Raritan Computer DKX2-V2.3.5-0N-E manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Raritan Computer DKX2-V2.3.5-0N-E, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Raritan Computer DKX2-V2.3.5-0N-E one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Raritan Computer DKX2-V2.3.5-0N-E. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Raritan Computer DKX2-V2.3.5-0N-E should contain:
- informations concerning technical data of Raritan Computer DKX2-V2.3.5-0N-E
- name of the manufacturer and a year of construction of the Raritan Computer DKX2-V2.3.5-0N-E item
- rules of operation, control and maintenance of the Raritan Computer DKX2-V2.3.5-0N-E item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Raritan Computer DKX2-V2.3.5-0N-E alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Raritan Computer DKX2-V2.3.5-0N-E, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Raritan Computer service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Raritan Computer DKX2-V2.3.5-0N-E.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Raritan Computer DKX2-V2.3.5-0N-E item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Copyright © 2011 Raritan, Inc. DKX2-v2.3.5- 0N -E March 2011 255 - 62 - 4023 - 00 Dominion KX II User Guide Release 2.3.5[...]

  • Page 2

    This document contains p roprietary information that is protected by copyright. A ll rights reserved. No part of this document may be photo copied, reproduced, or t ranslated into another lan guage without express prior written con sent of Raritan, Inc. © Copyright 2011 Raritan, Inc. All third-party software and hardware mentione d in this documen[...]

  • Page 3

    iii Contents Chapter 1 Introduction 1 KX II Overview ............................................................................................................................... 2 KX II Help ....................................................................................................................................... 4 Related Documentat[...]

  • Page 4

    Contents iv Video Properties ................................................................................................................ 63 Mouse Options ................................................................................................................... 68 VKC Virtual Media ......................................................[...]

  • Page 5

    Contents v Adding a New User .......................................................................................................... 120 Modifying an Existing User .............................................................................................. 120 Logging a User Off (Force Logoff) ..................................................[...]

  • Page 6

    Contents vi Configuring IP Access Cont rol ................................................................................................... 205 SSL Certificates ......................................................................................................................... 207 Security Banner ............................................[...]

  • Page 7

    Contents vii Chapter 13 KX II Local Console 242 Overview ................................................................ .................................................................... 242 Using the KX II Local Console ................................................................................................... 242 Simultaneous Users ..[...]

  • Page 8

    Contents viii Setting the Registry to Permit Write Operations to the Schema ............................................... 283 Creating a New Attribute ............................................................................................................ 283 Adding Attributes to the Class ................................ ....................[...]

  • Page 9

    Contents ix Appendix D FAQs 3 02 General Questions ..................................................................................................................... 303 Remote Access .......................................................................................................................... 305 Universal Virtual Media ............[...]

  • Page 10

    1 In This Chapter KX II Overview ........................................................................................... 2 KX II Help ................................................................................................... 4 KX II Client Applications ............................................................................ 5 Virtu[...]

  • Page 11

    Chapter 1 : Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) swit ch that provides BIOS-level (and up) access and control of serv ers from anywhere in the world v ia a web browser. Up to 64 servers can be controlled with a standa rd KX II. With the KX II 8-user model, u[...]

  • Page 12

    Chapter 1 : Introduction 3[...]

  • Page 13

    Chapter 1 : Introduction 4 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) KX II Local access Note: KX2-832 and KX2 -864 also use an extended local port. Remote KVM and serial devices IP LAN/WAN Modem PSTN Remote (network) access KX II Help The KX II help provides inf or mation on how [...]

  • Page 14

    Chapter 1 : Introduction 5 Related Documentation The KX II help is accompa nied by a KX II Device Quick Setu p Guide, which can be found on the Rarit an Firmware and Documentation page http://www.raritan.com/support/ firmware-and-documentation/ of Raritan's website. Installation requirements a nd instructions for client ap plications used with[...]

  • Page 15

    Chapter 1 : Introduction 6 Virtual Media All KX II models support vi rtual media. The benefits of virtual media - mounting of remote drives/media o n the target server to support software installation and diagnosti cs - are now available in all of the K X II models. Each KX II comes equippe d with virtual media to en able remote management tasks us[...]

  • Page 16

    Chapter 1 : Introduction 7 Product Photos KX II KX2 -832[...]

  • Page 17

    Chapter 1 : Introduction 8 KX2 -864[...]

  • Page 18

    Chapter 1 : Introduction 9 Product Features Hardware  Integrated KVM-over-IP remote access  1U or 2U rack-mountable (brackets in cluded)  Dual power supplies with f ailover; autoswitching power supply with power failure warni ng  8, 16, 32, or 64 (on KX2-464) server ports  32 (KX2-832) or 64 (KX2-864) se rver ports  Support for ti[...]

  • Page 19

    Chapter 1 : Introduction 10 Software  Virtual media with D2CIM-VUSB and D 2C IM-DVUSB CIMs  Absolute Mouse Synchroni zation with D2CIM-VUSB CIM and D2CIM-DVUSB CIMs  Plug-and-Play  Web-based access and m anagement  Intuitive graphical user int erface (GUI)  128 -bit encryption of com plete KVM signal, inclu ding video and virtual [...]

  • Page 20

    Chapter 1 : Introduction 11 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, M ouse) UT P Cable (Cat5/5e/6) KX II Local Access Console Local User - an optional user co nsole (consisting of a keyboard, mouse, and mult i-sync VGA monitor) attached directly to the KX II to control KVM target servers (directly at the rack, not through the netw[...]

  • Page 21

    Chapter 1 : Introduction 12 Package Contents Each KX II ships as a fully- configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmo unt chassis. Each KX II device ships with the following contents : Amount included Item 1 KX II device 1 KX II Quick Setup Guide 1 Rackmount kit 1 AC power cords 1 Cat5 network cable 1 Cat5 netw[...]

  • Page 22

    13 In This Chapter Overview .................................................................................................. 13 Default Login Information ........................................................................ 13 Getting Started ........................................................................................ 14 Overview T[...]

  • Page 23

    Chapter 2 : Installation and Configuration 14 Getting Started Step 1: Configure KVM T arget Servers KVM target servers are t he computers that will be a ccessed and controlled via the KX II. Before installing the KX II, configure all KVM target servers to ensure opt imum performance. This configuration applies only to KVM target server s, not to th[...]

  • Page 24

    Chapter 2 : Installation and Configuration 15 Win dows XP, Windows 2003 and Windows 2008 Settings To configure KVM target servers running Microsoft ® Windows XP ® operating system, Windo w s 2003 ® operating system or Windows 2008 ® operating sy stems: 1. Configure the mouse settin gs : a. Choose Start > Control Pa nel > Mouse. b. Click t[...]

  • Page 25

    Chapter 2 : Installation and Configuration 16 Note: For KVM target ser vers running Windows XP, Windows 2000 or Windows 2008, you may wi sh to create a user name t hat will be used only for remote connections thro ugh the KX II. This will enable you to keep the target server's slo w mouse pointer m otion/acceleration settings exclusive to the [...]

  • Page 26

    Chapter 2 : Installation and Configuration 17  Animate controls and elem ents inside windows  Animate windows when mi nimizing and maximizing  Fade options:  Fade or slide menus into view  Fade or slide ToolTips into vi ew  Fade out menu items after clicking 3. Click OK and Close the Co ntrol Panel. To configure KVM target servers[...]

  • Page 27

    Chapter 2 : Installation and Configuration 18 Windows 2000 Settings To configure KVM target servers running Microsoft ® Windows 2000 ® operating sy stem: 1. Configure the mouse settin gs : a. Ch oose Start > Cont rol Panel > Mouse. b. Click the Motion tab.  Set the acceleration t o None.  Set the mouse motion speed sett ing to exactly[...]

  • Page 28

    Chapter 2 : Installatio n and Configuration 19 a. Choose Main Menu > Prefere nces > Mouse. The Mou se Preferences dialog appears. b. Click the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity t owards low. e. Within the Drag & Drop group, set the Thresho[...]

  • Page 29

    Chapter 2 : Installation and Configuration 20 Note: If you change the video resol ution, you must log off of the target server and log back in for t he video settings to take eff ect. Note for Red Hat 9 KVM Target Servers If you are running Red Hat ® 9 on t he target server using a USB CIM, and are experiencing problems with the keyboard and/or mo[...]

  • Page 30

    Chapter 2 : Installation and Configuration 21 2. Configure the screen resol ution: a. Choose Main Menu > Syst em Settings > Display. Th e Display Settings dialog appears. b. On the Settings tab, select a Resolution supported by t he KX II. c. Click OK. Note: Once connected to the targ et server, in many Li nux graphical en vironments, the <[...]

  • Page 31

    Chapter 2 : Installation and Configuration 22 Make Linux Settings Permanent Note: These steps m ay vary slightly depending on the specific ver sion of Linux ® in use. To make your settings pe rmanent in Linux (promp t): 1. Choose System Menu > Preferen ces > Personal > Session s. 2. Click the Session Options tab. 3. Select the "Promp[...]

  • Page 32

    Chapter 2 : Installation and Configuration 23 2. All KVM target servers must be configured to one of the displ ay resolutions supported by t he KX II. The most popula r supported resolutions for Sun machin es are: Display resolution Vertical refresh rate Aspect ratio 1600 x 1200 60 Hz 4:3 1280 x 1024 60,75,85 Hz 5:4 1152 x 864 75 Hz 4:3 1024 x 768 [...]

  • Page 33

    Chapter 2 : Installation and Configuration 24 2. Choose Mouse Style Man ager. The Style Manager - Mou se dialog appears. 3. Set the Acceleration slider to 1.0. 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click. 2. Choose Tools > Terminal. A terminal window opens. (It is best to be at the root to issue com[...]

  • Page 34

    Chapter 2 : Installation and Configuration 25 Card To check resolution: To change resolution: 32 -bit # /usr/sbin/pgxconfig -prconf 1. # /usr/sbin/pgxconfig -res 1024x768x75 2. Log out or restart computer. 64 -bit # /usr/sbin/m64config -prconf 1. # /usr/sbin/m64config -res 1024x768x75 2. Log out or restart computer. 32 -bit and 64 -bit # /usr/sbin/[...]

  • Page 35

    Chapter 2 : Installation and Configuration 26 Make UNIX Settings Permanent Note: These steps m ay vary slightly depending on the type of UN IX ® (for example, Solaris ™ , IBM ® AIX ™ ) and the specifi c v ersion in use. 1. Choose Style Manager > S tartup. The Style Manager - St ar tup dialog appears. 2. On the Logout Confirmation dialog, s[...]

  • Page 36

    Chapter 2 : Installation and Configuration 27 Step 3: Connect the Equ ipment Connect the KX II to t he power supply, network, local P C, local video display, keyboard and mo use, and target servers. Th e letters in the diagram correspond to the topics in this section that d escr ibe the connection. A. AC Power To connect the po w er supply: 1. Atta[...]

  • Page 37

    Chapter 2 : Installation and Configuration 28 C. Network Port The KX II provides two Eth ernet ports for failover purpose s (not for load-balancing). By default, only LAN1 is active and the autom atic failover is disabled. When enabled, if the KX I I internal network interface or the network switch to which it is connected becomes un available, LAN[...]

  • Page 38

    Chapter 2 : Installation and Configuration 29 Connection Description port. Keyboard At tach a standard USB keyboard t o one of the USB Type A (female) ports. Mouse Attach a standard USB mo use to one of the USB Type A (femal e) ports. E. Target Server Ports The KX II uses standard UTP cabling (Cat5/5e/6) to connect t o each target server. To connec[...]

  • Page 39

    Chapter 2 : Installation and Configuration 30 Changing the Default Password The KX II ships with a default password. The first time y ou start the KX II you are required to change that password. To change the default p assword: 1. Power on the KX II using the power switch(s) at the back of the unit. Wait for the KX II unit to boot. (A beep signals [...]

  • Page 40

    Chapter 2 : Installation and Configuration 31 c. Enter the Default Gateway if None is selected from t he IP Auto Configuration drop-down. d. Enter the Preferred DHCP Host Name if DHCP is selected from the IP Auto Configuration d rop-down. e. Select the IP Auto Configurat ion. The following option s are available:  None (Static IP) - This option [...]

  • Page 41

    Chapter 2 : Installation and Configuration 32 5. Select Obtain DNS Serve r Address Automatically if DHCP is selected and Obtain DNS Server Address is enabled. When Obtain DNS Server Address Auto matically, the DNS information provided by the DHCP server will be used. 6. If Use the Following DNS S erver Addresses is select ed, regardless of whether [...]

  • Page 42

    Chapter 2 : Installation and Configuration 33 Valid Special Characters for Targ et Names Character Description Character Description ! Exclamation point ; Semi-colon " Double quote = Equal sign # Pound sign > Greater than sign $ Dollar sign ? Question mark % Percent sign @ At sign & Ampersand [ Left bracket ( Left parenthesis Backward[...]

  • Page 43

    Chapter 2 : Installation and Configuration 34 3. If you are plugging power i nput into power supply number two (right-most power supply at the back of the device), select the Powerln2 Auto Detect option. 4. Click OK. Note: If either of t hese checkboxes is selected a nd power input is not actually connected, the power LE D at the front of the devic[...]

