Raritan Computer DKX2-v2.6.0-0R-E manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 408 pages
- 5.34 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Switch
Raritan Computer Paragon switch
117 pages 2.21 mb -
Switch
Raritan Computer MXU2
40 pages 0.71 mb -
Switch
Raritan Computer MCIP18
80 pages 2.04 mb -
Switch
Raritan Computer MCIP116
80 pages 2.04 mb -
Switch
Raritan Computer KX II
6 pages 0.09 mb -
Switch
Raritan Computer Switch
60 pages 1.43 mb -
Switch
Raritan Computer MXU28
34 pages 0.55 mb -
Switch
Raritan Computer MCC16RD
42 pages 0.65 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Raritan Computer DKX2-v2.6.0-0R-E. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Raritan Computer DKX2-v2.6.0-0R-E ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Raritan Computer DKX2-v2.6.0-0R-E décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Raritan Computer DKX2-v2.6.0-0R-E devrait contenir:
- informations sur les caractéristiques techniques du dispositif Raritan Computer DKX2-v2.6.0-0R-E
- nom du fabricant et année de fabrication Raritan Computer DKX2-v2.6.0-0R-E
- instructions d'utilisation, de réglage et d’entretien de l'équipement Raritan Computer DKX2-v2.6.0-0R-E
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Raritan Computer DKX2-v2.6.0-0R-E ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Raritan Computer DKX2-v2.6.0-0R-E et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Raritan Computer en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Raritan Computer DKX2-v2.6.0-0R-E, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Raritan Computer DKX2-v2.6.0-0R-E, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Raritan Computer DKX2-v2.6.0-0R-E. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
Copyrigh t © 2014 Raritan, In c. DKX2-v2 .6.0- 0R -E March 2014 255 - 62 - 4023 - 00 Dominion KX II User Guide Release 2.6.0[...]
-
Page 2
This docum ent contains proprietary inform ation that is protected b y copyright. All rights reserved. No part of this docum ent may be photoco pied, reproduced, or tra nslated into another language without express prior written co nsent of Raritan, I nc. © Copyright 2014 Rar itan, Inc. All third -party software and hardware mentioned in this docu[...]
-
Page 3
iii Contents Chapter 1 Introduction 1 KX II Overview ............................................................................................................................... 2 Package Contents .......................................................................................................................... 4 KX II Device Photos and F[...]
-
Page 4
Contents iv Port Access Page (Rem ote Console Displ ay) ................................................................... 38 Port Action Menu ............................................................................................................... 41 Managing Favorites ........................................................................[...]
-
Page 5
Contents v Virtual Media in a Mac Environm ent .......................................................................................... 103 Active System Partition .................................................................................................... 103 Drive Partitions ..............................................................[...]
-
Page 6
Contents vi LAN Interface Settings ..................................................................................................... 144 Device Services ......................................................................................................................... 145 Enabling SSH ......................................................[...]
-
Page 7
Contents vii Upgrading CIMs ......................................................................................................................... 245 Upgrading Firm ware .................................................................................................................. 245 Upgrade Histor y ........................................[...]
-
Page 8
Contents viii Local Console Sm art Card Access ............................................................................................ 270 Smart Card Acces s in KX2 8xx Devices ......................................................................... 271 Local Console US B Profile Options .......................................................[...]
-
Page 9
Contents ix A ppendix B Dual Video Port Groups 317 Overview .................................................................................................................................... 317 Recomm endations for Dual Port Video ..................................................................................... 318 Dual Video Port Group Supp[...]
-
Page 10
Contents x Virtual Media Notes .................................................................................................................... 341 Cannot Connect to Dri ves from Linux Clients ................................................................ . 341 Cannot W rite To/From a File fr om a Mac Client ..................................[...]
-
Page 11
Contents xi A ppendix F Frequentl y Asked Questions 355 General FAQs ............................................................................................................................ 355 Remote Access .......................................................................................................................... 356 Universal V[...]
-
Page 12
1 In This Chapter KX II Overview ........................................................................................... 2 Package Contents ..................................................................................... 4 KX II Device Photos and Features ............................................................ 5 Product Features .....[...]
-
Page 13
Chapter 1 : Introduction 2 KX II Overview Raritan's Dom inion KX II is an e nterprise-class, sec ure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-l evel (and up) access and control of s ervers from anywhere in th e world via a web browser. Up to 64 serv ers can be controlled with a standard KX II. W ith the KX II 8-user m od[...]
-
Page 14
Chapter 1 : Intro duction 3[...]
-
Page 15
Chapter 1 : Introduction 4 Diagram key Local port access Tiering IP -based net work access Extended local port Modem Mobile access via iPh one ® and iPad ® using CC- SG Virtual media Digital audio Smart card ac cess at the rack CIMs Remote sm art card access Cat5/6 cable Package Contents Each KX II ships as a f ully-configured sta nd-alone produc[...]
-
Page 16
Chapter 1 : Intro duction 5 KX II Device Photos and Features KX II KX2- 808[...]
-
Page 17
Chapter 1 : Introduction 6 KX2- 832 KX2- 864 See KX II Dimension s and Physical Spe cifications (on page 287 ) f or product specifications . See Supported Comp uter Int erface Module (CIMs) Specifications (on page 289) for CIM specifica tions and images.[...]
-
Page 18
Chapter 1 : Intro duction 7 Product Features Hardware Integrated KVM-o ver-IP rem ote access 1U or 2U rack -mountable (brack ets included) Dual power supplies with failover; autoswitching po wer supply with power failure warning Support for tiering in which a base KX II de vice is used to access multiple other tiered d evices. See C[...]
-
Page 19
Chapter 1 : Introduction 8 Model Remote users Ports KX II- 416 4 16 KX II- 232 2 32 KX II- 216 2 16 KX II- 132 1 32 KX II- 116 1 16 KX II- 108 1 8 Software Virtual media support in W indows ® , Mac ® and Linux ® environm ents with D2CIM-VU SB and D2CIM-DVU SB CIMs and digital CIMs Support for digital audio over USB Port scanning and [...]
-
Page 20
Chapter 1 : Intro duction 9 KX II Client Applications The following client appl ications can be used in the KX II: KX II 2.2 (and later): Virtual KVM Client ( VKC) Active KVM Client (AKC) Multi-Platform Client (MPC) KX II (Generation 2): Virtual KVM Client ( VKC) Multi-Platform Client (MPC) Java ™ 1.7 is required to use the Ja[...]
-
Page 21
10 In This Chapter Overview .................................................................................................. 10 Rack Mounting ......................................................................................... 10 Default Login Inform ation ................................................................ ........ 12 Getting S[...]
-
Page 22
Chapter 2 : Installation and Co nfig uration 11 5. W hen connecting cables to the rear pa nel of the KX II drape them over the cable-su pport bar. Rear Mount The steps corr espond to the numbers s hown in the re ar rackmount diagrams . 1. Secure the cable-sup port bar to the f ront end of the side brack ets, near the side brack ets' “ears,?[...]
-
Page 23
Chapter 2 : Installation and Co nfig uration 12 Default Login Information Default Value User nam e admin This user has adm inistrative privileges. Password raritan The first time you start the KX II, you are required to change the default p assword. IP address 192.168.0.192. Important: For bac kup and business con tinuity purposes, it is st rongl y[...]
-
Page 24
Chapter 2 : Installation and Co nfig uration 13 Step 2: Configure the K VM Target Servers Target Server Video Resolutions For optim al bandwidth efficiency and video perf ormance, KVM targe t servers running grap hical user interfaces s uch as W indows ® , Linux ® , X-W indows, Solaris ™ , and KDE m ay require configuration. The desk top backgr[...]
-
Page 25
Chapter 2 : Installation and Co nfig uration 14 Windows XP, Windows 2003, Windows 2008 Mouse Settings Configure these mouse settings in Wind ows X P ® , Windows 2003 ® and Wind ows 2008 ® : Configure the Motio n settings: Set the mouse m otion speed setting to exactl y the middle speed Disable the "Enhance po inter precision" o[...]
-
Page 26
Chapter 2 : Installation and Co nfig uration 15 3. In KX II, select Device Settings > Port Config uration, then click on the target nam e to open the Port pa ge. 4. Expand 'Select USB Profiles for Port' sec tion. 5. Select 'Mac OS-X (10.4.9) and later' from the Available box, t hen click Add to add it to th e Selected box. 6.[...]
-
Page 27
Chapter 2 : Installation and Co nfig uration 16 Step 3: Connect the Equi pment A. AC Power Connect the pow er supply(s): 1. Attach the included AC power cord to the KX II, and plug it int o an AC power outlet. 2. For dual-power f ailover protection, attach th e second included AC power cord to the KX II, and plug it into a d ifferent power source t[...]
-
Page 28
Chapter 2 : In stallation and Config uration 17 Enable 'Automatic Fa ilover' on the KX II Network Configuration page. D. Local Access Port (Local PC) For access to target server s at the rack , use the KX II Local Access port. The Local Access port also provides a graphica l user interfac e from the KX II Local Console f or administration[...]
-
Page 29
Chapter 2 : Installation and Co nfig uration 18 2. Ensure that your target server's v ideo is configured to a supp orted resolution and refr esh rate. For Sun servers, ens ure your target server's v ideo card is set to output standard VGA (H - and -V sync) and not com posite sync. 3. Attach the ke yboard/mouse connector of your CIM/DCIM t[...]
-
Page 30
Chapter 2 : Installation and Co nfig uration 19 Assign the KX II an IP Address To assign an IP addre ss to the KX II: 1. Choose Device Settin gs > Network. T he Network Settings page opens. 2. Specify a meaningf ul Device Name f or your KX II device. Up to 32 alphanum eric and valid speci al characters, no spaces between characters . 3. Next, co[...]
-
Page 31
Chapter 2 : Installation and Co nfigu ration 20 Configure the IPv6 Settings 1. If using IPv6, enter or se lect the appropria te IPv6-s pecific network settings in the IPv6 sect ion: a. Select the IPv6 check box to activate the fields in the section and enable IPv6 on the dev ice. b. Enter a Global/Uniq ue IP Address. T his is the IP address assigne[...]
-
Page 32
Chapter 2 : Installation and Co nfig uration 21 2. If Use the Following DN S Server Address es is selected, whether or not DHCP is selected, t he addresses entered in this section is used to connect to the DNS ser ver. Enter the following i nformation if the Follo wing DNS Server Addresses is selected. T hese addresses are the prim ary and secondar[...]
-
Page 33
Chapter 2 : Installation and Co nfig uration 22 If either of these chec kboxes is selected an d only power input is connected, the po wer LED on the front of the de vice is Red. Configure Date/Time Settings (Optional) Optionally, configure th e date and tim e settings. The date and tim e settings impact SSL cert ificate validation if LDAPS is enabl[...]
-
Page 34
Chapter 2 : Installation and Co nfigur ation 23 Step 5: Launching t he KX II Remote Console Log in to you r KX II Rem ote Console from any workstation with network connectivity that has Micr osoft .NET ® and/or Java Run time Environment ™ installed. To launch the KX II Remo te Console: 1. Launch a supported web browser. 2. Enter either: The [...]
-
Page 35
Chapter 2 : Installation and Co nfig uration 24 3. Choose Switch From in the Port Action m enu. The new target server you selected is displa yed. Disconnecting a Target Server To disconnect a target server: On the Port Access page, click the port nam e of the tar get you want to disconnect from , then click Disconnect on P ort Action m enu when[...]
-
Page 36
Chapter 2 : Installation and Co nfig uration 25 Step 7: Configure T iering (Option al) The optional t iering feature allows you to use a KX II as your base device, then connect addition al KX II's to it as tiered devices. You can then acces s servers and PX PDUs through the base bot h l ocally and remotel y. See the Device M anagement (on page[...]
-
Page 37
Chapter 2 : Installation and Co nfig uration 26 http://IP-ADDRES S/akc for the Microsof t .NET-based Active KVM Client IP -ADDRESS is th e IP address assigned to your KX II You can also use HTT PS, or the DNS nam e of the KX II assig ned by your administrator (if ap plicable). You are alwa ys redirected to the IP addres s from HTTP to HTT PS. 3[...]
-
Page 38
Chapter 2 : Installation and Co nfig uration 27 Additional Security W arnings Even after an SSL c ertificate is installed in th e KX II, depending on your browser and securit y settings, additional securi ty warnings ma y be displayed when you log in to KX II. It is necessar y to accept these warnings to l aunch the KX II Rem ote Console. Reduce th[...]
-
Page 39
Chapter 2 : Installation and Co nfig uration 28 Example 1: Import t he Certificate into the Brow ser In this exam ple, you import the Certificate into the browser. Steps Open an IE browser, then log in to KX II. Click More Inform ation on the first Java ™ security warning. Click View Certificate Det ails on the Mor e Information dialog. Yo u are [...]
-
Page 40
Chapter 2 : Installation and Co nfig uration 29 Steps Click the Content ta b. Click Certificates. The Certificate Im port W izard opens and walks you through each st ep. File to Im port - Browse to lo cate the Certificate Certificate Store - Select th e location to store the Cert ificate Click Finish on the las t step of the W izard. The Ce[...]
-
Page 41
Chapter 2 : Installation and Co nfig uration 30 Example 2: A dd the KX II to Trusted Sites and Imp ort the Certificate In this exam ple, the KX II's URL is added as a Trusted Sit e, and the Self Signed Certificate is added as part of the proces s. Steps Open an IE browser, then select Tools > Interne t Options to open the Internet Options d[...]
-
Page 42
Chapter 2 : Installation and Co nfig uration 31 Steps Click OK on the Intern et Options dialog to app ly the change s, then close and reopen the browser. Next, import the Certif icate. Steps Open an IE browser, then log in to KX II. Click More Inform ation on the first Java ™ security warning. Click View Certificate Det ails on the Mor e Informat[...]
-
Page 43
32 In This Chapter KX II Interfaces ........................................................................................ 32 KX II Local Console I nterface: KX II Devices .......................................... 33 KX II Remote Cons ole Interface .............................................................. 33 Proxy Server Conf iguration for [...]
-
Page 44
Chapter 3 : W orking w ith Target Ser vers 33 KX II Local Console Interface: KX II Devices W hen y ou are located at th e server rack, the KX II provides standard KVM managem ent and adm inistration via the KX II Local Console. T he KX II Local Console pro vides a direct KVM (a nalog) connection to your connected servers; t he perform ance is exact[...]
-
Page 45
Chapter 3 : W orking w ith Target Ser vers 34 KX II Interface Both the KX II Rem ote Console and the KX II Local Console interf aces provide a web-base d interface for device conf iguration and administration, as wel l as target server list and s election. The options are organized into vario us tabs. After a successf ul login, the Port Access page[...]
-
Page 46
Chapter 3 : W orking w ith Target Ser vers 35 Left Panel The left panel of the KX II interface contains th e following inform ation. Note that some inform ation is conditional - meaning it is displayed based on your role, features be ing used and so on. Con ditional inform ation is noted here. Information Description When displayed? Time & Sess[...]
-
Page 47
Chapter 3 : W orking w ith Target Ser vers 36 Information Description When displayed? PowerIn2 Status of the power 2 outlet connection. Either on or off, or Auto- detect off Always Configured As Base or Configured As Tiered If you are using a tiering configuration, this indicates if the KX II you are accessing is the base device or a tiered de vice[...]
-
Page 48
Chapter 3 : Wo rking w it h Target Se rvers 37 KX II Console Nav igation The KX II Console int erfaces provide m any methods for navigation a nd making your selectio ns. To select an option ( use any of the following) : Click on a tab. A page of available options appe ars. Hover over a tab and se lect the appropriate o ption from the menu. [...]
-
Page 49
Chapter 3 : W orking w ith Target Ser vers 38 Port Access Page (Re mote Console Displ ay) After successf ully logging on to the KX II re mote cons ole, the View b y Port tab on the Port Acc ess page appears. T his page lists all of the KX I I ports, and the target serv ers, port groups, a nd blade chassis that are connected to those ports . The inf[...]
-
Page 50
Chapter 3 : W orking w ith Target Ser vers 39 Status - The status of the servers - ei ther up or down. To connect to an av ailable target server or dual m onitor target server: 1. Click on the port nam e. The Port Action m enu opens. 2. Click Connect. Onc e you are connected to a target or dual monitor target server, click on the port group nam[...]
-
Page 51
Chapter 3 : W orking w ith Target Ser vers 40 View b y Group Tab The View b y Group tab displays blade chass is, 'standard' port groups, and dual video port gr oups. Click the Exp and Arrow icon next to a group to view the ports assigned to the port group. See Device Management (on pa ge 141) for inform ation on creating each of these typ[...]
-
Page 52
Chapter 3 : W orking w ith Target Ser vers 41 Blade Chassis - Port Access Page The blade chassis is displ ayed in an expandab le, hierarchical list on the Port Access page, wit h the blade chassis a t the root of the hierarch y and the individual blades labeled and d isplayed below the root. Use the Expand Arrow icon next to the root ch assis to di[...]
