Raritan KX II Frequently Asked Questions Manual Download Page 18

Dominion KX II - FAQ

 

 

 

 

 

© 2010 Raritan Inc. 

Page 18 of 20 

V1098 R2   January 2010 

Question 

Answer 

Can I use Dominion KX II 
computer interface modules 
(CIMs) with Paragon, 
Raritan’s analog matrix 
KVM switch? 

No. Dominion KX II computer interface modules (CIMs) transmit video at 
ranges of 50 feet to 150 feet (15 m – 46 m) and thus do not work with 
Paragon, which requires CIMs that transmit video at a range of 1,000 
feet (304 m). To ensure that all Raritan’s customers experience the very 
best quality video available in the industry – a consistent Raritan 
characteristic – Dominion series CIMs do not interoperate with Paragon. 

Security 

Is the Dominion KX II FIPS 
140-2 Certified? 

The Dominion KX II, as of Release 2.2.0, uses an embedded FIPS   
140-2 validated cryptographic module running on a Linux platform per 
FIPS 140-2 implementation guidelines.  This cryptographic module is 
used for encryption of KVM session traffic consisting of video, keyboard, 
mouse, virtual media and smart card data. 

What kind of encryption 
does Dominion KX II use? 

Dominion KX II uses industry-standard (and extremely secure) 256-bit 
AES, 128-bit AES or 128-bit encryption, both in its SSL communications 
as well as its own data stream. Literally no data is transmitted between 
remote clients and Dominion KX II that is not completely secured by 
encryption. 

Does Dominion KX II 
support AES encryption as 
recommended by the U.S. 
government’s NIST and 
FIPS standards? 

Yes. The Dominion KX II utilizes the Advanced Encryption Standard 
(AES) for added security. 256-bit and 128-bit AES is available. 
 
AES is a U.S. government-approved cryptographic algorithm that is 
recommended by the National Institute of Standards and Technology 
(NIST) in the FIPS Standard 197. 

Does Dominion KX II allow 
encryption of video data? Or 
does it only encrypt 
keyboard and mouse data? 

Unlike competing solutions, which only encrypt keyboard and mouse 
data, Dominion KX II does not compromise security – it allows 
encryption of keyboard, mouse and video data.  

How does Dominion KX II 
integrate with external 
authentication servers such 
as Active Directory, 
RADIUS or LDAP? 

Through a very simple configuration, Dominion KX II can be set to 
forward all authentication requests to an external server such as LDAP, 
Active Directory or RADIUS. For each authenticated user, Dominion   
KX II receives from the authentication server the user group to which 
that user belongs. Dominion KX II then determines the user’s access 
permissions depending on the user group to which he or she belongs. 

How are usernames and 
passwords stored?  

Should Dominion KX II’s internal authentication capabilities be used, all 
sensitive information, such as usernames and passwords, is stored in 
an encrypted format. Literally no one, including Raritan technical 
support or product engineering departments, can retrieve those 
usernames and passwords. 

Does Dominion KX II 
support strong passwords? 

Yes. The Dominion KX II has administrator-configurable, strong 
password checking to ensure that user created passwords meet 
corporate and/or government standards and are resistant to brute force 
hacking. 

Summary of Contents for KX II

Page 1: ...does Dominion KX II differ from remote control software When using Dominion KX II remotely the interface at first glance may seem similar to remote control software such as pcAnywhereTM Windows Termin...

Page 2: ...The Dominion KX II ships standard with 19 rack mount brackets It can also be reverse rack mounted so the server ports face forward How large is the Dominion KX II Dominion KX II is only 1U high except...

Page 3: ...s it take to retrieve The Virtual KVM Client VKC applet used to access Dominion KX II is approximately 500KB in size The following chart describes the time required to retrieve Dominion KX II s applet...

Page 4: ...ynchronization as well as remote firmware updates Is virtual media secure Yes Virtual media sessions are secured using 256 bit AES 128 bit AES or 128 bit RC4 encryption What is a USB profile Certain s...

Page 5: ...or types a character then there is a small amount of bandwidth used If the display is running a complex screen saver or playing a video then there can be a larger amount of bandwidth used How does ban...

Page 6: ...B s 10 15 KB s Open Panel 50 100 KB s 60 70 KB s 20 30 KB s Change Tab in Panel 40 50 KB s 20 50 KB s 10 20 KB s Close Panel 50 100 KB s 40 60 KB s 20 30 KB s Change Panel Option 2 10 KB s 1 5 KB s 1...

Page 7: ...8 bit color or lower bit depths can reduce bandwidth and improve performance Other tips to decrease bandwidth include Use a solid desktop background instead of a complex image Disable screen savers Us...

Page 8: ...II will failover to the secondary network port with the same IP address ensuring that server operations are not disrupted Note that automatic failover must be enabled by the administrator Can I use D...

Page 9: ...Pv6 is the next generation IP protocol which will replace the current IP Version 4 IPv4 protocol IPv6 addresses a number of problems in IPv4 such as the limited number of IPv4 addresses It also improv...

Page 10: ...use the KVM infrastructure to fix problems Dominion KX II is designed to be completely independent from any external server For example should the data center come under attack from a malicious Windo...

Page 11: ...rver CIMs like the Paragon II Which CIM should I use It depends on the type of KVM ports on the specific make and model of the blade server you are using The following CIMs are supported DCIM PS2 DCIM...

Page 12: ...igured appropriately A virtual media CIM D2CIM VUSB or D2CIM DVUSB must be used Is Absolute Mouse Synchronization supported Servers with internal KVM switches inside the blade chassis typically do not...

Page 13: ...le DCIM dongle acts as a virtual keyboard and mouse to the server to which it is connected This technology is called KME keyboard mouse emulation Raritan s KME technology is data center grade battle t...

Page 14: ...k without compromising the number of users that access the rack remotely at the same time Can I use a USB keyboard or mouse at the local port Yes Dominion KX II offers both PS 2 and USB keyboard and m...

Page 15: ...center or to a Paragon II switch Is a user station required for the extended local port Yes The following devices can function as the user station for the extended local port Paragon II EUST Paragon...

Page 16: ...I Up to eight PDUs can be connected to a Dominion KX II device How do I connect the PDU to the Dominion KX II The D2CIM PWR is used to connect the power strip to the Dominion KX II The D2CIM PWR must...

Page 17: ...covered Dominion KX II units can be accessed via a user created profile Can I connect an existing analog KVM switch to Dominion KX II Yes Analog KVM switches can be connected to one of Dominion KX II...

Page 18: ...I utilizes the Advanced Encryption Standard AES for added security 256 bit and 128 bit AES is available AES is a U S government approved cryptographic algorithm that is recommended by the National Ins...

Page 19: ...CIM This CIM must be upgraded with the Release 2 1 10 firmware What firmware version is required Dominion KX II Release 2 1 10 and later is required Which smart card readers are supported The required...

Page 20: ...Dominion KX II s own internal logging capabilities Dominion KX II can send SNMP traps to SNMP management systems such as HP Openview and Raritan s CommandCenter NOC Can Dominion KX II s internal cloc...

Reviews: