Raritan Dominion KX II User Manual

Raritan Dominion KX II User Manual

Hide thumbs Also See for Dominion KX II:
Table of Contents

Advertisement

Dominion KX II
User Guide
Release 2.4.0
Copyright © 2012 Raritan, Inc.
DKX2-v2.4.0-0O-E
January 2012
255-62-4023-00

Advertisement

Table of Contents
loading

Summary of Contents for Raritan Dominion KX II

  • Page 1 Dominion KX II User Guide Release 2.4.0 Copyright © 2012 Raritan, Inc. DKX2-v2.4.0-0O-E January 2012 255-62-4023-00...
  • Page 2 Raritan, Inc. © Copyright 2012 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
  • Page 3: Table Of Contents

    Contents Chapter 1 Introduction KX II Overview ..........................2 KX II Help ............................4 What's New in the Help ....................... 4 Related Documentation ....................... 5 KX II Client Applications ........................ 5 Virtual Media ..........................6 KX II Photos ........................... 7 Product Features ...........................
  • Page 4 Contents Toolbar ..........................59 Connection Properties ....................... 61 Connection Information ..................... 63 Keyboard Options ......................64 Video Properties ........................ 69 Mouse Options........................74 Tool Options ........................79 View Options ........................82 Digital Audio ........................84 Smart Cards ........................87 Help Options ........................90 Multi-Platform Client (MPC) ......................
  • Page 5 Contents Adding a New User ......................129 Modifying an Existing User ....................129 Logging a User Off (Force Logoff) ................... 130 Authentication Settings ......................131 Implementing LDAP/LDAPS Remote Authentication ............132 Returning User Group Information from Active Directory Server ........136 Implementing RADIUS Remote Authentication ...............
  • Page 6 Contents User Blocking ........................217 Encryption & Share ......................219 Enabling FIPS 140-2 ....................... 222 Configuring IP Access Control ....................223 SSL Certificates ......................... 225 Security Banner ......................... 228 Chapter 10 Maintenance Audit Log ............................ 230 Device Information ........................231 Backup and Restore ........................
  • Page 7 Contents IPv6 Command ........................ 258 Chapter 13 KX II Local Console Overview ............................ 259 Simultaneous Users ........................259 KX II Local Console Interface: KX II Devices ................260 Security and Authentication ....................... 260 Available Resolutions......................... 261 Port Access Page (Local Console Server Display) ..............262 Accessing a Target Server ......................
  • Page 8 Contents Dell Chassis Cable Lengths and Video Resolutions ..............299 Audio Bandwidth Requirements ....................300 Number of Supported Audio/Virtual Media and Smartcard Connections ........301 Certified Modems ........................301 Devices Supported by the Extended Local Port ................ 301 KX2 8xx Extended Local Port Recommended Maximum Distances ......... 301 Remote Connection ........................
  • Page 9 Contents Virtual Media Not Refreshed After Files Added ............... 327 Active System Partitions ....................327 Drive Partitions ........................ 327 Virtual Media Linux Drive Listed Twice ................328 Mac and Linux Locked, Mapped Drives ................328 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB ....328 Target BIOS Boot Time with Virtual Media ..............
  • Page 10: Chapter 1 Introduction

    Chapter 1 Introduction In This Chapter KX II Overview ................... 2 KX II Help....................4 KX II Client Applications ................5 Virtual Media ....................6 KX II Photos ....................7 Product Features ..................9 Terminology ..................... 11 Package Contents ................... 13...
  • Page 11: Kx Ii Overview

    Chapter 1: Introduction KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can be controlled with a standard KX II. With the KX II 8-user model, up to 32 servers can be controlled with the KX2- 832 and up to 64 servers can be controlled with the KX2-864.
  • Page 12 Chapter 1: Introduction...
  • Page 13: Kx Ii Help

    See the KX II release notes for important information on the current release before you begin using the KX II. A PDF version of the help can be downloaded from the Raritan Firmware and Documentation page on the Raritan website. Raritan recommends that you refer to the Raritan website for the most up-to-date user guides available.
  • Page 14: Related Documentation

    Chapter 1: Introduction Related Documentation The KX II help is accompanied by the KX II Quick Setup Guide, which can be found on the Raritan Firmware and Documentation page of Raritan's website (http://www.raritan.com/support/firmware-and- documentation). Installation requirements and instructions for client applications used with the KX II can be found in the KVM and Serial Access Clients Guide, also found on the Raritan website.
  • Page 15: Virtual Media

    Chapter 1: Introduction Virtual Media All KX II models support virtual media. Each KX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD, DVD, USB, audio playback and record devices, internal and remote drives, and images. The KX II supports virtual media access of hard drives and remotely mounted images.
  • Page 16: Kx Ii Photos

    Chapter 1: Introduction KX II Photos KX II KX2-808...
  • Page 17 Chapter 1: Introduction KX2-832 KX2-864 CIMs...
  • Page 18: Product Features

    Chapter 1: Introduction Product Features Hardware  Integrated KVM-over-IP remote access  1U or 2U rack-mountable (brackets included)  Dual power supplies with failover; autoswitching power supply with power failure warning  Support for tiering in which a base KX II device is used to access multiple other tiered devices.
  • Page 19: Software

    SNMP and Syslog management  IPv4 and IPv6 support  Power control associated directly with servers to prevent mistakes  Integration with Raritan's CommandCenter Secure Gateway (CC- SG) management unit  CC Unmanage feature to remove device from CC-SG control...
  • Page 20: Terminology

    Chapter 1: Introduction Terminology Help uses the following terminology for typical KX II components:...
  • Page 21 , etc.) accessed remotely via the KX II. Dominion PX Rack PDU (Power Strips) Raritan rack PDUs accessed remotely via the KX II. See Supported CIMs and Operating Systems (Target Servers) for a list of the supported operating systems and CIMs, and see...
  • Page 22: Package Contents

    Chapter 1: Introduction Package Contents Each KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmount chassis. Each KX II device ships with the following contents: Amount Item included KX II device KX II Quick Setup Guide Rackmount kit AC power cords Cat5 network cable...
  • Page 23: Chapter 2 Installation And Configuration

    Passwords are case sensitive and must be entered in the exact case combination in which they were created. For example, the default password raritan must be entered entirely in lowercase letters. The first time you start the KX II, you are required to change the default password.
  • Page 24: Getting Started

    Chapter 2: Installation and Configuration Default Value Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location. Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that are accessed and controlled via the KX II.
  • Page 25 Chapter 2: Installation and Configuration Mouse Settings  ™ The KX II operates in Absolute Mouse Mode , Intelligent Mouse Mode and Standard Mouse Mode. Mouse parameters do not have to be altered for Absolute Mouse Synchronization but a D2CIM-VUSB or D2CIM-DVUSB is required. For both the Standard and Intelligent Mouse Modes, mouse parameters must be set to specific values.
  • Page 26 Chapter 2: Installation and Configuration - Accessing the Mouse Properties, Keyboard Properties, and Phone and Mode Options from the Windows Control Panel. 2. Disable transition effects: a. Select the Display option from the Control Panel. b. Click the Appearance tab. c.
  • Page 27 Chapter 2: Installation and Configuration  Set the mouse motion speed setting to exactly the middle speed.  Disable the "Enhanced pointer precision" option.  Click OK. 2. Disable animation and fade effects: a. Select the System option from the Control Panel. b.
  • Page 28 Chapter 2: Installation and Configuration d. Click the Settings button in the Performance group to open the Performance Options dialog. e. Under Custom options, deselect the following checkboxes:  Animation options:  Animate controls and elements inside windows  Animate windows when minimizing and maximizing ...
  • Page 29 Chapter 2: Installation and Configuration Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the KX II connection.
  • Page 30 Chapter 2: Installation and Configuration Note: Once connected to the target server, in many Linux graphical environments, the <Ctrl> <Alt> <+> command will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, depending on your X server distribution.
  • Page 31 Chapter 2: Installation and Configuration Linux Settings (Red Hat 4) Note: The following settings are optimized for Standard Mouse mode only. ® To configure KVM target servers running Linux (graphical user interface): 1. Configure the mouse settings: a. Red Hat 5 users, choose Main Menu > Preferences > Mouse. Red Hat 4 users, choose System >...
  • Page 32 Chapter 2: Installation and Configuration 2. Click Mouse. The Mouse Preferences dialog appears. 3. Open the Motion tab. 4. Within the Speed group, set the Acceleration slider to the exact center position. 5. Within the Speed group, set the Sensitivity slider to low. 6.
  • Page 33 Chapter 2: Installation and Configuration Sun Solaris Settings ™ ™ To configure KVM target servers running Sun Solaris 1. Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. This can be performed from:  The graphical user interface. ...
  • Page 34 Chapter 2: Installation and Configuration You can also contact your Raritan representative to purchase a video output adapter: If you have: Use this video output adapter: Sun 13W3 with composite APSSUN II Guardian converter sync output Sun HD15 with composite...
  • Page 35 Chapter 2: Installation and Configuration 2. Log out or restart computer. Video Settings (GUI) The GUI resolution can be checked and set using different commands depending on the video card in use. Run these commands from the command line. Note: 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using.
  • Page 36: Step 2: Configure Network Firewall Settings

    Chapter 2: Installation and Configuration 6. Select a resolution and refresh rate supported by the KX II. See Supported Video Resolutions (on page 294) for more information. Note: If you change the video resolution, you must log out of the target server and log back in for the video settings to take effect.
  • Page 37: Step 3: Connect The Equipment

    Chapter 2: Installation and Configuration Step 3: Connect the Equipment Connect the KX II to the power supply, network, local PC, local video display, keyboard and mouse, and target servers. The letters in the diagram correspond to the topics in this section that describe the connection.
  • Page 38 Configuring Modem Settings (on page 158) for information on configuring the modem. Note: Raritan recommends configuring the modem by enabling the CD (carrier detect) setting. C. Network Port The KX II provides two Ethernet ports for failover purposes (not for load- balancing).
  • Page 39 Chapter 2: Installation and Configuration D. Local Access Port (Local Video Display, Keyboard and Mouse) For convenient access to target servers while at the rack, use the KX II Local Access port. While the Local Access port is required for installation and setup, it is optional for subsequent use.
  • Page 40: Step 4: Configure The Kx Ii

    Chapter 2: Installation and Configuration E. Target Server Ports The KX II uses standard UTP cabling (Cat5/5e/6) to connect to each target server. To connect a target server to the KX II: 1. Use the appropriate Computer Interface Module (CIM). See Supported CIMs and Operating Systems (Target Servers) for more information about the CIMs to use with each operating system.
  • Page 41 1. Once the unit has booted, enter the default username (admin) and password (raritan). Click Login. 2. Enter the old password (raritan), enter a new password and then enter the new password again. Passwords can be up to 64 characters in length and can consist of English, alphanumeric and special characters.
  • Page 42 Chapter 2: Installation and Configuration  None (Static IP) - This option requires that you manually specify the network parameters. This is the recommended option because the KX II is an infrastructure device and its IP address should not change. ...
  • Page 43 Chapter 2: Installation and Configuration Enter the following information if the Following DNS Server Addresses option is selected. These addresses are the primary and secondary DNS addresses that will be used if the primary DNS server connection is lost due to an outage. a.
  • Page 44 Chapter 2: Installation and Configuration Naming Target Servers To name the target servers: 1. Connect all of the target servers if you have not already done so. See Step 3: Connect the Equipment (on page 28) for a description of connecting the equipment. 2.
  • Page 45 CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide to proceed (all found on Raritan's website, www.raritan.com, under Support). Note: The remainder of this help applies primarily to deploying the KX II...
  • Page 46: Step 5: Launch The Kx Ii Remote Console

    For additional information about CC-SG authentication, see the CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide, which can be downloaded from the Support section of the Raritan website http://www.raritan.com. Supported Protocols To simplify management of usernames and passwords, the KX II provides the ability to forward authentication requests to an external authentication server.
  • Page 47 Chapter 2: Installation and Configuration ® 2. Launch a supported web browser such as Internet Explorer ® Firefox 3. Enter the URL: http://IP-ADDRESS or http://IP-ADDRESS/akc for .NET, where IP-ADDRESS is the IP address assigned to your KX II. You can also use https, the DNS name of the KX II assigned by the administrator (provided that a DNS server has been configured), or type the IP address in the browser (KX II always redirects the IP address from HTTP to HTTPS.)
  • Page 48: Step 6: Configure The Keyboard Language (Optional)

    Del key on your keyboard. The Caps Lock light starts to blink, indicating that the CIM is in Layout Code Change mode. The text window displays: Raritan Computer, Inc. Current keyboard layout code = 22h (US5 UNIX). 3. Type the layout code desired (for example, 31 for the Japanese keyboard).
  • Page 49: Step 7: Configure Tiering (Optional)

    Chapter 2: Installation and Configuration Step 7: Configure Tiering (Optional) The optional tiering feature allows you to connect tiered KX II devices to a base KX II. You can then access the servers and PX PDUs through the base both locally and remotely. See the Device Management (on page 145) section of the KX II Help for more information on this feature.
  • Page 50: Chapter 3 Working With Target Servers

    Chapter 3 Working with Target Servers In This Chapter KX II Interfaces ..................41 KX II Local Console Interface: KX II Devices .......... 42 KX II Remote Console Interface .............. 42 Proxy Server Configuration for Use with MPC, VKC and AKC ....55 Virtual KVM Client (VKC) and Active KVM Client (AKC) ......
  • Page 51: Kx Ii Local Console Interface: Kx Ii Devices

    Chapter 3: Working with Target Servers KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provides standard KVM management and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
  • Page 52 4. Type your user name and password. If this is the first time logging in, log in with the factory default user name (admin) and password (raritan, all lower case). You will be prompted to change the default password. Click Login.
  • Page 53: Interface And Navigation

    Chapter 3: Working with Target Servers Interface and Navigation KX II Interface Both the KX II Remote Console and the KX II Local Console interfaces provide a web-based interface for device configuration and administration, as well as target server list and selection. The options are organized into various tabs.
  • Page 54 Chapter 3: Working with Target Servers Left Panel The left panel of the KX II interface contains the following information. Note that some information is conditional and will only be displayed if you are a certain of user, are using certain features, and so on. Conditional information is noted here.
  • Page 55: Kx Ii Console Navigation

    Chapter 3: Working with Target Servers Information Description When displayed? PowerIn2 Status of the power 2 Always outlet connection. Either on or off, or Auto-detect off. Configured As If you are using a tiering When the KX II is part of Base or Configured configuration, this a tiered configuration...
  • Page 56 Chapter 3: Working with Target Servers Port Access Page After successfully logging on to the KX II Remote Console, the Port Access page appears. By default, the View by Port tab will be displayed on the Port Access page. This page lists all of the KX II ports, the connected KVM target servers, and their status and availability.
  • Page 57 Chapter 3: Working with Target Servers  Port Name - The name of the KX II port. Initially, this is set to Dominion-KX2-Port# but you can change the name to something more descriptive. When you click a Port Name link, the Port Action Menu appears.
  • Page 58 Chapter 3: Working with Target Servers  Switch From - Switches from an existing connection to the selected port (KVM target server). This menu item is available only for KVM targets. This option is visible only when a Virtual KVM Client is opened.
  • Page 59: Scanning Ports

    Active KVM Client (AKC) and Multi-Platform Client (MPC). Note: MPC uses a different method for initiating a scan than the other Raritan clients. See Set Scan Group in the KVM and Serial Client Guide for details. The scan results and scan options differ between the Remote Console and the Local Console.
  • Page 60 Chapter 3: Working with Target Servers 3. Leave the Up Only checkbox selected if you only want targets that are up to be included in the scan. Deselect this checkbox if you want to include all targets, whether up or down. 4.
  • Page 61: Managing Favorites

    Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: ...
  • Page 62 Use: Favorites List Manage your list of favorite devices. Discover Devices - Local Subnet Discover Raritan devices on the client PC's local subnet. Discover Devices - KX II Subnet Discover the Raritan devices on the KX II device subnet. Add New Device to Favorites Add, edit, and delete devices from your list of Favorites.
  • Page 63 This feature allows multiple KX II devices to interoperate and scale automatically. The KX II Remote Console automatically discovers the KX II devices, and any other Raritan device, in the subnet of the KX II. To discover devices on the device subnet: 1.
  • Page 64: Logging Out

    Chapter 3: Working with Target Servers 4. Change the discovery Port (if necessary). 5. Select the Product Type. 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate KX II device.
  • Page 65 Insert the following parameters to the command line. Add them before "-classpath": -DsocksProxyHost=&lt;socks proxy ip addr&gt; - DsocksProxyPort=&lt;socks proxy port&gt; The parameters should look as follows: start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 - XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true - DsocksProxyHost=192.168.99.99 -DsocksProxyPort=1080 - classpath .\sdeploy.jar;.\sFoxtrot.jar;.\jaws.jar;.\sMpc.jar com.raritan.rrc.ui.RRCApplication %1...
  • Page 66: Virtual Kvm Client (Vkc) And Active Kvm Client (Akc)

    AKC is based on Microsoft Windows .NET technology and allows you to run the client in Windows environments without the use of the Java Runtime Environment (JRE), which is required to run Raritan's Virtual KVM Client (VKC) and Multi-Platform Client (MPC). AKC also works with CC-SG.
  • Page 67: Creating A New Attribute

    Chapter 3: Working with Target Servers Since .NET is required to run AKC, if you do not have .NET installed or you have an unsupported version of .NET installed, you will receive a message instructing you to check the .NET version. Browser ...
  • Page 68: Toolbar

    Chapter 3: Working with Target Servers 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
  • Page 69 Chapter 3: Working with Target Servers Button Button Description Name Video Opens the Video Settings dialog, allowing you to Settings manually adjust video conversion parameters. Color Adjusts color settings to reduce excess color Calibration noise. Same as choosing Video > Color Calibrate. Note: Not available in KX II-101-V2.
  • Page 70: Connection Properties

    Chapter 3: Working with Target Servers Button Button Description Name Single Cursor Starts Single Cursor mode in which the local Mode mouse pointer no longer appears onscreen. Press Ctrl+Alt+O to exit this mode. Note: Not available in KX II-101-V2. Full Screen Maximizes the screen real estate to view the Mode target server desktop.
  • Page 71 Chapter 3: Working with Target Servers 2. Choose the Connection Speed from the drop-down list. The device can automatically detect available bandwidth and not limit bandwidth use. However, you can also adjust this usage according to bandwidth limitations.  Auto ...
  • Page 72: Connection Information

    Chapter 3: Working with Target Servers 4. Use the slider to select the desired level of Smoothing (15-bit color mode only). The level of smoothing determines how aggressively to blend screen regions with small color variation into a single smooth color.
  • Page 73: Keyboard Options

    Chapter 3: Working with Target Servers Keyboard Options Keyboard Macros Keyboard macros ensure that keystroke combinations intended for the target server are sent to and interpreted only by the target server. Otherwise, they might be interpreted by the computer on which the Virtual KVM Client is running (your client PC).
  • Page 74 Chapter 3: Working with Target Servers  Click Yes to replace the existing macro with the imported version.  Click Yes to All to replace the currently selected and any other duplicate macros that are found.  Click No to keep the original macro and proceed to the next macro ...
  • Page 75 Chapter 3: Working with Target Servers 3. Click Ok. A dialog from which to locate and select the macro file appears. By default, the macro exists on your desktop. 4. Select the folder to save the macro file to, enter a name for the file and click Save.
  • Page 76 Chapter 3: Working with Target Servers Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequence field to be sure the macro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove. b.
  • Page 77 Chapter 3: Working with Target Servers Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu.
  • Page 78: Video Properties

    Chapter 3: Working with Target Servers Setting CIM Keyboard/Mouse Options To access the DCIM-USBG2 setup menu: 1. Put the mouse focus on a window such as Note Pad (Windows ® operating system) or an equivalent. 2. Select Set CIM Keyboard/Mouse options. This is the equivalent of sending the Left-Control and Num Lock to the target.
  • Page 79 Chapter 3: Working with Target Servers Calibrating Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The color settings are on a target server-basis. Note: The Calibrate Color command applies to the current connection only.
  • Page 80 Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor.
  • Page 81 Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
  • Page 82 Chapter 3: Working with Target Servers Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot from Target server command. If needed, save this screenshot to a file location of your choosing as a bitmap, JPEG or PNG file.
  • Page 83: Mouse Options

    Chapter 3: Working with Target Servers Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and you are accessing the target through MPC or VKC, you may need to change the maximum refresh rate of the monitor in order for the refresh rate to take effect on the target.
  • Page 84 Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
  • Page 85 Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place.  Do not use an animated mouse.
  • Page 86 To be sure to avoid any problems with this function, Raritan recommends you do not have file icons or folder icons in the upper left corner of your desktop.
  • Page 87 Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed.
  • Page 88: Tool Options