-
Page 53
Chapter 3 : W orking w ith Target Ser vers 42 On the local port, the KX II Local Console interface must be visible in order to perform the switch. Hot key switching is a lso available from the local port. Note: This option is not available from the KX II Remote Conso le for an available port if al l connections are busy. Switch From - Switches [...]
-
Page 54
Chapter 3 : W orking w ith Target Ser vers 43 Managing Favorites A Favorites feature is provided so you can organ ize and quickl y access the devices you use f requently. The Favorite Dev ices section is located in the lower left side (sidebar) of the Port Access page and provides the abilit y to: Create and manage a list of f avorite devices ?[...]
-
Page 55
Chapter 3 : W orking w ith Target Ser vers 44 Enable Favorites Click Enable in the F avorite Devices section of the left panel of th e KX II interface. Once enabled, the Ena ble button becom es a Disable button.[...]
-
Page 56
Chapter 3 : W orking w ith Target Ser vers 45 Access and Display Favorites To access a favo rite KX II device: Click the device nam e (listed beneath Fa vorite Devices). A ne w browser opens to that device. To display favorites b y name: Click Display b y Name. To display favorites b y IP Address: Click Display b y IP. To display favori[...]
-
Page 57
Chapter 3 : W orking w ith Target Ser vers 46 To use the def ault discovery port, sel ect the Use Default Port 5000 checkbox . To use a different d iscovery port: a. Deselect the Use Def ault Port 5000 check box. b. T y pe the port num ber in the Discover on Port field. c. Click Save. 3. Click Refres h. The list of devices on the local subn[...]
-
Page 58
Chapter 3 : W orking w ith Target Serve rs 47 Scanning Ports The KX II provides th e port scanning f eature to search for s elected targets, and displa y them in a slide sho w view, allowing you to m onitor up to 32 targets at o ne time. You can connect to targ ets or focus on a specific target as needed . Scans can include stand ard targets, blade[...]
-
Page 59
Chapter 3 : W orking w ith Target Ser vers 48 Note: MPC uses a dif ferent method for initiating a scan than the other Raritan clients. Se e Set Scan Group in the KV M and Serial Client Guide for details. Th e scan results and sc an options differ betwee n the Remote Console and th e Local Console. See Scanni ng Ports - Local Console (on page 2 69 )[...]
-
Page 60
Chapter 3 : W orking w ith Target Ser vers 49 Using Scan Port Options Following are options a vailable to you while sc anning targets. W ith the exception of the Expand/Collapse icon, a ll of these options are selected from the Options m enu in the upper lef t of the Port Scan viewer. The options will return t o their defaults when you close the wi[...]
-
Page 61
Chapter 3 : W orking w ith Target Ser vers 50 Logging Out To quit t he KX II: Click Logout in th e upper right-hand corn er of the page. Note: Logging out also cl oses any open Virtual K VM Client and serial client sessions. Proxy Server Configuration for Use with MPC, VKC and A KC W hen the use of a Proxy Server is required, a SOC KS prox y mu[...]
-
Page 62
Chapter 3 : W orking w ith Target Ser vers 51 e. On the General tab, cl ick Network Settings. T he Network Settings dialog opens. f. Select Use Prox y Server. g. Click Advanced. T he Advanced Network Settings dialog opens. h. Configure the prox y servers for a ll protocols. IMPORTANT : Do not select 'Use the sam e proxy server for all prot oco[...]
-
Page 63
Chapter 3 : W orking w ith Target Ser vers 52 Virtual KVM Client (VKC) and Active KVM Client (AKC) Overview W henev er you access a target server fr om the Port Access page of KX II the Rem ote Console, a Virtual KVM Client ( VKC) wind ow opens. There is one Virtua l KVM Client for each t arget server connecte d. Virtual KVM Client win dows can be [...]
-
Page 64
Chapter 3 : W orking w ith Target Ser vers 53 Virtual KVM Client (VKC) and Active KVM Client ( AKC) Shared Features The Virtual KVM C lient (VKC) and Active K VM Client (AKC) are interfaces used to acces s remote targets. VKC and AKC share s imilar features with the exception of the following: Minimum s y s tem r equirements Supported opera[...]
-
Page 65
Chapter 3 : W orking w ith Target Ser vers 54 Connection Properties Dynamic video com pression algorithm s maintain KVM cons ole usability under varying bandwid th constraints. The devices optim ize KVM output not o nly for LAN use, but also f or W AN use. These devices c an also control color dept h and limit video output, offering an optim al bal[...]
-
Page 66
Chapter 3 : W orking w ith Target Ser vers 55 3. Choose the Color Dep th from the drop-down list. The d evice can dynamically adapt the co lor depth transm itted to remote users in order to maxim ize usability in all band widths. 15 -bit RGB Color 8-bit RGB Color 4-bit Color 4-bit Gray 3-bit Gray 2-bit Gray Black and W h[...]
-
Page 67
Chapter 3 : W orking w ith Target Ser vers 56 Connection Information Open the Connection Inf ormation dialog for r eal-tim e connection inform ation, and copy the information from the dialog as needed. This is useful if, f or example, you want to gather r eal-ti me inform ation on your current connection. See Configuring Co nnection Properties T he[...]
-
Page 68
Chapter 3 : W orking w ith Target Serve rs 57 Steps Click Connection > Inf o... to open the Connect ion Inf o dialog. Click Copy to Clipbo ard. Paste the inform ation in a file of your choosing. Connection Properties Dynamic video com pression algorithm s maintain KVM cons ole usability under varying bandwid th constraints. The devices optim ize[...]
-
Page 69
Chapter 3 : W orking w ith Target Ser vers 58 33 kb (Fast Modem ) 24 kb (Slow Modem ) Note that these setti ngs are an optimi zation for specific conditions rather than an exact sp eed. The client an d server always att empt to deliver video as quick ly as possible on the net work regardless of the current network speed and encoding se ttin[...]
-
Page 70
Chapter 3 : W orking w ith Target Ser vers 59 Button Button name Description Same as choosing V ideo > Color Calibrat e. Target Screenshot Click to take a sc reenshot of the target server and save it to a file of your choosing. Audio Opens a dialog that a llows you to select fr om a list of audio devices c onnected to a client PC. Once audio dev[...]
-
Page 71
Chapter 3 : W orking w ith Target Ser vers 60 Audio is supported b y KX II 2.4.0 (and later). A udio capture is supported by KX II 2.5.0 (and later). Audio icons Icon name Description Speaker These icons are locate d in status bar at th e bottom of the client win dow. Green, blinking waves ind icate an audio playback s ession is currently streaming[...]
-
Page 72
Chapter 3 : W orking w ith Target Ser vers 61 Import/Export Keyboard Macros Macros exported fr om Active KVM Client (AKC) cannot be im ported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC) . Macros exported from MPC or VKC cannot be i mported into A KC. To import macros: 1. Choose Ke yboard > Import Keyboard Macros to open the Im p[...]
-
Page 73
Chapter 3 : W orking w ith Target Ser vers 62 The macros are then imported. If a macr o is imported that contains a h ot ke y th at already exists, the hot key for the im ported macro is discarded. To export macros: 1. Choose Tools > Export Macros to open the S elect Keyboard Macros to Export dialog. 2. Select the m acros to be exported b y chec[...]
-
Page 74
Chapter 3 : W orking w ith Target Ser vers 63 Building a Keyboard Macro To build a macro: 1. Click Keyboard > Ke yboard Macros. The Ke yboard Macros dialog appears. 2. Click Add. The Add Ke yboard Macro dialog app ears. 3. T y pe a name f or the macro in the Keyboard Macro Na me field. This name appears in the K eyboard menu af ter it is created[...]
-
Page 75
Chapter 3 : W orking w ith Target Ser vers 64 9. Select the new m acro on the m enu to run it or use the k eystrokes you assigned to the m acro. To use the Send T ext to Target function for the m acro: 1. Click the Keyboard > Se nd Text to T arget. The Send Text to T arget dialog appears. 2. Enter the text you want sent to the target . Note: Non[...]
-
Page 76
Chapter 3 : W orking w ith Target Ser vers 65 Modifying and Removing Key boa rd Macros To modify a macro: 1. Choose Ke yboard > Keyboard Macros. The Ke yboard Macros dialog appears. 2. Choose the m acro from among those liste d. 3. Click Modify. The Add /Edit Macro dialog app ears. 4. Make your changes. 5. Click OK. To remove a macro: 1. Choose [...]
-
Page 77
Chapter 3 : W orking w ith Target Ser vers 66 Video Properties Refreshing the Screen The Refresh Scr een command forces a ref resh of the video screen. Video settings can be ref reshed autom atically in sever al ways: The Refresh Screen com mand forces a ref resh of the video screen. The Auto-sense V ideo Settings comm and automatically det[...]
-
Page 78
Chapter 3 : W orking w ith Target Ser ve rs 67 Adjusting Video Settings Use the Video Settings c ommand to m anually adjust the video settin gs. To change th e video settings: 1. Choose Video > V ideo Settings to open the Video Settings dialog. 2. Adjust the following sett ings as required. As you adjust the settings the effects are imm ediately[...]
-
Page 79
Chapter 3 : W orking w ith Target Ser vers 68 Best possible video m ode The device will perform the full Auto Sens e process when switching targets or t arget resolutions. Select ing this option calibrates the video for the best im age quality. Quick sense video m ode W ith thi s option, the device will use a q uick video Auto Sense in orde[...]
-
Page 80
Chapter 3 : W orking w ith Target Ser vers 69 Screenshot from Target Command (Target Screenshot) You are able to tak e a screenshot of a targe t server using the Screenshot from Target server comm and. If needed, save this screenshot to a file loc ation of your choosing as a bitmap, JP EG or PNG file. To take a screenshot of the target server: 1. S[...]
-
Page 81
Chapter 3 : W orking w ith Target Ser vers 70 Mouse Options W hen i n dual m ouse mo de, and pr ovided the o ption is properl y configured, the m ouse cursors align. In dual mouse m ode, when controlling a targ et server, the R emote Console displa ys two mouse cursors : one belonging to your KX II cl ient workstation, and the ot her belonging to t[...]
-
Page 82
Chapter 3 : W orking w ith Target Ser vers 71 Mouse Pointer Synchronization W hen re motely viewing a target server that uses a mouse, two m ouse cursors are displa yed: one belonging to your remote client work station and the other belongin g to the target ser ver. W hen the mouse pointer lies within the Virtual KVM Client target ser ver window, m[...]
-
Page 83
Chapter 3 : W orking w ith Target Ser vers 72 Additional Notes for Intelligent Mouse Mode Be sure that there are no icons or applications i n the upper left section of the screen si nce that is where the s ynchronization routine takes place. Do not use an anim ated mouse. Disable active desk top on KVM target serv ers. Synchronize Mouse[...]
-
Page 84
Chapter 3 : W orking w ith Target Ser vers 73 Intelligent Mouse Mode In Intelligent Mouse m ode, the device can detect the target m ouse settings and s ynchronize the m ouse cursors accordingly, allo wing mouse acceleration on the target . Intelligent m ouse mode is the default for non -VM targets. During synchronizatio n, the m ouse cursor does a [...]
-
Page 85
Chapter 3 : W orking with Targ et Serv ers 74 Please note that m ouse configurations will vary on different target operating system s. Consult your OS guidelin es for further details. Also note that intelligent m ouse synchronization d oes not work with UNIX targets. Absolute Mouse Mode In this mode, absolute co ordinates are used to keep the clien[...]
-
Page 86
Chapter 3 : W orking w ith Target Ser vers 75 Single Mouse Mode Single Mouse m ode uses only the target serv er mouse curs or and the local mouse pointer no longer appears onsc reen. Note: Single mouse mod e does not work on W indows or Linux targ ets when client is running on a Virtual Machine. To enter single mous e mode, do one the follow ing: ?[...]
-
Page 87
Chapter 3 : W orking w ith Target Ser vers 76 United Kingdom Korean (Korea) French (Belgium ) Norwegian (Nor way) Portuguese (Portu gal) Danish (Denm ark) Swedish (Sweden) German (Switzerland) Hungarian (Hungar y) Spanish (Spain) Italian (Italy) Slovenian Translation: French - US Translation: [...]
-
Page 88
Chapter 3 : W orking w ith Target Ser vers 77 5. Click OK. Ke y board Limitatio ns Turkish Keyboards If using a Turk ish keyboard, you must c onnect to a target serv er through the Active KVM C lient (AKC). It is not supporte d by other Raritan c lients. Slovenian Keyboard s The < ke y does not work on Slovenian k eyboards due to a JRE limitatio[...]
-
Page 89
Chapter 3 : W orking w ith Target Ser vers 78 Client Launch Settings KX II users can conf igure client launch settings tha t allow you to define the screen settings f or a KVM session. To configu re client launch settings: 1. Click T ools > Options. The Options dialog a ppears. 2. Click on the Client La unch Settings tab. To configure the ta[...]
-
Page 90
Chapter 3 : W orking w ith Target Ser vers 79 Configure Scan Settings in VKC and AKC The KX II provides th e port scanning feature to s earch for selected targets, and displa y them in a slide sho w view, allowing you to m onitor up to 32 targets at o ne time. You can connect to targ ets or focus on a specific target as needed . Scans can include s[...]
-
Page 91
Chapter 3 : W orking w ith Target Ser vers 80 View Status Bar By default, the status bar is displayed at the bottom of the target win dow. To hide th e status bar: Click View > Status Bar to deselect it. To restore the status b ar: Click View > Status Bar to select it. Scaling Scaling your target window allows you to view th e entire [...]
-
Page 92
Chapter 3 : W orking w ith Target Ser vers 81 Full Screen Mode W hen y ou enter Full Scree n mode, the target's f ull screen is displa yed and acquires the sam e resolution as the targ et server. The hot ke y used for exiting this m ode is specified in the Options dialog, see Tool Optio ns (on page 75 ). W hile in Full Screen mode, m oving y o[...]
-
Page 93
Chapter 3 : W orking w ith Target Ser vers 82 Digital Audio The KX II supports end- to -end, bidirectional, digital audio co nnections for digital audio pla yback and capture devices f rom a remote client to a target server. The audio devices are ac cessed over a U SB connection. Current device firm ware is required. One of the following CIMs must [...]
-
Page 94
Chapter 3 : W orking w ith Target Ser vers 83 Saving Audio Settings Audio device settings are applied on a p er KX II device basis. Once the audio devices set tings are configured a nd saved on the KX II, the same settings are a pplied to it. For exam ple, you can configure a W indows ® audio device to us a stereo, 16 bit, 44.1K form at. W hen y o[...]
-
Page 95
Chapter 3 : W orking w ith Target Ser vers 84 Operating system Audio playback and capt ure supported by: Mac ® Virtual KVM Client ( VKC) Multi-Platform Client (MPC) A Speaker icon is displayed in the s tatus bar at the bottom of the client window. It is gra yed out when no audio is being used. W hen the Speaker icon and M icrophone icon ar[...]
-
Page 96
Chapter 3 : W orking w ith Target Ser vers 85 Connecting to a Single Target Server from Multiple Remote Clients KX II 2.5.0 (and later) allows up to eight (8) users on different rem ote clients to connect to th e sam e target server at the s ame time in order to listen in on audio pla yback. In order to use this f eature, PC Share m ode and VM Shar[...]
-
Page 97
Chapter 3 : W orking w ith Target Ser vers 86 Connecting and Disconnecting a Digital Audio Device Audio device settings are applied on a p er KX II device basi s. Once the audio devices set tings are configured a nd saved on the KX II, the same settings are a pplied to it. See Saving Aud io Settings ( on page 83 ) for m ore information. Note: If yo[...]
-
Page 98
Chapter 3 : W orking w ith Target Serve rs 87 Note: The device nam es listed in the Conn ect Recording Dev ice drop-down are truncat ed to a maximum of 30 characters for Java clients. 8. Select the device that you wish to connect f rom the drop- down list. 9. Select the audio f ormat for the record ing device from the Form at: drop-down. 10. Click [...]
-
Page 99
Chapter 3 : W orking w ith Target Ser vers 88 To disconnect from t he audio dev ice: Click the Audio icon in the toolbar and select O K when you are prompted to conf irm the disconnect. A conf irmation mess age appears. Click OK. Adjusting Capture and Playback Buffer Size (Audio Settings) Once an audio de vice is connected, the capt ure and pla[...]
-
Page 100
Chapter 3 : W orking w ith Target Ser vers 89 Smart Cards Using the KX II, you are able to mount a sm art card reader onto a target server to support sm art card authenticat ion and related appl ications. For a list of supported sm art cards, sm art card readers, and additional system requirem ents, see Smart Card Minim um System Requirements, CIMs[...]
-
Page 101
Chapter 3 : W orking w ith Target Ser vers 90 You are also able to rem ove or reinsert a sm art card. T his function can be used to provide no tification to a target ser ver OS that requires a removal/reinsertion i n order to display the appro priate login dialog. Using this function allo ws the notification to be sent t o a single target without a[...]
-
Page 102
Chapter 3 : W orking w ith Target Ser vers 91 To update t he smart card in the Select Smart Card Reader dial og: Click Refresh List if a ne w smart c ard reader has been attached to the client PC. To send smart card r emove and reins ert notifications to the target: Select the sm art card reader that is currentl y mounted and click the Remo[...]
