Raritan Dominion KX Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach PC / Workstation Barebones Raritan Dominion KX herunter. Raritan Dominion KX User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 223
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Dominion KX II-101-V2

Copyright © 2012 Raritan, Inc. KX2101V2-v3.5.0-D-E September 2012 255-62-3059-00 Dominion KX II-101-V2 User Guide Release 3.5.0

Seite 2 - VCCI Information (Japan)

Chapter 1: Introduction 2 KX II-101-V2 Overview Thank you for purchasing the Dominion KX II-101-V2. The KX II-101-V2 provides a single keyboard, v

Seite 3 - Contents

Chapter 5: User Management 92 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management >

Seite 4

Chapter 5: User Management 93 Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is

Seite 5 - Contents

Chapter 5: User Management 94 Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking pro

Seite 6

Chapter 5: User Management 95 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searc

Seite 7

Chapter 5: User Management 96 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used t

Seite 8 - Index 211

Chapter 5: User Management 97 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only us

Seite 9 - Introduction

Chapter 5: User Management 98 17. The KX II-101-V2 provides you with the ability to test the LDAP configuration from the Authentication Settings p

Seite 10 - KX II-101-V2 Overview

Chapter 5: User Management 99 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On yo

Seite 11 - KX II-101-V2 Help

Chapter 5: User Management 100 The timeout is the length of time the KX II-101-V2 waits for a response from the RADIUS server before sending anoth

Seite 12 - Chapter 1: Introduction

Chapter 5: User Management 101  CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than P

Seite 13 - Product Features

Chapter 1: Introduction 3 Diagram key KX II-101-V2 LAN Windows®, Linux® and Sun™ servers TCP/IP LAN Remote (network) access Mobile access

Seite 14

Chapter 5: User Management 102 RADIUS Communication Exchange Specifications The KX II-101-V2 sends the following RADIUS attributes to your RADIUS

Seite 15 - Terminology

Chapter 5: User Management 103 User Authentication Process When the device is configured to authenticate and authorize local users, the order in

Seite 16 - Package Contents

Chapter 5: User Management 104 Remote authentication follows the process specified in the flowchart below:

Seite 17 - Chapter 2

Chapter 5: User Management 105 Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Passwor

Seite 18 - Getting Started

106 In This Chapter Network Settings ... 106 Device Services ...

Seite 19 - Command Line Resolution

Chapter 6: Device Management 107 Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For c

Seite 20 - GUI Resolution/Solaris 8

Chapter 6: Device Management 108 e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discover

Seite 21 - Mouse Settings

Chapter 6: Device Management 109 See LAN Interface Settings (on page 110) for information in configuring this section of the Network Settings pag

Seite 22

Chapter 6: Device Management 110 LAN Interface Settings The current parameter settings are identified in the Current LAN interface parameters fiel

Seite 23

Chapter 6: Device Management 111 Device Services The Device Services page allows you to configure the following functions:  Enable SSH access

Seite 24 - Windows 2000 Settings

Chapter 1: Introduction 4 What's New in the Help The following information has been added based on enhancements and changes to the equipment

Seite 25

Chapter 6: Device Management 112 HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX II-101-V2. For exam

Seite 26

Chapter 6: Device Management 113 2. Select Enable Direct Port Access via URL if you would like users to have direct access to a target via the D

Seite 27 - Sun Solaris Settings

Chapter 6: Device Management 114 c. Authentication Protocol - the MD5 or SHA authentication protocol used by the SNMP v3 agent d. Authentication

Seite 28 - IBM AIX Settings

Chapter 6: Device Management 115 Keyboard/Mouse Setup Use the Keyboard/Mouse Setup page to configure the Keyboard and Mouse interface between the

Seite 29

Chapter 6: Device Management 116 Admin Port To configure the admin serial port: 1. Choose Device Settings > Serial Port. The Serial Port Set

Seite 30

Chapter 6: Device Management 117  Modem server IP address - The address the user types to access the KX II-101-V2 web interface once connected

Seite 31 - B: Target Server

Chapter 6: Device Management 118  User Specified Time - Choose this option to input the date and time manually. For the User Specified Time opti

Seite 32 - USB Configuration

Chapter 6: Device Management 119 2. Select SNMP Logging Enabled to enable to remaining checkboxes. Required 3. Select either or both SNMP v1/v2

Seite 33 - PS/2 Configuration

Chapter 6: Device Management 120 Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Man

Seite 34 - D: Admin Port

Chapter 6: Device Management 121 Note: If you disable SNMP settings at any time, the SNMP information is retained so you do not have to reenter i

Seite 35 - Setting a New Password

Chapter 1: Introduction 5 Product Photos KX II-101-V2 Product Features Interfaces  Integrated PS/2 KVM connection  USB connection for cont

Seite 36 - Assigning an IP Address

Chapter 6: Device Management 122 Trap Name Description deviceUpgradeStarted The KX II-101-V2 has begun update via an RFP file. factoryReset The de

Seite 37

Chapter 6: Device Management 123 Trap Name Description securityBannerChanged A change has been made to the security banner. securityViolation Se

Seite 38 - Naming the Target Server

Chapter 6: Device Management 124 Viewing the KX II-101-V2 MIB To view the KX II-101-V2 MIB: 1. Choose Device Settings > Event Management - S

Seite 39 - Create User Groups and Users

Chapter 6: Device Management 125 Note: IPv6 addresses cannot exceed 80 characters in length for the host name. Use the reset to factory defaults

Seite 40

Chapter 6: Device Management 126 Port Configuration The Port Configuration page displays a list of the KX II-101-V2 ports. Ports connected to KVM

Seite 41

Chapter 6: Device Management 127 Managing KVM Target Servers (Port Page) This Port page opens when you select a port from the Port Configuration

Seite 42

Chapter 6: Device Management 128 Valid Special Characters Character Description Character Description ! Exclamation point ; Semi-colon " Doub

Seite 43 - Working with Target Servers

Chapter 6: Device Management 129 Connecting the Power Strip Diagram key KX II-101-V2 Raritan power strip. DKX2-101-V2-PDU (DB9-RJ45 adapter)

Seite 44 - Left Panel

Chapter 6: Device Management 130 5. Power ON the Raritan power strip. 6. Click to Device Settings > Serial Port to open the Serial Port page.

Seite 45

Chapter 6: Device Management 131 To cancel without saving changes:  Click Cancel. Managing Power Associations To make power associations

Seite 46 - Port Access Page

Chapter 1: Introduction 6 System Management Features  Firmware upgradable over Ethernet  Failsafe firmware upgrade capability  Clock that ca

Seite 47 - Port Action Menu

Chapter 6: Device Management 132 2. For that power strip, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet

Seite 48 - Managing Favorites

Chapter 6: Device Management 133 Analog KVM Switch You can configure a Raritan analog KVM switch to work with the KX II-101-V2. The KX II-101-V2

Seite 49 - Favorites List Page

Chapter 6: Device Management 134 8. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults:  Click Reset to Defau

Seite 50

Chapter 6: Device Management 135 Note: If the KX II-101-V2 is set to restore to the factory defaults upon reset, the IP address, user name, and o

Seite 51 - Logging Out

136 In This Chapter Overview ... 137 USB Connection Se

Seite 52 - Virtual KVM Client (VKC)

Chapter 7: Managing USB Connections 137 Overview To broaden the KX II-101-V2's compatibility with different KVM target servers, Raritan prov

Seite 53

Chapter 7: Managing USB Connections 138 2. Click USB Connection Settings to expand the USB Connection Settings section. 3. Select the USB connec

Seite 54

Chapter 7: Managing USB Connections 139 3. Click the User Defined KX II-101 USB Profile Configuration Table link to access the recommended confi

Seite 55

140 In This Chapter Security Settings ... 140 Configuring IP Acces

Seite 56

Chapter 8: Security Management 141 Limitation Description This field is enabled and required when the Enable Password Aging checkbox is selected.

