Raritan Computer KX2101-v2.20-0B-E manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Raritan Computer KX2101-v2.20-0B-E. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Raritan Computer KX2101-v2.20-0B-E ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Raritan Computer KX2101-v2.20-0B-E décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Raritan Computer KX2101-v2.20-0B-E devrait contenir:
- informations sur les caractéristiques techniques du dispositif Raritan Computer KX2101-v2.20-0B-E
- nom du fabricant et année de fabrication Raritan Computer KX2101-v2.20-0B-E
- instructions d'utilisation, de réglage et d’entretien de l'équipement Raritan Computer KX2101-v2.20-0B-E
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Raritan Computer KX2101-v2.20-0B-E ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Raritan Computer KX2101-v2.20-0B-E et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Raritan Computer en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Raritan Computer KX2101-v2.20-0B-E, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Raritan Computer KX2101-v2.20-0B-E, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Raritan Computer KX2101-v2.20-0B-E. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    Copyright © 2008 Raritan, Inc. KX2101-v2.20-0B-E July 2008 255-62-4031-00 KX II-101 User Guide 2.0.20[...]

  • Page 2

    This document contains propri etary information that is protected by copyright. All right s reserved. No part of this document may be photocopied, rep rod uced, or translated into another language without express prior written con sent of Raritan, Inc. © Copyright 2008 Raritan, Inc., Comman dCe nter®, Dominion®, Paragon® and the Raritan company[...]

  • Page 3

    iii Contents Chapter 1 Introduction 1 What's New in t he User Guide ................................................................................................... .... 1 KX II-101 Ov erview ........................................................................................................................ 2 Product Photos ............[...]

  • Page 4

    Contents iv Keyboard Options .............................................................................................................. 46 Video Pro perties ............................................................................................................... . 49 Mouse Options...........................................................[...]

  • Page 5

    Contents v Device Se rvices ................................................................................................................ ......... 141 Keyboard/Mous e Setup ........................................................................................................... .. 143 Serial Port Settings .....................................[...]

  • Page 6

    Contents vi Analog KVM Switch .............................................................................................................. ..... 162 Resetting the KX II-101 Us ing the Rese t Button ....................................................................... 163 Chapter 7 Managing USB Connections 165 Overview ..........................[...]

  • Page 7

    Contents vii CLI Syntax -Tips and Shortcuts ....................................................................................... 214 Common Commands for All Comma nd Line Interf ace Levels ........................................ 214 CLI Commands ....................................................................................................[...]

  • Page 8

    Contents viii Attach the Brackets to KX II-101 for Vert ical Mount ........................................................ 244 Appendix D Informational Notes 246 Java Runtime Envi ronment (JRE) ............................................................................................. 246 Keyboard, Video an d Mouse Notes ........................[...]

  • Page 9

    1 In This Chapter What's New in t he User Guide .................................................................. 1 KX II-101 Overview .................................................................................... 2 Product Photos .......................................................................................... 4 Product Featur[...]

  • Page 10

    Chapter 1: Introduction 2 KX II-101 Overview Thank you for purchasing the Dominion the KX II-101. The KX II-101 provides a single keyboard, video, and mou se (KVM) port for connection to a target server and a single IP port for connection to an IP network. Within the KX II-101 device, KVM signals from your server are converted to IP format and comp[...]

  • Page 11

    Chapter 1: Introduction 3 Diagram key KX II-101 LAN Windows, Linux, and Sun servers TCP/IP LAN Remote (netwo rk ) access[...]

  • Page 12

    Chapter 1: Introduction 4 Product Photos Diagram key KX II-101 Mini-USB to USB cable Optional local port cable[...]

  • Page 13

    Chapter 1: Introduction 5 Product Features Interfaces • Integrated PS/2 KVM connection • USB connection for control and virtual media • Serial Admin port for initial devic e configuration and di agnostics, as well as use with an external modem access and Raritan po we r strip control • Ethernet LAN port supporting 10/100- ba se-T autosensin[...]

  • Page 14

    Chapter 1: Introduction 6 User Fe atures • Web-based access through comm on b rowsers • Intuitive graphical user interfa ce (GUI) • PC Share mode, which enables more than one remot e user • TCP communication • English user interface • Virtual media access • Absolute Mouse Synchronization ™ • Plug-and- play • 256-bit encryption o[...]

  • Page 15

    Chapter 1: Introduction 7 Term Description Local User port Enables a user in immediate proximity to the target server to use the native keyboard and mouse without unplugging the KX II-101. Virtual media Enables a KVM target server to rem otely access media from client PC and network file servers. Package Contents Each KX II-101 device ships with: ?[...]

  • Page 16

    Chapter 1: Introduction 8 Related Documentation The KX II-101 User Guide is accompanied by a KX II-101 Quick Se tup Guide, which can be found on the CD included with the device or on the Support page of Raritan's web sit e (www.raritan.com). Installation requirements and instru ctions for client applications used with the KX II- 101 can be fou[...]

  • Page 17

    9 In This Chapter Overview .................................................................................................... 9 Default Logon Information ......................................................................... 9 Getting St arted ........................................................................................ 10 Overview [...]

  • Page 18

    Chapter 2: Installation and Configuration 10 Getting Started KX II-101 users with Microsoft Internet Explorer versio n 6 or Wi ndows 2000 must upgrade to Serv ice Pack 4 (SP4) or higher. The KX II-101 ships with a static default IP address. On a network without a DHCP server, you must conf igure a new sta tic IP address, net mask, and gateway addre[...]

  • Page 19

    Chapter 2: Installation and Configuration 11 Resolutions 640x480 @66.6 Hz 800x600 @85 Hz 1152x870 @75.1 Hz 640x480 @72 Hz 800x600 @90 Hz 1152x900 @66 Hz 640x480 @75 Hz 800x600 @100 Hz 1152x900 @76 Hz 640x480 @85 Hz 832x624 @75.1 Hz 1280x960 @60 Hz 640x480 @90 Hz 1024x768 @60 Hz 1280x960 @85 Hz 640x480 @100 Hz 1024x768 @70 Hz 1280x1024 @60 Hz 640x48[...]

  • Page 20

    Chapter 2: Installation and Configuration 12 GUI Resolution/64 Bit To check the GUI resolution on 64 bit cards : 1. Run the following comma nd: # /usr/ sbin/m64config –prconf To change the resolution on 64 bit cards: 1. Run the following comma nd: # /usr/ sbin/m64config – res102 4x768x75 where 1024x768x75 is any resolution that the KX II- 101 s[...]

  • Page 21

    Chapter 2: Installation and Configuration 13 Windows XP®/Window s 2003® Settings To configure the mouse: 1. Select Start > Control Panel > Mouse. 2. On the Pointer Options tab in the Motion gro up, set the mouse motion speed setting to exactly the middle speed an d deselect the Enhanced pointer preci si on checkbox. Click OK. To disable tra[...]

  • Page 22

    Chapter 2: Installation and Configuration 14  Animate controls and elem ents in side windows  Animate windows when mi nimizi ng and maximizing  Fade or slide menus into view  Fade or slide ToolTips into view  Fade out menu items after clicking 4. Click OK. Linux® Settings On a target server running Linux gra phi cal interfaces, set [...]

  • Page 23

    Chapter 2: Installation and Configuration 15 Set the mouse acceleration value to exactly 1 and the threshol d to exactly 1. A target server running the Solaris operating syste m must output VGA video (H-and-V sync, not co mposite sync). Set this at the graphical user interfa ce o r with the co mmand line xset mouse a t where a is the acceleration a[...]

  • Page 24

    Chapter 2: Installation and Configuration 16 2. Click on Mouse Settings and set the Mouse A cceleration to 1.0 and Threshold to 3.0. Step 2: Configure Net work Firewall Settings To access the KX II-101 through a network firewall, your firewall m ust allow communication on T CP Port 5000. Alternatively, the KX II-101 can be configured to use a diffe[...]

  • Page 25

    Chapter 2: Installation and Configuration 17 Step 3: Connect the KX I I-101 The KX II-101 has the physical connections d escribe d in the diag ram.[...]

  • Page 26

    Chapter 2: Installation and Configuration 18 Diagram key Admin port Use to do one of the following: • Configure and manage the device with a terminal emulation program on your PC. • Configure and manage a powe r strip. • Connect an external modem to dial into the device. Monitor and PS/2 cable Attached Monitor and PS/2 cable (see E). Mini-USB[...]

  • Page 27

    Chapter 2: Installation and Configuration 19 Target Server The KX II-101 can use either the includ ed USB ca ble or integrated PS/2 cables to connect to the target serv er. Before conne cting, configure your target server's video to a supported resolution. Note: For PS/2 configurations that re quire virtual media con nectivity, the USB connec [...]

  • Page 28

    Chapter 2: Installation and Configuration 20 Use USB cables to connect the ke yboard and mo use directly to the target server. Diagram key Target server Included mini-USB to USB cable from the KX II-101 to the target server KX II-101 Local monitor, keyboard, and mouse USB connection from the target server to mouse[...]

  • Page 29

    Chapter 2: Installation and Configuration 21 Diagram key USB connection from the targ et server to keyboard Video connection to the local monitor (optional cable ) PS/2 Configuration To configure the KX II-101 for use with a PS/2 target server: 1. Use the attached PS/2 keyboa rd, video, and mouse cabling to connect the KX II-101 to the target serve[...]

  • Page 30

    Chapter 2: Installation and Configuration 22 3. If you require Virtual Media (VM) connectivity, connect the mini-USB connector to the KX II-101 and the USB connector to any USB port on the target server. Diagram key Target server Included mini-USB to USB conn ector from the KX II-101 to the target server for Virtual Media connectivity KX II-101 Loc[...]

  • Page 31

    Chapter 2: Installation and Configuration 23 Diagram key PS/2 connection from the KX II-101 to the mouse (op t ional cable) PS/2 connection from the KX II-101 to the keyboa rd (optional cable) Video connection to the local monitor (optional cable ) Network Connect a standard Ethernet cable fr om the network po rt labeled LAN to an Ethernet switch, [...]

  • Page 32

    Chapter 2: Installation and Configuration 24 Local User Port The KX II-101 is available with optional video and PS/2 cables (KX II- 101-LPKVMC) that enable you to attach a keyboard and mouse to the target server through the Local User port. The Local User port se rves as a pass-through to the target server to which the KX II-101 is atta ch ed and h[...]

  • Page 33

    Chapter 2: Installation and Configuration 25 2. Launch a supported we b browser such as Internet Explorer (IE) or Firefox. 3. In the address field of the browser, enter the default IP address of the device: 192.168.0.192. 4. Press Enter. The login page open s. 5. Enter the user name admi n and the passwo rd ra ritan. 6. Click Login. The Change Pass[...]

  • Page 34

    Chapter 2: Installation and Configuration 26  DHCP - With this option, network para meters are assigned by the DHCP server each time the KX II-101 is booted. Configuring Direct Port Acc ess To configure direct port acces s: 1. Choose Device Settings > Device Services. The Device Services page opens. 2. Select the Enable Direct Port Access via[...]

  • Page 35

    Chapter 2: Installation and Configuration 27 4. Specify a valid TCP port for the selected access type. For example, direct port access via Tel n et TCP port can be configured as 7770. 5. Click OK. See Device Management (on pa ge 138) for mo re information. Naming the Target Server 1. Attach the KX II-101 to the target server. 2. Choose Device Setti[...]

  • Page 36

    Chapter 2: Installation and Configuration 28 5. Click OK. Remote Authentication Note to CC-SG Users When the KX II-101 is controlled by Command Ce nter Secure Gateway, CC-SG authenticates users and group s. For additional information about CC-SG authenti cation, see the CommandCenter Secure Gate way User Guide, Administrator Guide, or Deployment Gu[...]

  • Page 37

    Chapter 2: Installation and Configuration 29 Note on Microsoft Active Directory Microsoft Active Directory uses t he LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the KX II-101. If it has the IAS (Inter net Authorization Server) component, a Microsoft Active Directory serv er can also serve as [...]

  • Page 38

    Chapter 2: Installation and Configuration 30 3. Launch the terminal emulation progr am you wa nt to use to configure the KX II-101. 4. Set the following port settings in the terminal emulatio n program:  Bits per second - 115200  Data bits - 8  Parity - None  Stop bits - 1  Flow control - None 5. Connect to the KX II-101. The login p[...]

  • Page 39

    Chapter 2: Installation and Configuration 31 11. To configure new networ k setti ngs, at the Network prompt, type interface followed by one of the following commands and its appropriate argument (option), then p ress Enter. Command Argument Options ipauto none|dhcp none - Enables you to manually specify an IP address for the device. You must follow[...]

  • Page 40

    32 In This Chapter Interfaces ................................................................................................. 32 Virtual KVM Client ................................................................................... 41 Multi-Platform Client (MPC ) ..................................................................... 60 Interfaces [...]

  • Page 41

    Chapter 3: Working with Target Servers 33 4. Click Save. To define a direct port access URL: • Define a URL with the IP address, user name, password, an d if necessary, port number of the KX II-101. If you have only one KVM port, the port number is not needed. The format for a direct port access URL is: https:// IP address /dpa. asp?username= use[...]

  • Page 42

    Chapter 3: Working with Target Servers 34 Port Access Page After successfully logging in to the KX II-101 Remote Console, the Port Access page appears. This page lists the KX II-101 port, the con ne cted KVM target server, and its status a nd availability. The Port Access page provides access to the KVM target server connected to the KX II-101. A K[...]

  • Page 43

    Chapter 3: Working with Target Servers 35 • Disconnect - Disconne cts t his port and closes the Virtual KVM Clie nt page for this target server. This menu item is availabl e only when the port status is up and connected, or u p an d busy. • Power On - Powers on the target serve r through the associated outlet. This option is visible only when t[...]

  • Page 44

    Chapter 3: Working with Target Servers 36 Managing Favorites A Favorites feature is provided so you can organize and quickly a ccess the devices you use frequently. The Fa vorite D ev ices section is lo cated in the lower left side (sidebar) of t he Port Access pag e and p rovides the ability to: • Create and manage a list of favorite devices •[...]

  • Page 45

    Chapter 3: Working with Target Servers 37 Manage Favorite s Page To open the Manage Favorites pa ge: • Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local Subnet Discover Raritan devices on the client PC&apos[...]

  • Page 46

    Chapter 3: Working with Target Servers 38 3. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Fav orites List: 1. Select the checkbox next to the device name/IP address. 2. Click Add. Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the rem ote con sole su[...]

  • Page 47

    Chapter 3: Working with Target Servers 39 Discovering Raritan Devices on t he KX II-101 Subnet This option discovers devices on the device subn et, which is the subnet of the KX II-101 device IP address itse lf. You can access these devices directly from this the Subnet page or add them to your list of favorites. See Favorites List Page (on page 37[...]

  • Page 48

    Chapter 3: Working with Target Servers 40 4. Change the discovery Port (if necessary). 5. Select the Product Type. 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate KX II-101 device. 2. Click the Edit button. The Edit page appears. 3. Update t[...]

  • Page 49

    Chapter 3: Working with Target Servers 41 1. Select the checkbox next to the appropriate KX II-101 device. 2. Click the Delete button. The favo rite is removed from your list of favorites. Logging off To quit the KX II-101 Remote Console: • Click Logout in the upper ri ght -h and corner of the page. Note: Logging off also closes any op en Virtual[...]

  • Page 50

    Chapter 3: Working with Target Servers 42 VKC Toolbar Button Description Properties Video settings Calibrate color Synchronize the target mouse cu rsor Refresh screen Auto-sense video Send Ctrl+Alt+Delete Single mous e cursor Full screen Resize video to fit screen Power Controlling a KVM Target Server Note: These features are availa ble onl y when [...]

  • Page 51

    Chapter 3: Working with Target Servers 43 To power off a target server: 1. From the KX II-101 Remote Console, click the Po rt Access tab to open it. The Port Access page opens. 2. Click the port name of the appropria te target server. The Port Action menu appears. 3. Choose Power Off. A c onfirmation message appears. Disconnecting a KVM Target Serv[...]

  • Page 52

    Chapter 3: Working with Target Servers 44 2. Choose the Connection Speed fr om the drop-down list. The device can automatically detect available bandwidth an d not limit bandwidth use. However, you can also adjust this usage according to bandwidth limitations.  Auto  100 Mb Ethernet  10 Mb Ethernet  1.5 Mb (MAX DSL/T1)  1 Mb (Fast DS[...]

  • Page 53

    Chapter 3: Working with Target Servers 45 4. Use the slider to select the desir ed level of Smoothing (15-bit color mode only). The level of smoothing determines h ow aggressively to blend screen regi on s with small color variation into a single smooth color. Smoothing improves the appeara nce of target video by reducing disp layed video n oise. 5[...]

  • Page 54

    Chapter 3: Working with Target Servers 46 Keyboard Options Keyboard Macros Keyboard macros ensure that keyst roke combi nations intended for the target server are sent to and interpreted only by the target serve r. Otherwise, they might be interpret ed by the computer on whi ch the Virtual KVM Client is running (your clie n t PC). Macros are stored[...]

  • Page 55

    Chapter 3: Working with Target Servers 47 7. Review the Macro Sequence field to be su re the macro sequence is defined correctly. The contents of this field are automatically generated and a re based on the selections made in t he Keys to Press and Keys to Release fields. a. To remove a step in the sequence, select it and click Rem ove. b. To chang[...]

  • Page 56

    Chapter 3: Working with Target Servers 48 9. Click Close to close the Keyboard Macros dialo g. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assign ed to the macro. Running a Keyboard Ma cro Once you have created a keyboard ma cro, execute i t using the ke ybo[...]

  • Page 57

    Chapter 3: Working with Target Servers 49 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboa rd Macro s dialog appears. 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted. Video Properties Refresh Scr een The Refresh Screen command force s a refre sh of the video screen. Video setting[...]

  • Page 58

    Chapter 3: Working with Target Servers 50 Calibrate Color Use the Calibrate Color command to opt imize the color levels (hue, brightness, saturation) of the transmitted video imag es. The KX II-101 color settings are on a target server-basis. Note: The Calibrate Color com mand applies to the current connection only. To calibrate the color, do the f[...]

  • Page 59

    Chapter 3: Working with Target Servers 51 If the video image looks extremely blurry or unfocused, the settings for clock and pha s e can b e adjusted until a better image appears on the active target server. Warning: Exercise caution when changing the Clo ck and Phase settings. Doing so may result in lost or d istorte d video and you may not be abl[...]

  • Page 60

    Chapter 3: Working with Target Servers 52 Note: Some Sun background screens, su ch as screens with very dark borders, may not center precisely on ce rtain Sun servers. Use a different background or place a lighter colored ico n in the upper left corner of the screen. Mouse Options When controlling a target server, the KX II-101 Remot e Console disp[...]

  • Page 61

    Chapter 3: Working with Target Servers 53 Mouse Pointer Sy nchronization When remotely viewing a target serve r that uses a mouse, you will see two mouse cursors: one belonging to y our remote cli ent workstation and the other belonging to the target server. When the mo use p ointer lies within the Virtual KVM Client target server wi ndo w, mouse m[...]

  • Page 62

    Chapter 3: Working with Target Servers 54 c. Close the terminal window. 6. Click the "Virtual KVM Client mouse synchronizatio n" button . Additional Notes for In telligent Mouse Mode • Be sure that there are no icons or applications in the upper left section of the sc reen since that is whe re the synchronization routin e takes place. ?[...]

  • Page 63

    Chapter 3: Working with Target Servers 55 Intelligent Mouse Mode In Intelligent Mouse mode, the KX II-101 device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. In this mode, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acce[...]

  • Page 64

    Chapter 3: Working with Target Servers 56 Please note that mouse configuratio ns will vary on different target operating systems. Consult your OS guideline s for furt her details. Also note that intelligent mouse synchr onization doe s not work with UNIX targets. Single Mouse Cursor Single Mouse mode uses only the target server mo use cursor and th[...]

  • Page 65

    Chapter 3: Working with Target Servers 57 Tool Options From the Tools menu, you can spe cify certain o ption s for use with the Virtual KVM Client, including logging, setting the key boa rd type, and defining hot keys for exiting target screen resolution mode a nd si ngle cursor mode. To set the tools options: 1. Choose Tools > Options. The Opti[...]

  • Page 66

    Chapter 3: Working with Target Servers 58  Italian (Italy)  Slovenian 4. Exit Target Screen Resolution M ode - Hotkey. Whe n you enter target screen resolu tion mode, th e display of the target server becom es full screen and acquire s the same resolution as the target server. Thi s is the hot key used for exiting this mode. 5. Exit Single Cu[...]

  • Page 67

    Chapter 3: Working with Target Servers 59 Note: The Keyboard Indicator should be use d on Linux systems using Gnome as a desktop envi ronm ent. View Options View Toolbar You can use the Virtual KVM client wi th or without the toolbar di spl ay. To toggle the display of the toolbar (on and off): • Choose View > View Toolbar. Scaling Scaling you[...]

  • Page 68

    Chapter 3: Working with Target Servers 60 Multi-Platform Client (MPC) Raritan Multi-Platform Client (MPC) is a graphical u ser interface for the Raritan product lines, providing remote access to targ et serve rs connected to Raritan KVM over IP devices. Requirements and Installation If you do not have MPC installed, fo r information on MPC install [...]

  • Page 69

    Chapter 3: Working with Target Servers 61 Navigator The navigator provides a tree view of every known Raritan device. From this panel, you can access all Raritan networked devices for whi ch a connection profile exists and/or all Raritan device s automatically identified on the network. Note: Automatic Raritan device identification use s the UDP pr[...]

  • Page 70

    Chapter 3: Working with Target Servers 62 Devices in the MPC Navigator In MPC, devices are named accordin g to the Manager Nam e field on the Manager's Network Config uration page. Dominion device s are nam ed according to the Device Name field on th e Domi nion Console Network Settings page. Device Ports in the Navigator For each device to wh[...]

  • Page 71

    Chapter 3: Working with Target Servers 63 Icon Description Connected (green) - You are currently authenticated and connected to this device. Available (black) - This dev ice is cu rrently available on the network but you are not currently con necte d to it. Unavailable - A profile exists for this device but it is no t currently available on the net[...]

  • Page 72

    Chapter 3: Working with Target Servers 64 Icon Ac tion Description Display/Hide Navigator You can also select Navigator in the View menu to toggle between displaying and hiding the Navigator. Refresh Navigator Updates t he device status information displayed in the Navigator. Browse Discover ed Devices When enabled, Show Discovere d Devices will di[...]

  • Page 73

    Chapter 3: Working with Target Servers 65 Navigator Display Options Showing Ports • Discovered Devices - Shows o r hid es discovered devices from the Navigator view. You will not see broadcast messages when this option is disabled (not sele cted ). • Unassigned Cha nnels - Shows or hides ch annels with no assigne d targets. Note that the defaul[...]

  • Page 74

    Chapter 3: Working with Target Servers 66 Button Button Name Description Connectio n Properties Opens the Modify Connect ion Properties dialog from which you can manually adjust bandwidth options (su ch a s connection speed, color depth, and so forth). Same as choosing Conne ction > Properties or choosi ng Connection Properties on the shortcut m[...]

  • Page 75

    Chapter 3: Working with Target Servers 67 Button Button Name Description Exit On- Screen Menu Not applicable for IP-Reach or Dominion. Used by the application with other Rarit an products . Alternatively, select Esc on the keyboard. Same as choosing Keyboard > Exit On- Screen Menu. Note: This function is not available on the KSX II. Send Ctrl+Al[...]

  • Page 76

    Chapter 3: Working with Target Servers 68 Button Button Name Description Show/Hide Browse All Devices Toggles between displaying and not displaying Raritan devices in the Navigat or that are automatically identified on the network and that do not have preconfigured profiles asso ciated with them. About Displays the appli cation version information.[...]

  • Page 77

    Chapter 3: Working with Target Servers 69 To display the Connected Serv er(s) toolbar (when not already visible): • Choose View > Connected Serve r(s) Toolbar. To view the w in d o w for a target server: • Click the button that correspond s to the app ropriate connected target server you want to view. The wind ow for the corresponding targ e[...]

  • Page 78

    Chapter 3: Working with Target Servers 70 Diagram key Session information Description Lock key indicators Indicates the status of the current target KVM Server, in respect to the activation of the Caps-Lock, Num-Lo ck, and Scroll- Lock keys. If these keys are enabled on the target server being viewed, this affirmative status will be reflected on th[...]

  • Page 79

    Chapter 3: Working with Target Servers 71 MPC Target Screen Resolution M ode Target Screen Resolution mode p rovides you with the ability to view the target server desktop in full screen mode, which remo ves all toolbars from view. Activate Target Screen Resolution mode once you are con ne cted to a target by doing one of the following: • Click t[...]

  • Page 80

    Chapter 3: Working with Target Servers 72 To exit full screen mode, use the sh ortcut menu or click the Close i con that appears at the top right of the page when you hover your mo u se along the top of the screen. Note: The Ctrl+Left Alt+M key combination doe s not work for certain target servers if you are running JRE 1.5.0_01. To return from ful[...]

  • Page 81

    Chapter 3: Working with Target Servers 73 MPC Scaling Scaling your target window size allows you to view the entire contents of the target server window. This featur e increases or redu ces the size of the target video to fit the window size and maintain s the aspe ct ratio. This allows you to see the entire tar get server desktop while in standard[...]

  • Page 82

    Chapter 3: Working with Target Servers 74 Note: Enabling Scale Video will scale the com plete target video image to fit the remote desktop area as it grow s or shrinks. You can com bine this setting with target screen resolution for a full page affect on targets with a higher resolution than yo ur de sktop. Auto-Scroll The auto-scroll feature autom[...]

  • Page 83

    Chapter 3: Working with Target Servers 75 2. On the Connect tab, type a meaningful description of the device in the Description field (up to 32 alphanu meric and spec ial cha racters are allowed). This descri ption i dentifies the Ra ritan device in the Navigator. 3. From the Product drop-down, ch oose the Ra ritan product you are using. 4. Select [...]

  • Page 84

    Chapter 3: Working with Target Servers 76 4. Click OK. To delete a profile: 1. Select the device with a profile in the Navigator and ri ght-click it. 2. Choose Delete Profile. 3. When prompted to confirm the deletion, click Ye s to delete the profile for this device or click No t o return to the application without deleting. Establishing a New Conn[...]

  • Page 85

    Chapter 3: Working with Target Servers 77 Connection Information To obtain information about your connection: • Choose Connection > Co n nection Info. The Connection Info dialog appears. Generation 2 Devices The following information is displayed about a curren t connection to Generation 2 devices: Connection information Description Device nam[...]

  • Page 86

    Chapter 3: Working with Target Servers 78 Connecting to a Re mote KVM Console Once you establish a connection with a Ra ritan device, that device's icon in the Navigator can be expanded to display all ports e nabled for remote access. Choose one of the following options to establish a remote KVM co nsole connectio n: • Double-click the KVM p[...]

  • Page 87

    Chapter 3: Working with Target Servers 79 3. To exit completely, click Exit on the Connection men u Shortcut Menu To access the shortcut menu, use either the default keyboard combination of Ctrl+Left Alt+M or the keyboard combination you a s sign. See Changing the Shortcut Menu Key board Combination (on page 80) for more information. TIP: If at som[...]

  • Page 88

    Chapter 3: Working with Target Servers 80 Shortcut Menu Key Options Execute any of the commands on the shortcut menu by either ch oosing the command in the menu or using a ke y combination. If you are using a key combination to execute a comma nd, you will press Ctrl+Left Alt+M and then press the key on your keyboard that corre sp ond s to the unde[...]

  • Page 89

    Chapter 3: Working with Target Servers 81 Once a new keyboard combination is assigned, the new combination will be displayed in the shortcut menu and in the onscreen message that displays when the combination is u sed.[...]

  • Page 90

    Chapter 3: Working with Target Servers 82 Keyboard Macros A hot key combination is a set of keystro ke s that performs a n acti on when pressed. For example, the hot key combination Ctrl +Alt+0 might be created to minimize all windows. A keyboard macro is a shortcut that se nds a h ot key combination to a target ser ver. Using keyboa rd macros ensu[...]

  • Page 91

    Chapter 3: Working with Target Servers 83 6. In the Keys to Release field: a. Choose each key for which you would li ke to emulate a key release. Define the keys you want rele ased in order to run the macro. For example, specify that the keys to be pre ssed must also be released in order for the macro to be execute d. Select the keys in the order b[...]

  • Page 92

    Chapter 3: Working with Target Servers 84 8. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Key board Macro s dialog appears and lists the new keyboard macro.[...]

  • Page 93

    Chapter 3: Working with Target Servers 85 9. Click Close to close the Keyboard Macros dialo g. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assign ed to the macro. Running a Keyboard Mac ro Once you have created a keyboard ma cro, execute i t using the ke ybo[...]

  • Page 94

    Chapter 3: Working with Target Servers 86 Modifying and Removing Ke yboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboa rd Macro s dialog appears. 2. Choose the macro from among those listed. 3. Click Modify. The Add/Edit Macro dialog appears. 4. Make your changes. 5. Click OK. To remove a macro: 1. Choose Keyboard [...]

  • Page 95

    Chapter 3: Working with Target Servers 87 Hot Key Combination Description Alt Gr Because of a limitation in the Java Runtime Environment (JRE), Fedora, Linux, and Solaris clients receive an invalid resp onse from Alt Gr on United Kingdom and US International langua ge keyboard s. Fedora, Linux, and Solaris do not pick u p events for the Alt Gr key [...]

  • Page 96

    Chapter 3: Working with Target Servers 88 Keyboard Type Specifying a Key board Type in MPC MPC will not autodetect the type of keyboard you use, so you mu st specify your keyboard type to ensure accurate keybo ard mappi ng. To specify a keyboard type: 1. Choose Tools > Options. The Options dialog will appear. 2. Click the Keyboard Type drop -do [...]

