background image

 

Chapter 8: Security Management 

 

 

131

 

 

Limitation 

Description 

This field is enabled and required when the 
Enable Password Aging checkbox is selected. 
Enter the number of days after which a password 
change is required. The default is 60 days. 

Log out idle users, 
After (1-365 
minutes) 

Select the "Log off idle users" checkbox to 
automatically disconnect users after the amount 
of time you specify in the "After (1-365 minutes)" 
field. If there is no activity from the keyboard or 
mouse, all sessions and all resources are logged 
out. If a virtual media session is in progress, 
however, the session does not timeout. 

The After field is used to set the amount of time 
(in minutes) after which an idle user will be 
logged out. This field is enabled when the Log 
Out Idle Users option is selected. Up to 365 
minutes can be entered as the field value 

 

 

Summary of Contents for Dominion KX II-101-V2

Page 1: ...Copyright 2014 Raritan Inc KX2101V2 v3 6 0 D E May 2014 255 62 3059 00 Dominion KX II 101 V2 User Guide Release 3 6 0...

Page 2: ...ions Operation of this equipment in a residential environment may cause harmful interference VCCI Information Japan Raritan is not responsible for damage to this product resulting from accident disast...

Page 3: ...ewall Settings 12 Step 3 Connect the Equipment 13 Step 4 Configure the KX II 101 V2 17 Allow Pop Ups 23 Security Warnings and Validation Messages 23 Java Validation and Access Warning 24 Additional Se...

Page 4: ...Types 66 Conditions when Read Write is Not Available 66 Number of Supported Virtual Media Drives 67 Connecting and Disconnecting from Virtual Media 67 Access a Virtual Media Drive on a Client Computer...

Page 5: ...evice Management 96 Network Settings 96 Network Basic Settings 97 Assign the KX II 101 V2 an IP Address 97 Configure the IPv4 Settings 97 Configure the IPv6 Settings 98 Configure the DNS Settings 99 L...

Page 6: ...s Control 139 SSL Certificates 142 Security Banner 145 Chapter 9 Maintenance 146 Audit Log 146 Device Information 147 Backup and Restore 148 Upgrading Firmware 150 Upgrade History 151 Factory Reset 15...

Page 7: ...Overview 171 Removing a KX II 101 V2 from CC SG Management 172 Using CC SG in Proxy Mode 173 Appendix A Specifications 174 Physical Specifications 174 Supported Operating Systems Clients 175 Supporte...

Page 8: ...formational Notes 193 Java Runtime Environment JRE 193 IPv6 Support Notes 194 Operating System IPv6 Support Notes 194 Keyboard Video and Mouse Notes 194 Sun Blade Video Keyboard and Mouse Support Limi...

Page 9: ...1 In This Chapter KX II 101 V2 Overview 2 Package Contents 3 KX II 101 V2 Help 4 Product Photos 4 Product Features 5 Chapter 1 Introduction...

Page 10: ...erver are converted to IP format and compressed for transmission over an IP network The KX II 101 V2 dongle form factor makes it easy to install near the target server and each individual KX II 101 V2...

Page 11: ...P LAN Remote network access Mobile access via iPhone and iPad using CC SG Package Contents Each KX II 101 V2 device ships with 1 KX II 101 V2 KVM over IP 1 KVM cable 1 Power adapter AC DC 5VDC with un...

Page 12: ...ase before you begin using the KX II 101 V2 KVM Client help is provided as part of KX II 101 V2 online help Online help is accompanied by the KX II 101 V2 Quick Setup Guide which is included with your...

Page 13: ...monitor connection Ethernet LAN port supporting 10 100 base T autosensing full duplex Network Configuration DHCP or static IP device address System Management Features Firmware upgradable over Etherne...

Page 14: ...igurable TCP IP port numbers Stealth Mode Support for IPv4 and IPv6 in a dual stack environment Disconnecting users from ports Forced user log off User Features Web based access through common browser...

Page 15: ...Chapter 1 Introduction 7 Mounting Rack mounting bracket...

Page 16: ...ure the target server you want to access via the KX II 101 V2 so you ensure optimum performance Default Login Information Default Value User name admin This user has administrative privileges Password...

Page 17: ...al on page 21 for information on setting an IP address using the Serial Admin Console Note that the following configuration requirements apply only to the target server not to the computers that you r...

Page 18: ...r OS documentation for additional details Following are the mouse settings for various operating systems These settings are configured on your target operating system unless otherwise indicated See th...

Page 19: ...ngs Configure the Motion settings Set the acceleration to None Set the mouse motion speed setting to exactly the middle speed Disable transition effects Deselect the Use the following transition effec...

Page 20: ...le Manager click on Mouse Settings and set Mouse Acceleration to 1 0 and Threshold to 3 0 Step 2 Configure Network Firewall Settings TCP Port 5000 Allow network and firewall communication on TCP Port...

Page 21: ...ded AC power adaptor into the Power port and plug the other end into a nearby AC power outlet Network Connect a standard Ethernet cable from the network port labeled LAN to an Ethernet switch hub or r...

