background image

Chapter 8: Device Management 
 

148

 

 

 

Configuring Modem Settings 

 

To configure modem settings:   

1.  Click Device Settings > Modem Settings to open the Modem Settings 

page. 

2.  Select the Enable Modem checkbox. This will enable the Serial Line 

Speed and Modem Init String field. 

3.  The Serial Line Speed of the modem is set to 115200. 

Read-only

 

4.  Enter the initial modem string in the Modem Init String field. If the 

modem string is left blank, the following string is sent to the modem 
by default: ATZ OK AT OK. 

This information is used to configure modem settings. Because 
different modems have different ways of settings these values, this 
document does not specify how to set these values, rather the user 
should refer to the modem to create the appropriate modem-specific 
string. 

a.  Modem Settings: 

  Enable RTS/CTS flow control 

  Send data to the computer on receipt of RTS 

  CTS should be configured to only drop if required by flow 

control. 

  DTR should be configured for Modem resets with DTR 

toggle. 

  DSR should be configured as always on. 

  DCD should be configured as enabled after a carrier signal is 

detected. (that is, DCD should only be enabled when modem 
connection is established with the remote side) 

5.  Enter the IPv4 modem server address in the Modem Server IPv4 

Address field and the client modem address in the Modem Client 
IPv4 Address field. 

Note: The modem client and server IP addresses must be on the 
same subnet and cannot overlap the KX LAN subnet. 

Summary of Contents for DKX2-V2.3.5-0N-E

Page 1: ...Copyright 2011 Raritan Inc DKX2 v2 3 5 0N E March 2011 255 62 4023 00 Dominion KX II User Guide Release 2 3 5...

Page 2: ...s A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a commercial installation This equipment generates us...

Page 3: ...3 Connect the Equipment 27 Step 4 Configure the KX II 29 Valid Special Characters for Target Names 33 Step 5 Optional Configure Keyboard Language 35 Chapter 3 Working with Target Servers 37 Interfaces...

Page 4: ...irtual Media 92 Using Virtual Media via VKC and AKC in a Windows Environment 93 Using Virtual Media 94 File Server Setup File Server ISO Images Only 95 Connecting to Virtual Media 97 Local Drives 97 C...

Page 5: ...t Settings 140 Entering the Discovery Port 141 Configuring and Enabling Tiering 142 Enabling Direct Port Access via URL 146 Enabling the AKC Download Server Certificate Validation 147 Configuring Mode...

Page 6: ...28 Device Diagnostics 230 Chapter 12 Command Line Interface CLI 232 Overview 232 Accessing the KX II Using CLI 233 SSH Connection to the KX II 233 SSH Access from a Windows PC 233 SSH Access from a UN...

Page 7: ...256 Appendix A Specifications 257 Physical Specifications 257 Environmental Requirements 259 Supported Operating Systems Clients 260 Supported CIMs and Operating Systems Target Servers 261 Supported O...

Page 8: ...d Resolutions 295 SUSE VESA Video Modes 295 Supported Video Resolutions Not Displaying 295 USB Ports and Profiles 296 VM CIMs and DL360 USB Ports 296 Help for Choosing USB Profiles 296 Changing a USB...

Page 9: ...ce 310 Ethernet and IP Networking 315 IPv6 Networking 317 Servers 319 Blade Servers 320 Installation 322 Local Port 324 Extended Local Port Dominion KX2 832 and KX2 864 Models Only 326 Power Control 3...

Page 10: ...1 In This Chapter KX II Overview 2 KX II Help 4 KX II Client Applications 5 Virtual Media 6 Product Photos 7 Product Features 9 Terminology 10 Package Contents 12 Chapter 1 Introduction...

Page 11: ...KX II provide the same levels of control of your servers via a web browser The KX II is easily installed using standard UTP Cat 5 5e 6 cabling Its advanced features include virtual media 128 bit encry...

Page 12: ...Chapter 1 Introduction 3...

Page 13: ...on accessing target servers and power strips using virtual media managing users and security and maintaining and diagnosing the KX II A PDF version of the help can be downloaded from the Raritan Firmw...

Page 14: ...Guide also found on the Raritan website Where applicable specific client functions used with the KX II are included in the help KX II Client Applications The following client applications can be used...

Page 15: ...media access of hard drives and remotely mounted images for added flexibility and productivity Virtual media sessions are secured using 128 bit AES or RC4 encryption The D2CIM VUSB CIM and D2CIM DVUS...

Page 16: ...Chapter 1 Introduction 7 Product Photos KX II KX2 832...

Page 17: ...Chapter 1 Introduction 8 KX2 864...

Page 18: ...ws up to 8 users to connect to the KX II at once Multiple user capacity 1 2 4 8 remote users 1 local user UTP Cat5 5e 6 server cabling Dual Ethernet ports 10 100 1000 LAN with failover Field upgradabl...

Page 19: ...virtual media LDAP Active Directory RADIUS or internal authentication and authorization DHCP or fixed IP addressing Smart card CAC authentication SNMP and Syslog management IPv4 and IPv6 support Powe...

Page 20: ...KVM target servers connected to the KX II A USB smart card reader can also be attached to the remote PC and attached to a target server via the KX II CIMS Dongles that connect to each target server or...

Page 21: ...d 1U 2U for DKX2 864 19 rackmount chassis Each KX II device ships with the following contents Amount included Item 1 KX II device 1 KX II Quick Setup Guide 1 Rackmount kit 1 AC power cords 1 Cat5 netw...

Page 22: ...s user name and password See Default Login Information on page 13 Default Login Information Default Value User name The default user name is admin This user has administrative privileges Password The...

Page 23: ...gradients might degrade performance Mouse Settings The KX II operates in several mouse modes Absolute Mouse Mode D2CIM VUSB only Intelligent Mouse Mode do not use an animated mouse Standard Mouse Mod...

Page 24: ...ndows 2003 on your target server if you access the server via KVM and perform any one off the actions listed below mouse synchronization may be lost if it has been previously enabled You will need to...

Page 25: ...o change the following settings HKey_USERS DEFAULT Control Panel Mouse MouseSpeed 0 MouseThreshold 1 0 MouseThreshold 2 0 Windows Vista Settings To configure KVM target servers running Windows Vista o...

Page 26: ...ng to exactly the middle speed Disable the Enhanced pointer precision option Click OK 2 Disable animation and fade effects a Select Control Panel System and Security b Select System and then select Ad...

Page 27: ...remote connections through the KX II This will enable you to keep the target server s slow mouse pointer motion acceleration settings exclusive to the KX II connection Windows XP 2000 and 2008 login p...

Page 28: ...ted to the target server in many Linux graphical environments the Ctrl Alt command will change the video resolution scrolling through all available resolutions that remain enabled in the XF86Config or...

Page 29: ...b controller usb uhci Note If there is another line using usb uhci in the etc modules conf file it needs to be removed or commented out 3 Save the file 4 Reboot the system in order for the changes to...

Page 30: ...at the SUSE Linux login prompt You must be connected to the target server to synchronize the mouse cursors To configure the mouse settings 1 Choose Desktop Control Center The Desktop Preferences dial...

Page 31: ...ip If you do not want to be prompted upon log out follow these procedures instead To make your settings permanent in Linux no prompt 1 Choose Desktop Control Center System Sessions 2 Click the Session...

Page 32: ...otprom mode 2 Issue the following command to change the output resolution setenv output device screen r1024x768x70 3 Issue the boot command to reboot the server You can also contact your Raritan repre...

Page 33: ...nd a GUI resolution Run these commands from the command line Note 1024x768x75 is used as an example here substitute the resolution and refresh rate you are using To check current POST resolution Run t...

Page 34: ...e mouse 1 Go to Launcher 2 Choose Style Manager 3 Click Mouse The Style Manager Mouse dialog appears 4 Use the sliders to set the Mouse acceleration to 1 0 and Threshold to 1 0 5 Click OK To configure...

Page 35: ...le Mac OS X version 10 4 9 and later must be selected from the USB Profile menu or the Port Configuration page Step 2 Configure Network Firewall Settings To access KX II through a network firewall via...

Page 36: ...you only attach one power cord the power LED on the KX II front panel will be red because the system is set to automatically detect both sources See Power Supply Setup on page 157 for information abo...

Page 37: ...Configuration page Note Use both network ports only if you want to use one as a failover port D Local Access Port Local Video Display Keyboard and Mouse For convenient access to target servers while a...

Page 38: ...s also ensure that your target server s video card has been set to output standard VGA H and V sync and not composite sync 3 Attach the keyboard mouse connector of your CIM to the corresponding ports...

Page 39: ...characters in length and can consist of English alphanumeric characters as well as special characters 5 Click Apply 6 You will receive confirmation that the password was successfully changed Click OK...

Page 40: ...checkbox to activate the fields in the section b Enter a Global Unique IP Address This is the IP address assigned to the KX II c Enter the Prefix Length This is the number of bits used in the IPv6 ad...

Page 41: ...tion in configuring this section of the Network Settings page Note In some environments the default LAN Interface Speed Duplex setting Autodetect autonegotiator does not properly set the network param...

Page 42: ...ower supplies and can automatically detect and provide notification regarding the status of these power supplies Proper configuration ensures that the KX II sends the appropriate notifications should...

Page 43: ...s website www raritan com under Support Note The remainder of this help applies primarily to deploying the KX II device s without the integration functionality of CC SG Remote Authentication Note to C...

Page 44: ...users Step 5 Optional Configure Keyboard Language Note This step is not required if you are using the US International language keyboard If you are using a non US language the keyboard has to be confi...

Page 45: ...Chapter 2 Installation and Configuration 36 5 Shut down the device and power on once again The DCIM SUSB performs a reset power cycle 6 Verify that the characters are correct...

Page 46: ...Multi Platform Client MPC The following table identifies these interfaces and their use for target server access and administration locally and remotely User Interface Local Remote Access Admin Acces...

Page 47: ...Console KX II Remote Console Interface The KX II Remote Console is a browser based graphical user interface that allows you to log in to KVM target servers and serial targets connected to the KX II a...

Page 48: ...er or Firefox 3 Type the following URL http IP ADDRESS where IP ADDRESS is the IP address assigned to your KX II You can also use https the DNS name of the KX II assigned by the administrator provided...

Page 49: ...lection The options are organized into various tabs After successful login the Port Access page opens listing all ports along with their status and availability Three tabs are provided on the page all...

Page 50: ...ays the time the session has been idle Always Your IP The IP address used to access the KX II Always Last Login The last login date and time Always Under CC SG Management The IP address of the CC SG d...

Page 51: ...II Always Help User Guide Links to online help Always Favorite Devices See Managing Favorites on page 46 Always FIPS Mode FIPS Mode EnabledSSL Certificate FIPS Mode Compliant When FIPS is enabled KX I...

Page 52: ...lade chassis at the root of the hierarchy and the individual blades labeled and displayed below the root Use the Expand Arrow icon next to the root chassis to display the individual blades Note To vie...

Page 53: ...the Port Action menu Connect Creates a new connection to the target server For the KX II Remote Console a new Virtual KVM Client see Virtual KVM Client VKC on page 51 page appears For the KX II Local...

Page 54: ...hrough the associated outlets This option is visible only when there are one or more power associations to the target when the target power is on port status is up and when user has permission to oper...

Page 55: ...ckly access frequently used devices List your favorites either by Device Name IP Address or DNS hostname Discover KX II devices on its subnet before and after login Retrieve discovered KX II devices f...

Page 56: ...add edit and delete devices from your list of favorites To open the Favorites List page Choose Manage Favorites List The Favorites List page opens Discovering Devices on the Local Subnet This option d...

Page 57: ...y from this the Subnet page or add them to your list of favorites See Favorites List Page on page 47 This feature allows multiple KX II devices to interoperate and scale automatically The KX II Remote...

Page 58: ...II device 2 Click the Edit button The Edit page appears 3 Update the fields as necessary Description IP Address Host Name Type the IP address of the KX II device Port if necessary Product Type 4 Click...

Page 59: ...s Note The default port for a SOCKS proxy 1080 is different from HTTP proxy 3128 2 Click OK at each dialog to apply the settings 3 Next configure the proxies for Java applets by selecting Control Pane...

Page 60: ...windows can be minimized maximized and moved around your computer desktop Note Refreshing your HTML browser closes the Virtual KVM Client connection so exercise caution Note If you are using Firefox 3...

Page 61: ...fresh of the video screen Auto sense Video Settings Forces a refresh of the video settings resolution refresh rate Smart Card Opens a dialog that allows you to select from a list of smart card readers...

Page 62: ...ese features are available only when you have made power associations To power cycle a KVM target server 1 From the KX II Remote Console click the Port Access tab The Port Access page opens 2 Click th...

Page 63: ...rent profile the USB profile from the last connection is used You are alerted to the use of a profile other than the preferred profile by a warning similar to the following After you have connected to...

Page 64: ...for different operating environments Connection properties are saved across subsequent connections to generation 2 devices once they are set and saved To set the connection properties 1 Choose Connect...

Page 65: ...ansmitted to remote users in order to maximize usability in all bandwidths 15 bit RGB Color 8 bit RGB Color 4 bit Color 4 bit Gray 3 bit Gray 2 bit Gray Black and White Important For most administrati...

Page 66: ...n RFB protocol version To copy this information Click Copy to Clipboard The information is available to be pasted into the program of your choice Keyboard Options Keyboard Macros Keyboard macros ensur...

Page 67: ...file 2 Click on the macro file and click Open to import the macro a If too many macros are found in the file an error message is displayed and the import terminates once OK is selected b If the import...

Page 68: ...the macro in the field and click OK The dialog closes and the process proceeds If the name that is entered is a duplicate of a macro an alert appears and you are required to enter another name for th...

Page 69: ...Macro Name field This name appears in the Keyboard menu after it is created 4 From the Hot Key Combination field select a keyboard combination from the drop down list This allows you to execute the m...

Page 70: ...teps in the sequence click the step and then click the up or down arrow buttons to reorder them as needed 9 Click OK to save the macro Click Clear to clear all field and start over When you click OK t...

Page 71: ...g Keyboard Macros To modify a macro 1 Choose Keyboard Keyboard Macros The Keyboard Macros dialog appears 2 Choose the macro from among those listed 3 Click Modify The Add Edit Macro dialog appears 4 M...

Page 72: ...Color command calibrates the video to enhance the colors being displayed In addition you can manually adjust the settings using the Video Settings command To refresh the video settings do one of the f...

Page 73: ...e settings the effects are immediately visible a Noise Filter The device can filter out the electrical interference of video output from graphics cards This feature optimizes picture quality and reduc...

Page 74: ...and you may not be able to return to the previous state Contact Raritan Technical Support before making any changes j Horizontal Offset Controls the horizontal positioning of the target server displa...

Page 75: ...Servers 66 Note Some Sun background screens such as screens with very dark borders may not center precisely on certain Sun servers Use a different background or place a lighter colored icon in the up...

Page 76: ...this screenshot to a file location of your choosing as a bitmap JPEG or PNG file To take a screenshot of the target server 1 Select Video Screenshot from Target or click the Screenshot from Target bu...

Page 77: ...the Plug and Play dialog 2 Click on the Monitor tab 3 Set the Screen refresh rate 4 Click OK and then OK again to apply the setting Mouse Options When controlling a target server the Remote Console d...

Page 78: ...these two modes single mouse and dual mouse Mouse Synchronization Tips Be sure to follow these steps when configuring mouse synchronization 1 Verify that the selected video resolution and refresh rate...

Page 79: ...erver mouse pointer with Virtual KVM Client mouse pointer To synchronize the mouse do one of the following Choose Mouse Synchronize Mouse or click the Synchronize Mouse button in the toolbar Note This...

Page 80: ...shape should be normal and not animated The target mouse speeds should not be set to very slow or very high values Advanced mouse properties such as Enhanced pointer precision or Snap mouse to default...

Page 81: ...ute Note The absolute mouse setting requires a USB target system and is the recommended mouse setting for KX II 101 Note For KX II devices Absolute Mouse Synchronization is available for use with the...

Page 82: ...Single Double Mouse Cursor button in the toolbar To exit single mouse mode 1 Press Ctrl Alt O on your keyboard to exit single mouse mode VKC Virtual Media See the chapter on Virtual Media for complete...

Page 83: ...e is enabled on the device multiple users can share access to a target server However when a smart card reader is connected to a target the device will enforce privacy regardless of the PC Share mode...

Page 84: ...Smart Card Reader dialog Click Refresh List if a new smart card reader has been attached to the client PC To send smart card remove and reinsert notifications to the target Select the smart card read...

Page 85: ...Logging checkbox only if directed to by Technical Support This option creates a log file in your home directory 3 Choose the Keyboard Type from the drop down list if necessary The options include US...

Page 86: ...covers as much screen area as possible and scroll bars are added if needed Select Full Screen to open the window in full screen mode a To configure the monitor on which the target viewer is launched...

Page 87: ...ings Control Center Belgian Keyboard Indicator Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Keyboard Indicator Hungarian System Settings Control Center Spanish System Settings Contro...

Page 88: ...isplayed and acquires the same resolution as the target server The hot key used for exiting this mode is specified in the Options dialog the default is Ctrl Alt M While in Full Screen mode moving your...

Page 89: ...nments without the use of the Java Runtime Environment JRE which is required to run Raritan s Virtual KVM and Multi Platform clients AKC also works with CC SG AKC and VKC share similar features with t...

Page 90: ...Windows Vista operating system up to 64 bit Windows 7 operating system up to 64 bit Note You must be using Windows 7 if WINDOWS PC FIPs is turned on and you are accessing a target using AKC and a sma...

Page 91: ...om the CC SG Admin Client you must have JRE 1 6 0_10 or above Multi Platform Client MPC Raritan Multi Platform Client MPC is a graphical user interface for the Raritan product lines providing remote a...

Page 92: ...n window type a device Description specify a Connection Type add the device IP address and click OK These specifications can be edited later 3 In the Navigator panel on the left of the page double cli...

Page 93: ...te port access permissions In the case of tiered configurations the Powerstrip page will display both rack PDUs attached to the base and tiered KX IIs for which the user has been granted appropriate p...

Page 94: ...wn Additionally information relating to the currently selected power strip is displayed If no power strips are connected to the KX II a message stating No powerstrips found will be displayed in the Po...

Page 95: ...rned on and its state will be displayed as on To turn an outlet off 1 Click Off 2 Click OK on the Power Off dialog 3 Click OK on the Power Off confirmation dialog The outlet will be turned off and its...

Page 96: ...pter 4 Rack PDU Power Strip Outlet Control 87 2 Click OK The outlet will then cycle note that this may take a few seconds 3 Once the cycling is complete the dialog will open Click OK to close the dial...

Page 97: ...r Using Virtual Media 92 Using Virtual Media via VKC and AKC in a Windows Environment 93 Using Virtual Media 94 File Server Setup File Server ISO Images Only 95 Connecting to Virtual Media 97 Disconne...

Page 98: ...le support via virtual media files are supported by virtual media via a USB connection Virtual media can include internal and USB mounted CD and DVD drives USB mass storage devices PC hard drives and...

Page 99: ...Chapter 5 Virtual Media 90...

Page 100: ...Chapter 5 Virtual Media 91 Diagram key Desktop PC CD DVD drive KX II USB mass storage device CIM PC hard drive Target server Remote file server ISO images...

Page 101: ...Dominion Device For users requiring access to virtual media the device permissions must be set to allow access to the relevant ports as well as virtual media access VM Access port permission for those...

Page 102: ...rosoft help for additional information on these features and how to use them Following is a list virtual media types users can access via VKC and AKC when running in a Windows environment The features...

Page 103: ...rk 2 Open a KVM session with the appropriate target server a Open the Port Access page from the Remote Console b Connect to the target server from the Port Access page Click the Port Name for the appr...

Page 104: ...down lists in the Map Virtual Media CD ISO Image dialog See CD ROM DVD ROM ISO Images on page 99 To designate file server ISO images for virtual media access 1 Choose Virtual Media from the Remote Co...

Page 105: ...rname and password If this occurs disable Microsoft Network Server Digitally Sign Communications Note You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limi...

Page 106: ...redirecting another virtual media device If other users are connected to the same target server they must also close their connections to the target server Note In the KX II 2 3 0 and above when you m...

Page 107: ...o the same drive from more than one entity can result in data corruption If you do not require Write access leave this option unselected 4 Click Connect The media will be mounted on the target server...

Page 108: ...nd external CD ROM or DVD ROM drives a Choose the Local CD DVD Drive option b Choose the drive from the Local CD DVD Drive drop down list All available internal and external CD and DVD drive names wil...

Page 109: ...ed files Files may not appear until a sync is performed Note If you are using the Windows 7 operating system Removable Disk is not displayed by default in the Window s My Computer folder when you moun...

Page 110: ...n operating at the BIOS level USB profiles are configured on the Device Settings Port Configuration Port page of the KX II Remote and Local Consoles A device administrator can configure the port with...

Page 111: ...s described in Upgrading CIMs on page 217 See Computer Interface Modules CIMs for additional information Available USB Profiles The current release of the KX II comes with the selection of USB profile...

Page 112: ...as a bootable device PowerEdge 750 850 860 1850 2850 SC1425 BIOS requires D2CIM DVUSB with Generic profile to support virtual media Use BIOS Dell PowerEdge 1950 2950 2970 6950 R200 or Generic profile...

Page 113: ...HP Proliant DL145 PhoenixBIOS during OS installation Restrictions USB bus speed limited to full speed 12 MBit s BIOS HP Compaq DC7100 DC7600 BIOS HP Compaq DC7100 DC7600 Use this profile to boot the...

Page 114: ...OS Restrictions Absolute mouse synchronization not supported Virtual CD ROM and disk drives cannot be used simultaneously Generic The generic USB profile resembles the behavior of the original KX2 rel...

Page 115: ...9 and later Mac OS X version 10 4 9 and later This profile compensates the scaling of mouse coordinates introduced in recent versions of Mac OS X Select this if the remote and local mouse positions g...

Page 116: ...Keyboard and Mouse Type 1 USB bus speed limited to full speed 12 MBit s Virtual CD ROM and disk drives cannot be used simultaneously WARNING USB enumeration will trigger whenever virtual media is con...

Page 117: ...assign to a KVM port based on the characteristics of the KVM target server it connects to You assign USB profiles to a KVM port in the Device Settings Port Configuration Port page in either the KX II...

Page 118: ...figure the mouse to work at the Boot menu 1 Reboot the Mac and press the Option key during the reboot to open the Boot menu The mouse will not respond at this point 2 Select Intelligent Mouse mode and...

Page 119: ...nal factory default user is a member of this group and has the complete set of system privileges In addition the Admin user must be a member of the Admin group Unknown This is the default group for us...

Page 120: ...List page opens Relationship Between Users and Groups Users belong to a group and groups have privileges Organizing the various users of your KX II into groups saves time by allowing you to manage per...

Page 121: ...ing to this group See Setting Permissions on page 114 4 Set the port permissions Specify the server ports that can be accessed by users belonging to this group and the type of access See Setting Port...

Page 122: ...nt 113 Note Several administrative functions are available within MPC and from the KX II Local Console These functions are available only to members of the default Admin group Note Both IPv4 and IPv6...

Page 123: ...sed on KX II authentication settings Note The Admin user group has this permission by default Device Settings Network settings date time settings port configuration channel names power associations ev...

Page 124: ...rver port you can specify the access type the group has as well as the type of port access to the virtual media and the power control Please note that the default setting for all permissions is Deny P...

Page 125: ...idual user group 1 Locate the group from among the groups listed Individual groups can be identified by the in the Group Name 2 Click the Group Name The Group page opens 3 Select the appropriate permi...

Page 126: ...les list Repeat steps 1 through 4 for each rule you want to enter To insert a rule 1 Enter a rule number A rule number is required when using the Insert command 2 Enter the Starting IP and Ending IP f...

Page 127: ...an existing user group 1 From the Group page change the appropriate fields and set the appropriate permissions 2 Set the Permissions for the group Select the checkboxes before the permissions you want...

Page 128: ...ch a base KX II device is used to access multiple other tiered devices users will need permission to access the base device and permissions to access each individual tiered device as needed When users...

Page 129: ...in the Password field and retype the password in the Confirm Password field up to 64 characters 5 Choose the group from the User Group drop down list The list contains all groups you have created in a...

Page 130: ...r List page by choosing User Management User List or click the Connected User link in the left panel of the page 2 Locate the user from among those listed on the User List page and select the checkbox...

