Raritan ComputerメーカーKX2101-v2.20-0B-Eの使用説明書/サービス説明書
ページ先へ移動 of 263
Copyright © 2008 Raritan, Inc. KX2101-v2.20-0B-E July 2008 255-62-4031-00 KX II-101 User Guide 2.0.20.
This document contains propri etary information that is protected by copyright. All right s reserved. No part of this document may be photocopied, rep rod uced, or translated into another language without express prior written con sent of Raritan, Inc.
iii Contents Chapter 1 Introduction 1 What's New in t he User Guide ................................................................................................... .... 1 KX II-101 Ov erview ...................................................
Contents iv Keyboard Options .............................................................................................................. 46 Video Pro perties ..........................................................................................
Contents v Device Se rvices ................................................................................................................ ......... 141 Keyboard/Mous e Setup ..........................................................................
Contents vi Analog KVM Switch .............................................................................................................. ..... 162 Resetting the KX II-101 Us ing the Rese t Button ...................................................
Contents vii CLI Syntax -Tips and Shortcuts ....................................................................................... 214 Common Commands for All Comma nd Line Interf ace Levels ........................................ 214 CLI Commands .
Contents viii Attach the Brackets to KX II-101 for Vert ical Mount ........................................................ 244 Appendix D Informational Notes 246 Java Runtime Envi ronment (JRE) ........................................................
1 In This Chapter What's New in t he User Guide .................................................................. 1 KX II-101 Overview .................................................................................... 2 Product Photos ........
Chapter 1: Introduction 2 KX II-101 Overview Thank you for purchasing the Dominion the KX II-101. The KX II-101 provides a single keyboard, video, and mou se (KVM) port for connection to a target server and a single IP port for connection to an IP network.
Chapter 1: Introduction 3 Diagram key KX II-101 LAN Windows, Linux, and Sun servers TCP/IP LAN Remote (netwo rk ) access.
Chapter 1: Introduction 4 Product Photos Diagram key KX II-101 Mini-USB to USB cable Optional local port cable.
Chapter 1: Introduction 5 Product Features Interfaces • Integrated PS/2 KVM connection • USB connection for control and virtual media • Serial Admin port for initial devic e configuration and di.
Chapter 1: Introduction 6 User Fe atures • Web-based access through comm on b rowsers • Intuitive graphical user interfa ce (GUI) • PC Share mode, which enables more than one remot e user • TC.
Chapter 1: Introduction 7 Term Description Local User port Enables a user in immediate proximity to the target server to use the native keyboard and mouse without unplugging the KX II-101. Virtual media Enables a KVM target server to rem otely access media from client PC and network file servers.
Chapter 1: Introduction 8 Related Documentation The KX II-101 User Guide is accompanied by a KX II-101 Quick Se tup Guide, which can be found on the CD included with the device or on the Support page of Raritan's web sit e (www.
9 In This Chapter Overview .................................................................................................... 9 Default Logon Information ......................................................................... 9 Getting St arted ..
Chapter 2: Installation and Configuration 10 Getting Started KX II-101 users with Microsoft Internet Explorer versio n 6 or Wi ndows 2000 must upgrade to Serv ice Pack 4 (SP4) or higher.
Chapter 2: Installation and Configuration 11 Resolutions 640x480 @66.6 Hz 800x600 @85 Hz 1152x870 @75.1 Hz 640x480 @72 Hz 800x600 @90 Hz 1152x900 @66 Hz 640x480 @75 Hz 800x600 @100 Hz 1152x900 @76 Hz 640x480 @85 Hz 832x624 @75.
Chapter 2: Installation and Configuration 12 GUI Resolution/64 Bit To check the GUI resolution on 64 bit cards : 1. Run the following comma nd: # /usr/ sbin/m64config –prconf To change the resolution on 64 bit cards: 1.
Chapter 2: Installation and Configuration 13 Windows XP®/Window s 2003® Settings To configure the mouse: 1. Select Start > Control Panel > Mouse. 2. On the Pointer Options tab in the Motion gro up, set the mouse motion speed setting to exactly the middle speed an d deselect the Enhanced pointer preci si on checkbox.
Chapter 2: Installation and Configuration 14 Animate controls and elem ents in side windows Animate windows when mi nimizi ng and maximizing Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 4.
Chapter 2: Installation and Configuration 15 Set the mouse acceleration value to exactly 1 and the threshol d to exactly 1. A target server running the Solaris operating syste m must output VGA video (H-and-V sync, not co mposite sync).
Chapter 2: Installation and Configuration 16 2. Click on Mouse Settings and set the Mouse A cceleration to 1.0 and Threshold to 3.0. Step 2: Configure Net work Firewall Settings To access the KX II-101 through a network firewall, your firewall m ust allow communication on T CP Port 5000.
Chapter 2: Installation and Configuration 17 Step 3: Connect the KX I I-101 The KX II-101 has the physical connections d escribe d in the diag ram..
Chapter 2: Installation and Configuration 18 Diagram key Admin port Use to do one of the following: • Configure and manage the device with a terminal emulation program on your PC. • Configure and manage a powe r strip. • Connect an external modem to dial into the device.
Chapter 2: Installation and Configuration 19 Target Server The KX II-101 can use either the includ ed USB ca ble or integrated PS/2 cables to connect to the target serv er. Before conne cting, configure your target server's video to a supported resolution.
Chapter 2: Installation and Configuration 20 Use USB cables to connect the ke yboard and mo use directly to the target server. Diagram key Target server Included mini-USB to USB cable from the KX II-1.
Chapter 2: Installation and Configuration 21 Diagram key USB connection from the targ et server to keyboard Video connection to the local monitor (optional cable ) PS/2 Configuration To configure the KX II-101 for use with a PS/2 target server: 1.
Chapter 2: Installation and Configuration 22 3. If you require Virtual Media (VM) connectivity, connect the mini-USB connector to the KX II-101 and the USB connector to any USB port on the target server.
Chapter 2: Installation and Configuration 23 Diagram key PS/2 connection from the KX II-101 to the mouse (op t ional cable) PS/2 connection from the KX II-101 to the keyboa rd (optional cable) Video c.
Chapter 2: Installation and Configuration 24 Local User Port The KX II-101 is available with optional video and PS/2 cables (KX II- 101-LPKVMC) that enable you to attach a keyboard and mouse to the target server through the Local User port.
Chapter 2: Installation and Configuration 25 2. Launch a supported we b browser such as Internet Explorer (IE) or Firefox. 3. In the address field of the browser, enter the default IP address of the device: 192.168.0.192. 4. Press Enter. The login page open s.
Chapter 2: Installation and Configuration 26 DHCP - With this option, network para meters are assigned by the DHCP server each time the KX II-101 is booted. Configuring Direct Port Acc ess To configure direct port acces s: 1. Choose Device Settings > Device Services.
Chapter 2: Installation and Configuration 27 4. Specify a valid TCP port for the selected access type. For example, direct port access via Tel n et TCP port can be configured as 7770. 5. Click OK. See Device Management (on pa ge 138) for mo re information.
Chapter 2: Installation and Configuration 28 5. Click OK. Remote Authentication Note to CC-SG Users When the KX II-101 is controlled by Command Ce nter Secure Gateway, CC-SG authenticates users and group s.
Chapter 2: Installation and Configuration 29 Note on Microsoft Active Directory Microsoft Active Directory uses t he LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the KX II-101.
Chapter 2: Installation and Configuration 30 3. Launch the terminal emulation progr am you wa nt to use to configure the KX II-101. 4. Set the following port settings in the terminal emulatio n program: Bits per second - 115200 Data bits - 8 Parity - None Stop bits - 1 Flow control - None 5.
Chapter 2: Installation and Configuration 31 11. To configure new networ k setti ngs, at the Network prompt, type interface followed by one of the following commands and its appropriate argument (option), then p ress Enter. Command Argument Options ipauto none|dhcp none - Enables you to manually specify an IP address for the device.
32 In This Chapter Interfaces ................................................................................................. 32 Virtual KVM Client ................................................................................... 41 Multi-Platform Client (MPC ) .
Chapter 3: Working with Target Servers 33 4. Click Save. To define a direct port access URL: • Define a URL with the IP address, user name, password, an d if necessary, port number of the KX II-101. If you have only one KVM port, the port number is not needed.
Chapter 3: Working with Target Servers 34 Port Access Page After successfully logging in to the KX II-101 Remote Console, the Port Access page appears. This page lists the KX II-101 port, the con ne cted KVM target server, and its status a nd availability.
Chapter 3: Working with Target Servers 35 • Disconnect - Disconne cts t his port and closes the Virtual KVM Clie nt page for this target server. This menu item is availabl e only when the port status is up and connected, or u p an d busy. • Power On - Powers on the target serve r through the associated outlet.
Chapter 3: Working with Target Servers 36 Managing Favorites A Favorites feature is provided so you can organize and quickly a ccess the devices you use frequently.
Chapter 3: Working with Target Servers 37 Manage Favorite s Page To open the Manage Favorites pa ge: • Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: To: Favorites List Manage your list of favorite devices.
Chapter 3: Working with Target Servers 38 3. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Fav orites List: 1.
Chapter 3: Working with Target Servers 39 Discovering Raritan Devices on t he KX II-101 Subnet This option discovers devices on the device subn et, which is the subnet of the KX II-101 device IP address itse lf. You can access these devices directly from this the Subnet page or add them to your list of favorites.
Chapter 3: Working with Target Servers 40 4. Change the discovery Port (if necessary). 5. Select the Product Type. 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate KX II-101 device.
Chapter 3: Working with Target Servers 41 1. Select the checkbox next to the appropriate KX II-101 device. 2. Click the Delete button. The favo rite is removed from your list of favorites. Logging off To quit the KX II-101 Remote Console: • Click Logout in the upper ri ght -h and corner of the page.
Chapter 3: Working with Target Servers 42 VKC Toolbar Button Description Properties Video settings Calibrate color Synchronize the target mouse cu rsor Refresh screen Auto-sense video Send Ctrl+Alt+De.
Chapter 3: Working with Target Servers 43 To power off a target server: 1. From the KX II-101 Remote Console, click the Po rt Access tab to open it. The Port Access page opens. 2. Click the port name of the appropria te target server. The Port Action menu appears.
Chapter 3: Working with Target Servers 44 2. Choose the Connection Speed fr om the drop-down list. The device can automatically detect available bandwidth an d not limit bandwidth use. However, you can also adjust this usage according to bandwidth limitations.
Chapter 3: Working with Target Servers 45 4. Use the slider to select the desir ed level of Smoothing (15-bit color mode only). The level of smoothing determines h ow aggressively to blend screen regi on s with small color variation into a single smooth color.
Chapter 3: Working with Target Servers 46 Keyboard Options Keyboard Macros Keyboard macros ensure that keyst roke combi nations intended for the target server are sent to and interpreted only by the target serve r. Otherwise, they might be interpret ed by the computer on whi ch the Virtual KVM Client is running (your clie n t PC).
Chapter 3: Working with Target Servers 47 7. Review the Macro Sequence field to be su re the macro sequence is defined correctly. The contents of this field are automatically generated and a re based on the selections made in t he Keys to Press and Keys to Release fields.
Chapter 3: Working with Target Servers 48 9. Click Close to close the Keyboard Macros dialo g. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assign ed to the macro.
Chapter 3: Working with Target Servers 49 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboa rd Macro s dialog appears. 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted. Video Properties Refresh Scr een The Refresh Screen command force s a refre sh of the video screen.
Chapter 3: Working with Target Servers 50 Calibrate Color Use the Calibrate Color command to opt imize the color levels (hue, brightness, saturation) of the transmitted video imag es. The KX II-101 color settings are on a target server-basis. Note: The Calibrate Color com mand applies to the current connection only.
Chapter 3: Working with Target Servers 51 If the video image looks extremely blurry or unfocused, the settings for clock and pha s e can b e adjusted until a better image appears on the active target server. Warning: Exercise caution when changing the Clo ck and Phase settings.
Chapter 3: Working with Target Servers 52 Note: Some Sun background screens, su ch as screens with very dark borders, may not center precisely on ce rtain Sun servers. Use a different background or place a lighter colored ico n in the upper left corner of the screen.
Chapter 3: Working with Target Servers 53 Mouse Pointer Sy nchronization When remotely viewing a target serve r that uses a mouse, you will see two mouse cursors: one belonging to y our remote cli ent workstation and the other belonging to the target server.
Chapter 3: Working with Target Servers 54 c. Close the terminal window. 6. Click the "Virtual KVM Client mouse synchronizatio n" button . Additional Notes for In telligent Mouse Mode • Be sure that there are no icons or applications in the upper left section of the sc reen since that is whe re the synchronization routin e takes place.
Chapter 3: Working with Target Servers 55 Intelligent Mouse Mode In Intelligent Mouse mode, the KX II-101 device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target.
Chapter 3: Working with Target Servers 56 Please note that mouse configuratio ns will vary on different target operating systems. Consult your OS guideline s for furt her details. Also note that intelligent mouse synchr onization doe s not work with UNIX targets.
Chapter 3: Working with Target Servers 57 Tool Options From the Tools menu, you can spe cify certain o ption s for use with the Virtual KVM Client, including logging, setting the key boa rd type, and defining hot keys for exiting target screen resolution mode a nd si ngle cursor mode.
Chapter 3: Working with Target Servers 58 Italian (Italy) Slovenian 4. Exit Target Screen Resolution M ode - Hotkey. Whe n you enter target screen resolu tion mode, th e display of the target server becom es full screen and acquire s the same resolution as the target server.
Chapter 3: Working with Target Servers 59 Note: The Keyboard Indicator should be use d on Linux systems using Gnome as a desktop envi ronm ent. View Options View Toolbar You can use the Virtual KVM client wi th or without the toolbar di spl ay. To toggle the display of the toolbar (on and off): • Choose View > View Toolbar.
Chapter 3: Working with Target Servers 60 Multi-Platform Client (MPC) Raritan Multi-Platform Client (MPC) is a graphical u ser interface for the Raritan product lines, providing remote access to targ et serve rs connected to Raritan KVM over IP devices.
Chapter 3: Working with Target Servers 61 Navigator The navigator provides a tree view of every known Raritan device. From this panel, you can access all Raritan networked devices for whi ch a connection profile exists and/or all Raritan device s automatically identified on the network.
Chapter 3: Working with Target Servers 62 Devices in the MPC Navigator In MPC, devices are named accordin g to the Manager Nam e field on the Manager's Network Config uration page. Dominion device s are nam ed according to the Device Name field on th e Domi nion Console Network Settings page.
Chapter 3: Working with Target Servers 63 Icon Description Connected (green) - You are currently authenticated and connected to this device. Available (black) - This dev ice is cu rrently available on the network but you are not currently con necte d to it.
Chapter 3: Working with Target Servers 64 Icon Ac tion Description Display/Hide Navigator You can also select Navigator in the View menu to toggle between displaying and hiding the Navigator. Refresh Navigator Updates t he device status information displayed in the Navigator.
Chapter 3: Working with Target Servers 65 Navigator Display Options Showing Ports • Discovered Devices - Shows o r hid es discovered devices from the Navigator view. You will not see broadcast messages when this option is disabled (not sele cted ). • Unassigned Cha nnels - Shows or hides ch annels with no assigne d targets.
Chapter 3: Working with Target Servers 66 Button Button Name Description Connectio n Properties Opens the Modify Connect ion Properties dialog from which you can manually adjust bandwidth options (su ch a s connection speed, color depth, and so forth).
Chapter 3: Working with Target Servers 67 Button Button Name Description Exit On- Screen Menu Not applicable for IP-Reach or Dominion. Used by the application with other Rarit an products . Alternatively, select Esc on the keyboard. Same as choosing Keyboard > Exit On- Screen Menu.
Chapter 3: Working with Target Servers 68 Button Button Name Description Show/Hide Browse All Devices Toggles between displaying and not displaying Raritan devices in the Navigat or that are automatically identified on the network and that do not have preconfigured profiles asso ciated with them.
Chapter 3: Working with Target Servers 69 To display the Connected Serv er(s) toolbar (when not already visible): • Choose View > Connected Serve r(s) Toolbar. To view the w in d o w for a target server: • Click the button that correspond s to the app ropriate connected target server you want to view.
Chapter 3: Working with Target Servers 70 Diagram key Session information Description Lock key indicators Indicates the status of the current target KVM Server, in respect to the activation of the Caps-Lock, Num-Lo ck, and Scroll- Lock keys.
Chapter 3: Working with Target Servers 71 MPC Target Screen Resolution M ode Target Screen Resolution mode p rovides you with the ability to view the target server desktop in full screen mode, which remo ves all toolbars from view.
Chapter 3: Working with Target Servers 72 To exit full screen mode, use the sh ortcut menu or click the Close i con that appears at the top right of the page when you hover your mo u se along the top of the screen. Note: The Ctrl+Left Alt+M key combination doe s not work for certain target servers if you are running JRE 1.
Chapter 3: Working with Target Servers 73 MPC Scaling Scaling your target window size allows you to view the entire contents of the target server window. This featur e increases or redu ces the size of the target video to fit the window size and maintain s the aspe ct ratio.
Chapter 3: Working with Target Servers 74 Note: Enabling Scale Video will scale the com plete target video image to fit the remote desktop area as it grow s or shrinks. You can com bine this setting with target screen resolution for a full page affect on targets with a higher resolution than yo ur de sktop.
Chapter 3: Working with Target Servers 75 2. On the Connect tab, type a meaningful description of the device in the Description field (up to 32 alphanu meric and spec ial cha racters are allowed). This descri ption i dentifies the Ra ritan device in the Navigator.
Chapter 3: Working with Target Servers 76 4. Click OK. To delete a profile: 1. Select the device with a profile in the Navigator and ri ght-click it. 2. Choose Delete Profile. 3. When prompted to confirm the deletion, click Ye s to delete the profile for this device or click No t o return to the application without deleting.
Chapter 3: Working with Target Servers 77 Connection Information To obtain information about your connection: • Choose Connection > Co n nection Info.
Chapter 3: Working with Target Servers 78 Connecting to a Re mote KVM Console Once you establish a connection with a Ra ritan device, that device's icon in the Navigator can be expanded to display all ports e nabled for remote access.
Chapter 3: Working with Target Servers 79 3. To exit completely, click Exit on the Connection men u Shortcut Menu To access the shortcut menu, use either the default keyboard combination of Ctrl+Left Alt+M or the keyboard combination you a s sign. See Changing the Shortcut Menu Key board Combination (on page 80) for more information.
Chapter 3: Working with Target Servers 80 Shortcut Menu Key Options Execute any of the commands on the shortcut menu by either ch oosing the command in the menu or using a ke y combination.
Chapter 3: Working with Target Servers 81 Once a new keyboard combination is assigned, the new combination will be displayed in the shortcut menu and in the onscreen message that displays when the combination is u sed.
Chapter 3: Working with Target Servers 82 Keyboard Macros A hot key combination is a set of keystro ke s that performs a n acti on when pressed. For example, the hot key combination Ctrl +Alt+0 might be created to minimize all windows. A keyboard macro is a shortcut that se nds a h ot key combination to a target ser ver.
Chapter 3: Working with Target Servers 83 6. In the Keys to Release field: a. Choose each key for which you would li ke to emulate a key release. Define the keys you want rele ased in order to run the macro. For example, specify that the keys to be pre ssed must also be released in order for the macro to be execute d.
Chapter 3: Working with Target Servers 84 8. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Key board Macro s dialog appears and lists the new keyboard macro.
Chapter 3: Working with Target Servers 85 9. Click Close to close the Keyboard Macros dialo g. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assign ed to the macro.
Chapter 3: Working with Target Servers 86 Modifying and Removing Ke yboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboa rd Macro s dialog appears. 2. Choose the macro from among those listed. 3. Click Modify. The Add/Edit Macro dialog appears.
Chapter 3: Working with Target Servers 87 Hot Key Combination Description Alt Gr Because of a limitation in the Java Runtime Environment (JRE), Fedora, Linux, and Solaris clients receive an invalid resp onse from Alt Gr on United Kingdom and US International langua ge keyboard s.
Chapter 3: Working with Target Servers 88 Keyboard Type Specifying a Key board Type in MPC MPC will not autodetect the type of keyboard you use, so you mu st specify your keyboard type to ensure accurate keybo ard mappi ng. To specify a keyboard type: 1.
Chapter 3: Working with Target Servers 89 3. Click OK. Keyboard Limitations Slovenian Keyboards The < key does not work on Slovenian keyboa rd s due to a JRE limitation.
Chapter 3: Working with Target Servers 90 Language Configuration method UK System Settings (Control Center) Korean System Settings (Control Center) Belgian Keyboard Indicator Norwegian Keyboard Indica.
Chapter 3: Working with Target Servers 91 Mouse Options Single Cursor Mode/Dual C ursor Mode When remotely viewing a target serve r that uses a mouse, you will see two mouse cursors on the remote deskt op.
Chapter 3: Working with Target Servers 92 Mouse Synchronization Opt ions In addition to synchronizing mouse cursors or togglin g between single and dual cursor mode, the Mouse menu provid es thre e op.
Chapter 3: Working with Target Servers 93 Intelligent Mouse Mode In Intelligent Mouse mode, the KX II-101 device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target.
Chapter 3: Working with Target Servers 94 Please note that mouse configuratio ns will vary on different target operating systems. Consult your OS guideline s for furt her details. Also note that intelligent mouse synchr onization doe s not work with UNIX targets.
Chapter 3: Working with Target Servers 95 384 kb (Slow DSL/T1) 256 kb (Cable) 128 kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) 3. Set the Color Depth. Devices can dynamically adapt the col or depth transmitted to remote users in order to maximize usability in all bandwidth s.
Chapter 3: Working with Target Servers 96 Devices can filter out the electri cal interference of video output from graphics cards. This feature optimizes picture quality and reduces bandwidth. Higher setting s tran smit variant pixels only if a large color variation exi sts in co mpa rison to the neighboring pixels.
Chapter 3: Working with Target Servers 97 Contrast Blue - Controls th e blue si gnal contrast; rang e is 0 - 255. Horizontal Offset - Controls the horizontal positio ning of the target server display on your monitor; range is 0 - 512 .
Chapter 3: Working with Target Servers 98 6. Click OK to apply the settings a nd close the dialog. Click Apply to apply the settings without closing the dial og. Color Calibration Use the Color Calibration command if the colo r level s (hue, brightness, and saturation) of the transmitted video images do not seem a ccurate.
Chapter 3: Working with Target Servers 99 TIP: Open Microsoft Notepad and maxim ize the wind ow. 3. On the Video menu, choose Calibrate Color o r click the Color Calibration button on the toolbar. The target device page will update its calibration. Tip: You can also specify autom atic color calibration using T ool s > Options.
Chapter 3: Working with Target Servers 100 General Options in MPC The Options available in the Tools menu provide o ptions that allow you to customize scroll borders, mouse m od e set tings, single cu rsor mode, auto color calibratio n, hot key config uration, keybo ard type, broad cast port, and logging.
Chapter 3: Working with Target Servers 101 French (France) German (Germany) Japanese United King dom Korean (Korea) Belgian (Belgium) Norwegian (Norway) Danish (Denmark) Swedish (Sweden) German (Switzerlan d) Hungarian (Hungary) Spanish (Spain) Italian (Italy) Slovenian 7.
Chapter 3: Working with Target Servers 102 10. For the Broadcast Port, type the broadcast port numbe r in the Port field if you want to use a port other then 5000. 11. Select the Enable IPv6 Netwo rki ng che ckbox for IPv6 to enable IPv4 and IPv6 dual-stack operation.
Chapter 3: Working with Target Servers 103 2. Highlight the target's icon in the Navigator and then ch oose Tools > Update > User Password. The Change Password di a log appears. 3. Type your current password in the Old Password field. 4. Type the new password in the New Password field.
Chapter 3: Working with Target Servers 104 2. Click Tools > Restore Devi ce Configuration. Note that device configuration is specific to a particula r device and should not be restored to another device . Backing Up and Restoring a User Configuration To back up a device's user configuration: 1.
Chapter 3: Working with Target Servers 105 Note: If you want the application to autodiscover Rarita n devi ces on the new broadcast port you entered in the Options di alog, you must configure all Raritan devi ces to use the new p ort number.
106 In This Chapter Overview ................................................................................................ 107 Prerequisites for Usi ng Virtual Medi a .................................................... 110 File Server Setup (File Server ISO Images Only) .
Chapter 4: Virtual Media 107 Overview Virtual media extends KVM capabilities by enabling K VM target servers to remotely access media from the client PC and net work file servers. With this feature, media mounted o n the client PC and network file servers is essentially mounted virtually by the ta rget server.
Chapter 4: Virtual Media 108.
Chapter 4: Virtual Media 109 Diagram key Local workstation KX II-101 Target server Remote file server (ISO images) USB drive Floppy drive CD/DVD drive Hard drive image files.
Chapter 4: Virtual Media 110 Prerequisites for Using Virtual Media With the KX II-101 virtual media feature, you can mount up to two drives (of different types) that are suppor ted by the USB profile curre ntly applied to the target. These drives are accessible for the duration of the KVM session.
Chapter 4: Virtual Media 111 File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also wo rk.
Chapter 4: Virtual Media 112 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog..
Chapter 4: Virtual Media 113 Connecting to Virtual Media Local Drives This option mounts an entire drive, wh ich mean s the entire disk drive is mounted virtually onto the target serv er. Use this option for hard dri v es and external drives only. It does no t include network drives, CD-ROM, or DVD-ROM drives.
Chapter 4: Virtual Media 114 Conditions when Read/Write is Not Av ailable Virtual media Read/Write is not av ailable in the following situations: • For all hard drives. • When the drive is write-p r otected. • When the user does not have Read/Write permi ssion: Port Permission Access is set to None or View.
Chapter 4: Virtual Media 115 c. Click Connect. 3. For ISO images: a. Choose the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive. ISO format is the only format supported. b. Click the Browse button. c.
116 In This Chapter User Groups .......................................................................................... 116 Users ..................................................................................................... 123 Authenticatio n Settings .
Chapter 5: User Management 117 User Group List User groups are use d with local an d remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user grou ps befo re creating individual users since, when you add a u se r, you must assign that user to an existing user group.
Chapter 5: User Management 118 Adding a New User Group To add a new user group: 1. Open the Group page by selecting User Mana geme nt > Add New User Group or clicki ng the Add bu tton from the User Group List page. The Group page is organized into the f ollowing categories: Group, Permissions, Port Permi ssi ons, and IP ACL.
Chapter 5: User Management 119 6. Click OK. Setting Port Permissions For each server port, you can sp ecif y the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setti ng for all permission s is Deny.
Chapter 5: User Management 120 VM access Option Description Deny Virtual media permission is denied altogether for the port Read-Only Virtual media access is limited to read a c cess only Read-Write C.
Chapter 5: User Management 121 To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2. Type the ending IP address in the Ending IP field. 3. Choose the action from the available options: Accept - IP addresses set to A ccept are allowed acce ss to the KX II-101 device.
Chapter 5: User Management 122 Tip: The rule numbers allow yo u to have m ore control over the order in which the rules are created. Setting Permissions Important: Selecting the User Manag ement checkbox allo ws the members of the group to change the permissions of all users, including their own.
Chapter 5: User Management 123 Modifying an Existing User Group Note: All permissions are enabled (and can not be changed) for the Admin group. To modify an existing user group: 1. From the Group page, change the appropri ate fields and set the appropriate permissi ons.
Chapter 5: User Management 124 User List The User List page display s a list of all users including their user name, full name, and user group. The list can be so rted o n any of the columns by clicking on the column name. From the User List p age, you ca n also add, modify, or delete users.
Chapter 5: User Management 125 5. Choose the group from the User Group dro p-down list. The list contains all groups you ha v e cre ated in addition to the system- supplied default groups. <Unkno wn >, which is the default setting, Admin, Individual Group.
Chapter 5: User Management 126 Authentication Settings Authentication is the proc ess of verifying that a user i s who he says he is. Once a user is authenticated, t he user's group is used to determine his system and port permi ssions. The user's assig ned privileges determine what type of access is allo wed.
Chapter 5: User Management 127 To return to factory defaults: • Click the Reset to Defaults button. Implementing LDAP/LDAPS Remote Aut hen tication Lightweight Directory Access Protoc ol (LDAP/LDAPS) is a networking protocol for querying and modifying directory servi c es running over TCP/IP.
Chapter 5: User Management 128 4. In the Primary LDAP Server fiel d, type the IP address or DNS name of your LDAP/LDAPS remote aut hentication server (up to 37 characters). When the Enable Secure LDAP option is sel ecte d, the DNS name must be used. 5.
Chapter 5: User Management 129 14. Active Directory Dom ain. Type the name of the Active Directory Domain. Returning User Group Information from Activ e Directory Server The KX II-101 supports user authentic ation to Active Directory (AD) without requiring that users be defined locally on the KX II-101.
Chapter 5: User Management 130 To enable your AD server on the KX II-101 : 1. Using the KX II-101, create special groups an d assig n proper permissions and privileges to these g roups. For example, create groups such as KVM_Admin and KVM_ Operator. 2.
Chapter 5: User Management 131 6. The Authentication Port default is port is 1812 but can be chang ed as required. 7. The Accounting Port default port is 1813 but can be chang ed as required. 8. The Timeout is recorded in se conds and default timeout is 1 se con d, but can be changed as req uired.
Chapter 5: User Management 132 CHAP - With CHAP, authentication can be re quested by the server at any time. CHAP prov ides more security than PAP.
Chapter 5: User Management 133 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeed s, the KX II-101 determines the permission s for a given use r based on the permissions of the user's group.
Chapter 5: User Management 134 Attribute Data Log on NAS-IP-Address (4) The IP address for the KX II-101. User-Name (1) The user name entered at the login screen.
Chapter 5: User Management 135 User Authentication Pro c ess When the device is configured to authe nticate and authorize local use rs from CC, the order in which the user credentials are validated fo.
Chapter 5: User Management 136 Remote authentication follows the pr ocess specified in the flowcha rt below:.
Chapter 5: User Management 137 Changing a Password To change your pass word: 1. Choose User Management > Ch ang e Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field.
138 In This Chapter Network Settings ................................................................................... 138 Device Se rvices ..................................................................................... 141 Keyboard/Mous e Setup .
Chapter 6: Device Management 139 To reset to factory defaults: • Click Reset to Defaults. Network Basi c Settings 1. Choose Device Settings > Network. The Netwo rk Settings page opens. 2. Specify a meaningful Device Name for your KX II-101 device u sing up to 16 alphanumeric cha ra cters, valid spe cial cha racters, and no spaces .
Chapter 6: Device Management 140 e. Select the IP Auto Configuration. The following options are available: None (Static IP) - This option requires that you manually specify the network parameters. This is the recommended option because the KX II-101 is an infrastructure device and its IP address should not change.
Chapter 6: Device Management 141 Full-duplex allows communication in b oth directions simultaneously. Note: Occasionally there are problem s runnin g at 10 Mbps in either half or full duplex. If you are experi en cing problems, please try another speed and duplex.
Chapter 6: Device Management 142 Note: KX II-101 is enabled by factory de fault. 2. Select Enable SSH Access . 3. Type the network port used for SSH access to the K X II-101.
Chapter 6: Device Management 143 Tip: Define a direct port access URL once, then save it in your web browser as a boo km ark to make reusing it easier. Keyboard/Mouse Setup Use the Keyboard/Mouse Setup page to configure the Keyboard a nd Mouse interface between the KX II-101 and the host device.
Chapter 6: Device Management 144 USB - Forces the KX II-101 to use the USB connection to send Keyboard and Mouse data to the host device. PS/2 - Forces the KX II-101 to use the PS/2 connection to send Keyboard and Mouse data to the host device.
Chapter 6: Device Management 145 4. Click OK. Raritan Power Strip Control To configure the po w er s trip serial port: 1. Choose Device Settings > Serial Port. T he Serial Po rt Settings page opens. 2. Select the PowerStrip Control radio butto n. Choose this option when connecting the KX II-101 to a Raritan powe r strip.
Chapter 6: Device Management 146 3. Click OK. Modem To configure the modem serial port: 1. Choose Device Settings > Serial Port. T he Serial Po rt Settings page opens. 2. Select the Modem radio button. Choose t his option when attaching an external modem to the KX II-101 in order to provide dial-up access.
Chapter 6: Device Management 147 4. Click OK. See Modem Access Cabl e Connections (on page 148) for details on the cabl e co nnectio n for m odem access and see Certified Modems (on page 226) for details on certified mode ms that wo rk with the KX II-101.
Chapter 6: Device Management 148 Modem Access Cable Connections Use the following cable co nne ction c onfiguration to connect the KX II- 101 to a modem: 1. Connect an admin seria l cable to the KX II-101. 2. Connect a 9 pin male/male gen de r changer to the admin serial cabl e.
Chapter 6: Device Management 149 6. Click OK. Event Management The KX II-101 Event Management feature provides a set of scree ns for enabling and disabling the distri buti on of system events to SNMP Managers, Syslog, and the audit log.
Chapter 6: Device Management 150 Configuring Event Management - Settings SNMP Configuration Simple Network Management Protocol (SNMP) is a p roto col gover ning network management and the monitori ng of network devices and their functions. The KX II-101 offers SNMP Agent support thro ugh Event Management.
Chapter 6: Device Management 151 Event Management - De stinations System events, if enabled, can g enerate SNMP notification events (traps), or can be logged to Syslog or A udit Log. Use the Event Management - Destinations page to sel ect the system events to track and where to send this information.
Chapter 6: Device Management 152 Tip: Enable or disable entire Categories by che cking or clearing the Category checkboxes, respec tively. 3. Click OK.
Chapter 6: Device Management 153 Trap Name Description ipConflictResolved An IP A ddress conflict was resolved. networkFailure An Ethernet interface of the product can no longer communicate over the net work. networkParameterChanged A change has been made to the network parameters.
Chapter 6: Device Management 154 Trap Name Description userPasswordChanged This event is tri ggered if the password of any user of the device is modified. userSessionTimeout A user with an active sessi on ha s experienced a session termination du e to timeout.
Chapter 6: Device Management 155 Port type Description PowerStrip Power strip KVM KVM target 1. Click the Port Name for the port you want to edit. For KVM ports, the Port page is opened. In this page, you can name the ports, create power asso ciations, and set target server settings.
Chapter 6: Device Management 156 Note: The Power Port 1 link is enable d only when a Raritan powe r strip is connected to the KX II-101 and configured. Otherwise, the link is disabled. Renaming a Port To change the port name: 1. Enter a descriptive name, such as the name of the target server.
Chapter 6: Device Management 157 Power Control The KX II-101 provides remote power control of a target server. T o utilize this feature, you must have a Raritan remote power strip.
Chapter 6: Device Management 158 Diagram key DKX2-101-SPDUC connector (not incl u ded) from the KX II-101 to Raritan the power strip. Raritan power strip. To connect the KX II-101 to a Raritan po wer strip: 1. Connect the Mini DIN9M connect or of the DKX2-101-SPDUC cabl e to the Admin port of the KX II-101.
Chapter 6: Device Management 159 3. Click OK. To cancel without sav ing changes: • Click Cancel. Managing Power A ssociations To make power associations (associ ate power strip outlets with the KVM target serv er): Note: When a power strip is asso ciate d with the target server (port), the outlet name is replaced by the port nam e.
Chapter 6: Device Management 160 To remove a power strip association: 1. Select the appropriate power stri p from the Power Stri p Name drop- down list. 2. For that power strip, select t he approp ria te outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down list, sel ect None.
Chapter 6: Device Management 161 Controlling a Power Strip Dev ice Control the power stri p device using the Power Strip Device pag e. This page enables you to turn each outl et on the power strip on and off. To control the po w er s tri p connected to the KX II-101: 1.
Chapter 6: Device Management 162 Analog KVM Switch You can configure a Raritan analo g KVM swit ch to work with the KX II- 101. The KX II-101's compatibility has been verified with t he following.
Chapter 6: Device Management 163 6. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults: • Click Reset to Defaults. Resetting the KX II-101 Using the Reset Button On the back panel of the KX II-101, there is a Re set button.
Chapter 6: Device Management 164 NOTE: If the KX II-101 is set to restore to the factory defaults upon reset, the IP address, user name, and other op tions will be set accordingly.
165 In This Chapter Overview ................................................................................................ 166 Basic USB Connect ion Sett ings ............................................................ 166 Advanced USB Conn ection Settings .
Chapter 7: Managing USB Connections 166 Overview To broaden the KX II-101's compatibilit y with different KVM target servers, Raritan provides a user defined real -time selection of USB configuration profile options for a wi de range of operating system and BIOS-level server implementations.
Chapter 7: Managing USB Connections 167 2. Click the icon to expand the USB Connection Settings section. 3. Select the USB connection settings you will be using: Enable Absolute Mouse - Applies on.
Chapter 7: Managing USB Connections 168 Advanced USB Connection Settings WARNING: It is possible, based on the selections you make in the Advanced USB Connection Settings se ction, to cause configuration problems between the KX II-101 and the target serve r.
Chapter 7: Managing USB Connections 169 5. Click OK. Known USB Profiles The current release of the KX II-101 includes the known USB p rofil es described in the following tables.
Chapter 7: Managing USB Connections 170 Hardware/BIOS: Dell PowerEdge 1950/2950/2970/6950/R2 00 Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media I.
Chapter 7: Managing USB Connections 171 Hardware/BIOS: Dell PowerEdge 650 Server attributes: BIOS A05, Windows Server 2003, Intel P 4 3GHz Keyboard & mouse: USB USB connection settings: Advanced U.
Chapter 7: Managing USB Connections 172 Hardware/BIOS: Dell PowerEdge 1650 Absolute mouse Virtual media Intf#1 CD -ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM dis k SUN USB keyboard Remove Unused VM Intf#2 Comments: BIOS accessible YES.
Chapter 7: Managing USB Connections 173 Hardware/BIOS: Other Dell Optiplex, keyboard only Server attributes: GX620 BIOS A11 11/20/06 Keyboard & mouse: USB USB connection settings: Advanced USB set.
Chapter 7: Managing USB Connections 174 Hardware/BIOS: HP Com paq DC7100/7600 Comments: Virtual CD-ROM and disk drives cannot be used simultaneously. Hardware/BIOS: HP Integrity RX1600 Server attributes: HP-UX 8.
Chapter 7: Managing USB Connections 175 Hardware/BIOS: HP Proliant DL145 Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM disk SUN USB keyboard Remove Unused VM Intf#2 Comments: Boot from CD-ROM.
Chapter 7: Managing USB Connections 176 Hardware/BIOS: HP Proliant DL360/DL380 Server attributes: HP Proliant DL360/DL380 G4 (HP SmartStart CD) Keyboard & mouse: PS/2 USB connection settings: Adva.
Chapter 7: Managing USB Connections 177 Hardware/BIOS: HP Proliant DL360/DL380 Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Med.
Chapter 7: Managing USB Connections 178 Hardware/BIOS: HP Proliant DL360/DL380 Server attributes: HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) Keyboard & mouse: USB USB connection.
Chapter 7: Managing USB Connections 179 Hardware/BIOS: IBM eServ er System P5 Absolute mouse Virtual media Intf#1 CD-ROM Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 REM disk SUN USB keyboard Remove Unused VM Intf#2 Comments: Boot options accessible - YES.
Chapter 7: Managing USB Connections 180 Hardware/BIOS: Lenov o ThinkPad X61 Server attributes: BIOS v1.11 2007-11-15 Intel Duo Core 2.20 GHz Keyboard & mouse: USB USB connection settings: Advanced.
Chapter 7: Managing USB Connections 181 Hardware/BIOS: Lenov o ThinkPad T61 Absolute mouse Virtual media Intf#1 Auto Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 Disabled SUN USB keyboard Remove Unused VM Intf#2 Comments: Press F1 during startup to enter BIOS.
Chapter 7: Managing USB Connections 182 Hardware/BIOS: Mac Server attributes: BIOS Mac Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 CD-.
Chapter 7: Managing USB Connections 183 Hardware/BIOS: RUBY Industrial Mai nboard (AwardBIOS) Absolute mouse Virtual media Intf#1 Auto Force full speed Remove Unused VM Intf#1 Absolute mouse Mac serve.
184 In This Chapter Security Settings .................................................................................... 184 Logon Limi tati ons .................................................................................. 185 Strong Passwords .
Chapter 8: Security Management 185 To reset back to defaults: • Click Reset to Defaults. Logon Limitations Using logon limitations, you can specify restrictions for single logon , password aging, and the logging off of idle users.
Chapter 8: Security Management 186 Limitation Description Enable password aging When selected, all use rs a r e required to change their passwords periodicall y based o n the number of days specified in Password Aging Interval field. This field is enabled and required when t he Enable Password Aging c heckbox is se lected.
Chapter 8: Security Management 187 Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alph abeti cal character and one nonalphabetical character (pu nctuation character or numb er). In addition, the first four characters of the password and the user name can not match.
Chapter 8: Security Management 188 User Blocking The User Blocking options specify the criteria by which use rs a re blocked from accessing the system after the sp ecified n umber of unsuccessful login attempts. The three options are mutually exclusive : Option Description Disabled The default opti on.
Chapter 8: Security Management 189 Option Description Timer Lock out Users are denied access to the system for the specified amount of time after exceeding the specified number of unsuccessful logi n attempts.
Chapter 8: Security Management 190 Encryption & Share Using the Encryption & Share setting s you ca n specify the type of encryption used, PC and VM shar e modes, and the type of re set performed when the KX II-101 Reset butt on is p ressed.
Chapter 8: Security Management 191 Encryption mode Description AES-128 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encrypti on of electronic data. 128 is the key length. When AES-128 is specified, be certain that your browser supports it, otherwise you will not be able to connect.
Chapter 8: Security Management 192 5. If needed, select the Disable Local Port Output checkbox. If this option is selected, there is no video output on the loca l port. 6. If needed, select Local Device Reset Mode. This option spe cifies which actions are taken when the hard ware Reset button (at the back of the device) is depress ed.
Chapter 8: Security Management 193 IP Access Control Using IP access control, you can co ntro l access to your KX II-101. By setting a global Access Control List (ACL) you are by ensuring that your device does not respond to packet s bei ng se nt from disallowed IP addresses.
Chapter 8: Security Management 194 Tip: Rule numbers allow you to have more control over the order in which the rules are created. To replace a rule: 1. Specify the rule number you want to repl ace. 2. Type the IP address and subnet mask in the IP/Mask field.
195 In This Chapter Audit Log................................................................................................ 195 Device Info rmation ................................................................................. 196 Back up and Restore .
Chapter 9: Maintenance 196 Device Information The Device Information page provides detailed info rmation about your KX II-101 device. This information is helpful should you need to co ntact Raritan Technical Suppo rt. To view information about y our KX II-10 1: • Choose Maintenance > De vice Informati on.
Chapter 9: Maintenance 197 Backup and Restore From the Backup/Restore page, you ca n backu p and restore the settings and configuration for your KX II-101. In addition to using backup and restore for busin ess continuity purposes, you can use this feature as a time -saving mechani sm.
Chapter 9: Maintenance 198 To restore your KX II-101: WARNING: Exercise caution when re storing your KX II-10 1 to an earlier version. Usernames and p assword in place at the time of the backup will be restored. If you do not remember the old administrative usernames and passwo rd s, you will be locked out of the KX II-101.
Chapter 9: Maintenance 199 To upgrade your KX II-101 devi ce: 1. Choose Maintenance > Firmwa re Upg rade. The Firmware Upgrade page opens. 2. Click the Show Latest Firmware link, locate the app ro priate Raritan firmware distribution file (*.RFP) from the Firm ware Upgrades > KX II-101 page, and download the file.
Chapter 9: Maintenance 200 5. Click Upgrade. Wait for the upgrade to complete. Status inform ation and progress bars are displ ayed during the upgrade. Upo n completion of the upgrade, the device re boots. 6. As prompted, close the browser and wait approximately 5 minutes before logging into the KX II-101 again.
Chapter 9: Maintenance 201 Rebooting The Reboot page provides a safe and co ntrolle d way to reboot your KX II-101. This is the recommended method for reb ooting. Important: All KVM and serial conne ctions will be closed and all users will be logged off.
202 The Diagnostics p ages are used for troubleshootin g and are intended primarily for the administrator of the KX II-101 device. All of the Diagnostics pages (ex cept Device Diagnostics) run standa rd networking commands and the information that is d isplayed is the output of those commands.
Chapter 10: Diagnostics 203 The following information is displayed: • Whether the Ethernet interface is up or down. • Whether the gateway is pingable or n ot. • The LAN port that is currently active. To refresh this information: • Click the Refresh button.
Chapter 10: Diagnostics 204 Statistics - Produces a page similar to the one di splayed here..
Chapter 10: Diagnostics 205 Interfaces - Produces a pa ge si mil ar to the one displayed here. Route - Produces a page simila r to the one displayed here.
Chapter 10: Diagnostics 206 Ping Host Page Ping is a network tool used to test whet her a p articular host or IP address is reach able across an IP network. Using th e Ping Host page, you can determine if a target server or another KX II-101 is acce ssible.
Chapter 10: Diagnostics 207 3. Choose the maximum hops from the drop-down li st (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The o utpu t of trace route is displayed in the Result field.
Chapter 10: Diagnostics 208 Device Diagnostics Note: This page is for use by Raritan Field Engin eers or wh en you are directed by Raritan Techni cal Support. The Device Diagnostics page downlo ad s diagnostics information from the KX II-101 to the client machine.
Chapter 10: Diagnostics 209 a. Retrieve the diagnostics fil e sup plied by Raritan and unzi p as necessary. b. Click Browse. A Choo se Fil e dialog appears. c. Navigate to and select this diagnosti cs file. d. Click Open. The file is displayed in the Script File field: e.
210 In This Chapter Overview ................................................................................................ 210 Accessing the KX II- 101 Using t he CLI ................................................. 211 SSH Connec tion to the KX II-101 .
Chapter 11: Command Line Interface (CLI) 211 Accessing the KX II-101 Using the CLI Access the KX II-101 using one of the following methods: • TELNET via IP connection • SSH (Secure Shell) via IP c.
Chapter 11: Command Line Interface (CLI) 212 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX/Linux workstation and log in as the user admin, enter the following command: ssh -l admin 192.168.30.222 The Password prompt appears.
Chapter 11: Command Line Interface (CLI) 213 CLI Prompts The Command Line Interface prompt indicate s the cu rrent command level. The root portion of the prompt is the login name. For a direct admin serial port connection with a terminal emulation application, Admin Port is the root portion of a command.
Chapter 11: Command Line Interface (CLI) 214 CLI Syntax -Tips and Shortcuts Tips • Commands are listed in al phabetical order. • Commands are not case sensitive. • Parameter names are singl e word without undersco re. • Commands without arguments default to sho w current settings for the command.
Chapter 11: Command Line Interface (CLI) 215 Command Des cription config Switch to the Configuration menu. diagnostics (on page 215) Switch to the diagn osti cs m enu. debug (on page 216) Switch to debug menu. help Display an overview of the CLI syntax.
Chapter 11: Command Line Interface (CLI) 216 Debug The Diagnostics > Debug menu enable s you to choose the Setlog command to set logging o ptions fo r the KX II-101. Setlog Command The Setlog command enables you set the logging le vel for differe nt modules of the KX II-101 and to view the current logg ing levels fo r each module.
Chapter 11: Command Line Interface (CLI) 217 Network The Configuration > Network comma n d s are used to configure the KX II- 101 network con ne ction and device name. Command Description interface Configure the KX II-101 device network interface. name Set the device name.
Chapter 11: Command Line Interface (CLI) 218 Command Option Description gw ipaddress Gateway IP address obtained from the IP administrator mode <auto | 100fdx> Set Ethernet Mode to auto detect o.
219 In This Chapter Overview ................................................................................................ 219 Removing a KX II-101 from CC-SG Management ................................ 220 Us ing CC-SG in Proxy Mode ..............
Chapter 12: CC Unmanage 220 Removing a KX II-101 from CC-SG Management Unless the KX II-101 is released from CC-SG cont rol, you cannot access the device directly.
Chapter 12: CC Unmanage 221 2. Click Yes. A message appears, confirming that the de vice is no longer under CC m ana gement. 3. Click OK. The KX II-101 login page opens.
222 In This Chapter KX II-101 Specif ications ........................................................................ 222 Supported Video Re solutions ................................................................ 223 Supported Keyboar d Languages .
Appendix A: Specifications 223 Specification Description Remote connection: • Network Protocols • One 10/100 Ethernet (RJ45) port • TCP/IP, HTTP, HTTPS, UDP, RADIUS, LDAP, SNTP, DHCP Screen reso.
Appendix A: Specifications 224 Resolutions 720x400 @70 Hz 1024x768 @75 Hz 1280x1024 @85 Hz 720x400 @84 Hz 1024x768 @85 Hz 1600x1200 @60 Hz Note: Composite Sync and Sync-on -G re en vid eo require an additional adapter. Supported Keyboard Languages The KX II-101 provides keyboard suppo rt for the languages listed in the following table.
Appendix A: Specifications 225 Language Regions Keyboard layout Italian Italy Italian Spanish Spain and most Spanish speaking cou ntries Spanish Supported Operating Systems (Clients) The following ope.
Appendix A: Specifications 226 Certified Modems • US Robotics 56K 5686E • ZOOM v90 • ZOOM v92 • US Robotics Sportster 56K • US Robotics Courie r 56K Connectors Interface type Length Description Inches Centime ters Video 15” 38 cm Integrated cable PS/2 15” 38 cm Integrated cable MiniUSB to USB(M) 17.
Appendix A: Specifications 227 Port Description HTTP, Port 80 All requests receive d by the KX II-101 via HTTP (p ort 80) are automatically forwarded to HTTPS for complete security.
Appendix A: Specifications 228 Network Speed Settings KX II-101 network speed setting Auto 100/Full 100/Half 10/Full 10/Half Auto Highest Available Speed KX II-101: 100/Full Switch: 100/Half 100/Half .
Appendix A: Specifications 229 Per Ethernet specification, these should be “n o communication,” howeve r, note that the KX II-101 behavior deviates from expected b ehavi or Note: For reliable netwo rk communication, config ure the KX II-101 and the LAN switch to the same LAN Interface Speed and Duplex.
Appendix A: Specifications 230 9 Pin Pinout 15 Pin local port Pin Single 1 LP_RED 2 LP_GRN 3 LP_BLU 4 CN_LP_KB_SDA 5 CN_LP_KB_SCL 6 GND 7 AGND 8 AGND 9 +5 V 10 CN_LP_MS_SDA 11 CN_LP_MS_SCL 12 N/C 13 L.
231 Note: The procedures in this chapter sh o uld be attempted only by experienced use r s. In This Chapter Returning User Gr oup Inform ation ........................................................ 231 Setting the Registry to Permit Write Operations to the Schema .
Appendix B: Updating the LDAP Schema 232 Setting the Registry to Permit Wr ite Operations to the Schema To allow a domain controller to write to the schema, you mu st set a registry entry that permits schema up dates. To permit write operations to the sche ma: 1.
Appendix B: Updating the LDAP Schema 233 3. Click New and then choose Attribute. When the warni ng me ssage appears, click Continue and t he Create New Attribute dialog appears. 4. Type rciuserg roup in the Common Name field. 5. Type rciuserg roup in the LDAP Display Name field.
Appendix B: Updating the LDAP Schema 234 2. Scroll to the user class in the right pane and rig ht-click it. 3. Choose Properties from the menu. The use r Pro perties dialog appears.
Appendix B: Updating the LDAP Schema 235 6. Choose rciusergroup from the Select Schema O bject list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1. Right-click Active Directory Schem a in the left pane of the wind ow and select Reload the Schema.
Appendix B: Updating the LDAP Schema 236 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4.
Appendix B: Updating the LDAP Schema 237 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose prop er ties you want to adjust in the right pane.
Appendix B: Updating the LDAP Schema 238 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in t he KX II-101) in the Edit Attribute field.
239 The KX II-101 device can be mounted vertic ally or horizontally, faci ng the front or the rear, on either side of a server rack. Use th e bra ckets and screws included with the K X II-101 kit. In This Chapter AC-DC Adapter Clip Fitting............
Appendix C: AC-DC Adapter and Rack Mount 240 Diagram key UK clip Remove the Attac hment Cover from AC - DC Power Adapter Diagram key AC/DC power adaptor Attachment cover.
Appendix C: AC-DC Adapter and Rack Mount 241 Attach the Clip to AC-D C Power Adapter Diagram key Australian clip EU clip UK clip Power adaptor Bracket Installation 1.
Appendix C: AC-DC Adapter and Rack Mount 242 2. Slide the left and right panels off the KX II-101. Diagram key KX II-101 Right panel Left panel Screws.
Appendix C: AC-DC Adapter and Rack Mount 243 KX II-101 Bracket Parts Diagram key U bracket L bracket Attach the Brackets to KX II-101 for Horizon tal Mount 1. Attach the U bracket to the L bracket using the incl uded screws. Adjust bracket placement before tighteni ng screws.
Appendix C: AC-DC Adapter and Rack Mount 244 This image illustrates mounting the KX II-101 on the left. To mount the KX II-101 on the right, follow these directions but attach brackets to the right side of the KX II-101.
Appendix C: AC-DC Adapter and Rack Mount 245 2. Mount the U and L bracket assemb ly to the rack with ra ck-mount screws (provided by the ra ck m anufacturer). 3. Slide the KX II-101 device into the U bracket with the KVM harness facing towards the target.
246 In This Chapter Java Runtime Envi ronment (JRE) ......................................................... 246 Keyboard, Video an d Mouse Notes....................................................... 246 Java Runtime Environment (JRE) Important: It is recommended that y ou disable Java caching and clear the Java cache.
Appendix D: Informational Notes 247 Sun Keyboard Key Support Limitations The following keys on Sun keyboards ar e not supported by KX II-101: Sun key Local port key combination Again Ctrl+ Alt +F2 Pro.
Appendix D: Informational Notes 248 Keyboard Configuration to use Dell Dimension 2400– BIOS A05 Set the Host Interface to PS/2 on the Keyboard/Mouse Setup page. See Keyboard/Mouse Setup (on page 143). Dell Optiplex 170L - BIOS A07 PS/2 plus a PS/2-to-USB-adapter.
Appendix D: Informational Notes 249 Windows 2000 and 2003 Serv er Keyboard Limitations Due to an operating system limitation, the followi ng keyboa rd combinations do not work with a US -Int ernational keyboard layout when using Windows 2000 a nd Windows 2003 se rvers.
.
251 9 9 Pin Pinout • 230 A Absolute Mouse Mode • 54, 92 Accessing the KX II-101 Using the CLI • 211 AC-DC Adapter and Rack Mount • 6, 239 AC-DC Adapter Clip Fitting • 239 Adding a New User .
Index 252 D Date/Time Settings • 148 Debug • 215, 216 Default Logon Information • 9 Device Diagnostics • 208 Device Information • 196 Device Management • 27, 138 Device Ports in the Naviga.
Index 253 Modifying an Existing User Group • 123 Modifying and Removing Keyboard Macros • 48, 86 Mounting • 6 Mouse Modes • 1 2 Mouse Options • 52, 91, 100 Mouse Pointer Synchronization • .
Index 254 Single Cursor Mode/Dual Cursor Mode • 91 Single Mouse Cursor • 56 Specifications • 1, 222 Specifying a Keyboard Type in MPC • 88 SSH Access from a UNIX/Linux Workstation • 212 SSH .
U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800-724- 809 0 or 732- 764- 8886 For CommandCenter NOC: Press 6, then Pr ess 1 For CommandCenter Secure Gateway : Press 6, then Press 2 Fax: 732-764-88 87 Email for CommandCenter NOC: tech-ccnoc@rarita n .
デバイスRaritan Computer KX2101-v2.20-0B-Eの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Raritan Computer KX2101-v2.20-0B-Eをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはRaritan Computer KX2101-v2.20-0B-Eの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Raritan Computer KX2101-v2.20-0B-Eの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Raritan Computer KX2101-v2.20-0B-Eで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Raritan Computer KX2101-v2.20-0B-Eを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はRaritan Computer KX2101-v2.20-0B-Eの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Raritan Computer KX2101-v2.20-0B-Eに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちRaritan Computer KX2101-v2.20-0B-Eデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。