Page 22: ...ng virtual media or Absolute Mouse Mode The following items are in each of the connection diagrams that follow KX II 101 V2 Target server Local monitor Optional Local mouse and keyboard Optional USB C...

Page 23: ...tion Note If you are using virtual media you must use the USB connection To configure the KX II 101 V2 for use with a PS 2 target server 1 Use the attached video cable to connect the KX II 101 V2 to t...

Page 24: ...the KX II 101 V2 to the serial port on your PC or laptop The serial port communication settings should be configured as follows 115 200 Baud 8 data bits 1 stop bit No parity No flow control Local Use...

Page 25: ...101 V2 See Configure the KX II 101 V2 Using a Terminal Emulation Program Optional on page 21 Change the Default Password The first time you start the KX II 101 V2 you are required to change the defaul...

Page 26: ...want to ensure redundant failover capabilities should the primary Ethernet port or the switch router to which it is connected fail If it fails KX II 101 V2 fails over to the secondary network port wit...

Page 27: ...Global Unique IP Address Prefix Length and Gateway IP Address allowing you to manually set the IP configuration Router Discovery use this option to automatically assign IPv6 addresses that have Globa...

Page 28: ...e from the Time Zone drop down list 3 Adjust for daylight savings time by checking the Adjust for daylight savings time checkbox 4 Choose the method to use to set the date and time User Specified Time...

Page 29: ...m To use a terminal emulation program to configure the KX II 101 V2 1 Connect to the Admin port on the KX II 101 V2 and the COM1 port on the PC 2 Launch the terminal emulation program you want to use...

Page 30: ...ress The IP address to assign to the device To manually set an IP address for the first time this command must be used with the ipauto command and the none option See ipauto for information After you...

Page 31: ...nfiguring the KX II 101 V2 type logout at the command prompt and press Enter You are logged out of the command line interface Allow Pop Ups Regardless of the browser used you must allow pop ups from t...

Page 32: ...warning messages during subsequent log ins by checking the following options on the security and certificate warning messages In the future do not show this warning Always trust content from this pub...

Page 33: ...ps Open an IE browser then log in to KX II 101 V2 Click More Information on the first Java security warning Click View Certificate Details on the More Information dialog You are prompted to install th...

Page 34: ...walks you through each step File to Import Browse to locate the Certificate Certificate Store Select the location to store the Certificate Click Finish on the last step of the Wizard The Certificate i...

Page 35: ...f Signed Certificate is added as part of the process Steps Open an IE browser then select Tools Internet Options to open the Internet Options dialog Click the Security tab Click on Trusted Sites Disab...

Page 36: ...Next import the Certificate Steps Open an IE browser then log in to KX II 101 V2 Click More Information on the first Java security warning Click View Certificate Details on the More Information dialog...

Page 37: ...ission issues when trying to connect to a target server To avoid this do the following 1 In Internet Explorer click Tools Internet Options to open the Internet Options dialog 2 In the Temporary Intern...

Page 38: ...igation and making your selections To select an option use any of the following Click on a tab A page of available options appears Hover over a tab and select the appropriate option from the menu Clic...

Page 39: ...V2 you are using Always Device Name Name assigned to the device Always IP Address The IP address of the KX II 101 V2 Always IPv4 and IPv6 if it is configured Firmware Current version of firmware Alwa...

Page 40: ...to the KVM target server connected to the KX II 101 V2 A KVM target server is a server that you want to control through the KX II 101 V2 device They are connected to the KX II 101 V2 ports at the bac...

Page 41: ...appears Disconnect Disconnects this port and closes the Virtual KVM Client page for this target server This menu item is available only when the port status is up and connected or up and busy Power On...

Page 42: ...cated in the lower left side sidebar of the Port Access page and provides the ability to Create and manage a list of favorite devices Quickly access frequently used devices List your favorites either...

Page 43: ...pter 3 Working with Target Servers 35 Enable Favorites Click Enable in the Favorite Devices section of the left panel of the KX II 101 V2 interface Once enabled the Enable button becomes a Disable but...

Page 44: ...lay by Host Name Discovering Devices on the Local Subnet This option discovers the devices on your local subnet which is the subnet where the KX II 101 V2 Remote Console is running These devices can b...

Page 45: ...ce IP address itself You can access these devices directly from this the Subnet page or add them to your list of favorites See Favorites List Page This feature allows multiple KX II 101 V2 devices to...

Page 46: ...by various Raritan products As such references to other products may appear in this section of help Virtual KVM Client VKC Please note this client is used by various Raritan products As such reference...

Page 47: ...l KVM Client Java Requirements Jave 1 7 is required to use the Java based Virtual VKM Client VKC Connecting to a KVM Target Server To connect to a KVM target server 1 From the KX II 101 V2 Remote Cons...

Page 48: ...re is available with the KX II 2 4 0 and later Note This feature is not supported by the LX This feature is not supported by the KX II 101 V2 Synchronize Mouse Dual mouse mode forces the realignment o...

Page 49: ...a KVM target server 1 From the KX II 101 V2 Remote Console click the Port Access tab The Port Access page opens 2 Click the Port Name of the appropriate target server The Port Action menu appears 3 Ch...