-
Page 103
Chapter 3 : W orking w ith Target Ser vers 92 2. Use the Cop y to Clipboard button to cop y the information contained in the dialog to a clipbo ard file so it can be acces sed later when dealing with support ( if needed). About the Active KVM Client Active KVM Client (AKC) is based on Microsof t W indows .NET technology and allo ws you to run the c[...]
-
Page 104
Chapter 3 : W orking w ith Target Ser vers 93 Since .NET is require d to run AKC, if y ou do not ha ve .NET installed or you have an unsupported version of .NET installed, you will receive a message instructing you to check the .NET version. Note: Raritan recom mends W indows XP ® operating sys tem users verify you have a working vers ion of .NET [...]
-
Page 105
Chapter 3 : W orking w ith Target Ser vers 94 Multi-Platform Client (MPC) Raritan Multi-P latform Client (MPC) is a graphical user interface for the Raritan product lines, pro viding remote acc ess to target servers connected to Raritan KVM over IP devices. For details on using MP C, see the KV M and Serial Access Cli ents Guide available on Rarita[...]
-
Page 106
Chapter 3 : W orking w ith Target Ser vers 95 Note: Depending on yo ur browser and b rowser securit y settings, you may see various security a nd certificate check and warning messages. It is necessary to accept the options in order to open MPC. Note: If you are using F irefox 3.0.3, you may exp erience problems launching the applicat ion. If this [...]
-
Page 107
96 All KX II m odels support virtual media. Vir tual media e xtends KVM capabilities by enabling tar get servers to rem otely access media from a client PC and net work file servers. W ith thi s feature, media m ounted on client PCs an d network file servers are essentiall y " mounted v irtually" by the targe t server. The target server c[...]
-
Page 108
Chapter 4 : Virtual Media 97 Remote PC VM Prerequisites Certain virtual media opt ions require administrative pri vileges on the remote PC (f or example, drive redirection of complete drives). Note: If you are usi ng Microsoft Vista or W indows 7, disable Us er Account Control or se lect Run as Administrator w hen starting Internet Explorer. T [...]
-
Page 109
Chapter 4 : Virtual Media 98 Supported Tasks Via Virtual Media Virtual media pro vides the ability to perf orm tasks remotely, such as: Transferring files Running diagnostics Installing or patching app lications Complete installation of the operating s ystem Record and pla yback of digital audio Supported Virtual Media Types The[...]
-
Page 110
Chapter 4 : Virtual Media 99 Supported Virtual Media Operating S y stems The following client operat ing system s are supported: W indow s ® 7 operating s ystem W indow s 8 operating s ystem W indow s XP ® operating s ystem openSUSE ® 11.4 Celad on (x86_64) Fedora ® 18 RHEL ® 6.4 OSX Mountain Lion ® 10.7 (and later[...]
-
Page 111
Chapter 4 : Virtual Media 100 Connecting and Disconnecting from Virtual Media Access a Virtual M edia Drive on a Client Comp uter To access a virtual medi a drive on the cli ent computer: 1. From the Virtual KVM Cl ient, choose Virtua l Media > Connect Drive, or click the Connect Dri ve... button . The Map Virtual Med ia Drive dialog appears . 2[...]
-
Page 112
Chapter 4 : Virtual Media 101 Mounting CD -ROM/DVD-ROM/ISO Image s This option m ounts CD-ROM, DVD-RO M, and ISO im ages. Note: ISO9660 forma t is the standard sup ported by R aritan. However, other CD-ROM exte nsions may also work. To access a CD-RO M, DVD-ROM , or ISO image: 1. From the Virtual KVM Cl ient, choose Virtua l Media > Connect CD -[...]
-
Page 113
Chapter 4 : Virtual Media 102 Note: If you are worki ng with files on a Linux ® target, u se the Linux Sync command after the f iles are copied using virt ual media in order to v iew the copied files. Files may not appear until a sy nc is performed. Note: If you are usi ng the Windows 7 ® operating system ® , Remov able Disk is not displayed by [...]
-
Page 114
Chapter 4 : Virtual Media 103 Drive Partitions The following drive p artition limitations exist ac ross operating s ystems: W indow s ® and Mac targets are not able to read L inux form atted partitions W indow s and Linux cannot read Mac form atted partitions Only W indows Fat partitions are supported by Linux Root User Permission Requ[...]
-
Page 115
Chapter 4 : Virtual Media 104 Virtual Media File Server Setup (File Server ISO Images Only ) This feature is onl y required when using virt ual media to access file server ISO images. ISO9660 form at is the stand ard supporte d by Raritan. However, other CD -ROM extensions m ay also work. Note: SMB/CIFS sup port is required on the file s erver. Use[...]
-
Page 116
105 In This Chapter Overview ................................................................................................ 105 Turning Outlets On/Of f and Cycling Power ........................................... 106 Overview The KX II allows you to control Raritan PX a nd RPC series rack PDU (power strip) outlets con nected to t he KX II throug[...]
-
Page 117
Chapter 5 : Ra c k PDU ( Power Stri p) Outlet Control 106 Control - Turn out lets on or off , or cycle their power. Association - The p orts associated with t he outlet. Initially, when you open the Powerstrip page, the power stri ps that are currently connected to t he KX II are displa yed in the Powerstrip drop-down. Additiona lly, inform[...]
-
Page 118
Chapter 5 : Ra c k PDU ( Power Stri p) Outlet Control 107 2. Click OK on the Po wer Off dialog. 3. Click OK on the Po wer Off confirm ation dialog. The outlet will be turned off and its stat e will be displa y ed as 'off '. To cycle the pow er of an outlet: 1. Click Cycle next to the outlet you want to c ycle. The Po wer Cycle Port dialog[...]
-
Page 119
108 In This Chapter Overview ................................................................................................ 108 CIM Compatibilit y .................................................................................. 109 Available USB Profi les ........................................................................... 109 Selecting [...]
-
Page 120
Chapter 6 : U SB Profiles 109 CIM Compatibility In order to mak e use of USB profiles, you must use a vir tual media CIM with updated firm ware. For a list of virtual m edia CIMs, see Supported Computer Interface Module (CIMs) Specifications (on p age 289 ). A CIM that has not ha d its firm ware upgraded supports a broad ran ge of configurations (k[...]
-
Page 121
Chapter 6 : U SB Profiles 110 USB profile Description USB enum eration will trigger when ever Virtual Media is connected or disconne cted Restrictions: USB bus spe ed limited to full-s peed (12 MBit/s) Absolute m ouse synchronization n ot supported Virtual CD- ROM and disk drives cannot be used simultaneousl y BIOS Dell Optiplex 7 9[...]
-
Page 122
Chapter 6 : U SB Profiles 111 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS. W ARNING: USB enumeration will trig ger whenever virt ual media is connected or disconnected. Restrictions: USB bus spe ed limited to full-s peed (12 MBit/s) Absolute mouse s ynchronization™ n[...]
-
Page 123
Chapter 6 : U SB Profiles 112 USB profile Description BIOS Lenovo Think Pad T61 & X61 BIOS Lenovo Think Pad T61 and X61 (boot fr om virtual m edia) Use this profile to boot t he T61 and X61 ser ies laptops from virtual media. Restrictions: USB bus spe ed limited to full-s peed (12 MBit/s) Generic The generic USB prof ile resembles the beh a[...]
-
Page 124
Chapter 6 : U SB Profiles 113 USB profile Description when using the Mac Boot Menu MAC OS X ® 10.4.9 (a nd later) Mac OS X version 10 .4.9 (and later) This profile com pensates the scaling of m ouse coordinates introduced in recent versions of Mac OS X. Select this if the remote and local m ouse positions get out of sync near the desktop borders. [...]
-
Page 125
Chapter 6 : U SB Profiles 114 USB profile Description Ke yboard and Mouse (T ype 2) first Mass Storage USB bus spe ed limited to full-s peed (12 MBit/s) Virtual CD- ROM and disk drives cannot be used simultaneousl y W ARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Troubleshooting 3 Troubles[...]
-
Page 126
Chapter 6 : U SB Profiles 115 Mouse Modes w hen Using the M ac Boot Menu W hen w orking with US B profiles in, to use the M ouse in the Mac Boot Menu, you mus t use Single Mouse mo de since Absolute Mous e Mode is not supported in the BIO S. To configu re the mouse to w ork at the Boot menu: 1. Reboot the Mac and press the Option k ey during the re[...]
-
Page 127
116 In This Chapter User Groups .......................................................................................... 116 Users ................................................................ ..................................... 125 Authentication Settings .......................................................................... 128 Changin[...]
-
Page 128
Chapter 7 : U ser Manage ment 117 User Group List User groups are used with local and rem ote authentication (via RADIU S or LDAP/LDAPS). It is a good idea to define user gr oups before creating individual users since, when you add a user, you must assi gn that user to an existing user grou p. The User Group List page displays a list of al l user g[...]
-
Page 129
Chapter 7 : U ser Manag ement 118 2. T y pe a descriptive nam e for the new user group into the Gr oup Name f ield (up to 64 characters). 3. Select the check boxes next to the perm issions you want to assign to all of the users belong ing to this group. See S etting Perm issions. 4. Specify the server ports and the type of access for each user belo[...]
-
Page 130
Chapter 7 : U ser Manage ment 119 Note: Several adm inistrative functions are available within and from the KX II Local Conso le. These functions are av ailable only to members of the default Admin grou p.[...]
-
Page 131
Chapter 7 : U ser Manag ement 120 Setting Permissions Important: Selecting the User Management ch eckbox allo ws the members of the group to change the permis sions of all users, including their ow n. Carefully consider grant ing these permiss ions. Permission Description Device Access W hile Under CC -SG Management Allows users and user groups wit[...]
-
Page 132
Chapter 7 : U ser Manage ment 121 Permission Description settings. If you are using a tier ed configuration in which a base KX II device is used to access m ultiple other tiered devices , user, user group an d remote authenticat ion settings mus t be consistent across all de vices. Setting Port Permissions For each server port, you can specif y the[...]
-
Page 133
Chapter 7 : U ser Manag ement 122 VM access Power control acce ss option Description Deny Deny power control t o the target server Access Full permission to po wer control on a target serv er For blade chassis, the port acces s permission will control access to the URLs that have been conf igured for that blad e chassis. T he options are Deny or Co[...]
-
Page 134
Chapter 7 : U ser Manage ment 123 Use the IP ACL sec tion of the Group pa ge to add, insert, replac e, and delete IP access contro l rules on a group -level basis. To add (app end) rules: 1. T y pe the starting IP addres s in the Starting I P field. 2. T y pe the ending IP ad dress in the Ending I P field. 3. Choose the action f rom the available o[...]
-
Page 135
Chapter 7 : U ser Manag ement 124 2. Click Delete. 3. W hen prompted to confirm the deletion, click OK. Important: ACL rules a re evaluated in the ord er in which th ey are listed. For instance, in t he example sho wn here, if th e two ACL rules were reversed, Dom inion w ould accept no communication at all. Tip: The rule numb ers allow you to have[...]
-
Page 136
Chapter 7 : U ser Manage ment 125 2. Click Delete. 3. W hen prompted to confirm the deletion, click OK. Users Users must be grant ed user names and pass words to gain access to the KX II. This inform ation is used to authenticat e users att empting to access your KX II. Up to 254 users can b e created for each user group. If you are using a tier ed[...]
-
Page 137
Chapter 7 : U ser Manag ement 126 6. To activate the new user, leave the Active c heckbox selected. Click OK. View the KX II Users L ist The User List page displays a list of all users including their user nam e, full name, and user gro up. The list can be sorte d on any of the colum ns by clicking on the colum n name. From the User List page , you[...]
-
Page 138
Chapter 7 : U ser Manage ment 127 Username - username for user logins an d target connections Access From - IP address of client PC accessing the KX II Status - current Active or I nactive status of the connection To view users by port: Choose User Manag ement > User b y Port. The Users b y Port page opens. Disconnecting Users fr[...]
-
Page 139
Chapter 7 : U ser Manag ement 128 Modifying an Existing User To modify an existing use r: 1. Open the User List p age by choosing User Mana gement > User List. 2. Locate the user f rom among those listed on the User List page. 3. Click the user nam e. The User page ope ns. 4. On the User page, cha nge the appropriat e fields. See Adding a New Us[...]
-
Page 140
Chapter 7 : U ser Manage ment 129 4. If you choose LDA P/LDAPS, read the section e ntitled Implementing LDAP Remote Auth entication for inform ation about com pleting the fields in the LDAP s ection of the Authenticat ion Settings page. 5. If you choose RADIU S, read the section entitled Implem enting RADIUS Rem ote Authentication for inform ation [...]
-
Page 141
Chapter 7 : U ser Manag ement 130 Microsoft Active Director y. Active Director y is an implem entation of LDAP/LDAPS d irectory services by Microsof t for use in W indows environments. 8. T y pe the name of the Act ive Directory Dom ain if you selected Microsoft Active Director y. For exam ple, acme.com . C onsult your Active Directive Adm inis[...]
-
Page 142
Chapter 7 : U ser Manage ment 131 11. If you entered a Distingu ished Name f or the Administrative User, you must enter the pass word that will be used to a uthenticate the Administrative User's DN against the rem ote authentication server. Enter the pass word in the Secret Phrase f ield and again in the Confirm Secret Phrase field (up to 128 [...]
-
Page 143
Chapter 7 : U ser Manag ement 132 15. Select the Enable LDA PS Server Cert ificate Validation check box to use the previousl y uploaded root CA certif icate file to validate t he certificate provided b y the server. If you do not want to use the previously uploaded ro ot CA certificate file, le ave this check box deselected. Disabling t his functio[...]
-
Page 144
Chapter 7 : U ser Manage ment 133 Once the test is com pleted, a m essage will be displayed that lets you know the test was suc cessful or, if the test f ailed, a detailed err or message will be displ ayed. It will displa y successful result or detail error m essage in failure case. It also can displa y group inform ation retrieved from remote LDAP[...]
-
Page 145
Chapter 7 : U ser Manag ement 134 Important Notes Group Name is case sensit ive. The KX II provides th e following default gro ups that cannot be changed or deleted : Admin and <Unk nown>. Verify that your Active Directory server does n ot use the same group names. If the group inform ation returned from the Active Directory serve[...]
-
Page 146
Chapter 7 : U ser Manage ment 135 9. The default num ber of retries is 3 Retries. This is the num ber of times the KX II will send an authentication request to the RADIU S server. 10. Choose the Global Aut hentication T ype from among the options in the drop-down list: PAP - W ith PAP, passwords are sent as plain text. PAP is not interactive. T[...]
-
Page 147
Chapter 7 : U ser Manag ement 136 Cisco ACS 5.x for RADIUS Authentication If you are using a Cisc o ACS 5.x ser ver, after you have conf igured the KX II for RADIUS auth entication, complete the f ollowing steps on the Cisco ACS 5.x server. Note: The following st eps include the Cisco men us and menu items used to access each page. P lease refer t [...]
-
Page 148
Chapter 7 : U ser Manage ment 137 Returning User Group Inf ormation via R ADIUS W hen a RA DIUS authent ication attem pt succeeds, the KX II determ ines the perm issions for a given user bas ed on the perm issions of the user's group. Your remote RADIU S server can provide thes e user group nam es by returning an attribute, implemented as a RA[...]
-
Page 149
Chapter 7 : U ser Manag ement 138 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-T ype (61) VIRTUAL (5) for net work connections. NAS-Port (5) Always 0. NAS- IP -Address (4) The IP address f or the KX II. User-Nam e (1) The user nam e entered at the login screen. Acct-Session-ID ( 44) Session ID for account ing.[...]
-
Page 150
Chapter 7 : U ser Manage ment 13 9 User Authentication Process Remote authentica tion follows the proc ess specified in the flowchart below:[...]
-
Page 151
Chapter 7 : U ser Manag ement 140 Changing a Password To change your KX II passwo rd: 1. Choose User Manag ement > Change Pas sword. The Change Password page opens . 2. T y pe your current password in the Old Password field. 3. T y pe a new password in th e New Password field. Ret ype the new password in the Conf irm New Password f ield. Passwor[...]
-
Page 152
141 In This Chapter Network Settings ................................................................................... 141 Device Services ..................................................................................... 145 Power Suppl y Setup .............................................................................. 170 Configuring Port[...]
-
Page 153
Chapter 8 : Dev ice Mana gement 142 Assign the KX II an I P Address To assign an IP addre ss to the KX II: 1. Choose Device Settin gs > Network. T he Network Settings page opens. 2. Specify a meaningf ul Device Name f or your KX II device. Up to 32 alphanum eric and valid spec ial characters, no s paces between characters . 3. Next, configure th[...]
-
Page 154
Chapter 8 : Dev ice Mana gement 143 Configure the I Pv6 Settings 1. If using IPv6, enter or se lect the appropria te IPv6-s pecific network settings in the IPv6 sect ion: a. Select the IPv6 check box to activate the fields in the section and enable IPv6 on the dev ice. b. Enter a Global/Uniq ue IP Address. T his is the IP address assigned to the KX[...]
-
Page 155
Chapter 8 : Dev ice Mana gement 144 2. If Use the Following DN S Server Address es is selected, whether or not DHCP is selected, t he addresses entered in this section is used to connect to the DNS ser ver. Enter the following i nformation if the Fo llowing DNS Server Addresses is selected. T hese addresses are the primar y and secondary DNS addres[...]
-
Page 156
Chapter 8 : Dev ice Mana gement 145 Note: Because a failover p ort is not activated unt il after a failover has actually occurred, Rarita n recomm ends that you not m onitor the port or monitor it only after a failover occurs . W hen thi s option is enable d, the following two fields a re used: Ping Interval (seconds) - Ping interval det ermine[...]
-
Page 157
Chapter 8 : Dev ice Mana gement 146 3. Enter the SSH Port i nformation. T he standard SSH TCP p ort num ber is 22 but the port num ber can be changed to prov ide a higher level of security operations. 4. Click OK. HTTP and HTT PS Port Settings You are able to conf igure HTTP and/or HTT PS ports used b y the KX II. For exam ple, if you are using the[...]
-
Page 158
Chapter 8 : Dev ice Mana gement 147 Configuring and En abling T iering The tiering feature al lows you to access KX II targets and PDUs thro ugh one base KX II d evice. This feature is avail able for standard KX II devices as well as KX2 -808, KX2-83 2 and KX2-864 de vices. Note: Base and tiered devices must all be o perating with the same firmware[...]
-
Page 159
Chapter 8 : Dev ice Mana gement 148 Port configuration, incl uding changing the CI M name, m ust be done directly from each device. It cannot be done f rom the base device f or tiered target ports. Tiering also su pports the use of KVM switches to switch between servers . See Configuring K VM Switches ( on page 174). Enabling Tiering ?[...]
-
Page 160
Chapter 8 : Dev ice Manage ment 149 6. In the Tier Secret field, enter the same sec ret word you entered for the base device on th e Device Settings p age. Click OK. Tiering - Target T y pes, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attach ed directly to the base are accessible. Power Control You can power on a nd [...]
-
Page 161
Chapter 8 : Dev ice Mana gement 150 Unsupported and Limited Features on Tiered Targets The following featur es are not supported on ti ered targets: Blade chassis on tiere d devices Audio on tiered dev ices Smart cards on tiered devices Virtual media tiered dev ices MCCAT as a tiered de vice Port group managem ent is limited[...]
-
Page 162
Chapter 8 : Dev ice Mana gement 151 Cabling Example in Tiered Configurations The follow ing diagram illustrates the cabling configurations betw een a KX II tiered dev ice and a KX II base d evice. [...]
-
Page 163
Chapter 8 : Dev ice Mana gement 152 Diagram key Target server CIM from target server to the KX II tiered device KX II tiered device D2CIM-DVUSB CIM f rom the KX II tiered device to the KX II base device KX II base device Enabling Direct Port Access via URL Direct port access allows users to bypass ha ving to use the device's Login dialog and P[...]
-
Page 164
Chapter 8 : Dev ice Mana gement 153 Direct Port Access URL Syntax for the Virtual KVM Client (VKC) If you are using the Virtual KVM Client (VKC) and d ire ct port access, use one of the following s yntaxes for standard p orts: https://IPaddress/dpa.asp? username=usernam e&password=passwo rd&port=port num ber Or https://IPaddress/dpa[...]
-
Page 165
Chapter 8 : Dev ice Mana gement 154 Direct Port Access URL Syntax for the Active KVM Client (A KC) If you are using the Active KVM Client (AKC) a nd direct port access, use: https://IPaddress/dpa.asp? username=usernam e&password=passwo rd&port=port num ber&client=akc Or https://IPaddress/dpa.asp? username=usernam e&password=[...]
-
Page 166
Chapter 8 : Dev ice Mana gement 155 Enable Direct Port Access To enable direct po rt access: 1. Choose Device Settin gs > Device Services. T he Device Service Settings page opens. 2. Select Enable Direct Port Access via URL if you would like users to have direct access to a target via the Dom inion device by passing in the necessar y parameters [...]
-
Page 167
Chapter 8 : Dev ice Mana gement 156 Enabling the A KC Dow nload Server Certificate V alidation If you are using the AKC client, you c an choose to use the Enable AKC Download Server Certif icate Validation f eature or opt not to use this feature. Note: When operatin g in IPv4 and IPv6 dual stack mode with 'Ena ble AKC Download Serv er Certific[...]
-
Page 168
Chapter 8 : Dev ice Mana gement 157 2. Launch Internet Explorer ® using the KX II IP address as the URL. A Certificate Error m essage will be displa yed. 3. Select View Certificat es. 4. On the General tab, cl ick Install Certificate. T he certificate is then installed in the Tr usted Root Certification Authori ties store. 5. After the certificate[...]
-
Page 169
Chapter 8 : Dev ice Mana gement 158 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option m ust be selected. Requ ired 4. Complete the follo wing fields for SNMP v1/ v2c (if needed): a. Comm unity - the device's comm unity string b. Comm unity Type - grant either Read -Only or Read-W rite access to the comm unity [...]
-
Page 170
Chapter 8 : Dev ice Mana gement 159 Configure SNMP traps on the Event Man agement - Settings page, which can be quick ly access ed by clicking the SNMP Trap Co nfiguration link. See Configuring SN MP Traps (on page 162)for inf ormation on creating SNMP traps a nd List of KX I I SNMP Traps ( on page 165) f or a list of available KX II SNMP traps. Th[...]
-
Page 171
Chapter 8 : Dev ice Mana gement 160 This inform ation is used to configure m odem settings. Because different m odems have different wa ys of settings these values, th is document does not specif y how to set these va lues, rather the u ser should refer to the m odem to create the appro priate modem -s pecific string. a. Modem Settings: Enable [...]
-
Page 172
Chapter 8 : Dev ice Mana gement 161 See Certified Modems (on page 30 7) for inform ation on certified modems that work with the KX II. For inform ation on settings that will gi ve you the best perf ormance when connecting to the KX I I via modem, s ee Creating, M odifying and Deleting Profiles in M PC - Generation 2 Devices in t he KVM and Serial A[...]
-
Page 173
Chapter 8 : Dev ice Mana geme nt 162 Event M anagement The KX II Event Mana gement feature allo ws you enable and disab le the distribution of s ystem events to SNMP Ma nagers, the Syslog and the audit log. These events are categorized, and for e ach event you can determine whether you want the event sent to o ne or several destinations. Configurin[...]
-
Page 174
Chapter 8 : Dev ice Mana gement 163 a. Destination IP/Hostnam e - the I P or hostname of the SNMP manager. Up to f ive (5) SNMP managers c an be created Note: IPv6 addresses c annot exceed 80 ch aracters in length fo r the host name. b. Port Num ber - the port number used b y the SNMP manager c. Comm unity - the device's comm unity string Note[...]
-
Page 175
Chapter 8 : Dev ice Mana gement 164 Use the Link to SNMP Agent Configuration link to quick ly navigate to the Devices Services pag e from the Event Management - Settings page. The events that are c aptured once an SNM P trap is configured are selected on the E vent Managem ent - Destination page. S ee Configuring Event Management - Destin ations (o[...]
-
Page 176
Chapter 8 : Dev ice Mana gement 165 Use the reset to factor y defaults feature to r emove the SNMP configuration and set th e KX II to its original factor y default. To reset to factor y defaults: Click Reset To Def aults. W ARNING: W hen using SNMP traps over UDP, it is p ossible for the KX II and the router th at it is attached to fall out of[...]
-
Page 177
Chapter 8 : Dev ice Mana gement 166 Trap Name Description networkFailure An Ethernet interf ace of the product ca n no longer comm unicate over the network . networkParam eterChanged A change has been m ade to the network parameters. passwordSettingsCh anged Strong password setti ngs have changed. portConnect A previousl y authenticated user has be[...]
-
Page 178
Chapter 8 : Dev ice Mana gement 167 Trap Name Description userForcedLogout A user was forc ibly logged out by Adm in userLogin A user has succ essfully logged into the KX II an d has been authenticated . userLogout A user has succes sfully logged out of the KX II properly. userModified A user account has be en modified. userPasswordChang ed This ev[...]
-
Page 179
Chapter 8 : Dev ice Mana gement 168 Note: If you have Read- Write privileges to the MIB file, use a MIB ed itor to make changes to the file. SysLog Configuration To configu re the Syslog (enable Sys log forwarding) : 1. Select Enable S y slog For warding to log the dev ice's messages to a remote Syslog serv er. 2. T y pe the IP Address/Hostn a[...]
-
Page 180
Chapter 8 : Dev ice Mana gement 169 Configuring Event Management - Destinations System events, if enab led, generate SNM P notification events (traps), or can be logged to the s yslog or audit log. Us e the Event Managem ent - Destinations page to sel ect the s y stem events to track and where to send this inform ation. Note: SNMP traps are generat[...]
-
Page 181
Chapter 8 : Dev ice Mana gement 170 Power Supply Setup The KX II provides du al power supplies, and c an autom atically detect and provide notificati on regarding the status of these power supplies . Use the Power Supp ly Setup page to specif y whether you are using one or both of the power su pplies. Proper configura tion ensures that t he KX II s[...]
-
Page 182
Chapter 8 : Dev ice Manag ement 171 Note: If either of these c heckboxes is selected and power inp ut is not actually connected, the power LED at the front of the unit turns red. To turn of f the automatic detection: Deselect the ch eckbox f or the appropriate power supply. To reset to factor y defaults: Click Reset To Def aults. No te: The[...]
-
Page 183
Chapter 8 : Dev ice Mana gement 172 Alternativel y, rename ports that are current ly not connected to th e KX II via a CIM a nd, as such, have a status of Not Available. To renam e a port with a status of Not Availab le, do one of the following: Rename the port. W hen a CIM is attached t he CIM nam e will be used. Rename the port, a nd sele[...]
-
Page 184
Chapter 8 : Dev ice Mana gement 173 Co nfiguring Standa rd Target Servers To name the target se rvers: 1. Connect all of the targ et servers if y ou have not alre ady done so. See Step 3: Connect th e Equipment (on page 16 ) for a description of connecting the e quipment. 2. Choose Device Settin gs > Port Configuration. T he Port Configuration p[...]
-
Page 185
Chapter 8 : Dev ice Mana gement 174 8. Click OK. Configuring KVM Switches The KX II also supports use of hot ke y sequences to switch bet ween targets. In addition to using hot ke y sequences with standard servers, KVM switching is sup ported by blade chassis an d in tiered configurations. Important: In order f or user groups to s ee the KVM switch[...]
-
Page 186
Chapter 8 : Dev ice Mana gement 175 Note: Only one switc h will appear in the drop -down. 5. Select KVM Switch H ot Key Sequence. 6. Enter the Maxim um Number of T arget Ports (2-32). 7. In the KVM Switch N ame field, enter the nam e you want to use to refer to this port connec tion. 8. Activate the targets tha t the KVM s witch hot key sequence wi[...]
-
Page 187
Chapter 8 : Dev ice Mana gement 176 Configuring CIM Ports The KX II supports the use of standard and virtual m edia CIMs to connect a server to th e KX II. To access a CIM to configure: 1. Choose Device Settin gs > Port Configuration. T he Port Configuration page opens. 2. Click the Port Nam e of the target ser ver you want to renam e. The Port [...]
-
Page 188
Chapter 8 : Dev ice Mana gement 177 If you are using an HD MI CIM, som e operating system/video card combinations m ay offer a limited range of RGB values. Improve the colors by selecting the DV I Com patibility Mode checkbox. Apply Selected Profiles to Other CIMs 1. Apply the profile to oth er CIMs by selecting them from the list in the Apply Sele[...]
-
Page 189
Chapter 8 : Dev ice Mana gement 178 Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are c onne cted to the Dominion device us ing the D2CIM- P W R CIM. To connect the rack PDU: 1. Connect the m ale RJ-45 of the D2CIM- P W R to the female RJ - 45 connector on the seri al port of the rack PDU. 2. Connect the fem ale RJ-45 connector o[...]
-
Page 190
Chapter 8 : Dev ice Mana gement 179 Naming the Rack PDU (Port Page for Power Strips) Note: PX rack PDUs (po wer strips) can be nam ed in the PX as wel l as in the KX II. Once a Raritan rem ote rack PDU is connected to the KX II, it will appear on the Port Conf iguration page. Click on the power port nam e on that page to access it. T he Type and th[...]
-
Page 191
Chapter 8 : Dev ice Mana gement 180 3. Click OK.[...]
-
Page 192
Chapter 8 : Dev ice Mana gement 181 Associating Outlets with Target Servers The Port page opens when you click on a port on the Port Conf iguration page. From this page, you can m ake power associations , change the port name to som ething more descriptive, and u pdate target server settings if you are using the D2CIM- VUSB CIM. The (C IM) Type and[...]
-
Page 193
Chapter 8 : Dev ice Mana gement 182 Removing Power Associations W hen di sconnecting target servers and/or rack PDUs from the device, all power associations shou ld first be delete d. W hen a target has been associated with a rack PDU and the target is removed from the device, the power association rem ains. W hen this occurs, you are not ab le to [...]
-
Page 194
Chapter 8 : Dev ice Mana gement 183 Configuring Blade Ch assis In addition to standard s ervers and rack PDUs (power strips), you can control blade chassis that are plugged into the KX II device port. Up to eight blade chassis can be managed at a given t ime. The blade chassis m ust be configured as a blade chassis subt ype. If the blade chassis t [...]
-
Page 195
Chapter 8 : Dev ice Mana geme nt 184 Two modes of operation are provided for b lade chassis: manual configuration and auto -discover y, depending on the blade ch assis capabilities. If a blade c hassis is configured f or auto-d iscovery, the Dominion device track s and updates the f ollowing: W hen a new blade server is added to the chas sis. ?[...]
-
Page 196
Chapter 8 : Dev ice Mana gement 185 Generic Blade Chassis Configuration The Generic Blade Ch assis' selection provides only a m anual configuration mode of operation. See Supported Blade Chas sis Models (on page 19 8), Supported CI Ms for Blade Chassis (on pag e 199 ), and Requir ed and Recommended Blade Chassis Configurations (on page 201) fo[...]
-
Page 197
Chapter 8 : Dev ice Mana gement 186 9. In the Blade Chassis Ma naged Links s ection of the page, yo u are able to configure the co nnection to a blade chass is web browser interface if one is availab le. Click the Blade C hassis Managed Links icon to expand the sect ion on the page. The first URL link is in tended for use to con nect to the blade c[...]
-
Page 198
Chapter 8 : Dev ice Mana gement 187 13. Select the CIMs nat ive, displa y resolution from the Displa y Native Resolution drop- down. This is the preferr ed resolution and tim ing mode of the digital CI M. Once a resolution is s elected, it is applied to the CIM. If no selection is m ade, the default 1024x1280@ 60Hz resolution is used. 14. Click OK [...]
-
Page 199
Chapter 8 : Dev ice Mana gement 188 c. Administrative Modul e Primar y IP Address/Host Nam e - Enter the primar y IP address for the blade chassis. Require d for auto-discover y mode d. Port Num ber - The default port num ber for the blade c hassis is 22. Change the port num ber if applicab le. Requir ed for auto-discover y mode e. Usernam e - Ente[...]
-
Page 200
Chapter 8 : Dev ice Mana gement 189 b. URL - Enter the UR L to the interface. See Blade Chassis Sample URL Form ats (on page 203) for sam ple configurations for the Dell M1000e. c. Usernam e - Enter the usernam e used to access the interf ace. d. Password - Enter t he password used to acc ess the interfac e. Note: Leave the userna me and password f[...]
-
Page 201
Chapter 8 : Dev ice Mana gement 190 d. Port Num ber - The default port num ber for the blade c hassis is 22. Not applicable. e. Usernam e - Not applicable. f. Password - Not ap plicable. 2. Change the blade chass is name if needed. 3. Indicate the blades th at are installed in the blade chas sis by checking the Installed c heck box next to each slo[...]
-
Page 202
Chapter 8 : Dev ice Mana gement 191 5. USB profiles do not a pply to Dell chass is. 6. Click OK to save the conf iguration. IBM Blade Chassis Configuration See Supported Blade Chassis Models (on page 19 8), Supported CIMs for Blade Chas sis (on page 199), a nd Required and Recommended Blade Chassis Configu rations ( on page 201) f or important, add[...]
-
Page 203
Chapter 8 : Dev ice Mana gement 192 f. Password - Enter t he password used to acc ess the blade chassis. Required for auto- discovery mode 2. If you want the KX II t o auto-disc over the chassis blad es, select the Blade Auto-Discover y checkbox and then click Discover Blades on Chassis Now. Onc e the blades are disc overed, they will be d isplayed[...]
-
Page 204
Chapter 8 : Dev ice Manag ement 193 e. The Usernam e Field and Password F ield, which are both optional, contain the labels that are expected t o be associated with the usernam e and password entr ies. It is in these f ields you should enter the f ield names for the usernam e and password fields used on the lo gin screen for the web application. Yo[...]