Seite 57 - Keyboard Macros

Chapter 1: Introduction 7 User Features  Web-based access through common browsers  Intuitive graphical user interface (GUI)  PC Share mode,

Seite 58

Chapter 8: Security Management 142 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor

Seite 59

Chapter 8: Security Management 143 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s

Seite 60 - Building a Keyboard Macro

Chapter 8: Security Management 144 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e

Seite 61

Chapter 8: Security Management 145 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,

Seite 62 - Running a Keyboard Macro

Chapter 8: Security Management 146 Encryption mode Description for more information. AES-256 The Advanced Encryption Standard (AES) is a National

Seite 63 - Adjusting Video Settings

Chapter 8: Security Management 147 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware

Seite 64

Chapter 8: Security Management 148 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desira

Seite 65

Chapter 8: Security Management 149  Set the Encryption & Share to Auto on the Security Settings page. See Encryption & Share. Microsoft

Seite 66

Chapter 8: Security Management 150  Drop - IP addresses are denied access to the KX II-101-V2 device. To add (append) rules: 1. Type the IP a

Seite 67 - Using Screenshot from Target

Chapter 8: Security Management 151 3. You are prompted to confirm the deletion. Click OK. To allow access to only one IP address and block all

Seite 68

Chapter 1: Introduction 8 Term Description Virtual media Enables a KVM target server to remotely access media from client PC and network file serv

Seite 69 - Mouse Synchronization Tips

Chapter 8: Security Management 152 SSL Certificates The KX II-101-V2 uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic

Seite 70 - Standard Mouse Mode

Chapter 8: Security Management 153 f. Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g.

Seite 71 - Intelligent Mouse Mode

Chapter 8: Security Management 154 i. Reboot the KX II-101-V2 to send the saved CSR to a CA for SSL certificate. To download a CSR certificate

Seite 72 - General Settings

Chapter 8: Security Management 155 Security Banner KX II-101-V2 provides you with the ability to add a security banner to the KX II-101-V2 login

Seite 73

156 In This Chapter Audit Log... 156 Device Informatio

Seite 74 - Keyboard Limitations

Chapter 9: Maintenance 157 Device Information The Device Information page provides detailed information about your KX II-101-V2 device. This info

Seite 75 - Client Launch Settings

Chapter 9: Maintenance 158 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX

Seite 76 - View Status Bar

Chapter 9: Maintenance 159 2. To do this: a. Save the backup file. The backup file is saved locally on your client machine with the name and lo

Seite 77 - Full Screen Mode

Chapter 9: Maintenance 160 Upgrading Firmware Use the Firmware Upgrade page to upgrade the firmware for your KX II-101-V2. Important: Do not turn

Seite 78

Chapter 9: Maintenance 161 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upg

Seite 79 - Virtual Media

9 In This Chapter Overview ... 9 Default Login Inf

Seite 80

Chapter 9: Maintenance 162  Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defaults. Note

Seite 81 - Chapter 4: Virtual Media

Chapter 9: Maintenance 163 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. Stopping CC-SG Manag

Seite 82 - Target Server

Chapter 9: Maintenance 164 2. Click Yes to begin the processing of removing the device from CC-SG management. A confirmation message will then di

Seite 83 - XP environment

165 The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the KX II-101-V2 device. All of the Diag

Seite 84 - Chapter 4: Virtual Media

Chapter 10: Diagnostics 166  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one

Seite 85

Chapter 10: Diagnostics 167  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display

Seite 86 - Using Virtual Media

Chapter 10: Diagnostics 168 Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP n

Seite 87

Chapter 10: Diagnostics 169 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace ro

Seite 88 - Connecting to Virtual Media

Chapter 10: Diagnostics 170 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical

Seite 89

Chapter 10: Diagnostics 171 a. Click Save to File. The File Download dialog appears. b. Click Save. The Save As dialog appears. c. Navigate t

Seite 90 - Disconnecting Virtual Media

Chapter 2: Installation and Configuration 10 Getting Started KX II-101-V2 users with Microsoft® Internet Explorer® version 6 or Windows 2000® m

Seite 91 - User Management

172 In This Chapter Overview ... 172 Accessing the KX

Seite 92

Chapter 11: Command Line Interface (CLI) 173 Accessing the KX II-101-V2 Using the CLI Access the KX II-101-V2 using one of the following methods:

Seite 93 - Setting Port Permissions

Chapter 11: Command Line Interface (CLI) 174 SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX®/Linux® workstation and

Seite 94

Chapter 11: Command Line Interface (CLI) 175 Completion of Commands The CLI supports the completion of partially-entered commands. After entering

Seite 95 - Setting Permissions

Chapter 11: Command Line Interface (CLI) 176 Command Description help Display an overview of the CLI syntax. quit Places the user back one level.

Seite 96

Chapter 11: Command Line Interface (CLI) 177 Diagnostics The Diagnostics menu enables you to set the logging options for different modules of the

Seite 97

Chapter 11: Command Line Interface (CLI) 178 Command Option Description verbose [on|off] Turns verbose logging on and off. Setlog Command Example

Seite 98

Chapter 11: Command Line Interface (CLI) 179 Command Option Description ipauto Static or dynamic IP address ip ipaddress IP address of the KX II-

Seite 99

Chapter 11: Command Line Interface (CLI) 180 Listports Command The Listports command lists the number of active users, user names, port, and statu

Seite 100 - Chapter 5: User Management

181 In This Chapter Overview ... 181 Removing a KX II-

Seite 101 - Authentication Settings

Chapter 2: Installation and Configuration 11 Resolutions 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz

Seite 102

Chapter 12: CC-SG Management 182 Removing a KX II-101-V2 from CC-SG Management Unless the KX II-101-V2 is released from CC-SG control, you cannot

Seite 103

Chapter 12: CC-SG Management 183 2. Click Yes. A message appears, confirming that the device is no longer under CC management. 3. Click OK. Th

Seite 104

184 In This Chapter Physical Specifications ... 184 Supported Operating Syst

Seite 105

Appendix A: Specifications 185 KX II-101-V2... Description Remote Connection: Network Protocols 1 Ethernet (RJ45) port with activity status indic

Seite 106

Appendix A: Specifications 186 Mode Operating system Browser 32-bit mode  Firefox® 1.06 - 4 or later Windows Server 2003®  Internet Explorer 6

Seite 107

Appendix A: Specifications 187 Certified Modems  USRobotics® 56K 5686E  ZOOM® v90  ZOOM v92  USRobotics Sportster® 56K  USRobotic

Seite 108

Appendix A: Specifications 188 Resolutions 800x600 @75Hz 1360x768@60Hz 800x600 @85Hz 1366x768@60Hz 800x600 @90Hz 1368x768@60Hz 800x600 @100Hz 1400

Seite 109

Appendix A: Specifications 189 Language Regions Keyboard layout Korean South Korea Dubeolsik Hangul Japanese Japan JIS Keyboard French

Seite 110

Appendix A: Specifications 190 Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 112

Seite 111 - User Authentication Process

Appendix A: Specifications 191 Network Speed Settings KX II-101-V2 network speed setting Network switch port setting Auto 100/Full 100/Half 10

Seite 112

This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, rep

Seite 113 - Changing a Password

Chapter 2: Installation and Configuration 12 To change the command line resolution: 1. Run the following command: # eeprom output-device=screen

Seite 114 - Device Management

Appendix A: Specifications 192 communication,” however, note that the KX II-101-V2 behavior deviates from expected behavior Note: For reliable net

Seite 115

193 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...

Seite 116 - Chapter 6: Device Management

Appendix B: Updating the LDAP Schema 194 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to th

Seite 117

Appendix B: Updating the LDAP Schema 195 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create

Seite 118

Appendix B: Updating the LDAP Schema 196 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.

Seite 119 - Device Services

Appendix B: Updating the LDAP Schema 197 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object di

Seite 120

Appendix B: Updating the LDAP Schema 198 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window op

Seite 121

Appendix B: Updating the LDAP Schema 199 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properti

Seite 122

Appendix B: Updating the LDAP Schema 200 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes lis

Seite 123 - Serial Port Settings

201 The KX II-101-V2 device can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brack

Seite 124

Chapter 2: Installation and Configuration 13 Mouse Settings The KX II-101-V2 operates in several mouse modes: Absolute Mouse Synchronization™, In

Seite 125

Appendix C: Rack Mount 202 Diagram key Screws

Seite 126 - Event Management

203 In This Chapter Java Runtime Environment (JRE) ... 203 IPv6 Support Notes ...

Seite 127

Appendix D: Informational Notes 204 IPv6 Support Notes Operating System IPv6 Support Notes Java Java™ 1.6 supports IPv6 for the following:  Sol

Seite 128

Appendix D: Informational Notes 205 Sun Blade Video, Keyboard, and Mouse Support Limitation Video If you are accessing a Sun™ Blade 100 with the

Seite 129

Appendix D: Informational Notes 206 HP UX RX 1600 Keyboard and Mouse Configuration If you are using an HP® UX RX 1600 running UNIX®, do the follow

Seite 130

207 In This Chapter General FAQs ... 207 IPv6 Networking ...

Seite 131

Appendix E: FAQs 208 Question Answer What new features are available in the latest release? With Release 3.5 (and above), the following features a

Seite 132 - SysLog Configuration

Appendix E: FAQs 209 Question Answer What if I have an external server with an IPv6 address that I want to use with my KX II-101-V2? The KX II-10

Seite 134 - Port Configuration

211 9 9 Pin Pinout • 192 A A Power • 23 Absolute Mouse Mode • 64 Accessing the KX II-101-V2 Using the CLI • 173 Adding a New User • 91, 92 Adding a

Seite 135 - Renaming a Port

Chapter 2: Installation and Configuration 14 d. Deselect the "Use the following transition effect for menus and tooltips" option. e. C

Seite 136 - Valid Special Characters

Index 212 Disconnecting Users from Ports • 90, 91 Disconnecting Virtual Media • 79, 82 Discovering Raritan Devices on the KX II-101-V2 Subnet • 42

Seite 137 - Connecting the Power Strip

Index 213 Modifying an Existing User • 92 Modifying an Existing User Group • 88 Modifying and Removing Keyboard Macros • 54 Mounting • 7 Mounting

Seite 138

Index 214 Sun Blade Video, Keyboard, and Mouse Support Limitation • 205 Sun Solaris Settings • 19 Sun Video Resolution • 11 Supported Browsers • 1

Seite 139 - Managing Power Associations

U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Pres

Seite 140

Chapter 2: Installation and Configuration 15 d. Click Settings in the Performance group to open the Performance Options dialog. e. Under Custom

Seite 141 - Analog KVM Switch

Chapter 2: Installation and Configuration 16  Fade or slide menus into view  Fade or slide ToolTips into view  Fade out menu items after cli

Seite 142

Chapter 2: Installation and Configuration 17 Linux Settings (Red Hat 4 and 5, and Fedora 14) Note: The following settings are optimized for Stand

Seite 143

Chapter 2: Installation and Configuration 18 b. Using a text editor, disable all non-KX II-101-V2 supported resolutions. c. Disable the virtual

Seite 144 - Managing USB Connections

Chapter 2: Installation and Configuration 19 c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed gr

Seite 145 - USB Connection Settings

Chapter 2: Installation and Configuration 20 Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. A target server running

Seite 146

Chapter 2: Installation and Configuration 21 2. Click on Mouse Settings and set the Mouse Acceleration to 1.0 and Threshold to 3.0. Step 2: Con

Seite 147

iii Contents Chapter 1 Introduction 1 KX II-101-V2 Overview ...

Seite 148 - Security Management

Chapter 2: Installation and Configuration 22 Step 3: Connect the Equipment The KX II-101-V2 has the physical connections described in the diagram.

Seite 149

Chapter 2: Installation and Configuration 23 Diagram key Admin port Use to do one of the following:  Configure and manage the device with a te

Seite 150

Chapter 2: Installation and Configuration 24 USB Configuration To configure the KX II-101-V2 for use with a USB target server: 1. Use the atta

Seite 151

Chapter 2: Installation and Configuration 25 Diagram key for USB Connection Video connection from the KX II-101-V2 to the target USB connection

Seite 152

Chapter 2: Installation and Configuration 26 Note: If you are using virtual media, you must use the USB connection. Diagram key for PS/2 connectio

Seite 153

Chapter 2: Installation and Configuration 27 E: Local User Port The Local User port serves as a pass-through to the target server video so that i

Seite 154

Chapter 2: Installation and Configuration 28 9. Click Apply. You will receive confirmation that the password was successfully changed. 10. Click

Seite 155

Chapter 2: Installation and Configuration 29 c. Enter the Prefix Length. This is the number of bits used in the IPv6 address. d. Enter the Gat

Seite 156

Chapter 2: Installation and Configuration 30 See LAN Interface Settings (on page 110) for information in configuring this section of the Network S

Seite 157

Chapter 2: Installation and Configuration 31 Remote Authentication Note to CC-SG Users When the KX II-101-V2 is controlled by CommandCenter Secur

Seite 158

Contents iv Video Properties ... 55 M

Seite 159

Chapter 2: Installation and Configuration 32 Configure the KX II-101-V2 Using a Terminal Emulation Program (Optional) You can use the Admin serial

Seite 160 - SSL Certificates

Chapter 2: Installation and Configuration 33 10. To configure new network settings, at the Network prompt, type interface followed by one of the

Seite 161

Chapter 2: Installation and Configuration 34 Command Argument Options  auto - Automatically sets speed and interface mode based on the network.