Page 131: ...en remote authentication LDAP LDAPS or RADIUS is selected if the user is not found the local authentication database will also be checked To configure authentication 1 Choose User Management Authentic...

Page 132: ...address or DNS name of your LDAP LDAPS remote authentication server up to 256 characters When the Enable Secure LDAP option is selected and the Enable LDAPS Server Certificate Validation option is sel...

Page 133: ...or for the appropriate values to enter into these fields 10 Enter the Distinguished Name of the Administrative User in the DN of Administrative User field up to 64 characters Complete this field if yo...

Page 134: ...rs LDAP LDAP Secure 12 Select the Enable Secure LDAP checkbox if you would like to use SSL This will enable the Enable LDAPS Server Certificate Validation checkbox Secure Sockets Layer SSL is a crypto...

Page 135: ...tificate File This field is enabled when the Enable Secure LDAP option is selected Consult your authentication server administrator to get the CA certificate file in Base64 encoded X 509 format for th...

Page 136: ...nistered through the standard KX II policies and user group privileges that are applied locally to AD user groups IMPORTANT If you are an existing Raritan Inc customer and have already configured the...

Page 137: ...ication protocol 1 Click User Management Authentication Settings to open the Authentication Settings page 2 Click the RADIUS radio button to enable the RADIUS section of the page 3 Click the icon to e...

Page 138: ...ication Type from among the options in the drop down list PAP With PAP passwords are sent as plain text PAP is not interactive The user name and password are sent as one data package once a connection...

Page 139: ...ents Add edit users Required Network Resources Users and Identity Stores Internal Identity Stores Users Configure Default Network access to enable CHAP Protocol Optional Policies Access Services Defau...

Page 140: ...al Back Number is the number associated with the user account that the KX II modem will use to dial back to the user account RADIUS Communication Exchange Specifications The KX II sends the following...

Page 141: ...atus 40 Stop 2 Stops the accounting NAS Port Type 61 VIRTUAL 5 for network connections NAS Port 5 Always 0 NAS IP Address 4 The IP address for the KX II User Name 1 The user name entered at the login...

Page 142: ...Chapter 7 User Management 133 User Authentication Process Remote authentication follows the process specified in the flowchart below...

Page 143: ...w password in the Confirm New Password field Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and special characters 4 Click OK 5 You will receive conf...

Page 144: ...e the KX II is part of your network infrastructure you most likely do not want its IP address to change frequently This option allows you to set the network parameters DHCP With this option the IP add...

Page 145: ...the Preferred DHCP Host Name if DHCP is selected from the IP Auto Configuration drop down e Select the IP Auto Configuration The following options are available None Static IP This option requires tha...

Page 146: ...P configuration Router Discovery Use this option to automatically assign IPv6 addresses that have Global or Unique Local significance beyond that of the Link Local which only applies to a directly con...

Page 147: ...the network parameters which results in network issues In these instances setting the KX II LAN Interface Speed Duplex field to 100 Mbps Full Duplex or whatever option is appropriate to your network a...

Page 148: ...rt fails Note Because a failover port is not activated until after a failover has actually occurred Raritan recommends that you not monitor the port or monitor it only after a failover occurs When thi...

Page 149: ...he Device Service Settings page opens 2 Select Enable SSH Access 3 Enter the SSH Port information The standard SSH TCP port number is 22 but the port number can be changed to provide a higher level of...

Page 150: ...figure it to use any TCP port except 80 and 443 To access the KX II from beyond a firewall your firewall settings must enable two way communication through the default Port 5000 or a non default port...

Page 151: ...Local Port Settings page Once devices are enabled and configured they appear on the Port Access page Port Access Page on page 43 When a KX II is configured to function as a base device or tiered devic...

Page 152: ...he Device Service Settings page appears 2 Select Enable Tiering as Base 3 In the Base Secret field enter the secret shared between the base and the tiered devices This secret is required for the tiere...

Page 153: ...that are currently on but you cannot power cycle outlets that are currently off KX II to KX II or KXII 8xx Local Port Configuration Compatible CIMS The following CIMS are compatible when you are conf...

Page 154: ...ase device to the tier KX II Local Access port video keyboard mouse ports using a D2CIM DVUSB If the tier device is a KX2 832 or KX2 864 connect from a target server port on the base device directly t...

Page 155: ...and password are optional If they are not provided a login dialog will be displayed and after being authenticated the user will be directly connected to the target The port may be a port number or po...

Page 156: ...istrators must upload a valid certificate to the device or generate a self signed certificate on the device The certificate must have a valid host designation Each user must add the CA certificate or...

Page 157: ...is document does not specify how to set these values rather the user should refer to the modem to create the appropriate modem specific string a Modem Settings Enable RTS CTS flow control Send data to...

Page 158: ...C Generation 2 Devices in the KVM and Serial Access Clients Guide Note Modem access directly to the KX II HTML interface is not supported You must use standalone MPC to access the KX II via modem Conf...

Page 159: ...ually For the User Specified Time option enter the date and time For the time use the hh mm format using a 24 hour clock Synchronize with NTP Server Choose this option to synchronize the date and time...

Page 160: ...elds type the SNMP agent s name that is the device s name as it appears in the KX II Console interface a contact name related to this device and where the Dominion device is physically located 4 Type...

Page 161: ...Device Management 152 3 Click OK To reset to factory defaults Click Reset To Defaults Note Both IPv4 and IPv6 addresses are supported Note IPv6 addresses cannot exceed 80 characters in length for the...

Page 162: ...log Forwarding option is selected Both of these options are in the Event Management Settings page See Configuring Event Management Settings To select events and their destinations 1 Choose Device Sett...

Page 163: ...Chapter 8 Device Management 154 3 Click OK...

Page 164: ...rap Name Description bladeChassisCommError A communications error with blade chassis device connected to this port was detected Note Not supported by the KX II 101 configBackup The device configuratio...

Page 165: ...to reboot either through cycling power to the system or by a warm reboot from the OS securityViolation Security violation startCCManagement The device has been put under CommandCenter Management stopC...

Page 166: ...n regarding the status of these power supplies Use the Power Supply Setup page to specify whether you are using one or both of the power supplies Proper configuration ensures that the KX II sends the...

Page 167: ...displayed in blue and can be edited For ports with no CIM connected or with a blank CIM name a default port name of Dominion KX2_Port is assigned where Port is the number of the KX II physical port T...

Page 168: ...vers if you have not already done so See Step 3 Connect the Equipment for a description of connecting the equipment 2 Choose Device Settings Port Configuration The Port Configuration page opens 3 Clic...

Page 169: ...user groups to see the KVM switch that you create you must first create the switch and then create the group If an existing user group needs to see the KVM switch you are creating you must recreate t...

Page 170: ...d Once Active is selected the URL field is required The username password username field and password field are optional depending on whether single sign on is desired or not b URL Name Enter the URL...

Page 171: ...e connected to the KX II using the D2CIM PWR CIM To connect the rack PDU 1 Connect the male RJ 45 of the D2CIM PWR to the female RJ 45 connector on the serial port of the rack PDU 2 Connect the female...

Page 172: ...ed for each outlet on the rack PDU Outlet Number Name and Port Association Use this page to name the rack PDU and its outlets All names can be up to 32 alphanumeric characters and can include special...

Page 173: ...Chapter 8 Device Management 164 3 Click OK...

Page 174: ...server from the Port Access page To use this feature you will need Raritan remote rack PDU s Power CIMs D2CIM PWR To make power associations associate rack PDU outlets to KVM target servers Note When...

Page 175: ...a rack PDU association 1 Select the appropriate rack PDU from the Power Strip Name drop down list 2 For that rack PDU select the appropriate outlet from the Outlet Name drop down list 3 From the Outle...

Page 176: ...ust be configured with the blade chassis model The specific information you are able to configure for a blade server will depend on the brand of blade server you are working with For specific informat...

Page 177: ...n Blade chassis can be managed from the Virtual KVM Client VKC the Active KVM Client AKC Raritan s Multi Platform Client MPC and CC SG Managing blade severs via VKC AKC and MPC is the same as managing...

Page 178: ...ord Not applicable 7 Change the blade chassis name if needed 8 Indicate the blades that are installed in the blade chassis by checking the Installed checkbox next to each slot that has a blade install...

