Raritan DKX2-V2.3.5-0N-E Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 351 Seiten
- 4.49 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Switch
Raritan UST-IP
64 Seiten 1.24 mb -
Switch
Raritan DKX2-V2.3.5-0N-E
351 Seiten 4.49 mb -
Switch
Raritan CS16(R)
21 Seiten 0.82 mb -
Switch
Raritan DOMINION KSX II
362 Seiten 5.02 mb -
Switch
Raritan KX II
20 Seiten 0.14 mb -
Switch
Raritan KX2-864
321 Seiten 2.98 mb -
Switch
Raritan SW2-USB
2 Seiten 1.21 mb -
Switch
Raritan Switch
60 Seiten 1.5 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Raritan DKX2-V2.3.5-0N-E an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Raritan DKX2-V2.3.5-0N-E, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Raritan DKX2-V2.3.5-0N-E die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Raritan DKX2-V2.3.5-0N-E. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Raritan DKX2-V2.3.5-0N-E sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Raritan DKX2-V2.3.5-0N-E
- Den Namen des Produzenten und das Produktionsjahr des Geräts Raritan DKX2-V2.3.5-0N-E
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Raritan DKX2-V2.3.5-0N-E
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Raritan DKX2-V2.3.5-0N-E zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Raritan DKX2-V2.3.5-0N-E und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Raritan finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Raritan DKX2-V2.3.5-0N-E zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Raritan DKX2-V2.3.5-0N-E, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Raritan DKX2-V2.3.5-0N-E widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
Copyright © 2011 Raritan, Inc. DKX2-v2.3.5- 0N -E March 2011 255 - 62 - 4023 - 00 Dominion KX II User Guide Release 2.3.5[...]
-
Seite 2
This document contains p roprietary information that is protected by copyright. A ll rights reserved. No part of this document may be photo copied, reproduced, or t ranslated into another lan guage without express prior written con sent of Raritan, Inc. © Copyright 2011 Raritan, Inc. All third-party software and hardware mentione d in this documen[...]
-
Seite 3
iii Contents Chapter 1 Introduction 1 KX II Overview ............................................................................................................................... 2 KX II Help ....................................................................................................................................... 4 Related Documentat[...]
-
Seite 4
Contents iv Video Properties ................................................................................................................ 63 Mouse Options ................................................................................................................... 68 VKC Virtual Media ......................................................[...]
-
Seite 5
Contents v Adding a New User .......................................................................................................... 120 Modifying an Existing User .............................................................................................. 120 Logging a User Off (Force Logoff) ..................................................[...]
-
Seite 6
Contents vi Configuring IP Access Cont rol ................................................................................................... 205 SSL Certificates ......................................................................................................................... 207 Security Banner ............................................[...]
-
Seite 7
Contents vii Chapter 13 KX II Local Console 242 Overview ................................................................ .................................................................... 242 Using the KX II Local Console ................................................................................................... 242 Simultaneous Users ..[...]
-
Seite 8
Contents viii Setting the Registry to Permit Write Operations to the Schema ............................................... 283 Creating a New Attribute ............................................................................................................ 283 Adding Attributes to the Class ................................ ....................[...]
-
Seite 9
Contents ix Appendix D FAQs 3 02 General Questions ..................................................................................................................... 303 Remote Access .......................................................................................................................... 305 Universal Virtual Media ............[...]
-
Seite 10
1 In This Chapter KX II Overview ........................................................................................... 2 KX II Help ................................................................................................... 4 KX II Client Applications ............................................................................ 5 Virtu[...]
-
Seite 11
Chapter 1 : Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) swit ch that provides BIOS-level (and up) access and control of serv ers from anywhere in the world v ia a web browser. Up to 64 servers can be controlled with a standa rd KX II. With the KX II 8-user model, u[...]
-
Seite 12
Chapter 1 : Introduction 3[...]
-
Seite 13
Chapter 1 : Introduction 4 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) KX II Local access Note: KX2-832 and KX2 -864 also use an extended local port. Remote KVM and serial devices IP LAN/WAN Modem PSTN Remote (network) access KX II Help The KX II help provides inf or mation on how [...]
-
Seite 14
Chapter 1 : Introduction 5 Related Documentation The KX II help is accompa nied by a KX II Device Quick Setu p Guide, which can be found on the Rarit an Firmware and Documentation page http://www.raritan.com/support/ firmware-and-documentation/ of Raritan's website. Installation requirements a nd instructions for client ap plications used with[...]
-
Seite 15
Chapter 1 : Introduction 6 Virtual Media All KX II models support vi rtual media. The benefits of virtual media - mounting of remote drives/media o n the target server to support software installation and diagnosti cs - are now available in all of the K X II models. Each KX II comes equippe d with virtual media to en able remote management tasks us[...]
-
Seite 16
Chapter 1 : Introduction 7 Product Photos KX II KX2 -832[...]
-
Seite 17
Chapter 1 : Introduction 8 KX2 -864[...]
-
Seite 18
Chapter 1 : Introduction 9 Product Features Hardware Integrated KVM-over-IP remote access 1U or 2U rack-mountable (brackets in cluded) Dual power supplies with f ailover; autoswitching power supply with power failure warni ng 8, 16, 32, or 64 (on KX2-464) server ports 32 (KX2-832) or 64 (KX2-864) se rver ports Support for ti[...]
-
Seite 19
Chapter 1 : Introduction 10 Software Virtual media with D2CIM-VUSB and D 2C IM-DVUSB CIMs Absolute Mouse Synchroni zation with D2CIM-VUSB CIM and D2CIM-DVUSB CIMs Plug-and-Play Web-based access and m anagement Intuitive graphical user int erface (GUI) 128 -bit encryption of com plete KVM signal, inclu ding video and virtual [...]
-
Seite 20
Chapter 1 : Introduction 11 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, M ouse) UT P Cable (Cat5/5e/6) KX II Local Access Console Local User - an optional user co nsole (consisting of a keyboard, mouse, and mult i-sync VGA monitor) attached directly to the KX II to control KVM target servers (directly at the rack, not through the netw[...]
-
Seite 21
Chapter 1 : Introduction 12 Package Contents Each KX II ships as a fully- configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmo unt chassis. Each KX II device ships with the following contents : Amount included Item 1 KX II device 1 KX II Quick Setup Guide 1 Rackmount kit 1 AC power cords 1 Cat5 network cable 1 Cat5 netw[...]
-
Seite 22
13 In This Chapter Overview .................................................................................................. 13 Default Login Information ........................................................................ 13 Getting Started ........................................................................................ 14 Overview T[...]
-
Seite 23
Chapter 2 : Installation and Configuration 14 Getting Started Step 1: Configure KVM T arget Servers KVM target servers are t he computers that will be a ccessed and controlled via the KX II. Before installing the KX II, configure all KVM target servers to ensure opt imum performance. This configuration applies only to KVM target server s, not to th[...]
-
Seite 24
Chapter 2 : Installation and Configuration 15 Win dows XP, Windows 2003 and Windows 2008 Settings To configure KVM target servers running Microsoft ® Windows XP ® operating system, Windo w s 2003 ® operating system or Windows 2008 ® operating sy stems: 1. Configure the mouse settin gs : a. Choose Start > Control Pa nel > Mouse. b. Click t[...]
-
Seite 25
Chapter 2 : Installation and Configuration 16 Note: For KVM target ser vers running Windows XP, Windows 2000 or Windows 2008, you may wi sh to create a user name t hat will be used only for remote connections thro ugh the KX II. This will enable you to keep the target server's slo w mouse pointer m otion/acceleration settings exclusive to the [...]
-
Seite 26
Chapter 2 : Installation and Configuration 17 Animate controls and elem ents inside windows Animate windows when mi nimizing and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into vi ew Fade out menu items after clicking 3. Click OK and Close the Co ntrol Panel. To configure KVM target servers[...]
-
Seite 27
Chapter 2 : Installation and Configuration 18 Windows 2000 Settings To configure KVM target servers running Microsoft ® Windows 2000 ® operating sy stem: 1. Configure the mouse settin gs : a. Ch oose Start > Cont rol Panel > Mouse. b. Click the Motion tab. Set the acceleration t o None. Set the mouse motion speed sett ing to exactly[...]
-
Seite 28
Chapter 2 : Installatio n and Configuration 19 a. Choose Main Menu > Prefere nces > Mouse. The Mou se Preferences dialog appears. b. Click the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity t owards low. e. Within the Drag & Drop group, set the Thresho[...]
-
Seite 29
Chapter 2 : Installation and Configuration 20 Note: If you change the video resol ution, you must log off of the target server and log back in for t he video settings to take eff ect. Note for Red Hat 9 KVM Target Servers If you are running Red Hat ® 9 on t he target server using a USB CIM, and are experiencing problems with the keyboard and/or mo[...]
-
Seite 30
Chapter 2 : Installation and Configuration 21 2. Configure the screen resol ution: a. Choose Main Menu > Syst em Settings > Display. Th e Display Settings dialog appears. b. On the Settings tab, select a Resolution supported by t he KX II. c. Click OK. Note: Once connected to the targ et server, in many Li nux graphical en vironments, the <[...]
-
Seite 31
Chapter 2 : Installation and Configuration 22 Make Linux Settings Permanent Note: These steps m ay vary slightly depending on the specific ver sion of Linux ® in use. To make your settings pe rmanent in Linux (promp t): 1. Choose System Menu > Preferen ces > Personal > Session s. 2. Click the Session Options tab. 3. Select the "Promp[...]
-
Seite 32
Chapter 2 : Installation and Configuration 23 2. All KVM target servers must be configured to one of the displ ay resolutions supported by t he KX II. The most popula r supported resolutions for Sun machin es are: Display resolution Vertical refresh rate Aspect ratio 1600 x 1200 60 Hz 4:3 1280 x 1024 60,75,85 Hz 5:4 1152 x 864 75 Hz 4:3 1024 x 768 [...]
-
Seite 33
Chapter 2 : Installation and Configuration 24 2. Choose Mouse Style Man ager. The Style Manager - Mou se dialog appears. 3. Set the Acceleration slider to 1.0. 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click. 2. Choose Tools > Terminal. A terminal window opens. (It is best to be at the root to issue com[...]
-
Seite 34
Chapter 2 : Installation and Configuration 25 Card To check resolution: To change resolution: 32 -bit # /usr/sbin/pgxconfig -prconf 1. # /usr/sbin/pgxconfig -res 1024x768x75 2. Log out or restart computer. 64 -bit # /usr/sbin/m64config -prconf 1. # /usr/sbin/m64config -res 1024x768x75 2. Log out or restart computer. 32 -bit and 64 -bit # /usr/sbin/[...]
-
Seite 35
Chapter 2 : Installation and Configuration 26 Make UNIX Settings Permanent Note: These steps m ay vary slightly depending on the type of UN IX ® (for example, Solaris ™ , IBM ® AIX ™ ) and the specifi c v ersion in use. 1. Choose Style Manager > S tartup. The Style Manager - St ar tup dialog appears. 2. On the Logout Confirmation dialog, s[...]
-
Seite 36
Chapter 2 : Installation and Configuration 27 Step 3: Connect the Equ ipment Connect the KX II to t he power supply, network, local P C, local video display, keyboard and mo use, and target servers. Th e letters in the diagram correspond to the topics in this section that d escr ibe the connection. A. AC Power To connect the po w er supply: 1. Atta[...]
-
Seite 37
Chapter 2 : Installation and Configuration 28 C. Network Port The KX II provides two Eth ernet ports for failover purpose s (not for load-balancing). By default, only LAN1 is active and the autom atic failover is disabled. When enabled, if the KX I I internal network interface or the network switch to which it is connected becomes un available, LAN[...]
-
Seite 38
Chapter 2 : Installation and Configuration 29 Connection Description port. Keyboard At tach a standard USB keyboard t o one of the USB Type A (female) ports. Mouse Attach a standard USB mo use to one of the USB Type A (femal e) ports. E. Target Server Ports The KX II uses standard UTP cabling (Cat5/5e/6) to connect t o each target server. To connec[...]
-
Seite 39
Chapter 2 : Installation and Configuration 30 Changing the Default Password The KX II ships with a default password. The first time y ou start the KX II you are required to change that password. To change the default p assword: 1. Power on the KX II using the power switch(s) at the back of the unit. Wait for the KX II unit to boot. (A beep signals [...]
-
Seite 40
Chapter 2 : Installation and Configuration 31 c. Enter the Default Gateway if None is selected from t he IP Auto Configuration drop-down. d. Enter the Preferred DHCP Host Name if DHCP is selected from the IP Auto Configuration d rop-down. e. Select the IP Auto Configurat ion. The following option s are available: None (Static IP) - This option [...]
-
Seite 41
Chapter 2 : Installation and Configuration 32 5. Select Obtain DNS Serve r Address Automatically if DHCP is selected and Obtain DNS Server Address is enabled. When Obtain DNS Server Address Auto matically, the DNS information provided by the DHCP server will be used. 6. If Use the Following DNS S erver Addresses is select ed, regardless of whether [...]
-
Seite 42
Chapter 2 : Installation and Configuration 33 Valid Special Characters for Targ et Names Character Description Character Description ! Exclamation point ; Semi-colon " Double quote = Equal sign # Pound sign > Greater than sign $ Dollar sign ? Question mark % Percent sign @ At sign & Ampersand [ Left bracket ( Left parenthesis Backward[...]
