Raritan DKX2-V2.3.5-0N-E User Manual

Raritan DKX2-V2.3.5-0N-E User Manual

Raritan computer switch user manual
Table of Contents

Advertisement

Quick Links

Dominion KX II
User Guide
Release 2.3.5
Copyright © 2011 Raritan, Inc.
DKX2-v2.3.5-0N-E
March 2011
255-62-4023-00

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DKX2-V2.3.5-0N-E and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Raritan DKX2-V2.3.5-0N-E

  • Page 1 Dominion KX II User Guide Release 2.3.5 Copyright © 2011 Raritan, Inc. DKX2-v2.3.5-0N-E March 2011 255-62-4023-00...
  • Page 2 This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc. © Copyright 2011 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
  • Page 3: Table Of Contents

    Contents Chapter 1 Introduction KX II Overview ... 2 KX II Help ... 4 Related Documentation ... 5 KX II Client Applications ... 5 Virtual Media ... 6 Product Photos ... 7 Product Features ... 9 Hardware ... 9 Software ... 10 Terminology ...
  • Page 4 Contents Video Properties ... 63 Mouse Options... 68 VKC Virtual Media ... 73 Smart Cards (VKC, AKC and MPC) ... 74 Tool Options ... 76 View Options ... 79 Help Options ... 80 Active KVM Client (AKC) ... 80 Overview ... 80 AKC Supported Operating Systems and Browsers ...
  • Page 5 Adding a New User ... 120 Modifying an Existing User ... 120 Logging a User Off (Force Logoff) ... 121 Authentication Settings ... 122 Implementing LDAP/LDAPS Remote Authentication ... 123 Returning User Group Information from Active Directory Server ... 127 Implementing RADIUS Remote Authentication ...
  • Page 6 Contents Configuring IP Access Control ... 205 SSL Certificates ... 207 Security Banner ... 209 Chapter 10 Maintenance Audit Log ... 211 Device Information ... 212 Backup and Restore ... 213 USB Profile Management ... 216 Handling Conflicts in Profile Names ... 217 Upgrading CIMs ...
  • Page 7 Chapter 13 KX II Local Console Overview ... 242 Using the KX II Local Console ... 242 Simultaneous Users ... 242 KX II Local Console Interface ... 243 Security and Authentication ... 243 Local Console Smart Card Access ... 244 Smart Card Access in KX2 8 Devices ...
  • Page 8 Contents Setting the Registry to Permit Write Operations to the Schema ... 283 Creating a New Attribute ... 283 Adding Attributes to the Class ... 284 Updating the Schema Cache ... 286 Editing rciusergroup Attributes for User Members ... 286 Appendix C Informational Notes Overview ...
  • Page 9 Appendix D FAQs General Questions ... 303 Remote Access ... 305 Universal Virtual Media ... 307 USB Profiles ... 308 Bandwidth and KVM-over-IP Performance ... 310 Ethernet and IP Networking ... 315 IPv6 Networking ... 317 Servers ... 319 Blade Servers ... 320 Installation ...
  • Page 10: Chapter 1 Introduction

    Chapter 1 Introduction In This Chapter KX II Overview ... 2 KX II Help... 4 KX II Client Applications ... 5 Virtual Media ... 6 Product Photos ... 7 Product Features ... 9 Terminology ... 10 Package Contents ... 12...
  • Page 11: Kx Ii Overview

    KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can be controlled with a standard KX II. With the KX II 8-user model, up to 32 servers can be controlled with the KX2-832 and up to 64 servers can be controlled with the KX2-864.
  • Page 12 Chapter 1: Introduction...
  • Page 13: Kx Ii Help

    Chapter 1: Introduction Diagram key KX II Help The KX II help provides information on how to install, set up, and configure the KX II. It also includes information on accessing target servers and power strips, using virtual media, managing users and security, and maintaining and diagnosing the KX II.
  • Page 14: Related Documentation

    Related Documentation The KX II help is accompanied by a KX II Device Quick Setup Guide, which can be found on the http://www.raritan.com/support/firmware-and-documentation/ Raritan's website. Installation requirements and instructions for client applications used with the KX II can be found in the KVM and Serial Access Clients Guide, also found on the Raritan website.
  • Page 15: Virtual Media

    Chapter 1: Introduction Virtual Media All KX II models support virtual media. The benefits of virtual media - mounting of remote drives/media on the target server to support software installation and diagnostics - are now available in all of the KX II models. Each KX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD, DVD, USB, internal and remote drives and images.
  • Page 16: Product Photos

    Chapter 1: Introduction Product Photos KX II KX2-832...
  • Page 17 Chapter 1: Introduction KX2-864...
  • Page 18: Product Features

    Product Features Hardware  Integrated KVM-over-IP remote access  1U or 2U rack-mountable (brackets included)  Dual power supplies with failover; autoswitching power supply with power failure warning  8, 16, 32, or 64 (on KX2-464) server ports  32 (KX2-832) or 64 (KX2-864) server ports ...
  • Page 19: Software

    Chapter 1: Introduction Software  Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs  Absolute Mouse Synchronization with D2CIM-VUSB CIM and D2CIM-DVUSB CIMs  Plug-and-Play  Web-based access and management  Intuitive graphical user interface (GUI)  128-bit encryption of complete KVM signal, including video and virtual media ...
  • Page 20 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) KX II Local Access Console Local User - an optional user console (consisting of a keyboard, mouse, and multi-sync VGA monitor) attached directly to the KX II to control KVM target servers (directly at the rack, not through the network).
  • Page 21: Package Contents

    Chapter 1: Introduction Package Contents Each KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmount chassis. Each KX II device ships with the following contents: Amount included Item KX II device KX II Quick Setup Guide Rackmount kit AC power cords Cat5 network cable...
  • Page 22: Chapter 2 Installation And Configuration

    Chapter 2 Installation and Configuration In This Chapter Overview ... 13 Default Login Information ... 13 Getting Started ... 14 Overview This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter. To install and configure the KX II: ...
  • Page 23: Getting Started

    Chapter 2: Installation and Configuration Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that will be accessed and controlled via the KX II. Before installing the KX II, configure all KVM target servers to ensure optimum performance. This configuration applies only to KVM target servers, not to the client workstations (remote PCs) used to access the KX II remotely.
  • Page 24 Windows XP, Windows 2003 and Windows 2008 Settings To configure KVM target servers running Microsoft ® operating system, Windows 2003 Windows 2008 ® operating systems: 1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab. c.
  • Page 25 Chapter 2: Installation and Configuration Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the KX II connection.
  • Page 26  Animate controls and elements inside windows  Animate windows when minimizing and maximizing  Fade options:  Fade or slide menus into view  Fade or slide ToolTips into view  Fade out menu items after clicking 3. Click OK and Close the Control Panel. To configure KVM target servers running Windows 7 system: 1.
  • Page 27 Chapter 2: Installation and Configuration Windows 2000 Settings 1. Configure the mouse settings: 2. Disable transition effects: 3. Click OK and close the Control Panel. Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KX II.
  • Page 28 a. Choose Main Menu > Preferences > Mouse. The Mouse Preferences dialog appears. b. Click the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity towards low. e.
  • Page 29 Chapter 2: Installation and Configuration Note: If you change the video resolution, you must log off of the target server and log back in for the video settings to take effect. Note for Red Hat 9 KVM Target Servers If you are running Red Hat are experiencing problems with the keyboard and/or mouse, there is an additional configuration setting you can try.
  • Page 30 2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display. The Display Settings dialog appears. b. On the Settings tab, select a Resolution supported by the KX II. c. Click OK. Note: Once connected to the target server, in many Linux graphical environments, the <Ctrl>...
  • Page 31 Chapter 2: Installation and Configuration Make Linux Settings Permanent Note: These steps may vary slightly depending on the specific version of Linux 1. Choose System Menu > Preferences > Personal > Sessions. 2. Click the Session Options tab. 3. Select the "Prompt on log off" checkbox and click OK. This option 4.
  • Page 32 2. All KVM target servers must be configured to one of the display resolutions supported by the KX II. The most popular supported resolutions for Sun machines are: Display resolution Vertical refresh rate 1600 x 1200 60 Hz 1280 x 1024 60,75,85 Hz 1152 x 864 75 Hz...
  • Page 33 Chapter 2: Installation and Configuration 2. Choose Mouse Style Manager. The Style Manager - Mouse dialog 3. Set the Acceleration slider to 1.0. 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click. 2.
  • Page 34 Card To check resolution: 32-bit # /usr/sbin/pgxconfig -prconf 64-bit # /usr/sbin/m64config -prconf 32-bit # /usr/sbin/fbconfig -prconf 64-bit IBM AIX 5.3 Settings Follow these steps to configure KVM target servers running IBM 5.3. To configure the mouse: 1. Go to Launcher. 2.
  • Page 35: Step 2: Configure Network Firewall Settings

    Chapter 2: Installation and Configuration Make UNIX Settings Permanent Note: These steps may vary slightly depending on the type of UNIX example, Solaris 1. Choose Style Manager > Startup. The Style Manager - Startup 2. On the Logout Confirmation dialog, select the On option. This option Apple Macintosh Settings For KVM target servers running an Apple Macintosh the preferred method is to use the D2CIM-VUSB and Absolute Mouse...
  • Page 36: Step 3: Connect The Equipment

    Step 3: Connect the Equipment Connect the KX II to the power supply, network, local PC, local video display, keyboard and mouse, and target servers. The letters in the diagram correspond to the topics in this section that describe the connection.
  • Page 37 By default, only LAN1 is active and the automatic failover is disabled. When enabled, if the KX II internal network interface or the network switch to which it is connected becomes unavailable, LAN2 will be enabled using the same IP address.
  • Page 38: Step 4: Configure The Kx Ii

    UTP (Cat5/5e/6) cable, connect the CIM to an available server port on the back of your KX II device. Note: The DCIM-USB G2 provides a small slide switch on the back of the CIM. Move the switch to P for PC-based USB target servers. Move the switch to S for Sun USB target servers.
  • Page 39 The KX II ships with a default password. The first time you start the KX II you are required to change that password. 1. Power on the KX II using the power switch(s) at the back of the unit. 2. Once the unit has booted, the KX II Local Console is visible on the 3.
  • Page 40 c. Enter the Default Gateway if None is selected from the IP Auto Configuration drop-down. d. Enter the Preferred DHCP Host Name if DHCP is selected from the IP Auto Configuration drop-down. e. Select the IP Auto Configuration. The following options are available: ...
  • Page 41 Chapter 2: Installation and Configuration 5. Select Obtain DNS Server Address Automatically if DHCP is 6. If Use the Following DNS Server Addresses is selected, regardless 7. When finished, click OK. this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
  • Page 42: Valid Special Characters For Target Names

