Linux OS including Cent OS, Redhat, and Ubuntu”
Accessories: 1 x BMC cable 1 x SPI cable 1 x Power On/Off cable 1 x Reset cable 1 x USB 2.0 cable 1 x IPMI TPM ADAPTER 1 x User manual
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.