Page 50: ...offering an optimal balance between video quality and system responsiveness for any bandwidth The parameters in the Properties dialog can be optimized to suit your needs for different operating envir...

Page 51: ...ted to remote users in order to maximize usability in all bandwidths 15 bit RGB Color 8 bit RGB Color 4 bit Color 4 bit Gray 3 bit Gray 2 bit Gray Black and White Important For most administrative tas...

Page 52: ...Version Raritan communications protocol version To copy this information Click Copy to Clipboard The information is available to be pasted into the program of your choice Keyboard Options Keyboard Mac...

Page 53: ...Deselect All options 4 Click OK to begin the import a If a duplicate macro is found the Import Macros dialog appears Do one of the following Click Yes to replace the existing macro with the imported...

Page 54: ...e macros to be exported by checking their corresponding checkbox or using the Select All or Deselect All options 3 Click Ok An Export Keyboard Macros to dialog is displayed Locate and select the macro...

Page 55: ...ch selection select Add Key As each key is selected it appears in the Macro Sequence field and a Release Key command is automatically added after each selection For example create a macro to close a w...

Page 56: ...et system is set to the US International keyboard layout checkbox 4 Click OK Running a Keyboard Macro Once you have created a keyboard macro execute it using the keyboard macro you assigned to it or b...

Page 57: ...ey combinations that coincide with blade chassis switching key sequences will not be sent to blades housed in those chassis Video Properties Refreshing the Screen The Refresh Screen command forces a r...

Page 58: ...ross the video screen Changes made to clock settings cause the video image to stretch or shrink horizontally Odd number settings are recommended Under most circumstances this setting should not be cha...

Page 59: ...lay on your monitor 3 Select Automatic Color Calibration to enable this feature 4 Select the video sensing mode Best possible video mode The device will perform the full Auto Sense process when switch...

Page 60: ...nshot You are able to take a screenshot of a target server using the Screenshot from Target server command If needed save this screenshot to a file location of your choosing as a bitmap JPEG or PNG fi...

Page 61: ...figured the mouse cursors align In dual mouse mode when controlling a target server the Remote Console displays two mouse cursors one belonging to your KX II 101 V2 client workstation and the other be...

Page 62: ...view only the target server s pointer You can toggle between these two modes single mouse and dual mouse Mouse Synchronization Tips If you have an issue with mouse synchronization 1 Verify that the s...

Page 63: ...erver mouse pointer with Virtual KVM Client mouse pointer To synchronize the mouse do one of the following Choose Mouse Synchronize Mouse or click the Synchronize Mouse button in the toolbar Note This...

Page 64: ...rsor shape should be normal and not animated The target mouse speeds should not be set to very slow or very high values Advanced mouse properties such as Enhanced pointer precision or Snap mouse to de...

Page 65: ...VM target servers running a Mac operating system To enter Absolute Mouse Synchronization Choose Mouse Absolute in the KVM client VKC Virtual Media See the chapter on Virtual Media on page 64 for compl...

Page 66: ...erver This is the hot key used for exiting this mode Exit Single Cursor Mode Hotkey When you enter single cursor mode only the target server mouse cursor is visible This is the hot key used to exit si...

Page 67: ...ou configure foreign keyboards using the methods described in the following table Language Configuration method US Intl Default French Keyboard Indicator German System Settings Control Center Japanese...

Page 68: ...on which the target viewer is launched a Select Monitor Client Was Launched From if you want the target viewer to be launched using the same display as the application that is being used on the client...

Page 69: ...ngs tab to customize the scan interval and default display options To set scan settings 1 Click Tools Options The Options dialog appears 2 Select the Scan Settings tab 3 In the Display Interval 10 255...

Page 70: ...atus bar Click View Status Bar to select it Scaling Scaling your target window allows you to view the entire contents of the target server window This feature increases or reduces the size of the targ...

Page 71: ...the Full Screen button To exit full screen mode Press the hot key configured in the Tool s Options dialog The default is Ctrl Alt M If you want to access the target in full screen mode at all times y...

Page 72: ...els support virtual media Virtual media extends KVM capabilities by enabling target servers to remotely access media from a client PC and network file servers With this feature media mounted on client...

Page 73: ...sites Certain virtual media options require administrative privileges on the remote PC for example drive redirection of complete drives Note If you are using Microsoft Vista or Windows 7 disable User...

Page 74: ...cs Installing or patching applications Complete installation of the operating system Record and playback of digital audio Supported Virtual Media Types The following virtual media types are supported...

Page 75: ...orts it To use virtual media connect attach the media to the client or network file server that you want to access from the target server This need not be the first step but it must be done prior to a...

Page 76: ...he Map Virtual Media CD ISO Image dialog appears 2 For internal and external CD ROM or DVD ROM drives a Choose the Local CD DVD Drive option b Choose the drive from the Local CD DVD Drive drop down li...

Page 77: ...VD Drive or Local or Remote ISO Image To view the Local CD DVD Drive or Local or Remote ISO Image in this folder select Tools Folder Options View and deselect Hide empty drives in the Computer folder...

Page 78: ...uirement Your virtual media connection can be closed if you mount a CD ROM from a Linux client to a target and then unmount the CD ROM To avoid these issues you must be a root user Virtual Media in a...

Page 79: ...he Remote Console The File Server Setup page opens 2 Check the Selected checkbox for all media that you want accessible as virtual media 3 Enter information about the file server ISO images that you w...

Page 80: ...ves For local drives choose Virtual Media Disconnect Drive For CD ROM DVD ROM and ISO images choose Virtual Media Disconnect CD ROM ISO Image Note In addition to disconnecting the virtual media using...

Page 81: ...group for users who are authenticated externally using LDAP LDAPS or RADIUS or who are unknown to the system If the external LDAP LDAPS or RADIUS server does not identify a valid user group the Unkno...

Page 82: ...t The User Group List page opens Relationship Between Users and Groups Users belong to a group and groups have privileges Organizing the various users of your KX II 101 V2 into groups saves time by al...

Page 83: ...ccess Option Description Deny Denied access completely View View the video but not interact with the connected target server Control Control the connected target server Control must be assigned to the...

Page 84: ...ol rules on a group level basis To add append rules 1 Type the starting IP address in the Starting IP field 2 Type the ending IP address in the Ending IP field 3 Choose the action from the available o...

Page 85: ...le numbers allow you to have more control over the order in which the rules are created Setting Permissions Important Selecting the User Management checkbox allows the members of the group to change t...

Page 86: ...re Simultaneous access to the same target by multiple users Security SSL certificate security settings VM Share PC Share IP ACL User Management User and group management remote authentication LDAP LDA...

Page 87: ...the unknown user group Tip To determine the users belonging to a particular group sort the User List by User Group 1 Choose a group from among those listed by checking the checkbox to the left of the...

Page 88: ...ins and target connections Access From IP address of client PC accessing the KX II 101 V2 Status current Active or Inactive status of the connection To view users by port Choose User Management User b...

Page 89: ...u can add new users modify user information and reactivate users that have been deactivated Note A user name can be deactivated when the number of failed login attempts has exceeded the maximum login...

Page 90: ...to confirm the deletion 6 Click OK Blocking and Unblocking Users A user s access to the system can be blocked by the administrator or automatically blocked based on security settings See User Blockin...

Page 91: ...re authentication 1 Choose User Management Authentication Settings The Authentication Settings page opens 2 Choose the option for the authentication protocol you want to use Local Authentication LDAP...

Page 92: ...ddress or DNS name of your LDAP LDAPS remote authentication server up to 256 characters When the Enable Secure LDAP option is selected and the Enable LDAPS Server Certificate Validation option is sele...

Page 93: ...r for the appropriate values to enter into these fields 10 Enter the Distinguished Name of the Administrative User in the DN of Administrative User field up to 64 characters Complete this field if you...

Page 94: ...t Phrase field and again in the Confirm Secret Phrase field up to 128 characters LDAP LDAP Secure 12 Select the Enable Secure LDAP checkbox if you would like to use SSL This will enable the Enable LDA...

Page 95: ...This checkbox is only available when the Enable Secure LDAP checkbox has been enabled Note When the Enable LDAPS Server Certificate Validation option is selected in addition to using the Root CA cert...

Page 96: ...rver for the test user in case of success Returning User Group Information from Active Directory Server The KX II 101 V2 supports user authentication to Active Directory AD without requiring that user...

Page 97: ...IUS is an AAA authentication authorization and accounting protocol for network access applications To use the RADIUS authentication protocol 1 Click User Management Authentication Settings to open the...

Page 98: ...is is the number of times the KX II 101 V2 will send an authentication request to the RADIUS server 10 Choose the Global Authentication Type from among the options in the drop down list PAP With PAP p...

Page 99: ...ication attempt succeeds the KX II 101 V2 determines the permissions for a given user based on the permissions of the user s group Your remote RADIUS server can provide these user group names by retur...

Page 100: ...The encrypted password Accounting Request 4 Acct Status 40 Start 1 Starts the accounting NAS Port Type 61 VIRTUAL 5 for network connections NAS Port 5 Always 0 NAS IP Address 4 The IP address for the...

Page 101: ...r 5 User Management 93 User Authentication Process When the device is configured to authenticate and authorize local users the order in which the user credentials are validated follows the following p...

Page 102: ...Chapter 5 User Management 94 Remote authentication follows the process specified in the flowchart below...

Page 103: ...password in the Confirm New Password field Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and special characters 4 Click OK 5 You will receive confir...

Page 104: ...ation None default This is the recommended option static IP Since the KX II 101 V2 is part of your network infrastructure you most likely do not want its IP address to change frequently This option al...

Page 105: ...68 0 192 b Enter the Subnet Mask The default subnet mask is 255 255 255 0 c Enter the Default Gateway if None is selected from the IP Auto Configuration drop down d Enter the Preferred DHCP Host Name...

Page 106: ...dentifies the device the address is associated with Read Only g Select an IP Auto Configuration option None Static IP this option requires you manually specify the network parameters This is the recom...

Page 107: ...S Server IP Address 3 When finished click OK Your KX II 101 V2 device is now network accessible LAN Interface Settings The current parameter settings are identified in the Current LAN interface parame...

Page 108: ...If you wish to use Telnet to access the KX II 101 V2 first access the KX II 101 V2 from the CLI or a browser To enable Telnet 1 Select Device Settings Device Services and then select the Enable TELNE...

Page 109: ...and or HTTPS port settings 1 Choose Device Settings Device Services The Device Service Settings page opens 2 Enter the new ports in the HTTP Port and or HTTPS Port fields 3 Click OK Entering the Disc...

Page 110: ...irect access to a target via the Dominion device by passing in the necessary parameters in the URL 3 Click OK Configuring SNMP Agents SNMP compliant devices called agents store data about themselves i...

Page 111: ...following fields for SNMP v3 if needed a Select Use Auth Passphrase if one is needed If the Privacy Passphrase is required the Use Auth Passphrase allows you to have the same passphrase for both with...

Page 112: ...traps The events that are captured once an SNMP trap is configured are selected on the Event Management Destination page See Configuring Event Management Destinations To reset to factory defaults Cli...

Page 113: ...wise it will default to the PS 2 connection USB Forces the KX II 101 V2 to use the USB connection to send Keyboard and Mouse data to the host device PS 2 Forces the KX II 101 V2 to use the PS 2 connec...

Page 114: ...ck OK Raritan Power Strip Control To configure the power strip serial port 1 Choose Device Settings Serial Port The Serial Port Settings page opens 2 Select the PowerStrip Control radio button Choose...

Page 115: ...ect a 9 pin male male gender changer to the admin serial cable 3 Connect a null modem cable to other side of the gender changer 4 Connect the 9 pin male male gender changer to other end of the null mo...

Page 116: ...ally enter the NTP server IP address by selecting the Override DHCP checkbox 6 Click OK Event Management The KX II 101 V2 Event Management feature allows you enable and disable the distribution of sys...

Page 117: ...NMP Logging Enabled checkbox to enable to remaining checkboxes in the section Required 3 Select either or both SNMP v1 v2c Traps Enabled and SNMP Trap v3 Enabled At least one option must be selected O...

Page 118: ...the privacy protocol algorithm up to 64 characters 6 Click OK to create the SNMP traps Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Ma...

Page 119: ...101 V2 and the router that it is attached to fall out of synchronization when the KX II 101 V2 is rebooted preventing the reboot completed SNMP trap from being logged List of KX II 101 V2 SNMP Traps S...

Page 120: ...II 101 V2 network parameters passwordSettingsChanged Strong password settings have changed portConnect A previously authenticated user has begun a KVM session portConnectv2 A previously authenticated...

Page 121: ...userDeleted A user account has been deleted userForcedLogout A user was forcibly logged out by Admin userLogin A user has successfully logged into the KX II 101 V2 and has been authenticated userLogou...

Page 122: ...f you have Read Write privileges to the MIB file use a MIB editor to make changes to the file SysLog Configuration To configure the Syslog enable Syslog forwarding 1 Select Enable Syslog Forwarding to...

Page 123: ...events are categorized by Device Operation Device Management Security User Activity and User Group Administration 2 Select the checkboxes for those event line items you want to enable or disable and w...

Page 124: ...rt Type The type of target connected to the port Port type Description PowerStrip Power strip PDU KVM KVM target To edit a port name 1 Click the Port Name for the port you want to edit For KVM ports t...

Page 125: ...age as shown below Note To use this feature you must have a Raritan Dominion PX power strip attached to the device See Connecting the Power Strip To access a port configuration 1 Choose Device Setting...

Page 126: ...des remote power control of a target server To utilize this feature you must have a Raritan remote power strip To use the KX II 101 V2 power control feature Connect the power strip to your target serv...

Page 127: ...strip To connect the KX II 101 V2 to a Raritan power strip 1 Connect the DKX2 101 V2 PDU DB9 RJ45 adapter cable to the Admin port of the KX II 101 V2 2 Connect the DKX2 101 V2 PDU to the serial port c...

Page 128: ...prepopulated The following information is displayed for each outlet in the power strip Outlet Number Name and Port Association Use this page to name the power strip and its outlets All names can be u...

Page 129: ...get server port the outlet name is replaced by the port name You can change this name in the Port 2 page 1 Choose the power strip from the Power Strip Name drop down list 2 Choose the outlet from the...

Page 130: ...ociated outlets Name field The outlet name appears in the Power Strip Device page See Controlling a Power Strip Device 3 Change the outlet association by clicking the Port Association link next to the...

Page 131: ...analog KVM switch you will receive the error PS 2 is needed to access the KVM Switch Please enable PS 2 first on the Analog KVM Switch Configuration page See Keyboard Mouse Setup on page 105 2 Click...

Page 132: ...a pointed object to press this button The actions that are performed when the Reset button is pressed are defined in the graphical user interface See Encryption Share To reset the device 1 Power off t...

Page 133: ...to English but also supports the following localized languages Japanese Simplified Chinese Traditional Chinese To change the GUI language 1 Select Device Settings Language The Language Settings page...

Page 134: ...126 In This Chapter Overview 127 USB Connection Settings 127 Advanced USB Connection Settings 128 Chapter 7 Managing USB Connections...