    Valid Special Characters for Target Names Character Description Exclamation point ; " Double quote Pound sign Dollar sign Percent sign & Ampersand Left parenthesis Right parenthesis ] Asterisk Plus sign Comma Dash Period Forward slash < Less than sign Colon Specifying Power Supply Autodetection The KX II provides dual power supplies and can automatically detect and provide notification regarding the status of these power supplies.
  • Page 43 Chapter 2: Installation and Configuration 3. If you are plugging power input into power supply number two 4. Click OK. Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the device turns red. 1.
  • Page 44: Step 5 (Optional): Configure Keyboard Language

    Del key on your keyboard. The Caps Lock light starts to blink, indicating that the CIM is in Layout Code Change mode. The text window displays: Raritan Computer, Inc. Current keyboard layout code = 22h (US5 UNIX). 3. Type the layout code desired (for example, 31 for the Japanese keyboard).
  • Page 45 Chapter 2: Installation and Configuration 5. Shut down the device and power on once again. The DCIM-SUSB performs a reset (power cycle). 6. Verify that the characters are correct.
  • Page 46: Chapter 3 Working With Target Servers

    Chapter 3 Working with Target Servers In This Chapter Interfaces ... 37 Proxy Server Configuration for use with MPC, VKC and AKC ... 50 Virtual KVM Client (VKC) ... 51 Active KVM Client (AKC) ... 80 Multi-Platform Client (MPC) ... 82 Interfaces There are several user interfaces in the KX II, providing you with easy access any time, anywhere.
  • Page 47: Kx Ii Local Console Interface

    Chapter 3: Working with Target Servers KX II Local Console Interface When you are located at the server rack, the KX II provides standard KVM management and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
  • Page 48 Depending on your browser and security settings, you may see various security and certificate warnings. It is necessary to accept these warnings to launch the KX II Remote Console. You can reduce the number of warning messages during subsequent log ins by checking the following options on the security and certificate warning messages: ...
  • Page 49 Chapter 3: Working with Target Servers Interface and Navigation KX II Console Layout Both the KX II Remote Console and the KX II Local Console interfaces provide an HTML (web-based) interface for configuration and administration, as well as target server list and selection. The options are organized into various tabs.
  • Page 50 Left Panel The left panel of the KX II interface contains the following information. Note that some information is conditional and will only be displayed if you are a certain of user, are using certain features, and so on. This conditional information is noted here.
  • Page 51 Chapter 3: Working with Target Servers Information Configured As Base or Configured As Tiered Port States Connect Users Help - User Guide Favorite Devices FIPS Mode KX II Console Navigation The KX II Console interfaces provide many methods for navigation and making your selections.
  • Page 52 Port Access Page After successfully logging on to the KX II Remote Console, the Port Access page appears. This page lists all of the KX II ports, the connected KVM target servers, and their status and availability. The Port Access page provides access to the KVM target servers connected to the KX II.
  • Page 53 Chapter 3: Working with Target Servers 2. Click View by Port, View by Group or View by Search to switch 3. Click the Port Name of the target server you want to access. The 4. Choose the desired menu command from the Port Action Menu.
  • Page 54  Power On - Powers on the target server through the associated outlet. This option is visible only when there are one or more power associations to the target.  Power Off - Powers off the target server through the associated outlets.
  • Page 55 Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: ...
  • Page 56 Note: Both IPv4 and IPv6 addresses are supported. Manage Favorites Page To open the Manage Favorites page:  Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: Favorites List Discover Devices - Local Subnet Discover Devices - KX II Subnet Add New Device to Favorites Favorites List Page...
  • Page 57 Chapter 3: Working with Target Servers 3. Click Refresh. The list of devices on the local subnet is refreshed. 1. Select the checkbox next to the device name/IP address. 2. Click Add. Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the remote console subnet.
  • Page 58 Adding, Deleting and Editing Favorites To add a device to your favorites list: 1. Choose Manage > Add New Device to Favorites. The Add New Favorite page appears. 2. Type a meaningful description. 3. Type the IP Address/Host Name for the device. 4.
  • Page 59: Proxy Server Configuration For Use With Mpc, Vkc And Akc

    Chapter 3: Working with Target Servers Proxy Server Configuration for use with MPC, VKC and AKC When the use of a Proxy Server is required, a SOCKS proxy must also be provided and configured on the remote client PC. Note: If the installed proxy server is only capable of the HTTP proxy protocol, you cannot connect.
  • Page 60: Virtual Kvm Client (Vkc)

    start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true -DsocksProxyHost=192.168.99.99 -DsocksProxyPort=1080 -classpath .\sdeploy.jar;.\sFoxtrot.jar;.\jaws.jar;.\sMpc.jar com.raritan.rrc.ui.RRCApplication %1 Virtual KVM Client (VKC) Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help. Overview Whenever you access a target server using the Remote Console, a Virtual KVM Client (VKC) window opens.
  • Page 61 Chapter 3: Working with Target Servers Button Button Description Name Video Opens the Video Settings dialog, allowing you to Settings manually adjust video conversion parameters. Color Adjusts color settings to reduce excess color Calibration noise. Same as choosing Video > Color Calibrate. Note: Not available in KX II-101-V2.
  • Page 62: Switching Between Kvm Target Servers

    2. Click the port name of the target you want to access. The Port Action menu appears. 3. Choose Switch From in the Port Action menu. The Virtual KVM Client window switches to the new target server you selected. Power Controlling a Target Server Note: These features are available only when you have made power associations.
  • Page 63: Disconnecting Kvm Target Servers

    Chapter 3: Working with Target Servers Disconnecting KVM Target Servers Note: This item is not available on the KX II Local Console. The only way to disconnect from the switched target in the Local Console is to use the hot key. 1.
  • Page 64: Connection Properties

    Connection Properties The dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
  • Page 65 Chapter 3: Working with Target Servers 3. Choose the Color Depth from the drop-down list. The device can 4. Use the slider to select the desired level of Smoothing (15-bit color 5. Click OK to set these properties.  256 Kb (Cable) ...
  • Page 66: Connection Information

    Connection Information To obtain information about your Virtual KVM Client connection:  Choose Connection > Info... The Connection Info window opens. The following information is displayed about the current connection:  Device Name - The name of the device.  IP Address - The IP address of the device.
  • Page 67 Chapter 3: Working with Target Servers Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC). Macros exported from MPC or VKC cannot be imported into AKC. Note: KX II-101 does not support AKC. 1.
  • Page 68  Click Yes to replace the existing macro with the imported version.  Click Yes to All to replace the currently selected and any other duplicate macros that are found.  Click No to keep the original macro and proceed to the next macro ...
  • Page 69 Chapter 3: Working with Target Servers 3. Click Ok. The Export Keyboard Macro. A dialog from which to locate 4. Select the folder to save the macro file to, enter a name for the file Building a Keyboard Macro 1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog 2.
  • Page 70 Press Left Ctrl Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequence field to be sure the macro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step and then click the up or down arrow buttons to reorder them as needed.
  • Page 71 Chapter 3: Working with Target Servers Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu.
  • Page 72: Video Properties

    3. Set the language and mouse settings. 4. Exit the menu to return to normal CIM functionality. Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways: ...
  • Page 73 Chapter 3: Working with Target Servers Calibrating Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The color settings are on a target server-basis. Note: The Calibrate Color command applies to the current connection only.
  • Page 74 c. Brightness: Use this setting to adjust the brightness of the target server display. d. Brightness Red - Controls the brightness of the target server display for the red signal. e. Brightness Green - Controls the brightness of the green signal. Brightness Blue - Controls the brightness of the blue signal.
  • Page 75 Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
  • Page 76 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot from Target server command. If needed, save this screenshot to a file location of your choosing as a bitmap, JPEG or PNG file.
  • Page 77: Mouse Options

    Chapter 3: Working with Target Servers Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and you are accessing the target through MPC or VKC, you may need to change the maximum refresh rate of the monitor in order for the refresh rate to take effect on the target.
  • Page 78 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
  • Page 79 Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode    Synchronize Mouse In dual mouse mode, the Synchronize Mouse command forces realignment of the target server mouse pointer with Virtual KVM Client mouse pointer.  Note: This option is available only in Standard and Intelligent mouse modes.
  • Page 80 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. Intelligent mouse mode is the default for non-VM targets. In this mode, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acceleration.
  • Page 81 Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed.
  • Page 82: Vkc Virtual Media

    Chapter 3: Working with Target Servers 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mode: 1. Press Ctrl+Alt+O on your keyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media for complete information about setting up and using virtual media.
  • Page 83: Smart Cards (Vkc, Akc And Mpc)

    OS. When the KVM session is terminated, either because it has been closed or because you switch to a new target, the smart card reader will be automatically unmounted from the target server.
  • Page 84 4. A progress dialog will open. Check the 'Mount selected card reader automatically on connection to targets' checkbox to mount the smart card reader automatically the next time you connect to a target. Click OK to begin the mounting process. To update the smart card in the Select Smart Card Reader dialog: ...
  • Page 85: Tool Options

    Chapter 3: Working with Target Servers Tool Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client, including logging, setting the keyboard type, and defining hot keys for exiting Full Screen mode and Single Cursor mode. Note: The KX II-101 and KX II-101-V2 do not support single cursor mode.
  • Page 86 4. Exit Full Screen Mode - Hotkey. When you enter Full Screen mode, the display of the target server becomes full screen and acquires the same resolution as the target server. This is the hot key used for exiting this mode. 5.
  • Page 87 Chapter 3: Working with Target Servers Language French German Japanese Korean Belgian Norwegian Danish Swedish Hungarian Spanish Italian Slovenian Portuguese Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. Configuration method Keyboard Indicator System Settings (Control Center) System Settings (Control Center) System Settings (Control Center)
  • Page 88: View Options

    View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off):  Choose View > View Toolbar. Scaling Scaling your target window allows you to view the entire contents of the target server window.
  • Page 89: Help Options

    Chapter 3: Working with Target Servers Help Options About Raritan Virtual KVM Client This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support. 1. Choose Help > About Raritan Virtual KVM Client. 2.
  • Page 90: Akc Supported Operating Systems And Browsers

    If you attempt to open AKC from a browser other than IE 6 or later, you will receive an error message instructing you to check your browser and to switch to Internet Explorer. Chapter 3: Working with Target Servers ®...
  • Page 91: Prerequisites For Using Akc

    Chapter 3: Working with Target Servers Prerequisites for Using AKC In order to use AKC:   Enable AKC Download Server Certificate Validation If the device (or CC-SG) administrator has enabled the Enable AKC Download Server Certificate Validation option:  ...
  • Page 92 Note: The Alt+Tab command toggles between windows only on the local system. When MPC opens, the Raritan devices that were automatically detected and which are found on your subnet are displayed in the Navigator in tree format. 2. If your device is not listed by name in the navigator, add it manually: a.
  • Page 93: Chapter 4 Rack Pdu (Power Strip) Outlet Control