-
Seite 43
Chapter 2 : Installation and Configuration 34 3. If you are plugging power i nput into power supply number two (right-most power supply at the back of the device), select the Powerln2 Auto Detect option. 4. Click OK. Note: If either of t hese checkboxes is selected a nd power input is not actually connected, the power LE D at the front of the devic[...]
-
Seite 44
Chapter 2 : Installation and Configuration 35 Note on Microsoft Active Directory Microsoft ® Active Directory ® uses the LDAP/LDAPS protocol n atively, and can function as an LDAP/LDAP S server and authenti cation source for the KX II. If it has the IAS (Int ernet Authorization Server) comp onent, a Microsoft Active Directory server ca n also ser[...]
-
Seite 45
Chapter 2 : Installation and Configuration 36 5. Shut down the device and power o n once again. The DCIM-SUSB performs a reset (power cy cle). 6. Verify that the characters are co rrect.[...]
-
Seite 46
37 In This Chapter Interfaces ................................................................................................ . 37 Proxy Server Configurat ion for use with MPC, VKC and A KC ................ 50 Virtual KVM Client (VKC) ......................................................................... 51 Active KVM Client (AKC) .............[...]
-
Seite 47
Chapter 3 : Working with Target Servers 38 KX II Local Console Interface When you are located at t he server rack, the K X II provides standard KVM management and ad ministration via the KX II Local C onsole. The KX II Local Console provid es a direct KVM (analog) co nnection to you r connected servers; the perf ormance is exactly as if you were di[...]
-
Seite 48
Ch apter 3 : Working with Target Servers 39 Depending on your brows er and security settings, you may see various security and certificate wa rnings. It is necessary to accept these warnings to launch the KX II Remote Console. You can reduce the numbe r of warning messages du ring subsequent l og ins by checking the following option s on the securi[...]
-
Seite 49
Chapter 3 : Working with Target Servers 40 Interface and Navigation KX II Console Layout Both the KX II Remote Co ns ole and the KX II Local Console interfaces provide an HTML (web-based) interfa ce for configuration and administration, as well as target server list and selection. The options are organized into various tabs. After successful login,[...]
-
Seite 50
Chapter 3 : Working with Target Servers 41 Left Pan el The left panel of the KX II interface contains the follo wing information. Note that some informatio n is conditional and will onl y be displayed if you are a certain of user, are using certain features, and so on. This conditional information is n oted here. Information Description When displa[...]
-
Seite 51
Chapter 3 : Working with Target Servers 42 Information Description When displayed? Configured As Base or Configured As Tiered If you are using a tiering configuration, this indicates if the KX II y ou are accessing is the ba se device or a tiered device. When the KX II is part of a tiered configuration. Port States The statuses of the ports being u[...]
-
Seite 52
Chapter 3 : Working with Target Servers 43 Port Access Page After successfully logging o n to the KX II Remote Cons ole, the Port Access page appears. This page lists all of the KX II ports, the connected KVM target se rvers, and their statu s and availability. The Port Access page provides a ccess to the KVM target se rvers connected to the KX II.[...]
-
Seite 53
Chapter 3 : Working with Target Servers 44 Note: Do not use apostrop hes for the Port (CIM) Nam e. Status - The status for sta ndard servers is either up o r down. Type - The type of server or CIM. For blade chassis, the type ca n be Blade Chassis, Blade, Blade ChassisAdmin, and BladeChassisURL. 2. Click View by Port, View by Group or View [...]
-
Seite 54
Chapter 3 : Working with Target Servers 45 Power On - Powers on the target server through the associated outlet. This option is visible only whe n there are one or mo re power associations to the target. Power Off - Powers off t he target server through the a ssociated outlets. This option is visib le only when there are one or more power a[...]
-
Seite 55
Chapter 3 : Working with Target Servers 46 Managing Favorit es A Favorites feature is provided s o you can organize and qui ck ly access the devices you use frequently . The Favorite Devices section is located in the lower left side (side bar) of the Port Access page and p ro vides the ability to: Create and manage a list of favorite devices ?[...]
-
Seite 56
Chapter 3 : Working with Target Servers 47 Note: Both IPv4 and IPv6 a ddresses are supported. Manage Favorites Page To open the Manage Favorites pa ge: Click the Manage button in the left panel. The Manage Favorites page appears and contain s the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local S[...]
-
Seite 57
Chapter 3 : Working with Target Servers 48 c. Click Save. 3. Click Refresh. The list of dev ices on the local subnet is refr eshed. To add devices to y our Favorites List: 1. Select the checkbox next to the device name/IP addr ess. 2. Click Add. Tip: Use the Select All and Desele ct All buttons to quickly select all (or deselect all) devices in the[...]
-
Seite 58
Chapter 3 : Working with Target Servers 49 Adding, Deleting and Editing Favorites To add a device to y our favorites list: 1. Choose Manage > Add New D evice to Favorites. Th e Add New Favorite page appears. 2. Type a meaningful description. 3. Type the IP Address/Host Name for the device. 4. Change the discovery Port (if necessary). 5. Select t[...]
-
Seite 59
Chapter 3 : Working with Target Servers 50 Proxy Server Configuration for use with MPC, VKC and AKC When the use of a Proxy Server i s re quired, a SOCKS proxy must also be provided and configured on the remote client PC. Note: If the installed prox y server is only capable of the HTTP proxy protocol, you cannot conne ct. To configure the SOCKS pro[...]
-
Seite 60
Chapter 3 : Working with Target Servers 51 start javaw -Xmn128M -Xm x512M -XX:MaxHeapFree Ratio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=tr ue -DsocksProxyHost=192.1 68.99.99 -DsocksProxyPort=1080 -classpath .sdeploy.jar;.sFoxt rot.jar;.jaws.jar;.sMpc.jar com.raritan.rrc.ui.RRCAppl ication %1 Virtual KVM Client (VKC) Please note this cli[...]
-
Seite 61
Chapter 3 : Working with Target Servers 52 Button Button Name Description Video Settings Opens the Video Setting s dialog, allowing you to manually adjust video con version parameters. Color Calibration Adjusts color setting s to reduce excess color noise. Same as choosing Video > Color Calibrate. Note: Not available in K X II -101-V2. Target Sc[...]
-
Seite 62
Chapter 3 : Working with Target Servers 53 Switching Bet ween KVM Target Servers With the KX II, you can acces s several KVM target servers. The KX II provides the ability t o switch from one target server to anothe r. Note: This feature is avail able in the KX II Remote Console only. To switch bet w een KVM target servers: 1. While already using a[...]
-
Seite 63
Chapter 3 : Working with Target Servers 54 Disconnecting KVM Target Serv ers Note: This item is not avail able on the KX II Local Co nsole. The only way to disconnect from t he sw itched target in the Local Consol e is to use the hot key. To disconnect a target s erver: 1. Click the port name of the target you want to disconnect. The Port Action me[...]
-
Seite 64
Chapter 3 : Working with Target Servers 55 Connection Properties The dynamic video compre ssion algorithms maintain K VM console usability under varying ban dwidth constraints. The de vices optimize KVM output not only for LAN use, but also for WAN use. Th ese devices can also control color depth and limit video output, offering an optimal balance [...]
-
Seite 65
Chapter 3 : Working with Target Servers 56 256 Kb (Cable) 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) Note that these settings a re an optimization for specif ic conditions rather than an exact spee d. The client and server al ways attempt to deliver video as quickly as possibl e on the network reg[...]
-
Seite 66
Chapter 3 : Working with Target Servers 57 Connection Information To obtain information about y our Virtual KVM Client connection: Choose Connection > Inf o... The Connection I nfo window opens. The following information is display ed about the current conne ction: Device Name - The name of t he device. IP Address - The IP addre ss o[...]
-
Seite 67
Chapter 3 : Working with Target Servers 58 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) o r Virtual KVM Client ( VKC). Macros exported from MPC or VKC cannot be imported into AKC. Note: KX II-101 does not support AKC. To import macros: 1. Choose Keyboard > Impo rt [...]
-
Seite 68
Chapter 3 : Working with Target Servers 59 Click Yes to replace the ex isting macro with the imported version. Click Yes to All to replace the curre ntly selected and an y other duplicate macros t hat are found. Click No to keep the original macro and proceed to the next macro Click No to All keep the ori ginal macro and proceed to [...]
-
Seite 69
Chapter 3 : Working with Target Servers 60 3. Click Ok. The Export Key board Macro. A dialog from which to locate and select the macro file appear s. By default, the macro exists on your desktop. 4. Select the folder to save the macro file to, enter a name f or the file and click Save. If the macro alre ady exists, you receive an alert message. Sel[...]
-
Seite 70
Chapter 3 : Working with Target Servers 61 Press Left Ctrl Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequen ce field to be sure the ma cro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step a nd then click the up or down ar[...]
-
Seite 71
Chapter 3 : Working with Target Servers 62 Running a Keyboard Macro Once you have created a keyboard macro, execute i t using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a ma cro, it appears under the Keyb oard menu. Execute the keyboard macro by clicking on it in the[...]
-
Seite 72
Chapter 3 : Working with Target Servers 63 3. Set the language and mouse s ettings. 4. Exit the menu to return to n ormal CIM functionality. Video Properties Refreshing the Screen The Refresh Screen com mand forces a refresh of t he video screen. Video settings can be refre shed automatically in sever al ways: The Refresh Screen com mand forces[...]
-
Seite 73
Chapter 3 : Working with Target Servers 64 Calibrating Color Use the Calibrate Color command to optimize the colo r levels (hue, brightness, saturation) of t he transmitted video imag es. The color settings are on a target s erver-basis. Note: The Calibrate Colo r command applies to the c urrent connection only. Note: The KX II-101 does suppo rt co[...]
-
Seite 74
Chapter 3 : Working with Target Servers 65 c. Brightness: Use this setting to adjust the brightness of the target server display. d. Brightness Red - Controls the brightness of the target server display for the red signal. e. Brightness Green - Controls the bri ghtness of the green signal. f. Brightness Blue - Controls the brightness of the blue si[...]
-
Seite 75
Chapter 3 : Working with Target Servers 66 Note: Some Sun backgro und screens, such as scr eens with very dark borders, may not center precisel y on certain Sun servers. Use a different background or place a light er colored icon in the upper left corner of the screen.[...]
-
Seite 76
Chapter 3 : Working with Target Servers 67 Using Screenshot from Target You are able to take a scre enshot of a target server using the Screenshot from Target server c ommand. If needed, save this screenshot to a file location of your choosing as a bit map, JPEG or PNG file. To take a screenshot of t he target serv er: 1. Select Video > Screensh[...]
-
Seite 77
Chapter 3 : Working with Target Servers 68 Changing the Maximum Refresh Rate If the video card you are u sing on the target uses cust om software and you are accessing the targ et through MPC or VKC, you may need to change the maximum refre sh rate of the monitor in order f or the refresh rate to take effect on the target . To adjust the monitor re[...]
-
Seite 78
Chapter 3 : Working with Target Servers 69 Mouse Pointer Synchronization When remotely v iewing a target server that uses a m ouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to t he target server. When the mou se pointer lies within the Virtual KVM Clien t target server window, m ouse m[...]
-
Seite 79
Chapter 3 : Working with Target Servers 70 Additional Notes for Intelligent Mouse Mode Be sure that there are no ic ons or applications in the upper left section of the screen since that is where the synchronization routine takes place. Do not use an animated mous e. Disable active desktop on KVM target servers. Synchronize Mouse In dua[...]
-
Seite 80
Chapter 3 : Working with Target Servers 71 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mou se settings and synchronize the mou se cursors accordingly, allowing mouse acceleration on the target. Intelligent mouse mode is t he default for non -VM targets. In this mode, the mouse c ursor does a “dance” in the[...]
-
Seite 81
Chapter 3 : Working with Target Servers 72 Please note that mouse co nfigurations will vary on di fferent target operating systems. Cons ult your OS guidelines for furt her details. Also note that intelligent mouse synchr onization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coo rdinates are used to k eep the client [...]
-
Seite 82
Chapter 3 : Working with Target Servers 73 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mo de: 1. Press Ctrl+Alt+O on your k eyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media for complete inform ation about setting up and using virtual media.[...]
-
Seite 83
Chapter 3 : Working with Target Servers 74 Smart Cards (VKC, AKC and MP C) Using the KX II 2.1.10 or lat er, you are able to mount a smart card reader onto a target server to sup port smart card authentic ation and related applications. For a list of supported smart cards, smart card readers, and additional system requirements, se e Supported and U[...]
-
Seite 84
Chapter 3 : Working with Target Servers 75 4. A progress dialog will open. Check the 'Mount selected card read er automatically on connection t o targets' checkbox to mount the smart card reader automatically the next time you connect t o a target. Click OK to begin the mounting process. To update the smart card in the Select Smart Card R[...]
-
Seite 85
Chapter 3 : Working with Target Servers 76 Tool Options From the Tools menu, you can specify certain option s for use with the Virtual KVM Client, includi ng logging, setting the key board type, and defining hot keys for exitin g Full Screen mode and Single C ursor mode. Note: The KX II-101 and K X II- 101 -V2 do not support single cursor mode. To [...]
-
Seite 86
Chapter 3 : Working with Target Servers 77 4. Exit Full Screen Mode - Hotkey. When y ou enter Full Screen mode, the display of the target server be comes full screen a nd acquires the same resolution as the ta rget server. This is the hot key us ed for exiting this mode. 5. Exit Single Cursor Mode - Hotk ey. When you enter si ngle cursor mode, only[...]
-
Seite 87
Chapter 3 : Working with Target Servers 78 Language Configuration method French Keyboard Indicator German System Settings (Control Center) Japanese System Settings (Control Center) UK System Settings (Control Center) Korean System Settings (Control Center) Belgian Keyboard Indicator Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Key[...]
-
Seite 88
Chapter 3 : Working with Target Servers 79 View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off): Choose View > View Toolb ar. Scaling Scaling your target window allow s you to view the entire content s of the target server window. This feature incr[...]
-
Seite 89
Chapter 3 : Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provi des version informatio n about the Virtual KVM Client, in case you require assista nce from Raritan Technical Support. To obtain version information: 1. Choose Help > About Rarit an Virtual KVM Client. 2. Use the Copy to Clipboard but[...]
-
Seite 90
Chapter 3 : Working with Target Servers 81 AKC Supported Operating Sy stems and Browsers .NET Framework AKC requires Windows .N ET ® version 3.5, and will work with both 3.5 and 4.0 installed. Operating Systems When launched from Internet E xplorer ® , AKC allows you to reach t arget servers via the KX II 2. 2 (or later). AKC is compatible with t[...]
-
Seite 91
Chapter 3 : Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC: Ensure the cookies from the IP addr ess of the device that is bein g accessed are not currently being bl ocked. Windows Vista, Windows 7 and Windows 2008 server users should ensure that the IP address of the device being acce ssed is included in thei[...]
-
Seite 92
Chapter 3 : Working with Target Servers 83 Note: The Alt+Tab comm and toggles between windows o nly on the local system. When MPC opens, the Rar itan devices that were automatically detected and which are f ound on your subnet are displ ayed in the Navigator in tree format. 2. If your device is not listed b y name in the navigator, ad d it manually[...]
-
Seite 93
84 In This Chapter Overview .................................................................................................. 84 Turning Outlets On/Off and Cycling Power ............................................. 85 Overview The KX II allows you to con trol Raritan PX and RPC series rack PDU (power strip) outlets conne cted to the KX II through[...]
-
Seite 94
Chapter 4 : Rack PDU (Power Strip) Outlet Control 85 Control - Turn outlets on or off , or cycle their power. Association - The ports associate d with the outlet. Initially, when you open the Powerstrip page, the po wer strips that are currently connected to the K X II are displayed in the P owerstrip drop-down. Additionally, informatio n r[...]
-
Seite 95
Chapter 4 : Rack PDU (Power Strip) Outlet Control 86 5. Click OK to close the Power On conf irmation dialog. The outlet will be turned on and its state will be displayed as 'on'. To turn an outlet off: 1. Click Off. 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The o utlet will be turned off and it[...]
-
Seite 96
Chapter 4 : Rack PDU (Power Strip) Outlet Control 87 2. Click OK. The outlet will then cycl e (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog.[...]
-
Seite 97
88 In This Chapter Overview .................................................................................................. 89 Prerequisites for Using Virt ual Med ia ...................................................... 92 Using Virtual Media via VKC and A KC in a Windows Environm ent ........ 93 Using Virtual Media ...........................[...]
-
Seite 98
Chapter 5 : Virtual Media 89 Overview Virtual media extends KVM capabili ties by enabling KVM target servers to remotely access media f rom a client PC and networ k file servers. With this feature, media mount ed on a client PC and net work file servers is essentially "mounted virtual ly" by the target server. The target server can then r[...]
-
Seite 99
Chapter 5 : Virtual Media 90[...]
-
Seite 100
Chapter 5 : Virtual Media 91 Diagram key Desktop PC CD/DVD drive KX II USB mass storage device CIM PC hard drive Target server Remote file server (ISO images)[...]
-
Seite 101
Chapter 5 : Virtual Media 92 Prerequisites for Using Virtual Media With the virtual media feat ure, you can mount up to t wo drives (of different types) that are suppo rted by the USB profile currently applied to the target. These drives are accessible for the duratio n of the KVM session. For example, you can mount a specific CD-ROM, use it, and t[...]
-
Seite 102
Chapter 5 : Virtual Media 93 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP ® operating system admi nistrator and standard user privileges vary from those of the Windows Vista ® operating system and the Windows 7 ® operating system. When enabled in Vista or Windows 7, User Access Cont rol (UAC) provides the lowest level [...]
-
Seite 103
Chapter 5 : Virtual Media 94 Using Virtual Media See Prerequisites for Using Virtual Media before proceeding with using virtual media. To use virtual media: 1. If you plan to access file se rver ISO images, identif y those file servers and images throug h the Remote Console Fil e Server Setup page. See File Server Setu p (File Server ISO Im ages On[...]
-
Seite 104
Chapter 5 : Virtual Media 95 File Server Setup (File Server ISO Images Only) Note: This feature is only r equired when using virtu al media to access file server ISO images. ISO9660 f ormat is the standard suppo rted by Raritan. However, other C D-ROM extensions may also work. Note: SMB/CIFS support is required on the file server. Use the Remote Co[...]
-
Seite 105
Chapter 5 : Virtual Media 96 Note: You cannot acces s a remote ISO image via virtual media using an IPv6 address due to techni cal limitations of third-party soft ware used by the by the KX, KSX or K X101 G2 device. Note: If you are connectin g to a Windows 2003 ® server and attempt to load an ISO image from the server, you may receive an er ror s[...]
-
Seite 106
Chapte r 5 : Virtual Media 97 Connecting to Virtual Media Local Drives This option mounts an entir e drive, which means the entire disk drive is mounted virtually onto the targ et server. Use this option f or hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives. This is the only option for which R ead/[...]
-
Seite 107
Chapter 5 : Virtual Media 98 3. If you want Read and Write capabilitie s, select the Read-Write checkbox. This option is di sabled for nonremovable d rives. See the Conditions when Read/Write is N ot Available (on page 98 ) for more information. When chec ked, you will be able to read o r write to the connected USB disk. WARNING: Enabling Read /Wri[...]
-
Seite 108
Chapter 5 : Virtual Media 99 CD -ROM/DVD-ROM/ISO I mages This option mounts CD-ROM , DVD-ROM, and ISO image s. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DV D-ROM, or ISO image: 1. From the Virtual KVM Clie nt, choose Virtual Media > Con nect CD -ROM/ISO I mage. [...]
-
Seite 109
Chapter 5 : Virtual Media 100 4. For remote ISO images on a f ile server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Image f rom the drop-down list. The file servers and image paths available are those that you configu red using the File Server Setup page. Only items you conf igured using the File Server Setup page will be[...]
-
Seite 110
101 In This Chapter Overview ................................................................................................ 101 CIM Compatibility .................................................................................. 102 Available USB Profiles ........................................................................... 102 Selecting Pr[...]
-
Seite 111
Chapter 6 : USB Profiles 102 CIM Compatibility In order to make use of USB profiles, you must use a D2 CIM-VUSB or D2CIM-DVUSB with updated f irmware. A VM-CIM that has not had its firmware upgraded will sup port a broad range of confi gurations (Keyboard, Mouse, CD-ROM , and Removable Drive) but will not be able to make use of profile s optimized [...]
-
Seite 112
Chapter 6 : USB Profiles 103 USB profile Description USB bus speed limited to full-speed (12 MBit/s) No virtual media support BIOS DellPowerEdge Keyboard Only Dell PowerEdge BIOS A ccess (Keyboard Only) Use this profile to have keyboard functionality for the Dell Powe rEdge BIOS when using D2CIM-VUSB . When using the new D2CIM-DVUSB, use &a[...]
-
Seite 113
Chapter 6 : USB Profiles 104 USB profile Description BIOS Generic BIOS Generic Use this profile when Gen eric OS profile does not work on th e BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Restrictions: USB bus speed limited to full-speed (12 MBit/s) Absolute mouse syn chronizat ion™ not [...]
-
Seite 114
Chapter 6 : USB Profiles 105 USB profile Description Advanced Management Module functionality when D2CIM-VUSB or D2CIM-DVUSB is connected t o the Advanced Management Module. Restrictions: Virtual CD-ROM and disk drive s cannot be used simultaneously BIOS Lenovo ThinkPad T6 1 & X61 BIOS Lenovo ThinkPad T6 1 and X61 (boot from virtual media) [...]
-
Seite 115
Chapter 6 : USB Profiles 106 USB profile Description Installation) (Windows 2003 Server Ins tallation) Use this profile for t he HP Proliant DL360/DL380 G4 series server when installing Windows 2003 S erver without the help of HP SmartSt art CD. Restrictions: USB bus speed limited to full-speed (12 MBit/s) Linux ® Generic Linux profile This is[...]
-
Seite 116
Chapter 6 : USB Profiles 107 USB profile Description series mainboards with Phoenix AwardBIOS. Re strictions: Virtual CD-ROM and disk drive s cannot be used simultaneously Suse 9.2 SuSE Linux 9.2 Use this for SuSE Linux 9. 2 distribution. Restrictions: Absolute mouse synchronizat ion™ not supported USB bus speed limited to full-speed [...]
-
Seite 117
Chapter 6 : USB Profiles 108 USB profile Description USB bus speed limited to full-speed (12 MBit/s) Virtual CD-ROM and disk drive s cannot be used simultaneously WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Use Full Speed for Virtual Media CIM Use Full Speed for virtual media CIM This profile r[...]
-
Seite 118
Chapter 6 : USB Profiles 109 Mouse Modes when Using the Mac OS-X USB Profile w ith a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X ® USB profile, and running Mac OS-X 10.4.9 ( or later), when you reboot you must be in Single Mouse mode to use the mou se at the Boot menu. To configure the mouse to w ork at the Boot menu : 1. Reboot the M[...]
-
Seite 119
110 In This Chapter User Groups .......................................................................................... 110 Users ..................................................................................................... 119 Authentication Settings .......................................................................... 122 Changing[...]
-
Seite 120
Chapter 7 : User Management 111 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, whe n you add a user, you must ass ign that user to an existing user group. The User Group List page dis plays a list of all user g roup[...]
-
Seite 121
Chapter 7 : User Management 112 The Group page is organized into t he following cate gories: Group, Permissions, Port Permissi ons, and IP ACL. 2. Type a descriptive name fo r the new user group into the Gr oup Name field (up to 64 character s). 3. Set the permissions for the group. Select the checkbo xes before the permissions you want to as sign [...]
-
Seite 122
Chapter 7 : User Management 113 Note: Several administrative f unctions are available wi thin MPC and from the KX II Local Console. These functions are available only to members of the default Admin group. Note: Both IPv4 and IPv6 a ddresses are supported.[...]
-
Seite 123
Chapter 7 : User Management 114 Setting Permissions Important: Selecting the Us er Management checkbox al low s the members of the group to change the permissions of al l users, including their o w n. Carefully consider granting t hese permissions. Permission Description Device Access While Under CC -SG Management Allows users and user groups with [...]
-
Seite 124
Chapter 7 : User Management 115 Permission Description User Management User and group management, remote. authentication (LDAP/LDA PS/RADIUS), login settings. If you are using a tiered conf iguration in which a base KX II device is use d to access multiple other tiered devices, user, user group a nd remote authentication settings m us t be consiste[...]
-
Seite 125
Chapter 7 : User Management 116 Power control access Option Description Deny Deny power control to the targ et server Access Full permission to power control on a target serve r For blade chassis, the port ac cess permission will control ac cess to the URLs that have been configured f or that blade chassis. The options are Deny or Control. In addit[...]
-
Seite 126
Chapter 7 : User Management 117 Use the IP ACL section of t he Group page to add, insert, repla ce, and delete IP access control ru les on a group-level basis. To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2. Type the ending IP address in the Ending IP field. 3. Choose the action from the available options: Ac[...]
-
Seite 127
Chapter 7 : User Management 118 2. Click Delete. 3. When prompted to confirm t he deletion, click OK. Important: ACL rules are ev aluated in the order in which they are listed. For instance, in th e example sho w n here, if the two ACL rules were reversed, Domi nion would accept no communication at all. Tip: The rule numbers allow you to have more [...]
-
Seite 128
Chapter 7 : User Management 119 Tip: To determine the users belo nging to a particular group, sort t he User List by User Group. 1. Choose a group from am ong those listed by che cking the checkbox to the left of the Group Nam e. 2. Click Delete. 3. When prompted to confirm t he deletion, click OK. Users Users must be granted user name s and passwo[...]
-
Seite 129
Chapter 7 : User Management 120 Adding a New User It is a good idea to define u ser groups before creating K X II users because, when you add a user, y ou must assign that user to an existing user group. See Adding a New User Group (on page 111 ). From the User page, you can add new users, modify user information, and reactivate users that have bee[...]
-
Seite 130
Chapter 7 : User Management 121 5. To delete a user, click Del ete. You are prompted t o confirm the deletion. 6. Click OK. Logging a User Off (Force Logof f) If you are an administrator, you are able to log off another locally authenticated user who is l ogged on to the KX II. To log off a user: 1. Open the User List page by choosing User Manageme[...]
-
Seite 131
Chapter 7 : User Management 122 Authentication Settings Authentication is the proce ss of verifying that a user i s who he says he is. Once a user is authenticated, t he user's group is used to determine his system and port permi ssions. The user's assigned privileges determine what type of ac cess is allowed. This is call ed authorizatio[...]
