Raritan Computer KX2-432 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Raritan Computer KX2-432 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Raritan Computer KX2-432, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Raritan Computer KX2-432 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Raritan Computer KX2-432. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Raritan Computer KX2-432 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Raritan Computer KX2-432
- Den Namen des Produzenten und das Produktionsjahr des Geräts Raritan Computer KX2-432
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Raritan Computer KX2-432
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Raritan Computer KX2-432 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Raritan Computer KX2-432 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Raritan Computer finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Raritan Computer KX2-432 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Raritan Computer KX2-432, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Raritan Computer KX2-432 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Dominion ® KX II KX2-116 KX2-132 KX2-216 KX2-232 KX2-416 KX2-432 KX2-464 User Guide Release 2.0.1 Copyright © 2007 Raritan, Inc. DKX2-0D-E June 2007 255-62-4023-00[...]

  • Seite 2

    This page intentionally left blank.[...]

  • Seite 3

    Copyright and Tradem ark Information This document contains proprietary inform ation that is protected by copyright. All rights reserved. No part of this document may be phot ocopied, reproduced, or tr anslated into another language without the express prior written consent of Raritan, Inc. © Copyright 2007 Raritan, Inc., CommandCen ter®, Raritan[...]

  • Seite 4

    Safety Guidelines To avoid potentially fatal shock hazard a nd possible damage to Raritan equipm ent: • Do not use a 2-wire power cord in any product configuration. • Test AC outlets at your computer and monitor for proper polarity and ground ing. • Use only with grounded outlets at both the com puter and monitor. When using a backup UPS, pow[...]

  • Seite 5

    C ONTENTS i Content s Chapt er 1 : Int rod uction ................................................................. 1 Dominion KX II Overvi ew ........................................................................................................ ... 1 Virtual Media ..................................................................................[...]

  • Seite 6

    ii C ONTENTS Discover Devices – Local Subnet ................................................................................................ .... 40 Discover Devices – KX Subnet ................................................................................................... ..... 41 Add New Fa vorite ........................................[...]

  • Seite 7

    C ONTENTS iii Setting Permi ssions ............................................................................................................ ............. 77 Setting Port Permissi ons ....................................................................................................... .......... 77 Group-based IP ACL (Acce ss Contro l List) ..[...]

  • Seite 8

    iv C ONTENTS Removing Dominion KX II fr om CC-SG Management ........................................................... 141 Appendix A: Sp ecificat io ns ........................................................ 143 Remote Connection .............................................................................................................. . 144 [...]

  • Seite 9

    F IGURES v Figur es Figure 1: Dominion KX II Confi guration ......................................................................................... ............... 1 Figure 2: Domi nion KX2- 116 ........................................................................................................................ 3 Figure 3: Domi nion KX2- 432 .[...]

  • Seite 10

    vi F IGURES Figure 42: File Server Setup ................................................................................................... ................... 70 Figure 43: User Management Menu ................................................................................................ .......... 71 Figure 44: Us er List .....................[...]

  • Seite 11

    F IGURES vii Figure 85: Up grade R eport ...................................................................................................................... 123 Figure 86: Reb oot .............................................................................................................. ...................... 124 Figure 87: Reboot Confirmatio[...]

  • Seite 12

    viii F IGURES[...]

  • Seite 13

    C HAPTER 1: I NTRODUCTION 1 Chapter 1: Introduction Dominion KX II Overview Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access, and contro l of up to 64 servers from anywhere in the world via Web browser. At the rack, Dominion KX II provides BIOS-level control of up to[...]

  • Seite 14

    2 D OMINION KX II U SER G UIDE Virtual Media All Dominion KX II models support virtual m edia. The benefits of virtual media – m ounting of remote drives/media on the target server to supp ort software installation, and diagnostics – are now available in all of the Dominion KX II models. Each Dominion KX II comes equipped with virtua l media to[...]

  • Seite 15

    C HAPTER 1: I NTRODUCTION 3 Product Photos Figure 2: Dominion KX2-116 Figure 3: Dominion KX2-432 Figure 4: Dominion KX II CIMs: D2CIM-VUSB (left); D2CIM-PW R (right)[...]

  • Seite 16

    4 D OMINION KX II U SER G UIDE Product Features Hardware • Integrated KVM-over-IP remote access • 1U or 2U (KX2-464) rack-mountable; brackets included • Dual power supplies with failover; auto-switc hing power supply with power failure warning • 16, 32, or 64 (on KX2-464) server ports • Multiple user capacity (1/2/4 remote users; 1 local [...]

  • Seite 17

    C HAPTER 1: I NTRODUCTION 5 Terminology This manual uses the following terminology for the components of a typical Dominion KX II configuration: Figure 5: Terminology and Topology Remote PC (client) Networked computers used to acc ess and control target servers connected to the Dominion KX II. Refer to Supported Operating Systems (Clients) for a li[...]

  • Seite 18

    6 D OMINION KX II U SER G UIDE User Guide Overview The Dominion KX II User Guide provides the informa tion to install, set up and configure, access target servers and power strips, use virtual medi a, manage users and security, and maintain and diagnose the Dominion KX II. This user guide is specific to Dominion KX II (version 2.0); for information[...]

  • Seite 19

    C HAPTER 2: G ETTING S TARTED 7 Chapter 2: Getting Started Login Information • The default Dominion KX II login user name is ad min and the default password is raritan . This user has administrative privileges. • Passwords are case sensitive and must be entered in the exact case combination in which they were created. For example, the default p[...]

  • Seite 20

    8 D OMINION KX II U SER G UIDE Supported Operating Systems and CIMs (Target Servers) In addition to the new Dominion KX II D2CIMs, most Paragon® and Dominion KX I CIMs are supported. The following table displays the sup ported target server operating systems, CIMs, virtual media, and mouse modes: S UPPORTED CIM S M OUSE M ODES T ARG ET S ERVER P A[...]

  • Seite 21

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 9 Chapter 3: Installati on and Configuration Overview This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter. To install and config ure Dom inion KX II: 1. Configure the target servers. 2. (Optional) Configure the keyboa[...]

  • Seite 22

    10 D OMINION KX II U SER G UIDE Desktop Background For optimal bandwidth efficiency and video performance, target servers running graphical user interfaces such as Windows, Linux, X-Windows, Sola ris, and KDE require configuration. The desktop background need not be comple tely solid; but desktop backgrounds featuring photo s or complex gradients m[...]

  • Seite 23

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 11 Note: For target servers running Windows 2000 or XP, you may wish to create a user name that will be used only for remote connections through Dominion KX II. This will enable you to keep the target server’s slow mouse pointer motion/a cceleration settings exclusive to the Dominion KX II connection. [...]

  • Seite 24

    12 D OMINION KX II U SER G UIDE Animation options: Animate controls and elements ins ide windows Animate windows when minimizing and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items afte r clicking f. Click OK . g. Close the Control Panel. Linux Settings (Red Hat 9) Note : The following set[...]

  • Seite 25

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 13 Note : If you change video resolution, you must logo ut of the target server and log back in for the video settings to take effect. Note for Red Hat 9 Target Servers If you are running Red Hat 9 on the target server using a USB CIM, and are experiencing problems with the keyboard and/or mouse, there i[...]

  • Seite 26

    14 D OMINION KX II U SER G UIDE SUSE Linux 10.1 Settings Note : Do not attempt to synchronize the mouse at th e SUSE login prompt. You must be connected to the target server to syn chronize the mouse cursors. To configure the mouse settings: 1. Select Desktop > Control Center . The Desktop Preferences dialog opens. 2. Select Mouse . The Mouse Pr[...]

