Raritan Dominion KX II-101-V2 User Manual

Raritan Dominion KX II-101-V2 User Manual

Raritan dominion kx ii-101-v2 kvm switche user guide
Hide thumbs Also See for Dominion KX II-101-V2:
Table of Contents

Advertisement

Quick Links

Dominion KX II-101-V2
User Guide
Release 3.6.0
Copyright © 2014 Raritan, Inc.
KX2101V2-v3.6.0-D-E
May 2014
255-62-3059-00

Advertisement

Table of Contents
loading

Summary of Contents for Raritan Dominion KX II-101-V2

  • Page 1 Dominion KX II-101-V2 User Guide Release 3.6.0 Copyright © 2014 Raritan, Inc. KX2101V2-v3.6.0-D-E May 2014 255-62-3059-00...
  • Page 2 Raritan, Inc. © Copyright 2014 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
  • Page 3: Table Of Contents

    Contents Chapter 1 Introduction KX II-101-V2 Overview ........................2 Package Contents .......................... 3 KX II-101-V2 Help .......................... 4 Product Photos ..........................4 Product Features ........................... 5 Interfaces ..........................5 Network Configuration ......................5 System Management Features ................... 5 Administration Features ....................... 6 User Features ........................
  • Page 4 Contents Toolbar Buttons and Status Bar Icons ................39 Power Controlling a Target Server ..................41 Disconnecting KVM Target Servers .................. 42 Connection Properties ....................... 42 Connection Information ..................... 44 Keyboard Options ......................44 Video Properties ........................ 49 Mouse Options ........................53 VKC Virtual Media ......................
  • Page 5 Configuring SNMP Agents ....................102 Keyboard/Mouse Setup ......................105 Serial Port Settings ........................105 Admin Port ........................106 Raritan Power Strip Control ..................... 106 Modem ..........................106 Configuring Date/Time Settings ....................107 Event Management ........................108 Configuring Event Management - Settings ..............108 Configuring Event Management - Destinations ...............
  • Page 6 Contents Analog KVM Switch ........................123 Resetting the KX II-101-V2 Using the Reset Button ..............124 Changing the Default GUI Language Setting ................125 Chapter 7 Managing USB Connections Overview ............................ 127 USB Connection Settings ......................127 Advanced USB Connection Settings ..................128 Chapter 8 Security Management Security Settings ........................
  • Page 7 Contents Logging in ..........................164 Navigation of the CLI ......................... 164 CLI Prompts ........................164 Completion of Commands ....................165 CLI Syntax -Tips and Shortcuts ..................165 Common Commands for All Command Line Interface Levels ........165 CLI Commands .......................... 166 Diagnostics ........................
  • Page 8 Contents Setting the Registry to Permit Write Operations to the Schema ..........185 Creating a New Attribute ......................185 Adding Attributes to the Class ....................186 Updating the Schema Cache ..................... 188 Editing rciusergroup Attributes for User Members ..............188 Appendix C Rack Mount Attach the L Bracket to the KX II-101-V2 for a Horizontal Mount ..........
  • Page 9: Chapter 1 Introduction

    Chapter 1 Introduction In This Chapter KX II-101-V2 Overview ................2 Package Contents ..................3 KX II-101-V2 Help ..................4 Product Photos ..................4 Product Features ..................5...
  • Page 10: Kx Ii-101-V2 Overview

    Chapter 1: Introduction KX II-101-V2 Overview Thank you for purchasing the Dominion KX II-101-V2. The KX II-101-V2 provides a single keyboard, video, and mouse (KVM) port for connection to a target server, and a single IP port for connection to an IP network.
  • Page 11: Package Contents

    Chapter 1: Introduction Diagram key KX II-101-V2 ™ ® ® Windows , Linux and Sun servers TCP/IP Remote (network) access Mobile access via iPhone ® and iPad ® using CC-SG Package Contents Each KX II-101-V2 device ships with:  1 - KX II-101-V2 KVM over IP ...
  • Page 12: Kx Ii-101-V2 Help

    KVM Client help is provided as part of KX II-101-V2 online help. Online help is accompanied by the KX II-101-V2 Quick Setup Guide, which is included with your KX II-101-V2 and can be found on the Raritan Support page of Raritan's website (http://www.raritan.com/support/firmware-and-documentation).
  • Page 13: Product Features

    Integrated PS/2 KVM connection  USB connection for control and virtual media  Serial Admin port for initial device configuration and diagnostics, as well as use with an external modem access and Raritan power strip control  Local port for monitor connection ...
  • Page 14: Administration Features

    ® LDAP, Active Directory , RADIUS, or internal authentication and authorization  DHCP or fixed IP addressing  Integration with Raritan's CommandCenter Secure Gateway (CC- SG) management unit  ® ® Mobile access from iPad and iPhone to servers connected to a KX II-101-V2 being managed by CC-SG ...
  • Page 15: Mounting

    Chapter 1: Introduction Mounting  Rack mounting bracket...
  • Page 16: Chapter 2 Installation And Configuration

    Default Login Information Default Value User name admin This user has administrative privileges. raritan Password The first time you start the KX II-101-V2, you are required to change the default password. IP address 192.168.0.192. Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location.
  • Page 17: Getting Started

    Chapter 2: Installation and Configuration Getting Started KX II-101-V2 users with Microsoft ® Internet Explorer ® version 6 or ® Windows 2000 must upgrade to Service Pack 4 (SP4) or higher. The KX II-101-V2 ships with a static default IP address. On a network without a DHCP server, you must configure a new static IP address, net mask, and gateway address using either the KX II-101-V2 serial admin console or the KX II-101-V2 Remote Console.
  • Page 18 Chapter 2: Installation and Configuration Mouse Modes The KX II-101-V2 operates in several mouse modes: Absolute Mouse ™ Synchronization , Intelligent Mouse mode and Standard Mouse mode. Note: Do not use an animated mouse while using Intelligent Mouse mode. Mouse parameters do not have to be altered for Absolute Mouse Synchronization.
  • Page 19 Chapter 2: Installation and Configuration Windows XP, Windows 2003, Windows 2008 Mouse Settings Configure these mouse settings in Windows XP ® , Windows ® ® 2003 and Windows 2008 Configure the Motion settings:  Set the mouse motion speed setting to exactly the middle speed ...
  • Page 20: Step 2: Configure Network Firewall Settings

    Chapter 2: Installation and Configuration Sun Solaris Mouse Settings ™ ® Configure these Sun Solaris mouse settings:  Set the mouse acceleration value to exactly 1 and the threshold to exactly 1  Ensure that your video card is set to a supported resolution and that its output is VGA, not composite sync IBM AIX Mouse Settings ®...
  • Page 21: Step 3: Connect The Equipment

    Chapter 2: Installation and Configuration Step 3: Connect the Equipment Power The KX II-101-V2 is powered by a 100-240V AC input and 5VDC output power adaptor that is included with the device. For standard AC power, plug the included AC power adaptor into the Power port and plug the other end into a nearby AC power outlet.
  • Page 22 Chapter 2: Installation and Configuration Target Server Use either the PS/2 or USB to connect to the target. Before connecting, configure your target server's video to a supported resolution. Use the USB connection if you are using virtual media or Absolute Mouse Mode.
  • Page 23 Chapter 2: Installation and Configuration 2. Connect the USB connector of the KVM cable to the KX II-101-V2 and to a USB port on the target server. 3. Connect a monitor to the KX II-101-V2 Local User Port if you need to use the local video.
  • Page 24 Chapter 2: Installation and Configuration Admin Port Use the Admin port to do the following:  Configure and manage the device with a terminal emulation such as HyperTerminal program on your PC.  Configure and manage a power strip (requires an adapter, not included).
  • Page 25: Step 4: Configure The Kx Ii-101-V2

    1. Once the unit has booted, enter the default username admin and password raritan. Click Login. 2. Enter the old password raritan, then enter and reenter a new password. Passwords can be up to 64 characters in length consisting of English, alphanumeric and special characters.
  • Page 26 Chapter 2: Installation and Configuration Configure the IPv4 Settings 1. In the IPv4 section, enter or select the appropriate IPv4-specific network settings: a. Enter the IP Address if needed. The default IP address is 192.168.0.192. b. Enter the Subnet Mask. The default subnet mask is 255.255.255.0.
  • Page 27 Chapter 2: Installation and Configuration d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the device, and is used for neighbor discovery or when no routers are present. Read-Only Zone ID. Identifies the device the address is associated with. Read-Only g.
  • Page 28 Chapter 2: Installation and Configuration Connect to a Switch Once KX II-101-V2 is network accessible, remove the crossover cable and connect the KX II-101-V2 to the switch using a Cat5 cable. Configure Date/Time Settings (Optional) Optionally, configure the date and time settings. The date and time settings impact SSL certificate validation if LDAPS is enabled.
  • Page 29 Chapter 2: Installation and Configuration Configure the KX II-101-V2 Using a Terminal Emulation Program (Optional) You can use the Admin serial console with a terminal emulation program like HyperTerminal to set the following configuration parameters for the KX II-101-V2:  IP address ...
  • Page 30 Chapter 2: Installation and Configuration Command Argument Options ipauto none|dhcp none - Enables you to manually specify an IP address for the device. You must follow this option with the ip command and the IP address, as shown in the following example: interface ipauto none ip 192.168.50.12...
  • Page 31: Allow Pop-Ups

    Chapter 2: Installation and Configuration Command Argument Options interface mode based on the network.  10hdx - 10 MB/s, half duplex.  10fdx - 10 MB/s, full duplex  100hdx - 100 MB/s, half duplex  100fdx - 100 MB/s, full duplex When you have successfully changed a setting, you see a confirmation message like the following:...
  • Page 32: Java Validation And Access Warning

    When logging in to KX II-101-V2, Jave 1.7 prompts you to validate KX II-101-V2, and to allow access to the application. Raritan recommends installing an SSL certificate in each KX II-101-V2 device in order to reduce Java warnings, and enhance security. See Certificates...
  • Page 33: Example 1: Import The Certificate Into The Browser

    Chapter 2: Installation and Configuration Example 1: Import the Certificate into the Browser In this example, you import the Certificate into the browser. Steps Open an IE browser, then log in to KX II-101-V2. ™ Click More Information on the first Java security warning.
  • Page 34 Chapter 2: Installation and Configuration Steps Click the Content tab. Click Certificates. The Certificate Import Wizard opens and walks you through each step.  File to Import - Browse to locate the Certificate  Certificate Store - Select the location to store the Certificate Click Finish on the last step of the Wizard.
  • Page 35: Example 2: Add The Kx Ii-101-V2 To Trusted Sites And Import The Certificate

    Chapter 2: Installation and Configuration Example 2: Add the KX II-101-V2 to Trusted Sites and Import the Certificate In this example, the KX II-101-V2's URL is added as a Trusted Site, and the Self Signed Certificate is added as part of the process. Steps Open an IE browser, then select Tools >...
  • Page 36 Chapter 2: Installation and Configuration Steps Click OK on the Internet Options dialog to apply the changes, then close and reopen the browser. Next, import the Certificate. Steps Open an IE browser, then log in to KX II-101-V2. ™ Click More Information on the first Java security warning.
  • Page 37: Chapter 3 Working With Target Servers

    Chapter 3 Working with Target Servers In This Chapter Interfaces ....................29 Virtual KVM Client (VKC) ................. 38 Interfaces KX II-101-V2 Remote Console Interface The KX II-101-V2 Remote Console is a browser-based graphical user interface that allows you to log into KVM target servers and serial targets connected to the KX II-101-V2 and to remotely administer the KX II-101- The KX II-101-V2 Remote Console provides a digital connection to your connected KVM target servers.
  • Page 38 Chapter 3: Working with Target Servers 3. Select the Enable Direct Port Access via URL checkbox. 4. Click Save. To define a direct port access URL:  Define a URL with the IP address, user name, password, and if necessary, port number of the KX II-101-V2. The format for a direct port access URL is: https://IP address/dpa.asp?username=username&password=password...
  • Page 39 Chapter 3: Working with Target Servers Information Description When displayed? State The current state of the Always application, either idle or active. If idle, the application tracks and displays the time the session has been idle. Your IP The IP address used to Always access the KX II-101-V2.
  • Page 40 Chapter 3: Working with Target Servers  Click on the blue, left-facing arrow located approximately halfway down the left side of the panel. Once the panel is collapsed, click the blue arrow again to expand it. Port Access Page After successfully logging in to the KX II-101-V2 Remote Console, the Port Access page appears.
  • Page 41 Chapter 3: Working with Target Servers 2. Click the Port Name of the target server you want to access. The Port Action Menu appears. See Port Action Menu (on page 33) for details on available menu options. 3. Choose the desired menu command from the Port Action Menu. Port Action Menu When you click a Port Name in the Port Access list, the Port Action menu appears.
  • Page 42 Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: ...
  • Page 43 Chapter 3: Working with Target Servers Enable Favorites  Click Enable in the Favorite Devices section of the left panel of the KX II-101-V2 interface. Once enabled, the Enable button becomes a Disable button.
  • Page 44 Chapter 3: Working with Target Servers Access and Display Favorites To access a favorite KX II-101-V2 device:  Click the device name (listed beneath Favorite Devices). A new browser opens to that device. To display favorites by name:  Click Display by Name. To display favorites by IP Address: ...
  • Page 45 This feature allows multiple KX II-101-V2 devices to interoperate and scale automatically. The KX II-101-V2 Remote Console automatically discovers the KX II-101-V2 devices, and any other Raritan device, in the subnet of the KX II-101-V2. To discover devices on the device subnet: 1.
  • Page 46: Multi-Platform Client (Mpc)

    Raritan Multi-Platform Client (MPC) is a graphical user interface for the Raritan product lines, providing remote access to target servers connected to Raritan KVM over IP devices. For details on using MPC, see the KVM and Serial Access Clients Guide available on Raritan's website on the same page as the user guide.
  • Page 47: Connect To A Target Server

    Chapter 3: Working with Target Servers Connect to a Target Server Once you have logged on to the KX II-101-V2 Remote Console, access target servers via the Virtual KVM Client (KVC). Note: The KX II-101-V2 only supports a connection to one target at a time.
  • Page 48 Chapter 3: Working with Target Servers Button Button name Description Video Opens the Video Settings dialog, allowing you to Settings manually adjust video conversion parameters. Color Adjusts color settings to reduce excess color Calibration noise. Same as choosing Video > Color Calibrate. Note: Not available in KX II-101-V2.
  • Page 49: Power Controlling A Target Server

    Chapter 3: Working with Target Servers Button Button name Description Single Cursor Starts Single Cursor mode in which the local Mode mouse pointer no longer appears onscreen. Press Ctrl+Alt+O to exit this mode. Full Screen Maximizes the screen real estate to view the Mode target server desktop.
  • Page 50: Disconnecting Kvm Target Servers

    Chapter 3: Working with Target Servers Disconnecting KVM Target Servers To disconnect a target server:  On the Port Access page, click the port name of the target you want to disconnect from, then click Disconnect on Port Action menu when it appears.
  • Page 51 Chapter 3: Working with Target Servers  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting.
  • Page 52: Connection Information

    Vertical Resolution - The target server vertical resolution.  Refresh Rate - Refresh rate of the target server.  Protocol Version - Raritan communications protocol version. To copy this information:  Click Copy to Clipboard. The information is available to be pasted into the program of your choice.
  • Page 53 Chapter 3: Working with Target Servers Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC). Macros exported from MPC or VKC cannot be imported into AKC. To import macros: 1.
  • Page 54 Chapter 3: Working with Target Servers The macros are then imported. If a macro is imported that contains a hot key that already exists, the hot key for the imported macro is discarded. To export macros: 1. Choose Tools > Export Macros to open the Select Keyboard Macros to Export dialog.
  • Page 55 Chapter 3: Working with Target Servers Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Click Add. The Add Keyboard Macro dialog appears. 3. Type a name for the macro in the Keyboard Macro Name field. This name appears in the Keyboard menu after it is created.
  • Page 56 Chapter 3: Working with Target Servers 9. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. To use the Send Text to Target function for the macro: 1. Click the Keyboard > Send Text to Target. The Send Text to Target dialog appears.
  • Page 57: Video Properties

    Chapter 3: Working with Target Servers Modifying and Removing Keyboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Choose the macro from among those listed. 3. Click Modify. The Add/Edit Macro dialog appears. 4.
  • Page 58 Chapter 3: Working with Target Servers Auto-Sense Video Settings The Auto-sense Video Settings command forces a re-sensing of the video settings (resolution, refresh rate) and redraws the video screen. To automatically detect the video settings, do the following:  Choose Video > Auto-sense Video Settings, or click the Auto-Sense Video Settings button in the toolbar.
  • Page 59 Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor.
  • Page 60 Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
  • Page 61: Mouse Options

    Chapter 3: Working with Target Servers Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software, and you are accessing the target through the Virtual KVM Client (VKC) or Multi-Platform Client (MPC), you may need to change the maximum refresh rate of the monitor in order for the refresh rate to take effect on the target.
  • Page 62 Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
  • Page 63 Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place.  Do not use an animated mouse.
  • Page 64 To be sure to avoid any problems with this function, Raritan recommends you do not have file icons or folder icons in the upper left corner of your desktop.
  • Page 65: Vkc Virtual Media

    Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in synch, even when the target mouse is set to a different acceleration or speed.
  • Page 66 Chapter 3: Working with Target Servers  Swedish (Sweden)  German (Switzerland)  Hungarian (Hungary)  Spanish (Spain)  Italian (Italy)  Slovenian  Translation: French - US  Translation: French - US International In AKC, the keyboard type defaults to the local client, so this option does not apply.
  • Page 67 Turkish Keyboards If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
  • Page 68 Chapter 3: Working with Target Servers Client Launch Settings Configuring client launch settings allows you to define the screen settings for a KVM session. Note: LX devices support this feature in MPC. LX does not support client launch setting in VKC and AKC. To configure client launch settings: 1.
  • Page 69: View Options

    Chapter 3: Working with Target Servers Configure Scan Settings in VKC and AKC The KX II and LX provide the port scanning feature to search for selected targets, and display them in a slide show view, allowing you to monitor up to 32 targets at one time.
  • Page 70 Chapter 3: Working with Target Servers View Status Bar By default, the status bar is displayed at the bottom of the target window. To hide the status bar:  Click View > Status Bar to deselect it. To restore the status bar: ...
  • Page 71: Version Information - Virtual Kvm Client

    2. Select Enable Launch in Full Screen Mode and click OK. Version Information - Virtual KVM Client This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support. To obtain version information: 1. Choose Help > About Raritan Virtual KVM Client.
  • Page 72: Chapter 4 Virtual Media

    Chapter 4 Virtual Media In This Chapter Overview ....................64 Prerequisites for Using Virtual Media ............65 Mounting Local Drives ................65 Supported Tasks Via Virtual Media ............66 Supported Virtual Media Types ............... 66 Number of Supported Virtual Media Drives ..........67 Connecting and Disconnecting from Virtual Media .........
  • Page 73: Prerequisites For Using Virtual Media

    Chapter 4: Virtual Media Prerequisites for Using Virtual Media KX II-101-V2 Virtual Media Prerequisites  For users requiring access to virtual media, the KX II-101-V2 permissions must be set to allow access to the relevant ports, as well as virtual media access (VM Access port permission) for those ports. Port permissions are set at the group-level.
  • Page 74: Notes On Mounting Local Drives

     ISO images (disk images)  Digital audio devices* Note: ISO9660 is the standard supported by Raritan. However, other ISO standards can be used. Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations: ...
  • Page 75: Number Of Supported Virtual Media Drives

    Chapter 4: Virtual Media Number of Supported Virtual Media Drives With the virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session.
  • Page 76: Mounting Cd-Rom/Dvd-Rom/Iso Images

    You can access the media just like any other drive. Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1.
  • Page 77: Disconnect From Virtual Media Drives