Page 179: ...t 720x400 Compensation if you are experiencing display issues when the target is using this resolution 12 Select Use international keyboard for scan code set 3 if connecting to the target with a DCIM...

Page 180: ...o discovery mode d Port Number The default port number for the blade chassis is 22 Change the port number if applicable Required for auto discovery mode e Username Enter the username used to access th...

Page 181: ...ge 186 for sample configurations for the Dell M1000e c Username Enter the username used to access the interface d Password Enter the password used to access the interface Note Leave the username and p...

Page 182: ...Managed Links section of the page you are able to configure the connection to a blade chassis web browser interface if one is available Click the Blade Chassis Managed Links icon to expand the section...

Page 183: ...uring the blade chassis 1 Connect the blade chassis to the KX II See Step 3 Connect the Equipment for details 2 Select Device Settings Port Configuration to open the Port Configuration page 3 On the P...

Page 184: ...e chassis by checking the Installed checkbox next to each slot that has a blade installed Alternatively use the Select All checkbox If needed change the blade server names If operating in Auto discove...

Page 185: ...icon to expand these sections of the page See Configuring USB Profiles Port Page on page 187 7 Click OK to save the configuration To configure a IBM BladeCenter Other 1 If you selected IBM BladeCente...

Page 186: ...or sample configurations for the IBM BladeCenter c Username Enter the username used to access the interface d Password Enter the password used to access the interface Note Leave the username and passw...

Page 187: ...which the web application expects to read the username and password Follow these examples for correct formats http s 192 168 1 1 login asp http s www example com cgi login http s example com home htm...

Page 188: ...p Ports connected to integrated KVM modules in a blade chassis are configured as blade chassis subtypes These ports are eligible to be included in port groups When KX II ports are connected to integra...

Page 189: ...is especially important to CC SG users who want HP blades to be organized on a chassis basis although each blade has its own connection to a port on the KX II 5 Click on a port in the Available box in...

Page 190: ...e selected on the Port Configuration page from the Blade Server Chassis Model drop down which appears when the Blade Chassis radio button is selected For details on how to configure each blade chassis...

Page 191: ...he Virtual Media menu is disabled on the client DCIM PS2 DCIM USBG2 Dell PowerEdge 1855 Includes one of the three KVM modules Analog KVM Ethernet switch module standard Digital Access KVM switch modul...

Page 192: ...ic procedures by connecting video and USB devices directly to the server blade Source HP ProLiant BL480c Server Blade Maintenance and Service Guide DCIM USBG2 D2CIM VUSB D2CIM DVUSB for standard KVM p...

Page 193: ...ssis as well as providing the local KVM function Source IBM BladeCenter Products and Technology DCIM USBG2 Note In order to support Auto discovery IBM BladeCenter Models H and E must use AMM with firm...

Page 194: ...the iKVM GUI display upon connecting to the blade chassis set the Screen Delay Time to 8 seconds Recommend that Timed and Displayed be selected during iKVM GUI Flag Setup This will allow you to visua...

Page 195: ...of the unit This will require a USB extension cable Note All IBM BladeCenters that use AMM must use AMM firmware version BPET36K or later to work with the KX II Note In the case of IBM Blade Center M...

Page 196: ...the left The profiles selected for use with a port appear in the Selected list on the right When you select a profile in either list a description of the profile and its use appears in the Profile De...

Page 197: ...ting the available profiles for a port choose one from the Preferred Profile for Port menu The default is Generic The selected profile will be used when connecting to the KVM target server You can cha...

Page 198: ...r a KVM target server connected to this port To apply a profile selection to multiple ports 1 In the Apply Selected Profiles to Other Ports section select the Apply checkbox for each KVM port you want...

Page 199: ...a delay of 2 3 seconds when switching to a target via the local port To configure the local port settings Note Some changes you make to the settings on the Local Port Settings page will restart the b...

Page 200: ...ype from among the options in the drop down list The browser will be restarted when this change is made US US International United Kingdom French France German Germany JIS Japanese Industry Standard S...

Page 201: ...ect Key Examples on page 249 for examples of connect key sequences 8 Set the Video Switching Delay from between 0 5 seconds if necessary Generally 0 is used unless more time is needed certain monitors...

Page 202: ...der CC SG management from within CC SG You will then be able to check this checkbox Note In order to use the standard local port and extended local port while the KX II is under CC SG management Ignor...

Page 203: ...ce a delay of 2 3 seconds when switching to a target via the Local port You must have Administrator privileges to configure these options To access a port you only need to enter your username and pass...

Page 204: ...lf signed Java applet certificates are signed by a VeriSign certificate Encryption guarantees that your information is safe from eavesdropping and these certificates ensure that you can trust that the...

Page 205: ...tation When selected only one login per user name is allowed at any time When deselected a given user name password combination can be connected into the device from several client workstations simult...

Page 206: ...the amount of time you specify in the After 1 365 minutes field If there is no activity from the keyboard or mouse all sessions and all resources are logged out If a virtual media session is in progre...

Page 207: ...validation is enforced When selected the following fields are enabled and required Field Description Minimum length of strong password Passwords must be at least 8 characters long The default is 8 bu...

Page 208: ...riteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts The three options are mutually exclusive Option Description Disabled The default...

Page 209: ...and the default is 5 minutes Note Users in the role of Administrator are exempt from the timer lockout settings Deactivate User ID When selected this option specifies that the user will be locked out...

Page 210: ...on The KX II autonegotiates to the highest level of encryption possible You must select Auto in order for the device and client to successfully negotiate the use of FIPS compliant algorithms RC4 Secur...

Page 211: ...age 204 for information on enabling FIPS 140 2 4 PC Share Mode Determines global concurrent remote KVM access enabling up to eight remote users to simultaneously log into one KX II and concurrently vi...

Page 212: ...pports AES 256 If you do not know if your browser uses AES check with the browser manufacturer or navigate to the https www fortify net sslcheck html website using the browser with the encryption meth...

Page 213: ...ll be displayed in the Device Information section in the left panel of the screen For additional security you can also create a new Certificate Signing Request once FIPS mode is activated This will be...

Page 214: ...packets being sent from disallowed IP addresses The IP access control is global affecting the KX II as a whole but you can also control access to your device at the group level See Group Based IP ACL...

Page 215: ...ss and subnet mask in the IPv4 Mask or IPv6 Prefix Length field 3 Choose the Policy from the drop down list 4 Click Insert If the rule you just typed equals an existing rule the new rule is placed ahe...

Page 216: ...riginator of the CSR The CA then returns a certificate containing its signature to the originator The certificate bearing the signature of the well known CA is used to vouch for the identity of the pr...

Page 217: ...f the Challenge Password i Email The email address of a contact person that is responsible for the KX II and its security j Key length The length of the generated key in bits 1024 is the default k Sel...

Page 218: ...eement before they can access the KX II The information provided in a security banner will be displayed in a Restricted Service Agreement dialog after users access KX II using their login credentials...

Page 219: ...e entered or uploaded from a text file To do this do one of the following a Edit the text by manually typing in the text box Click OK b Upload the information from txt file by selecting the Restricted...

Page 220: ...ed first The Audit Log provides the following information Date The date and time that the event occurred based on a 24 hour clock Event The event name as listed in the Event Management page Descriptio...

Page 221: ...itan Technical Support To view information about your KX II and CIMs Choose Maintenance Device Information The Device Information page opens The following information is provided about the KX II Model...

Page 222: ...w KX II You can also set up one KX II and copy its configuration to multiple KX II devices To access the Backup Restore page Choose Maintenance Backup Restore The Backup Restore page opens Note Backup...

Page 223: ...tion specified b Once saved locate the file and right click on it Select properties c In general tab click Change and select WordPad To restore your KX II WARNING Exercise caution when restoring your...

Page 224: ...This option includes only user and group information This option does not restore the certificate and the private key files Use this option to quickly set up users on a different KX II Device Setting...

Page 225: ...t page opens To upload a custom profile to your KX II 1 Click the Browse button A Choose File dialog appears 2 Navigate to and select the appropriate custom profile file and click Open The file select...

Page 226: ...CIMs using the firmware versions stored in the memory of your KX II device In general all CIMs are upgraded when you upgrade the device firmware using the Firmware Upgrade page In order to make use o...

Page 227: ...result in damage to the unit or CIMs To upgrade your KX II unit 1 Locate the appropriate Raritan firmware distribution file RFP on the Raritan website http www raritan com on the Firmware Upgrades web...