-
Page 205
Chapter 8 : Dev ice Mana gement 194 The first URL link is in tended for use to con nect to the blade chassis Administration Mod ule GUI. Note: Access to the URL links entered in this sec tion of the page is governed by the blad e chassis port permiss ions. a. Active - To activat e the link once it is config ured, select the Active checkbox. Leave t[...]
-
Page 206
Chapter 8 : Dev ice Mana gement 195 Tips for Adding a Web Browser Interface You can add a W eb Browser Interface to crea te a connection to a d evice with an em bedded web server. A W eb Browser interface c an also be used to connect to an y web application, suc h as the web a pplication associated with an RS A, DRAC or ILO Pr ocessor card. You mus[...]
-
Page 207
Chapter 8 : Dev ice Mana gement 196 HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports c onnected to certain t ypes of blades into a group r epresenting the blade chass is. Specificall y, Cisco ® UCS, HP ® BladeServ er blades and Dell ® PowerEdge ™ 1855 /1955 blades when the Dell Po[...]
-
Page 208
Chapter 8 : Dev ice Mana gement 197 3. Enter a Port Group Nam e. The port group nam e is not cas e sensitive and can contain up to 3 2 characters. 4. Select the Blade Server Group check box. If you want to designate that these ports are attach ed to blades housed in a blade chassis ( for exam ple, HP c3000 or Dell PowerEdge 1855), se lect the Blade[...]
-
Page 209
Chapter 8 : Dev ice Mana gement 198 Supported Blade Chassis Models This table contains the b lade chassis m odels that are supported b y the KX II and the correspo nding profiles that shou ld be selected per chass is model when configuring t hem in the K X II applicatio n. A list of these models can be selected on the Port Config uration page f rom[...]
-
Page 210
Chapter 8 : Dev ice Mana gement 199 Supported CIMs for Blade Chassis The following CIMs are su pported for b lade chassis being m anaged through the KX II: DCIM-PS2 DCIM-USBG2 D2CIM-VUSB D2CIM-DVUSB Following is a table cont aining supported CIMs f or eac h blade chassis model that the KX II sup ports. Blade chassis Connection metho[...]
-
Page 211
Chapter 8 : Dev ice Mana gement 200 Blade chassis Connection method Recommended CIM (s) Bo th m odules enable you to conn ect a PS/2-com patible keyboard, m ouse and video monitor to the s ystem (using a custom c able provided with the s ystem). Source: Dell Power Edge 1955 Owner's Manual Dell PowerEdge M1000e The KVM Switch Mod ule (iKVM) is [...]
-
Page 212
Chapter 8 : Dev ice Mana gement 201 Blade chassis Connection method Recommended CIM (s) Technology IBM BladeCenter E The current m odel BladeCenter E c hassis (8677-3Rx) ships s tandard with one Advanc ed Management Module. Source: IBM Blad eCenter Products and Technology DCIM-USBG2 D2CIM-DVUSB IBM BladeCenter T The BladeCenter T chassis sh[...]
-
Page 213
Chapter 8 : Dev ice Mana gement 202 This table contains inf ormation on lim itations and const raints that apply to configuri ng blade chassis to work with the KX II. Raritan rec ommends that all of the information below is followed. Blade chassis Required/recommend ed action Dell ® PowerEdge ™ M1000e Disable the iKVM GUI screensaver. An aut[...]
-
Page 214
Chapter 8 : Dev ice Mana gement 203 Blade chassis Required/recommend ed action Do not designate any slots for s can operations in the iKVM GUI Setup Scan m enu or the iKVM m ay not work properl y. T o avoid having the iKVM G UI display upon connecting to t he blade chassis, set the Scr een Delay Tim e to 8 seconds. Recomm end that &apos[...]
-
Page 215
Chapter 8 : Dev ice Mana gement 204 Blade chassis Sample URL format Password: calvin Password Field: pass word Dell 18 55 URL: https://192.168.60. 33/Forms/f_login Username: root Username Field: TEX T_USER_NAM E Password: calvin Password Field: T EXT_PASSWO RD IBM ® BladeCenter ® E or H http://192.168.84.217/pri va[...]
-
Page 216
Chapter 8 : Dev ice Mana gement 205 2. Click the Port Nam e for the KVM port you want to edit. T he Port page opens. To select the USB profile s for a KVM port: 1. In the Select USB Profiles for Port section, select one or m ore USB profiles from the Ava ilable list. Shift-Click and drag to select several cont inuous profiles. Ctrl-Click to[...]
-
Page 217
Chapter 8 : Dev ice Mana gement 206 Configuring KX II Local Port Settings From the Local Port Settings page, you can cus tomize m an y s ettings for the KX II Local Conso le including ke yboard, hot keys, video switching delay, power save m ode, local user interface res olution settings, and local user authenticatio n. Further, you can change a USB[...]
-
Page 218
Chapter 8 : Dev ice Mana gement 207 Note: If you are using KX2-808, KX2-832 and KX2- 864 as tiered devices, you must connec t them to the base KX II via the extended local port. 4. If you are using the t iering feature, select the En able Local Port Device Tiering check box and enter the tiered secret w ord in the T ier Secret field. In order to co[...]
-
Page 219
Chapter 8 : Dev ice Mana gement 208 Note: Keyboard use for C hinese, Japanes e, and Korea n is for display only. Local lan guage input is not supp orted at this time for K X II Local Console func tions. Note: If using a Turkish k eyboard, you m ust connect to a target server through the Active KVM Client (AKC). It is not supported by othe r Raritan[...]
-
Page 220
Chapter 8 : Dev ice Mana gement 209 1280x1024 13. Choose the refresh rate from the drop-down list. T he browser will be restarted when this ch ange is m ade. 60 Hz 75 Hz 14. Choose the type of l ocal user authentication. Local/LDAP/RADIUS. T his is the recomm ended option. For m ore inform ation about authentication, see Rem ote Aut[...]
-
Page 221
Chapter 8 : Dev ice Mana gement 210 KX2-808, KX2- 832 and KX2-864 Standard and Extended Local Port Settings The KX2-808, KX2- 832 and KX2-864 pro vide you with t wo local port options: the standard loca l port and the extende d local port. Each of these port options is e nabled and disabled fr om the Rem ote Console or from the Local Conso le on th[...]
-
Page 222
Chapter 8 : Dev ice Mana gement 211 Connect and Disconnect Scripts The KX II provides th e ability to execute k ey macro scripts when connecting to or disconn ecting from a target. You can create and e dit your own scripts on the C onnection Script page to perform additional actions when connecting to or disconnecting fr om targets. Alternativel y,[...]
-
Page 223
Chapter 8 : Dev ice Mana gement 212 3. In the Apply Selected Scr ipts to Ports s ection, select the target(s ) you want to appl y the script to using Select All or clicking on the checkbox to the lef t of each target to app ly the script to only select targets. 4. Click Apply Scripts. Once the script i s added to the tar get, it appears under the S[...]
-
Page 224
Chapter 8 : Dev ice Mana gement 213 For exam ple, select F1-F16 to displa y the function key set in the Add box. Select a function k ey and add it to the Scrip t box. Next, select Letters from the Key Set drop-do wn and add a letter k ey to the scr ipt. 8. Optionally, add text tha t will display when the script is executed. a. Click Construct Scrip[...]
-
Page 225
Chapter 8 : Dev ice Mana gement 214[...]
-
Page 226
Chapter 8 : Dev ice Manage ment 215 Modifying Scripts To modify existing sc ripts: 1. Click Device Settings > Connection Scripts. T he Connection Scripts page opens. 2. In the Available Connect ion Scripts sectio n, select the sc ript you want to modif y and click Modify. The page is then in Edit mode. 3. Make changes as nee ded. Click O K when [...]
-
Page 227
Chapter 8 : Dev ice Mana gement 216 5. Click Import. T he Configuration Scripts page o pens and the im ported scripts are displa yed. To export a disconne ct script: 1. Click Device Settings > Configuration Scripts. T he Configuration Scripts page opens. 2. In the Available Connect ion Scripts section, select t he script you want to export and c[...]
-
Page 228
Chapter 8 : Dev ice Mana gement 217 Creating Port Groups The KX II supports the aggregation of m ultiple ports into a single p ort group.Port groups co nsist solely of ports configure d as standard KVM ports. A port m ay only be a m ember of a single group . Ports that are availab le to be included in a port group are disp layed in the Select Port [...]
-
Page 229
Chapter 8 : Dev ice Mana gement 218 Creating a Dual Video Port Group The dual video port groups feature allows you to group two video ports into one group. Use this feature when you need to connect t o a server with t wo video cards/ports, and you want to access both ports from the sam e remote client at the sam e time. Note: Dual port video gro up[...]
-
Page 230
Chapter 8 : Dev ice Mana gement 219 Note: If a port is already a part of blade server port gr oup, another dual video port group, or 'standard' port group, th e port is not an option since ports c an only belong to a sing le port group at a time. 3. Select the Dual Video Port Group radio button. 4. From the Select Ports f or Group section[...]
-
Page 231
Chapter 8 : Dev ice Mana gement 220 3. Click Apply. Click Reset Defaults to change back to English. Note: Once you app ly a new language, the online help is also loca lized to match your langua ge selection.[...]
-
Page 232
221 In This Chapter Security Settings .................................................................................... 221 Configuring IP Acces s Control .............................................................. 232 SSL Certificates ..................................................................................... 234 Security Banner ..[...]
-
Page 233
Chapter 9 : Security Man agement 222 To reset back to d efaults: Click Reset to Def aults. Login Limitations Using login limitations, you can specif y restrictions for single login, password aging, and t he logging out idle users . Limitati on Description Enable single login limitation W hen selected, only one login per user name is allowed at [...]
-
Page 234
Chapter 9 : Security Man agement 223 Limitati on Description Enter the num ber of days after which a passwor d change is required. T he default is 60 days. Log out idle users, After (1- 365 minutes) Select the "Log off idle users" checkbox to automatically disconnect us ers after the am ount of time y o u specify in the " After (1-36[...]
-
Page 235
Chapter 9 : Security Man agement 224 Strong Passwords Strong passwords pr ovide m ore secure local authentic ation for the system. Us ing strong passwords, you can specif y the format of vali d KX II local passwords suc h as m ini mum and m aximum length, required characters, and pass word history retention. Strong passwords re quire user -created [...]
-
Page 236
Chapter 9 : Security Man agement 225 User Blocking The User Block ing options specif y the criteria by which users are b locked from acc essing the system after the specifie d number of unsuc cessful login attempts. The three options are m utually exclusi ve: Option Description Disabled The default option. Us ers are not block ed regardless of the [...]
-
Page 237
Chapter 9 : Security Man agement 226 Option Description Timer Lock out Users are denied acc ess to the s y stem for the specified amount of tim e after exceeding the specified num ber of unsuccessful login attem pts. W hen selected, the following fields are enabled: Attempts - The num ber of unsuccessful login attempts after which th e user wil[...]
-
Page 238
Chapter 9 : Security Man agement 227 Encryption & Share Using the Encr yption & Share settings you can s pecify the type of encryption used, PC an d VM share modes, a nd the t ype of reset performed when the KX II Reset button is pressed . W ARNING: If you select an encr yption mode that is not support ed by your browser, you will not be ab[...]
-
Page 239
Chapter 9 : Security Man agement 228 Encryption mode Description browser supports it, otherwise you will not be able to connect. Se e Checking Your Browser for AES Enc ryption (on page 229 ) for more inform ation. AES-256 The Advanced Encr yption Standard (AES) is a National Institute of Standards and Technolog y specification for the encr yption o[...]
-
Page 240
Chapter 9 : Security Man agement 229 6. If needed, select Loca l Device Reset Mode. T his option specifies which actions are tak en when the hardware Res et button (at the back of the device) is d epressed. For m ore information, see Resetting the KX II Using the Reset Button (on page 285 ). Choose one of the fol lowing options: Local device reset [...]
-
Page 241
Chapter 9 : Security Man agement 230 Enabling FIPS 140 -2 For governm ent and other high securit y environments, enabling FIP S 140 -2 mode m ay be required. The KX II uses an em bedded FIPS 140 -2-validated c ryptographic module running on a L inux ® platform per FIPS 140-2 Im plementation Guidance section G.5 gu idelines. Once this mode is enab [...]
-
Page 242
Chapter 9 : Security Man agement 231 FIPS 140-2 Support Requirements The KX II supports the use of FIPS 140 -2 approved e ncryption algorithms. T his allows an SSL server and client to succ essfully negotiate the cipher su ite used for the enc rypted session when a cli ent is configured for FIPS 140 -2 only m ode. Following are the recom mendations[...]
-
Page 243
Chapter 9 : Security Man agement 232 Configuring IP Access Control Using IP access contro l, you control access to your KX II. Note that IP access control restricts traf fic of any kind fr om accessing the KX II, so NTP servers, RADI US hosts, DNS hosts and so on m ust be granted access to the KX II. By setting a global Acc ess Control List (ACL) y[...]
-
Page 244
Chapter 9 : Security Man agement 233 3. Choose the Polic y from the drop-down list. 4. Click Insert. If the ru le # you just t yped equals an existing rule #, the new rule is placed ahead of the exiting rule and all ru les are m oved down in the list. Tip: The rule num bers allow you to have m ore control over the order in which the rules are c rea[...]
-
Page 245
Chapter 9 : Security Man agement 234 SSL Certificates The KX II uses the S ecure Socket La yer (SSL) protocol for an y encrypted network traffic between itself and a con nected client. W hen establishing a connection, the KX II has to identi fy itself to a client using a cryptographic cert ificate. It is possible to generate a Certificate Sign ing [...]
-
Page 246
Chapter 9 : Security Man agement 235 f. Country (ISO code) - The countr y where the organization is located. This is the t wo-letter ISO cod e, e.g. DE for Germ any, or US for the U.S. g. Challenge Pass word - Some certif ication authorities re quire a challenge password to authorize later changes on t he certificate (e.g. revocation of the cert if[...]
-
Page 247
Chapter 9 : Security Man agement 236 b. A message containi ng all of the inform ation you entered appears. c. The CSR and the f ile containing the private k ey used when generating it can be do wnloaded by clicking Do wnload CSR. d. Send the saved CSR to a CA for certif ication. You will get th e new certificate from the CA. Note: The CSR and the p[...]
-
Page 248
Chapter 9 : Security Man agement 237 Security Banner KX II provides you with the ability to add a s ecurity banner to the KX II login process. T his feature requires users to either accept or decli ne a security agreement before t hey can access the KX II. The information provided in a secur ity banner will be displa yed in a Restricted Serv ice Ag[...]
-
Page 249
Chapter 9 : Security Man agement 238 Note: You cannot u pload a text file from t he local port.[...]
-
Page 250
239 In This Chapter Audit Log ................................................................................................ 239 Device Inform ation ................................................................................. 240 Backup and Restore .............................................................................. 242 USB Profile[...]
-
Page 251
Chapter 10 : M aintenance 240 To page throug h the audit log: Use the [Older] and [Ne wer] links . Device Information The Device Inform ation page provides deta iled information about your KX II device and the CI Ms in use. This inf ormation is helpf ul should you need to contact Rarita n Technical Support. To view information about your KX II [...]
-
Page 252
Chapter 10 : Ma intenance 241 DCIM-SUSB D2CIM-VUSB D2CIM-DVUSB D2CIM-DVUSB-D VI D2CIM-DVUSB-HD MI D2CIM-DVUSB Note: Only the numer ic portion of the seri al numbers are disp layed for the DCIM-USB, DCI M-PS2 and DCI M-USB G2 CI Ms. For example, XXX1234567 is displaye d. The serial number pr efix GN is displayed for CIMs that[...]
-
Page 253
Chapter 10 : M aintenance 242 Backup and Restore From the Back up/Restore page, you can back up and restore the sett ings and configuration for your KX II. In addition to using back up and restore f or business continuit y purposes, you can use this f eature as a time -saving mechanism . For instance, you can quickly provide access to your team fro[...]
-
Page 254
Chapter 10 : Ma intenance 243 In IE 7 (and later), IE is used as the default a pplication to open files , so you are prom pted to open the f ile versus save the file. T o avoid this, you m ust change the default application tha t is used to open files to W ordPad ® . 2. To do this: a. Save the back up file. The back up file is saved locally on you[...]
-
Page 255
Chapter 10 : M aintenance 244 USB Profile Management From the USB Prof ile Management page, you can upload custom profiles provided b y Raritan tech support. T hese profiles are designe d to address the needs of your target server’s conf iguration, in the event that the set of standard prof iles does not alread y address them. Raritan tec h suppo[...]
-
Page 256
Chapter 10 : Ma intenance 245 As noted, you m ay delete a custom profile from the s y s tem while it is still designated as an act ive profile. Doing so wil l terminate any virtual media sessions that were in place. Handling Conflicts in P rofile Names A naming conflict bet ween custom and standard USB prof iles may occur when a firm ware upgrade i[...]