    Chapter 3: Working with Target Servers To exit single mouse mode:  Press Ctrl+Alt+O on your keyboard to exit single mouse mode. Tool Options General Settings To set the tools options: 1. Click Tools > Options. The Options dialog appears. 2.
  • Page 89 Turkish Keyboards If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
  • Page 90 Chapter 3: Working with Target Servers Language Configuration method Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Keyboard Indicator Hungarian System Settings (Control Center) Spanish System Settings (Control Center) Italian System Settings (Control Center) Slovenian System Settings (Control Center) Portuguese System Settings (Control Center) Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment.
  • Page 91: View Options

    Chapter 3: Working with Target Servers b. Select Enable Scale Video to automatically scale the display on the target server when it is accessed. c. Select Pin Menu Toolbar if you want the toolbar to remain visible on the target when it is in Full Screen mode. By default, while the target is in Full Screen mode, the menu is only visible when you hover your mouse along the top of the screen.
  • Page 92 Chapter 3: Working with Target Servers View Status Bar By default, the status bar is displayed at the bottom of the target window. To hide the status bar:  Click View > Status Bar to deselect it. To restore the status bar: ...
  • Page 93: Digital Audio

    Client (MPC) support connections to audio devices. Note: Audio CDs are not supported by virtual media so will not work with the audio feature. Before you begin using the audio feature, Raritan recommends you review the audio related information documented in the following sections of Help: ...
  • Page 94 Chapter 3: Working with Target Servers 2. Connect to the target from the Port Access page. 3. Once connected, click the Audio icon in the toolbar. The Connect Audio Device dialog appears. A list of available audio device connected to the remote client PC is displayed. Note: If there are no available audio devices connected to the remote client PC, the Audio icon is grayed out.
  • Page 95 Chapter 3: Working with Target Servers Once an audio connection is established, that Audio menu is changed to Disconnect Audio. To disconnect from the audio device:  Click the Audio icon in the toolbar and select OK when you are prompted to confirm the disconnect. A confirmation message appears.
  • Page 96: Smart Cards

    Chapter 3: Working with Target Servers Smart Cards Using the KX II, you are able to mount a smart card reader onto a target server to support smart card authentication and related applications. For a list of supported smart cards, smart card readers, and additional system requirements, see Supported and Unsupported Smart Card Readers...
  • Page 97 Chapter 3: Working with Target Servers 4. A progress dialog will open. Check the 'Mount selected card reader automatically on connection to targets' checkbox to mount the smart card reader automatically the next time you connect to a target. Click OK to begin the mounting process.
  • Page 98 SCM Microsystems firmware v5.25. Unsupported Smart Card Readers This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, therefore they are unsupported. If a smart card reader does not appear in the supported smart card readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function with the device.
  • Page 99: Help Options

    JRE 1.6 and, therefore, be used as a client. Mac 10.5.8 does not support MPC as a standalone client. 1. To open MPC from a client running any supported browser, type http://IP-ADDRESS/mpc into the address line, where IP-ADDRESS is the IP address of your Raritan device. MPC opens in a new window.
  • Page 100 OK. These specifications can be edited later. 3. In the Navigator panel on the left of the page, double-click the icon that corresponds to your Raritan device to connect to it. Note: Depending on your browser and browser security settings, you may see various security and certificate check and warning messages.
  • Page 101: Chapter 4 Rack Pdu (Power Strip) Outlet Control

    Turning Outlets On/Off and Cycling Power ..........93 Overview The KX II allows you to control Raritan PX and RPC series rack PDU (power strip) outlets connected to the KX II through a D2CIM-PWR. Once a PX or RPC series is setup and then attached to the KX II, the rack PDU and its outlets can be controlled from the Powerstrip page in the KX II interface.
  • Page 102: Turning Outlets On/Off And Cycling Power

    Chapter 4: Rack PDU (Power Strip) Outlet Control  Control - Turn outlets on or off, or cycle their power.  Association - The ports associated with the outlet. Initially, when you open the Powerstrip page, the power strips that are currently connected to the KX II are displayed in the Powerstrip drop- down.
  • Page 103 Chapter 4: Rack PDU (Power Strip) Outlet Control 5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its state will be displayed as 'on'. To turn an outlet off: 1. Click Off. 2.
  • Page 104 Chapter 4: Rack PDU (Power Strip) Outlet Control 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog.
  • Page 105: Chapter 5 Virtual Media

    Chapter 5 Virtual Media In This Chapter Overview ....................97 Using Virtual Media ................103 Connecting to Virtual Media ..............106 Disconnecting Virtual Media ..............109...
  • Page 106: Overview

     PC hard drives  ISO images (disk images)  Digital audio devices* Note: ISO9660 is the standard supported by Raritan. However, other ISO standards can be used. The following client operating systems are supported:  Windows  Mac OS X 10.5 ...
  • Page 107 Chapter 5: Virtual Media The Virtual KVM Client (VKC) and Multi-Platform Client (MPC) can be used to mount virtual media types with the exception of Mac OS X 10.5, which is supported exclusively by MPC.
  • Page 108 Chapter 5: Virtual Media Diagram key Desktop PC USB mass storage device KX II PC hard drive Audio speakers Target server Remote file server (ISO images) CD/DVD drive...
  • Page 109: Prerequisites For Using Virtual Media

    Chapter 5: Virtual Media Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session.
  • Page 110: Virtual Media In A Linux Environment

    Chapter 5: Virtual Media Virtual Media in a Linux Environment Following is important information for Linux ® users regarding using virtual media. Root User Permission Requirement Your virtual media connection can be closed if you mount a CD ROM from a Linux client to a target and then unmount the CD ROM. The connection also closes when a floppy drive has been mounted and then a floppy disk is removed.
  • Page 111 Chapter 5: Virtual Media guest_user@administrator-desktop:~$ getfacl -a /dev/sr0 getfacl: Removing leading '/' from absolute path names # file: dev/sr0 # owner: root # group: cdrom user::rw- user:guest_user:rw- group::rw- mask::rw- other::--- A similar check of the permissions for a removable device shows: guest_user@administrator-desktop:~$ ls -l /dev/sdb1 brw-rw---- 1 root disk 8, 17 12-03-2010 12:02 /dev/sdb1 guest_user@administrator-desktop:~$ ls -l /dev/sdb1...
  • Page 112: Conditions When Read/Write Is Not Available

    Virtual Media File Server Setup (File Server ISO Images Only) (on page 104). Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. 2. Open a KVM session with the appropriate target server. a. Open the Port Access page from the Remote Console.
  • Page 113: Virtual Media File Server Setup (File Server Iso Images Only)

    Note: This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. Note: SMB/CIFS support is required on the file server.
  • Page 114 Chapter 5: Virtual Media Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of third-party software used by the LX, KX, KSX or KX101 G2 device. ® Note: If you are connecting to a Windows 2003 server and attempt to load an ISO image from the server, you may receive an error stating "Virtual Media mounting on port failed.
  • Page 115: Connecting To Virtual Media

    Chapter 5: Virtual Media Connecting to Virtual Media Mounting Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives.
  • Page 116: Mounting Cd-Rom/Dvd-Rom/Iso Images

    You can access the media just like any other drive. Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1.
  • Page 117 Chapter 5: Virtual Media a. Choose the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive. ISO format is the only format supported. b. Click Browse. c. Navigate to the path containing the disk image you want to use and click Open.
  • Page 118: Disconnecting Virtual Media

    Chapter 5: Virtual Media Disconnecting Virtual Media To disconnect the virtual media drives:  For local drives, choose Virtual Media > Disconnect Drive.  For CD-ROM, DVD-ROM, and ISO images, choose Virtual Media > Disconnect CD-ROM/ISO Image. Note: In addition to disconnecting the virtual media using the Disconnect command, simply closing the KVM connection closes the virtual media as well.
  • Page 119: Chapter 6 Usb Profiles

    BIOS menu or boot from a virtual media drive, depending on the target server model, a BIOS profile may be more appropriate. Should none of the standard USB profiles provided by Raritan work with a given KVM target, please contact Raritan Technical Support for...
  • Page 120: Cim Compatibility

    The current release of the KX II comes with the selection of USB profiles described in the following table. New profiles are included with each firmware upgrade provided by Raritan. As new profiles are added, they will be documented in the help.
  • Page 121 Chapter 6: USB Profiles USB profile Description  USB bus speed limited to full- speed (12 MBit/s)  No virtual media support BIOS DellPowerEdge Dell PowerEdge BIOS Access Keyboard Only (Keyboard Only) Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB.
  • Page 122 Chapter 6: USB Profiles USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Restrictions:  USB bus speed limited to full- speed (12 MBit/s) ...
  • Page 123 Chapter 6: USB Profiles USB profile Description Module D2CIM-DVUSB is connected to the Advanced Management Module. Restrictions:  Virtual CD-ROM and disk drives cannot be used simultaneously BIOS Lenovo ThinkPad T61 BIOS Lenovo ThinkPad T61 and X61 & X61 (boot from virtual media) Use this profile to boot the T61 and X61 series laptops from virtual media.
  • Page 124 Chapter 6: USB Profiles USB profile Description Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server when installing Windows 2003 Server without the help of HP SmartStart CD. Restrictions:  USB bus speed limited to full- speed (12 MBit/s) ®...
  • Page 125 Chapter 6: USB Profiles USB profile Description Restrictions:  Virtual CD-ROM and disk drives cannot be used simultaneously Suse 9.2 SuSE Linux 9.2 Use this for SuSE Linux 9.2 distribution. Restrictions:  Absolute mouse synchronization™ not supported  USB bus speed limited to full- speed (12 MBit/s) Troubleshooting 1 Troubleshooting Profile 1...
  • Page 126: Selecting Profiles For A Kvm Port

    Chapter 6: USB Profiles USB profile Description  Virtual CD-ROM and disk drives cannot be used simultaneously WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Use Full Speed for Virtual Use Full Speed for virtual media CIM Media CIM This profile resembles the behavior of the original KX2 release with Full...
  • Page 127: Mouse Modes When Using The Mac Os-X Usb Profile With A Dcim-Vusb

    Chapter 6: USB Profiles Mouse Modes when Using the Mac OS-X USB Profile with a DCIM- VUSB ® If you are using a DCIM-VUSB, using a Mac OS-X USB profile, and running Mac OS-X 10.4.9 (or later), when you reboot you must be in Single Mouse mode to use the mouse at the Boot menu.
  • Page 128: Chapter 7 User Management

    Chapter 7 User Management In This Chapter User Groups ..................119 Users ..................... 128 Authentication Settings ................131 Changing a Password ................144 User Groups The KX II stores an internal list of all user and group names to determine access authorization and permissions.
  • Page 129: User Group List

    Chapter 7: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group.
  • Page 130 Chapter 7: User Management 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the checkboxes next to the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 123).
  • Page 131 Chapter 7: User Management Note: Several administrative functions are available within MPC and from the KX II Local Console. These functions are available only to members of the default Admin group.
  • Page 132 Chapter 7: User Management Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the permissions of all users, including their own. Carefully consider granting these permissions. Permission Description Device Access Allows users and user groups with this While Under CC- permission to directly access the KX II using an SG Management...
  • Page 133 Chapter 7: User Management Permission Description Management authentication (LDAP/LDAPS/RADIUS), login settings. If you are using a tiered configuration in which a base KX II device is used to access multiple other tiered devices, user, user group and remote authentication settings must be consistent across all devices.
  • Page 134 Chapter 7: User Management VM access Read-Write Complete access (read, write) to virtual media. Power control access option Description Deny Deny power control to the target server Access Full permission to power control on a target server For blade chassis, the port access permission will control access to the URLs that have been configured for that blade chassis.
  • Page 135 Chapter 7: User Management Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-level basis. To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2.
  • Page 136: Modifying An Existing User Group

    Chapter 7: User Management 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the order in which they are listed. For instance, in the example shown here, if the two ACL rules were reversed, Dominion would accept no communication at all.
  • Page 137: Users

    Chapter 7: User Management 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and passwords to gain access to the KX II. This information is used to authenticate users attempting to access your KX II. Up to 254 users can be created for each user group. If you are using a tiered configuration in which a base KX II device is used to access multiple other tiered devices, users will need permission to access the base device and permissions to access each individual...
  • Page 138: Adding A New User

    Chapter 7: User Management Adding a New User It is a good idea to define user groups before creating KX II users because, when you add a user, you must assign that user to an existing user group. See Adding a New User Group (on page 120). From the User page, you can add new users, modify user information, and reactivate users that have been deactivated.
  • Page 139: Logging A User Off (Force Logoff)

    Chapter 7: User Management Logging a User Off (Force Logoff) If you are an administrator, you are able to log off another locally authenticated user who is logged on to the KX II. To log off a user: 1. Open the User List page by choosing User Management > User List or click the Connected User link in the left panel of the page.
  • Page 140: Authentication Settings

    Chapter 7: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed.
  • Page 141: Implementing Ldap/Ldaps Remote Authentication

    Chapter 7: User Management Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn.
  • Page 142 LDAP database you want to begin searching for user information. Up to 64 characters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com. Consult your authentication server administrator for the appropriate values to enter into these fields.
  • Page 143 Chapter 7: User Management 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the Secret Phrase field and again in the Confirm Secret Phrase field (up to 128 characters).
  • Page 144 Chapter 7: User Management 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only used when the Enable Secure LDAP checkbox is selected. 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certificate file to validate the certificate provided by the server.
  • Page 145: Returning User Group Information From Active Directory Server

    KX II policies and user group privileges that are applied locally to AD user groups. IMPORTANT: If you are an existing Raritan, Inc. customer, and have already configured the Active Directory server by changing the AD schema, the KX II still supports this configuration and you do not need to perform the following operations.
  • Page 146: Implementing Radius Remote Authentication

    Chapter 7: User Management 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On your AD server, assign the KX II users to the groups created in step 2. 4.
  • Page 147 Chapter 7: User Management 7. The Accounting Port default port is 1813 but can be changed as required. 8. The Timeout is recorded in seconds and default timeout is 1 second, but can be changed as required. The timeout is the length of time the KX II waits for a response from the RADIUS server before sending another authentication request.
  • Page 148 Chapter 7: User Management  CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PAP.
  • Page 149  RADIUS Attribute: Filter-ID  Attribute Type: String  Attribute Value: Raritan:G{KVM_Admin} (where KVM_Admin is group name created locally on Dominion KVM Switch). Case sensitive.  Configure Session Conditions (Date and Time) (Required) - Policy Elements > Session Conditions > Date and Time ...
  • Page 150: Returning User Group Information Via Radius

    Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
  • Page 151 Chapter 7: User Management Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-Port (5) Always 0. NAS-IP-Address (4) The IP address for the KX II. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting.
  • Page 152: User Authentication Process

    Chapter 7: User Management User Authentication Process Remote authentication follows the process specified in the flowchart below:...
  • Page 153: Changing A Password

    Chapter 7: User Management Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
  • Page 154: Chapter 8 Device Management

    Chapter 8 Device Management In This Chapter Network Settings ................... 145 Device Services ..................150 Configuring Modem Settings ..............158 Configuring Date/Time Settings ............159 Event Management ................160 Power Supply Setup ................167 Configuring Ports ................... 168 Connect and Disconnect Scripts ............206 Port Group Management ...............
  • Page 155: Network Basic Settings

    Chapter 8: Device Management Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings (on page 145). To assign an IP address: 1.
  • Page 156 Chapter 8: Device Management d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present. Read-Only Zone ID. This identifies the device with which the address is associated.
  • Page 157: Lan Interface Settings

    Chapter 8: Device Management LAN Interface Settings (on page 148) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
  • Page 158 Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends that you not monitor the port or monitor it only after a failover occurs. When this option is enabled, the following two fields are used: ...
  • Page 159: Device Services

    Chapter 8: Device Management Device Services The Device Services page allows you to configure the following functions:  Enable SSH access  Enable tiering for the base KX II  Enter the discovery port  Enable direct port access  Enable the AKC Download Server Certificate Validation feature if you are using AKC Enabling SSH...
  • Page 160: Entering The Discovery Port

    Chapter 8: Device Management Entering the Discovery Port The KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can configure it to use any TCP port except 80 and 443. To access the KX II from beyond a firewall, your firewall settings must enable two-way communication through the default Port 5000 or a non-default port configured here.
  • Page 161: Configuring And Enabling Tiering

    Chapter 8: Device Management Configuring and Enabling Tiering The tiering feature allows you to access KX II targets and PDUs through one base KX II device. This feature is available for standard KX II devices as well as KX2-808, KX2-832 and KX2-864 devices. Note: Base and tiered devices must all be operating with the same firmware revision.
  • Page 162 Chapter 8: Device Management Enabling Tiering Connect from a target server port on the base device to the tier KX II Local Access port video/keyboard/mouse ports using a D2CIM-DVUSB. If the tier device is a KX2-808, KX2-832 or KX2-864, connect from a target server port on the base device directly to the tier KX2-808/KX2- 832/KX2-864 Extended Local port.
  • Page 163 Chapter 8: Device Management Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached directly to the base are accessible. Power Control You can power on and off targets that are a part of the tiered configuration.
  • Page 164 Chapter 8: Device Management Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a KX II tiered device and a KX II base device. Connect from a target server port on the base device to the tier KX II Local Access port video/keyboard/mouse ports using a D2CIM-DVUSB.
  • Page 165: Enabling Direct Port Access Via Url

    Chapter 8: Device Management Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Login dialog and Port Access page. This feature also provides the ability to enter a username and password directly and proceed to the target if the username and password is not contained in the URL.
  • Page 166: Enabling The Akc Download Server Certificate Validation

    Chapter 8: Device Management Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Option 1: Do Not Enable AKC Download Server Certificate Validation (default setting) If you do not enable AKC Download Server Certificate Validation, all Dominion device users and CC-SG Bookmark and Access Client users...
  • Page 167: Configuring Modem Settings

    Chapter 8: Device Management Configuring Modem Settings To configure modem settings: 1. Click Device Settings > Modem Settings to open the Modem Settings page. 2. Select the Enable Modem checkbox. This will enable the Serial Line Speed and Modem Init String field. 3.
  • Page 168: Configuring Date/Time Settings

    Chapter 8: Device Management 6. Click OK to commit your changes or click Reset to Defaults to return the settings to their defaults. Certified Modems (on page 301) for information on certified modems that work with the KX II. For information on settings that will give you the best performance when connecting to the KX II via modem, see Creating, Modifying and Deleting Profiles in MPC - Generation 2 Devices in the KVM and Serial Access Clients Guide.
  • Page 169: Event Management

    Chapter 8: Device Management 3. To adjust for daylight savings time, check the "Adjust for daylight savings time" checkbox. 4. Choose the method you would like to use to set the date and time:  User Specified Time - Choose this option to input the date and time manually.
  • Page 170 Chapter 8: Device Management 4. Type the Agent Community String (the device's string). An SNMP community is the group to which devices and management stations running SNMP belong. It helps define where information is sent. The community name is used to identify the group. The SNMP device or agent may belong to more than one SNMP community.
  • Page 171 Chapter 8: Device Management To reset to factory defaults:  Click Reset To Defaults. Note: IPv6 addresses cannot exceed 80 characters in length for the host name.
  • Page 172: Configuring Event Management - Destinations

    Chapter 8: Device Management Configuring Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management - Destinations page to select the system events to track and where to send this information.
  • Page 173 Chapter 8: Device Management To reset to factory defaults:  Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possible for the KX II and the router that it is attached to to fall out of synchronization when the KX II is rebooted, preventing the reboot completed SNMP trap from being logged.
  • Page 174 Chapter 8: Device Management Trap Name Description groupDeleted A group has been deleted from the system. groupModified A group has been modified. ipConflictDetected An IP Address conflict was detected. ipConflictResolved An IP Address conflict was resolved. networkFailure An Ethernet interface of the product can no longer communicate over the network.
  • Page 175 Chapter 8: Device Management Trap Name Description setFIPSMode FIPS mode has been enabled. Note: FIPS is not supported by the LX. startCCManagement The device has been put under CommandCenter Management. stopCCManagement The device has been removed from CommandCenter Management. userAdded A user has been added to the system.
  • Page 176: Power Supply Setup

    Chapter 8: Device Management Power Supply Setup The KX II provides dual power supplies, and can automatically detect and provide notification regarding the status of these power supplies. Use the Power Supply Setup page to specify whether you are using one or both of the power supplies.
  • Page 177: Configuring Ports

    Chapter 8: Device Management Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the unit turns red. To turn off the automatic detection:  Deselect the checkbox for the appropriate power supply. To reset to factory defaults: ...
  • Page 178: Configuring Standard Target Servers

    Chapter 8: Device Management  Rename the port. When a CIM is attached the CIM name will be used.  Rename the port, and select 'Persist name on Next CIM Insertion'. When a CIM is attached the name that has been assigned will be copied into the CIM.
  • Page 179 Chapter 8: Device Management 5. Assign a name to identify the server connected to that port. The name can be up to 32 characters, and alphanumeric and special characters are allowed. 6. In the Power Association section, associate a power strip with the port, if needed.
  • Page 180: Configuring Kvm Switches

    Chapter 8: Device Management Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targets. In addition to using hot key sequences with standard servers, KVM switching is supported by blade chassis and in tiered configurations.
  • Page 181: Configuring Rack Pdu (Power Strip) Targets

