
Copyright © 2011 Raritan, Inc. DKX2-v2.3.5-0N-E March 2011 255-62-4023-00 Dominion KX II User Guide Release 2.3.5
1 In This Chapter KX II Overview ... 2 KX II Help...
Chapter 5: Virtual Media 91 Diagram key Desktop PC CD/DVD drive KX II USB mass storage device CIM PC hard drive Target server Remote fi
Chapter 5: Virtual Media 92 Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different typ
Chapter 5: Virtual Media 93 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP® operating system administrator and standard
Chapter 5: Virtual Media 94 Using Virtual Media See Prerequisites for Using Virtual Media before proceeding with using virtual media. To use vir
Chapter 5: Virtual Media 95 File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to acces
Chapter 5: Virtual Media 96 Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of thi
Chapter 5: Virtual Media 97 Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mou
Chapter 5: Virtual Media 98 3. If you want Read and Write capabilities, select the Read-Write checkbox. This option is disabled for nonremovable
Chapter 5: Virtual Media 99 CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard su
Chapter 5: Virtual Media 100 4. For remote ISO images on a file server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Im
Chapter 1: Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch
101 In This Chapter Overview ... 101 CIM Compatibility
Chapter 6: USB Profiles 102 CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware
Chapter 6: USB Profiles 103 USB profile Description USB bus speed limited to full-speed (12 MBit/s) No virtual media support BIOS DellPower
Chapter 6: USB Profiles 104 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.
Chapter 6: USB Profiles 105 USB profile Description Advanced Management Module functionality when D2CIM-VUSB or D2CIM-DVUSB is connected to the A
Chapter 6: USB Profiles 106 USB profile Description Installation) (Windows 2003 Server Installation) Use this profile for the HP Proliant DL360/DL
Chapter 6: USB Profiles 107 USB profile Description series mainboards with Phoenix AwardBIOS. Restrictions: Virtual CD-ROM and disk drives can
Chapter 6: USB Profiles 108 USB profile Description USB bus speed limited to full-speed (12 MBit/s) Virtual CD-ROM and disk drives cannot be
Chapter 6: USB Profiles 109 Mouse Modes when Using the Mac OS-X USB Profile with a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X® USB
110 In This Chapter User Groups ... 110 Users ...
Chapter 1: Introduction 3
Chapter 7: User Management 111 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good
Chapter 7: User Management 112 The Group page is organized into the following categories: Group, Permissions, Port Permissions, and IP ACL. 2. Ty
Chapter 7: User Management 113 Note: Several administrative functions are available within MPC and from the KX II Local Console. These functions
Chapter 7: User Management 114 Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change t
Chapter 7: User Management 115 Permission Description User Management User and group management, remote. authentication (LDAP/LDAPS/RADIUS), logi
Chapter 7: User Management 116 Power control access Option Description Deny Deny power control to the target server Access Full permission to pow
Chapter 7: User Management 117 Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-le
Chapter 7: User Management 118 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the or
Chapter 7: User Management 119 Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Choose a group
Chapter 7: User Management 120 Adding a New User It is a good idea to define user groups before creating KX II users because, when you add a user,
Chapter 1: Introduction 4 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) KX
Chapter 7: User Management 121 5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK. Logging a User Off (F
Chapter 7: User Management 122 Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is
Chapter 7: User Management 123 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking p
Chapter 7: User Management 124 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searc
Chapter 7: User Management 125 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used
Chapter 7: User Management 126 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certifica
Chapter 7: User Management 127 Once the test is completed, a message will be displayed that lets you know the test was successful or, if the test
Chapter 7: User Management 128 Important Notes Group Name is case sensitive. The KX II provides the following default groups that cannot be
Chapter 7: User Management 129 9. The default number of retries is 3 Retries. This is the number of times the KX II will send an authenticatio
Chapter 7: User Management 130 Note: Both IPv4 and IPv6 addresses are supported. Cisco ACS 5.x for RADIUS Authentication If you are using a Cis
Chapter 1: Introduction 5 Related Documentation The KX II help is accompanied by a KX II Device Quick Setup Guide, which can be found on the Rari
Chapter 7: User Management 131 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II determines th
Chapter 7: User Management 132 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connectio
Chapter 7: User Management 133 User Authentication Process Remote authentication follows the process specified in the flowchart below:
Chapter 7: User Management 134 Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Passwo
135 In This Chapter Network Settings ... 135 Device Services ...
Chapter 8: Device Management 136 Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For co
Chapter 8: Device Management 137 d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the d
Chapter 8: Device Management 138 See LAN Interface Settings (on page 138) for information in configuring this section of the Network Settings page
Chapter 8: Device Management 139 Autodetect (default option) 10 Mbps/Half - Both LEDs blink 10 Mbps/Full - Both LEDs blink 100 Mbps/H
Chapter 8: Device Management 140 Device Services The Device Services page allows you to configure the following functions: Enable SSH access.
Chapter 1: Introduction 6 Virtual Media All KX II models support virtual media. The benefits of virtual media - mounting of remote drives/media on
Chapter 8: Device Management 141 Entering the Discovery Port The KX II discovery occurs over a single, configurable TCP Port. The default is Port
Chapter 8: Device Management 142 Configuring and Enabling Tiering The tiering feature allows you to access KX II targets and PDUs through one base
Chapter 8: Device Management 143 Enabling Tiering Connect from a target server port on the base device to the tier KX II Local Access port video/
Chapter 8: Device Management 144 Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached direc
Chapter 8: Device Management 145 Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a
Chapter 8: Device Management 146 Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Log
Chapter 8: Device Management 147 Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use t
Chapter 8: Device Management 148 Configuring Modem Settings To configure modem settings: 1. Click Device Settings > Modem Settings to open
Chapter 8: Device Management 149 6. Click OK to commit your changes or click Reset to Defaults to return the settings to their defaults. See Ce
Chapter 8: Device Management 150 3. To adjust for daylight savings time, check the "Adjust for daylight savings time" checkbox. 4. Cho
Chapter 1: Introduction 7 Product Photos KX II KX2-832
Chapter 8: Device Management 151 Event Management The KX II Event Management feature allows you enable and disable the distribution of system eve
Chapter 8: Device Management 152 3. Click OK. To reset to factory defaults: Click Reset To Defaults. Note: Both IPv4 and IPv6 addresses are
Chapter 8: Device Management 153 Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can
Chapter 8: Device Management 154 3. Click OK.
Chapter 8: Device Management 155 To reset to factory defaults: Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possi
Chapter 8: Device Management 156 Trap Name Description communicate over the network. networkParameterChanged A change has been made to the network
Chapter 8: Device Management 157 Trap Name Description userSessionTimeout A user with an active session has experienced a session termination due
Chapter 8: Device Management 158 4. Click OK. Note: If either of these checkboxes is selected and power input is not actually connected, the powe
Chapter 8: Device Management 159 Port type Description PowerStrip (rack PDU) Power strip connected VM Virtual media CIM (D2CIM-VUSB and D2CIM-DVU
Chapter 8: Device Management 160 8. Click OK. Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targe
Chapter 1: Introduction 8 KX2-864
Chapter 8: Device Management 161 5. Select KVM Switch Hot Key Sequence. 6. Enter the Maximum Number of Target Ports (2-32). 7. In the KVM Swit
Chapter 8: Device Management 162 Configuring Rack PDU (Power Strip) Targets The KX II allows you to connect rack PDUs (power strips) to KX II port
Chapter 8: Device Management 163 Naming the Rack PDU in the KX II (Port Page for Power Strips) Note: PX rack PDUs (power strips) can be named in
Chapter 8: Device Management 164 3. Click OK.
Chapter 8: Device Management 165 Associating Outlets with Target Servers on KX II The Port page opens when you click on a port on the Port Config
Chapter 8: Device Management 166 Removing Power Associations When disconnecting target servers and/or rack PDUs from KXII, all power associations
Chapter 8: Device Management 167 Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade ch
Chapter 8: Device Management 168 Note: In the case of IBM Blade Center Models E and H, the KX II only supports auto-discovery for AMM[1] as the ac
Chapter 8: Device Management 169 2. Select Device Settings > Port Configuration to open the Port Configuration page. 3. On the Port Config
Chapter 8: Device Management 170 b. URL - Enter the URL to the interface. Required c. Username - Enter the username used to access the interface
Chapter 1: Introduction 9 Product Features Hardware Integrated KVM-over-IP remote access 1U or 2U rack-mountable (brackets included) Dua
Chapter 8: Device Management 171 5. Select the Dell blade chassis model from the Blade Server Chassis Model drop-down. To configure a Dell P
Chapter 8: Device Management 172 5. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade c
Chapter 8: Device Management 173 To configure a Dell PowerEdge 1855/1955: 1. If you selected Dell 1855/1955, auto-discovery is not available.
Chapter 8: Device Management 174 Note: Leave the username and password fields blank for DRAC, ILO, and RSA web applications or the connection will
Chapter 8: Device Management 175 c. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis. Req
Chapter 8: Device Management 176 c. Username - Enter the username used to access the interface. d. Password - Enter the password used to acces
Chapter 8: Device Management 177 4. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade
Chapter 8: Device Management 178 Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device wi
Chapter 8: Device Management 179 HP Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports connected to
Chapter 8: Device Management 180 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. S
Chapter 1: Introduction 10 Software Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs Absolute Mouse Synchronization with D2CIM-VUSB CIM an
Chapter 8: Device Management 181 To delete a port group: 1. Click on the Port Group Management page, select the checkbox of the port group you
Chapter 8: Device Management 182 Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KX
Chapter 8: Device Management 183 Blade chassis Connection method Recommended CIM(s) M1000e with this chassis. The iKVM is compatible with the fol
Chapter 8: Device Management 184 Blade chassis Connection method Recommended CIM(s) one Advanced Management Module. In contrast to the standard Bl
Chapter 8: Device Management 185 Blade chassis Required/recommended action Slot, not by Name. iKVM may not work correctly if this is not done.
Chapter 8: Device Management 186 Blade chassis Required/recommended action management module. The SSH port configured on the blade chassis mana
Chapter 8: Device Management 187 Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles
Chapter 8: Device Management 188 Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appear in the Selec
Chapter 8: Device Management 189 2. Click Remove. The selected profiles appear in the Available list. These profiles are no longer available for
Chapter 8: Device Management 190 Configuring KX II Local Port Settings From the Local Port Settings page, you can customize many settings for the
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, repro
Chapter 1: Introduction 11 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) KX II Local Access Console
Chapter 8: Device Management 191 Note: If you are using KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II via the ex
Chapter 8: Device Management 192 Hot key: Take this action: Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Ca
Chapter 8: Device Management 193 Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to t
Chapter 8: Device Management 194 KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two local
195 In This Chapter Security Settings ... 195 Configuring IP Acces
Chapter 9: Security Management 196 To reset back to defaults: Click Reset to Defaults. Login Limitations Using login limitations, you can
Chapter 9: Security Management 197 Limitation Description Enter the number of days after which a password change is required. The default is 60 d
Chapter 9: Security Management 198 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor
Chapter 9: Security Management 199 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s
Chapter 9: Security Management 200 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e
Chapter 1: Introduction 12 Package Contents Each KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19"
Chapter 9: Security Management 201 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,
Chapter 9: Security Management 202 Encryption mode Description a National Institute of Standards and Technology specification for the encryption o
Chapter 9: Security Management 203 Local device reset mode Description Enable Local Factory Reset (default) Returns the KX II device to the facto
Chapter 9: Security Management 204 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desira
Chapter 9: Security Management 205 FIPS 140-2 should be enabled on the client computer and in Internet Explorer. To enable FIPS 140-2 on a W
Chapter 9: Security Management 206 To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/Mask or IPv6/Prefix Length field.
Chapter 9: Security Management 207 3. You are prompted to confirm the deletion. Click OK. SSL Certificates The KX II uses the Secure Socket La
Chapter 9: Security Management 208 b. Organizational unit - This field is used for specifying to which department within an organization the KX I
Chapter 9: Security Management 209 Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed cert
Chapter 9: Security Management 210 4. If needed, change the banner title. This information will be displayed to users as part of the banner. Up t
13 In This Chapter Overview ... 13 Default Login Inf
211 In This Chapter Audit Log... 211 Device Informatio
Chapter 10: Maintenance 212 Device Information The Device Information page provides detailed information about your KX II device and the CIMs in u
Chapter 10: Maintenance 213 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your K
Chapter 10: Maintenance 214 If you are using Internet Explorer 6 or higher, to backup your KX II: 1. Click Backup. A File Download dialog appea
Chapter 10: Maintenance 215 Full Restore - A complete restore of the entire system. Generally used for traditional backup and restore purposes
Chapter 10: Maintenance 216 USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech s
Chapter 10: Maintenance 217 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing
Chapter 10: Maintenance 218 3. Click the Upgrade button. You are prompted to confirm the upgrade. 4. Click OK to continue the upgrade. Progress
Chapter 10: Maintenance 219 6. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed for y
Chapter 10: Maintenance 220 For information about upgrading the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in
Chapter 2: Installation and Configuration 14 Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that wil
Chapter 10: Maintenance 221 Upgrade History The KX II provides information about upgrades performed on the KX II and attached CIMS. To view the
Chapter 10: Maintenance 222 To reboot your KX II: 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted
Chapter 10: Maintenance 223 Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you ar
Chapter 10: Maintenance 224 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed
225 In This Chapter Network Interface Page ... 225 Network Statistics Page ..
Chapter 11: Diagnostics 226 Network Statistics Page The KX II provides statistics about your network interface. To view statistics about your ne
Chapter 11: Diagnostics 227 Interfaces - Produces a page similar to the one displayed here. Route - Produces a page similar to the one dis
Chapter 11: Diagnostics 228 Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP n
Chapter 11: Diagnostics 229 Note: The host name cannot exceed 232 characters in length. 3. Choose the maximum hops from the drop-down list (5 to
Chapter 11: Diagnostics 230 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical
Chapter 2: Installation and Configuration 15 Windows XP, Windows 2003 and Windows 2008 Settings To configure KVM target servers running Microso
Chapter 11: Diagnostics 231 a. Click the Save to File button. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c.
232 In This Chapter Overview ... 232 Accessing the KX
Chapter 12: Command Line Interface (CLI) 233 Accessing the KX II Using CLI Access the KX II by using one of the following methods: SSH (Secure
Chapter 12: Command Line Interface (CLI) 234 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX®/Linux® workstation and
Chapter 12: Command Line Interface (CLI) 235 After reviewing the following Navigation of the CLI (on page 235) section, perform the Initial Confi
Chapter 12: Command Line Interface (CLI) 236 Completion of Commands The CLI supports the completion of partially-entered commands. After entering
Chapter 12: Command Line Interface (CLI) 237 Commands Description help Display an overview of the CLI syntax. quit Places the user back one level
Chapter 12: Command Line Interface (CLI) 238 Setting Network Parameters Network parameters are configured using the interface command. admin >
Chapter 12: Command Line Interface (CLI) 239 Command Description history Display the current session's command line history. listports List
Chapter 12: Command Line Interface (CLI) 240 Configuring Network The network menu commands are used to configure the KX II network adapter. Comman
Chapter 2: Installation and Configuration 16 Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create
Chapter 12: Command Line Interface (CLI) 241 Name Command The name command is used to configure the network name. The syntax of the name is: n
242 In This Chapter Overview ... 242 Using the KX II L
Chapter 13: KX II Local Console 243 KX II Local Console Interface When you are located at the server rack, the KX II provides standard KVM manage
Chapter 13: KX II Local Console 244 Local Console Smart Card Access To use a smart card to access a server at the Local Console, plug a USB smart
Chapter 13: KX II Local Console 245 To update the Card Readers Detected list: Click Refresh if a new smart card has been mounted. The Card R
Chapter 13: KX II Local Console 246 2. In the Select Profile To Use field, select the profile to use from among those available for the port. 3.
Chapter 13: KX II Local Console 247 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access p
Chapter 13: KX II Local Console 248 To use the Port Access page: 1. Log in to the Local Console. The KVM target servers are initially sorted b
Chapter 13: KX II Local Console 249 2. Click View by Port or View by Group to switch between views. In addition to the Port Number, Port Name
Chapter 13: KX II Local Console 250 Blade chassis Connect key action Key sequence example Access a port from the local port GUI Access port 5, sl
Chapter 2: Installation and Configuration 17 Animate controls and elements inside windows Animate windows when minimizing and maximizing
Chapter 13: KX II Local Console 251 Sun key Local port key combination Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KP
Chapter 13: KX II Local Console 252 Configuring KX II Local Console Local Port Settings From the Local Port Settings page, you can customize many
Chapter 13: KX II Local Console 253 3. Choose the local port hotkey. The local port hotkey is used to return to the KX II Local Console interfac
Chapter 13: KX II Local Console 254 None. There is no authentication for Local Console access. This option is recommended for secure environmen
Chapter 13: KX II Local Console 255 Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local p
Chapter 13: KX II Local Console 256 Timeout (seconds) 1. Click Reset to continue. You will be prompted to confirm the factory reset because al
257 In This Chapter Physical Specifications ... 257 Environmental Requiremen
Appendix A: Specifications 258 Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensi
Appendix A: Specifications 259 KX2-8 Specifications Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shippi
Appendix A: Specifications 260 Operating Shock N/A Supported Operating Systems (Clients) The following operating systems are supported on the Vi
Chapter 2: Installation and Configuration 18 Windows 2000 Settings To configure KVM target servers running Microsoft® Windows 2000® operating sy
Appendix A: Specifications 261 Mode Operating system Browser Windows Server 2003® Internet Explorer 6.0 SP1++, IE 7, IE 8 Firefox 1.06 - 3
Appendix A: Specifications 262 Supported Paragon CIMs Operating system and serial devices (where applicable) Virtual media Absolute Mouse mode Int
Appendix A: Specifications 263 Supported Paragon CIMs Operating system and serial devices (where applicable) Virtual media Absolute Mouse mode In
Appendix A: Specifications 264 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse
Appendix A: Specifications 265 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mous
Appendix A: Specifications 266 Supported KX II D2CIMs Target server and remote rack PDUs (where applicable) Virtual media Absolute Mouse mode In
Appendix A: Specifications 267 Supported Operating Systems and CIMs (KVM Target Servers) In addition to the new D2CIMs, most Dominion CIMs are su
Appendix A: Specifications 268 Target server Supported CIMs Mouse modes Windows 2003 Server® Windows Vista operating system Red Hat® Enterprise Wo
Appendix A: Specifications 269 Legend: VM - Virtual Media (D2CIM-VUSB only) AM: Absolute Mouse Synchronization (D2CIM-VUSB only) IM: In
Appendix A: Specifications 270 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (Wx
Chapter 2: Installation and Configuration 19 a. Choose Main Menu > Preferences > Mouse. The Mouse Preferences dialog appears. b. Click th
Appendix A: Specifications 271 Certified Modems USRobotics® 56K 5686E ZOOM® v90 ZOOM v92 USRobotics Sportster® 56K USRobot
Appendix A: Specifications 272 Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so forth and the s
Appendix A: Specifications 273 Resolutions 640x350 @85Hz 1024x768 @75Hz 640x400 @56Hz 1024x768 @90Hz 640x400 @84Hz 1024x768 @100Hz 640x400 @85Hz
Appendix A: Specifications 274 Supported Keyboard Languages The KX II provides keyboard support for the languages listed in the following table. N
Appendix A: Specifications 275 Language Regions Keyboard layout Spanish Spain and most Spanish speaking countries Spanish Portuguese Port
Appendix A: Specifications 276 This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, theref
Appendix A: Specifications 277 Windows XP® operating system targets must be running Windows XP SP3 in order to use smart cards with the KX II. If
Appendix A: Specifications 278 Fedora® Core 10 pcsc-lite-1.4.102.3.fc10.i386 Create a Java™ Library Link A soft link must be created to the lib
Appendix A: Specifications 279 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 14
Appendix A: Specifications 280 Network Speed Settings KX II network speed setting Network switch port setting Auto 1000/Full 100/Full 100/Half 10
Chapter 2: Installation and Configuration 20 Note: If you change the video resolution, you must log off of the target server and log back in for t
Appendix A: Specifications 281 communicate, but collisions will occur Per Ethernet specification, these should be “no communication,” however,
282 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...
Appendix B: Updating the LDAP Schema 283 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to t
Appendix B: Updating the LDAP Schema 284 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create
Appendix B: Updating the LDAP Schema 285 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.
Appendix B: Updating the LDAP Schema 286 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dia
Appendix B: Updating the LDAP Schema 287 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window o
Appendix B: Updating the LDAP Schema 288 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name
289 In This Chapter Overview ... 289 Java Runtime Envi
Appendix C: Informational Notes 290 IPv6 Support Notes Java Java™ 1.6 supports IPv6 for the following: Solaris™ 8 and higher Linux® kernel
iii Contents Chapter 1 Introduction 1 KX II Overview ...
Chapter 2: Installation and Configuration 21 2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display. The Dis
Appendix C: Informational Notes 291 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux® Clients Only) The Virtual KVM Client and the
Appendix C: Informational Notes 292 Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does
Appendix C: Informational Notes 293 Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using
Appendix C: Informational Notes 294 Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using
Appendix C: Informational Notes 295 Resolving Issues with Firefox Freezing when Using Fedora If you are accessing Firefox® and are using a Fedora
Appendix C: Informational Notes 296 USB Ports and Profiles VM-CIMs and DL360 USB Ports HP® DL360 servers have one USB port on the back of the devi
Appendix C: Informational Notes 297 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles
Appendix C: Informational Notes 298 Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will
Appendix C: Informational Notes 299 Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000® operating system does not supp
Appendix C: Informational Notes 300 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB A virtual media local drive cannot be acce
Chapter 2: Installation and Configuration 22 Make Linux Settings Permanent Note: These steps may vary slightly depending on the specific version o
Appendix C: Informational Notes 301 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you ar
302 In This Chapter General Questions ... 303 Remote Access ...
Appendix D: FAQs 303 General Questions What is the KX II? The KX II is a second generation digital KVM (keyboard/video/ mouse) switch that enable
Appendix D: FAQs 304 Will my existing KX I CIMs work with the KX II switches? Yes, existing KX I CIMs will work with the KX II switch. In addition
Appendix D: FAQs 305 Remote Access How many users can remotely access servers on each KX II? The KX II models offer remote connections for up to
Appendix D: FAQs 306 100Mbps Theoretical 100Mbit network speed 0.05 seconds 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theo
Appendix D: FAQs 307 Universal Virtual Media What KX II models support virtual media? All of the KX II models support virtual media. It is avai
Appendix D: FAQs 308 USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services
Appendix D: FAQs 309 Do I need a special CIM to use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan pr
Appendix D: FAQs 310 Bandwidth and KVM-over-IP Performance How is bandwidth used in KVM-over-IP systems? The KX II offers next generation KVM-over
Chapter 2: Installation and Configuration 23 2. All KVM target servers must be configured to one of the display resolutions supported by the KX
Appendix D: FAQs 311 Unlike KX I, the Noise Filter parameter does not generally have a large role in reducing bandwidth or improving performance.
Appendix D: FAQs 312 QuickTime video #2 1500 - 2500 KB/s 400 - 550 KB/s 200 - 350 KB/s With the reduced bandwidth settings, bandwidth is reduced s
Appendix D: FAQs 313 Please note that these bandwidth figures are only examples and may vary from those seen in your environment due to many fact
Appendix D: FAQs 314 It depends on the bandwidth and latency of the Internet connection between your remote client and the KX II. With a cable
Appendix D: FAQs 315 Ethernet and IP Networking Does the KX II offer dual gigabit Ethernet ports to provide redundant fail-over? Yes. The KX II
Appendix D: FAQs 316 How many TCP ports must be open on my firewall in order to enable network access to the KX II? Are these ports configurable?
Appendix D: FAQs 317 IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Protocol Version 6”. IPv6 is the “next generation” IP protoc
Appendix D: FAQs 318 Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6. The KX II User Guide describes th
Appendix D: FAQs 319 Servers Does the KX II depend on a Windows server to operate? Absolutely not. Because users depend on the KVM infrastructure
Appendix D: FAQs 320 Blade Servers Can I connect blade servers to the KX II? Yes. The KX II supports popular blade server models from the leadin
Chapter 2: Installation and Configuration 24 2. Choose Mouse Style Manager. The Style Manager - Mouse dialog appears. 3. Set the Acceleration sl
Appendix D: FAQs 321 For KX II's, Raritan recommends connecting up to two times the number of remote connections supported by the device. Fo
Appendix D: FAQs 322 Installation Besides the device itself, what do I need to order from Raritan to install the KX II? Each server that connects
Appendix D: FAQs 323 Servers connected to the KX II do not require any software agents to be installed, because the KX II connects directly via h
Appendix D: FAQs 324 Local Port Can I access my servers directly from the rack? Yes. At the rack, the KX II functions just like a traditional KVM
Appendix D: FAQs 325 If the external authentication servers are unavailable, the KX II fails-over to its own internal authentication database.
Appendix D: FAQs 326 Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) What is the extended local port? The Dominion KX2-832 and KX2-
Appendix D: FAQs 327 Power Control Does the KX II have a dual power option? All of the KX II models come equipped with dual AC inputs and power s
Appendix D: FAQs 328 Does remote power control require any special server configuration? Some servers ship with default BIOS settings such that
Appendix D: FAQs 329 Scalability How do I physically connect multiple KX II devices together into one solution? To physically connect multiple
Appendix D: FAQs 330 For customers wanting stand-alone usage (without a central management system), multiple KX II units still interoperate and sc
Chapter 2: Installation and Configuration 25 Card To check resolution: To change resolution: 32-bit # /usr/sbin/pgxconfig -prconf 1. # /usr/sbin
Appendix D: FAQs 331 Computer Interface Modules (CIMs) Can I use Computer Interface Modules (CIMs) from Raritan's analog matrix KVM switch,
Appendix D: FAQs 332 Security Is the Dominion KX II FIPS 140-2 Certified? The KX II 2.2.0 and later, and the KSX II 2.3.0 and later, provides user
Appendix D: FAQs 333 Yes, the KX II has administrator-configurable, strong password checking to ensure that user-created passwords meet corporate
Appendix D: FAQs 334 Smart Cards and CAC Authentication Does the KX II support smart card and CAC authentication? Yes, smart cards and DoD Common
Appendix D: FAQs 335 Manageability Can the KX II be remotely managed and configured via web browser? Yes, the KX II can be completely configure
Appendix D: FAQs 336 Miscellaneous What is the KX II's default IP address? 192.168.0.192 What is the KX II's default user name and passw
337 A A. AC Power • 27 Absolute Mouse Mode • 72 Accessing a Target Server • 251 Accessing the KX II Using CLI • 233 Accessing Virtual Media on a Wi
Index 338 Connecting to Virtual Media • 97 Connection Information • 57 Connection Properties • 55 Create User Groups and Users • 35 Creating a New
Index 339 K Keyboard Language Preference (Fedora Linux Clients) • 292 Keyboard Macros • 57 Keyboard Options • 57 Keyboards • 291 KX II Client App
Index 340 R Rack PDU (Power Strip) Outlet Control • 84 RADIUS Communication Exchange Specifications • 131 Rebooting • 221 Refreshing the Screen •
Chapter 2: Installation and Configuration 26 Make UNIX Settings Permanent Note: These steps may vary slightly depending on the type of UNIX® (for
Index 341 SUSE/VESA Video Modes • 295 Switching Between KVM Target Servers • 53 T Target BIOS Boot Time with Virtual Media • 300 Target Server Co
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then P
Chapter 2: Installation and Configuration 27 Step 3: Connect the Equipment Connect the KX II to the power supply, network, local PC, local video
Chapter 2: Installation and Configuration 28 C. Network Port The KX II provides two Ethernet ports for failover purposes (not for load-balancing).
Chapter 2: Installation and Configuration 29 Connection Description port. Keyboard Attach a standard USB keyboard to one of the USB Type A (femal
Chapter 2: Installation and Configuration 30 Changing the Default Password The KX II ships with a default password. The first time you start the K
Contents iv Video Properties ... 63 M
Chapter 2: Installation and Configuration 31 c. Enter the Default Gateway if None is selected from the IP Auto Configuration drop-down. d. Ente
Chapter 2: Installation and Configuration 32 5. Select Obtain DNS Server Address Automatically if DHCP is selected and Obtain DNS Server Address
Chapter 2: Installation and Configuration 33 Valid Special Characters for Target Names Character Description Character Description ! Exclamatio
Chapter 2: Installation and Configuration 34 3. If you are plugging power input into power supply number two (right-most power supply at the back
Chapter 2: Installation and Configuration 35 Note on Microsoft Active Directory Microsoft® Active Directory® uses the LDAP/LDAPS protocol nativel
Chapter 2: Installation and Configuration 36 5. Shut down the device and power on once again. The DCIM-SUSB performs a reset (power cycle). 6. V
37 In This Chapter Interfaces ... 37 Proxy Server Con
Chapter 3: Working with Target Servers 38 KX II Local Console Interface When you are located at the server rack, the KX II provides standard KVM m
Chapter 3: Working with Target Servers 39 Depending on your browser and security settings, you may see various security and certificate warnings.
Chapter 3: Working with Target Servers 40 Interface and Navigation KX II Console Layout Both the KX II Remote Console and the KX II Local Console
Contents v Adding a New User ... 120 Modif
Chapter 3: Working with Target Servers 41 Left Panel The left panel of the KX II interface contains the following information. Note that some inf
Chapter 3: Working with Target Servers 42 Information Description When displayed? Configured As Base or Configured As Tiered If you are using a ti
Chapter 3: Working with Target Servers 43 Port Access Page After successfully logging on to the KX II Remote Console, the Port Access page appear
Chapter 3: Working with Target Servers 44 Note: Do not use apostrophes for the Port (CIM) Name. Status - The status for standard servers is eit
Chapter 3: Working with Target Servers 45 Power On - Powers on the target server through the associated outlet. This option is visible only wh
Chapter 3: Working with Target Servers 46 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices yo
Chapter 3: Working with Target Servers 47 Note: Both IPv4 and IPv6 addresses are supported. Manage Favorites Page To open the Manage Favorit
Chapter 3: Working with Target Servers 48 c. Click Save. 3. Click Refresh. The list of devices on the local subnet is refreshed. To add device
Chapter 3: Working with Target Servers 49 Adding, Deleting and Editing Favorites To add a device to your favorites list: 1. Choose Manage &g
Chapter 3: Working with Target Servers 50 Proxy Server Configuration for use with MPC, VKC and AKC When the use of a Proxy Server is required, a S
Contents vi Configuring IP Access Control ... 205
Chapter 3: Working with Target Servers 51 start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true
Chapter 3: Working with Target Servers 52 Button Button Name Description Video Settings Opens the Video Settings dialog, allowing you to manually
Chapter 3: Working with Target Servers 53 Switching Between KVM Target Servers With the KX II, you can access several KVM target servers. The KX
Chapter 3: Working with Target Servers 54 Disconnecting KVM Target Servers Note: This item is not available on the KX II Local Console. The only w
Chapter 3: Working with Target Servers 55 Connection Properties The dynamic video compression algorithms maintain KVM console usability under var
Chapter 3: Working with Target Servers 56 256 Kb (Cable) 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem)
Chapter 3: Working with Target Servers 57 Connection Information To obtain information about your Virtual KVM Client connection: Choose Conn
Chapter 3: Working with Target Servers 58 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi
Chapter 3: Working with Target Servers 59 Click Yes to replace the existing macro with the imported version. Click Yes to All to replace th
Chapter 3: Working with Target Servers 60 3. Click Ok. The Export Keyboard Macro. A dialog from which to locate and select the macro file appears
Contents vii Chapter 13 KX II Local Console 242 Overview ...
Chapter 3: Working with Target Servers 61 Press Left Ctrl Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequence field to be sure
Chapter 3: Working with Target Servers 62 Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you
Chapter 3: Working with Target Servers 63 3. Set the language and mouse settings. 4. Exit the menu to return to normal CIM functionality.
Chapter 3: Working with Target Servers 64 Calibrating Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturat
Chapter 3: Working with Target Servers 65 c. Brightness: Use this setting to adjust the brightness of the target server display. d. Brightness
Chapter 3: Working with Target Servers 66 Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on c
Chapter 3: Working with Target Servers 67 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot
Chapter 3: Working with Target Servers 68 Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and
Chapter 3: Working with Target Servers 69 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor
Chapter 3: Working with Target Servers 70 Additional Notes for Intelligent Mouse Mode Be sure that there are no icons or applications in the up
Contents viii Setting the Registry to Permit Write Operations to the Schema ... 283 Creating a New Att
Chapter 3: Working with Target Servers 71 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s
Chapter 3: Working with Target Servers 72 Please note that mouse configurations will vary on different target operating systems. Consult your OS g
Chapter 3: Working with Target Servers 73 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mode: 1. Pr
Chapter 3: Working with Target Servers 74 Smart Cards (VKC, AKC and MPC) Using the KX II 2.1.10 or later, you are able to mount a smart card reade
Chapter 3: Working with Target Servers 75 4. A progress dialog will open. Check the 'Mount selected card reader automatically on connection
Chapter 3: Working with Target Servers 76 Tool Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client, i
Chapter 3: Working with Target Servers 77 4. Exit Full Screen Mode - Hotkey. When you enter Full Screen mode, the display of the target server b
Chapter 3: Working with Target Servers 78 Language Configuration method French Keyboard Indicator German System Settings (Control Center) Japanese
Chapter 3: Working with Target Servers 79 View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To
Chapter 3: Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provides version information about the V
Contents ix Appendix D FAQs 302 General Questions ...
Chapter 3: Working with Target Servers 81 AKC Supported Operating Systems and Browsers .NET Framework AKC requires Windows .NET® version 3.5, and
Chapter 3: Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC: Ensure the cookies from the IP address of the device
Chapter 3: Working with Target Servers 83 Note: The Alt+Tab command toggles between windows only on the local system. When MPC opens, the Raritan
84 In This Chapter Overview ... 84 Turning Outlets O
Chapter 4: Rack PDU (Power Strip) Outlet Control 85 Control - Turn outlets on or off, or cycle their power. Association - The ports associa
Chapter 4: Rack PDU (Power Strip) Outlet Control 86 5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its s
Chapter 4: Rack PDU (Power Strip) Outlet Control 87 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once t
88 In This Chapter Overview ... 89 Prerequisites for
Chapter 5: Virtual Media 89 Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client
Chapter 5: Virtual Media 90
Kommentare zu diesen Handbüchern