
Copyright © 2010 Raritan, Inc. DKSXII-v2.3.0-0D-E December 2010 255-62-4030-00 Dominion KSX II User Guide Release 2.3.0
Contents x Appendix D FAQs 314 General Questions ...
90 In This Chapter Overview ... 91 Prerequisites for
Chapter 5: Virtual Media 91 Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client
Chapter 5: Virtual Media 92
Chapter 5: Virtual Media 93 Diagram key Desktop PC CD/DVD drive KSX II USB mass storage device CIM PC hard drive Target server Remote f
Chapter 5: Virtual Media 94 Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different typ
Chapter 5: Virtual Media 95 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP® operating system administrator and standard
Chapter 5: Virtual Media 96 Using Virtual Media With the KSX II virtual media feature, you can mount up to two drives (of different types). These
Chapter 5: Virtual Media 97 Target Server KVM target servers must support USB connected drives. KVM target servers running the Windows 2000
Chapter 5: Virtual Media 98 File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access
Chapter 5: Virtual Media 99 Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of th
1 In This Chapter KSX II Overview ... 2 What's New in Hel
Chapter 5: Virtual Media 100 Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mou
Chapter 5: Virtual Media 101 WARNING: Enabling Read/Write access can be dangerous! Simultaneous access to the same drive from more than one entit
Chapter 5: Virtual Media 102 2. For internal and external CD-ROM or DVD-ROM drives: a. Choose the Local CD/DVD Drive option. b. Choose the driv
Chapter 5: Virtual Media 103 Disconnecting Virtual Media To disconnect the virtual media drives: For local drives, choose Virtual Media >
104 In This Chapter Overview ... 104 CIM Compatibility
Chapter 6: USB Profiles 105 CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmwar
Chapter 6: USB Profiles 106 USB profile Description Restrictions: USB bus speed limited to full-speed (12 MBit/s) No virtual media support B
Chapter 6: USB Profiles 107 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.
Chapter 6: USB Profiles 108 USB profile Description Module D2CIM-DVUSB is connected to the Advanced Management Module. Restrictions: Virtual CD
Chapter 6: USB Profiles 109 USB profile Description Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server when installi
Chapter 1: Introduction 2 KSX II Overview Raritan's Dominion KSX II is an enterprise-class, secure digital device that provides a single inte
Chapter 6: USB Profiles 110 USB profile Description Restrictions: Virtual CD-ROM and disk drives cannot be used simultaneously Suse 9.2 SuSE Li
Chapter 6: USB Profiles 111 USB profile Description Virtual CD-ROM and disk drives cannot be used simultaneously WARNING: USB enumeration will
Chapter 6: USB Profiles 112 Mouse Modes when Using the Mac OS-X USB Profile with a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X® USB p
113 In This Chapter User Groups ... 113 Users ...
Chapter 7: User Management 114 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good
Chapter 7: User Management 115 The Group page is organized into the following categories: Group, Permissions, Port Permissions, and IP ACL. 2. T
Chapter 7: User Management 116 3. Select the appropriate permissions. 4. Click OK. Note: See Alternate RADIUS Authentication Settings for inform
Chapter 7: User Management 117 Permission Description Management authentication (LDAP/LDAPS/RADIUS), login settings Port Permissions For each s
Chapter 7: User Management 118 Group-Based IP ACL (Access Control List) Important: Exercise caution when using group-based IP access control. It i
Chapter 7: User Management 119 4. Click Insert. If the rule number you just typed equals an existing rule number, the new rule is placed ahead o
Chapter 1: Introduction 3 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) K
Chapter 7: User Management 120 4. Set the IP ACL (optional). This feature limits access to the KSX II device by specifying IP addresses. See Grou
Chapter 7: User Management 121 Adding a New User It is a good idea to define user groups before creating KSX II users because, when you add a use
Chapter 7: User Management 122 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management &g
Chapter 7: User Management 123 Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user i
Chapter 7: User Management 124 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking pr
Chapter 7: User Management 125 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin sear
Chapter 7: User Management 126 13. Select the Enable Secure LDAP checkbox if you would like to use SSL. This will enable the Enable LDAPS Server C
Chapter 7: User Management 127 18. The KSX II provides you with the ability to test the LDAP configuration from the Authentication Settings page
Chapter 7: User Management 128 4. From the KSX II, enable and configure your AD server properly. See Implementing LDAP/LDAPS Remote Authenticatio
Chapter 7: User Management 129 8. The Timeout is recorded in seconds and default timeout is 1 second, but can be changed as required. The time
Chapter 1: Introduction 4 What's New in Help The following information has been added based on enhancements and changes to the equipment and/
Chapter 7: User Management 130 CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PA
Chapter 7: User Management 131 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KSX II determines t
Chapter 7: User Management 132 Attribute Data Log out Accounting-Request(4) Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VI
Chapter 7: User Management 133 User Authentication Process Remote authentication follows the process specified in the flowchart below:
Chapter 7: User Management 134 Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Passwo
135 In This Chapter Network Settings ... 135 Device Services ...
Chapter 8: Device Management 136 Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For co
Chapter 8: Device Management 137 d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the d
Chapter 8: Device Management 138 See LAN Interface Settings (on page 138) for information in configuring this section of the Network Settings page
Chapter 8: Device Management 139 Autodetect (default option) 10 Mbps/Half - Both LEDs blink 10 Mbps/Full - Both LEDs blink 100 Mbps/H
Chapter 1: Introduction 5 KSX II Help The KSX II help provides information on how to install, set up, and configure the KSX II. It also includes
Chapter 8: Device Management 140 Device Services The Device Services page allows you to configure the following functions: Enabling Telnet
Chapter 8: Device Management 141 HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KSX II. For example,
Chapter 8: Device Management 142 Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Log
Chapter 8: Device Management 143 3. Click OK. Configuring Direct Port Access via Telnet, IP Address or SSH The information in this topic is sp
Chapter 8: Device Management 144 Configure the Telnet TCP Port as "7770". Once this is done, connection to the target can be done using
Chapter 8: Device Management 145 Once you have created the direct port access, it can be connected in a client application such as PuTTY. Followi
Chapter 8: Device Management 146 Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use th
Chapter 8: Device Management 147 3. Click OK. Configuring Modem Settings To configure modem settings: 1. Click Device Settings > Modem
Chapter 8: Device Management 148 Configuring Date/Time Settings Use the Date/Time Settings page to specify the date and time for the KSX II. There
Chapter 8: Device Management 149 6. Click OK. Event Management The KSX II Event Management feature allows you enable and disable the distribut
Chapter 1: Introduction 6 Virtual Media All KSX II models support virtual media. The benefits of virtual media - mounting of remote drives/media o
Chapter 8: Device Management 150 Configuring Event Management Settings SNMP Configuration Simple Network Management Protocol (SNMP) is a protocol
Chapter 8: Device Management 151 4. Type the Agent Community String (the device's string). An SNMP community is the group that devices and
Chapter 8: Device Management 152 Configuring Event Management - Destinations System events, if enabled, can generate SNMP notification events (tra
Chapter 8: Device Management 153 SNMP Trap Configuration SNMP provides the ability to send traps, or notifications, to advise an administrator wh
Chapter 8: Device Management 154 Trap name Description network. networkParameterChanged A change has been made to the network parameters. password
Chapter 8: Device Management 155 Trap name Description userAuthenticationFailure A user attempted to log in without a correct username and/or pas
Chapter 8: Device Management 156 Port Name - The name assigned to the port. A port name displayed in black indicates that you cannot change the
Chapter 8: Device Management 157 For serial ports, the Port page for serial ports is opened.
Chapter 8: Device Management 158 Power Control Power control is configured on the Port page. The Port page opens when you select a port that is co
Chapter 8: Device Management 159 Assigning a Name to the PX The Port page opens when you select a port on the Port Configuration page. The port a
Chapter 1: Introduction 7 KSX II 144 and 188 CIM Serial Adapter Product Features Hardware KVM and serial remote access over IP 1U rack
Chapter 8: Device Management 160 To remove a rack PDU association: 1. Select the appropriate rack PDU from the Power Strip Name drop-down list.
Chapter 8: Device Management 161 Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade ch
Chapter 8: Device Management 162 The use of hot key sequences to switch KVM access to a blade chassis is also supported. For blade chassis that al
Chapter 8: Device Management 163 3. On the Port Configuration page, click on the name of the blade chassis you want to configure. The Port page
Chapter 8: Device Management 164 c. Username - Enter the username used to access the interface. Optional d. Password - Enter the password used t
Chapter 8: Device Management 165 To configure a Dell PowerEdge M1000e: 1. If you selected Dell PowerEdge™ M1000e, auto-discovery is available.
Chapter 8: Device Management 166 The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access
Chapter 8: Device Management 167 b. Maximum Number of Slots - The default maximum number of slots available on the blade chassis is automaticall
Chapter 8: Device Management 168 e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be as
Chapter 8: Device Management 169 d. Port Number - The default port number for the blade chassis is 22. Change the port number if applicable. Req
Chapter 1: Introduction 8 Software Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs Absolute Mouse Synchronization with D2CIM-VUSB CIM and
Chapter 8: Device Management 170 Note: Leave the username and password fields blank for DRAC, ILO, and RSA web applications or the connection will
Chapter 8: Device Management 171 4. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade
Chapter 8: Device Management 172 Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device wi
Chapter 8: Device Management 173 HP Blade Chassis Configuration (Port Group Management) The KSX II supports the aggregation of ports connected to
Chapter 8: Device Management 174 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. S
Chapter 8: Device Management 175 To delete a port group: 1. Click on the Port Group Management page, select the checkbox of the port group you
Chapter 8: Device Management 176 Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KSX
Chapter 8: Device Management 177 Blade chassis Connection method Recommended CIM(s) M1000e with this chassis. The iKVM is compatible with the fol
Chapter 8: Device Management 178 Blade chassis Connection method Recommended CIM(s) one Advanced Management Module. In contrast to the standard Bl
Chapter 8: Device Management 179 Blade chassis Required/recommended action Slot, not by Name. iKVM may not work correctly if this is not done.
Chapter 1: Introduction 9 Item Description USB port Remote indicator light LAN1 and LAN2 indicator lights Power indicator light
Chapter 8: Device Management 180 Blade chassis Required/recommended action management module. The SSH port configured on the blade chassis mana
Chapter 8: Device Management 181 Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles
Chapter 8: Device Management 182 Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appear in the Selec
Chapter 8: Device Management 183 2. Click Remove. The selected profiles appear in the Available list. These profiles are no longer available for
Chapter 8: Device Management 184 German (Germany) JIS (Japanese Industry Standard) Simplified Chinese Traditional Chinese Dubeolsik
Chapter 8: Device Management 185 a. Select the Power Save Mode checkbox. b. Set the amount of time (in minutes) in which Power Save Mode will b
Chapter 8: Device Management 186 Port Keywords Port keywords work as a filter. If a keyword is detected, a corresponding message be logged in a lo
Chapter 8: Device Management 187 2. Define a keyword for the first time, by clicking the Add button on the Port Keyword List page. The Add Keywo
Chapter 8: Device Management 188 Port Group Management This function is specific to HP blade chassis configuration. See HP Blade Chassis Configura
189 In This Chapter Security Settings ... 189 Configuring IP Acces
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, repro
Chapter 1: Introduction 10 Item Description AC power cord plug See Power Control (on page 158) for additional information. Power on/off switch
Chapter 9: Security Management 190 To reset back to defaults: Click Reset to Defaults. Login Limitations Using login limitations, you can s
Chapter 9: Security Management 191 Limitation Description change is required. The default is 60 days. Log out idle users, After (1-365 minutes) S
Chapter 9: Security Management 192 Field Description numeric character character is required in the password. Enforce at least one printable speci
Chapter 9: Security Management 193 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after
Chapter 9: Security Management 194 Encryption mode Description Auto This is the recommended option. The KSX II autonegotiates to the highest level
Chapter 9: Security Management 195 2. Apply Encryption Mode to KVM and Virtual Media. When selected, this option applies the selected encryption
Chapter 9: Security Management 196 Checking Your Browser for AES Encryption The KSX II supports AES-256. If you do not know if your browser uses A
Chapter 9: Security Management 197 For additional security, you can also create a new Certificate Signing Request once FIPS mode is activated. Th
Chapter 9: Security Management 198 Configuring IP Access Control Using IP access control, you can control access to your KSX II. By setting a glob
Chapter 9: Security Management 199 4. Click Insert. If the rule # you just typed equals an existing rule #, the new rule is placed ahead of the
Chapter 1: Introduction 11 Terminology This manual uses the following terminology for the components of a typical KSX II configuration:
Chapter 9: Security Management 200 SSL Certificates The KSX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic betwe
Chapter 9: Security Management 201 j. Key length - The length of the generated key in bits. 1024 is the default. k. Select the Create a Self-
Chapter 9: Security Management 202 Security Banner KSX II provides you with the ability to add a security banner to the KSX II login process. This
Chapter 9: Security Management 203 Note: You cannot upload a text file from the local port.
204 In This Chapter Maintenance Features (Local/Remote Console) ... 204 Audit Log...
Chapter 10: Maintenance 205 Audit Log A log is created of the KSX II system events. To view the audit log for your KSX II: 1. Choose Maintenan
Chapter 10: Maintenance 206 Device Information The Device Information page provides detailed information about your KSX II device and the CIMs in
Chapter 10: Maintenance 207 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your K
Chapter 10: Maintenance 208 If you are using Internet Explorer 6 or higher, to backup your KSX II: 1. Click Backup. A File Download dialog appe
Chapter 10: Maintenance 209 Full Restore - A complete restore of the entire system. Generally used for traditional backup and restore purposes
Chapter 1: Introduction 12 Diagram key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) KSX II Local Access Console
Chapter 10: Maintenance 210 USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech s
Chapter 10: Maintenance 211 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing
Chapter 10: Maintenance 212 3. Click the Upgrade button. You are prompted to confirm the upgrade. 4. Click OK to continue the upgrade. Progress
Chapter 10: Maintenance 213 7. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed (if y
Chapter 10: Maintenance 214 9. As prompted, close the browser and wait approximately 5 minutes before logging on to the KSX II again. Upgrade
Chapter 10: Maintenance 215 Information is provided about the KSX II upgrade(s) that have been run, the final status of the upgrade, the start an
Chapter 10: Maintenance 216 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. CC Unmanage When a K
Chapter 10: Maintenance 217 Stopping CC-SG Management While the KSX II is under CC-SG management, if you try to access the device directly, you a
Chapter 10: Maintenance 218 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed
219 The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the KSX II device. All of the Diagnostic
Chapter 1: Introduction 13 Diagram key serial port connected remotely via KSX II. Routers Dominion PX Rack PDU (Power Strip) Raritan rack PDUs
Chapter 11: Diagnostics 220 Statistics - Produces a page similar to the one displayed here. Interfaces - Produces a page similar to the one
Chapter 11: Diagnostics 221 Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display
Chapter 11: Diagnostics 222 3. Click Ping. The results of the ping are displayed in the Result field. Trace Route to Host Page Trace route is a
Chapter 11: Diagnostics 223 Device Diagnostics Note: This page is for use by Raritan field engineers or when you are directed by Raritan Technica
Chapter 11: Diagnostics 224 3. To create a diagnostics file to send to Raritan Technical Support: a. Click the Save to File button. The File Dow
225 In This Chapter Overview ... 226 Accessing the KSX
Chapter 12: Command Line Interface (CLI) 226 Overview The KSX II Serial Console supports all serial devices such as: Servers, including Windows
Chapter 12: Command Line Interface (CLI) 227 Accessing the KSX II Using CLI Access the KSX II by using one of the following methods: Telnet vi
Chapter 12: Command Line Interface (CLI) 228 Telnet Connection to the KSX II Due to the lack of security, user name, password and all traffic is
Chapter 12: Command Line Interface (CLI) 229 Port Settings Ensure that the port settings (serial communication parameters) are configured as foll
14 In This Chapter Overview ... 14 Default Login Inf
Chapter 12: Command Line Interface (CLI) 230 After reviewing the following Navigation of the CLI (on page 231) section, perform the Initial Config
Chapter 12: Command Line Interface (CLI) 231 login as: Janet Password: Authentication successful. ----------------------------------------------
Chapter 12: Command Line Interface (CLI) 232 CLI Syntax -Tips and Shortcuts Tips Commands are listed in alphabetical order. Commands are not
Chapter 12: Command Line Interface (CLI) 233 Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same co
Chapter 12: Command Line Interface (CLI) 234 The KSX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally usin
Chapter 12: Command Line Interface (CLI) 235 Security Issues Elements to consider when addressing security for console servers: Encrypting the
Chapter 12: Command Line Interface (CLI) 236 Port Sharing Using CLI It is possible for access client users to share ports with other authenticated
Chapter 12: Command Line Interface (CLI) 237 Interface Command The Interface command is used to configure the KSX II network interface. The synta
Chapter 12: Command Line Interface (CLI) 238 Connect Commands The connect commands provide a means to access ports and their history. Command Desc
Chapter 12: Command Line Interface (CLI) 239 IPv6 Command Use the IPv6_command to set IPv6 network parameters and retrieve existing IPv6 paramete
Chapter 2: Installation and Configuration 15 Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that wi
240 In This Chapter Overview ... 240 Using the KSX II
Chapter 13: KSX II Local Console 241 KSX II Local Console Interface When you are located at the server rack, the KSX II provides standard KVM man
Chapter 13: KSX II Local Console 242 Local Console Smart Card Access To use a smart card to access a server at the Local Console, plug a USB smart
Chapter 13: KSX II Local Console 243 To update the Card Readers Detected list: Click Refresh if a new smart card has been mounted. The Card
Chapter 13: KSX II Local Console 244 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field.
Chapter 13: KSX II Local Console 245 Port Access Page (Local Console Server Display) After you login to the KSX II Local Console, the Port Access
Chapter 13: KSX II Local Console 246 3. Click the Port Name of the target server you want to access. The Port Action Menu appears. See Port Actio
Chapter 13: KSX II Local Console 247 Status - The Status is either up or down. To change the sort order: Click the column heading you wan
Chapter 13: KSX II Local Console 248 Blade chassis Connect key action Key sequence example Switch between ports Switch from target port 5, slot 2
Chapter 13: KSX II Local Console 249 Language Regions Keyboard layout Japanese Japan JIS Keyboard French France French (AZERTY) l
Chapter 2: Installation and Configuration 16 Operating System Mouse and Video Settings This section provides video mode and mouse information spec
Chapter 13: KSX II Local Console 250 Sun key Local port key combination Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KP
Chapter 13: KSX II Local Console 251 KSX II Local Console Local Port Settings From the Local Port Settings page, you can customize many settings
Chapter 13: KSX II Local Console 252 Hot key: Take this action: Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key
Chapter 13: KSX II Local Console 253 10. Click OK. To reset back to defaults: Click Reset to Defaults. KSX II Local Console Factory Reset
Chapter 13: KSX II Local Console 254 Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defa
Chapter 13: KSX II Local Console 255 2. Use a pointed object to press and hold the Reset button. 3. While continuing to hold the Reset button,
256 In This Chapter Certified Modems for UNIX, Linux and MPC ... 256 Low Bandwidth KVM Settings ...
Chapter 14: Modem Configuration 257 Low Bandwidth KVM Settings Following are the settings that Raritan recommends in order to achieve optimum per
Chapter 14: Modem Configuration 258 Setting To achieve optimum performance: enable this option. Client Dial-Up Networking Configuration Configur
Chapter 14: Modem Configuration 259 3. Click Next and follow the steps in the Network Connection Wizard dialog to create custom dial-up network
Chapter 2: Installation and Configuration 17 Windows Vista Settings To configure KVM target servers running Windows Vista® operating system: 1.
Chapter 14: Modem Configuration 260 6. Type the area code and phone number you wish to dial in the appropriate fields. 7. Click the Country/regi
Chapter 14: Modem Configuration 261 9. Click the Only for myself radio button in the Connection Availability dialog. 10. Click Next. The Networ
Chapter 14: Modem Configuration 262 Note: In order to access the KSX II, the username and password cannot use a \ (backslash). 7. Click Connect.
Chapter 14: Modem Configuration 263 3. Click the Connect to the Internet radio button and click Next.
Chapter 14: Modem Configuration 264 4. Click the "Set up my connection manually" radio button and click Next.
Chapter 14: Modem Configuration 265 5. Click the "Connect using a dial-up modem" radio button and click Next.
Chapter 14: Modem Configuration 266 6. Type a name to identify this particular connection in the ISP Name field and click Next.
Chapter 14: Modem Configuration 267 7. Type the phone number for the connection in the Phone number field and click Next. 8. Type your ISP inf
Chapter 14: Modem Configuration 268 9. Select the checkbox before the appropriate option below the fields and click Next. 10. Click Finish. 11.
269 In This Chapter Physical Specifications ... 269 Supported Operating Syst
Chapter 2: Installation and Configuration 18 Set the mouse motion speed setting to exactly the middle speed. Disable the "Enhanced poin
Appendix A: Specifications 270 Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client an
Appendix A: Specifications 271 Mode Operating system Browser Windows Server 2003® Internet Explorer 6.0 SP1++, IE 7, IE 8 Firefox 1.06 - 3
Appendix A: Specifications 272 Supported Dominion CIMs & D2CIMs Operating system and serial devices (where applicable) Virtual media Absolute
Appendix A: Specifications 273 Target server Supported CIMs Mouse modes 4.0 and 5.0 DCIM-USB G2 Workstation 3.0) SUSE Linux Professional 9.2 and
Appendix A: Specifications 274 Supported Browsers KSX II supports the following browsers: Internet Explorer® 6, 7 and 8 Firefox® 1.5, 2.0, a
Appendix A: Specifications 275 Supported Paragon CIMS and Configurations The KSX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL CIMs, which pr
Appendix A: Specifications 276 KSX II to KSX II Guidelines The following system configuration guidelines should be followed when you are using Par
Appendix A: Specifications 277 If a connection to the target is in place from the other KSX II, the availability is checked when a connection is
Appendix A: Specifications 278 Paragon II operation mode Mode description Supported? PC Share A server or other device on a specific channel port
Appendix A: Specifications 279 Supported Video Resolutions Ensure that each target server's video resolution and refresh rate are supported
Chapter 2: Installation and Configuration 19 Deselect the "Use the following transition effect for menus and tooltips" option. 3. C
Appendix A: Specifications 280 Note: Composite Sync and Sync-on-Green video require an additional adapter. Note: Some resolutions may not be avail
Appendix A: Specifications 281 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 14
Appendix A: Specifications 282 Smart Card Readers Supported and Unsupported Smart Card Readers Only USB type external smart card readers are suppo
Appendix A: Specifications 283 This table contains a list of readers that Raritan has tested with the KSX II and we know not to work, therefore t
Appendix A: Specifications 284 Windows XP® operating system targets must be running Windows XP SP3 in order to use smart cards with the KSX II. If
Appendix A: Specifications 285 SuSE 11 pcsc-lite-1.4.102-1.24 Fedora® Core 10 pcsc-lite-1.4.102.3.fc10.i386 Create a Java™ Library Link A soft
Appendix A: Specifications 286 Local access Local Access for “crash-cart” applications. See Connectivity (on page 290) for a list of necessary KSX
Appendix A: Specifications 287 Port Description field to access the KSX II, but while still preserving complete security. HTTPS, Port 443 This po
Appendix A: Specifications 288 Port Description The default is port 22. Telnet Telnet port can be configured but is not recommended. The default
Appendix A: Specifications 289 Network Speed Settings KSX II network speed setting Network switch port setting Auto 1000/Full 100/Full 100/Ha
iii Contents Chapter 1 Introduction 1 KSX II Overview ...
Chapter 2: Installation and Configuration 20 SUSE Linux 10.1 Settings Note: Do not attempt to synchronize the mouse at the SUSE Linux® login promp
Appendix A: Specifications 290 Functions; not recommended NOT supported by Ethernet specification; product will communicate, but collisions wi
Appendix A: Specifications 291 Vendor Device Console connector Serial connection Silicon Graphics Origin CAT 5 cable Sun™ SPARCStation DB25F ASCS
Appendix A: Specifications 292 RJ-45 (female) DB9 (female) 1 8 2 1, 6 3 2 4 SHELL 5 5 6 3 7 4 8 7 DB9M Nulling Serial Adapter Pinouts RJ-45 (fe
Appendix A: Specifications 293 RJ-45 (female) DB25 (female) 8 4 DB25M Nulling Serial Adapter Pinouts RJ-45 (female) DB25 (male) 1 5 2 6, 8 3 3
294 IMPORTANT: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...
Appendix B: Updating the LDAP/LDAPS Schema 295 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to writ
Appendix B: Updating the LDAP/LDAPS Schema 296 3. Click New and then choose Attribute. When the warning message appears, click Continue and the C
Appendix B: Updating the LDAP/LDAPS Schema 297 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the
Appendix B: Updating the LDAP/LDAPS Schema 298 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Obje
Appendix B: Updating the LDAP/LDAPS Schema 299 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit wi
Chapter 2: Installation and Configuration 21 Tip: If you do not want to be prompted upon log out, follow these procedures instead. To make your
Appendix B: Updating the LDAP/LDAPS Schema 300 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the use
301 In This Chapter Overview ... 301 Java ...
Appendix C: Informational Notes 302 Applications Prerequisites Supported MPC Applet Requires installation of Java Cryptography Extension (JCE) Unl
Appendix C: Informational Notes 303 The KSX II Remote Console and MPC require JRE™ to function. Java Runtime Environment™ (JRE) version 1.6.x or
Appendix C: Informational Notes 304 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux® Clients Only) The Virtual KVM Client and the M
Appendix C: Informational Notes 305 Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 doe
Appendix C: Informational Notes 306 Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using
Appendix C: Informational Notes 307 Macintosh Keyboard When a Macintosh® is used as the client, the following keys on the Mac® keyboard are not c
Appendix C: Informational Notes 308 Fedora Resolving Fedora Core Focus Using the Multi-Platform Client (MPC), occasionally there is an inability t
Appendix C: Informational Notes 309 USB Ports and Profiles VM-CIMs and DL360 USB Ports HP® DL360 servers have one USB port on the back of the dev
Chapter 2: Installation and Configuration 22 Display resolution Vertical refresh rate Aspect ratio 1280 x 1024 60,75,85 Hz 5:4 1152 x 864 75 Hz 4:
Appendix C: Informational Notes 310 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles,
Appendix C: Informational Notes 311 Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will
Appendix C: Informational Notes 312 Virtual Media Dell OptiPlex and Dimension Computers From certain Dell OptiPlex ™ and Dimension computers, it m
Appendix C: Informational Notes 313 CC-SG Virtual KVM Client Version Not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from
314 In This Chapter General Questions ... 315 Serial Access ...
Appendix D: FAQs 315 General Questions What is KSX II? The KSX II is a second generation digital KVM (Keyboard, Video Mouse) switch that enables
Appendix D: FAQs 316 In general, customers can continue to use their existing switches for many years. As their data centers expand, customers can
Appendix D: FAQs 317 Serial Access My Dominion KSX II has just been configured with a network address and I can successfully ping the IP, but whe
Appendix D: FAQs 318 Can I open multiple windows and "tile" to monitor multiple servers and other IT equipment? Yes, you may monitor a
Appendix D: FAQs 319 I have lost my Admin password to the Dominion KSX II. Is there a back door or secret password? There is no back-door passw
Chapter 2: Installation and Configuration 23 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click. 2. C
Appendix D: FAQs 320 What is the name of the terminal emulation package included with Dominion KSX II? Raritan Serial Console. What Authentication
Appendix D: FAQs 321 Yes. Can I use KSX II over a VPN connection? Yes, KSX II fits into most any network configuration utilizing TCP/IP. KSX II
Appendix D: FAQs 322 Go to the Raritan website (www.raritan.com) Support page to find the latest information about the KSX II serial pinouts (RJ-4
Appendix D: FAQs 323 USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services
Appendix D: FAQs 324 Do I need a special CIM to use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan pro
Appendix D: FAQs 325 IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Protocol Version 6”. IPv6 is the “next generation” IP protoc
Appendix D: FAQs 326 Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6. The KSX II User Guide describes t
Appendix D: FAQs 327 Speed Description Time 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network speed .4
Appendix D: FAQs 328 Ethernet and IP Networking Does the KSX II offer dual gigabit Ethernet ports to provide redundant fail-over, or load balancin
Appendix D: FAQs 329 Use case Required bandwidth Idle Windows Desktop 0 Mbps Move Static 400x600 Window/Dialog 0.35Mbps Navigate Start Menu 0.49M
Chapter 2: Installation and Configuration 24 IBM AIX 5.3 Settings Follow these steps to configure KVM target servers running IBM® AIX™ 5.3. To c
Appendix D: FAQs 330 What is the slowest connection (lowest bandwidth) over which the KSX II can operate? 33Kbps or above is recommended for accep
Appendix D: FAQs 331 If an external authentication server (such as LDAP/LDAPS, Active Directory, RADIUS, and so forth) is used, the KSX II allows
Appendix D: FAQs 332 Servers Does the KSX II depend on a Windows® server to operate? No. The KSX II is completely independent. Even if a user choo
Appendix D: FAQs 333 Are the Paragon Blade CIMs used? No, the Paragon II Blade CIM will not work with the KSX II. Which CIM should I use? It depe
Appendix D: FAQs 334 I'm running VMware on some of my blade servers. Is this supported? Yes, with CC-SG you can display and access virtual ma
Appendix D: FAQs 335 Installation Besides the device itself, what do I need to order from Raritan to install the KSX II? Each server that connect
Appendix D: FAQs 336 The KSX II models range from 4 to 8 server ports in a 1U chassis. This is the industry's highest digital KVM switch port
Appendix D: FAQs 337 Local Port Can I access my servers directly from the rack? Yes. At the rack, the KSX II functions just like a traditional KV
Appendix D: FAQs 338 Yes. The local port presentation is identical and completely in sync with remote access clients, as well as Raritan's op
Appendix D: FAQs 339 Power Control Does the power supply used by the KSX II automatically detect voltage settings? Yes. The KSX II's power
Chapter 2: Installation and Configuration 25 To take advantage of the KSX II: The firewall must allow inbound communication on: Web-access capabi
Appendix D: FAQs 340 Scalability How do I connect multiple KSX II devices together into one solution? Multiple KSX II devices do not need to be
Appendix D: FAQs 341 Security Is the KSX II FIPS 140-2 Certified? The KX II 2.2.0 and later, and the KSX II 2.3.0 and later, provides users with
Appendix D: FAQs 342 Yes, the KSX II has administrator-configurable, strong password checking to ensure that user-created passwords meet corporate
Appendix D: FAQs 343 Smart Cards and CAC Authentication Does the KSX II support smart card and CAC authentication? Yes, smart cards and DoD Commo
Appendix D: FAQs 344 Managability Can the KSX II be remotely managed and configured via web browser? Yes, the KSX II can be completely configure
Appendix D: FAQs 345 Miscellaneous What is the KSX II's default IP address? 192.168.0.192 What is the KSX II's default user name and
347 A A. AC Power • 25 Absolute Mouse Mode • 73 Accessing a Target Server • 250 Accessing Telnet from a Windows PC • 228 Accessing the KSX II Using
Index 348 Create User Groups and Users • 37 Creating a New Attribute • 295 D D. KVM Target Server Ports • 27 DB25F Nulling Serial Adapter Pinouts
Index 349 K Key Combinations and the Java Runtime Environment (JRE) • 306 Keyboard Language Preference (Fedora Linux Clients) • 305 Keyboard Macr
Chapter 2: Installation and Configuration 26 B. Network Port The KSX II provides two Ethernet ports for failover purposes (not for load-balancing)
Index 350 Port Action Menu • 46, 246 Port Group Management • 188 Port Keywords • 186 Port Permissions • 115, 117 Port Settings • 229 Port Sharing
Index 351 Supported CIMs for Blade Chassis • 162, 164, 168, 176 Supported Keyboard Languages • 248 Supported Operating Systems (Clients) • 4, 270
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then P
Chapter 2: Installation and Configuration 27 Connection Description Mouse Attach either a standard PS/2 mouse to the Mini-DIN6 (female) mouse por
Chapter 2: Installation and Configuration 28 E. Rack PDU (Power Strip) To connect the Dominion PX to the KSX II: 1. Plug one end of a Cat5 cabl
Chapter 2: Installation and Configuration 29 Diagram key KSX II PX serial port KSX II Power Ctrl. 1 Port or Power Ctrl. 2 Port Cat5 cable PX
Contents iv Connection Information ... 60 Keyboa
Chapter 2: Installation and Configuration 30 Vendor Device Console connector Serial connection Graphics Sun™ SPARCStation DB25F ASCSDB25M adapter
Chapter 2: Installation and Configuration 31 5. Click Apply. 6. You will receive confirmation that the password was successfully changed. Click
Chapter 2: Installation and Configuration 32 a. Select the IPv6 checkbox to activate the fields in the section. b. Enter a Global/Unique IP Addr
Chapter 2: Installation and Configuration 33 See LAN Interface Settings (on page 138) for information in configuring this section of the Network
Chapter 2: Installation and Configuration 34 Character Description Character Description . Period | Pipe sign / Forward slash } Right brace < L
Chapter 2: Installation and Configuration 35 Configure the SSH TCP port as "7888". Once this is done, connection to the target can be d
Chapter 2: Installation and Configuration 36 Note to CC-SG Users Note to CC-SG Users If you are using the KSX II in a CC-SG configuration, perform
Chapter 2: Installation and Configuration 37 Create User Groups and Users As part of the initial configuration, you must define user groups and u
38 In This Chapter Interfaces ... 38 Proxy Server Con
Chapter 3: Working with Target Servers 39 The following sections of the user guide contain information about using specific interfaces to connect
Contents v Adding a New User Group ... 114 Modifying
Chapter 3: Working with Target Servers 40 KSX II Remote Console Interface The KSX II Remote Console is a browser-based graphical user interface th
Chapter 3: Working with Target Servers 41 Depending on your browser and security settings, you may see various security and certificate warnings.
Chapter 3: Working with Target Servers 42 Interface and Navigation KSX II Console Layout Both the KSX II Remote Console and the KSX II Local Conso
Chapter 3: Working with Target Servers 43 Left Panel The left panel of the KSX II interface contains the following information. Note that some in
Chapter 3: Working with Target Servers 44 Information Description When displayed? Connected Users The users, identified by their username and IP a
Chapter 3: Working with Target Servers 45 Port Access Page After successfully logging on to the KSX II Remote Console, the Port Access page appea
Chapter 3: Working with Target Servers 46 Availability - The Availability can be Idle, Connected, Busy, or Unavailable. Blade servers will have
Chapter 3: Working with Target Servers 47 Power On - Powers on the target server through the associated outlet. This option is visible only wh
Chapter 3: Working with Target Servers 48 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices yo
Chapter 3: Working with Target Servers 49 Note: Both IPv4 and IPv6 addresses are supported. Manage Favorites Page To open the Manage Favorit
Contents vi Encryption & Share ... 193
Chapter 3: Working with Target Servers 50 c. Click Save. 3. Click Refresh. The list of devices on the local subnet is refreshed. To add device
Chapter 3: Working with Target Servers 51 Adding, Deleting and Editing Favorites To add a device to your favorites list: 1. Choose Manage &g
Chapter 3: Working with Target Servers 52 Proxy Server Configuration for use with KSX II, MPC, VKC and AKC When the use of a Proxy Server is requi
Chapter 3: Working with Target Servers 53 start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true
Chapter 3: Working with Target Servers 54 Toolbar Note: The KX II-101 VKC interface is different from the other Dominion KX products. See VKC Tool
Chapter 3: Working with Target Servers 55 Button Button Name Description Full Screen Mode Maximizes the screen real estate to view the target se
Chapter 3: Working with Target Servers 56 To power off a target server: 1. From the KSX II Remote Console, click the Port Access tab to open it
Chapter 3: Working with Target Servers 57 After you have connected to a target server, you can change the USB profile as necessary. By default, t
Chapter 3: Working with Target Servers 58 Connection Properties The dynamic video compression algorithms maintain KVM console usability under vary
Chapter 3: Working with Target Servers 59 100 Mb Ethernet 10 Mb Ethernet 1.5 Mb (MAX DSL/T1) 1 Mb (Fast DSL/T1) 512 Kb (Medium DSL
Contents vii CLI Prompts ...
Chapter 3: Working with Target Servers 60 Connection Information To obtain information about your Virtual KVM Client connection: Choose Conne
Chapter 3: Working with Target Servers 61 Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Mac
Chapter 3: Working with Target Servers 62 10. Click Close to close the Keyboard Macros dialog. The macro will now appear on the Keyboard menu in t
Chapter 3: Working with Target Servers 63 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog
Chapter 3: Working with Target Servers 64 Auto-Sense Video Settings The Auto-sense Video Settings command forces a re-sensing of the video setting
Chapter 3: Working with Target Servers 65 The device can filter out the electrical interference of video output from graphics cards. This feature
Chapter 3: Working with Target Servers 66 Best possible video mode The device will perform the full Auto Sense process when switching targets o
Chapter 3: Working with Target Servers 67 Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on
Chapter 3: Working with Target Servers 68 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot f
Chapter 3: Working with Target Servers 69 Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software an
Contents viii Resetting the KSX II Using the Reset Button ... 254 Chapter
Chapter 3: Working with Target Servers 70 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, you will see two
Chapter 3: Working with Target Servers 71 Additional Notes for Intelligent Mouse Mode Be sure that there are no icons or applications in the u
Chapter 3: Working with Target Servers 72 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and sy
Chapter 3: Working with Target Servers 73 Please note that mouse configurations will vary on different target operating systems. Consult your OS
Chapter 3: Working with Target Servers 74 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mode: 1. Pre
Chapter 3: Working with Target Servers 75 Smart Cards For a list of supported smart cards, smart card readers, and additional system requirements
Chapter 3: Working with Target Servers 76 To update the smart card in the Select Smart Card Reader dialog: Click Refresh List if a new smart
Chapter 3: Working with Target Servers 77 US/International French (France) German (Germany) Japanese United Kingdom Korean (Kor
Chapter 3: Working with Target Servers 78 a. To configure the monitor on which the target viewer is launched: Select 'Monitor Client Wa
Chapter 3: Working with Target Servers 79 Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. Vie
Contents ix Setting the Registry to Permit Write Operations to the Schema ... 295 Creating a New Attr
Chapter 3: Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provides version information about the V
Chapter 3: Working with Target Servers 81 AKC Supported .NET Framework, Operating Systems and Browsers .NET Framework AKC requires Windows .NET®
Chapter 3: Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC: Ensure the cookies from the IP address of the device
Chapter 3: Working with Target Servers 83 1. To open MPC from a client running any supported browser, type http://IP-ADDRESS/mpc into the addres
Chapter 3: Working with Target Servers 84 Opening RSC from the Remote Console To open the Raritan Serial Console (RSC) from the Remote Console:
Chapter 3: Working with Target Servers 85 2. Enter the device's IP address, account information, and the desired target (port). 3. Click S
86 In This Chapter Overview ... 86 Turning Outlets O
Chapter 4: Rack PDU (Power Strip) Outlet Control 87 Initially, when you open the Powerstrip page, the power strips that are currently connected t
Chapter 4: Rack PDU (Power Strip) Outlet Control 88 5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its s
Chapter 4: Rack PDU (Power Strip) Outlet Control 89 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once t
Kommentare zu diesen Handbüchern