-
Page 257
Chapter 10 : M aintenance 246 To upgrade your KX II unit: 1. Locate the appropria te Raritan firm ware distribution f ile (*.RFP) on the Raritan web site http://ww w.raritan.com on the Firmware Upgrades web page. 2. Unzip the file. Please rea d all instructions inclu ded in the firm ware ZIP files carefully before u pgrading. No te: Copy the firmwa[...]
-
Page 258
Chapter 10 : Ma intenance 247 As prompted, close the browser and wait approximately 5 m inutes before logging in to the KX II again. again. For i nformation about upgrad ing the device firm ware using the Multi-P latform Client, see U pgrading Device Firmware in the KVM and Serial A ccess Clients Gu ide . Note: Firmware upgrades are not support ed [...]
-
Page 259
Chapter 10 : M aintenance 248 Rebooting the KX II The Reboot p age provides a saf e and controlled way to reboot your KX II. This is the recomm ended m ethod for rebooting. Important: All KVM and serial connections will be closed and all users will be logged off . To reboot your KX II: 1. Choose Maintenance > Reboot. The Rebo ot page opens. 2. C[...]
-
Page 260
Chapter 10 : Ma intenance 249 Stopping CC-SG Management W hile the K X II is under CC -SG m anagement, if you try to access the device directl y, you are notified that it the de vice is under CC -SG managem ent. If you are m anaging the KX II through CC -SG and con nectivity between CC -SG and the KX I I is lost after the spec ified timeout interva[...]
-
Page 261
Chapter 10 : M aintenance 250 3. Click Yes to rem ove the device CC -SG managem ent. Once CC-SG managem ent has ended, a confirm ation will be displayed.[...]
-
Page 262
251 In This Chapter Network Interf ace Page ......................................................................... 251 Network Statistics Pa ge ......................................................................... 251 Ping Host Page ...................................................................................... 253 Trace Route to Host[...]
-
Page 263
Chapter 11 : Diag nostic s 252 Statistics - Produces a page similar to the one displayed here. Interfaces - Produces a page similar to the one displayed here.[...]
-
Page 264
Chapter 11 : Diagn ostics 253 Route - Produces a p age sim ilar to the one displayed here. 3. Click Refres h. The relevant inform ation is displayed in the Result field. Ping Host Page Ping is a network tool used to test whether a particular host or I P address is reachable acros s an IP network . Using the Ping Host pag e, you can determ ine i[...]
-
Page 265
Chapter 11 : Diag nostic s 254 2. T y pe either the hostnam e or IP address into the IP Add ress/Host Name f ield. Note: The host name ca nnot exceed 232 charac ters in length. 3. Click Ping. The results of the ping are displa yed in the Result field. Trace Route to Host Page Trace route is a net work tool used to det ermine the route tak en to the[...]
-
Page 266
Chapter 11 : Diagn ostics 255 Device Diagnostics Note: This page is for use by Raritan Field En gineers or when you are directed by Raritan Tec hnical Support. De vice diagnostics do wnloads the diagnostics inf ormation from the KX II to the client mac hine. Two operations can be perf ormed on this pag e: Execute a special diagnost ics scr ipt [...]
-
Page 267
Chapter 11 : Diag nostic s 256 a. Click Save to File. T he File Download d ialog opens. b. Click Save. The Sav e As dialog box opens . c. Navigate to the des ired directory and click Save. d. Email this file as directe d by Raritan T echnical Support.[...]
-
Page 268
257 In This Chapter Overview ................................................................................................ 257 Accessing the KX II Usin g CLI .............................................................. 258 SSH Connection to th e KX II ................................................................ . 258 Logging In ...........[...]
-
Page 269
Chapter 12 : Co mmand Line Interface (C LI) 258 A ccessing the KX II Using CLI Access the KX II b y using one of the followi ng methods: SSH (Secure Shell) via I P connection A number of SSH c lients are available an d can be obtained from the following locations: Putty - http://www.chiar k.greenend.org.uk/ ~sgtatham/putty/ http://www.chiar[...]
-
Page 270
Chapter 12 : Co mmand Line Interface (C LI) 259 Logging In To log in, ent er the user name admin as shown: 1. Log in as admin 2. The Password prom pt appears. Enter the defau lt password: raritan The welcom e message displays. You are no w logged o n as an administrator. After reviewing the fol lowing Navigat ion of the CLI (o n page 259 ) section,[...]
-
Page 271
Chapter 12 : Co mmand Line Interface (C LI) 260 CLI Syntax -T ips and Shortcuts Tips Comm ands are listed in alphabetical order. Comm ands are not case sensitive. Parameter nam es are single word without unders core. Comm ands without arguments default to sh ow current settings for the comm and. Typing a question m ark ( ? ) aft[...]
-
Page 272
Chapter 12 : Co mmand Line Interface (C LI) 261 Initial Configuration Using CLI Note: These steps , which use the CLI, are op tional since the same configuration can be do ne via KVM. See Getting Star ted (on page 12 ) for more informatio n. KX II devices com e from the factor y with default factory settings. W hen you first power up and con nect t[...]
-
Page 273
Chapter 12 : Co mmand Line Interface (CL I) 262 The KX II now has t he basic configuration and ca n be access ed remotely via SSH, GUI, or local ly using the local serial port. The administrator needs to configure th e users and groups, ser vices, securit y , and seri a l ports to which the ser ial targets are attached t o the KX II. CLI Prompts Th[...]
-
Page 274
Chapter 12 : Co mmand Line Interface (C LI) 263 Enter admin > config > network . Command Description help Display overview of commands. history Display the current sess ion's comm and line history. interface Set/get network parameters. ipv6_interface Set/get IPv6 network param eters. logout Logout of the current C LI session. nam e D[...]
-
Page 275
Chapter 12 : Co mmand Line Interface (C LI) 264 Commands Description ipv6 Set/get IPv6 network param eters. Interface Command The Interface com mand is used to conf igure the KX II network interface. The s y n tax of the interf ace command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>[...]
-
Page 276
Chapter 12 : Co mmand Line Interface (CLI) 265 Name Co mmand The nam e command is used to configure the n etwork nam e. The syntax of the name is: name [devicename <devicename>] [hostname <hostname>] Device nam e configuration devicename <devicename> Device Name hostname <hostname> Preferred host name (DHCP only) Name Comman[...]
-
Page 277
266 In This Chapter Overview ................................................................................................ 266 Simultaneous Users .............................................................................. 266 KX II Local Console I nterface: KX II Devices ........................................ 267 Security and Authenticat io[...]
-
Page 278
Chapter 13 : KX II Local Con sole 267 KX II Local Console Interface: KX II Devices W hen y ou are located at the server rack , the KX II provides standard KVM managem ent and adm inistration via the KX II Local Console. T he KX II Local Console pro vides a direct KVM (a nalog) connection to your connected servers; the perform ance is exactly as if [...]
-
Page 279
Chapter 13 : KX II Local Con sole 268 Port Access Page (Local Console Serv er Disp lay) After you login to the KX II Local Console, the Port Access page opens. This page lists all of the KX II ports, and the targe t servers, port groups , and blade chassis that are connected to those ports. The Port Access pa ge contains the sam e informati on whet[...]
-
Page 280
Chapter 13 : KX II Local Con sole 269 Scanning Ports - Local Console The KX II scanning feat ure is supported b y the Local Console. The targets that are fou nd during the scan are displayed on the Sc an page one at a tim e, which is different f rom the Remote Console port s lide show. Each target is displa yed on the page f or 10 seconds by def au[...]
-
Page 281
Chapter 13 : KX II Local Console 270 Local Port Scan M ode Following are options a vailable to you to chan ge scan options on local port. To configu re the Local Console scan port s ettings: 1. On the Local Console, s elect Device Sett ings. 2. In the Local Port Sett ings section, sel ect Local Port Scan Mode. 3. Change the displa y interval as nee[...]
-
Page 282
Chapter 13 : KX II Local Con sole 271 4. Click OK. Once the sm art card reader is a dded, a message wil l appear on the page ind icating you have com pleted the operation successfully. A status of either Selected or Not Se lected will appear in the left panel of the p age under Card R eader. To update t he Card Readers Detected list: Click Refr[...]
-
Page 283
Chapter 13 : KX II Local Con sole 272 Local Console USB Profile Options From the USB Prof ile Options section of the Tools page, you can choose from the available U SB profiles. The ports that can b e assigned profiles are di spla yed in the Port Name field and the prof iles that are available for a port appear in the Select Profile To Use field af[...]
-
Page 284
Chapter 13 : KX II Local Con sole 273 Hot Keys and Connect Keys Because the KX II Local Console interf ace is completely replaced b y the interface for the target ser ver you are acc essing, a hot k ey is used to di sconnect fr om a target and return to t he local port GUI. A connect ke y is used to connect to a target or s witch between targets. T[...]
-
Page 285
Chapter 13 : KX II Local Console 274 Standard servers Co nnect key action Key sequence examp le Disconnect from a target and return to the local port GUI Disconnect from target port 5, slot 11 an d return to the local port GUI (t he page from which you connected to target): Double Click Scroll Lock Special Sun Key Combinations The following ke [...]
-
Page 286
Chapter 13 : KX II Local Con sole 275 Returning to the KX II Local Console Interface Important: T he KX II Local Console default ho t key is to press the Scroll Lock key tw ice rapidly. This key combination can be changed in t he Local P ort Settings page. See Configur ing KX II Local Port Settings fro m the Local Console (on page 279 ) in online h[...]
-
Page 287
Chapter 13 : KX II Local Con sole 276 US US/International United Kingdom French (France) German (Germ any ) JIS (Japanese Industr y Standard) Sim plified Chinese Traditional Chinese Dubeolsik Hangul ( Korean) German (Switzerland) Portuguese (Portu gal) Norwegian (Nor way) Swedish (Sweden) Dani[...]
-
Page 288
Chapter 13 : KX II Local Con sole 277 Hot key: Take this action: Double Click Lef t Ctrl key Press the left Ctrl k ey twice quickly 4. Select the Local Port C onnect ke y . Use a connect k ey sequence to connect to a target and switch to anoth er target. You can then use the ho t key to disconnect from the target and return to the local port G UI. [...]
-
Page 289
Chapter 13 : KX II Local Console 278 Note: If you initially choose not to ignore CC Manage mode on the local port but later wan t local port access, you w ill have to remove the device from under CC -SG manag ement (from within CC -SG). You will then be ab le to check this checkbox. 11. Click OK.[...]
-
Page 290
Chapter 13 : KX II Local Con sole 279 Configuring KX II Local Port Settings from the Local Console The standard local port and the extended loca l port can be configured from the Rem ote Console on the Port Config uration page, or from the Local Console on the L ocal Port Settin gs page. See Configuring K X II Local Port Settings (on page 206 ) for[...]
-
Page 291
Chapter 13 : KX II Local Con sole 280 IP auto configuration IP address Subnet mask Gateway IP address Primar y D NS server IP a ddress Secondary DNS server I P address Discovery port Bandwidth limit LAN interface s peed & duplex Enable autom atic failover Ping interval (seconds) Timeout (seconds) [...]
-
Page 292
Chapter 13 : KX II Local Con sole 281 Connect and Disconnect Scripts The KX II provides th e ability to execute k ey macro scripts when connecting to or disconn ecting from a target. You can create and e dit your own scripts on the C onnection Script page to perform additional actions when connecting to or disconnecting fr om targets. Alternativel [...]
-
Page 293
Chapter 13 : KX II Local Con sole 282 3. In the Apply Selected Scr ipts to Ports s ection, select the target(s ) you want to appl y the script to using Select All or clicking on the checkbox t o the left of each target to app ly the script to onl y select targets. 4. Click Apply Scripts. Once the script is added t o the target, it appears under the[...]
-
Page 294
Chapter 13 : KX II Local Con sole 283 For exam ple, select F1-F16 to displa y the function key set in the Add box. Select a functio n key and add it to the Script box. Next, select Letters from the Key Set drop-do wn and add a letter k ey to the script. 8. Optionally, add text tha t will display when the script is executed. a. Click Construct Scrip[...]
-
Page 295
Chapter 13 : KX II Local Con sole 284[...]
-
Page 296
Chapter 13 : KX II Local Con sole 285 Modifying Scripts To modify existing sc ripts: 1. Click Device Setti ngs > Connection Scripts. T he Connection Scripts page opens. 2. In the Available Connect ion Scripts section, select t he script you want to modif y and click Modify. The page is then in Edit mode. 3. Make changes as nee ded. Click O K whe[...]
-
Page 297
Chapter 13 : KX II Local Con sole 286 4. Continue holding the Res et button for 10 seco nds. Once the device has been reset, two short b eeps signal its completion.[...]
-
Page 298
287 In This Chapter Hardware ............................................................................................... 287 Software ................................................................................................ . 311 Hardware KX II Physical Sp ecifications DKX2-832 - Dual Power AC 100V/240V, Local US B Ports , Modem Port, Ex[...]
-
Page 299
Appendix A : Specification s 288 Dominion KX II model Description Dimensions (WxDxH) Weight Power and heat dissipation remote users , 1 local port for use at the rack 1.75"; 439 x 290 x 44mm 4.1kg 47/63Hz 1A 63W 54 KCAL DKX2- 232 32 server ports, 2 remote users , 1 local port for use at the rack 17.3" x 11.4" x 1.75"; 439 x 290 [...]
-
Page 300
Appendix A : Specification s 289 Specifications for All Dominion KX II M odels Local port access Video HD15(F) VGA Keyboard/Mouse USB(F), 1 USB front, 3 USB rear W arranty Two years standard with advanced replacement* Supported Target Serv er Video Resolution/Ref resh Rate/Connection Distanc e The maxim um supported distance is a f unction of m any[...]
-
Page 301
Appendix A : Specification s 290 CIM mod el Description Dimensions (WxDxH) Weight D2CIM-VUSB USB CIM for virtual m edia and Absolute Mouse S ynchronization 1.3" x 3.0" x 0.6"; 33 x 76 x 15mm 0.20lb; 0.09kg DCIM-PS2 CIM for PS/2 1.3" x 3.0" x 0.6"; 33 x 76 x 15mm 0.20lb; 0.09kg DCIM-SUN CIM for Sun 1.3" x 3.0"[...]
-
Page 302
Appendix A : Specification s 291 CIM mod el Description Dimensions (WxDxH) Weight P2CIM-SER Paragon II/Dom inion KX II CI M for serial (ASCII) devices 1.3" x 3.0" x 0.6"; 33 x 76 x 15mm 0.20lb; 0.09kg D2CIM-DVUSB- DVI Digital CIM that provides digital- to -analog con version and support for virtual m edia, smartcard/CAC, a udio, Abso[...]
-
Page 303
Appendix A : Specification s 292 CIM mod el Description Dimensions (WxDxH) Weight D2CIM-DVUSB- DP Digital CIM that provides digital- to -analog con version and support for virtual m edia, smartcard/CAC, a udio, Absolute and Relative Mouse Synchronization 1.7" x 3.5" x 0.8"; 43 x 90 x 19mm 0. 25lb; 0.11kg D2CIM-DVUSB- HDMI Digital CIM[...]
-
Page 304
Appendix A : Specification s 293 Digital CIM Timing Modes Fo llowing are the default t iming modes that are us ed when the KX II communicates with a video source via a digital CIM. The timing m ode that is used is dependent on t he native resolution of the video source. 1920x1080@60Hz 1600x1200@60Hz 1280x1024@60Hz (de fault resolution a[...]
-
Page 305
Appendix A : Specification s 294 Digital CIM Established and Standard Modes The following additiona l established and stan dard resolutions and tim ing modes are supported by the KX II 2.5.0 (and l ater). Established M odes 720x400@70Hz IBM, VGA 640x480@60Hz IBM, VGA 640x480@67Hz Apple Mac ® II 640x480@72Hz VE SA 640x480@75Hz V[...]
-
Page 306
Appendix A : Specification s 295 Digital CIM Display Native Resolution You are able to select t he native resolution of the CIM on the Port Configuration page fr om the Displa y Native Resolution drop -down. This is the preferred reso lution and timing m ode of the digital CIM. Once a resolution is selecte d, it is applied to the CIM . If no select[...]
-
Page 307
Appendix A : Specification s 2 96 Supported Paragon II CIM S and Configur ations The KX II supports the P2CIM-APS2DUA L and P2CIM-AUS BDUAL CIMs, which provide t wo RJ45 connections to dif f erent KVM switches. Support of these CIMs provides a second path to access the target in the event that one of the KVM switches is block ed or fails. Paragon C[...]
-
Page 308
Appendix A : Specification s 297 KX II- to -KX II Paragon CIM Guidelines The following system configuration guidelines shou ld be followed when you are using Paragon CIMs in a KX II- to -KX II configu ration: Concurrent A ccess Both KX II KVM s witches should be conf igured with the sam e policy for concurrent access to t argets - both PC-Share or [...]
-
Page 309
Appendix A : Specification s 298 If a connection to the targ et is in place from the other KX II, t he availability is check ed when a connection is attem pted. Access is denied or allowed consistent with the PC- Share polic y in place for the KX II. Until that tim e, the availability is not be updated on the other KX II. If access is denied beca u[...]
