Raritan Dominion KSX II User Manual

Raritan Dominion KSX II User Manual

Hide thumbs Also See for Dominion KSX II:
Table of Contents

Advertisement

Quick Links

Dominion KSX II
User Guide
Release 2.5.0
Copyright © 2013 Raritan, Inc.
DKSXII-v2.5.0-0F-E
February 2013
255-62-4030-00

Advertisement

Table of Contents
loading

Summary of Contents for Raritan Dominion KSX II

  • Page 1 Dominion KSX II User Guide Release 2.5.0 Copyright © 2013 Raritan, Inc. DKSXII-v2.5.0-0F-E February 2013 255-62-4030-00...
  • Page 2 Raritan, Inc. © Copyright 2013 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
  • Page 3: Table Of Contents

    Contents Chapter 1 Introduction KSX II Overview ..........................2 What's New in Help ........................4 KSX II Help ............................ 4 Related Documentation ....................... 5 KSX II Client Applications ......................5 Virtual Media ..........................6 Product Photos ..........................6 Product Features ........................... 7 Hardware ..........................
  • Page 4 Prerequisites for Using AKC ....................89 Multi-Platform Client (MPC) ......................90 Launching MPC from a Web Browser ................90 Raritan Serial Console (RSC) ...................... 91 Opening RSC from the Remote Console ................91 Chapter 4 Rack PDU (Power Strip) Outlet Control Overview ............................
  • Page 5 Contents Chapter 7 User Management User Groups ..........................123 User Group List........................ 124 Relationship Between Users and Groups ............... 124 Adding a New User Group ....................124 Modifying an Existing User Group ................... 129 Users ............................130 Adding a New User ......................130 View KSX II User List ......................
  • Page 6 Contents Configuring KSX II Local Port Settings ................199 Connect and Disconnect Scripts ....................202 Applying and Removing Scripts ..................202 Adding Scripts ........................203 Modifying Scripts ......................206 Importing and Exporting Scripts ..................206 Port Keywords ..........................208 Port Group Management ......................210 Creating Port Groups .......................
  • Page 7 Contents Chapter 11 Diagnostics Network Interface Page ......................242 Network Statistics Page ......................242 Ping Host Page .......................... 244 Trace Route to Host Page ......................245 Device Diagnostics ........................246 Chapter 12 Command Line Interface (CLI) Overview ............................ 249 Accessing the KSX II Using CLI ....................250 SSH Connection to the KSX II ....................
  • Page 8 Contents KSX II Local Console Interface ....................264 Security and Authentication ....................... 264 Available Resolutions......................... 265 Port Access Page (Local Console Server Display) ..............265 Accessing a Target Server ......................265 Scanning Ports - Local Console ....................266 Local Port Scan Mode ..................... 267 Local Console Smart Card Access ....................
  • Page 9 Contents Smart Card Readers ........................311 Smart Card Minimum System Requirements ..............311 Supported and Unsupported Smart Card Readers ..............312 Emergency Connectivity ......................314 Supported Remote Connections ....................314 KSX II Supported Keyboard Languages ..................315 TCP and UDP Ports Used ......................316 KVM Properties ..........................
  • Page 10 Contents SUSE/VESA Video Modes ......................341 CIMs ............................341 Windows 3-Button Mouse on Linux Targets ..............341 Smart Card Reader Not Detected when Using a DVM-DP CIM ........342 Virtual Media ..........................342 Dell OptiPlex and Dimension Computers ................ 342 Accessing Virtual Media on a Windows 2000 ..............
  • Page 11: Chapter 1 Introduction

    Chapter 1 Introduction In This Chapter KSX II Overview ..................2 What's New in Help ................... 4 KSX II Help ....................4 KSX II Client Applications ................5 Virtual Media ....................6 Product Photos ..................6 Product Features ..................7 External Product Overview ................
  • Page 12: Ksx Ii Overview

    Chapter 1: Introduction KSX II Overview Raritan's Dominion KSX II is an enterprise-class, secure digital device that provides a single integrated solution for remote KVM (keyboard, video, mouse) server access and serial device management, as well as power control from anywhere in the world from a web browser. At the rack, the KSX II provides control of all KVM server and serial targets from a single keyboard, monitor, and mouse.
  • Page 13 Chapter 1: Introduction Diagram key Cat5 cable Rack PDU (power strip) Computer Interface Local and remote smart Module (CIM) card access ® KSX II Mobile access via iPhone ® and iPad using CC-SG Remote KVM and serial Local access devices Modem access IP LAN/WAN Remote (network)
  • Page 14: What's New In Help

    See the KSX II release notes for important information on the current release before you begin using the KSX II. A PDF version of the help can be downloaded from the Raritan Firmware and Documentation page on the Raritan website. Raritan recommends that you refer to the Raritan website for the most up-to-date user guides available.
  • Page 15: Related Documentation

    Chapter 1: Introduction Related Documentation The KSX II help is accompanied by the KSX II Quick Setup Guide, which can be found on the Raritan Firmware and Documentation page of Raritan's website (http://www.raritan.com/support/firmware-and- documentation). Installation requirements and instructions for client applications used with the KSX II can be found in the KVM and Serial Access Clients Guide, also found on the Raritan website.
  • Page 16: Virtual Media

    Chapter 1: Introduction Virtual Media All KSX II models support virtual media. The benefits of virtual media - mounting of remote drives/media on the target server to support software installation and diagnostics - are now available in all of the KSX II models.
  • Page 17: Product Features

    Chapter 1: Introduction Product Features Hardware  KVM and serial remote access over IP  1U rack-mountable; brackets included  DKSX2-144 - 4 serial/4 KVM server ports  DKSX2-188 - 8 serial/8 KVM server ports  1 KVM channel shareable by 8 users, multiple serial users. ...
  • Page 18: Software

     IPv4 and IPv6 support  Power control associated directly with servers to prevent mistakes  Integration with Raritan's CommandCenter Secure Gateway (CC- SG) management unit  CC Unmanage feature to remove the device from CC-SG control External Product Overview The following diagram indicates the external components of the KSX II.
  • Page 19 Chapter 1: Introduction Item Description USB port Remote indicator light LAN1 and LAN2 indicator lights Power indicator light...
  • Page 20 Chapter 1: Introduction Item Description AC power cord plug Power Control (on page 173) for additional information. Power on/off switch LAN 3 port Note: The LAN 3 port is reserved for future use. LAN1 and LAN2 ports Step 3: Connect the Equipment (on page 25) for additional information.
  • Page 21: Terminology

    Chapter 1: Introduction Terminology This manual uses the following terminology for the components of a typical KSX II configuration:...
  • Page 22 Chapter 1: Introduction Diagram key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) KSX II Local Access Console Local User - an optional user console (consisting of a keyboard, mouse, and multi-sync VGA monitor) attached directly to the KSX II to control KVM target servers and serial targets locally (directly at the rack, not through the network).
  • Page 23: Package Contents

    KSX II. Routers Dominion PX Rack PDU (Power Strip) Raritan rack PDUs accessed remotely via the KSX II. Package Contents Each KSX II ships as a fully-configured stand-alone product in a standard 1U 19" rackmount chassis. Each KSX II device ships with the...
  • Page 24: Chapter 2 Installation And Configuration

    Passwords are case sensitive and must be entered in the exact case combination in which they were created. For example, the default password raritan must be entered entirely in lowercase letters. The first time you start the KSX II, you are required to change the default password.
  • Page 25: Getting Started

    Chapter 2: Installation and Configuration Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that are accessed and controlled via the KSX II. Before installing the KSX II, configure all KVM target servers to ensure optimum performance. This configuration applies only to KVM target servers, not to the client workstations (remote PCs) used to access the KSX II remotely.
  • Page 26 Chapter 2: Installation and Configuration Windows XP, Windows 2003 and Windows 2008 Settings ® To configure KVM target servers running Windows XP ® ® Windows 2003 and Windows 2008 1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b.
  • Page 27 Chapter 2: Installation and Configuration Windows 7 and Windows Vista Settings To configure KVM target servers running Windows Vista ® operating system: 1. Configure the mouse settings: a. Choose Start > Settings > Control Panel > Mouse. b. Select "Advanced system settings" from the left navigation panel. The System Properties dialog opens.
  • Page 28 Chapter 2: Installation and Configuration  Set the mouse motion speed setting to exactly the middle speed.  Disable the "Enhanced pointer precision" option.  Click OK. 2. Disable animation and fade effects: a. Select Control Panel > System and Security. b.
  • Page 29 Chapter 2: Installation and Configuration  Deselect the "Use the following transition effect for menus and tooltips" option. 3. Click OK and close the Control Panel. Linux Settings (for Standard Mouse Mode) Note: The following settings are optimized for Standard Mouse mode only.
  • Page 30 Chapter 2: Installation and Configuration SUSE Linux 10.1 Settings ® Note: Do not attempt to synchronize the mouse at the SUSE Linux login prompt. You must be connected to the target server to synchronize the mouse cursors. To configure the mouse settings: 1.
  • Page 31 Chapter 2: Installation and Configuration Tip: If you do not want to be prompted upon log out, follow these procedures instead. To make your settings permanent in Linux (no prompt): 1. Choose Desktop > Control Center > System > Sessions. 2.
  • Page 32 2. Issue the following command to change the output resolution: setenv output-device screen:r1024x768x70 3. Issue the boot command to reboot the server. You can also contact your Raritan representative to purchase a video output adapter: If you have: Use this video output adapter:...
  • Page 33 Chapter 2: Installation and Configuration 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click. 2. Choose Tools > Terminal. A terminal window opens. (It is best to be at the root to issue commands.) Video Settings (POST) Sun systems have two different resolution settings: a POST resolution and a GUI resolution.
  • Page 34: Step 2: Configure Network Firewall Settings

    Chapter 2: Installation and Configuration IBM AIX 5.3 Settings ™ ® Follow these steps to configure KVM target servers running IBM 5.3. To configure the mouse: 1. Go to Launcher. 2. Choose Style Manager. 3. Click Mouse. The Style Manager - Mouse dialog appears. 4.
  • Page 35: Step 3: Connect The Equipment

    Chapter 2: Installation and Configuration To take advantage of the KSX II: The firewall must allow inbound communication on: Web-access capabilities Port 443 - standard TCP port for HTTPS communication Automatic redirection of HTTP Port 80 - standard TCP port for requests to HTTPS HTTP communication (so the more common...
  • Page 36 LAN2 will be enabled using the same IP address. Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends that you either not monitor the failover port or monitor it only after a failover occurs.
  • Page 37 Chapter 2: Installation and Configuration Connection Description Mouse Attach either a standard PS/2 mouse to the Mini-DIN6 (female) mouse port or a standard USB mouse to one of the USB Type A (female) ports. You can use the Local Admin port to connect the KSX II directly to a workstation to manage your serial targets and configure the system with a terminal emulation program such as HyperTerminal.
  • Page 38 Chapter 2: Installation and Configuration E. Rack PDU (Power Strip) To connect the Dominion PX to the KSX II: 1. Plug one end of a Cat5 cable into the Serial port on the front of the Dominion PX. 2. Connect the other end of the Cat5 cable to either the Power Ctrl. 1 or Power Ctrl.
  • Page 39 Chapter 2: Installation and Configuration Diagram key KSX II PX serial port KSX II Power Cat5 cable Ctrl. 1 Port or Power Ctrl. 2 Port F. Serial Target Ports To connect a serial target to the KSX II, use a Cat5 cable with an appropriate serial adapter.
  • Page 40: Step 4: Configure The Ksx Ii

    1. Once the unit has booted, enter the default username (admin) and password (raritan). Click Login. 2. Enter the old password (raritan), enter a new password and then enter the new password again. Passwords can be up to 64 characters in length and can consist of English, alphanumeric and...
  • Page 41 Chapter 2: Installation and Configuration Note: The default password can also be changed from the Raritan Multi- Platform Client (MPC). For more information, refer to Changing a Password. Assigning an IP Address These procedures describe how to assign an IP address on the Network Settings page.
  • Page 42 Chapter 2: Installation and Configuration c. Enter the Prefix Length. This is the number of bits used in the IPv6 address. d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present.
  • Page 43 Chapter 2: Installation and Configuration LAN Interface Settings (on page 150) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
  • Page 44 Chapter 2: Installation and Configuration Character Description Character Description Colon Configuring Direct Port Access via Telnet, IP Address or SSH The information in this topic is specific to enabling direct port access for serial targets. Use the Enable Direct Port Access via URL option on the Device Services page to enable direct port access for a KVM/serial port connected to the KSX II.
  • Page 45 Chapter 2: Installation and Configuration 3. Click OK to save this information. Once you have created the direct port access, it can be connected in a client application such as PuTTY. Following is an example of how the direct port access information would appear in PuTTY. Note that PuTTY is not the only client application that can be used.
  • Page 46 CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide to proceed (all found on Raritan's website, www.raritan.com, under Support). Note: The remainder of this help applies primarily to deploying the KSX II device(s) without the integration functionality of CC-SG.
  • Page 47: Step 5: Launch The Ksx Ii Remote Console

    Chapter 2: Installation and Configuration Create User Groups and Users As part of the initial configuration, you must define user groups and users in order for users to access the KSX II. The KSX II uses system-supplied default user groups and allows you to create groups and specify the appropriate permissions to suit your needs.
  • Page 48: Step 6: Configure The Keyboard Language (Optional)

    Del key on your keyboard. The Caps Lock light starts to blink, indicating that the CIM is in Layout Code Change mode. The text window displays: Raritan Computer, Inc. Current keyboard layout code = 22h (US5 UNIX). 3. Type the layout code desired (for example, 31 for the Japanese keyboard).
  • Page 49 Chapter 2: Installation and Configuration 6. Verify that the characters are correct.
  • Page 50: Chapter 3 Working With Target Servers

    Virtual KVM Client (VKC) ................. 56 Active KVM Client (AKC) ................. 87 Multi-Platform Client (MPC) ..............90 Raritan Serial Console (RSC)..............91 Interfaces There are several interfaces in the KSX II providing you with easy access any time, anywhere. The following table identifies these interfaces and...
  • Page 51: Ksx Ii Local Console: Ksx Ii Devices

    Active KVM Client (AKC) (on page 87)  Multi-Platform Client (MPC) (on page 90)  Raritan Serial Console (RSC) (on page 91)  Command Line Interface (CLI) (on page 248) KSX II Local Console: KSX II Devices When you are located at the server rack, the KSX II provides standard KVM management and administration via the KSX II Local Console.
  • Page 52: Ksx Ii Remote Console Interface

    Chapter 3: Working with Target Servers KSX II Remote Console Interface The KSX II Remote Console is a browser-based graphical user interface that allows you to log in to KVM target servers and serial targets connected to the KSX II and to remotely administer the KSX II. The KSX II Remote Console provides a digital connection to your connected KVM target servers.
  • Page 53 4. Type your user name and password. If this is the first time logging in, log in with the factory default user name (admin) and password (raritan, all lower case). You will be prompted to change the default password. Click Login.
  • Page 54 Chapter 3: Working with Target Servers Interface and Navigation KSX II Interface Both the KSX II Remote Console and the KSX II Local Console interfaces provide a web-based interface for device configuration and administration, as well as target server list and selection. The options are organized into various tabs.
  • Page 55 Chapter 3: Working with Target Servers Left Panel The left panel of the KSX II interface contains the following information. Note that some information is conditional - meaning it is displayed if you are a certain of user, are using certain features, and so on. Conditional information is noted here.
  • Page 56 Chapter 3: Working with Target Servers Information Description When displayed? Connected Users The users, identified by Always their username and IP address, who are currently connected to the KSX II Online Help - User Links to online help Always Guide Favorite Devices Managing Favorites Always...
  • Page 57 Chapter 3: Working with Target Servers Port Access Page (Remote Console Display) After successfully logging on to the KSX II remote console, the View by Port tab on the Port Access page appears. This page lists all of the KSX II ports, and the target servers, port groups, and blade chassis that are connected to those ports.
  • Page 58 Chapter 3: Working with Target Servers 2. Click Connect. Once you are connected to a target or dual monitor target server, click on the port group name and then click Disconnect to disconnect. Port Action Menu (on page 49) for details on additional available menu options.
  • Page 59 Chapter 3: Working with Target Servers Set Scan Tab The port scanning feature is accessed from the Set Scan tab on the Port Access page. The feature allows you to define a set of targets to be scanned. Thumbnail views of the scanned targets are also available. Select a thumbnail to open that target in its Virtual KVM Client window.
  • Page 60 Chapter 3: Working with Target Servers  Power On - Powers on the target server through the associated outlet. This option is visible only when there are one or more power associations to the target, and when the user has permission to operate this service.
  • Page 61 Chapter 3: Working with Target Servers Using Scan Options Following are options available to you while scanning targets. With the exception of the Expand/Collapse icon, all of these options are selected from the Options menu in the upper left of the Port Scan viewer. The options will return to their defaults when you close the window.
  • Page 62 Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: ...
  • Page 63 Discover Devices - Local Subnet Discover Raritan devices on the client PC's local subnet. Discover Devices - KSX II Subnet Discover the Raritan devices on the KSX II device subnet. Add New Device to Favorites Add, edit, and delete devices from your list of Favorites.
  • Page 64 This feature allows multiple KSX II devices to interoperate and scale automatically. The KSX II Remote Console automatically discovers the KSX II devices, and any other Raritan device, in the subnet of the KSX II. To discover devices on the device subnet: 1.
  • Page 65: Proxy Server Configuration For Use With Mpc, Vkc And Akc

    Chapter 3: Working with Target Servers To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate KSX II device. 2. Click Edit. The Edit page appears. 3. Update the fields as necessary:  Description ...
  • Page 66: Virtual Kvm Client (Vkc)

    -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 - XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true - DsocksProxyHost=192.168.99.99 -DsocksProxyPort=1080 - classpath .\sdeploy.jar;.\sFoxtrot.jar;.\jaws.jar;.\sMpc.jar com.raritan.rrc.ui.RRCApplication %1 Virtual KVM Client (VKC) Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help.
  • Page 67: About The Virtual Kvm Client

    Chapter 3: Working with Target Servers About the Virtual KVM Client Whenever you access a target server using the Remote Console, a Virtual KVM Client (VKC) window opens. There is one Virtual KVM Client for each target server connected. These windows can be accessed via ®...
  • Page 68 Chapter 3: Working with Target Servers Button Button name Description Note: Not available in KX II-101-V2. Target Click to take a screenshot of the target server Screenshot and save it to a file of your choosing. Audio Opens a dialog that allows you to select from a list of audio devices connected to a client PC.
  • Page 69 Chapter 3: Working with Target Servers Button Button name Description Scaling Increases or reduces the target video size so you can view the entire contents of the target server window without using the scroll bar. Icon Icon name Description Speaker Located in status bar at the bottom of the client window.
  • Page 70: Switching Between Kvm Target Servers

    Chapter 3: Working with Target Servers Switching Between KVM Target Servers With the KSX II, you can access several KVM target servers. The KSX II provides the ability to switch from one target server to another. Note: This feature is available in the KSX II Remote Console only. To switch between KVM target servers: 1.
  • Page 71: Disconnecting Kvm Target Servers

    Chapter 3: Working with Target Servers Disconnecting KVM Target Servers Note: This item is not available on the KSX II Local Console. The only way to disconnect from the switched target in the Local Console is to use the hot key. To disconnect a target server: ...
  • Page 72: Connection Properties

    Chapter 3: Working with Target Servers Connection Properties The dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
  • Page 73 Chapter 3: Working with Target Servers 3. Choose the Color Depth from the drop-down list. The device can dynamically adapt the color depth transmitted to remote users in order to maximize usability in all bandwidths.  15-bit RGB Color  8-bit RGB Color ...
  • Page 74: Connection Information

    Chapter 3: Working with Target Servers Connection Information To obtain information about your Virtual KVM Client connection:  Choose Connection > Info... The Connection Info window opens. The following information is displayed about the current connection:  Device Name - The name of the device. ...
  • Page 75 Chapter 3: Working with Target Servers Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC). Macros exported from MPC or VKC cannot be imported into AKC. Note: KX II-101 does not support AKC. To import macros: 1.
  • Page 76 Chapter 3: Working with Target Servers The macros are then imported. If a macro is imported that contains a hot key that already exists, the hot key for the imported macro is discarded. To export macros: 1. Choose Tools > Export Macros to open the Select Keyboard Macros to Export dialog.
  • Page 77 Chapter 3: Working with Target Servers 4. Select the folder to save the macro file to, enter a name for the file and click Save. If the macro already exists, you receive an alert message. Select Yes to overwrite the existing macro or No to close the alert without overwriting the macro.
  • Page 78 Chapter 3: Working with Target Servers Release Left Alt 6. Review the Macro Sequence field to be sure the macro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step and then click the up or down arrow buttons to reorder them as needed.
  • Page 79 Chapter 3: Working with Target Servers Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu.
  • Page 80: Video Properties

    Chapter 3: Working with Target Servers 4. Exit the menu to return to normal CIM functionality. Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways: ...
  • Page 81 Chapter 3: Working with Target Servers Calibrating Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The color settings are on a target server-basis. Note: The Calibrate Color command applies to the current connection only.
  • Page 82 Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor.
  • Page 83 Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
  • Page 84 Chapter 3: Working with Target Servers Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot from Target server command. If needed, save this screenshot to a file location of your choosing as a bitmap, JPEG or PNG file.
  • Page 85: Mouse Options

    Chapter 3: Working with Target Servers Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and you are accessing the target through MPC or VKC, you may need to change the maximum refresh rate of the monitor in order for the refresh rate to take effect on the target.
  • Page 86 Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
  • Page 87 Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place.  Do not use an animated mouse.
  • Page 88 To be sure to avoid any problems with this function, Raritan recommends you do not have file icons or folder icons in the upper left corner of your desktop.
  • Page 89 Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed.
  • Page 90: Vkc Virtual Media

    Chapter 3: Working with Target Servers 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mode: 1. Press Ctrl+Alt+O on your keyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media (on page 97) for complete information about setting up and using virtual media.
  • Page 91: Smart Cards

    Chapter 3: Working with Target Servers Smart Cards When accessing a server remotely, you can select an attached smart card reader and mount it onto the server. Smart card authentication is used with the target server, it is not used to log into the device. Therefore, changes to smart card PIN and credentials do not require updates to device accounts.
  • Page 92: Tool Options

    Chapter 3: Working with Target Servers To update the smart card in the Select Smart Card Reader dialog:  Click Refresh List if a new smart card reader has been attached to the client PC. To send smart card remove and reinsert notifications to the target: ...
  • Page 93 Chapter 3: Working with Target Servers 2. Select the Enable Logging checkbox only if directed to by Technical Support. This option creates a log file in your home directory. 3. Choose the Keyboard Type from the drop-down list (if necessary). The options include: ...
  • Page 94 Turkish Keyboards If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
  • Page 95 Chapter 3: Working with Target Servers Language Configuration method Portuguese System Settings (Control Center) Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. Client Launch Settings KSX II users can configure client launch settings that allow you to define the screen settings for a KVM session.
  • Page 96 Chapter 3: Working with Target Servers Configure Scan Settings in VKC and AKC The KSX II provides a port scanning feature that searches for selected targets and displays them in a slide show view, allowing you to monitor up to 32 targets at one time. You can connect to targets or focus on a specific target as needed.
  • Page 97: View Options

    (if needed). Active KVM Client (AKC) Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help.
  • Page 98: Overview

    AKC is based on Microsoft Windows .NET technology and allows you to run the client in Windows environments without the use of the Java Runtime Environment (JRE), which is required to run Raritan's Virtual KVM Client (VKC) and Multi-Platform Client (MPC). AKC also works with CC-SG.
  • Page 99: Prerequisites For Using Akc

    .NET installed, you will receive a message instructing you to check the .NET version. ® Note: Raritan recommends Windows XP operating system users verify you have a working version of .NET 3.5 or 4.0 already installed before you launch AKC.
  • Page 100: Multi-Platform Client (Mpc)

    1. To open MPC from a client running any supported browser, type http://IP-ADDRESS/mpc into the address line, where IP-ADDRESS is the IP address of your Raritan device. MPC opens in a new window. Note: The Alt+Tab command toggles between windows only on the local system.
  • Page 101: Raritan Serial Console (Rsc)

    3. If you're using Dominion DSX:  Click Yes. A Warning - Security pop-up screen appears.  Click Yes to access the Raritan Serial Console from the Port page. Note: If you click Always, you will not receive the security page for future access.
  • Page 102 Chapter 3: Working with Target Servers Note: Download the standalone Raritan Serial Console from the Raritan website (www.raritan.com) on the Support page. ® To open RSC from the Windows desktop: 1. Double-click the shortcut or use the Start menu to open the standalone RSC.
  • Page 103: Chapter 4 Rack Pdu (Power Strip) Outlet Control

    Turning Outlets On/Off and Cycling Power ..........94 Overview The KSX II allows you to control Raritan PX and RPC series rack PDU (power strip) outlets. Once a PX or RPC series is setup and then attached to the KSX II, the rack PDU and its outlets can be controlled from the Powerstrip page in the KSX II interface.
  • Page 104: Turning Outlets On/Off And Cycling Power

    Chapter 4: Rack PDU (Power Strip) Outlet Control Initially, when you open the Powerstrip page, the power strips that are currently connected to the KSX II are displayed in the Powerstrip drop- down. Additionally, information relating to the currently selected power strip is displayed.
  • Page 105 Chapter 4: Rack PDU (Power Strip) Outlet Control 5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its state will be displayed as 'on'. To turn an outlet off: 1. Click Off. 2.
  • Page 106 Chapter 4: Rack PDU (Power Strip) Outlet Control 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog.
  • Page 107: Chapter 5 Virtual Media

    Chapter 5 Virtual Media In This Chapter Overview ....................98 Prerequisites for Using Virtual Media ............ 100 Virtual Media in a Windows XP Environment ........101 Virtual Media in a Linux Environment ............ 102 Virtual Media in a Mac Environment ............104 Virtual Media via VKC and AKC in a Windows Environment ....
  • Page 108: Overview

    Internal and USB-mounted CD and DVD drives  USB mass storage devices  PC hard drives  ISO images (disk images)  Digital audio devices* Note: ISO9660 is the standard supported by Raritan. However, other ISO standards can be used.
  • Page 109 Chapter 5: Virtual Media Diagram key Desktop PC USB mass storage device KSX II PC hard drive Audio speakers Target server Remote file server (ISO images) CD/DVD drive...
  • Page 110: Prerequisites For Using Virtual Media

    Chapter 5: Virtual Media Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session.
  • Page 111: Virtual Media In A Windows Xp Environment

    Chapter 5: Virtual Media Virtual Media in a Windows XP Environment If you are running the Virtual KVM Client or Active KVM Client in a ® Windows XP environment, users must have Administrator privileges to access any virtual media type other than CD-ROM connections, ISOs and ISO images.
  • Page 112: Virtual Media In A Linux Environment

    Chapter 5: Virtual Media Virtual Media in a Linux Environment ® Following is important information for Linux users regarding using virtual media. Root User Permission Requirement Your virtual media connection can be closed if you mount a CD ROM from a Linux client to a target and then unmount the CD ROM. The connection also closes when a floppy drive has been mounted and then a floppy disk is removed.
  • Page 113 Chapter 5: Virtual Media guest_user@administrator-desktop:~$ getfacl -a /dev/sr0 getfacl: Removing leading '/' from absolute path names # file: dev/sr0 # owner: root # group: cdrom user::rw- user:guest_user:rw- group::rw- mask::rw- other::--- A similar check of the permissions for a removable device shows: guest_user@administrator-desktop:~$ ls -l /dev/sdb1 brw-rw---- 1 root disk 8, 17 12-03-2010 12:02 /dev/sdb1 guest_user@administrator-desktop:~$ ls -l /dev/sdb1...
  • Page 114: Virtual Media In A Mac Environment

    Chapter 5: Virtual Media Virtual Media in a Mac Environment KX II 2.4.0 (and later), KSX II 2.5.0 (and later) and LX 2.4.5 (and later) support virtual media in a Linux environment. Following is important information for Mac ® users regarding using virtual media. Active System Partitions ...
  • Page 115: Virtual Media Via Vkc And Akc In A Windows Environment

    Chapter 5: Virtual Media Virtual Media via VKC and AKC in a Windows Environment Windows XP ® operating system administrator and standard user ® privileges vary from those of the Windows Vista operating system and ® the Windows 7 operating system. When enabled in Vista or Windows 7, User Access Control (UAC) provides the lowest level of rights and privileges a user needs for an application.
  • Page 116: Conditions When Read/Write Is Not Available

    Chapter 5: Virtual Media Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations:  For Linux ® and Mac ® clients  For all hard drives  When the drive is write-protected  When the user does not have Read/Write permission: ...
  • Page 117 (see "Virtual Media File Server Setup (File Server ISO Images Only)" on page 108). Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. 3. Open a KVM session with the appropriate target server.
  • Page 118: Virtual Media File Server Setup (File Server Iso Images Only)

    Note: This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. Note: SMB/CIFS support is required on the file server.
  • Page 119 Chapter 5: Virtual Media Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of third-party software used by the LX, KX, KSX or KX101 G2 device. ® Note: If you are connecting to a Windows 2003 server and attempt to load an ISO image from the server, you may receive an error stating "Virtual Media mounting on port failed.
  • Page 120: Connecting To Virtual Media

    Chapter 5: Virtual Media Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives.
  • Page 121: Conditions When Read/Write Is Not Available

    Port Permission VM Access is set to Read-Only or Deny CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1.
  • Page 122: Disconnecting Virtual Media

    Chapter 5: Virtual Media 4. For remote ISO images on a file server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Image from the drop-down list. The file servers and image paths available are those that you configured using the File Server Setup page.
  • Page 123: Chapter 6 Usb Profiles

    BIOS profile may be more appropriate. Should none of the standard USB profiles provided by Raritan work with a given KVM target, please contact Raritan Technical Support for...
  • Page 124: Cim Compatibility

    The current release of the KSX II comes with the selection of USB profiles described in the following table. New profiles are included with each firmware upgrade provided by Raritan. As new profiles are added, they will be documented in the help.
  • Page 125 Chapter 6: USB Profiles USB profile Description media Restrictions:  USB bus speed limited to full- speed (12 MBit/s)  No virtual media support BIOS Dell Optiplex 790 Use this profile for Dell Optiplex 790 during BIOS operations. Warning:  USB enumeration will trigger whenever Virtual Media is connected or disconnected...
  • Page 126 Chapter 6: USB Profiles USB profile Description BIOS DellPowerEdge Dell PowerEdge BIOS Access Keyboard and Mouse Only (Keyboard and Mouse Only) Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB. When using the new D2CIM-DVUSB, use 'Generic' profile.
  • Page 127 Chapter 6: USB Profiles USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Restrictions:  USB bus speed limited to full- speed (12 MBit/s) ...
  • Page 128 Chapter 6: USB Profiles USB profile Description Module D2CIM-DVUSB is connected to the Advanced Management Module. Restrictions:  Virtual CD-ROM and disk drives cannot be used simultaneously BIOS Lenovo ThinkPad T61 BIOS Lenovo ThinkPad T61 and X61 & X61 (boot from virtual media) Use this profile to boot the T61 and X61 series laptops from virtual media.
  • Page 129 Chapter 6: USB Profiles USB profile Description Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server when installing Windows 2003 Server without the help of HP SmartStart CD. Restrictions:  USB bus speed limited to full- speed (12 MBit/s) ®...
  • Page 130 Chapter 6: USB Profiles USB profile Description Restrictions:  Virtual CD-ROM and disk drives cannot be used simultaneously Suse 9.2 SuSE Linux 9.2 Use this for SuSE Linux 9.2 distribution. Restrictions:  Absolute mouse synchronization™ not supported  USB bus speed limited to full- speed (12 MBit/s) Troubleshooting 1 Troubleshooting Profile 1...
  • Page 131 Chapter 6: USB Profiles USB profile Description  Virtual CD-ROM and disk drives cannot be used simultaneously WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Use Full Speed for Virtual Use Full Speed for virtual media CIM Media CIM This profile resembles the behavior of the original KX2 release with Full...
  • Page 132: Selecting Profiles For A Kvm Port

    Chapter 6: USB Profiles Selecting Profiles for a KVM Port The KSX II comes with a set of USB profiles that you can assign to a KVM port based on the characteristics of the KVM target server it connects to. You assign USB profiles to a KVM port in the Device Settings >...
  • Page 133: Chapter 7 User Management

    Chapter 7 User Management In This Chapter User Groups ..................123 Users ..................... 130 Authentication Settings ................134 Changing a Password ................146 User Groups The KSX II stores an internal list of all user and group names to determine access authorization and permissions. This information is stored internally in an encrypted format.
  • Page 134: User Group List

    Chapter 7: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group.
  • Page 135 Chapter 7: User Management 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the checkboxes next to the permissions you want to assign to all of the users belonging to this group. See Setting Permissions.See Permissions (on page 126).
  • Page 136 Chapter 7: User Management 4. Click OK. Permissions Important: Selecting the User Management checkbox allows the members of the group to change the permissions of all users, including their own. Carefully consider granting these permissions. Permission Description Device Access Allows users and user groups with this While Under CC- permission to directly access the KSX II using SG Management...
  • Page 137 Chapter 7: User Management Port Permissions For each server port, you can specify the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setting for all permissions is Deny. Port access Option Description...
  • Page 138 Chapter 7: User Management This feature limits access to the KSX II device by users in the selected group to specific IP addresses. This feature applies only to users belonging to a specific group, unlike the IP Access Control List feature that applies to all access attempts to the device, is processed first, and takes priority.
  • Page 139: Modifying An Existing User Group

    Chapter 7: User Management 2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number. To delete a rule: 1.
  • Page 140: Users

    Chapter 7: User Management automatically assigned to the <unknown> user group. Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Choose a group from among those listed by checking the checkbox to the left of the Group Name.
  • Page 141: View Ksx Ii User List

    Chapter 7: User Management  ; semicolon  $ dollar sign  & and sign  ½ pipe symbol 6. Choose the group from the User Group drop-down list. The list contains all groups you have created in addition to the system- supplied default groups (<Unknown>...
  • Page 142: View Users By Port

    Chapter 7: User Management View Users by Port The User By Ports page lists all authenticated local and remote users and ports they are being connected to. Only permanent connections to ports are listed. Ports being accessed when scanning for ports are not listed.
  • Page 143: Logging Users Off The Ksx Ii (Force Logoff)

    Chapter 7: User Management Logging Users Off the KSX II (Force Logoff) If you are an administrator, you are able to log off any authenticated user who is logged on to the KSX II. Users can also be disconnected at the port level.
  • Page 144: Authentication Settings

    Chapter 7: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed.
  • Page 145: Implementing Ldap/Ldaps Remote Authentication