-
Seite 132
Chapter 7 : User Management 123 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protoc ol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services r unning over TCP/IP. A client starts an LDAP session by connecti ng to an LDAP/LDAPS server (the default TCP port is 389). The client then sends ope[...]
-
Seite 133
Chapter 7 : User Management 124 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searching for u ser information. Up to 64 char acters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com . Consul t your authentication server admi nistrator for the appropriate val[...]
-
Seite 134
Chapter 7 : User Management 125 11. If you entered a Disting uished Name for the Administrative User, you must enter the password that will be u sed to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the S ecret Phrase field and again in the Confirm Secret Phrase field (up to 128 charac[...]
-
Seite 135
Chapter 7 : User Management 126 15. Select the Enable L DAPS Server Certificate Valid ation checkbox to use the previously uploaded ro ot CA certificate file to v alidate the certificate provided by the server. If you do not want t o use the previously uploaded root C A certificate file, leave this checkbox deselected. Disabling this f unction is t[...]
-
Seite 136
Chapter 7 : User Management 127 Once the test is completed, a message will be displayed that lets you know the test was successf ul or, if the test failed, a de tailed error message will be displayed. I t will display successful result or detail error message in failure case. It also can display group information retrieved from remote LDAP ser ver [...]
-
Seite 137
Chapter 7 : User Management 128 Important Notes Group Name is case sensit ive. The KX II provides the following d efault groups that cannot be changed or deleted: Admin and < Unknown>. Verify that your Active Directory server does not us e the same group name s. If the group information ret ur ned from the Active Directory server [...]
-
Seite 138
Chapter 7 : User Management 129 9. The default number of retries is 3 Retries. This is the number of time s the KX II will send an authenticatio n request to the RADIUS serv er. 10. Choose the Global Auth entication Type from amo ng the options in the drop-down list: PAP - With PAP, passwords a re sent as plain text. PAP is not interactive. The[...]
-
Seite 139
Chapter 7 : User Management 130 Note: Both IPv4 and IPv6 a ddresses are supported. Cisco ACS 5.x for RADIUS Authentication If you are using a Cisco ACS 5. x server, aft er you have configured the KX II for RADIUS authenti cation, complete the following steps on the Cisco ACS 5.x server. Note: The following steps i nc lude the Cisco menus a nd menu [...]
-
Seite 140
Chapter 7 : User Management 131 Returning User Group Informa tion via RADIUS When a RADIUS authentication at tempt succeeds, the KX II determines the permissions for a give n user based on the permi ssions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemente d as a RADIUS FILTE[...]
-
Seite 141
Chapter 7 : User Management 132 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network c onnections. NAS-Port (5) Always 0. NAS- IP -Address (4) The IP address for the KX II. User-Name (1) The user name entered a t the login screen. Acct-Session-ID (44) Session ID for accounting.[...]
-
Seite 142
Chapter 7 : User Management 133 User Authentication Proc ess Remote authentication follows t he process specified in the flowchart below:[...]
-
Seite 143
Chapter 7 : User Management 134 Changing a Password To change your pass w ord: 1. Choose User Management > Chang e Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Rety pe the new password in the Confirm New Pa ssword field. Password s can be up t[...]
-
Seite 144
135 In This Chapter Network Settings ................................................................................... 135 Device Services ..................................................................................... 140 Configuring Modem Setti ngs ................................................................ . 148 Configuring Date/Tim[...]
-
Seite 145
Chapter 8 : Device Management 136 Network Basic Settings These procedures describe how to assign an IP address o n the Network Settings page. For complet e information about all of the fields and the operation of this page, see Network Settings . To assign an IP address: 1. Choose Device Setting s > Network. The Networ k Settings page opens. 2. [...]
-
Seite 146
Chapter 8 : Device Management 137 d. Enter the Gateway IP A ddress. e. Link-Local IP Address. This addres s is automatically assigned t o the device. It is used for ne ighbor discovery or when no routers are present. Read-Only f. Zone ID. This identifies the device with which the ad dress is associated. Read-Only g. Select the IP Auto Configurat io[...]
-
Seite 147
Chapter 8 : Device Management 138 See LAN Interface Settin gs (on page 138 ) for information in configuring this section of the Network Set tings page. Note: In some environments, t he default LAN Interface Speed & Duplex setting Autodetect (autonegotiator ) does not properly set the network parameters, which result s in network issues. In thes[...]
-
Seite 148
Chapter 8 : Device Management 139 Autodetect (default option) 10 Mbps/Half - Both LEDs blink 10 Mbps/Full - Both LEDs blink 100 Mbps/Half - Yellow LE D blinks 100 Mbps/Full - Yellow LED blin ks 1000 Mbps/Full (gigabit) - Green LED bl inks Half-duplex provides for co mmunication in both directi ons , but only one directio[...]
-
Seite 149
Chapter 8 : Device Management 140 Device Services The Device Services page allows you to configure the followin g functions: Enable SSH access. Enable tiering for the base KX II. En ter the discovery port. Enable direct port access. Enable the AKC Download Server Certificate Validatio n feature if you are using AKC. Enabling SSH[...]
-
Seite 150
Chapter 8 : Device Management 141 Entering the Discovery Port The KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can co nfigure it to use an y TCP port except 80 and 443. To access the KX II from beyond a firewall, your f irewall settings must enable two-way comm unication through t he default Port 50[...]
-
Seite 151
Chapter 8 : Device Management 142 Configuring and Enabling Tieri ng The tiering feature allows you t o access KX II targets and PDUs through one base KX II device. This f eature is available for standa rd KX II devices as well as KX2-832 and K X2-864 devices. Devices can be added and removed from a configu ra tion as needed up t o a maximum of two [...]
-
Seite 152
Chapter 8 : Device Management 143 Enabling Tiering Connect from a target se rver port on the base device to the tier KX II Local Access port video/ke yboard/mouse ports usi ng a D2CIM-DVUSB. If the tier device is a KX2-832 or KX 2-864, connect from a t arget server port on the base device directly to the tier KX2-832/KX2-864 E xtended Local port. T[...]
-
Seite 153
Chapter 8 : Device Management 144 Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached directly to the base are accessible. Power Control You can power on and off targets that are a part of t he tiered configuration. These target s are accessed from the P ort Access page. KX II PDU outlets can [...]
-
Seite 154
Chapter 8 : Device Management 145 Cabling Example in Tiered Configurations The following diagram illustrates the ca bling configurations bet ween a KX II tiered device and a KX II base device. Connect from a target server port on the base device to t he tier KX II Local Access port video/keyboard/mouse port s using a D2CIM-DVUSB. If the tier device[...]
-
Seite 155
Chapter 8 : Device Management 146 Enabling Direct Port Acc ess via URL Direct port access allows u sers to bypass having to u se the device's Login dialog and Port Acces s page. This feature also provides the ability to enter a username and passwor d directly and proceed to the target if the username and passwor d is not contained in the URL. [...]
-
Seite 156
Chapter 8 : Device Manageme nt 147 Enabling the AKC Do w nload Server Certificate V alidation If you are using the AKC cl ient, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Option 1: Do Not Enable AKC Download Serv er Certificate Validation (default settin g) If you do not enabl[...]
-
Seite 157
Chapter 8 : Device Management 148 Configuring Modem Settings To configure modem sett ings: 1. Click Device Settings > Modem Set tings to open the Modem Sett ings page. 2. Select the Enable Modem checkbox. This will enable the Serial Line Speed and Modem Init St ring field. 3. The Serial Line Speed of t he modem is set to 115200. Read-only 4. Ent[...]
-
Seite 158
Chapter 8 : Device Management 149 6. Click OK to commit your changes o r click Reset to Defaults t o return the settings to their defaults. See Certified Modems (on page 271) for information on certified modems that work with the KX II. For information on settings that will give you the best perform ance when connecting to the KX II via modem, see [...]
-
Seite 159
Chapter 8 : Device Management 150 3. To adjust for daylight savings time, check the "Adjust for daylight savings time" checkbox. 4. Choose the method you woul d like to use to set the date and time: User Specified Time - Choose thi s option to input the date and time manually. For the User Specified Tim e option, enter the date and ti[...]
-
Seite 160
Chapter 8 : Device Management 151 Event Management The KX II Event Management feature allows you enable and di sable the distribution of system even ts to SNMP Managers, the Sy slog and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or seve ral destinations. Configuring Event[...]
-
Seite 161
Chapter 8 : Device Management 152 3. Click OK. To reset to factory defaults: Click Reset To Defaults. Note: Both IPv4 and IPv6 a ddresses are supported. Note: IPv6 addresses cann ot exceed 80 characters in length f or the host name.[...]
-
Seite 162
Chapter 8 : Device Management 153 Event Management - Destina tions System events, if enabled, can g enerate SNMP notific ation events (traps), or can be logged to Syslog or A udit Log. Use the Event Management - Destinations page to select the system ev ents to track and where to send this information. Note: SNMP traps will be g enerated only if th[...]
-
Seite 163
Chapter 8 : Device Management 154 3. Click OK.[...]
-
Seite 164
Chapter 8 : Device Management 155 To reset to factory defaults: Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possible for the KX II and the router that it is attached to to fall out of synch ronization when the KX II is reboote d, preventing the reboot completed S NMP trap from being logged. SNMP Agent Configuration S[...]
-
Seite 165
Chap ter 8 : Device Management 156 Trap Name Description communicate over the net work. networkParameterChange d A change has been made t o the network parameters. passwordSettingsChanged Strong password settings h ave changed. portConnect A previously authenticated use r has begun a KVM session. portConnectionDenied A connection to the target port[...]
-
Seite 166
Chapter 8 : Device Management 157 Trap Name Description userSessionTimeout A user with an active sessi on has experienced a session termination due to timeout. userUploadedCertificate A user uploaded a SSL certif icate. vmImageConnected User attempted to mount either a device or image on the target using Virtual Media. For every attempt on device/i[...]
-
Seite 167
Chapter 8 : Device Management 158 4. Click OK. Note: If either of t hese checkboxes is selected a nd power input is not actually connected, the power LE D at the front of the unit turn s red. To turn off the automati c detection: Deselect the checkbox for the appropriate power sup ply. To reset to factory defaults: Click the Reset To Defaul[...]
-
Seite 168
Chapter 8 : Device Management 159 Port type Description PowerStrip (rack PDU) Power strip connected VM Virtual media CIM (D2CIM-VUSB and D2CIM-DVUSB) Blade Chassis Blade chassis and the bla des associated with that chassis (displaye d in a hierarchical order) 2. Click the Port Name for the port you want to edit. For KVM ports, the Port pa ge fo[...]
-
Seite 169
Chapter 8 : Device Management 16 0 8. Click OK. Configuring KVM S w itches The KX II also supports u se of hot key sequences to sw itch between targets. In addition to using hot key sequences with standard s er vers, KVM switching is supporte d by blade chassis and in t iered configurations. Important: In order for user groups to see the KVM switch[...]
-
Seite 170
Chapter 8 : Device Management 161 5. Select KVM Switch Hot Key S eque nce. 6. Enter the Maximum Numb er of Target Ports (2-32). 7. In the KVM Switch Name f ield, enter the name you want to use to refer to this port connectio n. 8. Activate the targets that the KVM switch hot key sequ ence will be applied to. Indicate the KV M switch ports have targ[...]
-
Seite 171
Chapter 8 : Device Management 162 Configuring Rack PDU (Po w er Strip) Targets The KX II allows you to con nec t rack PDUs (power str ips) to KX II ports. KX II rack PDU configurati on is done from the KX II Port Configuration page. Connecting a Rack PDU Raritan PX series rack PD Us (power strips) are conn ected to the KX II using the D2CIM-PWR CIM[...]
-
Seite 172
Chapter 8 : Device Management 163 Naming the Rack PDU in the KX II (Port Page for Power Strips) Note: PX rack PDUs (pow er strips) can be named in t he PX as well as in KX II. The Port page opens whe n you select a port from th e Port Configuration page that is connected to a Raritan remote rack PD U. The Type and the Name fields are prepopulat ed.[...]
-
Seite 173
Chapter 8 : Device Management 164 3. Click OK.[...]
-
Seite 174
Chapter 8 : Device Management 165 Associating Outlets with Target Servers on KX II The Port page opens whe n you click on a port on the P or t Configuration page. From this page, you can make power associations, change the port name to something more d escr iptive, and update target server settings if you are using the D2CIM-VUSB CIM. The (CIM) Typ[...]
-
Seite 175
Chapter 8 : Device Management 166 Removing Power Associations When disconnecting targ et servers and/or rack P DUs from KXII, all power associations should first be deleted. When a t arget has been associated with a rack PD U and the target is remove d from the KX II, the power association remain s. When this occurs, you are not able to access the [...]
-
Seite 176
Chapter 8 : Device Management 167 Configuring Blade Chass is In addition to standard servers and r ack PDUs (power strips), y ou can control blade chassis that a re plugged into a Dominion device port. Up to eight blade chassis can be managed at a given time. As with standard server s, blade chassis are autodete cted once they are connected. When a[...]
-
Seite 177
Chapter 8 : Device Management 168 Note: In the case of IBM Blade Center Models E and H, the KX II only supports auto-discovery for A MM[1] as the acting primary management module. The use of hot key sequen ces to switch KVM access to a blade chassis is also supported. For blade chas sis that allow users t o select a hot key sequence, those option s[...]