-
Page 310
Appendix A : Specification s 299 Paragon II operation mode Mode description Supported? port can be selected an d controlled by more tha n one user, but onl y one user has ke yboard and mouse control at an y one time. Timeout, which is conf igured on the Paragon II, is n ot supported. Both users will have concurrent k eyboard and mouse control. The [...]
-
Page 311
Appendix A : Specification s 300 Supported Remote Conn ections Remote connection Details Network 10BASE-T, 100 BASE-T, and 1000BA SE-T (Gigabit) Ethernet Protocols TCP/IP, UDP, SNT P, HTT P, HTTPS, RADIUS, LDAP/LDAPS Network Speed Setting s KX II netw ork speed setting Network switch port setting Auto 1000/Full 100/Full 100/Half 10/Full 10/Half Aut[...]
-
Page 312
Appendix A : Specification s 301 Legend: Does not function as exp ected Supported Functions; not recom mended NOT supported b y Ethernet specification; pro duct will communicate, but c ollisions will occur Per Ethernet spec ification, these should be “no communication,” howev er, note that the KX II behavior deviates from expected behavior Note[...]
-
Page 313
Appendix A : Specification s 302 Target Server Requirements W hen using smart c ard readers, the basic requirem ents for interoperabilit y at the target server are: The IFD (sm art card reader) Handler m ust be a standard US B CCID device driver (com parable to the generic Micr osoft ® USB CCID driver). A digital CIM or D2CIM -DVUSB (Dua l[...]
-
Page 314
Appendix A : Specification s 303 Remote Client Requirements The basic requirem ents for interoperabilit y at the remote client are: The IFD (sm art card reader) Handler m ust be a PC/SC compliant device driver. The ICC (sm art card) Resource Manager m ust be available and be PC/SC com pliant. The JRE ® Java ™ 1.7 with s mart c ard AP[...]
-
Page 315
Appendix A : Specification s 304 Type Vendor Model Verified USB SCM Microsystem s SCR331 Verified on local and remote USB ActivIdentity ® ActivIdentity USB Re ader v2.0 Verified on local and remote USB ActivIdentity ActivIdentity USB Reader v3.0 Verified on local and remote USB Gemalto ® GemPC USB- SW Verified on local and remote USB Keyboard/Car[...]
-
Page 316
Appendix A : Specification s 305 Supported A udio Device Formats The KX II supports one playback and cap ture device and one record device on a target at a time. T he following audio device f ormats are supported: Stereo, 16 bit, 44.1 K Mono, 16 bit, 44.1K Stereo, 16 bit, 22.0 5K Mono, 16 bit, 22.05K Stereo, 16 bit, 11.0 25K [...]
-
Page 317
Appendix A : Specification s 306 Bandwidth Requirements The table below detai ls the audio playback and capture bandwidth requirements to trans port audio under each of the se lected formats. Audio format Network bandw idth requirement 44.1 KHz, 16bit stere o 176 KB/s 44.1 KHz, 16bit m ono 88.2 KB/s 2.05 KHz, 16bit stere o 88.2 KB/s 22.05 KHz, 16bi[...]
-
Page 318
Appendix A : Specification s 307 Audio in a Mac Environment Following are k nown issues in a Mac ® e nvironment. On Mac clients, onl y one playback device is listed on t he Connect Audio panel when acc essing the device throu gh the Virtual KVM Client (VKC) and Mu lti-Platform Client (MPC). The devic e listed is the default and is d isplayed o[...]
-
Page 319
Appendix A : Specification s 308 KX2 8xx Extended L ocal Port Recommend ed Maximu m Distances Extended device 1024x768, 60 Hz 1280x1024, 60 Hz Paragon II UMT usin g EUST 1000 900 Paragon EUST 500 400 URKVM 650 250 Paragon UST 500 200 Mac Mini BIO S Keystroke Commands The following BIOS comm ands have bee n tested on Intel -based Mac ® Mini target [...]
-
Page 320
Appendix A : Specification s 309 Keystroke Description Virtual M edia CIM Dual Virtual Media CIM Mac Lion Server HDMI CIM Press N during startup Start up from a compatible network server (NetBoot) Press T during startup Start up in Target D isk mode Press Shift during startup Start up in Safe Boot mode and tem porarily disable login item s Known is[...]
-
Page 321
Appendix A : Specification s 310 Port Description By default, this port is use d for m ultiple purposes, including the web server for the HTML c lient, the download of client software (Multi-Platform Client (MPC) and Virtual KVM Client (VKC)) onto th e client's host, and the tr ansfer of KVM an d virtual media data str eams to the client. KX I[...]
-
Page 322
Appendix A : Specification s 311 Software Supported Operating S ystems (Clients) The following operatin g system s are supported on the Virtual K VM Client (VKC) and Multi-P latform Client (MPC). W indow s 7 ® W indow s XP ® W indow s 2008 ® W indow s Vista ® W indow s 2000 ® SP4 Serv er W indow s 2003 ® Server W i[...]
-
Page 323
Appendix A : Specification s 312 Linux ® The JRE ™ plug-in is a vailable for the W indows ® 32 -bit a nd 64-bit operating system s. MPC and VKC ca n be launched onl y from a 32-bit browser, or 64-bit browser. Following are the Java ™ 32 -bit and 64- bit W indow s operating s ystem requirements. Mode Operating system Browser W indows x64 3[...]
-
Page 324
Appendix A : Specification s 313 Mac OS X Mountain L ion 10.8.5 * using Saf ari 6.1.1 running JRE 1.7.0_51 *Note: Upon upgradin g from OS X 10.8.2 to O S X 10.8.3, Safari ® may block Java ™ . JRE Requirements and Browser Considerations for Mac Java Runtime Env ironment Requirem ents for Mac Install Java Runtim e Environm ent 7 (JRE) ® on PC[...]
-
Page 325
Appendix A : Specification s 314 Resolutions 640x480 @72Hz 1152x864 @85H z 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66H z 720x400 @70Hz 1152x900 @76H z 720x400 @84Hz 1280x720@60Hz 720x400 @85Hz 1280x960 @60H z 800x600 @56Hz 1280x960 @85H z 800x600 @60Hz 1280x1024 @60H z 800x600 @70Hz 1280x1024 @75H z 800x600 @72Hz 1280x1024 @85H z 800[...]
-
Page 326
Appendix A : Specifications 315 Video Image Appears Dark when Using a Mac If you are using a Mac ® with an HDMI video port and the video seem s too dar k, enable D VI Compatibilit y Mode on the CIM to help resol ve the issue. See Configuring CI M Ports (on page 176) KX II Supported Ke yboard Languages The KX II provides keyboard support f or the l[...]
-
Page 327
Appendix A : Specification s 316 Language Regions Keyboard layout Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian Slovenian Slovenia Slovenian Italian Italy Italian Spanish Spain and most Spanish speaking countries Spanish Portuguese Portugal Portuguese Events Captured in t he Audit Log and Syslog Following is a list and de[...]
-
Page 328
317 In This Chapter Overview ................................................................................................ 317 Recomm endations for Dual Port Video ................................................. 318 Dual Video Port Group Supported Mouse Mo des ................................ . 318 CIMs Required for Dua l Video Support .......[...]
-
Page 329
Appendix B : Dual Video Por t Groups 318 Recommendations for Dual Port Video Set the target server ’s primary and secondar y displays to the sam e video resolution in order to m aintain mouse s ynchronization and m inimize having to periodicall y resync. Depending on the desired orientation, th e top d isplay (vertical orientation) or left displa[...]
-
Page 330
Appendix B : Dual Video Por t Groups 319 Target operating systems Supported mouse modes Comments Mouse mode is recomm ended. Linux ® Intelligent and Standard Mouse Modes Linux ® users m ay experience display and m ouse movement issues using single m ouse mode. Raritan recom mends Linux users do not use Single Mouse mode. Mac ® operating system S[...]
-
Page 331
Appendix B : Dual Video Por t Groups 320 Monitor settings will NOT be applied. Inste ad the Port Group Management conf igured 'Displa y Orientation' will be applied. Other - Enable Singl e Mouse Cursor setti ng will NOT be applied Other - Enable Scal e Video setting will be applied Other - Pin Menu T oolbar setting will be[...]
-
Page 332
Appendix B : Dual Video Por t Groups 321 Example Dual Port Video Group Configuration The following is a genera l example. Your configuration m ay vary in the t ype of CIMs used, the port you designate as the prim ary port, the ports you are connecting to and so on. In this exam ple, we are using: A target server with two video ports Target [...]
-
Page 333
Appendix B : Dual Video Por t Groups 322 Diagram key Connection from the target's prim ary (first) video port to the KX II Connection from the target's secondar y (second) video port to the KX II IP connection between t he KX II and rem ote client Target server - c onfigure the displa y settings and launch the dual port video gro up Displ[...]
-
Page 334
Appendix B : Dual Video Por t Groups 323 Note: If the target pr imary and secondary displays are set to different resolutions the mouse will not stay in sync and wi ll need to be periodically re-sy nced from the top- left target window. Step 2: Connect the T arget Server t o the KX III Dual port video groups can be created from existing port connec[...]
-
Page 335
Appendix B : Dual Video Por t Groups 324 Step 3: Configure the M ouse Mod e and Ports Once you have connec ted the target server to the Rar itan device through the target server video ports, it detects th e connection and displa ys the ports on the Port Conf iguration page. For instructions, see Configuring Standa rd Target Servers (on pa ge 173 ) [...]
-
Page 336
Appendix B : Dual Video Por t Groups 325 Step 5: Launch a Dua l Port Video Group Once you have created th e dual video port gro up, it is available on th e Port Access page. Two KVM channels are required to rem otely connect to the dual video port group by click ing primary port. If two channels are not available, the Connect link is not d isplayed[...]
-
Page 337
Appendix B : Dual Video Por t Groups 326 Direct Port Access and Dual Port Video Groups Direct port access allows users to bypass ha ving to use the device's Login dialog and Port Acc ess page. This feature also prov ides the ability to enter a usernam e and password directly to proceed to th e target, if the usernam e and p assword is not cont[...]
-
Page 338
327 In This Chapter Overview ................................................................................................ 327 Connecting the Parago n II to the KX II .................................................. 328 Overview Connect the Parago n II system to a KX II device that is m anaged by CC -SG so that Parag on II is accessible from C[...]
-
Page 339
Appendix C : Accessing a PX2 from the KX II 328 W hen y ou access the Para gon II system f rom KX II or CC -SG (if the KX II is managed by CC -SG), the Paragon II O SUI login screen appears f or you to log in. In this integration, you can perform any OSUI functions im plemented with current Paragon II firm ware or an y KX II func tion implemented w[...]
-
Page 340
Appendix C : Accessing a PX2 from the KX II 329[...]
-
Page 341
330 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group I nform ation ........................................................ 330 Setting the Registr y to Perm it W rite Operations to the Schem a ........... 331 Creating a New Attr ibute ..........................................[...]
-
Page 342
Appendix D : Updating the LDAP S chema 331 Setting the Registry to Permit Write Operations to the Schema To allow a dom ain controller to write to the schem a, you must s et a registry entr y that permits schem a updates. To permit w rite operations to the schema: 1. Right-click the Active Directory ® Schem a root node in the left pane of the wind[...]
-
Page 343
Appendix D : Updating the LDAP S chema 332 3. Click New and then cho ose Attribute. W hen the warning m essage appears, click Continue and the Create New At tribute dialog appears. 4. T y pe rc iusergroup in th e Comm on Name field. 5. T y pe rc iusergroup in th e LDAP Displa y Name field. 6. T y pe 1.3.6.1.4.1.13742. 50 in the Un ique x5000 Object[...]
-
Page 344
Appendix D : Updating the LDAP S chema 333 2. Scroll to the user class in the right pane and r ight-c lick it. 3. Choose Properties fr om the m enu. The user Properties dialo g appears. 4. Click the Attributes ta b to open it. 5. Click Add.[...]
-
Page 345
Appendix D : Updating the LDAP S chema 334 6. Choose rciusergroup from the Select Sch ema Object list. 7. Click OK in the Select Schem a Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update t he schema cache: 1. Right-click Active Director y ® Schema in the left pane of the wind ow and select Reload the Sch[...]
-
Page 346
Appendix D : Updating the LDAP S chema 335 3. Go to the director y where the support tools were installed. Run adsiedit.msc . The ADSI Edit window opens. 4. Open the Dom ain. 5. In the left pane of the window, select the CN =Users folder.[...]
-
Page 347
Appendix D : Updating the LDAP S chema 336 6. Locate the user nam e whose properties you want to adjus t in the right pane. Rig ht -c lick the user nam e and select Prope rties. 7. Click the Attribute Ed itor tab if it is not alre ady open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor d ialog appears. 9. [...]
-
Page 348
337 In This Chapter Overview ................................................................................................ 337 Java Runtim e Environment (JRE) Notes ............................................... 337 IPv6 Support Notes ............................................................................... 339 Dual Stack Login Performanc[...]
-
Page 349
Appendix E : Informationa l Notes 338 Java Not Loading P roperly on M ac If you are using a Mac ® and see the f ollowing message when conn ecting to a device from the KX II Port Access T able, Java ™ is not loa ded properly: "Error while getting the list of open targets , please tr y again in a few seconds". If this occurs, check your [...]
-
Page 350
Appendix E : Informational No tes 339 IPv6 Support Notes Operating System IPv6 Support No tes Java Java ™ 1.7 supports IPv6 f or the following: Solaris ™ 10 (and later) Linux ® kernel 2.1.2 (and later)/RedHat 6.1 (and later) Solaris 10 (and later) W indow s XP ® SP1 and W indows 2003 ® , W indows Vista ® and W indows 7 opera[...]
-
Page 351
Appendix E : Informationa l Notes 340 Dual Stack Login Performance Issues If you are using the KX II in a dual stack configuration, it is im portant you configured the dom ain system ( DNS) correc tly i n the KX II in order to avoid dela y s when logging i n. See Tips for Adding a Web Browser Interfa ce (on p age 195 ) for inform ation on configuri[...]
-
Page 352
Appendix E : Informational No tes 341 Windows 2000 Comp osite USB Device Behavior for Virtu al Media The W indow s 2000 ® operat ing system does not s upport USB com posite devices, like Raritan’s D2 CIM -VU SB, in the same m anner as non -com posite USB devices. As a result, the “Saf ely Remove Hardware” s ystem tray icon does not appear fo[...]
-
Page 353
Appendix E : Informationa l Notes 342 Cannot Write T o/From a File from a M ac Client If you are connecting to the KX II from a Mac ® 10.8.5 c lient r u nning Safari ® 6.1 with Java ™ 1. 7 and cannot write to/f rom a file on a target server or access virtua l media, do the fol lowing to correct this: 1. In Safari, select Preferenc es. 2. Under [...]
-
Page 354
Appendix E : Informational No tes 343 Virtual M edia via VKC and AKC in a Wind ows Environment W indows XP ® operating system administrator and standard user privileges var y from those of the W indows Vista ® operat ing system and the W indow s 7 ® operating s ystem. W hen enabled in Vista or W indows 7, User Access Control (UAC) provides the l[...]
-
Page 355
Appendix E : Informationa l Notes 344 Virtual M edia Linux Drive Listed Tw ice For KX II 2.4.0 (and later) and LX 2.4.5 (and later), users who are logged in to Linux ™ clients as ro ot users, the drives are listed twic e in the Local Drive drop-down. For exam ple, you will see eg /dev/sdc and eg /dev/sdc1 where the f irst drive is the boot sector[...]
-
Page 356
Appendix E : Informational No tes 345 USB Port and Profile Notes VM -CIMs and DL360 USB Ports HP ® DL360 servers ha ve one USB port on th e back of the de vice and another on the fr ont of the device. W ith the DL360, both ports cannot be used at the sam e time. Therefore, a dual VM-CIM can not be used on DL360 servers. However, as a work around, [...]
-
Page 357
Appendix E : Informationa l Notes 346 USB profile help app ears in the USB Profile H elp window. For detailed inform ation about specific USB profiles, see Availabl e USB Profiles ( on page 109 ). Raritan provides a stand ard selection of USB conf iguration profiles for a wide range of oper ating system and BIOS level server im plementations. These[...]
-
Page 358
Appendix E : Informational No tes 347 Changing a USB Profile when Using a Sm art Card Reader There ma y be certain circum stances under which you will need to change the USB profi le for a target serv er. For example, you ma y need to change the connect ion speed to "Use Full Sp eed for Virtual Media CIM" when the target h as problems wit[...]
-
Page 359
Appendix E : Informationa l Notes 348 Note: These procedures do not apply to t he circumflex accent (above vowels). In all cases, th e ^ key (to the right of t he P key) works on French keyboards to create t he circumflex accent when used in combination with another character. Accent Symbol (Windows XP ® Operating S y stem Clients Onl y ) From the[...]
-
Page 360
Appendix E : Informational No tes 349 Ke y board Langua ge Preference (Fedora Linux Clients) Because the Sun ™ J RE ™ on Lin ux ® has problem s generating the corr ect KeyEvents for f oreign-language k eyboards configured using S ystem Preferences, Raritan recom m ends that you configure foreign k eyboards using the methods d escribed in the f[...]
-
Page 361
Appendix E : Informationa l Notes 350 4. Click Close. To set the keyboard lang uage using the Keyboard Ind icator: 1. Right-click the T ask Bar and choose Ad d to Panel. 2. In the Add to Panel dia log, right-c lick the Ke yboard Indicator and from the menu choose Op en Keyboard Pref erences. 3. In the Keyboard Preferenc es dialog, click the Layouts[...]
-
Page 362
Appendix E : Informational No tes 351 3. Restart the X server. W ith thi s change, the int ernal video mode t iming from the X server is used and corresponds ex actly with the VESA video mode tim ing, resulting in the proper video displa y on the KX II. List of Supported T arget Video Resolut ions Not Di splaying W hen using a CIM, there ar e som e[...]
-
Page 363
Appendix E : Informationa l Notes 352 Audio in a Linux Env ironment The following are k nown issues when usin g the audio feature in a L inux ® environment. Linux ® users, use the def ault audio device f or playback. Sound m ay not come through if a n on-default sound card is selected. SuSE 11 clients require Ja vas_1_6_0 -sun-alsa (ALSA [...]
-
Page 364
Appendix E : Informational No tes 353 Proxy Mod e and MPC If you are using KX II i n a CC-SG conf iguration, do not use the CC-SG proxy mode if you are planning to use th e Multi-Platform Client (MPC). Moving Betw een Ports on a Device If you move a between ports on the sam e Raritan device and resum e managem ent within one minute, CC -SG ma y dis[...]
-
Page 365
Appendix E : Informationa l Notes 354 VKC and MPC Sm art Card Connections to Fedora Servers If you are using a sm art card to connect t o a Linux ® Fe dora ® server via Multi-Platform Client (MPC) and Virtua l KVM Client (VKC) up grade the pcsc-lite librar y to 1.4.102-3 or above. Note: This feature is ava ilable on the KSX II 2.3.0 (and later) a[...]
-
Page 366
355 In This Chapter General FAQs ........................................................................................ 355 Remote Access ..................................................................................... 356 Universal Virtual Medi a .......................................................................... 359 Bandwidth and KV[...]
-
Page 367
Appendix F : Frequently As ked Question s 356 Question Answer How does Dom inion KX II differ from r emote control software? W hen using Dom inion KX II remotel y, the interface, at first glance, m ay seem sim ilar to remote control software such as pcAn ywhereT M, W indow s® Term inal Services/Remote Desk top, VNC, etc. However, because Dom inion[...]
-
Page 368
Appendix F : Frequently As ked Question s 357 Question Answer How man y users can remotely access servers on each Dominion KX II? Dominion KX II m odels offer rem ote connections for up to eight users per user c hannel to sim ultaneously access and control a unique target server. For one -channel dev ices like the DKX2- 116, up to eight remote user[...]
-
Page 369
Appendix F : Frequently As ked Question s 358 Question Answer Do you have a non - W indows KVM Client? Yes. Both the Virtua l KVM Client (VKC) and the Multiplatform Client (MPC) allow non-W indows users to connect to target servers in the data c enter. MPC can be run via W eb browsers and sta nd-alone and can access s ervers connected to bot h Domi[...]
-
Page 370
Appendix F : Frequently As ked Question s 359 Question Answer W hat is the file size of the applet that’s used to acces s Dominion KX II? Ho w long does it take to retr ieve? The Virtual KVM C lient (VKC) applet used t o access Dominion KX II is approx imately 500KB in size. The following chart describ es the time required to retrieve Dom inion K[...]
-
Page 371
Appendix F : Frequently As ked Questions 360 Question Answer W hat is requi red for virtua l media? A Dominion KX II virtua l media CIM is requ ired: a digital CIM, D2CI M-VUSB or D2CIM- DVUSB. The D2CIM-VUS B has a single USB connector and is for custom ers who will use virtual m edia at the OS level. The D2CIM-DVUS B has dual USB conn ectors and [...]
-
Page 372
Appendix F : Frequently As ked Question s 361 Question Answer W hy would I use a USB pro file? USB profiles are m ost often required at th e BIOS level where there m ay not be full support for the USB specificat ion when ac cessing virtual media drives. Howev er, profiles are som etimes used at the OS level, f or example, for m ouse synchronization[...]
-
Page 373
Appendix F : Frequently As ked Question s 362 Question Answer How is bandwidth us ed in KVM-over-IP s ystems? Dominion KX II off ers next-generatio n KVM-over-IP techno logy – the ver y best video compression available . Raritan has received numerous technica l awards, confirm ing its high video quality transm issions and the low bandwidth utiliz[...]
-
Page 374
Appendix F : Frequently As ked Question s 363 Question Answer W hat factors affect bandwi dth? There are m any factors that determ ine how much bandwidth wil l be used. The prim ary factor, noted above, is t he amount of c hange in the target server’s video display. This is dependent on the user’s t ask and actions. Other factors include t he s[...]
-
Page 375
Appendix F : Frequently As ked Question s 364 Question Answer How can I reduce ba ndwidth? KX II provides a var iety of settings in our remote clients for the user to optim ize bandwidth and perf ormance. The default settings will provide an at-the-rac k level of performance in standard LAN/W AN environments with economical use of bandwidth. Bandwi[...]
-
Page 376
Appendix F : Frequently As ked Question s 365 Question Answer W hat shoul d I do on slo wer bandwidth links? The connection speed a nd color depth se ttings can be tweaked to opt imize perform ance for slower bandwidth link s. For exam ple, in the Multiplatform Client or th e Virtual KVM Client, set th e connection speed to 1.5 Mb or 1 Mb; and th e[...]
-
Page 377
Appendix F : Frequently As ked Question s 366 Question Answer W hat abou t servers with DVI ports? Servers with DVI ports t hat support DVI- A (analog) and DVI- I (integrated analog and digital) can use Raritan ’s ADVI -VG A inexpensive, pass ive adapter to convert the server’s DVI port to a VGA plug that can be connected to a KX II CIM ’s VG[...]
-
Page 378
Appendix F : Frequently As ked Question s 367 User Task Default 1Mb Speed and 15 -bit Color 1Mb Speed and 8- bit Color Open Text W indow 50 – 100 KB/s 25 – 50 KB/s 10 – 15 KB/s Continuous T yping 1 KB/s .5 – 1 KB/s .2 – .5 KB/s Scroll Text W indow 1050 KB/s 5 – 25 KB/s 2 – 10 KB/s Close Text W indow 50 – 100 KB/s 20 – 40 KB/s 10 ?[...]
-
Page 379
Appendix F : Frequently As ked Question s 368 Question Answer W hat is the speed of Dominion KX II’s Ethernet interfaces ? Dominion KX II sup ports gigabit as wel l as 10/100 Ethernet. KX II supports two 10/100/1000 speed Ethern et interfaces, with configurable speed and duplex settings (either auto detected or m anually set). Can I access Dom in[...]
-
Page 380
Appendix F : 369 Question Answer Can the Dom inion KX II use DHCP? DHCP addressing can be used; howe ver, Raritan recomm ends fixed addressing since the Dom inion KX II is an infrastructure de vice and can be access ed and administered m ore effectively with a f ixed IP address. I’m having problem s connecting to the Dom inion KX II over m y IP n[...]
-
Page 381
Appendix F : 370 Question Answer W hat is IP v6? IPv6 is the acronym for Inte rnet Protocol Version 6. IPv6 is the "next generation" IP protocol which will rep lace the current IP Version 4 (IPv4) prot ocol. IPv6 addresses a num ber of problem s in IPv4, such as the limited num ber of IPv4 addresses. It also improves IPv4 in areas such as[...]
-
Page 382
Appendix F : 371 Question Answer W hat if m y network doesn’t support IPv6? The Dom inion KX II’s default networking is set at the factor y for IPv4 only. W hen you are ready to use IPv6, then f ollow the above instructions to enable IPv4/IPv6 d ual-stack operation. W here can I get more inform ation on IPv6? See www.ipv6.org f or general infor[...]
-
Page 383
Appendix F : 372 Question Answer W hat abou t mouse synchronization? In the past, KVM-o ver-IP mouse synchronization was a f rustrating experience. The Dom inion KX II’s Absolute Mouse Synchronization prov ides for a tightl y synchronized m ouse without requiring server mouse setting changes o n W indows and Apple® Mac servers. For other servers[...]
-
Page 384
Appendix F : 37 3 Question Answer Do I have to use hotk eys to switch between blades? Some blade servers require you to use hotk eys to switch between blades. W ith the Dominion KX II, you don’t ha ve to use these hotke y s. Just click on the nam e of the blade server, and the Dom inion KX II will autom atically switch to that blade without the e[...]
-
Page 385
Appendix F : 374 Question Answer Is virtual media supp orted? This depends on the blade server. HP blades can support virtual m edia. T he IBM BladeCenter (except f or BladeCenter T) supports virtual m edia if configured appropriatel y. A virtual media CIM – D2CIM-VUSB or D2CIM-DVUS B – must be used. Is Absolute Mouse Synchronization supporte d[...]
-
Page 386
Appendix F : 375 Question Answer How do I connect serv ers to Dominion KX II? Servers that connect to the Dom inion KX II require a Dom inion or Paragon CIM, which connects directl y to the keyboard, video and mouse ports of the server. Then, connect eac h CIM to Dom inion KX II using standard UT P (unshielded twisted pa ir) cable such as Cat5, Cat[...]
-
Page 387
Appendix F : 376 Question Answer How do I connect a s erially controlled (RS-23 2) device, such as a Cisco router/s witch or a headless Sun ser ver, to Dom inion KX II? If there are onl y a few serially controlled devices, they ma y be connected to a Dom inion KX II using Raritan’s P2CIM -SER seria l converter. Customers can also consider deplo y[...]
-
Page 388
Appendix F : 377 Question Answer W hen I am using the local port, do I prevent other users from ac cessing servers rem otely? No. The Dom inion KX II local port has a completely independent access path to the servers. This m eans a user can access servers locally at the rack – without com promising the number of users that access the rack remotel[...]
-
Page 389
Appendix F : 378 Question Answer If I use the local port to ch ange the name of a connected ser ver, does this change propagat e to rem ote access clients as wel l? Does it propagate to the optiona l Comm andCenter appliance? Yes. The local port prese ntation is identical and completel y in sync with rem ote access clients as well as Rarit an’s C[...]
-
Page 390
Appendix F : 379 Questi on Answer Must I use the extended local port? No. The extended loca l port is an optio nal feature and is disabled by default. Use the "Local Port Settings " page to enable it. You can also disable the stan dard local port if you are not going to use it for added securit y. Dual Power Supplies Does Dominion KX II h[...]
-
Page 391
Appendix F : 380 Question Answer How do I connect the PDU to the Dom inion KX II? The D2C IM -PW R is used to connec t the power strip to the Dom inion KX II. The D2CIM-PW R must be purchased separately; it does not com e with the PDU. Does Dominion KX II support servers with m ultiple power supplies? Yes. Dominion KX II can be easily configured to[...]
-
Page 392
Appendix F : 381 Question Answer How do I physicall y connect multiple Dom inion KX II devices together into one solutio n? To physicall y connect multiple KX II de vices together for consolida ted local access, y ou can connect the local ports of multiple "tiered" (or "cascaded") KX II switches to a "base" KX II using[...]
-
Page 393
Appendix F : 382 Question Answer Do I have to ph ysically connect Dominion KX II dev ices together? Multiple Dom inion KX II units do not need to b e physically connected toget her. Instead, each Dominion KX II unit co nnects to the net work, and they autom atically work together as a single solution i f deployed with Raritan’s Comm andCenter Sec[...]
-
Page 394
Appendix F : 383 Computer Interface Modules (CIMs) Question Answer W hat ty pe of video is supported b y your CIMs? Our CIMs have trad itionally supported analog VGA video. Three new CIMs support dig ital video form ats, including DVI, HDMI and DisplayPort. These ar e the D2CIM-DVUSB-D VI, D2CIM-DVU SB-HDMI and D2CIM-DVU SB-DP. Can I use com puter [...]
-
Page 395
Appendix F : 384 Question Answer Does Dominion KX II support Paragon Dual CIMs? Yes. The Dom inion KX II now supports Paragon II Dual C IMs (P2CIM-A PS2DUAL and P2CIM-AUSBDUA L), which can connec t servers in the data c enter to two diff erent Dominion KX II s witches. If one KX II switch is not available, the ser ver can be accessed through t he s[...]
-
Page 396
Appendix F : 385 Question Answer Does Dominion KX II allow encryption of video data? O r does it only encr ypt keyboard an d mouse data? Unlike com peting solutions, which only encr ypt ke y bo ard and mouse dat a, Dominion KX II does not com promise security – it allows encryption of k eyboard, mouse, video and virtual media data. How does Dom i[...]
-
Page 397
Appendix F : 386 Smart Cards and CAC A uthentication Question Answer Does Dominion KX II support smart card and C AC authentication? Yes. Smart c ards and DoD comm on access cards (CAC) authenticat ion to target servers is supported b y Release 2.1.10 and greater. W hat is CAC? Mandated b y Homeland Securit y Presidentia l Directive 12 (HSPD- 12), [...]
-
Page 398
Appendix F : 387 Question Answer Can Dom inion KX II be remotely managed and conf igured via W eb browser? Yes. Dominion KX II can be com pletely configured remotel y via W eb browser. Note that this does require that the works tation have an appropriate Java Ru ntime Environment (JRE) version installe d. Besides the initial setting of Dom i nion K[...]
-
Page 399
Appendix F : 388 Documentation and Support Question Answer W here do I find documentation on the Dom inion KX II? The docum entation is available at raritan.com on the KX II firm ware and docum entation page: http://www.raritan.c om/support/dominion - kx -ii. The docum entation is listed by firmware release. W hat documentation is available? A Quic[...]
-
Page 400
Appendix F : 389 Question Answer I changed and subsequ ently forgot Dominion KX II’s adm inistrative password; can you retrieve it for me? Dominion KX II contai ns a hardware reset button that can be used t o factory reset the device, which will reset the administrative password on the device to the default password. How do I migrate f rom the Do[...]
-
Page 401
391 A A. AC Power • 16 About the Active KV M Client • 92 Absolute Mouse Mode • 74 Access a Virtual Medi a Drive on a Client Compu ter • 100 Access and Contro l Target Servers Rem otely • 23 Access and Cop y Connection Inform ation • 56 Access and Displa y Favorites • 45 Accessing a PX2 from the KX II • 326 Accessing a Target Ser ver[...]
-
Page 402
Index 392 CIMs Required for Virt ual Media • 97 Cisco ACS 5.x f or RADIUS Authentication • 136 CLI Comm ands • 257, 26 2 CLI Prom pts • 262 CLI Syntax - T ips and Shortcuts • 260 Client Launch Settings • 78 Comm and Line Interface (CLI) • 257 Comm on Commands for All Comm and Line Interface Levels • 260 Completion of Com mands • 2[...]
-
Page 403
Index 393 Disconnecting Users from Ports • 126, 127 Discovering Devices o n the KX II Subnet • 46 Discovering Devices o n the Local Subnet • 4 5 Documentation and S upport • 386 Drive Partitions • 103 Dual Port Video Co nfiguration Steps • 316 , 321 Dual Port Vide o Gr oup Usabilit y Notes • 318 Dual Port Video Groups - Port Acces s P[...]
-
Page 404
Index 394 Java Validation and Acc ess Warning • 27 JRE Requirements and Browser Considerations for Mac • 312 K Keyboard Language Pref erence (Fedora L inux Clients) • 347 Ke yboard Limitations • 77 Keyboard Macros • 60 Keyboard Notes • 345 Keyboard Options • 60 KX II Client Applicatio ns • 9 KX II Console Navigat ion • 37 KX II De[...]
-
Page 405
Index 395 O Operating System IPv6 Sup port N otes • 337 Overview • 10, 52, 105, 1 08, 257, 266, 316, 326, 335 P Package Contents • 4 Permissions and D ual Video Port Gr oup Access • 219, 319 Ping Host Page • 25 3 Port Access Page (Local Console Server Display) • 268 Port Access Page (Rem ote Console D isplay) • 34, 38, 183, 268 Port A[...]
-
Page 406
Index 396 SSH Access f rom a Windows PC • 258 SSH Connection to th e KX II • 258 SSL Ce rtificates • 2 7, 234 Standard Mouse Mo de • 72 Step 1 Configure the Target Server Display • 321 Configuring Network Firewall Settings • 1 2 Step 2 Configure the KVM T arget Servers • 13 Connect the T arget Server to the KX III • 322 Step 3 Confi[...]
-
Page 407
Index 397 V Version Inform ation - Virtual KVM Client • 9 1 Video Image Appears Dark when Using a Mac • 313 Video Mode and R esolution Notes • 348 Video Properties • 66 View by Group T ab • 40 View by Search Tab • 40 View Options • 79 View Status Bar • 80 View the KX II Users List • 126 View Toolbar • 79 View Users b y Port • [...]
-
Page 408
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 73 2-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732- 764 -8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Beijing Monday - Friday [...]