    Chapter 4: Virtual Media c. File Server Username - User name required for access to the file server. The name can include the domain name such as mydomain/username. d. File Server Password - Password required for access to the file server (field is masked as you type).
  • Page 78: Virtual Media In A Linux Environment

    Chapter 4: Virtual Media Virtual Media in a Linux Environment Active System Partitions You cannot mount active system partitions from a Linux client. Linux Ext3/4 drive partitions need to be unmounted via umount /dev/<device label> prior to a making a virtual media connection. Drive Partitions The following drive partition limitations exist across operating systems: ...
  • Page 79: Virtual Media File Server Setup (File Server Iso Images Only)

    This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. Note: SMB/CIFS support is required on the file server. Use the Remote Console File Server Setup page to designate the files server(s) and image paths that you want to access using virtual media.
  • Page 80: Disconnecting Virtual Media

    Chapter 4: Virtual Media Disconnecting Virtual Media To disconnect the virtual media drives:  For local drives, choose Virtual Media > Disconnect Drive.  For CD-ROM, DVD-ROM, and ISO images, choose Virtual Media > Disconnect CD-ROM/ISO Image. Note: In addition to disconnecting the virtual media using the Disconnect command, simply closing the KVM connection closes the virtual media as well.
  • Page 81: Chapter 5 User Management

    Chapter 5 User Management In This Chapter User Groups .................... 73 Users ....................... 79 Authentication Settings ................83 Changing a Password ................95 User Groups Every KX II-101-V2 is delivered with three default user groups. These groups cannot be deleted: User Description Admin...
  • Page 82: User Group List

    Chapter 5: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group.
  • Page 83 Chapter 5: User Management 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the checkboxes next to the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 77).
  • Page 84 Chapter 5: User Management control. It is possible to be locked out of your KX II-101-V2 if your IP address is within a range that has been denied access. This feature limits access to the KX II-101-V2 device by users in the selected group to specific IP addresses.
  • Page 85 Chapter 5: User Management To replace a rule: 1. Specify the rule number you want to replace. 2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number.
  • Page 86: Modifying An Existing User Group

    Chapter 5: User Management Permission Description Note: The Admin user group has this permission by default. Device Settings Network settings, date/time settings, port configuration (channel names, power associations), event management (SNMP, Syslog), virtual media file server setup Diagnostics Network interface status, network statistics, ping host, trace route to host, KX II-101-V2 diagnostics Maintenance...
  • Page 87: Users

    Chapter 5: User Management 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 77). 3. Set the Port Permissions. Specify the server ports that can be accessed by users belonging to this group (and the type of access).
  • Page 88: View Users By Port

    Chapter 5: User Management View Users by Port The User By Ports page lists all authenticated local and remote users and ports they are being connected to. Only permanent connections to ports are listed. If the same user is logged on from more than one client, their username appears on the page for each connection they have made.
  • Page 89: Logging Users Off The Kx Ii-101-V2 (Force Logoff)

    Chapter 5: User Management Logging Users Off the KX II-101-V2 (Force Logoff) If you are an administrator, you are able to log off any authenticated user who is logged on to the KX II-101-V2. Users can also be disconnected at the port level.
  • Page 90: Modifying An Existing User

    Chapter 5: User Management Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management > User List. 2. Locate the user from among those listed on the User List page. 3. Click the user name. The User page opens. 4.
  • Page 91: Authentication Settings

    Chapter 5: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed.
  • Page 92: Implementing Ldap/Ldaps Remote Authentication

    Chapter 5: User Management Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn.
  • Page 93 LDAP database you want to begin searching for user information. Up to 64 characters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com. Consult your authentication server administrator for the appropriate values to enter into these fields.
  • Page 94 Chapter 5: User Management 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the Secret Phrase field and again in the Confirm Secret Phrase field (up to 128 characters).
  • Page 95 Chapter 5: User Management 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only used when the Enable Secure LDAP checkbox is selected. 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certificate file to validate the certificate provided by the server.
  • Page 96: Returning User Group Information From Active Directory Server

    KX II-101-V2 policies and user group privileges that are applied locally to AD user groups. IMPORTANT: If you are an existing Raritan, Inc. customer, and have already configured the Active Directory server by changing the AD schema, the KX II-101-V2 still supports this configuration and you do not need to perform the following operations.
  • Page 97: Implementing Radius Remote Authentication

    Chapter 5: User Management 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On your AD server, assign the KX II-101-V2 users to the groups created in step 2. 4.
  • Page 98 Chapter 5: User Management The timeout is the length of time the KX II-101-V2 waits for a response from the RADIUS server before sending another authentication request. 9. The default number of retries is 3 Retries. This is the number of times the KX II-101-V2 will send an authentication request to the RADIUS server.
  • Page 99: Returning User Group Information Via Radius

    Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
  • Page 100: Radius Communication Exchange Specifications

    Chapter 5: User Management RADIUS Communication Exchange Specifications The KX II-101-V2 sends the following RADIUS attributes to your RADIUS server: Attribute Data Log in Access-Request (1) NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-IP-Address (4) The IP address for the KX II-101-V2. User-Name (1) The user name entered at the login screen.
  • Page 101: User Authentication Process

    Chapter 5: User Management User Authentication Process When the device is configured to authenticate and authorize local users, the order in which the user credentials are validated follows the following process:...
  • Page 102 Chapter 5: User Management Remote authentication follows the process specified in the flowchart below:...
  • Page 103: Changing A Password

    Chapter 5: User Management Changing a Password To change your KX II-101-V2 password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
  • Page 104: Chapter 6 Device Management

    Chapter 6 Device Management In This Chapter Network Settings ..................96 Device Services ..................100 Keyboard/Mouse Setup ................. 105 Serial Port Settings ................105 Configuring Date/Time Settings ............107 Event Management ................108 Port Configuration .................. 115 Analog KVM Switch ................123 Resetting the KX II-101-V2 Using the Reset Button ......
  • Page 105: Network Basic Settings

    Chapter 6: Device Management Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings (on page 96). Assign the KX II-101-V2 an IP Address To assign an IP address to the KX II-101-V2: 1.
  • Page 106: Configure The Ipv6 Settings

    Chapter 6: Device Management With this option, network parameters are assigned by the DHCP server. If DHCP is used, enter the Preferred host name (DHCP only). Up to 63 characters. 2. Next, configure IPv6 and/or DNS settings. Configure the IPv6 Settings 1.
  • Page 107: Configure The Dns Settings

    Chapter 6: Device Management Configure the DNS Settings 1. Select Obtain DNS Server Address Automatically if DHCP is selected and Obtain DNS Server Address is enabled. When Obtain DNS Server Address Automatically, the DNS information provided by the DHCP server will be used. 2.
  • Page 108: Device Services

    Chapter 6: Device Management  256 Kilobit  512 Kilobit  2 Megabit  5 Megabit  10 Megabit  100 Megabit NEED NEW SCREENSHOT Device Services The Device Services page allows you to configure the following functions:  Enable SSH access ...
  • Page 109: Http And Https Port Settings

    Chapter 6: Device Management 2. Select Enable SSH Access. 3. Enter the SSH Port information. The standard SSH TCP port number is 22 but the port number can be changed to provide a higher level of security operations. 4. Click OK. HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX II- 101-V2.
  • Page 110: Enabling Direct Port Access Via Url

    Chapter 6: Device Management Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Login dialog and Port Access page. This feature also provides the ability to enter a username and password directly to proceed to the target, if the username and password is not contained in the URL.
  • Page 111 Chapter 6: Device Management 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option must be selected. Required 4. Complete the following fields for SNMP v1/v2c (if needed): a. Community - the device's community string b.
  • Page 112 Chapter 6: Device Management Configure SNMP traps on the Event Management - Settings page, which can be quickly accessed by clicking the SNMP Trap Configuration link. See Configuring SNMP Traps for information on creating SNMP traps and List of KX II-101-V2 SNMP Traps for a list of available KX II-101-V2 SNMP traps.
  • Page 113: Keyboard/Mouse Setup

    PS/2 - Forces the KX II-101-V2 to use the PS/2 connection to send Keyboard and Mouse data to the host device. Note: If you are using a Raritan switch on the front-end with a KX II- 101-V2, you must set the Host Interface to PS/2 in order for the configuration to work properly.
  • Page 114: Admin Port

    1. Choose Device Settings > Serial Port. The Serial Port Settings page opens. 2. Select the PowerStrip Control radio button. Choose this option when connecting the KX II-101-V2 to a Raritan power strip. 3. Click OK. Modem To configure the modem serial port: 1.
  • Page 115: Configuring Date/Time Settings

    Chapter 6: Device Management  Modem server IP address - The address the user types to access the KX II-101-V2 web interface once connected via modem.  Modem client IP address - The address assigned to the user once connected via modem. 4.
  • Page 116: Event Management

    Chapter 6: Device Management  Synchronize with NTP Server - use this option to synchronize the date and time with the Network Time Protocol (NTP) Server. 5. For the Synchronize with NTP Server option: a. Enter the IP address of the Primary Time server. b.
  • Page 117 Chapter 6: Device Management Configuring SNMP Traps Simple Network Management Protocol (SNMP) is a protocol governing network management and the monitoring of network devices and their functions. SNMP traps are sent out over a network to gather information. The traps are configured on the Event Management - Settings page. See List of KX II-101-V2 SNMP Traps for a list of KX II-101-V2 SNMP traps.
  • Page 118 Chapter 6: Device Management Note: IPv6 addresses cannot exceed 80 characters in length for the host name. b. Port Number - the port number used by the SNMP manager c. Security Name - the username or service account name of the entity communicating with the SNMP agent (up to 32 characters) d.
  • Page 119 Chapter 6: Device Management Note: If you disable SNMP settings at any time, the SNMP information is retained so you do not have to reenter if you re-enable the settings. To delete SNMP traps:  Clear all of the SNMP trap fields and save. Use the reset to factory defaults feature to remove the SNMP configuration and set the KX II-101-V2 to its original factory default.
  • Page 120 Chapter 6: Device Management Trap Name Description deviceUpgradeStarted The KX II-101-V2 has begun update via an RFP file. factoryReset The device has been reset to factory defaults. firmwareFileDiscarded Firmware file was discarded. firmwareUpdateFailed Firmware update failed. firmwareValidationFailed Firmware validation failed. groupAdded A group has been added to the KX II-101-V2 system.
  • Page 121 Chapter 6: Device Management Trap Name Description securityBannerChanged A change has been made to the security banner. securityViolation Security violation. setDateTime The date and time for the device has been set. setFIPSMode FIPS mode has been enabled. startCCManagement The device has been put under CommandCenter Management.
  • Page 122 Chapter 6: Device Management Viewing the KX II-101-V2 MIB To view the KX II-101-V2 MIB: 1. Choose Device Settings > Event Management - Settings. The Event Management - Settings page opens. 2. Click the 'Click here to view the Dominion SNMP MIB' link. The MIB file opens in a browser window.
  • Page 123: Configuring Event Management - Destinations

    Chapter 6: Device Management Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps), or can be logged to the syslog or audit log. Use the Event Management - Destinations page to select the system events to track and where to send this information.
  • Page 124 See Power Control (on page 118). Note: The Power Port 1 link is enabled only when a Raritan power strip is connected to the KX II-101-V2 and configured. Otherwise, the link is disabled.
  • Page 125: Managing Kvm Target Servers (Port Page)

    2. Click the Port Name for the port you want to edit. Note: The Power Port 1 link is enabled only when a Raritan power strip is connected to the KX II-101-V2 and configured. Otherwise, the link is disabled.
  • Page 126: Power Control

    Colon Power Control The KX II-101-V2 provides remote power control of a target server. To utilize this feature, you must have a Raritan remote power strip. To use the KX II-101-V2 power control feature:  Connect the power strip to your target server using the DKX2-101- V2-PDU connector (not included but available from your reseller or Raritan).
  • Page 127 DKX2-101-V2-PDU (DB9-RJ45 adapter) connector (not included) from the KX II-101-V2 to a Raritan the power strip. To connect the KX II-101-V2 to a Raritan power strip: 1. Connect the DKX2-101-V2-PDU (DB9-RJ45 adapter) cable to the Admin port of the KX II-101-V2.
  • Page 128 Power menu is available on the Remote Console. Naming the Power Strip (Port Page for Power Strips) Once the KX II-101-V2 is connected to a Raritan remote power strip, the port is displayed on the Port page and you can open that port from the Port Configuration page.
  • Page 129 Chapter 6: Device Management To cancel without saving changes:  Click Cancel. Managing Power Associations To make power associations (associate power strip outlets with the KVM target server): Note: When a power strip is associated with the target server (port), the outlet name is replaced by the port name.
  • Page 130 Chapter 6: Device Management 2. For that power strip, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down list, select None. 4. Click OK. That power strip/outlet association is removed. A confirmation message appears. To show the power port configuration: ...
  • Page 131: Analog Kvm Switch

    Chapter 6: Device Management Analog KVM Switch You can configure a Raritan analog KVM switch to work with the KX II- 101-V2. The KX II-101-V2's compatibility has been verified with the following Raritan KVM switches:  SwitchMan SW2, SW4 and SW8 ...
  • Page 132: Resetting The Kx Ii-101-V2 Using The Reset Button

    Chapter 6: Device Management 8. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults:  Click Reset to Defaults. Resetting the KX II-101-V2 Using the Reset Button On the top of the device, there is a Reset button. It is recessed to prevent accidental resets (you will need a pointed object to press this button).
  • Page 133: Changing The Default Gui Language Setting

    Chapter 6: Device Management Note: If the KX II-101-V2 is set to restore to the factory defaults upon reset, the IP address, user name, and other options will be set accordingly. Changing the Default GUI Language Setting The KX II-101-V2 GUI defaults to English, but also supports the following localized languages: ...
  • Page 134: Chapter 7 Managing Usb Connections

    Chapter 7 Managing USB Connections In This Chapter Overview ....................127 USB Connection Settings ..............127 Advanced USB Connection Settings ............. 128...
  • Page 135: Overview

    USB Connection Setting may be more appropriate. Should none of the USB Connection settings provided by Raritan work with a given KVM target, please contact Raritan Technical Support for assistance.
  • Page 136: Advanced Usb Connection Settings

    Advanced USB Connection Settings section, to cause configuration problems between the KX II-101-V2 and the target server. Therefore, Raritan strongly recommends that you refer to the Known USB Profiles or to the User Defined KX II-101-V2 USB Profiles Connection Configuration Table, which can be accessed by clicking its corresponding link on the Advanced USB Connection Settings section of the Port page .
  • Page 137 Chapter 7: Managing USB Connections 3. Click the User Defined KX II-101 USB Profile Configuration Table link to access the recommended configurations to apply to the Advanced USB Connection Settings section. 4. Configure the following as needed: a. Virtual Media Interface #1 Type b.
  • Page 138: Chapter 8 Security Management

    Chapter 8 Security Management In This Chapter Security Settings ..................130 Configuring IP Access Control .............. 139 SSL Certificates ..................142 Security Banner ..................145 Security Settings From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. To configure the security settings: 1.
  • Page 139 Chapter 8: Security Management Limitation Description This field is enabled and required when the Enable Password Aging checkbox is selected. Enter the number of days after which a password change is required. The default is 60 days. Log out idle users, Select the "Log off idle users"...
  • Page 140: Strong Passwords

    Chapter 8: Security Management Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KX II-101-V2 local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
  • Page 141: User Blocking

    Chapter 8: Security Management User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
  • Page 142 Chapter 8: Security Management Option Description Users are denied access to the system for the Timer Lockout specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will be locked out.
  • Page 143: Encryption & Share

    Chapter 8: Security Management Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX II-101-V2 Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX II-101-V2 from your browser.
  • Page 144 Chapter 8: Security Management Encryption mode Description browser supports it, otherwise you will not be able to connect. See Checking Your Browser for AES Encryption (on page 137) for more information. AES-256 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data.
  • Page 145 Reset (default) defaults. Enable Local Admin Resets the local administrator password only. Password Reset The password is reset to raritan. Disable All Local No reset action is taken. Resets Checking Your Browser for AES Encryption If you do not know if your browser uses AES, check with the browser manufacturer or navigate to the https://www.fortify.net/sslcheck.html...
  • Page 146: Enabling Fips 140-2

    Chapter 8: Security Management Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be required. The KX II-101-V2 uses an embedded FIPS 140-2-validated ® cryptographic module running on a Linux platform per FIPS 140-2 Implementation Guidance section G.5 guidelines.
  • Page 147: Configuring Ip Access Control

    Chapter 8: Security Management FIPS 140-2 Support Requirements The KX II-101-V2 supports the use of FIPS 140-2 approved encryption algorithms. This allows an SSL server and client to successfully negotiate the cipher suite used for the encrypted session when a client is configured for FIPS 140-2 only mode.
  • Page 148 Chapter 8: Security Management To use IP access control: 1. Open the IP Access Control page by selecting Security > IP Access Control. The IP Access Control page opens. 2. Select the Enable IP Access Control checkbox to enable IP access control and the remaining fields on the page.
  • Page 149 Chapter 8: Security Management 3. Choose the Policy from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number. To delete a rule: 1. Specify the rule number you want to delete. 2.
  • Page 150: Ssl Certificates

    Chapter 8: Security Management SSL Certificates The KX II-101-V2 uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the KX II-101-V2 has to identify itself to a client using a cryptographic certificate. It is possible to generate a Certificate Signing Request (CSR) and install a certificate signed by the Certificate Authority (CA) on the KX II-101-V2.
  • Page 151 Chapter 8: Security Management Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g. DE for Germany, or US for the U.S. g. Challenge Password - Some certification authorities require a challenge password to authorize later changes on the certificate (e.g.
  • Page 152 Chapter 8: Security Management b. A message containing all of the information you entered appears. c. The CSR and the file containing the private key used when generating it can be downloaded by clicking Download CSR. d. Send the saved CSR to a CA for certification. You will get the new certificate from the CA.
  • Page 153: Security Banner

    Chapter 8: Security Management Security Banner KX II-101-V2 provides you with the ability to add a security banner to the KX II-101-V2 login process. This feature requires users to either accept or decline a security agreement before they can access the KX II-101- V2.
  • Page 154: Chapter 9 Maintenance

    Chapter 9 Maintenance In This Chapter Audit Log....................146 Device Information ................. 147 Backup and Restore ................148 Upgrading Firmware ................150 Upgrade History ..................151 Factory Reset ..................151 Rebooting the KX II-101-V2..............152 Stopping CC-SG Management .............. 153 Audit Log A log is created of the KX II-101-V2 system events.
  • Page 155: Device Information

    Device Information The Device Information page provides detailed information about your KX II-101-V2 device. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX II-101-V2:  Choose Maintenance > Device Information. The Device Information page opens.
  • Page 156: Backup And Restore

    Chapter 9: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II-101-V2. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KX II-101-V2 by backing up the user configuration settings from the KX II-101-V2 in use and restoring those configurations to the new KX II-101-...
  • Page 157 Chapter 9: Maintenance In IE 7 (and later), IE is used as the default application to open files, so you are prompted to open the file versus save the file. To avoid this, you must change the default application that is used to open ®...
  • Page 158: Upgrading Firmware

    To upgrade your KX II-101-V2 device: 1. Choose Maintenance > Firmware Upgrade. The Firmware Upgrade page opens. 2. Click the Show Latest Firmware link, locate the appropriate Raritan firmware distribution file (*.RFP) from the Firmware Upgrades > KX II-101-V2 page, and download the file.
  • Page 159: Upgrade History

    Chapter 9: Maintenance 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the device reboots. 6. As prompted, close the browser and wait approximately 5 minutes before logging into the KX II-101-V2 again.
  • Page 160: Rebooting The Kx Ii-101-V2

    Chapter 9: Maintenance  Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defaults. Note that any management associations with CommandCenter will be broken. Because of the complete nature of this reset, you will be prompted to confirm the factory reset.
  • Page 161: Stopping Cc-Sg Management

    Chapter 9: Maintenance 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. Stopping CC-SG Management While the KX II-101-V2 is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC- SG management.
  • Page 162 Chapter 9: Maintenance 2. Click Yes to begin the processing of removing the device from CC- SG management. A confirmation message will then displayed asking you to confirm that you want the remove the device from CC-SG management. 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
  • Page 163: Chapter 10 Diagnostics

    The Diagnostics menu options help you debug and configure the network settings. The Device Diagnostics option is intended for use in conjunction with Raritan Technical Support. In This Chapter Network Interface Page ................. 155 Network Statistics Page ................. 155 Ping Host Page ..................
  • Page 164 Chapter 10: Diagnostics  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one displayed here.
  • Page 165 Chapter 10: Diagnostics  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.
  • Page 166: Ping Host Page

    Chapter 10: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another KX II-101-V2 is accessible.
  • Page 167 Chapter 10: Diagnostics 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The output of trace route is displayed in the Result field.
  • Page 168: Device Diagnostics

    Chapter 10: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. The Device Diagnostics page downloads diagnostics information from the KX II-101-V2 to the client machine. A device diagnostics log can be generated with or without running an optional diagnostic script provided by Raritan Technical Support.
  • Page 169 Chapter 10: Diagnostics a. Click Save to File. The File Download dialog appears. b. Click Save. The Save As dialog appears. c. Navigate to the desired directory and click Save. 4. Email this file as directed by Raritan Technical Support.
  • Page 170: Chapter 11 Command Line Interface (Cli)

    Chapter 11 Command Line Interface (CLI) In This Chapter Overview ....................162 Accessing the KX II-101-V2 Using the CLI ..........163 SSH Connection to the KX II-101-V2 ............ 163 Logging in ....................164 Navigation of the CLI ................164 CLI Commands ..................166 Overview This chapter provides an overview of the CLI commands that can be used with the KX II-101-V2.
  • Page 171: Accessing The Kx Ii-101-V2 Using The Cli

    Chapter 11: Command Line Interface (CLI) Accessing the KX II-101-V2 Using the CLI Access the KX II-101-V2 using one of the following methods:  TELNET via IP connection  SSH (Secure Shell) via IP connection  Multi-function admin serial port via RS-232 serial interface with provided cable and a terminal emulation program like HyperTerminal Several SSH/TELNET clients are available and can be obtained from the following locations:...
  • Page 172: Ssh Access From A Unix/Linux Workstation

    The Password prompt appears. Logging in To log in: 1. Login: admin 2. The password prompt appears. Enter the default password: raritan. The welcome message appears. You are now logged in as an Administrator. After reviewing the following Navigation of the CLI...
  • Page 173: Completion Of Commands

    Chapter 11: Command Line Interface (CLI) Completion of Commands The CLI supports the completion of partially-entered commands. After entering the first few characters of an entry, press the Tab key. If the characters form a unique match, the CLI will complete the entry. ...
  • Page 174: Cli Commands

    Chapter 11: Command Line Interface (CLI) Command Description help Display an overview of the CLI syntax. quit Places the user back one level. logout Logs out the user session. CLI Commands The table below lists and describes all available CLI commands. Command Description config...
  • Page 175: Diagnostics

    [module <module>] [level <level>] [vflag <vflag>] [verbose <on|off>] Set/Get diag log level The Setlog command options are described in the following table. Raritan Technical Support will tell you how to configure these settings. Command Option Description module The module name.
  • Page 176: Configuration

    Chapter 11: Command Line Interface (CLI) Command Option Description verbose [on|off] Turns verbose logging on and off. Setlog Command Example The following Setlog command sets the logging level to debug with verbose logging on for the libpp_serial module. Setlog module libpp_serial level debug verbose on Configuration The Configuration menu enables you to access the network commands used to configure the network interface and set the device name.
  • Page 177 Chapter 11: Command Line Interface (CLI) Command Option Description ipauto Static or dynamic IP address ip ipaddress IP address of the KX II-101-V2 assigned for access from the IP network mask subnetmask Subnet mask obtained from the IP administrator gw ipaddress Gateway IP address obtained from the IP administrator mode <auto | 100fdx>...
  • Page 178: Listports Command

    Chapter 11: Command Line Interface (CLI) Listports Command The Listports command lists the number of active users, user names, port, and status. Listports Command Example Admin Port > listports Port Port Port Port Port Name Type Status Availability - Dominion_KXII-101_V2_Port KVM idle Userlist Command The Userlist command lists the port, port name, port type, port status,...
  • Page 179: Chapter 12 Cc-Sg Management

    Chapter 12 CC-SG Management In This Chapter Overview ....................171 Removing a KX II-101-V2 from CC-SG Management ......172 Using CC-SG in Proxy Mode ..............173 Overview CC-SG can managed KX II-101-V2. Once under CC-SG management, mobile access to the KX II-101-V2 is supported from an iPad ®...
  • Page 180: Removing A Kx Ii-101-V2 From Cc-Sg Management

    Chapter 12: CC-SG Management Removing a KX II-101-V2 from CC-SG Management Unless the KX II-101-V2 is released from CC-SG control, you cannot access the device directly. However, if the KX II-101-V2 does not receive heartbeat messages from CommandCenter (for example, CommandCenter is not on the network), you can release the KX II-101- V2 from CC-SG control in order to access the device.
  • Page 181: Using Cc-Sg In Proxy Mode

    When the Virtual KVM Client is launched from CommandCenter Secure Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”. Proxy Mode and MPC...
  • Page 182: Appendix A Specifications

    Operating temperature 0° - 40°C (32° - 104°F) Humidity 20% - 85% RH Indicators: Boot-up and power indicator Blue RARITAN back-lit Network activity and connection speed logo indicator Yellow and Green LED Local Connection: 1 - Mini USB port for USB keyboard / mouse...
  • Page 183: Supported Operating Systems (Clients)

    Appendix A: Specifications KX II-101-V2... Description Remote Connection: 1 Ethernet (RJ45) port with activity status Network indicator TCP/IP, TELNET, SSH, HTTP, Protocols HTTPS, secure LDAP, RADIUS, LDAP, SNMP v2 and v3, DHCP and SNTP, dual- stack: IPv4 and IPv6 Warranty Two years with advanced replacement* Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client...
  • Page 184 Appendix A: Specifications  Linux ® ™ ® The JRE plug-in is available for the Windows 32-bit and 64-bit operating systems. MPC and VKC can be launched only from a 32-bit browser, or 64-bit browser. ™ Following are the Java 32-bit and 64-bit Windows operating system requirements.
  • Page 185: Supported Browsers

    Appendix A: Specifications Supported Browsers KX II-101-V2 supports the following browsers:  ® Internet Explorer 7 through 11  ® Firefox 4 (or later)  ® Safari 3 (or later)  ® ® OS X Mountain Lion 10.7.5 using Safari 6.0.5 running ™...
  • Page 186: Supported Video Resolutions

    Appendix A: Specifications Supported Video Resolutions Ensure each target server's video resolution and refresh rate are supported by the KX II-101-V2, and that the signal is noninterlaced. Video resolution and cable length are important factors in the ability to obtain mouse synchronization. The KX II-101-V2 supports these resolutions: Resolutions 640x350 @70Hz...
  • Page 187: Supported Keyboard Languages

    Appendix A: Specifications Resolutions 1024x768@72 1920x1080@60Hz Note: Composite Sync and Sync-on-Green video require an additional adapter. Note: Some resolutions may not be available by default. If you do not see a resolution, plug in the monitor first, remove the monitor and then plug in the CIM.
  • Page 188: Tcp And Udp Ports Used

    KX II-101-V2 This port is used to discover other Dominion devices and for (Raritan KVM-over- communication between Raritan devices and systems, including CC- IP) Protocol, SG for devices that CC-SG management is available. Configurable Port By default, this is set to Port 5000, but you may configure it to use any 5000 TCP port not currently in use.
  • Page 189: Network Speed Settings

    162 is used for outbound traffic for SNMP traps. Optional TCP Port 22 Port 22 is used for the KX II-101-V2 command line interface (when you are working with Raritan Technical Support). (Secure Shell) SSH port can be configured. The default is port 22. Telnet Telnet port can be configured but is not recommended.
  • Page 190: Pin Pinout

    Appendix A: Specifications KX II-101-V2 network speed setting KX II-101- 10/Full KX II-101- 10/Full V2: 10/Half Communica Communicat V2: 10/Half tion Switch: Switch: 10/Full 10/Full 10/Half KX II-101- 10/Half 10/Half Communica Communicat V2: 10/Full tion Switch: 10/Half Legend: Does not function as expected Supported Functions;...
  • Page 191 Appendix A: Specifications Pin definition DTR (out) CTS (in) RTS (out) RI (in)
  • Page 192: Appendix B Updating The Ldap Schema

    Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ............184 Setting the Registry to Permit Write Operations to the Schema ... 185 Creating a New Attribute ...............
  • Page 193: Setting The Registry To Permit Write Operations To The Schema

    Appendix B: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1.
  • Page 194: Adding Attributes To The Class

    Appendix B: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
  • Page 195 Appendix B: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
  • Page 196: Updating The Schema Cache

    Appendix B: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: ®...
  • Page 197 Appendix B: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain. 5. In the left pane of the window, select the CN=Users folder.
  • Page 198 Appendix B: Updating the LDAP Schema 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties. 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list.
  • Page 199: Appendix C Rack Mount

    Appendix C Rack Mount The KX II-101-V2 device can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brackets and screws included with the KX II-101-V2 kit. In This Chapter Attach the L Bracket to the KX II-101-V2 for a Horizontal Mount ..
  • Page 200 Appendix C: Rack Mount Diagram key Screws...
  • Page 201: Appendix D Informational Notes

    Remote Console checks the Java version. If the version is incorrect or outdated, you will be prompted to download a compatible version. Raritan recommends using JRE version 1.7 for optimum performance, but the Remote Console and MPC function with JRE version 1.6.x and later with the exception of 1.6.2.
  • Page 202: Ipv6 Support Notes

    Appendix D: Informational Notes IPv6 Support Notes Operating System IPv6 Support Notes Java ™ Java 1.6 (and later) supports IPv6 for the following:  ™ Solaris 10 (and later)  Linux ® kernel 2.1.2 (and later)/RedHat 6.1 (and later) The following IPv6 configurations are not supported by Java: ...
  • Page 203: Bios Access Limitation From A Local Keyboard

    Appendix D: Informational Notes BIOS Access Limitation from a Local Keyboard A USB connection is required when using Absolute Mouse Synchronization. However, the keyboards in this section do not support a USB connection to the local keyboard. To access the local keyboard via BIOS or virtual media through the local port, follow these configurations: Keyboard Configuration to use...
  • Page 204: Compaq Alpha And Ibm P Server Mouse Mode Limitation

    Appendix D: Informational Notes Compaq Alpha and IBM P Server Mouse Mode Limitation ® ® When connecting to either Compaq Alpha servers or IBM P servers through the KX II-101-V2, you must use Single Mouse mode. See Working with Target Servers (on page 29).
  • Page 205: Appendix E Faqs

    General FAQs Question Answer What is the difference The Dominion KX II-101-V2 is the latest generation, economically priced between the Dominion KX II- model The V2 supports virtually all the features of the previous 101-V2 and the previous generation KX II-101, plus many exciting additional features. The V2...
  • Page 206: Ipv6 Networking

    Appendix E: FAQs Question Answer What new features are With Release 3.5 (and above), the following features are now available: available in the latest release?  1920x1080 Video Resolution  iPad/iPhone Access (requires CC-SG)  Dual Stack IPv6  FIPS 140-2 Encryption Module ...
  • Page 207 Appendix E: FAQs Question Answer Why does KX II-101-V2 U.S. government agencies and the support IPv6 networking? Department of Defense are now mandated to purchase IPv6-compatible products. In addition, many enterprises and foreign countries, such as China, will be transitioning to IPv6 over the next several years.
  • Page 209: Index

    Index Checking Your Browser for AES Encryption • 135, 136, 137 CLI Commands • 162, 166 9 Pin Pinout • 182 CLI Prompts • 164 CLI Syntax -Tips and Shortcuts • 165 Client Launch Settings • 60 Absolute Mouse Mode • 57 Command Line Interface (CLI) •...
  • Page 210 Index Device Management • 96 Device Services • 100, 163 Diagnostics • 155, 166, 167 IBM AIX Mouse Settings • 12 Disconnect from Virtual Media Drives • 69 Implementing LDAP/LDAPS Remote Disconnecting KVM Target Servers • 42 Authentication • 84, 89 Disconnecting Users from Ports •...
  • Page 211 RADIUS Communication Exchange Modifying an Existing User Group • 78 Specifications • 92 Modifying and Removing Keyboard Macros • Raritan Power Strip Control • 106 Rebooting the KX II-101-V2 • 152 Mounting • 7 Refreshing the Screen • 49 Mounting CD-ROM/DVD-ROM/ISO Images •...
  • Page 212 Index Step 1 Configure the Target Server • 9 Step 2 Version Information - Virtual KVM Client • 63 Configure Network Firewall Settings • 12 Video Properties • 49 Step 3 Video Resolution • 6 Connect the Equipment • 13 View KX II-101-V2 User List •...
  • Page 213: United Kingdom

    For CommandCenter Secure Gateway: Press 6, then Press 2 Phone: +31-10-2844040 Fax: 732-764-8887 Email: tech.europe@raritan.com Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m. GMT China Phone +44(0)20-7090-1390...

Table of Contents