Contents Chapter 1 Introduction Dominion KX II Help... 1 Related Documentation ... 1 What's New in the Help... 2 Dominion KX II Overview... 3 Virtual Media ... 5 Product Photos ... 6 Product Features ... 8 Hardware ... 8 Software... 9 Terminology ...
Page 4
Contents Video Properties ... 63 Mouse Options... 67 VKC Virtual Media ...72 Tool Options ... 72 View Options... 74 Help Options ... 75 Chapter 4 Virtual Media Overview ... 77 Prerequisites for Using Virtual Media ...79 File Server Setup (File Server ISO Images Only)...80 Using Virtual Media...
Page 6
Contents Upgrading CIMs ...196 Upgrading Firmware ...197 Upgrade History ...199 Rebooting...199 Stopping CC-SG Management ...201 Chapter 11 Diagnostics Network Interface Page ...203 Network Statistics Page...204 Ping Host Page ...206 Trace Route to Host Page ...206 Device Diagnostics ...208 Chapter 12 Command Line Interface (CLI) Overview ...210 Accessing the Dominion KX II Using CLI...211 SSH Connection to the Dominion KX II ...211...
Page 7
Computer Interface Modules (CIMs)...237 Supported CIMs and Operating Systems (Target Servers)...239 Certified Modems...245 Devices Supported by the KX2-832 and KX2-864 Extended Local Port...245 Target Server Connection Distance and Video Resolution ...245 KX2-832 and KX2-864 Extended Local Port Recommended Maximum Distances ...246 Remote Connection ...246...
Page 8
Contents Setting the Registry to Permit Write Operations to the Schema ...255 Creating a New Attribute...255 Adding Attributes to the Class ...256 Updating the Schema Cache...258 Editing rciusergroup Attributes for User Members...258 Appendix C Informational Notes Overview ...262 Java Runtime Environment (JRE) ...262 IPv6 Support Notes...263 Keyboards...264 Non-US Keyboards...264...
Page 9
Universal Virtual Media ...280 USB Profiles...281 Ethernet and IP Networking...283 IPv6 Networking...290 Servers...292 Blade Servers ...293 Installation...296 Local Port...298 Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) ...300 Power Control ...301 Scalability...302 Computer Interface Modules (CIMs)...303 Security ...304 Manageability...305 Miscellaneous ...306 Index...
Introduction Chapter 1 In This Chapter Dominion KX II Help ...1 What's New in the Help ...2 Dominion KX II Overview...3 Virtual Media...5 Product Photos ...6 Product Features ...8 Terminology...9 Package Contents ...11 Dominion KX II Help The Dominion KX II help provides information on how to install, set up, and configure the Dominion KX II.
Information on the new Extended Local port feature on the KX2-832 and KX2-864 has been added to the help. Information on features specific to the KX2-832 and KX2-864 has been updated in the Help as needed. Specifications specific to the KX2-832 and KX2-864 have been...
Dominion KX II Overview The Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can be controlled with a standard Dominion KX II.
Computer Interface Module (CIM) Dominion KX II Remote KVM and serial devices Modem Remote (network) access Chapter 1: Introduction Remote virtual media USB drive(s) Power strip Local access Note: KX2-832 and KX2-864 also use an Extended Local port. IP LAN/WAN PSTN...
UTP (Cat5/5e/6) server cabling Dual Ethernet ports (10/100/1000 LAN) with failover Field upgradable Local User port for in-rack access PS/2 keyboard/mouse ports. KX2-832 and KX2-864 are USB only. One front and three back panel USB 2.0 ports for supported USB devices...
Software • Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs • Absolute Mouse Synchronization with D2CIM-VUSB CIM and D2CIM-DVUSB CIMs • Plug-and-Play • Web-based access and management • Intuitive graphical user interface (GUI) • 128-bit encryption of complete KVM signal, including video and virtual media •...
Page 19
Chapter 1: Introduction Diagram Key page 239) for a list of the supported operating systems and CIMs, and of the operating systems supported by the Dominion KX II remotely. TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) Dominion KX II Local Access Console Local User - an optional user console (consisting of a...
Package Contents Each Dominion KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmount chassis. Each Dominion KX II device ships with the following contents: Amount included Item Dominion KX II device Dominion KX II Quick Setup Guide Rackmount kit AC power cords Cat5 network cable...
Installation and Configuration Chapter 2 In This Chapter Overview...12 Default Login Information ...12 Getting Started ...13 Overview This section provides a brief overview of the installation process. Each step is further detailed in the remaining sections of this chapter. To install and configure the Dominion KX II: •...
Default Value Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location. Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that will be accessed and controlled via the Dominion KX II.
Page 23
Chapter 2: Installation and Configuration Mouse Settings The Dominion KX II operates in several mouse modes: • • • Mouse parameters do not have to be altered for Absolute Mouse Synchronization but D2CIM-VUSB or D2CIM-DVUSB is required for this mode. For both the Standard and Intelligent mouse modes, mouse parameters must be set to specific values, which are described here.
Page 24
Windows XP®/Windows 2003® To configure KVM target servers running Microsoft Windows XP/2003: 1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Pointer Options tab. c. In the Motion group: Set the mouse motion speed setting to exactly the middle speed.
Page 25
Chapter 2: Installation and Configuration Note: For KVM target servers running Windows 2000 or XP, you may wish to create a user name that will be used only for remote connections through the Dominion KX II. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the Dominion KX II connection.
Page 26
Animate controls and elements inside windows Animate windows when minimizing and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 3. Click OK and Close the Control Panel. Linux Settings (Red Hat 9) Note: The following settings are optimized for Standard Mouse mode only.
Page 27
Chapter 2: Installation and Configuration Note: Once connected to the target server, in many Linux graphical environments, the <Ctrl> <Alt> <+> command will change the video resolution, scrolling through all available resolutions that remain enabled in the XF86Config or /etc/X11/xorg.conf, depending on your X server distribution.
Page 28
3. Save the file. 4. Reboot the system in order for the changes to take effect. Linux Settings (Red Hat 4) Note: The following settings are optimized for Standard Mouse mode only. To configure KVM target servers running Linux (graphical user interface): 1.
Page 29
Chapter 2: Installation and Configuration SUSE Linux 10.1 Settings Note: Do not attempt to synchronize the mouse at the SUSE login prompt. You must be connected to the target server to synchronize the mouse cursors. 1. Choose Desktop > Control Center. The Desktop Preferences dialog 2.
Page 30
Tip: If you do not want to be prompted upon log out, follow these procedures instead. To make your settings permanent in Linux (no prompt): 1. Choose Desktop > Control Center > System > Sessions. 2. Click the Session Options tab. 3.
Page 31
Chapter 2: Installation and Configuration 3. KVM target servers running the Solaris operating system must output 1. Issue the Stop+A command to drop to bootprom mode. 2. Issue the following command to change the output resolution: setenv 3. Issue the boot command to reboot the server. You can also contact your Raritan representative to purchase a video output adapter: If you have:...
Page 32
Video Settings (POST) Sun systems have two different resolution settings: a POST resolution and a GUI resolution. Run these commands from the command line. Note: 1024x768x75 is used as an example here; substitute the resolution and refresh rate you are using. To check current POST resolution: •...
Chapter 2: Installation and Configuration 4. Use the sliders to set the Mouse acceleration to 1.0 and Threshold to 5. Click OK. 1. From the Launcher, select Application Manager. 2. Select System_Admin. 3. Choose Smit > Devices > Graphic Displays > Select the Display 4.
To take advantage of the Dominion KX II: Web-access capabilities Automatic redirection of HTTP requests to HTTPS (so the more common “http://xxx.xxx.xxx.xxx” can be used instead of “https://xxx.xxx.xxx.xxx”) Network Settings (on page 120) for additional information about designating another discovery port. Step 3: Connect the Equipment Connect the Dominion KX II to the power supply, network, local PC, and target servers.
Page 35
(not for load-balancing). By default, only LAN1 is active and the automatic failover is disabled. When enabled, if the Dominion KX II internal network interface or the network switch to which it is connected becomes unavailable, LAN2 will be enabled using the same IP address.
Page 36
Dominion KX II Local Console for administration and target server access. The KX2-832 and KX2-864 also provide you with an Extended Local port, labeled EXT LOCAL on the back of the device, for access to target servers while at the rack. The Extended Local port is not required for the initial installation and setup.
2. Attach the HD15 video connector of your CIM to the video port of 3. Attach the keyboard/mouse connector of your CIM to the Note: The DCIM-USB G2 provides a small slide switch on the back of the CIM. Move the switch to P for PC-based USB target servers. Move the switch to S for Sun USB target servers.
Page 38
2. Once the unit has booted, the Dominion KX II Local Console is visible on the monitor attached to the Dominion KX II local port. Type the default username (admin) and password (raritan) and click Login. The Change Password screen is displayed. 3.
Page 39
Chapter 2: Installation and Configuration 4. If IPv6 is to be used, enter or select the appropriate IPv6-specific 5. Select Obtain DNS Server Address Automatically if DHCP is 6. If Use the Following DNS Server Addresses is selected, regardless DHCP - Dynamic Host Configuration Protocol is used by networked computers (clients) to obtain unique IP addresses and other parameters from a DHCP server.
Page 40
a. Primary DNS Server IP Address b. Secondary DNS Server IP Address 7. When finished, click OK. Your Dominion KX II device is now network accessible. LAN Interface Settings (on page 123) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed &...
Chapter 2: Installation and Configuration Naming Target Servers 1. Connect all of the target servers if you have not already done so. 2. Using the Dominion KX II Local Console, choose Device Settings > 3. Click the Port Name of the target server you want to rename. The 4.
Page 42
Character Description Percent sign & Ampersand Left parenthesis Right parenthesis ] Asterisk Plus sign Comma Dash Period Forward slash < Less than sign Colon Specifying Power Supply Autodetection The Dominion KX II provides dual power supplies and can automatically detect and provide notification regarding the status of these power supplies.
Page 43
Chapter 2: Installation and Configuration Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the device turns red. 1. Using the Dominion KX II Local Console, choose Device Settings > 2.
Note on Microsoft Active Directory Microsoft Active Directory uses the LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the Dominion KX II. If it has the IAS (Internet Authorization Server) component, a Microsoft Active Directory server can also serve as a RADIUS authentication source.
Page 45
Chapter 2: Installation and Configuration 3. Type the layout code desired (for example, 31 for the Japanese 4. Press Enter. 5. Shut down the device and power on once again. The DCIM-SUSB 6. Verify that the characters are correct. keyboard). performs a reset (power cycle).
Working with Target Servers Chapter 3 In This Chapter Interfaces ...37 Virtual KVM Client ...51 Interfaces There are several user interfaces in the Dominion KX II, providing you with easy access any time, anywhere. These include the Dominion KX II Local Console, the Dominion KX II Remote Console, and the Multi-Platform Client (MPC).
Chapter 3: Working with Target Servers Dominion KX II Local Console Interface When you are located at the server rack, the Dominion KX II provides standard KVM management and administration via the Dominion KX II Local Console. The Dominion KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
Page 48
from the Dominion device's IP address to launch the Dominion KX II Remote Console. Depending on your browser and security settings, you may see various security and certificate warnings. It is necessary to accept these warnings to launch the Dominion KX II Remote Console. You can reduce the number of warning messages during subsequent log ins by checking the following options on the security and certificate warning messages:...
Page 49
Chapter 3: Working with Target Servers 6. See Dominion KX II Console Layout Both the Dominion KX II Remote Console and the Dominion KX II Local Console interfaces provide an HTML (web-based) interface for configuration and administration, as well as target server list and selection.
Page 50
Port Access Page After successfully logging on to the Dominion KX II Remote Console, the Port Access page appears. This page lists all of the Dominion KX II ports, the connected KVM target servers, and their status and availability. The Port Access page provides access to the KVM target servers connected to the Dominion KX II.
Page 51
Chapter 3: Working with Target Servers 2. Click View by Port or View by Group to switch between views. 3. Click the Port Name of the target server you want to access. The 4. Choose the desired menu command from the Port Action Menu.
Page 52
On the local port, the Dominion KX II Local Console interface must be visible in order to perform the switch. Hot key switching is also available from the local port.
Page 53
Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: •...
Page 54
Note: Both IPv4 and IPv6 addresses are supported. Manage Favorites Page To open the Manage Favorites page: • Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: Favorites List Discover Devices - Local Subnet Discover Devices - Dominion KX II Subnet Add New Device to Favorites...
Page 55
Chapter 3: Working with Target Servers Discovering Devices on the Local Subnet This option discovers the devices on your local subnet, which is the subnet where the Dominion KX II Remote Console is running. These devices can be accessed directly from this page or you can add them to your list of favorites.
Page 56
Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the remote console subnet. To access a discovered device: • Click the device name or IP address for that device. A new browser opens to that device.
Page 57
Chapter 3: Working with Target Servers 1. Choose Manage > Discover Devices - Dominion KX II Subnet. The 2. Click Refresh. The list of devices on the local subnet is refreshed. 1. Select the checkbox next to the device name/IP address. 2.
Page 58
6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate Dominion KX II device. 2. Click the Edit button. The Edit page appears. 3.
Chapter 3: Working with Target Servers Logging Out • Note: Logging out also closes any open Virtual KVM Client and serial client sessions. Multi-Platform Client Interface Raritan Multi-Platform Client (MPC) is a graphical user interface for the Raritan product lines, providing remote access to target servers connected to Raritan KVM over IP devices.
Note: Depending on your browser and browser security settings, you may see various security and certificate check and warning messages. It is necessary to accept the options in order to open MPC. Note: If you are using FireFox 3.0.3, you may experience problems launching the application.
Chapter 3: Working with Target Servers VKC Toolbar and Shortcut Keys Button Button Description Name Connection Opens the Modify Connection Properties Properties dialog from which you can manually adjust bandwidth options (such as connection speed, color depth, and so forth). Same as choosing Connection >...
Switching Between KVM Target Servers With the Dominion KX II, you can access several KVM target servers. The Dominion KX II provides the ability to switch from one target server to another. Note: This feature is available in the Dominion KX II Remote Console only.
Chapter 3: Working with Target Servers 3. Choose Switch From in the Port Action menu. The Virtual KVM Client window switches to the new target server you selected. Power Controlling a Target Server Note: These features are available only when you have made power associations.
Disconnecting KVM Target Servers Note: This item is not available on the Dominion KX II Local Console. The only way to disconnect from the switched target in the Local Console is to use the hot key. To disconnect a target server: 1.
Chapter 3: Working with Target Servers Connection Properties The Dominion KX II dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The Dominion KX II devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
Page 66
128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) Note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting.
Chapter 3: Working with Target Servers Connection Information • The following information is displayed about the current connection: • • • • • • • • • • • • Keyboard Options Keyboard Macros Keyboard macros ensure that keystroke combinations intended for the target server are sent to and interpreted only by the target server.
Page 68
Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Click Add. The Add Keyboard Macro dialog appears. 3. Type a name for the macro in the Keyboard Macro Name field. This name will appear in the Keyboard menu after it is created.
Page 69
Chapter 3: Working with Target Servers 8. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Keyboard Macros dialog appears and lists the new keyboard macro.
Page 70
9. Click Close to close the Keyboard Macros dialog. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu.
Page 71
Chapter 3: Working with Target Servers 5. Click OK. 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted. Hot-key combinations that coincide with blade chassis switching key sequences will not be sent to blades housed in those chassis.
Video Properties Refresh Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways: • The Refresh Screen command forces a refresh of the video screen. • The Auto-sense Video Settings command automatically detects the target server's video settings.
Page 73
Chapter 3: Working with Target Servers Video Settings Use the Video Settings command to manually adjust the video settings. 1. Choose Video > Video Settings or click the Video Settings button 2. Adjust the following settings as required. As you adjust the settings To change the video settings: in the toolbar to open the Video Settings dialog.
Page 74
Phase - Phase values range from 0 to 31 and will wrap around. Stop at the phase value that produces the best video image for the active target server. k. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor. Vertical Offset - Controls the vertical positioning of the target server display on your monitor.
Page 75
Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
3. Click Save to save the screenshot. Mouse Options When controlling a target server, the Dominion KX II Remote Console displays two mouse cursors: one belonging to your client workstation and the other belonging to the target server. You can operate in either single mouse mode or dual mouse mode. When in dual mouse mode, and provided the option is properly configured, the mouse cursors will align.
Page 77
Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, you will see two mouse cursors: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
Page 78
Additional Notes for Intelligent Mouse Mode • Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place. • Do not use an animated mouse. •...
Page 79
Chapter 3: Working with Target Servers Intelligent Mouse Mode In Intelligent Mouse mode, the Dominion KX II device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. In this mode, the mouse cursor does a “dance”...
Page 80
Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed.
Chapter 3: Working with Target Servers 1. Press Ctrl+Alt+O on your keyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media for complete information about setting up and using virtual media. Tool Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client, including logging, setting the keyboard type, and defining hot keys for exiting Full Screen mode and Single Cursor mode.
Page 82
5. Exit Single Cursor Mode - Hotkey. When you enter single cursor mode, only the target server mouse cursor is visible. This is the hot key used to exit single cursor mode and bring back the client mouse cursor. 6. Click OK. Keyboard Limitations Slovenian Keyboards The <...
Chapter 3: Working with Target Servers View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. • Scaling Scaling your target window allows you to view the entire contents of the target server window. This feature increases or reduces the size of the target video to fit the Virtual KVM Client window size, and maintains the aspect ratio so that you see the entire target server desktop without using the scroll bar.
Help Options About Raritan Virtual KVM Client This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support. To obtain version information: • Choose Help > About Raritan Virtual KVM Client. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file so it can be accessed later when dealing with support (if needed).
