Raritan ComputerメーカーDKX2-0E-Eの使用説明書/サービス説明書
ページ先へ移動 of 257
Dominion KX II User Guide Release 2.0.5 Copyright © 2007 Raritan, Inc. DKX2-0E-E September 2007 255-62-4023-00.
This document contains pr oprietar y information t hat is protect e d by copyright. All rights reserved. No part of this document may be photocopied, repro duced, or translated into another language without express prior written consent of Raritan, Inc.
iii Contents Chapter 1 Introduction 1 Dominion KX II Over view ........................................................................................................ ............... 2 Virtual Media ...................................................
Contents iv IBM AIX 5.3 Settings ........................................................................................................... ......... 26 Make UNIX Setti ngs Permanent ...................................................................
Contents v Discover Devices - KX Sub net ................................................................................................... . 55 Add New Fa vorite .......................................................................................
Contents vi Virtual Media .................................................................................................................. ......................... 84 Tools Menu ......................................................................
Contents vii Chapter 9 Device Management 121 Device Manage ment Menu ......................................................................................................... ......... 121 Network Se ttings ............................................
Contents viii IP Access Contro l................................................................................................................................... 153 Chapter 11 Maintenance 156 Maintenanc e Menu ......................................
Contents ix Chapter 14 CC Unmanage 187 Overview ....................................................................................................................... ......................... 187 Removing Dominion KX II from CC-SG Management .......
Contents x Macintosh Keyboard ............................................................................................................. ................ 208 Mouse Pointer Synchr oniz ation (Fedora) .................................................
xi Table of Figures Figure 1: Dominion KX II Configuration ........................................................................................ 2 Figure 2: Dominion KX2-116 ..........................................................................
Table of Figure s xii Figure 38: Map Virtual Media CD/ISO Image.............................................................................. 94 Figure 39: File Server Setup .............................................................................
Table of Figure s xiii Figure 80: Reboot Confirmation ................................................................................................. ... 166 Figure 81: Network Interface ..............................................................
.
1 In This Chapter Dominion KX II Over view................................................................................ 2 Virtual Media ..................................................................................................... 3 Product Photos .
Dominion KX II Ove rview 2 Dominion KX II Overview Dominion KX II is an enter prise-class, secure, digital KVM (Keyboard, Video, Mouse) sw itch that provides BIOS-level (and up) access, and control of up to 64 servers from an ywhere in the world via Web br owser.
Chapter 1: Introduction 3 Virtual Media All Dominion KX II models support virtual med ia. The benefits of virtual media - mounting of remote drives/media on the target server to support software instal lation, and diagnost ics - are now available in all of the Dominion KX II models.
Product Features 4 Figure 3: Dom inion KX2-43 2 Figure 4: Dominion KX II CIMs: D2CIM- VUSB (left); D2CIM-PWR (r ight) Product Features Hardware • Integrated KVM-over-IP remote access • 1U or 2U (K.
Chapter 1: Introduction 5 One front and three back panel USB 2.0 ports for supported USB devices Fully concurrent with remote user access Local Graphical Use r Interface (GUI) for administ.
Terminology 6 Terminology This manual uses the following t e rminology for the components of a typical Dominion KX II configur ation: Figure 5: Term inology and Topol ogy Remote PC (client) Networked computers used to acce ss and control target servers connected to the Dominion KX II.
Chapter 1: Introduction 7 Package Contents Each Dominion KX II ships as a fully-con figured stand-alone pro duct in a standard 1 U (2U for KX2-464) 19" rackmount cha ssis.
User Guid e 8 Organization of Information The user guide is organized as follow s: • Chapter 1, Introduction. Overview, fe atures, terminology, and package contents • Chapter 2, Getting Started. Login information; default IP Address; supported operating syste ms, browsers, and CIMs • Chapter 3, In stallation and Configuratio n.
Chapter 1: Introduction 9 • Appendix D, FAQs. Ge neral questions, remote access, universal virtual media, Ethernet and IP netw orking, servers, in stallation, local port, power control, scalability,.
10 In This Chapter Login Information............................................................................................ 10 Default IP Address .......................................................................................... 10 Supported Operating Syst ems (Clients) .
Chapter 2: Getting Started 11 Red Hat Linux 9.0 Yes; Locally held I SO image, Remote File Server mounting directly from KX Red Hat Enterprise Workstation 3.0 and 4. 0 Yes; Locally held I SO image, Remote F ile Server mounting directly from KX SUSE Linux Professional 9.
Supported Operating System s and CIMs (Target Se rvers) 12 Supported Operating Systems and CIMs (Target Servers) In addition to the new Dominion KX II D2CIMs, most Paragon® and Dominion KX I CIMs are supported.
Chapter 2: Getting Started 13 Mac OS P2CIM-AUSB UUSBPD DCIM-USB DCIM-USB G2 D2CIM-VUSB 9 9 All Solaris OSs supported in Dominion KX I P2CIM-SUN P2CIM-SUSB DCIM-SUN DCIM-SUSB DCIM-USB G2 9 IBM AIX P2CI.
14 In This Chapter Overview........................................................................................................... 14 Step 1: Configure Target S ervers ................................................................... 15 Step 2 (Optional): Config ure Keybo ard Language.
Chapter 3: Installation and Configuration 15 Step 1: Configure Target Servers Target servers are the computers that w ill be accessed and controlled via the Dominion KX II. Before instal ling Dominion KX II, configur e all target servers to ensure optimum performance.
Step 1: Configure Target Servers 16 640x480 @120 Hz 1024x768 @72 Hz 1280x1024 @75 Hz 720x400 @70 Hz 1024x768 @75 Hz 1280x1024 @85 Hz 720x400 @84 Hz 1024x768 @85 Hz 1600x1200 @60 Hz Note: Composite Sync and Sync-on -Green video require an additional adapter.
Chapter 3: Installation and Configuration 17 Windows XP / Windows 2003 Settings ¾ To configure target server s running Microsoft Windows XP/2003: 1. Configure the mouse settings: a. Select Start > Co ntrol Panel > Mouse. b. Open the Pointer Options tab.
Step 1: Configure Target Servers 18 Windows 2000 Settings ¾ To configure target server s running Microsoft Windows 2000: 1. Configure the mouse settings: a. Select Start > Co ntrol Panel > Mouse. b. Open the Motion tab. Set the acceleration to None.
Chapter 3: Installation and Configuration 19 c. Open the Advanced tab. d. Click the Settings button in the Performance group. The Performance Options dialog opens.
Step 1: Configure Target Servers 20 a. Select Main Menu > System Settings > Display. The Display Settings dialog opens. b. From the Display tab, select a Resolution supported by Dominion KX II. c. From the Advanced tab, verify that the Refresh Rate is supported by Dominion KX II.
Chapter 3: Installation and Configuration 21 Note: If you ch ange video reso lution, you must l ogout of the target server a nd log back in for the video settings to take effect.
Step 1: Configure Target Servers 22 Note: If these steps do not work, issue t he xset mouse 1 1 command as described in the Linux c ommand line instructions. 2. Configure the screen resolution: a. Select Main Menu > System Settings > Display. The Display Settings dialog opens.
Chapter 3: Installation and Configuration 23 Make Linux Settings Permanent Note: These steps may vary slightly depe nding on the specific version of Linux in use. ¾ To make your settings permanent in Linux (prompt): 1. Select Main Menu > Prefe rences > More Preferences > Sessions.
Step 1: Configure Target Servers 24 From the graphical user interface : Figure 6: Solaris Mouse Configuration With the command line : xset mouse a t (where “a” is the acceleration and “t” is the threshold.) 2. All target servers must be configured to one of the display resolutions supported by Domini on KX II.
Chapter 3: Installation and Configuration 25 You can also contact your Raritan representati ve to purchase a video output adap ter: If you Have: Use this Video Output Adapter: Sun 13W3 with composite .
Step 1: Configure Target Servers 26 ¾ To change POST resolution: 1. # eeprom output-device=screen:r 1024x768x75 2. Logout or restart computer . Video Settings (GUI) The GUI resolution can be checked and set using different commands depending on the video c ard in use.
Chapter 3: Installation and Configuration 27 3. Select Smit > Devices > Graphic Displays > Select the Display Resolution an d Refresh Rat e. 4. Select the video car d in use. 5. Click List. A list of disp lay modes is presented. 6. Select a resolution and ref resh ra te supported by the Dominion KX II.
Step 3: Configure Network Firewall Settings 28 Change the Keyboard Layout Code (Sun Targets) Use this procedure if you are using a DCIM-SU SB and would like the keyboard layout changed t o another language. ¾ To change the keyboard layout code (DCIM-SUSB only): 1.
Chapter 3: Installation and Configuration 29 Step 4: Connect the Equipment Connect the Dominion KX II to the power supply, network, local PC, and target servers. The numbers in the diagr am correspond to the sections describing the connection. Figure 7: Dominion KX II Connections 1.
Step 4: Connect the Equ ipment 30 2. Network Ports Dominion KX II provides two Ethernet ports for failover purposes (not for load-balancing). By default, only LAN1 is active and the automatic failover is disabled.
Chapter 3: Installation and Configuration 31 4. Target Server Ports Dominion KX II uses st andard UTP cabling (C at5/5e/6) to connect to each target server. Refer to Appendix A: Specificat ions (see " Specificat ions" on page 190) for addi tional informati on.
Step 5: Dominion KX II In itial Conf iguration 32 Changing the Default Password The Dominion KX II ships with a default password. The first time you start the Dominion KX II you are required to change that password. ¾ To change the default password: 1.
Chapter 3: Installation and Configuration 33 ) Right parenthesis ] Right bracket * Asterisk ^ Caret + Plus sign _ Underscore , Comma ` Grave accent - Dash { Left brace .
Step 5: Dominion KX II In itial Conf iguration 34 2. Specify a meaningf ul Device Name for your Domin ion KX II unit; up to 16 alphan umeric char acters, special characters (see " Valid Special Characters" o n page 32), an d no spaces. 3. Select the IP auto configuration from the drop-down list: None (Static IP).
Chapter 3: Installation and Configuration 35 2. Using the KX II Local Console, select Device Settings > Port Configuratio n. The Port Configuration page opens: Figure 9: Port Configuration 3. Click on the Port Name o f the target server you want to rename.
Remote Authentication 36 For more information, refer to Power Supply Setup Page (on page 136). Note to CC-SG Users If you are usi ng Dominion KX II in a CC-SG con figuration, perform the installation .
Chapter 3: Installation and Configuration 37 Authentication vs. Authorization Authentication is the process of verif ying that a user is who he says he is. Once a user is authenticated, the us er's group is used to determine his system and port permissio ns.
Users, Groups, and Access Permissions 38 Note the importance of the group to which a given user belongs, as well as the need to configure the group named, “Unknown”.
Chapter 3: Installation and Configuration 39 Individual Group An individual gro up is essentially a “group” of one . That is, the s pecific user is in it s own group, not affiliated w ith other real groups. Individual groups c an be identified by the “@” in the Group Name.
40 In This Chapter User Interfaces .................................................................................................. 40 KX II Local Console: KX II De vices ............................................................... 41 Dominion KX II Remote Consol e: Domin ion KX II Devices.
Chapter 4: Connecting to the Dom inion KX II 41 KX II Local Console: KX II Devices When you are loc ated at the server rack, Dominion KX II provide s standard KVM sw itching and administ ration via the KX II Loca l Console.
Dominion KX II Remote Console: Domin ion KX II Devices 42 Dominion KX II Remote Consol e: Dominion KX II Devices The Dominion KX II Remote Console is a browser-based graphical user interface that allows you to acce ss target servers connected to the Dominion KX II and to remotely admin ister the Dominion KX II.
Chapter 4: Connecting to the Dom inion KX II 43 Multi-Platform Client (MPC): KX I and Dominion KX II Devices The Raritan Mult i-Platform C lient (MPC) is a graphical inter face that allows you to remotely access the target devices connected to Dominion units.
Raritan Remote Client ( RRC): K X I De vices Onl y 44 Raritan Remote Client (R RC): KX I Devices Only Raritan Remote Client (RRC) is a gr aphical user inte rface providing remote access to the target devices. Note: RRC cannot be used with the Dominion KX II; use MPC instead.
Chapter 4: Connecting to the Dom inion KX II 45 Launching the Dominion KX II Important: Regardless of the browser used, you mus t allow pop-ups from the Dominion device's I P address to launch the Dominion KX II Remote Console.
Launching the Dominion KX II 46 4. Type your Username and Password. I f this is the f irst time logging in, log in with t he factory default usern ame and password (admin and raritan (all lower case)); you will be prompted to change the default password.
Chapter 4: Connecting to the Dom inion KX II 47 ¾ To scroll through pages longer than the screen: • Use Page Up and Page Down keys on your keyboard , or • Use the scroll bar on the right For more.
Launching the Dominion KX II 48 In addition to being id entified in the menu tree above, menu option variations between the Dominion KX II Local Console and the Dominion KX II Remote Console are ident.
Chapter 4: Connecting to the Dom inion KX II 49 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently.
Managing Favorites 50 ¾ To access a favorite Dominion KX II device: Click the device name for that devi ce (listed beneath Favorite Devices). A new browser o pens to that device. ¾ To toggle the Favorite Devices list display between name and IP Address: To display Favorites by IP Address: Click the Display by IP button.
Chapter 4: Connecting to the Dom inion KX II 51 Favorites List From the Favorites List pa ge, you can add, edit, and delete devices from your list of Favorites. ¾ To open the Favorites List page: Select Ma nage > Favori tes List. The Fa vorites Li st page opens: Figure 15: Favorites List ¾ To add a Favorite: Click the Add button.
Managing Favorites 52 2. Click the Edit button. The Edit page opens: Figure 16: Edit (Fav orite Information) 3. Update the fields as necessary : Description. Type something meaningful. IP Address. Type the IP Address of the Dominion KX I I unit.
Chapter 4: Connecting to the Dom inion KX II 53 Discover Devices - Local Subnet This option discovers the devices on yo ur loc al subnet (that is, the subnet where the Dominion KX II Remote Co nsole is running); access these devices directly from this p age, or add them to your lis t of favorites.
Managing Favorites 54 ¾ To discover devices on the local subnet: 1. Select Favorit es > Discover Devices - Local Subnet. Th e Discover Devices - Local Subnet page opens.
Chapter 4: Connecting to the Dom inion KX II 55 Discover Devices - KX Subnet This option discovers the devices on the KX device subnet (that is, the subnet of the Dominion KX II device IP address itself); access these devices directly from this p age, or add them to your lis t of favorites.
Managing Favorites 56 Tip: Use the Select All and Deselect All bu ttons to quickly sele ct all (or deselect all) devices in t he Dominion KX II device subnet. ¾ To access a discovered device: Click the device name or IP Address for that device. A new browser opens to that device.
57 In This Chapter Port Access Page .............................................................................................. 58 Connecting to a Targ et Server ........................................................................ 59 Port Acti on Menu .
Port Access Page 58 Port Access Page After successfully logging into the Dominion KX II Remote Console, the Port Access page opens. This p age li sts all o f the Dominion KX II ports, the connected target serv ers, and their st atus and avai lability.
Chapter 5: Accessing Target Servers 59 Port Number. Numbered from 1 to the to tal number of ports available for the Domi nion KX II unit. Please Note that ports connected to power strips will not be among those listed, resulting in gaps in the Port Number sequence.
Port Action Menu 60 3. Select Connect. A Vi rtual KVM Client (on page 64) window opens to the target server connected to that port. Port Action Menu 1.
Chapter 5: Accessing Target Servers 61 Power Cycle. Power cycles the target server through the associated outlets. This option is visib le only when there is a power association (one or more) to this target and when the user has permission to operate t his service.
Power Control ling a Target Se rver 62 Power Controlling a Target Server Note: These features are available only when you have ma de power associations. Refer to power control for more information. Power Cycle a Target Server ¾ To power cycle a target server: 1.
Chapter 5: Accessing Target Servers 63 Power Off a Target Server ¾ To power OFF a target server: 1. From the KX II Remote Console, clic k the Port Access tab to open it. The Port Access page open s. 2. Click the Port Name of the appropri ate target server .
64 In This Chapter Overview........................................................................................................... 65 Options .........................................................................................................
Chapter 6: Virtual K VM Client 65 Overview Whenever you access a target server using the KX II Remote Console, a Virtual KVM Client w indow is opened. There is one Virtual KVM Client for each target server conn ected to; these windows can be accessed via the Windows Taskbar.
Options 66 Status Bar Real-time info rmation on connection par ameters, target server window size, concurrent connections, Caps Lock indicator, and Num Lock indicator . Note to CC-SG Users If you are usi ng Dominion KX II in a CC-SG con figuration, do not use the CC-SG proxy mode if you are p lanning to use the Mult i-Platform Client (MPC).
Chapter 6: Virtual K VM Client 67 Refresh screen Auto-sense video Send Ctrl+Alt+Delete Toggles single/double mouse modes Full screen Resize video to fit screen Mouse Pointer Synchronization When remot.
Mouse Pointer Synchronization 68 Mouse Synchronization Tips Be sure to follow these steps when obtaining mouse synchronization: 1. Verify that the selected video reso lution and re fresh rate is among those supported by the Dominion KX II. The Virtual KVM Client Connection Info dialog displa ys the actual values that the KX II is seeing.
Chapter 6: Virtual K VM Client 69 Connection Menu Properties Dialog The Dominion KX II dynamic video compression algorithms maintain KVM console usabi lity under varyin g bandwidth constraints. Dominion KX II units optimize KVM output not only for LAN use, but also for WAN and dialup u se.
Connection Menu 70 512 Kb (Medi um DSL/T1) 384 Kb (Slow DSL/ T1) 256 Kb (C able) 128 Kb (Dua l ISDN) 56 Kb (ISP M odem) 33 Kb (Fast Mo dem) 24 Kb (Slow Modem ) Please note that these settings are an optimi zation for specific conditions rather than an exact speed .
Chapter 6: Virtual K VM Client 71 ¾ To cancel without saving changes: Click Cancel. Connection Info ¾ To obtain information about your Virtual KVM Client connection: Select Connection > Connection Info.
Connection Menu 72 The following informat ion is displayed about the current connecti on: • Device Name. The name of the Dominion KX II device. • IP Address. The IP Address of the Dominion KX II de vice. • Port. The KVM Communication TCP/IP Port used to access the target device.
Chapter 6: Virtual K VM Client 73 Keyboard Menu Send Ctrl+Alt+Delete Due to its frequent use, a Ctrl+Alt+Delete macro has been pre- programmed into the Virtual KVM Client. This key sequence is sent to the targ et server to which you are currently connected.
Keyboard Menu 74 Creating a Keyboard Macro ¾ To create a keyboard macro (add a macro): 1. Select Keyboard > Keyboard Macros. The Keybo ard Macros window opens: Figure 28: Keyboard Macros 2. Click Add. The Add Keyboard Macro window opens: Figure 29: Ad d Keyboard Macro 3.
Chapter 6: Virtual K VM Client 75 b. Click the Press Key button after ea ch selection. As each key is selected, it displays in the Keys to Relea se field. In this example, select two keys: the Windows key and the letter D key. 5. In the Keys to Release field: a.
Keyboard Menu 76 ¾ To cancel without saving changes: Click Cancel. ¾ To clear all fields and start over: Click the Clear button. Running a Keyboard Macro Once you have created a keyboard macro, exec ute it by clicking on its name in the Keyboard menu.
Chapter 6: Virtual K VM Client 77 ¾ To remove a macro: 1. Select Keyboard > Keyboard Macros. The Keybo ard Macros window opens. 2. Select the macro from among those listed.
Video Menu 78 Calibrate Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video i mages. The Dominion KX II color settings are on a target server-basis. Calibrate Color Adjusts color settings to optimize the video display.
Chapter 6: Virtual K VM Client 79 ¾ To change the video settings: 1. Select Video > Video Settings. The Video Settings window opens displaying the current settings: Figure 32: Video Setting s 2.
Video Menu 80 Red. Controls the bright ne ss of the red signal. Green. Controls the brightness o f the green signal. Blue. Controls the bright ness of the blue sign al. Color Contrast Settings: Contro ls the contrast adjustment. Contrast Red.
Chapter 6: Virtual K VM Client 81 Best possible video mode: Dominion KX II will perform the full Auto Sense process when switching targets or target resolutions.
Mouse Menu 82 ¾ To synchronize the mouse: • Select Mouse > Synchronize Mouse, or • Click the Synchronize Mouse b utton from the toolbar Single Mouse Cursor Single Mouse Cursor ente rs single mouse mode, in which only the target server mouse cursor is sho wn; the local PC mouse pointer no longer appears on-screen.
Chapter 6: Virtual K VM Client 83 Standard This is the standard mouse synchr onization algorithm using relative mouse positions. Standard mouse mode requires that acceleration is disabled and other mouse parameters are set correctly in order for the client and server mouse to stay synchronized.
Virtu al Medi a 84 Virtual Media Refer to the chapter on Virtual Media (o n page 87) for complete information ab out setting up and us ing virtual media.
Chapter 6: Virtual K VM Client 85 4. Exit Target Screen Resolution Mode - Hotkey. When you enter target screen resolution mode, the disp lay of the target server becomes full screen and acquires the same reso luti on as the target server. This is the hotkey used for exiting this mode ; select from the drop-down list.
Help M e nu 86 ¾ To exit target screen resolution mode: Press the hotkey configured in th e Tools Options dialog. The default is Ctrl+Alt+M . Note to CC-SG Users: Target Screen Resolution is disabled; full screen mode is available only when the Domi nion KX II device is not under CC-SG management.
87 In This Chapter Overview........................................................................................................... 88 Prerequisites for Using Virt ual Media .......................................................... 90 Using Virtual Media .
Overview 88 Overview Virtual media extends K VM capabilities by enabling target servers to remotely access media from the client PC and network fi le servers. With this feature, media mounted on the clie nt PC and network file servers is essentially mounted virtually by the t arget server.
Chapter 7: Virtual Media 89 Figure 35: Virtual Media Connection.
Prere q uisit es for Usi ng Virt ual Medi a 90 Prerequisites for Us ing Virtual Media The following conditions must be met in order to use virtual media: Dominion KX II • For users requiring access .
Chapter 7: Virtual Media 91 Using Virtual Media With the Dominion KX II virtual media fe ature, you can mount u p to two drives (of different types). These d rives are accessib le for the duration of the KVM session. For example, you can mount a spec ific CD-ROM, use it, and then disconnect it when you are done.
Opening a KVM Se ssion 92 Opening a KVM Session ¾ To open a KVM session: 1. Open the Port Access pag e from the Dominion KX II Remote Console. Figure 36: Open KVM Session 2. Connect to the target server from the Port Access page: a. Click the Port Name fo r the appropriate server.
Chapter 7: Virtual Media 93 Connecting to Virtual Media Local Drives This option mounts an entire drive; the entire disk drive is mounted virtually onto the target server. Us e this option for hard drives and external drives only; it doe s not include network drives, CD -ROM, or DVD-ROM drives.
Connecting to Vir tual Media 94 4. Click Connect. The media will be mounted on the target server virtually. You can access the media j ust like any other drive Conditions when Read-Writ e is not Available Virtual media re ad-write is not available in th e following situations: • For all hard drives.
Chapter 7: Virtual Media 95 b. Select the drive from the Local CD/DVD Drive drop-down list. All availab le internal and e xternal CD an d DVD drive name s will be populated in the drop-down list. c. Click Connect. 3. For ISO im ages: a. Select the ISO Image option.
File Server Setup (File Ser ver ISO Images Only) 96 File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images.
Chapter 7: Virtual Media 97 3. Check the Selected checkbox for a ll media that you want access ible as virtual me dia. 4. Click Save. A ll media specified here will now be avail able for selection in the M ap Virtual Media CD/ISO Imag e dialog. ¾ To cancel without saving: Click Cancel.
98 In This Chapter User Manage ment Menu ................................................................................ 98 User List ............................................................................................................ 99 Add New User .
Chapter 8: User Management 99 User List The User List page displays a list o f all users incl uding their Username, Full Name, and User Grou p. The list can be sorted on any o f the columns by clicking on the col umn name. From the User L ist page, you can also add, modify, or delete users.
Add New User 100 Add New User It is a good idea to d efine user groups be fore creating Dominion KX II users, because when you add a user, yo u must assign that user to an existing user group. From the User page, yo u can add new users, modify user informat ion, and reactivat e users that have been deactiv ated.
Chapter 8: User Management 101 5. Select the gro up from the User Group d rop-down list. The list contains all groups you have created in addition to the system- supplied default groups (<Unknown> (defa ult setting), Admin, Individual Group).
User Group List 102 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP). It is a good ide a to define user groups befo re creating individual users, because when you add a user, you must assign that user to an existing user group.
Chapter 8: User Management 103 ¾ To delete a user group: Important: B efore deleting a group, ensure th at no users ar e assigned to it, or th ose users will al so be deleted. Tip: To determine the users belonging to a particular grou p, sort the User List by User Group.
Add New Us er Gr ou p 104 Click the Add button from the User Group List page Figure 43: Gr oup Page.
Chapter 8: User Management 105 The Group page is org anized into the follow ing categories: Group , Permissions, Port Perm issions, and IP A CL. 2. Type a descriptive name for the new user group into the Group Name field. 3. Set the Permissions for the grou p.
Add New Us er Gr ou p 106 Permission Description Security SSL certificate, security set tings (VM Sh are, PC-Share), IP ACL User Management User and group managem ent , remote authentication (LDAP/RAD.
Chapter 8: User Management 107 This feature limits access to the Dominion KX II device by users in the selected group t o specific IP addresses. This feature applies only to users belonging to a spec ific group, unlike t he IP Access Control Li st feature which applies to all access attempts to the device, is processed first, a nd takes priority.
Add New Us er Gr ou p 108 ¾ To replace a rule: 1. Specify the Rule # yo u want to replace. 2. Populate the Starting IP and Ending IP fields. 3. Select the Action from the drop-down list. 4. Click Replac e. Your new rule rep laces the origin al rule with t he same Rule #.
Chapter 8: User Management 109 Modify Existing User Group Note: All permissions are enab led (and ca nnot be change d) for the Ad min group. ¾ To modify an existing user group: 1. From the Group page, change the appr opriate fields and set the appropriate permissions.
Add New Us er Gr ou p 110 2. Set the Permissions for the grou p. Check the boxes before the permissions you want to assign to all of the users belonging to this group. Refer to Settin g Permissions (on page 105) for more information. 3. Set the Port Permissions.
Chapter 8: User Management 111 Change Password ¾ To change your password: 1. Select User Management > C hange Password. The Change Password page opens: Figure 47: Cha nge Password 2.
Authentication Set tings 112 Authentication Settings From the Authentication Settings pa ge you can configure the type of authentication used f or access to your Dominion KX II. Refer to Authentication vs. Authorization for more information about how authentication and authorizat ion operate and diff er.
Chapter 8: User Management 113 Figure 48: Authentication Settings 2. Select the option for the authentication protocol you want to use (Local Authentication, LDAP, or RADIUS). Selecting the LDAP option enables the rem aining LDAP fie lds; selecting th e RADIUS option enables the remain ing RADIUS fields.
Authentication Set tings 114 5. If you selecte d RADIUS, read the section entitled Implementing RADIUS Remote Aut hentication (on page 118) for information about completing the fields in the RADIUS section of the Authentication Settings page. 6. When finished, click OK to save.
Chapter 8: User Management 115 Implementing LDAP Re mote Authentication Lightweight Directory Access Protocol (LDAP) is a networking protocol for querying and mod ifying directory services runn ing over TCP/IP. A client starts an LDAP session by connecting to an LDAP server (the default TCP port is 389).
Authentication Set tings 116 2. (Optional) Type the IP Ad dress or DNS name of you r backup LDAP server in the Secondary LDAP Server field. When the Enable Secure LDAP option is checked, t he DNS name must be used . Please note that the remaining fields share the same setti ngs with the Primary LDAP Server field.
Chapter 8: User Management 117 Returning User Group Information from Active Directory Server The Dominion KX II supports user authentication to Active Directory (AD) without requiring that users be defined locally on the Dominion KX II. This allows Active Directory user accounts and passwords to be maintained exclus ively on the AD serve r.
Authentication Set tings 118 Implementing RADIUS Re mote Authentication Remote Authentication Dial- in User Service (RADIUS) is an AAA (authentication, authorization, an d accounting) protocol for network access applications. ¾ To use the RADIUS authentication protocol: Figure 50: Authen tication Settings (RAD IUS) 1.
Chapter 8: User Management 119 3. Authentication Port. The default auth entication port is 1812; cha nge as required. 4. Accounting Port. The default accoun t ing port is 18 13; change as required. 5. Timeout (in seconds). The default timeout is 1 second; change as required.
Authentication Set tings 120 RADIUS Communication Exchange Specifications The Dominion KX II unit sends the following RADIUS attributes to your RADIUS server: Attribute Data Login Access-Request (1) NAS-Port-Type (61) VIRTUAL (5) for n etwork connections.
121 In This Chapter Device Manage ment Menu .......................................................................... 121 Network Se ttings ........................................................................................... 122 Date/Time Settings.
Networ k S ettin gs 122 Network Settings Use the Network Settings page to cu stomize the network configuration (e.g., IP Addr ess, discovery port, and LA N interface parameters) fo r your Dominion KX II unit. Important: Dominion KX II must be rebooted for new network settings to take effect.
Chapter 9: Device Management 123 2. Update the Network Basic Settings. R efer to Network Basic Settings (on page 123) for more info rmation about each of the fields. 3. Update the Network Miscellaneous Settings. Refer to Network Miscellaneou s Settings (on page 124) for m ore information about each of the fields.
Networ k S ettin gs 124 • Device Name. Type a uni que name for the device (up to 16 characters; spaces are not allowed ). Name your dev ice so you can easily identify i t. The default name for a Domi nion KX II unit is: “DominionKX”. Remote users w ill also see this name.
Chapter 9: Device Management 125 • Discovery Port. Dominion KX II di scovery occurs over a single, configurable TCP Port . The default is Port 5000, but you can configure it t o use any TCP p ort except 80 an d 443.
Networ k S ettin gs 126 100 Mbps/Fu ll 1000 Mbps/Full Gi gabit Half-duplex provides for communication in bot h directions, but only one direction at a time (not simult aneously). Full-duplex allows communication in both direction s simultaneously.
Chapter 9: Device Management 127 • Set System ACL. Click this button to set a global-level Access Control List for your Dominion KX II by ensuring that your device does not respond to packets bein g sent from disallowed IP addresses. The IP Access Control (on page 153) page opens.
Date/Time Settings 128 Date/Time Settings Use the Date/Time Settings page to specify the date and time for the Dominion KX II. There are two ways to do this: • Manually set the date and time, or • Synchronize with a Network Ti me Protocol (NTP) Server.
Chapter 9: Device Management 129 4. For the User Specified Time option, enter the date and time as follows: a. Select the Month from the drop-down list. b. Type the Day of the Month. c. Type the Year in yyyy format. d. Enter the Time in hh:mm format ( using a 24-hour clo ck).
Event Management 130 Event Management - Settings SNMP Configuration Simple Network Management Protocol (SNMP) is a protocol governing network management and the monitoring of network devices and their functions. Dominion KX II offers SNMP Agent support through Event Management.
Chapter 9: Device Management 131 2. Check the Enable SNMP Logging option; this enables the remaining SNMP f ields. 3. In the Name, Contact, and Location fields, type the SNMP Agent's (this Domini.
Event Management 132 Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management - Destinations page to select which system events to track and where to send this info rmation.
Chapter 9: Device Management 133 2. Check the checkboxes for t hose Event line items you want to enable or disable, and where you want to send the information. Tip: Enable or disab le entire Categories by checking or cle aring the Category line checkboxes, respectively.
Event Management 134 Trap Name Description deviceUpgradeStarted The Dominion KX II has begun update via an RFP file. ethernetFailover An Ethernet failov er was detected and restored on a new Ethernet interface. factoryReset The device has been reset to factory de faults.
Chapter 9: Device Management 135 Trap Name Description startCCManagement The device has been put under CommandCenter Management. stopCCManagement The device has been removed from CommandCenter Management. userAdded A user has been added to t he system.
Power Supply Setup Page 136 Power Supply Setup Page The Dominion KX II provides dual power supplies, and can automatically detect and provid e notification regarding the status of these power supplies. Use the Powe r Supply Setup p age to specify whether you are using one or both of the power supp lies.
Chapter 9: Device Management 137 Note: If either of the se checkboxes is checked and power input is not actually connect ed, the power LED at the fro nt of the un it displa ys red. ¾ To turn off the automatic detection: Clear the checkbox for the appropriate p ower supply.
Port Configuration Page 138 Port Configuration Page The Port Configuration p age displays a list of the Dominion KX II port s. Ports connected to target servers or po wer strips are displayed in blue and can be edited.
Chapter 9: Device Management 139 Note: Do not use apostrophes for the Port (CIM) Name. Port Type. The type of CIM connected to the port: Port Type Description DCIM Dominion CIM Not Available No CIM connected PCIM Paragon CIM PowerStrip Power CIM VM Virtual Media CIM (D2CIM- VUSB) 2.
Power Control 140 Power Control Connect the Power Strip The numbers in this diag ram correspond to the steps listed below. Figure 61: Power Stri p Connections ¾ To connect the power strip: 1. Connect the male RJ-45 of the D2CIM-PWR to the female RJ-45 connector on the power strip.
Chapter 9: Device Management 141 Name the Power Strip (Port Page for Power Str ips) This Port page opens when you se lect a port from the Port Co nfiguration (see " Port Configur ation Page" on p age 138) page that is connected to a Raritan remote power strip.
Power Control 142 Note: When a power strip is associated to a target server (port), the o utlet name is replaced by the tar get server name (eve n if you assigned another name to the outlet). ¾ To name the power strip (and outlets): Note: CommandCenter Ser vice Gateway does not recognize po wer strip names containing spaces.
Chapter 9: Device Management 143 Associate Target Servers to Outlets (Port Page) This Port page opens when you se lect a port from the Port Co nfiguration (see " Port Configur ation Page" on p age 138) page that is connected to a target server.
Power Control 144 ¾ To make power associations (a ssociate power strip outlets to target servers): Note: When a power strip is associated to a target server (port), the o utlet name is replaced by the tar get server name (eve n if you assigned another name to the outlet).
Chapter 9: Device Management 145 Note for D2CIM-VUSB CIM Usage If you are using the D2CIM-VUSB, there are additional setti ngs on the Port page to improve performance.
146 In This Chapter Security Se ttings Menu ................................................................................. 146 Security Settings ............................................................................................. 147 IP Access Control .
Chapter 10: Secu rity Settings 147 Security Settings From the Security Settings page, yo u can specify log in limitations, user blocking, password r ules, and encrypti on and share. Raritan SSL c ertificates are used for public and private key exchanges, and provide an add itional level of securi ty.
Security Sett ings 148 2. Update the Login Lim itations (on page 148) settings as ap propriate. 3. Update the Strong Passw ords (on page 149) settings as appropria te. 4. Update the User Bloc king (on page 150) settings as appropriat e. 5. Update the Encrypt ion & Share (on page 151) settings as appropriate.
Chapter 10: Secu rity Settings 149 Strong Passwords Strong passwords provide more secure local authentication for the system. Using Strong Passwords, you can spec ify criteria defining the format of valid Dominion KX II lo cal passwords such as minimum and maximum length, required characters , and passwo rd history retention.
Security Sett ings 150 Enforce at least one printab le special character. When checked, at least one specia l character (print able) is re quired in the password. Number of restricted p asswords based on history. T his field represents the password history depth; that is, the n umber of prior passwords that cannot be repeate d.
Chapter 10: Secu rity Settings 151 • Deactivate User-ID. When selected, this op tion specifies that the user will be locked out of the system after the number of failed login attempts specified in the Failed Attempts field: Failed Attempts. The number of unsuccessful login attempts after which the user's User-ID w ill be deactivated.
Security Sett ings 152 • Encryption Mode. Select one of the options from the drop-down list. When an encryption mode is select ed, a warning is displayed that if your browser does not support the selected mode, you will not be able to connected to the Dominion KX I I: Figure 69: Security Settings (Encryption Mode Warning Message) Auto.
Chapter 10: Secu rity Settings 153 PC-Share: Target servers c an be accessed by up to eight users (administrator or non-administrator) a t one time. Each remote user has equal keyboard and mo use control, however, please note that uneven control will occur if one us er does not stop typing or moving the mouse.
IP Access Control 154 ¾ To use IP Access Control: 1. Open the IP Access Control page using one of these methods: Select Security > IP Access Control, or Click the Set System ACL button from the Network Se ttings (on page 122) page The IP Access Control page opens: Figure 70: IP Access Con trol 2.
Chapter 10: Secu rity Settings 155 4. Repeat steps 1 through 3 for each rule you w ant to enter. ¾ To insert a rule: 1. Type a Rule # . A Rule # is r equired when using t he Insert command. 2. Type the IP Address an d subnet mask in the IP/Mask field.
156 In This Chapter Maintenanc e Menu ........................................................................................ 156 Maintenance Features (L ocal/ Remote Console) ........................................ 156 Audit Log ...................
Chapter 11: Maintenance 157 Use: To: Local Remote Upgrade Report View information abo ut the latest upgrade performed. 9 9 Reboot Reboot the Dominion Dominion KX II unit. 9 9 Audit Log A log is created of Dominion KX II system events. ¾ To view the audit log for your Do minion KX II unit: Select Maintenance > Audit Log.
Audit Log 158 The Audit Log page displays events by date and time (most recent events listed first). The Audit Log provides the follo wing information: • Date. The date and time that the event occurred; 24-hour clock. • Event. The event name as listed in the Ev ent Management page.
Chapter 11: Maintenance 159 Device Information The Device Information page provid es detailed information about your Dominion KX II device and t he CIMs in use. This in formation is hel pful should you need to contact Rarit an Technical Support. ¾ To view information about your Dominion KX II and CIMs: Select Maintenance > Device Information .
Backup and Restore 160 Backup and Restore From the Backup/Restore page, yo u can backup and restore the settings and configuration for your Dominion KX II. In addition to us ing backup and restore for business continui ty pu rposes, you can use this feature as a time-saving mechan ism.
Chapter 11: Maintenance 161 3. Select the loc ation, specify a fi le name, and click Save. A Download Complete dialog opens. 4. Click Close. T he backup file is s aved locally on your c lient machine with the name and location specif ied.
CIM Upgrade 162 CIM Upgrade Use this procedure to upgrade CIMs using the firmware versions stored in the memory of your Dominion KX II unit. In general, all CIMs are upgraded when you upgrade the device firmware using the Firmware Upgrade (on page 163) p age.
Chapter 11: Maintenance 163 Firmware Upgrade Use the Firmware Upgr ade page to upgrade the firmware for your Dominion KX II unit and all attached CIMs.
Firmw are Upg rade 164 6. Click Uplo ad from the Firm ware Upgrade page . Information abo ut the upgrade and vers ion numbers is display ed for your confirm ation (if you opted t o review CIM informat.
Chapter 11: Maintenance 165 For informati on about upgrad ing the device firmware using the Multi- Platform Client, refer to the Rarita n Multi-Platfo rm Client (MPC) and Raritan Remote Client (RRC) User Guide. Upgrade Report Dominion KX II provides informatio n about upgrades perfo rmed on the Dominion KX II unit and attached CIMS.
Reboot 166 logged off. ¾ To reboot your Dominion KX II: 1. Select Maintenance > Rebo ot . The Reboot page opens: Figure 79: Reboot 2. Click the Reboot button. You are prompted to confirm the action: Figure 80: Reboot Confirmation 3. Click Yes to proceed with the reboot.
167 In This Chapter Diagnostic s Menu .......................................................................................... 167 Network Inte rface Page ................................................................................ 168 Network Statistics Page .
Network Interface Page 168 Network Interface Page The Dominion KX II provid es information about the status of your network interface. ¾ To view information about your network interface: Select Diagnostics > Network Interface.
Chapter 12: Diagnostics 169 Network Statistics Page The Dominion KX II provides statistics about your network interface. ¾ To view statistics about your network interface: 1. Select Diagnostics > Netwo rk Statis tics. The Network Statistics page opens.
Network Statistics Page 170 Interfaces. Produces a pag e similar to the one displayed here : Figure 83: Network Sta tistics (interfaces) Route. Produces a page similar to the o ne displayed here: Figure 84: Net work Statistics (route) 3. Click the Refresh button.
Chapter 12: Diagnostics 171 Ping Host Page Ping is a network tool used to test whet her a particular host or IP Address is reachab le across an IP netwo rk. Using the Ping Host p age, you can determine if a target server or another Dominion KX II un it is accessible.
Trace Route to Host Page 172 Trace Route to Host Page Trace route is a network to ol used to determine the route taken all the way to the provided hostname or IP Address. ¾ To trace the route to the host: 1. Select Diagno stics > Trace Rout e to Host.
Chapter 12: Diagnostics 173 KX Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. KX Diagnostics downloads the diagno stics informat ion from Dominion KX II to the client machine. Three operations c an be performed on this page: • Command Line Interface.
KX Diagnostic s 174 Figure 87: KX Diagnostics 2. To enable the Command Line Interface for use by Raritan Technical Support: Note: UDP Port 21 is re quired for this feature . a. Check the Enable Command Line Interface for KX Diagnostics checkbox. b. Click OK.
Chapter 12: Diagnostics 175 a. Click the Save to File button. The File Download dialog opens: Figure 89: File Download b. Click Save. The Save As d ialog opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
176 In This Chapter KX II Local Console ....................................................................................... 176 Starting the KX II Local Co nsole .................................................................. 178 Accessing Targ et Servers .
Chapter 13: KX II Local Console 177 Physical Connections The physical connections for the local p orts can be found on the back panel of the Dominion KX II: Figure 91: Local User Panel on Dominion KX II Monitor: Attach a standard multi-sync VGA monitor to the HD15 (female) vide o port.
Starting the KX II Local Console 178 The actions that are performed when th e reset button is pressed are defined in the graphic al user interface. Refer to Security Settin gs, Encryption & Sha re (see " Encryption & Share" on page 151) for more information.
Chapter 13: KX II Local Console 179 Security and Authentication In order to use the Dominion KX II Local Console, you must first authenticate with a valid username and password. Dominion KX II provides a fully-int egrated authenti cation and s ecuri ty sch eme, wheth er your access is via the network or the local port.
Accessing Target Servers 180 Accessing Target Servers Server Display After you login to the KX II Local Console, the Port Access page opens. This page lists all of the Dominion KX II ports, the con nected target servers, and t heir status an d availabil ity.
Chapter 13: KX II Local Console 181 • Status. The Status is either up or down. • Availability. Va lid Values per inc lude Idle, Connected, B usy, or Unavailab le. ¾ To change the sort order: Click the column head ing you want to sort on. The list of target servers is sorted by th at column.
Local Port Administration 182 Local Port Administration The Dominion KX II can be managed by either the KX II Local Console or the KX II Remote Console.
Chapter 13: KX II Local Console 183 2. Select the appropriate Keyboard T ype from among the options in the drop-down list: US US/International UK French German JIS (Japanese Industry St andard) Simplified Chinese Traditional C hinese Dubeolsik Hangul (Korean) 3.
Local Port Administration 184 1280x1024 7. Select the Refresh Rate from the drop-down list: 60 Hz 75 Hz 8. Select the type of Local User Authentication: Local/LDAP/RADIUS. Th is is the recommended option; for more information about authentication, refer to Remote Authe nticatio n (on page 36) a nd Authentication vs.
Chapter 13: KX II Local Console 185 Factory Reset (KX II Local Console Only) Note: This feature is available only on the Dominion KX II Local Console. The Dominion KX II offers several types of reset mod es from the Local Console user interface. Note: It is reco mmended that you save the audi t log prior t o performing a factory reset.
Local Port Administration 186 Subnet Mask Gateway IP address Primary DNS server IP address Secondary DNS server IP address Discovery Port Bandwidth Limit LAN Interface Speed & D uplex Enable Autom.
187 In This Chapter Overview......................................................................................................... 187 Removing Dominion KX II from CC-SG Management .
Removing Dominion KX II fro m CC-SG Management 188 Removing Dominion KX II from CC-SG Management Unless the Dominion KX I I is released f rom CC-SG control, you ca nnot access the device directly. If, however , the Dominion KX II does no t receive heartbeat message s from CommandCenter (e.
Chapter 14: CC Unmanage 189 2. Click the Rea lly Unmanage butt on. A message is disp layed confirming that the device is no longer under CC management: Figure 99: Device Removed from CC Management 3.
190 In This Chapter Environmental Requirements ...................................................................... 190 Remote Co nnection ....................................................................................... 193 KVM Properties ...
Appendix A: Specifications 191 Physical Specifications Part Number DKX2-116 DKX2-132 DKX2-216 DKX2-232 DKX2-416 DKX2-432 Line Item Description 16-Port Dominion KX II with 1- user Network Access and Lo.
Environmental Requirements 192 Electrical Specifications Parameter Value Input Nominal Frequencies 50/60 Hz Nominal Voltage Range 100/240 VAC Maximum Current AC RMS 0.
Appendix A: Specifications 193 Part Number DCIM-SUN D2CIM-PWR D2CIM-VUSB- 32PAC D2CIM-VUSB - 64PAC Line Item Description Dominion KX I & II Computer Interface Module [Sun Port, HD 15 Video] Dominion KX II Computer Interface Module for Remote Power strips Bulk pack of 32 D2CIM-VUSB Bulk pack of 64 D2CIM-VUSB Product Weight 0.
TCP and UDP Ports Used 194 TCP and UDP Ports Used • HTTP, Port 80 - All reque sts received by Dominion K X II via HTTP (port 80) are automatically forw a rded to HTTPS for complete security.
Appendix A: Specifications 195 • SNMP Default UDP Ports (optional) - Po rt 161 is used for inbound/outbound re ad/write SNMP acc ess and port 162 is used for outbound traffic for SNMP traps. • UDP Port 21 - Port 21 is used for the Dominion KX II command line interface (when you are working wi th Rarit an Technical Support).
Network Speed Set tings 196 Legend: Does not function, as expected Supported Functions; not recommended NOT supported by Ethernet specific ation; product will comm unicate, but collisions will occur P.
197 Note: The procedures in this chapter shou ld be attempted only by experienced users. In This Chapter Returning User Gr oup Information ............................................................ 197 Setting the Registry to Perm it Write Operations to the Schem a .
Setting the Reg istry to Perm it Write Operation s to the Sche ma 198 Setting the Registry to Permit Write Operations to the Schema To allow a domain contro ller to write to the schema, you must set a registry entry that permits schema updates.
Appendix B: Updating the LDAP Sche ma 199 3. Click New, and then select At tr ibute. When the warning message appears, click Continue and the Create New Attribute window opens. Figure 101: Create New Attribute 4. Type rciusergroup in the Common Name field.
Adding Attributes to the Class 200 2. Scroll to the user class in the right pane, and right-click on it. Figure 102: Adding the Attrib utes 3. Select Properties from the menu. The user Properties window appears. 4. Click on the Attributes tab to open it.
Appendix B: Updating the LDAP Sche ma 201 8. Click OK from the use r Properties dialog. Updating the Schema Cache 1. Right-click Active Director y Schema in the left pane of the window and select Reload the Schema from the shortcut menu. 2. Minimize the Active D irectory Schema MMC (Microsoft Management Console) console.
Editing rciu sergroup Attribute s for User Member s 202 5. Open the Domain. 6. In the left pane of the win dow, select the CN=Users folder. Figure 105: ADSI Edi t (CN=Users) 7. Locate the user name whose properties you want to adjust in the right pane.
Appendix B: Updating the LDAP Sche ma 203 9. Select rciusergroup from the Attribut es list. Figure 106: Administrator Pr operties (attribute edito r).
Editing rciu sergroup Attribute s for User Member s 204 10. Click Edit. The String Attribute Editor dialog opens: Figure 107: User Pro perties 11. Type the user group (created in Domini on Dominion KX II) in the Edit Attribute field. Figure 108: Edit Attribute (adding user to KX II group) 12.
205 In This Chapter Overview......................................................................................................... 205 Non-US Keyboards........................................................................................ 205 Macintosh Keyboard .
Non-US Keyboards 206 Note: These procedures do not appl y to the circumflex ac cent (above vowe ls). In all cases, the ^ key (to the right of the P key) works on French keyboards to create the circumflex accent when u sed in combinatio n with anothe r char acter.
Appendix C: Informationa l Notes 207 Java Runtime Environment (JRE) Because of a limitation in the Java Runtime Environment (JRE), Fedora, Linux, and So laris clients receive an invalid response from Alt Gr on UK English and US International langua ge keyboards.
Macintosh Keyboard 208 Macintosh Keyboard When a Macintosh is used as the cl ient, t he following keys on the Mac keyboard are not captured by the Java Runtime Env ironment (JRE): • F9 • F10 • F.
Appendix C: Informationa l Notes 209 Resolving Fedora Core Focus Using the Mu lti-Platform Client (MPC), occasiona lly there is an inability to log into a Dominion KX II device or to access target servers (Windows, SUSE, etc.). In addition, the Ctrl+Alt+M key combin ation may not b ring up the Keyboard Shortcut menu.
CIMs 210 CIMs Windows 3-Button Mous e on Linux Targets When using a 3-button mouse on a Win dows client connecting to a Linux target, the left mouse button may get mapped to the center button of the Windows client 3-button mouse.
Appendix C: Informationa l Notes 211 CC-SG Virtual KVM Client Version not Known fro m CC-SG Proxy Mode When the Virtual KVM Client is la unched from Com mandCenter Secure Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”.
212 In This Chapter General Qu estions ......................................................................................... 213 Remote Access ................................................................................................ 215 Universal Virtual Medi a .
Appendix D: FAQs 213 General Questions Question Answer What is Dominion KX II? Dominion KX II is a second gener ation digital KVM (Keyboard, Video Mouse) switch that enables IT adm inistrators to access and control 16, 32, or 64* servers over the network with BIOS-level functionality.
General Questions 214 Question Answer How do I migrate from the Dominion KX I to Dominion KX II? In general, KX I customers can contin ue to use their existing switches for many years. As their d ata centers expand, customers c an purchase and use the new KX II models.
Appendix D: FAQs 215 Remote Access Question Answer How many users can remotely access servers on each Dominion KX II? Dominion KX II models offer remote connections for up to eight users per channel for sim ultaneous access and control of a unique target server.
Remote Access 216 Question Answer What is the file size of the applet that is used to access Dominion KX II? How long does it t ake to retrieve? The Virtual KVM Client applet used to access Dominion KX II is approximately 500KB in size.
Appendix D: FAQs 217 Question Answer My modem connection dropped and I got the error message “There was an unexpected communications error - connection terminated.” What should I do? This might have happened based on the frequency wit h which the user tried to connect via modem.
Ethernet and IP Networking 218 Ethernet and IP Networking Question Answer Does the Dominion KX II offer dual gi gabit Ethernet ports to provide redundant fail- over, or load balancing? Yes. Dominion KX II features d ual gigabit Ethernet ports to provide redundant failover capa bilities.
Appendix D: FAQs 219 Question Answer How much bandwidth does Dominion KX II require? Dominion KX II offers next genera tion KVM-over-IP technology - the very best video compression availab l e. Raritan has received n umerous technical awards con firming its high video quality tra nsmissions and the low bandwidth utilization.
Ethernet and IP Networking 220 Question Answer What is the slowest connection (lowest bandwidth) over which Dominion KX II can operate? 33Kbps or ab ove is recommended for acceptable KX performance over a modem connection. What is the speed of Dominion KX II's Ethernet interfaces? Dominion KX II supports Gigabit as well as 10/100 Eth ernet.
Appendix D: FAQs 221 Question Answer Can Dominion KX II be used with CITRIX? Dominion KX II may work with remote access products like CITRIX if configured appropriately, but Rari tan cannot guarantee it will work with acceptable performan ce.
Servers 222 Servers Question Answer Does Dominion KX II depend on a Windows server to operate? Absolutely not. Because users depend on the KVM infrastructure to always be avai lable in any scenario wh.
Appendix D: FAQs 223 Question Answer What comes in the Dominion KX II box? The following is included: (a) Dominion KX II unit ; (b) Quick Setup Guide; (c) standard 19" rack mount brackets; (d) User manual CD- ROM; (e) Network cable; (f) Crossover cabl e; (g) Localized AC Line Cord; (h) Warranty certific at e and other documentation.
Installation 224 Installation Question Answer Besides the unit itse lf, what do I need to order from Rari tan to instal l Dominion KX II? Each server that connects to Dominion KX II requires a Dominion or Paragon Comp uter Interface Mod ule (CIM), an adapter th at connects directly to the keyboard, video, and mouse ports of the server.
Appendix D: FAQs 225 Question Answer How many servers can be connected to each Dominion KX II unit? Dominion KX II models range f rom 16 or 32 server ports in a 1U chassis to 64 server p orts in a 2U c hassis. This i s the industry' s highest digit al KVM switch port density.
Local Port 226 Local Port Question Answer Can I access my servers directly from the rack? Yes. At the rack, Dominion KX II fu nctions just like a traditional K VM switch - allowing cont rol of up to 6 4 servers using a single keybo ard, monitor, and mouse.
Appendix D: FAQs 227 Question Answer If I use the local port to change the name of a connected server, does this change prop agate to remote access clients as well? Does it propagate to the optional CommandCenter appliance? Yes.
Power Control 228 Power Control Question Answer Does Dominion KX II have a dual power option? All Dominion KX II models come e quipped with dual AC inputs and power supplies with automatic fail-over. Should one of the power inputs or power supplie s fail, then the KX II wil l automatically sw itch to the other.
Appendix D: FAQs 229 Scalability Question Answer How do I connect multiple Dominion KX II devices together into one solution? Multiple Dominion KX II unit s do not need to be physic ally connected together.
Computer Interface Modu les (CIMs) 230 Computer Interface Modules (CIMs) Question Answer Can I use Computer Interface Modules (CIMs) from Rarit an's analog matrix KVM switch, Paragon, with Dominion KX II? Yes.
Appendix D: FAQs 231 Security Question Answer What kind of encryption does Dominion KX II use? Dominion KX II uses industry-stand ar d (and extremely secure) 128-bit RC4 or AES encryption, bo th in its SSL communication s as well as its own data stream.
Security 232 Question Answer If the Dominion KX II Encryption Mode is set to Auto, what level of encryption is achieved? The encryption level that is auto-negotiated is dependent on the browser in use: Browser Encryption Level Internet Explorer 6 RC4 Internet Explorer 7 AES-128 Firefox 1.
Appendix D: FAQs 233 Manageability Question Answer Can Dominion KX II be remotely managed an d configured via Web browser? Yes. Dominion KX II can be completely configured remotely via Web browser. Note that this does require that the workstation have an appropriate Java Runtime Environment (JRE) version insta lled.
Miscellaneous 234 Miscellaneous Question Answer What is Dominion KX II's default IP address? 192.168.0.192 What is Dominion KX II's default username and password? The KX II's default username and password are admi n/raritan [all lower case].
Appendix D: FAQs 235 Troubleshooting Question Answer I am logged into the Dominion KX II using Firefox, and I opened another Firefox browser. I am automat ically logged into the s ame Dominion KX II with the second Firefox browser. Is this right? Yes, this is correct behavior and is the direct result of how browser s and cookies function.
.
237 1 1. AC Power • 29 2 2. Network P orts • 30 3 3. Local Access Po rt (local PC) • 30 4 4. Target Serv er Ports • 31, 35 A About Raritan Virtual KVM Client • 90 Absolute • 16, 87 Accent .
Index 238 Dominion KX II Devices • 44 E Editing rciusergroup Attributes for U ser Members • 211 Electrical Spe cifications • 2 01 Encryption & Share • 94, 154, 157 , 186 Environmental Requ.
Index 239 Managing Favorites • 44, 52 Menu Tree • 70 Miscellaneous • 244 Modify Existing User • 103, 105 Modify Existing User Gro up • 106, 113 Modifying a Keyboard Ma cro • 80 Mouse Menu .
Index 240 Security Settings • 104, 15 2, 153 Security Settings Menu • 152 Send Ctrl+Alt +Delete • 77 Server Displa y • 188 Servers • 232 Set Per missions for Ind ividual Group • 105 , 115 .
Index 241 W Windows 2000 Settings • 18 Windows 3-Button Mouse on Linux Targets • 220 Windows Vista • 18 Windows XP / Windows 2003 Settings • 17.
.
¾ Germany Monday - Friday 8:30 a.m. - 5 p.m. GMT+1 CET Phone: +49-20 17 47 98 0 ¾ U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800 724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Sec ure Gateway: Press 6, then P ress 2 Fax: 732 764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.
デバイスRaritan Computer DKX2-0E-Eの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Raritan Computer DKX2-0E-Eをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはRaritan Computer DKX2-0E-Eの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Raritan Computer DKX2-0E-Eの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Raritan Computer DKX2-0E-Eで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Raritan Computer DKX2-0E-Eを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はRaritan Computer DKX2-0E-Eの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Raritan Computer DKX2-0E-Eに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちRaritan Computer DKX2-0E-Eデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。