  • Page 44

    Chapter 2 : Installation and Configuration 35 Note on Microsoft Active Directory Microsoft ® Active Directory ® uses the LDAP/LDAPS protocol n atively, and can function as an LDAP/LDAP S server and authenti cation source for the KX II. If it has the IAS (Int ernet Authorization Server) comp onent, a Microsoft Active Directory server ca n also ser[...]

  • Page 45

    Chapter 2 : Installation and Configuration 36 5. Shut down the device and power o n once again. The DCIM-SUSB performs a reset (power cy cle). 6. Verify that the characters are co rrect.[...]

  • Page 46

    37 In This Chapter Interfaces ................................................................................................ . 37 Proxy Server Configurat ion for use with MPC, VKC and A KC ................ 50 Virtual KVM Client (VKC) ......................................................................... 51 Active KVM Client (AKC) .............[...]

  • Page 47

    Chapter 3 : Working with Target Servers 38 KX II Local Console Interface When you are located at t he server rack, the K X II provides standard KVM management and ad ministration via the KX II Local C onsole. The KX II Local Console provid es a direct KVM (analog) co nnection to you r connected servers; the perf ormance is exactly as if you were di[...]

  • Page 48

    Ch apter 3 : Working with Target Servers 39 Depending on your brows er and security settings, you may see various security and certificate wa rnings. It is necessary to accept these warnings to launch the KX II Remote Console. You can reduce the numbe r of warning messages du ring subsequent l og ins by checking the following option s on the securi[...]

  • Page 49

    Chapter 3 : Working with Target Servers 40 Interface and Navigation KX II Console Layout Both the KX II Remote Co ns ole and the KX II Local Console interfaces provide an HTML (web-based) interfa ce for configuration and administration, as well as target server list and selection. The options are organized into various tabs. After successful login,[...]

  • Page 50

    Chapter 3 : Working with Target Servers 41 Left Pan el The left panel of the KX II interface contains the follo wing information. Note that some informatio n is conditional and will onl y be displayed if you are a certain of user, are using certain features, and so on. This conditional information is n oted here. Information Description When displa[...]

  • Page 51

    Chapter 3 : Working with Target Servers 42 Information Description When displayed? Configured As Base or Configured As Tiered If you are using a tiering configuration, this indicates if the KX II y ou are accessing is the ba se device or a tiered device. When the KX II is part of a tiered configuration. Port States The statuses of the ports being u[...]

  • Page 52

    Chapter 3 : Working with Target Servers 43 Port Access Page After successfully logging o n to the KX II Remote Cons ole, the Port Access page appears. This page lists all of the KX II ports, the connected KVM target se rvers, and their statu s and availability. The Port Access page provides a ccess to the KVM target se rvers connected to the KX II.[...]

  • Page 53

    Chapter 3 : Working with Target Servers 44 Note: Do not use apostrop hes for the Port (CIM) Nam e.  Status - The status for sta ndard servers is either up o r down.  Type - The type of server or CIM. For blade chassis, the type ca n be Blade Chassis, Blade, Blade ChassisAdmin, and BladeChassisURL. 2. Click View by Port, View by Group or View [...]

  • Page 54

    Chapter 3 : Working with Target Servers 45  Power On - Powers on the target server through the associated outlet. This option is visible only whe n there are one or mo re power associations to the target.  Power Off - Powers off t he target server through the a ssociated outlets. This option is visib le only when there are one or more power a[...]

  • Page 55

    Chapter 3 : Working with Target Servers 46 Managing Favorit es A Favorites feature is provided s o you can organize and qui ck ly access the devices you use frequently . The Favorite Devices section is located in the lower left side (side bar) of the Port Access page and p ro vides the ability to:  Create and manage a list of favorite devices ?[...]

  • Page 56

    Chapter 3 : Working with Target Servers 47 Note: Both IPv4 and IPv6 a ddresses are supported. Manage Favorites Page To open the Manage Favorites pa ge:  Click the Manage button in the left panel. The Manage Favorites page appears and contain s the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local S[...]

  • Page 57

    Chapter 3 : Working with Target Servers 48 c. Click Save. 3. Click Refresh. The list of dev ices on the local subnet is refr eshed. To add devices to y our Favorites List: 1. Select the checkbox next to the device name/IP addr ess. 2. Click Add. Tip: Use the Select All and Desele ct All buttons to quickly select all (or deselect all) devices in the[...]

  • Page 58

    Chapter 3 : Working with Target Servers 49 Adding, Deleting and Editing Favorites To add a device to y our favorites list: 1. Choose Manage > Add New D evice to Favorites. Th e Add New Favorite page appears. 2. Type a meaningful description. 3. Type the IP Address/Host Name for the device. 4. Change the discovery Port (if necessary). 5. Select t[...]

  • Page 59

    Chapter 3 : Working with Target Servers 50 Proxy Server Configuration for use with MPC, VKC and AKC When the use of a Proxy Server i s re quired, a SOCKS proxy must also be provided and configured on the remote client PC. Note: If the installed prox y server is only capable of the HTTP proxy protocol, you cannot conne ct. To configure the SOCKS pro[...]

  • Page 60

    Chapter 3 : Working with Target Servers 51 start javaw -Xmn128M -Xm x512M -XX:MaxHeapFree Ratio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=tr ue -DsocksProxyHost=192.1 68.99.99 -DsocksProxyPort=1080 -classpath .sdeploy.jar;.sFoxt rot.jar;.jaws.jar;.sMpc.jar com.raritan.rrc.ui.RRCAppl ication %1 Virtual KVM Client (VKC) Please note this cli[...]

  • Page 61

    Chapter 3 : Working with Target Servers 52 Button Button Name Description Video Settings Opens the Video Setting s dialog, allowing you to manually adjust video con version parameters. Color Calibration Adjusts color setting s to reduce excess color noise. Same as choosing Video > Color Calibrate. Note: Not available in K X II -101-V2. Target Sc[...]

  • Page 62

    Chapter 3 : Working with Target Servers 53 Switching Bet ween KVM Target Servers With the KX II, you can acces s several KVM target servers. The KX II provides the ability t o switch from one target server to anothe r. Note: This feature is avail able in the KX II Remote Console only. To switch bet w een KVM target servers: 1. While already using a[...]

  • Page 63

    Chapter 3 : Working with Target Servers 54 Disconnecting KVM Target Serv ers Note: This item is not avail able on the KX II Local Co nsole. The only way to disconnect from t he sw itched target in the Local Consol e is to use the hot key. To disconnect a target s erver: 1. Click the port name of the target you want to disconnect. The Port Action me[...]

  • Page 64

    Chapter 3 : Working with Target Servers 55 Connection Properties The dynamic video compre ssion algorithms maintain K VM console usability under varying ban dwidth constraints. The de vices optimize KVM output not only for LAN use, but also for WAN use. Th ese devices can also control color depth and limit video output, offering an optimal balance [...]

  • Page 65

    Chapter 3 : Working with Target Servers 56  256 Kb (Cable)  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings a re an optimization for specif ic conditions rather than an exact spee d. The client and server al ways attempt to deliver video as quickly as possibl e on the network reg[...]

  • Page 66

    Chapter 3 : Working with Target Servers 57 Connection Information To obtain information about y our Virtual KVM Client connection:  Choose Connection > Inf o... The Connection I nfo window opens. The following information is display ed about the current conne ction:  Device Name - The name of t he device.  IP Address - The IP addre ss o[...]

  • Page 67

    Chapter 3 : Working with Target Servers 58 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) o r Virtual KVM Client ( VKC). Macros exported from MPC or VKC cannot be imported into AKC. Note: KX II-101 does not support AKC. To import macros: 1. Choose Keyboard > Impo rt [...]

  • Page 68

    Chapter 3 : Working with Target Servers 59  Click Yes to replace the ex isting macro with the imported version.  Click Yes to All to replace the curre ntly selected and an y other duplicate macros t hat are found.  Click No to keep the original macro and proceed to the next macro  Click No to All keep the ori ginal macro and proceed to [...]

  • Page 69

    Chapter 3 : Working with Target Servers 60 3. Click Ok. The Export Key board Macro. A dialog from which to locate and select the macro file appear s. By default, the macro exists on your desktop. 4. Select the folder to save the macro file to, enter a name f or the file and click Save. If the macro alre ady exists, you receive an alert message. Sel[...]

  • Page 70

    Chapter 3 : Working with Target Servers 61 Press Left Ctrl Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequen ce field to be sure the ma cro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step a nd then click the up or down ar[...]

  • Page 71

    Chapter 3 : Working with Target Servers 62 Running a Keyboard Macro Once you have created a keyboard macro, execute i t using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a ma cro, it appears under the Keyb oard menu. Execute the keyboard macro by clicking on it in the[...]

  • Page 72

    Chapter 3 : Working with Target Servers 63 3. Set the language and mouse s ettings. 4. Exit the menu to return to n ormal CIM functionality. Video Properties Refreshing the Screen The Refresh Screen com mand forces a refresh of t he video screen. Video settings can be refre shed automatically in sever al ways:  The Refresh Screen com mand forces[...]

  • Page 73

    Chapter 3 : Working with Target Servers 64 Calibrating Color Use the Calibrate Color command to optimize the colo r levels (hue, brightness, saturation) of t he transmitted video imag es. The color settings are on a target s erver-basis. Note: The Calibrate Colo r command applies to the c urrent connection only. Note: The KX II-101 does suppo rt co[...]

  • Page 74

    Chapter 3 : Working with Target Servers 65 c. Brightness: Use this setting to adjust the brightness of the target server display. d. Brightness Red - Controls the brightness of the target server display for the red signal. e. Brightness Green - Controls the bri ghtness of the green signal. f. Brightness Blue - Controls the brightness of the blue si[...]

  • Page 75

    Chapter 3 : Working with Target Servers 66 Note: Some Sun backgro und screens, such as scr eens with very dark borders, may not center precisel y on certain Sun servers. Use a different background or place a light er colored icon in the upper left corner of the screen.[...]

  • Page 76

    Chapter 3 : Working with Target Servers 67 Using Screenshot from Target You are able to take a scre enshot of a target server using the Screenshot from Target server c ommand. If needed, save this screenshot to a file location of your choosing as a bit map, JPEG or PNG file. To take a screenshot of t he target serv er: 1. Select Video > Screensh[...]

  • Page 77

    Chapter 3 : Working with Target Servers 68 Changing the Maximum Refresh Rate If the video card you are u sing on the target uses cust om software and you are accessing the targ et through MPC or VKC, you may need to change the maximum refre sh rate of the monitor in order f or the refresh rate to take effect on the target . To adjust the monitor re[...]

  • Page 78

    Chapter 3 : Working with Target Servers 69 Mouse Pointer Synchronization When remotely v iewing a target server that uses a m ouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to t he target server. When the mou se pointer lies within the Virtual KVM Clien t target server window, m ouse m[...]

  • Page 79

    Chapter 3 : Working with Target Servers 70 Additional Notes for Intelligent Mouse Mode  Be sure that there are no ic ons or applications in the upper left section of the screen since that is where the synchronization routine takes place.  Do not use an animated mous e.  Disable active desktop on KVM target servers. Synchronize Mouse In dua[...]

  • Page 80

    Chapter 3 : Working with Target Servers 71 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mou se settings and synchronize the mou se cursors accordingly, allowing mouse acceleration on the target. Intelligent mouse mode is t he default for non -VM targets. In this mode, the mouse c ursor does a “dance” in the[...]

  • Page 81

    Chapter 3 : Working with Target Servers 72 Please note that mouse co nfigurations will vary on di fferent target operating systems. Cons ult your OS guidelines for furt her details. Also note that intelligent mouse synchr onization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coo rdinates are used to k eep the client [...]

  • Page 82

    Chapter 3 : Working with Target Servers 73 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mo de: 1. Press Ctrl+Alt+O on your k eyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media for complete inform ation about setting up and using virtual media.[...]

  • Page 83

    Chapter 3 : Working with Target Servers 74 Smart Cards (VKC, AKC and MP C) Using the KX II 2.1.10 or lat er, you are able to mount a smart card reader onto a target server to sup port smart card authentic ation and related applications. For a list of supported smart cards, smart card readers, and additional system requirements, se e Supported and U[...]

  • Page 84

    Chapter 3 : Working with Target Servers 75 4. A progress dialog will open. Check the 'Mount selected card read er automatically on connection t o targets' checkbox to mount the smart card reader automatically the next time you connect t o a target. Click OK to begin the mounting process. To update the smart card in the Select Smart Card R[...]

  • Page 85

    Chapter 3 : Working with Target Servers 76 Tool Options From the Tools menu, you can specify certain option s for use with the Virtual KVM Client, includi ng logging, setting the key board type, and defining hot keys for exitin g Full Screen mode and Single C ursor mode. Note: The KX II-101 and K X II- 101 -V2 do not support single cursor mode. To [...]

  • Page 86

    Chapter 3 : Working with Target Servers 77 4. Exit Full Screen Mode - Hotkey. When y ou enter Full Screen mode, the display of the target server be comes full screen a nd acquires the same resolution as the ta rget server. This is the hot key us ed for exiting this mode. 5. Exit Single Cursor Mode - Hotk ey. When you enter si ngle cursor mode, only[...]

  • Page 87

    Chapter 3 : Working with Target Servers 78 Language Configuration method French Keyboard Indicator German System Settings (Control Center) Japanese System Settings (Control Center) UK System Settings (Control Center) Korean System Settings (Control Center) Belgian Keyboard Indicator Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Key[...]

  • Page 88

    Chapter 3 : Working with Target Servers 79 View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off):  Choose View > View Toolb ar. Scaling Scaling your target window allow s you to view the entire content s of the target server window. This feature incr[...]

  • Page 89

    Chapter 3 : Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provi des version informatio n about the Virtual KVM Client, in case you require assista nce from Raritan Technical Support. To obtain version information: 1. Choose Help > About Rarit an Virtual KVM Client. 2. Use the Copy to Clipboard but[...]

  • Page 90

    Chapter 3 : Working with Target Servers 81 AKC Supported Operating Sy stems and Browsers .NET Framework AKC requires Windows .N ET ® version 3.5, and will work with both 3.5 and 4.0 installed. Operating Systems When launched from Internet E xplorer ® , AKC allows you to reach t arget servers via the KX II 2. 2 (or later). AKC is compatible with t[...]

  • Page 91

    Chapter 3 : Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC:  Ensure the cookies from the IP addr ess of the device that is bein g accessed are not currently being bl ocked.  Windows Vista, Windows 7 and Windows 2008 server users should ensure that the IP address of the device being acce ssed is included in thei[...]

  • Page 92

    Chapter 3 : Working with Target Servers 83 Note: The Alt+Tab comm and toggles between windows o nly on the local system. When MPC opens, the Rar itan devices that were automatically detected and which are f ound on your subnet are displ ayed in the Navigator in tree format. 2. If your device is not listed b y name in the navigator, ad d it manually[...]

  • Page 93

    84 In This Chapter Overview .................................................................................................. 84 Turning Outlets On/Off and Cycling Power ............................................. 85 Overview The KX II allows you to con trol Raritan PX and RPC series rack PDU (power strip) outlets conne cted to the KX II through[...]

  • Page 94

    Chapter 4 : Rack PDU (Power Strip) Outlet Control 85  Control - Turn outlets on or off , or cycle their power.  Association - The ports associate d with the outlet. Initially, when you open the Powerstrip page, the po wer strips that are currently connected to the K X II are displayed in the P owerstrip drop-down. Additionally, informatio n r[...]

  • Page 95

    Chapter 4 : Rack PDU (Power Strip) Outlet Control 86 5. Click OK to close the Power On conf irmation dialog. The outlet will be turned on and its state will be displayed as 'on'. To turn an outlet off: 1. Click Off. 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The o utlet will be turned off and it[...]

  • Page 96

    Chapter 4 : Rack PDU (Power Strip) Outlet Control 87 2. Click OK. The outlet will then cycl e (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog.[...]

  • Page 97

    88 In This Chapter Overview .................................................................................................. 89 Prerequisites for Using Virt ual Med ia ...................................................... 92 Using Virtual Media via VKC and A KC in a Windows Environm ent ........ 93 Using Virtual Media ...........................[...]

  • Page 98

    Chapter 5 : Virtual Media 89 Overview Virtual media extends KVM capabili ties by enabling KVM target servers to remotely access media f rom a client PC and networ k file servers. With this feature, media mount ed on a client PC and net work file servers is essentially "mounted virtual ly" by the target server. The target server can then r[...]

  • Page 99

    Chapter 5 : Virtual Media 90[...]

  • Page 100

    Chapter 5 : Virtual Media 91 Diagram key Desktop PC CD/DVD drive KX II USB mass storage device CIM PC hard drive Target server Remote file server (ISO images)[...]

  • Page 101

    Chapter 5 : Virtual Media 92 Prerequisites for Using Virtual Media With the virtual media feat ure, you can mount up to t wo drives (of different types) that are suppo rted by the USB profile currently applied to the target. These drives are accessible for the duratio n of the KVM session. For example, you can mount a specific CD-ROM, use it, and t[...]

  • Page 102

    Chapter 5 : Virtual Media 93 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP ® operating system admi nistrator and standard user privileges vary from those of the Windows Vista ® operating system and the Windows 7 ® operating system. When enabled in Vista or Windows 7, User Access Cont rol (UAC) provides the lowest level [...]

  • Page 103

    Chapter 5 : Virtual Media 94 Using Virtual Media See Prerequisites for Using Virtual Media before proceeding with using virtual media. To use virtual media: 1. If you plan to access file se rver ISO images, identif y those file servers and images throug h the Remote Console Fil e Server Setup page. See File Server Setu p (File Server ISO Im ages On[...]

  • Page 104

    Chapter 5 : Virtual Media 95 File Server Setup (File Server ISO Images Only) Note: This feature is only r equired when using virtu al media to access file server ISO images. ISO9660 f ormat is the standard suppo rted by Raritan. However, other C D-ROM extensions may also work. Note: SMB/CIFS support is required on the file server. Use the Remote Co[...]

  • Page 105

    Chapter 5 : Virtual Media 96 Note: You cannot acces s a remote ISO image via virtual media using an IPv6 address due to techni cal limitations of third-party soft ware used by the by the KX, KSX or K X101 G2 device. Note: If you are connectin g to a Windows 2003 ® server and attempt to load an ISO image from the server, you may receive an er ror s[...]

  • Page 106

    Chapte r 5 : Virtual Media 97 Connecting to Virtual Media Local Drives This option mounts an entir e drive, which means the entire disk drive is mounted virtually onto the targ et server. Use this option f or hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives. This is the only option for which R ead/[...]

  • Page 107

    Chapter 5 : Virtual Media 98 3. If you want Read and Write capabilitie s, select the Read-Write checkbox. This option is di sabled for nonremovable d rives. See the Conditions when Read/Write is N ot Available (on page 98 ) for more information. When chec ked, you will be able to read o r write to the connected USB disk. WARNING: Enabling Read /Wri[...]

  • Page 108

    Chapter 5 : Virtual Media 99 CD -ROM/DVD-ROM/ISO I mages This option mounts CD-ROM , DVD-ROM, and ISO image s. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DV D-ROM, or ISO image: 1. From the Virtual KVM Clie nt, choose Virtual Media > Con nect CD -ROM/ISO I mage. [...]

  • Page 109

    Chapter 5 : Virtual Media 100 4. For remote ISO images on a f ile server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Image f rom the drop-down list. The file servers and image paths available are those that you configu red using the File Server Setup page. Only items you conf igured using the File Server Setup page will be[...]

  • Page 110

    101 In This Chapter Overview ................................................................................................ 101 CIM Compatibility .................................................................................. 102 Available USB Profiles ........................................................................... 102 Selecting Pr[...]

  • Page 111

    Chapter 6 : USB Profiles 102 CIM Compatibility In order to make use of USB profiles, you must use a D2 CIM-VUSB or D2CIM-DVUSB with updated f irmware. A VM-CIM that has not had its firmware upgraded will sup port a broad range of confi gurations (Keyboard, Mouse, CD-ROM , and Removable Drive) but will not be able to make use of profile s optimized [...]

  • Page 112

    Chapter 6 : USB Profiles 103 USB profile Description  USB bus speed limited to full-speed (12 MBit/s)  No virtual media support BIOS DellPowerEdge Keyboard Only Dell PowerEdge BIOS A ccess (Keyboard Only) Use this profile to have keyboard functionality for the Dell Powe rEdge BIOS when using D2CIM-VUSB . When using the new D2CIM-DVUSB, use &a[...]

  • Page 113

    Chapter 6 : USB Profiles 104 USB profile Description BIOS Generic BIOS Generic Use this profile when Gen eric OS profile does not work on th e BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Restrictions:  USB bus speed limited to full-speed (12 MBit/s)  Absolute mouse syn chronizat ion™ not [...]

  • Page 114

    Chapter 6 : USB Profiles 105 USB profile Description Advanced Management Module functionality when D2CIM-VUSB or D2CIM-DVUSB is connected t o the Advanced Management Module. Restrictions:  Virtual CD-ROM and disk drive s cannot be used simultaneously BIOS Lenovo ThinkPad T6 1 & X61 BIOS Lenovo ThinkPad T6 1 and X61 (boot from virtual media) [...]

  • Page 115

    Chapter 6 : USB Profiles 106 USB profile Description Installation) (Windows 2003 Server Ins tallation) Use this profile for t he HP Proliant DL360/DL380 G4 series server when installing Windows 2003 S erver without the help of HP SmartSt art CD. Restrictions:  USB bus speed limited to full-speed (12 MBit/s) Linux ® Generic Linux profile This is[...]

  • Page 116

    Chapter 6 : USB Profiles 107 USB profile Description series mainboards with Phoenix AwardBIOS. Re strictions:  Virtual CD-ROM and disk drive s cannot be used simultaneously Suse 9.2 SuSE Linux 9.2 Use this for SuSE Linux 9. 2 distribution. Restrictions:  Absolute mouse synchronizat ion™ not supported  USB bus speed limited to full-speed [...]

  • Page 117

    Chapter 6 : USB Profiles 108 USB profile Description  USB bus speed limited to full-speed (12 MBit/s)  Virtual CD-ROM and disk drive s cannot be used simultaneously WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Use Full Speed for Virtual Media CIM Use Full Speed for virtual media CIM This profile r[...]

  • Page 118

    Chapter 6 : USB Profiles 109 Mouse Modes when Using the Mac OS-X USB Profile w ith a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X ® USB profile, and running Mac OS-X 10.4.9 ( or later), when you reboot you must be in Single Mouse mode to use the mou se at the Boot menu. To configure the mouse to w ork at the Boot menu : 1. Reboot the M[...]

  • Page 119

    110 In This Chapter User Groups .......................................................................................... 110 Users ..................................................................................................... 119 Authentication Settings .......................................................................... 122 Changing[...]

  • Page 120

    Chapter 7 : User Management 111 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, whe n you add a user, you must ass ign that user to an existing user group. The User Group List page dis plays a list of all user g roup[...]

  • Page 121

    Chapter 7 : User Management 112 The Group page is organized into t he following cate gories: Group, Permissions, Port Permissi ons, and IP ACL. 2. Type a descriptive name fo r the new user group into the Gr oup Name field (up to 64 character s). 3. Set the permissions for the group. Select the checkbo xes before the permissions you want to as sign [...]

  • Page 122

    Chapter 7 : User Management 113 Note: Several administrative f unctions are available wi thin MPC and from the KX II Local Console. These functions are available only to members of the default Admin group. Note: Both IPv4 and IPv6 a ddresses are supported.[...]

  • Page 123

    Chapter 7 : User Management 114 Setting Permissions Important: Selecting the Us er Management checkbox al low s the members of the group to change the permissions of al l users, including their o w n. Carefully consider granting t hese permissions. Permission Description Device Access While Under CC -SG Management Allows users and user groups with [...]

  • Page 124

    Chapter 7 : User Management 115 Permission Description User Management User and group management, remote. authentication (LDAP/LDA PS/RADIUS), login settings. If you are using a tiered conf iguration in which a base KX II device is use d to access multiple other tiered devices, user, user group a nd remote authentication settings m us t be consiste[...]

  • Page 125

    Chapter 7 : User Management 116 Power control access Option Description Deny Deny power control to the targ et server Access Full permission to power control on a target serve r For blade chassis, the port ac cess permission will control ac cess to the URLs that have been configured f or that blade chassis. The options are Deny or Control. In addit[...]

  • Page 126

    Chapter 7 : User Management 117 Use the IP ACL section of t he Group page to add, insert, repla ce, and delete IP access control ru les on a group-level basis. To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2. Type the ending IP address in the Ending IP field. 3. Choose the action from the available options:  Ac[...]

  • Page 127

    Chapter 7 : User Management 118 2. Click Delete. 3. When prompted to confirm t he deletion, click OK. Important: ACL rules are ev aluated in the order in which they are listed. For instance, in th e example sho w n here, if the two ACL rules were reversed, Domi nion would accept no communication at all. Tip: The rule numbers allow you to have more [...]

  • Page 128

    Chapter 7 : User Management 119 Tip: To determine the users belo nging to a particular group, sort t he User List by User Group. 1. Choose a group from am ong those listed by che cking the checkbox to the left of the Group Nam e. 2. Click Delete. 3. When prompted to confirm t he deletion, click OK. Users Users must be granted user name s and passwo[...]

  • Page 129

    Chapter 7 : User Management 120 Adding a New User It is a good idea to define u ser groups before creating K X II users because, when you add a user, y ou must assign that user to an existing user group. See Adding a New User Group (on page 111 ). From the User page, you can add new users, modify user information, and reactivate users that have bee[...]

  • Page 130

    Chapter 7 : User Management 121 5. To delete a user, click Del ete. You are prompted t o confirm the deletion. 6. Click OK. Logging a User Off (Force Logof f) If you are an administrator, you are able to log off another locally authenticated user who is l ogged on to the KX II. To log off a user: 1. Open the User List page by choosing User Manageme[...]

  • Page 131

    Chapter 7 : User Management 122 Authentication Settings Authentication is the proce ss of verifying that a user i s who he says he is. Once a user is authenticated, t he user's group is used to determine his system and port permi ssions. The user's assigned privileges determine what type of ac cess is allowed. This is call ed authorizatio[...]

  • Page 132

    Chapter 7 : User Management 123 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protoc ol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services r unning over TCP/IP. A client starts an LDAP session by connecti ng to an LDAP/LDAPS server (the default TCP port is 389). The client then sends ope[...]

  • Page 133

    Chapter 7 : User Management 124 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searching for u ser information. Up to 64 char acters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com . Consul t your authentication server admi nistrator for the appropriate val[...]

  • Page 134

    Chapter 7 : User Management 125 11. If you entered a Disting uished Name for the Administrative User, you must enter the password that will be u sed to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the S ecret Phrase field and again in the Confirm Secret Phrase field (up to 128 charac[...]

  • Page 135

    Chapter 7 : User Management 126 15. Select the Enable L DAPS Server Certificate Valid ation checkbox to use the previously uploaded ro ot CA certificate file to v alidate the certificate provided by the server. If you do not want t o use the previously uploaded root C A certificate file, leave this checkbox deselected. Disabling this f unction is t[...]

  • Page 136

    Chapter 7 : User Management 127 Once the test is completed, a message will be displayed that lets you know the test was successf ul or, if the test failed, a de tailed error message will be displayed. I t will display successful result or detail error message in failure case. It also can display group information retrieved from remote LDAP ser ver [...]

  • Page 137

    Chapter 7 : User Management 128 Important Notes  Group Name is case sensit ive.  The KX II provides the following d efault groups that cannot be changed or deleted: Admin and < Unknown>. Verify that your Active Directory server does not us e the same group name s.  If the group information ret ur ned from the Active Directory server [...]

  • Page 138

    Chapter 7 : User Management 129 9. The default number of retries is 3 Retries. This is the number of time s the KX II will send an authenticatio n request to the RADIUS serv er. 10. Choose the Global Auth entication Type from amo ng the options in the drop-down list:  PAP - With PAP, passwords a re sent as plain text. PAP is not interactive. The[...]

  • Page 139

    Chapter 7 : User Management 130 Note: Both IPv4 and IPv6 a ddresses are supported. Cisco ACS 5.x for RADIUS Authentication If you are using a Cisco ACS 5. x server, aft er you have configured the KX II for RADIUS authenti cation, complete the following steps on the Cisco ACS 5.x server. Note: The following steps i nc lude the Cisco menus a nd menu [...]

  • Page 140

    Chapter 7 : User Management 131 Returning User Group Informa tion via RADIUS When a RADIUS authentication at tempt succeeds, the KX II determines the permissions for a give n user based on the permi ssions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemente d as a RADIUS FILTE[...]

  • Page 141

    Chapter 7 : User Management 132 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network c onnections. NAS-Port (5) Always 0. NAS- IP -Address (4) The IP address for the KX II. User-Name (1) The user name entered a t the login screen. Acct-Session-ID (44) Session ID for accounting.[...]

  • Page 142

    Chapter 7 : User Management 133 User Authentication Proc ess Remote authentication follows t he process specified in the flowchart below:[...]

  • Page 143

    Chapter 7 : User Management 134 Changing a Password To change your pass w ord: 1. Choose User Management > Chang e Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Rety pe the new password in the Confirm New Pa ssword field. Password s can be up t[...]

  • Page 144

    135 In This Chapter Network Settings ................................................................................... 135 Device Services ..................................................................................... 140 Configuring Modem Setti ngs ................................................................ . 148 Configuring Date/Tim[...]

  • Page 145

    Chapter 8 : Device Management 136 Network Basic Settings These procedures describe how to assign an IP address o n the Network Settings page. For complet e information about all of the fields and the operation of this page, see Network Settings . To assign an IP address: 1. Choose Device Setting s > Network. The Networ k Settings page opens. 2. [...]

  • Page 146

    Chapter 8 : Device Management 137 d. Enter the Gateway IP A ddress. e. Link-Local IP Address. This addres s is automatically assigned t o the device. It is used for ne ighbor discovery or when no routers are present. Read-Only f. Zone ID. This identifies the device with which the ad dress is associated. Read-Only g. Select the IP Auto Configurat io[...]

  • Page 147

    Chapter 8 : Device Management 138 See LAN Interface Settin gs (on page 138 ) for information in configuring this section of the Network Set tings page. Note: In some environments, t he default LAN Interface Speed & Duplex setting Autodetect (autonegotiator ) does not properly set the network parameters, which result s in network issues. In thes[...]

  • Page 148

    Chapter 8 : Device Management 139  Autodetect (default option)  10 Mbps/Half - Both LEDs blink  10 Mbps/Full - Both LEDs blink  100 Mbps/Half - Yellow LE D blinks  100 Mbps/Full - Yellow LED blin ks  1000 Mbps/Full (gigabit) - Green LED bl inks  Half-duplex provides for co mmunication in both directi ons , but only one directio[...]

  • Page 149

    Chapter 8 : Device Management 140 Device Services The Device Services page allows you to configure the followin g functions:  Enable SSH access.  Enable tiering for the base KX II.  En ter the discovery port.  Enable direct port access.  Enable the AKC Download Server Certificate Validatio n feature if you are using AKC. Enabling SSH[...]

  • Page 150

    Chapter 8 : Device Management 141 Entering the Discovery Port The KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can co nfigure it to use an y TCP port except 80 and 443. To access the KX II from beyond a firewall, your f irewall settings must enable two-way comm unication through t he default Port 50[...]

  • Page 151

    Chapter 8 : Device Management 142 Configuring and Enabling Tieri ng The tiering feature allows you t o access KX II targets and PDUs through one base KX II device. This f eature is available for standa rd KX II devices as well as KX2-832 and K X2-864 devices. Devices can be added and removed from a configu ra tion as needed up t o a maximum of two [...]

  • Page 152

    Chapter 8 : Device Management 143 Enabling Tiering Connect from a target se rver port on the base device to the tier KX II Local Access port video/ke yboard/mouse ports usi ng a D2CIM-DVUSB. If the tier device is a KX2-832 or KX 2-864, connect from a t arget server port on the base device directly to the tier KX2-832/KX2-864 E xtended Local port. T[...]

  • Page 153

    Chapter 8 : Device Management 144 Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached directly to the base are accessible. Power Control You can power on and off targets that are a part of t he tiered configuration. These target s are accessed from the P ort Access page. KX II PDU outlets can [...]

  • Page 154

    Chapter 8 : Device Management 145 Cabling Example in Tiered Configurations The following diagram illustrates the ca bling configurations bet ween a KX II tiered device and a KX II base device. Connect from a target server port on the base device to t he tier KX II Local Access port video/keyboard/mouse port s using a D2CIM-DVUSB. If the tier device[...]

  • Page 155

    Chapter 8 : Device Management 146 Enabling Direct Port Acc ess via URL Direct port access allows u sers to bypass having to u se the device's Login dialog and Port Acces s page. This feature also provides the ability to enter a username and passwor d directly and proceed to the target if the username and passwor d is not contained in the URL. [...]

  • Page 156

    Chapter 8 : Device Manageme nt 147 Enabling the AKC Do w nload Server Certificate V alidation If you are using the AKC cl ient, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Option 1: Do Not Enable AKC Download Serv er Certificate Validation (default settin g) If you do not enabl[...]

  • Page 157

    Chapter 8 : Device Management 148 Configuring Modem Settings To configure modem sett ings: 1. Click Device Settings > Modem Set tings to open the Modem Sett ings page. 2. Select the Enable Modem checkbox. This will enable the Serial Line Speed and Modem Init St ring field. 3. The Serial Line Speed of t he modem is set to 115200. Read-only 4. Ent[...]

  • Page 158

    Chapter 8 : Device Management 149 6. Click OK to commit your changes o r click Reset to Defaults t o return the settings to their defaults. See Certified Modems (on page 271) for information on certified modems that work with the KX II. For information on settings that will give you the best perform ance when connecting to the KX II via modem, see [...]

  • Page 159

    Chapter 8 : Device Management 150 3. To adjust for daylight savings time, check the "Adjust for daylight savings time" checkbox. 4. Choose the method you woul d like to use to set the date and time:  User Specified Time - Choose thi s option to input the date and time manually. For the User Specified Tim e option, enter the date and ti[...]

  • Page 160

    Chapter 8 : Device Management 151 Event Management The KX II Event Management feature allows you enable and di sable the distribution of system even ts to SNMP Managers, the Sy slog and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or seve ral destinations. Configuring Event[...]

  • Page 161

    Chapter 8 : Device Management 152 3. Click OK. To reset to factory defaults:  Click Reset To Defaults. Note: Both IPv4 and IPv6 a ddresses are supported. Note: IPv6 addresses cann ot exceed 80 characters in length f or the host name.[...]

  • Page 162

    Chapter 8 : Device Management 153 Event Management - Destina tions System events, if enabled, can g enerate SNMP notific ation events (traps), or can be logged to Syslog or A udit Log. Use the Event Management - Destinations page to select the system ev ents to track and where to send this information. Note: SNMP traps will be g enerated only if th[...]

  • Page 163

    Chapter 8 : Device Management 154 3. Click OK.[...]

  • Page 164

    Chapter 8 : Device Management 155 To reset to factory defaults:  Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possible for the KX II and the router that it is attached to to fall out of synch ronization when the KX II is reboote d, preventing the reboot completed S NMP trap from being logged. SNMP Agent Configuration S[...]

  • Page 165

    Chap ter 8 : Device Management 156 Trap Name Description communicate over the net work. networkParameterChange d A change has been made t o the network parameters. passwordSettingsChanged Strong password settings h ave changed. portConnect A previously authenticated use r has begun a KVM session. portConnectionDenied A connection to the target port[...]

  • Page 166

    Chapter 8 : Device Management 157 Trap Name Description userSessionTimeout A user with an active sessi on has experienced a session termination due to timeout. userUploadedCertificate A user uploaded a SSL certif icate. vmImageConnected User attempted to mount either a device or image on the target using Virtual Media. For every attempt on device/i[...]

  • Page 167

    Chapter 8 : Device Management 158 4. Click OK. Note: If either of t hese checkboxes is selected a nd power input is not actually connected, the power LE D at the front of the unit turn s red. To turn off the automati c detection:  Deselect the checkbox for the appropriate power sup ply. To reset to factory defaults:  Click the Reset To Defaul[...]

  • Page 168

    Chapter 8 : Device Management 159 Port type Description PowerStrip (rack PDU) Power strip connected VM Virtual media CIM (D2CIM-VUSB and D2CIM-DVUSB) Blade Chassis Blade chassis and the bla des associated with that chassis (displaye d in a hierarchical order) 2. Click the Port Name for the port you want to edit.  For KVM ports, the Port pa ge fo[...]

  • Page 169

    Chapter 8 : Device Management 16 0 8. Click OK. Configuring KVM S w itches The KX II also supports u se of hot key sequences to sw itch between targets. In addition to using hot key sequences with standard s er vers, KVM switching is supporte d by blade chassis and in t iered configurations. Important: In order for user groups to see the KVM switch[...]

  • Page 170

    Chapter 8 : Device Management 161 5. Select KVM Switch Hot Key S eque nce. 6. Enter the Maximum Numb er of Target Ports (2-32). 7. In the KVM Switch Name f ield, enter the name you want to use to refer to this port connectio n. 8. Activate the targets that the KVM switch hot key sequ ence will be applied to. Indicate the KV M switch ports have targ[...]

  • Page 171

    Chapter 8 : Device Management 162 Configuring Rack PDU (Po w er Strip) Targets The KX II allows you to con nec t rack PDUs (power str ips) to KX II ports. KX II rack PDU configurati on is done from the KX II Port Configuration page. Connecting a Rack PDU Raritan PX series rack PD Us (power strips) are conn ected to the KX II using the D2CIM-PWR CIM[...]

  • Page 172

    Chapter 8 : Device Management 163 Naming the Rack PDU in the KX II (Port Page for Power Strips) Note: PX rack PDUs (pow er strips) can be named in t he PX as well as in KX II. The Port page opens whe n you select a port from th e Port Configuration page that is connected to a Raritan remote rack PD U. The Type and the Name fields are prepopulat ed.[...]

  • Page 173

    Chapter 8 : Device Management 164 3. Click OK.[...]

  • Page 174

    Chapter 8 : Device Management 165 Associating Outlets with Target Servers on KX II The Port page opens whe n you click on a port on the P or t Configuration page. From this page, you can make power associations, change the port name to something more d escr iptive, and update target server settings if you are using the D2CIM-VUSB CIM. The (CIM) Typ[...]

  • Page 175

    Chapter 8 : Device Management 166 Removing Power Associations When disconnecting targ et servers and/or rack P DUs from KXII, all power associations should first be deleted. When a t arget has been associated with a rack PD U and the target is remove d from the KX II, the power association remain s. When this occurs, you are not able to access the [...]

  • Page 176

    Chapter 8 : Device Management 167 Configuring Blade Chass is In addition to standard servers and r ack PDUs (power strips), y ou can control blade chassis that a re plugged into a Dominion device port. Up to eight blade chassis can be managed at a given time. As with standard server s, blade chassis are autodete cted once they are connected. When a[...]

  • Page 177

    Chapter 8 : Device Management 168 Note: In the case of IBM Blade Center Models E and H, the KX II only supports auto-discovery for A MM[1] as the acting primary management module. The use of hot key sequen ces to switch KVM access to a blade chassis is also supported. For blade chas sis that allow users t o select a hot key sequence, those option s[...]

  • Page 178

    Chapter 8 : Device Ma nagement 169 2. Select Device Settings > Port Configuration to open the Port Configuration page. 3. On the Port Configuration p age, click on the name of t he blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio button. The page will then display the necessary fields to configur e [...]

  • Page 179

    Chapter 8 : Device Management 170 b. URL - Enter the URL to t he interface. Required c. Username - Enter the use rname used to access the interfa ce . Optional d. Password - Enter the pass word used to access the int erface. Optional Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or the c onnection will [...]

  • Page 180

    Chapter 8 : Device Management 171 5. Select the Dell blade cha ssis model from the Blade Server C hassis Model drop-down. To configure a Dell P owerEdge M1000e: 1. If you selected Dell Power Edge ™ M1000e, auto-discovery is available. Configure the bl ade chassis as applicable. P rior to configuring a blade cha ssis that can be auto-discovered, i[...]

  • Page 181

    Chapter 8 : Device Management 172 5. In the Blade Chassis Managed Li nks section of the page, you are able to configure the con nection to a blade chassis web browser interface if one is availabl e. Click the Blade Chassi s Managed Links icon to expand the section on the page. Th e first URL link is intended f or use to connect to the blade ch assi[...]

  • Page 182

    Chapter 8 : Device Management 173 To configure a Dell P owerEdge 1855/1955: 1. If you selected Dell 1855/1 955, auto-discovery is not available . Configure the blade cha ssis as applicable. a. Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server. b. Maximum Number of Slots - The default maxi[...]

  • Page 183

    Chapter 8 : Device Management 174 Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or the c onnection will fail. e. The Username Field and P assword Field, which are both optional, contain the labels that are expected to be associated with the username and password e ntries. It is in these fields you shoul[...]

  • Page 184

    Chapter 8 : Device Management 175 c. Administrative Module Pri mary IP Address/Host Na me - Enter the primary IP address for the blade chassis. Required for auto-discovery mode d. Port Number - The default port number for the blade chassi s is 22. Change the port numb er if applicable. Required f or auto-discovery mode e. Username - Enter the use r[...]

  • Page 185

    Chapter 8 : Device Management 176 c. Username - Enter the use rname used to access the interfa ce . d. Password - Enter the pass word used to access the int erface. Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or t he connection will fail. e. The Username Field and P assword Field, which are both optio[...]

  • Page 186

    Chapter 8 : Device Management 177 4. In the Blade Chassis Managed Li nks section of the page, you are able to configure the con nection to a blade chassis web browser interface if one is availabl e. Click the Blade Chassi s Managed Links icon to expand the section on the page. The first URL link is intended f or use to connect to t he blade chassis[...]

  • Page 187

    Chapter 8 : Device Management 178 Tips for Adding a Web Browser Interface You can add a Web Brows er Interface to create a co nnection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web a pplication associated with an RSA, DRAC o r ILO Processor card. You must have DN[...]

  • Page 188

    Chapter 8 : Device Management 179 HP Blade Chassis Configuration (Port Group Management) The KX II supports the aggreg ation of ports connecte d to certain types of blades into a group repres enting the blade chassis. Specifically, HP ® BladeServer blades and D ell ® PowerEdge ™ 1855/1955 blades whe n the Dell PowerEdge 1855/195 5 is connected [...]

  • Page 189

    Chapter 8 : Device Management 180 3. Enter a Port Group Name. The port group name is n ot case sensitive and can contain up to 32 characte rs . 4. Select the Blade Server Grou p checkbox. If you want to designate th at these ports are attached to blades housed in a blade chassis (for ex ample, HP c3000 or Dell PowerEdge 1855), select t he Blade Ser[...]

  • Page 190

    Chapter 8 : Device Management 181 To delete a port group: 1. Click on the Port Group M anagement page, select th e checkbox of the port group you want to delete. 2. Click the Delete button. 3. Click OK on the warning m essage. Supported Blade Chassis Models This table contains the bla de chassis models that are supported by the KX II and the corres[...]

  • Page 191

    Chapter 8 : Device Manageme nt 182 Supported CIMs for Blade Chassis The following CIMs are supported f or blade chassis being ma naged through the KX II:  DCIM- PS2  DCIM-USBG2  D2CIM-VUSB  D2CIM-DVUSB Following is a table contai ning supported CIMs for each blade chassi s model that the KX II suppo rts. Blade chassis Connection method [...]

  • Page 192

    Chapter 8 : Device Management 183 Blade chassis Connection method Recommended CIM(s) M1000e with this chassis. The iKVM is compatible wi th the followin g peripherals:  USB keyboards, USB pointing devic es  VGA monitors with DDC support. Source: Dell Chassis Man agement Controller, Firmware Version 1.0, User Guid e HP ® BladeSystem c3000 The[...]

  • Page 193

    Chapter 8 : Device Management 184 Blade chassis Connection method Recommended CIM(s) one Advanced Management Module. In contrast to the standard B ladeCenter chassis, the KVM module and th e Management Module in the BladeCenter T chassis are separate comp onen ts. The front of the Management Module o nly features the LEDs for displaying status. A l[...]

  • Page 194

    Chapter 8 : Device Management 185 Blade chassis Required/recommended action Slot, not by Name. iKV M may not work correctly if t his is not done.  Do not designate any slots for scan operations in the iKVM GUI Setup Scan menu. iKVM may not work correctly ot herwise.  Do not designate any slots for broad cast keyboard/mouse operations in the i[...]

  • Page 195

    Chapter 8 : Device Management 186 Blade chassis Required/recommended action management module.  The SSH port configured on t he blade chassis mana gement mo dule and the port numb er entered on the Port Configuration page must match. IBM KX2 Virtual Media  Raritan KX II virtual media is supported only on IBM BladeCenter ® Models H and E. Thi[...]

  • Page 196

    Chapter 8 : Device Management 187 Configuring USB Profiles (Port Page) You choose the available USB profile s for a port in the Select USB Profiles for Port section of the Port page. The USB prof iles chosen in the Port page become the prof iles available to the user in VKC when connecting to a KVM target server from the port. The default is t he W[...]

  • Page 197

    Chapter 8 : Device Management 188  Ctrl-Click to select several discontin uous profiles. 2. Click Add. The selected profiles ap pear in the Selected list. These are the profiles that can be used for the KVM target s erver connected to the port. To specify a preferred US B profile: 1. After selecting the availabl e profiles for a port, choo se on[...]

  • Page 198

    Chapter 8 : Device Management 189 2. Click Remove. The select ed profiles appear in the A vailable list. These profiles are no long er available for a KVM tar get server connected to this port. To apply a profile selection to multiple ports: 1. In the Apply Selected P rofiles to Other Ports sectio n, select the Apply checkbox for each K VM port you[...]

  • Page 199

    Chapter 8 : Device Management 190 Configuring KX II Local Port Settin gs From the Local Port Settings pa ge, you can customize many settings for the KX II Local Console in clu ding keyboard, hot key s, video switching delay, power save mode, local user interface resoluti on settings, and local user authentication. F urther, you can change a USB pro[...]

  • Page 200

    Chapter 8 : Devic e Management 191 Note: If you are using KX2-832 an d KX2-864 as tiered devices, you must connect them t o the base KX II via the extended loc al port. Note: If you connect a Paragon d ev ice to the KX2-832 and KX2- 864 extended local port, you must use the remote client to change the USB profile. 4. If you are using the tiering fe[...]

  • Page 201

    Chapter 8 : Device Management 192 Hot key: Take this action: Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key Press the left Alt key twice quickly Double Click Left Shift key Press the left Shift key twic e quickly Double Click Left Ctrl key Press the left Ctrl[...]

  • Page 202

    Chapter 8 : Device Management 193  Select the "Ignore CC managed m ode on local port" checkbox if you would like local user a ccess to the KX II even when the device is under CC-SG management. Note: If you initially choose not to ignore CC Manage m ode on the local port but later want local port access, you will ha ve to remove the dev[...]

  • Page 203

    Chapter 8 : Device Management 194 KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two loca l port options: the standard local port and the extended local port. Each of these port options is enabled and disabled f rom the Remote Console on t he Port Configuration page or from the Local Console [...]

  • Page 204

    195 In This Chapter Security Settings .................................................................................... 195 Configuring IP Access Cont rol .............................................................. 205 SSL Certificates ..................................................................................... 207 Security Banner ..[...]

  • Page 205

    Chapter 9 : Security Management 19 6 To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, yo u can specify restrictions fo r single login, password aging, and the logging o ut idle users. Limitation Description Enable single login limitation When selected, only one lo gin per user name is allowed at any[...]

  • Page 206

    Chapter 9 : Security Management 197 Limitation Description Enter the number of days aft er which a password change is required. The de fault is 60 days. Log out idle users, After (1-365 minutes) Select the "Log off idle user s" checkbox to automatically disconnect us ers after the amount of time you specify in the "A fter (1-365 minu[...]

  • Page 207

    Chapter 9 : Security Management 198 Strong Passwords Strong passwords provide more secure local authenti ca tion for the system. Using strong password s, you can specify the format of valid KX II local passwords such as minimum and maximum le ngth, required characters, and password history retention. Strong passwords require user-created passwords [...]

  • Page 208

    Chapter 9 : Security Management 199 User Blocking The User Blocking options sp ecify the criteria by whi ch users are blocked from accessing the system aft er the specified number of un successful login attempts. The three options are mutu ally exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number[...]

  • Page 209

    Chapter 9 : Security Management 200 Option Description Timer Lockout Users are denied access to the system for the specified amount of time af ter exceeding the specified number of unsucces sful login attempts. When selected, the following f ields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will b e lo[...]

  • Page 210

    Chapter 9 : Security Management 201 Encryption & Share Using the Encryption & S hare settings you can specif y the type of encryption used, PC and V M share modes, and the ty pe of reset performed when the KX II Reset button is pressed. WARNING: If you select an enc ryption mode that is not supported by your browser, you will not be able to[...]

  • Page 211

    Chapter 9 : Security Management 202 Encryption mode Description a National Institute of S tandards and Technology specification fo r the encryption of electronic data. 256 is the ke y length. When AES -256 is specified, be certain that y our browser supports it, other wise you will not be able to connect. See Checking Your Browser for AES Encrypt i[...]

  • Page 212

    Chapter 9 : Security Management 203 Local device reset mode Description Enable Local Factory Reset (default) Returns the KX II dev ice to the factory defaults. Enable Local Admin Password Reset Resets the local administrator pa ssword only. The password is reset to raritan. Disable All Local Resets No reset action is taken. Note: When using the P2C[...]

  • Page 213

    Chapter 9 : Security Management 204 Enabling FIPS 140-2 For government and other high se curity environments, enabling FIPS 140 -2 mode may be desirable. The KX II uses an embedded FIPS 140 -2-validated cryptograp hic module running on a Linux ® platform per FIPS 140-2 Implementation Guida nce section G.5 guideline s. Once this mode is enabled, th[...]

  • Page 214

    Chapter 9 : Security Management 205  FIPS 140-2 should be enabled on t he client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administr ative Tools > Local Secu rity Policy to open the Local Security S ettings dialog. 2. From the navigation tree, s elect Select Local Policies > S[...]

  • Page 215

    Chapter 9 : Security Management 206 To add (append) rules: 1. Type the IP address and s ubnet mask in the IPv4/ Mask or IPv6/Prefix Length field. Note: The IP address sho uld be entered using CID R (Classless Inter-Domain Routing notat ion, in which the first 24 bits are used as a network address). 2. Choose the Policy from the drop-do wn list. 3. [...]

  • Page 216

    Chapter 9 : Security Management 207 3. You are prompted to confi rm the deletion. Click OK. SSL Certificates The KX II uses the Secure Soc ket Layer (SSL) protocol for any encrypted network traffic betwee n itself and a connected client. When establishing a connection, the KX II has to identify itself to a client using a cryptographic certificate. [...]

  • Page 217

    Chapter 9 : Security Management 208 b. Organizational unit - This field is u se d for specifying to whi ch department within an organization the KX II belongs. c. Organization - The name o f the organization to which the K X II belongs. d. Locality/City - The city where t he organization is locate d. e. State/Province - The state or pr ovince where[...]

  • Page 218

    Chapter 9 : Security Management 209 Note: The CSR and the private key f ile are a matched set and should be treated accordingly. If the sig ned certificate is not matched with the private key used to gen erate the original CSR, t he certificate will not be useful. This applies to uploading and downloa ding the CSR and private key files. After compl[...]

  • Page 219

    Chapter 9 : Security Management 210 4. If needed, change the banner titl e. This information will be displayed to users as part of the banner. Up to 64 characters ca n be used. 5. Edit the information in the Restri cted Services Banner Message text box. Up to 6000 characte rs can be entered or uploade d from a text file. To do this, do one of the f[...]

  • Page 220

    211 In This Chapter Audit Log ................................................................................................ 211 Device Information ................................................................................. 212 Backup and Restore .............................................................................. 213 USB Profile [...]

  • Page 221

    Chapter 10 : Maintenance 212 Device Information The Device Information pa ge provides detailed info rmation about your KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Te chnical Support. To view information abo ut your KX II and CIMs:  Choose Maintenance > Dev ice Information. The Device Inform[...]

  • Page 222

    Chapter 10 : Maintenance 213 Backup and Restore From the Backup/Restore page, you can backup and resto re the settings and configuration for your KX II. In addition to using backup and re store for business continuity pur poses, you can use this featu re as a time-saving mechanism. For ins tance, you can quickly provide access to your team from ano[...]

  • Page 223

    Chapter 10 : Maintenance 2 14 If you are using Internet Expl orer 6 or higher, to backup y our KX II: 1. Click Backup. A File Downl oad dialog appears that co ntains an Open button. Do not click Open. In IE 6 and higher, IE is used as the default application t o open files, so you are prompted to open t he file versus save the file. To avoid this, [...]

  • Page 224

    Chapter 10 : Maintenance 215  Full Restore - A complete r estore of the entire system. Gene rally used for traditional backup and restore purposes.  Protected Restore - Everything is restored except device-specific information such as IP add ress, name, and so forth. With t his option, you can setup one KX II and copy the configuration t o mu[...]

  • Page 225

    Chapter 10 : Maintenance 216 USB Profile Management From the USB Profile Managem ent page, you can upload custo m profiles provided by Raritan t ech support. These profiles are designed to address the needs of your t arget server‟s configura tion, in the ev ent that the set of standard prof iles does not already address them. Raritan tech support[...]

  • Page 226

    Chapter 10 : Maintenance 217 As noted, you may delete a custom profile from the system while it is still designated as an active prof ile. Doing so will terminate any virtua l media sessions that were i n place. Handling Conflicts in P rofile Names A naming conflict between custom an d standard USB profiles may occur when a firmware upgrade is pe r[...]

  • Page 227

    Chapter 10 : Maintenance 218 3. Click the Upgrade button. You are prompted to confir m the upgrade. 4. Click OK to continue the upgrade. Progress bars are displayed during the upgrade. Upgrading tak es approximately 2 m inutes or less per CIM. Upgrading Firmware Use the Firmware Upgrade page t o upgrade the firm ware for your KX II and all attached[...]

  • Page 228

    Chapter 10 : Maintenance 219 6. Click Upload from the Firmware U pgrade page. Information about the upgrade and version n umbers is displayed for yo ur confirmation (if you opted to review CIM informatio n, that information is dis played as well): Note: At this point, conne cted users are logged out, and new login attempts are blocked. 7. Click Upg[...]

  • Page 229

    Chapter 10 : Maintenance 220 For information about upgradi ng the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Access Clients Guide . Note: Firmware upgrades are n ot supported via modem . Note: If you are using a tier ed configuration in which a base KX II device is used to access multiple ot[...]

  • Page 230

    Chapter 10 : Maintenance 221 Upgrade History The KX II provides information about upgrades performed on t he KX II and attached CIMS. To view the upgrade history :  Choose Maintenance > Upgra de History. The Upgrade History page opens. Information is provided abo ut the KX II upgrade(s) tha t have been run, the final status of the upgrade, th[...]

  • Page 231

    Chapter 10 : Maintenance 222 To reboot your KX II : 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prom pted to confirm the action . Click Yes to proceed with the reboot.[...]

  • Page 232

    Chapter 10 : Maintenance 223 Stopping CC-SG Management While the KX II is under CC-SG man agement, if you try to access the device directly, y ou are notified that it the device is un der CC-SG management. If you are managing the KX II through CC-SG and connectivity between CC -SG and the KX II is lost after the specified timeout interval (typicall[...]

  • Page 233

    Chapter 10 : Maintenance 224 3. Click Yes to remove the device C C-SG management. Once CC-S G management has ended, a confi rmation will be displayed.[...]

  • Page 234

    225 In This Chapter Network Interface Page ......................................................................... 225 Network Statistics Page ......................................................................... 226 Ping Host Page ...................................................................................... 228 Trace Route to Host P[...]

  • Page 235

    Chapter 11 : Diagnostics 226 Network Statistics Page The KX II provides statistics abo ut your network interf ace. To view statistics about y our network interface: 1. Choose Diagnostics > Net work Statistics. The Network Statistics page opens. 2. Choose the appropriate op tion from the Options drop-down list:  Statistics - Produces a page si[...]

  • Page 236

    Chapter 11 : Diagnostics 227  Interfaces - Produces a pa ge similar to the one displayed here.  Route - Produces a page simila r to the one displayed here. 3. Click Refresh. The relevant inf or mation is displayed in the Result field.[...]

  • Page 237

    Chapter 11 : Diagnostics 228 Ping Host Page Ping is a network tool used to test whether a particul ar host or IP address is reachable acro ss an IP network. Using t he Ping Host page, you can determine if a targ et server or another KX II is accessible. To ping the host: 1. Choose Diagnostics > Pin g Host. The Ping Host page appears. 2. Type eit[...]

  • Page 238

    Chapter 11 : Diagnostics 229 Note: The host name cann ot exceed 232 characters in length. 3. Choose the maximum hops from the d ro p-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace r oute command is executed f or the given hostname or IP address and t he maximum hops. The o utput of trace route is displayed in the Result fie[...]

  • Page 239

    Chapter 11 : Diagnostics 230 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Techni cal Support. Device diagnostics downl oads the diagnostics info rmation from the KX II to the client machine. Two operation s can be performed on thi s page:  Execute a special diagnost ics script provi[...]

  • Page 240

    Chapter 11 : Diagnostics 231 a. Click the Save to File butt on. The File Download dialog open s. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed b y Raritan Technical Support .[...]

  • Page 241

    232 In This Chapter Overvi ew ................................................................................................ 232 Accessing the KX II Using CLI .............................................................. 233 SSH Connection to the KX II ................................................................ . 233 Logging In ............[...]

  • Page 242

    Chapter 12 : Command Line Interface (CLI) 233 Accessing the KX II Using CLI Access the KX II by using one of the following methods:  SSH (Secure Shell) via IP connection A number of SSH clients a re available and can be obt ained from the following locations:  Putty - http://www.chiark.green end.org.uk/~sgtatham/ putty/ http://www.chiark.gree[...]

  • Page 243

    Chapter 12 : Command Line Interfac e (CLI) 234 SSH Access from a UNIX/ Linux Workstation To open an SSH session from a UN IX ® /Linux ® w orkstation and log in as the user admin, enter the f ollowing command: ssh - l admin 192.168.30.222 The Password prompt app ears. See Logging In (on page 234 ). Note: Both IPv4 and IPv6 a ddresses are supported[...]

  • Page 244

    Chapter 12 : Command Line Interface (CLI ) 235 After reviewing the followin g Navigation of the CLI (on page 2 35 ) section, perform the Initial Configuration tasks. Navigation of the CLI Before using the CLI, it is important to understand C LI navigation and syntax. There are also som e keystroke combinations that simplify CLI use.[...]

  • Page 245

    Chapter 12 : Command Line Interfac e (CLI) 236 Completion of Command s The CLI supports the completion of partially-entered comm ands. After entering the first few character s of an entry, press the Tab k ey. If the characters form a unique match, the CLI will complete the entry.  If no match is found, the C LI displays the valid entries for t h[...]

  • Page 246

    Chapter 12 : Command Line Interface (CLI) 237 Commands Description help Display an overview of the CLI syntax. quit Places the user back one l evel. logout Logs out the user session. Initial Configuration Using CLI Note: These steps, which us e the CLI, are optional since the same configuration can be done via K VM. See Getting Started (on pa ge 14[...]

  • Page 247

    Chapter 12 : Command Line Interfac e (CLI) 238 Setting Network Parame ters Network parameters are conf igured using the interface command. admin > Config > Network > interface ipauto none ip 192.168.151.12 mask 255.255.255.0 gw 192.168.151.1 mode auto When the command is accepted, the device automatically dro ps the connection. You must re[...]

  • Page 248

    Chapter 12 : Command Line Interface (CLI) 239 Command Description history Display the current session's command line history. listports List accessible ports. logout Logout of the current CLI ses sion. top Return to the root menu. userlist List active user sessions.  Enter admin > config > network . Command Description help Display ov[...]

  • Page 249

    Chapter 12 : Command Line Interfac e (CLI) 240 Configuring Network The network menu comm ands are used to configure the KX II network adapter. Commands Description interface Configure the KX II device network interface. name Network name configuratio n ip v6 Set/get IPv6 network para meters. Interface Command The Interface command is used to config[...]

  • Page 250

    Chapter 12 : Command Line Interface (CLI) 241 Name Command The name command is used to config ure the network name. The syntax of the name is: name [devicename <devicename>] [hostname <hostname>] Device name configuration devicename <devicename> Device Name hostname <hostname> Preferred host name (DHCP only) Name Command Exa[...]

  • Page 251

    242 In This Chapter Overview ................................................................................................ 242 Using the KX II Local Console ............................................................... 242 KX II Local Console Interface ................................................................ 243 Security and Authentica[...]

  • Page 252

    Chapter 13 : KX II Local Consol e 243 KX II Local Console Interface When you are located at t he server rack, the K X II provides standard KVM management and ad ministration via the KX II Local C onsole. The KX II Local Console provides a di rect KVM (analog) connection to your connected servers; the perf ormance is exactly as if you were directly [...]

  • Page 253

    Chapter 13 : KX II Local Cons ole 244 Local Console Smart Card Access To use a smart card to acces s a server at the Local Con sole, plug a USB smart card reader into the KX II using one of the USB ports located on the KX II. Once a smart ca rd reader is plugged in or unplugged from the KX II, the KX II autodetects it . For a list of supported smar[...]

  • Page 254

    Chapter 13 : KX II Local Consol e 245 To update the Card Read ers Detected list:  Click Refresh if a new smart card has been mounted. The C ard Readers Detected list will be refr eshed to reflect the newly added smart card reader. Smart Card Access in KX2 8 Dev ices If you are using a smart card re ader to access a serve r from the Local Console[...]

  • Page 255

    Chapter 13 : KX II Local Cons ole 246 2. In the Select Profile To Use f ield, select the profile to use from among those available for the port. 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field. Available Resolutions The KX II Local Console provides the following resolutions to supp ort vari[...]

  • Page 256

    Chapter 13 : KX II Local Consol e 247 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Acce ss page opens. This page lists all of the KX II ports, the connected K VM target servers, and their status and availa bility. Also displayed on the Port Acces s page are blade cha ssis that have been config[...]

  • Page 257

    Chapter 13 : KX II Local Cons ole 248 To use the Port Access p age: 1. Log in to the Local Console. The KVM target servers are init ially sorted by Port Number. You can change the display to sort on any of the columns.  Port Number - Numbered f ro m 1 to the total number o f ports available for the KX II devi ce. Note that ports conne cted to po[...]

  • Page 258

    Chapter 13 : KX II Local Consol e 249 2. Click View by Port or View by Group to switch betwe en views.  In addition to the Port Number, Port Name, Status, T ype, and Availability, a Group column is als o displayed on the View by Group tab. This column contains the p ort groups that are available. 3. Click the Port Name of the target server you w[...]

  • Page 259

    Chapter 13 : KX II Local Cons ole 250 Blade chassis Connect key action Key sequence example Access a port from the local port GUI Access port 5, slot 2:  Press Left ALT > Press a nd Release 5 > Press and Release - > Press a nd Release 2 > Release Left ALT Switch between ports Switch from target port 5, slot 2 to port 5, slot 11:  [...]

  • Page 260

    Chapter 13 : KX II Local Consol e 251 Sun key Local port key combination Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KPAD - Stop No key combination Power No key combination Accessing a Target Server To access a target serv er : 1. Click the Port Name of the target you want to access. The Port Action Menu is displayed. 2.[...]

  • Page 261

    Chapter 13 : KX II Local Cons ole 252 Configuring KX II Local Console Local Port Settings From the Local Port Settings pa ge, you can customize many se ttings for the KX II Local Console in clu ding keyboard, hot key s, video switching delay, power save mode, local user interface resoluti on settings, and local user authentication. Note: Only users[...]

  • Page 262

    Chapter 13 : KX II Local Consol e 253 3. Choose the local port hot key. The local port hot key is used to return to the KX II Local Console interfa ce when a target serv er interface is being viewed. The default is to Double Click S croll Lock, but you can select any key combinatio n from the drop-down list: Hot key: Take this action: Double Click [...]

  • Page 263

    Chapter 13 : KX II Local Cons ole 254  None. There is no authenti cation for Local Console ac cess. This option is recommended for secur e environments only.  Select the "Ignore CC managed m ode on local port" checkbox if you would like local user a ccess to the KX II even when the device is under CC-SG management. Note: If you init[...]

  • Page 264

    Chapter 13 : KX II Local Consol e 255 Configuring KX II Local Port Settings from the Local Console The standard local port an d the extended local port can be configured from the Remote Console on t he Port Configuration page or from the Local Console on the Local Port Settings page. See Configuring KX I I Local Port Settings (on p age 190) for det[...]

  • Page 265

    Chapter 13 : KX II Local Cons ole 256  Timeout (seconds) 1. Click Reset to continue. You will be prompted to confirm the f actory reset because all network sett ings will be permanently lost. 2. Click OK button proceed. Up on completion, the K X II device is automatically restarted. Resetting the KX II Using the Reset Button On the back panel of[...]

  • Page 266

    257 In This Chapter Physical Specifications ................................ .......................................... 257 Environmental Requireme nts ................................................................ 259 Supported Operating Systems ( Clients) ................................................ 260 Supported CIMs and Oper ating Systems[...]

  • Page 267

    Appendix A : Specifications 258 Part number Line item description UP C code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DKX2- 132 32 -Port KX II with 1-user network access and local port, virtual media, dual power 785813624079 Dual power 100/240 V 50/60 Hz 0.6A 26 Watts 9.0 lbs 1.75" x 17.3" x 11.4&[...]

  • Page 268

    Appendix A : Specifications 259 KX2-8 Specifications Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DKX2- 83 2 32 -Port KX II with 8-user network access, standard local port, extended local port, virtual media, dual power 0785813620019 Dual power 100/240 V 50/60 Hz 1A ([...]

  • Page 269

    Appendix A : Specifications 260 Operating Shock N/A Supported Operating Systems (Clients) The following operating system s ar e supported on the V irtual KVM Client and Multi-Platform Client ( MPC): Client operating sy stem Virtual media (VM) supp ort on client Windows 7 ® Yes Windows XP ® Yes Windows 2008 ® Yes Windows Vista ® Yes Windows 2000[...]

  • Page 270

    Appendix A : Specifications 261 Mode Operating system Browser Windows Server 2003 ®  Internet Explorer 6.0 SP1++, IE 7, IE 8  Firefox 1.06 - 3 Windows Vista ®  Internet Explorer 7.0 or 8. 0 Windows 7 ®  Internet Explorer 7.0 or 8.0  Firefox 1.06 - 3 Windows x64 64 -bit mode Windows XP 64bit OS, 32bit browsers:  Internet Explore[...]

  • Page 271

    Appendix A : Specifications 262 Supported Paragon CIMs Operating system and serial devices ( where applicable) Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse mode  P2CIM- PS2  Windows XP ®  Windows 2000 ®  Windows 2000 Server ®  Windows 2003 Server ®  Windows Vista ®  Windows 7 ®  Windows 2008 [...]

  • Page 272

    Appendix A : Specifications 263 Supported Paragon CIMs Operating system and serial devices ( where applicable) Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse mode  UKVMPD (version 0C4) Note: Version 0C5 does not work with KX II.  Windows XP  Windows 2000  Windows 2000 Server  Windows 2003 Server  Windows V[...]

  • Page 273

    Appendix A : Specifications 264 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse m ode  DCIM- PS2  Windows XP  Windows 2000  Windows 2000 Server  Windows 2003 Server  Windows Vista  Windows 7  Windows 2008  Red Hat Enterprise Linux 4 ES  Red Hat Enterpr[...]

  • Page 274

    Appendix A : Specifications 265 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse m ode  DCIM-USBG2  Windows XP  Windows 2000  Windows 2000 Server  Windows 2003 Server  Windows Vista  Windows 7  Windows 2008  Red Hat Enterprise Linux 4 ES  Red Hat Enterp[...]

  • Page 275

    Appendix A : Specifications 266 Supported KX II D2CIMs Target server and remote rack PDUs (where applicable) Virtual media Ab solute Mouse mode Intelligent Mouse mode Standard Mouse mode  D2CIM-VUSB  Windows XP  Windows 2000  Windows 2000 Server  Windows 2003 Server  Windows Vista  Windows 7  Windows 2008  Open SUSE 10, 1[...]

  • Page 276

    Appendix A : Specifications 267 Supported Operating Systems and CIMs (KVM Target Servers) In addition to the new D2CIMs, most Dominion CIMs are supported. The following table displays the supported target server o perating systems, CIMs, virtual media, and mous e modes: Note: D2CIM-VUSB is not suppo rted on Sun ™ (Solaris ™ ) tar gets. Supporte[...]

  • Page 277

    Appendix A : Specifications 268 Target server Supported CIMs Mouse modes Windows 2003 Server ® Windows Vista operating system Red Hat ® Enterprise Workstation 3.0, 4.0 and 5.0 DCIM- PS2 DCIM-USB DCIM-USB G2 D2CIM-VUSB (excluding Red Hat Enterprise Workstation 3.0) SUSE Linux Professional 9.2 and 10 DCIM- PS2 DCIM-USB DCIM-USB G2 D2CIM-VUSB Fedora[...]

  • Page 278

    Appendix A : Specifications 269 Legend:  VM - Virtual Media (D2CIM-VUSB only)  AM: Absolute Mouse Sync hronization (D2CIM-VUSB only)  IM: Intelligent Mouse Mode  SM: Standard Mouse Mode  : Supported The DCIM-USB G2 provid es a small slide switch on t he back of the CIM. Move the switch to P for PC-ba sed USB KVM target servers; mov e[...]

  • Page 279

    Appendix A : Specifications 270 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) UPC code Interface Module for Remote Rack PDUs 0.6" D2CIM-VUSB- 32PAC Bulk pack of 32 D2CIM-VUSB 6.4 lb (1.3" x 3.0" x 0.6")*32 8.01 lb 21.65"x12.20 "x4.33" 785813[...]

  • Page 280

    Appendix A : Specifications 271 Certified Modems  USRobotics ® 56K 5686E  ZO OM ® v90  ZOOM v92  USRobotics Sportster ® 56K  USRobotics Courier ™ 56K Devices Supported by the KX2-832 and KX2-864 Extended Local Port The extended local port suppo rts attachment from th e following devices:  KX2 -832 and KX2-864.  Paragon II [...]

  • Page 281

    Appendix A : Specifications 272 Note: Due to the multiplicity of server manufacturers and t ypes, OS versions, video drivers, and so f orth and the subjective nature of video quality, Raritan cannot guar antee performance across all distances in all environments. See the Supported Video Resolu tions (on page 272) for the vide o resolutions supporte[...]

  • Page 282

    Appendix A : Specifications 273 Resolutions 640x350 @85Hz 1024x768 @75Hz 640x400 @56Hz 1024x768 @90Hz 640x400 @84Hz 1024x768 @100Hz 640x400 @85Hz 1152x864 @60Hz 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz 1152x900 @76Hz 720x400 @84[...]

  • Page 283

    Appendix A : Specifications 274 Supported Keyboard Languages The KX II provides keyboard s upport for the languages listed in t he following table. Note: You can use the keyboard for Chinese, Japanese, and Korean for display only; local language input is not supported at this time for the KX II Local Console functions. For m ore information about n[...]

  • Page 284

    Appendix A : Specifications 275 Language Regions Keyboard layout Spanish Spain and most Spanish speaking countries Spanish Portuguese Portugal Portuguese Smart Card Readers Supported and Unsuppo rted Smart Card Readers External, USB smart card re aders are supported. Supported Smart Card Readers Type Vendor Model Verified USB SCM Microsystems SCR33[...]

  • Page 285

    Appendix A : Specifications 276 This table contains a list of read ers that Raritan has tested a nd found not to work with the Raritan d evice, therefore they are unsupported. If a smart card reader does not appea r in the supported smart ca rd readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function w[...]

  • Page 286

    Appendix A : Specifications 277 Windows XP ® operating system t argets must be running Win dows XP SP3 in order to use smart cards with the KX II. If you are working with .NET 3.5 in a Windows XP env ironment on the target server, you must be using SP1. Linux Targets If you are using a Linux ® target, the following requirements mu st be met to us[...]

  • Page 287

    Appendix A : Specifications 278 Fedora ® Core 10 pcsc-lite-1.4.102.3.fc10.i386  Create a Java ™ Library Link A soft link must be create d to the libpcsclite.so after upgra ding RHEL 4, RHEL 5 and FC 10. Fo r example, ln – s /usr/lib/libpcsclite. so.1 /usr/lib/libpcsclite.so, assu ming installing the packag e places the libraries in /usr/lib[...]

  • Page 288

    Appendix A : Specifications 279 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS P ort Settings (on page 140). B y default, all requests recei ved by the KX II via HTTP (port 80) are automatic ally forwarded to HTTPS for complete security. The KX II respond s to Port 80 for user convenien ce, relieving us ers[...]

  • Page 289

    Appendix A : Specifications 280 Network Speed Settings KX II net work speed setting Network switch port setting Auto 1000/Full 100/Full 100/Half 10/Full 10/Ha lf Auto Highest Available Speed 1000/Full KX II: 100/Full Switch: 100/Half 100/Half KX II: 10/Full Switch: 10/Half 10/Half 1000/Full 1000/Full 1000/Full No Communica tion No Communicat ion No[...]

  • Page 290

    Appendix A : Specifications 281 communicate, but collision s will occur Per Ethernet specification, these sh ould be “no communication,” howeve r, note that the KX I I behavior deviates from expected be havior Note: For reliable network communication, config ure the KX II and the LAN switch to the same LAN Int erface Speed and Duplex. For examp[...]

  • Page 291

    282 Note: The procedures in thi s chapter should be attem pted only by experienced users. In This Chapter Returning User Group Inf ormation ........................................................ 282 Setting the Registry to Permit Write Operations to the Schema ........... 283 Creating a New Attribute ..............................................[...]

  • Page 292

    Appendix B : Updating the LDAP Sc hema 283 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller t o write to the schema, you mu st set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory ® Schema root no de in the left pane of the window a[...]

  • Page 293

    Appendix B : Updating the LDAP S chema 284 3. Click New and then choo se Attribute. When the warni ng message appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciusergroup in the C ommon Name field. 5. Type rciusergroup in the L DAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in t he Unique x5000 Object ID field. 7[...]

  • Page 294

    Appendix B : Updating the LDAP Sc hema 285 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from th e menu. The user Properti es dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.[...]

  • Page 295

    Appendix B : Updating the LDAP S chema 286 6. Choose rciusergroup f rom the Select Schema O bject list. 7. Click OK in the Select Sch ema Object dialog. 8. Click OK in the User Prope rties dialog. Updating the Schema Cache To update the schema ca che: 1. Right-click Active Directory ® Schema in the left pane of the window and select Reload the Sch[...]

  • Page 296

    Appendix B : Updating the LDAP S chema 287 3. Go to the directory where the suppo rt tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain. 5. In the left pane of the window, select the CN=Users folder.[...]

  • Page 297

    Appendix B : Updating the LDAP S chema 288 6. Locate the user name whose p roperties you want to a djust in the right pane. Right-click the user name and select Propertie s. 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attrib utes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type t[...]

  • Page 298

    289 In This Chapter Overview ................................................................................................ 289 Java Runtime Environment (JRE) ......................................................... 289 IPv6 Support Notes ............................................................................... 290 Keyboards ..............[...]

  • Page 299

    Appendix C : Informational Notes 290 IPv6 Support Notes Java Java ™ 1.6 supports IPv6 for the follo wing:  Solaris ™ 8 and higher  Linux ® kernel 2.1.2 and higher (RedH at 6.1 and higher) Java 5.0 and above supports the I Pv6 for the following:  Solaris 8 and higher  Linux kernel 2.1.2 and higher (kern el 2.4.0 and higher recomm en[...]

  • Page 300

    Appendix C : Informational Notes 291 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux ® Clients Only) The Virtual KVM Client an d the Multi-Platform Client (MPC ) do not process the key combinati o n of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux clients. To obtain the caret sy mbol: From a French keyboa[...]

  • Page 301

    Appendix C : Informational Notes 292 Tilde Symbol From the Virtual KVM Clie nt and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde sy mbol: Create a macro consisting of the following commands:  Press right Alt.  Press 2.  Release 2.  Rel[...]

  • Page 302

    Appendix C : Informational Notes 293 Note: The Keyboard Indica tor should be used on Linu x systems using Gnome as a desktop envir onment. When using a Hungarian keyboa rd from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double A cute work only with JRE 1.6. There are several methods that ca n be used to set the[...]

  • Page 303

    Appendix C : Informational Notes 294 Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality , Raritan recommends using t he following cable lengths and video resolutions when y ou are connecting to Dell ® blade chassis from the KX II: Cable length Video resolution 50 ft. 1024x768x60 50 ft. 1280x1024x60 30 ft. 1600x1200[...]

  • Page 304

    Appendix C : Informational Notes 295 Resolving Issues w ith Firefox Freezing w hen Using Fedora If you are accessing Fi refox ® and are using a Fedora ® server, Firefo x may freeze when it is opening. To resolve this issue, i ns tall the libnpjp2.so Java ™ plug-in on the serv er. Video Modes and Resolutions SUSE/VESA Video Mode s The SuSE X.org[...]

  • Page 305

    Appendix C : Informational Notes 296 USB Ports and Profiles VM -CIMs and DL360 USB Ports HP ® DL360 servers have o ne USB port on the back o f the device and another on the front of the device. With the DL360, bo th ports cannot be used at the same time. Th erefore, a dual VM-CIM ca nnot be used on DL360 servers. However, as a workaround, a USB2 h[...]

  • Page 306

    Appendix C : Informational Notes 297 USB profile help appears i n the USB Profile Help window. Fo r detailed information about specifi c USB profiles, see Available USB Pro files (on page 102 ). Raritan provides a standard selection of USB configuration profiles for a wide range of operating sy stem and BIOS level server implementations. These are [...]

  • Page 307

    Appendix C : Informational Notes 298 Changing a USB Profile when U sing a Smart Card Reader There may be certain circumsta nces under which y ou will need to change the USB profile for a target server. For example, you may need to change the connection speed t o "Use Full Speed fo r Virtual Media CIM" when the target has p roblems with th[...]

  • Page 308

    Appendix C : Informational Notes 299 Windows 2000 Composit e USB Device Behav ior f or Virtual Media The Windows 2000 ® operat ing system does not sup port USB composite devices, like Raritan‟ s D2CIM-V USB, in the same manner a s non -composite USB devices. As a result, the “Safely Remove Hardware” system tray icon does not appear for drive[...]

  • Page 309

    Appendix C : Informational Notes 300 Accessing Virtual Media on a Windows 2000 S erver Using a D2CIM-VUSB A virtual media local drive c annot be accessed on a Windows 2000 ® server using a D2CIM-VU SB. Target BIOS Boot Tim e with Virtual Media The BIOS for certain targets may take longer to boot if m edia is mounted virtually at the target. To sho[...]

  • Page 310

    Appendix C : Informational Notes 301 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do n ot use the CC-SG proxy mode if you are pla nning to use the Multi-Platfo rm Client (MPC). Moving Between Ports of the KX II If you move a between po rts of the same KX II and resume management within one minute, CC-SG may display an error m[...]

  • Page 311

    302 In This Chapter General Questions ................................................................................. 303 Remote Access ..................................................................................... 305 Universal Virtual Media .......................................................................... 307 USB Profiles ......[...]

  • Page 312

    Appendix D : FAQs 303 General Questions What is the KX II? The KX II is a second gene ration digital KVM (keyboa rd/video/ mouse) switch that enables one, two, four or eight IT administrators to access and control 8, 16, 32 or 64 servers over the network wi th BIOS-level functionality. The KX II is completely hardware and op erating system independ[...]

  • Page 313

    Appendix D : FAQs 304 Will my existing KX I CIM s work with the KX II switches? Yes, existing KX I CIM s will work with the KX II switch. In addition, select Paragon CIMs will work with t he KX II. This provides an easy migration to the KX II from Paragon I customers who wish to switch t o KVM -over-IP. However, you may want to consider the D2CIM-V[...]

  • Page 314

    Appendix D : FAQs 305 Remote Access How many users can re motely access servers on each KX II? The KX II models offer remote connections for up to eight us ers per user channel to simultaneously access an d control a unique target serve r. For one -channel devices like t he DKX2-116, up to eight re mote users can access and control a single t arget[...]

  • Page 315

    Appendix D : FAQs 306 100Mbps Theoretical 100Mbit network speed 0.05 seconds 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network speed .4 seconds 6Mbps Likely practical 10Mbit network speed .8 seconds 512Kbps Cable modem download speed (typical) 8 seconds How do I access serv ers connected to the KX II i f t[...]

  • Page 316

    Appendix D : FAQs 307 Universal Virtual Media What KX II models support v irtual media? All of the KX II models support virtual media. It is available sta ndalone and through Raritan's CommandCent er Secure Gateway, Raritan 's centralized management unit. What types of virtual medi a does the KX II support? The KX II supports the follo wi[...]

  • Page 317

    Appendix D : FAQs 308 USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services such as vir tual media. The USB Profile tailors the KX II‟s USB interface to the serv er to accommodate these server specific characteristics. Why would I use a USB profile? USB Profiles are most often r[...]

  • Page 318

    Appendix D : FAQs 309 Do I need a special CIM t o use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan provide USB profiles for other target server configurations? Raritan will provide new USB profiles to suit customer needs. As these profiles become available, they will be included in firmware up grades.[...]

  • Page 319

    Appendix D : FAQs 310 Bandwidth and KVM- over -IP Performance How is bandwidth used i n KVM-over-IP systems? The KX II offers next generat ion KVM-over-IP technology – the very best video compression availabl e. Raritan has received numerous technical awards confirming its high v ideo quality transmissions and t he low bandwidth utilization. The [...]

  • Page 320

    Appendix D : FAQs 311 Unlike KX I, the Noise Filte r parameter does not generally have a large role in reducing bandwidth or improving performa nce. How much band w idth does KX II use for common ta sks? Bandwidth primarily depends on the u ser's task and actions. The more the server's video screen changes, the more bandwi dth is utilized[...]

  • Page 321

    Appendix D : FAQs 312 Qu ickTime video #2 1500 - 2500 KB/s 400 - 550 KB/s 200 - 350 KB/s With the reduced bandwidt h settings, bandwidth is re duced significantly for virtually all tasks. With the 15 bit color setting, perceived pe rformance is similar to the default parameter s. Further, bandwidth reductions are possible with additional changes in[...]

  • Page 322

    Appendix D : FAQs 313 Please note that these bandwidth figures are only examples an d may vary from those seen in yo ur environment due to many factors. How can I reduce band w idth? The KX II provides a variety of settings in our remote client s to optimize bandwidth and performance. The default settings will provide a n at -the-rack level of perf[...]

  • Page 323

    Appendix D : FAQs 314 It depends on the bandwidt h and latency of the I nternet connection between your remote client and the KX II. With a cable modem or high speed DSL connection, yo ur performance can be ve ry similar to a LAN/WAN connection. For lower speed links, use the suggestions above to improve performance. I have a high band w idth envir[...]

  • Page 324

    Appendix D : FAQs 315 Ethernet and IP Networking Does the KX II offer dual gi gabit Ethernet ports to prov ide redundant fail-over? Yes. The KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should t he primary Ethernet port (or the switch/router to which it is con nected) fail, the KX II will failover to the se[...]

  • Page 325

    Appendix D : FAQs 316 How many TCP ports must be ope n on my firewall in order to enable network access t o the KX II? Are these po rts configurable? Only one. The KX II protect s network security by only requiring access to a single TCP port to operat e. This port is completely configurable for additional security. Note that, of course, to use the[...]

  • Page 326

    Appendix D : FAQs 317 IPv6 Networking What is IPv6? IPv6 is the acronym for “Int ernet Protocol Version 6”. IPv6 is the “next generation” IP protocol which will re place the current IP Vers ion 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses . It also improves IPv4 in areas such a[...]

  • Page 327

    Appendix D : FAQs 318 Where can I get more information on IPv6? See www.ipv6.org for general inf ormation on IPv6. The KX II User Guide describes the KX II‟s support for IPv6.[...]

  • Page 328

    Appendix D : FAQs 319 Servers Does the KX II depend on a Windows server to operat e? Absolutely not. B ecause users depend on the KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructu re to fix problems), the KX II is designed to be completely independent from any external server.[...]

  • Page 329

    Appendix D : FAQs 320 Blade Servers Can I connect blade servers to t he KX II? Yes. The KX II supports popula r blade server models from the leading blade server manufacturer s: HP ® , IBM ® and Dell ® . Which blade servers are suppor ted? The following models are suppo rted:  Dell ® PowerEdge ® 1855, 1955 and M10 00e  HP BladeSystem c30[...]

  • Page 330

    Appendix D : FAQs 321 For KX II's, Raritan recommend s connecting up to tw o times the number of remote connections sup ported by the device. For example, with a KX2 -216 with two remote channels, we recommend connecting u p to 4 blade server chassis. You ca n of course connect indiv idual servers to the remaining server ports. I'm an SMB[...]

  • Page 331

    Ap pendix D : FAQs 322 Installation Besides the device itself, what do I need to orde r from Raritan to install the KX II? Each server that connects to the KX II requires a Dominion o r Paragon Computer Interface Mod ule (CIM), an adapte r that connects directly to the keyboard, video, and m ouse ports of the server. What kind of Cat5 cablin g shou[...]

  • Page 332

    Appendix D : FAQs 323 Servers connected to the KX II do not require any software agents to be installed, because the KX II connects directly via hardware t o servers' keyboard, video, and mouse ports. How many serv ers can be connected to each the KX II device? The KX II models range from 8, 16, or 32 server ports in a 1U chas sis to 64 server[...]

  • Page 333

    Appendix D : FAQs 324 Local Port Can I access my serv ers directly from the rack? Yes. At the rack, the KX II functions just like a tradition al KVM switch, allowing control of up to 64 serv ers using a single keyb oard, monitor, and mouse. Can I consolidate the loc al ports of multiple KX I I’s? Yes. You can connect the l ocal ports of multiple [...]

  • Page 334

    Appendix D : FAQs 325  If the external authenticatio n servers are unavailable, the KX II fails-over to its own interna l authentication database. The KX II has its own standalone a uthentication, enabling instant, out - of -the-box installation. If I use the local port to change t he name of a connected serv er, does this change propag ate to r[...]

  • Page 335

    Appendix D : FAQs 326 Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) What is the extended local por t? The Dominion KX2-832 and K X2-864 feature an extended local p ort. The KX II eight user model s have a standard local port , plus a new extended local port that extends t he local port, via C at5 cable, beyond the rack to a control[...]

  • Page 336

    Appendix D : FAQs 327 Power Control Does the KX II hav e a dual power option? All of the KX II models com e equipped with dual AC in puts and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then t he KX II will automatically switch to the other. Does the power supply used by the KX II automatically de[...]

  • Page 337

    Appendix D : FAQs 328 Does remote po w er control require any special server configuration? Some servers ship with default BIOS settings such that the server does not automatically restart af ter losing and regainin g power. For these servers, see the server‟s d ocumentation to chang e this setting. What happens w hen I recycle po wer to a server[...]

  • Page 338

    Appendix D : FAQs 329 Scalability How do I phy sically connect multiple KX II de vices together into one solution? To physically connect mult iple KX II devices together for c onsolidated local access, you can connect the local ports of multiple "tiered" (or "cascaded") KX II switche s to a "base" KX II using the "[...]

  • Page 339

    Appendix D : FAQs 330 For customers wanting stand-alone us age (without a cent ral management system), multiple KX II units still interoperate and scale together via the IP network . Multiple KX II switches ca n be accessed from the KX II web-based u ser interface and from the Multiplatform Client (MPC). Can I connect an existing anal og KVM s w it[...]

  • Page 340

    Appendix D : FAQs 331 Computer Interface Modules (CIMs) Can I use Computer Int erface Modules (CIMs ) from Raritan's analog matrix KVM s w itch, Paragon, with the KX II? Yes. Certain Paragon com puter interface modules (CIM s) may work with the KX II (check the Rarita n KX II release notes o n the website for the latest list of certified CIM s[...]

  • Page 341

    Appendix D : FAQs 332 Security Is the Dominion KX II FIPS 140 -2 Certified? The KX II 2.2.0 and later, and t he KSX II 2.3.0 and later, provides users with the option to use an embed ded FIPS 140-2-validated cryptogr aphic module running on a Linux platform per FIPS 140-2 impleme ntation guidelines. This cryptographic m odule is used for en cryptio[...]

  • Page 342

    Appendix D : FAQs 333 Yes, the KX II has admini strator-configurable, strong passwor d checking to ensure that user-created pas swords meet corporate and/or government standards and are resistant to brute force hackin g. If the KX II encryption mode is set to Auto, w hat level of encryption is achieved? The encryption level that is autone gotiated [...]

  • Page 343

    Appendix D : FAQs 334 Smart Cards and CAC Authentication Does the KX II support smart car d and CAC authentication? Yes, smart cards and DoD Comm on Access Card (CAC) a uthentication to target servers is support ed in release KX I I 2.1.10 and later, and KSX II 2.3.0 and later. What KX II models support smar t cards/CAC? All KX II models are supp o[...]

  • Page 344

    Appendix D : FAQs 335 Manageability Can the KX II be remotely managed and configured via web browser? Yes, the KX II can be com pletely configured remotely via web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) v er sion installed. Besides the initial setting o f the KX II's IP addr[...]

  • Page 345

    Appendix D : FAQs 336 Miscellaneous What is the KX II's default I P address? 192.168.0.192 What is the KX II's default user name and pass w ord? The KX II's default user name is admi n and the default password is raritan [all lower case]. Howeve r, for the highest level of security , the KX II forces the administrator to change the K[...]

  • Page 346

    337 A A. AC Power • 27 Absolute Mouse Mode • 72 Accessing a Targe t Server • 251 Accessing the KX II Using CLI • 233 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM- VU SB • 300 Active KVM Client (AKC) • 80 Adding a New User • 120 Adding a New User Grou p • 111, 120 Adding Attributes to the Class • 284 Adding , Dele[...]

  • Page 347

    Inde x 338 Connecting to Virtual Med ia • 97 Connection Information • 57 Connection Propertie s • 55 Create User Groups and User s • 35 Creating a New Attribute • 283 D D. Local Access Port (Loc al Video Display, Keyboard and Mouse) • 2 8 Default Login Information • 13 Dell Blade Chassis Configu r ation • 170 Dell Chassis Cable Leng[...]

  • Page 348

    Index 339 K Keyboard Language Preference ( Fedora Linux Clients) • 292 Keyboard Macros • 57 Keyboard Options • 57 Keyboards • 291 KX II Client Ap plications • 5 KX II Console Layout • 40 KX II Console Navigation • 42 KX II Help • 4 KX II Local Console • 242 KX II Local Console Factory Reset • 255 KX II Local Console Interface ?[...]

  • Page 349

    Index 340 R Rack PDU (Power Strip) O utlet Control • 84 RADIUS Communication Ex ch ange Specifications • 13 1 Rebooting • 221 Refreshing the Screen • 63 Related Documentation • 5 Relationship Between U sers and Groups • 111 Remote Access • 305 Remote Authentication • 34, 192, 253 Remote Client Requireme nts • 277 Remote Connection[...]

  • Page 350

    Index 341 SUSE/VESA Video Modes • 295 Switching Between KVM Target Servers • 53 T Target BIOS Boot Time wit h Virtual Media • 300 Target Server Connection Dista nce and Video Resolu tion • 271, 272 Target Server Requirement s • 276 TCP and UDP Ports Used • 278 Terminology • 10, 14 Tiering - Target Types, Supported CIM S and Tiering Co[...]

  • Page 351

    U.S./Canada/Latin Americ a Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 732- 764 -8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Beijing Monday - Friday [...]