    Chapter 4 Rack PDU (Power Strip) Outlet Control In This Chapter Overview ... 84 Turning Outlets On/Off and Cycling Power ... 85 Overview The KX II allows you to control Raritan PX and RPC series rack PDU (power strip) outlets connected to the KX II through a D2CIM-PWR. Once a PX or RPC series is setup and then attached to the KX II, the rack PDU and its outlets can be controlled from the Powerstrip page in the KX II interface.
  • Page 94: Turning Outlets On/Off And Cycling Power

     Control - Turn outlets on or off, or cycle their power.  Association - The ports associated with the outlet. Initially, when you open the Powerstrip page, the power strips that are currently connected to the KX II are displayed in the Powerstrip drop-down.
  • Page 95 Chapter 4: Rack PDU (Power Strip) Outlet Control 5. Click OK to close the Power On confirmation dialog. The outlet will 1. Click Off. 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The outlet will be 1.
  • Page 96 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog. Chapter 4: Rack PDU (Power Strip) Outlet Control...
  • Page 97: Chapter 5 Virtual Media

    Chapter 5 Virtual Media In This Chapter Overview ... 89 Prerequisites for Using Virtual Media ... 92 Using Virtual Media via VKC and AKC in a Windows Environment ... 93 Using Virtual Media ... 94 File Server Setup (File Server ISO Images Only) ... 95 Connecting to Virtual Media ...
  • Page 98: Overview

    Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client PC and network file servers. With this feature, media mounted on a client PC and network file servers is essentially "mounted virtually" by the target server. The target server can then read from and write to that media as if it were physically connected to the target server itself.
  • Page 99 Chapter 5: Virtual Media...
  • Page 100 Diagram key Desktop PC KX II Target server CD/DVD drive USB mass storage device PC hard drive Remote file server (ISO images) Chapter 5: Virtual Media...
  • Page 101: Prerequisites For Using Virtual Media

    Chapter 5: Virtual Media Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session.
  • Page 102: Using Virtual Media Via Vkc And Akc In A Windows Environment

    Using Virtual Media via VKC and AKC in a Windows Environment Windows XP privileges vary from those of the Windows Vista the Windows 7 When enabled in Vista or Windows 7, User Access Control (UAC) provides the lowest level of rights and privileges a user needs for an application.
  • Page 103: Using Virtual Media

    Chapter 5: Virtual Media Using Virtual Media See Prerequisites for Using Virtual Media before proceeding with using virtual media. 1. If you plan to access file server ISO images, identify those file 2. Open a KVM session with the appropriate target server. 3.
  • Page 104: File Server Setup (File Server Iso Images Only)

    File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. Note: SMB/CIFS support is required on the file server. Use the Remote Console File Server Setup page to designate the files server(s) and image paths that you want to access using virtual media.
  • Page 105 Chapter 5: Virtual Media Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of third-party software used by the by the KX, KSX or KX101 G2 device. Note: If you are connecting to a Windows 2003 ®...
  • Page 106: Connecting To Virtual Media

    Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives.
  • Page 107: Conditions When Read/Write Is Not Available

    Chapter 5: Virtual Media 3. If you want Read and Write capabilities, select the Read-Write 4. Click Connect. The media will be mounted on the target server Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations: ...
  • Page 108: Cd-Rom/Dvd-Rom/Iso Images

    CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1. From the Virtual KVM Client, choose Virtual Media > Connect CD-ROM/ISO Image.
  • Page 109: Disconnecting Virtual Media

    Chapter 5: Virtual Media 4. For remote ISO images on a file server: Note: If you are working with files on a Linux command after the files are copied using virtual media in order to view the copied files. Files may not appear until a sync is performed. Note: If you are using the Windows 7 Disk is not displayed by default in the Window's My Computer folder when you mount a Local CD/DVD Drive or Local or Remote ISO Image.
  • Page 110: Chapter 6 Usb Profiles

    Chapter 6 USB Profiles In This Chapter Overview ... 101 CIM Compatibility ... 102 Available USB Profiles ... 102 Selecting Profiles for a KVM Port ... 108 Overview To broaden the KX II's compatibility with different KVM target servers, Raritan provides a standard selection of USB configuration profiles for a wide range of operating system and BIOS-level server implementations.
  • Page 111: Cim Compatibility

    Chapter 6: USB Profiles CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. A VM-CIM that has not had its firmware upgraded will support a broad range of configurations (Keyboard, Mouse, CD-ROM, and Removable Drive) but will not be able to make use of profiles optimized for particular target configurations.
  • Page 112 USB profile BIOS DellPowerEdge Keyboard Only BIOS ASUS P4C800 Motherboard Chapter 6: USB Profiles Description  USB bus speed limited to full-speed (12 MBit/s)  No virtual media support Dell PowerEdge BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB.
  • Page 113 Chapter 6: USB Profiles USB profile BIOS Generic BIOS HP BIOS HP Compaq DC7100/DC7600 BIOS IBM ThinkCentre Lenovo IBM BladeCenter H with Description BIOS Generic Use this profile when Generic OS profile does not work on the BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected.
  • Page 114 USB profile Advanced Management Module BIOS Lenovo ThinkPad T61 & X61 BIOS Mac Generic HP Proliant DL360/DL380 G4 (HP SmartStart CD) HP Proliant DL360/DL380 G4 ® (Windows 2003 Server Chapter 6: USB Profiles Description functionality when D2CIM-VUSB or D2CIM-DVUSB is connected to the Advanced Management Module.
  • Page 115 Chapter 6: USB Profiles USB profile Installation) Linux MAC OS X RUBY Industrial Mainboard (AwardBIOS) Supermicro Mainboard Phoenix (AwardBIOS) Description (Windows 2003 Server Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server when installing Windows 2003 Server without the help of HP SmartStart CD.
  • Page 116 USB profile Suse 9.2 Troubleshooting 1 Troubleshooting 2 Troubleshooting 3 Chapter 6: USB Profiles Description series mainboards with Phoenix AwardBIOS. Restrictions:  Virtual CD-ROM and disk drives cannot be used simultaneously SuSE Linux 9.2 Use this for SuSE Linux 9.2 distribution.
  • Page 117: Selecting Profiles For A Kvm Port

    Chapter 6: USB Profiles USB profile Use Full Speed for Virtual Media CIM Selecting Profiles for a KVM Port The KX II comes with a set of USB profiles that you can assign to a KVM port based on the characteristics of the KVM target server it connects to. You assign USB profiles to a KVM port in the Device Settings >...
  • Page 118: Mouse Modes When Using The Mac Os-X Usb Profile With A Dcim-Vusb

    Note: Mouse speed may be slow while in Single Mouse mode. 3. Once you are out of the Boot menu and have booted to the operating system, exit Single Mouse mode and switch back to Absolute Mouse mode for better mouse performance.
  • Page 119: Chapter 7 User Management

    Chapter 7 User Management In This Chapter User Groups ... 110 Users ... 119 Authentication Settings ... 122 Changing a Password ... 134 User Groups The KX II stores an internal list of all user and group names to determine access authorization and permissions.
  • Page 120: User Group List

    User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group.
  • Page 121 Chapter 7: User Management 2. Type a descriptive name for the new user group into the Group 3. Set the permissions for the group. Select the checkboxes before the 4. Set the port permissions. Specify the server ports that can be 5.
  • Page 122 Chapter 7: User Management Note: Several administrative functions are available within MPC and from the KX II Local Console. These functions are available only to members of the default Admin group. Note: Both IPv4 and IPv6 addresses are supported.
  • Page 123 Chapter 7: User Management Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the permissions of all users, including their own. Carefully consider granting these permissions. Permission Device Access While Under CC-SG Management Device Settings Diagnostics Maintenance...
  • Page 124 Permission Description User User and group management, remote. Management authentication (LDAP/LDAPS/RADIUS), login settings. If you are using a tiered configuration in which a base KX II device is used to access multiple other tiered devices, user, user group and remote authentication settings must be consistent across all devices.
  • Page 125 Chapter 7: User Management Power control access Option Deny Access For blade chassis, the port access permission will control access to the URLs that have been configured for that blade chassis. The options are Deny or Control. In addition, each blade housed within the chassis has its own independent Port Permissions setting.
  • Page 126 Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-level basis. To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2. Type the ending IP address in the Ending IP field. 3.
  • Page 127: Modifying An Existing User Group

    Chapter 7: User Management 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the order in which they are listed. For instance, in the example shown here, if the two ACL rules were reversed, Dominion would accept no communication at all.
  • Page 128: Users

    Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Choose a group from among those listed by checking the checkbox to the left of the Group Name. 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and passwords to gain access to the KX II.
  • Page 129: Adding A New User

    Chapter 7: User Management Adding a New User It is a good idea to define user groups before creating KX II users because, when you add a user, you must assign that user to an existing user group. See Adding a New User Group (on page 111). From the User page, you can add new users, modify user information, and reactivate users that have been deactivated.
  • Page 130: Logging A User Off (Force Logoff)

    5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK. Logging a User Off (Force Logoff) If you are an administrator, you are able to log off another locally authenticated user who is logged on to the KX II. To log off a user: 1.
  • Page 131: Authentication Settings

    Chapter 7: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed.
  • Page 132: Implementing Ldap/Ldaps Remote Authentication

    Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn.
  • Page 133 Chapter 7: User Management 9. In the User Search DN field, enter the Distinguished Name of where 10. Enter the Distinguished Name of the Administrative User in the DN of in the LDAP database you want to begin searching for user information.
  • Page 134 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the Secret Phrase field and again in the Confirm Secret Phrase field (up to 128 characters).
  • Page 135 Chapter 7: User Management 15. Select the Enable LDAPS Server Certificate Validation checkbox to 16. If needed, upload the Root CA Certificate File. This field is enabled 17. The KX II provides you with the ability to test the LDAP configuration use the previously uploaded root CA certificate file to validate the certificate provided by the server.
  • Page 136: Returning User Group Information From Active Directory Server

    Once the test is completed, a message will be displayed that lets you know the test was successful or, if the test failed, a detailed error message will be displayed. It will display successful result or detail error message in failure case. It also can display group information retrieved from remote LDAP server for the test user in case of success.
  • Page 137: Implementing Radius Remote Authentication

    Chapter 7: User Management Important Notes      Implementing RADIUS Remote Authentication Remote Authentication Dial-in User Service (RADIUS) is an AAA (authentication, authorization, and accounting) protocol for network access applications. 1. Click User Management > Authentication Settings to open the 2.
  • Page 138 9. The default number of retries is 3 Retries. This is the number of times the KX II will send an authentication request to the RADIUS server. 10. Choose the Global Authentication Type from among the options in the drop-down list: ...
  • Page 139  Attribute Type: String  Attribute Value: Raritan:G{KVM_Admin} (where KVM_Admin is group name created locally on Dominion KVM Switch). Case sensitive. Configure Session Conditions (Date and Time) (Required) - Policy Elements > Session Conditions > Date and Time Configure/create the Network Access Authorization Policy (Required) - Access Policies >...
  • Page 140: Returning User Group Information Via Radius

    Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II determines the permissions for a given user based on the permissions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID.
  • Page 141 Chapter 7: User Management Attribute Acct-Status (40) NAS-Port-Type (61) NAS-Port (5) NAS-IP-Address (4) User-Name (1) Acct-Session-ID (44) Data Stop(2) - Stops the accounting VIRTUAL (5) for network connections. Always 0. The IP address for the KX II. The user name entered at the login screen. Session ID for accounting.
  • Page 142: User Authentication Process

    Chapter 7: User Management User Authentication Process Remote authentication follows the process specified in the flowchart below:...
  • Page 143: Changing A Password

    Chapter 7: User Management Changing a Password 1. Choose User Management > Change Password. The Change 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new 4. Click OK. 5.
  • Page 144: Chapter 8 Device Management

    Chapter 8 Device Management In This Chapter Network Settings ... 135 Device Services ... 140 Configuring Modem Settings ... 148 Configuring Date/Time Settings ... 149 Event Management ... 151 Power Supply Setup ... 157 Configuring Ports ... 158 Port Group Management ... 194 Network Settings Use the Network Settings page to customize the network configuration (for example, the IP address, discovery port, and LAN interface...
  • Page 145: Network Basic Settings

    Chapter 8: Device Management Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings. 1. Choose Device Settings > Network. The Network Settings page 2.
  • Page 146 d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present. Read-Only Zone ID. This identifies the device with which the address is associated.
  • Page 147: Lan Interface Settings

    Chapter 8: Device Management this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues. In these instances, setting the KX II LAN Interface Speed &...
  • Page 148  Autodetect (default option)  10 Mbps/Half - Both LEDs blink  10 Mbps/Full - Both LEDs blink  100 Mbps/Half - Yellow LED blinks  100 Mbps/Full - Yellow LED blinks  1000 Mbps/Full (gigabit) - Green LED blinks ...
  • Page 149: Device Services

    Chapter 8: Device Management Device Services The Device Services page allows you to configure the following functions:      Enabling SSH Enable SSH access to allow administrators to access the KX II via the SSH v2 application. 1.
  • Page 150: Entering The Discovery Port

    Entering the Discovery Port The KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can configure it to use any TCP port except 80 and 443. To access the KX II from beyond a firewall, your firewall settings must enable two-way communication through the default Port 5000 or a non-default port configured here.
  • Page 151: Configuring And Enabling Tiering

    Port Access page. Tiered devices provide remote access from their own port lists. Local access is not available on the tiered devices when Tiering is enabled. Tiering also supports the use of KVM switches to switch between servers. See Tiering - Target Types, Supported CIMS and...
  • Page 152 Enabling Tiering Connect from a target server port on the base device to the tier KX II Local Access port video/keyboard/mouse ports using a D2CIM-DVUSB. If the tier device is a KX2-832 or KX2-864, connect from a target server port on the base device directly to the tier KX2-832/KX2-864 Extended Local port.
  • Page 153 Chapter 8: Device Management Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached directly to the base are accessible. Power Control You can power on and off targets that are a part of the tiered configuration.
  • Page 154 Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a KX II tiered device and a KX II base device. Connect from a target server port on the base device to the tier KX II Local Access port video/keyboard/mouse ports using a D2CIM-DVUSB.
  • Page 155: Enabling Direct Port Access Via Url

    Chapter 8: Device Management Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Login dialog and Port Access page. This feature also provides the ability to enter a username and password directly and proceed to the target if the username and password is not contained in the URL.
  • Page 156: Enabling The Akc Download Server Certificate Validation

    Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Option 1: Do Not Enable AKC Download Server Certificate Validation (default setting) If you do not enable AKC Download Server Certificate Validation, all Dominion device users and CC-SG Bookmark and Access Client users...
  • Page 157: Configuring Modem Settings

    Chapter 8: Device Management Configuring Modem Settings 1. Click Device Settings > Modem Settings to open the Modem Settings 2. Select the Enable Modem checkbox. This will enable the Serial Line 3. The Serial Line Speed of the modem is set to 115200. Read-only 4.
  • Page 158: Configuring Date/Time Settings

    6. Click OK to commit your changes or click Reset to Defaults to return the settings to their defaults. Certified Modems modems that work with the KX II. For information on settings that will give you the best performance when connecting to the KX II via modem, see Creating, Modifying and Deleting Profiles in MPC - Generation 2 Devices in the KVM and Serial Access Clients Guide.
  • Page 159 Chapter 8: Device Management 3. To adjust for daylight savings time, check the "Adjust for daylight 4. Choose the method you would like to use to set the date and time: 5. For the Synchronize with NTP Server option: 6. Click OK. Note: Both IPv4 and IPv6 addresses are supported.
  • Page 160: Event Management

    Event Management The KX II Event Management feature allows you enable and disable the distribution of system events to SNMP Managers, the Syslog and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or several destinations.
  • Page 161 Chapter 8: Device Management 3. Click OK.  Note: Both IPv4 and IPv6 addresses are supported. Note: IPv6 addresses cannot exceed 80 characters in length for the host name. To reset to factory defaults: Click Reset To Defaults.
  • Page 162: Event Management - Destinations

    Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management - Destinations page to select the system events to track and where to send this information. Note: SNMP traps will be generated only if the SNMP Logging Enabled option is selected.
  • Page 163 Chapter 8: Device Management 3. Click OK.
  • Page 164 To reset to factory defaults:  Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possible for the KX II and the router that it is attached to to fall out of synchronization when the KX II is rebooted, preventing the reboot completed SNMP trap from being logged.
  • Page 165 Chapter 8: Device Management Trap Name networkParameterChanged passwordSettingsChanged portConnect portConnectionDenied portDisconnect portStatusChange powerNotification powerOutletNotification rebootCompleted rebootStarted securityViolation startCCManagement stopCCManagement userAdded userAuthenticationFailure userConnectionLost userDeleted userForcedLogout userLogin userLogout userModified userPasswordChanged Description communicate over the network. A change has been made to the network parameters.
  • Page 166: Power Supply Setup

    Trap Name userSessionTimeout userUploadedCertificate vmImageConnected vmImageDisconnected Power Supply Setup The KX II provides dual power supplies, and can automatically detect and provide notification regarding the status of these power supplies. Use the Power Supply Setup page to specify whether you are using one or both of the power supplies.
  • Page 167: Configuring Ports

    Chapter 8: Device Management 4. Click OK. Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the unit turns red.  Deselect the checkbox for the appropriate power supply. ...
  • Page 168: Configuring Standard Target Servers

    Port type Description PowerStrip Power strip connected (rack PDU) Virtual media CIM (D2CIM-VUSB and D2CIM-DVUSB) Blade Chassis Blade chassis and the blades associated with that chassis (displayed in a hierarchical order) 2. Click the Port Name for the port you want to edit. ...
  • Page 169: Configuring Kvm Switches

    8. Click OK. Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targets. In addition to using hot key sequences with standard servers, KVM switching is supported by blade chassis and in tiered configurations.
  • Page 170 5. Select KVM Switch Hot Key Sequence. 6. Enter the Maximum Number of Target Ports (2-32). 7. In the KVM Switch Name field, enter the name you want to use to refer to this port connection. 8. Activate the targets that the KVM switch hot key sequence will be applied to.
  • Page 171: Configuring Rack Pdu (Power Strip) Targets

    Chapter 8: Device Management Configuring Rack PDU (Power Strip) Targets The KX II allows you to connect rack PDUs (power strips) to KX II ports. KX II rack PDU configuration is done from the KX II Port Configuration page. Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are connected to the KX II using the D2CIM-PWR CIM.
  • Page 172 Naming the Rack PDU in the KX II (Port Page for Power Strips) Note: PX rack PDUs (power strips) can be named in the PX as well as in KX II. The Port page opens when you select a port from the Port Configuration page that is connected to a Raritan remote rack PDU.
  • Page 173 Chapter 8: Device Management 3. Click OK.
  • Page 174 Associating Outlets with Target Servers on KX II The Port page opens when you click on a port on the Port Configuration page. From this page, you can make power associations, change the port name to something more descriptive, and update target server settings if you are using the D2CIM-VUSB CIM.
  • Page 175 Chapter 8: Device Management Removing Power Associations When disconnecting target servers and/or rack PDUs from KXII, all power associations should first be deleted. When a target has been associated with a rack PDU and the target is removed from the KX II, the power association remains.
  • Page 176: Configuring Blade Chassis

    Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade chassis that are plugged into a Dominion device port. Up to eight blade chassis can be managed at a given time. As with standard servers, blade chassis are autodetected once they are connected.
  • Page 177 AMM[1] as the acting primary management module. The use of hot key sequences to switch KVM access to a blade chassis is also supported. For blade chassis that allow users to select a hot key sequence, those options will be provided on the Port Configuration page.
  • Page 178 5. Select Generic from the Blade Server Chassis Model drop-down. 6. Configure the blade chassis as applicable. a. Switch Hot Key Sequence - Define the hot key sequence that will be used to switch from KVM to the blade chassis. The Switch Hot Key Sequence must match the sequence used by the KVM module in the blade chassis.
  • Page 179 Chapter 8: Device Management 10. USB profile information does not apply to a generic configuration. 11. In the Target Settings section, select 720x400 Compensation if you 12. Select 'Use international keyboard for scan code set 3' if connecting 13. Click OK to save the configuration. Dell Blade Chassis Configuration CIMs for Blade Chassis Recommended Blade Chassis Configurations...
  • Page 180 Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server. The Switch Hot Key Sequence must match the sequence used by the KVM module in the blade chassis.
  • Page 181 Chapter 8: Device Management 5. In the Blade Chassis Managed Links section of the page, you are 6. USB profiles do not apply to Dell chassis. 7. In the Target Settings section, select 720x400 Compensation if you 8. Select 'Use international keyboard for scan code set 3' if connecting 9.
  • Page 182 1. If you selected Dell 1855/1955, auto-discovery is not available. Configure the blade chassis as applicable. a. Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server. b. Maximum Number of Slots - The default maximum number of slots available on the blade chassis is automatically entered.
  • Page 183 The KX II only supports auto-discovery for AMM[1]. a. Switch Hot Key Sequence - Predefined. b. Maximum Number of Slots - The default maximum number of slots available on the blade chassis is automatically entered.
  • Page 184 c. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis. Required for auto-discovery mode d. Port Number - The default port number for the blade chassis is 22. Change the port number if applicable. Required for auto-discovery mode e.
  • Page 185 To configure a IBM BladeCenter (Other): available. Configure the blade chassis as applicable. a. Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server. b. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis.
  • Page 186 4. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon page. The first URL link is intended for use to connect to the blade chassis Administration Module GUI.
  • Page 187 Chapter 8: Device Management Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web application associated with an RSA, DRAC or ILO Processor card.
  • Page 188 HP Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports connected to certain types of blades into a group representing the blade chassis. Specifically, HP ® BladeServer blades and Dell PowerEdge Dell PowerEdge 1855/1955 is connected from each individual blade to a port on the KX II.
  • Page 189 Chapter 8: Device Management 3. Enter a Port Group Name. The port group name is not case sensitive 4. Select the Blade Server Group checkbox. 5. Click on a port in the Available box in the Select Ports for Group 6.
  • Page 190 To delete a port group: 1. Click on the Port Group Management page, select the checkbox of the port group you want to delete. 2. Click the Delete button. 3. Click OK on the warning message. Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KX II and the corresponding profiles that should be selected per chassis model when configuring them in the KX II application.
  • Page 191 Both modules enable you to connect a PS/2-compatible keyboard, mouse and video monitor to the system (using a custom cable provided with the system). Source: Dell PowerEdge 1955 Owner's Manual Dell PowerEdge The KVM Switch Module (iKVM) is Integrated DCIM-PS2 DCIM-USBG2 D2CIM-VUSB D2CIM-DVUSB Recommended CIM(s) ...
  • Page 192 Blade chassis Connection method M1000e with this chassis. The iKVM is compatible with the following peripherals:  USB keyboards, USB pointing devices  VGA monitors with DDC support. Source: Dell Chassis Management Controller, Firmware Version 1.0, User Guide ® BladeSystem The HP c-Class Blade SUV Cable enables you c3000 to perform blade chassis administration,...
  • Page 193 Chapter 8: Device Management Blade chassis Connection method one Advanced Management Module. In contrast to the standard BladeCenter chassis, the KVM module and the Management Module in the BladeCenter T chassis are separate components. The front of the Management Module only features the LEDs for displaying status.
  • Page 194 Blade chassis Required/recommended action Slot, not by Name. iKVM may not work correctly if this is not done.  Do not designate any slots for scan operations in the iKVM GUI Setup Scan menu. iKVM may not work correctly otherwise. ...
  • Page 195 Chapter 8: Device Management Blade chassis IBM KX2 Virtual Media Note: All IBM BladeCenters that use AMM must use AMM firmware version BPET36K or later to work with the KX II. Note: In the case of IBM Blade Center Models E and H, the KX II only supports auto-discovery for AMM[1] as the acting primary management module.
  • Page 196: Configuring Usb Profiles (Port Page)

    Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles for Port section of the Port page. The USB profiles chosen in the Port page become the profiles available to the user in VKC when connecting to a KVM target server from the port.
  • Page 197 Chapter 8: Device Management  2. Click Add. The selected profiles appear in the Selected list. These are the profiles that can be used for the KVM target server connected to the port. To specify a preferred USB profile: 1. After selecting the available profiles for a port, choose one from the Preferred Profile for Port menu.
  • Page 198 2. Click Remove. The selected profiles appear in the Available list. These profiles are no longer available for a KVM target server connected to this port. To apply a profile selection to multiple ports: 1. In the Apply Selected Profiles to Other Ports section, select the Apply checkbox for each KVM port you want to apply the current set of selected USB profiles to.
  • Page 199: Configuring Kx Ii Local Port Settings

    For the KX2-832 and KX2-864, you are also able to configure the extended local port from the Local Port Settings page. The extended local port may be connected to a Paragon switch or User Station to extend the reach of the Local port. Like the standard local port, you are...
  • Page 200 Note: If you are using KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II via the extended local port. Note: If you connect a Paragon device to the KX2-832 and KX2-864 extended local port, you must use the remote client to change the USB profile.
  • Page 201 Double Click Left Ctrl key Press the left Ctrl key twice quickly connect to a target and switch to another target. You can then use the hot key to disconnect from the target and return to the local port GUI. The connect key works for both standard servers and blade chassis.
  • Page 202  Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the KX II even when the device is under CC-SG management. Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access, you will have to remove the device from under CC-SG management (from within CC-SG).
  • Page 203: Port Group Management

    Chapter 8: Device Management KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two local port options: the standard local port and the extended local port. Each of these port options is enabled and disabled from the Remote Console on the Port Configuration page or from the Local Console on the Local Port Settings page.
  • Page 204: Chapter 9 Security Management

    Chapter 9 Security Management In This Chapter Security Settings ... 195 Configuring IP Access Control ... 205 SSL Certificates ... 207 Security Banner ... 209 Security Settings From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security.
  • Page 205: Login Limitations

    Chapter 9: Security Management To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can specify restrictions for single login, password aging, and the logging out idle users. Limitation Enable single login limitation Enable password aging Description When selected, only one login per user name is...
  • Page 206 Limitation Description Enter the number of days after which a password change is required. The default is 60 days. Log out idle users, Select the "Log off idle users" checkbox to After (1-365 automatically disconnect users after the amount minutes) of time you specify in the "After (1-365 minutes)"...
  • Page 207: Strong Passwords

    Chapter 9: Security Management Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KX II local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
  • Page 208: User Blocking

    User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
  • Page 209 Chapter 9: Security Management Option Timer Lockout Deactivate User-ID When selected, this option specifies that the user Description Users are denied access to the system for the specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled: ...
  • Page 210: Encryption & Share

    Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX II Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX II from your browser.
  • Page 211 Chapter 9: Security Management 2. Apply Encryption Mode to KVM and Virtual Media. When selected, 3. For government and other high security environments, enable FIPS 4. PC Share Mode. Determines global concurrent remote KVM access, 5. If needed, select VM Share Mode. This option is enabled only when 6.
  • Page 212 Local device reset Description mode Enable Local Factory Returns the KX II device to the factory defaults. Reset (default) Enable Local Admin Resets the local administrator password only. Password Reset The password is reset to raritan. Disable All Local No reset action is taken. Resets Note: When using the P2CIM-AUSBDUAL or P2CIM-APS2DUAL to attach a target to two KX IIs, if Private access to the targets is required,...
  • Page 213: Enabling Fips 140-2

    Chapter 9: Security Management Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desirable. The KX II uses an embedded FIPS 140-2-validated cryptographic module running on a Linux FIPS 140-2 Implementation Guidance section G.5 guidelines. Once this mode is enabled, the private key used to generate the SSL certificates must be internally generated;...
  • Page 214: Configuring Ip Access Control

     FIPS 140-2 should be enabled on the client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administrative Tools > Local Security Policy to open the Local Security Settings dialog. 2.
  • Page 215 Chapter 9: Security Management 1. Type the IP address and subnet mask in the IPv4/Mask or 2. Choose the Policy from the drop-down list. 3. Click Append. The rule is added to the bottom of the rules list. 1. Type a rule #. A rule # is required when using the Insert command. 2.
  • Page 216: Ssl Certificates

    3. You are prompted to confirm the deletion. Click OK. SSL Certificates The KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the KX II has to identify itself to a client using a cryptographic certificate.
  • Page 217 Chapter 9: Security Management 3. Click Create to generate the Certificate Signing Request (CSR). 1. The CSR and the file containing the private key used when 2. Send the saved CSR to a CA for certification. You will get the new 1.
  • Page 218: Security Banner

    Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed certificate is not matched with the private key used to generate the original CSR, the certificate will not be useful. This applies to uploading and downloading the CSR and private key files.
  • Page 219 Chapter 9: Security Management 4. If needed, change the banner title. This information will be displayed 5. Edit the information in the Restricted Services Banner Message text to users as part of the banner. Up to 64 characters can be used. box.
  • Page 220: Chapter 10 Maintenance

    Chapter 10 Maintenance In This Chapter Audit Log... 211 Device Information ... 212 Backup and Restore ... 213 USB Profile Management ... 216 Upgrading CIMs ... 217 Upgrading Firmware ... 218 Upgrade History ... 221 Rebooting ... 221 Stopping CC-SG Management ... 223 Audit Log A log is created of the KX II system events.
  • Page 221: Device Information

    Chapter 10: Maintenance Device Information The Device Information page provides detailed information about your KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX II and CIMs: ...
  • Page 222: Backup And Restore

    Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KX II by backing up the user configuration settings from the KX II in use and restoring those configurations to the new KX II.
  • Page 223 Chapter 10: Maintenance 1. Click Backup. A File Download dialog appears that contains an Open 2. To do this: WARNING: Exercise caution when restoring your KX II to an earlier version. Usernames and password in place at the time of the backup will be restored.
  • Page 224  Full Restore - A complete restore of the entire system. Generally used for traditional backup and restore purposes.  Protected Restore - Everything is restored except device-specific information such as IP address, name, and so forth. With this option, you can setup one KX II and copy the configuration to multiple KX II devices.
  • Page 225: Usb Profile Management

    Chapter 10: Maintenance USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech support. These profiles are designed to address the needs of your target server‟s configuration, in the event that the set of standard profiles does not already address them. Raritan tech support will provide the custom profile and work with you to verify the solution for your target server‟s specific needs.
  • Page 226: Handling Conflicts In Profile Names

    As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so will terminate any virtual media sessions that were in place. Handling Conflicts in Profile Names A naming conflict between custom and standard USB profiles may occur when a firmware upgrade is performed.
  • Page 227: Upgrading Firmware

    Chapter 10: Maintenance 3. Click the Upgrade button. You are prompted to confirm the upgrade. 4. Click OK to continue the upgrade. Progress bars are displayed Upgrading Firmware Use the Firmware Upgrade page to upgrade the firmware for your KX II and all attached CIMs.
  • Page 228 6. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed for your confirmation (if you opted to review CIM information, that information is displayed as well): Note: At this point, connected users are logged out, and new login attempts are blocked.
  • Page 229 Chapter 10: Maintenance For information about upgrading the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Access Clients Guide. Note: Firmware upgrades are not supported via modem. Note: If you are using a tiered configuration in which a base KX II device is used to access multiple other tiered devices, you may receive a low memory error during a firmware upgrade if you have a large number of user groups.
  • Page 230: Upgrade History

