Manuel d'utilisation / d'entretien du produit DKX2-v2.6.0-0R-E du fabricant Raritan Computer
Aller à la page of 408
Copyrigh t © 2014 Raritan, In c. DKX2-v2 .6.0- 0R -E March 2014 255 - 62 - 4023 - 00 Dominion KX II User Guide Release 2.6.0.
This docum ent contains proprietary inform ation that is protected b y copyright. All rights reserved. No part of this docum ent may be photoco pied, reproduced, or tra nslated into another language without express prior written co nsent of Raritan, I nc.
iii Contents Chapter 1 Introduction 1 KX II Overview ............................................................................................................................... 2 Package Contents ...................................................
Contents iv Port Access Page (Rem ote Console Displ ay) ................................................................... 38 Port Action Menu ...........................................................................................................
Contents v Virtual Media in a Mac Environm ent .......................................................................................... 103 Active System Partition .....................................................................................
Contents vi LAN Interface Settings ..................................................................................................... 144 Device Services ..............................................................................................
Contents vii Upgrading CIMs ......................................................................................................................... 245 Upgrading Firm ware .............................................................................
Contents viii Local Console Sm art Card Access ............................................................................................ 270 Smart Card Acces s in KX2 8xx Devices .....................................................................
Contents ix A ppendix B Dual Video Port Groups 317 Overview .................................................................................................................................... 317 Recomm endations for Dual Port Video .................
Contents x Virtual Media Notes .................................................................................................................... 341 Cannot Connect to Dri ves from Linux Clients ......................................................
Contents xi A ppendix F Frequentl y Asked Questions 355 General FAQs ............................................................................................................................ 355 Remote Access .......................................
1 In This Chapter KX II Overview ........................................................................................... 2 Package Contents ..................................................................................... 4 KX II Device Photos and Features .
Chapter 1 : Introduction 2 KX II Overview Raritan's Dom inion KX II is an e nterprise-class, sec ure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-l evel (and up) access and control of s ervers from anywhere in th e world via a web browser.
Chapter 1 : Intro duction 3.
Chapter 1 : Introduction 4 Diagram key Local port access Tiering IP -based net work access Extended local port Modem Mobile access via iPh one ® and iPad ® using CC- SG Virtual media Digital audio S.
Chapter 1 : Intro duction 5 KX II Device Photos and Features KX II KX2- 808.
Chapter 1 : Introduction 6 KX2- 832 KX2- 864 See KX II Dimension s and Physical Spe cifications (on page 287 ) f or product specifications . See Supported Comp uter Int erface Module (CIMs) Specifications (on page 289) for CIM specifica tions and images.
Chapter 1 : Intro duction 7 Product Features Hardware Integrated KVM-o ver-IP rem ote access 1U or 2U rack -mountable (brack ets included) Dual power supplies with failover; autoswitching po wer supply with power failure warning Support for tiering in which a base KX II de vice is used to access multiple other tiered d evices.
Chapter 1 : Introduction 8 Model Remote users Ports KX II- 416 4 16 KX II- 232 2 32 KX II- 216 2 16 KX II- 132 1 32 KX II- 116 1 16 KX II- 108 1 8 Software Virtual media support in W indows ® , M.
Chapter 1 : Intro duction 9 KX II Client Applications The following client appl ications can be used in the KX II: KX II 2.2 (and later): Virtual KVM Client ( VKC) Active KVM Client (AKC) Multi-Platform Client (MPC) KX II (Generation 2): Virtual KVM Client ( VKC) Multi-Platform Client (MPC) Java ™ 1.
10 In This Chapter Overview .................................................................................................. 10 Rack Mounting ......................................................................................... 10 Default Login Inform ation .
Chapter 2 : Installation and Co nfig uration 11 5. W hen connecting cables to the rear pa nel of the KX II drape them over the cable-su pport bar. Rear Mount The steps corr espond to the numbers s hown in the re ar rackmount diagrams .
Chapter 2 : Installation and Co nfig uration 12 Default Login Information Default Value User nam e admin This user has adm inistrative privileges. Password raritan The first time you start the KX II, you are required to change the default p assword. IP address 192.
Chapter 2 : Installation and Co nfig uration 13 Step 2: Configure the K VM Target Servers Target Server Video Resolutions For optim al bandwidth efficiency and video perf ormance, KVM targe t servers running grap hical user interfaces s uch as W indows ® , Linux ® , X-W indows, Solaris ™ , and KDE m ay require configuration.
Chapter 2 : Installation and Co nfig uration 14 Windows XP, Windows 2003, Windows 2008 Mouse Settings Configure these mouse settings in Wind ows X P ® , Windows 2003 ® and Wind ows 2008 ® : Configu.
Chapter 2 : Installation and Co nfig uration 15 3. In KX II, select Device Settings > Port Config uration, then click on the target nam e to open the Port pa ge. 4. Expand 'Select USB Profiles for Port' sec tion. 5. Select 'Mac OS-X (10.
Chapter 2 : Installation and Co nfig uration 16 Step 3: Connect the Equi pment A. AC Power Connect the pow er supply(s): 1. Attach the included AC power cord to the KX II, and plug it int o an AC power outlet.
Chapter 2 : In stallation and Config uration 17 Enable 'Automatic Fa ilover' on the KX II Network Configuration page. D. Local Access Port (Local PC) For access to target server s at the rack , use the KX II Local Access port.
Chapter 2 : Installation and Co nfig uration 18 2. Ensure that your target server's v ideo is configured to a supp orted resolution and refr esh rate. For Sun servers, ens ure your target server's v ideo card is set to output standard VGA (H - and -V sync) and not com posite sync.
Chapter 2 : Installation and Co nfig uration 19 Assign the KX II an IP Address To assign an IP addre ss to the KX II: 1. Choose Device Settin gs > Network. T he Network Settings page opens. 2. Specify a meaningf ul Device Name f or your KX II device.
Chapter 2 : Installation and Co nfigu ration 20 Configure the IPv6 Settings 1. If using IPv6, enter or se lect the appropria te IPv6-s pecific network settings in the IPv6 sect ion: a. Select the IPv6 check box to activate the fields in the section and enable IPv6 on the dev ice.
Chapter 2 : Installation and Co nfig uration 21 2. If Use the Following DN S Server Address es is selected, whether or not DHCP is selected, t he addresses entered in this section is used to connect to the DNS ser ver. Enter the following i nformation if the Follo wing DNS Server Addresses is selected.
Chapter 2 : Installation and Co nfig uration 22 If either of these chec kboxes is selected an d only power input is connected, the po wer LED on the front of the de vice is Red. Configure Date/Time Settings (Optional) Optionally, configure th e date and tim e settings.
Chapter 2 : Installation and Co nfigur ation 23 Step 5: Launching t he KX II Remote Console Log in to you r KX II Rem ote Console from any workstation with network connectivity that has Micr osoft .NET ® and/or Java Run time Environment ™ installed.
Chapter 2 : Installation and Co nfig uration 24 3. Choose Switch From in the Port Action m enu. The new target server you selected is displa yed. Disconnecting a Target Server To disconnect a target s.
Chapter 2 : Installation and Co nfig uration 25 Step 7: Configure T iering (Option al) The optional t iering feature allows you to use a KX II as your base device, then connect addition al KX II's to it as tiered devices. You can then acces s servers and PX PDUs through the base bot h l ocally and remotel y.
Chapter 2 : Installation and Co nfig uration 26 http://IP-ADDRES S/akc for the Microsof t .NET-based Active KVM Client IP -ADDRESS is th e IP address assigned to your KX II You can also use HTT PS, or the DNS nam e of the KX II assig ned by your administrator (if ap plicable).
Chapter 2 : Installation and Co nfig uration 27 Additional Security W arnings Even after an SSL c ertificate is installed in th e KX II, depending on your browser and securit y settings, additional securi ty warnings ma y be displayed when you log in to KX II.
Chapter 2 : Installation and Co nfig uration 28 Example 1: Import t he Certificate into the Brow ser In this exam ple, you import the Certificate into the browser. Steps Open an IE browser, then log in to KX II. Click More Inform ation on the first Java ™ security warning.
Chapter 2 : Installation and Co nfig uration 29 Steps Click the Content ta b. Click Certificates. The Certificate Im port W izard opens and walks you through each st ep. File to Im port - Browse to lo cate the Certificate Certificate Store - Select th e location to store the Cert ificate Click Finish on the las t step of the W izard.
Chapter 2 : Installation and Co nfig uration 30 Example 2: A dd the KX II to Trusted Sites and Imp ort the Certificate In this exam ple, the KX II's URL is added as a Trusted Sit e, and the Self Signed Certificate is added as part of the proces s.
Chapter 2 : Installation and Co nfig uration 31 Steps Click OK on the Intern et Options dialog to app ly the change s, then close and reopen the browser. Next, import the Certif icate. Steps Open an IE browser, then log in to KX II. Click More Inform ation on the first Java ™ security warning.
32 In This Chapter KX II Interfaces ........................................................................................ 32 KX II Local Console I nterface: KX II Devices .......................................... 33 KX II Remote Cons ole Interface .
Chapter 3 : W orking w ith Target Ser vers 33 KX II Local Console Interface: KX II Devices W hen y ou are located at th e server rack, the KX II provides standard KVM managem ent and adm inistration via the KX II Local Console.
Chapter 3 : W orking w ith Target Ser vers 34 KX II Interface Both the KX II Rem ote Console and the KX II Local Console interf aces provide a web-base d interface for device conf iguration and administration, as wel l as target server list and s election.
Chapter 3 : W orking w ith Target Ser vers 35 Left Panel The left panel of the KX II interface contains th e following inform ation. Note that some inform ation is conditional - meaning it is displayed based on your role, features be ing used and so on.
Chapter 3 : W orking w ith Target Ser vers 36 Information Description When displayed? PowerIn2 Status of the power 2 outlet connection. Either on or off, or Auto- detect off Always Configured As Base .
Chapter 3 : Wo rking w it h Target Se rvers 37 KX II Console Nav igation The KX II Console int erfaces provide m any methods for navigation a nd making your selectio ns. To select an option ( use any of the following) : Click on a tab. A page of available options appe ars.
Chapter 3 : W orking w ith Target Ser vers 38 Port Access Page (Re mote Console Displ ay) After successf ully logging on to the KX II re mote cons ole, the View b y Port tab on the Port Acc ess page appears. T his page lists all of the KX I I ports, and the target serv ers, port groups, a nd blade chassis that are connected to those ports .
Chapter 3 : W orking w ith Target Ser vers 39 Status - The status of the servers - ei ther up or down. To connect to an av ailable target server or dual m onitor target server: 1. Click on the port nam e. The Port Action m enu opens. 2. Click Connect.
Chapter 3 : W orking w ith Target Ser vers 40 View b y Group Tab The View b y Group tab displays blade chass is, 'standard' port groups, and dual video port gr oups. Click the Exp and Arrow icon next to a group to view the ports assigned to the port group.
Chapter 3 : W orking w ith Target Ser vers 41 Blade Chassis - Port Access Page The blade chassis is displ ayed in an expandab le, hierarchical list on the Port Access page, wit h the blade chassis a t the root of the hierarch y and the individual blades labeled and d isplayed below the root.
Chapter 3 : W orking w ith Target Ser vers 42 On the local port, the KX II Local Console interface must be visible in order to perform the switch. Hot key switching is a lso available from the local port. Note: This option is not available from the KX II Remote Conso le for an available port if al l connections are busy.
Chapter 3 : W orking w ith Target Ser vers 43 Managing Favorites A Favorites feature is provided so you can organ ize and quickl y access the devices you use f requently.
Chapter 3 : W orking w ith Target Ser vers 44 Enable Favorites Click Enable in the F avorite Devices section of the left panel of th e KX II interface.
Chapter 3 : W orking w ith Target Ser vers 45 Access and Display Favorites To access a favo rite KX II device: Click the device nam e (listed beneath Fa vorite Devices). A ne w browser opens to that device. To display favorites b y name: Click Display b y Name.
Chapter 3 : W orking w ith Target Ser vers 46 To use the def ault discovery port, sel ect the Use Default Port 5000 checkbox . To use a different d iscovery port: a. Deselect the Use Def ault Port 5000 check box. b. T y pe the port num ber in the Discover on Port field.
Chapter 3 : W orking w ith Target Serve rs 47 Scanning Ports The KX II provides th e port scanning f eature to search for s elected targets, and displa y them in a slide sho w view, allowing you to m onitor up to 32 targets at o ne time. You can connect to targ ets or focus on a specific target as needed .
Chapter 3 : W orking w ith Target Ser vers 48 Note: MPC uses a dif ferent method for initiating a scan than the other Raritan clients. Se e Set Scan Group in the KV M and Serial Client Guide for details. Th e scan results and sc an options differ betwee n the Remote Console and th e Local Console.
Chapter 3 : W orking w ith Target Ser vers 49 Using Scan Port Options Following are options a vailable to you while sc anning targets. W ith the exception of the Expand/Collapse icon, a ll of these options are selected from the Options m enu in the upper lef t of the Port Scan viewer.
Chapter 3 : W orking w ith Target Ser vers 50 Logging Out To quit t he KX II: Click Logout in th e upper right-hand corn er of the page. Note: Logging out also cl oses any open Virtual K VM Client and serial client sessions.
Chapter 3 : W orking w ith Target Ser vers 51 e. On the General tab, cl ick Network Settings. T he Network Settings dialog opens. f. Select Use Prox y Server. g. Click Advanced. T he Advanced Network Settings dialog opens. h. Configure the prox y servers for a ll protocols.
Chapter 3 : W orking w ith Target Ser vers 52 Virtual KVM Client (VKC) and Active KVM Client (AKC) Overview W henev er you access a target server fr om the Port Access page of KX II the Rem ote Console, a Virtual KVM Client ( VKC) wind ow opens. There is one Virtua l KVM Client for each t arget server connecte d.
Chapter 3 : W orking w ith Target Ser vers 53 Virtual KVM Client (VKC) and Active KVM Client ( AKC) Shared Features The Virtual KVM C lient (VKC) and Active K VM Client (AKC) are interfaces used to acces s remote targets.
Chapter 3 : W orking w ith Target Ser vers 54 Connection Properties Dynamic video com pression algorithm s maintain KVM cons ole usability under varying bandwid th constraints. The devices optim ize KVM output not o nly for LAN use, but also f or W AN use.
Chapter 3 : W orking w ith Target Ser vers 55 3. Choose the Color Dep th from the drop-down list. The d evice can dynamically adapt the co lor depth transm itted to remote users in order to maxim ize usability in all band widths.
Chapter 3 : W orking w ith Target Ser vers 56 Connection Information Open the Connection Inf ormation dialog for r eal-tim e connection inform ation, and copy the information from the dialog as needed. This is useful if, f or example, you want to gather r eal-ti me inform ation on your current connection.
Chapter 3 : W orking w ith Target Serve rs 57 Steps Click Connection > Inf o... to open the Connect ion Inf o dialog. Click Copy to Clipbo ard. Paste the inform ation in a file of your choosing. Connection Properties Dynamic video com pression algorithm s maintain KVM cons ole usability under varying bandwid th constraints.
Chapter 3 : W orking w ith Target Ser vers 58 33 kb (Fast Modem ) 24 kb (Slow Modem ) Note that these setti ngs are an optimi zation for specific conditions rather than an exact sp eed.
Chapter 3 : W orking w ith Target Ser vers 59 Button Button name Description Same as choosing V ideo > Color Calibrat e. Target Screenshot Click to take a sc reenshot of the target server and save it to a file of your choosing. Audio Opens a dialog that a llows you to select fr om a list of audio devices c onnected to a client PC.
Chapter 3 : W orking w ith Target Ser vers 60 Audio is supported b y KX II 2.4.0 (and later). A udio capture is supported by KX II 2.5.0 (and later). Audio icons Icon name Description Speaker These icons are locate d in status bar at th e bottom of the client win dow.
Chapter 3 : W orking w ith Target Ser vers 61 Import/Export Keyboard Macros Macros exported fr om Active KVM Client (AKC) cannot be im ported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC) . Macros exported from MPC or VKC cannot be i mported into A KC.
Chapter 3 : W orking w ith Target Ser vers 62 The macros are then imported. If a macr o is imported that contains a h ot ke y th at already exists, the hot key for the im ported macro is discarded. To export macros: 1. Choose Tools > Export Macros to open the S elect Keyboard Macros to Export dialog.
Chapter 3 : W orking w ith Target Ser vers 63 Building a Keyboard Macro To build a macro: 1. Click Keyboard > Ke yboard Macros. The Ke yboard Macros dialog appears. 2. Click Add. The Add Ke yboard Macro dialog app ears. 3. T y pe a name f or the macro in the Keyboard Macro Na me field.
Chapter 3 : W orking w ith Target Ser vers 64 9. Select the new m acro on the m enu to run it or use the k eystrokes you assigned to the m acro. To use the Send T ext to Target function for the m acro: 1. Click the Keyboard > Se nd Text to T arget.
Chapter 3 : W orking w ith Target Ser vers 65 Modifying and Removing Key boa rd Macros To modify a macro: 1. Choose Ke yboard > Keyboard Macros. The Ke yboard Macros dialog appears. 2. Choose the m acro from among those liste d. 3. Click Modify. The Add /Edit Macro dialog app ears.
Chapter 3 : W orking w ith Target Ser vers 66 Video Properties Refreshing the Screen The Refresh Scr een command forces a ref resh of the video screen. Video settings can be ref reshed autom atically in sever al ways: The Refresh Screen com mand forces a ref resh of the video screen.
Chapter 3 : W orking w ith Target Ser ve rs 67 Adjusting Video Settings Use the Video Settings c ommand to m anually adjust the video settin gs. To change th e video settings: 1. Choose Video > V ideo Settings to open the Video Settings dialog. 2. Adjust the following sett ings as required.
Chapter 3 : W orking w ith Target Ser vers 68 Best possible video m ode The device will perform the full Auto Sens e process when switching targets or t arget resolutions.
Chapter 3 : W orking w ith Target Ser vers 69 Screenshot from Target Command (Target Screenshot) You are able to tak e a screenshot of a targe t server using the Screenshot from Target server comm and. If needed, save this screenshot to a file loc ation of your choosing as a bitmap, JP EG or PNG file.
Chapter 3 : W orking w ith Target Ser vers 70 Mouse Options W hen i n dual m ouse mo de, and pr ovided the o ption is properl y configured, the m ouse cursors align.
Chapter 3 : W orking w ith Target Ser vers 71 Mouse Pointer Synchronization W hen re motely viewing a target server that uses a mouse, two m ouse cursors are displa yed: one belonging to your remote client work station and the other belongin g to the target ser ver.
Chapter 3 : W orking w ith Target Ser vers 72 Additional Notes for Intelligent Mouse Mode Be sure that there are no icons or applications i n the upper left section of the screen si nce that is where the s ynchronization routine takes place. Do not use an anim ated mouse.
Chapter 3 : W orking w ith Target Ser vers 73 Intelligent Mouse Mode In Intelligent Mouse m ode, the device can detect the target m ouse settings and s ynchronize the m ouse cursors accordingly, allo wing mouse acceleration on the target . Intelligent m ouse mode is the default for non -VM targets.
Chapter 3 : W orking with Targ et Serv ers 74 Please note that m ouse configurations will vary on different target operating system s. Consult your OS guidelin es for further details. Also note that intelligent m ouse synchronization d oes not work with UNIX targets.
Chapter 3 : W orking w ith Target Ser vers 75 Single Mouse Mode Single Mouse m ode uses only the target serv er mouse curs or and the local mouse pointer no longer appears onsc reen. Note: Single mouse mod e does not work on W indows or Linux targ ets when client is running on a Virtual Machine.
Chapter 3 : W orking w ith Target Ser vers 76 United Kingdom Korean (Korea) French (Belgium ) Norwegian (Nor way) Portuguese (Portu gal) Danish (Denm ark) Swedish (Sweden) .
Chapter 3 : W orking w ith Target Ser vers 77 5. Click OK. Ke y board Limitatio ns Turkish Keyboards If using a Turk ish keyboard, you must c onnect to a target serv er through the Active KVM C lient (AKC). It is not supporte d by other Raritan c lients.
Chapter 3 : W orking w ith Target Ser vers 78 Client Launch Settings KX II users can conf igure client launch settings tha t allow you to define the screen settings f or a KVM session. To configu re client launch settings: 1. Click T ools > Options.
Chapter 3 : W orking w ith Target Ser vers 79 Configure Scan Settings in VKC and AKC The KX II provides th e port scanning feature to s earch for selected targets, and displa y them in a slide sho w view, allowing you to m onitor up to 32 targets at o ne time.
Chapter 3 : W orking w ith Target Ser vers 80 View Status Bar By default, the status bar is displayed at the bottom of the target win dow. To hide th e status bar: Click View > Status Bar to deselect it. To restore the status b ar: Click View > Status Bar to select it.
Chapter 3 : W orking w ith Target Ser vers 81 Full Screen Mode W hen y ou enter Full Scree n mode, the target's f ull screen is displa yed and acquires the sam e resolution as the targ et server. The hot ke y used for exiting this m ode is specified in the Options dialog, see Tool Optio ns (on page 75 ).
Chapter 3 : W orking w ith Target Ser vers 82 Digital Audio The KX II supports end- to -end, bidirectional, digital audio co nnections for digital audio pla yback and capture devices f rom a remote client to a target server. The audio devices are ac cessed over a U SB connection.
Chapter 3 : W orking w ith Target Ser vers 83 Saving Audio Settings Audio device settings are applied on a p er KX II device basis. Once the audio devices set tings are configured a nd saved on the KX II, the same settings are a pplied to it. For exam ple, you can configure a W indows ® audio device to us a stereo, 16 bit, 44.
Chapter 3 : W orking w ith Target Ser vers 84 Operating system Audio playback and capt ure supported by: Mac ® Virtual KVM Client ( VKC) Multi-Platform Client (MPC) A Speaker icon is displayed in the s tatus bar at the bottom of the client window.
Chapter 3 : W orking w ith Target Ser vers 85 Connecting to a Single Target Server from Multiple Remote Clients KX II 2.5.0 (and later) allows up to eight (8) users on different rem ote clients to connect to th e sam e target server at the s ame time in order to listen in on audio pla yback.
Chapter 3 : W orking w ith Target Ser vers 86 Connecting and Disconnecting a Digital Audio Device Audio device settings are applied on a p er KX II device basi s. Once the audio devices set tings are configured a nd saved on the KX II, the same settings are a pplied to it.
Chapter 3 : W orking w ith Target Serve rs 87 Note: The device nam es listed in the Conn ect Recording Dev ice drop-down are truncat ed to a maximum of 30 characters for Java clients. 8. Select the device that you wish to connect f rom the drop- down list.
Chapter 3 : W orking w ith Target Ser vers 88 To disconnect from t he audio dev ice: Click the Audio icon in the toolbar and select O K when you are prompted to conf irm the disconnect.
Chapter 3 : W orking w ith Target Ser vers 89 Smart Cards Using the KX II, you are able to mount a sm art card reader onto a target server to support sm art card authenticat ion and related appl ications.
Chapter 3 : W orking w ith Target Ser vers 90 You are also able to rem ove or reinsert a sm art card. T his function can be used to provide no tification to a target ser ver OS that requires a removal/reinsertion i n order to display the appro priate login dialog.
Chapter 3 : W orking w ith Target Ser vers 91 To update t he smart card in the Select Smart Card Reader dial og: Click Refresh List if a ne w smart c ard reader has been attached to the client PC.
Chapter 3 : W orking w ith Target Ser vers 92 2. Use the Cop y to Clipboard button to cop y the information contained in the dialog to a clipbo ard file so it can be acces sed later when dealing with support ( if needed). About the Active KVM Client Active KVM Client (AKC) is based on Microsof t W indows .
Chapter 3 : W orking w ith Target Ser vers 93 Since .NET is require d to run AKC, if y ou do not ha ve .NET installed or you have an unsupported version of .NET installed, you will receive a message instructing you to check the .NET version. Note: Raritan recom mends W indows XP ® operating sys tem users verify you have a working vers ion of .
Chapter 3 : W orking w ith Target Ser vers 94 Multi-Platform Client (MPC) Raritan Multi-P latform Client (MPC) is a graphical user interface for the Raritan product lines, pro viding remote acc ess to target servers connected to Raritan KVM over IP devices.
Chapter 3 : W orking w ith Target Ser vers 95 Note: Depending on yo ur browser and b rowser securit y settings, you may see various security a nd certificate check and warning messages. It is necessary to accept the options in order to open MPC. Note: If you are using F irefox 3.
96 All KX II m odels support virtual media. Vir tual media e xtends KVM capabilities by enabling tar get servers to rem otely access media from a client PC and net work file servers. W ith thi s feature, media m ounted on client PCs an d network file servers are essentiall y " mounted v irtually" by the targe t server.
Chapter 4 : Virtual Media 97 Remote PC VM Prerequisites Certain virtual media opt ions require administrative pri vileges on the remote PC (f or example, drive redirection of complete drives). Note: If you are usi ng Microsoft Vista or W indows 7, disable Us er Account Control or se lect Run as Administrator w hen starting Internet Explorer.
Chapter 4 : Virtual Media 98 Supported Tasks Via Virtual Media Virtual media pro vides the ability to perf orm tasks remotely, such as: Transferring files Running diagnostics Installing or.
Chapter 4 : Virtual Media 99 Supported Virtual Media Operating S y stems The following client operat ing system s are supported: W indow s ® 7 operating s ystem W indow s 8 operating s ystem W indow s XP ® operating s ystem openSUSE ® 11.
Chapter 4 : Virtual Media 100 Connecting and Disconnecting from Virtual Media Access a Virtual M edia Drive on a Client Comp uter To access a virtual medi a drive on the cli ent computer: 1. From the Virtual KVM Cl ient, choose Virtua l Media > Connect Drive, or click the Connect Dri ve.
Chapter 4 : Virtual Media 101 Mounting CD -ROM/DVD-ROM/ISO Image s This option m ounts CD-ROM, DVD-RO M, and ISO im ages. Note: ISO9660 forma t is the standard sup ported by R aritan. However, other CD-ROM exte nsions may also work. To access a CD-RO M, DVD-ROM , or ISO image: 1.
Chapter 4 : Virtual Media 102 Note: If you are worki ng with files on a Linux ® target, u se the Linux Sync command after the f iles are copied using virt ual media in order to v iew the copied files.
Chapter 4 : Virtual Media 103 Drive Partitions The following drive p artition limitations exist ac ross operating s ystems: W indow s ® and Mac targets are not able to read L inux form atted part.
Chapter 4 : Virtual Media 104 Virtual Media File Server Setup (File Server ISO Images Only ) This feature is onl y required when using virt ual media to access file server ISO images. ISO9660 form at is the stand ard supporte d by Raritan. However, other CD -ROM extensions m ay also work.
105 In This Chapter Overview ................................................................................................ 105 Turning Outlets On/Of f and Cycling Power .
Chapter 5 : Ra c k PDU ( Power Stri p) Outlet Control 106 Control - Turn out lets on or off , or cycle their power. Association - The p orts associated with t he outlet. Initially, when you open the Powerstrip page, the power stri ps that are currently connected to t he KX II are displa yed in the Powerstrip drop-down.
Chapter 5 : Ra c k PDU ( Power Stri p) Outlet Control 107 2. Click OK on the Po wer Off dialog. 3. Click OK on the Po wer Off confirm ation dialog. The outlet will be turned off and its stat e will be displa y ed as 'off '. To cycle the pow er of an outlet: 1.
108 In This Chapter Overview ................................................................................................ 108 CIM Compatibilit y .................................................................................. 109 Available USB Profi les .
Chapter 6 : U SB Profiles 109 CIM Compatibility In order to mak e use of USB profiles, you must use a vir tual media CIM with updated firm ware. For a list of virtual m edia CIMs, see Supported Computer Interface Module (CIMs) Specifications (on p age 289 ).
Chapter 6 : U SB Profiles 110 USB profile Description USB enum eration will trigger when ever Virtual Media is connected or disconne cted Restrictions: USB bus spe ed limited to full-s peed (1.
Chapter 6 : U SB Profiles 111 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS. W ARNING: USB enumeration will trig ger whenever virt ual media is connected or disconnected.
Chapter 6 : U SB Profiles 112 USB profile Description BIOS Lenovo Think Pad T61 & X61 BIOS Lenovo Think Pad T61 and X61 (boot fr om virtual m edia) Use this profile to boot t he T61 and X61 ser ies laptops from virtual media.
Chapter 6 : U SB Profiles 113 USB profile Description when using the Mac Boot Menu MAC OS X ® 10.4.9 (a nd later) Mac OS X version 10 .4.9 (and later) This profile com pensates the scaling of m ouse coordinates introduced in recent versions of Mac OS X.
Chapter 6 : U SB Profiles 114 USB profile Description Ke yboard and Mouse (T ype 2) first Mass Storage USB bus spe ed limited to full-s peed (12 MBit/s) Virtual CD- ROM and disk drives cannot be used simultaneousl y W ARNING: USB enumeration will trigger whenever virtual media is connected or disconnected.
Chapter 6 : U SB Profiles 115 Mouse Modes w hen Using the M ac Boot Menu W hen w orking with US B profiles in, to use the M ouse in the Mac Boot Menu, you mus t use Single Mouse mo de since Absolute Mous e Mode is not supported in the BIO S. To configu re the mouse to w ork at the Boot menu: 1.
116 In This Chapter User Groups .......................................................................................... 116 Users ................................................................ ..................................... 125 Authentication Settings .
Chapter 7 : U ser Manage ment 117 User Group List User groups are used with local and rem ote authentication (via RADIU S or LDAP/LDAPS). It is a good idea to define user gr oups before creating individual users since, when you add a user, you must assi gn that user to an existing user grou p.
Chapter 7 : U ser Manag ement 118 2. T y pe a descriptive nam e for the new user group into the Gr oup Name f ield (up to 64 characters). 3. Select the check boxes next to the perm issions you want to assign to all of the users belong ing to this group.
Chapter 7 : U ser Manage ment 119 Note: Several adm inistrative functions are available within and from the KX II Local Conso le. These functions are av ailable only to members of the default Admin grou p.
Chapter 7 : U ser Manag ement 120 Setting Permissions Important: Selecting the User Management ch eckbox allo ws the members of the group to change the permis sions of all users, including their ow n.
Chapter 7 : U ser Manage ment 121 Permission Description settings. If you are using a tier ed configuration in which a base KX II device is used to access m ultiple other tiered devices , user, user group an d remote authenticat ion settings mus t be consistent across all de vices.
Chapter 7 : U ser Manag ement 122 VM access Power control acce ss option Description Deny Deny power control t o the target server Access Full permission to po wer control on a target serv er For blade chassis, the port acces s permission will control access to the URLs that have been conf igured for that blad e chassis.
Chapter 7 : U ser Manage ment 123 Use the IP ACL sec tion of the Group pa ge to add, insert, replac e, and delete IP access contro l rules on a group -level basis. To add (app end) rules: 1. T y pe the starting IP addres s in the Starting I P field. 2.
Chapter 7 : U ser Manag ement 124 2. Click Delete. 3. W hen prompted to confirm the deletion, click OK. Important: ACL rules a re evaluated in the ord er in which th ey are listed. For instance, in t he example sho wn here, if th e two ACL rules were reversed, Dom inion w ould accept no communication at all.
Chapter 7 : U ser Manage ment 125 2. Click Delete. 3. W hen prompted to confirm the deletion, click OK. Users Users must be grant ed user names and pass words to gain access to the KX II. This inform ation is used to authenticat e users att empting to access your KX II.
Chapter 7 : U ser Manag ement 126 6. To activate the new user, leave the Active c heckbox selected. Click OK. View the KX II Users L ist The User List page displays a list of all users including their user nam e, full name, and user gro up. The list can be sorte d on any of the colum ns by clicking on the colum n name.
Chapter 7 : U ser Manage ment 127 Username - username for user logins an d target connections Access From - IP address of client PC accessing the KX II Status - current Active or I nactive status of the connection To view users by port: Choose User Manag ement > User b y Port.
Chapter 7 : U ser Manag ement 128 Modifying an Existing User To modify an existing use r: 1. Open the User List p age by choosing User Mana gement > User List. 2. Locate the user f rom among those listed on the User List page. 3. Click the user nam e.
Chapter 7 : U ser Manage ment 129 4. If you choose LDA P/LDAPS, read the section e ntitled Implementing LDAP Remote Auth entication for inform ation about com pleting the fields in the LDAP s ection of the Authenticat ion Settings page.
Chapter 7 : U ser Manag ement 130 Microsoft Active Director y. Active Director y is an implem entation of LDAP/LDAPS d irectory services by Microsof t for use in W indows environments. 8. T y pe the name of the Act ive Directory Dom ain if you selected Microsoft Active Director y.
Chapter 7 : U ser Manage ment 131 11. If you entered a Distingu ished Name f or the Administrative User, you must enter the pass word that will be used to a uthenticate the Administrative User's DN against the rem ote authentication server.
Chapter 7 : U ser Manag ement 132 15. Select the Enable LDA PS Server Cert ificate Validation check box to use the previousl y uploaded root CA certif icate file to validate t he certificate provided b y the server. If you do not want to use the previously uploaded ro ot CA certificate file, le ave this check box deselected.
Chapter 7 : U ser Manage ment 133 Once the test is com pleted, a m essage will be displayed that lets you know the test was suc cessful or, if the test f ailed, a detailed err or message will be displ ayed. It will displa y successful result or detail error m essage in failure case.
Chapter 7 : U ser Manag ement 134 Important Notes Group Name is case sensit ive. The KX II provides th e following default gro ups that cannot be changed or deleted : Admin and <Unk nown>. Verify that your Active Directory server does n ot use the same group names.
Chapter 7 : U ser Manage ment 135 9. The default num ber of retries is 3 Retries. This is the num ber of times the KX II will send an authentication request to the RADIU S server. 10. Choose the Global Aut hentication T ype from among the options in the drop-down list: PAP - W ith PAP, passwords are sent as plain text.
Chapter 7 : U ser Manag ement 136 Cisco ACS 5.x for RADIUS Authentication If you are using a Cisc o ACS 5.x ser ver, after you have conf igured the KX II for RADIUS auth entication, complete the f ollowing steps on the Cisco ACS 5.x server. Note: The following st eps include the Cisco men us and menu items used to access each page.
Chapter 7 : U ser Manage ment 137 Returning User Group Inf ormation via R ADIUS W hen a RA DIUS authent ication attem pt succeeds, the KX II determ ines the perm issions for a given user bas ed on the perm issions of the user's group.
Chapter 7 : U ser Manag ement 138 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-T ype (61) VIRTUAL (5) for net work connections. NAS-Port (5) Always 0. NAS- IP -Address (4) The IP address f or the KX II. User-Nam e (1) The user nam e entered at the login screen.
Chapter 7 : U ser Manage ment 13 9 User Authentication Process Remote authentica tion follows the proc ess specified in the flowchart below:.
Chapter 7 : U ser Manag ement 140 Changing a Password To change your KX II passwo rd: 1. Choose User Manag ement > Change Pas sword. The Change Password page opens . 2. T y pe your current password in the Old Password field. 3. T y pe a new password in th e New Password field.
141 In This Chapter Network Settings ................................................................................... 141 Device Services ..................................................................................... 145 Power Suppl y Setup .
Chapter 8 : Dev ice Mana gement 142 Assign the KX II an I P Address To assign an IP addre ss to the KX II: 1. Choose Device Settin gs > Network. T he Network Settings page opens. 2. Specify a meaningf ul Device Name f or your KX II device. Up to 32 alphanum eric and valid spec ial characters, no s paces between characters .
Chapter 8 : Dev ice Mana gement 143 Configure the I Pv6 Settings 1. If using IPv6, enter or se lect the appropria te IPv6-s pecific network settings in the IPv6 sect ion: a. Select the IPv6 check box to activate the fields in the section and enable IPv6 on the dev ice.
Chapter 8 : Dev ice Mana gement 144 2. If Use the Following DN S Server Address es is selected, whether or not DHCP is selected, t he addresses entered in this section is used to connect to the DNS ser ver. Enter the following i nformation if the Fo llowing DNS Server Addresses is selected.
Chapter 8 : Dev ice Mana gement 145 Note: Because a failover p ort is not activated unt il after a failover has actually occurred, Rarita n recomm ends that you not m onitor the port or monitor it only after a failover occurs .
Chapter 8 : Dev ice Mana gement 146 3. Enter the SSH Port i nformation. T he standard SSH TCP p ort num ber is 22 but the port num ber can be changed to prov ide a higher level of security operations. 4. Click OK. HTTP and HTT PS Port Settings You are able to conf igure HTTP and/or HTT PS ports used b y the KX II.
Chapter 8 : Dev ice Mana gement 147 Configuring and En abling T iering The tiering feature al lows you to access KX II targets and PDUs thro ugh one base KX II d evice. This feature is avail able for standard KX II devices as well as KX2 -808, KX2-83 2 and KX2-864 de vices.
Chapter 8 : Dev ice Mana gement 148 Port configuration, incl uding changing the CI M name, m ust be done directly from each device. It cannot be done f rom the base device f or tiered target ports. Tiering also su pports the use of KVM switches to switch between servers .
Chapter 8 : Dev ice Manage ment 149 6. In the Tier Secret field, enter the same sec ret word you entered for the base device on th e Device Settings p age. Click OK. Tiering - Target T y pes, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attach ed directly to the base are accessible.
Chapter 8 : Dev ice Mana gement 150 Unsupported and Limited Features on Tiered Targets The following featur es are not supported on ti ered targets: Blade chassis on tiere d devices Audio on t.
Chapter 8 : Dev ice Mana gement 151 Cabling Example in Tiered Configurations The follow ing diagram illustrates the cabling configurations betw een a KX II tiered dev ice and a KX II base d evice.
Chapter 8 : Dev ice Mana gement 152 Diagram key Target server CIM from target server to the KX II tiered device KX II tiered device D2CIM-DVUSB CIM f rom the KX II tiered device to the KX II base devi.
Chapter 8 : Dev ice Mana gement 153 Direct Port Access URL Syntax for the Virtual KVM Client (VKC) If you are using the Virtual KVM Client (VKC) and d ire ct port access, use one of the following s yntaxes for standard p orts: https://IPaddress/dpa.
Chapter 8 : Dev ice Mana gement 154 Direct Port Access URL Syntax for the Active KVM Client (A KC) If you are using the Active KVM Client (AKC) a nd direct port access, use: https://IPaddress/dpa.asp? username=usernam e&password=passwo rd&port=port num ber&client=akc Or https://IPaddress/dpa.
Chapter 8 : Dev ice Mana gement 155 Enable Direct Port Access To enable direct po rt access: 1. Choose Device Settin gs > Device Services. T he Device Service Settings page opens.
Chapter 8 : Dev ice Mana gement 156 Enabling the A KC Dow nload Server Certificate V alidation If you are using the AKC client, you c an choose to use the Enable AKC Download Server Certif icate Validation f eature or opt not to use this feature.
Chapter 8 : Dev ice Mana gement 157 2. Launch Internet Explorer ® using the KX II IP address as the URL. A Certificate Error m essage will be displa yed. 3. Select View Certificat es. 4. On the General tab, cl ick Install Certificate. T he certificate is then installed in the Tr usted Root Certification Authori ties store.
Chapter 8 : Dev ice Mana gement 158 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option m ust be selected. Requ ired 4. Complete the follo wing fields for SNMP v1/ v2c (if needed): a. Comm unity - the device's comm unity string b.
Chapter 8 : Dev ice Mana gement 159 Configure SNMP traps on the Event Man agement - Settings page, which can be quick ly access ed by clicking the SNMP Trap Co nfiguration link. See Configuring SN MP Traps (on page 162)for inf ormation on creating SNMP traps a nd List of KX I I SNMP Traps ( on page 165) f or a list of available KX II SNMP traps.
Chapter 8 : Dev ice Mana gement 160 This inform ation is used to configure m odem settings. Because different m odems have different wa ys of settings these values, th is document does not specif y how to set these va lues, rather the u ser should refer to the m odem to create the appro priate modem -s pecific string.
Chapter 8 : Dev ice Mana gement 161 See Certified Modems (on page 30 7) for inform ation on certified modems that work with the KX II. For inform ation on settings that will gi ve you the best perf or.
Chapter 8 : Dev ice Mana geme nt 162 Event M anagement The KX II Event Mana gement feature allo ws you enable and disab le the distribution of s ystem events to SNMP Ma nagers, the Syslog and the audit log. These events are categorized, and for e ach event you can determine whether you want the event sent to o ne or several destinations.
Chapter 8 : Dev ice Mana gement 163 a. Destination IP/Hostnam e - the I P or hostname of the SNMP manager. Up to f ive (5) SNMP managers c an be created Note: IPv6 addresses c annot exceed 80 ch aracters in length fo r the host name. b. Port Num ber - the port number used b y the SNMP manager c.
Chapter 8 : Dev ice Mana gement 164 Use the Link to SNMP Agent Configuration link to quick ly navigate to the Devices Services pag e from the Event Management - Settings page. The events that are c aptured once an SNM P trap is configured are selected on the E vent Managem ent - Destination page.
Chapter 8 : Dev ice Mana gement 165 Use the reset to factor y defaults feature to r emove the SNMP configuration and set th e KX II to its original factor y default.
Chapter 8 : Dev ice Mana gement 166 Trap Name Description networkFailure An Ethernet interf ace of the product ca n no longer comm unicate over the network . networkParam eterChanged A change has been m ade to the network parameters. passwordSettingsCh anged Strong password setti ngs have changed.
Chapter 8 : Dev ice Mana gement 167 Trap Name Description userForcedLogout A user was forc ibly logged out by Adm in userLogin A user has succ essfully logged into the KX II an d has been authenticated . userLogout A user has succes sfully logged out of the KX II properly.
Chapter 8 : Dev ice Mana gement 168 Note: If you have Read- Write privileges to the MIB file, use a MIB ed itor to make changes to the file. SysLog Configuration To configu re the Syslog (enable Sys log forwarding) : 1. Select Enable S y slog For warding to log the dev ice's messages to a remote Syslog serv er.
Chapter 8 : Dev ice Mana gement 169 Configuring Event Management - Destinations System events, if enab led, generate SNM P notification events (traps), or can be logged to the s yslog or audit log. Us e the Event Managem ent - Destinations page to sel ect the s y stem events to track and where to send this inform ation.
Chapter 8 : Dev ice Mana gement 170 Power Supply Setup The KX II provides du al power supplies, and c an autom atically detect and provide notificati on regarding the status of these power supplies . Use the Power Supp ly Setup page to specif y whether you are using one or both of the power su pplies.
Chapter 8 : Dev ice Manag ement 171 Note: If either of these c heckboxes is selected and power inp ut is not actually connected, the power LED at the front of the unit turns red. To turn of f the automatic detection: Deselect the ch eckbox f or the appropriate power supply.
Chapter 8 : Dev ice Mana gement 172 Alternativel y, rename ports that are current ly not connected to th e KX II via a CIM a nd, as such, have a status of Not Available. To renam e a port with a status of Not Availab le, do one of the following: Rename the port.
Chapter 8 : Dev ice Mana gement 173 Co nfiguring Standa rd Target Servers To name the target se rvers: 1. Connect all of the targ et servers if y ou have not alre ady done so. See Step 3: Connect th e Equipment (on page 16 ) for a description of connecting the e quipment.
Chapter 8 : Dev ice Mana gement 174 8. Click OK. Configuring KVM Switches The KX II also supports use of hot ke y sequences to switch bet ween targets. In addition to using hot ke y sequences with standard servers, KVM switching is sup ported by blade chassis an d in tiered configurations.
Chapter 8 : Dev ice Mana gement 175 Note: Only one switc h will appear in the drop -down. 5. Select KVM Switch H ot Key Sequence. 6. Enter the Maxim um Number of T arget Ports (2-32). 7. In the KVM Switch N ame field, enter the nam e you want to use to refer to this port connec tion.
Chapter 8 : Dev ice Mana gement 176 Configuring CIM Ports The KX II supports the use of standard and virtual m edia CIMs to connect a server to th e KX II. To access a CIM to configure: 1. Choose Device Settin gs > Port Configuration. T he Port Configuration page opens.
Chapter 8 : Dev ice Mana gement 177 If you are using an HD MI CIM, som e operating system/video card combinations m ay offer a limited range of RGB values. Improve the colors by selecting the DV I Com patibility Mode checkbox. Apply Selected Profiles to Other CIMs 1.
Chapter 8 : Dev ice Mana gement 178 Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are c onne cted to the Dominion device us ing the D2CIM- P W R CIM. To connect the rack PDU: 1. Connect the m ale RJ-45 of the D2CIM- P W R to the female RJ - 45 connector on the seri al port of the rack PDU.
Chapter 8 : Dev ice Mana gement 179 Naming the Rack PDU (Port Page for Power Strips) Note: PX rack PDUs (po wer strips) can be nam ed in the PX as wel l as in the KX II. Once a Raritan rem ote rack PDU is connected to the KX II, it will appear on the Port Conf iguration page.
Chapter 8 : Dev ice Mana gement 180 3. Click OK..
Chapter 8 : Dev ice Mana gement 181 Associating Outlets with Target Servers The Port page opens when you click on a port on the Port Conf iguration page. From this page, you can m ake power associations , change the port name to som ething more descriptive, and u pdate target server settings if you are using the D2CIM- VUSB CIM.
Chapter 8 : Dev ice Mana gement 182 Removing Power Associations W hen di sconnecting target servers and/or rack PDUs from the device, all power associations shou ld first be delete d. W hen a target has been associated with a rack PDU and the target is removed from the device, the power association rem ains.
Chapter 8 : Dev ice Mana gement 183 Configuring Blade Ch assis In addition to standard s ervers and rack PDUs (power strips), you can control blade chassis that are plugged into the KX II device port. Up to eight blade chassis can be managed at a given t ime.
Chapter 8 : Dev ice Mana geme nt 184 Two modes of operation are provided for b lade chassis: manual configuration and auto -discover y, depending on the blade ch assis capabilities. If a blade c hassis is configured f or auto-d iscovery, the Dominion device track s and updates the f ollowing: W hen a new blade server is added to the chas sis.
Chapter 8 : Dev ice Mana gement 185 Generic Blade Chassis Configuration The Generic Blade Ch assis' selection provides only a m anual configuration mode of operation.
Chapter 8 : Dev ice Mana gement 186 9. In the Blade Chassis Ma naged Links s ection of the page, yo u are able to configure the co nnection to a blade chass is web browser interface if one is availab le. Click the Blade C hassis Managed Links icon to expand the sect ion on the page.
Chapter 8 : Dev ice Mana gement 187 13. Select the CIMs nat ive, displa y resolution from the Displa y Native Resolution drop- down. This is the preferr ed resolution and tim ing mode of the digital CI M. Once a resolution is s elected, it is applied to the CIM.
Chapter 8 : Dev ice Mana gement 188 c. Administrative Modul e Primar y IP Address/Host Nam e - Enter the primar y IP address for the blade chassis. Require d for auto-discover y mode d. Port Num ber - The default port num ber for the blade c hassis is 22.
Chapter 8 : Dev ice Mana gement 189 b. URL - Enter the UR L to the interface. See Blade Chassis Sample URL Form ats (on page 203) for sam ple configurations for the Dell M1000e. c. Usernam e - Enter the usernam e used to access the interf ace. d. Password - Enter t he password used to acc ess the interfac e.
Chapter 8 : Dev ice Mana gement 190 d. Port Num ber - The default port num ber for the blade c hassis is 22. Not applicable. e. Usernam e - Not applicable.
Chapter 8 : Dev ice Mana gement 191 5. USB profiles do not a pply to Dell chass is. 6. Click OK to save the conf iguration. IBM Blade Chassis Configuration See Supported Blade Chassis Models (on page .
Chapter 8 : Dev ice Mana gement 192 f. Password - Enter t he password used to acc ess the blade chassis. Required for auto- discovery mode 2. If you want the KX II t o auto-disc over the chassis blad es, select the Blade Auto-Discover y checkbox and then click Discover Blades on Chassis Now.
Chapter 8 : Dev ice Manag ement 193 e. The Usernam e Field and Password F ield, which are both optional, contain the labels that are expected t o be associated with the usernam e and password entr ies. It is in these f ields you should enter the f ield names for the usernam e and password fields used on the lo gin screen for the web application.
Chapter 8 : Dev ice Mana gement 194 The first URL link is in tended for use to con nect to the blade chassis Administration Mod ule GUI. Note: Access to the URL links entered in this sec tion of the page is governed by the blad e chassis port permiss ions.
Chapter 8 : Dev ice Mana gement 195 Tips for Adding a Web Browser Interface You can add a W eb Browser Interface to crea te a connection to a d evice with an em bedded web server. A W eb Browser interface c an also be used to connect to an y web application, suc h as the web a pplication associated with an RS A, DRAC or ILO Pr ocessor card.
Chapter 8 : Dev ice Mana gement 196 HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports c onnected to certain t ypes of blades into a group r epresenting the blade chass is.
Chapter 8 : Dev ice Mana gement 197 3. Enter a Port Group Nam e. The port group nam e is not cas e sensitive and can contain up to 3 2 characters. 4. Select the Blade Server Group check box.
Chapter 8 : Dev ice Mana gement 198 Supported Blade Chassis Models This table contains the b lade chassis m odels that are supported b y the KX II and the correspo nding profiles that shou ld be selected per chass is model when configuring t hem in the K X II applicatio n.
Chapter 8 : Dev ice Mana gement 199 Supported CIMs for Blade Chassis The following CIMs are su pported for b lade chassis being m anaged through the KX II: DCIM-PS2 DCIM-USBG2 D2CIM-VUSB D2CIM-DVUSB Following is a table cont aining supported CIMs f or eac h blade chassis model that the KX II sup ports.
Chapter 8 : Dev ice Mana gement 200 Blade chassis Connection method Recommended CIM (s) Bo th m odules enable you to conn ect a PS/2-com patible keyboard, m ouse and video monitor to the s ystem (using a custom c able provided with the s ystem).
Chapter 8 : Dev ice Mana gement 201 Blade chassis Connection method Recommended CIM (s) Technology IBM BladeCenter E The current m odel BladeCenter E c hassis (8677-3Rx) ships s tandard with one Advanc ed Management Module.
Chapter 8 : Dev ice Mana gement 202 This table contains inf ormation on lim itations and const raints that apply to configuri ng blade chassis to work with the KX II. Raritan rec ommends that all of the information below is followed. Blade chassis Required/recommend ed action Dell ® PowerEdge ™ M1000e Disable the iKVM GUI screensaver.
Chapter 8 : Dev ice Mana gement 203 Blade chassis Required/recommend ed action Do not designate any slots for s can operations in the iKVM GUI Setup Scan m enu or the iKVM m ay not work properl y. T o avoid having the iKVM G UI display upon connecting to t he blade chassis, set the Scr een Delay Tim e to 8 seconds.
Chapter 8 : Dev ice Mana gement 204 Blade chassis Sample URL format Password: calvin Password Field: pass word Dell 18 55 URL: https://192.168.60. 33/Forms/f_login Username: root Username Field: TEX T_USER_NAM E Password: calvin Password Field: T EXT_PASSWO RD IBM ® BladeCenter ® E or H http://192.
Chapter 8 : Dev ice Mana gement 205 2. Click the Port Nam e for the KVM port you want to edit. T he Port page opens. To select the USB profile s for a KVM port: 1. In the Select USB Profiles for Port section, select one or m ore USB profiles from the Ava ilable list.
Chapter 8 : Dev ice Mana gement 206 Configuring KX II Local Port Settings From the Local Port Settings page, you can cus tomize m an y s ettings for the KX II Local Conso le including ke yboard, hot keys, video switching delay, power save m ode, local user interface res olution settings, and local user authenticatio n.
Chapter 8 : Dev ice Mana gement 207 Note: If you are using KX2-808, KX2-832 and KX2- 864 as tiered devices, you must connec t them to the base KX II via the extended local port. 4. If you are using the t iering feature, select the En able Local Port Device Tiering check box and enter the tiered secret w ord in the T ier Secret field.
Chapter 8 : Dev ice Mana gement 208 Note: Keyboard use for C hinese, Japanes e, and Korea n is for display only. Local lan guage input is not supp orted at this time for K X II Local Console func tions. Note: If using a Turkish k eyboard, you m ust connect to a target server through the Active KVM Client (AKC).
Chapter 8 : Dev ice Mana gement 209 1280x1024 13. Choose the refresh rate from the drop-down list. T he browser will be restarted when this ch ange is m ade. 60 Hz 75 Hz 14. Choose the type of l ocal user authentication. Local/LDAP/RADIUS.
Chapter 8 : Dev ice Mana gement 210 KX2-808, KX2- 832 and KX2-864 Standard and Extended Local Port Settings The KX2-808, KX2- 832 and KX2-864 pro vide you with t wo local port options: the standard loca l port and the extende d local port.
Chapter 8 : Dev ice Mana gement 211 Connect and Disconnect Scripts The KX II provides th e ability to execute k ey macro scripts when connecting to or disconn ecting from a target. You can create and e dit your own scripts on the C onnection Script page to perform additional actions when connecting to or disconnecting fr om targets.
Chapter 8 : Dev ice Mana gement 212 3. In the Apply Selected Scr ipts to Ports s ection, select the target(s ) you want to appl y the script to using Select All or clicking on the checkbox to the lef t of each target to app ly the script to only select targets.
Chapter 8 : Dev ice Mana gement 213 For exam ple, select F1-F16 to displa y the function key set in the Add box. Select a function k ey and add it to the Scrip t box. Next, select Letters from the Key Set drop-do wn and add a letter k ey to the scr ipt.
Chapter 8 : Dev ice Mana gement 214.
Chapter 8 : Dev ice Manage ment 215 Modifying Scripts To modify existing sc ripts: 1. Click Device Settings > Connection Scripts. T he Connection Scripts page opens. 2. In the Available Connect ion Scripts sectio n, select the sc ript you want to modif y and click Modify.
Chapter 8 : Dev ice Mana gement 216 5. Click Import. T he Configuration Scripts page o pens and the im ported scripts are displa yed. To export a disconne ct script: 1. Click Device Settings > Configuration Scripts. T he Configuration Scripts page opens.
Chapter 8 : Dev ice Mana gement 217 Creating Port Groups The KX II supports the aggregation of m ultiple ports into a single p ort group.Port groups co nsist solely of ports configure d as standard KVM ports. A port m ay only be a m ember of a single group .
Chapter 8 : Dev ice Mana gement 218 Creating a Dual Video Port Group The dual video port groups feature allows you to group two video ports into one group. Use this feature when you need to connect t o a server with t wo video cards/ports, and you want to access both ports from the sam e remote client at the sam e time.
Chapter 8 : Dev ice Mana gement 219 Note: If a port is already a part of blade server port gr oup, another dual video port group, or 'standard' port group, th e port is not an option since ports c an only belong to a sing le port group at a time.
Chapter 8 : Dev ice Mana gement 220 3. Click Apply. Click Reset Defaults to change back to English. Note: Once you app ly a new language, the online help is also loca lized to match your langua ge selection.
221 In This Chapter Security Settings .................................................................................... 221 Configuring IP Acces s Control .............................................................. 232 SSL Certificates .........
Chapter 9 : Security Man agement 222 To reset back to d efaults: Click Reset to Def aults. Login Limitations Using login limitations, you can specif y restrictions for single login, password aging, and t he logging out idle users .
Chapter 9 : Security Man agement 223 Limitati on Description Enter the num ber of days after which a passwor d change is required. T he default is 60 days.
Chapter 9 : Security Man agement 224 Strong Passwords Strong passwords pr ovide m ore secure local authentic ation for the system. Us ing strong passwords, you can specif y the format of vali d KX II local passwords suc h as m ini mum and m aximum length, required characters, and pass word history retention.
Chapter 9 : Security Man agement 225 User Blocking The User Block ing options specif y the criteria by which users are b locked from acc essing the system after the specifie d number of unsuc cessful login attempts. The three options are m utually exclusi ve: Option Description Disabled The default option.
Chapter 9 : Security Man agement 226 Option Description Timer Lock out Users are denied acc ess to the s y stem for the specified amount of tim e after exceeding the specified num ber of unsuccessful login attem pts.
Chapter 9 : Security Man agement 227 Encryption & Share Using the Encr yption & Share settings you can s pecify the type of encryption used, PC an d VM share modes, a nd the t ype of reset performed when the KX II Reset button is pressed .
Chapter 9 : Security Man agement 228 Encryption mode Description browser supports it, otherwise you will not be able to connect. Se e Checking Your Browser for AES Enc ryption (on page 229 ) for more inform ation.
Chapter 9 : Security Man agement 229 6. If needed, select Loca l Device Reset Mode. T his option specifies which actions are tak en when the hardware Res et button (at the back of the device) is d epressed. For m ore information, see Resetting the KX II Using the Reset Button (on page 285 ).
Chapter 9 : Security Man agement 230 Enabling FIPS 140 -2 For governm ent and other high securit y environments, enabling FIP S 140 -2 mode m ay be required. The KX II uses an em bedded FIPS 140 -2-validated c ryptographic module running on a L inux ® platform per FIPS 140-2 Im plementation Guidance section G.
Chapter 9 : Security Man agement 231 FIPS 140-2 Support Requirements The KX II supports the use of FIPS 140 -2 approved e ncryption algorithms. T his allows an SSL server and client to succ essfully negotiate the cipher su ite used for the enc rypted session when a cli ent is configured for FIPS 140 -2 only m ode.
Chapter 9 : Security Man agement 232 Configuring IP Access Control Using IP access contro l, you control access to your KX II. Note that IP access control restricts traf fic of any kind fr om accessing the KX II, so NTP servers, RADI US hosts, DNS hosts and so on m ust be granted access to the KX II.
Chapter 9 : Security Man agement 233 3. Choose the Polic y from the drop-down list. 4. Click Insert. If the ru le # you just t yped equals an existing rule #, the new rule is placed ahead of the exiting rule and all ru les are m oved down in the list.
Chapter 9 : Security Man agement 234 SSL Certificates The KX II uses the S ecure Socket La yer (SSL) protocol for an y encrypted network traffic between itself and a con nected client. W hen establishing a connection, the KX II has to identi fy itself to a client using a cryptographic cert ificate.
Chapter 9 : Security Man agement 235 f. Country (ISO code) - The countr y where the organization is located. This is the t wo-letter ISO cod e, e.g. DE for Germ any, or US for the U.S. g. Challenge Pass word - Some certif ication authorities re quire a challenge password to authorize later changes on t he certificate (e.
Chapter 9 : Security Man agement 236 b. A message containi ng all of the inform ation you entered appears. c. The CSR and the f ile containing the private k ey used when generating it can be do wnloaded by clicking Do wnload CSR. d. Send the saved CSR to a CA for certif ication.
Chapter 9 : Security Man agement 237 Security Banner KX II provides you with the ability to add a s ecurity banner to the KX II login process. T his feature requires users to either accept or decli ne a security agreement before t hey can access the KX II.
Chapter 9 : Security Man agement 238 Note: You cannot u pload a text file from t he local port..
239 In This Chapter Audit Log ................................................................................................ 239 Device Inform ation ................................................................................. 240 Backup and Restore .
Chapter 10 : M aintenance 240 To page throug h the audit log: Use the [Older] and [Ne wer] links . Device Information The Device Inform ation page provides deta iled information about your KX II device and the CI Ms in use. This inf ormation is helpf ul should you need to contact Rarita n Technical Support.
Chapter 10 : Ma intenance 241 DCIM-SUSB D2CIM-VUSB D2CIM-DVUSB D2CIM-DVUSB-D VI D2CIM-DVUSB-HD MI D2CIM-DVUSB Note: Only the numer ic portion of the seri al numbers are disp layed for the DCIM-USB, DCI M-PS2 and DCI M-USB G2 CI Ms.
Chapter 10 : M aintenance 242 Backup and Restore From the Back up/Restore page, you can back up and restore the sett ings and configuration for your KX II. In addition to using back up and restore f or business continuit y purposes, you can use this f eature as a time -saving mechanism .
Chapter 10 : Ma intenance 243 In IE 7 (and later), IE is used as the default a pplication to open files , so you are prom pted to open the f ile versus save the file. T o avoid this, you m ust change the default application tha t is used to open files to W ordPad ® .
Chapter 10 : M aintenance 244 USB Profile Management From the USB Prof ile Management page, you can upload custom profiles provided b y Raritan tech support. T hese profiles are designe d to address the needs of your target server’s conf iguration, in the event that the set of standard prof iles does not alread y address them.
Chapter 10 : Ma intenance 245 As noted, you m ay delete a custom profile from the s y s tem while it is still designated as an act ive profile. Doing so wil l terminate any virtual media sessions that were in place.
Chapter 10 : M aintenance 246 To upgrade your KX II unit: 1. Locate the appropria te Raritan firm ware distribution f ile (*.RFP) on the Raritan web site http://ww w.raritan.com on the Firmware Upgrades web page. 2. Unzip the file. Please rea d all instructions inclu ded in the firm ware ZIP files carefully before u pgrading.
Chapter 10 : Ma intenance 247 As prompted, close the browser and wait approximately 5 m inutes before logging in to the KX II again. again. For i nformation about upgrad ing the device firm ware using the Multi-P latform Client, see U pgrading Device Firmware in the KVM and Serial A ccess Clients Gu ide .
Chapter 10 : M aintenance 248 Rebooting the KX II The Reboot p age provides a saf e and controlled way to reboot your KX II. This is the recomm ended m ethod for rebooting. Important: All KVM and serial connections will be closed and all users will be logged off .
Chapter 10 : Ma intenance 249 Stopping CC-SG Management W hile the K X II is under CC -SG m anagement, if you try to access the device directl y, you are notified that it the de vice is under CC -SG managem ent.
Chapter 10 : M aintenance 250 3. Click Yes to rem ove the device CC -SG managem ent. Once CC-SG managem ent has ended, a confirm ation will be displayed.
251 In This Chapter Network Interf ace Page ......................................................................... 251 Network Statistics Pa ge ......................................................................... 251 Ping Host Page ...........
Chapter 11 : Diag nostic s 252 Statistics - Produces a page similar to the one displayed here. Interfaces - Produces a page similar to the one displayed here.
Chapter 11 : Diagn ostics 253 Route - Produces a p age sim ilar to the one displayed here. 3. Click Refres h. The relevant inform ation is displayed in the Result field. Ping Host Page Ping is a network tool used to test whether a particular host or I P address is reachable acros s an IP network .
Chapter 11 : Diag nostic s 254 2. T y pe either the hostnam e or IP address into the IP Add ress/Host Name f ield. Note: The host name ca nnot exceed 232 charac ters in length. 3. Click Ping. The results of the ping are displa yed in the Result field.
Chapter 11 : Diagn ostics 255 Device Diagnostics Note: This page is for use by Raritan Field En gineers or when you are directed by Raritan Tec hnical Support. De vice diagnostics do wnloads the diagnostics inf ormation from the KX II to the client mac hine.
Chapter 11 : Diag nostic s 256 a. Click Save to File. T he File Download d ialog opens. b. Click Save. The Sav e As dialog box opens . c. Navigate to the des ired directory and click Save. d. Email this file as directe d by Raritan T echnical Support.
257 In This Chapter Overview ................................................................................................ 257 Accessing the KX II Usin g CLI .............................................................. 258 SSH Connection to th e KX II .
Chapter 12 : Co mmand Line Interface (C LI) 258 A ccessing the KX II Using CLI Access the KX II b y using one of the followi ng methods: SSH (Secure Shell) via I P connection A number of SSH c lients are available an d can be obtained from the following locations: Putty - http://www.
Chapter 12 : Co mmand Line Interface (C LI) 259 Logging In To log in, ent er the user name admin as shown: 1. Log in as admin 2. The Password prom pt appears. Enter the defau lt password: raritan The welcom e message displays. You are no w logged o n as an administrator.
Chapter 12 : Co mmand Line Interface (C LI) 260 CLI Syntax -T ips and Shortcuts Tips Comm ands are listed in alphabetical order. Comm ands are not case sensitive. Parameter nam es are single word without unders core. Comm ands without arguments default to sh ow current settings for the comm and.
Chapter 12 : Co mmand Line Interface (C LI) 261 Initial Configuration Using CLI Note: These steps , which use the CLI, are op tional since the same configuration can be do ne via KVM. See Getting Star ted (on page 12 ) for more informatio n. KX II devices com e from the factor y with default factory settings.
Chapter 12 : Co mmand Line Interface (CL I) 262 The KX II now has t he basic configuration and ca n be access ed remotely via SSH, GUI, or local ly using the local serial port. The administrator needs to configure th e users and groups, ser vices, securit y , and seri a l ports to which the ser ial targets are attached t o the KX II.
Chapter 12 : Co mmand Line Interface (C LI) 263 Enter admin > config > network . Command Description help Display overview of commands. history Display the current sess ion's comm and line history. interface Set/get network parameters. ipv6_interface Set/get IPv6 network param eters.
Chapter 12 : Co mmand Line Interface (C LI) 264 Commands Description ipv6 Set/get IPv6 network param eters. Interface Command The Interface com mand is used to conf igure the KX II network interface.
Chapter 12 : Co mmand Line Interface (CLI) 265 Name Co mmand The nam e command is used to configure the n etwork nam e. The syntax of the name is: name [devicename <devicename>] [hostname <ho.
266 In This Chapter Overview ................................................................................................ 266 Simultaneous Users .............................................................................. 266 KX II Local Console I nterface: KX II Devices .
Chapter 13 : KX II Local Con sole 267 KX II Local Console Interface: KX II Devices W hen y ou are located at the server rack , the KX II provides standard KVM managem ent and adm inistration via the KX II Local Console.
Chapter 13 : KX II Local Con sole 268 Port Access Page (Local Console Serv er Disp lay) After you login to the KX II Local Console, the Port Access page opens. This page lists all of the KX II ports, and the targe t servers, port groups , and blade chassis that are connected to those ports.
Chapter 13 : KX II Local Con sole 269 Scanning Ports - Local Console The KX II scanning feat ure is supported b y the Local Console. The targets that are fou nd during the scan are displayed on the Sc an page one at a tim e, which is different f rom the Remote Console port s lide show.
Chapter 13 : KX II Local Console 270 Local Port Scan M ode Following are options a vailable to you to chan ge scan options on local port. To configu re the Local Console scan port s ettings: 1. On the Local Console, s elect Device Sett ings. 2. In the Local Port Sett ings section, sel ect Local Port Scan Mode.
Chapter 13 : KX II Local Con sole 271 4. Click OK. Once the sm art card reader is a dded, a message wil l appear on the page ind icating you have com pleted the operation successfully. A status of either Selected or Not Se lected will appear in the left panel of the p age under Card R eader.
Chapter 13 : KX II Local Con sole 272 Local Console USB Profile Options From the USB Prof ile Options section of the Tools page, you can choose from the available U SB profiles.
Chapter 13 : KX II Local Con sole 273 Hot Keys and Connect Keys Because the KX II Local Console interf ace is completely replaced b y the interface for the target ser ver you are acc essing, a hot k ey is used to di sconnect fr om a target and return to t he local port GUI.
Chapter 13 : KX II Local Console 274 Standard servers Co nnect key action Key sequence examp le Disconnect from a target and return to the local port GUI Disconnect from target port 5, slot 11 an d re.
Chapter 13 : KX II Local Con sole 275 Returning to the KX II Local Console Interface Important: T he KX II Local Console default ho t key is to press the Scroll Lock key tw ice rapidly. This key combination can be changed in t he Local P ort Settings page.
Chapter 13 : KX II Local Con sole 276 US US/International United Kingdom French (France) German (Germ any ) JIS (Japanese Industr y Standard) Sim plified Chinese Tradit.
Chapter 13 : KX II Local Con sole 277 Hot key: Take this action: Double Click Lef t Ctrl key Press the left Ctrl k ey twice quickly 4. Select the Local Port C onnect ke y . Use a connect k ey sequence to connect to a target and switch to anoth er target.
Chapter 13 : KX II Local Console 278 Note: If you initially choose not to ignore CC Manage mode on the local port but later wan t local port access, you w ill have to remove the device from under CC -SG manag ement (from within CC -SG). You will then be ab le to check this checkbox.
Chapter 13 : KX II Local Con sole 279 Configuring KX II Local Port Settings from the Local Console The standard local port and the extended loca l port can be configured from the Rem ote Console on the Port Config uration page, or from the Local Console on the L ocal Port Settin gs page.
Chapter 13 : KX II Local Con sole 280 IP auto configuration IP address Subnet mask Gateway IP address Primar y D NS server IP a ddress Secondary DNS server I P address Disc.
Chapter 13 : KX II Local Con sole 281 Connect and Disconnect Scripts The KX II provides th e ability to execute k ey macro scripts when connecting to or disconn ecting from a target. You can create and e dit your own scripts on the C onnection Script page to perform additional actions when connecting to or disconnecting fr om targets.
Chapter 13 : KX II Local Con sole 282 3. In the Apply Selected Scr ipts to Ports s ection, select the target(s ) you want to appl y the script to using Select All or clicking on the checkbox t o the left of each target to app ly the script to onl y select targets.
Chapter 13 : KX II Local Con sole 283 For exam ple, select F1-F16 to displa y the function key set in the Add box. Select a functio n key and add it to the Script box. Next, select Letters from the Key Set drop-do wn and add a letter k ey to the script.
Chapter 13 : KX II Local Con sole 284.
Chapter 13 : KX II Local Con sole 285 Modifying Scripts To modify existing sc ripts: 1. Click Device Setti ngs > Connection Scripts. T he Connection Scripts page opens. 2. In the Available Connect ion Scripts section, select t he script you want to modif y and click Modify.
Chapter 13 : KX II Local Con sole 286 4. Continue holding the Res et button for 10 seco nds. Once the device has been reset, two short b eeps signal its completion.
287 In This Chapter Hardware ............................................................................................... 287 Software .............
Appendix A : Specification s 288 Dominion KX II model Description Dimensions (WxDxH) Weight Power and heat dissipation remote users , 1 local port for use at the rack 1.75"; 439 x 290 x 44mm 4.1kg 47/63Hz 1A 63W 54 KCAL DKX2- 232 32 server ports, 2 remote users , 1 local port for use at the rack 17.
Appendix A : Specification s 289 Specifications for All Dominion KX II M odels Local port access Video HD15(F) VGA Keyboard/Mouse USB(F), 1 USB front, 3 USB rear W arranty Two years standard with adva.
Appendix A : Specification s 290 CIM mod el Description Dimensions (WxDxH) Weight D2CIM-VUSB USB CIM for virtual m edia and Absolute Mouse S ynchronization 1.3" x 3.0" x 0.6"; 33 x 76 x 15mm 0.20lb; 0.09kg DCIM-PS2 CIM for PS/2 1.3" x 3.
Appendix A : Specification s 291 CIM mod el Description Dimensions (WxDxH) Weight P2CIM-SER Paragon II/Dom inion KX II CI M for serial (ASCII) devices 1.
Appendix A : Specification s 292 CIM mod el Description Dimensions (WxDxH) Weight D2CIM-DVUSB- DP Digital CIM that provides digital- to -analog con version and support for virtual m edia, smartcard/CAC, a udio, Absolute and Relative Mouse Synchronization 1.
Appendix A : Specification s 293 Digital CIM Timing Modes Fo llowing are the default t iming modes that are us ed when the KX II communicates with a video source via a digital CIM. The timing m ode that is used is dependent on t he native resolution of the video source.
Appendix A : Specification s 294 Digital CIM Established and Standard Modes The following additiona l established and stan dard resolutions and tim ing modes are supported by the KX II 2.
Appendix A : Specification s 295 Digital CIM Display Native Resolution You are able to select t he native resolution of the CIM on the Port Configuration page fr om the Displa y Native Resolution drop -down. This is the preferred reso lution and timing m ode of the digital CIM.
Appendix A : Specification s 2 96 Supported Paragon II CIM S and Configur ations The KX II supports the P2CIM-APS2DUA L and P2CIM-AUS BDUAL CIMs, which provide t wo RJ45 connections to dif f erent KVM switches. Support of these CIMs provides a second path to access the target in the event that one of the KVM switches is block ed or fails.
Appendix A : Specification s 297 KX II- to -KX II Paragon CIM Guidelines The following system configuration guidelines shou ld be followed when you are using Paragon CIMs in a KX II- to -KX II configu.
Appendix A : Specification s 298 If a connection to the targ et is in place from the other KX II, t he availability is check ed when a connection is attem pted. Access is denied or allowed consistent with the PC- Share polic y in place for the KX II. Until that tim e, the availability is not be updated on the other KX II.
Appendix A : Specification s 299 Paragon II operation mode Mode description Supported? port can be selected an d controlled by more tha n one user, but onl y one user has ke yboard and mouse control at an y one time. Timeout, which is conf igured on the Paragon II, is n ot supported.
Appendix A : Specification s 300 Supported Remote Conn ections Remote connection Details Network 10BASE-T, 100 BASE-T, and 1000BA SE-T (Gigabit) Ethernet Protocols TCP/IP, UDP, SNT P, HTT P, HTTPS, RA.
Appendix A : Specification s 301 Legend: Does not function as exp ected Supported Functions; not recom mended NOT supported b y Ethernet specification; pro duct will communicate, but c ollisions will .
Appendix A : Specification s 302 Target Server Requirements W hen using smart c ard readers, the basic requirem ents for interoperabilit y at the target server are: The IFD (sm art card reader) Handler m ust be a standard US B CCID device driver (com parable to the generic Micr osoft ® USB CCID driver).
Appendix A : Specification s 303 Remote Client Requirements The basic requirem ents for interoperabilit y at the remote client are: The IFD (sm art card reader) Handler m ust be a PC/SC compliant device driver. The ICC (sm art card) Resource Manager m ust be available and be PC/SC com pliant.
Appendix A : Specification s 304 Type Vendor Model Verified USB SCM Microsystem s SCR331 Verified on local and remote USB ActivIdentity ® ActivIdentity USB Re ader v2.
Appendix A : Specification s 305 Supported A udio Device Formats The KX II supports one playback and cap ture device and one record device on a target at a time. T he following audio device f ormats are supported: Stereo, 16 bit, 44.1 K Mono, 16 bit, 44.
Appendix A : Specification s 306 Bandwidth Requirements The table below detai ls the audio playback and capture bandwidth requirements to trans port audio under each of the se lected formats. Audio format Network bandw idth requirement 44.1 KHz, 16bit stere o 176 KB/s 44.
Appendix A : Specification s 307 Audio in a Mac Environment Following are k nown issues in a Mac ® e nvironment. On Mac clients, onl y one playback device is listed on t he Connect Audio panel when acc essing the device throu gh the Virtual KVM Client (VKC) and Mu lti-Platform Client (MPC).
Appendix A : Specification s 308 KX2 8xx Extended L ocal Port Recommend ed Maximu m Distances Extended device 1024x768, 60 Hz 1280x1024, 60 Hz Paragon II UMT usin g EUST 1000 900 Paragon EUST 500 400 .
Appendix A : Specification s 309 Keystroke Description Virtual M edia CIM Dual Virtual Media CIM Mac Lion Server HDMI CIM Press N during startup Start up from a compatible network server (NetBoot) Pre.
Appendix A : Specification s 310 Port Description By default, this port is use d for m ultiple purposes, including the web server for the HTML c lient, the download of client software (Multi-Platform Client (MPC) and Virtual KVM Client (VKC)) onto th e client's host, and the tr ansfer of KVM an d virtual media data str eams to the client.
Appendix A : Specification s 311 Software Supported Operating S ystems (Clients) The following operatin g system s are supported on the Virtual K VM Client (VKC) and Multi-P latform Client (MPC).
Appendix A : Specification s 312 Linux ® The JRE ™ plug-in is a vailable for the W indows ® 32 -bit a nd 64-bit operating system s. MPC and VKC ca n be launched onl y from a 32-bit browser, or 64-bit browser. Following are the Java ™ 32 -bit and 64- bit W indow s operating s ystem requirements.
Appendix A : Specification s 313 Mac OS X Mountain L ion 10.8.5 * using Saf ari 6.1.1 running JRE 1.7.0_51 *Note: Upon upgradin g from OS X 10.8.2 to O S X 10.
Appendix A : Specification s 314 Resolutions 640x480 @72Hz 1152x864 @85H z 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66H z 720x400 @70Hz 1152x900 @76H z 720x400 @84Hz 1280x720@60Hz 720x40.
Appendix A : Specifications 315 Video Image Appears Dark when Using a Mac If you are using a Mac ® with an HDMI video port and the video seem s too dar k, enable D VI Compatibilit y Mode on the CIM to help resol ve the issue.
Appendix A : Specification s 316 Language Regions Keyboard layout Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian Slovenian Slovenia Slovenian Italian Italy Italian Spanish Sp.
317 In This Chapter Overview ................................................................................................ 317 Recomm endations for Dual Port Video ................................................. 318 Dual Video Port Group Supported Mouse Mo des .
Appendix B : Dual Video Por t Groups 318 Recommendations for Dual Port Video Set the target server ’s primary and secondar y displays to the sam e video resolution in order to m aintain mouse s ynchronization and m inimize having to periodicall y resync.
Appendix B : Dual Video Por t Groups 319 Target operating systems Supported mouse modes Comments Mouse mode is recomm ended. Linux ® Intelligent and Standard Mouse Modes Linux ® users m ay experience display and m ouse movement issues using single m ouse mode.
Appendix B : Dual Video Por t Groups 320 Monitor settings will NOT be applied. Inste ad the Port Group Management conf igured 'Displa y Orientation' will be applied.
Appendix B : Dual Video Por t Groups 321 Example Dual Port Video Group Configuration The following is a genera l example. Your configuration m ay vary in the t ype of CIMs used, the port you designate as the prim ary port, the ports you are connecting to and so on.
Appendix B : Dual Video Por t Groups 322 Diagram key Connection from the target's prim ary (first) video port to the KX II Connection from the target's secondar y (second) video port to the .
Appendix B : Dual Video Por t Groups 323 Note: If the target pr imary and secondary displays are set to different resolutions the mouse will not stay in sync and wi ll need to be periodically re-sy nced from the top- left target window.
Appendix B : Dual Video Por t Groups 324 Step 3: Configure the M ouse Mod e and Ports Once you have connec ted the target server to the Rar itan device through the target server video ports, it detects th e connection and displa ys the ports on the Port Conf iguration page.
Appendix B : Dual Video Por t Groups 325 Step 5: Launch a Dua l Port Video Group Once you have created th e dual video port gro up, it is available on th e Port Access page. Two KVM channels are required to rem otely connect to the dual video port group by click ing primary port.
Appendix B : Dual Video Por t Groups 326 Direct Port Access and Dual Port Video Groups Direct port access allows users to bypass ha ving to use the device's Login dialog and Port Acc ess page.
327 In This Chapter Overview ................................................................................................ 327 Connecting the Parago n II to the KX II .
Appendix C : Accessing a PX2 from the KX II 328 W hen y ou access the Para gon II system f rom KX II or CC -SG (if the KX II is managed by CC -SG), the Paragon II O SUI login screen appears f or you to log in.
Appendix C : Accessing a PX2 from the KX II 329.
330 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group I nform ation ........................................................ 330 Setting the Registr y to Perm it W rite Operations to the Schem a .
Appendix D : Updating the LDAP S chema 331 Setting the Registry to Permit Write Operations to the Schema To allow a dom ain controller to write to the schem a, you must s et a registry entr y that permits schem a updates. To permit w rite operations to the schema: 1.
Appendix D : Updating the LDAP S chema 332 3. Click New and then cho ose Attribute. W hen the warning m essage appears, click Continue and the Create New At tribute dialog appears. 4. T y pe rc iusergroup in th e Comm on Name field. 5. T y pe rc iusergroup in th e LDAP Displa y Name field.
Appendix D : Updating the LDAP S chema 333 2. Scroll to the user class in the right pane and r ight-c lick it. 3. Choose Properties fr om the m enu. The user Properties dialo g appears.
Appendix D : Updating the LDAP S chema 334 6. Choose rciusergroup from the Select Sch ema Object list. 7. Click OK in the Select Schem a Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update t he schema cache: 1.
Appendix D : Updating the LDAP S chema 335 3. Go to the director y where the support tools were installed. Run adsiedit.msc . The ADSI Edit window opens.
Appendix D : Updating the LDAP S chema 336 6. Locate the user nam e whose properties you want to adjus t in the right pane. Rig ht -c lick the user nam e and select Prope rties. 7. Click the Attribute Ed itor tab if it is not alre ady open. Choose rciusergroup from the Attributes list.
337 In This Chapter Overview ................................................................................................ 337 Java Runtim e Environment (JRE) Notes ............................................... 337 IPv6 Support Notes ............
Appendix E : Informationa l Notes 338 Java Not Loading P roperly on M ac If you are using a Mac ® and see the f ollowing message when conn ecting to a device from the KX II Port Access T able, Java ™ is not loa ded properly: "Error while getting the list of open targets , please tr y again in a few seconds".
Appendix E : Informational No tes 339 IPv6 Support Notes Operating System IPv6 Support No tes Java Java ™ 1.7 supports IPv6 f or the following: Solaris ™ 10 (and later) Linux ® kernel 2.
Appendix E : Informationa l Notes 340 Dual Stack Login Performance Issues If you are using the KX II in a dual stack configuration, it is im portant you configured the dom ain system ( DNS) correc tly i n the KX II in order to avoid dela y s when logging i n.
Appendix E : Informational No tes 341 Windows 2000 Comp osite USB Device Behavior for Virtu al Media The W indow s 2000 ® operat ing system does not s upport USB com posite devices, like Raritan’s D2 CIM -VU SB, in the same m anner as non -com posite USB devices.
Appendix E : Informationa l Notes 342 Cannot Write T o/From a File from a M ac Client If you are connecting to the KX II from a Mac ® 10.8.5 c lient r u nning Safari ® 6.1 with Java ™ 1. 7 and cannot write to/f rom a file on a target server or access virtua l media, do the fol lowing to correct this: 1.
Appendix E : Informational No tes 343 Virtual M edia via VKC and AKC in a Wind ows Environment W indows XP ® operating system administrator and standard user privileges var y from those of the W indows Vista ® operat ing system and the W indow s 7 ® operating s ystem.
Appendix E : Informationa l Notes 344 Virtual M edia Linux Drive Listed Tw ice For KX II 2.4.0 (and later) and LX 2.4.5 (and later), users who are logged in to Linux ™ clients as ro ot users, the drives are listed twic e in the Local Drive drop-down.
Appendix E : Informational No tes 345 USB Port and Profile Notes VM -CIMs and DL360 USB Ports HP ® DL360 servers ha ve one USB port on th e back of the de vice and another on the fr ont of the device. W ith the DL360, both ports cannot be used at the sam e time.
Appendix E : Informationa l Notes 346 USB profile help app ears in the USB Profile H elp window. For detailed inform ation about specific USB profiles, see Availabl e USB Profiles ( on page 109 ). Raritan provides a stand ard selection of USB conf iguration profiles for a wide range of oper ating system and BIOS level server im plementations.
Appendix E : Informational No tes 347 Changing a USB Profile when Using a Sm art Card Reader There ma y be certain circum stances under which you will need to change the USB profi le for a target serv er.
Appendix E : Informationa l Notes 348 Note: These procedures do not apply to t he circumflex accent (above vowels). In all cases, th e ^ key (to the right of t he P key) works on French keyboards to create t he circumflex accent when used in combination with another character.
Appendix E : Informational No tes 349 Ke y board Langua ge Preference (Fedora Linux Clients) Because the Sun ™ J RE ™ on Lin ux ® has problem s generating the corr ect KeyEvents for f oreign-lang.
Appendix E : Informationa l Notes 350 4. Click Close. To set the keyboard lang uage using the Keyboard Ind icator: 1. Right-click the T ask Bar and choose Ad d to Panel. 2. In the Add to Panel dia log, right-c lick the Ke yboard Indicator and from the menu choose Op en Keyboard Pref erences.
Appendix E : Informational No tes 351 3. Restart the X server. W ith thi s change, the int ernal video mode t iming from the X server is used and corresponds ex actly with the VESA video mode tim ing, resulting in the proper video displa y on the KX II.
Appendix E : Informationa l Notes 352 Audio in a Linux Env ironment The following are k nown issues when usin g the audio feature in a L inux ® environment. Linux ® users, use the def ault audio device f or playback. Sound m ay not come through if a n on-default sound card is selected.
Appendix E : Informational No tes 353 Proxy Mod e and MPC If you are using KX II i n a CC-SG conf iguration, do not use the CC-SG proxy mode if you are planning to use th e Multi-Platform Client (MPC).
Appendix E : Informationa l Notes 354 VKC and MPC Sm art Card Connections to Fedora Servers If you are using a sm art card to connect t o a Linux ® Fe dora ® server via Multi-Platform Client (MPC) and Virtua l KVM Client (VKC) up grade the pcsc-lite librar y to 1.
355 In This Chapter General FAQs ........................................................................................ 355 Remote Access ..................................................................................... 356 Universal Virtual Medi a .
Appendix F : Frequently As ked Question s 356 Question Answer How does Dom inion KX II differ from r emote control software? W hen using Dom inion KX II remotel y, the interface, at first glance, m ay seem sim ilar to remote control software such as pcAn ywhereT M, W indow s® Term inal Services/Remote Desk top, VNC, etc.
Appendix F : Frequently As ked Question s 357 Question Answer How man y users can remotely access servers on each Dominion KX II? Dominion KX II m odels offer rem ote connections for up to eight users per user c hannel to sim ultaneously access and control a unique target server.
Appendix F : Frequently As ked Question s 358 Question Answer Do you have a non - W indows KVM Client? Yes. Both the Virtua l KVM Client (VKC) and the Multiplatform Client (MPC) allow non-W indows users to connect to target servers in the data c enter.
Appendix F : Frequently As ked Question s 359 Question Answer W hat is the file size of the applet that’s used to acces s Dominion KX II? Ho w long does it take to retr ieve? The Virtual KVM C lient (VKC) applet used t o access Dominion KX II is approx imately 500KB in size.
Appendix F : Frequently As ked Questions 360 Question Answer W hat is requi red for virtua l media? A Dominion KX II virtua l media CIM is requ ired: a digital CIM, D2CI M-VUSB or D2CIM- DVUSB. The D2CIM-VUS B has a single USB connector and is for custom ers who will use virtual m edia at the OS level.
Appendix F : Frequently As ked Question s 361 Question Answer W hy would I use a USB pro file? USB profiles are m ost often required at th e BIOS level where there m ay not be full support for the USB specificat ion when ac cessing virtual media drives.
Appendix F : Frequently As ked Question s 362 Question Answer How is bandwidth us ed in KVM-over-IP s ystems? Dominion KX II off ers next-generatio n KVM-over-IP techno logy – the ver y best video compression available .
Appendix F : Frequently As ked Question s 363 Question Answer W hat factors affect bandwi dth? There are m any factors that determ ine how much bandwidth wil l be used. The prim ary factor, noted above, is t he amount of c hange in the target server’s video display.
Appendix F : Frequently As ked Question s 364 Question Answer How can I reduce ba ndwidth? KX II provides a var iety of settings in our remote clients for the user to optim ize bandwidth and perf ormance. The default settings will provide an at-the-rac k level of performance in standard LAN/W AN environments with economical use of bandwidth.
Appendix F : Frequently As ked Question s 365 Question Answer W hat shoul d I do on slo wer bandwidth links? The connection speed a nd color depth se ttings can be tweaked to opt imize perform ance for slower bandwidth link s. For exam ple, in the Multiplatform Client or th e Virtual KVM Client, set th e connection speed to 1.
Appendix F : Frequently As ked Question s 366 Question Answer W hat abou t servers with DVI ports? Servers with DVI ports t hat support DVI- A (analog) and DVI- I (integrated analog and digital) can u.
Appendix F : Frequently As ked Question s 367 User Task Default 1Mb Speed and 15 -bit Color 1Mb Speed and 8- bit Color Open Text W indow 50 – 100 KB/s 25 – 50 KB/s 10 – 15 KB/s Continuous T yping 1 KB/s .
Appendix F : Frequently As ked Question s 368 Question Answer W hat is the speed of Dominion KX II’s Ethernet interfaces ? Dominion KX II sup ports gigabit as wel l as 10/100 Ethernet. KX II supports two 10/100/1000 speed Ethern et interfaces, with configurable speed and duplex settings (either auto detected or m anually set).
Appendix F : 369 Question Answer Can the Dom inion KX II use DHCP? DHCP addressing can be used; howe ver, Raritan recomm ends fixed addressing since the Dom inion KX II is an infrastructure de vice and can be access ed and administered m ore effectively with a f ixed IP address.
Appendix F : 370 Question Answer W hat is IP v6? IPv6 is the acronym for Inte rnet Protocol Version 6. IPv6 is the "next generation" IP protocol which will rep lace the current IP Version 4 (IPv4) prot ocol. IPv6 addresses a num ber of problem s in IPv4, such as the limited num ber of IPv4 addresses.
Appendix F : 371 Question Answer W hat if m y network doesn’t support IPv6? The Dom inion KX II’s default networking is set at the factor y for IPv4 only. W hen you are ready to use IPv6, then f ollow the above instructions to enable IPv4/IPv6 d ual-stack operation.
Appendix F : 372 Question Answer W hat abou t mouse synchronization? In the past, KVM-o ver-IP mouse synchronization was a f rustrating experience. The Dom inion KX II’s Absolute Mouse Synchronization prov ides for a tightl y synchronized m ouse without requiring server mouse setting changes o n W indows and Apple® Mac servers.
Appendix F : 37 3 Question Answer Do I have to use hotk eys to switch between blades? Some blade servers require you to use hotk eys to switch between blades.
Appendix F : 374 Question Answer Is virtual media supp orted? This depends on the blade server. HP blades can support virtual m edia. T he IBM BladeCenter (except f or BladeCenter T) supports virtual m edia if configured appropriatel y. A virtual media CIM – D2CIM-VUSB or D2CIM-DVUS B – must be used.
Appendix F : 375 Question Answer How do I connect serv ers to Dominion KX II? Servers that connect to the Dom inion KX II require a Dom inion or Paragon CIM, which connects directl y to the keyboard, video and mouse ports of the server.
Appendix F : 376 Question Answer How do I connect a s erially controlled (RS-23 2) device, such as a Cisco router/s witch or a headless Sun ser ver, to Dom inion KX II? If there are onl y a few serially controlled devices, they ma y be connected to a Dom inion KX II using Raritan’s P2CIM -SER seria l converter.
Appendix F : 377 Question Answer W hen I am using the local port, do I prevent other users from ac cessing servers rem otely? No. The Dom inion KX II local port has a completely independent access path to the servers.
Appendix F : 378 Question Answer If I use the local port to ch ange the name of a connected ser ver, does this change propagat e to rem ote access clients as wel l? Does it propagate to the optiona l Comm andCenter appliance? Yes.
Appendix F : 379 Questi on Answer Must I use the extended local port? No. The extended loca l port is an optio nal feature and is disabled by default. Use the "Local Port Settings " page to enable it. You can also disable the stan dard local port if you are not going to use it for added securit y.
Appendix F : 380 Question Answer How do I connect the PDU to the Dom inion KX II? The D2C IM -PW R is used to connec t the power strip to the Dom inion KX II. The D2CIM-PW R must be purchased separately; it does not com e with the PDU. Does Dominion KX II support servers with m ultiple power supplies? Yes.
Appendix F : 381 Question Answer How do I physicall y connect multiple Dom inion KX II devices together into one solutio n? To physicall y connect multiple KX II de vices together for consolida ted lo.
Appendix F : 382 Question Answer Do I have to ph ysically connect Dominion KX II dev ices together? Multiple Dom inion KX II units do not need to b e physically connected toget her.
Appendix F : 383 Computer Interface Modules (CIMs) Question Answer W hat ty pe of video is supported b y your CIMs? Our CIMs have trad itionally supported analog VGA video. Three new CIMs support dig ital video form ats, including DVI, HDMI and DisplayPort.
Appendix F : 384 Question Answer Does Dominion KX II support Paragon Dual CIMs? Yes. The Dom inion KX II now supports Paragon II Dual C IMs (P2CIM-A PS2DUAL and P2CIM-AUSBDUA L), which can connec t servers in the data c enter to two diff erent Dominion KX II s witches.
Appendix F : 385 Question Answer Does Dominion KX II allow encryption of video data? O r does it only encr ypt keyboard an d mouse data? Unlike com peting solutions, which only encr ypt ke y bo ard and mouse dat a, Dominion KX II does not com promise security – it allows encryption of k eyboard, mouse, video and virtual media data.
Appendix F : 386 Smart Cards and CAC A uthentication Question Answer Does Dominion KX II support smart card and C AC authentication? Yes. Smart c ards and DoD comm on access cards (CAC) authenticat ion to target servers is supported b y Release 2.1.10 and greater.
Appendix F : 387 Question Answer Can Dom inion KX II be remotely managed and conf igured via W eb browser? Yes. Dominion KX II can be com pletely configured remotel y via W eb browser. Note that this does require that the works tation have an appropriate Java Ru ntime Environment (JRE) version installe d.
Appendix F : 388 Documentation and Support Question Answer W here do I find documentation on the Dom inion KX II? The docum entation is available at raritan.com on the KX II firm ware and docum entation page: http://www.raritan.c om/support/dominion - kx -ii.
Appendix F : 389 Question Answer I changed and subsequ ently forgot Dominion KX II’s adm inistrative password; can you retrieve it for me? Dominion KX II contai ns a hardware reset button that can be used t o factory reset the device, which will reset the administrative password on the device to the default password.
391 A A. AC Power • 16 About the Active KV M Client • 92 Absolute Mouse Mode • 74 Access a Virtual Medi a Drive on a Client Compu ter • 100 Access and Contro l Target Servers Rem otely • 23 .
Index 392 CIMs Required for Virt ual Media • 97 Cisco ACS 5.x f or RADIUS Authentication • 136 CLI Comm ands • 257, 26 2 CLI Prom pts • 262 CLI Syntax - T ips and Shortcuts • 260 Client Laun.
Index 393 Disconnecting Users from Ports • 126, 127 Discovering Devices o n the KX II Subnet • 46 Discovering Devices o n the Local Subnet • 4 5 Documentation and S upport • 386 Drive Partitio.
Index 394 Java Validation and Acc ess Warning • 27 JRE Requirements and Browser Considerations for Mac • 312 K Keyboard Language Pref erence (Fedora L inux Clients) • 347 Ke yboard Limitations .
Index 395 O Operating System IPv6 Sup port N otes • 337 Overview • 10, 52, 105, 1 08, 257, 266, 316, 326, 335 P Package Contents • 4 Permissions and D ual Video Port Gr oup Access • 219, 319 P.
Index 396 SSH Access f rom a Windows PC • 258 SSH Connection to th e KX II • 258 SSL Ce rtificates • 2 7, 234 Standard Mouse Mo de • 72 Step 1 Configure the Target Server Display • 321 Confi.
Index 397 V Version Inform ation - Virtual KVM Client • 9 1 Video Image Appears Dark when Using a Mac • 313 Video Mode and R esolution Notes • 348 Video Properties • 66 View by Group T ab • .
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800- 724 -8090 or 73 2-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732- 764 -8887 Email for CommandCenter NOC: tech-ccnoc@raritan.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Raritan Computer DKX2-v2.6.0-0R-E c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Raritan Computer DKX2-v2.6.0-0R-E - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Raritan Computer DKX2-v2.6.0-0R-E, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Raritan Computer DKX2-v2.6.0-0R-E va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Raritan Computer DKX2-v2.6.0-0R-E, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Raritan Computer DKX2-v2.6.0-0R-E.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Raritan Computer DKX2-v2.6.0-0R-E. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Raritan Computer DKX2-v2.6.0-0R-E ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.