Raritan DKSXII-V2.3.0-0D-E Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Netzwerk-Switches Raritan DKSXII-V2.3.0-0D-E herunter. Raritan DKSXII-V2.3.0-0D-E User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 362
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Dominion KSX II

Copyright © 2010 Raritan, Inc. DKSXII-v2.3.0-0D-E December 2010 255-62-4030-00 Dominion KSX II User Guide Release 2.3.0

Seite 2 - VCCI Information (Japan)

Contents x Appendix D FAQs 314 General Questions ...

Seite 3 - Contents

90 In This Chapter Overview ... 91 Prerequisites for

Seite 4

Chapter 5: Virtual Media 91 Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client

Seite 5 - Contents

Chapter 5: Virtual Media 92

Seite 6

Chapter 5: Virtual Media 93 Diagram key Desktop PC CD/DVD drive KSX II USB mass storage device CIM PC hard drive Target server Remote f

Seite 7

Chapter 5: Virtual Media 94 Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different typ

Seite 8

Chapter 5: Virtual Media 95 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP® operating system administrator and standard

Seite 9

Chapter 5: Virtual Media 96 Using Virtual Media With the KSX II virtual media feature, you can mount up to two drives (of different types). These

Seite 10 - Index 347

Chapter 5: Virtual Media 97 Target Server  KVM target servers must support USB connected drives.  KVM target servers running the Windows 2000

Seite 11 - Introduction

Chapter 5: Virtual Media 98 File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access

Seite 12 - KSX II Overview

Chapter 5: Virtual Media 99 Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of th

Seite 13 - Chapter 1: Introduction

1 In This Chapter KSX II Overview ... 2 What's New in Hel

Seite 14 - What's New in Help

Chapter 5: Virtual Media 100 Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mou

Seite 15 - KSX II Client Applications

Chapter 5: Virtual Media 101 WARNING: Enabling Read/Write access can be dangerous! Simultaneous access to the same drive from more than one entit

Seite 16 - Product Photos

Chapter 5: Virtual Media 102 2. For internal and external CD-ROM or DVD-ROM drives: a. Choose the Local CD/DVD Drive option. b. Choose the driv

Seite 17 - Product Features

Chapter 5: Virtual Media 103 Disconnecting Virtual Media To disconnect the virtual media drives:  For local drives, choose Virtual Media >

Seite 18 - External Product Overview

104 In This Chapter Overview ... 104 CIM Compatibility

Seite 19

Chapter 6: USB Profiles 105 CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmwar

Seite 20 - Chapter 1: Introduction

Chapter 6: USB Profiles 106 USB profile Description Restrictions:  USB bus speed limited to full-speed (12 MBit/s)  No virtual media support B

Seite 21 - Terminology

Chapter 6: USB Profiles 107 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.

Seite 22

Chapter 6: USB Profiles 108 USB profile Description Module D2CIM-DVUSB is connected to the Advanced Management Module. Restrictions:  Virtual CD

Seite 23 - Package Contents

Chapter 6: USB Profiles 109 USB profile Description Installation) Use this profile for the HP Proliant DL360/DL380 G4 series server when installi

Seite 24 - Chapter 2

Chapter 1: Introduction 2 KSX II Overview Raritan's Dominion KSX II is an enterprise-class, secure digital device that provides a single inte

Seite 25 - Getting Started

Chapter 6: USB Profiles 110 USB profile Description Restrictions:  Virtual CD-ROM and disk drives cannot be used simultaneously Suse 9.2 SuSE Li

Seite 26

Chapter 6: USB Profiles 111 USB profile Description  Virtual CD-ROM and disk drives cannot be used simultaneously WARNING: USB enumeration will

Seite 27 - Windows Vista Settings

Chapter 6: USB Profiles 112 Mouse Modes when Using the Mac OS-X USB Profile with a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X® USB p

Seite 28 - Windows 2000 Settings

113 In This Chapter User Groups ... 113 Users ...

Seite 29 - Linux Settings (Red Hat 4)

Chapter 7: User Management 114 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good

Seite 30 - SUSE Linux 10.1 Settings

Chapter 7: User Management 115 The Group page is organized into the following categories: Group, Permissions, Port Permissions, and IP ACL. 2. T

Seite 31 - Sun Solaris Settings

Chapter 7: User Management 116 3. Select the appropriate permissions. 4. Click OK. Note: See Alternate RADIUS Authentication Settings for inform

Seite 32 - Mouse Settings

Chapter 7: User Management 117 Permission Description Management authentication (LDAP/LDAPS/RADIUS), login settings Port Permissions For each s

Seite 33 - Video Settings (GUI)

Chapter 7: User Management 118 Group-Based IP ACL (Access Control List) Important: Exercise caution when using group-based IP access control. It i

Seite 34 - Apple Macintosh Settings

Chapter 7: User Management 119 4. Click Insert. If the rule number you just typed equals an existing rule number, the new rule is placed ahead o

Seite 35 - A. AC Power

Chapter 1: Introduction 3 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) K

Seite 36 - B. Network Port

Chapter 7: User Management 120 4. Set the IP ACL (optional). This feature limits access to the KSX II device by specifying IP addresses. See Grou

Seite 37 - D. KVM Target Server Ports

Chapter 7: User Management 121 Adding a New User It is a good idea to define user groups before creating KSX II users because, when you add a use

Seite 38 - E. Rack PDU (Power Strip)

Chapter 7: User Management 122 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management &g

Seite 39 - F. Serial Target Ports

Chapter 7: User Management 123 Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user i

Seite 40

Chapter 7: User Management 124 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking pr

Seite 41 - Assigning an IP Address

Chapter 7: User Management 125 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin sear

Seite 42

Chapter 7: User Management 126 13. Select the Enable Secure LDAP checkbox if you would like to use SSL. This will enable the Enable LDAPS Server C

Seite 43 - Naming Target Servers

Chapter 7: User Management 127 18. The KSX II provides you with the ability to test the LDAP configuration from the Authentication Settings page

Seite 44

Chapter 7: User Management 128 4. From the KSX II, enable and configure your AD server properly. See Implementing LDAP/LDAPS Remote Authenticatio

Seite 45

Chapter 7: User Management 129 8. The Timeout is recorded in seconds and default timeout is 1 second, but can be changed as required. The time

Seite 46

Chapter 1: Introduction 4 What's New in Help The following information has been added based on enhancements and changes to the equipment and/

Seite 47 - Create User Groups and Users

Chapter 7: User Management 130  CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PA

Seite 48 - Working with Target Servers

Chapter 7: User Management 131 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KSX II determines t

Seite 49

Chapter 7: User Management 132 Attribute Data Log out Accounting-Request(4) Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VI

Seite 50

Chapter 7: User Management 133 User Authentication Process Remote authentication follows the process specified in the flowchart below:

Seite 51

Chapter 7: User Management 134 Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Passwo

Seite 52 - KSX II Console Layout

135 In This Chapter Network Settings ... 135 Device Services ...

Seite 53 - Left Panel

Chapter 8: Device Management 136 Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For co

Seite 54

Chapter 8: Device Management 137 d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the d

Seite 55 - Port Access Page

Chapter 8: Device Management 138 See LAN Interface Settings (on page 138) for information in configuring this section of the Network Settings page

Seite 56 - Port Action Menu

Chapter 8: Device Management 139  Autodetect (default option)  10 Mbps/Half - Both LEDs blink  10 Mbps/Full - Both LEDs blink  100 Mbps/H

Seite 57

Chapter 1: Introduction 5 KSX II Help The KSX II help provides information on how to install, set up, and configure the KSX II. It also includes

Seite 58 - Managing Favorites

Chapter 8: Device Management 140 Device Services The Device Services page allows you to configure the following functions:  Enabling Telnet

Seite 59 - Favorites List Page

Chapter 8: Device Management 141 HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KSX II. For example,

Seite 60

Chapter 8: Device Management 142 Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Log

Seite 61 - Logging Out

Chapter 8: Device Management 143 3. Click OK. Configuring Direct Port Access via Telnet, IP Address or SSH The information in this topic is sp

Seite 62

Chapter 8: Device Management 144 Configure the Telnet TCP Port as "7770". Once this is done, connection to the target can be done using

Seite 63 - Virtual KVM Client (VKC)

Chapter 8: Device Management 145 Once you have created the direct port access, it can be connected in a client application such as PuTTY. Followi

Seite 64

Chapter 8: Device Management 146 Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use th

Seite 65

Chapter 8: Device Management 147 3. Click OK. Configuring Modem Settings To configure modem settings: 1. Click Device Settings > Modem

Seite 66

Chapter 8: Device Management 148 Configuring Date/Time Settings Use the Date/Time Settings page to specify the date and time for the KSX II. There

Seite 67

Chapter 8: Device Management 149 6. Click OK. Event Management The KSX II Event Management feature allows you enable and disable the distribut

Seite 68

Chapter 1: Introduction 6 Virtual Media All KSX II models support virtual media. The benefits of virtual media - mounting of remote drives/media o

Seite 69

Chapter 8: Device Management 150 Configuring Event Management Settings SNMP Configuration Simple Network Management Protocol (SNMP) is a protocol

Seite 70 - Keyboard Macros

Chapter 8: Device Management 151 4. Type the Agent Community String (the device's string). An SNMP community is the group that devices and

Seite 71 - Building a Keyboard Macro

Chapter 8: Device Management 152 Configuring Event Management - Destinations System events, if enabled, can generate SNMP notification events (tra

Seite 72 - Running a Keyboard Macro

Chapter 8: Device Management 153 SNMP Trap Configuration SNMP provides the ability to send traps, or notifications, to advise an administrator wh

Seite 73 - Refresh Screen

Chapter 8: Device Management 154 Trap name Description network. networkParameterChanged A change has been made to the network parameters. password

Seite 74 - Adjusting Video Settings

Chapter 8: Device Management 155 Trap name Description userAuthenticationFailure A user attempted to log in without a correct username and/or pas

Seite 75

Chapter 8: Device Management 156  Port Name - The name assigned to the port. A port name displayed in black indicates that you cannot change the

Seite 76

Chapter 8: Device Management 157  For serial ports, the Port page for serial ports is opened.

Seite 77

Chapter 8: Device Management 158 Power Control Power control is configured on the Port page. The Port page opens when you select a port that is co

Seite 78 - Using Screenshot from Target

Chapter 8: Device Management 159 Assigning a Name to the PX The Port page opens when you select a port on the Port Configuration page. The port a

Seite 79

Chapter 1: Introduction 7 KSX II 144 and 188 CIM Serial Adapter Product Features Hardware  KVM and serial remote access over IP  1U rack

Seite 80 - Mouse Synchronization Tips

Chapter 8: Device Management 160 To remove a rack PDU association: 1. Select the appropriate rack PDU from the Power Strip Name drop-down list.

Seite 81 - Standard Mouse Mode

Chapter 8: Device Management 161 Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade ch

Seite 82 - Intelligent Mouse Mode

Chapter 8: Device Management 162 The use of hot key sequences to switch KVM access to a blade chassis is also supported. For blade chassis that al

Seite 83 - Single Mouse Cursor

Chapter 8: Device Management 163 3. On the Port Configuration page, click on the name of the blade chassis you want to configure. The Port page

Seite 84

Chapter 8: Device Management 164 c. Username - Enter the username used to access the interface. Optional d. Password - Enter the password used t

Seite 85

Chapter 8: Device Management 165 To configure a Dell PowerEdge M1000e: 1. If you selected Dell PowerEdge™ M1000e, auto-discovery is available.

Seite 86

Chapter 8: Device Management 166 The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access

Seite 87

Chapter 8: Device Management 167 b. Maximum Number of Slots - The default maximum number of slots available on the blade chassis is automaticall

Seite 88 - Keyboard Limitations

Chapter 8: Device Management 168 e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be as

Seite 89 - Target Screen Resolution

Chapter 8: Device Management 169 d. Port Number - The default port number for the blade chassis is 22. Change the port number if applicable. Req

Seite 90 - Active KVM Client (AKC)

Chapter 1: Introduction 8 Software  Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs  Absolute Mouse Synchronization with D2CIM-VUSB CIM and

Seite 91 - Browser

Chapter 8: Device Management 170 Note: Leave the username and password fields blank for DRAC, ILO, and RSA web applications or the connection will

Seite 92 - Multi-Platform Client (MPC)

Chapter 8: Device Management 171 4. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade

Seite 93 - Raritan Serial Console (RSC)

Chapter 8: Device Management 172 Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device wi

Seite 94

Chapter 8: Device Management 173 HP Blade Chassis Configuration (Port Group Management) The KSX II supports the aggregation of ports connected to

Seite 95

Chapter 8: Device Management 174 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. S

Seite 96 - Control

Chapter 8: Device Management 175 To delete a port group: 1. Click on the Port Group Management page, select the checkbox of the port group you

Seite 97

Chapter 8: Device Management 176 Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KSX

Seite 98

Chapter 8: Device Management 177 Blade chassis Connection method Recommended CIM(s) M1000e with this chassis. The iKVM is compatible with the fol

Seite 99

Chapter 8: Device Management 178 Blade chassis Connection method Recommended CIM(s) one Advanced Management Module. In contrast to the standard Bl

Seite 100 - Virtual Media

Chapter 8: Device Management 179 Blade chassis Required/recommended action Slot, not by Name. iKVM may not work correctly if this is not done. 

Seite 101 - Overview

Chapter 1: Introduction 9 Item Description USB port Remote indicator light LAN1 and LAN2 indicator lights Power indicator light

Seite 102 - Chapter 5: Virtual Media

Chapter 8: Device Management 180 Blade chassis Required/recommended action management module.  The SSH port configured on the blade chassis mana

Seite 103 - Chapter 5: Virtual Media

Chapter 8: Device Management 181 Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles

Seite 104 - Dominion Device

Chapter 8: Device Management 182  Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appear in the Selec

Seite 105

Chapter 8: Device Management 183 2. Click Remove. The selected profiles appear in the Available list. These profiles are no longer available for

Seite 106 - Using Virtual Media

Chapter 8: Device Management 184  German (Germany)  JIS (Japanese Industry Standard)  Simplified Chinese  Traditional Chinese  Dubeolsik

Seite 107

Chapter 8: Device Management 185 a. Select the Power Save Mode checkbox. b. Set the amount of time (in minutes) in which Power Save Mode will b

Seite 108

Chapter 8: Device Management 186 Port Keywords Port keywords work as a filter. If a keyword is detected, a corresponding message be logged in a lo

Seite 109

Chapter 8: Device Management 187 2. Define a keyword for the first time, by clicking the Add button on the Port Keyword List page. The Add Keywo

Seite 110 - Connecting to Virtual Media

Chapter 8: Device Management 188 Port Group Management This function is specific to HP blade chassis configuration. See HP Blade Chassis Configura

Seite 111

189 In This Chapter Security Settings ... 189 Configuring IP Acces

Seite 112

This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, repro

Seite 113 - Disconnecting Virtual Media

Chapter 1: Introduction 10 Item Description AC power cord plug See Power Control (on page 158) for additional information. Power on/off switch

Seite 114 - USB Profiles

Chapter 9: Security Management 190 To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can s

Seite 115 - Available USB Profiles

Chapter 9: Security Management 191 Limitation Description change is required. The default is 60 days. Log out idle users, After (1-365 minutes) S

Seite 116 - Chapter 6: USB Profiles

Chapter 9: Security Management 192 Field Description numeric character character is required in the password. Enforce at least one printable speci

Seite 117 - Chapter 6: USB Profiles

Chapter 9: Security Management 193 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after

Seite 118

Chapter 9: Security Management 194 Encryption mode Description Auto This is the recommended option. The KSX II autonegotiates to the highest level

Seite 119

Chapter 9: Security Management 195 2. Apply Encryption Mode to KVM and Virtual Media. When selected, this option applies the selected encryption

Seite 120

Chapter 9: Security Management 196 Checking Your Browser for AES Encryption The KSX II supports AES-256. If you do not know if your browser uses A

Seite 121

Chapter 9: Security Management 197 For additional security, you can also create a new Certificate Signing Request once FIPS mode is activated. Th

Seite 122

Chapter 9: Security Management 198 Configuring IP Access Control Using IP access control, you can control access to your KSX II. By setting a glob

Seite 123 - User Management

Chapter 9: Security Management 199 4. Click Insert. If the rule # you just typed equals an existing rule #, the new rule is placed ahead of the

Seite 124 - Chapter 7: User Management

Chapter 1: Introduction 11 Terminology This manual uses the following terminology for the components of a typical KSX II configuration:

Seite 125

Chapter 9: Security Management 200 SSL Certificates The KSX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic betwe

Seite 126 - Permissions

Chapter 9: Security Management 201 j. Key length - The length of the generated key in bits. 1024 is the default. k. Select the Create a Self-

Seite 127 - Port Permissions

Chapter 9: Security Management 202 Security Banner KSX II provides you with the ability to add a security banner to the KSX II login process. This

Seite 128

Chapter 9: Security Management 203 Note: You cannot upload a text file from the local port.

Seite 129

204 In This Chapter Maintenance Features (Local/Remote Console) ... 204 Audit Log...

Seite 130

Chapter 10: Maintenance 205 Audit Log A log is created of the KSX II system events. To view the audit log for your KSX II: 1. Choose Maintenan

Seite 131

Chapter 10: Maintenance 206 Device Information The Device Information page provides detailed information about your KSX II device and the CIMs in

Seite 132

Chapter 10: Maintenance 207 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your K

Seite 133 - Authentication Settings

Chapter 10: Maintenance 208 If you are using Internet Explorer 6 or higher, to backup your KSX II: 1. Click Backup. A File Download dialog appe

Seite 134

Chapter 10: Maintenance 209  Full Restore - A complete restore of the entire system. Generally used for traditional backup and restore purposes

Seite 135

Chapter 1: Introduction 12 Diagram key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) KSX II Local Access Console

Seite 136

Chapter 10: Maintenance 210 USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech s

Seite 137

Chapter 10: Maintenance 211 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing

Seite 138

Chapter 10: Maintenance 212 3. Click the Upgrade button. You are prompted to confirm the upgrade. 4. Click OK to continue the upgrade. Progress

Seite 139

Chapter 10: Maintenance 213 7. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed (if y

Seite 140

Chapter 10: Maintenance 214 9. As prompted, close the browser and wait approximately 5 minutes before logging on to the KSX II again. Upgrade

Seite 141

Chapter 10: Maintenance 215 Information is provided about the KSX II upgrade(s) that have been run, the final status of the upgrade, the start an

Seite 142

Chapter 10: Maintenance 216 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. CC Unmanage When a K

Seite 143

Chapter 10: Maintenance 217 Stopping CC-SG Management While the KSX II is under CC-SG management, if you try to access the device directly, you a

Seite 144 - Changing a Password

Chapter 10: Maintenance 218 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed

Seite 145 - Device Management

219 The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the KSX II device. All of the Diagnostic

Seite 146 - Chapter 8: Device Management

Chapter 1: Introduction 13 Diagram key serial port connected remotely via KSX II. Routers Dominion PX Rack PDU (Power Strip) Raritan rack PDUs

Seite 147

Chapter 11: Diagnostics 220  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one

Seite 148

Chapter 11: Diagnostics 221  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display

Seite 149

Chapter 11: Diagnostics 222 3. Click Ping. The results of the ping are displayed in the Result field. Trace Route to Host Page Trace route is a

Seite 150 - Device Services

Chapter 11: Diagnostics 223 Device Diagnostics Note: This page is for use by Raritan field engineers or when you are directed by Raritan Technica

Seite 151

Chapter 11: Diagnostics 224 3. To create a diagnostics file to send to Raritan Technical Support: a. Click the Save to File button. The File Dow

Seite 152

225 In This Chapter Overview ... 226 Accessing the KSX

Seite 153

Chapter 12: Command Line Interface (CLI) 226 Overview The KSX II Serial Console supports all serial devices such as:  Servers, including Windows

Seite 154

Chapter 12: Command Line Interface (CLI) 227 Accessing the KSX II Using CLI Access the KSX II by using one of the following methods:  Telnet vi

Seite 155

Chapter 12: Command Line Interface (CLI) 228 Telnet Connection to the KSX II Due to the lack of security, user name, password and all traffic is

Seite 156

Chapter 12: Command Line Interface (CLI) 229 Port Settings Ensure that the port settings (serial communication parameters) are configured as foll

Seite 157 - Configuring Modem Settings

14 In This Chapter Overview ... 14 Default Login Inf

Seite 158

Chapter 12: Command Line Interface (CLI) 230 After reviewing the following Navigation of the CLI (on page 231) section, perform the Initial Config

Seite 159 - Event Management

Chapter 12: Command Line Interface (CLI) 231 login as: Janet Password: Authentication successful. ----------------------------------------------

Seite 160 - SNMP Configuration

Chapter 12: Command Line Interface (CLI) 232 CLI Syntax -Tips and Shortcuts Tips  Commands are listed in alphabetical order.  Commands are not

Seite 161 - Syslog Configuration

Chapter 12: Command Line Interface (CLI) 233 Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same co

Seite 162

Chapter 12: Command Line Interface (CLI) 234 The KSX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally usin

Seite 163 - SNMP Trap Configuration

Chapter 12: Command Line Interface (CLI) 235 Security Issues Elements to consider when addressing security for console servers:  Encrypting the

Seite 164

Chapter 12: Command Line Interface (CLI) 236 Port Sharing Using CLI It is possible for access client users to share ports with other authenticated

Seite 165 - Configuring Ports

Chapter 12: Command Line Interface (CLI) 237 Interface Command The Interface command is used to configure the KSX II network interface. The synta

Seite 166

Chapter 12: Command Line Interface (CLI) 238 Connect Commands The connect commands provide a means to access ports and their history. Command Desc

Seite 167

Chapter 12: Command Line Interface (CLI) 239 IPv6 Command Use the IPv6_command to set IPv6 network parameters and retrieve existing IPv6 paramete

Seite 168

Chapter 2: Installation and Configuration 15 Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that wi

Seite 169 - Assigning a Name to the PX

240 In This Chapter Overview ... 240 Using the KSX II

Seite 170

Chapter 13: KSX II Local Console 241 KSX II Local Console Interface When you are located at the server rack, the KSX II provides standard KVM man

Seite 171

Chapter 13: KSX II Local Console 242 Local Console Smart Card Access To use a smart card to access a server at the Local Console, plug a USB smart

Seite 172

Chapter 13: KSX II Local Console 243 To update the Card Readers Detected list:  Click Refresh if a new smart card has been mounted. The Card

Seite 173

Chapter 13: KSX II Local Console 244 3. Click OK. The USB profile will be applied to the local port and will appear in the Profile In Use field.

Seite 174

Chapter 13: KSX II Local Console 245 Port Access Page (Local Console Server Display) After you login to the KSX II Local Console, the Port Access

Seite 175

Chapter 13: KSX II Local Console 246 3. Click the Port Name of the target server you want to access. The Port Action Menu appears. See Port Actio

Seite 176

Chapter 13: KSX II Local Console 247  Status - The Status is either up or down. To change the sort order:  Click the column heading you wan

Seite 177

Chapter 13: KSX II Local Console 248 Blade chassis Connect key action Key sequence example Switch between ports Switch from target port 5, slot 2

Seite 178

Chapter 13: KSX II Local Console 249 Language Regions Keyboard layout Japanese Japan JIS Keyboard French France French (AZERTY) l

Seite 179

Chapter 2: Installation and Configuration 16 Operating System Mouse and Video Settings This section provides video mode and mouse information spec

Seite 180

Chapter 13: KSX II Local Console 250 Sun key Local port key combination Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KP

Seite 181

Chapter 13: KSX II Local Console 251 KSX II Local Console Local Port Settings From the Local Port Settings page, you can customize many settings

Seite 182

Chapter 13: KSX II Local Console 252 Hot key: Take this action: Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key

Seite 183

Chapter 13: KSX II Local Console 253 10. Click OK. To reset back to defaults:  Click Reset to Defaults. KSX II Local Console Factory Reset

Seite 184

Chapter 13: KSX II Local Console 254  Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defa

Seite 185

Chapter 13: KSX II Local Console 255 2. Use a pointed object to press and hold the Reset button. 3. While continuing to hold the Reset button,

Seite 186

256 In This Chapter Certified Modems for UNIX, Linux and MPC ... 256 Low Bandwidth KVM Settings ...

Seite 187

Chapter 14: Modem Configuration 257 Low Bandwidth KVM Settings Following are the settings that Raritan recommends in order to achieve optimum per

Seite 188

Chapter 14: Modem Configuration 258 Setting To achieve optimum performance: enable this option. Client Dial-Up Networking Configuration Configur

Seite 189

Chapter 14: Modem Configuration 259 3. Click Next and follow the steps in the Network Connection Wizard dialog to create custom dial-up network

Seite 190

Chapter 2: Installation and Configuration 17 Windows Vista Settings To configure KVM target servers running Windows Vista® operating system: 1.

Seite 191

Chapter 14: Modem Configuration 260 6. Type the area code and phone number you wish to dial in the appropriate fields. 7. Click the Country/regi

Seite 192

Chapter 14: Modem Configuration 261 9. Click the Only for myself radio button in the Connection Availability dialog. 10. Click Next. The Networ

Seite 193

Chapter 14: Modem Configuration 262 Note: In order to access the KSX II, the username and password cannot use a \ (backslash). 7. Click Connect.

Seite 194

Chapter 14: Modem Configuration 263 3. Click the Connect to the Internet radio button and click Next.

Seite 195

Chapter 14: Modem Configuration 264 4. Click the "Set up my connection manually" radio button and click Next.

Seite 196 - Port Keywords

Chapter 14: Modem Configuration 265 5. Click the "Connect using a dial-up modem" radio button and click Next.

Seite 197

Chapter 14: Modem Configuration 266 6. Type a name to identify this particular connection in the ISP Name field and click Next.

Seite 198 - Port Group Management

Chapter 14: Modem Configuration 267 7. Type the phone number for the connection in the Phone number field and click Next. 8. Type your ISP inf

Seite 199 - Security Management

Chapter 14: Modem Configuration 268 9. Select the checkbox before the appropriate option below the fields and click Next. 10. Click Finish. 11.

Seite 200

269 In This Chapter Physical Specifications ... 269 Supported Operating Syst

Seite 201

Chapter 2: Installation and Configuration 18  Set the mouse motion speed setting to exactly the middle speed.  Disable the "Enhanced poin

Seite 202

Appendix A: Specifications 270 Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client an

Seite 203

Appendix A: Specifications 271 Mode Operating system Browser Windows Server 2003®  Internet Explorer 6.0 SP1++, IE 7, IE 8  Firefox 1.06 - 3

Seite 204

Appendix A: Specifications 272 Supported Dominion CIMs & D2CIMs Operating system and serial devices (where applicable) Virtual media Absolute

Seite 205

Appendix A: Specifications 273 Target server Supported CIMs Mouse modes 4.0 and 5.0 DCIM-USB G2 Workstation 3.0) SUSE Linux Professional 9.2 and

Seite 206

Appendix A: Specifications 274 Supported Browsers KSX II supports the following browsers:  Internet Explorer® 6, 7 and 8  Firefox® 1.5, 2.0, a

Seite 207

Appendix A: Specifications 275 Supported Paragon CIMS and Configurations The KSX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL CIMs, which pr

Seite 208

Appendix A: Specifications 276 KSX II to KSX II Guidelines The following system configuration guidelines should be followed when you are using Par

Seite 209

Appendix A: Specifications 277 If a connection to the target is in place from the other KSX II, the availability is checked when a connection is

Seite 210 - SSL Certificates

Appendix A: Specifications 278 Paragon II operation mode Mode description Supported? PC Share A server or other device on a specific channel port

Seite 211

Appendix A: Specifications 279 Supported Video Resolutions Ensure that each target server's video resolution and refresh rate are supported

Seite 212 - Security Banner

Chapter 2: Installation and Configuration 19  Deselect the "Use the following transition effect for menus and tooltips" option. 3. C

Seite 213

Appendix A: Specifications 280 Note: Composite Sync and Sync-on-Green video require an additional adapter. Note: Some resolutions may not be avail

Seite 214 - Maintenance

Appendix A: Specifications 281 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 14

Seite 215 - Audit Log

Appendix A: Specifications 282 Smart Card Readers Supported and Unsupported Smart Card Readers Only USB type external smart card readers are suppo

Seite 216 - Device Information

Appendix A: Specifications 283 This table contains a list of readers that Raritan has tested with the KSX II and we know not to work, therefore t

Seite 217 - Backup and Restore

Appendix A: Specifications 284 Windows XP® operating system targets must be running Windows XP SP3 in order to use smart cards with the KSX II. If

Seite 218 - Chapter 10: Maintenance

Appendix A: Specifications 285 SuSE 11 pcsc-lite-1.4.102-1.24 Fedora® Core 10 pcsc-lite-1.4.102.3.fc10.i386  Create a Java™ Library Link A soft

Seite 219 - Chapter 10: Maintenance

Appendix A: Specifications 286 Local access Local Access for “crash-cart” applications. See Connectivity (on page 290) for a list of necessary KSX

Seite 220 - USB Profile Management

Appendix A: Specifications 287 Port Description field to access the KSX II, but while still preserving complete security. HTTPS, Port 443 This po

Seite 221 - Upgrading CIMs

Appendix A: Specifications 288 Port Description The default is port 22. Telnet Telnet port can be configured but is not recommended. The default

Seite 222 - Upgrading Firmware

Appendix A: Specifications 289 Network Speed Settings KSX II network speed setting Network switch port setting Auto 1000/Full 100/Full 100/Ha

Seite 223

iii Contents Chapter 1 Introduction 1 KSX II Overview ...

Seite 224 - Upgrade History

Chapter 2: Installation and Configuration 20 SUSE Linux 10.1 Settings Note: Do not attempt to synchronize the mouse at the SUSE Linux® login promp

Seite 225 - Rebooting

Appendix A: Specifications 290 Functions; not recommended NOT supported by Ethernet specification; product will communicate, but collisions wi

Seite 226 - CC Unmanage

Appendix A: Specifications 291 Vendor Device Console connector Serial connection Silicon Graphics Origin CAT 5 cable Sun™ SPARCStation DB25F ASCS

Seite 227

Appendix A: Specifications 292 RJ-45 (female) DB9 (female) 1 8 2 1, 6 3 2 4 SHELL 5 5 6 3 7 4 8 7 DB9M Nulling Serial Adapter Pinouts RJ-45 (fe

Seite 228

Appendix A: Specifications 293 RJ-45 (female) DB25 (female) 8 4 DB25M Nulling Serial Adapter Pinouts RJ-45 (female) DB25 (male) 1 5 2 6, 8 3 3

Seite 229 - Diagnostics

294 IMPORTANT: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...

Seite 230 - Chapter 11: Diagnostics

Appendix B: Updating the LDAP/LDAPS Schema 295 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to writ

Seite 231 - Ping Host Page

Appendix B: Updating the LDAP/LDAPS Schema 296 3. Click New and then choose Attribute. When the warning message appears, click Continue and the C

Seite 232 - Trace Route to Host Page

Appendix B: Updating the LDAP/LDAPS Schema 297 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the

Seite 233 - Device Diagnostics

Appendix B: Updating the LDAP/LDAPS Schema 298 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Obje

Seite 234

Appendix B: Updating the LDAP/LDAPS Schema 299 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit wi

Seite 235 - Command Line Interface (CLI)

Chapter 2: Installation and Configuration 21 Tip: If you do not want to be prompted upon log out, follow these procedures instead. To make your

Seite 236

Appendix B: Updating the LDAP/LDAPS Schema 300 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the use

Seite 237 - SSH Connection to the KSX II

301 In This Chapter Overview ... 301 Java ...

Seite 238

Appendix C: Informational Notes 302 Applications Prerequisites Supported MPC Applet Requires installation of Java Cryptography Extension (JCE) Unl

Seite 239 - Logging On

Appendix C: Informational Notes 303 The KSX II Remote Console and MPC require JRE™ to function. Java Runtime Environment™ (JRE) version 1.6.x or

Seite 240

Appendix C: Informational Notes 304 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux® Clients Only) The Virtual KVM Client and the M

Seite 241 - Navigation of the CLI

Appendix C: Informational Notes 305 Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 doe

Seite 242 - Shortcuts

Appendix C: Informational Notes 306 Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using

Seite 243

Appendix C: Informational Notes 307 Macintosh Keyboard When a Macintosh® is used as the client, the following keys on the Mac® keyboard are not c

Seite 244 - CLI Commands

Appendix C: Informational Notes 308 Fedora Resolving Fedora Core Focus Using the Multi-Platform Client (MPC), occasionally there is an inability t

Seite 245

Appendix C: Informational Notes 309 USB Ports and Profiles VM-CIMs and DL360 USB Ports HP® DL360 servers have one USB port on the back of the dev

Seite 246 - Configuring Network

Chapter 2: Installation and Configuration 22 Display resolution Vertical refresh rate Aspect ratio 1280 x 1024 60,75,85 Hz 5:4 1152 x 864 75 Hz 4:

Seite 247 - Name Command Example

Appendix C: Informational Notes 310 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles,

Seite 248

Appendix C: Informational Notes 311 Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will

Seite 249 - IPv6 Command

Appendix C: Informational Notes 312 Virtual Media Dell OptiPlex and Dimension Computers From certain Dell OptiPlex ™ and Dimension computers, it m

Seite 250 - KSX II Local Console

Appendix C: Informational Notes 313 CC-SG Virtual KVM Client Version Not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from

Seite 251 - Security and Authentication

314 In This Chapter General Questions ... 315 Serial Access ...

Seite 252

Appendix D: FAQs 315 General Questions What is KSX II? The KSX II is a second generation digital KVM (Keyboard, Video Mouse) switch that enables

Seite 253

Appendix D: FAQs 316 In general, customers can continue to use their existing switches for many years. As their data centers expand, customers can

Seite 254 - Available Resolutions

Appendix D: FAQs 317 Serial Access My Dominion KSX II has just been configured with a network address and I can successfully ping the IP, but whe

Seite 255

Appendix D: FAQs 318 Can I open multiple windows and "tile" to monitor multiple servers and other IT equipment? Yes, you may monitor a

Seite 256 - Server Display

Appendix D: FAQs 319 I have lost my Admin password to the Dominion KSX II. Is there a back door or secret password? There is no back-door passw

Seite 257 - Hot Keys and Connect Keys

Chapter 2: Installation and Configuration 23 4. Set the Threshold slider to 1.0. 5. Click OK. Accessing the Command Line 1. Right click. 2. C

Seite 258 - Supported Keyboard Languages

Appendix D: FAQs 320 What is the name of the terminal emulation package included with Dominion KSX II? Raritan Serial Console. What Authentication

Seite 259 - Special Sun Key Combinations

Appendix D: FAQs 321 Yes. Can I use KSX II over a VPN connection? Yes, KSX II fits into most any network configuration utilizing TCP/IP. KSX II

Seite 260 - Local Port Administration

Appendix D: FAQs 322 Go to the Raritan website (www.raritan.com) Support page to find the latest information about the KSX II serial pinouts (RJ-4

Seite 261

Appendix D: FAQs 323 USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services

Seite 262

Appendix D: FAQs 324 Do I need a special CIM to use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan pro

Seite 263

Appendix D: FAQs 325 IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Protocol Version 6”. IPv6 is the “next generation” IP protoc

Seite 264

Appendix D: FAQs 326 Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6. The KSX II User Guide describes t

Seite 265

Appendix D: FAQs 327 Speed Description Time 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theoretical 10Mbit network speed .4

Seite 266 - Modem Configuration

Appendix D: FAQs 328 Ethernet and IP Networking Does the KSX II offer dual gigabit Ethernet ports to provide redundant fail-over, or load balancin

Seite 267 - Low Bandwidth KVM Settings

Appendix D: FAQs 329 Use case Required bandwidth Idle Windows Desktop 0 Mbps Move Static 400x600 Window/Dialog 0.35Mbps Navigate Start Menu 0.49M

Seite 268

Chapter 2: Installation and Configuration 24 IBM AIX 5.3 Settings Follow these steps to configure KVM target servers running IBM® AIX™ 5.3. To c

Seite 269

Appendix D: FAQs 330 What is the slowest connection (lowest bandwidth) over which the KSX II can operate? 33Kbps or above is recommended for accep

Seite 270

Appendix D: FAQs 331 If an external authentication server (such as LDAP/LDAPS, Active Directory, RADIUS, and so forth) is used, the KSX II allows

Seite 271

Appendix D: FAQs 332 Servers Does the KSX II depend on a Windows® server to operate? No. The KSX II is completely independent. Even if a user choo

Seite 272

Appendix D: FAQs 333 Are the Paragon Blade CIMs used? No, the Paragon II Blade CIM will not work with the KSX II. Which CIM should I use? It depe

Seite 273

Appendix D: FAQs 334 I'm running VMware on some of my blade servers. Is this supported? Yes, with CC-SG you can display and access virtual ma

Seite 274

Appendix D: FAQs 335 Installation Besides the device itself, what do I need to order from Raritan to install the KSX II? Each server that connect

Seite 275

Appendix D: FAQs 336 The KSX II models range from 4 to 8 server ports in a 1U chassis. This is the industry's highest digital KVM switch port

Seite 276

Appendix D: FAQs 337 Local Port Can I access my servers directly from the rack? Yes. At the rack, the KSX II functions just like a traditional KV

Seite 277

Appendix D: FAQs 338 Yes. The local port presentation is identical and completely in sync with remote access clients, as well as Raritan's op

Seite 278

Appendix D: FAQs 339 Power Control Does the power supply used by the KSX II automatically detect voltage settings? Yes. The KSX II's power

Seite 279 - Specifications

Chapter 2: Installation and Configuration 25 To take advantage of the KSX II: The firewall must allow inbound communication on: Web-access capabi

Seite 280 - Appendix A: Specifications

Appendix D: FAQs 340 Scalability How do I connect multiple KSX II devices together into one solution? Multiple KSX II devices do not need to be

Seite 281

Appendix D: FAQs 341 Security Is the KSX II FIPS 140-2 Certified? The KX II 2.2.0 and later, and the KSX II 2.3.0 and later, provides users with

Seite 282

Appendix D: FAQs 342 Yes, the KSX II has administrator-configurable, strong password checking to ensure that user-created passwords meet corporate

Seite 283

Appendix D: FAQs 343 Smart Cards and CAC Authentication Does the KSX II support smart card and CAC authentication? Yes, smart cards and DoD Commo

Seite 284 - Supported Browsers

Appendix D: FAQs 344 Managability Can the KSX II be remotely managed and configured via web browser? Yes, the KSX II can be completely configure

Seite 285

Appendix D: FAQs 345 Miscellaneous What is the KSX II's default IP address? 192.168.0.192 What is the KSX II's default user name and

Seite 287

347 A A. AC Power • 25 Absolute Mouse Mode • 73 Accessing a Target Server • 250 Accessing Telnet from a Windows PC • 228 Accessing the KSX II Using

Seite 288

Index 348 Create User Groups and Users • 37 Creating a New Attribute • 295 D D. KVM Target Server Ports • 27 DB25F Nulling Serial Adapter Pinouts

Seite 289 - Supported Video Resolutions

Index 349 K Key Combinations and the Java Runtime Environment (JRE) • 306 Keyboard Language Preference (Fedora Linux Clients) • 305 Keyboard Macr

Seite 290 - TCP and UDP Ports Used

Chapter 2: Installation and Configuration 26 B. Network Port The KSX II provides two Ethernet ports for failover purposes (not for load-balancing)

Seite 291

Index 350 Port Action Menu • 46, 246 Port Group Management • 188 Port Keywords • 186 Port Permissions • 115, 117 Port Settings • 229 Port Sharing

Seite 292 - Smart Card Readers

Index 351 Supported CIMs for Blade Chassis • 162, 164, 168, 176 Supported Keyboard Languages • 248 Supported Operating Systems (Clients) • 4, 270

Seite 293 - Target Server Requirements

U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then P

Seite 294 - Remote Client Requirements

Chapter 2: Installation and Configuration 27 Connection Description Mouse Attach either a standard PS/2 mouse to the Mini-DIN6 (female) mouse por

Seite 295 - Emergency Connectivity

Chapter 2: Installation and Configuration 28 E. Rack PDU (Power Strip) To connect the Dominion PX to the KSX II: 1. Plug one end of a Cat5 cabl

Seite 296 - Ports Used

Chapter 2: Installation and Configuration 29 Diagram key KSX II PX serial port KSX II Power Ctrl. 1 Port or Power Ctrl. 2 Port Cat5 cable PX

Seite 297

Contents iv Connection Information ... 60 Keyboa

Seite 298 - Distances for Serial Devices

Chapter 2: Installation and Configuration 30 Vendor Device Console connector Serial connection Graphics Sun™ SPARCStation DB25F ASCSDB25M adapter

Seite 299 - Network Speed Settings

Chapter 2: Installation and Configuration 31 5. Click Apply. 6. You will receive confirmation that the password was successfully changed. Click

Seite 300 - Connectivity

Chapter 2: Installation and Configuration 32 a. Select the IPv6 checkbox to activate the fields in the section. b. Enter a Global/Unique IP Addr

Seite 301 - KSX II Serial RJ-45 Pinouts

Chapter 2: Installation and Configuration 33 See LAN Interface Settings (on page 138) for information in configuring this section of the Network

Seite 302

Chapter 2: Installation and Configuration 34 Character Description Character Description . Period | Pipe sign / Forward slash } Right brace < L

Seite 303

Chapter 2: Installation and Configuration 35 Configure the SSH TCP port as "7888". Once this is done, connection to the target can be d

Seite 304 - Appendix B

Chapter 2: Installation and Configuration 36 Note to CC-SG Users Note to CC-SG Users If you are using the KSX II in a CC-SG configuration, perform

Seite 305 - Creating a New Attribute

Chapter 2: Installation and Configuration 37 Create User Groups and Users As part of the initial configuration, you must define user groups and u

Seite 306

38 In This Chapter Interfaces ... 38 Proxy Server Con

Seite 307

Chapter 3: Working with Target Servers 39 The following sections of the user guide contain information about using specific interfaces to connect

Seite 308 - Updating the Schema Cache

Contents v Adding a New User Group ... 114 Modifying

Seite 309

Chapter 3: Working with Target Servers 40 KSX II Remote Console Interface The KSX II Remote Console is a browser-based graphical user interface th

Seite 310

Chapter 3: Working with Target Servers 41 Depending on your browser and security settings, you may see various security and certificate warnings.

Seite 311 - Informational Notes

Chapter 3: Working with Target Servers 42 Interface and Navigation KSX II Console Layout Both the KSX II Remote Console and the KSX II Local Conso

Seite 312

Chapter 3: Working with Target Servers 43 Left Panel The left panel of the KSX II interface contains the following information. Note that some in

Seite 313 - IPv6 Support Notes

Chapter 3: Working with Target Servers 44 Information Description When displayed? Connected Users The users, identified by their username and IP a

Seite 314 - Keyboards

Chapter 3: Working with Target Servers 45 Port Access Page After successfully logging on to the KSX II Remote Console, the Port Access page appea

Seite 315 - Tilde Symbol

Chapter 3: Working with Target Servers 46  Availability - The Availability can be Idle, Connected, Busy, or Unavailable. Blade servers will have

Seite 316

Chapter 3: Working with Target Servers 47  Power On - Powers on the target server through the associated outlet. This option is visible only wh

Seite 317

Chapter 3: Working with Target Servers 48 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices yo

Seite 318

Chapter 3: Working with Target Servers 49 Note: Both IPv4 and IPv6 addresses are supported. Manage Favorites Page To open the Manage Favorit

Seite 319 - USB Ports and Profiles

Contents vi Encryption & Share ... 193

Seite 320

Chapter 3: Working with Target Servers 50 c. Click Save. 3. Click Refresh. The list of devices on the local subnet is refreshed. To add device

Seite 321 - SUSE/VESA Video Modes

Chapter 3: Working with Target Servers 51 Adding, Deleting and Editing Favorites To add a device to your favorites list: 1. Choose Manage &g

Seite 322

Chapter 3: Working with Target Servers 52 Proxy Server Configuration for use with KSX II, MPC, VKC and AKC When the use of a Proxy Server is requi

Seite 323

Chapter 3: Working with Target Servers 53 start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true

Seite 324 - Appendix D

Chapter 3: Working with Target Servers 54 Toolbar Note: The KX II-101 VKC interface is different from the other Dominion KX products. See VKC Tool

Seite 325 - General Questions

Chapter 3: Working with Target Servers 55 Button Button Name Description Full Screen Mode Maximizes the screen real estate to view the target se

Seite 326 - Appendix D: FAQs

Chapter 3: Working with Target Servers 56 To power off a target server: 1. From the KSX II Remote Console, click the Port Access tab to open it

Seite 327 - Serial Access

Chapter 3: Working with Target Servers 57 After you have connected to a target server, you can change the USB profile as necessary. By default, t

Seite 328

Chapter 3: Working with Target Servers 58 Connection Properties The dynamic video compression algorithms maintain KVM console usability under vary

Seite 329 - Appendix D: FAQs

Chapter 3: Working with Target Servers 59  100 Mb Ethernet  10 Mb Ethernet  1.5 Mb (MAX DSL/T1)  1 Mb (Fast DSL/T1)  512 Kb (Medium DSL

Seite 330

Contents vii CLI Prompts ...

Seite 331

Chapter 3: Working with Target Servers 60 Connection Information To obtain information about your Virtual KVM Client connection:  Choose Conne

Seite 332 - Universal Virtual Media

Chapter 3: Working with Target Servers 61 Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Mac

Seite 333

Chapter 3: Working with Target Servers 62 10. Click Close to close the Keyboard Macros dialog. The macro will now appear on the Keyboard menu in t

Seite 334

Chapter 3: Working with Target Servers 63 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog

Seite 335 - IPv6 Networking

Chapter 3: Working with Target Servers 64 Auto-Sense Video Settings The Auto-sense Video Settings command forces a re-sensing of the video setting

Seite 336 - Remote Access

Chapter 3: Working with Target Servers 65 The device can filter out the electrical interference of video output from graphics cards. This feature

Seite 337

Chapter 3: Working with Target Servers 66  Best possible video mode The device will perform the full Auto Sense process when switching targets o

Seite 338 - Ethernet and IP Networking

Chapter 3: Working with Target Servers 67 Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on

Seite 339

Chapter 3: Working with Target Servers 68 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot f

Seite 340

Chapter 3: Working with Target Servers 69 Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software an

Seite 341

Contents viii Resetting the KSX II Using the Reset Button ... 254 Chapter

Seite 342 - Blade Servers

Chapter 3: Working with Target Servers 70 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, you will see two

Seite 343

Chapter 3: Working with Target Servers 71 Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the u

Seite 344

Chapter 3: Working with Target Servers 72 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and sy

Seite 345 - Installation

Chapter 3: Working with Target Servers 73 Please note that mouse configurations will vary on different target operating systems. Consult your OS

Seite 346

Chapter 3: Working with Target Servers 74 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mode: 1. Pre

Seite 347 - Local Port

Chapter 3: Working with Target Servers 75 Smart Cards For a list of supported smart cards, smart card readers, and additional system requirements

Seite 348

Chapter 3: Working with Target Servers 76 To update the smart card in the Select Smart Card Reader dialog:  Click Refresh List if a new smart

Seite 349 - Power Control

Chapter 3: Working with Target Servers 77  US/International  French (France)  German (Germany)  Japanese  United Kingdom  Korean (Kor

Seite 350 - Scalability

Chapter 3: Working with Target Servers 78 a. To configure the monitor on which the target viewer is launched:  Select 'Monitor Client Wa

Seite 351 - Security

Chapter 3: Working with Target Servers 79 Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. Vie

Seite 352

Contents ix Setting the Registry to Permit Write Operations to the Schema ... 295 Creating a New Attr

Seite 353

Chapter 3: Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provides version information about the V

Seite 354 - Managability

Chapter 3: Working with Target Servers 81 AKC Supported .NET Framework, Operating Systems and Browsers .NET Framework AKC requires Windows .NET®

Seite 355 - Miscellaneous

Chapter 3: Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC:  Ensure the cookies from the IP address of the device

Seite 356

Chapter 3: Working with Target Servers 83 1. To open MPC from a client running any supported browser, type http://IP-ADDRESS/mpc into the addres

Seite 357

Chapter 3: Working with Target Servers 84 Opening RSC from the Remote Console To open the Raritan Serial Console (RSC) from the Remote Console:

Seite 358

Chapter 3: Working with Target Servers 85 2. Enter the device's IP address, account information, and the desired target (port). 3. Click S

Seite 359 - Index

86 In This Chapter Overview ... 86 Turning Outlets O

Seite 360

Chapter 4: Rack PDU (Power Strip) Outlet Control 87 Initially, when you open the Powerstrip page, the power strips that are currently connected t

Seite 361

Chapter 4: Rack PDU (Power Strip) Outlet Control 88 5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its s

Seite 362

Chapter 4: Rack PDU (Power Strip) Outlet Control 89 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once t

Kommentare zu diesen Handbüchern

Keine Kommentare