    Upgrade History The KX II provides information about upgrades performed on the KX II and attached CIMS. To view the upgrade history:  Choose Maintenance > Upgrade History. The Upgrade History page opens. Information is provided about the KX II upgrade(s) that have been run, the final status of the upgrade, the start and end times, and the previous and current firmware versions.
  • Page 231 Chapter 10: Maintenance 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted to confirm the action. Click Yes to To reboot your KX II: proceed with the reboot.
  • Page 232: Stopping Cc-Sg Management

    Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC-SG management. If you are managing the KX II through CC-SG and connectivity between CC-SG and the KX II is lost after the specified timeout interval (typically 10 minutes), you are able to end the CC-SG management session from the KX II console.
  • Page 233 Chapter 10: Maintenance 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
  • Page 234: Chapter 11 Diagnostics

    Chapter 11 Diagnostics In This Chapter Network Interface Page ... 225 Network Statistics Page ... 226 Ping Host Page ... 228 Trace Route to Host Page ... 228 Device Diagnostics ... 230 Network Interface Page The KX II provides information about the status of your network interface. To view information about your network interface: ...
  • Page 235: Network Statistics Page

    Chapter 11: Diagnostics Network Statistics Page The KX II provides statistics about your network interface. 1. Choose Diagnostics > Network Statistics. The Network Statistics 2. Choose the appropriate option from the Options drop-down list: To view statistics about your network interface: page opens.
  • Page 236  Interfaces - Produces a page similar to the one displayed here.  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field. Chapter 11: Diagnostics...
  • Page 237: Ping Host Page

    Chapter 11: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another KX II is accessible. 1.
  • Page 238 Note: The host name cannot exceed 232 characters in length. 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The output of trace route is displayed in the Result field.
  • Page 239: Device Diagnostics

    Chapter 11: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. Device diagnostics downloads the diagnostics information from the KX II to the client machine. Two operations can be performed on this page: ...
  • Page 240 Chapter 11: Diagnostics a. Click the Save to File button. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
  • Page 241: Chapter 12 Command Line Interface (Cli)

    Chapter 12 Command Line Interface (CLI) In This Chapter Overview ... 232 Accessing the KX II Using CLI ... 233 SSH Connection to the KX II ... 233 Logging In ... 234 Navigation of the CLI ... 235 Initial Configuration Using CLI ... 237 CLI Prompts ...
  • Page 242: Accessing The Kx Ii Using Cli

    Accessing the KX II Using CLI Access the KX II by using one of the following methods:  SSH (Secure Shell) via IP connection A number of SSH clients are available and can be obtained from the following locations:  Putty - http://www.chiark.greenend.org.uk/~sgtatham/putty/ ...
  • Page 243: Ssh Access From A Unix/Linux Workstation

    Chapter 12: Command Line Interface (CLI) SSH Access from a UNIX/Linux Workstation The Password prompt appears. Note: Both IPv4 and IPv6 addresses are supported. Logging In 1. Log in as admin 2. The Password prompt appears. Enter the default password: raritan To open an SSH session from a UNIX log in as the user admin, enter the following command: ssh -l admin 192.168.30.222...
  • Page 244: Navigation Of The Cli

    Chapter 12: Command Line Interface (CLI) After reviewing the following Navigation of the CLI (on page 235) section, perform the Initial Configuration tasks. Navigation of the CLI Before using the CLI, it is important to understand CLI navigation and syntax. There are also some keystroke combinations that simplify CLI use.
  • Page 245: Completion Of Commands

    Chapter 12: Command Line Interface (CLI) Completion of Commands The CLI supports the completion of partially-entered commands. After entering the first few characters of an entry, press the Tab key. If the characters form a unique match, the CLI will complete the entry. ...
  • Page 246: Initial Configuration Using Cli

    Commands help quit logout Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same configuration can be done via KVM. See for more information. KX II devices come from the factory with default factory settings. When you first power up and connect to the device, you must set the following basic parameters so the device can be accessed securely from the network:...
  • Page 247: Setting Network Parameters

    Chapter 12: Command Line Interface (CLI) Setting Network Parameters Network parameters are configured using the interface command. admin > Config > Network > interface ipauto none ip 192.168.151.12 mask 255.255.255.0 gw 192.168.151.1 mode auto When the command is accepted, the device automatically drops the connection.
  • Page 248: Security Issues

    Command history listports logout userlist  Enter admin > config > network. Command help history interface ipv6_interface logout name quit stop Security Issues Elements to consider when addressing security for console servers:  Encrypting the data traffic sent between the operator console and the KX II device.
  • Page 249: Configuring Network

    Chapter 12: Command Line Interface (CLI) Configuring Network The network menu commands are used to configure the KX II network adapter. Commands interface name ipv6 Interface Command The Interface command is used to configure the KX II network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters...
  • Page 250: Name Command

    Chapter 12: Command Line Interface (CLI) Name Command The name command is used to configure the network name. The syntax of the name is: name [devicename <devicename>] [hostname <hostname>] Device name configuration devicename <devicename> Device Name hostname <hostname> Preferred host name (DHCP only) Name Command Example The following command sets the network name:...
  • Page 251: Chapter 13 Kx Ii Local Console

    Chapter 13 KX II Local Console In This Chapter Overview ... 242 Using the KX II Local Console ... 242 KX II Local Console Interface ... 243 Security and Authentication ... 243 Local Console Smart Card Access ... 244 Local Console USB Profile Options ... 245 Available Resolutions ...
  • Page 252: Kx Ii Local Console Interface

    KX II Local Console Interface When you are located at the server rack, the KX II provides standard KVM management and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
  • Page 253: Local Console Smart Card Access

    OS. When the KVM session is terminated, either because it has been closed or because you switch to a new target, the smart card reader will be automatically unmounted from the target server.
  • Page 254: Smart Card Access In Kx2 8 Devices

    To update the Card Readers Detected list:  Click Refresh if a new smart card has been mounted. The Card Readers Detected list will be refreshed to reflect the newly added smart card reader. Smart Card Access in KX2 8 Devices If you are using a smart card reader to access a server from the Local Console through a KX2-832 or KX2-864 device, the extended local port (Local Port Settings page) must be disabled.
  • Page 255: Available Resolutions

    Chapter 13: KX II Local Console 2. In the Select Profile To Use field, select the profile to use from among those available for the port. 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field.
  • Page 256: Port Access Page (Local Console Server Display)

    Chapter 13: KX II Local Console Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access page opens. This page lists all of the KX II ports, the connected KVM target servers, and their status and availability.
  • Page 257 Chapter 13: KX II Local Console 1. Log in to the Local Console. To use the Port Access page: The KVM target servers are initially sorted by Port Number. You can change the display to sort on any of the columns. ...
  • Page 258: Hot Keys And Connect Keys

    2. Click View by Port or View by Group to switch between views.  3. Click the Port Name of the target server you want to access. The Port Action Menu appears. See Port Action Menu (on page 44) for details on available menu options.
  • Page 259: Special Sun Key Combinations

    Press Left ALT > Press and Release 5 > Press and Release - > Press and Release 2 > Release Left ALT Switch from target port 5, slot 2 to port 5, slot  Press Left ALT > Press and Release 5 >...
  • Page 260: Accessing A Target Server

    Sun key Compose Vol + Vol - Stop Power Accessing a Target Server To access a target server: 1. Click the Port Name of the target you want to access. The Port Action Menu is displayed. 2. Choose Connect from the Port Action menu. The video display switches to the target server interface.
  • Page 261: Configuring Kx Ii Local Console Local Port Settings

    Chapter 13: KX II Local Console Configuring KX II Local Console Local Port Settings From the Local Port Settings page, you can customize many settings for the KX II Local Console including keyboard, hot keys, video switching delay, power save mode, local user interface resolution settings, and local user authentication.
  • Page 262 4. Select the Local Port Connect key. Use a connect key sequence to connect to a target and switch to another target. You can then use the hot key to disconnect from the target and return to the local port GUI.
  • Page 263 Chapter 13: KX II Local Console 10. Click OK.  None. There is no authentication for Local Console access. This option is recommended for secure environments only.  Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the KX II even when the device is under CC-SG management.
  • Page 264: Kx Ii Local Console Factory Reset

    Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local port can be configured from the Remote Console on the Port Configuration page or from the Local Console on the Local Port Settings page. See Local Port Settings (on page 190) for details on configuring these ports.
  • Page 265: Resetting The Kx Ii Using The Reset Button

    Chapter 13: KX II Local Console 1. Click Reset to continue. You will be prompted to confirm the factory 2. Click OK button proceed. Upon completion, the KX II device is Resetting the KX II Using the Reset Button On the back panel of the device, there is a Reset button. It is recessed to prevent accidental resets (you will need a pointed object to press this button).
  • Page 266: Appendix A Specifications

    Appendix A Specifications In This Chapter Physical Specifications ... 257 Environmental Requirements ... 259 Supported Operating Systems (Clients) ... 260 Supported CIMs and Operating Systems (Target Servers) ... 261 Supported Operating Systems and CIMs (KVM Target Servers) ... 267 Computer Interface Modules (CIMs) ... 269 Supported Browsers ...
  • Page 267 Appendix A: Specifications Part Line item UPC code number description DKX2-132 32-Port KX II 785813624079 with 1-user network access and local port, virtual media, dual power DKX2-216 16-Port KX II 785813624086 with 2-user network access and local port, virtual media, dual power DKX2-232 32-Port KX II...
  • Page 268: Environmental Requirements

    KX2-8 Specifications Part Line item UPC code number description DKX2-83 32-Port KX II 0785813620019 with 8-user network access, standard local port, extended local port, virtual media, dual power DKX2-86 64-Port KX II 0785813620026 with 8-user network access, standard local port, extended local port, virtual media, dual power...
  • Page 269: Supported Operating Systems (Clients)

    Appendix A: Specifications Operating Shock Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client and Multi-Platform Client (MPC): Client operating system Windows 7 Windows XP Windows 2008 Windows Vista Windows 2000 Windows 2003 Windows 2008 Red Hat Red Hat Desktop 4.0 Open SUSE 10, 11...
  • Page 270: Supported Cims And Operating Systems (Target Servers)

    Mode Windows x64 64-bit mode Supported CIMs and Operating Systems (Target Servers) In addition to the KX II D2CIMs, most Paragon are supported. The following table displays the supported target server operating systems, CIMs, virtual media, and mouse modes. Operating system Browser ...
  • Page 271 Appendix A: Specifications Supported Operating system and Paragon CIMs serial devices (where applicable)   P2CIM-PS2 Windows XP  Windows 2000  Windows 2000 Server  Windows 2003 Server  Windows Vista  Windows 7  Windows 2008  Red Hat Linux ...
  • Page 272 Supported Operating system and Paragon CIMs serial devices (where applicable)   UKVMPD Windows XP (version 0C4)  Windows 2000  Note: Version 0C5 Windows 2000 does not work with Server KX II.  Windows 2003 Server  Windows Vista ...
  • Page 273 Appendix A: Specifications Supported Target server Dominion KX I DCIMs   DCIM-PS2 Windows XP  Windows 2000  Windows 2000 Server  Windows 2003 Server  Windows Vista  Windows 7  Windows 2008  Red Hat Enterprise Linux 4 ES ...
  • Page 274 Note: The DCIM-USBG2 and P2CIM-AUSB provide a small slide switch on the back of the CIM. Move the switch to P for PC-based USB target servers; move the switch to S for Sun USB target servers. A new switch position takes effect only after the CIM is power-cycled. To power-cycle the CIM, remove the USB connector from the target server and plug it back in a few seconds later.
  • Page 275 Appendix A: Specifications Supported KX II Target server and D2CIMs remote rack PDUs (where applicable)   D2CIM-VUSB Windows XP  Windows 2000  Windows 2000 Server  Windows 2003 Server  Windows Vista  Windows 7  Windows 2008 ...
  • Page 276: Supported Operating Systems And Cims (Kvm Target Servers)

    Supported Operating Systems and CIMs (KVM Target Servers) In addition to the new D2CIMs, most Dominion CIMs are supported. The following table displays the supported target server operating systems, CIMs, virtual media, and mouse modes: Note: D2CIM-VUSB is not supported on Sun Supported Operating system and Dominion CIMs &...
  • Page 277 Appendix A: Specifications Target server Supported CIMs Windows 2003 ® Server Windows Vista operating system ® Red Hat DCIM-PS2 Enterprise Workstation 3.0, DCIM-USB 4.0 and 5.0 DCIM-USB G2 SUSE Linux DCIM-PS2 Professional 9.2 DCIM-USB and 10 DCIM-USB G2 DCIM-PS2 Fedora ®...
  • Page 278: Computer Interface Modules (Cims)

    SM: Standard Mouse Mode  : Supported The DCIM-USB G2 provides a small slide switch on the back of the CIM. Move the switch to P for PC-based USB KVM target servers; move the switch to S for Sun USB KVM target servers.
  • Page 279: Supported Browsers

    Appendix A: Specifications Part number Line item description Interface Module for Remote Rack PDUs D2CIM-VUSB- Bulk pack of 32 32PAC D2CIM-VUSB D2CIM-VUSB Bulk pack of 64 -64PAC D2CIM-VUSB D2CIM-DVUS Dominion KX II Computer Interface Module [Dual USB Port with Virtual Media] D2CIM-DVUS Bulk pack of 32...
  • Page 280: Certified Modems

    Cat5Reach URKVMG Receiver connected directly to extended local port.  Paragon II analog KVM switch (UMT) target port connected to extended local port. Provides furthest possible access to extended local port, when used together with the Paragon II Enhanced User Station.
  • Page 281: Kx2-832 And Kx2-864 Extended Local Port Recommended Maximum Distances

    Appendix A: Specifications Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so forth and the subjective nature of video quality, Raritan cannot guarantee performance across all distances in all environments. See the resolutions supported by the KX II. KX2-832 and KX2-864 Extended Local Port Recommended Maximum Distances Extended device...
  • Page 282 Resolutions 640x350 @85Hz 1024x768 @75Hz 640x400 @56Hz 1024x768 @90Hz 640x400 @84Hz 1024x768 @100Hz 640x400 @85Hz 1152x864 @60Hz 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz 1152x900 @76Hz 720x400 @84Hz 1280x720@60Hz 720x400 @85Hz...
  • Page 283: Supported Keyboard Languages

    Appendix A: Specifications Supported Keyboard Languages The KX II provides keyboard support for the languages listed in the following table. Note: You can use the keyboard for Chinese, Japanese, and Korean for display only; local language input is not supported at this time for the KX II Local Console functions.
  • Page 284: Smart Card Readers

    Language Spanish Portuguese Smart Card Readers Supported and Unsupported Smart Card Readers External, USB smart card readers are supported. Supported Smart Card Readers Type Keyboard/Card reader Combo Keyboard/Card reader Combo USB reader for SIM-sized cards Integrated (Dell Latitude D620) PCMCIA PCMCIA Note: SCM Microsystems SCR331 smart card readers must be using SCM Microsystems firmware v5.25.
  • Page 285: Minimum System Requirements

    Appendix A: Specifications This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, therefore they are unsupported. If a smart card reader does not appear in the supported smart card readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function with the device.
  • Page 286 ® Windows XP operating system targets must be running Windows XP SP3 in order to use smart cards with the KX II. If you are working with .NET 3.5 in a Windows XP environment on the target server, you must be using SP1.
  • Page 287: Tcp And Udp Ports Used

    Appendix A: Specifications   TCP and UDP Ports Used ® Fedora Core 10 ™ Create a Java Library Link A soft link must be created to the libpcsclite.so after upgrading RHEL 4, RHEL 5 and FC 10. For example, ln –s /usr/lib/libpcsclite.so.1 /usr/lib/libpcsclite.so, assuming installing the package places the libraries in /usr/lib or /user/local/lib.
  • Page 288 Port Description HTTP, Port 80 This port can be configured as needed. See Settings via HTTP (port 80) are automatically forwarded to HTTPS for complete security. The KX II responds to Port 80 for user convenience, relieving users from having to explicitly type in the URL field to access the KX II, while still preserving complete security.
  • Page 289: Network Speed Settings

    Appendix A: Specifications Network Speed Settings KX II network speed setting Network Auto switch port Highest setting Auto Available Speed 1000/Full 1000/Full KX II: 100/Full 100/Half Switch: 100/Full 100/Half 100/Half KX II: 10/Full 10/Half Switch: 10/Full 10/Half 10/Half Legend: 1000/Full...
  • Page 290 Note: For reliable network communication, configure the KX II and the LAN switch to the same LAN Interface Speed and Duplex. For example, configure both the KX II and LAN Switch to Autodetect (recommended) or set both to a fixed speed/duplex such as 100MB/s/Full.
  • Page 291: Appendix B Updating The Ldap Schema

    Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ... 282 Setting the Registry to Permit Write Operations to the Schema ... 283 Creating a New Attribute ...
  • Page 292: Setting The Registry To Permit Write Operations To The Schema

    Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory the window and then click Operations Master.
  • Page 293: Adding Attributes To The Class

    Appendix B: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field. 7.
  • Page 294 Appendix B: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
  • Page 295: Updating The Schema Cache

    Appendix B: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache 1. Right-click Active Directory 2.
  • Page 296 Appendix B: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain. 5. In the left pane of the window, select the CN=Users folder.
  • Page 297 Appendix B: Updating the LDAP Schema 6. Locate the user name whose properties you want to adjust in the 7. Click the Attribute Editor tab if it is not already open. Choose 8. Click Edit. The String Attribute Editor dialog appears. 9.
  • Page 298: Appendix C Informational Notes

    Appendix C Informational Notes In This Chapter Overview ... 289 Java Runtime Environment (JRE) ... 289 IPv6 Support Notes ... 290 Keyboards ... 291 Dell Chassis Cable Lengths and Video Resolutions ... 294 Fedora ... 294 Video Modes and Resolutions ... 295 USB Ports and Profiles ...
  • Page 299: Ipv6 Support Notes

    Appendix C: Informational Notes IPv6 Support Notes Java Java   Java 5.0 and above supports the IPv6 for the following:    The following IPv6 configurations are not supported by Java:  Linux    Windows  Mac Leopard ...
  • Page 300: Keyboards

    Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux The Virtual KVM Client and the Multi-Platform Client (MPC) do not process the key combination of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux clients. To obtain the caret symbol: From a French keyboard, press the ^ key (to the right of the P key), then immediately press the space bar.
  • Page 301 Appendix C: Informational Notes Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. Create a macro consisting of the following commands: ...
  • Page 302: Macintosh Keyboard

    Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using a Hungarian keyboard from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double Acute work only with JRE 1.6.
  • Page 303: Dell Chassis Cable Lengths And Video Resolutions

    Appendix C: Informational Notes Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using the following cable lengths and video resolutions when you are connecting to Dell Cable length 50 ft. 50 ft. 30 ft. Fedora Resolving Fedora Core Focus Using the Multi-Platform Client (MPC), occasionally there is an inability to...
  • Page 304: Resolving Issues With Firefox Freezing When Using Fedora

    Resolving Issues with Firefox Freezing when Using Fedora If you are accessing Firefox may freeze when it is opening. To resolve this issue, install the libnpjp2.so Java Video Modes and Resolutions SUSE/VESA Video Modes The SuSE X.org configuration tool SaX2 generates video modes using modeline entries in the X.org configuration file.
  • Page 305: Usb Ports And Profiles

    Appendix C: Informational Notes USB Ports and Profiles VM-CIMs and DL360 USB Ports another on the front of the device. With the DL360, both ports cannot be used at the same time. Therefore, a dual VM-CIM cannot be used on DL360 servers.
  • Page 306 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles, see page 102). Raritan provides a standard selection of USB configuration profiles for a wide range of operating system and BIOS level server implementations. These are intended to provide an optimal match between remote USB device and target server configurations.
  • Page 307: Changing A Usb Profile When Using A Smart Card Reader

    Appendix C: Informational Notes Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will need to change the USB profile for a target server. For example, you may need to change the connection speed to "Use Full Speed for Virtual Media CIM"...
  • Page 308: Windows 2000 Composite Usb Device Behavior For Virtual Media

    Appendix C: Informational Notes Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000 ® operating system does not support USB composite devices, like Raritan‟s D2CIM-VUSB, in the same manner as non-composite USB devices. As a result, the “Safely Remove Hardware” system tray icon does not appear for drives mapped by the D2CIM-VUSB and a warning message may appear when disconnecting the device.
  • Page 309: Accessing Virtual Media On A Windows 2000 Server Using A D2Cim-Vusb

    Appendix C: Informational Notes Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB A virtual media local drive cannot be accessed on a Windows 2000 server using a D2CIM-VUSB. Target BIOS Boot Time with Virtual Media The BIOS for certain targets may take longer to boot if media is mounted virtually at the target.
  • Page 310: Proxy Mode And Mpc

    Appendix C: Informational Notes Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you are planning to use the Multi-Platform Client (MPC). Moving Between Ports of the KX II If you move a between ports of the same KX II and resume management within one minute, CC-SG may display an error message.
  • Page 311: Appendix D Faqs

    Appendix D FAQs In This Chapter General Questions ... 303 Remote Access ... 305 Universal Virtual Media ... 307 USB Profiles ... 308 Bandwidth and KVM-over-IP Performance ... 310 Ethernet and IP Networking ... 315 IPv6 Networking ... 317 Servers ... 319 Blade Servers ...
  • Page 312: General Questions

    What is the KX II? The KX II is a second generation digital KVM (keyboard/video/ mouse) switch that enables one, two, four or eight IT administrators to access and control 8, 16, 32 or 64 servers over the network with BIOS-level functionality.
  • Page 313 Will my existing KX I CIMs work with the KX II switches? Yes, existing KX I CIMs will work with the KX II switch. In addition, select Paragon CIMs will work with the KX II. This provides an easy migration to the KX II from Paragon I customers who wish to switch to KVM-over-IP.
  • Page 314: Remote Access

    Appendix D: FAQs Remote Access How many users can remotely access servers on each KX II? The KX II models offer remote connections for up to eight users per user channel to simultaneously access and control a unique target server. For one-channel devices like the DKX2-116, up to eight remote users can access and control a single target server.
  • Page 315 Appendix D: FAQs 100Mbps Theoretical 60Mbps 10Mbps 6Mbps 512Kbps Cable modem How do I access servers connected to the KX II if the network ever becomes unavailable? You can access servers at-the-rack or via modem. The KX II offers a dedicated modem port for attaching an external modem.
  • Page 316: Universal Virtual Media

    Appendix D: FAQs Universal Virtual Media What KX II models support virtual media? All of the KX II models support virtual media. It is available standalone and through Raritan's CommandCenter Secure Gateway, Raritan's centralized management unit. What types of virtual media does the KX II support? The KX II supports the following types of media: internal and USB-connected CD/DVD drives, USB mass storage devices, PC hard drives, and ISO images.
  • Page 317: Usb Profiles

    Appendix D: FAQs USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services such as virtual media. The USB Profile tailors the KX II‟s USB interface to the server to accommodate these server specific characteristics.
  • Page 318 Appendix D: FAQs Do I need a special CIM to use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan provide USB profiles for other target server configurations? Raritan will provide new USB profiles to suit customer needs. As these profiles become available, they will be included in firmware upgrades.
  • Page 319: Bandwidth And Kvm-Over-Ip Performance

    Appendix D: FAQs Bandwidth and KVM-over-IP Performance How is bandwidth used in KVM-over-IP systems? The KX II offers next generation KVM-over-IP technology – the very best video compression available. Raritan has received numerous technical awards confirming its high video quality transmissions and the low bandwidth utilization.
  • Page 320 Unlike KX I, the Noise Filter parameter does not generally have a large role in reducing bandwidth or improving performance. How much bandwidth does KX II use for common tasks? Bandwidth primarily depends on the user's task and actions. The more the server's video screen changes, the more bandwidth is utilized.
  • Page 321 Appendix D: FAQs QuickTime video #2 With the reduced bandwidth settings, bandwidth is reduced significantly for virtually all tasks. With the 15 bit color setting, perceived performance is similar to the default parameters. Further, bandwidth reductions are possible with additional changes in the settings. 1500 - 2500 400 - 550 KB/s...
  • Page 322 Please note that these bandwidth figures are only examples and may vary from those seen in your environment due to many factors. How can I reduce bandwidth? The KX II provides a variety of settings in our remote clients to optimize bandwidth and performance.
  • Page 323 RGB Color. What is the maximum remote (over IP) video resolution supported? The KX II is the first and only KVM-over-IP switch to support full High Definition (HD) remote video resolution – 1920x1080.
  • Page 324: Ethernet And Ip Networking

    Yes. The KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should the primary Ethernet port (or the switch/router to which it is connected) fail, the KX II will failover to the secondary network port with the same IP address, ensuring that server operations are not disrupted.
  • Page 325 Appendix D: FAQs How many TCP ports must be open on my firewall in order to enable network access to the KX II? Are these ports configurable? Only one. The KX II protects network security by only requiring access to a single TCP port to operate.
  • Page 326: Ipv6 Networking

    Appendix D: FAQs IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Protocol Version 6”. IPv6 is the “next generation” IP protocol which will replace the current IP Version 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses.
  • Page 327 Appendix D: FAQs Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6. The KX II User Guide describes the KX II‟s support for IPv6.
  • Page 328: Servers

    Appendix D: FAQs Servers Does the KX II depend on a Windows server to operate? Absolutely not. Because users depend on the KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructure to fix problems), the KX II is designed to be completely independent from any external server.
  • Page 329: Blade Servers

    Some blade servers require you to use hotkeys to switch between blades. With the KX II, you don't have to use these hotkeys. Just click on the name of the blade server and the KX II will automatically switch to that blade without the explicit use of the hotkey.
  • Page 330 Appendix D: FAQs For KX II's, Raritan recommends connecting up to two times the number of remote connections supported by the device. For example, with a KX2-216 with two remote channels, we recommend connecting up to 4 blade server chassis. You can of course connect individual servers to the remaining server ports.
  • Page 331: Installation

    Some operating systems lock up when I disconnect a keyboard or mouse during operation. What prevents servers connected to the KX II from locking up when I switch away from them? Each Dominion computer interface module (DCIM) dongle acts as a virtual keyboard and mouse to the server to which it is connected.
  • Page 332 How do I connect a serially controlled (RS-232) device to the KX II, ™ such as a Cisco router/switch or a headless Sun server? If there are only a few serially-controlled devices, they may be connected to a KX II using Raritan's new P2CIM-SER serial converter.
  • Page 333: Local Port

    Appendix D: FAQs Local Port Can I access my servers directly from the rack? Yes. At the rack, the KX II functions just like a traditional KVM switch, allowing control of up to 64 servers using a single keyboard, monitor, and mouse.
  • Page 334  If the external authentication servers are unavailable, the KX II fails-over to its own internal authentication database. The KX II has its own standalone authentication, enabling instant, out-of-the-box installation. If I use the local port to change the name of a connected server, does this change propagate to remote access clients as well? Does it propagate to the optional CommandCenter unit? Yes.
  • Page 335: Extended Local Port (Dominion Kx2-832 And Kx2-864 Models Only)

    Paragon II EUST, Paragon II UST, and the Cat5 Reach URKVMG device. In addition, the extended local port can be connected via Cat5 cable to a server port on a Paragon II switch. This configuration can be used to consolidate the local ports of many KX2-8xxx devices to a single switch.
  • Page 336: Power Control

    All of the KX II models come equipped with dual AC inputs and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then the KX II will automatically switch to the other. Does the power supply used by the KX II automatically detect voltage settings? Yes.
  • Page 337 Appendix D: FAQs Does remote power control require any special server configuration? Some servers ship with default BIOS settings such that the server does not automatically restart after losing and regaining power. For these servers, see the server‟s documentation to change this setting. What happens when I recycle power to a server? This is the physical equivalent of unplugging the server from the AC power line, and reinserting the plug.
  • Page 338: Scalability

    The D2CIM-DVUSB CIM must be used to connect the "tiered" KX II switch to the "base" switch. Or for the KX2-832 and KX2-864, the extended local port can be connected via CAT5/6 cable (no CIM required) to the base KX II switch.
  • Page 339 KX II web-based user interface and from the Multiplatform Client (MPC). Can I connect an existing analog KVM switch to the KX II? Yes. Analog KVM switches can be connected to one of the KX II's server ports. Simply use a D2CIM-DVUSB or D2CIM-VUSB and attach it to the user ports of the existing analog KVM switch.
  • Page 340: Computer Interface Modules (Cims)

    P2CIM-AUSBDUAL), which can connect servers in the data center to two different KX II switches. If one KX II switch is not available, the server can be accessed through the second KX II switch, providing redundant access and doubling the level of remote KVM access.
  • Page 341: Security

    Appendix D: FAQs Security Is the Dominion KX II FIPS 140-2 Certified? The KX II 2.2.0 and later, and the KSX II 2.3.0 and later, provides users with the option to use an embedded FIPS 140-2-validated cryptographic module running on a Linux platform per FIPS 140-2 implementation guidelines.
  • Page 342 Appendix D: FAQs Yes, the KX II has administrator-configurable, strong password checking to ensure that user-created passwords meet corporate and/or government standards and are resistant to brute force hacking. If the KX II encryption mode is set to Auto, what level of encryption is achieved? The encryption level that is autonegotiated is dependent on the browser in use.
  • Page 343: Smart Cards And Cac Authentication

    Appendix D: FAQs Smart Cards and CAC Authentication Does the KX II support smart card and CAC authentication? Yes, smart cards and DoD Common Access Card (CAC) authentication to target servers is supported in release KX II 2.1.10 and later, and KSX II 2.3.0 and later.
  • Page 344: Manageability

    Appendix D: FAQs Manageability Can the KX II be remotely managed and configured via web browser? Yes, the KX II can be completely configured remotely via web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) version installed.
  • Page 345: Miscellaneous

    Appendix D: FAQs Miscellaneous What is the KX II's default IP address? 192.168.0.192 What is the KX II's default user name and password? The KX II's default user name is admin and the default password is raritan [all lower case]. However, for the highest level of security, the KX II forces the administrator to change the KX II default administrative user name and password when the unit is first booted up.
  • Page 346: Index

    Index A. AC Power • 27 Absolute Mouse Mode • 72 Accessing a Target Server • 251 Accessing the KX II Using CLI • 233 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB • 300 Active KVM Client (AKC) • 80 Adding a New User •...
  • Page 347 Index Connecting to Virtual Media • 97 Connection Information • 57 Connection Properties • 55 Create User Groups and Users • 35 Creating a New Attribute • 283 D. Local Access Port (Local Video Display, Keyboard and Mouse) • 28 Default Login Information •...
  • Page 348 Keyboard Language Preference (Fedora Linux Clients) • 292 Keyboard Macros • 57 Keyboard Options • 57 Keyboards • 291 KX II Client Applications • 5 KX II Console Layout • 40 KX II Console Navigation • 42 KX II Help • 4 KX II Local Console •...
  • Page 349 Index Rack PDU (Power Strip) Outlet Control • 84 RADIUS Communication Exchange Specifications • 131 Rebooting • 221 Refreshing the Screen • 63 Related Documentation • 5 Relationship Between Users and Groups • 111 Remote Access • 305 Remote Authentication • 34, 192, 253 Remote Client Requirements •...
  • Page 350 SUSE/VESA Video Modes • 295 Switching Between KVM Target Servers • 53 Target BIOS Boot Time with Virtual Media • Target Server Connection Distance and Video Resolution • 271, 272 Target Server Requirements • 276 TCP and UDP Ports Used • 278 Terminology •...
  • Page 351: United Kingdom

    U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Beijing Monday - Friday...

This manual is also suitable for:

Dominion kx ii

Table of Contents