Page 135: ...ake in the Advanced USB Connection Settings section to cause configuration problems between the KX II 101 V2 and the target server Therefore Raritan strongly recommends that you refer to the most rece...

Page 136: ...Connection Settings WARNING It is possible based on the selections you make in the Advanced USB Connection Settings section to cause configuration problems between the KX II 101 V2 and the target ser...

Page 137: ...ection Settings section 4 Configure the following as needed a Virtual Media Interface 1 Type b Check the Remove Unused VM Interface 1 From Device Configuration checkbox to remove the specified VM type...

Page 138: ...e 133 settings as appropriate 5 Update the Encryption Share settings as appropriate 6 Click OK To reset back to defaults Click Reset to Defaults Login Limitations Using login limitations you can speci...

Page 139: ...ox to automatically disconnect users after the amount of time you specify in the After 1 365 minutes field If there is no activity from the keyboard or mouse all sessions and all resources are logged...

Page 140: ...enabled and required Field Description Minimum length of strong password Passwords must be at least 8 characters long The default is 8 but administrators can change the minimum to 63 characters Maximu...

Page 141: ...riteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts The three options are mutually exclusive Option Description Disabled The default...

Page 142: ...and the default is 5 minutes Note Users in the role of Administrator are exempt from the timer lockout settings Deactivate User ID When selected this option specifies that the user will be locked out...

Page 143: ...d please ensure that your browser supports this encryption mode otherwise you will not be able to connect to the KX II 101 V2 Encryption mode Description Auto This is the recommended option The KX II...

Page 144: ...tion KVM and virtual media data is also transferred with 128 bit encryption 3 For government and other high security environments enable FIPS 140 2 Mode by selecting the Enable FIPS 140 2 checkbox See...

Page 145: ...Local Resets No reset action is taken Checking Your Browser for AES Encryption If you do not know if your browser uses AES check with the browser manufacturer or navigate to the https www fortify net...

Page 146: ...ications once in FIPS 140 2 mode The FIPS cryptographic module is used for encryption of KVM session traffic consisting of video keyboard mouse virtual media and smart card data 3 Reboot the KX II 101...

Page 147: ...the Local Security Settings dialog 2 From the navigation tree select Select Local Policies Security Options 3 Enable System Cryptography Use FIPS compliant algorithms for encryption hashing and signi...

Page 148: ...he most significant part is the network address which identifies a whole network or subnet The least significant portion is the identifier The prefix length after the identifies the length of the subn...

Page 149: ...l access from the 192 168 51 subnet and the Default Policy is Accept you would Append a Rule with IP MASK set to 192 168 51 00 24 and a policy DROP Or if you are trying to exclude all access from the...

Page 150: ...are not accurate the certificate s valid from to date range may be incorrect causing certificate validation to fail See Configuring Date Time Settings on page 107 Note The CSR must be generated on the...

Page 151: ...d key in bits 1024 is the default 3 To generate do one of the following To generate self signed certificate do the following a Select the Create a Self Signed Certificate checkbox if you need to gener...

Page 152: ...o generate the original CSR the certificate will not be useful This applies to uploading and downloading the CSR and private key files Once you get the certificate from the CA upload it to the KX II 1...

Page 153: ...n the Banner page 2 Select Display Restricted Service Banner to enable the feature 3 If you want to require users to acknowledge the banner prior to continuing the login process select Require Accepta...

Page 154: ...Management page To view the audit log for your KX II 101 V2 1 Choose Maintenance Audit Log The Audit Log page opens The Audit Log page displays events by date and time most recent events listed first...

Page 155: ...vice This information is helpful should you need to contact Raritan Technical Support To view information about your KX II 101 V2 Choose Maintenance Device Information The Device Information page open...

Page 156: ...configuration settings from the KX II 101 V2 in use and restoring those configurations to the new KX II 101 V2 You can also set up one KX II 101 V2 and copy its configuration to multiple KX II 101 V2...

Page 157: ...o check the IP address after the update 1 Choose the type of restore you want to run Full Restore A complete restore of the entire system Generally used for traditional backup and restore purposes Pro...

Page 158: ...the appropriate Raritan firmware distribution file RFP from the Firmware Upgrades KX II 101 V2 page and download the file 3 Unzip the file and read all instructions included in the firmware ZIP files...

Page 159: ...Upgrade History The KX II 101 V2 provides information about upgrades performed on the KX II 101 V2 device To view the upgrade history Choose Maintenance Upgrade History The Upgrade History page opens...

Page 160: ...lick Device Settings Network Settings to access this information 3 Click Reset to continue You will be prompted to confirm the factory reset because all network settings will be permanently lost 4 Cli...

Page 161: ...t after the specified timeout interval typically 10 minutes you are able to end the CC SG management session from the KX II 101 V2 console Note You must have the appropriate permissions to end CC SG m...

Page 162: ...g the device from CC SG management A confirmation message will then displayed asking you to confirm that you want the remove the device from CC SG management 3 Click Yes to remove the device CC SG man...

Page 163: ...to Host Page 158 Device Diagnostics 160 Network Interface Page The KX II 101 V2 provides information about the status of your network interface To view information about your network interface Choose...

Page 164: ...Chapter 10 Diagnostics 156 Statistics Produces a page similar to the one displayed here Interfaces Produces a page similar to the one displayed here...

Page 165: ...Chapter 10 Diagnostics 157 Route Produces a page similar to the one displayed here 3 Click Refresh The relevant information is displayed in the Result field...

Page 166: ...e or IP address into the IP Address Host Name field Note The host name cannot exceed 232 characters in length 3 Click Ping The results of the ping are displayed in the Result field Trace Route to Host...

Page 167: ...e maximum hops from the drop down list 5 to 50 in increments of 5 4 Click Trace Route The trace route command is executed for the given hostname or IP address and the maximum hops The output of trace...

Page 168: ...d Optional Device Diagnostic Log Downloads a snapshot of diagnostics messages from the KX II 101 V2 device to the client This encrypted file is then sent to Raritan Technical Support Only Raritan can...

Page 169: ...nostics 161 a Click Save to File The File Download dialog appears b Click Save The Save As dialog appears c Navigate to the desired directory and click Save 4 Email this file as directed by Raritan Te...

Page 170: ...commands that can be used with the KX II 101 V2 See CLI Commands on page 166 for a list of commands and definitions and links to the sections in this chapter that give examples of these commands The...

Page 171: ...ace org ssh http www netspace org ssh OpenSSH Client www openssh org http www openssh org Note Accessing the CLI by SSH or TELNET requires you to set up access in the Device Services page of the KX II...

Page 172: ...I on page 164 section you can perform the initial configuration tasks described in Configure the KX II 101 V2 Using a Terminal Emulation Program Optional on page 21 Navigation of the CLI Before using...

Page 173: ...ow current settings for the command Typing a question mark after a command produces help for that command A pipe symbol indicates a choice within an optional or required set of keywords or arguments S...

Page 174: ...he current session s command line history interface Configure the KX II 101 V2 network interface ipv6_interface Set get IPv6 network parameters listports Lists the port port name port type port status...

Page 175: ...r the supervision of a Raritan Technical Support engineer Debug The Diagnostics Debug menu enables you to choose the Setlog command to set logging options for the KX II 101 V2 Setlog Command The Setlo...

Page 176: ...and device name Command Description interface Configure the KX II 101 V2 device network interface name Set the device name ipv6_interface Set get IPv6 network parameters Interface Command The interfac...

Page 177: ...he IP address mask and gateway addresses and sets the mode to auto detect Admin Port Config Network interface ipauto none ip 192 168 50 12 mask 255 255 255 0 gw 192 168 51 12 mode auto Name Command Th...

Page 178: ...ommand Example Admin Port listports Port Port Port Port Port No Name Type Status Availability 1 Dominion_KXII 101_V2_Port KVM up idle Userlist Command The Userlist command lists the port port name por...

Page 179: ...or iPhone For information on adding KX II 101 V2 to CC SG so CC SG can manage the device and for information on setting up mobile access to the device see the CC SG documentation When a KX II 101 V2...

Page 180: ...le CommandCenter is not on the network you can release the KX II 101 V2 from CC SG control in order to access the device This is accomplished by using the CC Unmanage feature Note Maintenance permissi...

Page 181: ...Known from CC SG Proxy Mode When the Virtual KVM Client is launched from CommandCenter Secure Gateway CC SG in proxy mode the Virtual KVM Client version is unknown In the About Raritan Virtual KVM Cl...

Page 182: ...103 x 74 x 27mm Weight 0 6498 lbs 0 295 kg Power AC DC 100 240V 6VDC power adapter or Power over Ethernet PoE compatible with IEEE 802 3af Mid Span Power Insertion Signal Pair Power Insertion Class 2...

Page 183: ...systems are supported on the Virtual KVM Client and Multi Platform Client MPC Windows 7 Windows XP Windows 2008 Windows Vista Windows 2000 SP4 Server Windows 2003 Server Windows 2008 Server Red Hat D...

Page 184: ...er 6 0 SP1 or 7 0 9 0 10 0 or 11 0 Firefox 1 06 4 or later Windows Server 2003 Internet Explorer 6 0 SP1 9 0 10 0 or 11 0 Firefox 1 06 3 Windows Vista Internet Explorer 9 0 10 0 or 11 0 Windows 7 Inte...

Page 185: ...5 using Safari 6 1 1 running JRE 1 7 0_51 Note Upon upgrading from OS X 10 8 2 to OS X 10 8 3 Safari may block Java Connectors Interface type Length Inches Centimeters Description KVM cable with PS 2...

Page 186: ...x400 56Hz 1024x768 90Hz 640x400 84Hz 1024x768 100Hz 640x400 85Hz 1152x864 60Hz 640x480 60Hz 1152x864 70Hz 640x480 66 6Hz 1152x864 75Hz 640x480 72Hz 1152x864 85Hz 640x480 75Hz 1152x870 75 1Hz 640x480 8...

Page 187: ...in the following table Language Regions Keyboard layout US English United States of America and most of English speaking countries for example Canada Australia and New Zealand US Keyboard layout US En...