  • Page 97

    Chapter 3: Working with Target Servers 89 3. Click OK. Keyboard Limitations Slovenian Keyboards The < key does not work on Slovenian keyboa rd s due to a JRE limitation. Language Configuratio n on Linux Because the Sun JRE on Linux has pr oblem s generating the correct Key Events for foreign-language keyboards config ured using System Preference[...]

  • Page 98

    Chapter 3: Working with Target Servers 90 Language Configuration method UK System Settings (Control Center) Korean System Settings (Control Center) Belgian Keyboard Indicator Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Keyboard Indicator Hungarian System Settings (Control Center) Spanish System Settings (Control Center) Italian S[...]

  • Page 99

    Chapter 3: Working with Target Servers 91 Mouse Options Single Cursor Mode/Dual C ursor Mode When remotely viewing a target serve r that uses a mouse, you will see two mouse cursors on the remote deskt op. Whe n your mouse pointer lies within the remote desktop area, mouse movem ent s and clicks are directly transmitted to the connec ted target ser[...]

  • Page 100

    Chapter 3: Working with Target Servers 92 Mouse Synchronization Opt ions In addition to synchronizing mouse cursors or togglin g between single and dual cursor mode, the Mouse menu provid es thre e options for synching cursors when in dual cu rsor mode: Menu option Description Absolute When connected to selecte d Dominion devices and targets with U[...]

  • Page 101

    Chapter 3: Working with Target Servers 93 Intelligent Mouse Mode In Intelligent Mouse mode, the KX II-101 device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. In this mode, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acce[...]

  • Page 102

    Chapter 3: Working with Target Servers 94 Please note that mouse configuratio ns will vary on different target operating systems. Consult your OS guideline s for furt her details. Also note that intelligent mouse synchr onization doe s not work with UNIX targets. Standard Mouse Mode Standard Mouse mode uses a sta nda rd mouse synchronization algori[...]

  • Page 103

    Chapter 3: Working with Target Servers 95  384 kb (Slow DSL/T1)  256 kb (Cable)  128 kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem) 3. Set the Color Depth. Devices can dynamically adapt the col or depth transmitted to remote users in order to maximize usability in all bandwidth s. Select from among the o[...]

  • Page 104

    Chapter 3: Working with Target Servers 96 Devices can filter out the electri cal interference of video output from graphics cards. This feature optimizes picture quality and reduces bandwidth. Higher setting s tran smit variant pixels only if a large color variation exi sts in co mpa rison to the neighboring pixels. However, setting the threshol d [...]

  • Page 105

    Chapter 3: Working with Target Servers 97  Contrast Blue - Controls th e blue si gnal contrast; rang e is 0 - 255.  Horizontal Offset - Controls the horizontal positio ning of the target server display on your monitor; range is 0 - 512 .  Vertical Offset - Controls the vertical positioning of the target server display on your monitor; ran [...]

  • Page 106

    Chapter 3: Working with Target Servers 98 6. Click OK to apply the settings a nd close the dialog. Click Apply to apply the settings without closing the dial og. Color Calibration Use the Color Calibration command if the colo r level s (hue, brightness, and saturation) of the transmitted video images do not seem a ccurate. The device color settings[...]

  • Page 107

    Chapter 3: Working with Target Servers 99 TIP: Open Microsoft Notepad and maxim ize the wind ow. 3. On the Video menu, choose Calibrate Color o r click the Color Calibration button on the toolbar. The target device page will update its calibration. Tip: You can also specify autom atic color calibration using T ool s > Options. See General Option[...]

  • Page 108

    Chapter 3: Working with Target Servers 100 General Options in MPC The Options available in the Tools menu provide o ptions that allow you to customize scroll borders, mouse m od e set tings, single cu rsor mode, auto color calibratio n, hot key config uration, keybo ard type, broad cast port, and logging. To configure the general options in MP C: 1[...]

  • Page 109

    Chapter 3: Working with Target Servers 101  French (France)  German (Germany)  Japanese  United King dom  Korean (Korea)  Belgian (Belgium)  Norwegian (Norway)  Danish (Denmark)  Swedish (Sweden)  German (Switzerlan d)  Hungarian (Hungary)  Spanish (Spain)  Italian (Italy)  Slovenian 7. From the Keyboard Sh[...]

  • Page 110

    Chapter 3: Working with Target Servers 102 10. For the Broadcast Port, type the broadcast port numbe r in the Port field if you want to use a port other then 5000. 11. Select the Enable IPv6 Netwo rki ng che ckbox for IPv6 to enable IPv4 and IPv6 dual-stack operation. Note: KSX II and KX II-101 devices are not IPv6 enabled, so this section will not[...]

  • Page 111

    Chapter 3: Working with Target Servers 103 2. Highlight the target's icon in the Navigator and then ch oose Tools > Update > User Password. The Change Password di a log appears. 3. Type your current password in the Old Password field. 4. Type the new password in the New Password field. 5. Retype the password in the Confirm New Password f[...]

  • Page 112

    Chapter 3: Working with Target Servers 104 2. Click Tools > Restore Devi ce Configuration. Note that device configuration is specific to a particula r device and should not be restored to another device . Backing Up and Restoring a User Configuration To back up a device's user configuration: 1. Select the device in the Navigator. 2. Click T[...]

  • Page 113

    Chapter 3: Working with Target Servers 105 Note: If you want the application to autodiscover Rarita n devi ces on the new broadcast port you entered in the Options di alog, you must configure all Raritan devi ces to use the new p ort number. Remote Power Management AC power to associated target s can be managed wh en used with a properly configured[...]

  • Page 114

    106 In This Chapter Overview ................................................................................................ 107 Prerequisites for Usi ng Virtual Medi a .................................................... 110 File Server Setup (File Server ISO Images Only) ................................. 111 Connecting to Vi rtual Media ........[...]

  • Page 115

    Chapter 4: Virtual Media 107 Overview Virtual media extends KVM capabilities by enabling K VM target servers to remotely access media from the client PC and net work file servers. With this feature, media mounted o n the client PC and network file servers is essentially mounted virtually by the ta rget server. The target server can then read from a[...]

  • Page 116

    Chapter 4: Virtual Media 108[...]

  • Page 117

    Chapter 4: Virtual Media 109 Diagram key Local workstation KX II-101 Target server Remote file server (ISO images) USB drive Floppy drive CD/DVD drive Hard drive image files[...]

  • Page 118

    Chapter 4: Virtual Media 110 Prerequisites for Using Virtual Media With the KX II-101 virtual media feature, you can mount up to two drives (of different types) that are suppor ted by the USB profile curre ntly applied to the target. These drives are accessible for the duration of the KVM session. For example, you can mount a specific CD-ROM, use i[...]

  • Page 119

    Chapter 4: Virtual Media 111 File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also wo rk. Use the KX II-101 Remote Console File Server Setup page to designate the fil[...]

  • Page 120

    Chapter 4: Virtual Media 112 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog.[...]

  • Page 121

    Chapter 4: Virtual Media 113 Connecting to Virtual Media Local Drives This option mounts an entire drive, wh ich mean s the entire disk drive is mounted virtually onto the target serv er. Use this option for hard dri v es and external drives only. It does no t include network drives, CD-ROM, or DVD-ROM drives. This is the onl y option for which Rea[...]

  • Page 122

    Chapter 4: Virtual Media 114 Conditions when Read/Write is Not Av ailable Virtual media Read/Write is not av ailable in the following situations: • For all hard drives. • When the drive is write-p r otected. • When the user does not have Read/Write permi ssion:  Port Permission Access is set to None or View.  Port Permission VM Access i[...]

  • Page 123

    Chapter 4: Virtual Media 115 c. Click Connect. 3. For ISO images: a. Choose the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive. ISO format is the only format supported. b. Click the Browse button. c. Navigate to the path containi ng the disk image you want to use and click Open. The path is popula[...]

  • Page 124

    116 In This Chapter User Groups .......................................................................................... 116 Users ..................................................................................................... 123 Authenticatio n Settings .......................................................................... 126 Changin[...]

  • Page 125

    Chapter 5: User Management 117 User Group List User groups are use d with local an d remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user grou ps befo re creating individual users since, when you add a u se r, you must assign that user to an existing user group. The User Group List page displ ays a list of all user gro[...]

  • Page 126

    Chapter 5: User Management 118 Adding a New User Group To add a new user group: 1. Open the Group page by selecting User Mana geme nt > Add New User Group or clicki ng the Add bu tton from the User Group List page. The Group page is organized into the f ollowing categories: Group, Permissions, Port Permi ssi ons, and IP ACL. 2. Type a descriptiv[...]

  • Page 127

    Chapter 5: User Management 119 6. Click OK. Setting Port Permissions For each server port, you can sp ecif y the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setti ng for all permission s is Deny. Port Acce ss Option Description Deny Denied access completely V[...]

  • Page 128

    Chapter 5: User Management 120 VM access Option Description Deny Virtual media permission is denied altogether for the port Read-Only Virtual media access is limited to read a c cess only Read-Write Complete access (read, write) to virtual media Power control access Option Description Deny Deny power control to the target server Access Full permiss[...]

  • Page 129

    Chapter 5: User Management 121 To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2. Type the ending IP address in the Ending IP field. 3. Choose the action from the available options:  Accept - IP addresses set to A ccept are allowed acce ss to the KX II-101 device.  Drop - IP addresses set to Dr op are deni ed [...]

  • Page 130

    Chapter 5: User Management 122 Tip: The rule numbers allow yo u to have m ore control over the order in which the rules are created. Setting Permissions Important: Selecting the User Manag ement checkbox allo ws the members of the group to change the permissions of all users, including their own. Carefully consider gran ting these pe rmissions. Per[...]

  • Page 131

    Chapter 5: User Management 123 Modifying an Existing User Group Note: All permissions are enabled (and can not be changed) for the Admin group. To modify an existing user group: 1. From the Group page, change the appropri ate fields and set the appropriate permissi ons. 2. Set the Permissions for the group. Select the checkb o xes before the permis[...]

  • Page 132

    Chapter 5: User Management 124 User List The User List page display s a list of all users including their user name, full name, and user group. The list can be so rted o n any of the columns by clicking on the column name. From the User List p age, you ca n also add, modify, or delete users. To view the list of users: • Choose User Management >[...]

  • Page 133

    Chapter 5: User Management 125 5. Choose the group from the User Group dro p-down list. The list contains all groups you ha v e cre ated in addition to the system- supplied default groups. <Unkno wn >, which is the default setting, Admin, Individual Group. If you do not want to associate this user with an existing User Group, select Individua[...]

  • Page 134

    Chapter 5: User Management 126 Authentication Settings Authentication is the proc ess of verifying that a user i s who he says he is. Once a user is authenticated, t he user's group is used to determine his system and port permi ssions. The user's assig ned privileges determine what type of access is allo wed. This is called autho rizatio[...]

  • Page 135

    Chapter 5: User Management 127 To return to factory defaults: • Click the Reset to Defaults button. Implementing LDAP/LDAPS Remote Aut hen tication Lightweight Directory Access Protoc ol (LDAP/LDAPS) is a networking protocol for querying and modifying directory servi c es running over TCP/IP. A client starts an LD AP session by connecting to an L[...]

  • Page 136

    Chapter 5: User Management 128 4. In the Primary LDAP Server fiel d, type the IP address or DNS name of your LDAP/LDAPS remote aut hentication server (up to 37 characters). When the Enable Secure LDAP option is sel ecte d, the DNS name must be used. 5. In the Secondary LDAP Server field, type the IP address or DNS name of your backup LDAP/LDAPS se [...]

  • Page 137

    Chapter 5: User Management 129 14. Active Directory Dom ain. Type the name of the Active Directory Domain. Returning User Group Information from Activ e Directory Server The KX II-101 supports user authentic ation to Active Directory (AD) without requiring that users be defined locally on the KX II-101. This allows Active Directory user acco unts a[...]

  • Page 138

    Chapter 5: User Management 130 To enable your AD server on the KX II-101 : 1. Using the KX II-101, create special groups an d assig n proper permissions and privileges to these g roups. For example, create groups such as KVM_Admin and KVM_ Operator. 2. On your Active Directory server , create ne w groups with the same group names as in the p rev io[...]

  • Page 139

    Chapter 5: User Management 131 6. The Authentication Port default is port is 1812 but can be chang ed as required. 7. The Accounting Port default port is 1813 but can be chang ed as required. 8. The Timeout is recorded in se conds and default timeout is 1 se con d, but can be changed as req uired. The timeout is the length of time the KX II-101 wai[...]

  • Page 140

    Chapter 5: User Management 132  CHAP - With CHAP, authentication can be re quested by the server at any time. CHAP prov ides more security than PAP.[...]

  • Page 141

    Chapter 5: User Management 133 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeed s, the KX II-101 determines the permission s for a given use r based on the permissions of the user's group. Your remote RADIUS server can pr ovid e these u ser group names by returning an attribute, implemented as a RADIUS F[...]

  • Page 142

    Chapter 5: User Management 134 Attribute Data Log on NAS-IP-Address (4) The IP address for the KX II-101. User-Name (1) The user name entered at the login screen. Acct-Session-ID (4 4) Session ID for acco unting.[...]

  • Page 143

    Chapter 5: User Management 135 User Authentication Pro c ess When the device is configured to authe nticate and authorize local use rs from CC, the order in which the user credentials are validated follows the following process:[...]

  • Page 144

    Chapter 5: User Management 136 Remote authentication follows the pr ocess specified in the flowcha rt below:[...]

  • Page 145

    Chapter 5: User Management 137 Changing a Password To change your pass word: 1. Choose User Management > Ch ang e Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field. Password s can be up to 6[...]

  • Page 146

    138 In This Chapter Network Settings ................................................................................... 138 Device Se rvices ..................................................................................... 141 Keyboard/Mous e Setup ......................................................................... 143 Serial Port Se tti[...]

  • Page 147

    Chapter 6: Device Management 139 To reset to factory defaults: • Click Reset to Defaults. Network Basi c Settings 1. Choose Device Settings > Network. The Netwo rk Settings page opens. 2. Specify a meaningful Device Name for your KX II-101 device u sing up to 16 alphanumeric cha ra cters, valid spe cial cha racters, and no spaces . 3. In the I[...]

  • Page 148

    Chapter 6: Device Management 140 e. Select the IP Auto Configuration. The following options are available:  None (Static IP) - This option requires that you manually specify the network parameters. This is the recommended option because the KX II-101 is an infrastructure device and its IP address should not change.  DHCP - Dynamic Host Config[...]

  • Page 149

    Chapter 6: Device Management 141 Full-duplex allows communication in b oth directions simultaneously. Note: Occasionally there are problem s runnin g at 10 Mbps in either half or full duplex. If you are experi en cing problems, please try another speed and duplex. See Network Speed Setti ngs (on page 228). • Select the Bandwidth Limit.  No Lim[...]

  • Page 150

    Chapter 6: Device Management 142 Note: KX II-101 is enabled by factory de fault. 2. Select Enable SSH Access . 3. Type the network port used for SSH access to the K X II-101. 4. Click Save to save the setting. Enabling Direct Port Access Direct port access enables you to access the KX II-101 Remote Client without having to go through the usual logi[...]

  • Page 151

    Chapter 6: Device Management 143 Tip: Define a direct port access URL once, then save it in your web browser as a boo km ark to make reusing it easier. Keyboard/Mouse Setup Use the Keyboard/Mouse Setup page to configure the Keyboard a nd Mouse interface between the KX II-101 and the host device. 1. Click Device Settings > Keyboard/Mouse. 2. Sele[...]

  • Page 152

    Chapter 6: Device Management 144  USB - Forces the KX II-101 to use the USB connection to send Keyboard and Mouse data to the host device.  PS/2 - Forces the KX II-101 to use the PS/2 connection to send Keyboard and Mouse data to the host device. Note: If you are using a Raritan switch on the front-e n d with a KX II- 101, you must set the Ho[...]

  • Page 153

    Chapter 6: Device Management 145 4. Click OK. Raritan Power Strip Control To configure the po w er s trip serial port: 1. Choose Device Settings > Serial Port. T he Serial Po rt Settings page opens. 2. Select the PowerStrip Control radio butto n. Choose this option when connecting the KX II-101 to a Raritan powe r strip.[...]

  • Page 154

    Chapter 6: Device Management 146 3. Click OK. Modem To configure the modem serial port: 1. Choose Device Settings > Serial Port. T he Serial Po rt Settings page opens. 2. Select the Modem radio button. Choose t his option when attaching an external modem to the KX II-101 in order to provide dial-up access. 3. In the Modem Settings section, confi[...]

  • Page 155

    Chapter 6: Device Management 147 4. Click OK. See Modem Access Cabl e Connections (on page 148) for details on the cabl e co nnectio n for m odem access and see Certified Modems (on page 226) for details on certified mode ms that wo rk with the KX II-101. For information on settings that will give you the best performance when connecting to the KX [...]

  • Page 156

    Chapter 6: Device Management 148 Modem Access Cable Connections Use the following cable co nne ction c onfiguration to connect the KX II- 101 to a modem: 1. Connect an admin seria l cable to the KX II-101. 2. Connect a 9 pin male/male gen de r changer to the admin serial cabl e. 3. Connect a null modem cable to other side of the ge nde r changer. 4[...]

  • Page 157

    Chapter 6: Device Management 149 6. Click OK. Event Management The KX II-101 Event Management feature provides a set of scree ns for enabling and disabling the distri buti on of system events to SNMP Managers, Syslog, and the audit log. These events are categorized, and for each event you can determin e wh eth er you want the event sent to one or s[...]

  • Page 158

    Chapter 6: Device Management 150 Configuring Event Management - Settings SNMP Configuration Simple Network Management Protocol (SNMP) is a p roto col gover ning network management and the monitori ng of network devices and their functions. The KX II-101 offers SNMP Agent support thro ugh Event Management. To configure SNMP (enable SNMP logging): 1.[...]

  • Page 159

    Chapter 6: Device Management 151 Event Management - De stinations System events, if enabled, can g enerate SNMP notification events (traps), or can be logged to Syslog or A udit Log. Use the Event Management - Destinations page to sel ect the system events to track and where to send this information. Note: SNMP traps will be generated only if the S[...]

  • Page 160

    Chapter 6: Device Management 152 Tip: Enable or disable entire Categories by che cking or clearing the Category checkboxes, respec tively. 3. Click OK. To reset to factory defaults: • Click Reset To Defaults. Warning: When using SNMP traps ove r UDP, it is possible fo r the KX II-101 and the router that it is attached to to fall out of synchroniz[...]

  • Page 161

    Chapter 6: Device Management 153 Trap Name Description ipConflictResolved An IP A ddress conflict was resolved. networkFailure An Ethernet interface of the product can no longer communicate over the net work. networkParameterChanged A change has been made to the network parameters. passwordSettingsChanged Strong password settings have cha nge d. po[...]

  • Page 162

    Chapter 6: Device Management 154 Trap Name Description userPasswordChanged This event is tri ggered if the password of any user of the device is modified. userSessionTimeout A user with an active sessi on ha s experienced a session termination du e to timeout. vmImageConnected User attempted to mount either a device or image on the target using Vir[...]

  • Page 163

    Chapter 6: Device Management 155 Port type Description PowerStrip Power strip KVM KVM target 1. Click the Port Name for the port you want to edit.  For KVM ports, the Port page is opened. In this page, you can name the ports, create power asso ciations, and set target server settings.  For power strips, the Port page for power strips is opene[...]

  • Page 164

    Chapter 6: Device Management 156 Note: The Power Port 1 link is enable d only when a Raritan powe r strip is connected to the KX II-101 and configured. Otherwise, the link is disabled. Renaming a Port To change the port name: 1. Enter a descriptive name, such as the name of the target server. The name can be up to 32 alphanum eri c characters and c[...]

  • Page 165

    Chapter 6: Device Management 157 Power Control The KX II-101 provides remote power control of a target server. T o utilize this feature, you must have a Raritan remote power strip. To use the KX II-101 power control feature: • Connect the power strip to your ta rget server using the DKX2-101- SPDUC connector (not incl uded b ut available from you[...]

  • Page 166

    Chapter 6: Device Management 158 Diagram key DKX2-101-SPDUC connector (not incl u ded) from the KX II-101 to Raritan the power strip. Raritan power strip. To connect the KX II-101 to a Raritan po wer strip: 1. Connect the Mini DIN9M connect or of the DKX2-101-SPDUC cabl e to the Admin port of the KX II-101. 2. Connect the RJ45M connecto r of the DK[...]

  • Page 167

    Chapter 6: Device Management 159 3. Click OK. To cancel without sav ing changes: • Click Cancel. Managing Power A ssociations To make power associations (associ ate power strip outlets with the KVM target serv er): Note: When a power strip is asso ciate d with the target server (port), the outlet name is replaced by the port nam e. You can change[...]

  • Page 168

    Chapter 6: Device Management 160 To remove a power strip association: 1. Select the appropriate power stri p from the Power Stri p Name drop- down list. 2. For that power strip, select t he approp ria te outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down list, sel ect None. 4. Click OK. That power strip/out let associ ati[...]

  • Page 169

    Chapter 6: Device Management 161 Controlling a Power Strip Dev ice Control the power stri p device using the Power Strip Device pag e. This page enables you to turn each outl et on the power strip on and off. To control the po w er s tri p connected to the KX II-101: 1. Choose Home > Powerstrip. The Powe r Strip Device page opens. 2. Click the O[...]

  • Page 170

    Chapter 6: Device Management 162 Analog KVM Switch You can configure a Raritan analo g KVM swit ch to work with the KX II- 101. The KX II-101's compatibility has been verified with t he following Raritan KVM switches: • SwitchMan SW2, SW4 and SW8 • Master Console MX416 and MXU Similar products from Raritan or ot h er vendo rs may be compat[...]

  • Page 171

    Chapter 6: Device Management 163 6. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults: • Click Reset to Defaults. Resetting the KX II-101 Using the Reset Button On the back panel of the KX II-101, there is a Re set button. It is recessed to prevent accidental resets (you will need a pointed object to press this bu[...]

  • Page 172

    Chapter 6: Device Management 164 NOTE: If the KX II-101 is set to restore to the factory defaults upon reset, the IP address, user name, and other op tions will be set accordingly.[...]

  • Page 173

    165 In This Chapter Overview ................................................................................................ 166 Basic USB Connect ion Sett ings ............................................................ 166 Advanced USB Conn ection Settings ..................................................... 168 Known USB Profiles ............[...]

  • Page 174

    Chapter 7: Managing USB Connections 166 Overview To broaden the KX II-101's compatibilit y with different KVM target servers, Raritan provides a user defined real -time selection of USB configuration profile options for a wi de range of operating system and BIOS-level server implementations. The default USB Connection Settings meets the needs [...]

  • Page 175

    Chapter 7: Managing USB Connections 167 2. Click the icon to expand the USB Connection Settings section. 3. Select the USB connection settings you will be using:  Enable Absolute Mouse - Applies only if USB is active Keyboard/Mouse Interface  Use Full Speed - Useful for BIOS that cannot accommodate High Speed USB devices  Enable Absolute m[...]

  • Page 176

    Chapter 7: Managing USB Connections 168 Advanced USB Connection Settings WARNING: It is possible, based on the selections you make in the Advanced USB Connection Settings se ction, to cause configuration problems between the KX II-101 and the target serve r. Therefore, Raritan strongly recommends that you refer to the Known US B Profiles (on page 1[...]

  • Page 177

    Chapter 7: Managing USB Connections 169 5. Click OK. Known USB Profiles The current release of the KX II-101 includes the known USB p rofil es described in the following tables. Howev er, for the mo st up-to-date USB profile information, please click on the User Defined KX II-101 USB Profiles Connection Config uratio n Table link in the Advanced US[...]

  • Page 178

    Chapter 7: Managing USB Connections 170 Hardware/BIOS: Dell PowerEdge 1950/2950/2970/6950/R2 00 Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM disk SUN USB keyboard Remove Unused VM Intf#2[...]

  • Page 179

    Chapter 7: Managing USB Connections 171 Hardware/BIOS: Dell PowerEdge 650 Server attributes: BIOS A05, Windows Server 2003, Intel P 4 3GHz Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM di[...]

  • Page 180

    Chapter 7: Managing USB Connections 172 Hardware/BIOS: Dell PowerEdge 1650 Absolute mouse Virtual media Intf#1 CD -ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM dis k SUN USB keyboard Remove Unused VM Intf#2 Comments: BIOS accessible YES. No BIOS support to boot from USB emulated devices. Hardware/B[...]

  • Page 181

    Chapter 7: Managing USB Connections 173 Hardware/BIOS: Other Dell Optiplex, keyboard only Server attributes: GX620 BIOS A11 11/20/06 Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Disabled Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 Disabled S[...]

  • Page 182

    Chapter 7: Managing USB Connections 174 Hardware/BIOS: HP Com paq DC7100/7600 Comments: Virtual CD-ROM and disk drives cannot be used simultaneously. Hardware/BIOS: HP Integrity RX1600 Server attributes: HP-UX 8.11 / CDE Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 CD-ROM Force full s[...]

  • Page 183

    Chapter 7: Managing USB Connections 175 Hardware/BIOS: HP Proliant DL145 Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM disk SUN USB keyboard Remove Unused VM Intf#2 Comments: Boot from CD-ROM. Hardware/BIOS: HP Proliant DL145 Server attributes: PhoenixBIOS HP S[...]

  • Page 184

    Chapter 7: Managing USB Connections 176 Hardware/BIOS: HP Proliant DL360/DL380 Server attributes: HP Proliant DL360/DL380 G4 (HP SmartStart CD) Keyboard & mouse: PS/2 USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 [...]

  • Page 185

    Chapter 7: Managing USB Connections 177 Hardware/BIOS: HP Proliant DL360/DL380 Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM disk SUN USB keyboard Remove Unused VM Intf#2 Comments: Use USB keyboard/mouse and set the mouse to Absolute Mouse mode for normal deskt[...]

  • Page 186

    Chapter 7: Managing USB Connections 178 Hardware/BIOS: HP Proliant DL360/DL380 Server attributes: HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtua[...]

  • Page 187

    Chapter 7: Managing USB Connections 179 Hardware/BIOS: IBM eServ er System P5 Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM disk SUN USB keyboard Remove Unused VM Intf#2 Comments: Boot options accessible - YES. Only use Intelligent Mouse mode or Single Mouse mo[...]

  • Page 188

    Chapter 7: Managing USB Connections 180 Hardware/BIOS: Lenov o ThinkPad X61 Server attributes: BIOS v1.11 2007-11-15 Intel Duo Core 2.20 GHz Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Auto Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 Disabl[...]

  • Page 189

    Chapter 7: Managing USB Connections 181 Hardware/BIOS: Lenov o ThinkPad T61 Absolute mouse Virtual media Intf#1 Auto Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 Disabled SUN USB keyboard Remove Unused VM Intf#2 Comments: Press F1 during startup to enter BIOS. Press F12 to boot from the appropriate virtual[...]

  • Page 190

    Chapter 7: Managing USB Connections 182 Hardware/BIOS: Mac Server attributes: BIOS Mac Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 Disabled SUN USB keyboard Remove Unused VM Intf#2 Comments[...]

  • Page 191

    Chapter 7: Managing USB Connections 183 Hardware/BIOS: RUBY Industrial Mai nboard (AwardBIOS) Absolute mouse Virtual media Intf#1 Auto Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 Disabled SUN USB keyboard Remove Unused VM Intf#2 Comments: Use this for the RUBY-9715VG2A series indust rial mainboards with P[...]

  • Page 192

    184 In This Chapter Security Settings .................................................................................... 184 Logon Limi tati ons .................................................................................. 185 Strong Passwords ................................................................................. 186 User Blocking[...]

  • Page 193

    Chapter 8: Security Management 185 To reset back to defaults: • Click Reset to Defaults. Logon Limitations Using logon limitations, you can specify restrictions for single logon , password aging, and the logging off of idle users. Limitation Description Enable single logon limitation Whe n sel ected, only one login per user name is allowed at any[...]

  • Page 194

    Chapter 8: Security Management 186 Limitation Description Enable password aging When selected, all use rs a r e required to change their passwords periodicall y based o n the number of days specified in Password Aging Interval field. This field is enabled and required when t he Enable Password Aging c heckbox is se lected. Enter the number of days [...]

  • Page 195

    Chapter 8: Security Management 187 Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alph abeti cal character and one nonalphabetical character (pu nctuation character or numb er). In addition, the first four characters of the password and the user name can not match. When selected, strong password [...]

  • Page 196

    Chapter 8: Security Management 188 User Blocking The User Blocking options specify the criteria by which use rs a re blocked from accessing the system after the sp ecified n umber of unsuccessful login attempts. The three options are mutually exclusive : Option Description Disabled The default opti on. Users are not blocked regardless of the number[...]

  • Page 197

    Chapter 8: Security Management 189 Option Description Timer Lock out Users are denied access to the system for the specified amount of time after exceeding the specified number of unsuccessful logi n attempts. When selected, the following fields are e nable d:  Attempts - The number of unsuccessful login attempts after which the user will be loc[...]

  • Page 198

    Chapter 8: Security Management 190 Encryption & Share Using the Encryption & Share setting s you ca n specify the type of encryption used, PC and VM shar e modes, and the type of re set performed when the KX II-101 Reset butt on is p ressed. WARNING: If you select an encrypt ion mode that is not supported by your browser, you will not be ab[...]

  • Page 199

    Chapter 8: Security Management 191 Encryption mode Description AES-128 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encrypti on of electronic data. 128 is the key length. When AES-128 is specified, be certain that your browser supports it, otherwise you will not be able to connect.[...]

  • Page 200

    Chapter 8: Security Management 192 5. If needed, select the Disable Local Port Output checkbox. If this option is selected, there is no video output on the loca l port. 6. If needed, select Local Device Reset Mode. This option spe cifies which actions are taken when the hard ware Reset button (at the back of the device) is depress ed. For m ore inf[...]

  • Page 201

    Chapter 8: Security Management 193 IP Access Control Using IP access control, you can co ntro l access to your KX II-101. By setting a global Access Control List (ACL) you are by ensuring that your device does not respond to packet s bei ng se nt from disallowed IP addresses. The IP access cont rol is global, affecting the KX II-101 as a whole, but[...]

  • Page 202

    Chapter 8: Security Management 194 Tip: Rule numbers allow you to have more control over the order in which the rules are created. To replace a rule: 1. Specify the rule number you want to repl ace. 2. Type the IP address and subnet mask in the IP/Mask field. 3. Choose the Policy from the drop-down list. 4. Click Replace. Your new rule repl aces th[...]

  • Page 203

    195 In This Chapter Audit Log................................................................................................ 195 Device Info rmation ................................................................................. 196 Back up and Restore .............................................................................. 197 Upgrading F[...]

  • Page 204

    Chapter 9: Maintenance 196 Device Information The Device Information page provides detailed info rmation about your KX II-101 device. This information is helpful should you need to co ntact Raritan Technical Suppo rt. To view information about y our KX II-10 1: • Choose Maintenance > De vice Informati on. The Device Information page opens. The[...]

  • Page 205

    Chapter 9: Maintenance 197 Backup and Restore From the Backup/Restore page, you ca n backu p and restore the settings and configuration for your KX II-101. In addition to using backup and restore for busin ess continuity purposes, you can use this feature as a time -saving mechani sm. For instance, you can quickly provide access to your team from a[...]

  • Page 206

    Chapter 9: Maintenance 198 To restore your KX II-101: WARNING: Exercise caution when re storing your KX II-10 1 to an earlier version. Usernames and p assword in place at the time of the backup will be restored. If you do not remember the old administrative usernames and passwo rd s, you will be locked out of the KX II-101. In addition, if you used[...]

  • Page 207

    Chapter 9: Maintenance 199 To upgrade your KX II-101 devi ce: 1. Choose Maintenance > Firmwa re Upg rade. The Firmware Upgrade page opens. 2. Click the Show Latest Firmware link, locate the app ro priate Raritan firmware distribution file (*.RFP) from the Firm ware Upgrades > KX II-101 page, and download the file. 3. Unzip the file and read a[...]

  • Page 208

    Chapter 9: Maintenance 200 5. Click Upgrade. Wait for the upgrade to complete. Status inform ation and progress bars are displ ayed during the upgrade. Upo n completion of the upgrade, the device re boots. 6. As prompted, close the browser and wait approximately 5 minutes before logging into the KX II-101 again. For information about upgradi ng the[...]

  • Page 209

    Chapter 9: Maintenance 201 Rebooting The Reboot page provides a safe and co ntrolle d way to reboot your KX II-101. This is the recommended method for reb ooting. Important: All KVM and serial conne ctions will be closed and all users will be logged off. To reboot your KX II-101: 1. Choose Maintenance > Re boot. The Re boot page opens. 2. Click [...]

  • Page 210

    202 The Diagnostics p ages are used for troubleshootin g and are intended primarily for the administrator of the KX II-101 device. All of the Diagnostics pages (ex cept Device Diagnostics) run standa rd networking commands and the information that is d isplayed is the output of those commands. The Dia gno stics menu options help you debug a nd conf[...]

  • Page 211

    Chapter 10: Diagnostics 203 The following information is displayed: • Whether the Ethernet interface is up or down. • Whether the gateway is pingable or n ot. • The LAN port that is currently active. To refresh this information: • Click the Refresh button. Network Statistics Page The KX II-101 provides statistics about your network interfa [...]

  • Page 212

    Chapter 10: Diagnostics 204  Statistics - Produces a page similar to the one di splayed here.[...]

  • Page 213

    Chapter 10: Diagnostics 205  Interfaces - Produces a pa ge si mil ar to the one displayed here.  Route - Produces a page simila r to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.[...]

  • Page 214

    Chapter 10: Diagnostics 206 Ping Host Page Ping is a network tool used to test whet her a p articular host or IP address is reach able across an IP network. Using th e Ping Host page, you can determine if a target server or another KX II-101 is acce ssible. To ping the host: 1. Choose Diagnosti cs > Ping Host. The Ping Host page appe ars. 2. Typ[...]

  • Page 215

    Chapter 10: Diagnostics 207 3. Choose the maximum hops from the drop-down li st (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The o utpu t of trace route is displayed in the Result field.[...]

  • Page 216

    Chapter 10: Diagnostics 208 Device Diagnostics Note: This page is for use by Raritan Field Engin eers or wh en you are directed by Raritan Techni cal Support. The Device Diagnostics page downlo ad s diagnostics information from the KX II-101 to the client machine. A device diagnostics log can be generated with or without runnin g an optional diagno[...]

  • Page 217

    Chapter 10: Diagnostics 209 a. Retrieve the diagnostics fil e sup plied by Raritan and unzi p as necessary. b. Click Browse. A Choo se Fil e dialog appears. c. Navigate to and select this diagnosti cs file. d. Click Open. The file is displayed in the Script File field: e. Click Run Script. 3. Create a diagnostics file to send to Ra ritan Te chnical[...]

  • Page 218

    210 In This Chapter Overview ................................................................................................ 210 Accessing the KX II- 101 Using t he CLI ................................................. 211 SSH Connec tion to the KX II-101 .......................................................... 211 Logging On ...................[...]

  • Page 219

    Chapter 11: Command Line Interface (CLI) 211 Accessing the KX II-101 Using the CLI Access the KX II-101 using one of the following methods: • TELNET via IP connection • SSH (Secure Shell) via IP connection • Multi-function admin serial port via RS-232 serial inte rface with provided cable and a terminal emul ation program like HyperTe rminal [...]

  • Page 220

    Chapter 11: Command Line Interface (CLI) 212 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX/Linux workstation and log in as the user admin, enter the following command: ssh -l admin 192.168.30.222 The Password prompt appears. See Logging On (on page 212). Logging On To log in, enter the user name admin as shown: 1. Logi[...]

  • Page 221

    Chapter 11: Command Line Interface (CLI) 213 CLI Prompts The Command Line Interface prompt indicate s the cu rrent command level. The root portion of the prompt is the login name. For a direct admin serial port connection with a terminal emulation application, Admin Port is the root portion of a command. admin > For TELNET/SSH, admin is the root[...]

  • Page 222

    Chapter 11: Command Line Interface (CLI) 214 CLI Syntax -Tips and Shortcuts Tips • Commands are listed in al phabetical order. • Commands are not case sensitive. • Parameter names are singl e word without undersco re. • Commands without arguments default to sho w current settings for the command. • Typing a question mark ( ? ) after a com[...]

  • Page 223

    Chapter 11: Command Line Interface (CLI) 215 Command Des cription config Switch to the Configuration menu. diagnostics (on page 215) Switch to the diagn osti cs m enu. debug (on page 216) Switch to debug menu. help Display an overview of the CLI syntax. history Display the current session's command line histo ry. interface Configure the KX II-[...]

  • Page 224

    Chapter 11: Command Line Interface (CLI) 216 Debug The Diagnostics > Debug menu enable s you to choose the Setlog command to set logging o ptions fo r the KX II-101. Setlog Command The Setlog command enables you set the logging le vel for differe nt modules of the KX II-101 and to view the current logg ing levels fo r each module. The syntax for[...]

  • Page 225

    Chapter 11: Command Line Interface (CLI) 217 Network The Configuration > Network comma n d s are used to configure the KX II- 101 network con ne ction and device name. Command Description interface Configure the KX II-101 device network interface. name Set the device name. Name Command The name command is used to conf igure the device and host n[...]

  • Page 226

    Chapter 11: Command Line Interface (CLI) 218 Command Option Description gw ipaddress Gateway IP address obtained from the IP administrator mode <auto | 100fdx> Set Ethernet Mode to auto detect or force 100MB/s full duplex (100fdx) Interface Command Example The following command sets the IP address, mask, a nd gate way addresses, and sets the [...]

  • Page 227

    219 In This Chapter Overview ................................................................................................ 219 Removing a KX II-101 from CC-SG Management ................................ 220 Us ing CC-SG in Proxy Mode ................................................................. 221 Overview When a KX II-101 device is under C[...]

  • Page 228

    Chapter 12: CC Unmanage 220 Removing a KX II-101 from CC-SG Management Unless the KX II-101 is released from CC-SG cont rol, you cannot access the device directly. However, if t he KX II-101 does not receive hea rtbeat messages from CommandCente r (for example, CommandCenter is not on the network), you can release t he KX II-101 from CC-SG cont rol[...]

  • Page 229

    Chapter 12: CC Unmanage 221 2. Click Yes. A message appears, confirming that the de vice is no longer under CC m ana gement. 3. Click OK. The KX II-101 login page opens. Using CC-SG in Proxy Mode Virtual KVM Client Version not Kno wn from CC-SG Proxy Mode When the Virtual KVM Client is launched from Comm andCenter Secure Gateway (CC-SG) in proxy mo[...]

  • Page 230

    222 In This Chapter KX II-101 Specif ications ........................................................................ 222 Supported Video Re solutions ................................................................ 223 Supported Keyboar d Languages ........................................................... 224 Supported Operating Systems (Client[...]

  • Page 231

    Appendix A: Specifications 223 Specification Description Remote connection: • Network Protocols • One 10/100 Ethernet (RJ45) port • TCP/IP, HTTP, HTTPS, UDP, RADIUS, LDAP, SNTP, DHCP Screen resolutions: • PC graphic mode • SUN® video mode • 720x400 (for DOS) • 640 X 480 @ 60/72/75/85Hz, • 800 X 600 @ 56/60/72/75/85Hz, • 1024 X 76[...]

  • Page 232

    Appendix A: Specifications 224 Resolutions 720x400 @70 Hz 1024x768 @75 Hz 1280x1024 @85 Hz 720x400 @84 Hz 1024x768 @85 Hz 1600x1200 @60 Hz Note: Composite Sync and Sync-on -G re en vid eo require an additional adapter. Supported Keyboard Languages The KX II-101 provides keyboard suppo rt for the languages listed in the following table. Language Reg[...]

  • Page 233

    Appendix A: Specifications 225 Language Regions Keyboard layout Italian Italy Italian Spanish Spain and most Spanish speaking cou ntries Spanish Supported Operating Systems (Clients) The following operating system s are supported on the Virtual KVM Client™ and Multi-Platform Client (MPC): Client OS Virtual media (VM) support on client Windows XP?[...]

  • Page 234

    Appendix A: Specifications 226 Certified Modems • US Robotics 56K 5686E • ZOOM v90 • ZOOM v92 • US Robotics Sportster 56K • US Robotics Courie r 56K Connectors Interface type Length Description Inches Centime ters Video 15” 38 cm Integrated cable PS/2 15” 38 cm Integrated cable MiniUSB to USB(M) 17.7” 45 cm Cable for USB MiniDin9(M)[...]

  • Page 235

    Appendix A: Specifications 227 Port Description HTTP, Port 80 All requests receive d by the KX II-101 via HTTP (p ort 80) are automatically forwarded to HTTPS for complete security. The KX II-101 responds to Port 80 for user conveni en ce, relieving users from having to explicitly type in the URL fiel d to access the KX II-101, while still preservi[...]

  • Page 236

    Appendix A: Specifications 228 Network Speed Settings KX II-101 network speed setting Auto 100/Full 100/Half 10/Full 10/Half Auto Highest Available Speed KX II-101: 100/Full Switch: 100/Half 100/Half KX II-101: 10/Full Switch: 10/Half 10/Half 100/Full KX II-101: 100/Half Switch: 100/Full 100/Full KX II-101: 100/Half Switch: 100/Full No Communica ti[...]

  • Page 237

    Appendix A: Specifications 229 Per Ethernet specification, these should be “n o communication,” howeve r, note that the KX II-101 behavior deviates from expected b ehavi or Note: For reliable netwo rk communication, config ure the KX II-101 and the LAN switch to the same LAN Interface Speed and Duplex. Fo r example, configure both the KX II-101[...]

  • Page 238

    Appendix A: Specifications 230 9 Pin Pinout 15 Pin local port Pin Single 1 LP_RED 2 LP_GRN 3 LP_BLU 4 CN_LP_KB_SDA 5 CN_LP_KB_SCL 6 GND 7 AGND 8 AGND 9 +5 V 10 CN_LP_MS_SDA 11 CN_LP_MS_SCL 12 N/C 13 LP_HS 14 LP_VS 15 N/C[...]

  • Page 239

    231 Note: The procedures in this chapter sh o uld be attempted only by experienced use r s. In This Chapter Returning User Gr oup Inform ation ........................................................ 231 Setting the Registry to Permit Write Operations to the Schema ........... 232 Creating a New Attribute ...........................................[...]

  • Page 240

    Appendix B: Updating the LDAP Schema 232 Setting the Registry to Permit Wr ite Operations to the Schema To allow a domain controller to write to the schema, you mu st set a registry entry that permits schema up dates. To permit write operations to the sche ma: 1. Right-click the Active Directory Sch ema root nod e in the left pane of the window and[...]

  • Page 241

    Appendix B: Updating the LDAP Schema 233 3. Click New and then choose Attribute. When the warni ng me ssage appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciuserg roup in the Common Name field. 5. Type rciuserg roup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Obje ct ID field. 7. [...]

  • Page 242

    Appendix B: Updating the LDAP Schema 234 2. Scroll to the user class in the right pane and rig ht-click it. 3. Choose Properties from the menu. The use r Pro perties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.[...]

  • Page 243

    Appendix B: Updating the LDAP Schema 235 6. Choose rciusergroup from the Select Schema O bject list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1. Right-click Active Directory Schem a in the left pane of the wind ow and select Reload the Schema. 2.[...]

  • Page 244

    Appendix B: Updating the LDAP Schema 236 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.[...]

  • Page 245

    Appendix B: Updating the LDAP Schema 237 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose prop er ties you want to adjust in the right pane. Right-click the user nam e and select Properties.[...]

  • Page 246

    Appendix B: Updating the LDAP Schema 238 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in t he KX II-101) in the Edit Attribute field. 10. Click OK.[...]

  • Page 247

    239 The KX II-101 device can be mounted vertic ally or horizontally, faci ng the front or the rear, on either side of a server rack. Use th e bra ckets and screws included with the K X II-101 kit. In This Chapter AC-DC Adapter Clip Fitting.................................................................... 239 Bracket Installation .................[...]

  • Page 248

    Appendix C: AC-DC Adapter and Rack Mount 240 Diagram key UK clip Remove the Attac hment Cover from AC - DC Power Adapter Diagram key AC/DC power adaptor Attachment cover. Push to remove.[...]

  • Page 249

    Appendix C: AC-DC Adapter and Rack Mount 241 Attach the Clip to AC-D C Power Adapter Diagram key Australian clip EU clip UK clip Power adaptor Bracket Installation 1. Remove the screws from the KX II-101.[...]

  • Page 250

    Appendix C: AC-DC Adapter and Rack Mount 242 2. Slide the left and right panels off the KX II-101. Diagram key KX II-101 Right panel Left panel Screws[...]

  • Page 251

    Appendix C: AC-DC Adapter and Rack Mount 243 KX II-101 Bracket Parts Diagram key U bracket L bracket Attach the Brackets to KX II-101 for Horizon tal Mount 1. Attach the U bracket to the L bracket using the incl uded screws. Adjust bracket placement before tighteni ng screws. 2. Mount the U and L bracket assemb ly to the rack with ra ck-mount screw[...]

  • Page 252

    Appendix C: AC-DC Adapter and Rack Mount 244 This image illustrates mounting the KX II-101 on the left. To mount the KX II-101 on the right, follow these directions but attach brackets to the right side of the KX II-101. Diagram key KX II-101 U bracket L bracket Screws Mounting hole Latch lever Attach the Brackets to KX II-101 for Vertical Moun t 1[...]

  • Page 253

    Appendix C: AC-DC Adapter and Rack Mount 245 2. Mount the U and L bracket assemb ly to the rack with ra ck-mount screws (provided by the ra ck m anufacturer). 3. Slide the KX II-101 device into the U bracket with the KVM harness facing towards the target. Pull and rel ea se the latch lever to lock the KX II-101 device into the U bracket. Diagram ke[...]

  • Page 254

    246 In This Chapter Java Runtime Envi ronment (JRE) ......................................................... 246 Keyboard, Video an d Mouse Notes....................................................... 246 Java Runtime Environment (JRE) Important: It is recommended that y ou disable Java caching and clear the Java cache. Please refer to y our Java [...]

  • Page 255

    Appendix D: Informational Notes 247 Sun Keyboard Key Support Limitations The following keys on Sun keyboards ar e not supported by KX II-101: Sun key Local port key combination Again Ctrl+ Alt +F2 Props Ctrl + Alt +F3 Undo Ctrl + Alt +F4 Stop A Break a Front Ctrl + Alt + F5 Copy Ctrl + Alt + F6 Open Ctrl + Alt + F7 Find Ctrl + Alt + F9 Cut Ctrl + A[...]

  • Page 256

    Appendix D: Informational Notes 248 Keyboard Configuration to use Dell Dimension 2400– BIOS A05 Set the Host Interface to PS/2 on the Keyboard/Mouse Setup page. See Keyboard/Mouse Setup (on page 143). Dell Optiplex 170L - BIOS A07 PS/2 plus a PS/2-to-USB-adapter. Set the Host Interface to PS/2 on the Keyboard/Mouse Setup page. See Keyboard/Mouse [...]

  • Page 257

    Appendix D: Informational Notes 249 Windows 2000 and 2003 Serv er Keyboard Limitations Due to an operating system limitation, the followi ng keyboa rd combinations do not work with a US -Int ernational keyboard layout when using Windows 2000 a nd Windows 2003 se rvers. • Right Alt+D • Right Alt+I • Right Alt+L Note: Right Alt may be labeled a[...]

  • Page 258

    [...]

  • Page 259

    251 9 9 Pin Pinout • 230 A Absolute Mouse Mode • 54, 92 Accessing the KX II-101 Using the CLI • 211 AC-DC Adapter and Rack Mount • 6, 239 AC-DC Adapter Clip Fitting • 239 Adding a New User • 124, 125 Adding a New User Group • 118, 124 Adding Attributes to the Class • 233 Adding, Deleting, and Editing Favorites • 39 Admin Port • [...]

  • Page 260

    Index 252 D Date/Time Settings • 148 Debug • 215, 216 Default Logon Information • 9 Device Diagnostics • 208 Device Information • 196 Device Management • 27, 138 Device Ports in the Navigator • 62 Device Services • 141, 211 Devices in the MPC Navig ator • 62 Diagnostics • 202, 215 Disconnecting a KVM Target Server • 43 Disconn[...]

  • Page 261

    Index 253 Modifying an Existing User Group • 123 Modifying and Removing Keyboard Macros • 48, 86 Mounting • 6 Mouse Modes • 1 2 Mouse Options • 52, 91, 100 Mouse Pointer Synchronization • 53 Mouse Synchronization Options • 92 MPC Broadcast Port • 104 MPC Connected Server(s) Toolbar • 68 MPC Connection Properties • 94 MPC Interfa[...]

  • Page 262

    Index 254 Single Cursor Mode/Dual Cursor Mode • 91 Single Mouse Cursor • 56 Specifications • 1, 222 Specifying a Keyboard Type in MPC • 88 SSH Access from a UNIX/Linux Workstation • 212 SSH Access from a Windows PC • 211 SSH Connection to the KX II-101 • 211 Standard Mouse Mode • 54, 92, 94 Standard Toolbar • 65 Step 1 Configure t[...]

  • Page 263

    U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800-724- 809 0 or 732- 764- 8886 For CommandCenter NOC: Press 6, then Pr ess 1 For CommandCenter Secure Gateway : Press 6, then Press 2 Fax: 732-764-88 87 Email for CommandCenter NOC: tech-ccnoc@rarita n .com Email for all o ther products: tech @raritan.com China Beijing Monday - F[...]