Raritan ComputerメーカーDKX2-V2.3.5-0N-Eの使用説明書/サービス説明書
ページ先へ移動 of 351
Copyright © 2011 Raritan, Inc. DKX2-v2.3.5- 0N -E March 2011 255 - 62 - 4023 - 00 Dominion KX II User Guide Release 2.3.5.
This document contains p roprietary information that is protected by copyright. A ll rights reserved. No part of this document may be photo copied, reproduced, or t ranslated into another lan guage without express prior written con sent of Raritan, Inc.
iii Contents Chapter 1 Introduction 1 KX II Overview ............................................................................................................................... 2 KX II Help .........................................................
Contents iv Video Properties ................................................................................................................ 63 Mouse Options ............................................................................................
Contents v Adding a New User .......................................................................................................... 120 Modifying an Existing User ....................................................................................
Contents vi Configuring IP Access Cont rol ................................................................................................... 205 SSL Certificates .......................................................................................
Contents vii Chapter 13 KX II Local Console 242 Overview ................................................................ .................................................................... 242 Using the KX II Local Console ..........................
Contents viii Setting the Registry to Permit Write Operations to the Schema ............................................... 283 Creating a New Attribute ..................................................................................................
Contents ix Appendix D FAQs 3 02 General Questions ..................................................................................................................... 303 Remote Access ................................................................
1 In This Chapter KX II Overview ........................................................................................... 2 KX II Help ................................................................................................... 4 KX II Client Applications .
Chapter 1 : Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) swit ch that provides BIOS-level (and up) access and control of serv ers from anywhere in the world v ia a web browser.
Chapter 1 : Introduction 3.
Chapter 1 : Introduction 4 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) KX II Local access Note: KX2-832 and KX2 -864 also use an extended local port.
Chapter 1 : Introduction 5 Related Documentation The KX II help is accompa nied by a KX II Device Quick Setu p Guide, which can be found on the Rarit an Firmware and Documentation page http://www.raritan.com/support/ firmware-and-documentation/ of Raritan's website.
Chapter 1 : Introduction 6 Virtual Media All KX II models support vi rtual media. The benefits of virtual media - mounting of remote drives/media o n the target server to support software installation and diagnosti cs - are now available in all of the K X II models.
Chapter 1 : Introduction 7 Product Photos KX II KX2 -832.
Chapter 1 : Introduction 8 KX2 -864.
Chapter 1 : Introduction 9 Product Features Hardware Integrated KVM-over-IP remote access 1U or 2U rack-mountable (brackets in cluded) Dual power supplies with f ailover; autoswitching pow.
Chapter 1 : Introduction 10 Software Virtual media with D2CIM-VUSB and D 2C IM-DVUSB CIMs Absolute Mouse Synchroni zation with D2CIM-VUSB CIM and D2CIM-DVUSB CIMs Plug-and-Play Web-bas.
Chapter 1 : Introduction 11 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, M ouse) UT P Cable (Cat5/5e/6) KX II Local Access Console Local User - an optional user co nsole (consisting of a .
Chapter 1 : Introduction 12 Package Contents Each KX II ships as a fully- configured stand-alone product in a standard 1U (2U for DKX2-864) 19" rackmo unt chassis.
13 In This Chapter Overview .................................................................................................. 13 Default Login Information ........................................................................ 13 Getting Started ...
Chapter 2 : Installation and Configuration 14 Getting Started Step 1: Configure KVM T arget Servers KVM target servers are t he computers that will be a ccessed and controlled via the KX II. Before installing the KX II, configure all KVM target servers to ensure opt imum performance.
Chapter 2 : Installation and Configuration 15 Win dows XP, Windows 2003 and Windows 2008 Settings To configure KVM target servers running Microsoft ® Windows XP ® operating system, Windo w s 2003 ® operating system or Windows 2008 ® operating sy stems: 1.
Chapter 2 : Installation and Configuration 16 Note: For KVM target ser vers running Windows XP, Windows 2000 or Windows 2008, you may wi sh to create a user name t hat will be used only for remote connections thro ugh the KX II.
Chapter 2 : Installation and Configuration 17 Animate controls and elem ents inside windows Animate windows when mi nimizing and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into vi ew Fade out menu items after clicking 3.
Chapter 2 : Installation and Configuration 18 Windows 2000 Settings To configure KVM target servers running Microsoft ® Windows 2000 ® operating sy stem: 1. Configure the mouse settin gs : a. Ch oose Start > Cont rol Panel > Mouse. b. Click the Motion tab.
Chapter 2 : Installatio n and Configuration 19 a. Choose Main Menu > Prefere nces > Mouse. The Mou se Preferences dialog appears. b. Click the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity t owards low.
Chapter 2 : Installation and Configuration 20 Note: If you change the video resol ution, you must log off of the target server and log back in for t he video settings to take eff ect.
Chapter 2 : Installation and Configuration 21 2. Configure the screen resol ution: a. Choose Main Menu > Syst em Settings > Display. Th e Display Settings dialog appears. b. On the Settings tab, select a Resolution supported by t he KX II. c. Click OK.
Chapter 2 : Installation and Configuration 22 Make Linux Settings Permanent Note: These steps m ay vary slightly depending on the specific ver sion of Linux ® in use. To make your settings pe rmanent in Linux (promp t): 1. Choose System Menu > Preferen ces > Personal > Session s.
Chapter 2 : Installation and Configuration 23 2. All KVM target servers must be configured to one of the displ ay resolutions supported by t he KX II. The most popula r supported resolutions for Sun m.
Chapter 2 : Installation and Configuration 24 2. Choose Mouse Style Man ager. The Style Manager - Mou se dialog appears. 3. Set the Acceleration slider to 1.0. 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click.
Chapter 2 : Installation and Configuration 25 Card To check resolution: To change resolution: 32 -bit # /usr/sbin/pgxconfig -prconf 1. # /usr/sbin/pgxconfig -res 1024x768x75 2. Log out or restart computer. 64 -bit # /usr/sbin/m64config -prconf 1. # /usr/sbin/m64config -res 1024x768x75 2.
Chapter 2 : Installation and Configuration 26 Make UNIX Settings Permanent Note: These steps m ay vary slightly depending on the type of UN IX ® (for example, Solaris ™ , IBM ® AIX ™ ) and the specifi c v ersion in use. 1. Choose Style Manager > S tartup.
Chapter 2 : Installation and Configuration 27 Step 3: Connect the Equ ipment Connect the KX II to t he power supply, network, local P C, local video display, keyboard and mo use, and target servers. Th e letters in the diagram correspond to the topics in this section that d escr ibe the connection.
Chapter 2 : Installation and Configuration 28 C. Network Port The KX II provides two Eth ernet ports for failover purpose s (not for load-balancing). By default, only LAN1 is active and the autom atic failover is disabled.
Chapter 2 : Installation and Configuration 29 Connection Description port. Keyboard At tach a standard USB keyboard t o one of the USB Type A (female) ports. Mouse Attach a standard USB mo use to one of the USB Type A (femal e) ports. E. Target Server Ports The KX II uses standard UTP cabling (Cat5/5e/6) to connect t o each target server.
Chapter 2 : Installation and Configuration 30 Changing the Default Password The KX II ships with a default password. The first time y ou start the KX II you are required to change that password. To change the default p assword: 1. Power on the KX II using the power switch(s) at the back of the unit.
Chapter 2 : Installation and Configuration 31 c. Enter the Default Gateway if None is selected from t he IP Auto Configuration drop-down. d. Enter the Preferred DHCP Host Name if DHCP is selected from the IP Auto Configuration d rop-down. e. Select the IP Auto Configurat ion.
Chapter 2 : Installation and Configuration 32 5. Select Obtain DNS Serve r Address Automatically if DHCP is selected and Obtain DNS Server Address is enabled. When Obtain DNS Server Address Auto matically, the DNS information provided by the DHCP server will be used.
Chapter 2 : Installation and Configuration 33 Valid Special Characters for Targ et Names Character Description Character Description ! Exclamation point ; Semi-colon " Double quote = Equal sign #.
Chapter 2 : Installation and Configuration 34 3. If you are plugging power i nput into power supply number two (right-most power supply at the back of the device), select the Powerln2 Auto Detect option.
Chapter 2 : Installation and Configuration 35 Note on Microsoft Active Directory Microsoft ® Active Directory ® uses the LDAP/LDAPS protocol n atively, and can function as an LDAP/LDAP S server and authenti cation source for the KX II.
Chapter 2 : Installation and Configuration 36 5. Shut down the device and power o n once again. The DCIM-SUSB performs a reset (power cy cle). 6. Verify that the characters are co rrect.
37 In This Chapter Interfaces ................................................................................................ . 37 Proxy Server Configurat ion for use with MPC, VKC and A KC ................ 50 Virtual KVM Client (VKC) ...............
Chapter 3 : Working with Target Servers 38 KX II Local Console Interface When you are located at t he server rack, the K X II provides standard KVM management and ad ministration via the KX II Local C onsole.
Ch apter 3 : Working with Target Servers 39 Depending on your brows er and security settings, you may see various security and certificate wa rnings. It is necessary to accept these warnings to launch the KX II Remote Console.
Chapter 3 : Working with Target Servers 40 Interface and Navigation KX II Console Layout Both the KX II Remote Co ns ole and the KX II Local Console interfaces provide an HTML (web-based) interfa ce for configuration and administration, as well as target server list and selection.
Chapter 3 : Working with Target Servers 41 Left Pan el The left panel of the KX II interface contains the follo wing information. Note that some informatio n is conditional and will onl y be displayed if you are a certain of user, are using certain features, and so on.
Chapter 3 : Working with Target Servers 42 Information Description When displayed? Configured As Base or Configured As Tiered If you are using a tiering configuration, this indicates if the KX II y ou are accessing is the ba se device or a tiered device.
Chapter 3 : Working with Target Servers 43 Port Access Page After successfully logging o n to the KX II Remote Cons ole, the Port Access page appears. This page lists all of the KX II ports, the connected KVM target se rvers, and their statu s and availability.
Chapter 3 : Working with Target Servers 44 Note: Do not use apostrop hes for the Port (CIM) Nam e. Status - The status for sta ndard servers is either up o r down. Type - The type of server or CIM. For blade chassis, the type ca n be Blade Chassis, Blade, Blade ChassisAdmin, and BladeChassisURL.
Chapter 3 : Working with Target Servers 45 Power On - Powers on the target server through the associated outlet. This option is visible only whe n there are one or mo re power associations to the target. Power Off - Powers off t he target server through the a ssociated outlets.
Chapter 3 : Working with Target Servers 46 Managing Favorit es A Favorites feature is provided s o you can organize and qui ck ly access the devices you use frequently .
Chapter 3 : Working with Target Servers 47 Note: Both IPv4 and IPv6 a ddresses are supported. Manage Favorites Page To open the Manage Favorites pa ge: Click the Manage button in the left panel. The Manage Favorites page appears and contain s the following: Use: To: Favorites List Manage your list of favorite devices.
Chapter 3 : Working with Target Servers 48 c. Click Save. 3. Click Refresh. The list of dev ices on the local subnet is refr eshed. To add devices to y our Favorites List: 1.
Chapter 3 : Working with Target Servers 49 Adding, Deleting and Editing Favorites To add a device to y our favorites list: 1. Choose Manage > Add New D evice to Favorites. Th e Add New Favorite page appears. 2. Type a meaningful description. 3. Type the IP Address/Host Name for the device.
Chapter 3 : Working with Target Servers 50 Proxy Server Configuration for use with MPC, VKC and AKC When the use of a Proxy Server i s re quired, a SOCKS proxy must also be provided and configured on the remote client PC. Note: If the installed prox y server is only capable of the HTTP proxy protocol, you cannot conne ct.
Chapter 3 : Working with Target Servers 51 start javaw -Xmn128M -Xm x512M -XX:MaxHeapFree Ratio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=tr ue -DsocksProxyHost=192.1 68.99.99 -DsocksProxyPort=1080 -classpath .sdeploy.jar;.sFoxt rot.jar;.jaws.jar;.
Chapter 3 : Working with Target Servers 52 Button Button Name Description Video Settings Opens the Video Setting s dialog, allowing you to manually adjust video con version parameters. Color Calibration Adjusts color setting s to reduce excess color noise.
Chapter 3 : Working with Target Servers 53 Switching Bet ween KVM Target Servers With the KX II, you can acces s several KVM target servers. The KX II provides the ability t o switch from one target server to anothe r. Note: This feature is avail able in the KX II Remote Console only.
Chapter 3 : Working with Target Servers 54 Disconnecting KVM Target Serv ers Note: This item is not avail able on the KX II Local Co nsole. The only way to disconnect from t he sw itched target in the Local Consol e is to use the hot key. To disconnect a target s erver: 1.
Chapter 3 : Working with Target Servers 55 Connection Properties The dynamic video compre ssion algorithms maintain K VM console usability under varying ban dwidth constraints. The de vices optimize KVM output not only for LAN use, but also for WAN use.
Chapter 3 : Working with Target Servers 56 256 Kb (Cable) 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) Note that these settings a re an optimization for specif ic conditions rather than an exact spee d.
Chapter 3 : Working with Target Servers 57 Connection Information To obtain information about y our Virtual KVM Client connection: Choose Connection > Inf o... The Connection I nfo window opens. The following information is display ed about the current conne ction: Device Name - The name of t he device.
Chapter 3 : Working with Target Servers 58 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) o r Virtual KVM Client ( VKC). Macros exported from MPC or VKC cannot be imported into AKC.
Chapter 3 : Working with Target Servers 59 Click Yes to replace the ex isting macro with the imported version. Click Yes to All to replace the curre ntly selected and an y other duplicate macros t hat are found.
Chapter 3 : Working with Target Servers 60 3. Click Ok. The Export Key board Macro. A dialog from which to locate and select the macro file appear s. By default, the macro exists on your desktop. 4. Select the folder to save the macro file to, enter a name f or the file and click Save.
Chapter 3 : Working with Target Servers 61 Press Left Ctrl Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequen ce field to be sure the ma cro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove.
Chapter 3 : Working with Target Servers 62 Running a Keyboard Macro Once you have created a keyboard macro, execute i t using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a ma cro, it appears under the Keyb oard menu.
Chapter 3 : Working with Target Servers 63 3. Set the language and mouse s ettings. 4. Exit the menu to return to n ormal CIM functionality. Video Properties Refreshing the Screen The Refresh Screen com mand forces a refresh of t he video screen.
Chapter 3 : Working with Target Servers 64 Calibrating Color Use the Calibrate Color command to optimize the colo r levels (hue, brightness, saturation) of t he transmitted video imag es. The color settings are on a target s erver-basis. Note: The Calibrate Colo r command applies to the c urrent connection only.
Chapter 3 : Working with Target Servers 65 c. Brightness: Use this setting to adjust the brightness of the target server display. d. Brightness Red - Controls the brightness of the target server display for the red signal. e. Brightness Green - Controls the bri ghtness of the green signal.
Chapter 3 : Working with Target Servers 66 Note: Some Sun backgro und screens, such as scr eens with very dark borders, may not center precisel y on certain Sun servers. Use a different background or place a light er colored icon in the upper left corner of the screen.
Chapter 3 : Working with Target Servers 67 Using Screenshot from Target You are able to take a scre enshot of a target server using the Screenshot from Target server c ommand. If needed, save this screenshot to a file location of your choosing as a bit map, JPEG or PNG file.
Chapter 3 : Working with Target Servers 68 Changing the Maximum Refresh Rate If the video card you are u sing on the target uses cust om software and you are accessing the targ et through MPC or VKC, you may need to change the maximum refre sh rate of the monitor in order f or the refresh rate to take effect on the target .
Chapter 3 : Working with Target Servers 69 Mouse Pointer Synchronization When remotely v iewing a target server that uses a m ouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to t he target server.
Chapter 3 : Working with Target Servers 70 Additional Notes for Intelligent Mouse Mode Be sure that there are no ic ons or applications in the upper left section of the screen since that is where the synchronization routine takes place. Do not use an animated mous e.
Chapter 3 : Working with Target Servers 71 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mou se settings and synchronize the mou se cursors accordingly, allowing mouse acceleration on the target. Intelligent mouse mode is t he default for non -VM targets.
Chapter 3 : Working with Target Servers 72 Please note that mouse co nfigurations will vary on di fferent target operating systems. Cons ult your OS guidelines for furt her details. Also note that intelligent mouse synchr onization does not work with UNIX targets.
Chapter 3 : Working with Target Servers 73 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mo de: 1. Press Ctrl+Alt+O on your k eyboard to exit single mouse mode. VKC Virtual Media See the chapter on Virtual Media for complete inform ation about setting up and using virtual media.
Chapter 3 : Working with Target Servers 74 Smart Cards (VKC, AKC and MP C) Using the KX II 2.1.10 or lat er, you are able to mount a smart card reader onto a target server to sup port smart card authentic ation and related applications.
Chapter 3 : Working with Target Servers 75 4. A progress dialog will open. Check the 'Mount selected card read er automatically on connection t o targets' checkbox to mount the smart card reader automatically the next time you connect t o a target.
Chapter 3 : Working with Target Servers 76 Tool Options From the Tools menu, you can specify certain option s for use with the Virtual KVM Client, includi ng logging, setting the key board type, and defining hot keys for exitin g Full Screen mode and Single C ursor mode.
Chapter 3 : Working with Target Servers 77 4. Exit Full Screen Mode - Hotkey. When y ou enter Full Screen mode, the display of the target server be comes full screen a nd acquires the same resolution as the ta rget server. This is the hot key us ed for exiting this mode.
Chapter 3 : Working with Target Servers 78 Language Configuration method French Keyboard Indicator German System Settings (Control Center) Japanese System Settings (Control Center) UK System Settings .
Chapter 3 : Working with Target Servers 79 View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off): Choose View > View Toolb ar. Scaling Scaling your target window allow s you to view the entire content s of the target server window.
Chapter 3 : Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provi des version informatio n about the Virtual KVM Client, in case you require assista nce from Raritan Technical Support. To obtain version information: 1.
Chapter 3 : Working with Target Servers 81 AKC Supported Operating Sy stems and Browsers .NET Framework AKC requires Windows .N ET ® version 3.5, and will work with both 3.5 and 4.0 installed. Operating Systems When launched from Internet E xplorer ® , AKC allows you to reach t arget servers via the KX II 2.
Chapter 3 : Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC: Ensure the cookies from the IP addr ess of the device that is bein g accessed are not currently being bl ocked.
Chapter 3 : Working with Target Servers 83 Note: The Alt+Tab comm and toggles between windows o nly on the local system. When MPC opens, the Rar itan devices that were automatically detected and which are f ound on your subnet are displ ayed in the Navigator in tree format.
84 In This Chapter Overview .................................................................................................. 84 Turning Outlets On/Off and Cycling Power .
Chapter 4 : Rack PDU (Power Strip) Outlet Control 85 Control - Turn outlets on or off , or cycle their power. Association - The ports associate d with the outlet. Initially, when you open the Powerstrip page, the po wer strips that are currently connected to the K X II are displayed in the P owerstrip drop-down.
Chapter 4 : Rack PDU (Power Strip) Outlet Control 86 5. Click OK to close the Power On conf irmation dialog. The outlet will be turned on and its state will be displayed as 'on'. To turn an outlet off: 1. Click Off. 2. Click OK on the Power Off dialog.
Chapter 4 : Rack PDU (Power Strip) Outlet Control 87 2. Click OK. The outlet will then cycl e (note that this may take a few seconds). 3. Once the cycling is complete the dialog will open.
88 In This Chapter Overview .................................................................................................. 89 Prerequisites for Using Virt ual Med ia ...................................................... 92 Using Virtual Media via VKC and A KC in a Windows Environm ent .
Chapter 5 : Virtual Media 89 Overview Virtual media extends KVM capabili ties by enabling KVM target servers to remotely access media f rom a client PC and networ k file servers. With this feature, media mount ed on a client PC and net work file servers is essentially "mounted virtual ly" by the target server.
Chapter 5 : Virtual Media 90.
Chapter 5 : Virtual Media 91 Diagram key Desktop PC CD/DVD drive KX II USB mass storage device CIM PC hard drive Target server Remote file server (ISO images).
Chapter 5 : Virtual Media 92 Prerequisites for Using Virtual Media With the virtual media feat ure, you can mount up to t wo drives (of different types) that are suppo rted by the USB profile currently applied to the target. These drives are accessible for the duratio n of the KVM session.
Chapter 5 : Virtual Media 93 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP ® operating system admi nistrator and standard user privileges vary from those of the Windows Vista ® operating system and the Windows 7 ® operating system.
Chapter 5 : Virtual Media 94 Using Virtual Media See Prerequisites for Using Virtual Media before proceeding with using virtual media. To use virtual media: 1. If you plan to access file se rver ISO images, identif y those file servers and images throug h the Remote Console Fil e Server Setup page.
Chapter 5 : Virtual Media 95 File Server Setup (File Server ISO Images Only) Note: This feature is only r equired when using virtu al media to access file server ISO images. ISO9660 f ormat is the standard suppo rted by Raritan. However, other C D-ROM extensions may also work.
Chapter 5 : Virtual Media 96 Note: You cannot acces s a remote ISO image via virtual media using an IPv6 address due to techni cal limitations of third-party soft ware used by the by the KX, KSX or K X101 G2 device.
Chapte r 5 : Virtual Media 97 Connecting to Virtual Media Local Drives This option mounts an entir e drive, which means the entire disk drive is mounted virtually onto the targ et server. Use this option f or hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives.
Chapter 5 : Virtual Media 98 3. If you want Read and Write capabilitie s, select the Read-Write checkbox. This option is di sabled for nonremovable d rives. See the Conditions when Read/Write is N ot Available (on page 98 ) for more information. When chec ked, you will be able to read o r write to the connected USB disk.
Chapter 5 : Virtual Media 99 CD -ROM/DVD-ROM/ISO I mages This option mounts CD-ROM , DVD-ROM, and ISO image s. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DV D-ROM, or ISO image: 1.
Chapter 5 : Virtual Media 100 4. For remote ISO images on a f ile server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Image f rom the drop-down list. The file servers and image paths available are those that you configu red using the File Server Setup page.
101 In This Chapter Overview ................................................................................................ 101 CIM Compatibility .................................................................................. 102 Available USB Profiles .
Chapter 6 : USB Profiles 102 CIM Compatibility In order to make use of USB profiles, you must use a D2 CIM-VUSB or D2CIM-DVUSB with updated f irmware. A VM-CIM that has not had its firmware upgraded w.
Chapter 6 : USB Profiles 103 USB profile Description USB bus speed limited to full-speed (12 MBit/s) No virtual media support BIOS DellPowerEdge Keyboard Only Dell PowerEdge BIOS A ccess (Keyboard Only) Use this profile to have keyboard functionality for the Dell Powe rEdge BIOS when using D2CIM-VUSB .
Chapter 6 : USB Profiles 104 USB profile Description BIOS Generic BIOS Generic Use this profile when Gen eric OS profile does not work on th e BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected.
Chapter 6 : USB Profiles 105 USB profile Description Advanced Management Module functionality when D2CIM-VUSB or D2CIM-DVUSB is connected t o the Advanced Management Module.
Chapter 6 : USB Profiles 106 USB profile Description Installation) (Windows 2003 Server Ins tallation) Use this profile for t he HP Proliant DL360/DL380 G4 series server when installing Windows 2003 S erver without the help of HP SmartSt art CD.
Chapter 6 : USB Profiles 107 USB profile Description series mainboards with Phoenix AwardBIOS. Re strictions: Virtual CD-ROM and disk drive s cannot be used simultaneously Suse 9.
Chapter 6 : USB Profiles 108 USB profile Description USB bus speed limited to full-speed (12 MBit/s) Virtual CD-ROM and disk drive s cannot be used simultaneously WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected.
Chapter 6 : USB Profiles 109 Mouse Modes when Using the Mac OS-X USB Profile w ith a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X ® USB profile, and running Mac OS-X 10.4.9 ( or later), when you reboot you must be in Single Mouse mode to use the mou se at the Boot menu.
110 In This Chapter User Groups .......................................................................................... 110 Users ..................................................................................................... 119 Authentication Settings .
Chapter 7 : User Management 111 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, whe n you add a user, you must ass ign that user to an existing user group.
Chapter 7 : User Management 112 The Group page is organized into t he following cate gories: Group, Permissions, Port Permissi ons, and IP ACL. 2. Type a descriptive name fo r the new user group into the Gr oup Name field (up to 64 character s). 3. Set the permissions for the group.
Chapter 7 : User Management 113 Note: Several administrative f unctions are available wi thin MPC and from the KX II Local Console. These functions are available only to members of the default Admin group. Note: Both IPv4 and IPv6 a ddresses are supported.
Chapter 7 : User Management 114 Setting Permissions Important: Selecting the Us er Management checkbox al low s the members of the group to change the permissions of al l users, including their o w n.
Chapter 7 : User Management 115 Permission Description User Management User and group management, remote. authentication (LDAP/LDA PS/RADIUS), login settings.
Chapter 7 : User Management 116 Power control access Option Description Deny Deny power control to the targ et server Access Full permission to power control on a target serve r For blade chassis, the port ac cess permission will control ac cess to the URLs that have been configured f or that blade chassis.
Chapter 7 : User Management 117 Use the IP ACL section of t he Group page to add, insert, repla ce, and delete IP access control ru les on a group-level basis. To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2. Type the ending IP address in the Ending IP field.
Chapter 7 : User Management 118 2. Click Delete. 3. When prompted to confirm t he deletion, click OK. Important: ACL rules are ev aluated in the order in which they are listed. For instance, in th e example sho w n here, if the two ACL rules were reversed, Domi nion would accept no communication at all.
Chapter 7 : User Management 119 Tip: To determine the users belo nging to a particular group, sort t he User List by User Group. 1. Choose a group from am ong those listed by che cking the checkbox to the left of the Group Nam e. 2. Click Delete. 3. When prompted to confirm t he deletion, click OK.
Chapter 7 : User Management 120 Adding a New User It is a good idea to define u ser groups before creating K X II users because, when you add a user, y ou must assign that user to an existing user group.
Chapter 7 : User Management 121 5. To delete a user, click Del ete. You are prompted t o confirm the deletion. 6. Click OK. Logging a User Off (Force Logof f) If you are an administrator, you are able to log off another locally authenticated user who is l ogged on to the KX II.
Chapter 7 : User Management 122 Authentication Settings Authentication is the proce ss of verifying that a user i s who he says he is. Once a user is authenticated, t he user's group is used to determine his system and port permi ssions. The user's assigned privileges determine what type of ac cess is allowed.
Chapter 7 : User Management 123 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protoc ol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services r unning over TCP/IP. A client starts an LDAP session by connecti ng to an LDAP/LDAPS server (the default TCP port is 389).
Chapter 7 : User Management 124 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searching for u ser information. Up to 64 char acters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com .
Chapter 7 : User Management 125 11. If you entered a Disting uished Name for the Administrative User, you must enter the password that will be u sed to authenticate the Administrative User's DN against the remote authentication server.
Chapter 7 : User Management 126 15. Select the Enable L DAPS Server Certificate Valid ation checkbox to use the previously uploaded ro ot CA certificate file to v alidate the certificate provided by the server. If you do not want t o use the previously uploaded root C A certificate file, leave this checkbox deselected.
Chapter 7 : User Management 127 Once the test is completed, a message will be displayed that lets you know the test was successf ul or, if the test failed, a de tailed error message will be displayed. I t will display successful result or detail error message in failure case.
Chapter 7 : User Management 128 Important Notes Group Name is case sensit ive. The KX II provides the following d efault groups that cannot be changed or deleted: Admin and < Unknown>. Verify that your Active Directory server does not us e the same group name s.
Chapter 7 : User Management 129 9. The default number of retries is 3 Retries. This is the number of time s the KX II will send an authenticatio n request to the RADIUS serv er. 10. Choose the Global Auth entication Type from amo ng the options in the drop-down list: PAP - With PAP, passwords a re sent as plain text.
Chapter 7 : User Management 130 Note: Both IPv4 and IPv6 a ddresses are supported. Cisco ACS 5.x for RADIUS Authentication If you are using a Cisco ACS 5. x server, aft er you have configured the KX II for RADIUS authenti cation, complete the following steps on the Cisco ACS 5.
Chapter 7 : User Management 131 Returning User Group Informa tion via RADIUS When a RADIUS authentication at tempt succeeds, the KX II determines the permissions for a give n user based on the permi ssions of the user's group.
Chapter 7 : User Management 132 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network c onnections. NAS-Port (5) Always 0. NAS- IP -Address (4) The IP address for the KX II. User-Name (1) The user name entered a t the login screen.
Chapter 7 : User Management 133 User Authentication Proc ess Remote authentication follows t he process specified in the flowchart below:.
Chapter 7 : User Management 134 Changing a Password To change your pass w ord: 1. Choose User Management > Chang e Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field.
135 In This Chapter Network Settings ................................................................................... 135 Device Services ..................................................................................... 140 Configuring Modem Setti ngs .
Chapter 8 : Device Management 136 Network Basic Settings These procedures describe how to assign an IP address o n the Network Settings page. For complet e information about all of the fields and the operation of this page, see Network Settings . To assign an IP address: 1.
Chapter 8 : Device Management 137 d. Enter the Gateway IP A ddress. e. Link-Local IP Address. This addres s is automatically assigned t o the device. It is used for ne ighbor discovery or when no routers are present. Read-Only f. Zone ID. This identifies the device with which the ad dress is associated.
Chapter 8 : Device Management 138 See LAN Interface Settin gs (on page 138 ) for information in configuring this section of the Network Set tings page. Note: In some environments, t he default LAN Interface Speed & Duplex setting Autodetect (autonegotiator ) does not properly set the network parameters, which result s in network issues.
Chapter 8 : Device Management 139 Autodetect (default option) 10 Mbps/Half - Both LEDs blink 10 Mbps/Full - Both LEDs blink 100 Mbps/Half - Yellow LE D blinks 100 Mbps/Full - Yello.
Chapter 8 : Device Management 140 Device Services The Device Services page allows you to configure the followin g functions: Enable SSH access. Enable tiering for the base KX II. En ter the discovery port. Enable direct port access. Enable the AKC Download Server Certificate Validatio n feature if you are using AKC.
Chapter 8 : Device Management 141 Entering the Discovery Port The KX II discovery occurs over a single, configurable TCP Port. The default is Port 5000, but you can co nfigure it to use an y TCP port except 80 and 443.
Chapter 8 : Device Management 142 Configuring and Enabling Tieri ng The tiering feature allows you t o access KX II targets and PDUs through one base KX II device. This f eature is available for standa rd KX II devices as well as KX2-832 and K X2-864 devices.
Chapter 8 : Device Management 143 Enabling Tiering Connect from a target se rver port on the base device to the tier KX II Local Access port video/ke yboard/mouse ports usi ng a D2CIM-DVUSB. If the tier device is a KX2-832 or KX 2-864, connect from a t arget server port on the base device directly to the tier KX2-832/KX2-864 E xtended Local port.
Chapter 8 : Device Management 144 Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached directly to the base are accessible. Power Control You can power on and off targets that are a part of t he tiered configuration.
Chapter 8 : Device Management 145 Cabling Example in Tiered Configurations The following diagram illustrates the ca bling configurations bet ween a KX II tiered device and a KX II base device. Connect from a target server port on the base device to t he tier KX II Local Access port video/keyboard/mouse port s using a D2CIM-DVUSB.
Chapter 8 : Device Management 146 Enabling Direct Port Acc ess via URL Direct port access allows u sers to bypass having to u se the device's Login dialog and Port Acces s page. This feature also provides the ability to enter a username and passwor d directly and proceed to the target if the username and passwor d is not contained in the URL.
Chapter 8 : Device Manageme nt 147 Enabling the AKC Do w nload Server Certificate V alidation If you are using the AKC cl ient, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature.
Chapter 8 : Device Management 148 Configuring Modem Settings To configure modem sett ings: 1. Click Device Settings > Modem Set tings to open the Modem Sett ings page. 2. Select the Enable Modem checkbox. This will enable the Serial Line Speed and Modem Init St ring field.
Chapter 8 : Device Management 149 6. Click OK to commit your changes o r click Reset to Defaults t o return the settings to their defaults. See Certified Modems (on page 271) for information on certified modems that work with the KX II.
Chapter 8 : Device Management 150 3. To adjust for daylight savings time, check the "Adjust for daylight savings time" checkbox. 4. Choose the method you woul d like to use to set the date and time: User Specified Time - Choose thi s option to input the date and time manually.
Chapter 8 : Device Management 151 Event Management The KX II Event Management feature allows you enable and di sable the distribution of system even ts to SNMP Managers, the Sy slog and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or seve ral destinations.
Chapter 8 : Device Management 152 3. Click OK. To reset to factory defaults: Click Reset To Defaults. Note: Both IPv4 and IPv6 a ddresses are supported.
Chapter 8 : Device Management 153 Event Management - Destina tions System events, if enabled, can g enerate SNMP notific ation events (traps), or can be logged to Syslog or A udit Log. Use the Event Management - Destinations page to select the system ev ents to track and where to send this information.
Chapter 8 : Device Management 154 3. Click OK..
Chapter 8 : Device Management 155 To reset to factory defaults: Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possible for the KX II and the router that it is attached to to fall out of synch ronization when the KX II is reboote d, preventing the reboot completed S NMP trap from being logged.
Chap ter 8 : Device Management 156 Trap Name Description communicate over the net work. networkParameterChange d A change has been made t o the network parameters. passwordSettingsChanged Strong password settings h ave changed. portConnect A previously authenticated use r has begun a KVM session.
Chapter 8 : Device Management 157 Trap Name Description userSessionTimeout A user with an active sessi on has experienced a session termination due to timeout. userUploadedCertificate A user uploaded a SSL certif icate. vmImageConnected User attempted to mount either a device or image on the target using Virtual Media.
Chapter 8 : Device Management 158 4. Click OK. Note: If either of t hese checkboxes is selected a nd power input is not actually connected, the power LE D at the front of the unit turn s red. To turn off the automati c detection: Deselect the checkbox for the appropriate power sup ply.
Chapter 8 : Device Management 159 Port type Description PowerStrip (rack PDU) Power strip connected VM Virtual media CIM (D2CIM-VUSB and D2CIM-DVUSB) Blade Chassis Blade chassis and the bla des associated with that chassis (displaye d in a hierarchical order) 2.
Chapter 8 : Device Management 16 0 8. Click OK. Configuring KVM S w itches The KX II also supports u se of hot key sequences to sw itch between targets. In addition to using hot key sequences with standard s er vers, KVM switching is supporte d by blade chassis and in t iered configurations.
Chapter 8 : Device Management 161 5. Select KVM Switch Hot Key S eque nce. 6. Enter the Maximum Numb er of Target Ports (2-32). 7. In the KVM Switch Name f ield, enter the name you want to use to refer to this port connectio n. 8. Activate the targets that the KVM switch hot key sequ ence will be applied to.
Chapter 8 : Device Management 162 Configuring Rack PDU (Po w er Strip) Targets The KX II allows you to con nec t rack PDUs (power str ips) to KX II ports.
Chapter 8 : Device Management 163 Naming the Rack PDU in the KX II (Port Page for Power Strips) Note: PX rack PDUs (pow er strips) can be named in t he PX as well as in KX II. The Port page opens whe n you select a port from th e Port Configuration page that is connected to a Raritan remote rack PD U.
Chapter 8 : Device Management 164 3. Click OK..
Chapter 8 : Device Management 165 Associating Outlets with Target Servers on KX II The Port page opens whe n you click on a port on the P or t Configuration page. From this page, you can make power associations, change the port name to something more d escr iptive, and update target server settings if you are using the D2CIM-VUSB CIM.
Chapter 8 : Device Management 166 Removing Power Associations When disconnecting targ et servers and/or rack P DUs from KXII, all power associations should first be deleted. When a t arget has been associated with a rack PD U and the target is remove d from the KX II, the power association remain s.
Chapter 8 : Device Management 167 Configuring Blade Chass is In addition to standard servers and r ack PDUs (power strips), y ou can control blade chassis that a re plugged into a Dominion device port. Up to eight blade chassis can be managed at a given time.
Chapter 8 : Device Management 168 Note: In the case of IBM Blade Center Models E and H, the KX II only supports auto-discovery for A MM[1] as the acting primary management module. The use of hot key sequen ces to switch KVM access to a blade chassis is also supported.
Chapter 8 : Device Ma nagement 169 2. Select Device Settings > Port Configuration to open the Port Configuration page. 3. On the Port Configuration p age, click on the name of t he blade chassis you want to configure. The Port page will open. 4. Select the Blade Chassis radio button.
Chapter 8 : Device Management 170 b. URL - Enter the URL to t he interface. Required c. Username - Enter the use rname used to access the interfa ce . Optional d.
Chapter 8 : Device Management 171 5. Select the Dell blade cha ssis model from the Blade Server C hassis Model drop-down. To configure a Dell P owerEdge M1000e: 1. If you selected Dell Power Edge ™ M1000e, auto-discovery is available. Configure the bl ade chassis as applicable.
Chapter 8 : Device Management 172 5. In the Blade Chassis Managed Li nks section of the page, you are able to configure the con nection to a blade chassis web browser interface if one is availabl e. Click the Blade Chassi s Managed Links icon to expand the section on the page.
Chapter 8 : Device Management 173 To configure a Dell P owerEdge 1855/1955: 1. If you selected Dell 1855/1 955, auto-discovery is not available . Configure the blade cha ssis as applicable. a. Switch Hot Key Sequence - Select the hot key sequence that will be used to switch from KVM to the blade server.
Chapter 8 : Device Management 174 Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or the c onnection will fail. e. The Username Field and P assword Field, which are both optional, contain the labels that are expected to be associated with the username and password e ntries.
Chapter 8 : Device Management 175 c. Administrative Module Pri mary IP Address/Host Na me - Enter the primary IP address for the blade chassis. Required for auto-discovery mode d. Port Number - The default port number for the blade chassi s is 22. Change the port numb er if applicable.
Chapter 8 : Device Management 176 c. Username - Enter the use rname used to access the interfa ce . d. Password - Enter the pass word used to access the int erface. Note: Leave the usernam e and password fields blank for DRAC, ILO, and RSA web applications or t he connection will fail.
Chapter 8 : Device Management 177 4. In the Blade Chassis Managed Li nks section of the page, you are able to configure the con nection to a blade chassis web browser interface if one is availabl e. Click the Blade Chassi s Managed Links icon to expand the section on the page.
Chapter 8 : Device Management 178 Tips for Adding a Web Browser Interface You can add a Web Brows er Interface to create a co nnection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web a pplication associated with an RSA, DRAC o r ILO Processor card.
Chapter 8 : Device Management 179 HP Blade Chassis Configuration (Port Group Management) The KX II supports the aggreg ation of ports connecte d to certain types of blades into a group repres enting the blade chassis.
Chapter 8 : Device Management 180 3. Enter a Port Group Name. The port group name is n ot case sensitive and can contain up to 32 characte rs . 4. Select the Blade Server Grou p checkbox.
Chapter 8 : Device Management 181 To delete a port group: 1. Click on the Port Group M anagement page, select th e checkbox of the port group you want to delete.
Chapter 8 : Device Manageme nt 182 Supported CIMs for Blade Chassis The following CIMs are supported f or blade chassis being ma naged through the KX II: DCIM- PS2 DCIM-USBG2 D2CIM-VUSB D2CIM-DVUSB Following is a table contai ning supported CIMs for each blade chassi s model that the KX II suppo rts.
Chapter 8 : Device Management 183 Blade chassis Connection method Recommended CIM(s) M1000e with this chassis. The iKVM is compatible wi th the followin g peripherals: USB keyboards, USB pointing devic es VGA monitors with DDC support. Source: Dell Chassis Man agement Controller, Firmware Version 1.
Chapter 8 : Device Management 184 Blade chassis Connection method Recommended CIM(s) one Advanced Management Module. In contrast to the standard B ladeCenter chassis, the KVM module and th e Management Module in the BladeCenter T chassis are separate comp onen ts.
Chapter 8 : Device Management 185 Blade chassis Required/recommended action Slot, not by Name. iKV M may not work correctly if t his is not done. Do not designate any slots for scan operations in the iKVM GUI Setup Scan menu. iKVM may not work correctly ot herwise.
Chapter 8 : Device Management 186 Blade chassis Required/recommended action management module. The SSH port configured on t he blade chassis mana gement mo dule and the port numb er entered on the Port Configuration page must match. IBM KX2 Virtual Media Raritan KX II virtual media is supported only on IBM BladeCenter ® Models H and E.
Chapter 8 : Device Management 187 Configuring USB Profiles (Port Page) You choose the available USB profile s for a port in the Select USB Profiles for Port section of the Port page. The USB prof iles chosen in the Port page become the prof iles available to the user in VKC when connecting to a KVM target server from the port.
Chapter 8 : Device Management 188 Ctrl-Click to select several discontin uous profiles. 2. Click Add. The selected profiles ap pear in the Selected list. These are the profiles that can be used for the KVM target s erver connected to the port. To specify a preferred US B profile: 1.
Chapter 8 : Device Management 189 2. Click Remove. The select ed profiles appear in the A vailable list. These profiles are no long er available for a KVM tar get server connected to this port.
Chapter 8 : Device Management 190 Configuring KX II Local Port Settin gs From the Local Port Settings pa ge, you can customize many settings for the KX II Local Console in clu ding keyboard, hot key s, video switching delay, power save mode, local user interface resoluti on settings, and local user authentication.
Chapter 8 : Devic e Management 191 Note: If you are using KX2-832 an d KX2-864 as tiered devices, you must connect them t o the base KX II via the extended loc al port. Note: If you connect a Paragon d ev ice to the KX2-832 and KX2- 864 extended local port, you must use the remote client to change the USB profile.
Chapter 8 : Device Management 192 Hot key: Take this action: Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key P.
Chapter 8 : Device Management 193 Select the "Ignore CC managed m ode on local port" checkbox if you would like local user a ccess to the KX II even when the device is under CC-SG management.
Chapter 8 : Device Management 194 KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two loca l port options: the standard local port and the extended local port.
195 In This Chapter Security Settings .................................................................................... 195 Configuring IP Access Cont rol .............................................................. 205 SSL Certificates .........
Chapter 9 : Security Management 19 6 To reset back to defaults: Click Reset to Defaults. Login Limitations Using login limitations, yo u can specify restrictions fo r single login, password aging, and the logging o ut idle users.
Chapter 9 : Security Management 197 Limitation Description Enter the number of days aft er which a password change is required. The de fault is 60 days.
Chapter 9 : Security Management 198 Strong Passwords Strong passwords provide more secure local authenti ca tion for the system. Using strong password s, you can specify the format of valid KX II local passwords such as minimum and maximum le ngth, required characters, and password history retention.
Chapter 9 : Security Management 199 User Blocking The User Blocking options sp ecify the criteria by whi ch users are blocked from accessing the system aft er the specified number of un successful login attempts. The three options are mutu ally exclusive: Option Description Disabled The default option.
Chapter 9 : Security Management 200 Option Description Timer Lockout Users are denied access to the system for the specified amount of time af ter exceeding the specified number of unsucces sful login attempts.
Chapter 9 : Security Management 201 Encryption & Share Using the Encryption & S hare settings you can specif y the type of encryption used, PC and V M share modes, and the ty pe of reset performed when the KX II Reset button is pressed.
Chapter 9 : Security Management 202 Encryption mode Description a National Institute of S tandards and Technology specification fo r the encryption of electronic data. 256 is the ke y length. When AES -256 is specified, be certain that y our browser supports it, other wise you will not be able to connect.
Chapter 9 : Security Management 203 Local device reset mode Description Enable Local Factory Reset (default) Returns the KX II dev ice to the factory defaults. Enable Local Admin Password Reset Resets the local administrator pa ssword only. The password is reset to raritan.
Chapter 9 : Security Management 204 Enabling FIPS 140-2 For government and other high se curity environments, enabling FIPS 140 -2 mode may be desirable. The KX II uses an embedded FIPS 140 -2-validated cryptograp hic module running on a Linux ® platform per FIPS 140-2 Implementation Guida nce section G.
Chapter 9 : Security Management 205 FIPS 140-2 should be enabled on t he client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administr ative Tools > Local Secu rity Policy to open the Local Security S ettings dialog.
Chapter 9 : Security Management 206 To add (append) rules: 1. Type the IP address and s ubnet mask in the IPv4/ Mask or IPv6/Prefix Length field. Note: The IP address sho uld be entered using CID R (Classless Inter-Domain Routing notat ion, in which the first 24 bits are used as a network address).
Chapter 9 : Security Management 207 3. You are prompted to confi rm the deletion. Click OK. SSL Certificates The KX II uses the Secure Soc ket Layer (SSL) protocol for any encrypted network traffic betwee n itself and a connected client. When establishing a connection, the KX II has to identify itself to a client using a cryptographic certificate.
Chapter 9 : Security Management 208 b. Organizational unit - This field is u se d for specifying to whi ch department within an organization the KX II belongs. c. Organization - The name o f the organization to which the K X II belongs. d. Locality/City - The city where t he organization is locate d.
Chapter 9 : Security Management 209 Note: The CSR and the private key f ile are a matched set and should be treated accordingly. If the sig ned certificate is not matched with the private key used to gen erate the original CSR, t he certificate will not be useful.
Chapter 9 : Security Management 210 4. If needed, change the banner titl e. This information will be displayed to users as part of the banner. Up to 64 characters ca n be used. 5. Edit the information in the Restri cted Services Banner Message text box.
211 In This Chapter Audit Log ................................................................................................ 211 Device Information ................................................................................. 212 Backup and Restore .
Chapter 10 : Maintenance 212 Device Information The Device Information pa ge provides detailed info rmation about your KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Te chnical Support. To view information abo ut your KX II and CIMs: Choose Maintenance > Dev ice Information.
Chapter 10 : Maintenance 213 Backup and Restore From the Backup/Restore page, you can backup and resto re the settings and configuration for your KX II. In addition to using backup and re store for business continuity pur poses, you can use this featu re as a time-saving mechanism.
Chapter 10 : Maintenance 2 14 If you are using Internet Expl orer 6 or higher, to backup y our KX II: 1. Click Backup. A File Downl oad dialog appears that co ntains an Open button. Do not click Open. In IE 6 and higher, IE is used as the default application t o open files, so you are prompted to open t he file versus save the file.