Virtual Media Chapter 4 In This Chapter Overview...77 Prerequisites for Using Virtual Media ...79 File Server Setup (File Server ISO Images Only) ...80 Using Virtual Media ...81 Connecting to Virtual Media ...83 Disconnecting Virtual Media ...86...
Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client PC and network file servers. With this feature, media mounted on a client PC and network file servers is essentially "mounted virtually" by the target server. The target server can then read from and written to that media as if it were physically connected to the target server itself.
Diagram key Desktop PC Dominion KX II Target server Prerequisites for Using Virtual Media With the Dominion KX II virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target.
Chapter 4: Virtual Media Target Server • • • • File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work.
4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog. Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of third-party software used by the KX2.
Page 91
Chapter 4: Virtual Media Target Server • • • 1. If you plan to access file server ISO images, identify those file 2. Open a KVM session with the appropriate target server. 3. Connect to the virtual media. Upon completion of your tasks, disconnect the virtual media. See Disconnecting Virtual Media If you would prefer not to change Vista account permissions, run Internet Explorer as an administrator.
Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives.
Chapter 4: Virtual Media 4. Click Connect. The media will be mounted on the target server Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations: • • • CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan.
Page 94
b. Choose the drive from the Local CD/DVD Drive drop-down list. All available internal and external CD and DVD drive names will be populated in the drop-down list. c. Click Connect. 3. For ISO images: a. Choose the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive.
Chapter 4: Virtual Media Disconnecting Virtual Media • • Note: In addition to disconnecting the virtual media using the Disconnect command, simply closing the KVM connection closes the virtual media as well. To disconnect the virtual media drives: For local drives, choose Virtual Media > Disconnect Drive. For CD-ROM, DVD-ROM, and ISO images, choose Virtual Media >...
USB Profiles Chapter 5 In This Chapter Overview...87 CIM Compatibility ...88 Available USB Profiles...88 Selecting Profiles for a KVM Port ...95 Overview To broaden the Dominion KX II's compatibility with different KVM target servers, Raritan provides a standard selection of USB configuration profiles for a wide range of operating system and BIOS-level server implementations.
Chapter 5: USB Profiles CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. A VM-CIM that has not had its firmware upgraded will support a broad range of configurations (Keyboard, Mouse, CD-ROM, and Removable Drive) but will not be able to make use of profiles optimized for particular target configurations.
Page 98
USB profile BIOS DellOptiplex Keyboard Only Chapter 5: USB Profiles Description Dell Optiplex BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell Optiplex BIOS when using D2CIM-VUSB. When using the new D2CIM-DVUSB, use 'Generic' profile. Notice: •...
Page 99
Chapter 5: USB Profiles USB profile BIOS DellPowerEdge Keyboard Only Description Dell PowerEdge BIOS Access (Keyboard Only) Use this profile to have keyboard functionality for the Dell PowerEdge BIOS when using D2CIM-VUSB. When using the new D2CIM-DVUSB, use 'Generic' profile. Notice: •...
Page 100
USB profile BIOS Generic BIOS HP Proliant DL145 BIOS HPCompaq DC7100/DC7600 BIOS IBM ThinkCentre Lenovo Chapter 5: USB Profiles Description BIOS Generic Use this profile when Generic OS profile does not work on the BIOS. WARNING: USB enumeration will trigger whenever Virtual Media is connected or disconnected Restrictions: •...
Page 101
Chapter 5: USB Profiles USB profile BIOS Lenovo ThinkPad T61 & X61 BIOS Mac Generic HP Proliant DL360/DL380 G4 (HP SmartStart CD) Description BIOS Lenovo ThinkPad T61 and X61 (boot from Virtual Media) Use this profile to boot the T61 and X61 series laptops from Virtual Media.
Page 102
USB profile HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) Linux MAC OS X (10.4.9 and later) RUBY Industrial Mainboard (AwardBIOS) Chapter 5: USB Profiles Description HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server when installing Windows 2003 Server without the help of HP SmartStart CD.
Page 103
Chapter 5: USB Profiles USB profile Supermicro Mainboard Phoenix (AwardBIOS) Suse 9.2 Troubleshooting 1 Troubleshooting 2 Description Supermicro Mainboard Phoenix AwardBIOS Use this profile for the Supermicro series mainboards with Phoenix AwardBIOS. Restrictions: • Virtual CD-ROM and disk drives cannot be used simultaneously SuSE Linux 9.2 Use this for SuSE Linux 9.2 distribution.
USB profile Troubleshooting 3 Use Full Speed for Virtual Media CIM Selecting Profiles for a KVM Port The Dominion KX II comes with a set of USB profiles that you can assign to a KVM port based on the characteristics of the KVM target server it connects to.
User Management Chapter 6 In This Chapter User Groups ...96 Users ...105 Authentication Settings...108 Changing a Password ...119 User Groups The Dominion KX II stores an internal list of all user and group names to determine access authorization and permissions. This information is stored internally in an encrypted format.
User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group.
Page 107
Chapter 6: User Management 2. Type a descriptive name for the new user group into the Group Set the permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group.
Page 108
Chapter 6: User Management Note: Several administrative functions are available within MPC and from the Dominion KX II Local Console. These functions are available only to members of the default Admin group. Note: Both IPv4 and IPv6 addresses are supported.
Page 110
Setting Port Permissions For each server port, you can specify the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setting for all permissions is Deny. Port Access Option Description...
Page 111
Chapter 6: User Management This feature limits access to the Dominion KX II device by users in the selected group to specific IP addresses. This feature applies only to users belonging to a specific group, unlike the IP Access Control List feature that applies to all access attempts to the device, is processed first, and takes priority.
Page 112
2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number. To delete a rule: 1. Specify the rule number you want to delete. 2.
Chapter 6: User Management Permission Security User Management Setting Permissions for an Individual Group 1. Locate the group from among the groups listed. Individual groups 2. Click the Group Name. The Group page opens. 3. Select the appropriate permissions. 4. Click OK. Modifying an Existing User Group Note: All permissions are enabled (and cannot be changed) for the Admin group.
Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Choose a group from among those listed by checking the checkbox to the left of the Group Name. 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and passwords to gain access to the Dominion KX II.
Chapter 6: User Management Adding a New User It is a good idea to define user groups before creating Dominion KX II users because, when you add a user, you must assign that user to an existing user group. See From the User page, you can add new users, modify user information, and reactivate users that have been deactivated.
5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK. Logging a User Off (Force Logoff) If you are an administrator, you are able to log out another locally authenticated user who is logged on to the Dominion KX II. To log out a user: 1.
Chapter 6: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed.
Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn.
Page 119
Chapter 6: User Management 10. The default Secure LDAP Port is 636. Either use the default port or 11. Certificate File - Consult your authentication server administrator to 12. DN of Administrative User - Distinguished Name of administrative 13. User Search DN - Enter the name you want to bind against the 14.
Page 120
15. Active Directory Domain. Type the name of the Active Directory Domain. For example, testradius.com. Consult with your Active Directive Administrator for a specific domain name. Note: Both IPv4 and IPv6 addresses are supported. Chapter 6: User Management...
Chapter 6: User Management Returning User Group Information from Active Directory Server The Dominion KX II supports user authentication to Active Directory (AD) without requiring that users be defined locally on the Dominion KX II. This allows Active Directory user accounts and passwords to be maintained exclusively on the AD server.
Implementing RADIUS Remote Authentication Remote Authentication Dial-in User Service (RADIUS) is an AAA (authentication, authorization, and accounting) protocol for network access applications. To use the RADIUS authentication protocol: 1. Click User Management > Authentication Settings to open the Authentication Settings page. 2.
Page 123
Chapter 6: User Management CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PAP. Note: Both IPv4 and IPv6 addresses are supported.
Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the Dominion KX II determines the permissions for a given user based on the permissions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID.
Page 125
Chapter 6: User Management Attribute Log in Log out Accounting-Request(4) Acct-Status (40) NAS-Port-Type (61) NAS-Port (5) NAS-IP-Address (4) User-Name (1) Acct-Session-ID (44) Data Stop(2) - Stops the accounting VIRTUAL (5) for network connections. Always 0. The IP address for the Dominion KX II. The user name entered at the login screen.
Chapter 6: User Management User Authentication Process When the device is configured to authenticate and authorize local users from CC, the order in which the user credentials are validated follows the following process:...
Page 127
Chapter 6: User Management Remote authentication follows the process specified in the flowchart below:...
Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
Device Management Chapter 7 In This Chapter Network Settings ...120 Device Services...125 Modem Settings...125 Configuring Date/Time Settings ...127 Event Management ...129 Power Supply Setup ...135 Configuring Ports...137 Network Settings Use the Network Settings page to customize the network configuration (for example, the IP address, discovery port, and LAN interface parameters) for your Dominion KX II.
Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings 1. Choose Device Settings > Network. The Network Settings page opens.
Page 131
Chapter 7: Device Management 5. Select Obtain DNS Server Address Automatically if DHCP is 6. If Use the Following DNS Server Addresses is selected, regardless 7. When finished, click OK. Your Dominion KX II device is now network e. Link-Local IP Address. This address is automatically assigned to the device.
LAN Interface Settings (on page 123) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues. In these instances, setting the Dominion KX II LAN Interface Speed &...
Page 133
Chapter 7: Device Management 3. Select the Enable Automatic Failover checkbox to allow the 4. Select the Bandwidth from the following options: 10 Mbps/Half - Both LEDs blink 10 Mbps/Full - Both LEDs blink 100 Mbps/Half - Yellow LED blinks 100 Mbps/Full - Yellow LED blinks 1000 Mbps/Full (gigabit) - Green LED blinks Half-duplex provides for communication in both directions, but...
5. Click OK to apply the LAN settings. Device Services 1. Choose Device Settings > Device Services. The Device Service Settings page appears. 2. Enter the Discovery Port. The Dominion KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can configure it to use any TCP port except 80 and 443.
Page 135
Chapter 7: Device Management 4. Enter the initial modem string in the Modem Init String field. If the 5. Enter the IPv4 modem server address in the Modem Server IPv4 modem string is left blank, the following string is sent to the modem by default: ATZ OK AT OK.
6. Click OK to commit your changes or click Reset to Defaults to return the settings to their defaults. Certified Modems modems that work with the Dominion KX II. For information on settings that will give you the best performance when connecting to the Dominion KX II via modem, see Creating, Modifying and Deleting Profiles in MPC - Generation 2 Devices in the KVM and Serial Access Clients Guide.
Page 137
Chapter 7: Device Management 2. Choose your time zone from the Time Zone drop-down list. 3. To adjust for daylight savings time, check the "Adjust for daylight 4. Choose the method you would like to use to set the date and time: 5.
Event Management The Dominion KX II Event Management feature provides a set of screens for enabling and disabling the distribution of system events to SNMP Managers, Syslog, and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or several destinations.
Page 139
Chapter 7: Device Management 2. Type the IP Address/Host Name of your Syslog server in the IP 3. Click OK. • Note: Both IPv4 and IPv6 addresses are supported. Note: IPv6 addresses cannot exceed 80 characters in length for the host name.
Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management - Destinations page to select the system events to track and where to send this information. Note: SNMP traps will be generated only if the SNMP Logging Enabled option is selected.
Page 141
Chapter 7: Device Management 3. Click OK.
Page 142
To reset to factory defaults: • Click Reset To Defaults. Warning: When using SNMP traps over UDP, it is possible for the Dominion KX II and the router that it is attached to to fall out of synchronization when the Dominion KX II is rebooted, preventing the reboot completed SNMP trap from being logged.
Page 143
Chapter 7: Device Management Trap Name ipConflictResolved networkFailure networkParameterChanged passwordSettingsChanged portConnect portConnectionDenied portDisconnect portStatusChange powerNotification powerOutletNotification rebootCompleted rebootStarted securityViolation startCCManagement stopCCManagement userAdded userAuthenticationFailure userConnectionLost userDeleted userForcedLogout userLogin userLogout Description An IP Address conflict was resolved. An Ethernet interface of the product can no longer communicate over the network.
Trap Name userModified userPasswordChanged userSessionTimeout userUploadedCertificate vmImageConnected vmImageDisconnected Power Supply Setup The Dominion KX II provides dual power supplies, and can automatically detect and provide notification regarding the status of these power supplies. Use the Power Supply Setup page to specify whether you are using one or both of the power supplies.
Page 145
Chapter 7: Device Management 2. If you are plugging power input into power supply number one 3. If you are plugging power input into power supply number two 4. Click OK. Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the unit turns red.
Configuring Ports The Port Configuration page displays a list of the Dominion KX II ports. Ports connected to KVM target servers (blades and standard servers) and power strips are displayed in blue and can be edited. For ports with no CIM connected or with a blank CIM name, a default port name of Dominion-KX2_Port# is assigned, where Port# is the number of the Dominion KX II physical port.
Chapter 7: Device Management 2. Click the Port Name for the port you want to edit. Configuring Standard Target Servers 1. Connect all of the target servers if you have not already done so. 2. Choose Device Settings > Port Configuration. The Port Configuration 3.
Page 148
Connecting a Power Strip To connect the power strip: 1. Connect the male RJ-45 of the D2CIM-PWR to the female RJ-45 connector on the power strip. 2. Connect the female RJ-45 connector of the D2CIM-PWR to any of the available female system port connectors on the Dominion KX II using a straight through Cat5 cable.
Page 149
Chapter 7: Device Management 2. Connect the female RJ-45 connector of the D2CIM-PWR to any of 3. Attach an AC power cord to the target server and an available power 4. Connect the power strip to an AC power source. 5.
Page 150
Naming the Power Strip (Port Page for Power Strips) This Port page opens when you select a port from the Port Configuration page that is connected to a Raritan remote power strip. The Type and the Name fields are prepopulated. Note: The (CIM) Type cannot be changed.
Page 151
Chapter 7: Device Management 3. Click OK.
Page 152
Manage KVM Target Servers Associated with Outlets (Port Page) This Port page opens when you select a port from the Port Configuration page that is connected to a target server. From this page, you can make power associations, change the port name to something more descriptive, and update target server settings if you are using the D2CIM-VUSB CIM.
Page 153
Chapter 7: Device Management Removing Power Associations Do not physically remove a power strip from the Dominion KX II without first removing the power strip association in Device Settings. When a target has been associated with a power strip and the target is removed from the Dominion KX II, the power association remains.
Configuring Blade Chassis In addition to standard servers and power strips, the Dominion KX II offers you the ability to control blade chassis that are plugged into a Dominion KX II port. Up to eight blade chassis can be managed through the Dominion KX II at a given time.
Page 155
Chapter 7: Device Management The Dominion KX II also supports use of hot key sequences to switch KVM access to a blade chassis. For blade chassis that allow users to select a hot key sequence, those options will be provided on the Port Configuration page.
Page 156
Chapter 7: Device Management If you move a blade chassis from one KX II port to another KX II port, interfaces that were added to the blade chassis node in CC-SG will be lost in CC-SG. All other information will be retained.
Page 157
The Port page will open. necessary fields to configure a blade chassis. a. Switch Hot Key Sequence - Define the hot key sequence that will be used to switch from KVM to the blade chassis. The Switch Hot Key Sequence must match the sequence used by the KVM module in the blade chassis.
Page 158
The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access to the URL links entered in this section of the page is governed by the blade chassis port permissions. a. Active - To activate the link once it is configured, select the Active checkbox.
Page 159
Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server. The Switch Hot Key Sequence must match the sequence used by the KVM module in the blade chassis.
Page 160
1. If you selected Dell 1855/1955, auto-discovery is not available. Configure the blade chassis as applicable. a. Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server. Chapter 7: Device Management...
Page 161
Chapter 7: Device Management 2. Change the blade chassis name if needed. 3. Indicate the blades that are installed in the blade chassis by 4. In the Blade Chassis Managed Links section of the page, you are b. Maximum Number of Slots - The default maximum number of slots available on the blade chassis is automatically entered.
Page 162
(on page 125)). Additionally, a user account with the corresponding authentication credentials must be previously created on the blade chassis. a. Switch Hot Key Sequence - Predefined. b. Maximum Number of Slots - The default maximum number of slots available on the blade chassis is automatically entered.
Page 163
Chapter 7: Device Management 2. If you want the Dominion KX II to auto-discover the chassis blades, 3. Change the blade chassis name if needed. If the chassis is already 4. If operating in Manual mode, indicate the blades that are installed in 5.
Page 164
1. If you selected IBM BladeCenter (Other), auto-discovery is not available. Configure the blade chassis as applicable. a. Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server.
Page 165
Chapter 7: Device Management 4. In the Blade Chassis Managed Links section of the page, you are 5. USB profiles are not used by IBM (Other) configurations. 6. Click OK to save the configuration. able to configure the connection to a blade chassis web browser interface if one is available.
Page 166
Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web application associated with an RSA, DRAC or ILO Processor card.
Page 167
Chapter 7: Device Management HP® Blade Chassis Configuration (Port Group Management) The Dominion KX II supports the aggregation of ports connected to certain types of blades into a group representing the blade chassis. Specifically, HP BladeServer blades and Dell PowerEdge 1855/1955 blades when the DellPowerEdge 1855/1955 is connected from each individual blade to a port on the Dominion KX II.
Page 168
3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. Select the Blade Server Group checkbox. If you want to designate that these ports are attached to blades housed in a blade chassis (for example, HP c3000 or Dell PowerEdge 1855), select the Blade Server Group checkbox.
Page 169
Chapter 7: Device Management 1. Click on the Port Group Management page, select the checkbox of 2. Click the Delete button. 3. Click OK on the warning message. Supported Blade Chassis Models This table contains the blade chassis models that are supported by the Dominion KX II and the corresponding profiles that should be selected per chassis model when configuring them in the Dominion KX II application.
Page 170
(standard) • Digital Access KVM switch module (optional) • KVM switch module (standard on systems sold prior to April, 2005) These switches provide a custom connector that allows two PS/2 and one video device to be connected to the system.
Page 171
Chapter 7: Device Management Blade chassis Connection method Dell PowerEdge The KVM Switch Module (iKVM) is Integrated M1000e with this chassis. The iKVM is compatible with the following peripherals: • USB keyboards, USB pointing devices • VGA monitors with DDC support.
Page 172
Blade chassis Connection method IBM BladeCenter E The current model BladeCenter E chassis (8677-3Rx) ships standard with one Advanced Management Module. Source: IBM BladeCenter Products and Technology IBM BladeCenter T The BladeCenter T chassis ships standard with one Advanced Management Module. In contrast to the standard BladeCenter chassis, the KVM module and the Management Module in the BladeCenter T...
Page 173
Chapter 7: Device Management Blade chassis Dell PowerEdge M1000e Required/recommended action • Disable the iKVM GUI screensaver. An authorize dialog will appear, preventing iKVM from working correctly, if this is not done. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM.
Page 174
Blade chassis Required/recommended action • Dell PowerEdge Disable the iKVM GUI screensaver. An Authorize dialog will appear if this is not done and will prevent the iKVM from 1855/1955 operating correctly. • Exit the iKVM GUI menu before attaching Dell's chassis to a Raritan CIM.
Page 175
Chapter 7: Device Management Blade Chassis Sample URL Formats This table contains sample URL formats for blade chassis being configured in the Dominion KX II. Blade chassis Dell M1000e Dell 1855 BladeCenter E or H Sample URL format • URL: https://192.168.60.44/cgi-bin/webcgi/login •...
Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles for Port section of the Port page. The USB profiles chosen in the Port page become the profiles available to the user in VKC when connecting to a KVM target server from the port.
Page 177
Chapter 7: Device Management 2. Click Add. The selected profiles appear in the Selected list. These are the profiles that can be use for the KVM target server connected to the port. To specify a preferred USB profile: 1. After selecting the available profiles for a port, choose one from the Preferred Profile for Port menu.
For the KX2-832 and KX2-864, you are also able to configure the Extended Local port from the Local Port Settings page. The Extended Local port may be connected to a Paragon switch or User Station to extend the reach of the local port.
Page 179
Chapter 7: Device Management 2. Select the checkbox next to the Standard Local Port to enable it. 3. If you are using a KX2-832 or KX2-864 device, select the checkbox 4. Choose the appropriate keyboard type from among the options in the Deselect the checkbox to disable it.
Page 180
Double Click Left Ctrl key 6. Select the Local Port Connectkey. Use a connect key sequence to connect to a target and switch to another target. You can then use the hot key to disconnect from the target and return to the local port GUI.
Page 181
Chapter 7: Device Management 12. Click OK. None. There is no authentication for Local Console access. This option is recommended for secure environments only. Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is under CC-SG management.
Page 182
Chapter 7: Device Management KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two local port options: the Standard Local port and the Extended Local port. Each of these port options is enabled and disabled from the Remote Console on the Port...
Powerstrip Outlet Control Chapter 8 In This Chapter Overview...174 Turning Outlets On/Off and Cycling Power ...175 Overview The Dominion KX II allows you to control PX and Baytech powerstrip outlets connected to the Dominion KX II through a D2CIM-PWR. Note: For information on setting up a PX, see the Dominion PX User Guide.
Initially, when you open the Powerstrip page, the powerstrips that are currently connected to the Dominion KX II are displayed in the Powerstrip drop-down. Additionally, information relating to the currently selected powerstrip is displayed. The name, state, and powerstrip port associations are not displayed, nor are the on, off, and cycle controls.
Page 185
Chapter 8: Powerstrip Outlet Control 4. Click On. 5. Click OK to close the Power On confirmation dialog. The outlet will 1. Click Off. 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The outlet will be 1.
Page 186
2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open. Click OK to close the dialog. Chapter 8: Powerstrip Outlet Control...
Security Management Chapter 9 In This Chapter Security Settings...178 Checking Your Browser for AES Encryption ...185 Configuring IP Access Control ...185 SSL Certificates...188 Security Settings From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security.
To reset back to defaults: • Click Reset to Defaults. Login Limitations Using login limitations, you can specify restrictions for single login, password aging, and the logging out idle users. Limitation Description Enable single login When selected, only one login per user name is limitation allowed at any time.
Chapter 9: Security Management Limitation Enable password aging Log out idle users, After (1-365 minutes) Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid Dominion KX II local passwords such as minimum and maximum length, required characters, and password history retention.
Field Description Maximum length of strong The default is 16, but can be up to 64 password characters long. Enforce at least one lower When checked, at least one lower case case character character is required in the password. Enforce at least one upper When checked, at least one upper case case character character is required in the password.
Chapter 9: Security Management Option Timer Lockout Deactivate User-ID When selected, this option specifies that the user When a user-ID is deactivated after the specified number of failed attempts, the administrator must change the user password and activate the user account by selecting the Active checkbox on the User page. Encryption &...
Page 192
Encryption mode Description Auto This is the recommended option. The Dominion KX II autonegotiates to the highest level of encryption possible. Secures user names, passwords and KVM data, including video transmissions using the RSA RC4 encryption method. This is a 128-bit Secure Sockets Layer (SSL) protocol that provides a private communications channel between the Dominion KX II device...
Page 193
Chapter 9: Security Management 4. If needed, select VM Share Mode. This option is enabled only when 5. If needed, select the Disable Local Port Output checkbox. If this 6. If needed, select Local Device Reset Mode. This option specifies Private - No PC share.
Checking Your Browser for AES Encryption The Dominion KX II supports AES-256. If you do not know if your browser uses AES, check with the browser manufacturer or navigate to the https://www.fortify.net/sslcheck.html website using the browser with the encryption method you want to check. This website detects your browser's encryption method and displays a report.
Page 195
Chapter 9: Security Management 3. Choose the Default Policy. This is the action taken for IP addresses 1. Type the IP address and subnet mask in the IPv4/Mask or 2. Choose the Policy from the drop-down list. 3. Click Append. The rule is added to the bottom of the rules list. 1.
Page 196
Chapter 9: Security Management 2. Click Delete. 3. You are prompted to confirm the deletion. Click OK.
Chapter 9: Security Management SSL Certificates The Dominion KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the Dominion KX II has to identify itself to a client using a cryptographic certificate.
Page 198
2. Complete the following fields: a. Common name - The network name of the Dominion KX II once it is installed in the user's network (usually the fully qualified domain name). It is identical to the name that is used to access the Dominion KX II with a web browser but without the prefix “http://”.
Page 199
Chapter 9: Security Management 1. Upload the certificate to the Dominion KX II by clicking the Upload After completing these three steps the Dominion KX II has its own certificate that is used for identifying the card to its clients. Important: If you destroy the CSR on the Dominion KX II there is no way to get it back! In case you deleted it by mistake, you have to repeat the three steps as described above.
Chapter 10 Maintenance In This Chapter Audit Log...191 Device Information...192 Backup and Restore ...193 USB Profile Management ...195 Upgrading CIMs...196 Upgrading Firmware ...197 Upgrade History...199 Rebooting ...199 Stopping CC-SG Management...201 Audit Log A log is created of the Dominion KX II system events. To view the audit log for your Dominion KX II: 1.
Chapter 10: Maintenance Device Information The Device Information page provides detailed information about your Dominion KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. To view information about your Dominion KX II and CIMs: •...
Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your Dominion KX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another Dominion KX II by backing up the user configuration settings from the Dominion KX II in use and restoring those configurations to the new Dominion KX II.
Page 203
Chapter 10: Maintenance WARNING: Exercise caution when restoring your Dominion KX II to an earlier version. Usernames and password in place at the time of the backup will be restored. If you do not remember the old administrative usernames and passwords, you will be locked out of the Dominion KX II.
USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech support. These profiles are designed to address the needs of your target server’s configuration, in the event that the set of standard profiles does not already address them. Raritan tech support will provide the custom profile and work with you to verify the solution for your target server’s specific needs.
Chapter 10: Maintenance As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so will terminate any Virtual Media sessions that were in place. Handling Conflicts in Profile Names A naming conflict between custom and standard USB profiles may occur when a firmware upgrade is performed.
3. Click the Upgrade button. You are prompted to confirm the upgrade. 4. Click OK to continue the upgrade. Progress bars are displayed during the upgrade. Upgrading takes approximately 2 minutes or less per CIM. Upgrading Firmware Use the Firmware Upgrade page to upgrade the firmware for your Dominion KX II and all attached CIMs.
Page 207
Chapter 10: Maintenance 6. Click Upload from the Firmware Upgrade page. Information about 7. Click Upgrade. Please wait for the upgrade to complete. Status 8. As prompted, close the browser and wait approximately 5 minutes the upgrade and version numbers is displayed for your confirmation (if you opted to review CIM information, that information is displayed as well): Note: At this point, connected users are logged out, and new login...
For information about upgrading the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Client Guide. Note: Firmware upgrades are not supported via modem. Upgrade History The Dominion KX II provides information about upgrades performed on the Dominion KX II and attached CIMS.
Page 209
Chapter 10: Maintenance users will be logged off. 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted to confirm the action. Click Yes to To reboot your Dominion KX II: proceed with the reboot.
Stopping CC-SG Management While the Dominion KX II is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC-SG management. If you are managing the Dominion KX II through CC-SG and connectivity between CC-SG and the Dominion KX II is lost after the specified timeout interval (typically 10 minutes), you are able to end the CC-SG management session from the Dominion KX II console.
Page 211
Chapter 10: Maintenance 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
Chapter 11 Diagnostics In This Chapter Network Interface Page ...203 Network Statistics Page...204 Ping Host Page...206 Trace Route to Host Page ...206 Device Diagnostics ...208 Network Interface Page The Dominion KX II provides information about the status of your network interface. To view information about your network interface: •...
Chapter 11: Diagnostics Network Statistics Page The Dominion KX II provides statistics about your network interface. 1. Choose Diagnostics > Network Statistics. The Network Statistics 2. Choose the appropriate option from the Options drop-down list: To view statistics about your network interface: page opens.
Page 214
Chapter 11: Diagnostics Interfaces - Produces a page similar to the one displayed here. Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.
Chapter 11: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another Dominion KX II is accessible.
Page 216
2. Type either the IP address or host name into the IP Address/Host Name field. Note: The host name cannot exceed 232 characters in length. 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4.
Chapter 11: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. Device diagnostics downloads the diagnostics information from the Dominion KX II to the client machine. Two operations can be performed on this page: •...
Page 218
Chapter 11: Diagnostics a. Click the Save to File button. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
Chapter 12 Command Line Interface (CLI) In This Chapter Overview...210 Accessing the Dominion KX II Using CLI ...211 SSH Connection to the Dominion KX II...211 Telnet Connection to the Dominion KX II ...212 Logging In ...213 Navigation of the CLI ...214 Initial Configuration Using CLI...215 CLI Prompts...216 CLI Commands...216...
Accessing the Dominion KX II Using CLI Access the Dominion KX II by using one of the following methods: • Telnet via IP connection • SSH (Secure Shell) via IP connection • Local Port-via RS-232 serial interface A number of SSH/Telnet clients are available and can be obtained from the following locations: •...
Chapter 12: Command Line Interface (CLI) SSH Access from a UNIX/Linux Workstation Note: Both IPv4 and IPv6 addresses are supported. Telnet Connection to the Dominion KX II Due to the lack of security, user name, password and all traffic is in clear-text on the wire.
Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default password: raritan The welcome message displays. You are now logged on as an administrator. After reviewing the following section, perform the Initial Configuration tasks.
Chapter 12: Command Line Interface (CLI) Navigation of the CLI Before using the CLI, it is important to understand CLI navigation and syntax. There are also some keystroke combinations that simplify CLI use. Completion of Commands The CLI supports the completion of partially-entered commands. After entering the first few characters of an entry, press the Tab key.
Common Commands for All Command Line Interface Levels Following are the commands that are available at all CLI levels. These commands also help navigate through the CLI. Commands history help quit logout Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same configuration can be done via KVM.
Chapter 12: Command Line Interface (CLI) Setting Network Parameters Network parameters are configured using the interface command. admin > Config > Network > interface enable true if lan1 ip 192.16.151.12 mask 255.255.255 gw 192.168.51.12 When the command is accepted, the device automatically drops the connection.
Command Description history Display the current session's command line history. listports List accessible ports. logout Logout of the current CLI session. Return to the root menu. userlist List active user sessions. • Enter admin > config > network. Command Description help Display overview of commands.
Chapter 12: Command Line Interface (CLI) Administering the Dominion KX II Console Server Configuration Commands Note: CLI commands are the same for SSH, Telnet, and Local Port access sessions. The Network command can be accessed in the Configuration menu for the Dominion KX II.
Interface Command The Interface command is used to configure the Dominion KX II network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters ipauto <none|dhcp> IP auto configuration (none/dhcp) ip <ipaddress>...
Chapter 13 Dominion KX II Local Console In This Chapter Overview...221 Using the Dominion KX II Local Console ...221 Dominion KX II Local Console Interface...222 Security and Authentication...222 Available Resolutions ...223 Port Access Page (Local Console Server Display) ...224 Hot Keys and Connect Keys...226 Special Sun Key Combinations ...227 Accessing a Target Server ...228 Returning to the Dominion KX II Local Console Interface...228...
Chapter 13: Dominion KX II Local Console Dominion KX II Local Console Interface When you are located at the server rack, the Dominion KX II provides standard KVM management and administration via the Dominion KX II Local Console. The Dominion KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
Available Resolutions The Dominion KX II Local Console provides the following resolutions to support various monitors: • 800x600 • 1024x768 • 1280x1024 Each of these resolutions supports a refresh rate of 60Hz and 75Hz. Chapter 13: Dominion KX II Local Console...
Chapter 13: Dominion KX II Local Console Port Access Page (Local Console Server Display) After you login to the Dominion KX II Local Console, the Port Access page opens. This page lists all of the Dominion KX II ports, the connected KVM target servers, and their status and availability.
Page 234
Unavailable. Blade servers will have an availability of either shared or exclusive when a connection to that blade is in place. 2. Click View by Port or View by Group to switch between views. In addition to the Port Number, Port Name, Status, Type, and Availability, a Group column is also displayed on the View by Group tab.
GUI. A connect key is used to connect to a target or switch between targets. The Local Port hot key allows you to rapidly access the Dominion KX II Local Console user interface when a target server is currently being viewed.
Blade chassis Connect key action Key sequence example Disconnect from a target and return to the local port GUI Special Sun Key Combinations The following key combinations for Sun Microsystems server’s special keys operate on the local port. These special are available from the Keyboard menu when you connect to a Sun target server: Sun key Again...
Chapter 13: Dominion KX II Local Console Accessing a Target Server 1. Click the Port Name of the target you want to access. The Port 2. Choose Connect from the Port Action menu. The video display Returning to the Dominion KX II Local Console Interface Important: The Dominion KX II Local Console default hot key is to press the Scroll Lock key twice rapidly.
Configuring Dominion KX II Local Console Local Port Settings From the Local Port Settings page, you can customize many settings for the Dominion KX II Local Console including keyboard, hot keys, video switching delay, power save mode, local user interface resolution settings, and local user authentication.
Page 239
Double Click Left Ctrl key Press the left Ctrl key twice quickly connect to a target and switch to another target. You can then use the hot key to disconnect from the target and return to the local port GUI. The connect key works for both standard servers and blade chassis.
Page 240
Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to the Dominion KX II even when the device is under CC-SG management. Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access, you will have to remove the device from under CC-SG management (from within CC-SG).
Chapter 13: Dominion KX II Local Console Configuring Dominion KX II Local Port Settings from the Local Console The Standard Local port and the Extended Local port can be configured from the Remote Console on the Port Configuration page or from the Local Console on the Local Port Settings page.
1. Click Reset to continue. You will be prompted to confirm the factory reset because all network settings will be permanently lost. 2. Click OK button proceed. Upon completion, the Dominion KX II device is automatically restarted. Resetting the Dominion KX II Using the Reset Button On the back panel of the device, there is a Reset button.
Computer Interface Modules (CIMs) ...237 Supported CIMs and Operating Systems (Target Servers) ...239 Certified Modems ...245 Devices Supported by the KX2-832 and KX2-864 Extended Local Port245 Target Server Connection Distance and Video Resolution...245 KX2-832 and KX2-864 Extended Local Port Recommended Maximum Distances ...246...
Page 244
Part Line item UPC code number description DKX2-132 32-Port 785813624079 Dual Power Dominion KX II with 1-user Network Access and Local Port, Virtual Media, Dual Power DKX2-216 16-Port 785813624086 Dual Power Dominion KX II with 2-user Network Access and Local Port, Virtual Media, Dual Power DKX2-232...
Page 245
Appendix A: Specifications Part Line item number description DKX2-464 64-Port Dominion KX II with 4-user Network Access and Local Port, Virtual Media, Dual Power KX2-8 Specifications Part Line item UPC code number description DKX2-832 32-Port 0785813620019 Dual Power Dominion KX II with 8-user Network Access,...
Environmental Requirements Operating Temperature 0°C- 40°C (32°F - 104°F) Humidity 20% - 85% RH Altitude Vibration 5-55-5 HZ, 0.38mm, 1 minutes per cycle; 30 minutes for each axis (X, Y, Z) Shock Non-Operating Temperature 0°C- 50°C (32°F - 122°F) Humidity 10% - 90% RH Altitude Vibration...
Page 247
Appendix A: Specifications Part number Line item description DCIM-USB Dominion KX I & II Computer Interface Module [USB Port] DCIM-SUSB Dominion KX I & II Computer Interface Module [USB Port for Sun] DCIM-USBG2 Dominion KX I & II Computer Interface Module [USB and Sun USB Port] G2 CIM...
Part number Line item description D2CIM-DVUSB Dominion KX II Computer Interface Module [Dual USB Port with Virtual Media] D2CIM-DVUSB- Bulk pack of 32PAC D2CIM-DVUS D2CIM-DVUSB Bulk pack of -64PAC D2CIM-DVUS Supported CIMs and Operating Systems (Target Servers) In addition to the new Dominion KX II D2CIMs, most Paragon® and Dominion KX I CIMs are supported.
Page 249
Appendix A: Specifications Supported Operating system and Paragon CIMs serial devices (where applicable) • • P2CIM-PS2 Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and •...
Page 250
Supported Operating system and Paragon CIMs serial devices (where applicable) • • UKVMPD Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and •...
Page 251
Appendix A: Specifications Supported Target server Dominion KX I DCIMs • • DCIM-PS2 Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • Red Hat Linux 9.0 • Red Hat Enterprise Workstation 3.0 and •...
Page 252
HP UX Note: The DCIM-USB G2 provides a small slide switch on the back of the CIM. Move the switch to P for PC-based USB target servers; move the switch to S for Sun USB target servers. A new switch position takes effect only after the CIM is power-cycled.
Page 253
Appendix A: Specifications Supported Target server and Dominion KX II remote power strips D2CIMs (where applicable) • • D2CIM-VUSB Windows XP • Windows 2000 • Windows 2000 Server • Windows 2003 Server • Windows Vista • SUSE Linux Professional 9.2 and •...
• US Robotics Sportster 56K • US Robotics Courier 56K Devices Supported by the KX2-832 and KX2-864 Extended Local Port The Extended Local Port supports attachment from the following devices: • Paragon II User Station (P2-UST) connected directly to Extended Local port.
Raritan cannot guarantee performance across all distances in all environments. See the resolutions supported by the Dominion KX II. KX2-832 and KX2-864 Extended Local Port Recommended Maximum Distances Extended device Paragon II UMT using EUST...
Appendix A: Specifications Language Chinese Traditional Chinese Simplified Korean Japanese French German Belgian Norwegian Danish Swedish Hungarian Slovenian Italian Spanish Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client™ and Multi-Platform Client (MPC): Client OS Windows XP®...
Page 258
Client OS Virtual media (VM) support on client SUSE Linux Professional 9.2 Yes. Locally held ISO image, Remote and 10 File Server mounting directly from Dominion KX II Fedora™ Core 5 and above Yes. Locally held ISO image, Remote File Server mounting directly from Dominion KX II Mac®...
Appendix A: Specifications Supported Browsers Dominion KX II supports the following browsers: • • • • TCP and UDP Ports Used Internet Explorer 6, 7 and 8 Firefox 1.5, 2.0, and 3.0 Mozilla 1.7 Safari 2.0...
Page 260
Port Description HTTP, Port 80 All requests received by the Dominion KX II via HTTP (port 80) are automatically forwarded to HTTPS for complete security. The Dominion KX II responds to Port 80 for user convenience, relieving users from having to explicitly type in the URL field to access the Dominion KX II, while still preserving complete security.
Appendix A: Specifications Network Speed Settings Dominion KX II network speed setting Network Auto switch port Highest setting Auto Available Speed 1000/Full 1000/Full Dominion 100/Full KX II: 100/Half Switch: 100/Full 100/Half 100/Half Dominion 10/Full KX II: 10/Half Switch: 10/Full 10/Half...
Page 262
Note: For reliable network communication, configure the Dominion KX II and the LAN switch to the same LAN Interface Speed and Duplex. For example, configure both the Dominion KX II and LAN Switch to Autodetect (recommended) or set both to a fixed speed/duplex such as 100MB/s/Full.
Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...254 Setting the Registry to Permit Write Operations to the Schema ...255 Creating a New Attribute ...255 Adding Attributes to the Class ...256 Updating the Schema Cache...258 Editing rciusergroup Attributes for User Members ...258...
Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory Schema root node in the left pane of the window and then click Operations Master.
Appendix B: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field. 7.
Page 266
Appendix B: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
Appendix B: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache 1. Right-click Active Directory Schema in the left pane of the window 2.
Page 268
Appendix B: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
Page 269
Appendix B: Updating the LDAP Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
Page 270
7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the Dominion KX II) in the Edit Attribute field.
Appendix C Informational Notes In This Chapter Overview...262 Java Runtime Environment (JRE) ...262 IPv6 Support Notes ...263 Keyboards ...264 Mouse Pointer Synchronization (Fedora)...267 Dell Chassis Cable Lengths and Video Resolutions ...268 Resolving Fedora Core Focus...268 Running VKC on Fedora with FireFox 3.0.x and JRE 1.5.0_16...268 SUSE/VESA Video Modes ...269 USB Ports and Profiles...269 CIMs ...272...
IPv6 Support Notes Java Java 1.5 supports IPv6 for the following: • Solaris 8 and higher • Linux kernel 2.1.2 and higher (RedHat 6.1 and higher) Java 5.0 and above supports the IPv6 for the following: • Solaris 8 and higher •...
Appendix C: Informational Notes Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux Clients Only) The Virtual KVM Client and the Multi-Platform Client (MPC) do not process the key combination of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux clients.
Page 274
Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde symbol: Create a macro consisting of the following commands: •...
Page 275
Appendix C: Informational Notes Language Norwegian Swedish Danish Japanese Korean Slovenian Italian Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using a Hungarian keyboard from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double Acute work only with JRE 1.6.
Macintosh Keyboard When a Macintosh is used as the client, the following keys on the Mac keyboard are not captured by the Java Runtime Environment (JRE): • • • • • • Volume Up • Volume Down • Mute • Eject As a result, the Virtual KVM Client and the Multi-Platform Client (MPC) are unable to process these keys from a Mac client's keyboard.
Appendix C: Informational Notes Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using the following cable lengths and video resolutions when you are connecting to Dell blade chassis from the Dominion KX II: Cable length 50 ft.
SUSE/VESA Video Modes The SuSE X.org configuration tool SaX2 generates video modes using modeline entries in the X.org configuration file. These video modes do not correspond exactly with VESA video mode timing (even when a VESA monitor is selected). The Dominion KX II, on the other hand, relies on exact VESA mode timing for proper synchronization.
Appendix C: Informational Notes Help for Choosing USB Profiles When you are connected to a KVM target server in VKC, you can view information about USB profiles via the Help on USB Profiles command on the USB Profile menu.
Page 280
USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles, see page 88). Raritan provides a standard selection of USB configuration profiles for a wide range of operating system and BIOS level server implementations. These are intended to provide an optimal match between remote USB device and target server configurations.
Appendix C: Informational Notes CIMs Windows 3-Button Mouse on Linux Targets When using a 3-button mouse on a Windows client connecting to a Linux target, the left mouse button may get mapped to the center button of the Windows client 3-button mouse. Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000 operating system does not support USB composite devices, like Raritan’s D2CIM-VUSB, in the same manner as...
Virtual Media Virtual Media Not Refreshed After Files Added After a virtual media drive has been mounted, if you add a file(s) to that drive, those files may not be immediately visible on the target server. Disconnect and then reconnect the virtual media connection. Target BIOS Boot Time with Virtual Media The BIOS for certain targets may take longer to boot if media is mounted virtually at the target.
Appendix C: Informational Notes Moving Between Ports of the Dominion KX II If you move a between ports of the same Dominion KX II and resume management within one minute, CC-SG may display an error message. If you resume management, the display will be updated.
Page 284
USB Profiles ...281 Ethernet and IP Networking ...283 IPv6 Networking ...290 Servers ...292 Blade Servers ...293 Installation ...296 Local Port...298 Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) .300 Power Control...301 Scalability...302 Computer Interface Modules (CIMs) ...303 Security...304 Manageability ...305 Miscellaneous...306...
What is the Dominion KX II? The Dominion KX II is a second generation digital KVM (keyboard/video/ mouse) switch that enables one, two, four or eight IT administrators to access and control 8, 16, 32 or 64 servers over the network with BIOS-level functionality.
Page 286
How large is the Dominion KX II? The Dominion KX II is only 1U high (except KX2-864 and KX2-464, which are 2U), fits in a standard 19" rack mount, and is only 11.4" (29 cm) deep.
Appendix D: FAQs Remote Access How many users can remotely access servers on each Dominion KX II? The Dominion KX II models offer remote connections for up to eight users per user channel to simultaneously access and control a unique target server.
Page 288
Speed Description 100Mbps Theoretical 100Mbit network speed 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network speed 6Mbps Likely practical 10Mbit network speed 512Kbps Cable modem download speed (typical) How do I access servers connected to the Dominion KX II if the network ever becomes unavailable? You can access servers at-the-rack or via modem.
Appendix D: FAQs Universal Virtual Media What Dominion KX II models support virtual media? All of the Dominion KX II models support virtual media. It is available standalone and through Raritan's CommandCenter Secure Gateway, Raritan's centralized management unit. What types of virtual media does the Dominion KX II support? The Dominion KX II supports the following types of media: internal and USB-connected CD/DVD drives, USB mass storage devices, PC hard drives, and ISO images.
Appendix D: FAQs USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services such as virtual media. The USB Profile tailors the Dominion KX II’s USB interface to the server to accommodate these server specific characteristics.
Page 291
Appendix D: FAQs A BIOS profile has been tailored to match the requirements of a particular server’s BIOS that does not implement the full USB specification. The profile enables use of keyboard, mouse, and virtual media at the BIOS level, overcoming the restrictions or limitations of the BIOS.
Yes. The Dominion KX II features dual gigabit Ethernet ports to provide redundant failover capabilities. Should the primary Ethernet port (or the switch/router to which it is connected) fail, the Dominion KX II will failover to the secondary network port with the same IP address, ensuring that server operations are not disrupted.
Page 293
Appendix D: FAQs Other factors include the server’s video resolution, networking speed and characteristics, client PC resources, and video card noise. The Dominion KX II has very sophisticated video processing algorithms that optimize bandwidth and performance for a variety of environments. In addition, they are highly configurable since there are many settings to optimize bandwidth usage.
Page 294
User task Default Close browser 100 - 150 KB/s 75 - 100 KB/s 30 - 60KB/s Open Start menu 75 - 100 KB/s Close Start menu 75 - 100 KB/s Starfield screen 25 - 50 KB/s saver 3D pipes screen 10 - 100 KB/s saver Windows media...
Page 295
Appendix D: FAQs With the reduced bandwidth settings, bandwidth is reduced significantly for virtually all tasks. With the 15 bit color setting, perceived performance is similar to the default parameters. Further, bandwidth reductions are possible with additional changes in the settings. Please note that these bandwidth figures are only examples and may vary from those seen in your environment due to many factors.
Page 296
Appendix D: FAQs The connection speed and color depth settings can be tweaked to optimize performance for slower bandwidth links. For example, in the Multi-Platform Client or the Virtual KVM Client, set the connection speed to 1.5Mb or 1Mb and the color depth to 8 bit. Even lower connection speeds and color depths can be used for very low bandwidth situations.
Page 297
Appendix D: FAQs Only one. The Dominion KX II protects network security by only requiring access to a single TCP port to operate. This port is completely configurable for additional security. Note that, of course, to use the Dominion KX II's optional web browser capability, the standard HTTPS port 443 must also be open.
Page 298
Appendix D: FAQs When changing the IP address of the Dominion KX II or swapping in a new Dominion KX II, sufficient time must be allowed for its IP and MAC addresses to be known throughout the Layer 2 and Layer 3 networks.
Appendix D: FAQs IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Protocol Version 6”. IPv6 is the “next generation” IP protocol which will replace the current IP Version 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses.
Page 300
Appendix D: FAQs The Dominion KX II’s default networking is set at the factory for IPv4 only. When you are ready to use IPv6, then follow the above instructions to enable IPv6/IPv4 dual stack operation. Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6.
Appendix D: FAQs Servers Does the Dominion KX II depend on a Windows server to operate? Absolutely not. Because users depend on the KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructure to fix problems), the Dominion KX II is designed to be completely independent from any external server.
Blade Servers Can I connect blade servers to the Dominion KX II? Yes you can. The Dominion KX II supports popular blade server models from the leading blade server manufacturers: HP, IBM and Dell. Which blade servers are supported? The following models are supported: •...
Page 303
With the Dominion KX II, you don't have to use these hotkeys. Just click on the name of the blade server and the Dominion KX II will automatically switch to that blade without the explicit use of the hotkey. Can I access the blade server's management module? Yes, you can define the URL of the management module and access it from the Dominion KX II or from CC-SG.
Page 304
Appendix D: FAQs I'm running VMware on some of my blade servers. Is this supported? Yes, with CC-SG you can display and access virtual machines running on blade servers. Is virtual media supported? We support VM on IBM BladeCenter Model H and E with the D2CIM - DVUSB.
Some operating systems lock up when I disconnect a keyboard or mouse during operation. What prevents servers connected to the Dominion KX II from locking up when I switch away from them? Each Dominion computer interface module (DCIM) dongle acts as a virtual keyboard and mouse to the server to which it is connected.
Page 306
CommandCenter Secure Gateway management appliance. How do I connect a serially controlled (RS-232) device to the Dominion KX II, such as a Cisco router/switch or a headless Sun server? If there are only a few serially-controlled devices, they may be connected to a Dominion KX II using Raritan's new P2CIM-SER serial converter.
Can I access my servers directly from the rack? Yes. At the rack, the Dominion KX II functions just like a traditional KVM switch, allowing control of up to 64 servers using a single keyboard, monitor, and mouse. When I am using the local port, do I prevent other users from accessing servers remotely? No.
Page 308
Appendix D: FAQs If I use the local port to change the name of a connected server, does this change propagate to remote access clients as well? Does it propagate to the optional CommandCenter unit? Yes. The local port presentation is identical and completely in sync with remote access clients, as well as Raritan's optional CommandCenter Secure Gateway management device.
Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) What is the Extended Local port? The Dominion KX2-832 and KX2-864 feature an extended local port. The Dominion KX II eight user models have a Standard Local port, plus a new extended local port that extends the local port, via Cat5 cable, beyond the rack to a control room, another point in the data center or to a Paragon II switch.
All of the Dominion KX II models come equipped with dual AC inputs and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then the Dominion KX II will automatically switch to the other.
Yes. Analog KVM switches can be connected to one of the Dominion KX II's server ports. Simply use a PS/2 Computer Interface Module (CIM) and attach it to the user ports of the existing analog KVM switch. Please Note that analog KVM switches vary in their specifications and Raritan cannot guarantee the interoperability of any particular third-party analog KVM switch.
Computer Interface Modules (CIMs) Can I use Computer Interface Modules (CIMs) from Raritan's analog matrix KVM switch, Paragon, with the Dominion KX II? Yes. Certain Paragon computer interface modules (CIMs) may work with the Dominion KX II (check the Raritan Dominion KX II release notes on the website for the latest list of certified CIMs).
Appendix D: FAQs Security What kind of encryption does the Dominion KX II use? The Dominion KX II uses industry-standard (and extremely secure) RC4 or AES encryption, both in its SSL communications as well as its own data stream. Literally no data is transmitted between remote clients and the Dominion KX II that is not completely secured by encryption.
Appendix D: FAQs The encryption level that is autonegotiated is dependent on the browser in use. Manageability Can the Dominion KX II be remotely managed and configured via web browser? Yes, the Dominion KX II can be completely configured remotely via web browser.
Appendix D: FAQs Miscellaneous What is the Dominion KX II's default IP address? 192.168.0.192 What is the Dominion KX II's default user name and password? The Dominion KX II's default user name is admin and the default password is raritan [all lower case]. However, for the highest level of security, the Dominion KX II forces the administrator to change the Dominion KX II default administrative user name and password when the unit is first booted up.
Dell® Blade Chassis Configuration • 149 Desktop Background • 13 Device Diagnostics • 208 Device Information • 192 Device Management • 120 Device Services • 125, 150, 153 Devices Supported by the KX2-832 and KX2-864 Extended Local Port • 170, 245 Diagnostics • 203...
Page 317
Clients) • 265 Keyboard Macros • 58 Keyboard Options • 58 Keyboards • 264 KX2-832 and KX2-864 Extended Local Port Recommended Maximum Distances • 246 KX2-832 and KX2-864 Standard and Extended Local Port Settings • 169, 173 LAN Interface Settings • 31, 123 Launching the Dominion KX II Remote Console •...
Page 318
Logging Out • 50 Login Limitations • 178, 179 Macintosh Keyboard • 267 Maintenance • 191 Make Linux Settings Permanent • 20 Make UNIX Settings Permanent • 24 Manage Favorites Page • 45 Manage KVM Target Servers Associated with Outlets (Port Page) • 143 Manageability •...
Page 319
Index Setting Network Parameters • 216 Setting Parameters • 215 Setting Permissions • 98, 103, 104 Setting Permissions for an Individual Group • 104, 106 Setting Port Permissions • 101, 104 Setting the Registry to Permit Write Operations to the Schema • 255 Simultaneous Users •...
Page 320
VKC Virtual Media • 72 VM-CIMs and DL360 USB Ports • 269 What's New in the Help • 2 Windows 2000 Composite USB Device Behavior for Virtual Media • 272 Windows 2000® Settings • 14 Windows 3-Button Mouse on Linux Targets • Windows Vista®...
U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Beijing Monday - Friday...
Need help?
Do you have a question about the Dominion KX2-864 and is the answer not in the manual?
Questions and answers