Copyright © 2014 Raritan, Inc. DKX2-v2.6.0-0R-E March 2014 255-62-4023-00 Dominion KX II User Guide Release 2.6.0
Contents x Virtual Media Notes ...
Chapter 3: Working with Target Servers 89 Smart Cards Using the KX II, you are able to mount a smart card reader onto a target server to support
Chapter 3: Working with Target Servers 90 You are also able to remove or reinsert a smart card. This function can be used to provide notification
Chapter 3: Working with Target Servers 91 To update the smart card in the Select Smart Card Reader dialog: Click Refresh List if a new smart
Chapter 3: Working with Target Servers 92 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file
Chapter 3: Working with Target Servers 93 Since .NET is required to run AKC, if you do not have .NET installed or you have an unsupported version
Chapter 3: Working with Target Servers 94 Multi-Platform Client (MPC) Raritan Multi-Platform Client (MPC) is a graphical user interface for the Ra
Chapter 3: Working with Target Servers 95 Note: Depending on your browser and browser security settings, you may see various security and certifi
96 All KX II models support virtual media. Virtual media extends KVM capabilities by enabling target servers to remotely access media from a client
Chapter 4: Virtual Media 97 Remote PC VM Prerequisites Certain virtual media options require administrative privileges on the remote PC (for e
Chapter 4: Virtual Media 98 Supported Tasks Via Virtual Media Virtual media provides the ability to perform tasks remotely, such as: Transferri
Contents xi Appendix F Frequently Asked Questions 355 General FAQs ...
Chapter 4: Virtual Media 99 Supported Virtual Media Operating Systems The following client operating systems are supported: Windows® 7 operati
Chapter 4: Virtual Media 100 Connecting and Disconnecting from Virtual Media Access a Virtual Media Drive on a Client Computer To access a virtu
Chapter 4: Virtual Media 101 Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the s
Chapter 4: Virtual Media 102 Note: If you are working with files on a Linux® target, use the Linux Sync command after the files are copied using v
Chapter 4: Virtual Media 103 Drive Partitions The following drive partition limitations exist across operating systems: Windows® and Mac targe
Chapter 4: Virtual Media 104 Virtual Media File Server Setup (File Server ISO Images Only) This feature is only required when using virtual media
105 In This Chapter Overview ... 105 Turning Outlets O
Chapter 5: Rack PDU (Power Strip) Outlet Control 106 Control - Turn outlets on or off, or cycle their power. Association - The ports associa
Chapter 5: Rack PDU (Power Strip) Outlet Control 107 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. T
108 In This Chapter Overview ... 108 CIM Compatibility
1 In This Chapter KX II Overview ... 2 Package Contents ...
Chapter 6: USB Profiles 109 CIM Compatibility In order to make use of USB profiles, you must use a virtual media CIM with updated firmware. For a
Chapter 6: USB Profiles 110 USB profile Description USB enumeration will trigger whenever Virtual Media is connected or disconnected Restrictio
Chapter 6: USB Profiles 111 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.
Chapter 6: USB Profiles 112 USB profile Description BIOS Lenovo ThinkPad T61 & X61 BIOS Lenovo ThinkPad T61 and X61 (boot from virtual media)
Chapter 6: USB Profiles 113 USB profile Description when using the Mac Boot Menu MAC OS X® 10.4.9 (and later) Mac OS X version 10.4.9 (and later)
Chapter 6: USB Profiles 114 USB profile Description Keyboard and Mouse (Type 2) first Mass Storage USB bus speed limited to full-speed (1
Chapter 6: USB Profiles 115 Mouse Modes when Using the Mac Boot Menu When working with USB profiles in, to use the Mouse in the Mac Boot Menu, yo
116 In This Chapter User Groups ... 116 Users ...
Chapter 7: User Management 117 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good
Chapter 7: User Management 118 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select th
Chapter 1: Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch
Chapter 7: User Management 119 Note: Several administrative functions are available within and from the KX II Local Console. These functions are
Chapter 7: User Management 120 Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the
Chapter 7: User Management 121 Permission Description settings. If you are using a tiered configuration in which a base KX II device is used to a
Chapter 7: User Management 122 VM access Power control access option Description Deny Deny power control to the target server Access Full permissi
Chapter 7: User Management 123 Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-le
Chapter 7: User Management 124 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the or
Chapter 7: User Management 125 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and
Chapter 7: User Management 126 6. To activate the new user, leave the Active checkbox selected. Click OK. View the KX II Users List The User Lis
Chapter 7: User Management 127 Username - username for user logins and target connections Access From - IP address of client PC accessing t
Chapter 7: User Management 128 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management &g
Chapter 1: Introduction 3
Chapter 7: User Management 129 4. If you choose LDAP/LDAPS, read the section entitled Implementing LDAP Remote Authentication for information ab
Chapter 7: User Management 130 Microsoft Active Directory. Active Directory is an implementation of LDAP/LDAPS directory services by Microsoft
Chapter 7: User Management 131 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used
Chapter 7: User Management 132 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certifica
Chapter 7: User Management 133 Once the test is completed, a message will be displayed that lets you know the test was successful or, if the test
Chapter 7: User Management 134 Important Notes Group Name is case sensitive. The KX II provides the following default groups that cannot be
Chapter 7: User Management 135 9. The default number of retries is 3 Retries. This is the number of times the KX II will send an authenticatio
Chapter 7: User Management 136 Cisco ACS 5.x for RADIUS Authentication If you are using a Cisco ACS 5.x server, after you have configured the KX I
Chapter 7: User Management 137 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II determines th
Chapter 7: User Management 138 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connectio
Chapter 1: Introduction 4 Diagram key Local port access Tiering IP-based network access Extended local port Modem Mobile access via iPhone®
Chapter 7: User Management 139 User Authentication Process Remote authentication follows the process specified in the flowchart below:
Chapter 7: User Management 140 Changing a Password To change your KX II password: 1. Choose User Management > Change Password. The Change
141 In This Chapter Network Settings ... 141 Device Services ...
Chapter 8: Device Management 142 Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings > Network. T
Chapter 8: Device Management 143 Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network settings in
Chapter 8: Device Management 144 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addresses entered
Chapter 8: Device Management 145 Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends
Chapter 8: Device Management 146 3. Enter the SSH Port information. The standard SSH TCP port number is 22 but the port number can be changed to
Chapter 8: Device Management 147 Configuring and Enabling Tiering The tiering feature allows you to access KX II targets and PDUs through one bas
Chapter 8: Device Management 148 Port configuration, including changing the CIM name, must be done directly from each device. It cannot be done fr
Chapter 1: Introduction 5 KX II Device Photos and Features KX II KX2-808
Chapter 8: Device Management 149 6. In the Tier Secret field, enter the same secret word you entered for the base device on the Device Settings
Chapter 8: Device Management 150 Unsupported and Limited Features on Tiered Targets The following features are not supported on tiered targets:
Chapter 8: Device Management 151 Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a
Chapter 8: Device Management 152 Diagram key Target server CIM from target server to the KX II tiered device KX II tiered device D2CIM-DVUSB
Chapter 8: Device Management 153 Direct Port Access URL Syntax for the Virtual KVM Client (VKC) If you are using the Virtual KVM Client (VKC) and
Chapter 8: Device Management 154 Direct Port Access URL Syntax for the Active KVM Client (AKC) If you are using the Active KVM Client (AKC) and di
Chapter 8: Device Management 155 Enable Direct Port Access To enable direct port access: 1. Choose Device Settings > Device Services. The D
Chapter 8: Device Management 156 Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use th
Chapter 8: Device Management 157 2. Launch Internet Explorer® using the KX II IP address as the URL. A Certificate Error message will be display
Chapter 8: Device Management 158 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option must be selected. Required 4
Chapter 1: Introduction 6 KX2-832 KX2-864 See KX II Dimensions and Physical Specifications (on page 287) for product specifications. See Support
Chapter 8: Device Management 159 Configure SNMP traps on the Event Management - Settings page, which can be quickly accessed by clicking the SNMP
Chapter 8: Device Management 160 This information is used to configure modem settings. Because different modems have different ways of settings th
Chapter 8: Device Management 161 See Certified Modems (on page 307) for information on certified modems that work with the KX II. For informati
Chapter 8: Device Management 162 Event Management The KX II Event Management feature allows you enable and disable the distribution of system ev
Chapter 8: Device Management 163 a. Destination IP/Hostname - the IP or hostname of the SNMP manager. Up to five (5) SNMP managers can be create
Chapter 8: Device Management 164 Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Man
Chapter 8: Device Management 165 Use the reset to factory defaults feature to remove the SNMP configuration and set the KX II to its original fac
Chapter 8: Device Management 166 Trap Name Description networkFailure An Ethernet interface of the product can no longer communicate over the netw
Chapter 8: Device Management 167 Trap Name Description userForcedLogout A user was forcibly logged out by Admin userLogin A user has successfully
Chapter 8: Device Management 168 Note: If you have Read-Write privileges to the MIB file, use a MIB editor to make changes to the file. SysLog
Chapter 1: Introduction 7 Product Features Hardware Integrated KVM-over-IP remote access 1U or 2U rack-mountable (brackets included) Dua
Chapter 8: Device Management 169 Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps)
Chapter 8: Device Management 170 Power Supply Setup The KX II provides dual power supplies, and can automatically detect and provide notification
Chapter 8: Device Management 171 Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the
Chapter 8: Device Management 172 Alternatively, rename ports that are currently not connected to the KX II via a CIM and, as such, have a status o
Chapter 8: Device Management 173 Configuring Standard Target Servers To name the target servers: 1. Connect all of the target servers if you h
Chapter 8: Device Management 174 8. Click OK. Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targe
Chapter 8: Device Management 175 Note: Only one switch will appear in the drop-down. 5. Select KVM Switch Hot Key Sequence. 6. Enter the Maximu
Chapter 8: Device Management 176 Configuring CIM Ports The KX II supports the use of standard and virtual media CIMs to connect a server to the KX
Chapter 8: Device Management 177 If you are using an HDMI CIM, some operating system/video card combinations may offer a limited range of RGB val
Chapter 8: Device Management 178 Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are connected to the Dominion device using the D
Chapter 1: Introduction 8 Model Remote users Ports KX II-416 4 16 KX II-232 2 32 KX II-216 2 16 KX II-132 1 32 KX II-116 1 16 KX II-108 1 8 Soft
Chapter 8: Device Management 179 Naming the Rack PDU (Port Page for Power Strips) Note: PX rack PDUs (power strips) can be named in the PX as wel
Chapter 8: Device Management 180 3. Click OK.
Chapter 8: Device Management 181 Associating Outlets with Target Servers The Port page opens when you click on a port on the Port Configuration p
Chapter 8: Device Management 182 Removing Power Associations When disconnecting target servers and/or rack PDUs from the device, all power associa
Chapter 8: Device Management 183 Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade ch
Chapter 8: Device Management 184 Two modes of operation are provided for blade chassis: manual configuration and auto-discovery, depending on the
Chapter 8: Device Management 185 Generic Blade Chassis Configuration The Generic Blade Chassis' selection provides only a manual configurati
Chapter 8: Device Management 186 9. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade c
Chapter 8: Device Management 187 13. Select the CIMs native, display resolution from the Display Native Resolution drop-down. This is the preferr
Chapter 8: Device Management 188 c. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis. Requ
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, repro
Chapter 1: Introduction 9 KX II Client Applications The following client applications can be used in the KX II: KX II 2.2 (and later): Virtual
Chapter 8: Device Management 189 b. URL - Enter the URL to the interface. See Blade Chassis Sample URL Formats (on page 203) for sample configur
Chapter 8: Device Management 190 d. Port Number - The default port number for the blade chassis is 22. Not applicable. e. Username - Not applica
Chapter 8: Device Management 191 5. USB profiles do not apply to Dell chassis. 6. Click OK to save the configuration. IBM Blade Chassis Config
Chapter 8: Device Management 192 f. Password - Enter the password used to access the blade chassis. Required for auto-discovery mode 2. If you w
Chapter 8: Device Management 193 e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be a
Chapter 8: Device Management 194 The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access
Chapter 8: Device Management 195 Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device w
Chapter 8: Device Management 196 HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports
Chapter 8: Device Management 197 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4.
Chapter 8: Device Management 198 Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KX II and t
10 In This Chapter Overview ... 10 Rack Mounting ...
Chapter 8: Device Management 199 Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KX
Chapter 8: Device Management 200 Blade chassis Connection method Recommended CIM(s) Both modules enable you to connect a PS/2-compatible keyboard,
Chapter 8: Device Management 201 Blade chassis Connection method Recommended CIM(s) Technology IBM BladeCenter E The current model BladeCenter E
Chapter 8: Device Management 202 This table contains information on limitations and constraints that apply to configuring blade chassis to work wi
Chapter 8: Device Management 203 Blade chassis Required/recommended action Do not designate any slots for scan operations in the iKVM GUI Setu
Chapter 8: Device Management 204 Blade chassis Sample URL format Password: calvin Password Field: password Dell 1855 URL: https://192.168
Chapter 8: Device Management 205 2. Click the Port Name for the KVM port you want to edit. The Port page opens. To select the USB profiles for
Chapter 8: Device Management 206 Configuring KX II Local Port Settings From the Local Port Settings page, you can customize many settings for the
Chapter 8: Device Management 207 Note: If you are using KX2-808, KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II v
Chapter 8: Device Management 208 Note: Keyboard use for Chinese, Japanese, and Korean is for display only. Local language input is not supported a
Chapter 2: Installation and Configuration 11 5. When connecting cables to the rear panel of the KX II drape them over the cable-support bar.
Chapter 8: Device Management 209 1280x1024 13. Choose the refresh rate from the drop-down list. The browser will be restarted when this change
Chapter 8: Device Management 210 KX2-808, KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-808, KX2-832 and KX2-864 provide y
Chapter 8: Device Management 211 Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to or
Chapter 8: Device Management 212 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Se
Chapter 8: Device Management 213 For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to t
Chapter 8: Device Management 214
Chapter 8: Device Management 215 Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connectio
Chapter 8: Device Management 216 5. Click Import. The Configuration Scripts page opens and the imported scripts are displayed. To export a dis
Chapter 8: Device Management 217 Creating Port Groups The KX II supports the aggregation of multiple ports into a single port group.Port groups c
Chapter 8: Device Management 218 Creating a Dual Video Port Group The dual video port groups feature allows you to group two video ports into one
Chapter 2: Installation and Configuration 12 Default Login Information Default Value User name admin This user has administrative privileges. Pass
Chapter 8: Device Management 219 Note: If a port is already a part of blade server port group, another dual video port group, or 'standard&a
Chapter 8: Device Management 220 3. Click Apply. Click Reset Defaults to change back to English. Note: Once you apply a new language, the onlin
221 In This Chapter Security Settings ... 221 Configuring IP Acces
Chapter 9: Security Management 222 To reset back to defaults: Click Reset to Defaults. Login Limitations Using login limitations, you can
Chapter 9: Security Management 223 Limitation Description Enter the number of days after which a password change is required. The default is 60 d
Chapter 9: Security Management 224 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor
Chapter 9: Security Management 225 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s
Chapter 9: Security Management 226 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e
Chapter 9: Security Management 227 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,
Chapter 9: Security Management 228 Encryption mode Description browser supports it, otherwise you will not be able to connect. See Checking Your B
Chapter 2: Installation and Configuration 13 Step 2: Configure the KVM Target Servers Target Server Video Resolutions For optimal bandwidth effic
Chapter 9: Security Management 229 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware
Chapter 9: Security Management 230 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be requir
Chapter 9: Security Management 231 FIPS 140-2 Support Requirements The KX II supports the use of FIPS 140-2 approved encryption algorithms. This
Chapter 9: Security Management 232 Configuring IP Access Control Using IP access control, you control access to your KX II. Note that IP access co
Chapter 9: Security Management 233 3. Choose the Policy from the drop-down list. 4. Click Insert. If the rule # you just typed equals an existi
Chapter 9: Security Management 234 SSL Certificates The KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic betwee
Chapter 9: Security Management 235 f. Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g.
Chapter 9: Security Management 236 b. A message containing all of the information you entered appears. c. The CSR and the file containing the
Chapter 9: Security Management 237 Security Banner KX II provides you with the ability to add a security banner to the KX II login process. This
Chapter 9: Security Management 238 Note: You cannot upload a text file from the local port.
Chapter 2: Installation and Configuration 14 Windows XP, Windows 2003, Windows 2008 Mouse Settings Configure these mouse settings in Windows XP®
239 In This Chapter Audit Log... 239 Device Informatio
Chapter 10: Maintenance 240 To page through the audit log: Use the [Older] and [Newer] links. Device Information The Device Information page
Chapter 10: Maintenance 241 DCIM-SUSB D2CIM-VUSB D2CIM-DVUSB D2CIM-DVUSB-DVI D2CIM-DVUSB-HDMI D2CIM-DVUSB Note: Only the nume
Chapter 10: Maintenance 242 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX
Chapter 10: Maintenance 243 In IE 7 (and later), IE is used as the default application to open files, so you are prompted to open the file versus
Chapter 10: Maintenance 244 USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech s
Chapter 10: Maintenance 245 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so
Chapter 10: Maintenance 246 To upgrade your KX II unit: 1. Locate the appropriate Raritan firmware distribution file (*.RFP) on the Raritan web
Chapter 10: Maintenance 247 As prompted, close the browser and wait approximately 5 minutes before logging in to the KX II again. again. For info
Chapter 10: Maintenance 248 Rebooting the KX II The Reboot page provides a safe and controlled way to reboot your KX II. This is the recommended m
Chapter 2: Installation and Configuration 15 3. In KX II, select Device Settings > Port Configuration, then click on the target name to open
Chapter 10: Maintenance 249 Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you ar
Chapter 10: Maintenance 250 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed
251 In This Chapter Network Interface Page ... 251 Network Statistics Page ..
Chapter 11: Diagnostics 252 Statistics - Produces a page similar to the one displayed here. Interfaces - Produces a page similar to the one
Chapter 11: Diagnostics 253 Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display
Chapter 11: Diagnostics 254 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232
Chapter 11: Diagnostics 255 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technica
Chapter 11: Diagnostics 256 a. Click Save to File. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to
257 In This Chapter Overview ... 257 Accessing the KX
Chapter 12: Command Line Interface (CLI) 258 Accessing the KX II Using CLI Access the KX II by using one of the following methods: SSH (Secure
Chapter 2: Installation and Configuration 16 Step 3: Connect the Equipment A. AC Power Connect the power supply(s): 1. Attach the included AC
Chapter 12: Command Line Interface (CLI) 259 Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password pro
Chapter 12: Command Line Interface (CLI) 260 CLI Syntax -Tips and Shortcuts Tips Commands are listed in alphabetical order. Commands are not
Chapter 12: Command Line Interface (CLI) 261 Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same co
Chapter 12: Command Line Interface (CLI) 262 The KX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally using
Chapter 12: Command Line Interface (CLI) 263 Enter admin > config > network. Command Description help Display overview of commands. hist
Chapter 12: Command Line Interface (CLI) 264 Commands Description ipv6 Set/get IPv6 network parameters. Interface Command The Interface command
Chapter 12: Command Line Interface (CLI) 265 Name Command The name command is used to configure the network name. The syntax of the name is: n
266 In This Chapter Overview ... 266 Simultaneous User
Chapter 13: KX II Local Console 267 KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provides stan
Chapter 13: KX II Local Console 268 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access pa
Chapter 2: Installation and Configuration 17 Enable 'Automatic Failover' on the KX II Network Configuration page. D. Local Access Port
Chapter 13: KX II Local Console 269 Scanning Ports - Local Console The KX II scanning feature is supported by the Local Console. The targets th
Chapter 13: KX II Local Console 270 Local Port Scan Mode Following are options available to you to change scan options on local port. To config
Chapter 13: KX II Local Console 271 4. Click OK. Once the smart card reader is added, a message will appear on the page indicating you have comp
Chapter 13: KX II Local Console 272 Local Console USB Profile Options From the USB Profile Options section of the Tools page, you can choose from
Chapter 13: KX II Local Console 273 Hot Keys and Connect Keys Because the KX II Local Console interface is completely replaced by the interface f
Chapter 13: KX II Local Console 274 Standard servers Connect key action Key sequence example Disconnect from a target and return to the local port
Chapter 13: KX II Local Console 275 Returning to the KX II Local Console Interface Important: The KX II Local Console default hot key is to pres
Chapter 13: KX II Local Console 276 US US/International United Kingdom French (France) German (Germany) JIS (Japanese Industry S
Chapter 13: KX II Local Console 277 Hot key: Take this action: Double Click Left Ctrl key Press the left Ctrl key twice quickly 4. Select the Lo
Chapter 13: KX II Local Console 278 Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access,
Chapter 2: Installation and Configuration 18 2. Ensure that your target server's video is configured to a supported resolution and refresh r
Chapter 13: KX II Local Console 279 Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local p
Chapter 13: KX II Local Console 280 IP auto configuration IP address Subnet mask Gateway IP address Primary DNS server IP address
Chapter 13: KX II Local Console 281 Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to
Chapter 13: KX II Local Console 282 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using
Chapter 13: KX II Local Console 283 For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it t
Chapter 13: KX II Local Console 284
Chapter 13: KX II Local Console 285 Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connec
Chapter 13: KX II Local Console 286 4. Continue holding the Reset button for 10 seconds. Once the device has been reset, two short beeps signal i
287 In This Chapter Hardware ... 287 Software...
Appendix A: Specifications 288 Dominion KX II model Description Dimensions (WxDxH) Weight Power and heat dissipation remote users, 1 local port fo
iii Contents Chapter 1 Introduction 1 KX II Overview ...
Chapter 2: Installation and Configuration 19 Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings &g
Appendix A: Specifications 289 Specifications for All Dominion KX II Models Local port access Video HD15(F) VGA Keyboard/Mouse USB(F), 1 USB fro
Appendix A: Specifications 290 CIM model Description Dimensions (WxDxH) Weight D2CIM-VUSB USB CIM for virtual media and Absolute Mouse Synchroniza
Appendix A: Specifications 291 CIM model Description Dimensions (WxDxH) Weight P2CIM-SER Paragon II/Dominion KX II CIM for serial (ASCII) dev
Appendix A: Specifications 292 CIM model Description Dimensions (WxDxH) Weight D2CIM-DVUSB-DP Digital CIM that provides digital-to-analog conversi
Appendix A: Specifications 293 Digital CIM Timing Modes Following are the default timing modes that are used when the KX II communicates with a v
Appendix A: Specifications 294 Digital CIM Established and Standard Modes The following additional established and standard resolutions and timing
Appendix A: Specifications 295 Digital CIM Display Native Resolution You are able to select the native resolution of the CIM on the Port Configur
Appendix A: Specifications 296 Supported Paragon II CIMS and Configurations The KX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL CIMs, which p
Appendix A: Specifications 297 KX II-to-KX II Paragon CIM Guidelines The following system configuration guidelines should be followed when you ar
Appendix A: Specifications 298 If a connection to the target is in place from the other KX II, the availability is checked when a connection is at
Chapter 2: Installation and Configuration 20 Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network
Appendix A: Specifications 299 Paragon II operation mode Mode description Supported? port can be selected and controlled by more than one user, b
Appendix A: Specifications 300 Supported Remote Connections Remote connection Details Network 10BASE-T, 100BASE-T, and 1000BASE-T (Gigabit) Ethern
Appendix A: Specifications 301 Legend: Does not function as expected Supported Functions; not recommended NOT supported by Ethernet s
Appendix A: Specifications 302 Target Server Requirements When using smart card readers, the basic requirements for interoperability at the target
Appendix A: Specifications 303 Remote Client Requirements The basic requirements for interoperability at the remote client are: The IFD (sma
Appendix A: Specifications 304 Type Vendor Model Verified USB SCM Microsystems SCR331 Verified on local and remote USB ActivIdentity® ActivIdentit
Appendix A: Specifications 305 Supported Audio Device Formats The KX II supports one playback and capture device and one record device on a tar
Appendix A: Specifications 306 Bandwidth Requirements The table below details the audio playback and capture bandwidth requirements to transport a
Appendix A: Specifications 307 Audio in a Mac Environment Following are known issues in a Mac® environment. On Mac clients, only one playback
Appendix A: Specifications 308 KX2 8xx Extended Local Port Recommended Maximum Distances Extended device 1024x768, 60 Hz 1280x1024, 60 Hz Paragon
Chapter 2: Installation and Configuration 21 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addr
Appendix A: Specifications 309 Keystroke Description Virtual Media CIM Dual Virtual Media CIM Mac Lion Server HDMI CIM Press N during startup Sta
Appendix A: Specifications 310 Port Description By default, this port is used for multiple purposes, including the web server for the HTML client,
Appendix A: Specifications 311 Software Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Cl
Appendix A: Specifications 312 Linux® The JRE™ plug-in is available for the Windows® 32-bit and 64-bit operating systems. MPC and VKC can be la
Appendix A: Specifications 313 Mac OS X Mountain Lion 10.8.5 * using Safari 6.1.1 running JRE 1.7.0_51 *Note: Upon upgrading from OS X 10.8.2
Appendix A: Specifications 314 Resolutions 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz
Appendix A: Specifications 315 Video Image Appears Dark when Using a Mac If you are using a Mac® with an HDMI video port and the video seems too
Appendix A: Specifications 316 Language Regions Keyboard layout Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian
317 In This Chapter Overview ... 317 Recommendations f
Appendix B: Dual Video Port Groups 318 Recommendations for Dual Port Video Set the target server’s primary and secondary displays to the same vide
Chapter 2: Installation and Configuration 22 If either of these checkboxes is selected and only power input is connected, the power LED on the fro
Appendix B: Dual Video Port Groups 319 Target operating systems Supported mouse modes Comments Mouse mode is recommended. Linux® Intelligent and
Appendix B: Dual Video Port Groups 320 Monitor settings will NOT be applied. Instead the Port Group Management configured 'Display Orienta
Appendix B: Dual Video Port Groups 321 Example Dual Port Video Group Configuration The following is a general example. Your configuration may v
Appendix B: Dual Video Port Groups 322 Diagram key Connection from the target's primary (first) video port to the KX II Connection from
Appendix B: Dual Video Port Groups 323 Note: If the target primary and secondary displays are set to different resolutions the mouse will not sta
Appendix B: Dual Video Port Groups 324 Step 3: Configure the Mouse Mode and Ports Once you have connected the target server to the Raritan device
Appendix B: Dual Video Port Groups 325 Step 5: Launch a Dual Port Video Group Once you have created the dual video port group, it is available on
Appendix B: Dual Video Port Groups 326 Direct Port Access and Dual Port Video Groups Direct port access allows users to bypass having to use the d
327 In This Chapter Overview ... 327 Connecting the P
Appendix C: Accessing a PX2 from the KX II 328 When you access the Paragon II system from KX II or CC-SG (if the KX II is managed by CC-SG), the P
Chapter 2: Installation and Configuration 23 Step 5: Launching the KX II Remote Console Log in to your KX II Remote Console from any workstation
Appendix C: Accessing a PX2 from the KX II 329
330 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...
Appendix D: Updating the LDAP Schema 331 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to t
Appendix D: Updating the LDAP Schema 332 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create
Appendix D: Updating the LDAP Schema 333 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.
Appendix D: Updating the LDAP Schema 334 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dia
Appendix D: Updating the LDAP Schema 335 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window o
Appendix D: Updating the LDAP Schema 336 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name
337 In This Chapter Overview ... 337 Java Runtime Envi
Appendix E: Informational Notes 338 Java Not Loading Properly on Mac If you are using a Mac® and see the following message when connecting to a de
Chapter 2: Installation and Configuration 24 3. Choose Switch From in the Port Action menu. The new target server you selected is displayed. Dis
Appendix E: Informational Notes 339 IPv6 Support Notes Operating System IPv6 Support Notes Java Java™ 1.7 supports IPv6 for the following: S
Appendix E: Informational Notes 340 Dual Stack Login Performance Issues If you are using the KX II in a dual stack configuration, it is important
Appendix E: Informational Notes 341 Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000® operating system does not supp
Appendix E: Informational Notes 342 Cannot Write To/From a File from a Mac Client If you are connecting to the KX II from a Mac® 10.8.5 client run
Appendix E: Informational Notes 343 Virtual Media via VKC and AKC in a Windows Environment Windows XP® operating system administrator and standar
Appendix E: Informational Notes 344 Virtual Media Linux Drive Listed Twice For KX II 2.4.0 (and later) and LX 2.4.5 (and later), users who are log
Appendix E: Informational Notes 345 USB Port and Profile Notes VM-CIMs and DL360 USB Ports HP® DL360 servers have one USB port on the back of the
Appendix E: Informational Notes 346 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles,
Appendix E: Informational Notes 347 Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will
Appendix E: Informational Notes 348 Note: These procedures do not apply to the circumflex accent (above vowels). In all cases, the ^ key (to the r
Chapter 2: Installation and Configuration 25 Step 7: Configure Tiering (Optional) The optional tiering feature allows you to use a KX II as your
Appendix E: Informational Notes 349 Keyboard Language Preference (Fedora Linux Clients) Because the Sun™ JRE™ on Linux® has problems generating t
Appendix E: Informational Notes 350 4. Click Close. To set the keyboard language using the Keyboard Indicator: 1. Right-click the Task Bar and
Appendix E: Informational Notes 351 3. Restart the X server. With this change, the internal video mode timing from the X server is used and corr
Appendix E: Informational Notes 352 Audio in a Linux Environment The following are known issues when using the audio feature in a Linux® environme
Appendix E: Informational Notes 353 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you ar
Appendix E: Informational Notes 354 VKC and MPC Smart Card Connections to Fedora Servers If you are using a smart card to connect to a Linux® Fedo
355 In This Chapter General FAQs ... 355 Remote Access ...
Appendix F: Frequently Asked Questions 356 Question Answer How does Dominion KX II differ from remote control software? When using Dominion KX II
Appendix F: Frequently Asked Questions 357 Question Answer How many users can remotely access servers on each Dominion KX II? Dominion KX II mode
Appendix F: Frequently Asked Questions 358 Question Answer Do you have a non-Windows KVM Client? Yes. Both the Virtual KVM Client (VKC) and the Mu
Chapter 2: Installation and Configuration 26 http://IP-ADDRESS/akc for the Microsoft .NET-based Active KVM Client IP-ADDRESS is the IP addres
Appendix F: Frequently Asked Questions 359 Question Answer What is the file size of the applet that’s used to access Dominion KX II? How long doe
Appendix F: Frequently Asked Questions 360 Question Answer What is required for virtual media? A Dominion KX II virtual media CIM is required: a d
Appendix F: Frequently Asked Questions 361 Question Answer Why would I use a USB profile? USB profiles are most often required at the BIOS level
Appendix F: Frequently Asked Questions 362 Question Answer How is bandwidth used in KVM-over-IP systems? Dominion KX II offers next-generation KVM
Appendix F: Frequently Asked Questions 363 Question Answer What factors affect bandwidth? There are many factors that determine how much bandwidt
Appendix F: Frequently Asked Questions 364 Question Answer How can I reduce bandwidth? KX II provides a variety of settings in our remote clients
Appendix F: Frequently Asked Questions 365 Question Answer What should I do on slower bandwidth links? The connection speed and color depth setti
Appendix F: Frequently Asked Questions 366 Question Answer What about servers with DVI ports? Servers with DVI ports that support DVI-A (analog) a
Appendix F: Frequently Asked Questions 367 User Task Default 1Mb Speed and 15-bit Color 1Mb Speed and 8-bit Color Open Text Window 50 – 100 KB/s
Appendix F: Frequently Asked Questions 368 Question Answer What is the speed of Dominion KX II’s Ethernet interfaces? Dominion KX II supports giga
Chapter 2: Installation and Configuration 27 Additional Security Warnings Even after an SSL certificate is installed in the KX II, depending on y
Appendix F: 369 Question Answer Can the Dominion KX II use DHCP? DHCP addressing can be used; however, Raritan recommends fixed addressing sinc
Appendix F: 370 Question Answer What is IPv6? IPv6 is the acronym for Internet Protocol Version 6. IPv6 is the "next generation" IP pr
Appendix F: 371 Question Answer What if my network doesn’t support IPv6? The Dominion KX II’s default networking is set at the factory for IPv4
Appendix F: 372 Question Answer What about mouse synchronization? In the past, KVM-over-IP mouse synchronization was a frustrating experience. T
Appendix F: 373 Question Answer Do I have to use hotkeys to switch between blades? Some blade servers require you to use hotkeys to switch betw
Appendix F: 374 Question Answer Is virtual media supported? This depends on the blade server. HP blades can support virtual media. The IBM Blade
Appendix F: 375 Question Answer How do I connect servers to Dominion KX II? Servers that connect to the Dominion KX II require a Dominion or Pa
Appendix F: 376 Question Answer How do I connect a serially controlled (RS-232) device, such as a Cisco router/switch or a headless Sun server,
Appendix F: 377 Question Answer When I am using the local port, do I prevent other users from accessing servers remotely? No. The Dominion KX I
Appendix F: 378 Question Answer If I use the local port to change the name of a connected server, does this change propagate to remote access cl
Chapter 2: Installation and Configuration 28 Example 1: Import the Certificate into the Browser In this example, you import the Certificate into t
Appendix F: 379 Question Answer Must I use the extended local port? No. The extended local port is an optional feature and is disabled by defau
Appendix F: 380 Question Answer How do I connect the PDU to the Dominion KX II? The D2CIM-PWR is used to connect the power strip to the Dominion
Appendix F: 381 Question Answer How do I physically connect multiple Dominion KX II devices together into one solution? To physically connect m
Appendix F: 382 Question Answer Do I have to physically connect Dominion KX II devices together? Multiple Dominion KX II units do not need to be
Appendix F: 383 Computer Interface Modules (CIMs) Question Answer What type of video is supported by your CIMs? Our CIMs have traditionally su
Appendix F: 384 Question Answer Does Dominion KX II support Paragon Dual CIMs? Yes. The Dominion KX II now supports Paragon II Dual CIMs (P2CIM-
Appendix F: 385 Question Answer Does Dominion KX II allow encryption of video data? Or does it only encrypt keyboard and mouse data? Unlike com
Appendix F: 386 Smart Cards and CAC Authentication Question Answer Does Dominion KX II support smart card and CAC authentication? Yes. Smart ca
Appendix F: 387 Question Answer Can Dominion KX II be remotely managed and configured via Web browser? Yes. Dominion KX II can be completely c
Appendix F: 388 Documentation and Support Question Answer Where do I find documentation on the Dominion KX II? The documentation is available
Contents iv Port Access Page (Remote Console Display) ... 38 Port Action Menu ...
Chapter 2: Installation and Configuration 29 Steps Click the Content tab. Click Certificates. The Certificate Import Wizard opens and walks
Appendix F: 389 Question Answer I changed and subsequently forgot Dominion KX II’s administrative password; can you retrieve it for me? Dominio
391 A A. AC Power • 16 About the Active KVM Client • 92 Absolute Mouse Mode • 74 Access a Virtual Media Drive on a Client Computer • 100 Access and
Index 392 CIMs Required for Virtual Media • 97 Cisco ACS 5.x for RADIUS Authentication • 136 CLI Commands • 257, 262 CLI Prompts • 262 CLI Syntax
Index 393 Disconnecting Users from Ports • 126, 127 Discovering Devices on the KX II Subnet • 46 Discovering Devices on the Local Subnet • 45 Doc
Index 394 Java Validation and Access Warning • 27 JRE Requirements and Browser Considerations for Mac • 312 K Keyboard Language Preference (Fedora
Index 395 O Operating System IPv6 Support Notes • 337 Overview • 10, 52, 105, 108, 257, 266, 316, 326, 335 P Package Contents • 4 Permissions and
Index 396 SSH Access from a Windows PC • 258 SSH Connection to the KX II • 258 SSL Certificates • 27, 234 Standard Mouse Mode • 72 Step 1 Configur
Index 397 V Version Information - Virtual KVM Client • 91 Video Image Appears Dark when Using a Mac • 313 Video Mode and Resolution Notes • 348 V
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then P
Chapter 2: Installation and Configuration 30 Example 2: Add the KX II to Trusted Sites and Import the Certificate In this example, the KX II'
Chapter 2: Installation and Configuration 31 Steps Click OK on the Internet Options dialog to apply the changes, then close and reopen the brows
32 In This Chapter KX II Interfaces ... 32 KX II Local Console
Chapter 3: Working with Target Servers 33 KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provide
Chapter 3: Working with Target Servers 34 KX II Interface Both the KX II Remote Console and the KX II Local Console interfaces provide a web-based
Chapter 3: Working with Target Servers 35 Left Panel The left panel of the KX II interface contains the following information. Note that some i
Chapter 3: Working with Target Servers 36 Information Description When displayed? PowerIn2 Status of the power 2 outlet connection. Either on or o
Chapter 3: Working with Target Servers 37 KX II Console Navigation The KX II Console interfaces provide many methods for navigation and making
Chapter 3: Working with Target Servers 38 Port Access Page (Remote Console Display) After successfully logging on to the KX II remote console, the
Contents v Virtual Media in a Mac Environment ... 103 Acti
Chapter 3: Working with Target Servers 39 Status - The status of the servers - either up or down. To connect to an available target serve
Chapter 3: Working with Target Servers 40 View by Group Tab The View by Group tab displays blade chassis, 'standard' port groups, and du
Chapter 3: Working with Target Servers 41 Blade Chassis - Port Access Page The blade chassis is displayed in an expandable, hierarchical list on
Chapter 3: Working with Target Servers 42 On the local port, the KX II Local Console interface must be visible in order to perform the switch. H
Chapter 3: Working with Target Servers 43 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices y
Chapter 3: Working with Target Servers 44 Enable Favorites Click Enable in the Favorite Devices section of the left panel of the KX II interfac
Chapter 3: Working with Target Servers 45 Access and Display Favorites To access a favorite KX II device: Click the device name (listed bene
Chapter 3: Working with Target Servers 46 To use the default discovery port, select the Use Default Port 5000 checkbox. To use a different d
Chapter 3: Working with Target Servers 47 Scanning Ports The KX II provides the port scanning feature to search for selected targets, and display
Chapter 3: Working with Target Servers 48 Note: MPC uses a different method for initiating a scan than the other Raritan clients. See Set Scan Gro
Contents vi LAN Interface Settings ... 144 Devic
Chapter 3: Working with Target Servers 49 Using Scan Port Options Following are options available to you while scanning targets. With the excep
Chapter 3: Working with Target Servers 50 Logging Out To quit the KX II: Click Logout in the upper right-hand corner of the page. Note: Log
Chapter 3: Working with Target Servers 51 e. On the General tab, click Network Settings. The Network Settings dialog opens. f. Select Use Proxy
Chapter 3: Working with Target Servers 52 Virtual KVM Client (VKC) and Active KVM Client (AKC) Overview Whenever you access a target server from t
Chapter 3: Working with Target Servers 53 Virtual KVM Client (VKC) and Active KVM Client (AKC) Shared Features The Virtual KVM Client (VKC) and A
Chapter 3: Working with Target Servers 54 Connection Properties Dynamic video compression algorithms maintain KVM console usability under varying
Chapter 3: Working with Target Servers 55 3. Choose the Color Depth from the drop-down list. The device can dynamically adapt the color depth tr
Chapter 3: Working with Target Servers 56 Connection Information Open the Connection Information dialog for real-time connection information, and
Chapter 3: Working with Target Servers 57 Steps Click Connection > Info... to open the Connection Info dialog. Click Copy to Clipboard. Past
Chapter 3: Working with Target Servers 58 33 kb (Fast Modem) 24 kb (Slow Modem) Note that these settings are an optimization for specific co
Contents vii Upgrading CIMs ...
Chapter 3: Working with Target Servers 59 Button Button name Description Same as choosing Video > Color Calibrate. Target Screenshot Click to
Chapter 3: Working with Target Servers 60 Audio is supported by KX II 2.4.0 (and later). Audio capture is supported by KX II 2.5.0 (and later). Au
Chapter 3: Working with Target Servers 61 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Mult
Chapter 3: Working with Target Servers 62 The macros are then imported. If a macro is imported that contains a hot key that already exists, the ho
Chapter 3: Working with Target Servers 63 Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Mac
Chapter 3: Working with Target Servers 64 9. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. To us
Chapter 3: Working with Target Servers 65 Modifying and Removing Keyboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. T
Chapter 3: Working with Target Servers 66 Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen.
Chapter 3: Working with Target Servers 67 Adjusting Video Settings Use the Video Settings command to manually adjust the video settings. To c
Chapter 3: Working with Target Servers 68 Best possible video mode The device will perform the full Auto Sense process when switching targets o
Contents viii Local Console Smart Card Access ... 270 Sma
Chapter 3: Working with Target Servers 69 Screenshot from Target Command (Target Screenshot) You are able to take a screenshot of a target server
Chapter 3: Working with Target Servers 70 Mouse Options When in dual mouse mode, and provided the option is properly configured, the mouse cursors
Chapter 3: Working with Target Servers 71 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor
Chapter 3: Working with Target Servers 72 Additional Notes for Intelligent Mouse Mode Be sure that there are no icons or applications in the up
Chapter 3: Working with Target Servers 73 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s
Chapter 3: Working with Target Servers 74 Please note that mouse configurations will vary on different target operating systems. Consult your OS g
Chapter 3: Working with Target Servers 75 Single Mouse Mode Single Mouse mode uses only the target server mouse cursor and the local mouse pointe
Chapter 3: Working with Target Servers 76 United Kingdom Korean (Korea) French (Belgium) Norwegian (Norway) Portuguese (Portugal)
Chapter 3: Working with Target Servers 77 5. Click OK. Keyboard Limitations Turkish Keyboards If using a Turkish keyboard, you must connect to
Chapter 3: Working with Target Servers 78 Client Launch Settings KX II users can configure client launch settings that allow you to define the scr
Contents ix Appendix B Dual Video Port Groups 317 Overview ...
Chapter 3: Working with Target Servers 79 Configure Scan Settings in VKC and AKC The KX II provides the port scanning feature to search for selec
Chapter 3: Working with Target Servers 80 View Status Bar By default, the status bar is displayed at the bottom of the target window. To hide
Chapter 3: Working with Target Servers 81 Full Screen Mode When you enter Full Screen mode, the target's full screen is displayed and acquir
Chapter 3: Working with Target Servers 82 Digital Audio The KX II supports end-to-end, bidirectional, digital audio connections for digital audio
Chapter 3: Working with Target Servers 83 Saving Audio Settings Audio device settings are applied on a per KX II device basis. Once the audio d
Chapter 3: Working with Target Servers 84 Operating system Audio playback and capture supported by: Mac® Virtual KVM Client (VKC) Multi-Plat
Chapter 3: Working with Target Servers 85 Connecting to a Single Target Server from Multiple Remote Clients KX II 2.5.0 (and later) allows up to
Chapter 3: Working with Target Servers 86 Connecting and Disconnecting a Digital Audio Device Audio device settings are applied on a per KX II dev
Chapter 3: Working with Target Servers 87 Note: The device names listed in the Connect Recording Device drop-down are truncated to a maximum of 3
Chapter 3: Working with Target Servers 88 To disconnect from the audio device: Click the Audio icon in the toolbar and select OK when you
Kommentare zu diesen Handbüchern