  • Seite 27

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 15 Sun Solaris Settings To configure target serv ers running Sun Solaris: 1. Set the mouse acceleration value to exactly 1 an d the threshold to exactly 1. This can be performed: − From the graphical user interface: Figure 6: Solaris Mouse Configuration − With the command line: xset mouse a t (where [...]

  • Seite 28

    16 D OMINION KX II U SER G UIDE Mouse Settings To configure the mouse set tings (Sun Solaris 10.1): 1. Select Launcher . Application Manager – Desktop Controls opens. 2. Select Mouse Style Manager . The Style Manager – Mouse dialog opens. 3. Set the Acceleration slider to 1.0. 4. Set the Threshold slider to 1.0. 5. Click OK . Accessing the Comm[...]

  • Seite 29

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 17 IBM AIX 5.3 Se ttings Follow these steps in this section to confi gure target servers running IBM AIX 5.3. To configure the mouse: 1. Go to Launcher . 2. Select Style Manager . 3. Click Mouse . The Style Manager – Mouse dialog ope ns. 4. Use the sliders to set the Mouse acceleration to 1.0 and Thres[...]

  • Seite 30

    18 D OMINION KX II U SER G UIDE Step 2 (Optional): Configure Keyboard Language Note : This step is not required if you are using the U S/International language keyboard. If you are using a non-US language, the keyboard has to be configured for the appropriate language. In addition, the keyboard language for the client machine and the target servers[...]

  • Seite 31

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 19 Step 4: Connect the Equipment Connect the Dominion KX II to the power supply, network, local PC, and target servers. The numbers in the diagram correspond to th e sections describing the connection. Figure 7: Dominion KX II Connections 1. AC Power To connect the power supply: 1. Attach the included AC[...]

  • Seite 32

    20 D OMINION KX II U SER G UIDE 3. Local Access Port (local PC) For convenient access to target ser vers while at the rack, use the Dominion KX II Local Access port. While the local port is required for installation and setup, it is optio nal for subsequent u se. The local port provides the KX II Local Console gr aphical user interface for administ[...]

  • Seite 33

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 21 Step 5: Dominion KX II Initial Configuration The first time you power up the Dominion KX II unit, there is some initial configuration that you need to perform through th e KX II Local Console: • Change the default password. • Assign the IP Address. • Name the target servers. • Specify power su[...]

  • Seite 34

    22 D OMINION KX II U SER G UIDE Assigning an IP Address These procedures describe how to assign an IP Address using the Network Settings page. For complete information about all of the fields and the operation of this page, r efer to Network Settings . 1. From the KX II Local Console, select Device Settings > Network Settings . The Network Setti[...]

  • Seite 35

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 23 Naming Target Servers To name the target servers: 1. Connect all of the target servers if you ha ve not already done so (as described in Step 3: Connect the Equipment, Target Server Ports ). 2. Using the KX II Local Console, select Device Settings > Port Configuration . The Port Configuration page [...]

  • Seite 36

    24 D OMINION KX II U SER G UIDE Note to CC-SG Users If you are using Dominion KX II in a CC-SG configuration, per form the installation steps as outlined above, and when finished, consult the CommandCenter Secure Gateway User Guide, Administrator Guide , or Deployment Guide to proceed (all found on Raritan’s Website under Support: http://www.rari[...]

  • Seite 37

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 25 Remote Authentication Note to CC-SG Users When the Dominion KX II is controlled by CommandCenter Secure Gateway, CC-SG authenticates users and groups, except for local users (requiring local port acces s). When CC-SG is controlling the KX II, local port users will be au thenticated against the local u[...]

  • Seite 38

    26 D OMINION KX II U SER G UIDE Authentication vs. Authorization Authentication is the process of verifying that a user is who he says he is. Once a us er is authenticated, the user’s group is used to determ ine his system and port permissions. The user’s assigned privileges determine what type of access is allowed. This is called authorization[...]

  • Seite 39

    C HAPTER 3: I NSTALLATION AND C ONFIGURATION 27 Users, Groups, and Access Permissions Overview The Dominion KX II stores an internal list of al l user and group nam es to determine access authorization and permissions. This information is stored internally in an encrypted format. There are several forms of authenticati on and this one is known as ?[...]

  • Seite 40

    28 D OMINION KX II U SER G UIDE[...]

  • Seite 41

    C HAPTER 4: C ONNECTING TO THE D OMINION KX II 29 Chapter 4: Connecting to the Dominion KX II User Interfaces There are several user interfaces in the Do minion KX II providing you with easy access any time, anywhere. These include the KX II Local Consol e, the KX II Remote Console, and the Multi- Platform Client (MPC). The following table iden tif[...]

  • Seite 42

    30 D OMINION KX II U SER G UIDE Multi-Platform Client (MPC) − KX I and KX II Devices The Raritan Multi-Platform Client (MPC) is a gr aphical interface that allows you to remotely access the target devices connected to Dominion un its. MPC can be installed for standalone use or accessed through a Web browser. After installing the Dominion KX II, e[...]

  • Seite 43

    C HAPTER 4: C ONNECTING TO THE D OMINION KX II 31 Language Support The Dominion KX II provides keyboard support for the following languages: US English, UK English, Traditional Chinese, Simplified Ch inese, Japanese, Korean, French, and German. Note : You can use the keyboard for Chinese, J apanese, and Korean for display only; local language input[...]

  • Seite 44

    32 D OMINION KX II U SER G UIDE Launching the KX II Important: Regardless of the browser us ed, you must allow pop-ups from the Dominion device’s IP address to l aunch the KX II Remote Console. Note: Depending on your browser and security settings, you may see vari ous security and certificate warnings. It is necessary to accept these warnings to[...]

  • Seite 45

    C HAPTER 4: C ONNECTING TO THE D OMINION KX II 33 KX II Console Layout Both the KX II Remote Console and the KX II Lo cal Console interfaces provide an HTML (Web- like) interface for configuration and administration, as well as target server list and selection. The options are organized into various tabs. Figure 12: KX II Remote Console Main Page F[...]

  • Seite 46

    34 D OMINION KX II U SER G UIDE The numbers in the following table correspond to the num bers in Figure 12. # T ITLE D ESCRIPTION 1 Time & Session Date, time, use r name, current state, IP Addr ess of client, and last login 2 Device Information Device name, IP Address, firmware version, and status of both po wer lines 3 Port States Current stat[...]

  • Seite 47

    C HAPTER 4: C ONNECTING TO THE D OMINION KX II 35 KX II Console Menu Tree The following diagram represents all of the menu options available in both the KX II Rem ote and KX II Local Console interfaces. Variations be tween the KX II Local Console and the KX II Remote Console are identified. Figure 15: KX II Console Menu Tree (Local and Remote) In a[...]

  • Seite 48

    36 D OMINION KX II U SER G UIDE Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices y ou use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: • Create and manage a list of favorite devices • Quickly access f[...]

  • Seite 49

    C HAPTER 4: C ONNECTING TO THE D OMINION KX II 37 Manage Favorites Menu The Manage Favorites menu provides these options: Favorites List, Discover Devices – Local Subnet, Discover Devices – KX Subnet, and Add New Device to Favorites. To open the Mana ge Favori tes menu: Click the Manage button. The Manage Favorites page opens: Figure 17: Manage[...]

  • Seite 50

    38 D OMINION KX II U SER G UIDE Favorites List From the Favorites List page, you can add, edit, and delete devices from your list of Favorites. To open the Favorites List page: Select Manage > Favorites List . The Favorites List page opens: Figure 18: Favorites List To add a Favorite: Click the Add button. The Add New Favorite page opens. To del[...]

  • Seite 51

    C HAPTER 4: C ONNECTING TO THE D OMINION KX II 39 To edit a Favorite: 1. From the Favorites List page, check the checkbox next to t he appropriate Dominion KX II device. 2. Click the Edit button. The Edit page opens: Figure 19: Edit (Favorite Information) 3. Update the fields as necessary: • Description . Type something meaningful. • IP Address[...]