Page 228: ...d as well Note At this point connected users are logged out and new login attempts are blocked 7 Click Upgrade Please wait for the upgrade to complete Status information and progress bars are displaye...

Page 229: ...modem Note If you are using a tiered configuration in which a base KX II device is used to access multiple other tiered devices you may receive a low memory error during a firmware upgrade if you have...

Page 230: ...ined by clicking the show link for an upgrade The CIM information provided is Type The type of CIM Port The port where the CIM is connected User The user who performed the upgrade IP IP address firmwa...

Page 231: ...Chapter 10 Maintenance 222 To reboot your KX II 1 Choose Maintenance Reboot The Reboot page opens 2 Click Reboot You are prompted to confirm the action Click Yes to proceed with the reboot...

Page 232: ...st have the appropriate permissions to end CC SG management of the KX II Additionally the Stop CC SG Management option will not be provided unless you are currently using CC SG to manage the KX II To...

Page 233: ...Chapter 10 Maintenance 224 3 Click Yes to remove the device CC SG management Once CC SG management has ended a confirmation will be displayed...

Page 234: ...about the status of your network interface To view information about your network interface Choose Diagnostics Network Interface The Network Interface page opens The following information is displaye...

Page 235: ...cs about your network interface To view statistics about your network interface 1 Choose Diagnostics Network Statistics The Network Statistics page opens 2 Choose the appropriate option from the Optio...

Page 236: ...1 Diagnostics 227 Interfaces Produces a page similar to the one displayed here Route Produces a page similar to the one displayed here 3 Click Refresh The relevant information is displayed in the Resu...

Page 237: ...ame or IP address into the IP Address Host Name field Note The host name cannot exceed 232 characters in length 3 Click Ping The results of the ping are displayed in the Result field Note Both IPv4 an...

Page 238: ...racters in length 3 Choose the maximum hops from the drop down list 5 to 50 in increments of 5 4 Click Trace Route The trace route command is executed for the given hostname or IP address and the maxi...

Page 239: ...r a snapshot of diagnostics messages from the KX II device to the client This encrypted file is then sent to Raritan Technical Support Only Raritan can interpret this file Note This page is accessible...

Page 240: ...s 231 a Click the Save to File button The File Download dialog opens b Click Save The Save As dialog box opens c Navigate to the desired directory and click Save d Email this file as directed by Rarit...

Page 241: ...the KX II network interface and perform diagnostic functions provided you have the appropriate permissions to do so The following figures describe an overview of the CLI commands See CLI Commands on...

Page 242: ...www netspace org ssh OpenSSH Client www openssh org http www openssh org SSH Connection to the KX II Use any SSH client that supports SSHv2 to connect to the KX II You must enable SSH access from the...

Page 243: ...nter the following command ssh l admin 192 168 30 222 The Password prompt appears See Logging In on page 234 Note Both IPv4 and IPv6 addresses are supported Logging In To log in enter the user name ad...

Page 244: ...he following Navigation of the CLI on page 235 section perform the Initial Configuration tasks Navigation of the CLI Before using the CLI it is important to understand CLI navigation and syntax There...

Page 245: ...to show current settings for the command Typing a question mark after a command produces help for that command A pipe symbol indicates a choice within an optional or required set of keywords or argum...

Page 246: ...from the network 1 Reset the administrator password All KX II devices are shipped with the same default password Therefore to avoid security breaches it is imperative that you change the admin passwor...

Page 247: ...ed to be performed again if this is done The KX II now has the basic configuration and can be accessed remotely via SSH GUI or locally using the local serial port The administrator needs to configure...

Page 248: ...meters logout Logout of the current CLI session name Device name configuration quit Return to previous menu stop Return to the root menu Security Issues Elements to consider when addressing security f...

Page 249: ...face ipauto none dhcp ip ipaddress mask subnetmask gw ipaddress mode mode Set Get ethernet parameters ipauto none dhcp IP auto configuration none dhcp ip ipaddress IP Address mask subnetmask Subnet Ma...

Page 250: ...devicename hostname hostname Device name configuration devicename devicename Device Name hostname hostname Preferred host name DHCP only Name Command Example The following command sets the network na...

Page 251: ...browser based graphical user interface for quick convenient switching between servers The KX II Local Console provides a direct analog connection to your connected servers which provides the same perf...

Page 252: ...ntication In order to use the KX II Local Console you must first authenticate with a valid username and password The KX II provides a fully integrated authentication and security scheme whether your a...

Page 253: ...logged out depending on how the card removal policy has been setup on the target server OS When the KVM session is terminated either because it has been closed or because you switch to a new target t...

Page 254: ...e disabled The extended local port does not support smart card authentication Local Console USB Profile Options From the USB Profile Options section of the Tools page you can choose from the available...

Page 255: ...e for the port 3 Click OK The USB profile will be applied to the local port and will appear in the Profile In Use field Available Resolutions The KX II Local Console provides the following resolutions...

Page 256: ...lay the individual blades Note To view the blade chassis in a hierarchal order blade chassis subtypes must be configured for the blade server chassis If you are using a tiered configuration in which a...

Page 257: ...t be among those listed resulting in gaps in the Port Number sequence Port Name The name of the KX II port Initially this is set to Dominion KX2 Port but you can change the name to something more desc...

Page 258: ...from a target and return to the local port GUI A connect key is used to connect to a target or switch between targets The Local Port hot key allows you to rapidly access the KX II Local Console user...

Page 259: ...from a target and return to the local port GUI Disconnect from target port 5 slot 11 and return to the local port GUI the page from which you connected to target Double Click Scroll Lock Special Sun K...

Page 260: ...hot key is to press the Scroll Lock key twice rapidly This key combination can be changed in the Local Port Settings page See KX II Local Console Local Port Settings To return to the KX II Local Conso...

Page 261: ...rking in If a browser restart will occur when a setting is changed it is noted in the steps provider here 1 Choose Device Settings Local Port Settings The Local Port Settings page opens 2 Choose the a...

Page 262: ...the local port GUI The connect key works for both standard servers and blade chassis Once the local port connect key is created it will appear in the Navigation panel of the GUI so you can use it as...

Page 263: ...ed mode on local port checkbox if you would like local user access to the KX II even when the device is under CC SG management Note If you initially choose not to ignore CC Manage mode on the local po...

Page 264: ...is not logged in the audit log For more information about saving the audit log see Audit Log To perform a factory reset 1 Choose Maintenance Factory Reset The Factory Reset page opens 2 Choose the ap...

Page 265: ...s that are performed when the Reset button is pressed are defined in the graphical user interface See Encryption Share Note It is recommended that you save the audit log prior to performing a factory...

Page 266: ...ges 274 Smart Card Readers 275 TCP and UDP Ports Used 278 Network Speed Settings 280 Physical Specifications KX II Specifications Part number Line item description UPC code Power Weight Product dimens...

Page 267: ...13625021 Dual power 100 240 V 50 60 Hz optimal 47 63 Hz 0 6A 27 Watts 9 0 lbs 1 75 x 17 3 x 11 4 14 9 lbs 22 x 16 6 x 6 5 4 1 kg 44mm x 439mm x 290mm 6 8 kg 559mm x 422mm x 165mm DKX2 416 16 Port KX I...

Page 268: ...470 mm x 280 mm DKX2 86 4 64 Port KX II with 8 user network access standard local port extended local port virtual media dual power 0785813620026 Dual power 100 240 V 50 60 Hz 1 2A 64 Watts 13 22 lbs...

Page 269: ...y from KX II Red Hat Desktop 4 0 Yes Locally held ISO image Remote File Server mounting directly from KX II Open SUSE 10 11 Yes Locally held ISO image Remote File Server mounting directly from KX II F...

Page 270: ...32bit browsers Internet Explorer 6 0 SP1 7 0 or 8 0 Firefox 1 06 3 64bit mode 64bit browsers Internet Explorer 7 0 or 8 0 Windows XP Professional Windows XP Tablet Windows Vista Windows Server 2003 Wi...

Page 271: ...ws 2000 Windows 2000 Server Windows 2003 Server Windows Vista Windows 7 Windows 2008 Red Hat Enterprise Linux 4 ES Red Hat Enterprise Linux 5 Open SUSE 10 11 Fedora 8 11 IBM AIX HP UX P2CIM AUSB UUSBP...