Chapter 10 : Maintenance 215 Full Restore - A complete r estore of the entire system. Gene rally used for traditional backup and restore purposes. Protected Restore - Everything is restored except device-specific information such as IP add ress, name, and so forth.
Chapter 10 : Maintenance 216 USB Profile Management From the USB Profile Managem ent page, you can upload custo m profiles provided by Raritan t ech support. These profiles are designed to address the needs of your t arget server‟s configura tion, in the ev ent that the set of standard prof iles does not already address them.
Chapter 10 : Maintenance 217 As noted, you may delete a custom profile from the system while it is still designated as an active prof ile. Doing so will terminate any virtua l media sessions that were i n place.
Chapter 10 : Maintenance 218 3. Click the Upgrade button. You are prompted to confir m the upgrade. 4. Click OK to continue the upgrade. Progress bars are displayed during the upgrade.
Chapter 10 : Maintenance 219 6. Click Upload from the Firmware U pgrade page. Information about the upgrade and version n umbers is displayed for yo ur confirmation (if you opted to review CIM informatio n, that information is dis played as well): Note: At this point, conne cted users are logged out, and new login attempts are blocked.
Chapter 10 : Maintenance 220 For information about upgradi ng the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Access Clients Guide .
Chapter 10 : Maintenance 221 Upgrade History The KX II provides information about upgrades performed on t he KX II and attached CIMS. To view the upgrade history : Choose Maintenance > Upgra de History.
Chapter 10 : Maintenance 222 To reboot your KX II : 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prom pted to confirm the action .
Chapter 10 : Maintenance 223 Stopping CC-SG Management While the KX II is under CC-SG man agement, if you try to access the device directly, y ou are notified that it the device is un der CC-SG management.
Chapter 10 : Maintenance 224 3. Click Yes to remove the device C C-SG management. Once CC-S G management has ended, a confi rmation will be displayed..
225 In This Chapter Network Interface Page ......................................................................... 225 Network Statistics Page ......................................................................... 226 Ping Host Page .............
Chapter 11 : Diagnostics 226 Network Statistics Page The KX II provides statistics abo ut your network interf ace. To view statistics about y our network interface: 1.
Chapter 11 : Diagnostics 227 Interfaces - Produces a pa ge similar to the one displayed here. Route - Produces a page simila r to the one displayed here.
Chapter 11 : Diagnostics 228 Ping Host Page Ping is a network tool used to test whether a particul ar host or IP address is reachable acro ss an IP network. Using t he Ping Host page, you can determine if a targ et server or another KX II is accessible.
Chapter 11 : Diagnostics 229 Note: The host name cann ot exceed 232 characters in length. 3. Choose the maximum hops from the d ro p-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace r oute command is executed f or the given hostname or IP address and t he maximum hops.
Chapter 11 : Diagnostics 230 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Techni cal Support. Device diagnostics downl oads the diagnostics info rmation from the KX II to the client machine.
Chapter 11 : Diagnostics 231 a. Click the Save to File butt on. The File Download dialog open s. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed b y Raritan Technical Support .
232 In This Chapter Overvi ew ................................................................................................ 232 Accessing the KX II Using CLI .............................................................. 233 SSH Connection to the KX II .
Chapter 12 : Command Line Interface (CLI) 233 Accessing the KX II Using CLI Access the KX II by using one of the following methods: SSH (Secure Shell) via IP connection A number of SSH clients a re available and can be obt ained from the following locations: Putty - http://www.
Chapter 12 : Command Line Interfac e (CLI) 234 SSH Access from a UNIX/ Linux Workstation To open an SSH session from a UN IX ® /Linux ® w orkstation and log in as the user admin, enter the f ollowing command: ssh - l admin 192.168.30.222 The Password prompt app ears.
Chapter 12 : Command Line Interface (CLI ) 235 After reviewing the followin g Navigation of the CLI (on page 2 35 ) section, perform the Initial Configuration tasks. Navigation of the CLI Before using the CLI, it is important to understand C LI navigation and syntax.
Chapter 12 : Command Line Interfac e (CLI) 236 Completion of Command s The CLI supports the completion of partially-entered comm ands. After entering the first few character s of an entry, press the Tab k ey. If the characters form a unique match, the CLI will complete the entry.
Chapter 12 : Command Line Interface (CLI) 237 Commands Description help Display an overview of the CLI syntax. quit Places the user back one l evel. logout Logs out the user session. Initial Configuration Using CLI Note: These steps, which us e the CLI, are optional since the same configuration can be done via K VM.
Chapter 12 : Command Line Interfac e (CLI) 238 Setting Network Parame ters Network parameters are conf igured using the interface command. admin > Config > Network > interface ipauto none ip 192.168.151.12 mask 255.255.255.0 gw 192.168.151.1 mode auto When the command is accepted, the device automatically dro ps the connection.
Chapter 12 : Command Line Interface (CLI) 239 Command Description history Display the current session's command line history. listports List accessible ports. logout Logout of the current CLI ses sion. top Return to the root menu. userlist List active user sessions.
Chapter 12 : Command Line Interfac e (CLI) 240 Configuring Network The network menu comm ands are used to configure the KX II network adapter. Commands Description interface Configure the KX II device network interface. name Network name configuratio n ip v6 Set/get IPv6 network para meters.
Chapter 12 : Command Line Interface (CLI) 241 Name Command The name command is used to config ure the network name. The syntax of the name is: name [devicename <devicename>] [hostname <hostna.
242 In This Chapter Overview ................................................................................................ 242 Using the KX II Local Console ............................................................... 242 KX II Local Console Interface .
Chapter 13 : KX II Local Consol e 243 KX II Local Console Interface When you are located at t he server rack, the K X II provides standard KVM management and ad ministration via the KX II Local C onsole.
Chapter 13 : KX II Local Cons ole 244 Local Console Smart Card Access To use a smart card to acces s a server at the Local Con sole, plug a USB smart card reader into the KX II using one of the USB ports located on the KX II. Once a smart ca rd reader is plugged in or unplugged from the KX II, the KX II autodetects it .
Chapter 13 : KX II Local Consol e 245 To update the Card Read ers Detected list: Click Refresh if a new smart card has been mounted. The C ard Readers Detected list will be refr eshed to reflect the newly added smart card reader.
Chapter 13 : KX II Local Cons ole 246 2. In the Select Profile To Use f ield, select the profile to use from among those available for the port. 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field.
Chapter 13 : KX II Local Consol e 247 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Acce ss page opens. This page lists all of the KX II ports, the connected K VM target servers, and their status and availa bility.
Chapter 13 : KX II Local Cons ole 248 To use the Port Access p age: 1. Log in to the Local Console. The KVM target servers are init ially sorted by Port Number. You can change the display to sort on any of the columns. Port Number - Numbered f ro m 1 to the total number o f ports available for the KX II devi ce.
Chapter 13 : KX II Local Consol e 249 2. Click View by Port or View by Group to switch betwe en views. In addition to the Port Number, Port Name, Status, T ype, and Availability, a Group column is als o displayed on the View by Group tab. This column contains the p ort groups that are available.
Chapter 13 : KX II Local Cons ole 250 Blade chassis Connect key action Key sequence example Access a port from the local port GUI Access port 5, slot 2: Press Left ALT > Press a nd Release 5 &g.
Chapter 13 : KX II Local Consol e 251 Sun key Local port key combination Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KPAD - Stop No key combination Power No key combination Accessing a Target Server To access a target serv er : 1.
Chapter 13 : KX II Local Cons ole 252 Configuring KX II Local Console Local Port Settings From the Local Port Settings pa ge, you can customize many se ttings for the KX II Local Console in clu ding keyboard, hot key s, video switching delay, power save mode, local user interface resoluti on settings, and local user authentication.
Chapter 13 : KX II Local Consol e 253 3. Choose the local port hot key. The local port hot key is used to return to the KX II Local Console interfa ce when a target serv er interface is being viewed.
Chapter 13 : KX II Local Cons ole 254 None. There is no authenti cation for Local Console ac cess. This option is recommended for secur e environments only. Select the "Ignore CC managed m ode on local port" checkbox if you would like local user a ccess to the KX II even when the device is under CC-SG management.
Chapter 13 : KX II Local Consol e 255 Configuring KX II Local Port Settings from the Local Console The standard local port an d the extended local port can be configured from the Remote Console on t he Port Configuration page or from the Local Console on the Local Port Settings page.
Chapter 13 : KX II Local Cons ole 256 Timeout (seconds) 1. Click Reset to continue. You will be prompted to confirm the f actory reset because all network sett ings will be permanently lost. 2. Click OK button proceed. Up on completion, the K X II device is automatically restarted.
257 In This Chapter Physical Specifications ................................ .......................................... 257 Environmental Requireme nts ................................................................ 259 Supported Operating Systems ( Clients) .
Appendix A : Specifications 258 Part number Line item description UP C code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DKX2- 132 32 -Port KX II with 1-user network access and local port, virtual media, dual power 785813624079 Dual power 100/240 V 50/60 Hz 0.
Appendix A : Specifications 259 KX2-8 Specifications Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) DKX2- 83 2 32 -Port .
Appendix A : Specifications 260 Operating Shock N/A Supported Operating Systems (Clients) The following operating system s ar e supported on the V irtual KVM Client and Multi-Platform Client ( MPC): C.
Appendix A : Specifications 261 Mode Operating system Browser Windows Server 2003 ® Internet Explorer 6.0 SP1++, IE 7, IE 8 Firefox 1.06 - 3 Windows Vista ® Internet Explorer 7.0 or 8. 0 Windows 7 ® Internet Explorer 7.0 or 8.0 Firefox 1.
Appendix A : Specifications 262 Supported Paragon CIMs Operating system and serial devices ( where applicable) Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse mode P2CIM- P.
Appendix A : Specifications 263 Supported Paragon CIMs Operating system and serial devices ( where applicable) Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse mode UKVMPD (version 0C4) Note: Version 0C5 does not work with KX II.
Appendix A : Specifications 264 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse m ode DCIM- PS2 Windows XP Windows 2000 .
Appendix A : Specifications 265 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse m ode DCIM-USBG2 Windows XP Windows 2000.
Appendix A : Specifications 266 Supported KX II D2CIMs Target server and remote rack PDUs (where applicable) Virtual media Ab solute Mouse mode Intelligent Mouse mode Standard Mouse mode D2CIM-VUS.
Appendix A : Specifications 267 Supported Operating Systems and CIMs (KVM Target Servers) In addition to the new D2CIMs, most Dominion CIMs are supported. The following table displays the supported target server o perating systems, CIMs, virtual media, and mous e modes: Note: D2CIM-VUSB is not suppo rted on Sun ™ (Solaris ™ ) tar gets.
Appendix A : Specifications 268 Target server Supported CIMs Mouse modes Windows 2003 Server ® Windows Vista operating system Red Hat ® Enterprise Workstation 3.0, 4.0 and 5.0 DCIM- PS2 DCIM-USB DCIM-USB G2 D2CIM-VUSB (excluding Red Hat Enterprise Workstation 3.
Appendix A : Specifications 269 Legend: VM - Virtual Media (D2CIM-VUSB only) AM: Absolute Mouse Sync hronization (D2CIM-VUSB only) IM: Intelligent Mouse Mode SM: Standard Mouse Mode : Supported The DCIM-USB G2 provid es a small slide switch on t he back of the CIM.
Appendix A : Specifications 270 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (WxDxH) UPC code Interface Module for Remote Rack PDUs 0.6" D2CIM-VUSB- 32PAC Bulk pack of 32 D2CIM-VUSB 6.
Appendix A : Specifications 271 Certified Modems USRobotics ® 56K 5686E ZO OM ® v90 ZOOM v92 USRobotics Sportster ® 56K USRobotics Courier ™ 56K Devices Supported by the KX2-832 and KX2-864 Extended Local Port The extended local port suppo rts attachment from th e following devices: KX2 -832 and KX2-864.
Appendix A : Specifications 272 Note: Due to the multiplicity of server manufacturers and t ypes, OS versions, video drivers, and so f orth and the subjective nature of video quality, Raritan cannot guar antee performance across all distances in all environments.
Appendix A : Specifications 273 Resolutions 640x350 @85Hz 1024x768 @75Hz 640x400 @56Hz 1024x768 @90Hz 640x400 @84Hz 1024x768 @100Hz 640x400 @85Hz 1152x864 @60Hz 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.
Appendix A : Specifications 274 Supported Keyboard Languages The KX II provides keyboard s upport for the languages listed in t he following table. Note: You can use the keyboard for Chinese, Japanese, and Korean for display only; local language input is not supported at this time for the KX II Local Console functions.
Appendix A : Specifications 275 Language Regions Keyboard layout Spanish Spain and most Spanish speaking countries Spanish Portuguese Portugal Portuguese Smart Card Readers Supported and Unsuppo rted Smart Card Readers External, USB smart card re aders are supported.
Appendix A : Specifications 276 This table contains a list of read ers that Raritan has tested a nd found not to work with the Raritan d evice, therefore they are unsupported.
Appendix A : Specifications 277 Windows XP ® operating system t argets must be running Win dows XP SP3 in order to use smart cards with the KX II. If you are working with .NET 3.5 in a Windows XP env ironment on the target server, you must be using SP1.
Appendix A : Specifications 278 Fedora ® Core 10 pcsc-lite-1.4.102.3.fc10.i386 Create a Java ™ Library Link A soft link must be create d to the libpcsclite.so after upgra ding RHEL 4, RHEL 5 and FC 10. Fo r example, ln – s /usr/lib/libpcsclite.
Appendix A : Specifications 279 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS P ort Settings (on page 140). B y default, all requests recei ved by the KX II via HTTP (port 80) are automatic ally forwarded to HTTPS for complete security.
Appendix A : Specifications 280 Network Speed Settings KX II net work speed setting Network switch port setting Auto 1000/Full 100/Full 100/Half 10/Full 10/Ha lf Auto Highest Available Speed 1000/Full.
Appendix A : Specifications 281 communicate, but collision s will occur Per Ethernet specification, these sh ould be “no communication,” howeve r, note that the KX I I behavior deviates from expected be havior Note: For reliable network communication, config ure the KX II and the LAN switch to the same LAN Int erface Speed and Duplex.
282 Note: The procedures in thi s chapter should be attem pted only by experienced users. In This Chapter Returning User Group Inf ormation ........................................................ 282 Setting the Registry to Permit Write Operations to the Schema .
Appendix B : Updating the LDAP Sc hema 283 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller t o write to the schema, you mu st set a registry entry that permits schema updates. To permit write operations to the schema: 1.
Appendix B : Updating the LDAP S chema 284 3. Click New and then choo se Attribute. When the warni ng message appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciusergroup in the C ommon Name field. 5. Type rciusergroup in the L DAP Display Name field.
Appendix B : Updating the LDAP Sc hema 285 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from th e menu. The user Properti es dialog appears.
Appendix B : Updating the LDAP S chema 286 6. Choose rciusergroup f rom the Select Schema O bject list. 7. Click OK in the Select Sch ema Object dialog. 8. Click OK in the User Prope rties dialog. Updating the Schema Cache To update the schema ca che: 1.
Appendix B : Updating the LDAP S chema 287 3. Go to the directory where the suppo rt tools were installed. Run adsiedit.msc. The ADSI Edit window opens.
Appendix B : Updating the LDAP S chema 288 6. Locate the user name whose p roperties you want to a djust in the right pane. Right-click the user name and select Propertie s. 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attrib utes list.
289 In This Chapter Overview ................................................................................................ 289 Java Runtime Environment (JRE) ......................................................... 289 IPv6 Support Notes .........
Appendix C : Informational Notes 290 IPv6 Support Notes Java Java ™ 1.6 supports IPv6 for the follo wing: Solaris ™ 8 and higher Linux ® kernel 2.1.2 and higher (RedH at 6.1 and higher) Java 5.0 and above supports the I Pv6 for the following: Solaris 8 and higher Linux kernel 2.
Appendix C : Informational Notes 291 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux ® Clients Only) The Virtual KVM Client an d the Multi-Platform Client (MPC ) do not process the key combinati o n of Alt Gr + 9 as the caret symbol (^) when using French keyboards with Linux clients.
Appendix C : Informational Notes 292 Tilde Symbol From the Virtual KVM Clie nt and the Multi-Platform Client, the key combination of Alt Gr + 2 does not produce the tilde (~) symbol when using a French keyboard. To obtain the tilde sy mbol: Create a macro consisting of the following commands: Press right Alt.
Appendix C : Informational Notes 293 Note: The Keyboard Indica tor should be used on Linu x systems using Gnome as a desktop envir onment. When using a Hungarian keyboa rd from a Linux client, the Latin letter U with Double Acute and the Latin letter O with Double A cute work only with JRE 1.
Appendix C : Informational Notes 294 Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality , Raritan recommends using t he following cable lengths and video resolutions when y ou are connecting to Dell ® blade chassis from the KX II: Cable length Video resolution 50 ft.
Appendix C : Informational Notes 295 Resolving Issues w ith Firefox Freezing w hen Using Fedora If you are accessing Fi refox ® and are using a Fedora ® server, Firefo x may freeze when it is opening. To resolve this issue, i ns tall the libnpjp2.so Java ™ plug-in on the serv er.
Appendix C : Informational Notes 296 USB Ports and Profiles VM -CIMs and DL360 USB Ports HP ® DL360 servers have o ne USB port on the back o f the device and another on the front of the device. With the DL360, bo th ports cannot be used at the same time.
Appendix C : Informational Notes 297 USB profile help appears i n the USB Profile Help window. Fo r detailed information about specifi c USB profiles, see Available USB Pro files (on page 102 ). Raritan provides a standard selection of USB configuration profiles for a wide range of operating sy stem and BIOS level server implementations.
Appendix C : Informational Notes 298 Changing a USB Profile when U sing a Smart Card Reader There may be certain circumsta nces under which y ou will need to change the USB profile for a target server.
Appendix C : Informational Notes 299 Windows 2000 Composit e USB Device Behav ior f or Virtual Media The Windows 2000 ® operat ing system does not sup port USB composite devices, like Raritan‟ s D2CIM-V USB, in the same manner a s non -composite USB devices.
Appendix C : Informational Notes 300 Accessing Virtual Media on a Windows 2000 S erver Using a D2CIM-VUSB A virtual media local drive c annot be accessed on a Windows 2000 ® server using a D2CIM-VU SB. Target BIOS Boot Tim e with Virtual Media The BIOS for certain targets may take longer to boot if m edia is mounted virtually at the target.
Appendix C : Informational Notes 301 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do n ot use the CC-SG proxy mode if you are pla nning to use the Multi-Platfo rm Client (MPC).
302 In This Chapter General Questions ................................................................................. 303 Remote Access ..................................................................................... 305 Universal Virtual Media .
Appendix D : FAQs 303 General Questions What is the KX II? The KX II is a second gene ration digital KVM (keyboa rd/video/ mouse) switch that enables one, two, four or eight IT administrators to access and control 8, 16, 32 or 64 servers over the network wi th BIOS-level functionality.
Appendix D : FAQs 304 Will my existing KX I CIM s work with the KX II switches? Yes, existing KX I CIM s will work with the KX II switch. In addition, select Paragon CIMs will work with t he KX II. This provides an easy migration to the KX II from Paragon I customers who wish to switch t o KVM -over-IP.
Appendix D : FAQs 305 Remote Access How many users can re motely access servers on each KX II? The KX II models offer remote connections for up to eight us ers per user channel to simultaneously access an d control a unique target serve r.
Appendix D : FAQs 306 100Mbps Theoretical 100Mbit network speed 0.05 seconds 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network speed .
Appendix D : FAQs 307 Universal Virtual Media What KX II models support v irtual media? All of the KX II models support virtual media. It is available sta ndalone and through Raritan's CommandCent er Secure Gateway, Raritan 's centralized management unit.
Appendix D : FAQs 308 USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services such as vir tual media. The USB Profile tailors the KX II‟s USB interface to the serv er to accommodate these server specific characteristics.
Appendix D : FAQs 309 Do I need a special CIM t o use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan provide USB profiles for other target server configurations? Raritan will provide new USB profiles to suit customer needs.
Appendix D : FAQs 310 Bandwidth and KVM- over -IP Performance How is bandwidth used i n KVM-over-IP systems? The KX II offers next generat ion KVM-over-IP technology – the very best video compression availabl e. Raritan has received numerous technical awards confirming its high v ideo quality transmissions and t he low bandwidth utilization.
Appendix D : FAQs 311 Unlike KX I, the Noise Filte r parameter does not generally have a large role in reducing bandwidth or improving performa nce. How much band w idth does KX II use for common ta sks? Bandwidth primarily depends on the u ser's task and actions.
Appendix D : FAQs 312 Qu ickTime video #2 1500 - 2500 KB/s 400 - 550 KB/s 200 - 350 KB/s With the reduced bandwidt h settings, bandwidth is re duced significantly for virtually all tasks. With the 15 bit color setting, perceived pe rformance is similar to the default parameter s.
Appendix D : FAQs 313 Please note that these bandwidth figures are only examples an d may vary from those seen in yo ur environment due to many factors. How can I reduce band w idth? The KX II provides a variety of settings in our remote client s to optimize bandwidth and performance.
Appendix D : FAQs 314 It depends on the bandwidt h and latency of the I nternet connection between your remote client and the KX II. With a cable modem or high speed DSL connection, yo ur performance can be ve ry similar to a LAN/WAN connection. For lower speed links, use the suggestions above to improve performance.
Appendix D : FAQs 315 Ethernet and IP Networking Does the KX II offer dual gi gabit Ethernet ports to prov ide redundant fail-over? Yes. The KX II features dual gigabit Ethernet ports to provide redundant failover capabilities.
Appendix D : FAQs 316 How many TCP ports must be ope n on my firewall in order to enable network access t o the KX II? Are these po rts configurable? Only one. The KX II protect s network security by only requiring access to a single TCP port to operat e.
Appendix D : FAQs 317 IPv6 Networking What is IPv6? IPv6 is the acronym for “Int ernet Protocol Version 6”. IPv6 is the “next generation” IP protocol which will re place the current IP Vers ion 4 (IPv4) protocol. IPv6 addresses a number of problems in IPv4, such as the limited number of IPv4 addresses .
Appendix D : FAQs 318 Where can I get more information on IPv6? See www.ipv6.org for general inf ormation on IPv6. The KX II User Guide describes the KX II‟s support for IPv6.
Appendix D : FAQs 319 Servers Does the KX II depend on a Windows server to operat e? Absolutely not. B ecause users depend on the KVM infrastructure to always be available in any scenario whatsoever (as they will likely need to use the KVM infrastructu re to fix problems), the KX II is designed to be completely independent from any external server.
Appendix D : FAQs 320 Blade Servers Can I connect blade servers to t he KX II? Yes. The KX II supports popula r blade server models from the leading blade server manufacturer s: HP ® , IBM ® and Dell ® .
Appendix D : FAQs 321 For KX II's, Raritan recommend s connecting up to tw o times the number of remote connections sup ported by the device. For example, with a KX2 -216 with two remote channels, we recommend connecting u p to 4 blade server chassis.
Ap pendix D : FAQs 322 Installation Besides the device itself, what do I need to orde r from Raritan to install the KX II? Each server that connects to the KX II requires a Dominion o r Paragon Computer Interface Mod ule (CIM), an adapte r that connects directly to the keyboard, video, and m ouse ports of the server.
Appendix D : FAQs 323 Servers connected to the KX II do not require any software agents to be installed, because the KX II connects directly via hardware t o servers' keyboard, video, and mouse ports.
Appendix D : FAQs 324 Local Port Can I access my serv ers directly from the rack? Yes. At the rack, the KX II functions just like a tradition al KVM switch, allowing control of up to 64 serv ers using a single keyb oard, monitor, and mouse. Can I consolidate the loc al ports of multiple KX I I’s? Yes.
Appendix D : FAQs 325 If the external authenticatio n servers are unavailable, the KX II fails-over to its own interna l authentication database. The KX II has its own standalone a uthentication, enabling instant, out - of -the-box installation.
Appendix D : FAQs 326 Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) What is the extended local por t? The Dominion KX2-832 and K X2-864 feature an extended local p ort.
Appendix D : FAQs 327 Power Control Does the KX II hav e a dual power option? All of the KX II models com e equipped with dual AC in puts and power supplies with automatic fail-over. Should one of the power inputs or power supplies fail, then t he KX II will automatically switch to the other.
Appendix D : FAQs 328 Does remote po w er control require any special server configuration? Some servers ship with default BIOS settings such that the server does not automatically restart af ter losing and regainin g power. For these servers, see the server‟s d ocumentation to chang e this setting.
Appendix D : FAQs 329 Scalability How do I phy sically connect multiple KX II de vices together into one solution? To physically connect mult iple KX II devices together for c onsolidated local access.
Appendix D : FAQs 330 For customers wanting stand-alone us age (without a cent ral management system), multiple KX II units still interoperate and scale together via the IP network . Multiple KX II switches ca n be accessed from the KX II web-based u ser interface and from the Multiplatform Client (MPC).
Appendix D : FAQs 331 Computer Interface Modules (CIMs) Can I use Computer Int erface Modules (CIMs ) from Raritan's analog matrix KVM s w itch, Paragon, with the KX II? Yes.
Appendix D : FAQs 332 Security Is the Dominion KX II FIPS 140 -2 Certified? The KX II 2.2.0 and later, and t he KSX II 2.3.0 and later, provides users with the option to use an embed ded FIPS 140-2-validated cryptogr aphic module running on a Linux platform per FIPS 140-2 impleme ntation guidelines.
Appendix D : FAQs 333 Yes, the KX II has admini strator-configurable, strong passwor d checking to ensure that user-created pas swords meet corporate and/or government standards and are resistant to brute force hackin g.
Appendix D : FAQs 334 Smart Cards and CAC Authentication Does the KX II support smart car d and CAC authentication? Yes, smart cards and DoD Comm on Access Card (CAC) a uthentication to target servers is support ed in release KX I I 2.1.10 and later, and KSX II 2.
Appendix D : FAQs 335 Manageability Can the KX II be remotely managed and configured via web browser? Yes, the KX II can be com pletely configured remotely via web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) v er sion installed.
Appendix D : FAQs 336 Miscellaneous What is the KX II's default I P address? 192.168.0.192 What is the KX II's default user name and pass w ord? The KX II's default user name is admi n and the default password is raritan [all lower case].
337 A A. AC Power • 27 Absolute Mouse Mode • 72 Accessing a Targe t Server • 251 Accessing the KX II Using CLI • 233 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM- VU SB • 3.
Inde x 338 Connecting to Virtual Med ia • 97 Connection Information • 57 Connection Propertie s • 55 Create User Groups and User s • 35 Creating a New Attribute • 283 D D.
Index 339 K Keyboard Language Preference ( Fedora Linux Clients) • 292 Keyboard Macros • 57 Keyboard Options • 57 Keyboards • 291 KX II Client Ap plications • 5 KX II Console Layout • 40 K.
Index 340 R Rack PDU (Power Strip) O utlet Control • 84 RADIUS Communication Ex ch ange Specifications • 13 1 Rebooting • 221 Refreshing the Screen • 63 Related Documentation • 5 Relationshi.
Index 341 SUSE/VESA Video Modes • 295 Switching Between KVM Target Servers • 53 T Target BIOS Boot Time wit h Virtual Media • 300 Target Server Connection Dista nce and Video Resolu tion • 271.
U.S./Canada/Latin Americ a Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 732- 764 -8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.
デバイスRaritan Computer DKX2-V2.3.5-0N-Eの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Raritan Computer DKX2-V2.3.5-0N-Eをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはRaritan Computer DKX2-V2.3.5-0N-Eの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Raritan Computer DKX2-V2.3.5-0N-Eの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Raritan Computer DKX2-V2.3.5-0N-Eで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Raritan Computer DKX2-V2.3.5-0N-Eを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はRaritan Computer DKX2-V2.3.5-0N-Eの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Raritan Computer DKX2-V2.3.5-0N-Eに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちRaritan Computer DKX2-V2.3.5-0N-Eデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。