  • Seite 52

    40 D OMINION KX II U SER G UIDE Discover Devices – Local Subnet This option discovers the devices on your local s ubnet (that is, the subnet where the Dominion KX II Remote Console is running); access these devi ces directly from this page, or add them to your list of favorites. Figure 20: Discover Devices - Local Subnet To discover devices on th[...]

  • Seite 53

    C HAPTER 4: C ONNECTING TO THE D OMINION KX II 41 Discover Devices – KX Subnet This option discovers the devices on the KX device subnet (that is, the subnet of the Dom inion KX II device IP address itself); access these devices di rectly from this page , or add them to your list of favorites. This feature allows multiple Dominion KX II units to [...]

  • Seite 54

    42 D OMINION KX II U SER G UIDE Add New Favorite To add a device to your favorites list: 1. Select Manage Favorites > Add New Device to Favorites . The Add New Favorite page opens: Figure 22: Add New Favorite 2. Type a meaningful Description . 3. Type the IP Address for the device. 4. Change the discovery Port (if necessary). 5. Click OK . This [...]

  • Seite 55

    C HAPTER 5: A CCESSING T ARGET S ERVERS 43 Chapter 5: Accessing Target Servers Port Access Page After successfully logging into t he Dominion KX II Remote Console, the Port Access page opens. This page lists all of the Dominion KX II ports, th e connected target servers, and their status and availability. The Port Access page provides access to the[...]

  • Seite 56

    44 D OMINION KX II U SER G UIDE To change the displa y sort order : Click the column heading you want to sort on. Th e list of target servers is sorted by that column. Port Action Menu 1. When you click on a Port Name in the Port A ccess list, the Port Action menu is displayed. Please note that only options available for the sel ected port are list[...]

  • Seite 57

    C HAPTER 5: A CCESSING T ARGET S ERVERS 45 Connecting to a Target Server To connect to a target server: 1. From the KX II Remote Console, click the Port Access tab to open it. The Port Access page opens. 2. Click the Port Name of the target you want to access. The Port Action Menu is displayed: Figure 24: Port Action Menu 3. Select Connect . A Virt[...]

  • Seite 58

    46 D OMINION KX II U SER G UIDE Power Controlling a Target Server Note : These features are available only when you have made power associations. Refer to power control for more information. Power Cycle a Target Server To power cycle a target server: 1. From the KX II Remote Console, click the Port Access tab to open it. The Port Access page opens.[...]

  • Seite 59

    C HAPTER 6: V IRTUAL KVM C LIENT 47 Chapter 6: Virtual KVM Client Whenever you access a target server using the KX II Remote Console, a Virtual KVM Client window is opened. There is one Virtual KVM Client for each target server connected to; these windows can be accessed via the Windows Taskbar. Virtual KVM Client windows can be minimized , maximiz[...]

  • Seite 60

    48 D OMINION KX II U SER G UIDE Options Menu Tree The following diagram represents all of the menu options available in the Virtual KVM Client. Figure 27: Virtual KVM Client Menu Tree Toolbar B UTTON D ESCRIPTION Properties Video settings Calibrate color Synchronize client and targ et ser ver mouse cursors Refresh screen Auto-sense video Send Ctrl+[...]

  • Seite 61

    C HAPTER 6: V IRTUAL KVM C LIENT 49 Mouse Pointer Synchronization When remotely viewing a target server that u ses a mouse, you will see two mouse pointers: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and[...]

  • Seite 62

    50 D OMINION KX II U SER G UIDE Additional Notes for Intelligent Mouse Mode • Be sure that there are no icons or applic ations in the upper left section of the screen since that is where the synchronization routine takes place. • Do not use an animated mouse. • Disable active desktop on target servers.[...]

  • Seite 63

    C HAPTER 6: V IRTUAL KVM C LIENT 51 Connection Menu Properties Dialog The Dominion KX II dynamic video com pression algorithms maintain KVM console usabilit y under varying bandwidth constraints. Dominion KX II units optimize KVM output not only for LAN use, but also for WAN and dialup use. Th ese units can also control color depth and limit video [...]

  • Seite 64

    52 D OMINION KX II U SER G UIDE 3. Select the Color Depth from the drop-down list. Dominion KX II can dynamically adapt the color depth transmitted to rem ote users in orde r to maximize usability in all bandwidths. 15-bit RGB Color 8-bit RGB Color 4-bit Color 4-bit Gray 3-bit Gray 2-bit Gray Black and White Important: For most administrative tasks[...]

  • Seite 65

    C HAPTER 6: V IRTUAL KVM C LIENT 53 Connection Info To obtain information about your Virtual KVM Client connection: Select Connection > Connection Info . The Connection Info window opens: Figure 30: Connection Info The following information is displayed about the current connectio n: • Device Name . The name of the Dominion KX II device. • I[...]

  • Seite 66

    54 D OMINION KX II U SER G UIDE Keyboard Menu Send Ctrl+Alt+Delete Due to its frequent use, a Ctrl+Alt+Delete macro has been pre-programmed into the Virtual KVM Client. This key sequence is sent to the target s erver to which you are currently connected. In contra st, if you were to physically press the Ctrl+Alt+Delete keys while using t he Virtual[...]

  • Seite 67

    C HAPTER 6: V IRTUAL KVM C LIENT 55 Figure 32: Add Keyboard Macro 3. Type a name in the Keyboard Macro Name field. This is the name that will display on the Virtual KVM Client menu bar after the macro is created. In this example , type Minimize All Windows . 4. In the Keys to Press drop-down list: a. Scroll through and select each key for which you[...]

  • Seite 68

    56 D OMINION KX II U SER G UIDE 7. Click OK from the Add Keyboard Macro window to save the macro. 8. Click Close from the Keyboard Macros window ( Figure 31). The keyboard macro created is now listed as an optio n from Keyboard menu: Figure 34: New Macro in Keyboard Menu To cancel without saving changes: Click Cancel . To clear all fields and start[...]

  • Seite 69

    C HAPTER 6: V IRTUAL KVM C LIENT 57 Video Menu Video settings can be refreshed automatically in several ways: • The Refresh Screen option forces a refresh of the video screen • The Auto-sense Video Settings option automatically detects the target server’s video settings • The Calibrate Color option calibrates the video to enhance the colors[...]

  • Seite 70

    58 D OMINION KX II U SER G UIDE Video Settings Use the Video Settings option to manually adjust the video settings. Video Settings Opens Video Settings for ma nual adjustment of video parame ters. To change the video s ettings: 1. Select Video > Video Settings . The Video Settings window opens displaying the current settings: Figure 35: Video Se[...]

  • Seite 71

    C HAPTER 6: V IRTUAL KVM C LIENT 59 − Color Contrast Settings: Controls the contrast adjustment.  Contrast Red . Controls the red signal.  Contrast Green . Controls the green signal.  Contrast Blue . Controls the blue signal. − If the video image looks extrem ely blurry or unfocused, the settings for clock and phase can be adjusted unt[...]

  • Seite 72

    60 D OMINION KX II U SER G UIDE Mouse Menu When controlling a target server, the KX II Remote Console displays two mouse cursors: one belonging to your client workstation and the o ther belonging to the target server. You can op erate in either single mouse mode or dual mouse m ode. When in dual mouse mode and properly configured, these two mouse c[...]

  • Seite 73

    C HAPTER 6: V IRTUAL KVM C LIENT 61 Standard This is the standard mouse synchronization al gorithm using relative mouse positions. Standard mouse mode requires that acceleration is disabled a nd other mouse parameters are set correctly in order for the client and server mouse to stay sy nchronized. Standard mouse mode is the default. To enter stand[...]

  • Seite 74

    62 D OMINION KX II U SER G UIDE Tools Menu Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client: synchronize mouse when in dual mouse mode, enab le logging, keyboard t ype, and the exit target screen resolution mode hotkey. To set the tools options: 1. Select Tools > Options . The Options window opens:[...]

  • Seite 75

    C HAPTER 6: V IRTUAL KVM C LIENT 63 View Menu View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle t he display of the toolbar (on and of f): Select View > View Toolbar . Scaling Scaling your target window allows you to view the entire contents of the target server window. This feature increases or reduc[...]

  • Seite 76

    64 D OMINION KX II U SER G UIDE[...]

  • Seite 77

    C HAPTER 7: V IRTUAL M EDIA 65 Chapter 7: Virtual Media Overview Virtual media extends KVM capabilities by enab ling target servers to remotely access media from the client PC and network file servers. With t his feature, media mounted on the client PC and network file servers is essentially mounted virtually by the target server. The target server[...]

  • Seite 78

    66 D OMINION KX II U SER G UIDE Prerequisites for Us ing Virtual Media The following conditions m ust be met in order to use virtual media: Dominion KX II • For users requiring access to virtual media, KX permissions must be set to allow acces s to the relevant ports, as well as virtual media access ( VM Access port permission) for those ports. P[...]

  • Seite 79

    C HAPTER 7: V IRTUAL M EDIA 67 Opening a KVM Session To open a KVM session: 1. Open the Port Access page from th e Dominion KX II Remote Console. Figure 39: Open KVM Session 2. Connect to the target server from the Port Access page: a. Click the Port Name for the appropriate server. b. Select the Connect option from the Port Action Menu. The target[...]

  • Seite 80

    68 D OMINION KX II U SER G UIDE 2. Select the drive from the Local Drive drop-down list. 3. If you want read and write capabilities, check the Read-Write option checkbox. This option is disabled for non-removable drives. Please refer to the conditions when read-write is not available for more information. When checked, you will be able to read or w[...]

  • Seite 81

    C HAPTER 7: V IRTUAL M EDIA 69 3. For ISO images: a. Select the ISO Image option. Use this option when you wa nt to access a disk image of a CD, DVD, or hard drive. ISO form at is the only format supported. b. Click the Browse button. c. Navigate to the path containing the disk image you want to use and click Open . The path is populated in the Ima[...]

  • Seite 82

    70 D OMINION KX II U SER G UIDE File Server Setup (File Server ISO Images Only) Note : This feature is only required when using virtual media to access file server ISO images. Use the Dominion KX II Remote Console File Server Setup page to designate the files server(s) and image paths that you want to access using Dominion KX II Virtual Media. File[...]

  • Seite 83

    C HAPTER 8: U SER M ANAGEMENT 71 Chapter 8: User Management The User Management menu is organized as follo ws: User List, Add New User, User Group List, Add New User Group, Change Passw ord, and Authentication Settings. Figure 43: User Management Menu U SE : T O : User List Display an alpha betical list of al l users; add, modif y, or delete users.[...]

  • Seite 84

    72 D OMINION KX II U SER G UIDE User List The User List page displays a list of all user s including their Username , Full Name, and User Group. The list can be sorted on any of the colu mns by clicking on the colum n name. From the User List page, you can also add, modify, or delete users. To view the list of users: Select User Management > Use[...]

  • Seite 85

    C HAPTER 8: U SER M ANAGEMENT 73 Add New User It is a good idea to define user groups before creating Dominion KX II users, because when you add a user, you must assign that user to an existing user group. From the User page, you can add new users, modify user information, and r eactivate users that have been deactiva ted. Note : A username can be [...]

  • Seite 86

    74 D OMINION KX II U SER G UIDE Modify Existing User To modify an e xisting user : 1. From the User page ( Figure 45), change the appropriate fields. (Refer to Add New User for information about how to get access the User page.) 2. Click OK .[...]

  • Seite 87

    C HAPTER 8: U SER M ANAGEMENT 75 User Group List User groups are used with local and remote auth entication (via RADIUS or LDAP). It is a good idea to define user groups before creating individual users, because when you add a user, you must assign that user to an existing user group. The User Group List page displays a list of all user groups, whi[...]

  • Seite 88

    76 D OMINION KX II U SER G UIDE Add New User Group To add a new user group: 1. Open the Group page using one of these methods: • Select User Management > Add New User Group , or • Click the Add button from the User Group List page Figure 47: Group Page The Group page is organized into the following categories: Group, Permis sions, Port Perm [...]

  • Seite 89

    C HAPTER 8: U SER M ANAGEMENT 77 5. Set the IP ACL (optional). This feature limits access to the Dominion KX I I device by specifying IP addresses; it applies only to users belonging to a specific group, unlike the IP Access Control list feature which applies to all access attempts to the device (and takes priority). 6. Click OK . Note : Several ad[...]

  • Seite 90

    78 D OMINION KX II U SER G UIDE Group-based IP ACL (Access Control List) Important: Please exercise caution when using group-based IP a ccess control. It is possible to be locked out of your Dominion KX II if your IP Address is within a range that has been denied access. This feature limits access to the Dominion KX II device by users in the select[...]

  • Seite 91

    C HAPTER 8: U SER M ANAGEMENT 79 To delete a rule: 1. Specify the Rule # you want to delete. 2. Click Delete . 3. You are prompted to confirm the deletion. Click OK . Important: ACL rules are evaluated in the order in which they are listed. For instance, in the example shown here, if the two ACL rules were reversed, Dominion would accept no communi[...]

  • Seite 92

    80 D OMINION KX II U SER G UIDE Modify Existing User Group Note : All permissions are enabled (and cannot be changed) for the Admin grou p. To modify an existing user group : 1. From the Group page, change the appropriate fields and set the appropriate permissions. Figure 50: Modify Group 2. Set the Permissions for the group. Check the boxes before[...]

  • Seite 93

    C HAPTER 8: U SER M ANAGEMENT 81 Set Permissions for Individua l Group To set perm issions for an i ndividual user group: 1. Locate the user from among the groups listed. Individ ual groups can be identified by the @ in the Group Name . 2. Click on the Group Name . The Group page ( Figure 50) opens. 3. Select the ap propriate permissions. 4. Click [...]

  • Seite 94

    82 D OMINION KX II U SER G UIDE Change Password To change your passw ord: 1. Select User Management > Change Password . The Change Password page opens: Figure 51: Change Password 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field; retype the new password in the Confirm New Password field. Pa[...]

  • Seite 95

    C HAPTER 8: U SER M ANAGEMENT 83 Authentication Settings From the Authentication Settings page you can co nfigure the type of authe ntication used for access to your Dominion KX II. Refer to Authentication vs. Authorization for m ore information about how authentication and authorization operate and differ. Note : Even if you select remote authenti[...]

  • Seite 96

    84 D OMINION KX II U SER G UIDE 2. Select the option for the authentication protocol you want to use ( Local Authentication , LDAP , or RADIUS ). Selecting the LDAP option enables the remaining LDAP fields; selecting the RADIUS option enables the remaining RADIUS fields. 3. If you selected Local Authentication , proceed to step 6. 4. If you selecte[...]

  • Seite 97

    C HAPTER 8: U SER M ANAGEMENT 85 Implementing LDAP Remote Authentication Lightweight Directory Access Protocol (LDAP) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP server (the default TCP port is 389). The client then sends operation requests to t[...]

  • Seite 98

    86 D OMINION KX II U SER G UIDE 8. DN of administrative User . Distinguished Name of administrative user; consult your authentication server administrator for the approp riate values to ty pe into this field. An example DN of administrative User value might be: “cn=Administrator,cn=Users,dc=testradius,dc=com”. 9. User Search DN. This describes [...]

  • Seite 99

    C HAPTER 8: U SER M ANAGEMENT 87 Implementing RADIUS Remote Authentication Remote Authentication Dial-in User Service (RADIUS) is an AAA (authentication, authorization, and accounting) protocol for network access applications. To use th e RADIUS au thenticat ion protocol: Figure 54: Authentication Settings (RADIUS) 1. Type the IP Address of your pr[...]

  • Seite 100

    88 D OMINION KX II U SER G UIDE Returning User Group Inform ation via RADIUS When a RADIUS authentication attempt succe eds, the Dominion KX II device determines the permissions for a given user based on the permissions of the user’s group. Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RA[...]

  • Seite 101

    C HAPTER 9: D EVICE M ANAGEMENT 89 Chapter 9: Device Management The Device Settings menu is organized as follo ws: Network, Date/Time, Event Management (Settings and Destinations), Power Supply Setup, Port Configuration, and Local Port Settings (Dominion KX II Local Console only). Figure 55: Device Settings Menu U SE : T O : Network Customize the n[...]

  • Seite 102

    90 D OMINION KX II U SER G UIDE Network Settings Use the Network Settings page to customize the network configuration (e.g., IP Address, discovery port, and LAN interface parameters) for your Dominion KX II unit. Important: Dominion KX II must be reboot ed for new network settings to take effect. Before changing the network confi guration, ensure t[...]

  • Seite 103

    C HAPTER 9: D EVICE M ANAGEMENT 91 To cancel without saving changes: Click Cancel . To reset to f actory defaults: Click Reset to Defaults . Network Basic Settings Figure 57: Network Settings (Network Basic Settings) • Device Name. Type a unique name for the device (up to 16 characters; spaces are not allowed). Name your device so you can easily [...]

  • Seite 104

    92 D OMINION KX II U SER G UIDE ♦ If DHCP is used, enter the Preferred host name (DHCP only) . Up to 63 characters. Network Miscellaneous Settings Figure 58: Network Settings (N etwork Miscellaneous Settings) • Discovery Port . Dominion KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000 , but you can configure[...]

  • Seite 105

    C HAPTER 9: D EVICE M ANAGEMENT 93 • LAN Interface Speed & Duplex . Select from am ong the speed and duplex combinations available. Autodetect Default option 10 Mbps/Half 10 Mbps/Full 100 Mbps/Half 100 Mbps/Full 1000 Mbps/Full Gigabit − Half-duplex provides for communication in both di rections, but only one direction at a time (not simulta[...]

  • Seite 106

    94 D OMINION KX II U SER G UIDE Date/Time Settings Use the Date/Time Settings page to specify the date and time for the Dominion KX II. There are two ways to do this: • Manually set the date and time, or • Synchronize with a Network Time Protocol (NTP) Server. To set the date and time: 1. Select Device Settings > Date/Time . The Date/Time Se[...]

  • Seite 107

    C HAPTER 9: D EVICE M ANAGEMENT 95 Event Management The Dominion KX II Event Management featur e provides a set of screens for enabling and disabling the distribution of system events to SN MP Managers, Syslog, and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or several des[...]

  • Seite 108

    96 D OMINION KX II U SER G UIDE 3. In the Name , Contact , and Location fields, type the SNMP Agen t’s (this Dominion unit’s) name as it appears in the KX II Console interface, a contact name related to this unit, and where the Dominion unit is physically located, respe ctively. 4. Type the Agent Community String (the Dominion unit’s string).[...]

  • Seite 109

    C HAPTER 9: D EVICE M ANAGEMENT 97 Event Management – Destinations System events, if enabled, can generate SNMP no tification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management - Destinations page to select which system events to track and where to send this information. Note : SNMP traps will only be generated if t[...]

  • Seite 110

    98 D OMINION KX II U SER G UIDE 2. Check the checkboxes for those Event line items you want to enable or disable, and where you want to send the information. Tip: Enable or disable entire Categories by checking or clearing the Category line checkboxes, respectively. 3. Click OK . To cancel without saving changes: Click Cancel . To reset to f actory[...]

  • Seite 111

    C HAPTER 9: D EVICE M ANAGEMENT 99 SNMP Trap Configuration SNMP provides the ability to send traps, or notifica tions, to advise an adm inistrator when one or more conditions have been met. The following table lists the Dominion KX II SNMP traps: T RA P N AME D ESCRIPTION cimConnected A CIM is plugged into to the Dominion KX II port. cimDisconnecte[...]

  • Seite 112

    100 D OMINION KX II U SER G UIDE Power Supply Setup Page The Dominion KX II provides dual power supplies, and can automatically detect and provide notification regarding the status of these power supplies. Use the Power Supply Setup page to specify whether you are using one or both of th e power supplies. Proper configuration ensures that the Domin[...]

  • Seite 113

    C HAPTER 9: D EVICE M ANAGEMENT 101 Port Configuration Page The Port Configuration page displa ys a list of the Dominion KX II ports. Ports connected to target servers or power strips are displayed in blue and can be edited. For port s with no CIM connected or with a blank CIM name, a default port nam e of Dominion-KX2_Port# is assigned, where Port[...]

  • Seite 114

    102 D OMINION KX II U SER G UIDE Power Control The Dominion KX II provides remote power control of target servers. To utilize this feature, you must have a Raritan remote power strip and the D2CIM-PWR computer interface m odule (CIM). Once power assignments are made, remote power ma nagement of your target servers is possible. To use the Dom inion [...]

  • Seite 115

    C HAPTER 9: D EVICE M ANAGEMENT 103 Name the Power Strip (Po rt Page for Power Strips) This Port page opens when you select a port from the Port Configuration page that is connected to a Raritan remote power strip. The Type and t he Name fields are pre-populated; please note that the (CIM) Type cannot be changed. The following information is displa[...]

  • Seite 116

    104 D OMINION KX II U SER G UIDE Associate Target Servers to Outlets (Port Page) This Port page opens when you select a port from the Port Configuration page that is connected to a target server. From this page, you ca n make power associations, change the Port Name to something more descriptive, and update target server settings if you are using t[...]

  • Seite 117

    C HAPTER 9: D EVICE M ANAGEMENT 105 To change the port name: 1. Type something descriptive in the Name field. For example, the name of the target server would be a likely candidate. The name can be up to 32 alphanumeric characters and can include special characters . 2. Click OK . To cancel without saving changes: Click the Cancel button. To remove[...]

  • Seite 118

    106 D OMINION KX II U SER G UIDE Certain BIOS do not support USB high-speed capabil ities and the attempt to auto-negotiate does not work. If you are experiencing BIOS problems with the target server, check the Use Full Speed for Virtual Media CIM option. Note : For SUSE 9.2 target servers, please enable (check) the Use Full Speed for Virtual Media[...]

  • Seite 119

    C HAPTER 10: S ECURITY S ETTIN GS 107 Chapter 10: Security Settings The Security menu is organized as follows: Security Settings and IP Access Control. Figure 70: Security Menu U SE : T O : Security Settings Configure security settings for login limitations, s trong passwords, user blocking, and encr yption & share. IP Access Control Control ac[...]

  • Seite 120

    108 D OMINION KX II U SER G UIDE Security Settings From the Security Settings page, you can specify logi n limitations, user blocking, password rules, and encryption and share. Raritan SSL certificates are used for public and priv ate key exchanges, and provide an additional level of security. Raritan web server certificates are self-signed; Java a[...]

  • Seite 121

    C HAPTER 10: S ECURITY S ETTIN GS 109 Login Limitations Using Login Limitations you can specify restricti ons for single login, password aging, and the logging out of idle users. • Enable Single Login Limitation . When checked, onl y one login per usernam e is allowed at any time. When cleared, a given username/password combination can be connect[...]

  • Seite 122

    110 D OMINION KX II U SER G UIDE − Minimum length of strong password . Passwords must be at least 8 characters long. The default is 8, but it can be up to 63. − Maximum length of strong password . The default is 16, but can be up to 64 characters long. − Enforce at least one lower case character . When checked, at least one lower cas e charac[...]

  • Seite 123

    C HAPTER 10: S ECURITY S ETTIN GS 111 Encryption & Share Using the Encryption & Share settings you can sp ecify the type of encryption used, PC and VM share modes, and the type of reset performed when the Dominion KX II reset button is pressed. Figure 74: Security Settings (Encryption & Share) • Encryption Mode . Select one of the opt[...]

  • Seite 124

    112 D OMINION KX II U SER G UIDE • PC Share Mode . Determines global concurrent remote KVM access, enabling up to eight remote users to simultaneously log on to one Dominion KX II and concurrently view and control the same target server through the device. Click on the drop-down list to select one of the following options: − Private : No PC sha[...]

  • Seite 125

    C HAPTER 10: S ECURITY S ETTIN GS 113 IP Access Control Using IP Access Control, you can control access to your Dominion KX II unit. By setting a global Access Control List (ACL) you are by en suring that your device does not respond to packets being sent from disallowed IP addresses. The IP Access Control is global, affecting the KX unit as a whol[...]

  • Seite 126

    114 D OMINION KX II U SER G UIDE To add (append) rules: 1. Type the IP Address and subnet mask in the IP/Mask field. 2. Select the Policy from the drop-down list. 3. Click Append . The rule is added to the bottom of the rules list. 4. Repeat steps 1 through 3 for each rule you want to enter. To insert a rule: 1. Type a Rule # . A Rule # is required[...]

  • Seite 127

    C HAPTER 11: M AINTENANCE 115 Chapter 11: Maintenance The Maintenance menu includes these options: Audi t Log, Device Information, Backup/Restore, CIM Firmware Upgrade, Firmware Upgrade, Factory Reset (Dominion KX II Local Console only), Upgrade Report, and Reboot. Figure 77: Maintenance Menu U SE : T O : L OCAL R EMOTE Audit Log View Dominion KX I[...]

  • Seite 128

    116 D OMINION KX II U SER G UIDE Audit Log A log is created of Dominion KX II system events. To view the audi t log for your Dom inion KX II unit: Select Maintenance > Audit Log . The Audit Log page opens: Figure 78: Audit Log The Audit Log page displays events by date and time (most recent events listed first). The Audit Log provides the follow[...]

  • Seite 129

    C HAPTER 11: M AINTENANCE 117 Device Information The Device Information page provides detailed information about your Dominion KX II device and the CIMs in use. This inform ation is helpful should you nee d to contact Raritan Technical Support. To view information about y our Dominion KX II and CIMs: Select Maintenance > Device Information . The[...]

  • Seite 130

    118 D OMINION KX II U SER G UIDE Backup and Restore From the Backup/Restore page, you ca n backup an d restore the settings and configuration for your Dominion KX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving m echanism. For in stance, you can quickly provide access to your t[...]

  • Seite 131

    C HAPTER 11: M AINTENANCE 119 To restore your Domini on KX II: WARNING: Please exercise caution when re storing your Dominion KX II to an earlier version. Usernames and password in place at the time of the backup will be restored. If you do not remem ber th e old administrative usernames and passwords, you will be locked out of the KX II. In additi[...]

  • Seite 132

    120 D OMINION KX II U SER G UIDE CIM Upgrade Use this procedure to upgrade CIMs using the firmware versions stored in the memory of your Dominion KX II unit. In general, all CIMs are upgraded when you upgrade the device firmware using the Firmware Upgrade page. Use the CIM Upgrade page to upgrade new CIMs. Note : Only D2CIM-VUSB and D2CIM-PWR can b[...]

  • Seite 133

    C HAPTER 11: M AINTENANCE 121 Firmware Upgrade Use the Firmware Upgrade page to upgrade th e firmware for y our Dom inion KX II unit and all attached CIMs. This page is available in the KX II Remote Console only. Important: Do not turn off your Domi nion KX II unit or di sconnect CIMs while the upgrade is in progress – doing so will likely result[...]

  • Seite 134

    122 D OMINION KX II U SER G UIDE Figure 83: Firmware Upgrade Review Note : At this point, connected users are logged out, and new login attempts are blocked. 7. Click Upgrade . Please wait for the upgrade to complete . Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the unit reboots (1 beep sou[...]

  • Seite 135

    C HAPTER 11: M AINTENANCE 123 Upgrade Report Dominion KX II provides information about upgrad es performed on the KX II unit and attached CIMS. To view the upgrade report: Select Maintenance > Upgrade Report . The Upgrade Report page opens: Figure 85: Upgrade Report Information is provided about the last Dominion KX II upgrade that was run, the [...]

  • Seite 136

    124 D OMINION KX II U SER G UIDE Reboot The Reboot page provides a safe and controlled way to reboot your Dominion KX II unit; this is the recommended method for rebooting. Important: All KVM connections will be clo sed and all users will be logged off. To reboot your Domini on KX II: 1. Select Maintenance > Reboot . The Reboot page opens: Figur[...]

  • Seite 137

    C HAPTER 12: D IAGNOSTICS 125 Chapter 12: Diagnostics Diagnostics Menu The Diagnostics pages are used for troubles hooting and are intended primarily for the administrator of the KX II device. All of th e Diagnostics pages (except KX Diagnostics) run standard networking commands; the informati on displayed is the ou tput of those commands. The foll[...]

  • Seite 138

    126 D OMINION KX II U SER G UIDE Network Interface Page The Dominion KX II provides information abou t the status of your network interface. To view information about your network interface: Select Diagnostics > Network Interface . The Network Interface page opens: Figure 89: Network Interface The following information is displayed: • Whether [...]

  • Seite 139

    C HAPTER 12: D IAGNOSTICS 127 Network Statistics Page The Dominion KX II provides statistics about your network interface. To view statistics about your network interface: 1. Select Diagnostics > Network Statistics . The Network Statistics page opens. 2. Select the appropriate option from the Options drop-down list: • Statistics . Produces a p[...]

  • Seite 140

    128 D OMINION KX II U SER G UIDE Figure 92: Network Statistics (route) 3. Click the Refresh button. The relevant information is displayed in the Result field.[...]

  • Seite 141

    C HAPTER 12: D IAGNOSTICS 129 Ping Host Page Ping is a network tool used to test whether a particular host or IP Address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another Dominion KX II unit is accessible. To ping the host: 1. Select Diagnostics > Ping Host . The Ping Host page opens: Fi[...]

  • Seite 142

    130 D OMINION KX II U SER G UIDE Trace Route to Host Page Trace route is a network tool used to determin e the route taken all the way to the provided hostname or IP Address. To trace the route to the hos t: 1. Select Diagnostics > Trace Route to Host . The Trace Route to Host page opens: Figure 94: Trace Route to Host 2. Type either the Hostnam[...]

  • Seite 143

    C HAPTER 12: D IAGNOSTICS 131 KX Diagnostics Note : This page is for use by Raritan Field En gineers or when you are directed by Raritan Technical Support. KX Diagnostics downloads the diagnostics information from Dominion KX II to the client machine. Three operations can be performed on this page: • Command Line Interface . Enable or disable the[...]

  • Seite 144

    132 D OMINION KX II U SER G UIDE c. UDP port 21 must be opened and made av ailable to Raritan Technical Support. d. Raritan Technical Support will also need to kn ow the administrative password for the KX II. e. Once Raritan Technical Support has completed their testing, return UDP port 21 to its original state. 3. To execute a diagnostics script f[...]

  • Seite 145

    C HAPTER 13: KX II L OCAL C ONSOLE 133 Chapter 13: KX II Local Console KX II Local Console Dominion KX II provides at-the-rack access and administration via its local p ort, which features a browser-based graphical user interface for qui ck, convenient s witching between servers. The Dominion KX II Local Console provides a direct analog connection [...]

  • Seite 146

    134 D OMINION KX II U SER G UIDE Mouse: Attach either a standard PS/2 mouse to the Mini-DIN6 (female) mouse port or a standard USB mouse to one of the USB Type A (fema le) ports. Reset Button At the back of the Dominion KX II unit, there is a Reset button. It is rec essed to prevent accidental presses (you will need a pointed object to use this but[...]

  • Seite 147

    C HAPTER 13: KX II L OCAL C ONSOLE 135 Starting the KX II Local Console Simultaneous Users The Dominion KX II Local Console provides an inde pendent access path to the connected target servers. Using the Local Console does not prevent other users from simultaneously connecting over the network. And even when remote users are connected to Dominion K[...]

  • Seite 148

    136 D OMINION KX II U SER G UIDE Accessing Target Servers Server Display After you login to the KX II Local Console, the Port Access page opens. This page lists all of the Dominion KX II ports, the connected target ser vers, and their status and availability. Figure 101: Local Console Port Access The target servers are initially so rted by Port Num[...]

  • Seite 149

    C HAPTER 13: KX II L OCAL C ONSOLE 137 Hotkeys Because the Dominion KX II Local Console interface is co m pletely replaced by the interface for the target server you are accessing, a hotkey is utilized so you can switch between these inter faces. The Local Port hotkey allows you to rapidly access the KX II Local Console user interface w hen a targe[...]

  • Seite 150

    138 D OMINION KX II U SER G UIDE Local Port Administration The Dominion KX II can be managed by either the KX II Local Console or the KX II Remote Console. Please note that the KX II Local Cons ole also provides access to these administrative functions: • Local Port Settings • Factory Reset Note : Only users with administrative privileges can a[...]

  • Seite 151

    C HAPTER 13: KX II L OCAL C ONSOLE 139 3. Select the Local Port Hotkey . The Local Port Hotkey is used to return to the KX II Local Console interface when a target server interface is being viewed. The default is Double Click Scroll Lock , but you can select any key combination fr om the drop-down list: H OTKEY : T AKE TH I S A CTION : Double Click[...]

  • Seite 152

    140 D OMINION KX II U SER G UIDE Factory Reset (KX II Local Console Only) Note : This feature is available only on the Dominion KX II Local Console. The Dominion KX II offers several types of reset modes fro m the Local Console user interface. Note : It is recommended that you save the audit log prior to performing a factor y reset. The audit log i[...]

  • Seite 153

    C HAPTER 14: CC U NMANAGE 141 Chapter 14: CC Unmanage Overview When a Dominion KX II device is under Comma ndCenter Secure Gateway control and you attempt to access the device directly using the Dominion KX II Remote Console, the following message is displayed (after entry of a valid username and password): Figure 104: Device Managed by CC-SG Messa[...]

  • Seite 154

    142 D OMINION KX II U SER G UIDE To remove the device from CC-SG managem ent (to us e CC Unmanage): 1. Click the Yes button. You are prompted to confirm the action: Figure 106: Confirm CC Unmanag e 2. Click the Really Unmanage button. A message is displayed confirming that th e device is no longer under CC management: Figure 107: Device Removed fro[...]

  • Seite 155

    A PPENDIX A: S PECI FICATIONS 143 Appendix A: Specifications Environmental Req uirem ents O PERATING Temperature 0 ℃ - 40 ℃ (32 ℉ - 104 ℉ ) Humidity 20% - 85% RH Altitude N/A Vibration 5-55-5 HZ, 0.38mm, 1 minutes per cycle; 30 minutes for each axis (X, Y, Z) Shock N/A N ON -O PERATING Temperature 0 ℃ - 50 ℃ (32 ℉ -122 ℉ ) Humidity [...]

  • Seite 156

    144 D OMINION KX II U SER G UIDE Electrical Specifications P AR AME TE R V AL UE Input Nominal Frequencies 50/60 Hz Nominal Voltage Range 100/240 VAC Maximum Current AC RMS 0.6A max. AC Operating Range 100 to 240 VAC (+-10%), 47 to 63 Hz Output +5 VDC, +12VDC N/A -5 VDC, -12VDC N/A Maximum DC Power Output N/A Maximum AC Power Consumption N/A Maximu[...]

  • Seite 157

    A PPENDIX A: S PECI FICATIONS 145 TCP and UDP Ports Used • HTTP, Port 80 – All requests received by Dominion KX II via HTTP (port 80) are automatically forwarded to HTTPS for complete security. Dominion KX II responds to Por t 80 for user convenience, relieving users from having to explicitly t ype “https://” in the URL field to access Domi[...]

  • Seite 158

    146 D OMINION KX II U SER G UIDE Target Server Connection Distance and Video Resolution The maximum supported distance is a function of many factors including the type/quality of Cat 5 cable, server type and manufacturer, video driv er and monitor, environm ental conditions, and user expectations. The following table summarize s the maximu m target[...]

  • Seite 159

    A PPENDIX B: U PDATING THE LDAP S CHEMA 147 Appendix B: Updating the LDAP Schema Note : The procedures in this chapter should be attempted only by experienced users. Returning User Group Information Use the information in this chapter to re turn User Group information (and assist with authorization) once authentication is successful. From LDAP When[...]

  • Seite 160

    148 D OMINION KX II U SER G UIDE Figure 108: Create New Attribute 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.1 3742.50 in the Unique x5000 Object ID field. 7. Click on the Syntax drop-down arrow and select Case Insensitive String from the list. 8. Type 1 in the Minimum fie[...]

  • Seite 161

    A PPENDIX B: U PDATING THE LDAP S CHEMA 149 Updating the Schema Cache 1. Right-click Active Direc tory Schema in the left pane of the window and select Reload the Schema from the shortcut menu. 2. Minimize the Active Directory Schema MMC console. Editing RCI User Group Attributes for User Members To run Active Directory script on Windows 20 03 serv[...]

  • Seite 162

    150 D OMINION KX II U SER G UIDE 6. Click on the Select a property to view drop-down arrow and select rciusergroup from the list. Figure 111: User Properties 7. In the Attribute Values panel of the window, type the user name you would like returned to RRC in the Edit Attribute field. Figure 112: Edit Attribute (adding user to KX II group) 8. Click [...]

  • Seite 163

    A PPENDIX C: I NFORMATIONAL N OTES 151 Appendix C: Informational Notes Overview This chapter includes important notes on Dominion KX II usage. Future updates will be documented and available online through the Help – User Guide link in the KX II Remote Console interface. Non-US Keyboards French Keyboard Caret Symbol (Linux Clients only) The Virtu[...]

  • Seite 164

    152 D OMINION KX II U SER G UIDE Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde s ymbol: Create a macro consisting of the following commands: 1. Press Right Alt 2. Press 2 3. Release 2 4. Release Right A[...]

  • Seite 165

    A PPENDIX C: I NFORMATIONAL N OTES 153 As a result, the Virtual KVM Client and the Multi-Platform Client (MPC) are unable to pr ocess these keys from a Mac client’s keyboard. Mouse Pointer Synchronization (Fedora) When connected in dual m ouse mode to a target server running Fedora, the target and local mouse pointers may lose synchronization aft[...]

  • Seite 166

    154 D OMINION KX II U SER G UIDE CIMs Windows 3-Button Mouse on Linux Targets When using a 3-button mouse on a Windows client connecting to a Linux target, the left mouse button may get mapped to the center button of t he Windows client 3-button mouse. Virtual Media Dell OptiPlex and Dimension Computers From certain Dell OptiPlex and Dimension comp[...]

  • Seite 167

    A PPENDIX D: FAQ S 155 Appendix D: FAQs General Questions Q UESTION A NSWER What is Dominion KX II? Dominion KX II is a second generation digital KVM (Keyboard, Video Mouse) switch that enables IT administrators to access and control 16, 32, or 64* servers over the network with BIOS-level functionalit y. Dominion KX II is completely hardware and OS[...]

  • Seite 168

    156 D OMINION KX II U SER G UIDE Q UESTION A NSWER Can the Dominion KX II be rack mounted? Yes. The Dominion KX II ships standard with 19" rack mount brackets. It can also be reverse rack mounted so the server ports face forward. How large is the Dominion KX II? Dominion KX II is only 1U high (except KX2-464, which is 2U), fits in a standard 1[...]

  • Seite 169

    A PPENDIX D: FAQ S 157 Remote Access Q UESTION A NSWER How many users can remotely access servers on each Dominion KX II? Dominion KX II models offer remote connections f or up to eight users per channel for simultaneous access and control of a unique target server. For one-channel devices like th e DKX2-116, up to eight remote users can access and[...]

  • Seite 170

    158 D OMINION KX II U SER G UIDE Q UESTION A NSWER Do you have a non- Windows client? Yes. Both the Virtual KVM Client and the Multi-Platform Client (MPC), allow non-Windows users to connect to target servers through the Dominion KX I and KX II switches. MPC can be run via Web browsers and standalone. Please refer to the Virtual KVM Client and the [...]

  • Seite 171

    A PPENDIX D: FAQ S 159 Universal Virtual Media Q UESTION A NSWER What Dominion KX II models support virtual media? All Dominion KX II models support virtual media. It is available standalone and through CommandCenter Secure Gateway, a centralized management appliance. What types of virtual media does the Dominion KX II support? Dominion KX II suppo[...]

  • Seite 172

    160 D OMINION KX II U SER G UIDE Ethernet and IP Networking Q UESTION A NSWER Does the Dominion KX II offer dual gigabit Ethernet ports to provide redundant fail-over, or load balancing? Yes. Dominion KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should the primary Ethernet port (or the switch/router to whic[...]

  • Seite 173

    A PPENDIX D: FAQ S 161 Q UESTION A NSWER Can I access Dominion KX II over a wireless connection? Yes. Dominion KX II not only uses standard Ethernet, but also very conservative bandwidth with very high qualit y video. Thus, if a wireless client has network connec tivity to a Dominion KX II, servers can be configured and managed at BIOS-level wirele[...]

  • Seite 174

    162 D OMINION KX II U SER G UIDE Q UESTION A NSWER I’m having problems connecting to the Dominion KX II over my IP network. What could be the problem? The Dominion KX II relies on your LAN/WAN network. Some possible problems include: • Ethernet auto negotiation. On some networks, 10/10 0 auto negotiation does not work properly and the KX II uni[...]

  • Seite 175

    A PPENDIX D: FAQ S 163 Servers Q UESTION A NSWER Does Dominion KX II depend on a Windows server to operate? Absolutely not. Because users de pend on the KVM infrastructure to always be available in any scenario wh atsoever (as they will likely need to use the KVM infrastructure to fix problems), Dominion KX II is designed to be completely independe[...]

  • Seite 176

    164 D OMINION KX II U SER G UIDE Installation Q UESTION A NSWER Besides the unit itself, what do I need to order from Raritan to install Dominion KX II? Each server that connects to Dominion KX II requires a Dominion or Paragon Computer Interface Module (CIM), an adapter that connects directly to the keyboard, video, and m ouse ports of the server.[...]

  • Seite 177

    A PPENDIX D: FAQ S 165 Q UESTION A NSWER How do I connect a serially controlled (RS- 232) device to Dominion KX II, such as a Cisco router/switch or a headless Sun server? If there are only a few serially-controlled devices, they may be connected to a Dominion KX II using Raritan’s new P2CIM-SER serial converter. However, if there are four or mor[...]

  • Seite 178

    166 D OMINION KX II U SER G UIDE Local Port Q UESTION A NSWER Can I access my servers directly from the rack? Yes. At the rack, Dom inion KX II functions just like a traditional KVM switch – allowing control of up to 64 servers using a single keyboa rd, monitor, and mouse. When I am using the local port, do I prevent other users from accessing se[...]

  • Seite 179

    A PPENDIX D: FAQ S 167 Q UESTION A NSWER If I use Dominion KX II’s remote administration tools to change the name of a connected server, does that change propagate to the local port OSD as well? Yes. If the name of a server is ch anged remotely, or via Raritan’s optional CommandCenter Secure Gate way management appliance, this update immediatel[...]

  • Seite 180

    168 D OMINION KX II U SER G UIDE Power Control Q UESTION A NSWER Does Dominion KX II have a dual power option? All Dominion KX II models come equipped with dual AC inputs and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then the KX II will automatically switch to the other. Does the power supply us[...]

  • Seite 181

    A PPENDIX D: FAQ S 169 Scalability Q UESTION A NSWER How do I connect multiple Dominion KX II devices together into one solution? Multiple Dominion KX II units do not need to be physically connected together. Instead, each Dominion KX II unit connects to the network, and they automatically work together as a single solution if deployed with Raritan[...]

  • Seite 182

    170 D OMINION KX II U SER G UIDE Computer Interface Modules (CIMs) Q UESTION A NSWER Can I use Computer Interface Modules (CIMs) from Raritan’s analog matrix KVM switch, Paragon, with Dominion KX II? Yes. Certain Paragon computer interface modules (CIMs) may work with Dominion KX II (please check the Raritan Dominion KX II release notes on the we[...]

  • Seite 183

    A PPENDIX D: FAQ S 171 Security Q UESTION A NSWER What kind of encryption does Dominion KX II use? Dominion KX II uses industry-standard (and extremely secure) 128-bit RC4 or AES encryption, both in its SSL communications as well as its own data stream. Literally no data is transmitted between rem ote clients and Dominion KX II that is not complete[...]

  • Seite 184

    172 D OMINION KX II U SER G UIDE Manageability Q UESTION A NSWER Can Dominion KX II be remotely managed and configured via Web browser? Yes. Dominion KX II can be completely configured rem otely via Web browser. Note that this does require that the workstation have an appropriate Java Runtime Environm ent (JRE) version installed. Besides the initia[...]

  • Seite 185

    A PPENDIX D: FAQ S 173 Miscellaneous Q UESTION A NSWER What is Dominion KX II’s default IP address? 192.168.0.19 2 What is Dominion KX II’s default username and password? The KX II’s default username and password are admin / raritan [all lower case]. However, for the highest level of security, the KX II forces the administrator to change the [...]

  • Seite 186

    174 D OMINION KX II U SER G UIDE Troubleshooting Q UESTION A NSWER I am logged into the Dominion KX II using Firefox, and I opened another Firefox browser. I am automatically logged into the same Dominion KX II with the second Firefox browser. Is this right? Yes, this is correct behavior and is the direct result of how browsers and cookies function[...]

  • Seite 187

    A PPENDIX D: FAQ S 175 255-62-4023-0 0[...]

  • Seite 188

    European Headquarters Raritan Europe, B.V. Eglantierbaan 16 2908 LV Capelle aan den IJssel The Netherlands Tel. (31) 10-284-4040 Fax. (31) 10-284-4049 Email: sales.europe@raritan .com Web: www .raritan.fr www.raritan.de World Headquarters Raritan, Inc. 400 Cottontail Lane Somerset, NJ 08873 USA Tel. (732) 764-8886 Fax. (732) 764-8887 Email: sales@r[...]