Page 272: ...ode Standard Mouse mode UKVMPD version 0C4 Note Version 0C5 does not work with KX II Windows XP Windows 2000 Windows 2000 Server Windows 2003 Server Windows Vista Windows 7 Windows 2008 Red Hat Enterp...

Page 273: ...00 Server Windows 2003 Server Windows Vista Windows 7 Windows 2008 Red Hat Enterprise Linux 4 ES Red Hat Enterprise Linux 5 Open SUSE 10 11 Fedora Core 3 and above IBM AIX HP UX DCIM USB Windows XP Wi...

Page 274: ...pen SUSE 10 11 Fedora 8 11 Mac OS All Solaris OSs supported in Dominion KX I IBM AIX HP UX Note The DCIM USBG2 and P2CIM AUSB provide a small slide switch on the back of the CIM Move the switch to P f...

Page 275: ...ndows 2003 Server Windows Vista Windows 7 Windows 2008 Open SUSE 10 11 Fedora Core 3 and above Red Hat Enterprise Linux 4 ES Red Hat Enterprise Linux 5 Mac OS Note D2CIM VUSB is not supported on Sun S...

Page 276: ...erial devices where applicable Virtual media Absolute mouse mode Intelligent mouse mode Standard mouse mode DCIM PS2 DCIM PS2 DCIM USB DCIM USB G2 Windows XP operating system Windows 2000 operating sy...

Page 277: ...d Hat Enterprise Workstation 3 0 SUSE Linux Professional 9 2 and 10 DCIM PS2 DCIM USB DCIM USB G2 D2CIM VUSB Fedora Core 3 and above DCIM PS2 DCIM USB DCIM USB G2 D2CIM VUSB Mac OS DCIM USB DCIM USB G...

Page 278: ...eight Product dimensions WxDxH Shipping weight Shipping dimensions WxDxH UPC code D2CIM VUSB KX II Computer Interface Module USB Port with Virtual Media 0 2 lbs 1 3 x 3 0 x 0 6 0 2 lbs 7 2 x 9 x 0 6 7...

Page 279: ...minion KX II Computer Interface Module Dual USB Port with Virtual Media 0 23 lbs 105 g 3 53 x1 68 x 76 89 7x42 7x19 3 mm 25 lbs 112 5 g 3 9 x5 7 x 1 0 100 145 27 mm 785813339508 D2CIM DVUS B 32PAC Bul...

Page 280: ...d local port Paragon II analog KVM switch UMT target port connected to extended local port Provides furthest possible access to extended local port when used together with the Paragon II Enhanced User...

Page 281: ...60 Hz Paragon II UMT using EUST 1000 900 Paragon EUST 500 400 URKVM 650 250 Paragon UST 500 200 Remote Connection Remote connection Details Network 10BASE T 100BASE T and 1000BASE T Gigabit Ethernet P...

Page 282: ...800x600 72Hz 1280x1024 85Hz 800x600 75Hz 1360x768 60Hz 800x600 85Hz 1366x768 60Hz 800x600 90Hz 1368x768 60Hz 800x600 100Hz 1400x1050 60Hz 832x624 75 1Hz 1440x900 60Hz 1024x768 60Hz 1600x1200 60Hz 1024...

Page 283: ...rica and most of English speaking countries for example Canada Australia and New Zealand US Keyboard layout US English International United States of America and most of English speaking countries for...

Page 284: ...ntity ActivIdentity USB Reader v3 0 Verified on local and remote USB Gemalto GemPC USB SW Verified on local and remote USB Keyboard Card reader Combo Dell USB Smart Card Reader Keyboard Verified on lo...

Page 285: ...tary implementation Minimum System Requirements Local Port Requirements The basic interoperability requirement for local port attachment to the KX II is All devices smart card reader or token that are...

Page 286: ...id 1 3 8 1 el5 SuSE 11 pcsc ccid 1 3 8 3 12 Fedora Core 10 ccid 1 3 8 1 fc10 i386 Remote Client Requirements The basic requirements for interoperability at the remote client are The IFD smart card rea...

Page 287: ...e libpcsclite so after upgrading RHEL 4 RHEL 5 and FC 10 For example ln s usr lib libpcsclite so 1 usr lib libpcsclite so assuming installing the package places the libraries in usr lib or user local...

Page 288: ...y to synchronize its internal clock to a central time server This function requires the use of UDP Port 123 the standard for SNTP but can also be configured to use any port of your designation Optiona...

Page 289: ...0 Half Switch 100 Full KX II 100 Half Switch 100 Full 100 Full KX II 100 Half Switch 100 Full No Communica tion No Communicat ion 100 Half 100 Half 100 Half KX II 100 Full Switch 100 Half 100 Half No...

Page 290: ...however note that the KX II behavior deviates from expected behavior Note For reliable network communication configure the KX II and the LAN switch to the same LAN Interface Speed and Duplex For exam...

Page 291: ...oup Your remote LDAP server can provide these user group names by returning an attribute named as follows rciusergroup attribute type string This may require a schema extension on your LDAP LDAPS serv...

Page 292: ...ma 1 Right click the Active Directory Schema root node in the left pane of the window and then click Operations Master The Change Schema Master dialog appears 2 Select the Schema can be modified on th...

Page 293: ...LDAP Display Name field 6 Type 1 3 6 1 4 1 13742 50 in the Unique x5000 Object ID field 7 Type a meaningful description in the Description field 8 Click the Syntax drop down arrow and choose Case Ins...

Page 294: ...Updating the LDAP Schema 285 2 Scroll to the user class in the right pane and right click it 3 Choose Properties from the menu The user Properties dialog appears 4 Click the Attributes tab to open it...

Page 295: ...ibutes for User Members To run the Active Directory script on a Windows 2003 server use the script provided by Microsoft available on the Windows 2003 server installation CD These scripts are loaded o...

Page 296: ...Updating the LDAP Schema 287 3 Go to the directory where the support tools were installed Run adsiedit msc The ADSI Edit window opens 4 Open the Domain 5 In the left pane of the window select the CN U...

Page 297: ...the right pane Right click the user name and select Properties 7 Click the Attribute Editor tab if it is not already open Choose rciusergroup from the Attributes list 8 Click Edit The String Attribute...

Page 298: ...a caching and clear the Java cache Please refer to your Java documentation or the KVM and Serial Access Clients Guide for more information The KX II Remote Console and MPC require the Java Runtime Env...

Page 299: ...does not support IPv6 on Microsoft Windows Linux It is recommended that Linux kernel 2 4 0 or higher is used when using IPv6 An IPv6 enabled kernel will need to be installed or the kernel will need t...

Page 300: ...elease Right Alt Note These procedures do not apply to the circumflex accent above vowels In all cases the key to the right of the P key works on French keyboards to create the circumflex accent when...

Page 301: ...rds configured using System Preferences Raritan recommends that you configure foreign keyboards using the methods described in the following table Language Configuration method US Intl Default UK Syst...

Page 302: ...From the toolbar choose System Preferences Keyboard 2 Open the Layouts tab 3 Add or select the appropriate language 4 Click Close To set the keyboard language using the Keyboard Indicator 1 Right clic...

Page 303: ...0 Through testing it has been determined that installation of libXp resolves window focusing issues with Fedora Core 6 Raritan has tested with libXp 1 0 0 8 i386 rpm this resolved all of the keyboard...

Page 304: ...sections of the picture and noise To configure the SUSE video display 1 The generated configuration file etc X11 xorg conf includes a Monitor section with an option named UseModes For example UseModes...

Page 305: ...annot be used at the same time Therefore a dual VM CIM cannot be used on DL360 servers However as a workaround a USB2 hub can be attached to the USB port on the back of the device and a dual VM CIM ca...

Page 306: ...le when operating at the BIOS level Add Other Profiles provides access to other profiles available on the system Profiles selected from this list will be added to the USB Profile Menu This includes a...

Page 307: ...on speed When a profile is changed you may receive a New Hardware Detected message and be required to log in to the target with administrative privileges to reinstall the USB driver This is only likel...

Page 308: ...n s US engineering department has developed a configuration which supports the Safely Remove Hardware icon and avoids this Windows message This configuration requires the use of the D2CIM DVUSB virtua...