    Chapter 7: User Management Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (through the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn.
  • Page 146 LDAP database you want to begin searching for user information. Up to 64 characters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com. Consult your authentication server administrator for the appropriate values to enter into these fields.
  • Page 147 Chapter 7: User Management 13. Select the Enable Secure LDAP checkbox if you would like to use SSL. This will enable the Enable LDAPS Server Certificate Validation checkbox. Secure Sockets Layer (SSL) is a cryptographic protocol that allows KSX II to communicate securely with the LDAP/LDAPS server.
  • Page 148: Returning User Group Information From Active Directory Server

    KSX II policies and user group privileges that are applied locally to AD user groups. IMPORTANT: If you are an existing Raritan, Inc. customer, and have already configured the Active Directory server by changing the AD schema, the KSX II still supports this configuration and you do not need to perform the following operations.
  • Page 149: Implementing Radius Remote Authentication

    Chapter 7: User Management 4. From the KSX II, enable and configure your AD server properly. See Implementing LDAP/LDAPS Remote Authentication. Important Notes  Group Name is case sensitive.  The KSX II provides the following default groups that cannot be changed or deleted: Admin and <Unknown>.
  • Page 150 Chapter 7: User Management The timeout is the length of time the KSX II waits for a response from the RADIUS server before sending another authentication request. 9. The default number of retries is 3 Retries. This is the number of times the KSX II will send an authentication request to the RADIUS server.
  • Page 151 Chapter 7: User Management  CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PAP.
  • Page 152  RADIUS Attribute: Filter-ID  Attribute Type: String  Attribute Value: Raritan:G{KVM_Admin} (where KVM_Admin is group name created locally on Dominion KVM Switch). Case sensitive.  Configure Session Conditions (Date and Time) (Required) - Policy Elements > Session Conditions > Date and Time ...
  • Page 153: Returning User Group Information Via Radius

    Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
  • Page 154 Chapter 7: User Management Attribute Data Log out Accounting-Request(4) Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-Port (5) Always 0. NAS-IP-Address (4) The IP address for the KSX II. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting.
  • Page 155: User Authentication Process

    Chapter 7: User Management User Authentication Process Remote authentication follows the process specified in the flowchart below:...
  • Page 156: Changing A Password

    Chapter 7: User Management Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
  • Page 157: Chapter 8 Device Management

    Chapter 8 Device Management In This Chapter Network Settings ................... 147 Device Services ..................152 Configuring Modem Settings ..............160 Configuring Date/Time Settings ............161 Event Management ................162 Configuring Ports ................... 171 Connect and Disconnect Scripts ............202 Port Keywords ..................208 Port Group Management ...............
  • Page 158: Network Basic Settings

    Chapter 8: Device Management Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings (on page 147). To assign an IP address: 1.
  • Page 159 Chapter 8: Device Management d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present. Read-Only Zone ID. This identifies the device with which the address is associated.
  • Page 160: Lan Interface Settings

    Chapter 8: Device Management LAN Interface Settings (on page 150) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
  • Page 161 Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends that you not monitor the port or monitor it only after a failover occurs. When this option is enabled, the following two fields are used: ...
  • Page 162: Device Services

    Chapter 8: Device Management Device Services The Device Services page allows you to configure the following functions:  Enabling Telnet  Enabling SSH access  Configuring HTTP and HTTPs port settings  Enabling Serial Console Access  Configuring the discovery port access ...
  • Page 163: Http And Https Port Settings

    Chapter 8: Device Management HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KSX II. For example, if you are using the default HTTP port 80 for another purpose, changing the port will ensure the device does not attempt to use it.
  • Page 164: Enabling Direct Port Access Via Url

    Chapter 8: Device Management Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Login dialog and Port Access page. This feature also provides the ability to enter a username and password directly and proceed to the target if the username and password is not contained in the URL.
  • Page 165: Configuring Direct Port Access Via Telnet, Ip Address Or Ssh

    Chapter 8: Device Management Configuring Direct Port Access via Telnet, IP Address or SSH The information in this topic is specific to enabling direct port access for serial targets. Use the Enable Direct Port Access via URL option on the Device Services page to enable direct port access for a KVM/serial port connected to the KSX II.
  • Page 166 Chapter 8: Device Management 3. Click OK to save this information. Once you have created the direct port access, it can be connected in a client application such as PuTTY. Following is an example of how the direct port access information would appear in PuTTY. Note that PuTTY is not the only client application that can be used.
  • Page 167: Enabling The Akc Download Server Certificate Validation

    Chapter 8: Device Management Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Note: When operating in IPv4 and IPv6 dual stack mode with 'Enable ®...
  • Page 168: Configuring Snmp Agents

    Chapter 8: Device Management 5. After the certificate is installed, the KSX II IP address should be removed from the Trusted Site zone. To enable AKC download server certificate validation: 1. Choose Device Settings > Device Services. The Device Service Settings page opens.
  • Page 169 Chapter 8: Device Management b. Community Type - grant either Read-Only or Read-Write access to the community users Note: An SNMP community is the group to which devices and management stations running SNMP belong. It helps define where information is sent. The community name is used to identify the group.
  • Page 170: Configuring Modem Settings

    Chapter 8: Device Management Configure SNMP traps on the Event Management - Settings page, which can be quickly accessed by clicking the SNMP Trap Configuration link. Configuring SNMP Traps (on page 163)for information on creating SNMP traps and List of KSX II SNMP Traps (on page 165) for a list of available KSX II SNMP traps.
  • Page 171: Configuring Date/Time Settings

    Chapter 8: Device Management Note: The PPP server IP address and PPP Client IP address must be different and cannot conflict with the network addresses used by the server or the client. 5. Check Enable Modem Dialback, if needed. Note: If dial-back is enabled, each user accessing the KSX II via modem must have a call-back number defined in their profile.
  • Page 172: Event Management

    Chapter 8: Device Management  User Specified Time - Choose this option to input the date and time manually. For the User Specified Time option, enter the date and time. For the time, use the hh:mm format (using a 24- hour clock).
  • Page 173: Configuring Snmp Traps

    Chapter 8: Device Management Configuring SNMP Traps Simple Network Management Protocol (SNMP) is a protocol governing network management and the monitoring of network devices and their functions. SNMP traps are sent out over a network to gather information. The traps are configured on the Event Management - Settings page. See List of KSX II SNMP Traps (on page 165) for a list of KSX II SNMP traps.
  • Page 174 Chapter 8: Device Management b. Port Number - the port number used by the SNMP manager c. Security Name - the username or service account name of the entity communicating with the SNMP agent (up to 32 characters) d. Authentication Protocol - the MD5 or SHA authentication protocol used by the SNMP v3 agent e.
  • Page 175 Chapter 8: Device Management Note: If you disable SNMP settings at any time, the SNMP information is retained so you do not have to reenter if you re-enable the settings. To delete SNMP traps:  Clear all of the SNMP trap fields and save. Use the reset to factory defaults feature to remove the SNMP configuration and set the KSX II to its original factory default.
  • Page 176 Chapter 8: Device Management Trap Name Description Note: Not supported by the KX II-101 or LX. cimConnected The CIM is connected. cimDisconnected The CIM is disconnected. cimUpdateStarted The CIM update start is underway. cimUpdateCompleted The CIM update is complete. configBackup The device configuration has been backed up.
  • Page 177 Chapter 8: Device Management Trap Name Description portDisconnect A user engaging in a KVM session closes the session properly. portDisconnectv2 A KX II-101-V2 user engaging in a KVM session closes the session properly. portStatusChange The port has become unavailable. powerNotification The power outlet status notification: 1=Active, 0=Inactive.
  • Page 178 Chapter 8: Device Management Trap Name Description userModified A user account has been modified. userPasswordChanged This event is triggered if the password of any user of the device is modified. userSessionTimeout A user with an active session has experienced a session termination due to timeout.
  • Page 179 Chapter 8: Device Management Note: If you have Read-Write privileges to the MIB file, use a MIB editor to make changes to the file. SysLog Configuration To configure the Syslog (enable Syslog forwarding): 1. Select Enable Syslog Forwarding to log the device's messages to a remote Syslog server.
  • Page 180: Configuring Event Management - Destinations

    Chapter 8: Device Management Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps), or can be logged to the syslog or audit log. Use the Event Management - Destinations page to select the system events to track and where to send this information.
  • Page 181: Configuring Ports

    Chapter 8: Device Management Configuring Ports The Port Configuration page displays a list of the KSX II ports. Ports connected to KVM target servers (blades and standard servers) and rack PDUs (power strips) are displayed in blue and can be edited. For ports with no CIM connected or with a blank CIM name, a default port name of Dominion_KSX2_Port# is assigned, where Port# is the number of the KSX II physical port.
  • Page 182 Chapter 8: Device Management  DCIM - Dominion CIM  Not Available - No CIM connected  MCUTP - Master Console MCUTP, CIM in a cable  PCIM - Paragon CIM  PowerStrip (rack PDU) - Power strip connected  Dual - VM - Virtual media CIM (D2CIM-VUSB and D2CIM- DVUSB) ...
  • Page 183: Power Control

    Chapter 8: Device Management Power Control Power control is configured on the Port page. The Port page opens when you select a port that is connected to a target server from the Port Configuration page. From the Port page, you can make power associations and change the port name to something more descriptive.
  • Page 184 Assigning a Name to the PX The Port page opens when you select a port on the Port Configuration page. The port appears on this page when connected to a Raritan remote rack PDU (power strip). The Type and the Name fields are prepopulated.
  • Page 185: Target Settings

    Chapter 8: Device Management To remove a rack PDU association: 1. Select the appropriate rack PDU from the Power Strip Name drop- down list. 2. For that rack PDU, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down list, select None. 4.
  • Page 186: Configuring Blade Chassis

    Chapter 8: Device Management Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade chassis that are plugged into the KSX II device port. Up to eight blade chassis can be managed at a given time. The blade chassis must be configured as a blade chassis subtype.
  • Page 187 Blade chassis can be managed from the Virtual KVM Client (VKC), the Active KVM Client (AKC), Raritan's Multi-Platform Client (MPC), and CC- SG. Managing blade severs via VKC, AKC and MPC is the same as managing standard target servers.
  • Page 188 Chapter 8: Device Management Generic Blade Chassis Configuration The Generic Blade Chassis' selection provides only a manual configuration mode of operation. See Supported Blade Chassis Models, Supported CIMs for Blade Chassis, and Required and Recommended Blade Chassis Configurations (on page 194) for important, additional information when configuring the blade chassis.
  • Page 189 Chapter 8: Device Management 9. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon to expand the section on the page.
  • Page 190 Chapter 8: Device Management 13. Select the CIMs native, display resolution from the Display Native Resolution drop-down. This is the preferred resolution and timing mode of the digital CIM. Once a resolution is selected, it is applied to the CIM. If no selection is made, the default 1280x1024 resolution is used.
  • Page 191 Chapter 8: Device Management d. Port Number - The default port number for the blade chassis is 22. Change the port number if applicable. Required for auto- discovery mode e. Username - Enter the username used to access the blade chassis.
  • Page 192 Chapter 8: Device Management Note: Leave the username and password fields blank for DRAC, ILO, and RSA web applications or the connection will fail. e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be associated with the username and password entries.
  • Page 193 Chapter 8: Device Management 3. Indicate the blades that are installed in the blade chassis by checking the Installed checkbox next to each slot that has a blade installed. Alternatively, use the Select All checkbox. If needed, change the blade server names. 4.
  • Page 194 Chapter 8: Device Management IBM Blade Chassis Configuration See Supported Blade Chassis Models, Supported CIMs for Blade Chassis, and Required and Recommended Blade Chassis Configurations (on page 194) for important, additional information when configuring the blade chassis. See Dell Chassis Cable Lengths and Video Resolutions (on page 338) for information on cable lengths and ®...
  • Page 195 Chapter 8: Device Management 2. If you want the KSX II to auto-discover the chassis blades, select the Blade Auto-Discovery checkbox and then click Discover Blades on Chassis Now. Once the blades are discovered, they will be displayed on the page. 3.
  • Page 196 Chapter 8: Device Management e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be associated with the username and password entries. It is in these fields you should enter the field names for the username and password fields used on the login screen for the web application.
  • Page 197 Chapter 8: Device Management The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access to the URL links entered in this section of the page is governed by the blade chassis port permissions. a.
  • Page 198 Chapter 8: Device Management Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web application associated with an RSA, DRAC or ILO Processor card.
  • Page 199 Chapter 8: Device Management HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KSX II supports the aggregation of ports connected to certain types of blades into a group representing the blade chassis. Specifically, ™ ® ® ® Cisco UCS, HP BladeServer blades and Dell...
  • Page 200 Chapter 8: Device Management 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. Select the Blade Server Group checkbox. If you want to designate that these ports are attached to blades housed in a blade chassis (for example, HP c3000 or Dell PowerEdge 1855), select the Blade Server Group checkbox.
  • Page 201 Chapter 8: Device Management 3. Click OK on the warning message. Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KSX II and the corresponding profiles that should be selected per chassis model when configuring them in the KSX II application. A list of these models can be selected on the Port Configuration page from the Blade Server Chassis Model drop-down, which appears when the Blade Chassis radio button is selected.
  • Page 202 Chapter 8: Device Management Blade chassis Connection method Recommended CIM(s)  DCIM-PS2 Generic If a D2CIM-VUSB or D2CIM-DVUSB is used when connecting to a blade-chassis configured  DCIM-USBG2 as Generic, you will be able to select the USB profiles from the Port Configuration page and the client's USB Profile menu.
  • Page 203 Chapter 8: Device Management Blade chassis Connection method Recommended CIM(s)  VGA monitors with DDC support. Source: Dell Chassis Management Controller, Firmware Version 1.0, User Guide  ® BladeSystem The HP c-Class Blade SUV Cable enables you DCIM-USBG2 c3000 to perform blade chassis administration, ...
  • Page 204 M1000e  Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM. iKVM may not work correctly if this is not done.  Configure the iKVM GUI Main menu to select target blades by Slot, not by Name. iKVM may not work correctly if this is not done.
  • Page 205  Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM. iKVM may not work correctly if this is not done.  Configure the iKVM GUI Main menu to select target blades by Slot, not by Name. iKVM may not work correctly if this is not done.
  • Page 206 Chapter 8: Device Management Blade chassis Required/recommended action ® Media BladeCenter Models H and E. This requires the use of the D2CIM-DVUSB. The black D2CIM-DVUSB Low-Speed USB connector is attached to the Administrative Management Module (AMM) at the rear of the unit. The gray D2CIM-DVUSB High-Speed USB connector is attached to the Media Tray (MT) at the front of the unit.
  • Page 207: Configuring Usb Profiles (Port Page)

    Chapter 8: Device Management Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles for Port section of the Port page. The USB profiles chosen in the Port page become the profiles available to the user in VKC when connecting to a KVM target server from the port.
  • Page 208 Chapter 8: Device Management To specify a preferred USB profile: 1. After selecting the available profiles for a port, choose one from the Preferred Profile for Port menu. The default is Generic. The selected profile is used when connecting to the KVM target server. You can change to any other USB profile as necessary.
  • Page 209: Configuring Ksx Ii Local Port Settings

    Chapter 8: Device Management Configuring KSX II Local Port Settings From the Local Port Settings page, you can customize many settings for the KSX II Local Console including keyboard, hot keys, video switching delay, power save mode, local user interface resolution settings, and local user authentication.
  • Page 210 Note: If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. 5. Choose the local port hotkey. The local port hotkey is used to return to the KSX II Local Console interface when a target server interface is being viewed.
  • Page 211 Chapter 8: Device Management b. Set the amount of time (in minutes) in which Power Save Mode will be initiated. 9. Choose the resolution for the KSX II Local Console from the drop- down list. The browser will be restarted when this change is made. ...
  • Page 212: Connect And Disconnect Scripts

    Chapter 8: Device Management Connect and Disconnect Scripts The KSX II provides the ability to execute key macro scripts when connecting to or disconnecting from a target. These scripts are defined and managed on the Connection Scripts page. You can create and edit your own scripts on the Connection Script page to perform additional actions when connecting to or disconnecting from targets.
  • Page 213: Adding Scripts

    Chapter 8: Device Management 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Select All or clicking on the checkbox to the left of each target to apply the script to only select targets.
  • Page 214 Chapter 8: Device Management For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to the Script box. Next, select Letters from the Key Set drop-down and add a letter key to the script. 8.
  • Page 215 Chapter 8: Device Management...
  • Page 216: Modifying Scripts

    Chapter 8: Device Management Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connection Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to modify and click Modify. The page is then in Edit mode. 3.
  • Page 217 Chapter 8: Device Management 5. Click Import. The Configuration Scripts page opens and the imported scripts are displayed. To export a disconnect script: 1. Click Device Settings > Configuration Scripts. The Configuration Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to export and click Export.
  • Page 218: Port Keywords

    Chapter 8: Device Management Port Keywords Port keywords work as a filter. If a keyword is detected, a corresponding message be logged in a local port log and a corresponding trap will be sent via SNMP (if configured). Defining keywords guarantees that only messages that contain those keywords are logged for the local port.
  • Page 219 Chapter 8: Device Management 2. Define a keyword for the first time, by clicking the Add button on the Port Keyword List page. The Add Keyword page will then open. Follow steps 3 - 5 to create new keywords. 3. Type a keyword in the Keyword field and then click the Add button. The keyword will be added to the page directly under the Keyword field and will appear on the Port Keyword List page once OK is selected.
  • Page 220: Port Group Management

    Chapter 8: Device Management Port Group Management This function is specific to HP blade chassis configuration. See Blade Chassis Configuration (Port Group Management) (see "HP and Cisco UCS Blade Chassis Configuration (Port Group Management)" on page 189). Creating Port Groups The KSX II supports the aggregation of multiple ports into a single port group.
  • Page 221: Changing The Default Gui Language Setting

    Chapter 8: Device Management Changing the Default GUI Language Setting The KSX II GUI supports the following localized languages:  Japanese  Simplified Chinese  Traditional Chinese To change the GUI language: 1. Select Device Settings > Language. The Language Settings page opens.
  • Page 222: Chapter 9 Security Management

    From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security. Raritan web server certificates are self-signed.
  • Page 223: Login Limitations

    Chapter 9: Security Management To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can specify restrictions for single login, password aging, and the logging out idle users. Limitation Description Enable single login When selected, only one login per user name is limitation allowed at any time.
  • Page 224 Chapter 9: Security Management Limitation Description Log out idle users, Select the "Log off idle users" checkbox to After (1-365 automatically disconnect users after the amount minutes) of time you specify in the "After (1-365 minutes)" field. If there is no activity from the keyboard or mouse, all sessions and all resources are logged out.
  • Page 225: Strong Passwords

    Chapter 9: Security Management Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KSX II local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
  • Page 226: User Blocking

    Chapter 9: Security Management User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
  • Page 227 Chapter 9: Security Management Option Description Users are denied access to the system for the Timer Lockout specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will be locked out.
  • Page 228: Encryption & Share

    Chapter 9: Security Management Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KSX II Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KSX II from your browser.
  • Page 229 Chapter 9: Security Management Encryption mode Description for more information. AES-256 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. 256 is the key length. When AES-256 is specified, be certain that your browser supports it, otherwise you will not be able to connect.
  • Page 230 Reset (default) defaults. Enable Local Admin Resets the local administrator password only. Password Reset The password is reset to raritan. Disable All Local No reset action is taken. Resets Note: When using the P2CIM-AUSBDUAL or P2CIM-APS2DUAL to attach a target to two KSX IIs, if Private access to the targets is required, both KVM switches must have Private set as their PC Share Mode.
  • Page 231: Enabling Fips 140-2

    Chapter 9: Security Management Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desirable. The KSX II uses an embedded FIPS 140- ® 2-validated cryptographic module running on a Linux platform per FIPS 140-2 Implementation Guidance section G.5 guidelines.
  • Page 232: Configuring Ip Access Control

    Chapter 9: Security Management  FIPS 140-2 should be enabled on the client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administrative Tools > Local Security Policy to open the Local Security Settings dialog. 2.
  • Page 233 Chapter 9: Security Management  Accept - IP addresses are allowed access to the KSX II device.  Drop - IP addresses are denied access to the KSX II device. To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/Mask or IPv6/Prefix Length field.
  • Page 234: Ssl Certificates

    Chapter 9: Security Management 3. You are prompted to confirm the deletion. Click OK. SSL Certificates The KSX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the KSX II has to identify itself to a client using a cryptographic certificate.
  • Page 235 Chapter 9: Security Management When a self-signed certificate is created, the KSX II date and time are used to calculate the validity period. If the KSX II date and time are not accurate, the certificate's valid from - to date range may be incorrect, causing certificate validation to fail.
  • Page 236 Chapter 9: Security Management a. Select the Create a Self-Signed Certificate checkbox if you need to generate a self-signed certificate. When you select this option, the KSX II generates the certificate based on your entries, and acts as the signing certificate authority. The CSR does not need to be exported and used to generate a signed certificate.
  • Page 237: Security Banner

    Chapter 9: Security Management Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed certificate is not matched with the private key used to generate the original CSR, the certificate will not be useful.
  • Page 238 Chapter 9: Security Management a. Edit the text by manually typing in the text box. Click OK. b. Upload the information from .txt file by selecting the Restricted Services Banner File radio button and using the Browse feature to locate and upload the file. Click OK. Once the file is uploaded, the text from the file will appear in the Restricted Services Banner Message text box.
  • Page 239: Chapter 10 Maintenance

    Local Remote Audit Log View Dominion KSX II events sorted by date and time. Device Information View information about the Dominion KSX II and its CIMs. Backup/Restore Backup and restore the KSX II configuration. USB Profile Upload custom profiles Management provided by Raritan tech support.
  • Page 240: Audit Log

    Chapter 10: Maintenance Audit Log A log is created of the KSX II system events. The audit log can contain up to approximately 2K worth of data before it starts overwriting the oldest entries. To avoid losing audit log data, export the data to a syslog server or SNMP manager.
  • Page 241: Device Information

    The Device Information page provides detailed information about your KSX II device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. To view information about your Dominion KSX II and CIMs:  Choose Maintenance > Device Information. The Device Information page opens.
  • Page 242: Backup And Restore

    Chapter 10: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KSX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KSX II by backing up the user configuration settings from the KSX II in use and restoring those configurations to the new KSX II.
  • Page 243 Chapter 10: Maintenance a. Save the backup file. The backup file is saved locally on your client machine with the name and location specified. b. Once saved, locate the file and right-click on it. Select properties. c. In general tab, click Change and select WordPad. To restore your KSX II: WARNING: Exercise caution when restoring your KSX II to an earlier version.
  • Page 244: Usb Profile Management

    Raritan tech support. These profiles are designed to address the needs of your target server’s configuration, in the event that the set of standard profiles does not already address them. Raritan tech support will provide the custom profile and work with you to verify the solution for your target server’s specific needs.
  • Page 245: Handling Conflicts In Profile Names

    Chapter 10: Maintenance As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so will terminate any virtual media sessions that were in place. Handling Conflicts in Profile Names A naming conflict between custom and standard USB profiles may occur when a firmware upgrade is performed.
  • Page 246: Upgrading Firmware

    - doing so will likely result in damage to the device or CIMs. To upgrade your KSX II: 1. Locate the appropriate Raritan firmware distribution file (*.RFP), found on the Raritan Firmware Upgrades webpage: http://www.raritan.com/support/firmwareupgrades and download the file.
  • Page 247 Chapter 10: Maintenance 8. Click Upgrade and wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the device reboots (1 beep sounds to signal the reboot). 9. As prompted, close the browser and wait approximately 5 minutes before logging on to the KSX II again.
  • Page 248: Upgrade History

    Chapter 10: Maintenance Upgrade History The KSX II provides information about upgrades performed on the KSX II and attached CIMS. To view the upgrade history:  Choose Maintenance > Upgrade History. The Upgrade History page opens. Information is provided about the KSX II upgrade(s) that have been run, the final status of the upgrade, the start and end times, and the previous and current firmware versions.
  • Page 249: Cc Unmanage

    Chapter 10: Maintenance To reboot your KSX II: 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. CC Unmanage When a KSX II device is under CommandCenter Secure Gateway control and you attempt to access the device directly using the KSX II Remote Console, the following message appears (after entry of a valid user name and password).
  • Page 250: Stopping Cc-Sg Management

    Chapter 10: Maintenance Stopping CC-SG Management While the KSX II is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC-SG management. If you are managing the KSX II through CC-SG and connectivity between CC-SG and the KSX II is lost after the specified timeout interval (typically 10 minutes), you are able to end the CC-SG management session from the KSX II console.
  • Page 251 Chapter 10: Maintenance 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
  • Page 252: Chapter 11 Diagnostics

    The Diagnostics menu options help you debug and configure the network settings. The Device Diagnostics option is intended for use in conjunction with Raritan Technical Support. In This Chapter Network Interface Page ................. 242 Network Statistics Page ................. 242 Ping Host Page ..................
  • Page 253 Chapter 11: Diagnostics  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one displayed here.
  • Page 254: Ping Host Page

    Chapter 11: Diagnostics  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field. Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network.
  • Page 255: Trace Route To Host Page

    Chapter 11: Diagnostics 2. Type either the hostname or IP address into the Hostname or IP Address field. 3. Click Ping. The results of the ping are displayed in the Result field. Trace Route to Host Page Trace route is a network tool used to determine the route taken to the provided hostname or IP address.
  • Page 256: Device Diagnostics

    Chapter 11: Diagnostics Device Diagnostics Note: This page is for use by Raritan field engineers or when you are directed by Raritan Technical Support. Device Diagnostics downloads the diagnostics information from KSX II to the client machine. Two operations can be performed on this page:...
  • Page 257 Chapter 11: Diagnostics Send this file to Raritan Technical Support using step 4. 3. To create a diagnostics file to send to Raritan Technical Support: a. Click the Save to File button. The File Download dialog appears. b. Click Save. The Save As dialog appears.
  • Page 258: Chapter 12 Command Line Interface (Cli)

    Chapter 12 Command Line Interface (CLI) In This Chapter Overview ....................249 Accessing the KSX II Using CLI ............250 SSH Connection to the KSX II ............... 250 Telnet Connection to the KSX II ............251 Local Serial Port Connection to the KSX II ..........251 Logging On ....................
  • Page 259: Overview

    Chapter 12: Command Line Interface (CLI) Overview The KSX II Serial Console supports all serial devices such as:  ® Servers, including Windows Server 2003 when using the Emergency Management Console (EMS-) Special Administration Console, or SAC with BIOS redirection in the server BIOS. ...
  • Page 260: Accessing The Ksx Ii Using Cli

    Chapter 12: Command Line Interface (CLI) Accessing the KSX II Using CLI Access the KSX II by using one of the following methods:  Telnet via IP connection  SSH (Secure Shell) via IP connection  Local Port-via RS-232 serial interface A number of SSH/Telnet clients are available and can be obtained from the following locations: ...
  • Page 261: Telnet Connection To The Ksx Ii

    Chapter 12: Command Line Interface (CLI) Telnet Connection to the KSX II Due to the lack of security, user name, password and all traffic is in clear-text on the wire. Telnet access is disabled by default. Enabling Telnet If you wish to use Telnet to access the KSX II, first access the KSX II from the CLI or a browser.
  • Page 262: Port Settings

    Bits per second = 9600 Logging On To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default password: raritan The welcome message displays. You are now logged on as an administrator.
  • Page 263 Chapter 12: Command Line Interface (CLI) After reviewing the following Navigation of the CLI (on page 254) section, perform the Initial Configuration tasks. Welcome! 192.168.59.202 login: admin Passwd: ---------------------------------------------------- ---------------------------- Device Type: Dominion KSX2 Model: DKSX2_188 Device Name: YongKSX2 FW Version: 1.0.0.5.6321 SN: AE17950009 IP Address:...
  • Page 264: Navigation Of The Cli

    Chapter 12: Command Line Interface (CLI) login as: Janet Password: Authentication successful. --------------------------------------------------- ------------- Welcome to the KSX II [Model: KSX2] UnitName:KSX II FirmwareVersion:3.0.0.5.1 Serial:WACEA00008 IP Address:192.168.51.194 UserIdletimeout:99min ---------------------------------------------------- ------------- Port Port Port Port Name Name - Port1 [U] - Port2 [U] - Port3 [U] - Port4 [U] Current Time: Wed Sep 20 16:05:50 2006...
  • Page 265: Cli Syntax -Tips And Shortcuts

    Chapter 12: Command Line Interface (CLI) CLI Syntax -Tips and Shortcuts Tips  Commands are listed in alphabetical order.  Commands are not case sensitive.  Parameter names are single word without underscore.  Commands without arguments default to show current settings for the command.
  • Page 266: Initial Configuration Using Cli

    Therefore, to avoid security breaches it is imperative that you change the admin password from raritan to one customized for the administrators who will manage the KSX II device. 2. Assign the IP address, subnet mask, and gateway IP address to allow remote access.
  • Page 267: Cli Prompts

    Chapter 12: Command Line Interface (CLI) The KSX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally using the local serial port. The administrator needs to configure the users and groups, services, security, and serial ports to which the serial targets are attached to the KSX II.
  • Page 268: Security Issues

    Solaris server is set to ISO8859-1, the target device should also be set to ISO8859-1. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work.  Ensure that the terminal emulation on the target host connected to the KSX II serial port is set to VT100, VT220, VT320 or ANSI.
  • Page 269: Port Sharing Using Cli

    Chapter 12: Command Line Interface (CLI) Port Sharing Using CLI It is possible for access client users to share ports with other authenticated and authorized users, regardless of whether they are access client users (RSC) or SSH/Telnet users. Port sharing is used for training or for troubleshooting applications.
  • Page 270: Interface Command

    Chapter 12: Command Line Interface (CLI) Interface Command The Interface command is used to configure the KSX II network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters ipauto <none|dhcp>...
  • Page 271: Connect Commands

    Chapter 12: Command Line Interface (CLI) Connect Commands The connect commands provide a means to access ports and their history. Command Description connect Connect to a port. The port sub-menu, reached using escape key sequence. clearhistory Clear history buffer for this port. Only available to users who have Write access.
  • Page 272: Ipv6 Command

    Chapter 12: Command Line Interface (CLI) IPv6 Command Use the IPv6_command to set IPv6 network parameters and retrieve existing IPv6 parameters. Ipv6_interface mode enable ipauto none ip 2001:db8:290c:1291::17 prefixlen 128 gw 2001:db8:290c:1291::1...
  • Page 273: Chapter 13 Ksx Ii Local Console

    Chapter 13 KSX II Local Console In This Chapter Overview ....................263 Using the KSX II Local Console ............263 KSX II Local Console Interface ............. 264 Security and Authentication ..............264 Available Resolutions ................265 Port Access Page (Local Console Server Display) ....... 265 Accessing a Target Server ..............
  • Page 274: Ksx Ii Local Console Interface

    Chapter 13: KSX II Local Console KSX II Local Console Interface When you are located at the server rack, the KSX II provides standard KVM management and administration via the KSX II Local Console. The KSX II Local Console provides a direct KVM (analog) connection to your connected servers;...
  • Page 275: Available Resolutions

    Chapter 13: KSX II Local Console Available Resolutions The KSX II Local Console provides the following resolutions to support various monitors:  800x600  1024x768  1280x1024 Each of these resolutions supports a refresh rate of 60Hz and 75Hz. Port Access Page (Local Console Server Display) After you login to the KSX II Local Console, the Port Access page opens.
  • Page 276: Scanning Ports - Local Console

    Chapter 13: KSX II Local Console Scanning Ports - Local Console The KSX II scanning feature is supported by the Local Console. The targets that are found during the scan are displayed on the Scan page one at a time, which is different from the Remote Console port slide show.
  • Page 277: Local Port Scan Mode

    Chapter 13: KSX II Local Console Local Port Scan Mode Following are options available to you to change scan options on local port. To configure the local port scan mode: 1. On local port, select Device Settings. 2. In the Local Port Settings section, select Local Port Scan Mode. 3.
  • Page 278: Local Console Usb Profile Options

    Chapter 13: KSX II Local Console To update the Card Readers Detected list:  Click Refresh if a new smart card has been mounted. The Card Readers Detected list will be refreshed to reflect the newly added smart card reader. Local Console USB Profile Options From the USB Profile Options section of the Tools page, you can choose from the available USB profiles.
  • Page 279: Server Display

    Chapter 13: KSX II Local Console 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field. Server Display After you login to the KSX II Local Console, the Port Access page opens. This page lists all of the KSX II ports, KVM target servers and serial servers, and their status and availability.
  • Page 280: Hot Keys And Connect Keys

    Chapter 13: KSX II Local Console The KVM and serial target servers are initially sorted by Port Number; you can change the display to sort on any of the columns.  Port Number - Numbered from 1 to the total number of ports available for the KSX II.
  • Page 281: Ksx Ii Supported Keyboard Languages

    KSX II Local Console functions. For more information about non-US keyboards, see Informational Notes. Note: Raritan strongly recommends that you use system-config-keyboard to change languages if you are working in a Linux environment. Language...
  • Page 282: Special Sun Key Combinations

    Chapter 13: KSX II Local Console Language Regions Keyboard layout Australia, and New Zealand. US English United States of America and US Keyboard layout International most of English-speaking countries: for example, Netherlands UK English United Kingdom UK layout keyboard Chinese Hong Kong S.
  • Page 283: Returning To The Ksx Ii Local Console Interface

    Chapter 13: KSX II Local Console Sun key Local port key combination Props Ctrl + Alt +F3 Undo Ctrl + Alt +F4 Stop A Break a Front Ctrl + Alt + F5 Copy Ctrl + Alt + F6 Open Ctrl + Alt + F7 Find Ctrl + Alt + F9 Ctrl + Alt + F10...
  • Page 284: Local Port Administration

    Chapter 13: KSX II Local Console Local Port Administration The KSX II can be managed by either the KSX II Local Console or the KSX II Remote Console. Note that the KSX II Local Console also provides access to:  Factory Reset ...
  • Page 285 Chapter 13: KSX II Local Console Note: Keyboard use for Chinese, Japanese, and Korean is for display only. Local language input is not supported at this time for KSX II Local Console functions. 3. Choose the local port hotkey. The local port hotkey is used to return to the KSX II Local Console interface when a target server interface is being viewed.
  • Page 286 Chapter 13: KSX II Local Console Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access, you will have to remove the device from under CC-SG management (from within CC-SG). You will then be able to check this checkbox.
  • Page 287: Ksx Ii Local Console Factory Reset

    Chapter 13: KSX II Local Console KSX II Local Console Factory Reset Note: This feature is available only on the KSX II Local Console. The KSX II offers several types of reset modes from the Local Console user interface. Note: It is recommended that you save the audit log prior to performing a factory reset.
  • Page 288: Connect And Disconnect Scripts

    Chapter 13: KSX II Local Console Connect and Disconnect Scripts The KSX II provides the ability to execute key macro scripts when connecting to or disconnecting from a target. These scripts are defined and managed on the Connection Scripts page. You can create and edit your own scripts on the Connection Script page to perform additional actions when connecting to or disconnecting from targets.
  • Page 289: Adding Scripts

    Chapter 13: KSX II Local Console 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Select All or clicking on the checkbox to the left of each target to apply the script to only select targets.
  • Page 290 Chapter 13: KSX II Local Console For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to the Script box. Next, select Letters from the Key Set drop-down and add a letter key to the script. 8.
  • Page 291 Chapter 13: KSX II Local Console...
  • Page 292: Modifying Scripts

    Chapter 13: KSX II Local Console Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connection Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to modify and click Modify. The page is then in Edit mode. 3.
  • Page 293: Chapter 14 Modem Configuration

    Chapter 14 Modem Configuration In This Chapter Certified Modems for UNIX, Linux and MPC ......... 283 Low Bandwidth KVM Settings ............... 284 Client Dial-Up Networking Configuration ..........285 Windows 2000 Dial-Up Networking Configuration ........ 285 Windows Vista Dial-Up Networking Configuration ........ 289 Windows XP Dial-Up Networking Configuration........
  • Page 294: Low Bandwidth Kvm Settings

    Chapter 14: Modem Configuration Low Bandwidth KVM Settings Following are the settings that Raritan recommends in order to achieve optimum performance when using KVM over low bandwidth speeds typical of DSL connections. This information applies to both virtual KVM and MPC.
  • Page 295: Client Dial-Up Networking Configuration

    Chapter 14: Modem Configuration Setting To achieve optimum performance: Select the "Quick sense video mode" radio to enable this option. Client Dial-Up Networking Configuration Configuring Microsoft Windows ® Dial-Up Networking for use with KSX II allows configuration of a PC to reside on the same PPP network as the KSX II.
  • Page 296 Chapter 14: Modem Configuration 2. Double-click the Make New Connection icon when the Network and Dial-Up Connections window appears. 3. Click Next and follow the steps in the Network Connection Wizard dialog to create custom dial-up network profiles.
  • Page 297 Chapter 14: Modem Configuration 4. Click the Dial-up to private network radio button and click Next. 5. Select the checkbox before the modem that you want to use to connect to the KSX II and then click Next. 6. Type the area code and phone number you wish to dial in the appropriate fields.
  • Page 298 Chapter 14: Modem Configuration 7. Click the Country/region code drop-down arrow and select the country or region from the list. 8. Click Next. The Connection Availability dialog appears. 9. Click the Only for myself radio button in the Connection Availability dialog.
  • Page 299: Windows Vista Dial-Up Networking Configuration

    Chapter 14: Modem Configuration 10. Click Next. The Network Connection has been created. 11. Type the name of the Dial-up connection. 12. Click Finish. 13. Click Dial to connect to the remote machine when the Dial dialog appears. A dialog indicating that a successful connection has been established will appear.
  • Page 300: Windows Xp Dial-Up Networking Configuration

    Chapter 14: Modem Configuration Windows XP Dial-Up Networking Configuration 1. Choose Start > Programs > Accessories > Communications > New Connection Wizard. 2. Click Next and follow the steps in the New Connection Wizard to create custom dial-up network profiles. 3.
  • Page 301 Chapter 14: Modem Configuration 4. Click the "Set up my connection manually" radio button and click Next.
  • Page 302 Chapter 14: Modem Configuration 5. Click the "Connect using a dial-up modem" radio button and click Next.
  • Page 303 Chapter 14: Modem Configuration 6. Type a name to identify this particular connection in the ISP Name field and click Next.
  • Page 304 Chapter 14: Modem Configuration 7. Type the phone number for the connection in the Phone number field and click Next. 8. Type your ISP information. Type the user name and password in the appropriate fields, and retype the password to confirm it.
  • Page 305 Chapter 14: Modem Configuration 9. Select the checkbox before the appropriate option below the fields and click Next. 10. Click Finish. 11. Click Dial to connect to the remote machine when the Dial dialog appears. A dialog indicating that you connected successfully appears.
  • Page 306: Appendix A Specifications

    Appendix A Specifications In This Chapter KSX II Dimensions and Physical Specifications ........296 KSX II Environmental Requirements - KSX II ........297 KSX II Electrical Specifications.............. 297 Supported Operating Systems (Clients) ..........298 Supported Video Resolutions ..............299 Supported Target Server Connection Distance and VideoSupported Target Server Connection Distance/Refresh Rate/Video Resolution ....
  • Page 307: Ksx Ii Environmental Requirements - Ksx Ii

    Appendix A: Specifications KSX II Environmental Requirements - KSX II Operating Temperature 0°C- 40°C (32°F - 104°F) Humidity 20% - 85% RH Altitude Vibration 5-55-5 HZ, 0.38mm, 1 minutes per cycle; 30 minutes for each axis (X, Y, Z) Shock Non-Operating Temperature 0°C- 50°C (32°F - 122°F)
  • Page 308: Supported Operating Systems (Clients)

    Appendix A: Specifications Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client and Multi-Platform Client (MPC): Client operating system Virtual media (VM) support on client? ® Windows 7 ® Windows XP ® Windows 2008 ®...
  • Page 309: Supported Video Resolutions

    Appendix A: Specifications Mode Operating system Browser  Windows Server 2003 ® Internet Explorer 6.0 SP1++, IE 7, IE 8  Firefox 1.06 - 3  ® Internet Explorer 7.0 or Windows Vista  ® Windows 7 Internet Explorer 9.0 ...
  • Page 310: Supported Target Server Connection Distance And Videosupported Target Server Connection Distance/Refresh Rate/Video Resolution

    Appendix A: Specifications Resolutions 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz 1152x900 @76Hz 720x400 @84Hz 1280x720@60Hz 720x400 @85Hz 1280x960 @60Hz 800x600 @56Hz 1280x960 @85Hz 800x600 @60Hz 1280x1024 @60Hz 800x600 @70Hz 1280x1024 @75Hz 800x600 @72Hz 1280x1024 @85Hz 800x600 @75Hz 1360x768@60Hz 800x600 @85Hz 1366x768@60Hz...
  • Page 311: Supported Distances For Serial Devices

    150 ft. (45 m) Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so forth and the subjective nature of video quality, Raritan cannot guarantee performance across all distances in all environments. Supported Video Resolutions (on page 299) for the video resolutions supported by the KSX II.
  • Page 312: Supported Computer Interface Module (Cims) Specifications

    Appendix A: Specifications Supported Computer Interface Module (CIMs) Specifications CIM model Description Dimensions (WxDxH) Weight D2CIM- Dual USB CIM for BIOS virtual media, 1.7" x 3.5" x 0.8"; 43 x 0.25lb; DVUSB smartcard/CAC, audio and Absolute 90 x 19mm 0.11kg Mouse Synchronization D2CIM-VUSB USB CIM for virtual media and Absolute 1.3"...
  • Page 313 Appendix A: Specifications CIM model Description Dimensions (WxDxH) Weight D2CIM-PWR CIM for remote power management 1.3" x 3.0" x 0.6"; 33 x 0.20lb; 76 x 15mm 0.09kg P2CIM-SER Paragon II/Dominion KX II CIM for serial 1.3" x 3.0" x 0.6"; 33 x 0.20lb;...
  • Page 314 Appendix A: Specifications CIM model Description Dimensions (WxDxH) Weight D2CIM- Digital CIM that provides digital-to-analog 1.7" x 3.5" x 0.8"; 43 x 0.25lb; DVUSB-DP conversion and support for virtual media, 90 x 19mm 0.11kg smartcard/CAC, audio, Absolute and Relative Mouse Synchronization D2CIM- Digital CIM that provides digital-to-analog 1.7"...
  • Page 315: Digital Cim Target Server Timing And Video Resolution

    Appendix A: Specifications Digital CIM Target Server Timing and Video Resolution Digital CIMs support Display Data Channels (DDC) and Enhanced Extended Display Identification Data (E-EDID). See Supported Computer Interface Module (CIMs) Specifications for CIM specifications. Timing Modes Following are the default timing modes that are used when the KSX II communicates with a video source via a digital CIM.
  • Page 316: Supported Paragon Cims And Configurations

    Appendix A: Specifications  1400x1050@60Hz VESA  1440x900@60Hz VESA  1600x1200 @60Hz VESA  1680x1050@60Hz VESA  1920x1080@60Hz VESA Display Native Resolution You are able to select the native resolution of the CIM on the Port Configuration page from the Display Native Resolution drop-down. This is the preferred resolution and timing mode of the digital CIM.
  • Page 317 Appendix A: Specifications Paragon CIM Supports Does not support   P2CIM-AUSBDUAL Servers with USB- or Virtual media ™ USB-type  Smart cards keyboard and mouse  Absolute Mouse ports mode  Automatic skew  Use with blade compensation (when chassis the CIMs are connected to...
  • Page 318: Ksx Ii To Ksx Ii Guidelines

    Appendix A: Specifications KSX II to KSX II Guidelines The following system configuration guidelines should be followed when you are using Paragon CIMs in a KSX II to KSX II configuration: Concurrent Access Both KSX II KVM switches should be configured with the same policy for concurrent access to targets, either both PC-Share or both Private.
  • Page 319: Ksx Ii To Paragon Ii Guidelines

    Appendix A: Specifications If a connection to the target is in place from the other KSX II, the availability is checked when a connection is attempted. Access is denied or allowed consistent with the PC-Share policy in place for the KSX II. Until that time, the availability is not be updated on the other KSX II.
  • Page 320 Appendix A: Specifications Paragon II Mode description Supported? operation mode PC Share A server or other device Supported. on a specific channel port can be selected and controlled by more than However, PC Share Idle one user, but only one Timeout, which is configured user has keyboard and on the Paragon II, is not...
  • Page 321: Smart Card Readers

    Raritan device.  CCID Requirements If the Raritan D2CIM-DVUSB VM/CCID is not recognized as a smart card reader by your Linux target, you may need to update the CCID driver version to 1.3.8 or above and update the driver configuration file (Info.plist).
  • Page 322: Supported And Unsupported Smart Card Readers

    ® client, the following requirements must be met to use smart card readers with the Raritan device. Note: User login to client, on smart card insertion, may take longer when 1 or more KVM sessions are actively in place to targets. As the login process to these targets is also under way.
  • Page 323 SCM Microsystems firmware v5.25. Unsupported Smart Card Readers This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, therefore they are unsupported. If a smart card reader does not appear in the supported smart card readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function with the device.
  • Page 324: Emergency Connectivity

    Target device Simplified RJ45-based CAT 5 cable scheme; connectivity serial port adapters are available from Raritan. Local Access for “crash-cart” applications. Local access Connectivity (on page 319) for a list of necessary KSX II hardware (adapters and/or cables) for connecting the KSX II to common Vendor/Model combinations.
  • Page 325: Ksx Ii Supported Keyboard Languages

    KSX II Local Console functions. For more information about non-US keyboards, see Informational Notes. Note: Raritan strongly recommends that you use system-config-keyboard to change languages if you are working in a Linux environment. Language...
  • Page 326: Tcp And Udp Ports Used

    Appendix A: Specifications Language Regions Keyboard layout Spanish Spain and most Spanish Spanish speaking countries Portuguese Portugal Portuguese TCP and UDP Ports Used...
  • Page 327 KVM and virtual media data streams to the client. KSX II (Raritan This port is used to discover other Dominion devices and for KVM-over-IP) communication between Raritan devices and systems, including CC- Protocol, SG for devices that CC-SG management is available. By default, this is Configurable Port...
  • Page 328: Kvm Properties

    Appendix A: Specifications KVM Properties  Keyboard - PS/2 or USB  Mouse - PS/2 or USB  Video - VGA Network Speed Settings KSX II network speed setting Network Auto 1000/Full 100/Full 100/Half 10/Full 10/Half switch port Highest 1000/Full KSX II: 100/Half KSX II:...
  • Page 329: Connectivity

    Appendix A: Specifications Supported Functions; not recommended NOT supported by Ethernet specification; product will communicate, but collisions will occur Per Ethernet specification, these should be “no communication,” however, note that the KSX II behavior deviates from expected behavior Note: For reliable network communication, configure the KSX II and the LAN switch to the same LAN Interface Speed and Duplex.
  • Page 330: Ksx Ii Serial Rj-45 Pinouts

    Various Windows NT CAT 5 cable Go to the Support page on Raritan's website (www.raritan.com) to obtain a list of commonly used cables and adapters. KSX II Serial RJ-45 Pinouts To provide maximum port density and to enable simple UTP (Category 5) cabling, The KSX II provides its serial connections via compact RJ-45 ports.
  • Page 331: Db9F Nulling Serial Adapter Pinouts

    Appendix A: Specifications DB9F Nulling Serial Adapter Pinouts RJ-45 (female) DB9 (female) 1, 6 SHELL DB9M Nulling Serial Adapter Pinouts RJ-45 (female) DB9 (male) 1, 6 SHELL DB25F Nulling Serial Adapter Pinouts RJ-45 (female) DB25 (female) 6, 8...
  • Page 332: Db25M Nulling Serial Adapter Pinouts

    Appendix A: Specifications RJ-45 (female) DB25 (female) DB25M Nulling Serial Adapter Pinouts RJ-45 (female) DB25 (male) 6, 8...
  • Page 333: Appendix B Updating The Ldap/Ldaps Schema

    Appendix B Updating the LDAP/LDAPS Schema IMPORTANT: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ............323 Setting the Registry to Permit Write Operations to the Schema ... 324 Creating a New Attribute ...............
  • Page 334: Setting The Registry To Permit Write Operations To The Schema

    Appendix B: Updating the LDAP/LDAPS Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: ®...
  • Page 335: Adding Attributes To The Class

    Appendix B: Updating the LDAP/LDAPS Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
  • Page 336 Appendix B: Updating the LDAP/LDAPS Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
  • Page 337: Updating The Schema Cache

    Appendix B: Updating the LDAP/LDAPS Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: ®...
  • Page 338 Appendix B: Updating the LDAP/LDAPS Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
  • Page 339 Appendix B: Updating the LDAP/LDAPS Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
  • Page 340 Appendix B: Updating the LDAP/LDAPS Schema 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the KSX II) in the Edit Attribute field. Click OK.
  • Page 341: Appendix C Informational Notes

    This section includes important notes on KSX II usage. Future updates will be documented and available online through the Help link in the KSX II Remote Console interface. Note: Some topics in this section reference other multiple Raritan devices because various devices are impacted by the information. Java...
  • Page 342: Java Runtime Environment (Jre)

    Appendix C: Informational Notes Applications Prerequisites Supported MPC Applet Requires installation Browser Supported of Java Cryptography ® Firefox Extension (JCE) 2.0.0.7 Unlimited Strength Firefox 3.0.x Jurisdiction Policy Files + Internet Explorer ® Internet Explorer 7 Internet Explorer 8 HTML access Requires installation Browser Supported...
  • Page 343: Ipv6 Support Notes

    Appendix C: Informational Notes ™ The KSX II Remote Console and MPC require JRE to function. Java ™ Runtime Environment (JRE) version 1.6.x or higher are supported. The KSX II Remote Console checks the Java version. If the version is incorrect or outdated, you will be prompted to download a compatible version.
  • Page 344: Akc Download Server Certification Validation Ipv6 Support Notes

    Appendix C: Informational Notes AKC Download Server Certification Validation IPv6 Support Notes If you are connecting to a KSX II standalone device and support for AKC download server certificate validation is enabled, the valid IPv6 format to generate the certificate is either: ...
  • Page 345 ® Because the Sun on Linux has problems generating the correct KeyEvents for foreign-language keyboards configured using System Preferences, Raritan recommends that you configure foreign keyboards using the methods described in the following table. Language Configuration method US Intl Default...
  • Page 346 Appendix C: Informational Notes Language Configuration method US Intl Default System Settings (Control Center) French Keyboard Indicator German Keyboard Indicator Hungarian System Settings (Control Center) Spanish System Settings (Control Center) Swiss-German System Settings (Control Center) Norwegian Keyboard Indicator Swedish Keyboard Indicator Danish Keyboard Indicator Japanese...
  • Page 347: Macintosh Keyboard

    Appendix C: Informational Notes 2. In the Add to Panel dialog, right-click the Keyboard Indicator and from the menu choose Open Keyboard Preferences. 3. In the Keyboard Preferences dialog, click the Layouts tab. 4. Add and remove languages as necessary. Key Combinations and the Java Runtime Environment (JRE) ™...
  • Page 348: Dell Chassis Cable Lengths And Video Resolutions

    Firefox ® 1.5 or 2.0. Through testing, it has been determined that installation of libXp resolves window focusing issues with Fedora Core 6. Raritan has tested with libXp-1.0.0.8.i386.rpm; this resolved all of the keyboard focus and popup-menu problems. ®...
  • Page 349: Vkc And Mpc Smart Card Connections To Fedora Servers

    Appendix C: Informational Notes VKC and MPC Smart Card Connections to Fedora Servers ® If you are using a smart card to connect to a Fedora server via MPC or VKC upgrade the pcsc-lite library to 1.4.102-3 or above. Note: This feature is available on the KSX II 2.3.0 (and later) and KX II 2.1.10 (and later).
  • Page 350 The USB Profile Menu selections are configurable via the Console Device Settings > Port Configuration page. Should none of the standard USB profiles provided by Raritan meet your target server requirements, Raritan Technical Support can work with you to arrive at a solution tailored for that target. Raritan recommends that you do the following: 1.
  • Page 351: Changing A Usb Profile When Using A Smart Card Reader

    Appendix C: Informational Notes Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will need to change the USB profile for a target server. For example, you may need to change the connection speed to "Use Full Speed for Virtual Media CIM"...
  • Page 352: Smart Card Reader Not Detected When Using A Dvm-Dp Cim

    BIOS when a virtual media session is active (unless the Use Full Speed for Virtual Media CIM option is enabled from the Port page). Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. Accessing Virtual Media on a Windows 2000 ®...
  • Page 353: Virtual Media Connection Failures Using High Speed For Virtual Media Connections

    Alt+Tab to return the focus to the VKC window. Moving Between Ports on a Device If you move a between ports on the same Raritan device and resume management within one minute, CC-SG may display an error message.
  • Page 354: Appendix D Ksx Ii Faqs

    Appendix D KSX II FAQs In This Chapter FAQs ...................... 345...
  • Page 355: Chapter 15 Faqs

    Chapter 15 FAQs Question Answer What is the The Dominion KSX II is an integrated remote Dominion KSX II? access and control appliance that provides secure, out-of-band KVM-over-IP, serial access and power control for IT assets in remote and branch offices.
  • Page 356 (4) higher service quality. Technical Features In a nutshell, what The Dominion KSX II is a combination of the is the KSX II? Dominion KX II KVM-over-IP switch and features from the Dominion SX Secure Console Server. It provides world-class KVM-over-IP, serial-over-IP and remote power control in a single appliance.
  • Page 357 Chapter 15: KSX II FAQs Question Answer How does the Built on a foundation of the award-winning Dominion KSX II Dominion KX II, the Dominion KSX II provides virtually all of the KX II’s KVM- compare to the Dominion KX II? over-IP software features as of Release 2.5.
  • Page 358 Chapter 15: KSX II FAQs Question Answer Is the Dominion The Dominion KSX II uses a FIPS 140-2-certified KSX II FIPS 140-2- encryption module for both serial and KVM certified? sessions. The KSX II also supports DoD Common Access Card, Secure Login Banner and IPv6 -- three other features of interest to government and military customers.
  • Page 359 Synchronization? settings on each target server. It is a feature supported by USB 2.0-enabled servers. Is the Dominion Yes. The Dominion KSX II units are Sun "break- safe" for use with Sun Solaris™. ® KSX II Sun "break- safe"?
  • Page 360 Manage Racks of The Dominion KSX II is also ideal for labs, KVM and Serially computer rooms and data centers with racks containing both serially – and KVM – controlled Managed Devices devices.
  • Page 361 Using virtual media, you can even remotely re-image a server in a branch office. The Dominion KSX II supports a wide variety of media options, including CD/DVD/Floppy drives, hard drives, USB drives, and ISO image files.
  • Page 362 Chapter 15: KSX II FAQs Question Answer Smart Card and The Dominion KSX II supports smart card and CAC Authentication DoD Common Access Card (CAC) authentication at the rack, stand-alone over IP and through CC- SG. Meets U.S. Government HSPD-12, PIV and CAC directives and ISO 7816, PC/SC and CCID standards.
  • Page 363 Mobile KVM Users can now access and control servers Access for iPhone connected to the Dominion KSX II via their Apple and iPad iPhones and iPads. This provides emergency 24/7 out-of-hours access, as well as convenient everyday access for iPads enthusiasts. CC-SG Release 5.2 or later is required for this capability.
  • Page 364 Chapter 15: KSX II FAQs Question Answer Ease of Use Next Generation The Dominion KSX II has a next generation, Common User browser-based user interface for enhanced Interface usability and productivity. This interface is common across the local port, remote access, management software as well as other Raritan products.
  • Page 365 Chinese languages. This is available stand-alone as well as through CC-SG. Serial Console Capabilities True Serial Access The Dominion KSX II provides true, remote serial console access to either four or eight serial devices, without the use of expensive serial dongles.
  • Page 366 IP address and under a single management interface. Remote Power The Dominion KSX II has two dedicated power Control control ports for Raritan PDUs like the Dominion PX. This enables you to remotely power cycle IT devices from the KSX II management interface.
  • Page 367: Index

    Index A. AC Power • 25 C. Local User Port (Local PC) and Local About the Virtual KVM Client • 57 Admin Port • 26 Absolute Mouse Mode • 79 Calibrating Color • 71 Access and Control Target Servers Remotely • CC Unmanage •...
  • Page 368 Index Configuring KSX II Local Port Settings • 199 Editing rciusergroup Attributes for User Configuring Modem Settings • 160 Members • 327 Configuring Network • 259 Emergency Connectivity • 314 Configuring Ports • 171 Enabling Direct Port Access via URL • 34, 88, Configuring SNMP Agents •...
  • Page 369 Index KSX II to Paragon II Guidelines • 309 Implementing RADIUS Remote Authentication • 134, 139 KVM Properties • 318 Import/Export Keyboard Macros • 65 Importing and Exporting Scripts • 203, 206, LAN Interface Settings • 33, 147, 150 Informational Notes • 331 Launching MPC from a Web Browser •...
  • Page 370 RADIUS Communication Exchange a DVM-DP CIM • 342 Specifications • 143 Smart Card Readers • 311 Raritan Serial Console (RSC) • 41, 91 Smart Cards • 81 Rebooting the KSX II • 238 Software • 8 Refreshing the Screen • 70 Special Sun Key Combinations •...
  • Page 371 Index SSH Access from a UNIX/Linux Workstation • Target Server Requirements • 311 Target Settings • 175 SSH Access from a Windows PC • 250 TCP and UDP Ports Used • 316 SSH Connection to the KSX II • 250 Telnet Connection to the KSX II •...
  • Page 372 Index Virtual Media in a Mac Environment • 104 Virtual Media in a Windows XP Environment • Virtual Media Not Refreshed After Files Added • 342 Virtual Media via VKC and AKC in a Windows Environment • 105 VKC and MPC Smart Card Connections to Fedora Servers •...
  • Page 373: United Kingdom

    For CommandCenter Secure Gateway: Press 6, then Press 2 Phone: +31-10-2844040 Fax: 732-764-8887 Email: tech.europe@raritan.com Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m. GMT China Phone +44(0)20-7090-1390...

Table of Contents