Page 188: ...r multiple purposes including the web server for the HTML client the download of client software Multi Platform Client MPC and Virtual KVM Client VKC onto the client s host and the transfer of KVM and...

Page 189: ...ed to send messages to a Syslog server then the indicated port s will be used for communication uses UDP Port 514 SNMP Default UDP Ports Port 161 is used for inbound outbound read write SNMP access an...

Page 190: ...upported by Ethernet specification product will communicate but collisions will occur Per Ethernet specification these should be no communication however note that the KX II 101 V2 behavior deviates f...

Page 191: ...Appendix A Specifications 183 Pin definition 5 GND 6 DTR out 7 CTS in 8 RTS out 9 RI in...

Page 192: ...sed on the permissions of the user s group Your remote LDAP server can provide these user group names by returning an attribute named as follows rciusergroup attribute type string This may require a s...

Page 193: ...ma 1 Right click the Active Directory Schema root node in the left pane of the window and then click Operations Master The Change Schema Master dialog appears 2 Select the Schema can be modified on th...

Page 194: ...LDAP Display Name field 6 Type 1 3 6 1 4 1 13742 50 in the Unique x5000 Object ID field 7 Type a meaningful description in the Description field 8 Click the Syntax drop down arrow and choose Case Ins...

Page 195: ...Updating the LDAP Schema 187 2 Scroll to the user class in the right pane and right click it 3 Choose Properties from the menu The user Properties dialog appears 4 Click the Attributes tab to open it...

Page 196: ...ibutes for User Members To run the Active Directory script on a Windows 2003 server use the script provided by Microsoft available on the Windows 2003 server installation CD These scripts are loaded o...

Page 197: ...Updating the LDAP Schema 189 3 Go to the directory where the support tools were installed Run adsiedit msc The ADSI Edit window opens 4 Open the Domain 5 In the left pane of the window select the CN U...

Page 198: ...right pane Right click the user name and select Properties 7 Click the Attribute Editor tab if it is not already open Choose rciusergroup from the Attributes list 8 Click Edit The String Attribute Edi...

Page 199: ...the KX II 101 V2 for a Horizontal Mount 1 Attach the L bracket to the KX II 101 V2 using the included screws Adjust bracket placement before tightening screws 2 Mount the L bracket assembly to the rac...

Page 200: ...Appendix C Rack Mount 192 Diagram key Screws...

Page 201: ...te Console and MPC require the Java Runtime Environment JRE to function since the Remote Console checks the Java version If the version is incorrect or outdated you will be prompted to download a comp...

Page 202: ...de linux IPv6 IPv6 HOWTO IPv6 HOWTO html Windows Windows XP and Windows 2003 users will need to install the Microsoft IPv6 service pack to enable IPv6 Keyboard Video and Mouse Notes The following equ...

Page 203: ...2 plus a PS 2 to USB adapter Set the Host Interface to PS 2 on the Keyboard Mouse Setup page See Keyboard Mouse Setup on page 105 Dell Server 1850 In order for BIOS version A06 to recognize a virtual...

Page 204: ...e to an operating system limitation the following keyboard combinations do not work with a US International keyboard layout when using the Windows 2000 operating system and Windows 2003 servers Right...

Page 205: ...s main input output devices keyboard video and mouse Consequently any hardware that supports standard PC keyboard and mouse interfaces and standard PC video VGA can be used with Dominion KX II 101 V2...

Page 206: ...Banner Customer SSL Certificate Upload Configurable Port Numbers IPv6 Networking Question Answer What is IPv6 IPv6 is the acronym for Internet Protocol Version 6 IPv6 is the next generation IP protoco...

Page 207: ...auto configuration Consult the user guide for more information What if I have an external server with an IPv6 address that I want to use with my KX II 101 V2 The KX II 101 V2 can access external serve...

Page 208: ......

Page 209: ...owser for AES Encryption 135 136 137 CLI Commands 162 166 CLI Prompts 164 CLI Syntax Tips and Shortcuts 165 Client Launch Settings 60 Command Line Interface CLI 106 162 Common Commands for All Command...

Page 210: ...P ACL Access Control List 75 79 H HP UX RX 1600 Keyboard and Mouse Configuration 195 HTTP and HTTPS Port Settings 101 180 I IBM AIX Mouse Settings 12 Implementing LDAP LDAPS Remote Authentication 84 8...

Page 211: ...et Server 41 Prerequisites for Using Virtual Media 65 Product Features 5 Product Photos 4 Proxy Mode and MPC 196 PS 2 Configuration 15 R Rack Mount 191 RADIUS Communication Exchange Specifications 92...

Page 212: ...Schema Cache 188 Upgrade History 151 Upgrading Firmware 150 USB Configuration 14 USB Connection Settings 127 User Authentication Process 93 User Blocking 82 130 133 User Features 6 User Group List 74...

Page 213: ...India Monday Friday 9 a m 6 p m local time Phone 91 124 410 7881 Japan Monday Friday 9 30 a m 5 30 p m local time Phone 81 3 5795 3170 Email support japan raritan com Europe Europe Monday Friday 8 30...

Reviews: