Raritan Dominion KX II Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Netzwerk-Switches Raritan Dominion KX II herunter. Raritan Dominion KX II User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 408
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Dominion KX II

Copyright © 2014 Raritan, Inc. DKX2-v2.6.0-0R-E March 2014 255-62-4023-00 Dominion KX II User Guide Release 2.6.0

Seite 2 - VCCI Information (Japan)

Contents x Virtual Media Notes ...

Seite 3

Chapter 3: Working with Target Servers 89 Smart Cards Using the KX II, you are able to mount a smart card reader onto a target server to support

Seite 4

Chapter 3: Working with Target Servers 90 You are also able to remove or reinsert a smart card. This function can be used to provide notification

Seite 5 - Contents

Chapter 3: Working with Target Servers 91 To update the smart card in the Select Smart Card Reader dialog:  Click Refresh List if a new smart

Seite 6

Chapter 3: Working with Target Servers 92 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file

Seite 7

Chapter 3: Working with Target Servers 93 Since .NET is required to run AKC, if you do not have .NET installed or you have an unsupported version

Seite 8

Chapter 3: Working with Target Servers 94 Multi-Platform Client (MPC) Raritan Multi-Platform Client (MPC) is a graphical user interface for the Ra

Seite 9

Chapter 3: Working with Target Servers 95 Note: Depending on your browser and browser security settings, you may see various security and certifi

Seite 10 - Contents

96 All KX II models support virtual media. Virtual media extends KVM capabilities by enabling target servers to remotely access media from a client

Seite 11 - Index 391

Chapter 4: Virtual Media 97 Remote PC VM Prerequisites  Certain virtual media options require administrative privileges on the remote PC (for e

Seite 12 - Introduction

Chapter 4: Virtual Media 98 Supported Tasks Via Virtual Media Virtual media provides the ability to perform tasks remotely, such as:  Transferri

Seite 13 - KX II Overview

Contents xi Appendix F Frequently Asked Questions 355 General FAQs ...

Seite 14 - Chapter 1: Introduction

Chapter 4: Virtual Media 99 Supported Virtual Media Operating Systems The following client operating systems are supported:  Windows® 7 operati

Seite 15 - Package Contents

Chapter 4: Virtual Media 100 Connecting and Disconnecting from Virtual Media Access a Virtual Media Drive on a Client Computer To access a virtu

Seite 16 - KX2-808

Chapter 4: Virtual Media 101 Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the s

Seite 17 - Chapter 1: Introduction

Chapter 4: Virtual Media 102 Note: If you are working with files on a Linux® target, use the Linux Sync command after the files are copied using v

Seite 18 - Product Features

Chapter 4: Virtual Media 103 Drive Partitions The following drive partition limitations exist across operating systems:  Windows® and Mac targe

Seite 19

Chapter 4: Virtual Media 104 Virtual Media File Server Setup (File Server ISO Images Only) This feature is only required when using virtual media

Seite 20 - KX II Help

105 In This Chapter Overview ... 105 Turning Outlets O

Seite 21 - Chapter 2

Chapter 5: Rack PDU (Power Strip) Outlet Control 106  Control - Turn outlets on or off, or cycle their power.  Association - The ports associa

Seite 22

Chapter 5: Rack PDU (Power Strip) Outlet Control 107 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. T

Seite 23 - Getting Started

108 In This Chapter Overview ... 108 CIM Compatibility

Seite 24 - Mouse Settings

1 In This Chapter KX II Overview ... 2 Package Contents ...

Seite 25 - Apple Mac Mouse Settings

Chapter 6: USB Profiles 109 CIM Compatibility In order to make use of USB profiles, you must use a virtual media CIM with updated firmware. For a

Seite 26 - IBM AIX Mouse Settings

Chapter 6: USB Profiles 110 USB profile Description  USB enumeration will trigger whenever Virtual Media is connected or disconnected Restrictio

Seite 27 - C. Network Port

Chapter 6: USB Profiles 111 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.

Seite 28 - E. Target Server Ports

Chapter 6: USB Profiles 112 USB profile Description BIOS Lenovo ThinkPad T61 & X61 BIOS Lenovo ThinkPad T61 and X61 (boot from virtual media)

Seite 29 - Change the Default Password

Chapter 6: USB Profiles 113 USB profile Description when using the Mac Boot Menu MAC OS X® 10.4.9 (and later) Mac OS X version 10.4.9 (and later)

Seite 30 - Configure the IPv4 Settings

Chapter 6: USB Profiles 114 USB profile Description  Keyboard and Mouse (Type 2) first  Mass Storage  USB bus speed limited to full-speed (1

Seite 31 - Configure the DNS Settings

Chapter 6: USB Profiles 115 Mouse Modes when Using the Mac Boot Menu When working with USB profiles in, to use the Mouse in the Mac Boot Menu, yo

Seite 32 - Name Your Target Servers

116 In This Chapter User Groups ... 116 Users ...

Seite 33

Chapter 7: User Management 117 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good

Seite 34

Chapter 7: User Management 118 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select th

Seite 35

Chapter 1: Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch

Seite 36 - Logging in to the KX II

Chapter 7: User Management 119 Note: Several administrative functions are available within and from the KX II Local Console. These functions are

Seite 37 - Allow Pop-Ups

Chapter 7: User Management 120 Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the

Seite 38 - Installing a Certificate

Chapter 7: User Management 121 Permission Description settings. If you are using a tiered configuration in which a base KX II device is used to a

Seite 39

Chapter 7: User Management 122 VM access Power control access option Description Deny Deny power control to the target server Access Full permissi

Seite 40

Chapter 7: User Management 123 Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-le

Seite 41

Chapter 7: User Management 124 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the or

Seite 42

Chapter 7: User Management 125 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and

Seite 43 - Working with Target Servers

Chapter 7: User Management 126 6. To activate the new user, leave the Active checkbox selected. Click OK. View the KX II Users List The User Lis

Seite 44

Chapter 7: User Management 127  Username - username for user logins and target connections  Access From - IP address of client PC accessing t

Seite 45

Chapter 7: User Management 128 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management &g

Seite 46

Chapter 1: Introduction 3

Seite 47

Chapter 7: User Management 129 4. If you choose LDAP/LDAPS, read the section entitled Implementing LDAP Remote Authentication for information ab

Seite 48

Chapter 7: User Management 130  Microsoft Active Directory. Active Directory is an implementation of LDAP/LDAPS directory services by Microsoft

Seite 49

Chapter 7: User Management 131 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used

Seite 50

Chapter 7: User Management 132 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certifica

Seite 51 - Set Scan Tab

Chapter 7: User Management 133 Once the test is completed, a message will be displayed that lets you know the test was successful or, if the test

Seite 52

Chapter 7: User Management 134 Important Notes  Group Name is case sensitive.  The KX II provides the following default groups that cannot be

Seite 53

Chapter 7: User Management 135 9. The default number of retries is 3 Retries. This is the number of times the KX II will send an authenticatio

Seite 54

Chapter 7: User Management 136 Cisco ACS 5.x for RADIUS Authentication If you are using a Cisco ACS 5.x server, after you have configured the KX I

Seite 55 - KX II interface

Chapter 7: User Management 137 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II determines th

Seite 56 - Access and Display Favorites

Chapter 7: User Management 138 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connectio

Seite 57

Chapter 1: Introduction 4 Diagram key Local port access Tiering IP-based network access Extended local port Modem Mobile access via iPhone®

Seite 58

Chapter 7: User Management 139 User Authentication Process Remote authentication follows the process specified in the flowchart below:

Seite 59

Chapter 7: User Management 140 Changing a Password To change your KX II password: 1. Choose User Management > Change Password. The Change

Seite 60 - Using Scan Port Options

141 In This Chapter Network Settings ... 141 Device Services ...

Seite 61

Chapter 8: Device Management 142 Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings > Network. T

Seite 62

Chapter 8: Device Management 143 Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network settings in

Seite 63

Chapter 8: Device Management 144 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addresses entered

Seite 64

Chapter 8: Device Management 145 Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends

Seite 65

Chapter 8: Device Management 146 3. Enter the SSH Port information. The standard SSH TCP port number is 22 but the port number can be changed to

Seite 66

Chapter 8: Device Management 147 Configuring and Enabling Tiering The tiering feature allows you to access KX II targets and PDUs through one bas

Seite 67

Chapter 8: Device Management 148 Port configuration, including changing the CIM name, must be done directly from each device. It cannot be done fr

Seite 68

Chapter 1: Introduction 5 KX II Device Photos and Features KX II KX2-808

Seite 69

Chapter 8: Device Management 149 6. In the Tier Secret field, enter the same secret word you entered for the base device on the Device Settings

Seite 70

Chapter 8: Device Management 150 Unsupported and Limited Features on Tiered Targets The following features are not supported on tiered targets: 

Seite 71 - Keyboard Macros

Chapter 8: Device Management 151 Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a

Seite 72

Chapter 8: Device Management 152 Diagram key Target server CIM from target server to the KX II tiered device KX II tiered device D2CIM-DVUSB

Seite 73

Chapter 8: Device Management 153 Direct Port Access URL Syntax for the Virtual KVM Client (VKC) If you are using the Virtual KVM Client (VKC) and

Seite 74 - Building a Keyboard Macro

Chapter 8: Device Management 154 Direct Port Access URL Syntax for the Active KVM Client (AKC) If you are using the Active KVM Client (AKC) and di

Seite 75 - Running a Keyboard Macro

Chapter 8: Device Management 155 Enable Direct Port Access To enable direct port access: 1. Choose Device Settings > Device Services. The D

Seite 76 - Ctrl+Alt+Del Macro

Chapter 8: Device Management 156 Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use th

Seite 77 - Calibrating Color

Chapter 8: Device Management 157 2. Launch Internet Explorer® using the KX II IP address as the URL. A Certificate Error message will be display

Seite 78 - Adjusting Video Settings

Chapter 8: Device Management 158 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option must be selected. Required 4

Seite 79

Chapter 1: Introduction 6 KX2-832 KX2-864 See KX II Dimensions and Physical Specifications (on page 287) for product specifications. See Support

Seite 80

Chapter 8: Device Management 159 Configure SNMP traps on the Event Management - Settings page, which can be quickly accessed by clicking the SNMP

Seite 81

Chapter 8: Device Management 160 This information is used to configure modem settings. Because different modems have different ways of settings th

Seite 82 - Mouse Synchronization Tips

Chapter 8: Device Management 161 See Certified Modems (on page 307) for information on certified modems that work with the KX II. For informati

Seite 83 - Standard Mouse Mode

Chapter 8: Device Management 162 Event Management The KX II Event Management feature allows you enable and disable the distribution of system ev

Seite 84 - Intelligent Mouse Mode

Chapter 8: Device Management 163 a. Destination IP/Hostname - the IP or hostname of the SNMP manager. Up to five (5) SNMP managers can be create

Seite 85 - Absolute Mouse Mode

Chapter 8: Device Management 164 Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Man

Seite 86 - General Settings

Chapter 8: Device Management 165 Use the reset to factory defaults feature to remove the SNMP configuration and set the KX II to its original fac

Seite 87

Chapter 8: Device Management 166 Trap Name Description networkFailure An Ethernet interface of the product can no longer communicate over the netw

Seite 88 - Keyboard Limitations

Chapter 8: Device Management 167 Trap Name Description userForcedLogout A user was forcibly logged out by Admin userLogin A user has successfully

Seite 89 - Client Launch Settings

Chapter 8: Device Management 168 Note: If you have Read-Write privileges to the MIB file, use a MIB editor to make changes to the file. SysLog

Seite 90 - View Toolbar

Chapter 1: Introduction 7 Product Features Hardware  Integrated KVM-over-IP remote access  1U or 2U rack-mountable (brackets included)  Dua

Seite 91 - Scaling

Chapter 8: Device Management 169 Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps)

Seite 92 - Full Screen Mode

Chapter 8: Device Management 170 Power Supply Setup The KX II provides dual power supplies, and can automatically detect and provide notification

Seite 93

Chapter 8: Device Management 171 Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the

Seite 94 - Saving Audio Settings

Chapter 8: Device Management 172 Alternatively, rename ports that are currently not connected to the KX II via a CIM and, as such, have a status o

Seite 95

Chapter 8: Device Management 173 Configuring Standard Target Servers To name the target servers: 1. Connect all of the target servers if you h

Seite 96

Chapter 8: Device Management 174 8. Click OK. Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targe

Seite 97

Chapter 8: Device Management 175 Note: Only one switch will appear in the drop-down. 5. Select KVM Switch Hot Key Sequence. 6. Enter the Maximu

Seite 98

Chapter 8: Device Management 176 Configuring CIM Ports The KX II supports the use of standard and virtual media CIMs to connect a server to the KX

Seite 99

Chapter 8: Device Management 177 If you are using an HDMI CIM, some operating system/video card combinations may offer a limited range of RGB val

Seite 100

Chapter 8: Device Management 178 Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are connected to the Dominion device using the D

Seite 101

Chapter 1: Introduction 8 Model Remote users Ports KX II-416 4 16 KX II-232 2 32 KX II-216 2 16 KX II-132 1 32 KX II-116 1 16 KX II-108 1 8 Soft

Seite 102

Chapter 8: Device Management 179 Naming the Rack PDU (Port Page for Power Strips) Note: PX rack PDUs (power strips) can be named in the PX as wel

Seite 103 - Operating Systems

Chapter 8: Device Management 180 3. Click OK.

Seite 104 - Prerequisites for Using AKC

Chapter 8: Device Management 181 Associating Outlets with Target Servers The Port page opens when you click on a port on the Port Configuration p

Seite 105 - Multi-Platform Client (MPC)

Chapter 8: Device Management 182 Removing Power Associations When disconnecting target servers and/or rack PDUs from the device, all power associa

Seite 106

Chapter 8: Device Management 183 Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade ch

Seite 107 - Virtual Media

Chapter 8: Device Management 184 Two modes of operation are provided for blade chassis: manual configuration and auto-discovery, depending on the

Seite 108 - Mounting Local Drives

Chapter 8: Device Management 185 Generic Blade Chassis Configuration The Generic Blade Chassis' selection provides only a manual configurati

Seite 109 - Chapter 4: Virtual Media

Chapter 8: Device Management 186 9. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade c

Seite 110 - Chapter 4: Virtual Media

Chapter 8: Device Management 187 13. Select the CIMs native, display resolution from the Display Native Resolution drop-down. This is the preferr

Seite 111

Chapter 8: Device Management 188 c. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis. Requ

Seite 112

This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, repro

Seite 113

Chapter 1: Introduction 9 KX II Client Applications The following client applications can be used in the KX II: KX II 2.2 (and later):  Virtual

Seite 114

Chapter 8: Device Management 189 b. URL - Enter the URL to the interface. See Blade Chassis Sample URL Formats (on page 203) for sample configur

Seite 115

Chapter 8: Device Management 190 d. Port Number - The default port number for the blade chassis is 22. Not applicable. e. Username - Not applica

Seite 116 - Control

Chapter 8: Device Management 191 5. USB profiles do not apply to Dell chassis. 6. Click OK to save the configuration. IBM Blade Chassis Config

Seite 117

Chapter 8: Device Management 192 f. Password - Enter the password used to access the blade chassis. Required for auto-discovery mode 2. If you w

Seite 118

Chapter 8: Device Management 193 e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be a

Seite 119 - USB Profiles

Chapter 8: Device Management 194 The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access

Seite 120 - Available USB Profiles

Chapter 8: Device Management 195 Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device w

Seite 121 - Chapter 6: USB Profiles

Chapter 8: Device Management 196 HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports

Seite 122 - Chapter 6: USB Profiles

Chapter 8: Device Management 197 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4.

Seite 123

Chapter 8: Device Management 198 Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KX II and t

Seite 124

10 In This Chapter Overview ... 10 Rack Mounting ...

Seite 125

Chapter 8: Device Management 199 Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KX

Seite 126

Chapter 8: Device Management 200 Blade chassis Connection method Recommended CIM(s) Both modules enable you to connect a PS/2-compatible keyboard,

Seite 127 - User Management

Chapter 8: Device Management 201 Blade chassis Connection method Recommended CIM(s) Technology IBM BladeCenter E The current model BladeCenter E

Seite 128

Chapter 8: Device Management 202 This table contains information on limitations and constraints that apply to configuring blade chassis to work wi

Seite 129 - Chapter 7: User Management

Chapter 8: Device Management 203 Blade chassis Required/recommended action  Do not designate any slots for scan operations in the iKVM GUI Setu

Seite 130

Chapter 8: Device Management 204 Blade chassis Sample URL format  Password: calvin  Password Field: password Dell 1855  URL: https://192.168

Seite 131 - Setting Permissions

Chapter 8: Device Management 205 2. Click the Port Name for the KVM port you want to edit. The Port page opens. To select the USB profiles for

Seite 132 - Setting Port Permissions

Chapter 8: Device Management 206 Configuring KX II Local Port Settings From the Local Port Settings page, you can customize many settings for the

Seite 133

Chapter 8: Device Management 207 Note: If you are using KX2-808, KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II v

Seite 134

Chapter 8: Device Management 208 Note: Keyboard use for Chinese, Japanese, and Korean is for display only. Local language input is not supported a

Seite 135

Chapter 2: Installation and Configuration 11 5. When connecting cables to the rear panel of the KX II drape them over the cable-support bar.

Seite 136

Chapter 8: Device Management 209  1280x1024 13. Choose the refresh rate from the drop-down list. The browser will be restarted when this change

Seite 137

Chapter 8: Device Management 210 KX2-808, KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-808, KX2-832 and KX2-864 provide y

Seite 138

Chapter 8: Device Management 211 Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to or

Seite 139 - Authentication Settings

Chapter 8: Device Management 212 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Se

Seite 140

Chapter 8: Device Management 213 For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to t

Seite 141

Chapter 8: Device Management 214

Seite 142

Chapter 8: Device Management 215 Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connectio

Seite 143

Chapter 8: Device Management 216 5. Click Import. The Configuration Scripts page opens and the imported scripts are displayed. To export a dis

Seite 144 - Updating the LDAP

Chapter 8: Device Management 217 Creating Port Groups The KX II supports the aggregation of multiple ports into a single port group.Port groups c

Seite 145

Chapter 8: Device Management 218 Creating a Dual Video Port Group The dual video port groups feature allows you to group two video ports into one

Seite 146

Chapter 2: Installation and Configuration 12 Default Login Information Default Value User name admin This user has administrative privileges. Pass

Seite 147

Chapter 8: Device Management 219 Note: If a port is already a part of blade server port group, another dual video port group, or 'standard&a

Seite 148

Chapter 8: Device Management 220 3. Click Apply. Click Reset Defaults to change back to English. Note: Once you apply a new language, the onlin

Seite 149

221 In This Chapter Security Settings ... 221 Configuring IP Acces

Seite 150

Chapter 9: Security Management 222 To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can

Seite 151 - Changing a Password

Chapter 9: Security Management 223 Limitation Description Enter the number of days after which a password change is required. The default is 60 d

Seite 152 - Device Management

Chapter 9: Security Management 224 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor

Seite 153 - Chapter 8: Device Management

Chapter 9: Security Management 225 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s

Seite 154

Chapter 9: Security Management 226 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e

Seite 155

Chapter 9: Security Management 227 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,

Seite 156 - Device Services

Chapter 9: Security Management 228 Encryption mode Description browser supports it, otherwise you will not be able to connect. See Checking Your B

Seite 157

Chapter 2: Installation and Configuration 13 Step 2: Configure the KVM Target Servers Target Server Video Resolutions For optimal bandwidth effic

Seite 158

Chapter 9: Security Management 229 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware

Seite 159 - Enabling Tiering

Chapter 9: Security Management 230 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be requir

Seite 160

Chapter 9: Security Management 231 FIPS 140-2 Support Requirements The KX II supports the use of FIPS 140-2 approved encryption algorithms. This

Seite 161

Chapter 9: Security Management 232 Configuring IP Access Control Using IP access control, you control access to your KX II. Note that IP access co

Seite 162

Chapter 9: Security Management 233 3. Choose the Policy from the drop-down list. 4. Click Insert. If the rule # you just typed equals an existi

Seite 163

Chapter 9: Security Management 234 SSL Certificates The KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic betwee

Seite 164

Chapter 9: Security Management 235 f. Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g.

Seite 165

Chapter 9: Security Management 236 b. A message containing all of the information you entered appears. c. The CSR and the file containing the

Seite 166 - Enable Direct Port Access

Chapter 9: Security Management 237 Security Banner KX II provides you with the ability to add a security banner to the KX II login process. This

Seite 167

Chapter 9: Security Management 238 Note: You cannot upload a text file from the local port.

Seite 168

Chapter 2: Installation and Configuration 14 Windows XP, Windows 2003, Windows 2008 Mouse Settings Configure these mouse settings in Windows XP®

Seite 169

239 In This Chapter Audit Log... 239 Device Informatio

Seite 170

Chapter 10: Maintenance 240 To page through the audit log:  Use the [Older] and [Newer] links. Device Information The Device Information page

Seite 171

Chapter 10: Maintenance 241  DCIM-SUSB  D2CIM-VUSB  D2CIM-DVUSB  D2CIM-DVUSB-DVI  D2CIM-DVUSB-HDMI  D2CIM-DVUSB Note: Only the nume

Seite 172

Chapter 10: Maintenance 242 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX

Seite 173 - Configuring SNMP Traps

Chapter 10: Maintenance 243 In IE 7 (and later), IE is used as the default application to open files, so you are prompted to open the file versus

Seite 174

Chapter 10: Maintenance 244 USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech s

Seite 175

Chapter 10: Maintenance 245 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so

Seite 176 - List of KX II SNMP Traps

Chapter 10: Maintenance 246 To upgrade your KX II unit: 1. Locate the appropriate Raritan firmware distribution file (*.RFP) on the Raritan web

Seite 177

Chapter 10: Maintenance 247 As prompted, close the browser and wait approximately 5 minutes before logging in to the KX II again. again. For info

Seite 178 - Viewing the KX II MIB

Chapter 10: Maintenance 248 Rebooting the KX II The Reboot page provides a safe and controlled way to reboot your KX II. This is the recommended m

Seite 179 - SysLog Configuration

Chapter 2: Installation and Configuration 15 3. In KX II, select Device Settings > Port Configuration, then click on the target name to open

Seite 180

Chapter 10: Maintenance 249 Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you ar

Seite 181 - Power Supply Setup

Chapter 10: Maintenance 250 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed

Seite 182 - Configuring Ports

251 In This Chapter Network Interface Page ... 251 Network Statistics Page ..

Seite 183

Chapter 11: Diagnostics 252  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one

Seite 184

Chapter 11: Diagnostics 253  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display

Seite 185

Chapter 11: Diagnostics 254 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232

Seite 186

Chapter 11: Diagnostics 255 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technica

Seite 187 - Configure the CIM Settings

Chapter 11: Diagnostics 256 a. Click Save to File. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to

Seite 188

257 In This Chapter Overview ... 257 Accessing the KX

Seite 189 - Connecting a Rack PDU

Chapter 12: Command Line Interface (CLI) 258 Accessing the KX II Using CLI Access the KX II by using one of the following methods:  SSH (Secure

Seite 190

Chapter 2: Installation and Configuration 16 Step 3: Connect the Equipment A. AC Power Connect the power supply(s): 1. Attach the included AC

Seite 191 - 3. Click OK

Chapter 12: Command Line Interface (CLI) 259 Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password pro

Seite 192

Chapter 12: Command Line Interface (CLI) 260 CLI Syntax -Tips and Shortcuts Tips  Commands are listed in alphabetical order.  Commands are not

Seite 193 - Removing Power Associations

Chapter 12: Command Line Interface (CLI) 261 Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same co

Seite 194

Chapter 12: Command Line Interface (CLI) 262 The KX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally using

Seite 195

Chapter 12: Command Line Interface (CLI) 263  Enter admin > config > network. Command Description help Display overview of commands. hist

Seite 196

Chapter 12: Command Line Interface (CLI) 264 Commands Description ipv6 Set/get IPv6 network parameters. Interface Command The Interface command

Seite 197

Chapter 12: Command Line Interface (CLI) 265 Name Command The name command is used to configure the network name. The syntax of the name is: n

Seite 198

266 In This Chapter Overview ... 266 Simultaneous User

Seite 199

Chapter 13: KX II Local Console 267 KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provides stan

Seite 200

Chapter 13: KX II Local Console 268 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access pa

Seite 201

Chapter 2: Installation and Configuration 17 Enable 'Automatic Failover' on the KX II Network Configuration page. D. Local Access Port

Seite 202

Chapter 13: KX II Local Console 269 Scanning Ports - Local Console The KX II scanning feature is supported by the Local Console. The targets th

Seite 203

Chapter 13: KX II Local Console 270 Local Port Scan Mode Following are options available to you to change scan options on local port. To config

Seite 204

Chapter 13: KX II Local Console 271 4. Click OK. Once the smart card reader is added, a message will appear on the page indicating you have comp

Seite 205

Chapter 13: KX II Local Console 272 Local Console USB Profile Options From the USB Profile Options section of the Tools page, you can choose from

Seite 206

Chapter 13: KX II Local Console 273 Hot Keys and Connect Keys Because the KX II Local Console interface is completely replaced by the interface f

Seite 207

Chapter 13: KX II Local Console 274 Standard servers Connect key action Key sequence example Disconnect from a target and return to the local port

Seite 208

Chapter 13: KX II Local Console 275 Returning to the KX II Local Console Interface Important: The KX II Local Console default hot key is to pres

Seite 209

Chapter 13: KX II Local Console 276  US  US/International  United Kingdom  French (France)  German (Germany)  JIS (Japanese Industry S

Seite 210

Chapter 13: KX II Local Console 277 Hot key: Take this action: Double Click Left Ctrl key Press the left Ctrl key twice quickly 4. Select the Lo

Seite 211

Chapter 13: KX II Local Console 278 Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access,

Seite 212

Chapter 2: Installation and Configuration 18 2. Ensure that your target server's video is configured to a supported resolution and refresh r

Seite 213

Chapter 13: KX II Local Console 279 Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local p

Seite 214

Chapter 13: KX II Local Console 280  IP auto configuration  IP address  Subnet mask  Gateway IP address  Primary DNS server IP address 

Seite 215

Chapter 13: KX II Local Console 281 Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to

Seite 216

Chapter 13: KX II Local Console 282 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using

Seite 217

Chapter 13: KX II Local Console 283 For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it t

Seite 218

Chapter 13: KX II Local Console 284

Seite 219

Chapter 13: KX II Local Console 285 Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connec

Seite 220

Chapter 13: KX II Local Console 286 4. Continue holding the Reset button for 10 seconds. Once the device has been reset, two short beeps signal i

Seite 221

287 In This Chapter Hardware ... 287 Software...

Seite 222

Appendix A: Specifications 288 Dominion KX II model Description Dimensions (WxDxH) Weight Power and heat dissipation remote users, 1 local port fo

Seite 223

iii Contents Chapter 1 Introduction 1 KX II Overview ...

Seite 224

Chapter 2: Installation and Configuration 19 Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings &g

Seite 225

Appendix A: Specifications 289 Specifications for All Dominion KX II Models Local port access Video HD15(F) VGA Keyboard/Mouse USB(F), 1 USB fro

Seite 226

Appendix A: Specifications 290 CIM model Description Dimensions (WxDxH) Weight D2CIM-VUSB USB CIM for virtual media and Absolute Mouse Synchroniza

Seite 227 - Port Group Management

Appendix A: Specifications 291 CIM model Description Dimensions (WxDxH) Weight P2CIM-SER Paragon II/Dominion KX II CIM for serial (ASCII) dev

Seite 228

Appendix A: Specifications 292 CIM model Description Dimensions (WxDxH) Weight D2CIM-DVUSB-DP Digital CIM that provides digital-to-analog conversi

Seite 229 - Dual Video Port Groups

Appendix A: Specifications 293 Digital CIM Timing Modes Following are the default timing modes that are used when the KX II communicates with a v

Seite 230

Appendix A: Specifications 294 Digital CIM Established and Standard Modes The following additional established and standard resolutions and timing

Seite 231

Appendix A: Specifications 295 Digital CIM Display Native Resolution You are able to select the native resolution of the CIM on the Port Configur

Seite 232 - Security Management

Appendix A: Specifications 296 Supported Paragon II CIMS and Configurations The KX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL CIMs, which p

Seite 233

Appendix A: Specifications 297 KX II-to-KX II Paragon CIM Guidelines The following system configuration guidelines should be followed when you ar

Seite 234

Appendix A: Specifications 298 If a connection to the target is in place from the other KX II, the availability is checked when a connection is at

Seite 235

Chapter 2: Installation and Configuration 20 Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network

Seite 236

Appendix A: Specifications 299 Paragon II operation mode Mode description Supported? port can be selected and controlled by more than one user, b

Seite 237

Appendix A: Specifications 300 Supported Remote Connections Remote connection Details Network 10BASE-T, 100BASE-T, and 1000BASE-T (Gigabit) Ethern

Seite 238

Appendix A: Specifications 301 Legend: Does not function as expected Supported Functions; not recommended NOT supported by Ethernet s

Seite 239

Appendix A: Specifications 302 Target Server Requirements When using smart card readers, the basic requirements for interoperability at the target

Seite 240

Appendix A: Specifications 303 Remote Client Requirements The basic requirements for interoperability at the remote client are:  The IFD (sma

Seite 241

Appendix A: Specifications 304 Type Vendor Model Verified USB SCM Microsystems SCR331 Verified on local and remote USB ActivIdentity® ActivIdentit

Seite 242

Appendix A: Specifications 305 Supported Audio Device Formats The KX II supports one playback and capture device and one record device on a tar

Seite 243

Appendix A: Specifications 306 Bandwidth Requirements The table below details the audio playback and capture bandwidth requirements to transport a

Seite 244

Appendix A: Specifications 307 Audio in a Mac Environment Following are known issues in a Mac® environment.  On Mac clients, only one playback

Seite 245 - SSL Certificates

Appendix A: Specifications 308 KX2 8xx Extended Local Port Recommended Maximum Distances Extended device 1024x768, 60 Hz 1280x1024, 60 Hz Paragon

Seite 246

Chapter 2: Installation and Configuration 21 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addr

Seite 247

Appendix A: Specifications 309 Keystroke Description Virtual Media CIM Dual Virtual Media CIM Mac Lion Server HDMI CIM Press N during startup Sta

Seite 248 - Security Banner

Appendix A: Specifications 310 Port Description By default, this port is used for multiple purposes, including the web server for the HTML client,

Seite 249

Appendix A: Specifications 311 Software Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Cl

Seite 250 - Maintenance

Appendix A: Specifications 312  Linux® The JRE™ plug-in is available for the Windows® 32-bit and 64-bit operating systems. MPC and VKC can be la

Seite 251 - Device Information

Appendix A: Specifications 313  Mac OS X Mountain Lion 10.8.5 * using Safari 6.1.1 running JRE 1.7.0_51 *Note: Upon upgrading from OS X 10.8.2

Seite 252 - Chapter 10: Maintenance

Appendix A: Specifications 314 Resolutions 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz

Seite 253 - Backup and Restore

Appendix A: Specifications 315 Video Image Appears Dark when Using a Mac If you are using a Mac® with an HDMI video port and the video seems too

Seite 254

Appendix A: Specifications 316 Language Regions Keyboard layout Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian

Seite 255 - USB Profile Management

317 In This Chapter Overview ... 317 Recommendations f

Seite 256 - Upgrading Firmware

Appendix B: Dual Video Port Groups 318 Recommendations for Dual Port Video Set the target server’s primary and secondary displays to the same vide

Seite 257 - Chapter 10: Maintenance

Chapter 2: Installation and Configuration 22 If either of these checkboxes is selected and only power input is connected, the power LED on the fro

Seite 258 - Upgrade History

Appendix B: Dual Video Port Groups 319 Target operating systems Supported mouse modes Comments Mouse mode is recommended. Linux® Intelligent and

Seite 259 - Rebooting the KX II

Appendix B: Dual Video Port Groups 320  Monitor settings will NOT be applied. Instead the Port Group Management configured 'Display Orienta

Seite 260 - Stopping CC-SG Management

Appendix B: Dual Video Port Groups 321 Example Dual Port Video Group Configuration The following is a general example. Your configuration may v

Seite 261

Appendix B: Dual Video Port Groups 322 Diagram key Connection from the target's primary (first) video port to the KX II Connection from

Seite 262 - Diagnostics

Appendix B: Dual Video Port Groups 323 Note: If the target primary and secondary displays are set to different resolutions the mouse will not sta

Seite 263 - Chapter 11: Diagnostics

Appendix B: Dual Video Port Groups 324 Step 3: Configure the Mouse Mode and Ports Once you have connected the target server to the Raritan device

Seite 264 - Ping Host Page

Appendix B: Dual Video Port Groups 325 Step 5: Launch a Dual Port Video Group Once you have created the dual video port group, it is available on

Seite 265 - Trace Route to Host Page

Appendix B: Dual Video Port Groups 326 Direct Port Access and Dual Port Video Groups Direct port access allows users to bypass having to use the d

Seite 266 - Device Diagnostics

327 In This Chapter Overview ... 327 Connecting the P

Seite 267

Appendix C: Accessing a PX2 from the KX II 328 When you access the Paragon II system from KX II or CC-SG (if the KX II is managed by CC-SG), the P

Seite 268 - Command Line Interface (CLI)

Chapter 2: Installation and Configuration 23 Step 5: Launching the KX II Remote Console Log in to your KX II Remote Console from any workstation

Seite 269 - SSH Connection to the KX II

Appendix C: Accessing a PX2 from the KX II 329

Seite 270 - Navigation of the CLI

330 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...

Seite 271 - Shortcuts

Appendix D: Updating the LDAP Schema 331 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to t

Seite 272

Appendix D: Updating the LDAP Schema 332 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create

Seite 273 - CLI Commands

Appendix D: Updating the LDAP Schema 333 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.

Seite 274 - Configuring Network

Appendix D: Updating the LDAP Schema 334 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dia

Seite 275 - Interface Command Example

Appendix D: Updating the LDAP Schema 335 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window o

Seite 276 - Name Command Example

Appendix D: Updating the LDAP Schema 336 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name

Seite 277 - KX II Local Console

337 In This Chapter Overview ... 337 Java Runtime Envi

Seite 278 - Available Resolutions

Appendix E: Informational Notes 338 Java Not Loading Properly on Mac If you are using a Mac® and see the following message when connecting to a de

Seite 279 - Accessing a Target Server

Chapter 2: Installation and Configuration 24 3. Choose Switch From in the Port Action menu. The new target server you selected is displayed. Dis

Seite 280

Appendix E: Informational Notes 339 IPv6 Support Notes Operating System IPv6 Support Notes Java Java™ 1.7 supports IPv6 for the following:  S

Seite 281

Appendix E: Informational Notes 340 Dual Stack Login Performance Issues If you are using the KX II in a dual stack configuration, it is important

Seite 282

Appendix E: Informational Notes 341 Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000® operating system does not supp

Seite 283

Appendix E: Informational Notes 342 Cannot Write To/From a File from a Mac Client If you are connecting to the KX II from a Mac® 10.8.5 client run

Seite 284 - Hot Keys and Connect Keys

Appendix E: Informational Notes 343 Virtual Media via VKC and AKC in a Windows Environment Windows XP® operating system administrator and standar

Seite 285 - Special Sun Key Combinations

Appendix E: Informational Notes 344 Virtual Media Linux Drive Listed Twice For KX II 2.4.0 (and later) and LX 2.4.5 (and later), users who are log

Seite 286 - Local Port Administration

Appendix E: Informational Notes 345 USB Port and Profile Notes VM-CIMs and DL360 USB Ports HP® DL360 servers have one USB port on the back of the

Seite 287

Appendix E: Informational Notes 346 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles,

Seite 288

Appendix E: Informational Notes 347 Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will

Seite 289

Appendix E: Informational Notes 348 Note: These procedures do not apply to the circumflex accent (above vowels). In all cases, the ^ key (to the r

Seite 290

Chapter 2: Installation and Configuration 25 Step 7: Configure Tiering (Optional) The optional tiering feature allows you to use a KX II as your

Seite 291

Appendix E: Informational Notes 349 Keyboard Language Preference (Fedora Linux Clients) Because the Sun™ JRE™ on Linux® has problems generating t

Seite 292

Appendix E: Informational Notes 350 4. Click Close. To set the keyboard language using the Keyboard Indicator: 1. Right-click the Task Bar and

Seite 293

Appendix E: Informational Notes 351 3. Restart the X server. With this change, the internal video mode timing from the X server is used and corr

Seite 294

Appendix E: Informational Notes 352 Audio in a Linux Environment The following are known issues when using the audio feature in a Linux® environme

Seite 295

Appendix E: Informational Notes 353 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you ar

Seite 296

Appendix E: Informational Notes 354 VKC and MPC Smart Card Connections to Fedora Servers If you are using a smart card to connect to a Linux® Fedo

Seite 297

355 In This Chapter General FAQs ... 355 Remote Access ...

Seite 298 - Specifications

Appendix F: Frequently Asked Questions 356 Question Answer How does Dominion KX II differ from remote control software? When using Dominion KX II

Seite 299 - Appendix A: Specifications

Appendix F: Frequently Asked Questions 357 Question Answer How many users can remotely access servers on each Dominion KX II? Dominion KX II mode

Seite 300

Appendix F: Frequently Asked Questions 358 Question Answer Do you have a non-Windows KVM Client? Yes. Both the Virtual KVM Client (VKC) and the Mu

Seite 301

Chapter 2: Installation and Configuration 26  http://IP-ADDRESS/akc for the Microsoft .NET-based Active KVM Client IP-ADDRESS is the IP addres

Seite 302

Appendix F: Frequently Asked Questions 359 Question Answer What is the file size of the applet that’s used to access Dominion KX II? How long doe

Seite 303

Appendix F: Frequently Asked Questions 360 Question Answer What is required for virtual media? A Dominion KX II virtual media CIM is required: a d

Seite 304 - Digital CIM Timing Modes

Appendix F: Frequently Asked Questions 361 Question Answer Why would I use a USB profile? USB profiles are most often required at the BIOS level

Seite 305

Appendix F: Frequently Asked Questions 362 Question Answer How is bandwidth used in KVM-over-IP systems? Dominion KX II offers next-generation KVM

Seite 306 - DVI Compatibility Mode

Appendix F: Frequently Asked Questions 363 Question Answer What factors affect bandwidth? There are many factors that determine how much bandwidt

Seite 307

Appendix F: Frequently Asked Questions 364 Question Answer How can I reduce bandwidth? KX II provides a variety of settings in our remote clients

Seite 308

Appendix F: Frequently Asked Questions 365 Question Answer What should I do on slower bandwidth links? The connection speed and color depth setti

Seite 309

Appendix F: Frequently Asked Questions 366 Question Answer What about servers with DVI ports? Servers with DVI ports that support DVI-A (analog) a

Seite 310

Appendix F: Frequently Asked Questions 367 User Task Default 1Mb Speed and 15-bit Color 1Mb Speed and 8-bit Color Open Text Window 50 – 100 KB/s

Seite 311

Appendix F: Frequently Asked Questions 368 Question Answer What is the speed of Dominion KX II’s Ethernet interfaces? Dominion KX II supports giga

Seite 312 - Local Port Requirements

Chapter 2: Installation and Configuration 27 Additional Security Warnings Even after an SSL certificate is installed in the KX II, depending on y

Seite 313 - Target Server Requirements

Appendix F: 369 Question Answer Can the Dominion KX II use DHCP? DHCP addressing can be used; however, Raritan recommends fixed addressing sinc

Seite 314 - Remote Client Requirements

Appendix F: 370 Question Answer What is IPv6? IPv6 is the acronym for Internet Protocol Version 6. IPv6 is the "next generation" IP pr

Seite 315

Appendix F: 371 Question Answer What if my network doesn’t support IPv6? The Dominion KX II’s default networking is set at the factory for IPv4

Seite 316 - Audio Level

Appendix F: 372 Question Answer What about mouse synchronization? In the past, KVM-over-IP mouse synchronization was a frustrating experience. T

Seite 317 - Bandwidth Requirements

Appendix F: 373 Question Answer Do I have to use hotkeys to switch between blades? Some blade servers require you to use hotkeys to switch betw

Seite 318 - Audio in a Mac Environment

Appendix F: 374 Question Answer Is virtual media supported? This depends on the blade server. HP blades can support virtual media. The IBM Blade

Seite 319

Appendix F: 375 Question Answer How do I connect servers to Dominion KX II? Servers that connect to the Dominion KX II require a Dominion or Pa

Seite 320

Appendix F: 376 Question Answer How do I connect a serially controlled (RS-232) device, such as a Cisco router/switch or a headless Sun server,

Seite 321

Appendix F: 377 Question Answer When I am using the local port, do I prevent other users from accessing servers remotely? No. The Dominion KX I

Seite 322 - Software

Appendix F: 378 Question Answer If I use the local port to change the name of a connected server, does this change propagate to remote access cl

Seite 323

Chapter 2: Installation and Configuration 28 Example 1: Import the Certificate into the Browser In this example, you import the Certificate into t

Seite 324

Appendix F: 379 Question Answer Must I use the extended local port? No. The extended local port is an optional feature and is disabled by defau

Seite 325

Appendix F: 380 Question Answer How do I connect the PDU to the Dominion KX II? The D2CIM-PWR is used to connect the power strip to the Dominion

Seite 326

Appendix F: 381 Question Answer How do I physically connect multiple Dominion KX II devices together into one solution? To physically connect m

Seite 327

Appendix F: 382 Question Answer Do I have to physically connect Dominion KX II devices together? Multiple Dominion KX II units do not need to be

Seite 328 - Appendix B

Appendix F: 383 Computer Interface Modules (CIMs) Question Answer What type of video is supported by your CIMs? Our CIMs have traditionally su

Seite 329

Appendix F: 384 Question Answer Does Dominion KX II support Paragon Dual CIMs? Yes. The Dominion KX II now supports Paragon II Dual CIMs (P2CIM-

Seite 330

Appendix F: 385 Question Answer Does Dominion KX II allow encryption of video data? Or does it only encrypt keyboard and mouse data? Unlike com

Seite 331

Appendix F: 386 Smart Cards and CAC Authentication Question Answer Does Dominion KX II support smart card and CAC authentication? Yes. Smart ca

Seite 332

Appendix F: 387 Question Answer Can Dominion KX II be remotely managed and configured via Web browser? Yes. Dominion KX II can be completely c

Seite 333

Appendix F: 388 Documentation and Support Question Answer Where do I find documentation on the Dominion KX II? The documentation is available

Seite 334

Contents iv Port Access Page (Remote Console Display) ... 38 Port Action Menu ...

Seite 335

Chapter 2: Installation and Configuration 29 Steps Click the Content tab. Click Certificates. The Certificate Import Wizard opens and walks

Seite 336

Appendix F: 389 Question Answer I changed and subsequently forgot Dominion KX II’s administrative password; can you retrieve it for me? Dominio

Seite 337

391 A A. AC Power • 16 About the Active KVM Client • 92 Absolute Mouse Mode • 74 Access a Virtual Media Drive on a Client Computer • 100 Access and

Seite 338 - Appendix C

Index 392 CIMs Required for Virtual Media • 97 Cisco ACS 5.x for RADIUS Authentication • 136 CLI Commands • 257, 262 CLI Prompts • 262 CLI Syntax

Seite 339

Index 393 Disconnecting Users from Ports • 126, 127 Discovering Devices on the KX II Subnet • 46 Discovering Devices on the Local Subnet • 45 Doc

Seite 340

Index 394 Java Validation and Access Warning • 27 JRE Requirements and Browser Considerations for Mac • 312 K Keyboard Language Preference (Fedora

Seite 341 - Updating the LDAP Schema

Index 395 O Operating System IPv6 Support Notes • 337 Overview • 10, 52, 105, 108, 257, 266, 316, 326, 335 P Package Contents • 4 Permissions and

Seite 342 - Creating a New Attribute

Index 396 SSH Access from a Windows PC • 258 SSH Connection to the KX II • 258 SSL Certificates • 27, 234 Standard Mouse Mode • 72 Step 1 Configur

Seite 343

Index 397 V Version Information - Virtual KVM Client • 91 Video Image Appears Dark when Using a Mac • 313 Video Mode and Resolution Notes • 348 V

Seite 344

U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then P

Seite 345 - Updating the Schema Cache

Chapter 2: Installation and Configuration 30 Example 2: Add the KX II to Trusted Sites and Import the Certificate In this example, the KX II'

Seite 346

Chapter 2: Installation and Configuration 31 Steps Click OK on the Internet Options dialog to apply the changes, then close and reopen the brows

Seite 347

32 In This Chapter KX II Interfaces ... 32 KX II Local Console

Seite 348 - Informational Notes

Chapter 3: Working with Target Servers 33 KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provide

Seite 349

Chapter 3: Working with Target Servers 34 KX II Interface Both the KX II Remote Console and the KX II Local Console interfaces provide a web-based

Seite 350 - IPv6 Support Notes

Chapter 3: Working with Target Servers 35 Left Panel The left panel of the KX II interface contains the following information. Note that some i

Seite 351 - CIM Notes

Chapter 3: Working with Target Servers 36 Information Description When displayed? PowerIn2 Status of the power 2 outlet connection. Either on or o

Seite 352 - Virtual Media Notes

Chapter 3: Working with Target Servers 37 KX II Console Navigation The KX II Console interfaces provide many methods for navigation and making

Seite 353

Chapter 3: Working with Target Servers 38 Port Access Page (Remote Console Display) After successfully logging on to the KX II remote console, the

Seite 354

Contents v Virtual Media in a Mac Environment ... 103 Acti

Seite 355

Chapter 3: Working with Target Servers 39  Status - The status of the servers - either up or down. To connect to an available target serve

Seite 356 - USB Port and Profile Notes

Chapter 3: Working with Target Servers 40 View by Group Tab The View by Group tab displays blade chassis, 'standard' port groups, and du

Seite 357

Chapter 3: Working with Target Servers 41 Blade Chassis - Port Access Page The blade chassis is displayed in an expandable, hierarchical list on

Seite 358 - Keyboard Notes

Chapter 3: Working with Target Servers 42 On the local port, the KX II Local Console interface must be visible in order to perform the switch. H

Seite 359 - Tilde Symbol

Chapter 3: Working with Target Servers 43 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices y

Seite 360

Chapter 3: Working with Target Servers 44 Enable Favorites  Click Enable in the Favorite Devices section of the left panel of the KX II interfac

Seite 361

Chapter 3: Working with Target Servers 45 Access and Display Favorites To access a favorite KX II device:  Click the device name (listed bene

Seite 362

Chapter 3: Working with Target Servers 46  To use the default discovery port, select the Use Default Port 5000 checkbox.  To use a different d

Seite 363 - CC-SG Notes

Chapter 3: Working with Target Servers 47 Scanning Ports The KX II provides the port scanning feature to search for selected targets, and display

Seite 364 - Browser Notes

Chapter 3: Working with Target Servers 48 Note: MPC uses a different method for initiating a scan than the other Raritan clients. See Set Scan Gro

Seite 365

Contents vi LAN Interface Settings ... 144 Devic

Seite 366 - Frequently Asked Questions

Chapter 3: Working with Target Servers 49 Using Scan Port Options Following are options available to you while scanning targets. With the excep

Seite 367 - Remote Access

Chapter 3: Working with Target Servers 50 Logging Out To quit the KX II:  Click Logout in the upper right-hand corner of the page. Note: Log

Seite 368

Chapter 3: Working with Target Servers 51 e. On the General tab, click Network Settings. The Network Settings dialog opens. f. Select Use Proxy

Seite 369

Chapter 3: Working with Target Servers 52 Virtual KVM Client (VKC) and Active KVM Client (AKC) Overview Whenever you access a target server from t

Seite 370 - Universal Virtual Media

Chapter 3: Working with Target Servers 53 Virtual KVM Client (VKC) and Active KVM Client (AKC) Shared Features The Virtual KVM Client (VKC) and A

Seite 371

Chapter 3: Working with Target Servers 54 Connection Properties Dynamic video compression algorithms maintain KVM console usability under varying

Seite 372

Chapter 3: Working with Target Servers 55 3. Choose the Color Depth from the drop-down list. The device can dynamically adapt the color depth tr

Seite 373

Chapter 3: Working with Target Servers 56 Connection Information Open the Connection Information dialog for real-time connection information, and

Seite 374

Chapter 3: Working with Target Servers 57 Steps Click Connection > Info... to open the Connection Info dialog. Click Copy to Clipboard. Past

Seite 375

Chapter 3: Working with Target Servers 58  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings are an optimization for specific co

Seite 376

Contents vii Upgrading CIMs ...

Seite 377

Chapter 3: Working with Target Servers 59 Button Button name Description Same as choosing Video > Color Calibrate. Target Screenshot Click to

Seite 378 - Ethernet and IP Networking

Chapter 3: Working with Target Servers 60 Audio is supported by KX II 2.4.0 (and later). Audio capture is supported by KX II 2.5.0 (and later). Au

Seite 379

Chapter 3: Working with Target Servers 61 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Mult

Seite 380 - IPv6 Networking

Chapter 3: Working with Target Servers 62 The macros are then imported. If a macro is imported that contains a hot key that already exists, the ho

Seite 381 - Appendix F:

Chapter 3: Working with Target Servers 63 Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Mac

Seite 382 - Servers

Chapter 3: Working with Target Servers 64 9. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. To us

Seite 383 - Blade Servers

Chapter 3: Working with Target Servers 65 Modifying and Removing Keyboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. T

Seite 384 - Appendix F:

Chapter 3: Working with Target Servers 66 Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen.

Seite 385 - Installation

Chapter 3: Working with Target Servers 67 Adjusting Video Settings Use the Video Settings command to manually adjust the video settings. To c

Seite 386

Chapter 3: Working with Target Servers 68  Best possible video mode The device will perform the full Auto Sense process when switching targets o

Seite 387 - Local Port

Contents viii Local Console Smart Card Access ... 270 Sma

Seite 388

Chapter 3: Working with Target Servers 69 Screenshot from Target Command (Target Screenshot) You are able to take a screenshot of a target server

Seite 389

Chapter 3: Working with Target Servers 70 Mouse Options When in dual mouse mode, and provided the option is properly configured, the mouse cursors

Seite 390

Chapter 3: Working with Target Servers 71 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor

Seite 391

Chapter 3: Working with Target Servers 72 Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the up

Seite 392

Chapter 3: Working with Target Servers 73 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s

Seite 393

Chapter 3: Working with Target Servers 74 Please note that mouse configurations will vary on different target operating systems. Consult your OS g

Seite 394

Chapter 3: Working with Target Servers 75 Single Mouse Mode Single Mouse mode uses only the target server mouse cursor and the local mouse pointe

Seite 395 - Security

Chapter 3: Working with Target Servers 76  United Kingdom  Korean (Korea)  French (Belgium)  Norwegian (Norway)  Portuguese (Portugal) 

Seite 396

Chapter 3: Working with Target Servers 77 5. Click OK. Keyboard Limitations Turkish Keyboards If using a Turkish keyboard, you must connect to

Seite 397 - Manageability

Chapter 3: Working with Target Servers 78 Client Launch Settings KX II users can configure client launch settings that allow you to define the scr

Seite 398

Contents ix Appendix B Dual Video Port Groups 317 Overview ...

Seite 399 - Miscellaneous

Chapter 3: Working with Target Servers 79 Configure Scan Settings in VKC and AKC The KX II provides the port scanning feature to search for selec

Seite 400

Chapter 3: Working with Target Servers 80 View Status Bar By default, the status bar is displayed at the bottom of the target window. To hide

Seite 401

Chapter 3: Working with Target Servers 81 Full Screen Mode When you enter Full Screen mode, the target's full screen is displayed and acquir

Seite 402

Chapter 3: Working with Target Servers 82 Digital Audio The KX II supports end-to-end, bidirectional, digital audio connections for digital audio

Seite 403 - Index

Chapter 3: Working with Target Servers 83 Saving Audio Settings Audio device settings are applied on a per KX II device basis. Once the audio d

Seite 404

Chapter 3: Working with Target Servers 84 Operating system Audio playback and capture supported by: Mac®  Virtual KVM Client (VKC)  Multi-Plat

Seite 405

Chapter 3: Working with Target Servers 85 Connecting to a Single Target Server from Multiple Remote Clients KX II 2.5.0 (and later) allows up to

Seite 406

Chapter 3: Working with Target Servers 86 Connecting and Disconnecting a Digital Audio Device Audio device settings are applied on a per KX II dev

Seite 407

Chapter 3: Working with Target Servers 87 Note: The device names listed in the Connect Recording Device drop-down are truncated to a maximum of 3

Seite 408

Chapter 3: Working with Target Servers 88 To disconnect from the audio device:  Click the Audio icon in the toolbar and select OK when you

Kommentare zu diesen Handbüchern

Keine Kommentare