Raritan KX2-864 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Raritan KX2-864 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Raritan KX2-864, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Raritan KX2-864 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Raritan KX2-864. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Raritan KX2-864 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Raritan KX2-864
- Den Namen des Produzenten und das Produktionsjahr des Geräts Raritan KX2-864
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Raritan KX2-864
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Raritan KX2-864 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Raritan KX2-864 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Raritan finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Raritan KX2-864 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Raritan KX2-864, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Raritan KX2-864 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Copyright © 2009 Raritan, Inc. DKX2-v2.1.8-0J-E April 2009 255-62-4023-00 Dominion KX II (KX2-832 and KX2-864) User Guide Release 2.1.8[...]

  • Seite 2

    This document contains propri etary information that is protected by copyright. All right s reserved. No part of this document may be photocopied, rep rod uced, or translated into another language without express prior written con sent of Raritan, Inc. © Copyright 2009 Raritan, Inc., Comman dCe nter®, Dominion®, Paragon® and the Raritan company[...]

  • Seite 3

    iii Contents Chapter 1 Introduction 1 Dominion KX II Help............................................................................................................ ........... 1 Related Docu mentation ....................................................................................................... 1 What's New in the Help .............[...]

  • Seite 4

    Contents iv Video Pro perties ............................................................................................................... . 63 Mouse Options.................................................................................................................. . 67 VKC Virtual Media ....................................................[...]

  • Seite 5

    Contents v Changing a Password ................................................................................................................ 119 Chapter 7 Device Management 120 Network Settings ............................................................................................................... ......... 120 Network Basic Settings ....[...]

  • Seite 6

    Contents vi Upgradi ng CIMs ................................................................................................................. ........ 196 Upgrading Firmware ............................................................................................................. ..... 197 Upgrade Hi story .......................................[...]

  • Seite 7

    Contents vii Dominion KX II Local Co nsole Interface .................................................................................... 222 Security and Au thentication .................................................................................................... ... 222 Available Re solutions................................................[...]

  • Seite 8

    Contents viii Setting the Registry to Permit Wri te Operations to the Schema ............................................... 255 Creating a New Attribute ....................................................................................................... ..... 255 Adding Attributes to the Class ...................................................[...]

  • Seite 9

    Contents ix Appendix D FAQs 275 General Questions .............................................................................................................. ....... 276 Remote Access .................................................................................................................. ........ 278 Universal Virt ual Media ..........[...]

  • Seite 10

    1 In This Chapter Dominion KX II Help .................................................................................. 1 What's New in the Help ............................................................................. 2 Dominion KX II Overview........................................................................... 3 Virtual Media ....[...]

  • Seite 11

    Chapter 1: Introduction 2 What's New in the Help The following information has been ad ded based on enhancement s and changes to the equipment and/o r user d ocumentation. • Information on the new Extended Lo cal port feature on the KX2-83 2 and KX2-864 has been added to the help . • Information on features specific to the KX2-83 2 and K X[...]

  • Seite 12

    Chapter 1: Introduction 3 Dominion KX II Overview The Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can b e controlled with a standard Domini on KX II. With the Dominion KX II 8-[...]

  • Seite 13

    Chapter 1: Introduction 4[...]

  • Seite 14

    Chapter 1: Introduction 5 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Power strip Dominion KX II Local access Note: KX2-832 and KX2-864 also use an Extended Local port. Remote KVM and serial devices IP LAN/WAN Modem PSTN Remote (netwo rk ) access Virtual Media All Dominion KX II models support virtual me[...]

  • Seite 15

    Chapter 1: Introduction 6 Product Photos Dominion KX II KX2-832[...]

  • Seite 16

    Chapter 1: Introduction 7 KX2-864[...]

  • Seite 17

    Chapter 1: Introduction 8 Product Features Hardware • Integrated KVM-over-IP remote acce s s • 1U or 2U rack-mountable (brackets in cluded) • Dual power supplies with failover; auto s witching power supply with power failure warning • 8, 16, 32, or 64 (on KX2-464) server po rts • 32 (KX2-832) or 64 (KX2-864) serve r po rts • Up to 8 vid[...]

  • Seite 18

    Chapter 1: Introduction 9 Software • Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs • Absolute Mouse Synchronization with D2CIM-V USB CIM and D2CIM-DVUSB CIMs • Plug-and-Play • Web-based access and manag eme nt • Intuitive graphical user interfa ce (GUI) • 128-bit encryption of com p lete KVM signal, including video and virtual medi[...]

  • Seite 19

    Chapter 1: Introduction 10 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) Dominion KX II Local Access Console Local User - an optional user console (consi sting of a keyboard, mouse, and multi-sync VGA monitor) attached directly to the Dominion KX II to control KVM target servers (directly at the rack, not th[...]

  • Seite 20

    Chapter 1: Introduction 11 Package Contents Each Dominion KX II ships as a fully-configured stan d-al one product in a standard 1U (2U for DKX2-864) 19" rackmount cha ssis. Each Dominion KX II device ships with the following contents: Amount included Item 1 Dominion KX II device 1 Dominion KX II Quick Setup Guide 1 Rackmount kit 1 AC power cor[...]

  • Seite 21

    12 In This Chapter Overview .................................................................................................. 12 Default Login Informat ion ........................................................................ 12 Getting St arted ........................................................................................ 13 Overview[...]

  • Seite 22

    Chapter 2: Installation and Configuration 13 Default Value Important: For backup and busines s continuity purposes, it is strongly recommended that y ou create a backup administrator user name and password and keep that inform ation in a secure location. Getting Started Step 1: Configure KVM Targe t Serv ers KVM target servers are the com puters th[...]

  • Seite 23

    Chapter 2: Installation and Configuration 14 Mouse Settings The Dominion KX II operates in several mouse modes: • Absolute Mouse Mode ™ (D2CIM-VUSB only) • Intelligent Mouse Mode (do not use an animated mo u se) • Standard Mouse Mode Mouse parameters do not have to be altered for Absol ute Mouse Synchronization but D2CI M-VUSB or D2 CIM-DVU[...]

  • Seite 24

    Chapter 2: Installation and Configuration 15 Windows XP®/Windo w s 2003® To configure KVM target serv ers running Microsoft Windows XP/2003: 1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab. c. In the Motion group:  Set the mouse motion speed setting to exactly the middle speed. ?[...]

  • Seite 25

    Chapter 2: Installation and Configuration 16 Note: For KVM target servers running Wind ows 2000 or XP, you may wish to create a user name that will be used only for remote connections through the Dominion KX II. This w ill enable you to keep the target server's slow m ouse pointer motion/acceleratio n settings exclusive t o the Dominion KX II [...]

  • Seite 26

    Chapter 2: Installation and Configuration 17  Animate controls and elem ents in side windows  Animate windows when mi nimizi ng and maximizing  Fade options:  Fade or slide menus into view  Fade or slide ToolTips into view  Fade out menu items after clicking 3. Click OK and Close the Control Panel. Linux Settings (Red Ha t 9) Note[...]

  • Seite 27

    Chapter 2: Installation and Configuration 18 Note: Once connected to the target server, in many Li nux graphical environments, the <Ctrl > <Alt> <+> com mand will change the video resolution, scrolling through all avail able resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, dependin g on yo ur X se rver dist[...]

  • Seite 28

    Chapter 2: Installation and Configuration 19 3. Save the file. 4. Reboot the system in order for the changes to take effect. Linux Settings (Red Ha t 4) Note: The following settings are optim ized for Standa rd Mouse mode only. To configure KVM target serv ers running Linux (graphical user interface): 1. Configure the mouse settings: a. Choose Main[...]

  • Seite 29

    Chapter 2: Installation and Configuration 20 SUSE Linux 10.1 Settings Note: Do not attempt to synchroni ze the mouse at the SUSE login prompt. You must be connected to the target serve r to synchroni ze the mouse cursors. To configure the mouse settings: 1. Choose Desktop > Control Cente r. The Desktop Preferences di alog appears. 2. Click Mouse[...]

  • Seite 30

    Chapter 2: Installation and Configuration 21 Tip: If you do not want to be prompted upon log out, follow the se procedures instead. To make your settings permanent in Linux (no prom pt): 1. Choose Desktop > Control Cente r > System > Sessions. 2. Click the Session Options tab. 3. Deselect the "Prompt on the log off" checkbox. 4. [...]

  • Seite 31

    Chapter 2: Installation and Configuration 22 3. KVM target servers running the Solaris operating system must output VGA video (H-and-V sync, not composite sync). To change your Sun video card output from comp osite sync to the nondefault VGA output: 1. Issue the Stop+A command to drop to bootprom mode. 2. Issue the following command to ch ang e the[...]

  • Seite 32

    Chapter 2: Installation and Configuration 23 Video Settings (POST) Sun systems have two different resoluti on setting s: a POST resolution and a GUI resolution. Run these comm ands from the command line. Note: 1024x768x75 is used as an exam ple here; substitute the resolution and refresh rate you are using. To check current POST resolution: • Run[...]

  • Seite 33

    Chapter 2: Installation and Configuration 24 4. Use the sliders to set the Mouse acceleration to 1.0 and Threshold to 1.0. 5. Click OK. To configure the video: 1. From the Launcher, select Application M anag er. 2. Select System_Admin. 3. Choose Smit > Devices > Gra phic Display s > S e le ct the Display Resolution and Refresh Rate. 4. Sel[...]

  • Seite 34

    Chapter 2: Installation and Configuration 25 To take advantage of th e Dominion KX II: The firewall must allow inbound communication on: Web-access cap abilities Port 443 - standard TCP port for HTTPS communication Automatic redirection of HTTP requests to HTTPS (so the more common “http://xxx.xxx.xxx.xxx” can be used instead of “https://xxx.[...]

  • Seite 35

    Chapter 2: Installation and Configuration 26 A. AC Po w er To connect the power supply : 1. Attach the included AC power cord to the Domi nion KX II and plug into an AC power outlet. 2. For dual power failover protection, attach the se con d included AC power cord and plug it into a different powe r so urce than the first power cord. Note: If you o[...]

  • Seite 36

    Chapter 2: Installation and Configuration 27  Enable Automatic Failover on the Network Configuration page. Note: Use both network ports only if you want to use one as a failo ver port. D. Local Access Port (Local PC) For convenient access to target server s while at the rack, use the Dominion KX II Local Access port. Whil e the Local Access port[...]

  • Seite 37

    Chapter 2: Installation and Configuration 28 E. Target Server Ports The Dominion KX II uses standard UTP cablin g (Ca t5/5e/6) to connect to each target server. To connect a target serv er to th e Dominion KX II: 1. Use the appropriate Computer Interfa ce Module (CIM ). See Supported CIMs and Operating Systems (Target S ervers) (on page 239) for mo[...]

  • Seite 38

    Chapter 2: Installation and Configuration 29 2. Once the unit has booted, the Dominion KX II Local Console is visible on the monitor attached to the Dominion KX II local port. Type the default username (admin) and pa sswo rd (rarita n) and click Login. The Change Password screen is displ ayed. 3. Type your old passw ord (raritan) in the Old Passwor[...]

  • Seite 39

    Chapter 2: Installation and Configuration 30  DHCP - Dynamic Host Configuration Pro tocol is used by networked computers (clients) to obtai n unique IP addresses and other parameters from a DHCP server. With this option, network parameter s ar e as sign ed by the DHCP server. If DHCP is used, enter the Preferred ho st na me (DHCP only). Up to 63[...]

  • Seite 40

    Chapter 2: Installation and Configuration 31 a. Primary DNS Server IP Address b. Secondary DNS Server IP Address 7. When finished, click OK. Your Do minion KX II device is now network accessible. See LAN Interface Settings (on page 123) for information in configuring this se ction of the Networ k Settings pa ge. Note: In some environments, the defa[...]

  • Seite 41

    Chapter 2: Installation and Configuration 32 Naming Target Servers To name the target serv ers: 1. Connect all of the target serv ers if you have not already done so. See Step 3: Connect the Equipment (on page 25 ) for a description of conn ectin g the equipme nt. 2. Using the Dominion KX II Local Console, choose Device Settings > Port Configura[...]

  • Seite 42

    Chapter 2: Installation and Configuration 33 Character Description Character Description % Percent sign @ At sign & Ampersand [ Left bracket ( Left parenthesis Backward slash ) Right parenthesis ] Right bracket * Asterisk ^ Caret + Plus sign _ Underscore , Comma ` Grave accent - Dash { Left brace . Period | Pipe sign / Forward slash } Right b[...]

  • Seite 43

    Chapter 2: Installation and Configuration 34 Note: If either of these checkboxes is selected and po we r input is not actually connected, the power LED at the front of the devi ce turns red. To disable power supply autodetectio n for the power supply not in use: 1. Using the Dominion KX II Local Console, choose Device Settings > Power Supply Set[...]

  • Seite 44

    Chapter 2: Installation and Configuration 35 Note on Microsoft Active Directory Microsoft Active Directory uses t he LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the Dominion KX II. If it has the IAS (Internet Authorization Server) component, a Microsoft Active Dire ctory server can also serve[...]

  • Seite 45

    Chapter 2: Installation and Configuration 36 3. Type the layout code desired (for exam ple, 31 for the Japanese keyboard). 4. Press Enter. 5. Shut down the device and power on once again. The DCIM -SUSB performs a reset (p ower cy cle). 6. Verify that the characters are correct.[...]

  • Seite 46

    37 In This Chapter Interfaces ................................................................................................. 37 Virtual KVM Client ................................................................................... 51 Interfaces There are several user interfaces in the Domini on KX II, providing you with easy access any time, any[...]

  • Seite 47

    Chapter 3: Working with Target Servers 38 Dominion KX II Local Console Interface When you are located at the server rack, the Domi nion KX II provides standard KVM management and admini stration via the Domi nion KX II Local Console. The Domini on KX II Local Con sole provides a direct KVM (analog) connection to your conn ected servers; the perform[...]

  • Seite 48

    Chapter 3: Working with Target Servers 39 from the Dominion device's IP address to launch the Dominion KX II Remote Console. Depending on your browser and se cu rity settings, you may see various security and certificate warnin gs. It is necessary to accept these warnings to launch the Do minion KX II Remote Co nsole. You can reduce the numbe [...]

  • Seite 49

    Chapter 3: Working with Target Servers 40 6. See Virtual KVM Client (on page 51) for information on the Dominion KX II functions available via the Remote Co nsol e. Dominion KX II Console La yout Both the Dominion KX II Remote Console and the Dominion KX II Local Console interfaces provide an HTML (web-ba sed ) interface for configuration and admin[...]

  • Seite 50

    Chapter 3: Working with Target Servers 41 Port Access Page After successfully logging on to the Dominion KX II Remote Consol e, the Port Access page appears. This page lists all of the Dominion KX II ports, the connected KVM target serve r s, and their status and availability. The Port Access page pr ovides a c ce ss to the KVM target servers conne[...]

  • Seite 51

    Chapter 3: Working with Target Servers 42  Availability - The Availability can be Idle, Connected, Busy, or Unavailable. Blade servers will have an availability of either shared or exclusive when a connection to that blade i s in pla ce. 2. Click View by Port or View by Group to switch between views.  In addition to the Port Number, Port Name[...]

  • Seite 52

    Chapter 3: Working with Target Servers 43 Port Ac tion Menu When you click a P o rt Name in the Port A ccess list, the Port Action menu appears. Choose the desi red men u option for that port to execute it. Note that only currently available optio ns, depending on the port's statu s and availability, will be listed in the Port Action menu: •[...]

  • Seite 53

    Chapter 3: Working with Target Servers 44 Managing Favorites A Favorites feature is provided so you can organize and quickly a ccess the devices you use frequently. The Fa vorite D ev ices section is lo cated in the lower left side (sidebar) of t he Port Access pag e and p rovides the ability to: • Create and manage a list of favorite devices •[...]

  • Seite 54

    Chapter 3: Working with Target Servers 45 Note: Both IPv4 and IPv6 addresses are supported. Manage Favorite s Page To open the Manage Favorites page: • Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local Subn[...]

  • Seite 55

    Chapter 3: Working with Target Servers 46 Discovering Devices on the Local Subnet This option discovers the device s on you r local subnet, which is the subnet where the Dominio n KX II Remo te Console is running. These devices can be accessed directly from this pag e or you can add them to your list of favorites. See Favorites List Page (on page 4[...]

  • Seite 56

    Chapter 3: Working with Target Servers 47 Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the rem ote con sole subnet. To access a discovered dev ice: • Click the device name or IP addre s s for that device. A new browser opens to that device. Note: Both IPv4 and IPv6 addresses are supported. Di[...]

  • Seite 57

    Chapter 3: Working with Target Servers 48 To discover devices on the dev ice subnet: 1. Choose Manage > Discover Device s - Dominion KX II Subnet. The Discover Devices - Dominion KX II Subnet page appears. 2. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Fav orites List: 1. Select the checkbox next t[...]

  • Seite 58

    Chapter 3: Working with Target Servers 49 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate Dominion KX II device. 2. Click the Edit button. The Edit page appears. 3. Update the fields as necessary:  Description  IP Address/Host Name - T[...]

  • Seite 59

    Chapter 3: Working with Target Servers 50 Logging Out To quit the Dominion KX II Remote Console: • Click Logout in the upper ri ght -h and corner of the page. Note: Logging out also closes any ope n Virtual KVM Client and serial client sessions. Multi-Platform Client Interface Raritan Multi-Platform Client (MPC) is a graphical u ser interface for[...]

  • Seite 60

    Chapter 3: Working with Target Servers 51 Note: Depending on your browser and brow ser security settings, you may see various se curity and certificate check and wa rning messages. It is necessary to accept the opt ions in ord er to ope n MPC. Note: If you are using FireFox 3.0.3, yo u m ay experience problems launching the application. If this occ[...]

  • Seite 61

    Chapter 3: Working with Target Servers 52 VKC Toolbar and Shortcut Key s Button Button Name Description Connectio n Properties Opens the Modify Connection Properties dialog from which you can manually adjust bandwidth options (su ch a s connection speed, color depth, and so forth). Same as choosing Conne ction > Properties or choosi ng Connectio[...]

  • Seite 62

    Chapter 3: Working with Target Servers 53 Button Button Name Description Send Ctrl+Alt+D el Sends a Ctrl+Alt+Del hot key combination to the target server. Same as choosing Keyboard > Send Ctrl+Alt+D el. Single Cursor Mode Starts Single Cursor mode in whi ch the local mouse pointer no lon ger a ppears onscreen. Same as choosing Mouse > Single [...]

  • Seite 63

    Chapter 3: Working with Target Servers 54 3. Choose Switch From in the Port Action menu. The Virtual KVM Client window switches to the new target server you sele cted. Power Controlling a Target Server Note: These features are availa ble onl y when you have m ade power associations. To power cycle a KVM target serv er: 1. From the Dominion KX II Re[...]

  • Seite 64

    Chapter 3: Working with Target Servers 55 Disconnecting KVM Target Serv ers Note: This item is not available on the Dom inion KX II Local Console. The only way to disconnect from the sw it ched ta rget in the Local Console is to use the hot key. To disconnect a target serv er: 1. Click the port name of the target you want to disco nn ect. The Port [...]

  • Seite 65

    Chapter 3: Working with Target Servers 56 Connection Properties The Dominion KX II dynamic video compression al gorithm s maintain KVM console usability under varyi ng bandwidth constraints. The Dominion KX II devices optimize KVM output not only for LAN use, but also for WAN use. These devices ca n al so control color depth and limit video output,[...]

  • Seite 66

    Chapter 3: Working with Target Servers 57  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings are an optimizat ion for sp ecific conditions rather than an exact speed. The client and serve r al ways attempt to deliver video as quickly as possible on the network regardle ss of th e curr[...]

  • Seite 67

    Chapter 3: Working with Target Servers 58 Connection Information To obtain information about your Virtual KVM Client connection: • Choose Connection > Co n nection Info. The Connection Info window opens. The following information is displayed about the current con nection: • Device Name - The name of the Dominion KX II device. • IP Address[...]

  • Seite 68

    Chapter 3: Working with Target Servers 59 Building a Key board Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialo g appears. 2. Click Add. The Add Keyboard Macro dialog appea rs. 3. Type a name for the macro in the Keyboard Macro Name field. This name will appear in the Keyboard menu after it is cre a ted. 4. [...]

  • Seite 69

    Chapter 3: Working with Target Servers 60 8. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Key board Macro s dialog appears and lists the new keyboard macro.[...]

  • Seite 70

    Chapter 3: Working with Target Servers 61 9. Click Close to close the Keyboard Macros dialo g. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assign ed to the macro. Running a Keyboard Ma cro Once you have created a keyboard ma cro, execute i t using the ke ybo[...]

  • Seite 71

    Chapter 3: Working with Target Servers 62 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboa rd Macro s dialog appears. 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted. Hot-key combinations that coincide with blade chassis switching key sequences wi ll not be sent to blades housed [...]

  • Seite 72

    Chapter 3: Working with Target Servers 63 Video Properties Refresh Scr een The Refresh Screen command force s a refre sh of the video screen. Video settings can be refreshed automatically in seve ral ways: • The Refresh Screen command force s a refresh of the video screen. • The Auto-sense Video Settings comm an d automatically detects the targ[...]

  • Seite 73

    Chapter 3: Working with Target Servers 64 Video Settings Use the Video Settings command to manually adjust the video settings. To change the video settings: 1. Choose Video > Video Settings o r cli ck the Video Settings button in the toolbar to open the Video Settings dialog. 2. Adjust the following settings as req uired. As you adjust the setti[...]

  • Seite 74

    Chapter 3: Working with Target Servers 65 j. Phase - Phase values ran ge from 0 to 31 and will wrap around. Stop at the phase value that produces the best video image for the active target server. k. Horizontal Offset - Controls the horizontal positioni ng of the target server display on your monitor. l. Vertical Offset - Controls the vertical p os[...]

  • Seite 75

    Chapter 3: Working with Target Servers 66 Note: Some Sun background screens, su ch as screens with very dark borders, may not center precisely on ce rtain Sun servers. Use a different background or place a lighter colored ico n in the upper left corner of the screen. Using Screenshot from Target You are able to take a screenshot of a target server [...]

  • Seite 76

    Chapter 3: Working with Target Servers 67 3. Click Save to save the screenshot. Mouse Options When controlling a target server, the Do minion KX II Remote Co nsole displays two mouse cursors: one bel onging to your client workstation and the other belonging to the target server. You can operate in either single mouse mode o r dual mouse mode. When [...]

  • Seite 77

    Chapter 3: Working with Target Servers 68 Mouse Pointer Sy nchronization When remotely viewing a target serve r that uses a mouse, you will see two mouse cursors: one belonging to y our remote cli ent workstation and the other belonging to the target server. When the mo use p ointer lies within the Virtual KVM Client target server wi ndo w, mouse m[...]

  • Seite 78

    Chapter 3: Working with Target Servers 69 Additional Notes for In telligent Mouse Mode • Be sure that there are no icons or applications in the upper left section of the sc reen since that is whe re the synchronization routin e takes place. • Do not use an animated mouse. • Disable active desktop on KVM target servers. Synchronize Mouse In du[...]

  • Seite 79

    Chapter 3: Working with Target Servers 70 Intelligent Mouse Mode In Intelligent Mouse mode, the Dominion KX II device can detect the target mouse settings and synchroni ze the mouse cursors accordingly, allowing mouse accelerati on on the target. In this mode, the mou se cursor does a “dance ” in the top left corner of the screen and calcul ate[...]

  • Seite 80

    Chapter 3: Working with Target Servers 71 Please note that mouse configuratio ns will vary on different target operating systems. Consult your OS guideline s for furt her details. Also note that intelligent mouse synchr onization doe s not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates ar e used to keep the clie nt a[...]

  • Seite 81

    Chapter 3: Working with Target Servers 72 To exit single mouse mode: 1. Press Ctrl+Alt+O on your key board to exit single mo use mode. VKC Virtual Media See the chapter on Virtual Media for co mplete inform ation about setting up and using virtual media. Tool Options From the Tools menu, you can spe cify certain o ption s for use with the Virtual K[...]

  • Seite 82

    Chapter 3: Working with Target Servers 73 5. Exit Single Cursor Mode - Hotkey. When you enter si ngle cursor mode, only the target server mouse cu rsor is visible. This is the hot key used to exit single cursor mode and brin g back the client mouse cursor. 6. Click OK. Keyboard Limitations Slovenian Keyboards The < key does not work on Slovenian[...]

  • Seite 83

    Chapter 3: Working with Target Servers 74 View Options View Toolbar You can use the Virtual KVM client wi th or without the toolbar di spl ay. To toggle the display of the toolbar (on and off): • Choose View > View Toolbar. Scaling Scaling your target window allows y ou to view the entire contents of the target server window. This feature in c[...]

  • Seite 84

    Chapter 3: Working with Target Servers 75 Help Options About Raritan Virtual KVM Client This menu command provides versi on information about the Virtual KVM Client, in case you require assistance from Raritan T echnical Support. To obtain version information: • Choose Help > About Raritan Virtual KVM Client. Use the Copy to Clipboard button t[...]

  • Seite 85

    76 In This Chapter Overview .................................................................................................. 77 Prerequisites for Usi ng Virtual Medi a ...................................................... 79 File Server Setup (File Server ISO Im ages On ly) ................................... 80 Using Virtual Media .............[...]

  • Seite 86

    Chapter 4: Virtual Media 77 Overview Virtual media extends KVM capabilities by enabling K VM target servers to remotely access media from a client PC and networ k file se rvers. With this feature, media mounted on a client PC and network file servers is essentially "mounted virtually" by the ta rget server. The target server can then read[...]

  • Seite 87

    Chapter 4: Virtual Media 78[...]

  • Seite 88

    Chapter 4: Virtual Media 79 Diagram key Desktop P C CD/DVD drive Dominion KX II USB mass storage device CIM PC hard drive Target server Remote file server (ISO images) Prerequisites for Using Virtual Media With the Dominion KX II virtual media feature, you can mount up to two drives (of different types) that are su pported by the USB profile curren[...]

  • Seite 89

    Chapter 4: Virtual Media 80 If you would prefer not to change Vista accou nt permissions, run Internet Explorer as an adm inist rator. To do this, click the Start Menu, locate IE, right-click it and sele ct Run as Administrator. Target Server • KVM target servers must support USB connected driv es. • KVM target servers running Wind ows 2000 mus[...]

  • Seite 90

    Chapter 4: Virtual Media 81 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog. Note: You cannot access a remote ISO image via virtual m edia using an IPv6 address due to techni cal limitations of third-party software used by the KX2. Using Virtual Media With the Dominion KX II v[...]

  • Seite 91

    Chapter 4: Virtual Media 82 If you would prefer not to change Vista accou nt permissions, run Internet Explorer as an adm inist rator. To do this, click the Start Menu, locate IE, right-click it and sele ct Run as Administrator. Target Server • KVM target servers must support USB connected driv es. • KVM target servers running Wind ows 2000 mus[...]

  • Seite 92

    Chapter 4: Virtual Media 83 Connecting to Virtual Media Local Drives This option mounts an entire drive, wh ich mean s the entire disk drive is mounted virtually onto the target serv er. Use this option for hard dri v es and external drives only. It does no t include network drives, CD-ROM, or DVD-ROM drives. This is the onl y option for which Read[...]

  • Seite 93

    Chapter 4: Virtual Media 84 4. Click Connect. The media will be mounted on the ta rget server virtually. You can access the medi a ju st like any othe r drive. Conditions when Read/Write is Not Av ailable Virtual media Read/Write is not av ailable in the following situations: • For all hard drives. • When the drive is write-p r otected. • Whe[...]

  • Seite 94

    Chapter 4: Virtual Media 85 b. Choose the drive from the Loc al CD/DVD Drive drop-down list. All available internal and external CD and DVD d rive names will be populated in the drop-down li st. c. Click Connect. 3. For ISO images: a. Choose the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive. ISO [...]

  • Seite 95

    Chapter 4: Virtual Media 86 Disconnecting Virtual Media To disconnect the virtual media driv es: • For local drives, choose Vi rtual Medi a > Disconnect Drive. • For CD-ROM, DVD-ROM, and ISO images, ch oo se Virtual Media > Disconnect CD-ROM/ISO Image. Note: In addition to disconnecting the vi rtual m edia using the Disconnect command, si[...]

  • Seite 96

    87 In This Chapter Overview .................................................................................................. 87 CIM Compat ib ility .................................................................................... 88 Available US B Profiles............................................................................. 88 Selec ti[...]

  • Seite 97

    Chapter 5: USB Profiles 88 CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-V USB or D2CIM-DVUSB with updated firmware. A VM-CIM that has not ha d its firmware upgraded will sup port a broad range of configurations (Keyboard, Mouse, CD-ROM, and Remo v able Drive) but will not be able to make use of profiles optimize d fo[...]

  • Seite 98

    Chapter 5: USB Profiles 89 USB profile Description BIOS DellOptiplex Keyboard Only Dell Optiplex BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell Optiplex BIOS when using D2CIM-VUSB. When usi ng the new D2CIM-DVUSB, use 'G ene ric' profile. Notice: • Optiplex 210L/280/745/GX620 requires D2CIM-DV U[...]

  • Seite 99

    Chapter 5: USB Profiles 90 USB profile Description BIOS DellPowerEdge Keyboard Only Dell PowerEdge BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB. When using the new D2CIM-DV USB, use 'Generic' profile. Notice: • PowerEdge 650/1650/1750/2600/2650 BIOS do not [...]

  • Seite 100

    Chapter 5: USB Profiles 91 USB profile Description BIOS Generic BIOS Generic Use this profile when Gene ric OS profile does not work on the BIOS. WARNING: USB enumeration will trigger whenever Virtual M edia is connected or disconne cted Restrict ions: • USB bus speed limited to full-speed (12 MBit/s) • Absolute mo use synchr onization™ not s[...]

  • Seite 101

    Chapter 5: USB Profiles 92 USB profile Description BIOS Lenovo ThinkPad T61 & X61 BIOS Lenovo ThinkPad T61 and X61 (boot from Virtual Media) Use this profile to boot the T61 and X61 series laptops from Virtual Media. Restrict ions: • USB bus speed limited to full-speed (12 MBit/s) BIOS Mac BIOS Mac Use this profile for Mac BIOS. Restrict ions[...]

  • Seite 102

    Chapter 5: USB Profiles 93 USB profile Description HP Proliant DL360/DL380 G4 (Windows 2003 Serve r Installation) HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server whe n installing Windows 2003 S erver without the help of HP SmartStart CD. Restrict ions: • USB bus speed[...]

  • Seite 103

    Chapter 5: USB Profiles 94 USB profile Description Supermicro Mainboard Phoenix (AwardBIOS) Supermicro Mainboard Phoenix AwardBIOS Use this profile for the Supermicro series mainboards with Phoenix AwardBIOS. Restrict ions: • Virtual CD-ROM and disk drives cannot be used simultane ously Suse 9.2 SuSE Linux 9.2 Use this for SuSE Linux 9.2 distribu[...]

  • Seite 104

    Chapter 5: USB Profiles 95 USB profile Description Troubleshooting 3 Troubleshooting Profile 3 • Mass Storage first • Keyboard and Mouse (Type 2) • USB bus speed limited to full-speed (12 MBit/s) • Virtual CD-ROM and disk drives cannot be used simultane ously WARNING: USB enumeration will trigger whenever Virtual M edia is connected or disc[...]

  • Seite 105

    96 In This Chapter User Groups ............................................................................................ 96 Users ..................................................................................................... 105 Authenticatio n Settings .......................................................................... 108 Changin[...]

  • Seite 106

    Chapter 6: User Management 97 User Group List User groups are use d with local an d remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user grou ps befo re creating individual users since, when you add a u se r, you must assign that user to an existing user group. The User Group List page displ ays a list of all user grou[...]

  • Seite 107

    Chapter 6: User Management 98 The Group page is organized into the f ollowing categories: Group, Permissions, Port Permi ssi ons, and IP ACL. 2. Type a descriptive name for t he ne w use r group into the Group Name field (up to 30 characters). Set the permissions for the grou p. Select the checkboxes before the permissions you want to assign to all[...]

  • Seite 108

    Chapter 6: User Management 99 Note: Several administrative functions a r e available within MPC and from the Dominion KX II Local Console. These function s a re available only to members of the default Adm in group. Note: Both IPv4 and IPv6 addresses are supported.[...]

  • Seite 109

    Chapter 6: User Management 100[...]

  • Seite 110

    Chapter 6: User Management 101 Setting Port Permissions For each server port, you can sp ecif y the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setti ng for all permission s is Deny. Port Acce ss Option Description Deny Denied access completely View View the [...]

  • Seite 111

    Chapter 6: User Management 102 This feature limits access to the Dominion KX II device by users in the selected group to specific IP addres se s. This feature applies only to users belonging to a spe cif ic group, unlike the IP Access Control List feature that applies to all access a ttempts to the device, is processed first, and takes priority. Im[...]

  • Seite 112

    Chapter 6: User Management 103 2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule repl aces the original rule with the sam e rule numb er. To delete a rule: 1. Specify the rule number you want to delete. 2. Click Delete. 3. When prompted to confir m the deletion, click OK. Imp[...]

  • Seite 113

    Chapter 6: User Management 104 Permission Description Security SSL certificate, security settings (VM Share, PC-Share), IP ACL User Management User and group management, remote authentication (LDAP/LDAPS/RADIUS), login settings Setting Permissions for an I ndividual Group To set permissions for an indiv i dual user group: 1. Locate the group from a[...]

  • Seite 114

    Chapter 6: User Management 105 Tip: To determine the users belonging to a particular gro up, sort the User List by User Group. 1. Choose a group from among those liste d by che cking the checkbox to the left of the Group Name. 2. Click Delete. 3. When prompted to confir m the deletion, click OK. Users Users must be granted user names and passwo rd [...]

  • Seite 115

    Chapter 6: User Management 106 Adding a New User It is a good idea to define user groups before creatin g Domi nion KX II users becaus e, when you add a user, you must assign that user to an existing user group. See Adding a New User Group (on page 97). From the Use r page, you can add new users, modify user informati on, and reactivate users that [...]

  • Seite 116

    Chapter 6: User Management 107 5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK. Logging a User Off (Force Logoff) If you are an administrator, you are able to log out ano ther lo cally authenticated user who is logge d on to the Dominion KX II. To log out a user: 1. Open the User List page by choo sing User [...]

  • Seite 117

    Chapter 6: User Management 108 Authentication Settings Authentication is the proc ess of verifying that a user i s who he says he is. Once a user is authenticated, t he user's group is used to determine his system and port permi ssions. The user's assig ned privileges determine what type of access is allo wed. This is called autho rizatio[...]

  • Seite 118

    Chapter 6: User Management 109 Implementing LDAP/LDAPS Remote Aut hen tication Lightweight Directory Access Protoc ol (LDAP/LDAPS) is a networking protocol for querying and modifying directory servi c es running over TCP/IP. A client starts an LD AP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). T he clie nt then sends[...]

  • Seite 119

    Chapter 6: User Management 110 10. The default Secure LDAP Port is 636. Either u se the default po rt or specify another port. This field is enabled whe n the Enable Se cu re LDAP checkb ox is selected. 11. Certificate File - Consult your au thenti cation server administrator to get the CA certificate file in Base64 encoded X-509 format for the LDA[...]

  • Seite 120

    Chapter 6: User Management 111 15. Active Directory Domain. Type the nam e of the Active Directo ry Domain. For example, testradi us. com. Consult with your Active Directive Administrator for a specific domain name. Note: Both IPv4 and IPv6 addresses are supported.[...]

  • Seite 121

    Chapter 6: User Management 112 Returning User Group Information from Activ e Directory Server The Dominion KX II supports user authentication to A ctive Directo r y (AD) without requiring that users be defined locally on the Dominion KX II. This allows Active Directory us er accounts and password s to be maintained exclusively on the AD server. Aut[...]

  • Seite 122

    Chapter 6: User Management 113 Implementing RADIUS Remote Auth entication Remote Authentication Dial-in Us er Service (RADIUS) is an AAA (authentication, authorization, and accounting) proto c ol for network access applications. To use the RADIUS authe ntication protocol: 1. Click User Management > Authentication Settings to open the Authenticat[...]

  • Seite 123

    Chapter 6: User Management 114  CHAP - With CHAP, authentication can be re quested by the server at any time. CHAP prov ides more security than PAP. Note: Both IPv4 and IPv6 addresses are supported.[...]

  • Seite 124

    Chapter 6: User Management 115 Returning User Group Information via RADIUS When a RADIUS authentication atte mpt succeeds, the Domi nion KX II determines the permission s for a given use r based on the permissions of the user's group. Your remote RADIUS server can pr ovid e these u ser group names by returning an attribute, implemented as a RA[...]

  • Seite 125

    Chapter 6: User Management 116 Attribute Data Log in Log out Accounting-Request(4) Acct-Status (40) Stop(2) - Stops the a ccounting NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-Port (5) Always 0. NAS-IP-Address (4) The IP address for the Dominion KX II. User-Name (1) The user name entered at the login screen. Acct-Session-ID (4 4) Se[...]

  • Seite 126

    Chapter 6: User Management 117 User Authentication Pro c ess When the device is configured to authe nticate and authorize local use rs from CC, the order in which the user credentials are validated follows the following process:[...]

  • Seite 127

    Chapter 6: User Management 118 Remote authentication follows the pr ocess specified in the flowcha rt below:[...]

  • Seite 128

    Chapter 6: User Management 119 Changing a Password To change your pass word: 1. Choose User Management > Ch ange Password. The Cha nge Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field. Password s can be up to 6[...]

  • Seite 129

    120 In This Chapter Network Settings ................................................................................... 120 Device Se rvices ..................................................................................... 125 Modem Se ttings ..................................................................................... 125 Configuring [...]

  • Seite 130

    Chapter 7: Device Management 121 Network Basi c Settings These procedures describe how to assign an IP address on the Netwo rk Settings page. For complete informatio n about all of the fields and the operation of this page, see Network Settings (on pag e 120). 1. Cho ose Device Settings > Network. The Netwo rk Settings page opens. 2. Specify a m[...]

  • Seite 131

    Chapter 7: Device Management 122 e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when n o route rs are present. Read-Only f. Zone ID. This identifies the device with whi ch the address is associated. Read-Only g. Select the IP Auto Configuration. The following options are availabl[...]

  • Seite 132

    Chapter 7: Device Management 123 See LAN Interface Settings (on page 123) for information in configuring this section of the Networ k Settings pa ge. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properl y set the network parameters, which results in network issues. In these in[...]

  • Seite 133

    Chapter 7: Device Management 124  10 Mbps/Half - Both LEDs blink  10 Mbps/Full - Both LEDs blink  100 Mbps/Half - Yellow LE D blinks  100 Mbps/Full - Yellow LED blin ks  1000 Mbps/Full (gigabit) - Gre en LED blinks  Half-duplex provides for communication in both directi ons, but only one direction at a time (not simultaneou sly). [...]

  • Seite 134

    Chapter 7: Device Management 125  128 Kilobit 5. Click OK to apply the LAN settings. Device Services 1. Choose Device Settings > Device Services. The Device Service Settings page appears. 2. Enter the Discovery Port. The Dominion KX II discovery occurs ov er a si ngle, configurable TCP Port. The default is Port 5000, but you can configure i t[...]

  • Seite 135

    Chapter 7: Device Management 126 4. Enter the initial modem string in the Modem Init String field. If the modem string is left blank, the following string is sent to the modem by default: ATZ OK AT OK. This information is used to config ure mo dem settings. Because different modems have different wa ys of settings these values, this document does n[...]

  • Seite 136

    Chapter 7: Device Management 127 6. Click OK to commit your changes or click Reset to Defaults to retu rn the settings to their defaults. See Certified Modems (on page 245) for information on ce rtified modems that work with the Dominion KX II. For information on settings that will give you the best performance when connecting to the Dominion KX II[...]

  • Seite 137

    Chapter 7: Device Management 128 2. Choose your time zone from the Time Zone drop -down list. 3. To adjust for daylight savings ti me, check the "Adjust for daylight savings time" checkbox. 4. Choose the method you would like to use to set the date and tim e:  User Specified Time - Choose this option to input the date and time manually[...]

  • Seite 138

    Chapter 7: Device Management 129 Event Management The Dominion KX II Event Management feature provides a set of screens for enabling and d isabli ng the distribution of system events to SNMP Managers, Syslog, and the audit log. These events are categorized, and for each event you ca n determi ne whether you want the event sent to one or several des[...]

  • Seite 139

    Chapter 7: Device Management 130 2. Type the IP Address/Host Name of your Syslog server in the IP Address field. 3. Click OK. To reset to factory defaults: • Click Reset To Defaults. Note: Both IPv4 and IPv6 addresses are supported. Note: IPv6 addresses ca nn ot exceed 80 characters in length for the host name.[...]

  • Seite 140

    Chapter 7: Device Management 131 Event Management - De stinations System events, if enabled, can g enerate SNMP notification events (traps), or can be logged to Syslog or A udit Log. Use the Event Management - Destinations page to sel ect the system events to track and where to send this information. Note: SNMP traps will be generated only if the S[...]

  • Seite 141

    Chapter 7: Device Management 132 3. Click OK.[...]

  • Seite 142

    Chapter 7: Device Management 133 To reset to factory defaults: • Click Reset To Defaults. Warning: When usi ng SNMP traps ov er UDP, it is possible fo r the Dominion KX II and the router that it is attached to to fall out of synchronization when the Domi nion KX II is rebooted, preventing the reboot completed SNMP trap from being logged. SNMP Age[...]

  • Seite 143

    Chapter 7: Device Management 134 Trap Name Description ipConflictResolved An IP A ddress conflict was resolved. networkFailure An Ethernet interface of the product can no longer communicate over the net work. networkParameterChanged A change has been made to the network parameters. passwordSettingsChanged Strong pa ssword settings have changed. por[...]

  • Seite 144

    Chapter 7: Device Management 135 Trap Name Description userModified A user account has be en modified. userPasswordChanged This event is tri ggered if the password of any user of the device is modified. userSessionTimeout A user with an active sessi on ha s experienced a session termination du e to timeout. userUploadedCertificate A user uploaded a[...]

  • Seite 145

    Chapter 7: Device Management 136 2. If you are plugging power input into power supply nu mber o ne (left-most power supply at the bac k of the unit), then select the Powerln1 Auto Detect option. 3. If you are plugging power input into power supply number two (right-most power supply at the bac k of the unit), then sele ct the Powerln2 Auto Detect o[...]

  • Seite 146

    Chapter 7: Device Management 137 Configuring Ports The Port Configuration page displays a li st of the Dominion KX II ports. Ports connected to KVM target serv ers (b lades and standard serve rs) and power strips are displa yed in blue and can be edited. For ports with no CIM connected or with a blank CIM name, a defa ult port name of Dominion-KX2_[...]

  • Seite 147

    Chapter 7: Device Management 138  Port Type Port type Description DCIM Dominion CIM Not Available No CIM connected PCIM Paragon CIM PowerStrip Power CIM VM Virtual Medi a CIM (D2CIM-VUSB and D2CIM-DVUSB) Blade Chassis Blade chassis and the bla des a ssociated with that chassis (displayed in a hierarchical order) 2. Click the Port Name for the po[...]

  • Seite 148

    Chapter 7: Device Management 139 Connecting a Power Strip To connect the power strip: 1. Connect the male RJ-45 of t he D2CIM-PWR to the female RJ-45 connector on the power stri p. 2. Connect the female RJ-45 conne c tor of the D2 CIM-P WR to any of the available female system port co nne ctors on the Dominion KX II using a straight through Cat5 ca[...]

  • Seite 149

    Chapter 7: Device Management 140 2. Connect the female RJ-45 conne c tor of the D2 CIM-P WR to any of the available female system port co nne ctors on the Dominion KX II using a straight through Cat5 cable. 3. Attach an AC power cord to the target server and an available power strip outlet. 4. Connect the power strip to an AC power sou rce. 5. Powe[...]

  • Seite 150

    Chapter 7: Device Management 141 Naming the Power Strip (Port Page for Power Strips) This Port page opens when you select a port from th e Port Configuration page that is connected to a Raritan rem ote power strip. The Type and the Name fields are prepopulated. Note: The (CIM) Type cannot be change d. The following information is displayed for each[...]

  • Seite 151

    Chapter 7: Device Management 142 3. Click OK.[...]

  • Seite 152

    Chapter 7: Device Management 143 Manage KVM Target Servers A ssociated w ith Outlets (Port Page) This Port page opens when you select a port from th e Port Configuration page that is connected to a target serv er. From this pa ge, you can make power associations, chan g e the port name to something more descriptive, and update target server setting[...]

  • Seite 153

    Chapter 7: Device Management 144 Removing Power Associations Do not physically remove a power strip from the Domi nion KX II without first removing the power strip association in Device Se ttings. When a target has been associated with a po we r strip and the target is removed from the Dominion KX II, the power association remains. When this occurs[...]

  • Seite 154

    Chapter 7: Device Management 145 Configuring Blade Chassi s In addition to standard servers and power strips, the Dominio n KX II offers you the ability to control bl ade chassis that are plugged into a Dominion KX II port. Up to eight blade chassis can be managed through the Dominion KX II at a given time. As with standard servers, blade chassi s [...]

  • Seite 155

    Chapter 7: Device Management 146 The Dominion KX II also supports use of hot key seq uences to switch KVM access to a blade chassis. For bl ad e chassis that allow use rs t o select a hot key sequence, those optio ns will be provided on the Port Configuration page. For blade cha ssi s t hat come with predefined hot key sequences, those seque nces w[...]

  • Seite 156

    Chapter 7: Device Management 147 If you move a blade chassis from one KX II port to another KX II port, interfaces that w ere added to the blade chas s is node in CC-SG will be lost in CC-SG. All other information w ill be retained.[...]

  • Seite 157

    Chapter 7: Device Management 148 Generic Blade Chassis Config u ratio n The Generic Blade Chassi s' sele ction provides only a manual configuration mode of operation. See Supported Blade Chassis Models (on page 160), Su pported CIMs for Blad e Chassis (o n page 161), and Required and Recommend ed Blade Chassis Configurations (on page 163) for [...]

  • Seite 158

    Chapter 7: Device Management 149 The first URL link is intended for use to con ne ct to the blade chassis Administration Module GUI. Note: Access to the URL links enter ed in this section of the page is governed by the blade cha ssis po rt permissions. a. Active - To activate the link once it is configured, select the Active checkbox. Leave the che[...]

  • Seite 159

    Chapter 7: Device Management 150 3. On the Port Configuration p age, click on the name of the blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio bu tton. The pag e will then di splay the necessary fields to configure a blade chassis. 5. Select the Dell blade chassis model from the Blade Server Chassi s M[...]

  • Seite 160

    Chapter 7: Device Management 151 If operating in Auto-discovery mode, the Installed box will display the slots containing blad es d uring discovery. 5. In the Blade Chassis Managed Li nks section of the page, you are able to configure the conne ction to a blade chassis web browser interface if one is available. C lick the Blade Chassi s M anaged Li[...]

  • Seite 161

    Chapter 7: Device Management 152 b. Maximum Number of Slots - The default maximum number of slots available on the blade chas sis i s automatically entered. c. Administrative Module Primary IP Address/Ho st Name - Not applicable. d. Port Number - The default por t numbe r for the bla de chassis is 22. Not applicable. e. Username - Not applicable. f[...]

  • Seite 162

    Chapter 7: Device Management 153 e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be as sociated with the username and password entr ies. It is in these fields you should enter the field names for the u sername a nd pa ssword fields used on the login screen for the web application. You can v[...]

  • Seite 163

    Chapter 7: Device Management 154 d. Port Number - The default por t numbe r for the bla de chassis is 22. Change the port numb er if appli cable. Required for auto-discovery mode e. Username - Enter the user name used to acce ss the blade chassis. Req uired for auto-discovery mode f. Password - Enter the password used to acce ss the blade chassis. [...]

  • Seite 164

    Chapter 7: Device Management 155 Note: Leave the username and pa ssword fields bla nk for DRAC, ILO, and RSA web applications or the connection will fail. e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be as sociated with the username and password entr ies. It is in these fields you should[...]

  • Seite 165

    Chapter 7: Device Management 156 4. In the Blade Chassis Managed Li nks section of the page, you are able to configure the conne ction to a blade chassis web browser interface if one is available. C lick the Blade Chassi s M anaged Links icon to expand the section on the page. The first URL link is intended for use to con ne ct to the blade chassis[...]

  • Seite 166

    Chapter 7: Device Management 157 Tips for Adding a We b Browser Interface You can add a Web Browser Interface to create a co nne ction to a device with an embedded web se rver. A Web Browser interface can also be used to connect to any web appli cation, such as the web application associated with an RSA, DRAC or ILO Pro ce ssor card . You must have[...]

  • Seite 167

    Chapter 7: Device Management 158 HP® Blade Chassis Configuration (Port Group Management) The Dominion KX II supports the aggregation of po rts connected to certain types of blades into a grou p representing the blade cha ssis. Specifically, HP BladeServer blades an d Dell Po werEdge 1855/1955 blades when the DellPowerEdge 1 855/1 955 is connected [...]

  • Seite 168

    Chapter 7: Device Management 159 3. Enter a Port Group Name. The port group nam e is not case sensitive and can contain up to 32 characters. 4. Select the Blade Server Group checkbo x . If you want to designate that these ports are attached to blade s housed in a blade chassi s (for example, HP c3000 or Dell PowerEdge 1855), sele ct the Blade Se rv[...]

  • Seite 169

    Chapter 7: Device Management 160 To delete a port group: 1. Click on the Port Group Manageme nt page, select the checkbox of the port group you want to delete. 2. Click the Delete button. 3. Click OK on the warning m essage. Supported Blade Chassis Models This table contains the bla de ch assi s models that are supp orted by the Dominion KX II and [...]

  • Seite 170

    Chapter 7: Device Management 161 Supported CIMs for Blade Chassis The following CIMs are supported for bl ade chassis being manag ed through the Dominion KX II: • DCIM-PS2 • DCIM-USBG2 • D2CIM-VUSB • D2CIM-DVUSB Following is a table contain ing supported CIMs for each blade chassis model that the Dominion KX II supports. Blade chassis Conne[...]

  • Seite 171

    Chapter 7: Device Management 162 Blade chassis Connection method Recommended CIM(s) Dell PowerEdge M1000e The KVM Switc h Module (iKVM) is Integrated with this chassis. The iKVM is compatible with the following peripherals: • USB keyboards, USB pointing devices • VGA monitors with DDC support. Source: Dell Chassis Man agement Controller, Firmwa[...]

  • Seite 172

    Chapter 7: Device Management 163 Blade chassis Connection method Recommended CIM(s) IBM BladeCenter E The current model BladeCenter E chassis (8677-3Rx) ships standard with one Advanced Management Module. Source: IBM BladeCenter Products and Technology • DCIM-USBG2 • D2CIM-DVUSB IBM BladeCenter T The BladeCenter T chassis ships standard with on[...]

  • Seite 173

    Chapter 7: Device Management 164 Blade chassis Required/recommended action Dell PowerEdge M1000e • Disable the iKVM GUI screensa ver. An authorize dialog will appear, preventing iKVM from working correctly, if this is not done. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM. iKVM may not work correctly if this is[...]

  • Seite 174

    Chapter 7: Device Management 165 Blade chassis Required/recommended action Dell PowerEdge 1855/1955 • Disable the iKVM GUI screensa ver. An Authorize dialog will appear if this is not done and will p reven t the iKVM from operating correctly. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM. iKVM may not work corre[...]

  • Seite 175

    Chapter 7: Device Management 166 Blade Chassis Sample URL Formats This table contains sam pl e URL formats for blade chassis b eing configured in the Dominion KX II. Blade chassis Sample URL format Dell M1000e • URL: https://192.168.60.44/cgi-bin/web cgi/login • Username: root • Username Field: user • Password: calvin • Password Field: pa[...]

  • Seite 176

    Chapter 7: Device Management 167 Configuring USB Profiles (Port Page) You choose the available USB profiles for a po rt in the Select USB Profiles for Port section of the Port page . The USB profiles chosen in the Port page become the profiles availa ble to the user in VKC when connecting to a KVM target server from the port. The default is the Win[...]

  • Seite 177

    Chapter 7: Device Management 168  Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appe ar in the Sele cted list. These are the profiles that can be use for the KVM target server con nected to the port. To specify a preferred USB profile : 1. After selecting the available profiles for a port, choose one fr[...]

  • Seite 178

    Chapter 7: Device Management 169 2. Click Remove. The selected profiles appe ar in the Available list. The se profiles are no longer available for a KVM target se rver co nnected to this port. To apply a profile selection to multiple ports: 1. In the Apply Selected Profiles to Other Port s section, select the Apply checkbox for each KVM port you wa[...]

  • Seite 179

    Chapter 7: Device Management 170 2. Select the checkbox next to the Standard Local Port to enable it. Deselect the checkbox to disa bl e it. By default, the Standard Local port is enabled but can be disa bled a s needed. 3. If you are using a KX2-832 or KX2-864 device, sele ct the che ckbox next to the Extended Local Port to enable it. Deselect the[...]

  • Seite 180

    Chapter 7: Device Management 171 5. Choose the local port hotkey. The local port hot key is used to return to the Dominion KX II Local Console interface when a target serve r interface is being viewed. The default is to Double Click S croll Lock, but you can select any key combination from the drop-down list: Hot key: Take this action: Double Click[...]

  • Seite 181

    Chapter 7: Device Management 172  None. There is no authentication for Local Con sole access. This option is recommended for secure environme nts only .  Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is unde r CC-SG m anagement. Note: If you [...]

  • Seite 182

    Chapter 7: Device Management 173 KX2-832 and KX2-864 Stan d ard and Extended Local Port Setting s The KX2-832 and KX2-864 provide s you with two loca l port options: the Standard Local port and the Extended Local port. Each of these port options is enabled and disabled from the Rem ote Co nsole on the Port Configuration page or from the Local Co ns[...]

  • Seite 183

    174 In This Chapter Overview ................................................................................................ 174 Turning Outlets On/Off and Cycling Power ........................................... 175 Overview The Dominion KX II allows you to control PX and Baytech powerstrip outlets connected to the Dominion KX II through a D2CIM[...]

  • Seite 184

    Chapter 8: Powerstrip Outlet Control 175 Initially, when you open the Powerstrip page, the powerstrip s that are currently connected to the Domi nion KX II are displ ayed in the Powerstrip drop-down. Additionally, in formation relating to the cu rrently selected powerstrip is displayed. The name, state, and powerstrip port associations are not disp[...]

  • Seite 185

    Chapter 8: Powerstrip Outlet Control 176 4. Click On. 5. Click OK to close the Power On confirmati on dialog. The outlet will be turned on and its state will be di spla yed as 'on'. To turn an outlet off: 1. Click Off. 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The outlet will be turned off and [...]

  • Seite 186

    Chapter 8: Powerstrip Outlet Control 177 2. Click OK. The outlet will then cycl e (note that this may take a few seconds). 3. Once the cycling is complete t he dialog will open. Click OK to close the dialog.[...]

  • Seite 187

    178 In This Chapter Security Settings .................................................................................... 178 Checking Your Browse r for AES Encr yption ......................................... 185 Configuring IP Acc ess Control .............................................................. 185 SSL Certif icates ..................[...]

  • Seite 188

    Chapter 9: Security Management 179 To reset back to defaults: • Click Reset to Defaults. Login Limitations Using login limitations, you can spe cify restrictions for single login, password aging, and the logging out idle use rs. Limitation Description Enable single login limitation When selected, only one login per user n ame is allowed at any ti[...]

  • Seite 189

    Chapter 9: Security Management 180 Limitation Description Enable password aging When selected, all use rs a r e required to change their passwords periodicall y based o n the number of days specified in Password Aging Interval field. This field is enabled and required when t he Enable Password Aging c heckbox is se lected. Enter the number of days [...]

  • Seite 190

    Chapter 9: Security Management 181 Field Description Maximum length of strong password The default is 16, but can be up to 64 characte rs long. Enforce at least one lower case chara cter When checked, at least one lowe r case character is required in the password. Enforce at least one upper case chara cter When checked, at least one uppe r case cha[...]

  • Seite 191

    Chapter 9: Security Management 182 Option Description Timer Lock out Users are de nied a ccess to the system for the specified amount of time after exceeding the specified number of unsuccessful logi n attempts. When selected, the following fields are e nable d:  Attempts - The number of unsuccessful login attempts after which the user will be l[...]

  • Seite 192

    Chapter 9: Security Management 183 Encryption mode Description Auto This is the recommended option. The Dominion KX II autonegotiates to the highest level of encryption possible. RC4 Secures user names, passwords and KVM data, including video transmissions usin g the RSA RC4 encryption method. This is a 128-bit Secure Sockets Layer (SSL) p rotocol [...]

  • Seite 193

    Chapter 9: Security Management 184  Private - No PC share. This is the defau lt mode. Each target server can be accessed exclusively by only one user at a time.  PC-Share - KVM target servers can b e a ccessed by up to eight users (administrator or n on -administrator) at one time. Each remote user has equal ke yboar d and mouse control, howe[...]

  • Seite 194

    Chapter 9: Security Management 185 Checking Your Browser for AES Encryption The Dominion KX II supports AES-25 6. If you do not know if your browser uses AES, check with the br owser manufacturer or navigate to the https://www.fortify.net/sslcheck.ht ml website using the browser with the encryption method you want to check. This web site detects yo[...]

  • Seite 195

    Chapter 9: Security Management 186 3. Choose the Default Policy. This is the action taken for IP addresses that are not within the ranges you specify.  Accept - IP addresses are allo wed access to the Dominion KX II device.  Drop - IP addresses are denied access to the Domi ni on KX II device. Note: Both IPv4 and IPv6 addresses are supported.[...]

  • Seite 196

    Chapter 9: Security Management 187 2. Click Delete. 3. You are prompted to conf irm the deletion. Click OK.[...]

  • Seite 197

    Chapter 9: Security Management 188 SSL Certificates The Dominion KX II uses the Secure Socket Layer (S SL) protocol for any encrypted network traffic between it self and a conn ected client. When establishing a connection, the Do minion KX II has to identify itself to a client using a cryptographic certificate. It is possible to generate a Ce rtifi[...]

  • Seite 198

    Chapter 9: Security Management 189 2. Complete the following fields: a. Common name - The network n ame of the Dominion KX II once it is installed in the user's network (usually the fully qualified domain name). It is identical to the name that is used to acce ss the Dominion KX II with a web browser but without th e prefix “http://”. In c[...]

  • Seite 199

    Chapter 9: Security Management 190 To upload a CSR: 1. Upload the certificate to the Dominion K X II by clicki ng the Upload button. Note: The CSR and the private key file are a m atched set and should be treated accordingly. If the signed ce rtificate is not matched with the private key used to generate the or igi nal CS R, the certificate will no[...]

  • Seite 200

    191 In This Chapter Audit Log................................................................................................ 191 Device Info rmation ................................................................................. 192 Back up and Restore .............................................................................. 193 USB Profile[...]

  • Seite 201

    Chapter 10: Maintenance 192 Device Information The Device Information page provides detailed info rmation about your Dominion KX II device and the CIMs in use. This information is hel pful should you need to contact Raritan Technical Support. To view information about your Dominion KX II and CIMs: • Choose Maintenance > De vice Informati on. T[...]

  • Seite 202

    Chapter 10: Maintenance 193 Backup and Restore From the Backup/Restore page, you ca n backu p and restore the settings and configuration for your Dominion KX II. In addition to using backup and restore for busin ess continuity purposes, you can use this feature as a time -saving mechani sm. For instance, you can quickly provide access to your team [...]

  • Seite 203

    Chapter 10: Maintenance 194 To restore your Dominion KX II: WARNING: Exercise caution when re storing your Dominion KX II to an earlier version. Usernames a nd pa ssword in place at the time of the backup will be restored. If you do not remembe r the old administrative username s and pa sswords, you will be locked out of the Dominion KX II. In addi[...]

  • Seite 204

    Chapter 10: Maintenance 195 USB Profile Management From the USB Profile Management page, you can up load custom profiles provided by Raritan tech support. These profiles are designed to address the needs of your target se rver’ s co nfigura tion, in the event that the set of standard profiles doe s not alrea dy address them. Raritan tech support [...]

  • Seite 205

    Chapter 10: Maintenance 196 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so will terminate any Virtual Media sessio ns that we re in place. Handling Conflicts in Profile Names A naming conflict between custom and standa rd USB profiles may occur when a firmware upgrade is perform[...]

  • Seite 206

    Chapter 10: Maintenance 197 3. Click the Upgrade button. You are prompted to confi r m the upgrade. 4. Click OK to continue the upgr ade. Progress bars are displ ayed during the upgrade. Up gra ding takes approximately 2 minutes or less per CIM. Upgrading Firmware Use the Firmware Upgrade page to up g rade the firmware for your Dominion KX II and a[...]

  • Seite 207

    Chapter 10: Maintenance 198 6. Click Upload from the Firmwa re Upgrade page. Information ab out the upgrade and version numbers i s displayed for your confirmation (if you opted to review CIM information, that information is displayed as well): Note: At this point, connected users are logge d out, and new login attempts are blocked. 7. Click Upgrad[...]

  • Seite 208

    Chapter 10: Maintenance 199 For information about upgradi ng the device firmware using the Multi-Platform Client, see Upgr ading Device Firmware in the KVM and Serial Client Guide . Note: Firmware upgra de s are not supported via modem . Upgrade History The Dominion KX II provides information about upgrade s performed on the Dominion KX II and atta[...]

  • Seite 209

    Chapter 10: Maintenance 200 users will be logged off. To reboot your Dominion KX II: 1. Choose Maintenance > Re boot. The Re boot page opens. 2. Click Reboot. You are prompted to confirm the action . Click Yes to proceed with the reboot.[...]

  • Seite 210

    Chapter 10: Maintenance 201 Stopping CC-SG Management While the Dominion KX II is under CC-S G management, if you try to access the device dire ctly, you are not ifi ed that it the device is under CC-SG management. If you are managing the Dominion KX II through CC-SG and connectivity between CC-SG and the Dominion KX II is lost after the specified [...]

  • Seite 211

    Chapter 10: Maintenance 202 3. Click Yes to remove the device CC-SG manageme nt. Once CC-SG management has ended, a conf irmation will be displayed.[...]

  • Seite 212

    203 In This Chapter Network Interface Page ......................................................................... 203 Network Statis tics Page ......................................................................... 204 Ping Host Page ...................................................................................... 206 Trace Route to Hos t[...]

  • Seite 213

    Chapter 11: Diagnostics 204 Network Statistics Page The Dominion KX II provides statisti cs about your network interface. To vie w stati stics about your net work interface: 1. Choose Diagnostics > Network Statistics. The Network Statistics page opens. 2. Choose the appropriate opti on from the Options drop-down list:  Statistics - Produces a[...]

  • Seite 214

    Chapter 11: Diagnostics 205  Interfaces - Produces a pa ge si mil ar to the one displayed here.  Route - Produces a page simila r to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.[...]

  • Seite 215

    Chapter 11: Diagnostics 206 Ping Host Page Ping is a network tool used to test whet her a p articular host or IP address is reach able across an IP network. Using th e Ping Host page, you can determine if a target server or another Domi nion KX II is accessible. To ping the host: 1. Choose Diagnosti cs > Ping Host. The Ping Host page appe ars. 2[...]

  • Seite 216

    Chapter 11: Diagnostics 207 2. Type either the IP address or ho st name into the IP Address/Ho st Name field. Note: The host name cannot exceed 2 32 characters in length. 3. Choose the maximum hops from the drop-down li st (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address an[...]

  • Seite 217

    Chapter 11: Diagnostics 208 Device Diagnostics Note: This page is for use by Raritan Field Engin eers or wh en you are directed by Raritan Techni cal Support. Device diagnostics downlo ads the di agnostics information from the Dominion KX II to the client machine. Two operation s can be performed on this page: • Execute a special diagnost ics scr[...]

  • Seite 218

    Chapter 11: Diagnostics 209 a. Click the Save to File button. The File Download dialog open s. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.[...]

  • Seite 219

    210 In This Chapter Overview ................................................................................................ 210 Accessing the Domini on KX II Us ing CLI .............................................. 211 SSH Connection to the Dominion KX II ................................................. 211 Telnet Connec tion to the Dominion KX[...]

  • Seite 220

    Chapter 12: Command Line Interface (CLI) 211 Accessing the Dominion KX II Using CLI Access the Dominion KX II by us ing one of the following methods: • Telnet via IP connection • SSH (Secure Shell) via IP connection • Local Port-via RS-232 seria l interface A number of SSH/Telnet clients are available an d can be obtained from the following l[...]

  • Seite 221

    Chapter 12: Command Line Interface (CLI) 212 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX/Linux workstation and log in as the user admin, enter the following command: ssh -l admin 192.168.30.222 The Password prompt appears. See Logging In (on page 213). Note: Both IPv4 and IPv6 a ddresses are supported. Telnet Connect[...]

  • Seite 222

    Chapter 12: Command Line Interface (CLI) 213 Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default pa ssword: raritan The welcome message displays. You are now logged on as an administrator. After reviewing the following Navig ation of the CLI (on page 214) se ction, pe rform [...]

  • Seite 223

    Chapter 12: Command Line Interface (CLI) 214 Navigation of the CLI Before using the CLI, it is important to understand CL I navigation and syntax. There are also some keystro ke combin ation s that simplify CLI use. Completion of Commands The CLI supports the completion of parti ally-ente red commands. After entering the first few characters of an [...]

  • Seite 224

    Chapter 12: Command Line Interface (CLI) 215 Common Commands for All Command Line Interface Lev els Following are the commands that are available at all CLI levels. These commands also hel p navig ate through the CLI. Commands Description top Return to the top level of the CLI hierarchy, or the “username” prompt. history Display the last 200 co[...]

  • Seite 225

    Chapter 12: Command Line Interface (CLI) 216 Setting Network Parameters Network parameters are configur ed u sing the interface command. admin > Config > Network > interface enable true i f lan1 ip 192.16.151.12 mask 255.255.255 gw 192.168.51.12 When the command is accepted, t he device automa t ically dro ps the connection. You must recon[...]

  • Seite 226

    Chapter 12: Command Line Interface (CLI) 217 Command Description history Display the current session's command line history. listports List accessible ports. logout Logout of the current CLI session. top Return to the root menu. userlist List active user sessions. • Enter admin > config > netwo rk. Command Description help Display over[...]

  • Seite 227

    Chapter 12: Command Line Interface (CLI) 218 Administering the Dominion KX II Console Server Configuration Commands Note: CLI commands are the same for SSH, Telnet, and Lo cal Port access sessi ons. The Network command ca n be accessed in the Configuration menu for the Dominion KX II. Configuring Network The network menu comm ands are used to confi[...]

  • Seite 228

    Chapter 12: Command Line Interface (CLI) 219 Interface Command The Interface command is used to confi gure the Dominion KX II network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters ipauto &[...]

  • Seite 229

    Chapter 12: Command Line Interface (CLI) 220 IPv6 Command Use the IPv6 command to set IPv6 network parameters and ret riev e existing IPv6 parameters.[...]

  • Seite 230

    221 In This Chapter Overview ................................................................................................ 221 Using the Dominion KX II Local Console .............................................. 221 Dominion KX II Local Co nsole Interface ................................................ 222 Security and Au thentication ........[...]

  • Seite 231

    Chapter 13: Dominion KX II Local Console 222 Dominion KX II Local Console Interface When you are located at the server rack, the Domi nion KX II provides standard KVM management and admini stration via the Domi nion KX II Local Console. The Domini on KX II Local Con sole provides a direct KVM (analog) connection to your conn ected servers; the perf[...]

  • Seite 232

    Chapter 13: Dominion KX II Local Console 223 Available Resolutions The Dominion KX II Local Console provides the following re solutions to support va rious monitors : • 800x600 • 1024x768 • 1280x1024 Each of these resolutions supports a refresh rate of 60 Hz and 75Hz.[...]

  • Seite 233

    Chapter 13: Dominion KX II Local Console 224 Port Access Page (Local Console Server Display) After you login to the Dominion KX II Local Console, the Port Access page opens. This page lists all of the Do minion KX II port s, the connected KVM target servers, an d thei r status and availability. Also displayed on the Port Access page are bl ade chas[...]

  • Seite 234

    Chapter 13: Dominion KX II Local Console 225 The KVM target servers are initially sorted by Port Nu mber. You can change the display to sort on any of the column s.  Port Number - Numbe red f rom 1 to the total number of ports available for the Dominion KX II device. Note that ports connected to power strips will not be among tho se list ed, res[...]

  • Seite 235

    Chapter 13: Dominion KX II Local Console 226 Hot Keys and Connect Keys Because the Dominion KX II Local Console interface i s co mpletely replaced by the interface for the targ et se rver you are accessing, a hot key is used to disconnect from a target and return to the local port GUI. A connect key is used to c onnect to a target or switch between[...]

  • Seite 236

    Chapter 13: Dominion KX II Local Console 227 Blade chassis Connect key action Key sequence example Disconnect from a target and return to the local port GUI Disconnect from target port 5, slot 11 and return to the local port GUI (the page from which you connected to target): • Double Click Scroll Lock Special Sun Key Combinations The following ke[...]

  • Seite 237

    Chapter 13: Dominion KX II Local Console 228 Accessing a Target Server To access a target se rv er: 1. Click the Port Name of the tar get you want to access. The Port Action Menu is displayed. 2. Choose Connect from the Port Action m enu. The vide o display switches to the target server interface. Returning to the Dominion KX II Local Console Inter[...]

  • Seite 238

    Chapter 13: Dominion KX II Local Console 229 Configuring Dominion KX II Local Console Local Port Settings From the Local Port Settings page, you can customi z e many settings for the Dominion KX II Local Console including keyb oa rd, hot keys, video switching delay, powe r sa ve mode, local use r interface resolution settings, and local user authen[...]

  • Seite 239

    Chapter 13: Dominion KX II Local Console 230 Hot key: Take this action: Double Click Scroll Lock Press Scroll Lock key twice quickly Double Cl ick Num Lock Press Num Lock key twice qu ickly Double Cl ick Caps Lock Press Caps Lock key twic e quickly Double Click Left Alt key Press the left Alt key twice quickly Double Click Left Shift key Press the [...]

  • Seite 240

    Chapter 13: Dominion KX II Local Console 231  Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is unde r CC-SG m anagement. Note: If you initially choose not to ignore CC Manage m ode on the local port but later want local por t access, you will ha[...]

  • Seite 241

    Chapter 13: Dominion KX II Local Console 232 Configuring Dominion KX II Local Po rt Settings from the Loc al Console The Standard Local port and the Extended Lo cal port can be configure d from the Remote Console on the Port Configu ration p age o r from the Local Console on the Local Port Settings pag e. See Con figuring Dominion KX II Local Port [...]

  • Seite 242

    Chapter 13: Dominion KX II Local Console 233  Ping interval (seconds)  Timeout (seconds) 1. Click Reset to continue. You w ill be prompted to confirm the factory reset because all network setti ngs will be permanently lost. 2. Click OK button proceed. Upon comple tion, the Dominion KX II device is automatically restarted. Resetting the Domini[...]

  • Seite 243

    234 In This Chapter Physical Specifications .......................................................................... 234 Environmental Requirements ................................................................ 237 Computer Int erfac e Modules (CIMs) ..................................................... 237 Supported CIMs and Operating Systems [...]

  • Seite 244

    Appendix A: Specifications 235 Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) 9.0 lbs 1.75" x 17.3" x 11.4" 14.9 lbs 22" x 16.6" x 6.5" DKX2-132 32-Port Dominion KX II with 1-user Network Access and Local Port, Virtual Media, Dual Power 785[...]

  • Seite 245

    Appendix A: Specifications 236 Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) 11.29 lbs 17.3” x 11.6” x 3.5” 19.8 lbs 22” x 16.5” x 6.5” DKX2-464 64-Port Dominion KX II with 4-user Network Access and Local Port, Virtual Media, Dual Power 785813625298 Dual Po[...]

  • Seite 246

    Appendix A: Specifications 237 Environmental Requirements Operating Temperature 0°C- 40°C (32°F - 104°F) Humidity 20% - 85% RH Altitude N/A Vibration 5-55-5 HZ, 0.38mm, 1 minutes pe r cycle; 30 minutes for each axis (X, Y, Z) Shock N/A Non-Operating Temperature 0°C- 50°C (32°F - 122°F) Humidity 10% - 90% RH Altitude N/A Vibration 5-55-5 HZ,[...]

  • Seite 247

    Appendix A: Specifications 238 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) UPC code DCIM-USB Dominion KX I & II Computer Interface Module [USB Port] 0.2 lbs 1.3" x 3.0" x 0.6" 0.2 lbs 7.2" x 9" x 0.6" 785813338518 DCIM-SUSB Dominion KX I &a[...]

  • Seite 248

    Appendix A: Specifications 239 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) UPC code D2CIM-DVUSB Dominion KX II Computer Interface Module [Dual USB Port with Virtual Media] 0.23 lbs, 105 g 3.53”x1.68”x.76” 89.7x42.7x19.3 (mm) .25 lbs, 112.5 g 3.9”x5.7”x 1.0” 100*[...]

  • Seite 249

    Appendix A: Specifications 240 Supported Paragon CIMs Opera ting system and serial devices (where applicable) Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • P2CIM-PS2 • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workst[...]

  • Seite 250

    Appendix A: Specifications 241 Supported Paragon CIMs Opera ting system and serial devices (where applicable) Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • UKVMPD • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstati[...]

  • Seite 251

    Appendix A: Specifications 242 Supported Dominion KX I DCIMs Target server Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • DCIM-PS2 • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and 4.0 • SUSE Linux Pro[...]

  • Seite 252

    Appendix A: Specifications 243 Supported Dominion KX I DCIMs Target server Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • DCIM-USB G2 • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and 4.0 • SUSE Linux [...]

  • Seite 253

    Appendix A: Specifications 244 Supported Dominion KX II D2CIMs Target server and remote power strips (where applicable) Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode • D2CIM-VUSB • Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • SUSE Linux Professional 9.2 and 10 ?[...]

  • Seite 254

    Appendix A: Specifications 245 Certified Modems • US Robotics 56K 5686E • ZOOM v90 • ZOOM v92 • US Robotics Sportster 56K • US Robotics Courie r 56K Devices Supported by the KX2-832 a nd KX2-864 Extended Local Port The Extended Local Port supports attachment from the followi ng devices: • Paragon II User Station (P2-UST) connected di re[...]

  • Seite 255

    Appendix A: Specifications 246 Note: Due to the multiplicity of server manufa cturers and types, OS versions, video dri vers, and so fort h and the subjective nature of video quality, Raritan cannot guarantee perfor m ance a cross all distances in all environments. See the Supported Video Resolutions (on pa ge 246) for the vide o resolutions suppor[...]

  • Seite 256

    Appendix A: Specifications 247 Resolutions 640x350 @85 Hz 800x600 @56 Hz 1024x768 @100 Hz 640x400 @56 Hz 800x600 @60 Hz 1152x864 @60 Hz 640x400 @84 Hz 800x600 @70 Hz 1152x864 @70 Hz 640x400 @85 Hz 800x600 @72 Hz 1152x864 @75 Hz 640x480 @60 Hz 800x600 @75 Hz 1152x864 @85 Hz 640x480 @66.6 Hz 800x600 @85 Hz 1152x870 @75.1 Hz 640x480 @72 Hz 800x600 @90[...]

  • Seite 257

    Appendix A: Specifications 248 Language Regions Keyboard lay out Chinese Traditional Hong Kong S. A. R., Republic of China (Taiwan) Chinese Traditional Chinese Simplified Mainland of the People’s Republic of China Chinese Simplified Korean South Kore a Dubeolsik Hangul Japanese Japan JIS Keyboard French France French (AZERTY) layout keyboard. Ger[...]

  • Seite 258

    Appendix A: Specifications 249 Client OS Virtual media (VM) support on client SUSE Linux Professional 9.2 and 10 Yes. Locally held ISO image, Remote File Server mounting direct ly from Dominion KX II Fedora™ Core 5 and above Yes. Locally held ISO ima ge, Rem ote File Server mounting direct ly from Dominion KX II Mac® No Solaris No At this time, [...]

  • Seite 259

    Appendix A: Specifications 250 Supported Browsers Dominion KX II supports the following browse rs: • Internet Explorer 6, 7 and 8 • Firefox 1.5, 2.0, and 3.0 • Mozilla 1.7 • Safari 2.0 TCP and UDP Ports Used[...]

  • Seite 260

    Appendix A: Specifications 251 Port Description HTTP, Port 80 All requests received by the Dominion KX II via HTTP (port 80) are automatically forwarded to HTTPS for complete security. The Dominion KX II responds to Port 80 for user conve nien ce, relieving users from having to explicitly type in the UR L field to access the Dominion KX II, while s[...]

  • Seite 261

    Appendix A: Specifications 252 Network Speed Settings Dominion KX II network speed setting Auto 1000/Full 100/Full 100/Half 10/Full 10/Half Auto Highest Available Speed 1000/Full Dominion KX II: 100/Full Switch: 100/Half 100/Half Dominion KX II: 10/Full Switch: 10/Half 10/Half 1000/Full 1000/Full 1000/Full No Communica tion No Communicat ion No Com[...]

  • Seite 262

    Appendix A: Specifications 253 Functions; not recommen ded NOT supported by Ethernet spe cification; product will communicate, but collisions will occur Per Ethernet specification, these should be “n o communication,” howeve r, note that the Dominion KX II behavior deviates from expected b ehavi or Note: For reliable netwo rk communication, con[...]

  • Seite 263

    254 Note: The procedures in this chapter sh o uld be attempted only by experienced use r s. In This Chapter Returning User Gr oup Inform ation ........................................................ 254 Setting the Registry to Permit Write Operations to the Schema ........... 255 Creating a New Attribute ...........................................[...]

  • Seite 264

    Appendix B: Updating the LDAP Schema 255 Setting the Registry to Permit Wr ite Operations to the Schema To allow a domain controller to write to the schema, you mu st set a registry entry that permits schema up dates. To permit write operations to the sche ma: 1. Right-click the Active Directory Sch ema root node in the left pane of the window and [...]

  • Seite 265

    Appendix B: Updating the LDAP Schema 256 3. Click New and then choose Attribute. When the warni ng me ssage appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciuserg roup in the Common Name field. 5. Type rciuserg roup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Obje ct ID field. 7. [...]

  • Seite 266

    Appendix B: Updating the LDAP Schema 257 2. Scroll to the user class in the right pane and rig ht-click it. 3. Choose Properties from the menu. The use r Pro perties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.[...]

  • Seite 267

    Appendix B: Updating the LDAP Schema 258 6. Choose rciusergroup from the Select Schema O bject list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1. Right-click Active Directory Schem a in the left pane of the window and select Reload the Schema. 2. [...]

  • Seite 268

    Appendix B: Updating the LDAP Schema 259 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.[...]

  • Seite 269

    Appendix B: Updating the LDAP Schema 260 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose prop er ties you want to adjust in the right pane. Right-click the user nam e and select Properties.[...]

  • Seite 270

    Appendix B: Updating the LDAP Schema 261 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the Dominion KX II) in the Edit Attribute field. 10. Click OK.[...]

  • Seite 271

    262 In This Chapter Overview ................................................................................................ 262 Java Runtime Envi ronment (JRE) ......................................................... 262 IPv6 Suppor t Notes ............................................................................... 263 Keyboards ............[...]

  • Seite 272

    Appendix C: Informational Notes 263 IPv6 Support Notes Java Java 1.5 supports IPv6 for the following: • Solaris 8 and higher • Linux kernel 2.1.2 and higher (RedHat 6.1 and highe r) Java 5.0 and above supports the IPv6 for the following: • Solaris 8 and higher • Linux kernel 2.1.2 and higher (kern el 2.4.0 and hig her recommended for better[...]

  • Seite 273

    Appendix C: Informational Notes 264 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux Clients Only) The Virtual KVM Client and the Multi-Platform Clie nt (MPC) do not process the key combination of Alt Gr + 9 as the care t symbol (^) when using French keyboards with Linux clients. To obtain the caret symbol: From a French keyboard, pre[...]

  • Seite 274

    Appendix C: Informational Notes 265 Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde symbol: Create a macro consisting of the following command s: • Press right Alt. • Press 2. • Release 2. • Relea[...]

  • Seite 275

    Appendix C: Informational Notes 266 Language Configuration method Norwegian Keyboard Indicator Swedish Keyboard Indicator Danish Keyboard Indicator Japanese System Settings (Control Center) Korean System Settings (Control Center) Slovenian System Settings (Control Center) Italian System Settings (Control Center) Note: The Keyboard Indicator should [...]

  • Seite 276

    Appendix C: Informational Notes 267 Macintosh Keyboard When a Macintosh is used as the clie nt, the following keys on the Mac keyboard are not captured by the Java Runtime Environment (JRE): • F9 • F10 • F11 • F14 • F15 • Volume Up • Volume Down • Mute • Eject As a result, the Virtual KVM Client and the Multi-Platform Client (MP C[...]

  • Seite 277

    Appendix C: Informational Notes 268 Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recomm ends using the following cable length s and video re solutions when you are con necting to Dell blade chassis from the Dominion KX II: Cable length Video resolution 50 ft. 1024x768x60 50 ft. 1280x1024x60 30 ft. 160[...]

  • Seite 278

    Appendix C: Informational Notes 269 SUSE/VESA Video Modes The SuSE X.org configuration tool SaX2 gene rates video modes using modeline entries in the X.org conf iguration file. These video mod es do not correspond exactly with VESA video mode timing (even when a VESA monitor is selected). The Dominion KX II, on the other hand, relies on exact VESA [...]

  • Seite 279

    Appendix C: Informational Notes 270 Help for Choosing USB Profiles When you are connected to a KVM target server in VKC, you can view information about USB profiles via the Help on USB P rofile s com mand on the USB Profile menu.[...]

  • Seite 280

    Appendix C: Informational Notes 271 USB profile help appears in the USB Profile Help win dow. For detailed information about specific USB profiles, see Availabl e USB Profiles (on page 88). Ra ritan provides a standar d sele ction of USB configuration profiles for a wide range of operating sy stem and BI OS level server implementations. These are i[...]

  • Seite 281

    Appendix C: Informational Notes 272 CIMs Windows 3-Button Mouse on Linux Targets When using a 3-button mo use o n a Wi ndows client connecting to a Linux target, the left mouse button may get mapped to the center button of the Windows client 3-button mouse. Windows 2000 Composit e USB Device Behav ior for Virtual Media The Windows 2000 operating sy[...]

  • Seite 282

    Appendix C: Informational Notes 273 Virtual Media Virtual Media Not Refreshed After Files Add ed After a virtual media drive has been mo unted, if you add a file(s) t o that drive, those files may not be immedi ately visible on the target server. Disconnect and then reconnect the virtu al media connection. Target BIOS Boot Time with Virtual Media T[...]

  • Seite 283

    Appendix C: Informational Notes 274 Moving Between Ports of the Domini on KX II If you move a between ports of the same Domini on KX II and resume management within one minute, CC-SG may displ ay an error message. If you resume management, the display will be update d.[...]

  • Seite 284

    275 In This Chapter General Questions ................................................................................. 276 Remote Access ..................................................................................... 278 Universal Virt ual Media .......................................................................... 280 USB Profiles .....[...]

  • Seite 285

    Appendix D: FAQs 276 General Questions What is the Dominion KX II? The Dominion KX II is a second generation digital KVM (keyb oard/video/ mouse) switch that enables one, two, four or ei ght IT administrators to access and control 8, 16, 32 or 64 servers ove r the ne twork with BIOS-level functionality. The Dominion KX II is completely hardwa r e a[...]

  • Seite 286

    Appendix D: FAQs 277 In general, customers can continue to use their existing switches f or many years. As their data centers expand, custome rs can purchase an d use the new Dominion KX II models. Ra ritan' s centralized manage ment unit, CommandCenter Secure Gateway, and the Multi-Platform Clie nt (MPC) both support KX I and Dominion KX II s[...]

  • Seite 287

    Appendix D: FAQs 278 Remote Access How many users can remotely access servers on each Dominion KX II? The Dominion KX II models offer remot e con ne ctions for up to eight users per user channel to simultane ously access and control a unique target server. For one-channel devices like the DKX2-11 6, up to eight remote users can acce ss and control [...]

  • Seite 288

    Appendix D: FAQs 279 Speed Description Time 100Mbps Theoretical 100Mbit net wo rk speed 0.05 seconds 60Mbps Likely practical 100Mbit ne twork spee d 0.08 seconds 10Mbps Theoretical 10Mbit network speed .4 seconds 6Mbps Likely practical 10Mbit network speed .8 seconds 512Kbps Cabl e mod em download speed (typical) 8 seconds How do I access servers c[...]

  • Seite 289

    Appendix D: FAQs 280 Universal Virtual Media What Dominion KX II models support virtual media? All of the Dominion KX II models support virtual media. It is available standalone and through Raritan's CommandCenter Secure Gateway, Raritan's centrali zed ma nagement unit. What types of virtual media does th e Dominion KX II support? The Dom[...]

  • Seite 290

    Appendix D: FAQs 281 USB Profiles What is a USB profile? Certain servers require a specifi ca lly configured USB interface for USB based services such as virtual medi a. The USB Profile tailors the Dominion KX II’s USB interface to the server to accommodate these server spe cif ic ch aracterist ics. Why would I use a USB profile? USB Profiles are[...]

  • Seite 291

    Appendix D: FAQs 282 A BIOS profile has been tailored to match the requirem ents of a particular server’s BIOS that does not impleme nt the full USB specification. The profile enables use of keyboard, mouse, and virtual media at the BIOS level, overcoming th e restrictions or limitations of the BIOS. Do I need a special CIM to use USB profiles? Y[...]

  • Seite 292

    Appendix D: FAQs 283 Ethernet and IP Networking Does the Dominion KX II offer dual gigabit Ethernet por ts to p rovide redundant fail-over? Yes. The Dominion KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should the prima ry Ethern et port (or the switch/router to which it is connected) fail, the Dominion KX [...]

  • Seite 293

    Appendix D: FAQs 284 Other factors include the server’s video resolutio n, networking speed and characteristics, client PC resources, an d video ca rd noise. The Dominion KX II has very sophistica t ed video pro cessing algorithms that optimize bandwidth and perfo rma nce for a variety of environments. In addition, they are highly configur able s[...]

  • Seite 294

    Appendix D: FAQs 285 User ta sk Default 1Mbit speed & 15 bit color 1Mbit speed & 8 bit color Close browser 100 - 150 KB/s 75 - 100 KB/s 30 - 60KB/s Open Start menu 75 - 100 KB/s 50 -75 KB/s 20 - 30 KB/s Close Start menu 75 - 100 KB/s 25 - 50 KB/s 10 - 15 KB/s Starfield screen saver 25 - 50 KB/s 10 - 15 KB/s 7 - 10 KB/s 3D pipes screen saver[...]

  • Seite 295

    Appendix D: FAQs 286 With the reduced bandwidt h settings, bandwidth is reduced si gnificantly for virtually all tasks. With the 15 bi t color setting, perceived performance is similar to the default parameters. Further, bandwidth reductio ns are possible with additional ch ange s in the settings. Please note that these bandwidth fi gures are only [...]

  • Seite 296

    Appendix D: FAQs 287 The connection speed a nd color depth settings can be tweaked to optimize performance for slower bandwi dth links. For example, in the Multi-Platform Client or the Virtual KVM Client, set the connection speed to 1.5Mb or 1Mb and the color depth to 8 bit. Even lowe r co nnection speeds and color depths can be used fo r very low [...]

  • Seite 297

    Appendix D: FAQs 288 Only one. The Dominion KX II protects netwo rk se curity by only requiring access to a single TCP port to operate. This port is completely configurable for additional se curity. Note that, of course, to use the Dominion KX II's optional web b rowser capability, the standard HTTPS port 443 must also be open. Does the Domini[...]

  • Seite 298

    Appendix D: FAQs 289 When changing the IP addre ss of the Dominio n KX II or swapping in a new Dominion KX II, sufficient time must be allowed for its IP and MAC addresses to be known through out the L ayer 2 and Layer 3 networks.[...]

  • Seite 299

    Appendix D: FAQs 290 IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Prot ocol Version 6”. IPv6 is the “next generation” IP protocol which will repl ace the cu rrent IP Version 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses. It also improves IPv4 in areas su ch as[...]

  • Seite 300

    Appendix D: FAQs 291 The Dominion KX II’s default networking is set at the factory for IPv4 only. When you are ready to use IPv6, then follow the above instruction s to enable IPv6/IPv4 dual stack operation. Where can I get more information on IPv6? See www.ipv6.org for general informati on on IPv6. The Do minion KX II User Guide describes the Do[...]

  • Seite 301

    Appendix D: FAQs 292 Servers Does the Dominion KX II depend on a Windo ws server to operate? Absolutely not. Because users depend on the KVM infrastru cture to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructure to fix problems), the Dominion KX II is designed to be completely independ ent from any[...]

  • Seite 302

    Appendix D: FAQs 293 Blade Servers Can I connect blade servers to the Dominion KX II? Yes you can. The Dominion KX II supports popular blade serve r models from the leading blade serv er man ufacturers: HP, IBM and Dell. Which blade servers are supported? The following models are suppo rted: • Dell PowerEdge 185 5, 195 5 and M1000e • HP BladeSy[...]

  • Seite 303

    Appendix D: FAQs 294 Are the Paragon Blade CIMs used? No, the Paragon II Blade CIM will not work with the Dominion KX II. Which CIM should I use? It depends on the type of KVM ports on the specifi c m ake and model of the blade server you are using. The following CIM s are supported: DCIM-PS2, DCIM-USBG2, D2CIM-VUSB and D2CIM-DV USB. What types of [...]

  • Seite 304

    Appendix D: FAQs 295 I'm running VMware on some of my blade servers. Is this supported? Yes, with CC-SG you can display and access virtual machi nes running on blade servers. Is virtual media supported? We support VM on IBM BladeCenter Model H and E with the D2CI M - DVUSB. Is absolute mouse synchronization suppor ted? Servers with internal KV[...]

  • Seite 305

    Appendix D: FAQs 296 Installation Besides the devi ce itself, what do I need to order from Raritan to install the Dominion KX II? Each server that connects to the Domini on KX II requires a Dominion or Paragon Computer Interface Modul e (CIM), an adapter that connects directly to the keyboard, video, and mouse ports of th e server. What kind of Cat[...]

  • Seite 306

    Appendix D: FAQs 297 Servers connected to the Dominion KX II do not require any softwa re agents to be installed, because the Dominion KX II connects di re ctly via hardware to servers' keyboa rd, video, and mouse ports. How many servers can be conne cte d to each the Dominion KX II device? The Dominion KX II models range from 8, 16, or 32 ser[...]

  • Seite 307

    Appendix D: FAQs 298 Local Port Can I access my serv ers directly from the rack? Yes. At the rack, the Dominion KX II functions just like a traditional KVM switch, allowing co ntrol of up to 64 servers using a si ngle keyboard, monitor, and mouse. When I am using the local port, do I prevent other users from accessing servers remotely ? No. The Dom[...]

  • Seite 308

    Appendix D: FAQs 299 If I use the local port to change the name of a connected serv er, does this change propagate to remote acce ss clients as well? Does it propagate to the optional Command Center unit? Yes. The local port presentation is identical an d co mpletely in sync with remote access clients, as well a s Raritan's optional CommandCen[...]

  • Seite 309

    Appendix D: FAQs 300 Extended Local Port (Dominion KX 2-832 and KX2-864 Models Only) What is the Extended Local port? The Dominion KX2-832 and KX2-864 feature an extended lo cal p ort. The Dominion KX II eight user models have a Standard Local port, plus a new extended local port that extends the local p ort, via Cat5 cable, beyond the rack to a co[...]

  • Seite 310

    Appendix D: FAQs 301 Power Control Does the Dominion KX II have a dual po w er optio n? All of the Dominion KX II models come equipped with dual AC inp uts and power supplies with auto matic fail-ove r. Should one of the power inputs or power supplies fail, t hen the Dominion KX II will automatically switch to the other. Does the power supply used [...]

  • Seite 311

    Appendix D: FAQs 302 To take advantage of the Dominion KX II's integrated powe r control user interface, and more importantly, integrat ed se curity, use Raritan's Remote Power Control (R PC) power st rips. RPCs come in many outlet, connector, and amp variations. Th e D2CIM-PWR must be purcha sed to connect the RPC to the Dominion KX II. [...]

  • Seite 312

    Appendix D: FAQs 303 Computer Interface Modules (CIMs) Can I use Computer Interface Modules (CIMs) fro m Raritan 's analog matrix KVM switch, Paragon, with the Dominion KX II? Yes. Certain Paragon computer inte rface modul es (CIMs) may work with the Dominion KX II (check the Ra ritan Dominion KX II release notes on the website for the latest [...]

  • Seite 313

    Appendix D: FAQs 304 Security What kind of encryption does the Dominion KX II use? The Dominion KX II uses industry-s tandard (and extremely secure ) RC4 or AES encryption, both in its SSL communications as well as its own data stream. Literally no data is transmitted between remote client s and the Dominion KX II that is not co mpletely secure d b[...]

  • Seite 314

    Appendix D: FAQs 305 The encryption level that is autonegotiated is depend ent on the browser in use. Manageability Can the Dominion KX II be remotely managed and configured via web br o wser ? Yes, the Dominion KX II can be completely configu re d remotely via web browser. Note that this does r equire that the workstat ion have an appropriate Java[...]

  • Seite 315

    Appendix D: FAQs 306 Miscellaneous What is the Dominion KX II's default IP address? 192.168.0.192 What is the Dominion KX II's default user name and pass word? The Dominion KX II's default user name is admin and the default password is raritan [all lower case]. However, for the highest level of security, the Dominion KX II forces the[...]

  • Seite 316

    307 A A. AC Power • 26 Absolute Mouse Mode • 71 Access Telnet from a Windows PC • 212 Accessing a Target Server • 228 Accessing the Dominion KX II Using CL I • 211 Adding a New User • 106 Adding a New User Group • 97, 106 Adding Attributes to the Class • 256 Adding, Deleting and Editing Favorites • 48 Administering the Dominion KX[...]

  • Seite 317

    Index 308 Disconnecting KVM Target Servers • 55 Disconnecting Virtual Media • 82, 86 Discovering Devices on the Dominion K X II Subnet • 47 Discovering Devices on the Local Subnet • 46 Dominion KX II Console Layout • 40 Dominion KX II Console Navigation • 40 Dominion KX II Help • 1 Dominion KX II Local Console • 221 Dominion KX II L[...]

  • Seite 318

    Index 309 Logging Out • 50 Login Limitations • 178, 179 M Macintosh Keyboard • 267 Maintenance • 191 Make Linux Settings Permanent • 20 Make UNIX Settings Permanent • 24 Manage Favorites Page • 45 Manage KVM Target Servers Associated with Outlets (Port Page) • 143 Manageability • 305 Managing Favorites • 44 Miscellaneous • 306[...]

  • Seite 319

    Index 310 Setting Network Parameters • 216 Setting Parameters • 215 Setting Permissions • 98, 103, 104 Setting Permissions for an Individual G roup • 104, 106 Setting Port Permissions • 101, 104 Setting the Registry to Permit Write Operations to the Schema • 255 Simultaneous Users • 221 Single Mouse Cursor • 71 Single Mouse Mode - C[...]

  • Seite 320

    Index 311 VKC Virtual Media • 72 VM-CIMs and DL360 USB Ports • 269 W What's New in the Help • 2 Windows 2000 Compo site USB Device Behavior for Virtual Media • 272 Windows 2000® Settings • 14 Windows 3-Button Mouse on Linux Targ ets • 272 Windows Vista® Settings • 16 Windows XP®/Windows 2003® • 15 Working with Targ et Serve[...]

  • Seite 321

    U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800-724- 809 0 or 732- 764- 8886 For CommandCenter NOC: Press 6, then Pr ess 1 For CommandCenter Secure Gateway : Press 6, then Press 2 Fax: 732-764-88 87 Email for CommandCenter NOC: tech-ccnoc@rarita n .com Email for all o ther products: tech @raritan.com China Beijing Monday - F[...]