-
Seite 178
Chapter 8 : Device Ma nagement 169 2. Select Device Settings > Port Configuration to open the Port Configuration page. 3. On the Port Configuration p age, click on the name of t he blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio button. The page will then display the necessary fields to configur e [...]
-
Seite 179
Chapter 8 : Device Management 170 b. URL - Enter the URL to t he interface. Required c. Username - Enter the use rname used to access the interfa ce . Optional d. Password - Enter the pass word used to access the int erface. Optional Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or the c onnection will [...]
-
Seite 180
Chapter 8 : Device Management 171 5. Select the Dell blade cha ssis model from the Blade Server C hassis Model drop-down. To configure a Dell P owerEdge M1000e: 1. If you selected Dell Power Edge ™ M1000e, auto-discovery is available. Configure the bl ade chassis as applicable. P rior to configuring a blade cha ssis that can be auto-discovered, i[...]
-
Seite 181
Chapter 8 : Device Management 172 5. In the Blade Chassis Managed Li nks section of the page, you are able to configure the con nection to a blade chassis web browser interface if one is availabl e. Click the Blade Chassi s Managed Links icon to expand the section on the page. Th e first URL link is intended f or use to connect to the blade ch assi[...]
-
Seite 182
Chapter 8 : Device Management 173 To configure a Dell P owerEdge 1855/1955: 1. If you selected Dell 1855/1 955, auto-discovery is not available . Configure the blade cha ssis as applicable. a. Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server. b. Maximum Number of Slots - The default maxi[...]
-
Seite 183
Chapter 8 : Device Management 174 Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or the c onnection will fail. e. The Username Field and P assword Field, which are both optional, contain the labels that are expected to be associated with the username and password e ntries. It is in these fields you shoul[...]
-
Seite 184
Chapter 8 : Device Management 175 c. Administrative Module Pri mary IP Address/Host Na me - Enter the primary IP address for the blade chassis. Required for auto-discovery mode d. Port Number - The default port number for the blade chassi s is 22. Change the port numb er if applicable. Required f or auto-discovery mode e. Username - Enter the use r[...]
-
Seite 185
Chapter 8 : Device Management 176 c. Username - Enter the use rname used to access the interfa ce . d. Password - Enter the pass word used to access the int erface. Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or t he connection will fail. e. The Username Field and P assword Field, which are both optio[...]
-
Seite 186
Chapter 8 : Device Management 177 4. In the Blade Chassis Managed Li nks section of the page, you are able to configure the con nection to a blade chassis web browser interface if one is availabl e. Click the Blade Chassi s Managed Links icon to expand the section on the page. The first URL link is intended f or use to connect to t he blade chassis[...]
-
Seite 187
Chapter 8 : Device Management 178 Tips for Adding a Web Browser Interface You can add a Web Brows er Interface to create a co nnection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web a pplication associated with an RSA, DRAC o r ILO Processor card. You must have DN[...]
-
Seite 188
Chapter 8 : Device Management 179 HP Blade Chassis Configuration (Port Group Management) The KX II supports the aggreg ation of ports connecte d to certain types of blades into a group repres enting the blade chassis. Specifically, HP ® BladeServer blades and D ell ® PowerEdge ™ 1855/1955 blades whe n the Dell PowerEdge 1855/195 5 is connected [...]
-
Seite 189
Chapter 8 : Device Management 180 3. Enter a Port Group Name. The port group name is n ot case sensitive and can contain up to 32 characte rs . 4. Select the Blade Server Grou p checkbox. If you want to designate th at these ports are attached to blades housed in a blade chassis (for ex ample, HP c3000 or Dell PowerEdge 1855), select t he Blade Ser[...]
-
Seite 190
Chapter 8 : Device Management 181 To delete a port group: 1. Click on the Port Group M anagement page, select th e checkbox of the port group you want to delete. 2. Click the Delete button. 3. Click OK on the warning m essage. Supported Blade Chassis Models This table contains the bla de chassis models that are supported by the KX II and the corres[...]
-
Seite 191
Chapter 8 : Device Manageme nt 182 Supported CIMs for Blade Chassis The following CIMs are supported f or blade chassis being ma naged through the KX II: DCIM- PS2 DCIM-USBG2 D2CIM-VUSB D2CIM-DVUSB Following is a table contai ning supported CIMs for each blade chassi s model that the KX II suppo rts. Blade chassis Connection method [...]
-
Seite 192
Chapter 8 : Device Management 183 Blade chassis Connection method Recommended CIM(s) M1000e with this chassis. The iKVM is compatible wi th the followin g peripherals: USB keyboards, USB pointing devic es VGA monitors with DDC support. Source: Dell Chassis Man agement Controller, Firmware Version 1.0, User Guid e HP ® BladeSystem c3000 The[...]
-
Seite 193
Chapter 8 : Device Management 184 Blade chassis Connection method Recommended CIM(s) one Advanced Management Module. In contrast to the standard B ladeCenter chassis, the KVM module and th e Management Module in the BladeCenter T chassis are separate comp onen ts. The front of the Management Module o nly features the LEDs for displaying status. A l[...]
-
Seite 194
Chapter 8 : Device Management 185 Blade chassis Required/recommended action Slot, not by Name. iKV M may not work correctly if t his is not done. Do not designate any slots for scan operations in the iKVM GUI Setup Scan menu. iKVM may not work correctly ot herwise. Do not designate any slots for broad cast keyboard/mouse operations in the i[...]
-
Seite 195
Chapter 8 : Device Management 186 Blade chassis Required/recommended action management module. The SSH port configured on t he blade chassis mana gement mo dule and the port numb er entered on the Port Configuration page must match. IBM KX2 Virtual Media Raritan KX II virtual media is supported only on IBM BladeCenter ® Models H and E. Thi[...]
-
Seite 196
Chapter 8 : Device Management 187 Configuring USB Profiles (Port Page) You choose the available USB profile s for a port in the Select USB Profiles for Port section of the Port page. The USB prof iles chosen in the Port page become the prof iles available to the user in VKC when connecting to a KVM target server from the port. The default is t he W[...]
-
Seite 197
Chapter 8 : Device Management 188 Ctrl-Click to select several discontin uous profiles. 2. Click Add. The selected profiles ap pear in the Selected list. These are the profiles that can be used for the KVM target s erver connected to the port. To specify a preferred US B profile: 1. After selecting the availabl e profiles for a port, choo se on[...]
-
Seite 198
Chapter 8 : Device Management 189 2. Click Remove. The select ed profiles appear in the A vailable list. These profiles are no long er available for a KVM tar get server connected to this port. To apply a profile selection to multiple ports: 1. In the Apply Selected P rofiles to Other Ports sectio n, select the Apply checkbox for each K VM port you[...]
-
Seite 199
Chapter 8 : Device Management 190 Configuring KX II Local Port Settin gs From the Local Port Settings pa ge, you can customize many settings for the KX II Local Console in clu ding keyboard, hot key s, video switching delay, power save mode, local user interface resoluti on settings, and local user authentication. F urther, you can change a USB pro[...]
-
Seite 200
Chapter 8 : Devic e Management 191 Note: If you are using KX2-832 an d KX2-864 as tiered devices, you must connect them t o the base KX II via the extended loc al port. Note: If you connect a Paragon d ev ice to the KX2-832 and KX2- 864 extended local port, you must use the remote client to change the USB profile. 4. If you are using the tiering fe[...]
-
Seite 201
Chapter 8 : Device Management 192 Hot key: Take this action: Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key Press the left Alt key twice quickly Double Click Left Shift key Press the left Shift key twic e quickly Double Click Left Ctrl key Press the left Ctrl[...]
-
Seite 202
Chapter 8 : Device Management 193 Select the "Ignore CC managed m ode on local port" checkbox if you would like local user a ccess to the KX II even when the device is under CC-SG management. Note: If you initially choose not to ignore CC Manage m ode on the local port but later want local port access, you will ha ve to remove the dev[...]
-
Seite 203
Chapter 8 : Device Management 194 KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two loca l port options: the standard local port and the extended local port. Each of these port options is enabled and disabled f rom the Remote Console on t he Port Configuration page or from the Local Console [...]
-
Seite 204
195 In This Chapter Security Settings .................................................................................... 195 Configuring IP Access Cont rol .............................................................. 205 SSL Certificates ..................................................................................... 207 Security Banner ..[...]
-
Seite 205
Chapter 9 : Security Management 19 6 To reset back to defaults: Click Reset to Defaults. Login Limitations Using login limitations, yo u can specify restrictions fo r single login, password aging, and the logging o ut idle users. Limitation Description Enable single login limitation When selected, only one lo gin per user name is allowed at any[...]
-
Seite 206
Chapter 9 : Security Management 197 Limitation Description Enter the number of days aft er which a password change is required. The de fault is 60 days. Log out idle users, After (1-365 minutes) Select the "Log off idle user s" checkbox to automatically disconnect us ers after the amount of time you specify in the "A fter (1-365 minu[...]
-
Seite 207
Chapter 9 : Security Management 198 Strong Passwords Strong passwords provide more secure local authenti ca tion for the system. Using strong password s, you can specify the format of valid KX II local passwords such as minimum and maximum le ngth, required characters, and password history retention. Strong passwords require user-created passwords [...]
-
Seite 208
Chapter 9 : Security Management 199 User Blocking The User Blocking options sp ecify the criteria by whi ch users are blocked from accessing the system aft er the specified number of un successful login attempts. The three options are mutu ally exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number[...]
-
Seite 209
Chapter 9 : Security Management 200 Option Description Timer Lockout Users are denied access to the system for the specified amount of time af ter exceeding the specified number of unsucces sful login attempts. When selected, the following f ields are enabled: Attempts - The number of unsuccessful login attempts after which the user will b e lo[...]
-
Seite 210
Chapter 9 : Security Management 201 Encryption & Share Using the Encryption & S hare settings you can specif y the type of encryption used, PC and V M share modes, and the ty pe of reset performed when the KX II Reset button is pressed. WARNING: If you select an enc ryption mode that is not supported by your browser, you will not be able to[...]
-
Seite 211
Chapter 9 : Security Management 202 Encryption mode Description a National Institute of S tandards and Technology specification fo r the encryption of electronic data. 256 is the ke y length. When AES -256 is specified, be certain that y our browser supports it, other wise you will not be able to connect. See Checking Your Browser for AES Encrypt i[...]
-
Seite 212
Chapter 9 : Security Management 203 Local device reset mode Description Enable Local Factory Reset (default) Returns the KX II dev ice to the factory defaults. Enable Local Admin Password Reset Resets the local administrator pa ssword only. The password is reset to raritan. Disable All Local Resets No reset action is taken. Note: When using the P2C[...]
-
Seite 213
Chapter 9 : Security Management 204 Enabling FIPS 140-2 For government and other high se curity environments, enabling FIPS 140 -2 mode may be desirable. The KX II uses an embedded FIPS 140 -2-validated cryptograp hic module running on a Linux ® platform per FIPS 140-2 Implementation Guida nce section G.5 guideline s. Once this mode is enabled, th[...]
-
Seite 214
Chapter 9 : Security Management 205 FIPS 140-2 should be enabled on t he client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administr ative Tools > Local Secu rity Policy to open the Local Security S ettings dialog. 2. From the navigation tree, s elect Select Local Policies > S[...]
-
Seite 215
Chapter 9 : Security Management 206 To add (append) rules: 1. Type the IP address and s ubnet mask in the IPv4/ Mask or IPv6/Prefix Length field. Note: The IP address sho uld be entered using CID R (Classless Inter-Domain Routing notat ion, in which the first 24 bits are used as a network address). 2. Choose the Policy from the drop-do wn list. 3. [...]
-
Seite 216
Chapter 9 : Security Management 207 3. You are prompted to confi rm the deletion. Click OK. SSL Certificates The KX II uses the Secure Soc ket Layer (SSL) protocol for any encrypted network traffic betwee n itself and a connected client. When establishing a connection, the KX II has to identify itself to a client using a cryptographic certificate. [...]
-
Seite 217
Chapter 9 : Security Management 208 b. Organizational unit - This field is u se d for specifying to whi ch department within an organization the KX II belongs. c. Organization - The name o f the organization to which the K X II belongs. d. Locality/City - The city where t he organization is locate d. e. State/Province - The state or pr ovince where[...]
-
Seite 218
Chapter 9 : Security Management 209 Note: The CSR and the private key f ile are a matched set and should be treated accordingly. If the sig ned certificate is not matched with the private key used to gen erate the original CSR, t he certificate will not be useful. This applies to uploading and downloa ding the CSR and private key files. After compl[...]
-
Seite 219
Chapter 9 : Security Management 210 4. If needed, change the banner titl e. This information will be displayed to users as part of the banner. Up to 64 characters ca n be used. 5. Edit the information in the Restri cted Services Banner Message text box. Up to 6000 characte rs can be entered or uploade d from a text file. To do this, do one of the f[...]
-
Seite 220
211 In This Chapter Audit Log ................................................................................................ 211 Device Information ................................................................................. 212 Backup and Restore .............................................................................. 213 USB Profile [...]
-
Seite 221
Chapter 10 : Maintenance 212 Device Information The Device Information pa ge provides detailed info rmation about your KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Te chnical Support. To view information abo ut your KX II and CIMs: Choose Maintenance > Dev ice Information. The Device Inform[...]
-
Seite 222
Chapter 10 : Maintenance 213 Backup and Restore From the Backup/Restore page, you can backup and resto re the settings and configuration for your KX II. In addition to using backup and re store for business continuity pur poses, you can use this featu re as a time-saving mechanism. For ins tance, you can quickly provide access to your team from ano[...]
-
Seite 223
Chapter 10 : Maintenance 2 14 If you are using Internet Expl orer 6 or higher, to backup y our KX II: 1. Click Backup. A File Downl oad dialog appears that co ntains an Open button. Do not click Open. In IE 6 and higher, IE is used as the default application t o open files, so you are prompted to open t he file versus save the file. To avoid this, [...]
-
Seite 224
Chapter 10 : Maintenance 215 Full Restore - A complete r estore of the entire system. Gene rally used for traditional backup and restore purposes. Protected Restore - Everything is restored except device-specific information such as IP add ress, name, and so forth. With t his option, you can setup one KX II and copy the configuration t o mu[...]
-
Seite 225
Chapter 10 : Maintenance 216 USB Profile Management From the USB Profile Managem ent page, you can upload custo m profiles provided by Raritan t ech support. These profiles are designed to address the needs of your t arget server‟s configura tion, in the ev ent that the set of standard prof iles does not already address them. Raritan tech support[...]
-
Seite 226
Chapter 10 : Maintenance 217 As noted, you may delete a custom profile from the system while it is still designated as an active prof ile. Doing so will terminate any virtua l media sessions that were i n place. Handling Conflicts in P rofile Names A naming conflict between custom an d standard USB profiles may occur when a firmware upgrade is pe r[...]
-
Seite 227
Chapter 10 : Maintenance 218 3. Click the Upgrade button. You are prompted to confir m the upgrade. 4. Click OK to continue the upgrade. Progress bars are displayed during the upgrade. Upgrading tak es approximately 2 m inutes or less per CIM. Upgrading Firmware Use the Firmware Upgrade page t o upgrade the firm ware for your KX II and all attached[...]
-
Seite 228
Chapter 10 : Maintenance 219 6. Click Upload from the Firmware U pgrade page. Information about the upgrade and version n umbers is displayed for yo ur confirmation (if you opted to review CIM informatio n, that information is dis played as well): Note: At this point, conne cted users are logged out, and new login attempts are blocked. 7. Click Upg[...]
-
Seite 229
Chapter 10 : Maintenance 220 For information about upgradi ng the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Access Clients Guide . Note: Firmware upgrades are n ot supported via modem . Note: If you are using a tier ed configuration in which a base KX II device is used to access multiple ot[...]
-
Seite 230
Chapter 10 : Maintenance 221 Upgrade History The KX II provides information about upgrades performed on t he KX II and attached CIMS. To view the upgrade history : Choose Maintenance > Upgra de History. The Upgrade History page opens. Information is provided abo ut the KX II upgrade(s) tha t have been run, the final status of the upgrade, th[...]
-
Seite 231
Chapter 10 : Maintenance 222 To reboot your KX II : 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prom pted to confirm the action . Click Yes to proceed with the reboot.[...]
-
Seite 232
Chapter 10 : Maintenance 223 Stopping CC-SG Management While the KX II is under CC-SG man agement, if you try to access the device directly, y ou are notified that it the device is un der CC-SG management. If you are managing the KX II through CC-SG and connectivity between CC -SG and the KX II is lost after the specified timeout interval (typicall[...]
-
Seite 233
Chapter 10 : Maintenance 224 3. Click Yes to remove the device C C-SG management. Once CC-S G management has ended, a confi rmation will be displayed.[...]
-
Seite 234
225 In This Chapter Network Interface Page ......................................................................... 225 Network Statistics Page ......................................................................... 226 Ping Host Page ...................................................................................... 228 Trace Route to Host P[...]
-
Seite 235
Chapter 11 : Diagnostics 226 Network Statistics Page The KX II provides statistics abo ut your network interf ace. To view statistics about y our network interface: 1. Choose Diagnostics > Net work Statistics. The Network Statistics page opens. 2. Choose the appropriate op tion from the Options drop-down list: Statistics - Produces a page si[...]
-
Seite 236
Chapter 11 : Diagnostics 227 Interfaces - Produces a pa ge similar to the one displayed here. Route - Produces a page simila r to the one displayed here. 3. Click Refresh. The relevant inf or mation is displayed in the Result field.[...]
-
Seite 237
Chapter 11 : Diagnostics 228 Ping Host Page Ping is a network tool used to test whether a particul ar host or IP address is reachable acro ss an IP network. Using t he Ping Host page, you can determine if a targ et server or another KX II is accessible. To ping the host: 1. Choose Diagnostics > Pin g Host. The Ping Host page appears. 2. Type eit[...]
-
Seite 238
Chapter 11 : Diagnostics 229 Note: The host name cann ot exceed 232 characters in length. 3. Choose the maximum hops from the d ro p-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace r oute command is executed f or the given hostname or IP address and t he maximum hops. The o utput of trace route is displayed in the Result fie[...]
-
Seite 239
Chapter 11 : Diagnostics 230 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Techni cal Support. Device diagnostics downl oads the diagnostics info rmation from the KX II to the client machine. Two operation s can be performed on thi s page: Execute a special diagnost ics script provi[...]
-
Seite 240
Chapter 11 : Diagnostics 231 a. Click the Save to File butt on. The File Download dialog open s. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed b y Raritan Technical Support .[...]
-
Seite 241
232 In This Chapter Overvi ew ................................................................................................ 232 Accessing the KX II Using CLI .............................................................. 233 SSH Connection to the KX II ................................................................ . 233 Logging In ............[...]
-
Seite 242
Chapter 12 : Command Line Interface (CLI) 233 Accessing the KX II Using CLI Access the KX II by using one of the following methods: SSH (Secure Shell) via IP connection A number of SSH clients a re available and can be obt ained from the following locations: Putty - http://www.chiark.green end.org.uk/~sgtatham/ putty/ http://www.chiark.gree[...]
-
Seite 243
Chapter 12 : Command Line Interfac e (CLI) 234 SSH Access from a UNIX/ Linux Workstation To open an SSH session from a UN IX ® /Linux ® w orkstation and log in as the user admin, enter the f ollowing command: ssh - l admin 192.168.30.222 The Password prompt app ears. See Logging In (on page 234 ). Note: Both IPv4 and IPv6 a ddresses are supported[...]
-
Seite 244
Chapter 12 : Command Line Interface (CLI ) 235 After reviewing the followin g Navigation of the CLI (on page 2 35 ) section, perform the Initial Configuration tasks. Navigation of the CLI Before using the CLI, it is important to understand C LI navigation and syntax. There are also som e keystroke combinations that simplify CLI use.[...]
-
Seite 245
Chapter 12 : Command Line Interfac e (CLI) 236 Completion of Command s The CLI supports the completion of partially-entered comm ands. After entering the first few character s of an entry, press the Tab k ey. If the characters form a unique match, the CLI will complete the entry. If no match is found, the C LI displays the valid entries for t h[...]
-
Seite 246
Chapter 12 : Command Line Interface (CLI) 237 Commands Description help Display an overview of the CLI syntax. quit Places the user back one l evel. logout Logs out the user session. Initial Configuration Using CLI Note: These steps, which us e the CLI, are optional since the same configuration can be done via K VM. See Getting Started (on pa ge 14[...]
-
Seite 247
Chapter 12 : Command Line Interfac e (CLI) 238 Setting Network Parame ters Network parameters are conf igured using the interface command. admin > Config > Network > interface ipauto none ip 192.168.151.12 mask 255.255.255.0 gw 192.168.151.1 mode auto When the command is accepted, the device automatically dro ps the connection. You must re[...]
-
Seite 248
Chapter 12 : Command Line Interface (CLI) 239 Command Description history Display the current session's command line history. listports List accessible ports. logout Logout of the current CLI ses sion. top Return to the root menu. userlist List active user sessions. Enter admin > config > network . Command Description help Display ov[...]
-
Seite 249
Chapter 12 : Command Line Interfac e (CLI) 240 Configuring Network The network menu comm ands are used to configure the KX II network adapter. Commands Description interface Configure the KX II device network interface. name Network name configuratio n ip v6 Set/get IPv6 network para meters. Interface Command The Interface command is used to config[...]
-
Seite 250
Chapter 12 : Command Line Interface (CLI) 241 Name Command The name command is used to config ure the network name. The syntax of the name is: name [devicename <devicename>] [hostname <hostname>] Device name configuration devicename <devicename> Device Name hostname <hostname> Preferred host name (DHCP only) Name Command Exa[...]
-
Seite 251
242 In This Chapter Overview ................................................................................................ 242 Using the KX II Local Console ............................................................... 242 KX II Local Console Interface ................................................................ 243 Security and Authentica[...]
-
Seite 252
Chapter 13 : KX II Local Consol e 243 KX II Local Console Interface When you are located at t he server rack, the K X II provides standard KVM management and ad ministration via the KX II Local C onsole. The KX II Local Console provides a di rect KVM (analog) connection to your connected servers; the perf ormance is exactly as if you were directly [...]
-
Seite 253
Chapter 13 : KX II Local Cons ole 244 Local Console Smart Card Access To use a smart card to acces s a server at the Local Con sole, plug a USB smart card reader into the KX II using one of the USB ports located on the KX II. Once a smart ca rd reader is plugged in or unplugged from the KX II, the KX II autodetects it . For a list of supported smar[...]
-
Seite 254
Chapter 13 : KX II Local Consol e 245 To update the Card Read ers Detected list: Click Refresh if a new smart card has been mounted. The C ard Readers Detected list will be refr eshed to reflect the newly added smart card reader. Smart Card Access in KX2 8 Dev ices If you are using a smart card re ader to access a serve r from the Local Console[...]
-
Seite 255
Chapter 13 : KX II Local Cons ole 246 2. In the Select Profile To Use f ield, select the profile to use from among those available for the port. 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field. Available Resolutions The KX II Local Console provides the following resolutions to supp ort vari[...]
-
Seite 256
Chapter 13 : KX II Local Consol e 247 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Acce ss page opens. This page lists all of the KX II ports, the connected K VM target servers, and their status and availa bility. Also displayed on the Port Acces s page are blade cha ssis that have been config[...]
-
Seite 257
Chapter 13 : KX II Local Cons ole 248 To use the Port Access p age: 1. Log in to the Local Console. The KVM target servers are init ially sorted by Port Number. You can change the display to sort on any of the columns. Port Number - Numbered f ro m 1 to the total number o f ports available for the KX II devi ce. Note that ports conne cted to po[...]
-
Seite 258
Chapter 13 : KX II Local Consol e 249 2. Click View by Port or View by Group to switch betwe en views. In addition to the Port Number, Port Name, Status, T ype, and Availability, a Group column is als o displayed on the View by Group tab. This column contains the p ort groups that are available. 3. Click the Port Name of the target server you w[...]
-
Seite 259
Chapter 13 : KX II Local Cons ole 250 Blade chassis Connect key action Key sequence example Access a port from the local port GUI Access port 5, slot 2: Press Left ALT > Press a nd Release 5 > Press and Release - > Press a nd Release 2 > Release Left ALT Switch between ports Switch from target port 5, slot 2 to port 5, slot 11: [...]
-
Seite 260
Chapter 13 : KX II Local Consol e 251 Sun key Local port key combination Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KPAD - Stop No key combination Power No key combination Accessing a Target Server To access a target serv er : 1. Click the Port Name of the target you want to access. The Port Action Menu is displayed. 2.[...]
-
Seite 261
Chapter 13 : KX II Local Cons ole 252 Configuring KX II Local Console Local Port Settings From the Local Port Settings pa ge, you can customize many se ttings for the KX II Local Console in clu ding keyboard, hot key s, video switching delay, power save mode, local user interface resoluti on settings, and local user authentication. Note: Only users[...]
-
Seite 262
Chapter 13 : KX II Local Consol e 253 3. Choose the local port hot key. The local port hot key is used to return to the KX II Local Console interfa ce when a target serv er interface is being viewed. The default is to Double Click S croll Lock, but you can select any key combinatio n from the drop-down list: Hot key: Take this action: Double Click [...]
-
Seite 263
Chapter 13 : KX II Local Cons ole 254 None. There is no authenti cation for Local Console ac cess. This option is recommended for secur e environments only. Select the "Ignore CC managed m ode on local port" checkbox if you would like local user a ccess to the KX II even when the device is under CC-SG management. Note: If you init[...]
-
Seite 264
Chapter 13 : KX II Local Consol e 255 Configuring KX II Local Port Settings from the Local Console The standard local port an d the extended local port can be configured from the Remote Console on t he Port Configuration page or from the Local Console on the Local Port Settings page. See Configuring KX I I Local Port Settings (on p age 190) for det[...]
-
Seite 265
Chapter 13 : KX II Local Cons ole 256 Timeout (seconds) 1. Click Reset to continue. You will be prompted to confirm the f actory reset because all network sett ings will be permanently lost. 2. Click OK button proceed. Up on completion, the K X II device is automatically restarted. Resetting the KX II Using the Reset Button On the back panel of[...]
-
Seite 266
257 In This Chapter Physical Specifications ................................ .......................................... 257 Environmental Requireme nts ................................................................ 259 Supported Operating Systems ( Clients) ................................................ 260 Supported CIMs and Oper ating Systems[...]
-
Seite 267
Appendix A : Specifications 258 Part number Line item description UP C code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DKX2- 132 32 -Port KX II with 1-user network access and local port, virtual media, dual power 785813624079 Dual power 100/240 V 50/60 Hz 0.6A 26 Watts 9.0 lbs 1.75" x 17.3" x 11.4&[...]
-
Seite 268
Appendix A : Specifications 259 KX2-8 Specifications Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DKX2- 83 2 32 -Port KX II with 8-user network access, standard local port, extended local port, virtual media, dual power 0785813620019 Dual power 100/240 V 50/60 Hz 1A ([...]
-
Seite 269
Appendix A : Specifications 260 Operating Shock N/A Supported Operating Systems (Clients) The following operating system s ar e supported on the V irtual KVM Client and Multi-Platform Client ( MPC): Client operating sy stem Virtual media (VM) supp ort on client Windows 7 ® Yes Windows XP ® Yes Windows 2008 ® Yes Windows Vista ® Yes Windows 2000[...]
-
Seite 270
Appendix A : Specifications 261 Mode Operating system Browser Windows Server 2003 ® Internet Explorer 6.0 SP1++, IE 7, IE 8 Firefox 1.06 - 3 Windows Vista ® Internet Explorer 7.0 or 8. 0 Windows 7 ® Internet Explorer 7.0 or 8.0 Firefox 1.06 - 3 Windows x64 64 -bit mode Windows XP 64bit OS, 32bit browsers: Internet Explore[...]
-
Seite 271
Appendix A : Specifications 262 Supported Paragon CIMs Operating system and serial devices ( where applicable) Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse mode P2CIM- PS2 Windows XP ® Windows 2000 ® Windows 2000 Server ® Windows 2003 Server ® Windows Vista ® Windows 7 ® Windows 2008 [...]
-
Seite 272
Appendix A : Specifications 263 Supported Paragon CIMs Operating system and serial devices ( where applicable) Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse mode UKVMPD (version 0C4) Note: Version 0C5 does not work with KX II. Windows XP Windows 2000 Windows 2000 Server Windows 2003 Server Windows V[...]
-
Seite 273
Appendix A : Specifications 264 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse m ode DCIM- PS2 Windows XP Windows 2000 Windows 2000 Server Windows 2003 Server Windows Vista Windows 7 Windows 2008 Red Hat Enterprise Linux 4 ES Red Hat Enterpr[...]
-
Seite 274
Appendix A : Specifications 265 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse m ode DCIM-USBG2 Windows XP Windows 2000 Windows 2000 Server Windows 2003 Server Windows Vista Windows 7 Windows 2008 Red Hat Enterprise Linux 4 ES Red Hat Enterp[...]
-
Seite 275
Appendix A : Specifications 266 Supported KX II D2CIMs Target server and remote rack PDUs (where applicable) Virtual media Ab solute Mouse mode Intelligent Mouse mode Standard Mouse mode D2CIM-VUSB Windows XP Windows 2000 Windows 2000 Server Windows 2003 Server Windows Vista Windows 7 Windows 2008 Open SUSE 10, 1[...]
-
Seite 276
Appendix A : Specifications 267 Supported Operating Systems and CIMs (KVM Target Servers) In addition to the new D2CIMs, most Dominion CIMs are supported. The following table displays the supported target server o perating systems, CIMs, virtual media, and mous e modes: Note: D2CIM-VUSB is not suppo rted on Sun ™ (Solaris ™ ) tar gets. Supporte[...]
-
Seite 277
Appendix A : Specifications 268 Target server Supported CIMs Mouse modes Windows 2003 Server ® Windows Vista operating system Red Hat ® Enterprise Workstation 3.0, 4.0 and 5.0 DCIM- PS2 DCIM-USB DCIM-USB G2 D2CIM-VUSB (excluding Red Hat Enterprise Workstation 3.0) SUSE Linux Professional 9.2 and 10 DCIM- PS2 DCIM-USB DCIM-USB G2 D2CIM-VUSB Fedora[...]
-
Seite 278
Appendix A : Specifications 269 Legend: VM - Virtual Media (D2CIM-VUSB only) AM: Absolute Mouse Sync hronization (D2CIM-VUSB only) IM: Intelligent Mouse Mode SM: Standard Mouse Mode : Supported The DCIM-USB G2 provid es a small slide switch on t he back of the CIM. Move the switch to P for PC-ba sed USB KVM target servers; mov e[...]
-
Seite 279
Appendix A : Specifications 270 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) UPC code Interface Module for Remote Rack PDUs 0.6" D2CIM-VUSB- 32PAC Bulk pack of 32 D2CIM-VUSB 6.4 lb (1.3" x 3.0" x 0.6")*32 8.01 lb 21.65"x12.20 "x4.33" 785813[...]
-
Seite 280
Appendix A : Specifications 271 Certified Modems USRobotics ® 56K 5686E ZO OM ® v90 ZOOM v92 USRobotics Sportster ® 56K USRobotics Courier ™ 56K Devices Supported by the KX2-832 and KX2-864 Extended Local Port The extended local port suppo rts attachment from th e following devices: KX2 -832 and KX2-864. Paragon II [...]
-
Seite 281
Appendix A : Specifications 272 Note: Due to the multiplicity of server manufacturers and t ypes, OS versions, video drivers, and so f orth and the subjective nature of video quality, Raritan cannot guar antee performance across all distances in all environments. See the Supported Video Resolu tions (on page 272) for the vide o resolutions supporte[...]
-
Seite 282
Appendix A : Specifications 273 Resolutions 640x350 @85Hz 1024x768 @75Hz 640x400 @56Hz 1024x768 @90Hz 640x400 @84Hz 1024x768 @100Hz 640x400 @85Hz 1152x864 @60Hz 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz 1152x900 @76Hz 720x400 @84[...]
-
Seite 283
Appendix A : Specifications 274 Supported Keyboard Languages The KX II provides keyboard s upport for the languages listed in t he following table. Note: You can use the keyboard for Chinese, Japanese, and Korean for display only; local language input is not supported at this time for the KX II Local Console functions. For m ore information about n[...]
-
Seite 284
Appendix A : Specifications 275 Language Regions Keyboard layout Spanish Spain and most Spanish speaking countries Spanish Portuguese Portugal Portuguese Smart Card Readers Supported and Unsuppo rted Smart Card Readers External, USB smart card re aders are supported. Supported Smart Card Readers Type Vendor Model Verified USB SCM Microsystems SCR33[...]
-
Seite 285
Appendix A : Specifications 276 This table contains a list of read ers that Raritan has tested a nd found not to work with the Raritan d evice, therefore they are unsupported. If a smart card reader does not appea r in the supported smart ca rd readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function w[...]
-
Seite 286
Appendix A : Specifications 277 Windows XP ® operating system t argets must be running Win dows XP SP3 in order to use smart cards with the KX II. If you are working with .NET 3.5 in a Windows XP env ironment on the target server, you must be using SP1. Linux Targets If you are using a Linux ® target, the following requirements mu st be met to us[...]
-
Seite 287
Appendix A : Specifications 278 Fedora ® Core 10 pcsc-lite-1.4.102.3.fc10.i386 Create a Java ™ Library Link A soft link must be create d to the libpcsclite.so after upgra ding RHEL 4, RHEL 5 and FC 10. Fo r example, ln – s /usr/lib/libpcsclite. so.1 /usr/lib/libpcsclite.so, assu ming installing the packag e places the libraries in /usr/lib[...]
-
Seite 288
Appendix A : Specifications 279 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS P ort Settings (on page 140). B y default, all requests recei ved by the KX II via HTTP (port 80) are automatic ally forwarded to HTTPS for complete security. The KX II respond s to Port 80 for user convenien ce, relieving us ers[...]
-
Seite 289
Appendix A : Specifications 280 Network Speed Settings KX II net work speed setting Network switch port setting Auto 1000/Full 100/Full 100/Half 10/Full 10/Ha lf Auto Highest Available Speed 1000/Full KX II: 100/Full Switch: 100/Half 100/Half KX II: 10/Full Switch: 10/Half 10/Half 1000/Full 1000/Full 1000/Full No Communica tion No Communicat ion No[...]
-
Seite 290
Appendix A : Specifications 281 communicate, but collision s will occur Per Ethernet specification, these sh ould be “no communication,” howeve r, note that the KX I I behavior deviates from expected be havior Note: For reliable network communication, config ure the KX II and the LAN switch to the same LAN Int erface Speed and Duplex. For examp[...]
-
Seite 291
282 Note: The procedures in thi s chapter should be attem pted only by experienced users. In This Chapter Returning User Group Inf ormation ........................................................ 282 Setting the Registry to Permit Write Operations to the Schema ........... 283 Creating a New Attribute ..............................................[...]
-
Seite 292
Appendix B : Updating the LDAP Sc hema 283 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller t o write to the schema, you mu st set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory ® Schema root no de in the left pane of the window a[...]
-
Seite 293
Appendix B : Updating the LDAP S chema 284 3. Click New and then choo se Attribute. When the warni ng message appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciusergroup in the C ommon Name field. 5. Type rciusergroup in the L DAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in t he Unique x5000 Object ID field. 7[...]
-
Seite 294
Appendix B : Updating the LDAP Sc hema 285 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from th e menu. The user Properti es dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.[...]
-
Seite 295
Appendix B : Updating the LDAP S chema 286 6. Choose rciusergroup f rom the Select Schema O bject list. 7. Click OK in the Select Sch ema Object dialog. 8. Click OK in the User Prope rties dialog. Updating the Schema Cache To update the schema ca che: 1. Right-click Active Directory ® Schema in the left pane of the window and select Reload the Sch[...]
-
Seite 296
Appendix B : Updating the LDAP S chema 287 3. Go to the directory where the suppo rt tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain. 5. In the left pane of the window, select the CN=Users folder.[...]
-
Seite 297
Appendix B : Updating the LDAP S chema 288 6. Locate the user name whose p roperties you want to a djust in the right pane. Right-click the user name and select Propertie s. 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attrib utes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type t[...]
-
Seite 298
289 In This Chapter Overview ................................................................................................ 289 Java Runtime Environment (JRE) ......................................................... 289 IPv6 Support Notes ............................................................................... 290 Keyboards ..............[...]
-
Seite 299
Appendix C : Informational Notes 290 IPv6 Support Notes Java Java ™ 1.6 supports IPv6 for the follo wing: Solaris ™ 8 and higher Linux ® kernel 2.1.2 and higher (RedH at 6.1 and higher) Java 5.0 and above supports the I Pv6 for the following: Solaris 8 and higher Linux kernel 2.1.2 and higher (kern el 2.4.0 and higher recomm en[...]
-
Seite 300
Appendix C : Informational Notes 291 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux ® Clients Only) The Virtual KVM Client an d the Multi-Platform Client (MPC ) do not process the key combinati o n of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux clients. To obtain the caret sy mbol: From a French keyboa[...]
-
Seite 301
Appendix C : Informational Notes 292 Tilde Symbol From the Virtual KVM Clie nt and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde sy mbol: Create a macro consisting of the following commands: Press right Alt. Press 2. Release 2. Rel[...]
-
Seite 302
Appendix C : Informational Notes 293 Note: The Keyboard Indica tor should be used on Linu x systems using Gnome as a desktop envir onment. When using a Hungarian keyboa rd from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double A cute work only with JRE 1.6. There are several methods that ca n be used to set the[...]
-
Seite 303
Appendix C : Informational Notes 294 Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality , Raritan recommends using t he following cable lengths and video resolutions when y ou are connecting to Dell ® blade chassis from the KX II: Cable length Video resolution 50 ft. 1024x768x60 50 ft. 1280x1024x60 30 ft. 1600x1200[...]
-
Seite 304
Appendix C : Informational Notes 295 Resolving Issues w ith Firefox Freezing w hen Using Fedora If you are accessing Fi refox ® and are using a Fedora ® server, Firefo x may freeze when it is opening. To resolve this issue, i ns tall the libnpjp2.so Java ™ plug-in on the serv er. Video Modes and Resolutions SUSE/VESA Video Mode s The SuSE X.org[...]
-
Seite 305
Appendix C : Informational Notes 296 USB Ports and Profiles VM -CIMs and DL360 USB Ports HP ® DL360 servers have o ne USB port on the back o f the device and another on the front of the device. With the DL360, bo th ports cannot be used at the same time. Th erefore, a dual VM-CIM ca nnot be used on DL360 servers. However, as a workaround, a USB2 h[...]
-
Seite 306
Appendix C : Informational Notes 297 USB profile help appears i n the USB Profile Help window. Fo r detailed information about specifi c USB profiles, see Available USB Pro files (on page 102 ). Raritan provides a standard selection of USB configuration profiles for a wide range of operating sy stem and BIOS level server implementations. These are [...]
-
Seite 307
Appendix C : Informational Notes 298 Changing a USB Profile when U sing a Smart Card Reader There may be certain circumsta nces under which y ou will need to change the USB profile for a target server. For example, you may need to change the connection speed t o "Use Full Speed fo r Virtual Media CIM" when the target has p roblems with th[...]
-
Seite 308
Appendix C : Informational Notes 299 Windows 2000 Composit e USB Device Behav ior f or Virtual Media The Windows 2000 ® operat ing system does not sup port USB composite devices, like Raritan‟ s D2CIM-V USB, in the same manner a s non -composite USB devices. As a result, the “Safely Remove Hardware” system tray icon does not appear for drive[...]
-
Seite 309
Appendix C : Informational Notes 300 Accessing Virtual Media on a Windows 2000 S erver Using a D2CIM-VUSB A virtual media local drive c annot be accessed on a Windows 2000 ® server using a D2CIM-VU SB. Target BIOS Boot Tim e with Virtual Media The BIOS for certain targets may take longer to boot if m edia is mounted virtually at the target. To sho[...]
-
Seite 310
Appendix C : Informational Notes 301 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do n ot use the CC-SG proxy mode if you are pla nning to use the Multi-Platfo rm Client (MPC). Moving Between Ports of the KX II If you move a between po rts of the same KX II and resume management within one minute, CC-SG may display an error m[...]
-
Seite 311
302 In This Chapter General Questions ................................................................................. 303 Remote Access ..................................................................................... 305 Universal Virtual Media .......................................................................... 307 USB Profiles ......[...]
-
Seite 312
Appendix D : FAQs 303 General Questions What is the KX II? The KX II is a second gene ration digital KVM (keyboa rd/video/ mouse) switch that enables one, two, four or eight IT administrators to access and control 8, 16, 32 or 64 servers over the network wi th BIOS-level functionality. The KX II is completely hardware and op erating system independ[...]
-
Seite 313
Appendix D : FAQs 304 Will my existing KX I CIM s work with the KX II switches? Yes, existing KX I CIM s will work with the KX II switch. In addition, select Paragon CIMs will work with t he KX II. This provides an easy migration to the KX II from Paragon I customers who wish to switch t o KVM -over-IP. However, you may want to consider the D2CIM-V[...]
-
Seite 314
Appendix D : FAQs 305 Remote Access How many users can re motely access servers on each KX II? The KX II models offer remote connections for up to eight us ers per user channel to simultaneously access an d control a unique target serve r. For one -channel devices like t he DKX2-116, up to eight re mote users can access and control a single t arget[...]
-
Seite 315
Appendix D : FAQs 306 100Mbps Theoretical 100Mbit network speed 0.05 seconds 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network speed .4 seconds 6Mbps Likely practical 10Mbit network speed .8 seconds 512Kbps Cable modem download speed (typical) 8 seconds How do I access serv ers connected to the KX II i f t[...]
-
Seite 316
Appendix D : FAQs 307 Universal Virtual Media What KX II models support v irtual media? All of the KX II models support virtual media. It is available sta ndalone and through Raritan's CommandCent er Secure Gateway, Raritan 's centralized management unit. What types of virtual medi a does the KX II support? The KX II supports the follo wi[...]
-
Seite 317
Appendix D : FAQs 308 USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services such as vir tual media. The USB Profile tailors the KX II‟s USB interface to the serv er to accommodate these server specific characteristics. Why would I use a USB profile? USB Profiles are most often r[...]
-
Seite 318
Appendix D : FAQs 309 Do I need a special CIM t o use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan provide USB profiles for other target server configurations? Raritan will provide new USB profiles to suit customer needs. As these profiles become available, they will be included in firmware up grades.[...]
-
Seite 319
Appendix D : FAQs 310 Bandwidth and KVM- over -IP Performance How is bandwidth used i n KVM-over-IP systems? The KX II offers next generat ion KVM-over-IP technology – the very best video compression availabl e. Raritan has received numerous technical awards confirming its high v ideo quality transmissions and t he low bandwidth utilization. The [...]
-
Seite 320
Appendix D : FAQs 311 Unlike KX I, the Noise Filte r parameter does not generally have a large role in reducing bandwidth or improving performa nce. How much band w idth does KX II use for common ta sks? Bandwidth primarily depends on the u ser's task and actions. The more the server's video screen changes, the more bandwi dth is utilized[...]
-
Seite 321
Appendix D : FAQs 312 Qu ickTime video #2 1500 - 2500 KB/s 400 - 550 KB/s 200 - 350 KB/s With the reduced bandwidt h settings, bandwidth is re duced significantly for virtually all tasks. With the 15 bit color setting, perceived pe rformance is similar to the default parameter s. Further, bandwidth reductions are possible with additional changes in[...]
-
Seite 322
Appendix D : FAQs 313 Please note that these bandwidth figures are only examples an d may vary from those seen in yo ur environment due to many factors. How can I reduce band w idth? The KX II provides a variety of settings in our remote client s to optimize bandwidth and performance. The default settings will provide a n at -the-rack level of perf[...]
-
Seite 323
Appendix D : FAQs 314 It depends on the bandwidt h and latency of the I nternet connection between your remote client and the KX II. With a cable modem or high speed DSL connection, yo ur performance can be ve ry similar to a LAN/WAN connection. For lower speed links, use the suggestions above to improve performance. I have a high band w idth envir[...]
-
Seite 324
Appendix D : FAQs 315 Ethernet and IP Networking Does the KX II offer dual gi gabit Ethernet ports to prov ide redundant fail-over? Yes. The KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should t he primary Ethernet port (or the switch/router to which it is con nected) fail, the KX II will failover to the se[...]
-
Seite 325
Appendix D : FAQs 316 How many TCP ports must be ope n on my firewall in order to enable network access t o the KX II? Are these po rts configurable? Only one. The KX II protect s network security by only requiring access to a single TCP port to operat e. This port is completely configurable for additional security. Note that, of course, to use the[...]
-
Seite 326
Appendix D : FAQs 317 IPv6 Networking What is IPv6? IPv6 is the acronym for “Int ernet Protocol Version 6”. IPv6 is the “next generation” IP protocol which will re place the current IP Vers ion 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses . It also improves IPv4 in areas such a[...]
-
Seite 327
Appendix D : FAQs 318 Where can I get more information on IPv6? See www.ipv6.org for general inf ormation on IPv6. The KX II User Guide describes the KX II‟s support for IPv6.[...]
-
Seite 328
Appendix D : FAQs 319 Servers Does the KX II depend on a Windows server to operat e? Absolutely not. B ecause users depend on the KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructu re to fix problems), the KX II is designed to be completely independent from any external server.[...]
-
Seite 329
Appendix D : FAQs 320 Blade Servers Can I connect blade servers to t he KX II? Yes. The KX II supports popula r blade server models from the leading blade server manufacturer s: HP ® , IBM ® and Dell ® . Which blade servers are suppor ted? The following models are suppo rted: Dell ® PowerEdge ® 1855, 1955 and M10 00e HP BladeSystem c30[...]
-
Seite 330
Appendix D : FAQs 321 For KX II's, Raritan recommend s connecting up to tw o times the number of remote connections sup ported by the device. For example, with a KX2 -216 with two remote channels, we recommend connecting u p to 4 blade server chassis. You ca n of course connect indiv idual servers to the remaining server ports. I'm an SMB[...]
-
Seite 331
Ap pendix D : FAQs 322 Installation Besides the device itself, what do I need to orde r from Raritan to install the KX II? Each server that connects to the KX II requires a Dominion o r Paragon Computer Interface Mod ule (CIM), an adapte r that connects directly to the keyboard, video, and m ouse ports of the server. What kind of Cat5 cablin g shou[...]
-
Seite 332
Appendix D : FAQs 323 Servers connected to the KX II do not require any software agents to be installed, because the KX II connects directly via hardware t o servers' keyboard, video, and mouse ports. How many serv ers can be connected to each the KX II device? The KX II models range from 8, 16, or 32 server ports in a 1U chas sis to 64 server[...]
-
Seite 333
Appendix D : FAQs 324 Local Port Can I access my serv ers directly from the rack? Yes. At the rack, the KX II functions just like a tradition al KVM switch, allowing control of up to 64 serv ers using a single keyb oard, monitor, and mouse. Can I consolidate the loc al ports of multiple KX I I’s? Yes. You can connect the l ocal ports of multiple [...]
-
Seite 334
Appendix D : FAQs 325 If the external authenticatio n servers are unavailable, the KX II fails-over to its own interna l authentication database. The KX II has its own standalone a uthentication, enabling instant, out - of -the-box installation. If I use the local port to change t he name of a connected serv er, does this change propag ate to r[...]
-
Seite 335
Appendix D : FAQs 326 Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) What is the extended local por t? The Dominion KX2-832 and K X2-864 feature an extended local p ort. The KX II eight user model s have a standard local port , plus a new extended local port that extends t he local port, via C at5 cable, beyond the rack to a control[...]
-
Seite 336
Appendix D : FAQs 327 Power Control Does the KX II hav e a dual power option? All of the KX II models com e equipped with dual AC in puts and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then t he KX II will automatically switch to the other. Does the power supply used by the KX II automatically de[...]
-
Seite 337
Appendix D : FAQs 328 Does remote po w er control require any special server configuration? Some servers ship with default BIOS settings such that the server does not automatically restart af ter losing and regainin g power. For these servers, see the server‟s d ocumentation to chang e this setting. What happens w hen I recycle po wer to a server[...]
-
Seite 338
Appendix D : FAQs 329 Scalability How do I phy sically connect multiple KX II de vices together into one solution? To physically connect mult iple KX II devices together for c onsolidated local access, you can connect the local ports of multiple "tiered" (or "cascaded") KX II switche s to a "base" KX II using the "[...]
-
Seite 339
Appendix D : FAQs 330 For customers wanting stand-alone us age (without a cent ral management system), multiple KX II units still interoperate and scale together via the IP network . Multiple KX II switches ca n be accessed from the KX II web-based u ser interface and from the Multiplatform Client (MPC). Can I connect an existing anal og KVM s w it[...]
-
Seite 340
Appendix D : FAQs 331 Computer Interface Modules (CIMs) Can I use Computer Int erface Modules (CIMs ) from Raritan's analog matrix KVM s w itch, Paragon, with the KX II? Yes. Certain Paragon com puter interface modules (CIM s) may work with the KX II (check the Rarita n KX II release notes o n the website for the latest list of certified CIM s[...]
-
Seite 341
Appendix D : FAQs 332 Security Is the Dominion KX II FIPS 140 -2 Certified? The KX II 2.2.0 and later, and t he KSX II 2.3.0 and later, provides users with the option to use an embed ded FIPS 140-2-validated cryptogr aphic module running on a Linux platform per FIPS 140-2 impleme ntation guidelines. This cryptographic m odule is used for en cryptio[...]
-
Seite 342
Appendix D : FAQs 333 Yes, the KX II has admini strator-configurable, strong passwor d checking to ensure that user-created pas swords meet corporate and/or government standards and are resistant to brute force hackin g. If the KX II encryption mode is set to Auto, w hat level of encryption is achieved? The encryption level that is autone gotiated [...]
-
Seite 343
Appendix D : FAQs 334 Smart Cards and CAC Authentication Does the KX II support smart car d and CAC authentication? Yes, smart cards and DoD Comm on Access Card (CAC) a uthentication to target servers is support ed in release KX I I 2.1.10 and later, and KSX II 2.3.0 and later. What KX II models support smar t cards/CAC? All KX II models are supp o[...]
-
Seite 344
Appendix D : FAQs 335 Manageability Can the KX II be remotely managed and configured via web browser? Yes, the KX II can be com pletely configured remotely via web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) v er sion installed. Besides the initial setting o f the KX II's IP addr[...]
-
Seite 345
Appendix D : FAQs 336 Miscellaneous What is the KX II's default I P address? 192.168.0.192 What is the KX II's default user name and pass w ord? The KX II's default user name is admi n and the default password is raritan [all lower case]. Howeve r, for the highest level of security , the KX II forces the administrator to change the K[...]
-
Seite 346
337 A A. AC Power • 27 Absolute Mouse Mode • 72 Accessing a Targe t Server • 251 Accessing the KX II Using CLI • 233 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM- VU SB • 300 Active KVM Client (AKC) • 80 Adding a New User • 120 Adding a New User Grou p • 111, 120 Adding Attributes to the Class • 284 Adding , Dele[...]
-
Seite 347
Inde x 338 Connecting to Virtual Med ia • 97 Connection Information • 57 Connection Propertie s • 55 Create User Groups and User s • 35 Creating a New Attribute • 283 D D. Local Access Port (Loc al Video Display, Keyboard and Mouse) • 2 8 Default Login Information • 13 Dell Blade Chassis Configu r ation • 170 Dell Chassis Cable Leng[...]
-
Seite 348
Index 339 K Keyboard Language Preference ( Fedora Linux Clients) • 292 Keyboard Macros • 57 Keyboard Options • 57 Keyboards • 291 KX II Client Ap plications • 5 KX II Console Layout • 40 KX II Console Navigation • 42 KX II Help • 4 KX II Local Console • 242 KX II Local Console Factory Reset • 255 KX II Local Console Interface ?[...]
-
Seite 349
Index 340 R Rack PDU (Power Strip) O utlet Control • 84 RADIUS Communication Ex ch ange Specifications • 13 1 Rebooting • 221 Refreshing the Screen • 63 Related Documentation • 5 Relationship Between U sers and Groups • 111 Remote Access • 305 Remote Authentication • 34, 192, 253 Remote Client Requireme nts • 277 Remote Connection[...]
-
Seite 350
Index 341 SUSE/VESA Video Modes • 295 Switching Between KVM Target Servers • 53 T Target BIOS Boot Time wit h Virtual Media • 300 Target Server Connection Dista nce and Video Resolu tion • 271, 272 Target Server Requirement s • 276 TCP and UDP Ports Used • 278 Terminology • 10, 14 Tiering - Target Types, Supported CIM S and Tiering Co[...]
-
Seite 351
U.S./Canada/Latin Americ a Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 732- 764 -8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Beijing Monday - Friday [...]