    KX II rack PDU configuration is done from the KX II Port Configuration page. Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are connected to the Dominion device using the D2CIM-PWR CIM. To connect the rack PDU: 1.
  • Page 182 Note: PX rack PDUs (power strips) can be named in the PX as well as in the KX II. Once a Raritan remote rack PDU is connected to the KX II, it will appear on the Port Configuration page. Click on the power port name on that page to access it.
  • Page 183 Chapter 8: Device Management 3. Click OK.
  • Page 184 Port Access page. To use this feature, you will need:  Raritan remote rack PDU(s)  Power CIMs (D2CIM-PWR) To make power associations (associate rack PDU outlets to...
  • Page 185 Chapter 8: Device Management Removing Power Associations When disconnecting target servers and/or rack PDUs from the device, all power associations should first be deleted. When a target has been associated with a rack PDU and the target is removed from the device, the power association remains.
  • Page 186: Configuring Blade Chassis

    Chapter 8: Device Management Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade chassis that are plugged into the KX II device port. Up to eight blade chassis can be managed at a given time. The blade chassis must be configured as a blade chassis subtype.
  • Page 187 Blade chassis can be managed from the Virtual KVM Client (VKC), the Active KVM Client (AKC), Raritan's Multi-Platform Client (MPC), and CC- SG. Managing blade severs via VKC, AKC and MPC is the same as managing standard target servers.
  • Page 188 Chapter 8: Device Management Generic Blade Chassis Configuration - KSX II, KX II The Generic Blade Chassis' selection provides only a manual configuration mode of operation. See Supported Blade Chassis Models (on page 192), Supported CIMs for Blade Chassis, and Required and Recommended Blade Chassis Configurations page 196) for important, additional information when configuring the blade chassis.
  • Page 189 Chapter 8: Device Management 9. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon to expand the section on the page.
  • Page 190 Chapter 8: Device Management Dell Blade Chassis Configuration Supported Blade Chassis Models (on page 192), Supported CIMs for Blade Chassis, and Required and Recommended Blade Chassis Configurations (on page 196) for important, additional information when configuring the blade chassis. See Dell Chassis Cable Lengths and Video Resolutions for information on cable lengths and video resolutions ®...
  • Page 191 Chapter 8: Device Management Password - Enter the password used to access the blade chassis. Required for auto-discovery mode 2. If you want the KX II to auto-discover the chassis blades, select the Blade Auto-Discovery checkbox and then click Discover Blades on Chassis Now.
  • Page 192 Chapter 8: Device Management e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be associated with the username and password entries. It is in these fields you should enter the field names for the username and password fields used on the login screen for the web application.
  • Page 193 Chapter 8: Device Management 4. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon to expand the section on the page.
  • Page 194 Chapter 8: Device Management IBM Blade Chassis Configuration Supported Blade Chassis Models (on page 192), Supported CIMs for Blade Chassis, and Required and Recommended Blade Chassis Configurations (on page 196) for important, additional information when configuring the blade chassis. See Dell Chassis Cable Lengths and Video Resolutions for information on cable lengths and video resolutions ®...
  • Page 195 Chapter 8: Device Management 2. If you want the KX II to auto-discover the chassis blades, select the Blade Auto-Discovery checkbox and then click Discover Blades on Chassis Now. Once the blades are discovered, they will be displayed on the page. 3.
  • Page 196 Chapter 8: Device Management e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be associated with the username and password entries. It is in these fields you should enter the field names for the username and password fields used on the login screen for the web application.
  • Page 197 Chapter 8: Device Management The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access to the URL links entered in this section of the page is governed by the blade chassis port permissions. a.
  • Page 198 Chapter 8: Device Management Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web application associated with an RSA, DRAC or ILO Processor card.
  • Page 199 Chapter 8: Device Management HP Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports connected to certain types of blades into a group representing the blade chassis. Specifically, HP ® ™ BladeServer blades and Dell ®...
  • Page 200 Chapter 8: Device Management 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. Select the Blade Server Group checkbox. If you want to designate that these ports are attached to blades housed in a blade chassis (for example, HP c3000 or Dell PowerEdge 1855), select the Blade Server Group checkbox.
  • Page 201 Chapter 8: Device Management To delete a port group: 1. Click on the Port Group Management page, select the checkbox of the port group you want to delete. 2. Click Delete. 3. Click OK on the warning message. Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KX II and the corresponding profiles that should be selected per chassis model when configuring them in the KX II application.
  • Page 202 Chapter 8: Device Management Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KX II:  DCIM-PS2  DCIM-USBG2  D2CIM-VUSB  D2CIM-DVUSB Following is a table containing supported CIMs for each blade chassis model that the KX II supports.
  • Page 203 Chapter 8: Device Management Blade chassis Connection method Recommended CIM(s) Both modules enable you to connect a PS/2- compatible keyboard, mouse and video monitor to the system (using a custom cable provided with the system). Source: Dell PowerEdge 1955 Owner's Manual ...
  • Page 204 Chapter 8: Device Management Blade chassis Connection method Recommended CIM(s) Technology  DCIM-USBG2 IBM BladeCenter E The current model BladeCenter E chassis (8677-3Rx) ships standard with one Advanced  D2CIM-DVUSB Management Module. Source: IBM BladeCenter Products and Technology  DCIM-PS2 IBM BladeCenter T The BladeCenter T chassis ships standard with one Advanced Management Module.
  • Page 205 Chapter 8: Device Management Required and Recommended Blade Chassis Configurations This table contains information on limitations and constraints that apply to configuring blade chassis to work with the KX II. Raritan recommends that all of the information below is followed. Blade chassis Required/recommended action ...
  • Page 206  The SSH port configured on the blade chassis management module and the port number entered on the Port Configuration page must match.  Raritan KX II virtual media is supported only on IBM IBM KX2 Virtual ® Media BladeCenter Models H and E.
  • Page 207: Configuring Usb Profiles (Port Page)

    Chapter 8: Device Management Blade chassis Sample URL format  Username: root  Username Field: TEXT_USER_NAME  Password: calvin  Password Field: TEXT_PASSWORD  ® http://192.168.84.217/private/welcome.ssi ® BladeCenter or H Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles for Port section of the Port page.
  • Page 208 Chapter 8: Device Management  Shift-Click and drag to select several continuous profiles.  Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appear in the Selected list. These are the profiles that can be used for the KVM target server connected to the port.
  • Page 209 Chapter 8: Device Management 2. Click Remove. The selected profiles appear in the Available list. These profiles are no longer available for a KVM target server connected to this port. To apply a profile selection to multiple ports: 1. In the Apply Selected Profiles to Other Ports section, select the Apply checkbox for each KVM port you want to apply the current set of selected USB profiles to.
  • Page 210: Configuring Kx Ii Local Port Settings

    Chapter 8: Device Management Configuring KX II Local Port Settings From the Local Port Settings page, you can customize many settings for the KX II Local Console including keyboard, hot keys, video switching delay, power save mode, local user interface resolution settings, and local user authentication.
  • Page 211 Chapter 8: Device Management Note: If you are using KX2-808, KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II via the extended local port. 4. If you are using the tiering feature, select the Enable Local Port Device Tiering checkbox and enter the tiered secret word in the Tier Secret field.
  • Page 212 Note: If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. 7. Choose the local port hotkey. The local port hotkey is used to return to the KX II Local Console interface when a target server interface is being viewed.
  • Page 213 Chapter 8: Device Management  Local/LDAP/RADIUS. This is the recommended option. For more information about authentication, see Remote Authentication (on page 37).  None. There is no authentication for Local Console access. This option is recommended for secure environments only. ...
  • Page 214 Chapter 8: Device Management KX2-808, KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-808, KX2-832 and KX2-864 provide you with two local port options: the standard local port and the extended local port. Each of these port options is enabled and disabled from the Remote Console or from the Local Console on the Local Port Settings page.
  • Page 215: Connect And Disconnect Scripts

    Chapter 8: Device Management Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to or disconnecting from a target. These scripts are defined and managed on the Connection Scripts page. You can create and edit your own scripts on the Connection Script page to perform additional actions when connecting to or disconnecting from targets.
  • Page 216: Adding Scripts

    Chapter 8: Device Management 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Select All or clicking on the checkbox to the left of each target to apply the script to only select targets.
  • Page 217 Chapter 8: Device Management For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to the Script box. Next, select Letters from the Key Set drop-down and add a letter key to the script. 8.
  • Page 218 Chapter 8: Device Management...
  • Page 219: Modifying Scripts

    Chapter 8: Device Management Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connection Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to modify and click Modify. The page is then in Edit mode. 3.
  • Page 220: Port Group Management

    Chapter 8: Device Management 5. Click Import. The Configuration Scripts page opens and the imported scripts are displayed. To export a disconnect script: 1. Click Device Settings > Configuration Scripts. The Configuration Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to export and click Export.
  • Page 221 Chapter 8: Device Management 2. From the Language drop-down, select the language you want to apply to the GUI. 3. Click Apply. Click Reset Defaults to change back to English. Note: Once you apply a new language, the online help is also localized to match your language selection.
  • Page 222: Chapter 9 Security Management

    From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security. Raritan web server certificates are self-signed.
  • Page 223: Login Limitations

    Chapter 9: Security Management To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can specify restrictions for single login, password aging, and the logging out idle users. Limitation Description Enable single login When selected, only one login per user name is limitation allowed at anytime.
  • Page 224 Chapter 9: Security Management Limitation Description Enter the number of days after which a password change is required. The default is 60 days. Log out idle users, Select the "Log off idle users" checkbox to After (1-365 automatically disconnect users after the amount minutes) of time you specify in the "After (1-365 minutes)"...
  • Page 225: Strong Passwords

    Chapter 9: Security Management Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KX II local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
  • Page 226: User Blocking

    Chapter 9: Security Management User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
  • Page 227 Chapter 9: Security Management Option Description Users are denied access to the system for the Timer Lockout specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will be locked out.
  • Page 228: Encryption & Share

    Chapter 9: Security Management Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX II Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX II from your browser.
  • Page 229 Chapter 9: Security Management Encryption mode Description AES-256 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. 256 is the key length. When AES-256 is specified, be certain that your browser supports it, otherwise you will not be able to connect.
  • Page 230 Returns the KX II device to the factory defaults. Reset (default) Enable Local Admin Resets the local administrator password only. Password Reset The password is reset to raritan. Disable All Local No reset action is taken. Resets Note: When using the P2CIM-AUSBDUAL or P2CIM-APS2DUAL to attach a target to two KX IIs, if Private access to the targets is required, both KVM switches must have Private set as their PC Share Mode.
  • Page 231: Enabling Fips 140-2

    Chapter 9: Security Management Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desirable. The KX II uses an embedded FIPS 140- 2-validated cryptographic module running on a Linux ® platform per FIPS 140-2 Implementation Guidance section G.5 guidelines.
  • Page 232: Configuring Ip Access Control

    Chapter 9: Security Management  FIPS 140-2 should be enabled on the client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administrative Tools > Local Security Policy to open the Local Security Settings dialog. 2.
  • Page 233 Chapter 9: Security Management  Drop - IP addresses are denied access to the KX II device. To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/Mask or IPv6/Prefix Length field. Note: The IP address should be entered using CIDR (Classless Inter-Domain Routing notation, in which the first 24 bits are used as a network address).
  • Page 234: Ssl Certificates

    Chapter 9: Security Management 3. You are prompted to confirm the deletion. Click OK. SSL Certificates The KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the KX II has to identify itself to a client using a cryptographic certificate.
  • Page 235 Chapter 9: Security Management 2. Complete the following fields: a. Common name - The network name of the KX II once it is installed in the user's network (usually the fully qualified domain name). It is identical to the name that is used to access the KX II with a web browser but without the prefix “http://”.
  • Page 236 Chapter 9: Security Management Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed certificate is not matched with the private key used to generate the original CSR, the certificate will not be useful.
  • Page 237: Security Banner

    Chapter 9: Security Management Security Banner KX II provides you with the ability to add a security banner to the KX II login process. This feature requires users to either accept or decline a security agreement before they can access the KX II. The information provided in a security banner will be displayed in a Restricted Service Agreement dialog after users access KX II using their login credentials.
  • Page 238 Chapter 9: Security Management Note: You cannot upload a text file from the local port.
  • Page 239: Chapter 10 Maintenance

    Chapter 10 Maintenance In This Chapter Audit Log....................230 Device Information ................. 231 Backup and Restore ................233 USB Profile Management ..............235 Upgrading CIMs ..................237 Upgrading Firmware ................237 Upgrade History ..................239 Rebooting the KX II ................240 Stopping CC-SG Management ..............
  • Page 240: Device Information

    Device Information The Device Information page provides detailed information about your KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX II and CIMs: ...
  • Page 241 Chapter 10: Maintenance Note: Only the numeric portion or the serial numbers are displayed for the DCIM-USB, DCIM-PS2 and DCIM-USB G2 CIMs. For example, XXX1234567 is displayed. The serial number prefix GN is displayed for CIMs that have field configured serial numbers.
  • Page 242: Backup And Restore

    Chapter 10: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KX II by backing up the user configuration settings from the KX II in use and restoring those configurations to the new KX II.
  • Page 243 Chapter 10: Maintenance If you are using Internet Explorer 6 or later, to backup your KX 1. Click Backup. A File Download dialog appears that contains an Open button. Do not click Open. In IE 6 (and later), IE is used as the default application to open files, so you are prompted to open the file versus save the file.
  • Page 244: Usb Profile Management

    Raritan tech support. These profiles are designed to address the needs of your target server’s configuration, in the event that the set of standard profiles does not already address them. Raritan tech support will provide the custom profile and work with you to verify the solution for your target server’s specific needs.
  • Page 245: Handling Conflicts In Profile Names

    Chapter 10: Maintenance 3. Click Upload. The custom profile will be uploaded and displayed in the Profile table. Note: If an error or warning is displayed during the upload process (for example. overwriting an existing custom profile), you may continue with the upload by clicking Upload or cancel it by clicking on Cancel.
  • Page 246: Upgrading Cims

    - doing so will likely result in damage to the unit or CIMs. To upgrade your KX II unit: 1. Locate the appropriate Raritan firmware distribution file (*.RFP) on Raritan website http://www.raritan.com on the Firmware Upgrades web page.
  • Page 247 Chapter 10: Maintenance Note: Copy the firmware update file to a local PC before uploading. Do not load the file from a network drive. 3. Choose Maintenance > Firmware Upgrade. The Firmware Upgrade page opens. 4. Click Browse to navigate to the directory where you unzipped the upgrade file.
  • Page 248: Upgrade History

    Chapter 10: Maintenance As prompted, close the browser and wait approximately 5 minutes before logging in to the KX II again. again. For information about upgrading the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Access Clients Guide. Note: Firmware upgrades are not supported via modem.
  • Page 249: Rebooting The Kx Ii

    Chapter 10: Maintenance Rebooting the KX II The Reboot page provides a safe and controlled way to reboot your KX II. This is the recommended method for rebooting. Important: All KVM and serial connections will be closed and all users will be logged off. To reboot your KX II: 1.
  • Page 250: Stopping Cc-Sg Management

    Chapter 10: Maintenance Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC-SG management. If you are managing the KX II through CC-SG and connectivity between CC-SG and the KX II is lost after the specified timeout interval (typically 10 minutes), you are able to end the CC-SG management session from the KX II console.
  • Page 251 Chapter 10: Maintenance 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
  • Page 252: Chapter 11 Diagnostics

    Chapter 11 Diagnostics In This Chapter Network Interface Page ................. 243 Network Statistics Page ................. 244 Ping Host Page ..................246 Trace Route to Host Page ..............246 Device Diagnostics ................248 Network Interface Page The KX II provides information about the status of your network interface. To view information about your network interface: ...
  • Page 253: Network Statistics Page

    Chapter 11: Diagnostics Network Statistics Page The KX II provides statistics about your network interface. To view statistics about your network interface: 1. Choose Diagnostics > Network Statistics. The Network Statistics page opens. 2. Choose the appropriate option from the Options drop-down list: ...
  • Page 254 Chapter 11: Diagnostics  Interfaces - Produces a page similar to the one displayed here.  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.
  • Page 255: Ping Host Page

    Chapter 11: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another KX II is accessible. To ping the host: 1.
  • Page 256 Chapter 11: Diagnostics 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The output of trace route is displayed in the Result field.
  • Page 257: Device Diagnostics

    Chapter 11: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. Device diagnostics downloads the diagnostics information from the KX II to the client machine. Two operations can be performed on this page: ...
  • Page 258 Chapter 11: Diagnostics a. Click Save to File. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
  • Page 259: Chapter 12 Command Line Interface (Cli)

    Chapter 12 Command Line Interface (CLI) In This Chapter Overview ....................250 Accessing the KX II Using CLI .............. 251 SSH Connection to the KX II ..............251 Logging In ....................252 Navigation of the CLI ................252 Initial Configuration Using CLI ............... 254 CLI Prompts ...................
  • Page 260: Accessing The Kx Ii Using Cli

    Chapter 12: Command Line Interface (CLI) Accessing the KX II Using CLI Access the KX II by using one of the following methods:  SSH (Secure Shell) via IP connection A number of SSH clients are available and can be obtained from the following locations: ...
  • Page 261: Logging In

    Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default password: raritan The welcome message displays. You are now logged on as an administrator. After reviewing the following...
  • Page 262: Cli Syntax -Tips And Shortcuts

    Chapter 12: Command Line Interface (CLI) CLI Syntax -Tips and Shortcuts Tips  Commands are listed in alphabetical order.  Commands are not case sensitive.  Parameter names are single word without underscore.  Commands without arguments default to show current settings for the command.
  • Page 263: Initial Configuration Using Cli

    1. Reset the administrator password. All KX II devices are shipped with the same default password. Therefore, to avoid security breaches it is imperative that you change the admin password from raritan to one customized for the administrators who will manage the KX II device.
  • Page 264: Cli Prompts

    Chapter 12: Command Line Interface (CLI) The KX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally using the local serial port. The administrator needs to configure the users and groups, services, security, and serial ports to which the serial targets are attached to the KX II.
  • Page 265: Security Issues

    Chapter 12: Command Line Interface (CLI)  Enter admin > config > network. Command Description help Display overview of commands. history Display the current session's command line history. interface Set/get network parameters. ipv6_interface Set/get IPv6 network parameters. logout Logout of the current CLI session. name Device name configuration.
  • Page 266: Interface Command

    Chapter 12: Command Line Interface (CLI) Commands Description ipv6 Set/get IPv6 network parameters. Interface Command The Interface command is used to configure the KX II network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters ipauto <none|dhcp>...
  • Page 267: Name Command

    Chapter 12: Command Line Interface (CLI) Name Command The name command is used to configure the network name. The syntax of the name is: name [devicename <devicename>] [hostname <hostname>] Device name configuration devicename <devicename> Device Name hostname <hostname> Preferred host name (DHCP only) Name Command Example The following command sets the network name:...
  • Page 268: Chapter 13 Kx Ii Local Console

    Chapter 13 KX II Local Console In This Chapter Overview ....................259 Simultaneous Users ................259 KX II Local Console Interface: KX II Devices ........260 Security and Authentication ..............260 Available Resolutions ................261 Port Access Page (Local Console Server Display) ....... 262 Accessing a Target Server ..............
  • Page 269: Kx Ii Local Console Interface: Kx Ii Devices

    Chapter 13: KX II Local Console KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provides standard KVM management and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
  • Page 270: Available Resolutions

    Chapter 13: KX II Local Console Available Resolutions The KX II Local Console provides the following resolutions to support various monitors:  800x600  1024x768  1280x1024 Each of these resolutions supports a refresh rate of 60Hz and 75Hz.
  • Page 271: Port Access Page (Local Console Server Display)

    Chapter 13: KX II Local Console Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access page opens. This page lists all of the KX II ports, the connected KVM target servers, and their status and availability.
  • Page 272 Chapter 13: KX II Local Console To use the Port Access page: 1. Log in to the Local Console. The KVM target servers are initially sorted by Port Number. You can change the display to sort on any of the columns. ...
  • Page 273: Accessing A Target Server

    Chapter 13: KX II Local Console 2. Click View by Port or View by Group to switch between views.  In addition to the Port Number, Port Name, Status, Type, and Availability, a Group column is also displayed on the View by Group tab.
  • Page 274: Scanning Ports - Local Console

    Chapter 13: KX II Local Console Scanning Ports - Local Console The KX II scanning feature is supported by the Local Console. The targets that are found during the scan are displayed on the Scan page one at a time, which is different from the Remote Console port slide show.
  • Page 275: Using Scan Options

    Chapter 13: KX II Local Console Using Scan Options Following are options available to you while scanning targets. With the exception of the Expand/Collapse icon, all of these options are selected from the Options menu in the upper left of the Port Scan viewer. The options will return to their defaults when you close the window.
  • Page 276: Local Console Smart Card Access

    Chapter 13: KX II Local Console Local Console Smart Card Access To use a smart card to access a server at the Local Console, plug a USB smart card reader into the KX II using one of the USB ports located on the KX II.
  • Page 277: Smart Card Access In Kx2 8Xx Devices

    Chapter 13: KX II Local Console To update the Card Readers Detected list:  Click Refresh if a new smart card has been mounted. The Card Readers Detected list will be refreshed to reflect the newly added smart card reader. Smart Card Access in KX2 8xx Devices If you are using a smart card reader to access a server from the Local Console through a KX2-808, KX2-832 or KX2-864 device, the extended...
  • Page 278: Hot Keys And Connect Keys

    Chapter 13: KX II Local Console 2. In the Select Profile To Use field, select the profile to use from among those available for the port. 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field.
  • Page 279: Special Sun Key Combinations

    Chapter 13: KX II Local Console Standard servers Connect key action Key sequence example Press and Release 1 > Release Left ALT Disconnect from a Disconnect from target port 11 and return to the target and return to local port GUI (the page from which you the local port GUI connected to target): ...
  • Page 280: Returning To The Kx Ii Local Console Interface

    Chapter 13: KX II Local Console Sun key Local port key combination Copy Ctrl + Alt + F6 Open Ctrl + Alt + F7 Find Ctrl + Alt + F9 Ctrl + Alt + F10 Paste Ctrl + Alt + F8 Mute Ctrl + Alt + F12 Compose...
  • Page 281: Configuring Kx Ii Local Console Local Port Settings

    Chapter 13: KX II Local Console Configuring KX II Local Console Local Port Settings From the Local Port Settings page, you can customize many settings for the KX II Local Console including keyboard, hot keys, video switching delay, power save mode, local user interface resolution settings, and local user authentication.
  • Page 282 Note: If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. 3. Choose the local port hotkey. The local port hotkey is used to return to the KX II Local Console interface when a target server interface is being viewed.
  • Page 283 Chapter 13: KX II Local Console  Local/LDAP/RADIUS. This is the recommended option. For more information about authentication, see Remote Authentication (on page 37).  None. There is no authentication for Local Console access. This option is recommended for secure environments only. ...
  • Page 284 Chapter 13: KX II Local Console 10. Click OK. Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local port can be configured from the Remote Console on the Port Configuration page or from the Local Console on the Local Port Settings page.
  • Page 285: Kx Ii Local Console Factory Reset

    Chapter 13: KX II Local Console KX II Local Console Factory Reset Note: This feature is available only on the KX II Local Console. The KX II offers several types of reset modes from the Local Console user interface. Note: It is recommended that you save the audit log prior to performing a factory reset.
  • Page 286: Connect And Disconnect Scripts

    Chapter 13: KX II Local Console Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to or disconnecting from a target. These scripts are defined and managed on the Connection Scripts page. You can create and edit your own scripts on the Connection Script page to perform additional actions when connecting to or disconnecting from targets.
  • Page 287: Adding Scripts

    Chapter 13: KX II Local Console 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Select All or clicking on the checkbox to the left of each target to apply the script to only select targets.
  • Page 288 Chapter 13: KX II Local Console For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to the Script box. Next, select Letters from the Key Set drop-down and add a letter key to the script. 8.
  • Page 289 Chapter 13: KX II Local Console...
  • Page 290: Modifying Scripts

    Chapter 13: KX II Local Console Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connection Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to modify and click Modify. The page is then in Edit mode. 3.
  • Page 291 Chapter 13: KX II Local Console...
  • Page 292: Appendix A Using Kx Ii To Access Paragon Ii

    Appendix A Using KX II to Access Paragon II In This Chapter Overview ....................283 Connecting the Paragon II to the KX II ..........284 Overview If you do not have the P2SC device, you can connect the Paragon II system to a KX II device that is managed by CC-SG so that Paragon II is accessible from CC-SG.
  • Page 293 Appendix A: Using KX II to Access Paragon II The user station with DCIM-USB-G2 or DCIM-PS2 attached KX II When you access the Paragon system from KX II or CC-SG (if the KX II is managed by CC-SG), the Paragon OSUI login screen appears for you to log in.
  • Page 294 Appendix A: Using KX II to Access Paragon II 4. If you want to have more paths to access the same Paragon II system in KX II or CC-SG, repeat Steps 1 to 3 to connect additional user stations to KX II.
  • Page 295: Appendix B Specifications

    Appendix B Specifications In This Chapter Physical Specifications ................286 Computer Interface Module (CIMs) Specifications ........ 288 Supported Operating Systems (Clients) ..........288 Supported Browsers ................289 Supported Paragon CIMS and Configurations ........290 Supported Video Resolutions ..............294 Smart Card Readers ................296 Dell Chassis Cable Lengths and Video Resolutions ......
  • Page 296 Appendix B: Specifications Dominion Description Dimensions (WxDxH) Weight Power and heat KX II Model dissipation DKX2-416 16 server ports, 4 remote 17.3" x 11.4" x 1.75"; 9.04lbs; Dual Power 100V/240V users, 1 local port for use at 439 x 290 x 44mm 4.1kg 47/63Hz 1A 63W 54 the rack...
  • Page 297: Computer Interface Module (Cims) Specifications

    CIM for remote power management 1.3" x 3.0" x 0.6"; 33 x 0.20lb; 76 x 15mm 0.09kg P2CIM-SER Paragon II/Dominion KX II CIM for serial 1.3" x 3.0" x 0.6"; 33 x 0.20lb; (ASCII) devices 76 x 15mm 0.09kg Supported Operating Systems (Clients)
  • Page 298: Supported Browsers

    Appendix B: Specifications Client operating system Virtual media (VM) support on client? ™ Solaris Linux ® ™ ® The JRE plug-in is available for the Windows 32-bit and 64-bit operating systems. MPC and VKC can be launched only from a 32-bit browser, or 64-bit IE7 or IE8 browser.
  • Page 299: Supported Paragon Cims And Configurations

    Appendix B: Specifications Supported Paragon CIMS and Configurations The KX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL CIMs, which provide two RJ45 connections to different KVM switches. Support of these CIMs provides a second path to access the target in the event that one of the KVM switches is blocked or fails.
  • Page 300: Kx Ii To Kx Ii Guidelines

    Appendix B: Specifications KX II to KX II Guidelines The following system configuration guidelines should be followed when you are using Paragon CIMs in a KX II to KX II configuration: Concurrent Access Both KX II KVM switches should be configured with the same policy for concurrent access to targets, either both PC-Share or both Private.
  • Page 301: Kx Ii To Paragon Ii Guidelines

    Appendix B: Specifications If a connection to the target is in place from the other KX II, the availability is checked when a connection is attempted. Access is denied or allowed consistent with the PC-Share policy in place for the KX II. Until that time, the availability is not be updated on the other KX II.
  • Page 302 Appendix B: Specifications Paragon II Mode description Supported? operation mode indicate ‘available’. PC Share A server or other device Supported. on a specific channel port can be selected and controlled by more than However, PC Share Idle one user, but only one Timeout, which is configured user has keyboard and on the Paragon II, is not...
  • Page 303: Supported Distance For Kx Ii Integration

     Supported distance from KX II to the KX II user station is up to 150 cable feet (45 m). For more detailed information, see Dominion KX II User Guide. Supported Video Resolutions Ensure that each target server's video resolution and refresh rate are supported by the KX II and that the signal is noninterlaced.
  • Page 304: Target Server Connection Distance And Video Resolution

    Appendix B: Specifications Resolutions 800x600 @72Hz 1280x1024 @85Hz 800x600 @75Hz 1360x768@60Hz 800x600 @85Hz 1366x768@60Hz 800x600 @90Hz 1368x768@60Hz 800x600 @100Hz 1400x1050@60Hz 832x624 @75.1Hz 1440x900@60Hz 1024x768 @60Hz 1600x1200 @60Hz 1024x768@70 1680x1050@60Hz 1024x768@72 1920x1080@60Hz Note: Composite Sync and Sync-on-Green video require an additional adapter.
  • Page 305: Smart Card Readers

    Appendix B: Specifications Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so forth and the subjective nature of video quality, Raritan cannot guarantee performance across all distances in all environments. See the Supported Video Resolutions (on page 294) for the video resolutions supported by the KX II.
  • Page 306: Smart Card Minimum System Requirements

    SCM Microsystems firmware v5.25. Unsupported Smart Card Readers This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, therefore they are unsupported. If a smart card reader does not appear in the supported smart card readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function with the device.
  • Page 307 Raritan device.  CCID Requirements If the Raritan D2CIM-DVUSB VM/CCID is not recognized as a smart card reader by your Linux target, you may need to update the CCID driver version to 1.3.8 or above and update the driver configuration file (Info.plist).
  • Page 308: Dell Chassis Cable Lengths And Video Resolutions

    When the pcsc daemon (resource manager in framework) is restarted, restart the browser and MPC, too. Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using the following cable lengths and video resolutions when you are connecting to ®...
  • Page 309: Audio Bandwidth Requirements

    Appendix B: Specifications Cable length Video resolution 30 ft. 1600x1200x60 Audio Bandwidth Requirements The table below details the bandwidth requirements to transport audio under each of the selected formats. Audio format Network bandwidth requirement 44.1 KHz, 16bit stereo 176 KB/s 44.1 KHz, 16bit mono 88.2 KB/s 2.05 KHz, 16bit stereo...
  • Page 310: Number Of Supported Audio/Virtual Media And Smartcard Connections

    Appendix B: Specifications Number of Supported Audio/Virtual Media and Smartcard Connections Following are the number of simultaneous Audio/Virtual Media and Smartcard connections that can be made from a client to a target:  1 smartcard  1 virtual media  1 Smartcard and 1 virtual media ...
  • Page 311: Remote Connection

    KX II Local Console functions. For more information about non-US keyboards, see Informational Notes (on page 315). Note: Raritan strongly recommends that you use system-config-keyboard to change languages if you are working in a Linux environment. Language Regions Keyboard layout...
  • Page 312: Tcp And Udp Ports Used

    Appendix B: Specifications Language Regions Keyboard layout German Germany and Austria German keyboard (QWERTZ layout) French Belgium Belgian Norwegian Norway Norwegian Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian Slovenian Slovenia Slovenian Italian Italy Italian Spanish Spain and most Spanish Spanish speaking countries Portuguese...
  • Page 313 KX II (Raritan KVM- This port is used to discover other Dominion devices and for over-IP) Protocol, communication between Raritan devices and systems, including CC- Configurable Port SG for devices that CC-SG management is available. By default, this is 5000 set to Port 5000, but you may configure it to use any TCP port not currently in use.
  • Page 314: Events Captured In The Audit Log And Syslog

    Appendix B: Specifications Events Captured in the Audit Log and Syslog Following is a list and description of the events that are captured by the KX II audit log and syslog:  Access Login - A user has logged in to the KX II ...
  • Page 315 Appendix B: Specifications KX II network speed setting 100/Half 100/Half KX II: 100/Half 100/Half 100/Full Communica Communicat tion Switch: 100/Half KX II: 10/Full KX II: 10/Full 10/Half Communica Communica Communicat 10/Half tion tion Switch: Switch: 10/Full 10/Full 10/Half KX II: 10/Half 10/Half Communica...
  • Page 316: Appendix C Updating The Ldap Schema

    Appendix C Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ............307 Setting the Registry to Permit Write Operations to the Schema ... 308 Creating a New Attribute ...............
  • Page 317: Setting The Registry To Permit Write Operations To The Schema

    Appendix C: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: ®...
  • Page 318: Adding Attributes To The Class

    Appendix C: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
  • Page 319 Appendix C: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
  • Page 320: Updating The Schema Cache

    Appendix C: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: ®...
  • Page 321 Appendix C: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
  • Page 322 Appendix C: Updating the LDAP Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
  • Page 323 Appendix C: Updating the LDAP Schema 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the KX II) in the Edit Attribute field. Click OK.
  • Page 324: Appendix D Informational Notes

    This section includes important notes on KX II usage. Future updates will be documented and available online through the Help link in the KX II Remote Console interface. Note: Some topics in this section reference other multiple Raritan devices because various devices are impacted by the information. Java Runtime Environment (JRE)
  • Page 325: Ipv6 Support Notes

    Appendix D: Informational Notes IPv6 Support Notes Java ™ Java 1.6 supports IPv6 for the following:  ™ Solaris 10 (and later)  ® Linux kernel 2.1.2 (and later)/RedHat 6.1 (and later) Java 5.0 and above supports the IPv6 for the following: ...
  • Page 326: Keyboards

    Appendix D: Informational Notes Keyboards Non-US Keyboards French Keyboard ® Caret Symbol (Linux Clients Only) The Virtual KVM Client and the Multi-Platform Client (MPC) do not process the key combination of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux clients.
  • Page 327 ® Because the Sun on Linux has problems generating the correct KeyEvents for foreign-language keyboards configured using System Preferences, Raritan recommends that you configure foreign keyboards using the methods described in the following table. Language Configuration method US Intl Default...
  • Page 328: Macintosh Keyboard

    Appendix D: Informational Notes Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using a Hungarian keyboard from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double Acute work only with JRE 1.6.
  • Page 329: Fedora

    Firefox 1.5 or 2.0. Through testing, it has been determined that installation of libXp resolves window focusing issues with Fedora Core 6. Raritan has tested with libXp-1.0.0.8.i386.rpm; this resolved all of the keyboard focus and popup-menu problems. Note: libXp is also required for the SeaMonkey (formerly Mozilla ®...
  • Page 330: Video Modes And Resolutions

    Appendix D: Informational Notes Video Modes and Resolutions SUSE/VESA Video Modes The SuSE X.org configuration tool SaX2 generates video modes using modeline entries in the X.org configuration file. These video modes do not correspond exactly with VESA video mode timing (even when a VESA monitor is selected).
  • Page 331: Audio

    Features that May Interrupt an Audio Connection If you use any of the following features while connected to an audio device, your audio connection may be interrupted. Raritan recommends you do not use these features if you are connected to an audio device: ...
  • Page 332: Audio In A Mac Environment

    Appendix D: Informational Notes Audio in a Mac Environment Following are known issues in a Mac ® environment.  On Mac clients, only one playback device is listed on the Connect Audio panel when accessing the device through the Virtual KVM Client (VKC) and Multi-Platform Client (MPC).
  • Page 333 The USB Profile Menu selections are configurable via the Console Device Settings > Port Configuration page. Should none of the standard USB profiles provided by Raritan meet your target server requirements, Raritan Technical Support can work with you to arrive at a solution tailored for that target. Raritan recommends that you do the following: 1.
  • Page 334: Changing A Usb Profile When Using A Smart Card Reader

    Appendix D: Informational Notes Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will need to change the USB profile for a target server. For example, you may need to change the connection speed to "Use Full Speed for Virtual Media CIM"...
  • Page 335: Virtual Media

    Appendix D: Informational Notes Virtual Media Virtual Media via VKC and AKC in a Windows Environment ® Windows XP operating system administrator and standard user ® privileges vary from those of the Windows Vista operating system and the Windows 7 ®...
  • Page 336: Virtual Media Not Refreshed After Files Added

    Appendix D: Informational Notes Drive Partitions  The following drive partition limitations exist across operating systems:  Windows and Mac targets are not able to read Linux formatted partitions  ® ® Windows and Linux cannot read Mac formatted partitions ...
  • Page 337: Virtual Media Linux Drive Listed Twice

    Appendix D: Informational Notes Virtual Media Linux Drive Listed Twice For KX II 2.4.0 (and later) and LX 2.4.5 (and later), users who are logged ™ in to Linux clients as root users, the drives are listed twice in the Local Drive drop-down.
  • Page 338: Windows 2000 Composite Usb Device Behavior For Virtual Media

    Virtual KVM Client Version Not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from CommandCenter Secure Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”.
  • Page 339: Single Mouse Mode - Connecting To A Target Under Cc-Sg Control Via Vkc Using Firefox

    Multi-Platform Client (MPC). Moving Between Ports on a Device If you move a between ports on the same Raritan device and resume management within one minute, CC-SG may display an error message.
  • Page 340: Appendix E Frequently Asked Questions

    ® software? pcAnywhere , Windows Terminal Services/Remote Desktop, VNC, etc. However, because Dominion KX II is not a software but a hardware solution, it’s much more powerful:  Hardware- and OS-independent – Dominion KX II can be used ® to manage servers running many popular OSs, including Intel ®...
  • Page 341 Question Answer How large is the Dominion Dominion KX II is only 1U high (except the KX2-864 and KX2-464, KX II? which are 2U), fits in a standard 19" rack mount and is only 11.4" (29 cm) deep. The Dominion KX2-832 and KX2-864 are 13.8" (36 cm) deep.
  • Page 342 Question Answer What is the file size of the The Virtual KVM Client (VKC) applet used to access Dominion KX II applet that’s used to access is approximately 500KB in size. The following chart describes the time required to retrieve Dominion KX II’s applet at different network...
  • Page 343 ISO images. What is required for virtual A Dominion KX II virtual media CIM is required. There are two of media? these CIMs: the D2CIM-VUSB and the D2CIM-DVUSB. The D2CIM-VUSB has a single USB connector and is for customers who will use virtual media at the OS level.
  • Page 344 In general, there is a trade-off between bandwidth and KVM-over-IP performance? performance. The more bandwidth available, the better performance can be. In limited bandwidth environments, performance can degrade. The Dominion KX II has been optimized to provide strong performance in a wide variety of environments.
  • Page 345 Other factors include the server’s video resolution, networking speed and characteristics, client PC resources and video card noise. The Dominion KX II has very sophisticated video processing algorithms that optimize bandwidth and performance for a variety of environments. In addition, they are highly configurable; there are many settings to optimize bandwidth usage.
  • Page 346 Appendix E: Frequently Asked Questions User task Default 1Mb speed 1Mb speed and 15-bit and 8-bit color color 40 – 70 KB/s 10 – 25 KB/s 5 – 15 KB/s Drag Icon 10 – 40 KB/s 5 – 20 KB/s 5 –...
  • Page 347 Appendix E: Frequently Asked Questions User task Default 1Mb speed 1Mb speed and 15-bit and 8-bit color color 1500 – 2500 400 – 550 200 – 350 QuickTime Video KB/s KB/s KB/s  With reduced bandwidth settings, bandwidth is reduced significantly for virtually all tasks.
  • Page 348 Ensure that the connection speed is set to 100 Mb or 1 Gb and the color depth is set to 15-bit RGB color. What is the maximum The Dominion KX II is the first and only KVM-over-IP switch to support full high definition (HD) remote video resolution – 1920x1080. remote (over IP) video...
  • Page 349 Dominion KX II, servers can be configured and managed at the BIOS level wirelessly. Does the Dominion KX II offer dual gigabit Ethernet Yes. Dominion KX II features dual gigabit ports to provide redundant failover or load balancing? Ethernet ports to provide redundant failover capabilities.
  • Page 350 IP address. I’m having problems connecting to the Dominion KX II The Dominion KX II relies on your over my IP network. What could be the problem? LAN/WAN network.
  • Page 351 Given the gradual transition from IPv4 to IPv6, dual stack is a fundamental requirement for IPv6 support. How do I enable IPv6 on the Dominion KX II? Use the "Network Settings" page, available from the "Device Settings" tab. Enable IPv6 addressing and choose manual or auto- configuration.
  • Page 352 IPv6, then follow the above instructions to enable IPv4/IPv6 dual-stack operation. Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6. The Dominion KX II user guide describes the Dominion KX II’s support for IPv6.
  • Page 354: Index

    Index A. AC Power • 28 C. Network Port • 29 About the Active KVM Client • 57 Cabling Example in Tiered Configurations • Absolute Mouse Mode • 78 Access and Control Target Servers Remotely • Calibrating Color • 70 CC-SG •...
  • Page 355 Index Configuring KX II Local Port Settings • 30, Editing rciusergroup Attributes for User Members • 311 201, 205, 275 Enabling Direct Port Access via URL • 57, 156 Configuring KX II Local Port Settings from the Local Console • 271, 275 Enabling FIPS 140-2 •...
  • Page 356 Index Importing and Exporting Scripts • 207, 210, Local Port Requirements • 297 Logging a User Off (Force Logoff) • 130 Informational Notes • 84, 302, 315 Logging In • 251, 252 Initial Configuration Using CLI • 254 Logging Out • 55 Installation and Configuration •...
  • Page 357 Index Scanning Ports - Local Console • 50, 265 Security and Authentication • 260 Security Banner • 228 Package Contents • 13 Security Issues • 256 Physical Specifications • 286 Security Management • 213 Ping Host Page • 246 Security Settings • 129, 213 Port Access Page •...
  • Page 358 Index Updating the Schema Cache • 311 Configure the Keyboard Language (Optional) • 14, 39 Upgrade History • 239 Upgrading CIMs • 111, 198, 237 Step 7 Configure Tiering (Optional) • 14, 40 Upgrading Firmware • 237 Stopping CC-SG Management • 241 USB Ports and Profiles •...
  • Page 359 Index Windows 7 and Windows Vista Settings • 17 Windows XP, Windows 2003 and Windows 2008 Settings • 16 Working with Target Servers • 5, 41, 178...
  • Page 360: United Kingdom

    For CommandCenter Secure Gateway: Press 6, then Press 2 Phone: +31-10-2844040 Fax: 732-764-8887 Email: tech.europe@raritan.com Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m. GMT China Phone +44(0)20-7090-1390...

Table of Contents