Page 309: ...or when the target is experiencing USB protocol errors caused by signal degradation due to additional connectors and cables for example a connection to a blade server via a dongle CC SG Virtual KVM C...

Page 310: ...on do not use the CC SG proxy mode if you are planning to use the Multi Platform Client MPC Moving Between Ports of the KX II If you move a between ports of the same KX II and resume management within...

Page 311: ...hernet and IP Networking 315 IPv6 Networking 317 Servers 319 Blade Servers 320 Installation 322 Local Port 324 Extended Local Port Dominion KX2 832 and KX2 864 Models Only 326 Power Control 327 Scalab...

Page 312: ...dent The KX II can be used to manage servers running many popular operating systems including Intel Sun PowerPC running Windows Linux Solaris etc State Independent Agentless The KX II does not require...

Page 313: ...However you may want to consider the D2CIM VUSB and D2CIM DVUSB CIMs which support Virtual Media and Absolute Mouse Synchronization Can the KX II be rack mounted Yes The KX II ships standard with 19...

Page 314: ...of the remote ports The local port can access the same server using the PC Share feature In order to access the KX II from a client what hardware software or network configuration is required Because...

Page 315: ...get servers through the Dominion KX I and KX II switches MPC can be run via web browser and standalone Refer to Virtual KVM Client and Raritan Multi Platform Client MPC Supported Operating Systems in...

Page 316: ...CIM is required There are two of these CIMs the D2CIM VUSB and the new D2CIM DVUSB The D2CIM DVUSB has dual USB connectors and should be purchased by customers who wish to utilize virtual media at the...

Page 317: ...Not choosing the right USB profile for a KVM target server can prevent a mass storage device mouse or keyboard from working optimally or working at all Do I always need to set a USB profile when I use...

Page 318: ...ust use a D2CIM VUSB or D2CIM DVUSB with updated firmware Will Raritan provide USB profiles for other target server configurations Raritan will provide new USB profiles to suit customer needs As these...

Page 319: ...the user moves the mouse or types a character then there is a small amount of bandwidth used If the display is running a complex screen saver or playing a video then there can be a larger amount of b...

Page 320: ...g icon 40 70 KB s 10 25 KB s 5 15 KB s Drag folder 10 40 KB s 5 20 KB s 5 10 KB s Open text window 50 100 KB s 25 50 KB s 10 15 KB s Continuous typing 1 KB s 5 1 KB s 2 5 KB s Scroll text window 10 50...

Page 321: ...0 KB s With the reduced bandwidth settings bandwidth is reduced significantly for virtually all tasks With the 15 bit color setting perceived performance is similar to the default parameters Further b...

Page 322: ...color depth will also significantly decrease bandwidth and increase performance but fewer colors will be used resulting in video degradation This may be acceptable for certain system administration t...

Page 323: ...remote over IP video resolution supported The KX II is the first and only KVM over IP switch to support full High Definition HD remote video resolution 1920x1080 In addition popular widescreen formats...

Page 324: ...port or the switch router to which it is connected fail Dominion KX II will failover to the secondary network port with the same IP address ensuring that server operations are not disrupted Note that...

Page 325: ...ork with remote access products like CITRIX if configured appropriately but Raritan cannot guarantee it will work with acceptable performance Products like CITRIX utilize video redirection technologie...

Page 326: ...l stack is the ability to simultaneously support both IPv4 and IPv6 protocols Given the gradual transition from IPv4 to IPv6 dual stack is a fundamental requirement for IPv6 support How do I enable IP...

Page 327: ...Appendix D FAQs 318 Where can I get more information on IPv6 See www ipv6 org for general information on IPv6 The KX II User Guide describes the KX II s support for IPv6...

Page 328: ...elf sufficient device After assigning an IP address to the KX II it s ready to use since it comes with web browser and authentication capabilities completely built in What software do I have to instal...

Page 329: ...2 DCIM USBG2 D2CIM VUSB and D2CIM DVUSB What types of access and control are available The KX II provides automated secure KVM access 1 at the rack 2 remotely over IP 3 via CommandCenter and 4 by mode...

Page 330: ...hat if I want in band or embedded KVM access Yes in band and embedded access to blade servers can be configured within CC SG I m running VMware on some of my blade servers Is this supported Yes with C...

Page 331: ...Then connect each CIM to the KX II using standard UTP twisted pair cable such as Cat5 Cat5e or Cat6 How far can my servers be from the KX II In general servers can be up to 150 feet 45 m away from the...

Page 332: ...servers are moved from port to port Furthermore this automatic update does not just affect the local access port but propagates to all remote clients and the optional CommandCenter Secure Gateway man...

Page 333: ...e ports on the local port Note that as of April 2011 the Dominion KX II switches will no longer have PS 2 local ports Customers with PS 2 keyboard and mice should utilize a PS 2 to USB adapter Is ther...

Page 334: ...t device To be clear if the name of a server via the KX II onscreen display is changed this updates all remote clients and external management servers in real time If I use the KX II s remote administ...

Page 335: ...lowing devices can function as the user station for the extended local port Paragon II EUST Paragon II UST and the Cat5 Reach URKVMG device In addition the extended local port can be connected via Cat...

Page 336: ...of the KVM target servers After a simple one time configuration step just right click the server name to power on off or recycle a hung server Note that a hard reboot provides the physical equivalent...

Page 337: ...ng the server from the AC power line and reinserting the plug Can I power on off other equipment non servers connected to a PDU Yes You can power on off other equipment attached to the PDU by outlet f...

Page 338: ...edia smart card and blade server access via tiered access will be supported in a future release Of course these features are available when accessed via a standard remote connection While remote IP se...

Page 339: ...form Client MPC Can I connect an existing analog KVM switch to the KX II Yes Analog KVM switches can be connected to one of the KX II s server ports Simply use a D2CIM DVUSB or D2CIM VUSB and attach i...

Page 340: ...terface Modules CIMs with Raritan s analog matrix KVM switch Paragon No The KX II computer interface modules CIMs transmit video at ranges of 50 to 150 feet 15 45 m and thus do not work with Paragon w...

Page 341: ...the National Institute of Standards and Technology NIST in the FIPS Standard 197 Does the KX II allow encryption of video data Or does it only encrypt keyboard and mouse data Unlike competing solution...

Page 342: ...load self signed or certificate authority provided digital certificates to the KX II for enhanced authentication and secure communication Does the KX II support a configurable security banner Yes For...

Page 343: ...eral government What CIMs support smart cards CAC The D2CIM DVUSB is required This CIM must be upgraded with the release 2 1 10 and later of the firmware and KSX II 2 3 0 and later What firmware versi...

Page 344: ...ork or via the Remote Console What auditing or logging does the KX II offer For complete accountability the KX II logs all major user and system events with a date and time stamp For instance reported...

Page 345: ...pened another Firefox browser I am automatically logged into the same KX II with the second Firefox browser Is this right Yes this is correct behavior and is the direct result of how browsers and cook...

Page 346: ...ile when Using a Smart Card Reader 298 Changing the Default Password 30 Changing the Keyboard Layout Code Sun Targets 35 Changing the Maximum Refresh Rate 68 Checking Your Browser for AES Encryption 2...

Page 347: ...net and IP Networking 315 Event Management 151 Event Management Destinations 153 Extended Local Port Dominion KX2 832 and KX2 864 Models Only 326 F FAQs 302 Favorites List Page 47 48 Fedora 294 File S...

Page 348: ...avorites 42 46 Minimum System Requirements 244 276 Miscellaneous 336 Modifying an Existing User 120 Modifying an Existing User Group 118 Modifying and Removing Keyboard Macros 62 Mouse Modes when Usin...

Page 349: ...Permit Write Operations to the Schema 283 Simultaneous Users 242 Single Mouse Cursor 72 Single Mouse Mode Connecting to a KX II Target Under CC SG Control Via VKC Using Firefox 300 Smart Card Access i...

Page 350: ...87 308 User Authentication Process 133 User Blocking 195 199 User Group List 111 User Groups 110 User List 119 User Management 110 243 Users 119 Using Screenshot from Target 67 Using the KX II Local C...

Page 351: ...India Monday Friday 9 a m 6 p m local time Phone 91 124 410 7881 Japan Monday Friday 9 30 a m 5 30 p m local time Phone 81 3 3523 5991 Email support japan raritan com Europe Europe Monday Friday 8 30...

Reviews: