Raritan Dominion KX II-101-V2 User Manual

Raritan Dominion KX II-101-V2 User Manual

Hide thumbs Also See for Dominion KX II-101-V2:
Table of Contents

Advertisement

Quick Links

Dominion KX II-101-V2
User Guide
Release 3.5.0
Copyright © 2012 Raritan, Inc.
KX2101V2-v3.5.0-D-E
September 2012
255-62-3059-00

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Dominion KX II-101-V2 and is the answer not in the manual?

Questions and answers

Summary of Contents for Raritan Dominion KX II-101-V2

  • Page 1 Dominion KX II-101-V2 User Guide Release 3.5.0 Copyright © 2012 Raritan, Inc. KX2101V2-v3.5.0-D-E September 2012 255-62-3059-00...
  • Page 2 Raritan, Inc. © Copyright 2012 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
  • Page 3: Table Of Contents

    Contents Chapter 1 Introduction KX II-101-V2 Overview ........................2 KX II-101-V2 Help .......................... 3 What's New in the Help ....................... 4 Related Documentation ....................... 4 Product Photos ..........................5 Product Features ........................... 5 Interfaces ..........................5 Network Configuration ......................5 System Management Features ...................
  • Page 4 Contents Video Properties ........................ 55 Mouse Options ........................60 VKC Virtual Media ......................64 Tool Options ........................64 View Options ........................68 Help Options ........................69 Chapter 4 Virtual Media Overview ............................72 Prerequisites for Using Virtual Media ................74 Virtual Media in a Windows XP Environment ..............
  • Page 5 Configuring SNMP Agents ....................113 Keyboard/Mouse Setup ......................115 Serial Port Settings ........................115 Admin Port ........................116 Raritan Power Strip Control ..................... 116 Modem ..........................116 Configuring Date/Time Settings ....................117 Event Management ........................118 Configuring Event Management - Settings ..............118 Configuring Event Management - Destinations ...............
  • Page 6 Contents Configuring IP Access Control ....................149 SSL Certificates ......................... 152 Security Banner ......................... 155 Chapter 9 Maintenance Audit Log ............................ 156 Device Information ........................157 Backup and Restore ........................158 Upgrading Firmware ........................160 Upgrade History ......................... 161 Factory Reset ..........................161 Rebooting the KX II-101-V2 .......................
  • Page 7 Contents Chapter 12 CC-SG Management Overview ............................ 181 Removing a KX II-101-V2 from CC-SG Management ............... 182 Using CC-SG in Proxy Mode ..................... 183 Appendix A Specifications Physical Specifications ......................184 Supported Operating Systems (Clients) ..................185 Supported Browsers ........................186 Connectors ..........................
  • Page 8 Contents Appendix E FAQs General FAQs ..........................207 IPv6 Networking ......................... 208 Index viii...
  • Page 9: Chapter 1 Introduction

    Chapter 1 Introduction In This Chapter KX II-101-V2 Overview ................2 KX II-101-V2 Help ..................3 Product Photos ..................5 Product Features ..................5 Terminology ....................7 Package Contents ..................8...
  • Page 10: Kx Ii-101-V2 Overview

    Chapter 1: Introduction KX II-101-V2 Overview Thank you for purchasing the Dominion KX II-101-V2. The KX II-101-V2 provides a single keyboard, video, and mouse (KVM) port for connection to a target server, and a single IP port for connection to an IP network.
  • Page 11: Kx Ii-101-V2 Help

    See the KX II-101-V2 release notes for important information on the current release before you begin using the KX II-101-V2. A PDF version of the help can be downloaded from the Raritan Firmware and Documentation page on the Raritan website. Raritan recommends that you refer to the Raritan website for the most up-to-date user guides available.
  • Page 12: What's New In The Help

    Related Documentation The KX II-101-V2 help is accompanied by the KX II-101-V2 Quick Setup Guide, which can be found on the Raritan Firmware and Documentation page of Raritan's website (http://www.raritan.com/support/firmware-and-documentation).
  • Page 13: Product Photos

    Integrated PS/2 KVM connection  USB connection for control and virtual media  Serial Admin port for initial device configuration and diagnostics, as well as use with an external modem access and Raritan power strip control  Local port for monitor connection ...
  • Page 14: System Management Features

    ® LDAP, Active Directory , RADIUS, or internal authentication and authorization  DHCP or fixed IP addressing  Integration with Raritan's CommandCenter Secure Gateway (CC- SG) management unit  ® ® Mobile access from iPad and iPhone to servers connected to a KX II-101-V2 being managed by CC-SG ...
  • Page 15: User Features

    Chapter 1: Introduction User Features  Web-based access through common browsers  Intuitive graphical user interface (GUI)  PC Share mode, which enables more than one remote user to connect to the target  TCP communication  English, Japanese, Traditional Chinese and Simplified Chinese user interface and help ...
  • Page 16: Package Contents

    Chapter 1: Introduction Term Description Virtual media Enables a KVM target server to remotely access media from client PC and network file servers. Package Contents Each KX II-101-V2 device ships with:  KX II-101-V2 - KVM over IP  KVM cable ...
  • Page 17: Chapter 2 Installation And Configuration

    Passwords are case sensitive and must be entered in the exact case combination in which they were created. For example, the default password raritan must be entered entirely in lowercase letters. The first time you start the KX II-101-V2, you are required to change the default password.
  • Page 18: Getting Started

    Chapter 2: Installation and Configuration Getting Started KX II-101-V2 users with Microsoft ® Internet Explorer ® version 6 or ® Windows 2000 must upgrade to Service Pack 4 (SP4) or higher. The KX II-101-V2 ships with a static default IP address. On a network without a DHCP server, you must configure a new static IP address, net mask, and gateway address using either the KX II-101-V2 serial admin console or the KX II-101-V2 Remote Console.
  • Page 19 Chapter 2: Installation and Configuration Resolutions 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz 1152x900 @76Hz 720x400 @84Hz 1280x720@60Hz 720x400 @85Hz 1280x960 @60Hz 800x600 @56Hz 1280x960 @85Hz 800x600 @60Hz 1280x1024 @60Hz 800x600 @70Hz...
  • Page 20 Chapter 2: Installation and Configuration To change the command line resolution: 1. Run the following command: # eeprom output- device=screen:r1024x768x75 where 1024x768x75 is any resolution that the KX II-101-V2 supports. 2. Restart the computer. GUI Resolution/32 Bit To check the GUI resolution on 32 bit cards: 1.
  • Page 21 Chapter 2: Installation and Configuration Mouse Settings The KX II-101-V2 operates in several mouse modes: Absolute Mouse ™ Synchronization , Intelligent Mouse mode and Standard Mouse mode. Note: Do not use an animated mouse while using Intelligent Mouse mode. Mouse parameters do not have to be altered for Absolute Mouse Synchronization.
  • Page 22 Chapter 2: Installation and Configuration d. Deselect the "Use the following transition effect for menus and tooltips" option. e. Click OK. 3. Close the Control Panel. Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KX II-101-V2.
  • Page 23 Chapter 2: Installation and Configuration d. Click Settings in the Performance group to open the Performance Options dialog. e. Under Custom options, deselect the following checkboxes:  Animation options:  Animate controls and elements inside windows  Animate windows when minimizing and maximizing ...
  • Page 24 Chapter 2: Installation and Configuration  Fade or slide menus into view  Fade or slide ToolTips into view  Fade out menu items after clicking 3. Click OK and Close the Control Panel. Windows 2000 Settings To configure KVM target servers running Microsoft ®...
  • Page 25 Chapter 2: Installation and Configuration Linux Settings (Red Hat 4 and 5, and Fedora 14) Note: The following settings are optimized for Standard Mouse mode only. ® To configure KVM target servers running Linux (graphical user interface): 1. Configure the mouse settings: a.
  • Page 26 Chapter 2: Installation and Configuration b. Using a text editor, disable all non-KX II-101-V2 supported resolutions. c. Disable the virtual desktop feature (not supported by the KX II- 101-V2). d. Check blanking times (+/- 40% of VESA standard). e. Restart computer. Note: If you change the video resolution, you must log off of the target server and log back in for the video settings to take effect.
  • Page 27 Chapter 2: Installation and Configuration c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. Close the Mouse Preferences dialog.
  • Page 28 Alternatively, contact your Raritan representative to purchase a video output adapter. Suns with composite sync output require APSSUN II Raritan guardian for use with the KX II-101-V2. HD15 Suns with separate sync output require an APKMSUN Raritan guardian for use with the KX II-101-V2.
  • Page 29: Step 2: Configure Network Firewall Settings

    Chapter 2: Installation and Configuration 2. Click on Mouse Settings and set the Mouse Acceleration to 1.0 and Threshold to 3.0. Step 2: Configure Network Firewall Settings To access the KX II-101-V2 through a network firewall, your firewall must allow communication on TCP Port 5000. Alternatively, the KX II-101-V2 can be configured to use a different TCP port of your own designation.
  • Page 30: Step 3: Connect The Equipment

    Chapter 2: Installation and Configuration Step 3: Connect the Equipment The KX II-101-V2 has the physical connections described in the diagram. Each letter in the diagram corresponds to a step in the equipment connection process described here. Diagram key Power Single power adapter.
  • Page 31 Chapter 2: Installation and Configuration Diagram key Admin port Use to do one of the following:  Configure and manage the device with a terminal emulation program on your  Configure and manage a power strip (requires an adapter, not included). ...
  • Page 32 Chapter 2: Installation and Configuration USB Configuration To configure the KX II-101-V2 for use with a USB target server: 1. Use the attached video cable to connect the KX II-101-V2 to the target video port. 2. Connect the USB connector of the KVM cable to the KX II-101-V2 and to a USB port on the target server.
  • Page 33 Chapter 2: Installation and Configuration Diagram key for USB Connection Video connection from the KX II-101-V2 to the target USB connection from the KX II-101-V2 to the target Optional monitor connection from KX II-101- V2 Local User Port to the monitor Optional USB connection from the target server to the mouse and keyboard (cable not included)
  • Page 34 Chapter 2: Installation and Configuration Note: If you are using virtual media, you must use the USB connection. Diagram key for PS/2 connections KX II-101-V2 Target server Local monitor Local mouse and keyboard (optional) Video connection from the KX II-101-V2 to the target KVM cable connection from the KX II-101-V2 to the target server...
  • Page 35: Step 4: Configure The Kx Ii-101-V2

    3. In the address field of the browser, enter the default IP address of the device: 192.168.0.192. 4. Press Enter. The login page opens. 5. Enter the user name admin and the password raritan. 6. Click Login. The Change Password page is displayed. 7. Type raritan in the Old Password field.
  • Page 36 Chapter 2: Installation and Configuration 9. Click Apply. You will receive confirmation that the password was successfully changed. 10. Click OK. The Port Access page opens. Assigning an IP Address These procedures describe how to assign an IP address on the Network Settings page.
  • Page 37 Chapter 2: Installation and Configuration c. Enter the Prefix Length. This is the number of bits used in the IPv6 address. d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present.
  • Page 38 Chapter 2: Installation and Configuration LAN Interface Settings (on page 110) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
  • Page 39 For additional information about CC-SG authentication, see the CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide, which can be downloaded from the Support section of the Raritan website (www.raritan.com). Supported Protocols To simplify management of usernames and passwords, the KX II-101-V2 provides the ability to forward authentication requests to an external authentication server.
  • Page 40 Chapter 2: Installation and Configuration Configure the KX II-101-V2 Using a Terminal Emulation Program (Optional) You can use the Admin serial console with a terminal emulation program like HyperTerminal to set the following configuration parameters for the KX II-101-V2:  IP address ...
  • Page 41 Chapter 2: Installation and Configuration 10. To configure new network settings, at the Network prompt, type interface followed by one of the following commands and its appropriate argument (option), then press Enter. Command Argument Options ipauto none|dhcp none - Enables you to manually specify an IP address for the device.
  • Page 42 Chapter 2: Installation and Configuration Command Argument Options  auto - Automatically sets speed and interface mode based on the network.  10hdx - 10 MB/s, half duplex.  10fdx - 10 MB/s, full duplex  100hdx - 100 MB/s, half duplex ...
  • Page 43: Chapter 3 Working With Target Servers

    Chapter 3 Working with Target Servers In This Chapter Interfaces ....................35 Virtual KVM Client (VKC) ................. 44 Interfaces KX II-101-V2 Remote Console Interface The KX II-101-V2 Remote Console is a browser-based graphical user interface that allows you to log into KVM target servers and serial targets connected to the KX II-101-V2 and to remotely administer the KX II-101- The KX II-101-V2 Remote Console provides a digital connection to your connected KVM target servers.
  • Page 44 Chapter 3: Working with Target Servers 3. Select the Enable Direct Port Access via URL checkbox. 4. Click Save. To define a direct port access URL:  Define a URL with the IP address, user name, password, and if necessary, port number of the KX II-101-V2. The format for a direct port access URL is: https://IP address/dpa.asp?username=username&password=password...
  • Page 45 Chapter 3: Working with Target Servers Information Description When displayed? State The current state of the Always application, either idle or active. If idle, the application tracks and displays the time the session has been idle. Your IP The IP address used to Always access the KX II-101-V2.
  • Page 46 Chapter 3: Working with Target Servers The left panel can be collapsed in order to increase the display area of the page. To collapse and the left panel:  Click on the blue, left-facing arrow located approximately halfway down the left side of the panel. Once the panel is collapsed, click the blue arrow again to expand it.
  • Page 47 Chapter 3: Working with Target Servers  Port Name - The name of the KX II-101-V2 port. Initially, this is set to Dominion_KX2_101_Port1 but you can change the name to something more descriptive. When you click a Port Name link, the Port Action Menu appears.
  • Page 48 Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: ...
  • Page 49  Choose Manage > Favorites List. The Favorites List page opens. Discovering Raritan Devices on the Local Subnet This option discovers the devices on your local subnet, which is the subnet where the KX II-101-V2 Remote Console is running. These devices can be accessed directly from this page or you can add them to your list of favorites.
  • Page 50 This feature allows multiple KX II-101-V2 devices to interoperate and scale automatically. The KX II-101-V2 Remote Console automatically discovers the KX II-101-V2 devices, and any other Raritan device, in the subnet of the KX II-101-V2. To discover devices on the device subnet: 1.
  • Page 51: Multi-Platform Client (Mpc)

    Raritan Multi-Platform Client (MPC) is a graphical user interface for the Raritan product lines, providing remote access to target servers connected to Raritan KVM over IP devices. For details on using MPC, see the KVM and Serial Access Clients Guide available on Raritan's website on the same page as the user guide.
  • Page 52: Virtual Kvm Client (Vkc)

    Chapter 3: Working with Target Servers Virtual KVM Client (VKC) Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help. Overview Whenever you access a target server using the Remote Console, a Virtual KVM Client (VKC) window opens.
  • Page 53 Chapter 3: Working with Target Servers Button Button name Description Note: Not available in KX II-101-V2. Target Click to take a screenshot of the target server Screenshot and save it to a file of your choosing. Audio Opens a dialog that allows you to select from a list of audio devices connected to a client PC.
  • Page 54: Power Controlling A Target Server

    Chapter 3: Working with Target Servers Button Button name Description Scaling Increases or reduces the target video size so you can view the entire contents of the target server window without using the scroll bar. Power Controlling a Target Server Note: These features are available only when you have made power associations.
  • Page 55: Connection Properties

    Chapter 3: Working with Target Servers Connection Properties The dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
  • Page 56 Chapter 3: Working with Target Servers  256 Kb (Cable)  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings are an optimization for specific conditions rather than an exact speed.
  • Page 57: Connection Information

    Chapter 3: Working with Target Servers Connection Information To obtain information about your Virtual KVM Client connection:  Choose Connection > Info... The Connection Info window opens. The following information is displayed about the current connection:  Device Name - The name of the device. ...
  • Page 58 Chapter 3: Working with Target Servers Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC). Macros exported from MPC or VKC cannot be imported into AKC. Note: KX II-101 does not support AKC. To import macros: 1.
  • Page 59 Chapter 3: Working with Target Servers  Click Yes to replace the existing macro with the imported version.  Click Yes to All to replace the currently selected and any other duplicate macros that are found.  Click No to keep the original macro and proceed to the next macro ...
  • Page 60 Chapter 3: Working with Target Servers 3. Click Ok. An "Export Keyboard Macros to" dialog is displayed. Locate and select the macro file. By default, the macro exists on your desktop. 4. Select the folder to save the macro file to, enter a name for the file and click Save.
  • Page 61 Chapter 3: Working with Target Servers Release F4 Release Left Alt 6. Review the Macro Sequence field to be sure the macro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step and then click the up or down arrow buttons to reorder them as needed.
  • Page 62 Chapter 3: Working with Target Servers Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu.
  • Page 63: Video Properties

    Chapter 3: Working with Target Servers Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways:  The Refresh Screen command forces a refresh of the video screen. ...
  • Page 64 Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor.
  • Page 65 Chapter 3: Working with Target Servers  Best possible video mode The device will perform the full Auto Sense process when switching targets or target resolutions. Selecting this option calibrates the video for the best image quality.  Quick sense video mode With this option, the device will use a quick video Auto Sense in order to show the target's video sooner.
  • Page 66 Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
  • Page 67 Chapter 3: Working with Target Servers Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot from Target server command. If needed, save this screenshot to a file location of your choosing as a bitmap, JPEG or PNG file.
  • Page 68: Mouse Options

    Chapter 3: Working with Target Servers Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and you are accessing the target through MPC or VKC, you may need to change the maximum refresh rate of the monitor in order for the refresh rate to take effect on the target.
  • Page 69 Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
  • Page 70 Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place.  Do not use an animated mouse.
  • Page 71 To be sure to avoid any problems with this function, Raritan recommends you do not have file icons or folder icons in the upper left corner of your desktop.
  • Page 72: Vkc Virtual Media

    Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed.
  • Page 73 Chapter 3: Working with Target Servers  Norwegian (Norway)  Portuguese (Portugal)  Danish (Denmark)  Swedish (Sweden)  German (Switzerland)  Hungarian (Hungary)  Spanish (Spain)  Italian (Italy)  Slovenian  Translation: French - US  Translation: French - US International In AKC, the keyboard type defaults to the local client, so this option does not apply.
  • Page 74 Turkish Keyboards If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
  • Page 75 Chapter 3: Working with Target Servers Client Launch Settings Configuring client launch settings allows you to define the screen settings for a KVM session. Note: LX devices support this feature in MPC. LX does not support client launch setting in VKC and AKC. To configure client launch settings: 1.
  • Page 76: View Options

    Chapter 3: Working with Target Servers Configure Scan Settings in VKC and AKC The KX II and LX provide a port scanning feature that searches for selected targets and displays them in a slide show view, allowing you to monitor up to 32 targets at one time. You can connect to targets or focus on a specific target as needed.
  • Page 77: Help Options

    Help Options About Raritan Virtual KVM Client This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support. To obtain version information: 1. Choose Help > About Raritan Virtual KVM Client.
  • Page 78 Chapter 3: Working with Target Servers 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file so it can be accessed later when dealing with support (if needed).
  • Page 79: Chapter 4 Virtual Media

    Chapter 4 Virtual Media In This Chapter Overview ....................72 Using Virtual Media ................. 78 Connecting to Virtual Media ..............80 Disconnecting Virtual Media ..............82...
  • Page 80: Overview

     PC hard drives  ISO images (disk images)  Digital audio devices* Note: ISO9660 is the standard supported by Raritan. However, other ISO standards can be used. The following client operating systems are supported:  Windows  Mac OS X 10.5, 10.6 and 10.7 ...
  • Page 81 Chapter 4: Virtual Media...
  • Page 82: Prerequisites For Using Virtual Media

    Chapter 4: Virtual Media Note: If you are using virtual media, you must use the USB connection. Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target.
  • Page 83: Virtual Media In A Windows Xp Environment

    Chapter 4: Virtual Media Virtual Media in a Windows XP Environment ® If you are running the Virtual KVM Client in a Windows XP environment, users must have Administrator privileges to access any virtual media type other than CD-ROM connections, ISOs and ISO images.
  • Page 84: Virtual Media In A Linux Environment

    Chapter 4: Virtual Media Virtual Media in a Linux Environment ® Following is important information for Linux users regarding using virtual media. Root User Permission Requirement Your virtual media connection can be closed if you mount a CD ROM from a Linux client to a target and then unmount the CD ROM. The connection also closes when a floppy drive has been mounted and then a floppy disk is removed.
  • Page 85 Chapter 4: Virtual Media guest_user@administrator-desktop:~$ getfacl -a /dev/sr0 getfacl: Removing leading '/' from absolute path names # file: dev/sr0 # owner: root # group: cdrom user::rw- user:guest_user:rw- group::rw- mask::rw- other::--- A similar check of the permissions for a removable device shows: guest_user@administrator-desktop:~$ ls -l /dev/sdb1 brw-rw---- 1 root disk 8, 17 12-03-2010 12:02 /dev/sdb1 guest_user@administrator-desktop:~$ ls -l /dev/sdb1...
  • Page 86: Virtual Media In A Mac Environment

    Chapter 4: Virtual Media Virtual Media in a Mac Environment ® Following is important information for Mac users regarding using virtual media. Active System Partitions  You cannot use virtual media to mount active system partitions for a Mac client. Drive Partitions ...
  • Page 87 Chapter 4: Virtual Media Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. 2. Open a KVM session with the appropriate target server. a. Open the Port Access page from the Remote Console.
  • Page 88: Connecting To Virtual Media

    Chapter 4: Virtual Media Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives.
  • Page 89: Mounting Cd-Rom/Dvd-Rom/Iso Images

    Chapter 4: Virtual Media Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1. From the Virtual KVM Client, choose Virtual Media > Connect CD- ROM/ISO Image.
  • Page 90: Disconnecting Virtual Media

    Chapter 4: Virtual Media ® Note: If you are working with files on a Linux target, use the Linux Sync command after the files are copied using virtual media in order to view the copied files. Files may not appear until a sync is performed. Note: If you are using the Windows 7 ®...
  • Page 91: Chapter 5 User Management

    Chapter 5 User Management In This Chapter User Groups .................... 83 Users ....................... 89 Authentication Settings ................93 Changing a Password ................105 User Groups Every KX II-101-V2 is delivered with three default user groups. These groups cannot be deleted: User Description Admin...
  • Page 92: User Group List

    Chapter 5: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group.
  • Page 93 Chapter 5: User Management 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the checkboxes next to the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 87).
  • Page 94 Chapter 5: User Management control. It is possible to be locked out of your KX II-101-V2 if your IP address is within a range that has been denied access. This feature limits access to the KX II-101-V2 device by users in the selected group to specific IP addresses.
  • Page 95 Chapter 5: User Management To replace a rule: 1. Specify the rule number you want to replace. 2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number.
  • Page 96: Modifying An Existing User Group

    Chapter 5: User Management Permission Description Note: The Admin user group has this permission by default. Device Settings Network settings, date/time settings, port configuration (channel names, power associations), event management (SNMP, Syslog), virtual media file server setup Diagnostics Network interface status, network statistics, ping host, trace route to host, KX II-101-V2 diagnostics Maintenance...
  • Page 97: Users

    Chapter 5: User Management 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 87). 3. Set the Port Permissions. Specify the server ports that can be accessed by users belonging to this group (and the type of access).
  • Page 98: View Users By Port

    Chapter 5: User Management View Users by Port The User By Ports page lists all authenticated local and remote users and ports they are being connected to. Only permanent connections to ports are listed. If the same user is logged on from more than one client, their username appears on the page for each connection they have made.
  • Page 99: Logging Users Off The Kx Ii-101-V2 (Force Logoff)

    Chapter 5: User Management Logging Users Off the KX II-101-V2 (Force Logoff) If you are an administrator, you are able to log off any authenticated user who is logged on to the KX II-101-V2. Users can also be disconnected at the port level.
  • Page 100: Modifying An Existing User

    Chapter 5: User Management Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management > User List. 2. Locate the user from among those listed on the User List page. 3. Click the user name. The User page opens. 4.
  • Page 101: Authentication Settings

    Chapter 5: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed.
  • Page 102: Implementing Ldap/Ldaps Remote Authentication

    Chapter 5: User Management Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn.
  • Page 103 LDAP database you want to begin searching for user information. Up to 64 characters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com. Consult your authentication server administrator for the appropriate values to enter into these fields.
  • Page 104 Chapter 5: User Management 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the Secret Phrase field and again in the Confirm Secret Phrase field (up to 128 characters).
  • Page 105 Chapter 5: User Management 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only used when the Enable Secure LDAP checkbox is selected. 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certificate file to validate the certificate provided by the server.
  • Page 106: Returning User Group Information From Active Directory Server

    KX II-101-V2 policies and user group privileges that are applied locally to AD user groups. IMPORTANT: If you are an existing Raritan, Inc. customer, and have already configured the Active Directory server by changing the AD schema, the KX II-101-V2 still supports this configuration and you do not need to perform the following operations.
  • Page 107: Implementing Radius Remote Authentication

    Chapter 5: User Management 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On your AD server, assign the KX II-101-V2 users to the groups created in step 2. 4.
  • Page 108 Chapter 5: User Management The timeout is the length of time the KX II-101-V2 waits for a response from the RADIUS server before sending another authentication request. 9. The default number of retries is 3 Retries. This is the number of times the KX II-101-V2 will send an authentication request to the RADIUS server.
  • Page 109: Returning User Group Information Via Radius

    Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
  • Page 110: Radius Communication Exchange Specifications

    Chapter 5: User Management RADIUS Communication Exchange Specifications The KX II-101-V2 sends the following RADIUS attributes to your RADIUS server: Attribute Data Log in Access-Request (1) NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-IP-Address (4) The IP address for the KX II-101-V2. User-Name (1) The user name entered at the login screen.
  • Page 111: User Authentication Process

    Chapter 5: User Management User Authentication Process When the device is configured to authenticate and authorize local users, the order in which the user credentials are validated follows the following process:...
  • Page 112 Chapter 5: User Management Remote authentication follows the process specified in the flowchart below:...
  • Page 113: Changing A Password

    Chapter 5: User Management Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
  • Page 114: Chapter 6 Device Management

    Chapter 6 Device Management In This Chapter Network Settings ................... 106 Device Services ..................111 Keyboard/Mouse Setup ................. 115 Serial Port Settings ................115 Configuring Date/Time Settings ............117 Event Management ................118 Port Configuration .................. 126 Analog KVM Switch ................133 Resetting the KX II-101-V2 Using the Reset Button ......
  • Page 115: Network Basic Settings

    Chapter 6: Device Management Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings (on page 106). To assign an IP address: 1.
  • Page 116 Chapter 6: Device Management e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present. Read-Only Zone ID. This identifies the device with which the address is associated.
  • Page 117 Chapter 6: Device Management LAN Interface Settings (on page 110) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
  • Page 118: Lan Interface Settings

    Chapter 6: Device Management LAN Interface Settings The current parameter settings are identified in the Current LAN interface parameters field.  Select the LAN Interface Speed & Duplex settings.  Autodetect (default option)  10 Mbps/Half - Yellow LED blinks ...
  • Page 119: Device Services

    Chapter 6: Device Management Device Services The Device Services page allows you to configure the following functions:  Enable SSH access  Enter the discovery port  Enable direct port access  Enable Telnet access  Configure HTTp and HTTPs settings ...
  • Page 120: Http And Https Port Settings

    Chapter 6: Device Management HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX II- 101-V2. For example, if you are using the default HTTP port 80 for another purpose, changing the port will ensure the device does not attempt to use it.
  • Page 121: Configuring Snmp Agents

    Chapter 6: Device Management 2. Select Enable Direct Port Access via URL if you would like users to have direct access to a target via the Dominion device by passing in the necessary parameters in the URL. 3. Click OK. Configuring SNMP Agents SNMP-compliant devices, called agents, store data about themselves in Management Information Bases (MIBs) and return this data to the SNMP...
  • Page 122 Chapter 6: Device Management c. Authentication Protocol - the MD5 or SHA authentication protocol used by the SNMP v3 agent d. Authentication Passphrase - the passphrase required to access the SNMP v3 agent (up to 64 characters) e. Privacy Protocol - if applicable, the AES or DES algorithm used to encrypt PDU and context data Privacy Passphrase - the passphrase used to access the privacy protocol algorithm (up to 64 characters)
  • Page 123: Keyboard/Mouse Setup

    PS/2 - Forces the KX II-101-V2 to use the PS/2 connection to send Keyboard and Mouse data to the host device. Note: If you are using a Raritan switch on the front-end with a KX II- 101-V2, you must set the Host Interface to PS/2 in order for the configuration to work properly.
  • Page 124: Admin Port

    1. Choose Device Settings > Serial Port. The Serial Port Settings page opens. 2. Select the PowerStrip Control radio button. Choose this option when connecting the KX II-101-V2 to a Raritan power strip. 3. Click OK. Modem To configure the modem serial port: 1.
  • Page 125: Configuring Date/Time Settings

    Chapter 6: Device Management  Modem server IP address - The address the user types to access the KX II-101-V2 web interface once connected via modem.  Modem client IP address - The address assigned to the user once connected via modem. 4.
  • Page 126: Event Management

    Chapter 6: Device Management  User Specified Time - Choose this option to input the date and time manually. For the User Specified Time option, enter the date and time. For the time, use the hh:mm format (using a 24- hour clock).
  • Page 127 Chapter 6: Device Management 2. Select SNMP Logging Enabled to enable to remaining checkboxes. Required 3. Select either or both SNMP v1/v2c Traps Enabled and SNMP Trap v3 Enabled. At least one option must be selected. Once selected, all related fields are enabled. Required 4.
  • Page 128 Chapter 6: Device Management Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Management - Settings page. The events that are captured once an SNMP trap is configured are selected on the Event Management - Destination page. See Configuring Event Management - Destinations.
  • Page 129 Chapter 6: Device Management Note: If you disable SNMP settings at any time, the SNMP information is retained so you do not have to reenter if you re-enable the settings. To delete SNMP traps:  Clear all of the SNMP trap fields and save. Use the reset to factory defaults feature to remove the SNMP configuration and set the KX II-101-V2 to its original factory default.
  • Page 130 Chapter 6: Device Management Trap Name Description deviceUpgradeStarted The KX II-101-V2 has begun update via an RFP file. factoryReset The device has been reset to factory defaults. firmwareFileDiscarded Firmware file was discarded. firmwareUpdateFailed Firmware update failed. firmwareValidationFailed Firmware validation failed. groupAdded A group has been added to the KX II-101-V2 system.
  • Page 131 Chapter 6: Device Management Trap Name Description securityBannerChanged A change has been made to the security banner. securityViolation Security violation. setDateTime The date and time for the device has been set. setFIPSMode FIPS mode has been enabled. startCCManagement The device has been put under CommandCenter Management.
  • Page 132 Chapter 6: Device Management Viewing the KX II-101-V2 MIB To view the KX II-101-V2 MIB: 1. Choose Device Settings > Event Management - Settings. The Event Management - Settings page opens. 2. Click the 'Click here to view the Dominion KX2 SNMP MIB' link. The MIB file opens in a browser window.
  • Page 133: Configuring Event Management - Destinations

    Chapter 6: Device Management Note: IPv6 addresses cannot exceed 80 characters in length for the host name. Use the reset to factory defaults feature to remove the syslog configuration and set the KX II-101-V2 to its original factory default. To reset to factory defaults: 1.
  • Page 134: Port Configuration

    See Power Control (on page 128). Note: The Power Port 1 link is enabled only when a Raritan power strip is connected to the KX II-101-V2 and configured. Otherwise, the link is disabled.
  • Page 135: Managing Kvm Target Servers (Port Page)

    2. Click the Port Name for the port you want to edit. Note: The Power Port 1 link is enabled only when a Raritan power strip is connected to the KX II-101-V2 and configured. Otherwise, the link is disabled.
  • Page 136: Power Control

    Colon Power Control The KX II-101-V2 provides remote power control of a target server. To utilize this feature, you must have a Raritan remote power strip. To use the KX II-101-V2 power control feature:  Connect the power strip to your target server using the DKX2-101- V2-PDU connector (not included but available from your reseller or Raritan).
  • Page 137 DKX2-101-V2-PDU (DB9-RJ45 adapter) connector (not included) from the KX II-101-V2 to a Raritan the power strip. To connect the KX II-101-V2 to a Raritan power strip: 1. Connect the DKX2-101-V2-PDU (DB9-RJ45 adapter) cable to the Admin port of the KX II-101-V2.
  • Page 138 Power menu is available on the Remote Console. Naming the Power Strip (Port Page for Power Strips) Once the KX II-101-V2 is connected to a Raritan remote power strip, the port is displayed on the Port page and you can open that port from the Port Configuration page.
  • Page 139 Chapter 6: Device Management To cancel without saving changes:  Click Cancel. Managing Power Associations To make power associations (associate power strip outlets with the KVM target server): Note: When a power strip is associated with the target server (port), the outlet name is replaced by the port name.
  • Page 140 Chapter 6: Device Management 2. For that power strip, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down list, select None. 4. Click OK. That power strip/outlet association is removed. A confirmation message appears. To show the power port configuration: ...
  • Page 141: Analog Kvm Switch

    Chapter 6: Device Management Analog KVM Switch You can configure a Raritan analog KVM switch to work with the KX II- 101-V2. The KX II-101-V2's compatibility has been verified with the following Raritan KVM switches:  SwitchMan SW2, SW4 and SW8 ...
  • Page 142: Resetting The Kx Ii-101-V2 Using The Reset Button

    Chapter 6: Device Management 8. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults:  Click Reset to Defaults. Resetting the KX II-101-V2 Using the Reset Button On the top of the device, there is a Reset button. It is recessed to prevent accidental resets (you will need a pointed object to press this button).
  • Page 143: Changing The Default Gui Language Setting

    Chapter 6: Device Management Note: If the KX II-101-V2 is set to restore to the factory defaults upon reset, the IP address, user name, and other options will be set accordingly. Changing the Default GUI Language Setting The KX II-101-V2 GUI supports the following localized languages: ...
  • Page 144: Chapter 7 Managing Usb Connections

    Chapter 7 Managing USB Connections In This Chapter Overview ....................137 USB Connection Settings ..............137 Advanced USB Connection Settings ............. 138...
  • Page 145: Overview

    USB Connection Setting may be more appropriate. Should none of the USB Connection settings provided by Raritan work with a given KVM target, please contact Raritan Technical Support for assistance.
  • Page 146: Advanced Usb Connection Settings

    Advanced USB Connection Settings section, to cause configuration problems between the KX II-101-V2 and the target server. Therefore, Raritan strongly recommends that you refer to the Known USB Profiles or to the User Defined KX II-101-V2 USB Profiles Connection Configuration Table, which can be accessed by clicking its corresponding link on the Advanced USB Connection Settings section of the Port page .
  • Page 147 Chapter 7: Managing USB Connections 3. Click the User Defined KX II-101 USB Profile Configuration Table link to access the recommended configurations to apply to the Advanced USB Connection Settings section. 4. Configure the following as needed: a. Virtual Media Interface #1 Type b.
  • Page 148: Chapter 8 Security Management

    Chapter 8 Security Management In This Chapter Security Settings ..................140 Configuring IP Access Control .............. 149 SSL Certificates ..................152 Security Banner ..................155 Security Settings From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. To configure the security settings: 1.
  • Page 149 Chapter 8: Security Management Limitation Description This field is enabled and required when the Enable Password Aging checkbox is selected. Enter the number of days after which a password change is required. The default is 60 days. Log out idle users, Select the "Log off idle users"...
  • Page 150: Strong Passwords

    Chapter 8: Security Management Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KX II-101-V2 local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
  • Page 151: User Blocking

    Chapter 8: Security Management User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
  • Page 152 Chapter 8: Security Management Option Description Users are denied access to the system for the Timer Lockout specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will be locked out.
  • Page 153: Encryption & Share

    Chapter 8: Security Management Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX II-101-V2 Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX II-101-V2 from your browser.
  • Page 154 Chapter 8: Security Management Encryption mode Description for more information. AES-256 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. 256 is the key length. When AES-256 is specified, be certain that your browser supports it, otherwise you will not be able to connect.
  • Page 155 Reset (default) defaults. Enable Local Admin Resets the local administrator password only. Password Reset The password is reset to raritan. Disable All Local No reset action is taken. Resets Checking Your Browser for AES Encryption The KX II-101-V2 supports AES-256. If you do not know if your browser uses AES, check with the browser manufacturer or navigate to the https://www.fortify.net/sslcheck.html website using the browser with the...
  • Page 156: Enabling Fips 140-2

    Chapter 8: Security Management Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desirable. The KX II-101-V2 uses an embedded ® FIPS 140-2-validated cryptographic module running on a Linux platform per FIPS 140-2 Implementation Guidance section G.5 guidelines. Once this mode is enabled, the private key used to generate the SSL certificates must be internally generated;...
  • Page 157: Configuring Ip Access Control

    Chapter 8: Security Management  Set the Encryption & Share to Auto on the Security Settings page. See Encryption & Share. Microsoft Client  FIPS 140-2 should be enabled on the client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1.
  • Page 158 Chapter 8: Security Management  Drop - IP addresses are denied access to the KX II-101-V2 device. To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/Mask or IPv6/Prefix Length field. Note: The IP address should be entered using CIDR (Classless Inter-Domain Routing notation, CIDR notation consists of two parts.
  • Page 159 Chapter 8: Security Management 3. You are prompted to confirm the deletion. Click OK. To allow access to only one IP address and block all others, change the subnet mask for the rule to /32. For example, if you are trying to exclude all access from the '192.168.51' subnet and the Default Policy is Accept, you would Append a Rule with IP/MASK set to 192.168.51.00/24 and a policy DROP.
  • Page 160: Ssl Certificates

    Chapter 8: Security Management SSL Certificates The KX II-101-V2 uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the KX II-101-V2 has to identify itself to a client using a cryptographic certificate.
  • Page 161 Chapter 8: Security Management Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g. DE for Germany, or US for the U.S. g. Challenge Password - Some certification authorities require a challenge password to authorize later changes on the certificate (e.g.
  • Page 162 Chapter 8: Security Management Reboot the KX II-101-V2 to send the saved CSR to a CA for SSL certificate. To download a CSR certificate: 1. The CSR and the file containing the private key used when generating it can be downloaded by clicking Download. Note: The CSR and the private key file are a matched set and should be treated accordingly.
  • Page 163: Security Banner

    Chapter 8: Security Management Security Banner KX II-101-V2 provides you with the ability to add a security banner to the KX II-101-V2 login process. This feature requires users to either accept or decline a security agreement before they can access the KX II-101- V2.
  • Page 164: Chapter 9 Maintenance

    Chapter 9 Maintenance In This Chapter Audit Log....................156 Device Information ................. 157 Backup and Restore ................158 Upgrading Firmware ................160 Upgrade History ..................161 Factory Reset ..................161 Rebooting the KX II-101-V2..............162 Stopping CC-SG Management .............. 163 Audit Log A log is created of the KX II-101-V2 system events.
  • Page 165: Device Information

    Device Information The Device Information page provides detailed information about your KX II-101-V2 device. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX II-101-V2:  Choose Maintenance > Device Information. The Device Information page opens.
  • Page 166: Backup And Restore

    Chapter 9: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II-101-V2. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KX II-101-V2 by backing up the user configuration settings from the KX II-101-V2 in use and restoring those configurations to the new KX II-101-V2.
  • Page 167 Chapter 9: Maintenance 2. To do this: a. Save the backup file. The backup file is saved locally on your client machine with the name and location specified. b. Once saved, locate the file and right-click on it. Select properties. c.
  • Page 168: Upgrading Firmware

    To upgrade your KX II-101-V2 device: 1. Choose Maintenance > Firmware Upgrade. The Firmware Upgrade page opens. 2. Click the Show Latest Firmware link, locate the appropriate Raritan firmware distribution file (*.RFP) from the Firmware Upgrades > KX II-101-V2 page, and download the file.
  • Page 169: Upgrade History

    Chapter 9: Maintenance 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the device reboots. 6. As prompted, close the browser and wait approximately 5 minutes before logging into the KX II-101-V2 again.
  • Page 170: Rebooting The Kx Ii-101-V2

    Chapter 9: Maintenance  Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defaults. Note that any management associations with CommandCenter will be broken. Because of the complete nature of this reset, you will be prompted to confirm the factory reset.
  • Page 171: Stopping Cc-Sg Management

    Chapter 9: Maintenance 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. Stopping CC-SG Management While the KX II-101-V2 is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC- SG management.
  • Page 172 Chapter 9: Maintenance 2. Click Yes to begin the processing of removing the device from CC- SG management. A confirmation message will then displayed asking you to confirm that you want the remove the device from CC-SG management. 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
  • Page 173: Chapter 10 Diagnostics

    The Diagnostics menu options help you debug and configure the network settings. The Device Diagnostics option is intended for use in conjunction with Raritan Technical Support. In This Chapter Network Interface Page ................. 165 Network Statistics Page ................. 165 Ping Host Page ..................
  • Page 174 Chapter 10: Diagnostics  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one displayed here.
  • Page 175 Chapter 10: Diagnostics  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.
  • Page 176: Ping Host Page

    Chapter 10: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another KX II-101-V2 is accessible.
  • Page 177 Chapter 10: Diagnostics 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The output of trace route is displayed in the Result field.
  • Page 178: Device Diagnostics

    Chapter 10: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. The Device Diagnostics page downloads diagnostics information from the KX II-101-V2 to the client machine. A device diagnostics log can be generated with or without running an optional diagnostic script provided by Raritan Technical Support.
  • Page 179 Chapter 10: Diagnostics a. Click Save to File. The File Download dialog appears. b. Click Save. The Save As dialog appears. c. Navigate to the desired directory and click Save. 4. Email this file as directed by Raritan Technical Support.
  • Page 180: Chapter 11 Command Line Interface (Cli)

    Chapter 11 Command Line Interface (CLI) In This Chapter Overview ....................172 Accessing the KX II-101-V2 Using the CLI ..........173 SSH Connection to the KX II-101-V2 ............ 173 Logging in ....................174 Navigation of the CLI ................174 CLI Commands ..................176 Overview This chapter provides an overview of the CLI commands that can be used with the KX II-101-V2.
  • Page 181: Accessing The Kx Ii-101-V2 Using The Cli

    Chapter 11: Command Line Interface (CLI) Accessing the KX II-101-V2 Using the CLI Access the KX II-101-V2 using one of the following methods:  TELNET via IP connection  SSH (Secure Shell) via IP connection  Multi-function admin serial port via RS-232 serial interface with provided cable and a terminal emulation program like HyperTerminal Several SSH/TELNET clients are available and can be obtained from the following locations:...
  • Page 182: Ssh Access From A Unix/Linux Workstation

    The Password prompt appears. Logging in To log in: 1. Login: admin 2. The password prompt appears. Enter the default password: raritan. The welcome message appears. You are now logged in as an Administrator. After reviewing the following Navigation of the CLI...
  • Page 183: Completion Of Commands

    Chapter 11: Command Line Interface (CLI) Completion of Commands The CLI supports the completion of partially-entered commands. After entering the first few characters of an entry, press the Tab key. If the characters form a unique match, the CLI will complete the entry. ...
  • Page 184: Cli Commands

    Chapter 11: Command Line Interface (CLI) Command Description help Display an overview of the CLI syntax. quit Places the user back one level. logout Logs out the user session. CLI Commands The table below lists and describes all available CLI commands. Command Description config...
  • Page 185: Diagnostics

    [module <module>] [level <level>] [vflag <vflag>] [verbose <on|off>] Set/Get diag log level The Setlog command options are described in the following table. Raritan Technical Support will tell you how to configure these settings. Command Option Description module The module name.
  • Page 186: Configuration

    Chapter 11: Command Line Interface (CLI) Command Option Description verbose [on|off] Turns verbose logging on and off. Setlog Command Example The following Setlog command sets the logging level to debug with verbose logging on for the libpp_serial module. Setlog module libpp_serial level debug verbose on Configuration The Configuration menu enables you to access the network commands used to configure the network interface and set the device name.
  • Page 187 Chapter 11: Command Line Interface (CLI) Command Option Description ipauto Static or dynamic IP address ip ipaddress IP address of the KX II-101-V2 assigned for access from the IP network mask subnetmask Subnet mask obtained from the IP administrator gw ipaddress Gateway IP address obtained from the IP administrator mode <auto | 100fdx>...
  • Page 188: Listports Command

    Chapter 11: Command Line Interface (CLI) Listports Command The Listports command lists the number of active users, user names, port, and status. Listports Command Example Admin Port > listports Port Port Port Port Port Name Type Status Availability - Dominion_KXII-101_V2_Port KVM idle Userlist Command The Userlist command lists the port, port name, port type, port status,...
  • Page 189: Chapter 12 Cc-Sg Management

    Chapter 12 CC-SG Management In This Chapter Overview ....................181 Removing a KX II-101-V2 from CC-SG Management ......182 Using CC-SG in Proxy Mode ..............183 Overview CC-SG can managed KX II-101-V2. Once under CC-SG management, mobile access to the KX II-101-V2 is supported from an iPad ®...
  • Page 190: Removing A Kx Ii-101-V2 From Cc-Sg Management

    Chapter 12: CC-SG Management Removing a KX II-101-V2 from CC-SG Management Unless the KX II-101-V2 is released from CC-SG control, you cannot access the device directly. However, if the KX II-101-V2 does not receive heartbeat messages from CommandCenter (for example, CommandCenter is not on the network), you can release the KX II-101- V2 from CC-SG control in order to access the device.
  • Page 191: Using Cc-Sg In Proxy Mode

    When the Virtual KVM Client is launched from CommandCenter Secure Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”. Proxy Mode and MPC...
  • Page 192: Appendix A Specifications

    Operating temperature 0° - 40°C (32° - 104°F) Humidity 20% - 85% RH Indicators: Boot-up and power indicator Blue RARITAN back-lit Network activity and connection speed logo indicator Yellow and Green LED Local Connection: 1 - Mini USB port for USB keyboard / mouse...
  • Page 193: Supported Operating Systems (Clients)

    Appendix A: Specifications KX II-101-V2... Description Remote Connection: 1 Ethernet (RJ45) port with activity status Network indicator TCP/IP, TELNET, SSH, HTTP, Protocols HTTPS, secure LDAP, RADIUS, LDAP, SNMP v2 and v3, DHCP and SNTP, dual- stack: IPv4 and IPv6 Warranty Two years with advanced replacement* Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client...
  • Page 194: Supported Browsers

    Appendix A: Specifications Mode Operating system Browser  32-bit mode Firefox ® 1.06 - 4 or later  ® Internet Explorer 6.0 Windows Server 2003 SP1++, IE 7, IE 8  Firefox 1.06 - 3  ® Windows Vista Internet Explorer 7.0 or ...
  • Page 195: Certified Modems

    Appendix A: Specifications Certified Modems  ® USRobotics 56K 5686E  ® ZOOM  ZOOM v92  USRobotics Sportster ®  ™ USRobotics Courier Supported Video Resolutions Ensure that each target server's video resolution and refresh rate are supported by the KX II-101-V2 and that the signal is noninterlaced. Video resolution and cable length are important factors in the ability to obtain mouse synchronization.
  • Page 196: Supported Keyboard Languages

    Appendix A: Specifications Resolutions 800x600 @75Hz 1360x768@60Hz 800x600 @85Hz 1366x768@60Hz 800x600 @90Hz 1368x768@60Hz 800x600 @100Hz 1400x1050@60Hz 832x624 @75.1Hz 1440x900@60Hz 1024x768 @60Hz 1600x1200 @60Hz 1024x768@70 1680x1050@60Hz 1024x768@72 1920x1080@60Hz Note: Composite Sync and Sync-on-Green video require an additional adapter. Note: Some resolutions may not be available by default. If you do not see a resolution, plug in the monitor first, remove the monitor and then plug in the CIM.
  • Page 197: Tcp And Udp Ports Used

    Appendix A: Specifications Language Regions Keyboard layout Korean South Korea Dubeolsik Hangul Japanese Japan JIS Keyboard French France French (AZERTY) layout keyboard. German Germany and Austria German keyboard (QWERTZ layout) French Belgium Belgian Norwegian Norway Norwegian Danish Denmark Danish Swedish Sweden Swedish Hungarian...
  • Page 198 KVM and virtual media data streams to the client. KX II-101-V2 This port is used to discover other Dominion devices and for (Raritan KVM-over- communication between Raritan devices and systems, including CC- IP) Protocol, SG for devices that CC-SG management is available. By default, this is Configurable Port...
  • Page 199: Network Speed Settings

    Appendix A: Specifications Network Speed Settings KX II-101-V2 network speed setting Network Auto 100/Full 100/Half 10/Full 10/Half switch port Highest KX II-101- 100/Half KX II-101- 10/Half setting Auto Available V2: 100/Full V2: 10/Full Speed Switch: Switch: 100/Half 10/Half KX II-101- 100/Full KX II-101- 100/Full...
  • Page 200: Pin Pinout

    Appendix A: Specifications communication,” however, note that the KX II-101-V2 behavior deviates from expected behavior Note: For reliable network communication, configure the KX II-101-V2 and the LAN switch to the same LAN Interface Speed and Duplex. For example, configure both the KX II-101-V2 and LAN Switch to Autodetect (recommended) or set both to a fixed speed/duplex such as 100MB/s/Full.
  • Page 201: Appendix B Updating The Ldap Schema

    Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ............193 Setting the Registry to Permit Write Operations to the Schema ... 194 Creating a New Attribute ...............
  • Page 202: Setting The Registry To Permit Write Operations To The Schema

    Appendix B: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: ®...
  • Page 203: Adding Attributes To The Class

    Appendix B: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
  • Page 204 Appendix B: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
  • Page 205: Updating The Schema Cache

    Appendix B: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: ®...
  • Page 206 Appendix B: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
  • Page 207 Appendix B: Updating the LDAP Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
  • Page 208 Appendix B: Updating the LDAP Schema 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the KX II-101-V2) in the Edit Attribute field.
  • Page 209: Appendix C Rack Mount

    Appendix C Rack Mount The KX II-101-V2 device can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brackets and screws included with the KX II-101-V2 kit. In This Chapter Attach the L Bracket to the KX II-101-V2 for a Horizontal Mount ..
  • Page 210 Appendix C: Rack Mount Diagram key Screws...
  • Page 211: Appendix D Informational Notes

    Remote Console checks the Java version. If the version is incorrect or outdated, you will be prompted to download a compatible version. Raritan recommends using JRE version 1.7 for optimum performance, but the Remote Console and MPC function with JRE version 1.6.x and later with the exception of 1.6.2.
  • Page 212: Ipv6 Support Notes

    Appendix D: Informational Notes IPv6 Support Notes Operating System IPv6 Support Notes Java ™ Java 1.6 supports IPv6 for the following:  ™ Solaris 10 (and later)  Linux ® kernel 2.1.2 (and later)/RedHat 6.1 (and later) The following IPv6 configurations are not supported by Java: ...
  • Page 213: Sun Blade Video, Keyboard, And Mouse Support Limitation

    Appendix D: Informational Notes Sun Blade Video, Keyboard, and Mouse Support Limitation Video ™ If you are accessing a Sun Blade 100 with the KX II-101-V2, video on the local port or a remote connection may not function properly when the Sun Blade is booting up.
  • Page 214: Hp Ux Rx 1600 Keyboard And Mouse Configuration

    Appendix D: Informational Notes HP UX RX 1600 Keyboard and Mouse Configuration ® ® If you are using an HP UX RX 1600 running UNIX , do the following to connect the device to the target:  Verify you are using KX II-101-V2 firmware 2.0.20.5.6964 or higher. ...
  • Page 215: Appendix E Faqs

    General FAQs Question Answer What is the difference The Dominion KX II-101-V2 is the latest generation, economically priced between the Dominion KX II- model The V2 supports virtually all the features of the previous 101-V2 and the previous generation KX II-101, plus many exciting additional features. The V2...
  • Page 216: Ipv6 Networking

    Appendix E: FAQs Question Answer What new features are With Release 3.5 (and above), the following features are now available: available in the latest release?  1920x1080 Video Resolution  iPad/iPhone Access (requires CC-SG)  Dual Stack IPv6  FIPS 140-2 Encryption Module ...
  • Page 217 Appendix E: FAQs Question Answer What if I have an external The KX II-101-V2 can access external servers via their IPv6 addresses, server with an IPv6 address for example, an SNMP manager, syslog server or LDAP server. that I want to use with my KX Using the KX II-101-V2’s dual-stack architecture, these external servers II-101-V2? can be accessed via: (1) an IPv4 address, (2) IPv6 address or (3)
  • Page 219: Index

    Index CLI Commands • 172, 176 CLI Prompts • 174 CLI Syntax -Tips and Shortcuts • 175 9 Pin Pinout • 192 Client Launch Settings • 67 Command Line Interface (CLI) • 116, 172 Common Commands for All Command Line Interface Levels •...
  • Page 220 Informational Notes • 203 Disconnecting Virtual Media • 79, 82 Installation and Configuration • 9, 178 Intelligent Mouse Mode • 63 Discovering Raritan Devices on the KX II-101- V2 Subnet • 42 Interface Command • 178 Interfaces • 5, 35 Discovering Raritan Devices on the Local Subnet •...
  • Page 221 RADIUS Communication Exchange Modifying an Existing User Group • 88 Specifications • 102 Modifying and Removing Keyboard Macros • Raritan Power Strip Control • 116 Rebooting the KX II-101-V2 • 162 Mounting • 7 Refreshing the Screen • 55 Mounting CD-ROM/DVD-ROM/ISO Images •...
  • Page 222 Index Virtual Media in a Mac Environment • 78 Sun Blade Video, Keyboard, and Mouse Support Limitation • 205 Virtual Media in a Windows XP Environment • Sun Solaris Settings • 19 Sun Video Resolution • 11 VKC Virtual Media • 64 Supported Browsers •...
  • Page 223: United Kingdom

    For CommandCenter Secure Gateway: Press 6, then Press 2 Phone: +31-10-2844040 Fax: 732-764-8887 Email: tech.europe@raritan.com Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m. GMT China Phone +44(0)20-7090-1390...

Table of Contents