Raritan Computer KSX II Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Raritan Computer KSX II an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Raritan Computer KSX II, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Raritan Computer KSX II die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Raritan Computer KSX II. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Raritan Computer KSX II sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Raritan Computer KSX II
- Den Namen des Produzenten und das Produktionsjahr des Geräts Raritan Computer KSX II
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Raritan Computer KSX II
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Raritan Computer KSX II zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Raritan Computer KSX II und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Raritan Computer finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Raritan Computer KSX II zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Raritan Computer KSX II, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Raritan Computer KSX II widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Copyright © 2011 Raritan, Inc. DKSXII-v2.3.5- 0E - E March 2011 255 - 62 - 4030 - 00 Dominion KSX II User Guide 2.3.5[...]

  • Seite 2

    This document contains p roprietary information that is protected by copyright. A ll rights reserved. No part of this document may be photo copied, reproduced, or t ranslated into another lan guage without express prior written con sent of Raritan, Inc. © Copyright 2011 Raritan, Inc. All third-party software and hardware mentione d in this documen[...]

  • Seite 3

    iii Contents Chapter 1 Introduction 1 KSX II Overview ............................................................................................................................. 2 KSX II Help .................................................................................................................................... 4 Related Documentation[...]

  • Seite 4

    Contents iv Video Properties ................................................................................................................ 63 Mouse Options ................................................................................................................... 68 VKC Virtual Media ......................................................[...]

  • Seite 5

    Contents v Users .......................................................................................................................................... 120 User List ........................................................................................................................... 120 Adding a New User ..................................[...]

  • Seite 6

    Contents vi Configuring IP Access Cont r ol ................................................................................................... 1 99 SSL Certificates ......................................................................................................................... 201 Security Banner ..........................................[...]

  • Seite 7

    Contents vi i Target Connections and the CLI ................................................................................................ 236 Setting Emulation on a Target ......................................................................................... 236 Port Sharing Using CLI .........................................................[...]

  • Seite 8

    Contents viii Resetting the KSX II Using the Reset Button ............................................................................ 256 Chapter 14 Modem Configuration 257 Certified Modems for UNIX , Linux and MPC ............................................................................. 257 Low Bandwidth KVM Settings .........................[...]

  • Seite 9

    Contents ix Setting the Registry to Permit Write Operations to the Schema ............................................... 296 Creating a New Attribute ............................................................................................................ 296 Adding Attributes to the Class .......................................................[...]

  • Seite 10

    Contents x Appendix D FAQs 316 General Questions ..................................................................................................................... 316 Serial Access ............................................................................................................................. 318 Universal Virtual Media ...........[...]

  • Seite 11

    1 In This Chapter KSX II Overview ................................................................ ........................ 2 KSX II Help ................................................................................................ 4 KSX II Client Applications .......................................................................... 4 Virtual M[...]

  • Seite 12

    Chapter 1 : Introduction 2 KSX II Overview Raritan's Dominion KSX II is an ente rprise-class, secure digital de vice that provides a single integ rated solution for remote KVM (keyboard, video, mouse) server access a nd serial device manageme nt, as well as power control from anywh ere in the world from a we b browser. At the rack, the KSX II [...]

  • Seite 13

    Chapter 1 : Introduction 3 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) KSX II Local access Remote KVM and serial devices IP LAN/WAN Modem access PSTN Remote (network) acces s[...]

  • Seite 14

    Chapter 1 : Introduction 4 KSX II Help The KSX II help provides infor mation on how to ins tall, set up, and configure the KSX II. It also includes information on accessing t arget servers and power strips, u sing virtual media, managi ng users and security, and maintaining a nd diagnosing the KSX II. A PDF version of the help can be do wnloaded fr[...]

  • Seite 15

    Chapter 1 : Introduction 5 Virtual Media All KSX II models suppo rt virtual media. The benefit s of virtual media - mounting of remote drives/media o n the target server to support software installation and diagnosti cs - are now available in all of the KS X II models. Virtual media sessions can be secured by usi ng 128-bit and 256 -bit AES or RC4 [...]

  • Seite 16

    Chapter 1 : Introduction 6  Local serial port (RS232) for C LI-based administration and serial target access  Integrated power control  Dual dedicated power control ports  LED indicators for networ k activity, and remote KV M user status  Hardware reset button  Internal modem  Centralized access securit y Software  Virtual m[...]

  • Seite 17

    Chapter 1 : Introduction 7 External Product Overview The following diagram indicate s the external components of the KSX II. Note that the KSX II 144 wi ll have 4 KVM ports and 4 serial ports as compared to the KSX I I 188 used in the diagram, which has 8 KVM ports and 8 serial ports. Item Description USB port Remote indicator light LAN1 and LAN2 i[...]

  • Seite 18

    Chapter 1 : Introduction 8 Item Description AC power cord plug See Power Control (on page 158 ) for additional information. Power on/off switch LAN 3 port Note: The LAN 3 port is rese rved for future use. LAN1 and LAN2 ports See Step 3: Connect t he Equipment for additional information. Admin port See Step 3: Connect the E quipment for additional i[...]

  • Seite 19

    Chapter 1 : Introduction 9 Terminology This manual uses the following t erminology for the components of a typical KSX II configuratio n:[...]

  • Seite 20

    Chapter 1 : Introduction 10 Diagram key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Vi deo, Mouse) UTP Cable (Cat5/5e/6) KSX II Local Access Console Local User - an optional user co nsole (consisting of a keyboard, mouse, and mult i-sync VGA monitor) attached directly to the KSX II to control KVM target servers a nd serial targets locally (directly at t[...]

  • Seite 21

    Chapter 1 : Introduction 11 Diagram key serial port connected remotely via KSX II. Routers Dominion PX Rack PDU (Power Strip) Raritan rack PDUs accessed rem otely via the KSX I I. Package Contents Each KSX II ships as a f ully-configured stand-alone product in a standard 1U 19" rackmoun t chassis. Each KSX I I device ships with the following c[...]

  • Seite 22

    12 In This Chapter Overview .................................................................................................. 12 Default Login Information ........................................................................ 12 Getting Started ........................................................................................ 13 Overview T[...]

  • Seite 23

    Chapter 2 : Installation and Configuration 13 Getting Started Step 1: Configure KVM T arget Servers KVM target servers are t he computers that will be a ccessed and controlled via the KSX II. Before installing the KSX I I, configure all KVM target servers to ensure opt imum performance. This config uration applies only to KVM target server s, not t[...]

  • Seite 24

    Chapter 2 : Installation and Configuration 14 Operating System Mouse and Video Settings This section provides v ideo mode and mouse inf ormation specific to the operating system in use o n the target server. Windows XP, Windows 2003 and Windows 2008 Settings To configure KVM target servers running Windo w s XP ® , Windows 2003 ® and Windo w s 200[...]

  • Seite 25

    Chapter 2 : Installation and Configuration 15 Windows Vista Settings To configure KVM target servers running Windo w s Vista ® operating system: 1. Configure the mouse settin gs: a. Choose Start > Settings > Control Panel > Mouse. b. Select "Advanced system settings" from the left nav igation panel. The System Properties di alog[...]

  • Seite 26

    Chapter 2 : Installation and Configuration 16  Set the mouse motion speed sett ing to exactly the middle speed.  Disable the "Enhanced poi nter precision" option.  Click OK. 2. Disable animation and fade effects: a. Select Control Panel > System and S ecurity. b. Select System and then select "Advanced system settings&quo[...]

  • Seite 27

    Chapter 2 : Installation and Configuration 17  Deselect the "Use the following t ransition effect for menu s and tooltips" option. 3. Click OK and close the Control P anel. Linux Settings (Red Hat 4) Note: The following setting s are optimized for Standard Mou se mode only. To configure KVM target servers running Linux ® (graphical us[...]

  • Seite 28

    Chapter 2 : Installation and Configuration 18 SUSE Linux 10.1 Settings Note: Do not attempt to synchronize the m ouse at the SUSE Linux ® login prompt. You must be con nected to the target server t o synchronize the mouse cursors. To configure the mouse s ettings: 1. Choose Desktop > Control Center. The Desktop P references dialog appears. 2. C[...]

  • Seite 29

    Chapter 2 : Installation and Configuration 19 Tip : If you do not want to be prom pted upon log out, follow the se procedures instead. To make your settings pe rmanent in Linux (no pro mpt): 1. Choose Desktop > Control Center > System > Sessio ns. 2. Click the Session Options tab. 3. Deselect the "Prompt on th e log off" checkbox[...]

  • Seite 30

    Chapter 2 : Installation and Configuration 20 Display resolution Vertical refresh rate Aspect ratio 1280 x 1024 60,75,85 Hz 5:4 1152 x 864 75 Hz 4:3 1024 x 768 60,70,75,85 Hz 4:3 800 x 600 56,60,72,75,85 Hz 4:3 720 x 400 85 Hz 9:5 640 x 480 60, 72,75,85 Hz 4:3 3. KVM target servers runni ng the Solaris operating syst em must output VGA video (H-and[...]

  • Seite 31

    Chapter 2 : Installation and Configuration 21 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click. 2. Choose Tools > Terminal. A terminal window opens. (It is best to be at the root to issue commands. ) Video Settings (POST) Sun systems have two differe nt resolution settings: a POST resolution and a GUI re[...]

  • Seite 32

    Chapter 2 : Installation and Configuration 22 IBM AIX 5.3 Settings Follow these steps to configure KVM target servers running IBM ® AIX ™ 5.3. To configure the mouse: 1. Go to Launcher. 2. Choose Style Manager. 3. Click Mouse. The Style Manage r - Mouse dialog appears. 4. Use the sliders to set the Mouse ac celeration to 1.0 and Threshold to 1.0[...]

  • Seite 33

    Chapter 2 : Installation and Configuration 23 To take advantage of the KSX I I: The firewall must allo w inbound communicatio n on: Web-access capabilities Port 443 - standard TCP p ort for HTTPS communication Automatic redirection of HTTP requests to HTTPS (so the more common “http://xxx.xxx.xxx.x xx” can be used instead of “https://xxx.xxx.[...]

  • Seite 34

    Chapter 2 : Installation and Configuration 24 B. Network Port The KSX II provides two E thernet ports for failover p urposes (not for load-balancing). By default, only LAN1 is active and the autom atic failover is disabled. When enabled, if the KSX II internal network interface or the network swi tch to which it is connected becomes unavailable, LA[...]

  • Seite 35

    Chapter 2 : Installation and Configuration 25 You can use the Local Adm in port to connect the KSX II directly to a workstation to manage yo ur serial targets and config ure the system with a terminal emulation prog ram such as HyperTermi nal. The Local Admin port requires the use of a st andard null modem cable. Note: When Local Authorizat ion and[...]

  • Seite 36

    Chapter 2 : Installation and Configuration 26 4. Connect the rack PDU to an AC power source. 5. Power on the KSX II device. Important: When using CC-SG, the power ports should be inactive before attaching rack PDUs th at were s wapped between the power ports. If this is not done, there is a possibility that the numbe r of power outlets will not be [...]

  • Seite 37

    Chapter 2 : Installation and Configuration 27 F. Serial Target Ports To connect a serial target to the KSX II, use a Cat5 cable with a n appropriate serial adapter. The following table lists the neces sary KSX II hardware (ad apters and/or cables) for connecting the KSX II to common vend or/model combinations. Vendor Device Console connector Serial[...]

  • Seite 38

    Ch apter 2 : Installation and Configuration 28 Go to the Support page on Ra ritan's website (www.raritan. com) to obtain a list of commonly used cable s and adapters. Step 4: Configure the KSX II The first time you power u p the KSX II device, ther e is some initial configuration that you need to perform through the K SX II Local Console:  [...]

  • Seite 39

    Chapter 2 : Installation and Configuration 29 Assigning an IP Address These procedures describe how to assign an IP address o n the Network Settings page. For complet e information about all of t he fields and the operation of this page, see Network Settings . To assign an IP address: 1. Choose Device Settings > Network. The Network Set tings pa[...]

  • Seite 40

    Chapter 2 : Installation and Configuration 30 e. Link-Local IP Address. This addres s is automatically assigned t o the device. It is used for ne ighbor discovery or when n o routers are present. Read-Only f. Zone ID. This identifies the device with which the ad dress is associated. Read-Only g. Select the IP Auto Configurat ion. The following opti[...]

  • Seite 41

    Chapter 2 : Installation and Configuration 31 Naming Target Servers To name the target serv ers: 1. Connect all of the target server s if you have not alrea dy done so. See Step 3: Connect the Equipment for a description of con necting the equipment. 2. Using the KSX II Local Consol e, choose Device Settings > Port Configuration. The Port Conf i[...]

  • Seite 42

    Chapter 2 : Installation and Configuration 32 Configuring Direct Port Access via Telnet, IP Address or SSH The information in this topi c is specific to enabling dir ect port access for serial targets. Use the Ena ble Direct Port Acce ss via URL option on the Device Services page to en able direct port access for a KVM/serial port connect to the KS[...]

  • Seite 43

    Chapter 2 : Installation and Configuration 33 3. Click OK to save this information. Once you have created th e direct port access, it can be connected in a client application such as P uTTY. Following is an example of how the direct port access informat ion would appear in PuTT Y. Note that PuTTY is not the only client applicat ion that can be used[...]

  • Seite 44

    Chapter 2 : Installati on and Configuration 34 Note to CC-SG Users Note to CC-SG Users If you are using the KSX II in a CC-SG configuration, perfor m the installation steps, and whe n finished, consult the Co mmandCenter Secure Gateway User Guide , Administra tor Gui de , or Deploy ment Guide to proceed (all foun d on Raritan's website, www.ra[...]

  • Seite 45

    Chapter 2 : Installation and Configuration 35 Create User Groups and Users As part of the initial configuration, you must define user group s and users in order for users to access t he KSX II. The KSX II uses system-supplie d default user groups and allows you to create groups and specify t he appropriate permissions to suit your needs. User names[...]

  • Seite 46

    36 In This Chapter Interfaces ................................................................................................ . 36 Proxy Server Configurat ion for use with MPC, VKC and A KC ................ 50 Virtual KVM Client (VKC) ......................................................................... 51 Active KVM Client (AKC) .............[...]

  • Seite 47

    Chapter 3 : Working with Target Servers 37 The following sections of the user g uide contain information about using specific interfaces to conn ect to the KSX II and manage targets:  KSX II Local Console Inte rface: KSX II Devices (see " KSX II Local Console: KSX II Devices " on page 37 )  KSX II Remote Console Interfac e (on page [...]

  • Seite 48

    Chapter 3 : Working with Target Serve rs 38 KSX II Remote Console Interfac e The KSX II Remote Console is a br owser-based graphical user int erface that allows you to log in to KV M target servers and serial targ ets connected to the KSX II and t o remotely administer the KSX II. The KSX II Remote Console provid es a digital connect ion to your co[...]

  • Seite 49

    Chapter 3 : Working with Target Servers 39 Depending on your brows er and security settings, you may see various security and certificate wa rnings. It is necessary to accept these warnings to launch the KSX II Remote Console. You can reduce the numbe r of warning messages du ring subsequent log ins by checking the following option s on the securit[...]

  • Seite 50

    Chapter 3 : Working with Target Servers 40 Interface and Navigation KSX II Console Layout Both the KSX II Remote C onsole and the KSX II Local Console interfaces provide an HTML (web-ba sed) interface for configuratio n and administration, as well as target server list and selection. The options are organized into various tab s. After successful lo[...]

  • Seite 51

    Chapter 3 : Working with Target Servers 41 Left Panel The left panel of the KSX II interface contains the follo wing information. Note that some informatio n is conditional and will onl y be displayed if you are a certain of user, are using certain features, and so on. Thi s conditional information is n oted here. Information Description When displ[...]

  • Seite 52

    Chapter 3 : Working with Target Servers 42 Information Description When displayed? Connected Users The users, identified by their username and IP address, who are currently connected to the KSX II. Always Online Help - User Guide Links to online help. Always Favorite Devices See Managing Favorites (on page 46 ). Always FIPS Mode FIPS Mode: EnabledS[...]

  • Seite 53

    Chapter 3 : Working with Target Servers 43 Port Access Page After successfully logging o n to the KSX II Remote Consol e, the Port Access page appears. This page lists all of the KSX II ports, the connected KVM target se rvers, and their statu s and availability. The Port Access page provides a ccess to the KVM target se rvers connected t o the KSX[...]

  • Seite 54

    Chapter 3 : Working with Target Servers 44  Availability - The Availabili ty can be Idle, Connected, Busy, or Unavailable. Blade serve rs will have an availability of either shared or exclusive when a connectio n to that blade is in pla ce. 3. Click View by Port, View by Group or View by Search to switch between views. 4. Click the Port Name of [...]

  • Seite 55

    Chapter 3 : Working with Target Servers 45  Power On - Powers on the target server through the a ssociated outlet. This option is visible only whe n there are one or mo re power associations to the target.  Power Off - Powers off t he target server through the a ssociated outlets. This option is visible only when there are one or more power a[...]

  • Seite 56

    Chapter 3 : Working with Target Servers 46 Managing Favorites A Favorites feature is provided s o you can organize and qui ckly access the devices you use frequently . The Favorite Devices section is located in the lower left side (side bar) of the Port Access page and p rovides the ability to:  Create and manage a list of favorite devices  Q[...]

  • Seite 57

    Chapter 3 : Working with Target Servers 47 Note: Both IPv4 and IPv6 a ddresses are supported. Manage Favorites Page To open the Manage Favorites pa ge:  Click the Manage button in the left panel. The Manage Fav orites page appears and contain s the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local [...]

  • Seite 58

    Chapter 3 : Working with Target Servers 48 c. Click Save. 3. Click Refresh. The list of dev ices on the local subnet is refr eshed. To add devices to y our Favorites List: 1. Select the checkbox next to the device name/IP addr ess. 2. Click Add. Tip: Use the Select All and Desele ct All buttons to quickly sele ct all (or deselect all) devices in th[...]

  • Seite 59

    Chapter 3 : Working with Target Servers 49 Adding, Deleting and Editing Favorites To add a device to y our favorites list: 1. Choose Manage > Add New D evice to Favorites. Th e Add New Favorite page appears. 2. Type a meaningful description. 3. Type the IP Address/Host Name for the device. 4. Change the discovery Port (if necessary). 5. Select t[...]

  • Seite 60

    Chapter 3 : Working with Target Servers 50 Proxy Server Configuration for use with MPC, VKC and AKC When the use of a Proxy Server i s required, a SOCKS proxy must also be provided and configured on the remote client PC. Note: If the installed prox y server is only capable of the HTTP proxy protocol, you cannot conne ct. To configure the SOCKS prox[...]

  • Seite 61

    Chapter 3 : Working with Target Servers 51 start javaw -Xmn128M -Xm x512M -XX:MaxHeapFree Ratio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=tr ue -DsocksProxyHost=192.1 68.99.99 -DsocksProxyPo rt=1080 -classpath .sdeploy.jar;.sFoxt rot.jar;.jaws.jar;.sMpc.jar com.raritan.rrc.ui.RRCAppl ication %1 Virtual KVM Client (VKC) Please note this cl[...]

  • Seite 62

    Chapter 3 : Working with Target Servers 52 Button Button Name Description Video Settings Opens the Video Setting s dialog, allowing you to manually adjust video con version parameters. Color Calibration Adjusts color setting s to reduce excess color noise. Same as choosing Video > Color Calibrate. Note: Not available in KX II-101-V2. Target Scre[...]

  • Seite 63

    Chapter 3 : Working with Target Servers 53 Switching Bet ween KVM Target Servers With the KSX II, you can a ccess several KVM target servers. The KSX I I provides the ability to switch from o ne target server to anothe r. Note: This feature is avail able in the KSX I I Remote Console only. To switch bet ween KVM target servers: 1. While already usi[...]

  • Seite 64

    Chapter 3 : Working with Target Servers 54 Disconnecting KVM Target Serv ers Note: This item is not avail able on the KSX II Local C onsole. The only way to disconnect from the switche d target in the Local Console i s to use the hot key. To disconnect a target s erver: 1. Click the port name of the target you want to disconnect. The Port Action me[...]

  • Seite 65

    Chapter 3 : Working with Target Servers 55 Connection Properties The dynamic video compre ssion algorithms maintain K VM console usability under varying ban dwidth constraints. The de vices optimize KVM output not only for LAN use, but also for WAN use. Th ese devices can also control color depth an d limit video output, offering an optimal balance[...]

  • Seite 66

    Chapter 3 : Working with Target Servers 56  256 Kb (Cable)  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings a re an optimization f or specific conditions rather than an exact spee d. The client and server al ways attempt to deliver video as quickly as possibl e on the network reg[...]

  • Seite 67

    Chapter 3 : Working with Target Servers 57 Connection Information To obtain information about y our Virtual KVM Client connection:  Choose Connection > Info.. . The Connection Info window opens. The following information is display ed about the current conne ction:  Device Name - The name of t he device.  IP Address - The IP addre ss of[...]

  • Seite 68

    Chapter 3 : Working with Target Servers 58 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) o r Virtual KVM Client (VK C). Macros exported from MPC or VKC cannot be imported into AKC. Note: KX II-101 does not support AKC. To import macros: 1. Choose Keyboard > Impo rt [...]

  • Seite 69

    Chapter 3 : Working with Target Servers 59  Click Yes to replace the ex isting macro with the imported version.  Click Yes to All to replace the curre ntly selected and any other duplicate macros t hat are found.  Click No to keep the original macro and proceed to the next macro  Click No to All keep the ori ginal macro and proceed to t[...]

  • Seite 70

    Chapter 3 : Working with Target Servers 60 3. Click Ok. The Export Key board Macro. A dialog from which to locate and select the macro file a ppears. By default, the macro exists o n your desktop. 4. Select the folder to save the macro file to, enter a name f or the file and click Save. If the macro alre ady exists, you receive an alert message. Se[...]

  • Seite 71

    Chapter 3 : Working with Target Servers 61 Press Left Ctrl Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequen ce field to be sure the ma cro sequence is defined correctly. a. To remove a step in the sequence, select it and click Rem ove. b. To change the order of steps in the sequence, click the step a nd then click the up or down a[...]

  • Seite 72

    Chapter 3 : Working with Target Servers 62 Running a Keyboard Macro Once you have created a keyboard macro, execute i t using the keyboard macro you assigned to it or by choosing it from t he Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyb oard menu. Execute the keyboard macro by clicking on it in the[...]

  • Seite 73

    Chapter 3 : Working with Target Servers 63 3. Set the language and mouse s ettings. 4. Exit the menu to return to n ormal CIM functionality. Video Properties Refreshing the Screen The Refresh Screen com mand forces a refresh of t he video screen. Video settings can be refre shed automatically in sever al ways:  The Refresh Screen com mand forces[...]

  • Seite 74

    Chapter 3 : Working with Target Servers 64 Calibrating Color Use the Calibrate Color command to optimize the colo r levels (hue, brightness, saturation) of t he transmitted video imag es. The color settings are on a target s erver-basis. Note: The Calibrate Colo r command applies to the current connection only. Note: The KX II-101 does suppo rt col[...]

  • Seite 75

    Chapter 3 : Working with Target Servers 65 c. Brightness: Use this setting to adjust the brightness of the target server display. d. Brightness Red - Controls the brightness of the t arget server display for the red signal. e. Brightness Green - Controls the bri ghtness of the green sign al. f. Brightness Blue - Controls the brightness of the blue [...]

  • Seite 76

    Chapter 3 : Working with Target Servers 66 Note: Some Sun background sc reens, such as scre ens with very dark borders, may not center precisel y on certain Sun servers. Use a different background or place a light er colored icon in the upper left corner of the screen.[...]

  • Seite 77

    Chapter 3 : Working with Target Servers 67 Using Screenshot from Target You are able to take a scre enshot of a target serve r using the Screenshot from Target server c ommand. If needed, save this screenshot to a file location of your choosing as a bit map, JPEG or PNG file. To take a screenshot of t he target serv er: 1. Select Video > Screens[...]

  • Seite 78

    Chapter 3 : Working with Target Servers 68 Changing the Maximum Refresh Rate If the video card you are u sing on the target uses cust om software and you are accessing the targ et through MPC or VKC, you may need to change the maximum refre sh rate of the monitor in order f or the refresh rate to take effect on the target . To adjust the monitor re[...]

  • Seite 79

    Chapter 3 : Working with Target Servers 69 Mouse Pointer Synchronization When remotely v iewing a target server that uses a m ouse, two mouse cursors are displayed: one belonging to your remote cl ient workstation and the other belonging to t he target server. When the mou se pointer lies within the Virtual KVM Client target server window, m ouse m[...]

  • Seite 80

    Chapter 3 : Working with Target Servers 70 Additional Notes for Intelligent Mouse Mode  Be sure that there are no ic ons or applications in the upper left section of the screen since that is where the synchron ization routine takes place.  Do not use an animated mous e.  Disable active desktop on KVM target servers. Synchronize Mouse In du[...]

  • Seite 81

    Chapter 3 : Working with Target Servers 71 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mou se settings and synchronize t he mouse cursors accordingly, allowing mouse acceleration on the target. Intelligent mouse mode is t he default for non -VM targets. In this mode, the mouse c ursor does a “dance” in the[...]

  • Seite 82

    Chapter 3 : Working with Target Servers 72 Please note that mouse co nfigurations will vary on di fferent target operating systems. Cons ult your OS guidelines for furt her details. Also note that intelligent mouse synchr onization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coo rdinates are used to k eep the client [...]

  • Seite 83

    Chapter 3 : Working with Target Servers 73 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mo de: 1. Press Ctrl+Alt+O on your k eyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media (on page 90 ) for complete info rmation about setting up and using virtual medi a.[...]

  • Seite 84

    Chapter 3 : Working with Target Servers 74 Smart Cards For a list of supported smart cards, smart card readers, and ad ditional system requirements, see Supported and Unsuppo rted Smart Card Readers (on page 283 ). When accessing a server remotely, you will have the opportunity to select an attached smart card reader and mount it onto the server. S[...]

  • Seite 85

    Chapter 3 : Working with Target Servers 75 4. A progress dialog will open. Check the 'Mount selected card r eader automatically on connection t o targets' checkbox to mount the smart card reader automatically the next time you connect t o a target. Click OK to begin the mounting process. To update the smart card in the Select Smart Card R[...]

  • Seite 86

    Chapter 3 : Working with Target Servers 76 Tool Options From the Tools menu, you can specify certain option s for use with the Virtual KVM Client, includi ng logging, setting the keyboa rd type, and defining hot keys for exitin g Full Screen mode and Single C ursor mode. Note: The KX II-101 and K X II- 101 -V2 do not suppo rt single cursor mode. To[...]

  • Seite 87

    Chapter 3 : Working with Target Servers 77 4. Exit Full Screen Mode - Hotkey. When y ou enter Full Screen mo de, the display of the target server be comes full screen and acqui res the same resolution as the ta rget server. This is the hot k ey used for exiting this mode. 5. Exit Single Cursor Mode - Hotk ey. When you enter si ngle cursor mode, onl[...]

  • Seite 88

    Chapter 3 : Working with Target Servers 78 Language Configuration method Japanese System Settings (Control Center) UK System Settings (Control Center) Korean System Settings (Control Center) Belgian Keyboard Indicator Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Keyboard Indicator Hungarian System Settings (Control Center) Spanish[...]

  • Seite 89

    Chapter 3 : Working with Target Servers 79 View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off):  Choose View > View Toolb ar. Scaling Scaling your target window allow s you to view the entire content s of the target server window. This feature incr[...]

  • Seite 90

    Chapter 3 : Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provi des version informatio n about the Virtual KVM Client, in case you require assistance from Raritan T echnical Support. To obtain version information: 1. Choose Help > About Rarit an Virtual KVM Client. 2. Use the Copy to Clipboard but[...]

  • Seite 91

    Chapter 3 : Working with Target Servers 81 AKC Supported .NET Frame w ork, Operating Systems and Browser s .NET Framework AKC requires Windows .N ET ® version 3.5, and will work with both 3.5 and 4.0 installed. Operating Systems AKC is compatible with the followin g platforms running . NET Framework 3.5:  Windows XP ® operating system  Wind[...]

  • Seite 92

    Chapter 3 : Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC:  Ensure the cookies from the I P address of the device t hat is being accessed are not currently being bl ocked.  Windows Vista, Windows 7 and Windows 2008 server users should ensure that the IP address of the device being acce ssed is included in thei[...]

  • Seite 93

    Chapter 3 : Working with Target Servers 83 Note: The Alt+Tab comm and toggles between windows o nly on the local system. When MPC opens, the Rar itan devices that were automatically detected and which are f ound on your subnet are displ ayed in the Navigator in tree format. 2. If your device is not listed b y name in the navigator, ad d it manually[...]

  • Seite 94

    Chapter 3 : Working with Target Servers 84 Note: A security pop-up screen ap pears only if you used htt ps to connect to the RSC. 3. If you're using Dominion DSX :  Click Yes. A Warning - Security pop-up screen appears.  Click Yes to access the Raritan Serial Console from th e Port page. Note: If you click Always, you will not receive th[...]

  • Seite 95

    Chapter 3 : Working with Target Servers 85 5. Click OK to log on.[...]

  • Seite 96

    86 In This Chapter Overview .................................................................................................. 86 Turning Outlets On/Off and Cycling Power ............................................. 87 Overview The KSX II allows you to co ntrol Raritan PX and RPC series rack PDU (power strip) outlets. On ce a PX or RPC series i s [...]

  • Seite 97

    Chapter 4 : Rack PDU (Power Strip) Outlet Control 87 Initially, when you open the Powerstrip page, the po wer strips that are currently connected to the K SX II are displayed in the Powerstrip drop-down. Additionally, informatio n relating to the currently selected power strip is displayed. If no power strips are connected to the KSX II, a message [...]

  • Seite 98

    Chapter 4 : Rack PDU (Power Strip) Outlet Control 88 5. Click OK to close the Power On confirmation dialog. T he outlet will be turned on and its state will be displayed as 'on'. To turn an outlet off: 1. Click Off. 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The o utlet will be turned off and it[...]

  • Seite 99

    Chapter 4 : Rack PDU (Power Strip) Outlet Control 89 2. Click OK. The outlet will then cycl e (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog.[...]

  • Seite 100

    90 In This Chapter Overview .................................................................................................. 91 Prerequisites for Using Virt ual Media ...................................................... 94 Using Virtual Media via VKC and A KC in a Windows Environm ent ........ 95 Using Virtual Media ............................[...]

  • Seite 101

    Chapter 5 : Virtual Media 91 Overview Virtual media extends KVM capabilities by enabling KVM target serve rs to remotely access media f rom a client PC and networ k file servers. With this feature, media mount ed on a client PC and net work file servers is essentially "mounted virtual ly" by the target serve r. The target server can then [...]

  • Seite 102

    Chapter 5 : Virtual Media 92[...]

  • Seite 103

    Chapter 5 : Virtual Media 93 Diagram key Desktop PC CD/DVD drive KSX II USB mass storage device CIM PC hard drive Target server Remote file server (ISO images)[...]

  • Seite 104

    Chapter 5 : Virtual Media 94 Prerequisites for Using Virtual Media With the virtual media feat ure, you can mount up to t wo drives (of different types) that are suppo rted by the USB profile currently applied to the target. These drives are accessible for the duratio n of the KVM session. For example, you can mount a specific CD-ROM, use it, and t[...]

  • Seite 105

    Chapter 5 : Virtual Media 95 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP ® operating system admi nistrator and standard u ser privileges vary from those of the Windows Vista ® operating system and the Windows 7 ® operating system. When enabled in Vista or Windows 7, User Access Control ( UAC) provides the lowest level[...]

  • Seite 106

    Chapter 5 : Virtual Media 96 Using Virtual Media With the KSX II virtual med ia feature, you can m ount up to two drives ( of different types). These d rives are accessible fo r the duration of the K VM session. For example, you can mount a specific CD-ROM, use it, and then disconnect it when you are done. The CD- ROM virtua l media “channel” w[...]

  • Seite 107

    Chapter 5 : Virtual Media 97 Target Server  KVM target servers must s upport USB connected driv es.  KVM target servers runnin g the Windows 2000 ® operating system must have all of the recent patches installed. 1. USB 2.0 ports are both fast er and preferred.. 2. If you plan to access file se rver ISO images, identif y those file servers an[...]

  • Seite 108

    Chapter 5 : Virtual Media 98 File Server Setup (File Server ISO Images Only) Note: This feature is only r equired when using virtu al media to access file server ISO images. ISO9660 f ormat is the standard suppo rted by Raritan. However, other C D-ROM extensions may also work. Note: SMB/CIFS support is requi red on the file server. Use the Remote C[...]

  • Seite 109

    Chapter 5 : Virtual Media 99 Note: You cannot acces s a remote ISO image via virtual media using an IPv6 address due to techni cal limitations of third-party soft ware used by the by the KX, KSX or K X101 G2 device. Note: If you are connectin g to a Windows 2003 ® server and attempt to load an ISO image from the server, you may receive an er ror s[...]

  • Seite 110

    Chap ter 5 : Virtual Media 100 Connecting to Virtual Media Local Drives This option mounts an entir e drive, which means the e ntire disk drive is mounted virtually onto the targ et server. Use this option f or hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives. This is the only option for which R ea[...]

  • Seite 111

    Chapter 5 : Virtual Media 101 WARNING: Enabling Read /Write access can be dangero us! Simultaneous access to the same dri ve from m ore than one entity can result in data corruption. If you do not require Write access, leave this option unselecte d. 4. Click Connect. The media will be mo unted on the target se rver virtually. You can access th e me[...]

  • Seite 112

    Chapter 5 : Virtual Media 102 2. For internal and external C D-ROM or DVD-ROM drives: a. Choose the Local CD/ DVD Drive option. b. Choose the drive from the Local CD/DVD Drive dro p-down list. All available internal and e xternal CD and DVD drive name s will be populated in the drop-down list. c. Click Connect. 3. For ISO images: a. Choose the ISO [...]

  • Seite 113

    Chapter 5 : Virtual Media 103 Disconnecting Virtual Media To disconnect the virtual media drives:  For local drives, choose Vi rtual Media > Disconnect D rive.  For CD-ROM, DVD-ROM, and ISO images, choose V irtual Media > Disconnect CD-ROM/ISO Image. No te: In addition to dis connecting the virtual media u sing the Disconnect command, s[...]

  • Seite 114

    104 In This Chapter Overview ................................................................................................ 104 CIM Compatibility .................................................................................. 105 Available USB Profiles ........................................................................... 105 Selecting Pr[...]

  • Seite 115

    Chapter 6 : USB Profiles 105 CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-V USB or D2CIM-DVUSB with updated f irmware. A VM-CIM that has not had its firmware upgraded will sup port a broad range of confi gurations (Keyboard, Mouse, CD-ROM , and Removable Drive) but will not be able to make use of profile s optimized [...]

  • Seite 116

    Chapter 6 : USB Profiles 106 USB profile Description Restrictions:  USB bus speed limited to full-speed (12 MBit/s)  No virtual media support BIOS DellPowerEdge Keyboard Only Dell PowerEdge BIOS A ccess (Keyboard Only) Use this profile to have key board functionality for the Dell Powe rEdge BIOS when using D2CIM-VUSB . When using the new D2CI[...]

  • Seite 117

    Chapter 6 : USB Profiles 107 USB profile Description BIOS Generic BIOS Generic Use this profile when Gen eric OS profile does not work on th e BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Restrictions:  USB bus speed limited to full-speed (12 MBit/s)  Absolute mouse synchronizat ion™ not s[...]

  • Seite 118

    Chapter 6 : USB Profiles 108 USB profile Description Module D2CIM-DVUSB is connected t o the Advanced Management Module. Restrictions:  Virtual CD-ROM and disk drive s cannot be used simultaneously BIOS Lenovo ThinkPad T6 1 & X61 BIOS Lenovo ThinkPad T6 1 and X61 (boot from virtual media) Use this profile to boot the T61 and X61 series lapto[...]

  • Seite 119

    Chapter 6 : USB Profiles 109 USB profile Description Installation) Use this profile for t he HP Proliant DL360/DL380 G4 series server when in stalling Windows 2003 Server without the help of HP SmartSt art CD. Restrictions:  USB bus speed limited to full-speed (12 MBit/s) Linux ® Generic Linux profile This is the generic Linux profile; use it f[...]

  • Seite 120

    Chapter 6 : USB Profiles 110 USB profile Description Restrictions:  Virtual CD-ROM and disk drive s cannot be used simultaneously Suse 9.2 SuSE Linux 9.2 Use this for SuSE Linux 9. 2 distributio n. Restrictions:  Absolute mouse synchronizat ion™ not supported  USB bus speed limited to full-speed (12 MBit/s) Troubleshooting 1 Troubleshoot[...]

  • Seite 121

    Chapter 6 : USB Profiles 111 USB profile Description  Virtual CD-ROM and disk drive s cannot be used simultaneously WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Use Full Speed for Virtual Media CIM Use Full Speed for virtual media CIM This profile resemble s the behavior of the original KX2 release w[...]

  • Seite 122

    Chapter 6 : USB Profiles 112 Mouse Modes when Using the Mac OS-X USB Profile w ith a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X ® USB profile, and running Mac OS-X 10.4.9 ( or later), when you reboot you must be in Single Mouse mode to use the mou se at the Boot menu. To configure the mouse to w ork at the Boot menu: 1. Reboot the Ma[...]

  • Seite 123

    113 In This Chapter User Groups .......................................................................................... 113 Users ..................................................................................................... 120 Authentication Settings .......................................................................... 123 Changing[...]

  • Seite 124

    Chapter 7 : User Management 114 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). I t is a good idea to define user g roups before creating individual users since, whe n you add a user, you must assign that user to an existing user group. The User Group List page displays a list of all user g roup[...]

  • Seite 125

    Chapter 7 : User Management 115 The Group page is organized into t he following cate gories: Group, Permissions, Port Permissi ons, and IP ACL. 2. Type a descriptive name fo r the new user group into the Group Name field (up to 64 character s). 3. Set the permissions for the group. Select the checkbo xes before the permissions you want to as sign t[...]

  • Seite 126

    Chapter 7 : User Management 116 3. Select the appropriate permis sions. 4. Click OK. Note: See Alternate RADIUS A uthentication Settings for inform ation on additional settings if you ar e using Alternate RADIUS A uthentication. Permissions Important: Selecting the User Management check box allo ws the members of the group to change the permissions[...]

  • Seite 127

    Chapt er 7 : User Management 117 Permission Description Management authentication (LDAP/LDA PS/RADIUS), login settings Port Permissions For each server port, you can specify the access type t he group has, as well as the type of port a ccess to the virtual media an d the power control. Please note that the default setting for all permission s is De[...]

  • Seite 128

    Chapter 7 : User Management 118 Group-Based IP ACL (Access Control List) Important: Exercise cau tion when using group-based I P access control. It is possible to be l ocked out of your KSX II if your IP address is within a range that has been denied access. This feature limits access t o the KSX II device by u sers in the selected group to specifi[...]

  • Seite 129

    Chapter 7 : User Management 119 4. Click Insert. If the rule num ber you just typed equals an existing rule number, the new rule is pl aced ahead of the exit ing rule and all rules are moved down in the list. To replace a rule: 1. Specify the rule number yo u want to replace. 2. Type the Starting IP and E nding IP fields. 3. Choose the Action from [...]

  • Seite 130

    Chapter 7 : User Management 120 4. Set the IP ACL (optional). This f eature limits access t o the KSX II device by specifying IP add resses. See Group -Base d IP ACL (Access Control List) . 5. Click OK. To delete a user group: Important: If y ou delete a group with users in it, the users are automatically assigned to the <unkno wn> user group[...]

  • Seite 131

    Chapter 7 : User Management 121 Adding a New User It is a good idea to define u ser groups before creating K SX II users because, when you add a user, y ou must assign that user to an existing user group. Refer to Adding a New User Group (on page 114) fo r more information. From the User page, you can add new users, modify user information, and rea[...]

  • Seite 132

    Chapter 7 : User Management 122 Modifying an Existing U ser To modify an existing us er: 1. Open the User List page by choosing User Management > User List. 2. Locate the user from among t hose listed on the User List page. 3. Click the user name. The U ser page opens. 4. On the User page, change t he appropriate fields. See Adding a New User fo[...]

  • Seite 133

    Chapter 7 : User Management 123 Authentication Settings Authentication is the proce ss of verifying that a user is who he says he is. Once a user is authenticated, t he user's group is used t o determine his system and port permi ssions. The user's assigned privileges determine what type of access is allowed. This is call ed authorization[...]

  • Seite 134

    Chapter 7 : User Management 124 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Pr otocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services r unning over TCP/IP. A client starts an LDAP session by connecting t o an LDAP/LDAPS server (thro ugh the default TCP port is 389). The client then [...]

  • Seite 135

    Chapter 7 : User Management 125 9. In the User Search DN field, enter the Distinguished Nam e of where in the LDAP database you want to begin searching for u ser information. Up to 64 char acters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com . Consul t your authentication server administrator for the app ropriate va[...]

  • Seite 136

    Chapter 7 : User Management 126 13. Select the Enable Secure LDAP checkbox if you would like to us e SSL. This will enable the E nable LDAPS Server C ertificate Validation checkbox. Secure Socket s Layer (SSL) is a cryptogr aphic protocol that allows KSX II to communicate sec urely with the LDAP/LDAP S server. 14. The default Port is 389. Either u [...]

  • Seite 137

    Chapter 7 : User Management 127 18. The KSX II provides you with the ability to test the LDA P configuration from the Auth entication Settings page du e to the complexity sometimes encounte red with successfully configuring the LDAP server and KSX II for remote authentication. To test the LDAP configuration, enter the logi n name and password in th[...]

  • Seite 138

    Chapter 7 : User Management 128 4. From the KSX II , enable and configure your A D server properly. See Implementing LDAP/LDAP S Remote Authentication. Important Notes  Group Name is case sensit ive.  The KSX II provides the foll owing default groups that cannot be changed or deleted: Admin and < Unknown>. Verify that your Active Direct[...]

  • Seite 139

    Chapter 7 : User Management 129 The timeout is the length of time the KSX II waits f or a response from the RADIUS server before sendi ng another authentication re quest. 9. The default number of retries is 3 Retries. This is the number of time s the KSX II will send a n authentication request to the RADIUS serv er. 10. Choose the Global Authentica[...]

  • Seite 140

    Chapter 7 : User Management 130  CHAP - With CHAP, authentication can be requested by the server at any time. CHAP p rovides more security than PAP.[...]

  • Seite 141

    Chapter 7 : User Management 131 Cisco ACS 5.x for RADIUS Authentication If you are using a Cisco ACS 5. x server, aft er you have configured the KSX II for RADIUS authent ication, complete the followi ng steps on the Cisco ACS 5.x server. Note: The following steps i nclude the Cisco menus and m enu items used to access each page. Please refer to yo[...]

  • Seite 142

    Chapter 7 : User Management 132 Returning User Group Informa tion via RADIUS When a RADIUS authentication at tempt succeeds, the KSX II determines the permissions for a given user based on t he permissions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemente d as a RADIUS FILTE[...]

  • Seite 143

    Chapter 7 : User Management 133 Attribute Data Log out Accounting-Request(4) Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connection s. NAS-Port (5) Always 0. NAS- IP -Address (4) The IP address for the KS X II. User-Name (1) The user name entered a t the login screen. Acct-Session-ID (44) Session ID fo[...]

  • Seite 144

    Chapter 7 : User Management 134 User Authentication Proc ess Remote authentication follows t he process specified in the flowchart below:[...]

  • Seite 145

    Chapter 7 : User Management 135 Changing a Password To change your pass word: 1. Choose User Management > Chang e Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Rety pe the new password in the Confirm New Pa ssword field. Password s can be up to[...]

  • Seite 146

    136 In This Chapter Network Settin gs ................................................................................... 136 Device Services ..................................................................................... 141 Configuring Modem Setti ngs ................................................................ . 147 Configuring Date/Ti[...]

  • Seite 147

    Chapter 8 : Device Management 137 Network Basic Settings These procedures describe how to assign an IP address o n the Network Settings page. For complet e information about all of t he fields and the operation of this page, see Network Settings . To assign an IP address: 1. Choose Device Setting s > Network. The Networ k Settings page opens. 2.[...]

  • Seite 148

    Chapter 8 : Device Management 138 e. Link-Local IP Address. This addres s is automatically assigned t o the device. It is used for ne ighbor discovery or when n o routers are present. Read-Only f. Zone ID. This identifies the device with which the address is associated. Read-Only g. Select the IP Auto Configurat ion. The following option s are avai[...]

  • Seite 149

    Chapter 8 : Device Management 139 See LAN Interface Settin gs (on page 139 ) for informati on in configuring this section of the Network Set tings page. Note: In some environments, t he default LAN Interface Speed & D uplex setting Autodetect (autonegotiator ) does not properly set the network parameters, which result s in network issues. In th[...]

  • Seite 150

    Chapter 8 : Device Management 140  Autodetect (default option)  10 Mbps/Half - Both LEDs blink  10 Mbps/Full - Both LEDs blink  100 Mbps/Half - Yellow LE D blinks  100 Mbps/Full - Yellow LED blin ks  1000 Mbps/Full (gigabit) - Green LED bl inks  Half-duplex provides for co mmunication in both directi ons, but only one direction[...]

  • Seite 151

    Chapter 8 : De vice Management 141 Device Services The Device Services page allows you to configure the followin g functions:  Enabling Telnet  Enabling SSH access  Configuring HTTP and HTT Ps port settings  Enabling Serial Console A ccess  Configuring the discovery port a ccess  Enabling direct port access  Enabling the AKC Do[...]

  • Seite 152

    Chapter 8 : Device Management 142 HTTP and HTTPS Port Setting s You are able to configure HTTP and/or HTTPS ports used by the KSX I I. For example, if you are using t he default HTTP port 80 f or another purpose, changing the port will ensure the device doe s not attempt to use it. To change the HTTP and/or HTTPS port settings: 1. Choose Device Set[...]

  • Seite 153

    Chapter 8 : Device Management 143 Enabling Direct Port Acc ess via URL Direct port access allows u sers to bypass having to u se the device's Login dialog and Port Acces s page. This feature also provides the ability to enter a username and passwor d directly and proceed to the target if the username and passwor d is not contained in the URL. [...]

  • Seite 154

    Chapter 8 : Device Management 144 Configuring Direct Port Access v ia Telnet, IP Address or SSH The information in this topi c is specific to enabling dir ect port access for serial targets. Use the En able Direct Port Access via URL option on the Device Services page to en able direct port access for a KVM/serial port connect to the KSX I I. See E[...]

  • Seite 155

    Chapter 8 : Device Management 145 3. Click OK to save this information. Once you have created th e direct port access, it can be connected in a client application such as P uTTY. Following is an example of ho w the direct port access informat ion would appear in PuTT Y. Note that PuTTY is not the only client applicat ion that can be used. It is use[...]

  • Seite 156

    Chapter 8 : Device Management 146 Enabling the AKC Do wnload Server Certificate V alidation If you are using the AKC cl ient, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Option 1: Do Not Enable AKC Download Serv er Certificate Validation (default settin g) If you do not enable [...]

  • Seite 157

    Chapter 8 : Device Management 147 3. Click OK. Configuring Modem Settings To configure modem sett ings: 1. Click Device Settings > Modem Set tings to open the Modem S ettings page. 2. Check Enable Modem, if neede d. 3. Enter the PPP server IP address. The internet addre ss assigned to the KSX II when a connecti on is established via dial-up. Req[...]

  • Seite 158

    Chapter 8 : Device Management 148 Configuring Date/Time Settings Use the Date/Time Settings page to specify the date and t ime for the KSX II. There are two ways to do this:  Manually set the date and t ime.  Synchronize the date and time wit h a Network Time Protocol (NTP) server. To set the date and time : 1. Choose Device Settings > Dat[...]

  • Seite 159

    Chapter 8 : Device Management 149 6. Click OK. Event Management The KSX II Event Manage ment feature allows you en able and disable the distribution of system e vents to SNMP Manager s, the Syslog and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or seve ral destinations.[...]

  • Seite 160

    Chapter 8 : Device Management 150 Configuring Event Management S ettings SNMP Configuration Simple Network Management Protocol (SNMP) is a proto col governing network management and the monitoring of network device s and their functions. KSX II offers SN MP Agent support through Event Management. To configure SNMP (enable SNMP logging): 1. Choose D[...]

  • Seite 161

    Chapter 8 : Device Management 151 4. Type the Agent Community String (the device's string). An SNMP community is the group that devices and management stat ions running SNMP belong to. It helps define where inf ormation is sent. The community name is used to identify the group. The SNMP device or agent may belong to more than one SNMP communit[...]

  • Seite 162

    Chapter 8 : Device Management 152 Configuring Event Management - Destinations System events, if enabled, can g enerate SNMP notific ation events (traps), or can be logged to syslog or a udit log. Use the Event Management - Destinations page to select which system ev ents to track and where to send this information. Note: SNMP traps will only be gen[...]

  • Seite 163

    Chapter 8 : Device Management 153 SNMP Trap Configuration SNMP provides the ability to send traps, or notifications, t o advise a n administrator when one o r more conditions hav e been met. The followin g table lists the KSX II S NMP traps: Trap name Description cimConnected A CIM is plugged into to the KS X II port. cimDisconnected A CIM is eithe[...]

  • Seite 164

    Chapter 8 : Device Management 154 Trap name Description network. networkParameterChange d A change has been made t o the network parameters. passwordSettingsChanged Strong password settings h ave changed. portConnect A previously authenticated use r has begun a KVM session. portConnectionDenied A connection to the target port was denied. portDiscon[...]

  • Seite 165

    Chapter 8 : Device Management 155 Trap name Description userAuthenticationFailure A user attempted to log in without a correct username and/or p assword. userConnectionLost A user with an active sessi on has experienced an abnormal se ssion termination. userDeleted A user account has been d eleted. userLogin A user has successfully log ged into the[...]

  • Seite 166

    Chapter 8 : Device Management 156  Port Name - The name assigned t o the port. A port name displayed in black indicate s that you cannot change th e name and that the port cannot be edited; port names display ed in blue can be edited. Note: Do not use apostrop hes for the Port (CIM) Nam e.  Port Type Port type Description DCIM Dominion CIM No[...]

  • Seite 167

    Chapter 8 : Device Management 157  For serial ports, the Port page for serial ports is opened.[...]

  • Seite 168

    Chapter 8 : Device Management 158 Power Control Power control is configured on the Port page. The Port page open s when you select a port that is co nnected to a target server from t he Port Configuration page. From the Port page, you can make power associations and ch ange the port name to something more d escriptive. A server can have up to four [...]

  • Seite 169

    Chapter 8 : Device Management 159 Assigning a Name to the PX The Port page opens whe n you select a port on the Port Configuration page. The port appears on this page when connected to a Raritan remote rack PDU (power strip ). The Type and the Name f ields are prepopulated. Use this page to name the ra ck PDU and its outlets; all name s can be up t[...]

  • Seite 170

    Chapter 8 : Device Management 160 To remove a rack PDU association : 1. Se lect the appropriate rack PDU from the Power Strip Name drop-down list. 2. For that rack PDU, select t he appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down li st, select None. 4. Click OK. The rack PDU/o utlet association is removed an[...]

  • Seite 171

    Chapter 8 : Device Management 161 Configuring Blade Chass is In addition to standard servers and r ack PDUs (power strips), y ou can control blade chassis that a re plugged into a Domi nion device port. Up to eight blade chassis can be managed at a given time. As with standard server s, blade chassis are autodete cted once they are connected. When [...]

  • Seite 172

    Chapter 8 : Device Management 162 The use of hot key sequen ces to switch KVM access to a blade chassis is also supported. For blade chas sis that allow users t o select a hot key sequence, those option s will be provided on the P ort Configuration page. For blade chassis that com e with predefined hot key s equences, those sequences will be prepop[...]

  • Seite 173

    Chap ter 8 : Device Management 163 3. On the Port Configuration p age, click on the name of t he blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio button. The page will then display the necessary fields to configur e a blade chassis. 5. Select Generic from the Bl ade Server Chassis Model drop-down. 6. C[...]

  • Seite 174

    Chapter 8 : Device Management 164 c. Username - Enter the use rname used to access the interfa ce. Optional d. Password - Enter the pass word used to access the int erface. Optional Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or the c onnection will fail. e. The Username Field and P assword Field, whi[...]

  • Seite 175

    Chapter 8 : Device Management 165 To configure a Dell P owerEdge M1000e: 1. If you selected Dell Power Edge ™ M1000e, au to -discovery is available. Configure the bl ade chassis as applicable. P rior to configuring a blade cha ssis that can be auto-discovered, it must be configured to enable SSH connection s on the designated port number (see Dev[...]

  • Seite 176

    Chapter 8 : Device Management 166 The first URL link is intended f or use to connect to t he blade chassis Administration Module GU I. Note: Access to the URL li nks entered in this section of the page is governed by the blade cha ssis port permissions. a. Active - To activate the link once it is configured, select t he Active checkbox. Leave t he [...]

  • Seite 177

    Chapter 8 : Device Management 16 7 b. Maximum Number of Slots - The default maximum number of slots available on the blade chas sis is automatically entered. c. Administrative Module Pri mary IP Address/Host Na me - Not applicable. d. Port Number - The default port number for the blade chassi s is 22. Not applicable. e. Username - Not applicabl e. [...]

  • Seite 178

    Chapter 8 : Device Management 168 e. The Username Field and P assword Field, which are both optional, contain the labels that are expected to be a ssociated with the username and password e ntries. It is in these fields you should enter the field name s for the username and password fields used on the login screen f or the web application. You can [...]

  • Seite 179

    Chapter 8 : Device Management 169 d. Port Number - The default port number for the blade chassi s is 22. Change the port numb er if applicable. Required f or auto-discovery mode e. Username - Enter the use rname used to access the blade chassis. Required for aut o-discovery mode f. Password - Enter the pass word used to access the bl ade chassis. R[...]

  • Seite 180

    Chapter 8 : Device Management 170 Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or the c onnection will fail. e. The Username Field and P assword Field, which are both optional, contain the labels that are expected to be asso ciated with the username and password e ntries. It is in these fields y ou sho[...]

  • Seite 181

    Chapter 8 : Device Management 171 4. In the Blade Chassis Managed Li nks section of the page, you are able to configure the con nection to a blade chassis web browser interface if one is available. Click the Blade Chassis M anaged Links icon to expand the section on the page. The first URL link is intended f or use to connect to t he blade chassis [...]

  • Seite 182

    Chapter 8 : Device Management 172 Tips for Adding a Web Browser Interface You can add a Web Brows er Interface to create a co nnection to a device with an embedded web server. A Web Browser interface can al so be used to connect to any web application, such as the web application associated with an RSA, DRAC o r ILO Processor card . You must have D[...]

  • Seite 183

    Chapter 8 : Device Management 173 HP Blade Chassis Configuration (Port Group Management) The KSX II supports the aggregatio n of ports connect ed to certain types of blades into a group repr esenting the blade cha ssis. Specifically, HP ® BladeServer blades and D ell ® PowerEdge ™ 1855/1955 blades whe n the Dell PowerEdge 1855/195 5 is connecte[...]

  • Seite 184

    Chapter 8 : Device Management 174 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characte rs. 4. Select the Blade Server Grou p checkbox. If you want to designate th at these ports are attached to blades housed in a blade chassis (for ex ample, HP c3000 or Del l PowerEdge 1855), select t he Blade Serv[...]

  • Seite 185

    Chapter 8 : Device Management 175 To delete a port group: 1. Click on the Port Group M anagement page, select th e checkbox of the port group you want to delete. 2. Click the Delete button. 3. Click OK on the warning m essage. Supported Blade Chassis Models This table contains the bla de chassis models that are supported by the KSX II and the corre[...]

  • Seite 186

    Chapter 8 : Device Ma nagement 176 Supported CIMs for Blade Chassis The following CIMs are supported f or blade chassis being ma naged through the KSX II:  DCIM- PS2  DCIM-USBG2  D2CIM-VUSB  D2CIM-DVUSB Following is a table contai ning supported CIMs for each blade chassis model that the KSX I I supports. Blade chassis Connection method[...]

  • Seite 187

    Chapter 8 : Device Management 177 Blade chassis Connection method Recommended CIM(s) custom cable provided wit h the system). Source: Dell PowerEdge 1 955 Owner's Manual Dell PowerEdge M1000e The KVM Switch Module (i KVM) is Integrated with this chassi s. The iKVM is compatible wi th the following peripherals:  USB keyboards, USB pointing d[...]

  • Seite 188

    Chapter 8 : Device Management 178 Blade chassis Connection method Recommended CIM(s) Management Module. Source: IBM BladeCenter Produ cts and Technology IBM BladeCenter E The current model Blade Center E chassis (8677-3Rx) ships stand ard with one Advanced Management Module. Source: IBM BladeCenter Produ cts and Technology  DCIM-USBG2  D2CIM-[...]

  • Seite 189

    Chapter 8 : Device Management 179 Required and Recommended Blade Chassis Configurations This table contains information on limitations and constr aints that apply to configuring blade chassi s to work with the KSX II. Raritan recommends that all of the information below is follow ed. Blade chassis Required/recommended action Dell ® PowerEdge ™ M[...]

  • Seite 190

    Chapter 8 : Device Management 180 Blade chassis Required/recommended action  Do not designate any slots for scan operations in the iK VM GUI Setup Scan menu or the iKVM may not work properly.  To avoid having the iKVM GUI display upon connecti ng to the blade chassis, set the Screen Del ay Time to 8 seconds.  Recommend that 'Timed&apo[...]

  • Seite 191

    Chapter 8 : Device Management 181 Blade chassis Sample URL format  Username: root  Username Field: TEXT_USER_NAME  Password: calvin  Password Field: TEX T_PASSWORD IBM ® BladeCenter ® E or H  http://192.168.84.217/private/ welcome.ssi Configuring USB Profiles (Port Page) You choose the available USB profile s for a port in the Sele[...]

  • Seite 192

    Chapter 8 : Device Management 182  Shift-Click and drag to select seve ral continuous profi les.  Ctrl- Cl ick to select several discontinuous profiles. 2. Click Add. The selected profiles ap pear in the Selecte d list. These are the profiles that can be used for the KVM target s erver connected to the port. To specify a preferred US B profil[...]

  • Seite 193

    Chapter 8 : Device Management 183 2. Click Remove. The select ed profiles appear in the A vailable list. These profiles are no long er available for a KVM target server connected to this port. To apply a profile selection to multiple ports: 1. In the Apply Selected P rofiles to Other Ports sectio n, select the Apply checkbox for each KV M port you [...]

  • Seite 194

    Chapter 8 : Device Management 184  German (Germany)  JIS (Japanese Industry Standard)  Simplified Chinese  Traditional Chinese  Dubeolsik Hangul (Korean)  German (Switzerland)  Portuguese (Portugal)  Norwegian (Norway)  Swedish (Sweden)  Danish (Denmark)  Belgian (Belgium) Note: Keyboard use for Chi nese, Japanese, [...]

  • Seite 195

    Chap ter 8 : Device Management 185 a. Select the Power Save Mo de checkbox. b. Set the amount of tim e (in minutes) in which Power S ave Mode will be initiated. 8. Choose the resolution for t he KSX II Local Consol e from the drop-down list. The browser will be r estarted when this chang e is made.  800x600  1024x768  1280x1024 9. Choose t[...]

  • Seite 196

    Chapter 8 : Device Management 186 Port Keywords Port keywords work as a fil ter. If a keyword is detecte d, a corresponding message be logged in a lo cal port log and a correspo nding trap will be sent via SNMP (if configur ed). Defining keywords guarantees that only messages th at contain those keywords are logged for the local port. You can creat[...]

  • Seite 197

    Chapter 8 : Device Management 187 2. Define a keyword for the f irst time, by clicking the Add but ton on the Port Keyword List page. Th e Add Keyword page will t hen open. Follow steps 3 - 5 to create new keywords. 3. Type a keyword in the Ke yword field and then click t he Add button. The keyword will be added to the page directly under t he Keyw[...]

  • Seite 198

    Chapter 8 : Device Management 188 Port Group Management This function is specific to HP blad e chassis configurat ion. See HP Blade Chassis Configur ation (Port Group M anagement) (on page 173 ).[...]

  • Seite 199

    189 In This Chapter Security Settings .................................................................................... 189 Configuring IP Access Cont rol .............................................................. 199 SSL Certificates ..................................................................................... 201 Security Banner ..[...]

  • Seite 200

    Chapter 9 : Security Ma nagement 190 To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, yo u can specify restrictions for single login, password aging, and the logging o ut idle users. Limitation Description Enable single login limitation When selected, only one lo gin per user name is allowed at any [...]

  • Seite 201

    Chapter 9 : Security Management 191 Limitation Description change is required. The de fault is 60 days. Log out idle users, After (1-365 minutes) Select the "Log off idle user s" checkbox to automatically disconnect us ers after the amount of time you specify in the "A fter (1-365 minutes)" field. If there is no activity from th[...]

  • Seite 202

    Chapter 9 : Security Management 192 Strong Passwords Strong passwords provide more secure local authenti cation for the system. Using strong password s, you can specify the f ormat of valid KSX II local passwords such as minimum and maximum le ngth, required characters, and password history retention. Strong passwords require user-created passwords[...]

  • Seite 203

    Chapter 9 : Security Management 193 User Blocking The User Blocking options specify the criteria by whi ch users are blocked from accessing the system aft er the specified number of un successful login attempts. The three options are mutu ally exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number [...]

  • Seite 204

    Chapter 9 : Security Management 194 Option Description Timer Lockout Users are denied access to the system for the specified amount of time af ter exceeding the specified number of unsucces sful login attempts. When selected, the following f ields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will b e lo[...]

  • Seite 205

    Chapter 9 : Security Management 195 Encryption & Share Using the Encryption & S hare settings you can specif y the type of encryption used, PC and V M share modes, and the ty pe of reset performed when the KSX II Reset button is pressed. WARNING: If you select an enc ryption mode that is not supported by your browser, you will not be able t[...]

  • Seite 206

    Chapter 9 : Security Management 196 Encryption mode Description a National Institute of St andards and Technology specification fo r the encryption of electronic data. 256 is the key length. When AES -256 is specified, be certain that y our browser supports it, other wise you will not be able to connect. See Checking Your Browser for AES Encryption[...]

  • Seite 207

    Chapter 9 : Security Management 197 Local device reset mode Description Enable Local Factory Reset (default) Returns the KSX II dev ice to the factory defaults. Enable Local Admin Password Reset Resets the local administrator pa ssword only. The password is reset to raritan. Disable All Local Resets No reset action is taken. Note: When using the P2[...]

  • Seite 208

    Chapter 9 : Security Management 198 Enabling FIPS 140-2 For government and other high se curity environments, enabli ng FIPS 140 -2 mode may be desirable. The KSX II uses an e mbedded FIPS 140 -2-validated cryptograp hic module running on a Linux ® platform per FIPS 140-2 Implementation Guida nce section G.5 guideline s. Once this mode is enabled,[...]

  • Seite 209

    Chapter 9 : Security Management 199  FIPS 140-2 should be enabled on t he client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administrativ e Tools > Local Security Policy to open the Local Security S ettings dialog. 2. From the navigation tree, s elect Select Local Policies > Se[...]

  • Seite 210

    Chapter 9 : Security Management 200 To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/ Mask or IPv6/Prefix Length field. Note: The IP address sho uld be entered using CID R (Classless Inter-Domain Routing notat ion, in which the first 24 bit s are used as a network address). 2. Choose the Policy from the drop-do wn list. 3. [...]

  • Seite 211

    Chapter 9 : Security Management 201 3. You are prompted to confi rm the deletion. Click OK. SSL Certificates The KSX II uses the Secure S ocket Layer (SSL) prot ocol for any encrypted network traffic betwee n itself and a connected client. When establishing a connection, the KSX II has to identif y itself to a client using a cryptographic certifica[...]

  • Seite 212

    Chapter 9 : Security Management 202 b. Organizational unit - This field is u sed for specifying t o which department within an organization the KSX II belongs. c. Organization - The name o f the organization to which the KSX II bel ongs. d. Locality/City - The city where t he organization is locate d. e. State/Province - The state or pr ovince wher[...]

  • Seite 213

    Chapter 9 : Security Management 203 Note: The CSR and the private key file a re a matched set and should be treated accordingly. If the sig ned certificate is not matched with the private key used to gen erate the original CSR, t he certificate will not be useful. This applies to uploading and downloa ding the CSR and private key files. After compl[...]

  • Seite 214

    Chapter 9 : Security Management 204 4. If needed, change the banner titl e. This information will be displayed to users as part of the ban ner. Up to 64 characters ca n be used. 5. Edit the information in the Restri cted Services Banner Message text box. Up to 6000 characte rs can be entered or uploade d from a text file. To do this, do one of the [...]

  • Seite 215

    205 In This Chapter Maintenance Features (Lo cal/Remote Console) ................................ ... 205 Audit Log ................................................................................................ 206 Device Information ................................................................................. 207 Backup and Restore .........[...]

  • Seite 216

    Chapter 10 : Maintenance 206 Audit Log A log is created of the KS X II system events. To view the audit log for your KSX II: 1. Choose Maintenance > Audit Log. The Audit Log page opens. The Audit Log page displa ys events by date and time (most r ecent events listed first). The Aud it Log provides the followi ng information:  Date - The date [...]

  • Seite 217

    Chapter 10 : Maintenance 207 Device Information The Device Information pa ge provides detailed info rmation about your KSX II device and the CIM s in use. This information i s helpful should you need to contact Raritan Te chnical Support. To view information abo ut your Dominion KSX II and CIMs:  Choose Maintenance > Dev ice Information. The [...]

  • Seite 218

    Chapter 10 : Maintenance 208 Backup and Restore From the Backup/Restore page, you can backup and resto re the settings and configuration for your KSX II. In addition to using backup and re store for business continuity pur poses, you can use this featu re as a time-saving mechanism. For instance, you can quickly provide access to your team from ano[...]

  • Seite 219

    Chapter 10 : Maintenance 209 If you are using Internet Expl orer 6 or higher, to backup y our KSX II: 1. Click Backup. A File Downl oad dialog appears that co ntains an Open button. Do not click Open. In IE 6 and higher, IE is used as the default application t o open files, so you are prompted to open t he file versus save the file. To avoid this, [...]

  • Seite 220

    Chapter 10 : Maintenance 210 2. Navigate to and select the appropriate backup file an d click Open. The selected file is listed in the Restore File field. 3. Click Restore. The configurat ion (based on the type of resto re selected) is restored. USB Profile Management From the USB Profile Managem ent page, you can upload custo m profiles provided b[...]

  • Seite 221

    Chapter 10 : Maintenance 211 Note: If an error or warning is dis played during the upload pr ocess (for example. overwriting an exi sting custom profile), you m ay continue with the upload by clicking Upload or cancel it by clicking o n Cancel. To delete a custom profile to y our KS X II: 1. Check the box correspondi ng to the row of the table c on[...]

  • Seite 222

    Chapter 10 : Maintenance 212 Upgrading CIMs Use this procedure to upg rade CIMs using t he firmware versions st ored in the memory of your KSX II device. In general, all CIM s are upgraded when you upgrade the dev ice firmware using t he Firmware Upgrade page. In order to make use of USB profiles, you must use a D2 CIM-VUSB or D2CIM-DVUSB with upda[...]

  • Seite 223

    Chapter 10 : Maintenance 213 To upgrade your KSX II: 1. Locate the appropriate Rari tan firmware distribution f ile (*.RFP), found on the Raritan Firmware U pgrades webpage: http://www.raritan.com/sup port/firmwareupgrad es and download the file. 2. Unzip the file. Read all instruction s included in the firmware ZI P files carefully before upgradin[...]

  • Seite 224

    Chapter 10 : Maintenance 214 8. Click Upgrade and wait for the upgrade to complete. S tatus information and progress b ars are displayed during t he upgrade. Upon completion of the upgrade, the device reboots (1 beep sounds to signal the reboot). 9. As prompted, close the bro wser and wait approximatel y 5 minutes before logging on to the K SX II a[...]

  • Seite 225

    Chapter 10 : Maintenance 215 Upgrade History The KSX II provides inform ation about upgrades performed on the KSX II and attached CIMS. To view the upgrade history :  Choose Maintenance > Upgra de History. The Upgrade Histo ry page opens. Information is provided abo ut the KSX II upgrade(s) th at have been run, the final status of the upgrade[...]

  • Seite 226

    Chapter 10 : Maintenance 216 To reboot your KSX I I: 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prom pted to confirm the action . Click Yes to proceed with the reboot. CC Unmanage When a KSX II device is un der CommandCenter Se cure Gateway control and you attempt to access the device directly using the KSX I[...]

  • Seite 227

    Chapter 10 : Maintenance 217 Stopping CC-SG Management While the KSX II is under CC-SG ma nagement, if y ou try to access the device directly, you are notified that it the device is un der CC-SG management. If you are managing the KSX II through CC-SG and connectivity between CC -SG and the KSX I I is lost after the specified time out interval (typ[...]

  • Seite 228

    Chapter 10 : Maintenance 218 3. Click Yes to remove the device C C-SG management. Once CC-S G management has ended, a confi rmation will be displayed.[...]

  • Seite 229

    219 The Diagnostics pages a re used for troubleshooting a nd are intended primarily for the administra tor of the KSX II device. All of the Diagnostics pages (except Device Diag nostics) run standard net working commands and the information that is displayed is the output of thos e commands. The Diagnostics menu options h elp you debug and conf igu[...]

  • Seite 230

    Chapter 11 : Diagnostics 220 Network Interface Page The KSX II provides inform ation about the status of yo ur network interface. To view information abo ut your network interface :  Choose Diagnostics > Net work Interface. The Net work Interface page opens. The following information is display ed:  Whether the Ethernet inter face is up or[...]

  • Seite 231

    Chapter 11 : Diagnostics 221  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a pa ge similar to the one displ ayed here.[...]

  • Seite 232

    Chapter 11 : Diagnostics 222  Route - Produces a page simila r to the one displayed here. 3. Click Refresh. The relevant inf ormation is displayed in t he Result field. Ping Host Page Ping is a network tool used to test whether a particul ar host or IP address is reachable acro ss an IP network. Using t he Ping Host page, you can determine if a [...]

  • Seite 233

    Chapter 11 : Diagnostics 223 2. Type either the hostname o r IP address into the Hostname or I P Address field. 3. Click Ping. The results of the ping are displayed in the Result field. Trace Route to Host Page Trace route is a network tool use d to determine the route taken t o the provided hostname or IP address. To trace the route to the host : [...]

  • Seite 234

    Chapter 11 : Diagnostics 224 Device Diagnostics Note: This page is for use by Raritan field enginee rs or when you are directed by Raritan Techni cal Support. Device Diagnostics downlo ads the diagnostics information f rom KSX II to the client machine. Two operat ions can be performe d on this page: Operation Description Diagnostics Scripts Execute[...]

  • Seite 235

    Chap ter 11 : Diagnostics 225 f. Send this file to Rarita n Technical Support usi ng step 4. 3. To create a diagnostics file to send to Raritan Technical Support: a. Click the Save to File button. The File Download dialog appe ars. b. Click Save. The Save As dialog ap pears. c. Navigate to the desired directo ry and click Save. 4. Email this file a[...]

  • Seite 236

    226 In This Chapter Overview ................................................................................................ 227 Accessing the KSX II Using CLI ............................................................ 228 SSH Connection to the KSX II ............................................................... 228 Telnet Connection to the KS[...]

  • Seite 237

    Chapter 12 : Command Line Interface (CLI) 227 Overview The KSX II Serial Con sole supports all serial device s such as:  Servers, including Window s Server 2003 ® when using the Emergency Management Con sole (EMS-) Special A dministration Console, or SAC with BIOS redirection in the server BI OS.  Routers  Layer 2 switches  Firewalls ?[...]

  • Seite 238

    Chapter 12 : Command Line Interfac e (CLI) 228 Accessing the KSX II Using CLI Access the KSX II by using one of the following methods:  Telnet via IP connection  SSH (Secure Shell) via IP connection  Local Port-via RS-232 serial i nterface A number of SSH/Telnet clients a re available and can be obtained from the following locations:  P[...]

  • Seite 239

    Chapter 12 : Command Line Interfac e (CLI) 229 Telnet Connection to the KSX II Due to the lack of security, user name, password and all traffic is in clear-text on the wire. Telnet access is disabled by default . Enabling Telnet If you wish to use Telnet to ac cess the KSX II, first access the KSX II from the CLI or a browser. To enable Telnet: 1. [...]

  • Seite 240

    Chapter 12 : Command Line Interfac e (CLI) 230 Port Settings Ensure that the port settin gs (serial communication parameters) are configured as follows:  Data bits = 8  Parity = None  Stop bits =1  Flow Control = None  Bits per second = 9600 Logging On To log in, enter the user name admin as sho wn: 1. Log in as admin 2. The Password[...]

  • Seite 241

    Chapter 12 : Command Line Interface (CLI) 231 After reviewing the followin g Navigation of the CLI (on page 2 32 ) section, perform the Initial Configuration tasks. Welcome! 192.168.59.202 login: admin Passwd: ---------------------------------------------------- ---------------------------- Device Type: Dominion KSX2 Model: DKSX2_188 Device Name: Y[...]

  • Seite 242

    Chapter 12 : Command Line Interfac e (CLI) 232 login as: Janet Password: Authentication successful. ---------------------------------------------------- ------------ Welcome to the KSX II [Model: KSX2] UnitName:KSX II Firmware Version:3.0.0.5.1 Serial:WACEA00008 IP Address:192.168.51.194 UserIdletimeout:99min ---------------------------------------[...]

  • Seite 243

    Chapter 12 : Command Line Interface (CLI) 233 CLI Syntax -Tips and Shortcuts Tips  Commands are listed in al phabetical order.  Commands are not case sensitiv e.  Parameter names are singl e word without underscore .  Commands without arguments default to show current sett ings for the command.  Typing a question mark ( ? ) after a c[...]

  • Seite 244

    Chapter 12 : Command Line Interfac e (CLI) 234 Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same configuration can be done via K VM. See Getting Started f or more information. KSX II devices come from t he factory with default fact ory settings. When you first power up and con nect to the device, you [...]

  • Seite 245

    Chapter 12 : Command Li ne Interface (CLI) 235 The KSX II now has the b asic configuration and can be accessed remotely via SSH, GUI, or locally using the local serial port. The administrator needs to co nfigure the users and groups, servi ces, security, and serial ports to which the serial targets ar e attached to the KSX II. CLI Prompts The Comma[...]

  • Seite 246

    Chapter 12 : Command Line Interfac e (CLI) 236 Security Issues Elements to consider when addr essing security for co nsole servers:  Encrypting the data traffic sent between the operator console and the KSX II device.  Providing authentication and autho rization for users.  Security profile. The KSX II supports each of these elements; howe[...]

  • Seite 247

    Chapter 12 : Command Line Interface (CLI) 237 Port Sharing Using CLI It is possible for access clie nt users to share ports with other authenticated and authorized users, regardless of whether they are access client users (RS C) or SSH/Telnet users. Port sharing is used for training or for troubleshooti ng applications.  Users are notified in re[...]

  • Seite 248

    Chapter 12 : Command Line Interfa ce (CLI) 238 Interface Command The Interface command is used to configure the KS X II network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters ipauto <non[...]

  • Seite 249

    Chapter 12 : Command Line Interface (CLI) 239 Connect Commands The connect commands p rovide a means to access ports and their history. Command Description connect Connect to a port. The po rt sub-menu, reached using escape key sequence. clearhistory Clear history buffer for this port. Only available to users who have Write a ccess. clientlist Disp[...]

  • Seite 250

    Chapter 12 : Command Line Interfac e (CLI) 240 IPv6 Command Use the IPv6_command to set I Pv6 network paramet ers and retrieve existing IPv6 parameters.[...]

  • Seite 251

    241 In This Chapter Overview ................................................................................................ 241 Using the KSX II Local Consol e ............................................................ 241 KSX II Local Console I nterface ............................................................. 242 Security and Authenticati[...]

  • Seite 252

    Chapter 13 : KSX II Local Console 242 KSX II Local Console Interface When you are located at t he server rack, the K SX II provides standard KVM management and ad ministration via the KSX I I Local Console. The KSX II Local Console pr ovides a direct KVM (anal og) connection to y our connected servers; the perf ormance is exactly as if you were dir[...]

  • Seite 253

    Chapter 13 : KSX II Local Console 243 Local Console Smart Card Access To use a smart card to acces s a server at the Local Con sole, plug a USB smart card reader into the KS X II using one of the USB ports located on the KSX II. Once a smart card r eader is plugged in or unplu gged from the KSX II, the KSX I I autodetects it. For a list of supporte[...]

  • Seite 254

    Chapter 13 : KSX II Local Console 244 To update the Card Read ers Detected list:  Click Refresh if a new smart card has been mounted. The C ard Readers Detected li st will be refreshed to reflect the newly added smart card reader. Local Console USB Profile Options From the USB Profile Options section of the Tools page, you can choose from the av[...]

  • Seite 255

    Chapter 13 : KSX II Local Console 245 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field. Available Resolutions The KSX II Local Console provid es the following resol utions to support various monitors:  800x600  1024x768  1280x1024 Each of these resolutions suppo rts a refresh rate o[...]

  • Seite 256

    Chapter 13 : KSX II Local Console 246 Port Access Page (Local Console Server Display) After you login to the KSX II Local Console, the Port Acces s page opens. This page lists all of the KS X II ports, the connected KVM target servers, and their status and availa bility. Also displayed on the Port Acces s page are blade cha ssis that have been conf[...]

  • Seite 257

    Chapter 13 : KSX II Local Console 247  In addition to the Port Number, Port Name, Status, T ype, and Availability, a Group column is als o displayed on the View by Group tab. This column contains the p ort groups that are available. 3. Click the Port Name of the target server you want to a ccess. The Port Action Menu appear s. See Port Action Me[...]

  • Seite 258

    Chapter 13 : KSX II Local Console 248 The KVM and serial target servers are initially sorted by Port Number; you can change the displa y to sort on any of the columns.  Port Number - Numbered f rom 1 to the total number o f ports available for the KSX II .  Port Name - The name of the K SX II port. Initially t his is set to Dominion- KSX II -[...]

  • Seite 259

    Chapter 13 : KSX II Local Console 249 Standard servers Connect key action Key sequence example the local port GUI connected to target):  Double Click Scroll Lock Blade chassis Connect key action Key sequence example Access a port from the local port GUI Access port 5, slot 2:  Press Left ALT > Press a nd Release 5 > Press and Release - [...]

  • Seite 260

    Chapter 13 : KSX II Local Consol e 250 Language Regions Keyboard layout US English International United States of America a nd most of English-speaking countries: for example, Netherlands US Keyboard layout UK English United Kingdom UK layout keyboard Chinese Traditional Hong Kong S. A. R., Republic of China (Taiwan) Chinese Traditional Chinese Sim[...]

  • Seite 261

    Chapter 13 : KSX II Local Console 251 Sun key Local port key combination Undo Ctrl + Alt +F4 Stop A Break a Front Ctrl + Alt + F5 Copy Ctrl + Alt + F6 Open Ctrl + Alt + F7 Find Ctrl + Alt + F9 Cut Ctrl + Alt + F10 Paste Ctrl + Alt + F8 Mute Ctrl + Alt + F12 Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KPAD - Stop No key c[...]

  • Seite 262

    Chapter 13 : KSX II Local Console 252 Local Port Administration The KSX II can be managed by either t he KSX II Local Console or the KSX II Remote Console. Note that the KSX II Local C onsole also provides access to:  Factory Reset  Local Port Settings Note: Only users with administrative p rivileges can access thes e functions. KSX II Local [...]

  • Seite 263

    Chapter 13 : KSX II Local Console 253 Note: Keyboard use for Chi nese, Japanese, and Korean is for display only. Local lang uage input is not supported at this time f or KSX II Local Console f unctions. 3. Choose the local port hotkey . The local port hotkey is used to return to the KSX II Local Consol e interface when a target s erver interface is[...]

  • Seite 264

    Chapter 13 : KSX II Local Console 254 Note: If you initially choose not to ignore CC Manage m ode on the local port but later want local port access, you will ha ve to remov e the device from under C C-SG management (from within CC-SG). You will then be able to ch eck this checkbox. 10. Click OK. To reset back to defaults:  Click Reset to Defaul[...]

  • Seite 265

    Chapter 13 : KSX II Local Console 255 KSX II Local Console Factory Reset Note: This feature is avail able only on the KSX I I Local Console. The KSX II offers several t ypes of reset modes from t he Local Console user interface. Note: It is recomm ended that you save the audit log prior to pe rforming a factory reset. The audit log is delete d when[...]

  • Seite 266

    Chapter 13 : KSX II Local Console 256 Resetting the KSX II Using the Reset Button On the back panel of the d evice, there is a Reset button. It is recessed to prevent accidental reset s (you will need a pointed obj ect to press this button ). The actions that are perfo rmed when the Reset butt on is pressed are defined in the graphical user interfa[...]

  • Seite 267

    257 In This Chapter Certified Modems for UNIX , Linux and MPC ......................................... 257 Low Bandwidth KVM Settings ............................................................... 258 Client Dial-Up Networking Config uration ............................................... 259 Windows 2000 Dial-Up Net working Configuration .......[...]

  • Seite 268

    Chapter 14 : Modem Configuration 258 Low Bandwidth KVM Settings Following are the settings t hat Raritan recommends in order to achieve optimum performance whe n using KVM over lo w bandwidth speeds typical of DSL connection s. This information applies to both virtual KVM and MPC. Setting To achieve optimum perform ance: Connection speed Select Con[...]

  • Seite 269

    Chapter 14 : Modem Configuration 259 Setting To achieve optimum perform ance: Select the "Quick sense video mo de" radio to enabl e this option. Client Dial-Up Networking Configuration Configuring Microsoft Win dows ® Dial-Up Networking for use with KSX II allows configuration of a PC t o reside on the same P PP network as the KSX II. Af[...]

  • Seite 270

    Chapter 14 : Modem Configuration 260 2. Double-click the Make New Connection icon when the Network and Dial-Up Connections window app ears. 3. Click Next and follow the steps in the Network Connect ion Wizard dialog to create custom dia l-up network profiles.[...]

  • Seite 271

    Chapter 14 : Modem Configuration 261 4. Click the Dial-up to private network radio button and cl ick Next. 5. Select the checkbox befor e the modem that you want to use to connect to the KSX I I and then click Next. 6. Type the area code and phone numb er you wish to dial in the appropriate fields.[...]

  • Seite 272

    Chapter 14 : Modem Configuration 262 7. Click the Country/region code dr op-down arrow and select the country or region from the list. 8. Click Next. The Connectio n Availability dialog appears. 9. Click the Only for myself radio butt on in the Connection Availabilit y dialog.[...]

  • Seite 273

    Chapter 14 : Modem Configuration 263 10. Click Next. The Network Connection has been create d. 11. Type the name of the Dial-up conne ction. 12. Click Finish. 13. Click Dial to connect to t he remote machine when the Dial dialog appears. A dialog indicating t hat a successful connection has b een established will appear. Consult the Windows 200 0 ?[...]

  • Seite 274

    Chapter 14 : Modem Configuration 264 Windows XP Dial-Up Networking Configuration 1. Choose Start > Programs > Accessories > Communi cations > New Connection Wizard. 2. Click Next and follow the steps in the New Connection Wizard to create custom dial-up network p rofiles. 3. Click the Connect to the Intern et radio button and click Next[...]

  • Seite 275

    Chapter 14 : Modem Configuration 265 4. Click the "Set up my connection ma nually" radio button and cli ck Next.[...]

  • Seite 276

    Chapter 14 : Modem Configuration 266 5. Click the "Connect using a dial-up modem" radio button and click Next.[...]

  • Seite 277

    Chapter 14 : Modem Configuration 267 6. Type a name to identify this particular connection in th e ISP Name field and click Next.[...]

  • Seite 278

    Chapter 14 : Modem Configuration 268 7. Type the phone number for the connection in the Pho ne number field and click Next. 8. Type your ISP information. Type the user name and password in the appropriate fields, and rety pe the password to confirm it .[...]

  • Seite 279

    Chapter 14 : Modem Configuration 269 9. Select the checkbox befor e the appropriate option be low the fields and click Next. 10. Click Finish. 11. Click Dial to connect to the remote machine when t he Dial dialog appears. A dialog indicating t hat you connected successfully appears. If you get any errors, consult Windows XP ® Dial- up Networking H[...]

  • Seite 280

    270 In This Chapter Physical Specifications .......................................................................... 270 Supported Operating Systems ( Clients) ................................................ 271 Supported Operating Systems a nd CIMs (KVM Target Servers) .......... 272 Supported Browsers ..........................................[...]

  • Seite 281

    Appendix A : Specifications 271 Supported Operating Systems (Clients) The following operating system s are supported on the Virtual K VM Client and Multi-Platform Client ( MPC): Client operating sy stem Virtual media (VM) supp ort on client Windows 7 ® Yes Windows XP ® Yes Windows 2008 ® Yes Windows Vista ® Yes Windows 2000 ® SP4 S erver Yes W[...]

  • Seite 282

    Appendix A : Specifications 272 Mode Operating system Browser Windows Server 2003 ®  Internet Explorer 6.0 SP1++, IE 7, IE 8  Firefox 1.06 - 3 Windows Vista ®  Internet Explorer 7.0 or 8.0 Windows 7 ®  Internet Explorer 7.0 or 8.0  Firefox 1.06 - 3 Windows x64 64 -bit mode Windows XP 64bit OS, 32bit browsers:  Internet Explorer[...]

  • Seite 283

    Appendix A : Specifications 273 Supported Dominion CIMs & D2CIMs Operating system and serial devices ( where applicable) Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode  DCIM- PS2  DCIM- PS2  DCIM-USB  DCIM-USB G2  Windows XP ® operating system  Windows 2000 ® operating system  Windows 2000 Se[...]

  • Seite 284

    Appendix A : Specifications 274 Target server Supported CIMs Mouse modes 4.0 and 5.0 DCIM-USB G2 Workstation 3.0) SUSE Linux Professional 9.2 and 10 DCIM- PS2 DCIM-USB DCIM-USB G2 D2CIM-VUSB Fedora ® Core 3 ® and above DCIM- PS2 DCIM-USB DCIM-USB G2 D2CIM-VUSB Mac OS DCIM-USB DCIM-USB G2 D2CIM-VUSB All Solaris OSs supported in Dominion KSX II DCI[...]

  • Seite 285

    Appendix A : Specifications 275 Supported Browsers KSX II supports the followi ng browsers:  Internet Explorer ® 6, 7 and 8  Firefox ® 1.5, 2.0, and 3.0 (up t o build 3.0.10)  Safari ® Computer Interface Modules (CIMs) Part number Line item description UPC code Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH[...]

  • Seite 286

    Appendix A : Specifications 276 Supported Paragon CIMS and Configurations The KSX II supports the P2CIM-APS2 DUAL and P2CIM-AUSB DUAL CIMs, which provide two RJ45 connections to differe nt KVM switches. Support of these CIMs prov ides a second path to acc ess the target in the event that one of the KVM switche s is blocked or fails. Paragon CIM Sup[...]

  • Seite 287

    Appendix A : Specifications 277 KSX II to KSX II Guidelines The following system confi guration guidelines should be followed when you are using Paragon CI Ms in a KSX II to KSX I I configuration: Concurrent Access Both KSX II KVM switche s should be configured with the same policy for concurrent access to target s, either both PC-Share or both P r[...]

  • Seite 288

    Appendix A : Specifications 278 If a connection to the t arget is in place from the other KSX II, the availability is checked when a connection is attempted. Access is denied or allowed consistent with the P C-Share policy in place for the K SX II. Until that time, the availability is not be updated on the ot her K SX II. If access is denied becau [...]

  • Seite 289

    Appendix A : Specifications 279 Paragon II operation mode Mode description Supported? indicate „available‟. PC Share A server or other device on a specific channel port can be selected and controlled by more than one user, but only one user has keyboard and mouse control at any one time. Supported. However, PC Share Idle Timeout, which is confi[...]

  • Seite 290

    Appendix A : Specifications 280 Supported Video Resolutions Ensure that each target ser ver's video resolution and refresh rate are supported by the KSX I I and that the signal is noninte rlaced. Video resolution and cable length a re important factor s in the ability to obtain mouse synchronization. See Target Server Connec tion Distance and [...]

  • Seite 291

    Appendix A : Specifications 281 Resolutions 1024x768@70 1680x1050@60Hz 1024x768@72 1920x1080@60Hz Note: Composite Sync and Sync- on -Green video require an a dditional adapter. Note: Some resolutions m ay not be available by default. If you do not see a resolution, plug in th e monitor first, rem ove the monitor and then plug in the CIM. Note: If t[...]

  • Seite 292

    Appendix A : Specifications 282 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS P ort Settings (on page 142). B y default, all requests recei ved by the KSX II via HTTP (port 80) are automatic ally forwarded to HTTPS for complete security. The KSX I I responds to Port 80 for user con venience, relieving user[...]

  • Seite 293

    Appendix A : Specifications 283 Smart Card Readers Supported and Unsuppo rted Smart Card Readers External, USB smart card readers are supported. Supported Smart Card Readers Type Vendor Model Verified USB SCM Microsystems SCR331 Verified on local and remote USB ActivIdentity ® ActivIdentity USB Reader v2.0 Verified on local and remote US B ActivId[...]

  • Seite 294

    Appendix A : Specifications 284 This table contains a list of read ers that Raritan has tested a nd found not to work with the Raritan d evice, therefore they are unsupported. If a smart card reader does not appea r in the supported smart ca rd readers table or in the unsupported smart card readers table, Rarit an cannot guarantee it will function [...]

  • Seite 295

    Appendix A : Specifications 285 Windows XP ® operating system t argets must be running Windo ws XP SP3 in order to use smart cards with the KSX II. If you are working with .NET 3.5 in a Windows XP env ironment on the target server, you must be using SP1. Linux Targets If you are using a Linux ® target, the following requirements mu st be met to u[...]

  • Seite 296

    Appendix A : Specifications 286 Fedora ® Core 10 pcsc-lite-1.4.102.3.fc10.i386  Create a Java ™ Library Link A soft link must be create d to the libpcsclite.so after up grading RHEL 4, RHEL 5 and FC 10. Fo r example, ln – s /usr/lib/libpcsclite. so.1 /usr/lib/libpcsclite.so, assu ming installing the packag e places the libraries in /usr/lib[...]

  • Seite 297

    Appendix A : Specifications 287 See Connectivity (on pag e 291 ) for a list of necessary KSX II hardware (adapters and/or cables) f or connecting the K SX II to common Vendor/Model combination s. Electrical Specifications Parameter Value Input Nominal Frequencies 50/60 Hz Nominal Voltage Range 100/240 VAC Maximum Current A C RMS 0.6A max. AC Operat[...]

  • Seite 298

    Appendix A : Specifications 288 Port Description HTTPS, Port 443 This port is used for the act ual KVM-over- IP communication from the K SX II device to the KVM client on the user' s desktop. It cannot be changed. KSX II (Raritan KVM -over-IP) Protocol, Configurable Port 5000 This port is used to discover ot her KX devices and for communicatio[...]

  • Seite 299

    Appendix A : Specifications 289 Port Description Te lnet Telnet port can be configur ed but is not recommended. The default port is 23. Target Server Connection Distance and Video Resolution The maximum supported distan ce is a function of ma ny factors including the type/quality of Cat5 cable, server type and manuf acturer, video driver and monito[...]

  • Seite 300

    Appendix A : Specifications 290 Network Speed Settings KSX II network speed set ting Network switch port setting Auto 1000/Full 100/Full 100/Half 10/Full 10/Half Auto Highest Available Speed 1000/Full KSX II: 100/Full Switch: 100/Half 10 0/Half KSX II: 10/Full Switch: 10/Half 10/Half 1000/Full 1000/Full 1000/Full No Communica tion No Communicat ion[...]

  • Seite 301

    Appendix A : Specifications 291 communicate, but collision s will occur Per Ethernet specification, these should be “no communication,” howeve r, note that the KSX II behavior deviates from expected be havior Note: For reliable network communication, configure the KS X II and the LAN switch to the same LAN Int erface Speed and Duplex. For examp[...]

  • Seite 302

    Appendix A : Specifications 292 Vendor Device Console connector Serial connection CAT 5 cable Sun Netra T1 RJ - 45 CRLVR-15 cable; or CRLVR- 1 adapter and a CAT5 cable Sun Cobalt DB9M ASCSDB9F adapter and a CAT 5 cable Various Windows NT ® Go to the Support page on Ra ritan's website (www.raritan. com) to obtain a list of commonly used cable [...]

  • Seite 303

    Appendix A : Specifications 293 RJ -45 (female) DB9 (female) 3 2 4 SHELL 5 5 6 3 7 4 8 7 DB9M Nulling Serial Ada pter Pinouts RJ -45 (female) DB9 (male) 1 8 2 1, 6 3 2 4 SHELL 5 5 6 3 7 4 8 7 DB25F Nulling Serial Ad apter Pinouts RJ -45 (female) DB25 (female) 1 5 2 6, 8 3 3 4 1 5 7 6 2 7 20 8 4[...]

  • Seite 304

    Appendix A : Specifications 294 DB25M Nulling Serial Ad apter Pinouts RJ -45 (female) DB25 (male) 1 5 2 6, 8 3 3 4 1 5 7 6 2 7 20 8 4[...]

  • Seite 305

    295 IMPORTANT: The procedures i n this chapter should be attempted only by experienced user s. In This Chapter Returning User Group Inf ormation ........................................................ 295 Setting the Registry to Permit Write Operations to the Schem a ........... 296 Creating a New Attribute ........................................[...]

  • Seite 306

    Appendix B : Updating the LDAP/L DAPS Schema 296 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller t o write to the schema, you mu st set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory ® Schema root no de in the left pane of the wi[...]

  • Seite 307

    Appendix B : Updating the LDAP/LDAP S Schema 297 3. Click New and then choo se Attribute. When the warni ng message appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciusergroup in the C ommon Name field. 5. Type rciusergroup in the L DAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in t he Unique x5000 Object ID fi[...]

  • Seite 308

    Appendix B : Updating the LDAP/L DAPS Schema 298 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from th e menu. The user Properti es dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.[...]

  • Seite 309

    Appendix B : Up dating the LDAP/LDAP S Schema 299 6. Choose rciusergroup f rom the Select Schema Object list. 7. Click OK in the Select Sch ema Object dialog. 8. Click OK in the User Prope rties dialog. Updating the Schema Cache To update the schema ca che: 1. Right-click Active Directory ® Schema in the left pane of the window and select Reload t[...]

  • Seite 310

    Appendix B : Updating the LDAP/L DAPS Schema 300 3. Go to the directory where the suppo rt tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.[...]

  • Seite 311

    Appendix B : Updating the LDAP/LDAP S Schema 301 5. In the left pane of the window, sel ect the CN=Users folder. 6. Locate the user name whose p roperties you want to a djust in the right pane. Right-click the user name and select Prop erties.[...]

  • Seite 312

    Appendix B : Updating the LDAP/L DAPS Schema 302 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attrib utes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the KSX II) in the E dit Attribute field. Click OK.[...]

  • Seite 313

    303 In This Chapter Overview ................................................................................................ 303 Java ....................................................................................................... 303 IPv6 Support Notes ............................................................................... 305 Keyb[...]

  • Seite 314

    Appendix C : Informational Notes 304 Applications Prerequisites Supported MPC Applet Requires installation of Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files + Browser Supported Firefox ® 2.0.0.7 Yes Firefox 3.0.x Yes Internet Explorer ® 6* No Internet Explorer 7 Yes Internet Explorer 8 Yes HTML access client Requir[...]

  • Seite 315

    Appendix C : Informational Notes 305 The KSX II Remote Console and MPC require JRE ™ to function. Java Runtime Environment ™ (JRE) v ersion 1.6.x or higher are supported. The KSX II Remote Console checks the Java version. If the version is incorrect or outdated, y ou will be prompted to download a co mpatible version. Note: In order for m ulti-[...]

  • Seite 316

    Appendix C : Informational Notes 306 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux ® Clients Only) The Virtual KVM Client an d the Multi-Platform Client (MPC ) do not process the key combinati on of Alt Gr + 9 as the care t symbol (^) when using French keyboards with Linux clients. To obtain the caret sy mbol: From a French keyboa[...]

  • Seite 317

    Appendix C : Informational Notes 307 Tilde Symbol From the Virtual KVM Clie nt and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde ( ~) symbol when using a French keyboard. To obtain the tilde sy mbol: Create a macro consisting of the following commands:  Press right Alt.  Press 2.  Release 2.  Re[...]

  • Seite 318

    Appendix C : Informational Notes 308 Note: The Keyboard Indica tor should be used on Linu x systems using Gnome as a desktop envir onment. When using a Hungarian keyboa rd from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double A cute work only with JRE 1.6. There are several methods that can be used to set the [...]

  • Seite 319

    Appendix C : Informational Notes 309 Macintosh Keyboard When a Macintosh ® is used as t he client, the following keys on t he Mac ® keyboard are not captured by the Java ™ Runtime Environment ( JRE ™ ):  F9  F10  F11  F14  F15  Volume Up  Volume Down  Mute  Eject As a result, the Virtual KVM Client and the Multi-Pla[...]

  • Seite 320

    Appendix C : Informational Notes 310 Fedora Resolving Fedora Core Focus Using the Multi-Platform Client (MPC), occasionally there i s an inability to log in to a KSX II device or to access KVM target serv ers (Windows ® , SUSE, and so forth). In ad dition, the Ctrl+Alt+M key c ombination may not bring up the Keyboard S hortcut menu. This situation[...]

  • Seite 321

    Appendix C : Informational Notes 311 USB Ports and Profiles VM -CIMs and DL360 USB Ports HP ® DL360 servers have o ne USB port on the back o f the device and another on the front of the device. With the DL360, bo th ports cannot be used at the same time. Th erefore, a dual VM-CIM ca nnot be used on DL360 servers. However, as a workaround, a USB2 h[...]

  • Seite 322

    Appendix C : Informational Notes 312 USB profile help appears i n the USB Profile Help window. Fo r detailed information about specifi c USB profiles, see Available USB P rofiles (on page 105 ). Raritan provides a standard selection of USB configuration profil es for a wide range of operating sy stem and BIOS level serve r implementations. These ar[...]

  • Seite 323

    Appendix C : Informational Notes 313 Changing a USB Profile when U sing a Smart Card Read er There may be certain circumsta nces under which y ou will need to change the USB profile for a target server. For example, you may need to change the connection speed t o "Use Full Speed fo r Virtual Media CIM" when the target has p roblems with t[...]

  • Seite 324

    Appendix C : Informational Notes 314 Virtual Media Dell OptiPlex and Dimen sion Comput ers From certain Dell OptiPlex ™ and Dimension computers, it may not be possible to boot a target server fr om a redirected drive/I SO image, or to access the target server BI OS when a virtual media s ession is active (unless the Use Full Speed for Virtual Med[...]

  • Seite 325

    Appendix C : Informational Notes 315 CC - SG Virtual KVM Client Version Not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from Command Center Secure Gateway (CC-SG) in proxy m ode, the Virtual KVM Client version is unknown. In the About Rari tan Virtual KVM Client dial og, the version is displayed as “Version Unknow n”. Si[...]

  • Seite 326

    316 In This Chapter General Questions ................................................................................. 316 Serial Access ......................................................................................... 318 Universal Virtual Media .......................................................................... 323 USB Profiles ..[...]

  • Seite 327

    Appendix D : FAQs 317  OS - and hardware-independent - The KSX II can be used to manage servers running many pop ular operating systems, incl uding Intel ® , Sun ™ , PowerPC running Windows ® , Linux ® , Solaris ™ , etc.  State-Independent/Agentles s - The KSX II does not require t he managed server's operating system to be up and[...]

  • Seite 328

    Appendix D : FAQs 318 Serial Acce ss My Dominion KSX I I has just been configured w ith a network address and I can successfully ping the IP, but when I try to access it using a web bro w ser, the message reads "Page cannot be fo und or server error, contact S ystem Administrator." Check your web browser s ettings and confirm that a proxy[...]

  • Seite 329

    Appendix D : FAQs 319 You will need to purchase a 3rd party RS232 to RS4 22/485 converter for each end (two units total) - one at the Dominion end and on e connected to the device. Can I open multiple w indows and "tile" to monitor m ultiple servers and other IT equipment? Yes, you may monitor and "tile" as many windows as there[...]

  • Seite 330

    Appendix D : FAQs 320 All Dominion KSX II units are S UN "break-safe" for use with S UN Solaris. I have lost my Admin pass w ord to the Dominion KSX I I. Is there a back door or secret pas sword? There is no back-door password. The only option is to restore t he unit to its factory default settings and c reate the administrator u ser name[...]

  • Seite 331

    Appendix D : FAQs 321 No. Dominion KSX II is truly "Plug- and -Play" m aking installation quick and set-up easy. It is not necessary to buy any additional cli ent software or hardware. In addition, n o special networking equi pment or design is necessary. What is the name of the termi nal emulation pack age included with Dominion KSX II? [...]

  • Seite 332

    Appendix D : FAQs 322 Can I get the buffered off -line data from a serial port w hen using Telnet? Yes. Can I use KSX II ov er a VPN connection? Yes, KSX II fits into most a ny network configuration utilizing TCP/IP. K SX II uses standard Internet Proto col (IP) technologies fr om Layer 1 through Layer 4. Set up the VPN (t ypically IPSec) connectio[...]

  • Seite 333

    Appendix D : FAQs 323 Go to the Raritan website ( www.raritan.com) Support page to find the latest information about the KSX II serial pinouts (RJ-45). The Dominion KSX II uses the web bro w ser to access serial devices. What are the ad vantages of Java-enabled w eb browser access? For many Solaris/Unix/Linu x system administrators, t he de facto s[...]

  • Seite 334

    Appendix D : FAQs 324 USB Profiles What is a USB profile? Certain servers require a specifically configured USB int erface for USB based services such as vir tual media. The USB Profile tailors the K SX II‟s USB interface to the serv er to accommodate these server specific characteristics. Why would I use a USB profile? USB Profiles are most ofte[...]

  • Seite 335

    Appendix D : FAQs 325 Do I need a special CIM t o use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firm ware. Will Raritan provide USB profiles for other target server configurations? Raritan will provide new USB profiles to suit customer nee ds. As these profiles become available, they will be included in firmware up grades.[...]

  • Seite 336

    Appendix D : FAQs 326 IPv6 Networking What is IPv6? IPv6 is the acronym for “Int ernet Protocol Version 6”. IPv6 is the “next generation” IP protocol which will replace the current I P Version 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses . It also improves IPv4 in areas such as[...]

  • Seite 337

    Appendix D : FAQs 327 Where can I get more information on IPv6? See www.ipv6.org for general inf ormation on IPv6. The KSX II User Guide describes the KSX I I‟s support for IPv6. Remote Access How many users can re motely access servers on each KSX II? Up to 8 KVM users can sh are one KVM channel and up to 8 serial user s can share 8 serial cha n[...]

  • Seite 338

    Appendix D : FAQs 328 Speed Description Time 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network sp eed .4 seconds 6Mbps Likely practical 10Mbit network speed .8 seconds 512Kbps Cable modem download speed (typical) 8 seconds How do I access servers conne cted to the KSX II if t he network ever becomes unavai[...]

  • Seite 339

    Appendix D : FAQs 329 Ethernet and IP Networking Does the KSX II offer dua l gigabit Ethernet ports to prov ide redundant fail-over, or load balancing? Yes. The KSX II features dual gig abit Ethernet ports to provide redundant failover capabilities. Should the primary Ethern et port (or the switch/router to which it is con nected) fail, the KSX II [...]

  • Seite 340

    Appendix D : FAQs 330 Use case Required bandwidth Idle Windows Desktop 0 Mbps Navigate Start Menu 0.49Mbps Scroll an Entire Page of Text 1.23Mbps Run 3D Maze Screensaver 1.55Mbps[...]

  • Seite 341

    Appendix D : FAQs 331 What is the slowest connect ion (lowest bandwidth) over w hich the KSX II can operate? (Shared) 33Kbps or above is recom mended for acceptable KSX II performance over a modem connection . What is the speed of the KSX II's Ethernet interfaces? The KSX II supports two 1 0/100/1000 speed Ethernet interfaces, with configurabl[...]

  • Seite 342

    Appendix D : FAQs 332 If an external authentication se rver (such as LDAP/LDAP S, Active Directory, RADIUS, and so forth) is used, the KSX II allows this as well, and will even failover to its own inte rnal authentication should the external authentication se rver become unavailable. In this way, the KSX II's design philosophy is opt imized to[...]

  • Seite 343

    Appendix D : FAQs 333 Servers Does the KSX II depend on a Windows ® server to opera te? No. The KSX II is completel y independent. Even if a user chooses to configure the KSX II t o authenticate against an Active Directory server - if that Active Directory server becom es unavailable, the K SX II's own authentication will be activat ed and fu[...]

  • Seite 344

    Appendix D : FAQs 334 Blade Servers Can I connect blade servers to t he KSX II? Yes. The KSX II supports popul ar blade server model s from the leading blade server manufacturer s: HP ® , IBM ® and Dell ® . Which blade servers are suppor ted? The following models are suppo rted:  Dell ® PowerEdge ® 1855, 1955 and M10 00e  HP BladeSystem [...]

  • Seite 345

    Appendix D : FAQs 335 For KX II's, Raritan recommend s connecting up to tw o times the number of remote connections sup ported by the device. For example, with a KX2 -216 with two remote channels, we recommend connecting u p to 4 blade server chassis. You can of course connect indiv idual servers to the remaining server ports. I'm an SMB [...]

  • Seite 346

    Appendix D : FAQs 336 Installation Besides the device itself, what do I need to orde r from Raritan to install the KSX II? Each server that connects to the KSX II requires a D ominion Computer Interface Module (CIM), a s erial cable adapter, an d an adapter that connects directly to t he keyboard, video, and mouse p orts of the server. What kind of[...]

  • Seite 347

    Appendix D : FAQs 337 The KSX II models range fr om 4 to 8 server ports in a 1U c hassis. This is the industry's highest digital KVM switch port density. What happens if I disconnect a s erver from the KSX II and reconnect it to another KSX II device, or conne ct it to a different port on the same KSX II device? The KSX II will automaticall y [...]

  • Seite 348

    Appendix D : FAQs 338 Local Po rt Can I access my serv ers directly from the rack? Yes. At the rack, the KSX I I functions just like a traditio nal KVM switch - allowing control of up to 16 serv ers using a single keyb oard, monitor, and mouse. When I am using the local port, do I prevent other users from accessing servers remotely ? No. The local [...]

  • Seite 349

    Appendix D : FAQs 339 Yes. The local port present ation is identical and completely in sync with remote access clients, as well as Raritan's optional CommandCenter Secure Gateway management devic e. To be clear, if the name of a server via the onscreen d isplay is changed, this up dates all remote clients and external management servers in rea[...]

  • Seite 350

    Appendix D : FAQs 340 Power Control Does the power supply used by the KSX II automa tically detect voltage settings? Yes. The KSX II's power supply can be used in AC voltage r anges from 100 -240 volts, at 50-60 Hz. What type of po wer control capabilities does the KSX II offer? Raritan's Remote Power Cont rol power strips can be conne ct[...]

  • Seite 351

    Appendix D : FAQs 341 Scalability How do I connect multipl e KSX II devices togethe r into one solution? Multiple KSX II devices do not need to be physically c onnected together. Instead, each KSX II device connects to the network. They automatically work together as a single solution if deployed with Raritan's optional CommandCenter Secure Ga[...]

  • Seite 352

    Appendix D : FAQs 342 Security Is the KSX II FIPS 140-2 Certified ? The KX II 2.2.0 and later, and t he KSX II 2.3.0 and later, provid es users with the option to use an embed ded FIPS 140-2-validated cryptogr aphic module running on a Linux platform per FIPS 140-2 impleme ntation guidelines. This cryptographic m odule is used for en cryption of KV[...]

  • Seite 353

    Appendix D : FAQs 343 Yes, the KSX II has admini strator-configurable, strong password checking to ensure that u ser-created passwords meet corporate and/or government standards and are r esistant to brute force hacking. If the KSX II Encry ption Mode is set to Auto, w hat level of encryption is achieved? The KSX II has the ability t o support AES-[...]

  • Seite 354

    Appendix D : FAQs 344 Smart Cards and CAC Authentication Does the KSX II support smart c ard and CAC auth entication? Yes, smart cards and DoD Comm on Access Card (CA C) authentication to target servers is support ed in release KX I I 2.1.10 and later, and KSX II 2.3.0 and later. What KSX II models support smar t cards/CAC? All KSX II models are su[...]

  • Seite 355

    Appendix D : FAQs 345 Managability Can the KSX II be rem otely managed and configur ed via web browser? Yes, the KSX II can be co mpletely configured remotely via web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) v ersion installed. Besides the initial setting o f the KSX II's IP a[...]

  • Seite 356

    Appendix D : FAQs 346 Miscellaneous What is the KSX II's defaul t IP address? 192.168.0.192 What is the KSX II's defaul t user name and pass w ord? The KSX II's default user n ame is admin and the defa ult password is raritan [all lower case]. Howeve r, for the highest level of security , the KSX II forces the administr ator to chang[...]

  • Seite 357

    347 A A. AC Power • 23 Absolute Mouse Mode • 72 Accessing a Target Server • 251 Accessing Telnet from a W indows PC • 229 Accessing the KSX II Using CLI • 228 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM- VU SB • 314 Active KVM Client (AKC) • 37, 80 Adding a New User • 121 Adding a New U ser Group • 114, 121 Addi[...]

  • Seite 358

    Index 348 Connectivity • 287, 291 Create User Groups and User s • 35 Creating a New Attribute • 296 D D. KVM Target Server Port s • 25 DB25F Nulling Serial Adap ter Pinouts • 293 DB25M Nulling Serial Adap ter Pinouts • 294 DB9F Nulling Serial Adapter P inouts • 292 DB9M Nulling Serial Adapt er Pinouts • 293 Default Login Information[...]

  • Seite 359

    Index 349 J Java • 303 Java Runtime Environment (JRE) • 304 K Key Combinations and the Java Runtime Environment (JRE) • 308 Keyboard Language Preference ( Fedora Linux Clients) • 3 07 Keyboard Macros • 57 Keyboard Options • 57 Keyboards • 306 KSX II Client Applications • 4 KSX II Console Layout • 40 KSX II Help • 4 KSX II Local [...]

  • Seite 360

    Index 350 Ping Host Page • 222 Port Access Page • 43 Port Access Page (Local Con sole Server Display) • 246 Port Action Menu • 44, 247 Port Group Management • 188 Port Keywords • 186 Port Permissions • 115, 117 Port Settings • 2 30 Port Sharing Using CLI • 237 Ports Used • 287 Power Control • 8, 158, 340 Power Controlling a Ta[...]

  • Seite 361

    Index 351 Supported Blade Chassis Model s • 162, 164, 168, 175 Supported Browsers • 275 S upported CIMs for Blade Chassis • 176 Supported Keyboard Langu ages • 249 Supported Operating Systems ( Clients) • 271 Supported Operating Systems an d CIMs (KVM Target Servers) • 25, 272, 317 Supported Paragon CIMS and C onfigurations • 197, 276[...]

  • Seite 362

    U.S./Canada/Latin Americ a Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 732- 764 -8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Beijing Monday - Friday [...]