Raritan DKX2-V2.3.5-0N-E Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Netzwerk-Switches Raritan DKX2-V2.3.5-0N-E herunter. Raritan DKX2-V2.3.5-0N-E User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 351
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Dominion KX II

Copyright © 2011 Raritan, Inc. DKX2-v2.3.5-0N-E March 2011 255-62-4023-00 Dominion KX II User Guide Release 2.3.5

Seite 2 - VCCI Information (Japan)

1 In This Chapter KX II Overview ... 2 KX II Help...

Seite 3 - Contents

Chapter 5: Virtual Media 91 Diagram key Desktop PC CD/DVD drive KX II USB mass storage device CIM PC hard drive Target server Remote fi

Seite 4

Chapter 5: Virtual Media 92 Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different typ

Seite 5 - Contents

Chapter 5: Virtual Media 93 Using Virtual Media via VKC and AKC in a Windows Environment Windows XP® operating system administrator and standard

Seite 6

Chapter 5: Virtual Media 94 Using Virtual Media See Prerequisites for Using Virtual Media before proceeding with using virtual media. To use vir

Seite 7

Chapter 5: Virtual Media 95 File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to acces

Seite 8

Chapter 5: Virtual Media 96 Note: You cannot access a remote ISO image via virtual media using an IPv6 address due to technical limitations of thi

Seite 9 - Index 337

Chapter 5: Virtual Media 97 Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mou

Seite 10 - Introduction

Chapter 5: Virtual Media 98 3. If you want Read and Write capabilities, select the Read-Write checkbox. This option is disabled for nonremovable

Seite 11 - KX II Overview

Chapter 5: Virtual Media 99 CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard su

Seite 12 - Chapter 1: Introduction

Chapter 5: Virtual Media 100 4. For remote ISO images on a file server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Im

Seite 13 - KX II Help

Chapter 1: Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch

Seite 14 - KX II Client Applications

101 In This Chapter Overview ... 101 CIM Compatibility

Seite 15 - Virtual Media

Chapter 6: USB Profiles 102 CIM Compatibility In order to make use of USB profiles, you must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware

Seite 16 - Product Photos

Chapter 6: USB Profiles 103 USB profile Description  USB bus speed limited to full-speed (12 MBit/s)  No virtual media support BIOS DellPower

Seite 17 - Chapter 1: Introduction

Chapter 6: USB Profiles 104 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.

Seite 18 - Product Features

Chapter 6: USB Profiles 105 USB profile Description Advanced Management Module functionality when D2CIM-VUSB or D2CIM-DVUSB is connected to the A

Seite 19 - Terminology

Chapter 6: USB Profiles 106 USB profile Description Installation) (Windows 2003 Server Installation) Use this profile for the HP Proliant DL360/DL

Seite 20

Chapter 6: USB Profiles 107 USB profile Description series mainboards with Phoenix AwardBIOS. Restrictions:  Virtual CD-ROM and disk drives can

Seite 21 - Package Contents

Chapter 6: USB Profiles 108 USB profile Description  USB bus speed limited to full-speed (12 MBit/s)  Virtual CD-ROM and disk drives cannot be

Seite 22 - Chapter 2

Chapter 6: USB Profiles 109 Mouse Modes when Using the Mac OS-X USB Profile with a DCIM-VUSB If you are using a DCIM-VUSB, using a Mac OS-X® USB

Seite 23 - Getting Started

110 In This Chapter User Groups ... 110 Users ...

Seite 24

Chapter 1: Introduction 3

Seite 25 - Windows Vista Settings

Chapter 7: User Management 111 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good

Seite 26

Chapter 7: User Management 112 The Group page is organized into the following categories: Group, Permissions, Port Permissions, and IP ACL. 2. Ty

Seite 27 - Linux Settings (Red Hat 9)

Chapter 7: User Management 113 Note: Several administrative functions are available within MPC and from the KX II Local Console. These functions

Seite 28

Chapter 7: User Management 114 Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change t

Seite 29 - Linux Settings (Red Hat 4)

Chapter 7: User Management 115 Permission Description User Management User and group management, remote. authentication (LDAP/LDAPS/RADIUS), logi

Seite 30 - SUSE Linux 10.1 Settings

Chapter 7: User Management 116 Power control access Option Description Deny Deny power control to the target server Access Full permission to pow

Seite 31 - Sun Solaris Settings

Chapter 7: User Management 117 Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-le

Seite 32 - Mouse Settings

Chapter 7: User Management 118 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the or

Seite 33 - Video Settings (GUI)

Chapter 7: User Management 119 Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Choose a group

Seite 34 - IBM AIX 5.3 Settings

Chapter 7: User Management 120 Adding a New User It is a good idea to define user groups before creating KX II users because, when you add a user,

Seite 35 - Apple Macintosh Settings

Chapter 1: Introduction 4 Diagram key Cat5 cable Remote virtual media USB drive(s) Computer Interface Module (CIM) Rack PDU (power strip) KX

Seite 36 - B. Modem Port (Optional)

Chapter 7: User Management 121 5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK. Logging a User Off (F

Seite 37 - C. Network Port

Chapter 7: User Management 122 Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is

Seite 38 - E. Target Server Ports

Chapter 7: User Management 123 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking p

Seite 39 - Assigning an IP Address

Chapter 7: User Management 124 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searc

Seite 40

Chapter 7: User Management 125 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used

Seite 41 - Naming Target Servers

Chapter 7: User Management 126 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certifica

Seite 42

Chapter 7: User Management 127 Once the test is completed, a message will be displayed that lets you know the test was successful or, if the test

Seite 43 - Supported Protocols

Chapter 7: User Management 128 Important Notes  Group Name is case sensitive.  The KX II provides the following default groups that cannot be

Seite 44 - Create User Groups and Users

Chapter 7: User Management 129 9. The default number of retries is 3 Retries. This is the number of times the KX II will send an authenticatio

Seite 45

Chapter 7: User Management 130 Note: Both IPv4 and IPv6 addresses are supported. Cisco ACS 5.x for RADIUS Authentication If you are using a Cis

Seite 46 - Working with Target Servers

Chapter 1: Introduction 5 Related Documentation The KX II help is accompanied by a KX II Device Quick Setup Guide, which can be found on the Rari

Seite 47

Chapter 7: User Management 131 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II determines th

Seite 48

Chapter 7: User Management 132 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connectio

Seite 49 - KX II Console Layout

Chapter 7: User Management 133 User Authentication Process Remote authentication follows the process specified in the flowchart below:

Seite 50 - Left Panel

Chapter 7: User Management 134 Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Passwo

Seite 51 - KX II Console Navigation

135 In This Chapter Network Settings ... 135 Device Services ...

Seite 52 - Port Access Page

Chapter 8: Device Management 136 Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For co

Seite 53 - Port Action Menu

Chapter 8: Device Management 137 d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the d

Seite 54

Chapter 8: Device Management 138 See LAN Interface Settings (on page 138) for information in configuring this section of the Network Settings page

Seite 55 - Managing Favorites

Chapter 8: Device Management 139  Autodetect (default option)  10 Mbps/Half - Both LEDs blink  10 Mbps/Full - Both LEDs blink  100 Mbps/H

Seite 56 - Favorites List Page

Chapter 8: Device Management 140 Device Services The Device Services page allows you to configure the following functions:  Enable SSH access.

Seite 57

Chapter 1: Introduction 6 Virtual Media All KX II models support virtual media. The benefits of virtual media - mounting of remote drives/media on

Seite 58 - Logging Out

Chapter 8: Device Management 141 Entering the Discovery Port The KX II discovery occurs over a single, configurable TCP Port. The default is Port

Seite 59

Chapter 8: Device Management 142 Configuring and Enabling Tiering The tiering feature allows you to access KX II targets and PDUs through one base

Seite 60 - Virtual KVM Client (VKC)

Chapter 8: Device Management 143 Enabling Tiering Connect from a target server port on the base device to the tier KX II Local Access port video/

Seite 61

Chapter 8: Device Management 144 Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached direc

Seite 62

Chapter 8: Device Management 145 Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a

Seite 63

Chapter 8: Device Management 146 Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Log

Seite 64

Chapter 8: Device Management 147 Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use t

Seite 65

Chapter 8: Device Management 148 Configuring Modem Settings To configure modem settings: 1. Click Device Settings > Modem Settings to open

Seite 66 - Keyboard Macros

Chapter 8: Device Management 149 6. Click OK to commit your changes or click Reset to Defaults to return the settings to their defaults. See Ce

Seite 67

Chapter 8: Device Management 150 3. To adjust for daylight savings time, check the "Adjust for daylight savings time" checkbox. 4. Cho

Seite 68

Chapter 1: Introduction 7 Product Photos KX II KX2-832

Seite 69 - Building a Keyboard Macro

Chapter 8: Device Management 151 Event Management The KX II Event Management feature allows you enable and disable the distribution of system eve

Seite 70

Chapter 8: Device Management 152 3. Click OK. To reset to factory defaults:  Click Reset To Defaults. Note: Both IPv4 and IPv6 addresses are

Seite 71 - Running a Keyboard Macro

Chapter 8: Device Management 153 Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can

Seite 72 - Auto-Sense Video Settings

Chapter 8: Device Management 154 3. Click OK.

Seite 73 - Adjusting Video Settings

Chapter 8: Device Management 155 To reset to factory defaults:  Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possi

Seite 74

Chapter 8: Device Management 156 Trap Name Description communicate over the network. networkParameterChanged A change has been made to the network

Seite 75

Chapter 8: Device Management 157 Trap Name Description userSessionTimeout A user with an active session has experienced a session termination due

Seite 76 - Using Screenshot from Target

Chapter 8: Device Management 158 4. Click OK. Note: If either of these checkboxes is selected and power input is not actually connected, the powe

Seite 77

Chapter 8: Device Management 159 Port type Description PowerStrip (rack PDU) Power strip connected VM Virtual media CIM (D2CIM-VUSB and D2CIM-DVU

Seite 78 - Mouse Synchronization Tips

Chapter 8: Device Management 160 8. Click OK. Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targe

Seite 79 - Standard Mouse Mode

Chapter 1: Introduction 8 KX2-864

Seite 80 - Intelligent Mouse Mode

Chapter 8: Device Management 161 5. Select KVM Switch Hot Key Sequence. 6. Enter the Maximum Number of Target Ports (2-32). 7. In the KVM Swit

Seite 81 - Single Mouse Cursor

Chapter 8: Device Management 162 Configuring Rack PDU (Power Strip) Targets The KX II allows you to connect rack PDUs (power strips) to KX II port

Seite 82

Chapter 8: Device Management 163 Naming the Rack PDU in the KX II (Port Page for Power Strips) Note: PX rack PDUs (power strips) can be named in

Seite 83

Chapter 8: Device Management 164 3. Click OK.

Seite 84

Chapter 8: Device Management 165 Associating Outlets with Target Servers on KX II The Port page opens when you click on a port on the Port Config

Seite 85

Chapter 8: Device Management 166 Removing Power Associations When disconnecting target servers and/or rack PDUs from KXII, all power associations

Seite 86 - Keyboard Limitations

Chapter 8: Device Management 167 Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade ch

Seite 87

Chapter 8: Device Management 168 Note: In the case of IBM Blade Center Models E and H, the KX II only supports auto-discovery for AMM[1] as the ac

Seite 88 - Target Screen Resolution

Chapter 8: Device Management 169 2. Select Device Settings > Port Configuration to open the Port Configuration page. 3. On the Port Config

Seite 89 - Active KVM Client (AKC)

Chapter 8: Device Management 170 b. URL - Enter the URL to the interface. Required c. Username - Enter the username used to access the interface

Seite 90 - Browser

Chapter 1: Introduction 9 Product Features Hardware  Integrated KVM-over-IP remote access  1U or 2U rack-mountable (brackets included)  Dua

Seite 91 - Multi-Platform Client (MPC)

Chapter 8: Device Management 171 5. Select the Dell blade chassis model from the Blade Server Chassis Model drop-down. To configure a Dell P

Seite 92

Chapter 8: Device Management 172 5. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade c

Seite 93 - Control

Chapter 8: Device Management 173 To configure a Dell PowerEdge 1855/1955: 1. If you selected Dell 1855/1955, auto-discovery is not available.

Seite 94

Chapter 8: Device Management 174 Note: Leave the username and password fields blank for DRAC, ILO, and RSA web applications or the connection will

Seite 95

Chapter 8: Device Management 175 c. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis. Req

Seite 96

Chapter 8: Device Management 176 c. Username - Enter the username used to access the interface. d. Password - Enter the password used to acces

Seite 97 - Chapter 5

Chapter 8: Device Management 177 4. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade

Seite 98 - Overview

Chapter 8: Device Management 178 Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device wi

Seite 99

Chapter 8: Device Management 179 HP Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports connected to

Seite 100 - Chapter 5: Virtual Media

Chapter 8: Device Management 180 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. S

Seite 101 - Target Server

Chapter 1: Introduction 10 Software  Virtual media with D2CIM-VUSB and D2CIM-DVUSB CIMs  Absolute Mouse Synchronization with D2CIM-VUSB CIM an

Seite 102

Chapter 8: Device Management 181 To delete a port group: 1. Click on the Port Group Management page, select the checkbox of the port group you

Seite 103 - Using Virtual Media

Chapter 8: Device Management 182 Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KX

Seite 104

Chapter 8: Device Management 183 Blade chassis Connection method Recommended CIM(s) M1000e with this chassis. The iKVM is compatible with the fol

Seite 105 - Chapter 5: Virtual Media

Chapter 8: Device Management 184 Blade chassis Connection method Recommended CIM(s) one Advanced Management Module. In contrast to the standard Bl

Seite 106 - Connecting to Virtual Media

Chapter 8: Device Management 185 Blade chassis Required/recommended action Slot, not by Name. iKVM may not work correctly if this is not done. 

Seite 107

Chapter 8: Device Management 186 Blade chassis Required/recommended action management module.  The SSH port configured on the blade chassis mana

Seite 108

Chapter 8: Device Management 187 Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB Profiles

Seite 109 - Disconnecting Virtual Media

Chapter 8: Device Management 188  Ctrl-Click to select several discontinuous profiles. 2. Click Add. The selected profiles appear in the Selec

Seite 110 - USB Profiles

Chapter 8: Device Management 189 2. Click Remove. The selected profiles appear in the Available list. These profiles are no longer available for

Seite 111 - Available USB Profiles

Chapter 8: Device Management 190 Configuring KX II Local Port Settings From the Local Port Settings page, you can customize many settings for the

Seite 112 - Chapter 6: USB Profiles

This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, repro

Seite 113 - Chapter 6: USB Profiles

Chapter 1: Introduction 11 Diagram Key TCP/IP IPv4 and/or IPv6 KVM (Keyboard, Video, Mouse) UTP Cable (Cat5/5e/6) KX II Local Access Console

Seite 114

Chapter 8: Device Management 191 Note: If you are using KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II via the ex

Seite 115

Chapter 8: Device Management 192 Hot key: Take this action: Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Ca

Seite 116

Chapter 8: Device Management 193  Select the "Ignore CC managed mode on local port" checkbox if you would like local user access to t

Seite 117

Chapter 8: Device Management 194 KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-832 and KX2-864 provides you with two local

Seite 118

195 In This Chapter Security Settings ... 195 Configuring IP Acces

Seite 119 - User Management

Chapter 9: Security Management 196 To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can

Seite 120

Chapter 9: Security Management 197 Limitation Description Enter the number of days after which a password change is required. The default is 60 d

Seite 121 - Chapter 7: User Management

Chapter 9: Security Management 198 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor

Seite 122

Chapter 9: Security Management 199 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s

Seite 123 - Setting Permissions

Chapter 9: Security Management 200 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e

Seite 124 - Setting Port Permissions

Chapter 1: Introduction 12 Package Contents Each KX II ships as a fully-configured stand-alone product in a standard 1U (2U for DKX2-864) 19"

Seite 125

Chapter 9: Security Management 201 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,

Seite 126

Chapter 9: Security Management 202 Encryption mode Description a National Institute of Standards and Technology specification for the encryption o

Seite 127

Chapter 9: Security Management 203 Local device reset mode Description Enable Local Factory Reset (default) Returns the KX II device to the facto

Seite 128

Chapter 9: Security Management 204 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desira

Seite 129

Chapter 9: Security Management 205  FIPS 140-2 should be enabled on the client computer and in Internet Explorer. To enable FIPS 140-2 on a W

Seite 130

Chapter 9: Security Management 206 To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/Mask or IPv6/Prefix Length field.

Seite 131 - Authentication Settings

Chapter 9: Security Management 207 3. You are prompted to confirm the deletion. Click OK. SSL Certificates The KX II uses the Secure Socket La

Seite 132

Chapter 9: Security Management 208 b. Organizational unit - This field is used for specifying to which department within an organization the KX I

Seite 133

Chapter 9: Security Management 209 Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed cert

Seite 134

Chapter 9: Security Management 210 4. If needed, change the banner title. This information will be displayed to users as part of the banner. Up t

Seite 135

13 In This Chapter Overview ... 13 Default Login Inf

Seite 136

211 In This Chapter Audit Log... 211 Device Informatio

Seite 137

Chapter 10: Maintenance 212 Device Information The Device Information page provides detailed information about your KX II device and the CIMs in u

Seite 138

Chapter 10: Maintenance 213 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your K

Seite 139

Chapter 10: Maintenance 214 If you are using Internet Explorer 6 or higher, to backup your KX II: 1. Click Backup. A File Download dialog appea

Seite 140

Chapter 10: Maintenance 215  Full Restore - A complete restore of the entire system. Generally used for traditional backup and restore purposes

Seite 141

Chapter 10: Maintenance 216 USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech s

Seite 142

Chapter 10: Maintenance 217 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing

Seite 143 - Changing a Password

Chapter 10: Maintenance 218 3. Click the Upgrade button. You are prompted to confirm the upgrade. 4. Click OK to continue the upgrade. Progress

Seite 144 - Device Management

Chapter 10: Maintenance 219 6. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed for y

Seite 145 - Chapter 8: Device Management

Chapter 10: Maintenance 220 For information about upgrading the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in

Seite 146

Chapter 2: Installation and Configuration 14 Getting Started Step 1: Configure KVM Target Servers KVM target servers are the computers that wil

Seite 147

Chapter 10: Maintenance 221 Upgrade History The KX II provides information about upgrades performed on the KX II and attached CIMS. To view the

Seite 148

Chapter 10: Maintenance 222 To reboot your KX II: 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted

Seite 149 - Device Services

Chapter 10: Maintenance 223 Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you ar

Seite 150

Chapter 10: Maintenance 224 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed

Seite 151

225 In This Chapter Network Interface Page ... 225 Network Statistics Page ..

Seite 152 - Enabling Tiering

Chapter 11: Diagnostics 226 Network Statistics Page The KX II provides statistics about your network interface. To view statistics about your ne

Seite 153

Chapter 11: Diagnostics 227  Interfaces - Produces a page similar to the one displayed here.  Route - Produces a page similar to the one dis

Seite 154

Chapter 11: Diagnostics 228 Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP n

Seite 155

Chapter 11: Diagnostics 229 Note: The host name cannot exceed 232 characters in length. 3. Choose the maximum hops from the drop-down list (5 to

Seite 156

Chapter 11: Diagnostics 230 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical

Seite 157 - Configuring Modem Settings

Chapter 2: Installation and Configuration 15 Windows XP, Windows 2003 and Windows 2008 Settings To configure KVM target servers running Microso

Seite 158

Chapter 11: Diagnostics 231 a. Click the Save to File button. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c.

Seite 159

232 In This Chapter Overview ... 232 Accessing the KX

Seite 160 - Event Management

Chapter 12: Command Line Interface (CLI) 233 Accessing the KX II Using CLI Access the KX II by using one of the following methods:  SSH (Secure

Seite 161

Chapter 12: Command Line Interface (CLI) 234 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX®/Linux® workstation and

Seite 162

Chapter 12: Command Line Interface (CLI) 235 After reviewing the following Navigation of the CLI (on page 235) section, perform the Initial Confi

Seite 163 - 3. Click OK

Chapter 12: Command Line Interface (CLI) 236 Completion of Commands The CLI supports the completion of partially-entered commands. After entering

Seite 164 - SNMP Trap Configuration

Chapter 12: Command Line Interface (CLI) 237 Commands Description help Display an overview of the CLI syntax. quit Places the user back one level

Seite 165

Chapter 12: Command Line Interface (CLI) 238 Setting Network Parameters Network parameters are configured using the interface command. admin >

Seite 166 - Power Supply Setup

Chapter 12: Command Line Interface (CLI) 239 Command Description history Display the current session's command line history. listports List

Seite 167 - Configuring Ports

Chapter 12: Command Line Interface (CLI) 240 Configuring Network The network menu commands are used to configure the KX II network adapter. Comman

Seite 168

Chapter 2: Installation and Configuration 16 Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create

Seite 169

Chapter 12: Command Line Interface (CLI) 241 Name Command The name command is used to configure the network name. The syntax of the name is: n

Seite 170

242 In This Chapter Overview ... 242 Using the KX II L

Seite 171 - Connecting a Rack PDU

Chapter 13: KX II Local Console 243 KX II Local Console Interface When you are located at the server rack, the KX II provides standard KVM manage

Seite 172

Chapter 13: KX II Local Console 244 Local Console Smart Card Access To use a smart card to access a server at the Local Console, plug a USB smart

Seite 173

Chapter 13: KX II Local Console 245 To update the Card Readers Detected list:  Click Refresh if a new smart card has been mounted. The Card R

Seite 174

Chapter 13: KX II Local Console 246 2. In the Select Profile To Use field, select the profile to use from among those available for the port. 3.

Seite 175 - Removing Power Associations

Chapter 13: KX II Local Console 247 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access p

Seite 176

Chapter 13: KX II Local Console 248 To use the Port Access page: 1. Log in to the Local Console. The KVM target servers are initially sorted b

Seite 177

Chapter 13: KX II Local Console 249 2. Click View by Port or View by Group to switch between views.  In addition to the Port Number, Port Name

Seite 178

Chapter 13: KX II Local Console 250 Blade chassis Connect key action Key sequence example Access a port from the local port GUI Access port 5, sl

Seite 179

Chapter 2: Installation and Configuration 17  Animate controls and elements inside windows  Animate windows when minimizing and maximizing 

Seite 180

Chapter 13: KX II Local Console 251 Sun key Local port key combination Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KP

Seite 181

Chapter 13: KX II Local Console 252 Configuring KX II Local Console Local Port Settings From the Local Port Settings page, you can customize many

Seite 182

Chapter 13: KX II Local Console 253 3. Choose the local port hotkey. The local port hotkey is used to return to the KX II Local Console interfac

Seite 183

Chapter 13: KX II Local Console 254  None. There is no authentication for Local Console access. This option is recommended for secure environmen

Seite 184

Chapter 13: KX II Local Console 255 Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local p

Seite 185

Chapter 13: KX II Local Console 256  Timeout (seconds) 1. Click Reset to continue. You will be prompted to confirm the factory reset because al

Seite 186

257 In This Chapter Physical Specifications ... 257 Environmental Requiremen

Seite 187

Appendix A: Specifications 258 Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shipping weight Shipping dimensi

Seite 188

Appendix A: Specifications 259 KX2-8 Specifications Part number Line item description UPC code Power Weight Product dimensions (WxDxH) Shippi

Seite 189

Appendix A: Specifications 260 Operating Shock N/A Supported Operating Systems (Clients) The following operating systems are supported on the Vi

Seite 190

Chapter 2: Installation and Configuration 18 Windows 2000 Settings To configure KVM target servers running Microsoft® Windows 2000® operating sy

Seite 191

Appendix A: Specifications 261 Mode Operating system Browser Windows Server 2003®  Internet Explorer 6.0 SP1++, IE 7, IE 8  Firefox 1.06 - 3

Seite 192

Appendix A: Specifications 262 Supported Paragon CIMs Operating system and serial devices (where applicable) Virtual media Absolute Mouse mode Int

Seite 193

Appendix A: Specifications 263 Supported Paragon CIMs Operating system and serial devices (where applicable) Virtual media Absolute Mouse mode In

Seite 194

Appendix A: Specifications 264 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mouse

Seite 195

Appendix A: Specifications 265 Supported Dominion KX I DCIMs Target server Virtual media Absolute Mouse mode Intelligent Mouse mode Standard Mous

Seite 196

Appendix A: Specifications 266 Supported KX II D2CIMs Target server and remote rack PDUs (where applicable) Virtual media Absolute Mouse mode In

Seite 197

Appendix A: Specifications 267 Supported Operating Systems and CIMs (KVM Target Servers) In addition to the new D2CIMs, most Dominion CIMs are su

Seite 198

Appendix A: Specifications 268 Target server Supported CIMs Mouse modes Windows 2003 Server® Windows Vista operating system Red Hat® Enterprise Wo

Seite 199

Appendix A: Specifications 269 Legend:  VM - Virtual Media (D2CIM-VUSB only)  AM: Absolute Mouse Synchronization (D2CIM-VUSB only)  IM: In

Seite 200

Appendix A: Specifications 270 Part number Line item description Product weight Product dimensions (WxDxH) Shipping weight Shipping dimensions (Wx

Seite 201

Chapter 2: Installation and Configuration 19 a. Choose Main Menu > Preferences > Mouse. The Mouse Preferences dialog appears. b. Click th

Seite 202

Appendix A: Specifications 271 Certified Modems  USRobotics® 56K 5686E  ZOOM® v90  ZOOM v92  USRobotics Sportster® 56K  USRobot

Seite 203 - Port Group Management

Appendix A: Specifications 272 Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so forth and the s

Seite 204 - Security Management

Appendix A: Specifications 273 Resolutions 640x350 @85Hz 1024x768 @75Hz 640x400 @56Hz 1024x768 @90Hz 640x400 @84Hz 1024x768 @100Hz 640x400 @85Hz

Seite 205

Appendix A: Specifications 274 Supported Keyboard Languages The KX II provides keyboard support for the languages listed in the following table. N

Seite 206

Appendix A: Specifications 275 Language Regions Keyboard layout Spanish Spain and most Spanish speaking countries Spanish Portuguese Port

Seite 207

Appendix A: Specifications 276 This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, theref

Seite 208

Appendix A: Specifications 277 Windows XP® operating system targets must be running Windows XP SP3 in order to use smart cards with the KX II. If

Seite 209

Appendix A: Specifications 278 Fedora® Core 10 pcsc-lite-1.4.102.3.fc10.i386  Create a Java™ Library Link A soft link must be created to the lib

Seite 210

Appendix A: Specifications 279 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 14

Seite 211

Appendix A: Specifications 280 Network Speed Settings KX II network speed setting Network switch port setting Auto 1000/Full 100/Full 100/Half 10

Seite 212

Chapter 2: Installation and Configuration 20 Note: If you change the video resolution, you must log off of the target server and log back in for t

Seite 213

Appendix A: Specifications 281 communicate, but collisions will occur Per Ethernet specification, these should be “no communication,” however,

Seite 214

282 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...

Seite 215

Appendix B: Updating the LDAP Schema 283 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to t

Seite 216 - SSL Certificates

Appendix B: Updating the LDAP Schema 284 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create

Seite 217

Appendix B: Updating the LDAP Schema 285 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.

Seite 218 - Security Banner

Appendix B: Updating the LDAP Schema 286 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dia

Seite 219

Appendix B: Updating the LDAP Schema 287 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window o

Seite 220 - Maintenance

Appendix B: Updating the LDAP Schema 288 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name

Seite 221 - Device Information

289 In This Chapter Overview ... 289 Java Runtime Envi

Seite 222 - Backup and Restore

Appendix C: Informational Notes 290 IPv6 Support Notes Java Java™ 1.6 supports IPv6 for the following:  Solaris™ 8 and higher  Linux® kernel

Seite 223 - Chapter 10: Maintenance

iii Contents Chapter 1 Introduction 1 KX II Overview ...

Seite 224 - Chapter 10: Maintenance

Chapter 2: Installation and Configuration 21 2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display. The Dis

Seite 225 - USB Profile Management

Appendix C: Informational Notes 291 Keyboards Non-US Keyboards French Keyboard Caret Symbol (Linux® Clients Only) The Virtual KVM Client and the

Seite 226 - Upgrading CIMs

Appendix C: Informational Notes 292 Tilde Symbol From the Virtual KVM Client and the Multi-Platform Client, the key combination of Alt Gr + 2 does

Seite 227 - Upgrading Firmware

Appendix C: Informational Notes 293 Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. When using

Seite 228

Appendix C: Informational Notes 294 Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using

Seite 229

Appendix C: Informational Notes 295 Resolving Issues with Firefox Freezing when Using Fedora If you are accessing Firefox® and are using a Fedora

Seite 230 - Rebooting

Appendix C: Informational Notes 296 USB Ports and Profiles VM-CIMs and DL360 USB Ports HP® DL360 servers have one USB port on the back of the devi

Seite 231

Appendix C: Informational Notes 297 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles

Seite 232 - Stopping CC-SG Management

Appendix C: Informational Notes 298 Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will

Seite 233

Appendix C: Informational Notes 299 Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000® operating system does not supp

Seite 234 - Diagnostics

Appendix C: Informational Notes 300 Accessing Virtual Media on a Windows 2000 Server Using a D2CIM-VUSB A virtual media local drive cannot be acce

Seite 235 - Network Statistics Page

Chapter 2: Installation and Configuration 22 Make Linux Settings Permanent Note: These steps may vary slightly depending on the specific version o

Seite 236 - Chapter 11: Diagnostics

Appendix C: Informational Notes 301 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you ar

Seite 237 - Trace Route to Host Page

302 In This Chapter General Questions ... 303 Remote Access ...

Seite 238

Appendix D: FAQs 303 General Questions What is the KX II? The KX II is a second generation digital KVM (keyboard/video/ mouse) switch that enable

Seite 239 - Device Diagnostics

Appendix D: FAQs 304 Will my existing KX I CIMs work with the KX II switches? Yes, existing KX I CIMs will work with the KX II switch. In addition

Seite 240

Appendix D: FAQs 305 Remote Access How many users can remotely access servers on each KX II? The KX II models offer remote connections for up to

Seite 241 - Command Line Interface (CLI)

Appendix D: FAQs 306 100Mbps Theoretical 100Mbit network speed 0.05 seconds 60Mbps Likely practical 100Mbit network speed 0.08 seconds 10Mbps Theo

Seite 242 - SSH Connection to the KX II

Appendix D: FAQs 307 Universal Virtual Media What KX II models support virtual media? All of the KX II models support virtual media. It is avai

Seite 243 - Logging In

Appendix D: FAQs 308 USB Profiles What is a USB profile? Certain servers require a specifically configured USB interface for USB based services

Seite 244 - Navigation of the CLI

Appendix D: FAQs 309 Do I need a special CIM to use USB profiles? You must use a D2CIM-VUSB or D2CIM-DVUSB with updated firmware. Will Raritan pr

Seite 245 - Shortcuts

Appendix D: FAQs 310 Bandwidth and KVM-over-IP Performance How is bandwidth used in KVM-over-IP systems? The KX II offers next generation KVM-over

Seite 246

Chapter 2: Installation and Configuration 23 2. All KVM target servers must be configured to one of the display resolutions supported by the KX

Seite 247 - CLI Commands

Appendix D: FAQs 311 Unlike KX I, the Noise Filter parameter does not generally have a large role in reducing bandwidth or improving performance.

Seite 248

Appendix D: FAQs 312 QuickTime video #2 1500 - 2500 KB/s 400 - 550 KB/s 200 - 350 KB/s With the reduced bandwidth settings, bandwidth is reduced s

Seite 249 - Configuring Network

Appendix D: FAQs 313 Please note that these bandwidth figures are only examples and may vary from those seen in your environment due to many fact

Seite 250 - Name Command Example

Appendix D: FAQs 314 It depends on the bandwidth and latency of the Internet connection between your remote client and the KX II. With a cable

Seite 251 - KX II Local Console

Appendix D: FAQs 315 Ethernet and IP Networking Does the KX II offer dual gigabit Ethernet ports to provide redundant fail-over? Yes. The KX II

Seite 252 - Security and Authentication

Appendix D: FAQs 316 How many TCP ports must be open on my firewall in order to enable network access to the KX II? Are these ports configurable?

Seite 253

Appendix D: FAQs 317 IPv6 Networking What is IPv6? IPv6 is the acronym for “Internet Protocol Version 6”. IPv6 is the “next generation” IP protoc

Seite 254

Appendix D: FAQs 318 Where can I get more information on IPv6? See www.ipv6.org for general information on IPv6. The KX II User Guide describes th

Seite 255 - Available Resolutions

Appendix D: FAQs 319 Servers Does the KX II depend on a Windows server to operate? Absolutely not. Because users depend on the KVM infrastructure

Seite 256

Appendix D: FAQs 320 Blade Servers Can I connect blade servers to the KX II? Yes. The KX II supports popular blade server models from the leadin

Seite 257

Chapter 2: Installation and Configuration 24 2. Choose Mouse Style Manager. The Style Manager - Mouse dialog appears. 3. Set the Acceleration sl

Seite 258 - Hot Keys and Connect Keys

Appendix D: FAQs 321 For KX II's, Raritan recommends connecting up to two times the number of remote connections supported by the device. Fo

Seite 259 - Special Sun Key Combinations

Appendix D: FAQs 322 Installation Besides the device itself, what do I need to order from Raritan to install the KX II? Each server that connects

Seite 260 - Local Port Administration

Appendix D: FAQs 323 Servers connected to the KX II do not require any software agents to be installed, because the KX II connects directly via h

Seite 261

Appendix D: FAQs 324 Local Port Can I access my servers directly from the rack? Yes. At the rack, the KX II functions just like a traditional KVM

Seite 262

Appendix D: FAQs 325  If the external authentication servers are unavailable, the KX II fails-over to its own internal authentication database.

Seite 263

Appendix D: FAQs 326 Extended Local Port (Dominion KX2-832 and KX2-864 Models Only) What is the extended local port? The Dominion KX2-832 and KX2-

Seite 264

Appendix D: FAQs 327 Power Control Does the KX II have a dual power option? All of the KX II models come equipped with dual AC inputs and power s

Seite 265

Appendix D: FAQs 328 Does remote power control require any special server configuration? Some servers ship with default BIOS settings such that

Seite 266 - Specifications

Appendix D: FAQs 329 Scalability How do I physically connect multiple KX II devices together into one solution? To physically connect multiple

Seite 267 - Appendix A: Specifications

Appendix D: FAQs 330 For customers wanting stand-alone usage (without a central management system), multiple KX II units still interoperate and sc

Seite 268 - Environmental Requirements

Chapter 2: Installation and Configuration 25 Card To check resolution: To change resolution: 32-bit # /usr/sbin/pgxconfig -prconf 1. # /usr/sbin

Seite 269

Appendix D: FAQs 331 Computer Interface Modules (CIMs) Can I use Computer Interface Modules (CIMs) from Raritan's analog matrix KVM switch,

Seite 270

Appendix D: FAQs 332 Security Is the Dominion KX II FIPS 140-2 Certified? The KX II 2.2.0 and later, and the KSX II 2.3.0 and later, provides user

Seite 271

Appendix D: FAQs 333 Yes, the KX II has administrator-configurable, strong password checking to ensure that user-created passwords meet corporate

Seite 272

Appendix D: FAQs 334 Smart Cards and CAC Authentication Does the KX II support smart card and CAC authentication? Yes, smart cards and DoD Common

Seite 273

Appendix D: FAQs 335 Manageability Can the KX II be remotely managed and configured via web browser? Yes, the KX II can be completely configure

Seite 274

Appendix D: FAQs 336 Miscellaneous What is the KX II's default IP address? 192.168.0.192 What is the KX II's default user name and passw

Seite 275

337 A A. AC Power • 27 Absolute Mouse Mode • 72 Accessing a Target Server • 251 Accessing the KX II Using CLI • 233 Accessing Virtual Media on a Wi

Seite 276

Index 338 Connecting to Virtual Media • 97 Connection Information • 57 Connection Properties • 55 Create User Groups and Users • 35 Creating a New

Seite 277

Index 339 K Keyboard Language Preference (Fedora Linux Clients) • 292 Keyboard Macros • 57 Keyboard Options • 57 Keyboards • 291 KX II Client App

Seite 278

Index 340 R Rack PDU (Power Strip) Outlet Control • 84 RADIUS Communication Exchange Specifications • 131 Rebooting • 221 Refreshing the Screen •

Seite 279 - Supported Browsers

Chapter 2: Installation and Configuration 26 Make UNIX Settings Permanent Note: These steps may vary slightly depending on the type of UNIX® (for

Seite 280 - Certified Modems

Index 341 SUSE/VESA Video Modes • 295 Switching Between KVM Target Servers • 53 T Target BIOS Boot Time with Virtual Media • 300 Target Server Co

Seite 281 - Supported Video Resolutions

U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then P

Seite 282

Chapter 2: Installation and Configuration 27 Step 3: Connect the Equipment Connect the KX II to the power supply, network, local PC, local video

Seite 283 - Supported Keyboard Languages

Chapter 2: Installation and Configuration 28 C. Network Port The KX II provides two Ethernet ports for failover purposes (not for load-balancing).

Seite 284 - Smart Card Readers

Chapter 2: Installation and Configuration 29 Connection Description port. Keyboard Attach a standard USB keyboard to one of the USB Type A (femal

Seite 285 - Target Server Requirements

Chapter 2: Installation and Configuration 30 Changing the Default Password The KX II ships with a default password. The first time you start the K

Seite 286 - Remote Client Requirements

Contents iv Video Properties ... 63 M

Seite 287 - TCP and UDP Ports Used

Chapter 2: Installation and Configuration 31 c. Enter the Default Gateway if None is selected from the IP Auto Configuration drop-down. d. Ente

Seite 288

Chapter 2: Installation and Configuration 32 5. Select Obtain DNS Server Address Automatically if DHCP is selected and Obtain DNS Server Address

Seite 289 - Network Speed Settings

Chapter 2: Installation and Configuration 33 Valid Special Characters for Target Names Character Description Character Description ! Exclamatio

Seite 290

Chapter 2: Installation and Configuration 34 3. If you are plugging power input into power supply number two (right-most power supply at the back

Seite 291 - Updating the LDAP Schema

Chapter 2: Installation and Configuration 35 Note on Microsoft Active Directory Microsoft® Active Directory® uses the LDAP/LDAPS protocol nativel

Seite 292 - Creating a New Attribute

Chapter 2: Installation and Configuration 36 5. Shut down the device and power on once again. The DCIM-SUSB performs a reset (power cycle). 6. V

Seite 293

37 In This Chapter Interfaces ... 37 Proxy Server Con

Seite 294

Chapter 3: Working with Target Servers 38 KX II Local Console Interface When you are located at the server rack, the KX II provides standard KVM m

Seite 295 - Updating the Schema Cache

Chapter 3: Working with Target Servers 39 Depending on your browser and security settings, you may see various security and certificate warnings.

Seite 296

Chapter 3: Working with Target Servers 40 Interface and Navigation KX II Console Layout Both the KX II Remote Console and the KX II Local Console

Seite 297

Contents v Adding a New User ... 120 Modif

Seite 298 - Informational Notes

Chapter 3: Working with Target Servers 41 Left Panel The left panel of the KX II interface contains the following information. Note that some inf

Seite 299 - IPv6 Support Notes

Chapter 3: Working with Target Servers 42 Information Description When displayed? Configured As Base or Configured As Tiered If you are using a ti

Seite 300 - Keyboards

Chapter 3: Working with Target Servers 43 Port Access Page After successfully logging on to the KX II Remote Console, the Port Access page appear

Seite 301 - Tilde Symbol

Chapter 3: Working with Target Servers 44 Note: Do not use apostrophes for the Port (CIM) Name.  Status - The status for standard servers is eit

Seite 302

Chapter 3: Working with Target Servers 45  Power On - Powers on the target server through the associated outlet. This option is visible only wh

Seite 303

Chapter 3: Working with Target Servers 46 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices yo

Seite 304 - Video Modes and Resolutions

Chapter 3: Working with Target Servers 47 Note: Both IPv4 and IPv6 addresses are supported. Manage Favorites Page To open the Manage Favorit

Seite 305 - USB Ports and Profiles

Chapter 3: Working with Target Servers 48 c. Click Save. 3. Click Refresh. The list of devices on the local subnet is refreshed. To add device

Seite 306

Chapter 3: Working with Target Servers 49 Adding, Deleting and Editing Favorites To add a device to your favorites list: 1. Choose Manage &g

Seite 307

Chapter 3: Working with Target Servers 50 Proxy Server Configuration for use with MPC, VKC and AKC When the use of a Proxy Server is required, a S

Seite 308

Contents vi Configuring IP Access Control ... 205

Seite 309

Chapter 3: Working with Target Servers 51 start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true

Seite 310

Chapter 3: Working with Target Servers 52 Button Button Name Description Video Settings Opens the Video Settings dialog, allowing you to manually

Seite 311 - Appendix D

Chapter 3: Working with Target Servers 53 Switching Between KVM Target Servers With the KX II, you can access several KVM target servers. The KX

Seite 312 - General Questions

Chapter 3: Working with Target Servers 54 Disconnecting KVM Target Servers Note: This item is not available on the KX II Local Console. The only w

Seite 313 - Appendix D: FAQs

Chapter 3: Working with Target Servers 55 Connection Properties The dynamic video compression algorithms maintain KVM console usability under var

Seite 314 - Remote Access

Chapter 3: Working with Target Servers 56  256 Kb (Cable)  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem)

Seite 315

Chapter 3: Working with Target Servers 57 Connection Information To obtain information about your Virtual KVM Client connection:  Choose Conn

Seite 316 - Universal Virtual Media

Chapter 3: Working with Target Servers 58 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi

Seite 317

Chapter 3: Working with Target Servers 59  Click Yes to replace the existing macro with the imported version.  Click Yes to All to replace th

Seite 318 - Appendix D: FAQs

Chapter 3: Working with Target Servers 60 3. Click Ok. The Export Keyboard Macro. A dialog from which to locate and select the macro file appears

Seite 319

Contents vii Chapter 13 KX II Local Console 242 Overview ...

Seite 320

Chapter 3: Working with Target Servers 61 Press Left Ctrl Release Left Ctrl Press Esc Release Esc 8. Review the Macro Sequence field to be sure

Seite 321

Chapter 3: Working with Target Servers 62 Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you

Seite 322 - Reduce Color Depth

Chapter 3: Working with Target Servers 63 3. Set the language and mouse settings. 4. Exit the menu to return to normal CIM functionality.

Seite 323

Chapter 3: Working with Target Servers 64 Calibrating Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturat

Seite 324 - Ethernet and IP Networking

Chapter 3: Working with Target Servers 65 c. Brightness: Use this setting to adjust the brightness of the target server display. d. Brightness

Seite 325

Chapter 3: Working with Target Servers 66 Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on c

Seite 326 - IPv6 Networking

Chapter 3: Working with Target Servers 67 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot

Seite 327

Chapter 3: Working with Target Servers 68 Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and

Seite 328 - Servers

Chapter 3: Working with Target Servers 69 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor

Seite 329 - Blade Servers

Chapter 3: Working with Target Servers 70 Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the up

Seite 330

Contents viii Setting the Registry to Permit Write Operations to the Schema ... 283 Creating a New Att

Seite 331 - Installation

Chapter 3: Working with Target Servers 71 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s

Seite 332

Chapter 3: Working with Target Servers 72 Please note that mouse configurations will vary on different target operating systems. Consult your OS g

Seite 333 - Local Port

Chapter 3: Working with Target Servers 73 2. Click the Single/Double Mouse Cursor button in the toolbar. To exit single mouse mode: 1. Pr

Seite 334

Chapter 3: Working with Target Servers 74 Smart Cards (VKC, AKC and MPC) Using the KX II 2.1.10 or later, you are able to mount a smart card reade

Seite 335

Chapter 3: Working with Target Servers 75 4. A progress dialog will open. Check the 'Mount selected card reader automatically on connection

Seite 336 - Power Control

Chapter 3: Working with Target Servers 76 Tool Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client, i

Seite 337

Chapter 3: Working with Target Servers 77 4. Exit Full Screen Mode - Hotkey. When you enter Full Screen mode, the display of the target server b

Seite 338 - Scalability

Chapter 3: Working with Target Servers 78 Language Configuration method French Keyboard Indicator German System Settings (Control Center) Japanese

Seite 339

Chapter 3: Working with Target Servers 79 View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To

Seite 340

Chapter 3: Working with Target Servers 80 Help Options About Raritan Virtual KVM Client This menu command provides version information about the V

Seite 341 - Security

Contents ix Appendix D FAQs 302 General Questions ...

Seite 342

Chapter 3: Working with Target Servers 81 AKC Supported Operating Systems and Browsers .NET Framework AKC requires Windows .NET® version 3.5, and

Seite 343

Chapter 3: Working with Target Servers 82 Prerequisites for Using AKC In order to use AKC:  Ensure the cookies from the IP address of the device

Seite 344 - Manageability

Chapter 3: Working with Target Servers 83 Note: The Alt+Tab command toggles between windows only on the local system. When MPC opens, the Raritan

Seite 345 - Miscellaneous

84 In This Chapter Overview ... 84 Turning Outlets O

Seite 346

Chapter 4: Rack PDU (Power Strip) Outlet Control 85  Control - Turn outlets on or off, or cycle their power.  Association - The ports associa

Seite 347

Chapter 4: Rack PDU (Power Strip) Outlet Control 86 5. Click OK to close the Power On confirmation dialog. The outlet will be turned on and its s

Seite 348 - Index

Chapter 4: Rack PDU (Power Strip) Outlet Control 87 2. Click OK. The outlet will then cycle (note that this may take a few seconds). 3. Once t

Seite 349

88 In This Chapter Overview ... 89 Prerequisites for

Seite 350

Chapter 5: Virtual Media 89 Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from a client

Seite 351

Chapter 5: Virtual Media 90

Kommentare zu diesen Handbüchern

Keine Kommentare