Seite 162

35 In This Chapter Interfaces ... 35 Virtual KVM Clie

Seite 163 - Security Banner

Chapter 3: Working with Target Servers 36 3. Select the Enable Direct Port Access via URL checkbox. 4. Click Save. To define a direct port acc

Seite 164 - Maintenance

Chapter 3: Working with Target Servers 37 Information Description When displayed? State The current state of the application, either idle or acti

Seite 165 - Device Information

Chapter 3: Working with Target Servers 38 The left panel can be collapsed in order to increase the display area of the page. To collapse and the

Seite 166 - Backup and Restore

Chapter 3: Working with Target Servers 39  Port Name - The name of the KX II-101-V2 port. Initially, this is set to Dominion_KX2_101_Port1 but

Seite 167 - Chapter 9: Maintenance

Chapter 3: Working with Target Servers 40 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices yo

Seite 168 - Upgrading Firmware

Chapter 3: Working with Target Servers 41 Manage Favorites Page To open the Manage Favorites page:  Click Manage in the left panel. The Mana

Seite 169 - Factory Reset

Contents v Device Services ...

Seite 170 - Rebooting the KX II-101-V2

Chapter 3: Working with Target Servers 42 3. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Favori

Seite 171 - Stopping CC-SG Management

Chapter 3: Working with Target Servers 43 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favori

Seite 172 - Chapter 9: Maintenance

Chapter 3: Working with Target Servers 44 Virtual KVM Client (VKC) Please note this client is used by various Raritan products. As such, reference

Seite 173 - Diagnostics

Chapter 3: Working with Target Servers 45 Button Button name Description Note: Not available in KX II-101-V2. Target Screenshot Click to take a

Seite 174 - Chapter 10: Diagnostics

Chapter 3: Working with Target Servers 46 Button Button name Description Scaling Increases or reduces the target video size so you can view the e

Seite 175 - Chapter 10: Diagnostics

Chapter 3: Working with Target Servers 47 Connection Properties The dynamic video compression algorithms maintain KVM console usability under var

Seite 176 - Trace Route to Host Page

Chapter 3: Working with Target Servers 48  256 Kb (Cable)  128 Kb (Dual ISDN)  56 kb (ISP Modem)  33 kb (Fast Modem)  24 kb (Slow Modem)

Seite 177

Chapter 3: Working with Target Servers 49 Connection Information To obtain information about your Virtual KVM Client connection:  Choose Conn

Seite 178 - Device Diagnostics

Chapter 3: Working with Target Servers 50 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi

Seite 179

Chapter 3: Working with Target Servers 51  Click Yes to replace the existing macro with the imported version.  Click Yes to All to replace th

Seite 180 - Command Line Interface (CLI)

Contents vi Configuring IP Access Control ... 149

Seite 181

Chapter 3: Working with Target Servers 52 3. Click Ok. An "Export Keyboard Macros to" dialog is displayed. Locate and select the macro

Seite 182 - Navigation of the CLI

Chapter 3: Working with Target Servers 53 Release F4 Release Left Alt 6. Review the Macro Sequence field to be sure the macro sequence is define

Seite 183 - Shortcuts

Chapter 3: Working with Target Servers 54 Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you

Seite 184 - CLI Commands

Chapter 3: Working with Target Servers 55 Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen.

Seite 185 - Setlog Command

Chapter 3: Working with Target Servers 56 The device can filter out the electrical interference of video output from graphics cards. This feature

Seite 186 - Interface Command

Chapter 3: Working with Target Servers 57  Best possible video mode The device will perform the full Auto Sense process when switching targets

Seite 187 - IPv6 Command

Chapter 3: Working with Target Servers 58 Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on c

Seite 188 - Userlist Command Example

Chapter 3: Working with Target Servers 59 Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot

Seite 189 - CC-SG Management

Chapter 3: Working with Target Servers 60 Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and

Seite 190 - Chapter 12: CC-SG Management

Chapter 3: Working with Target Servers 61 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor

Seite 191 - Using CC-SG in Proxy Mode

Contents vii Chapter 12 CC-SG Management 181 Overview ...

Seite 192 - Specifications

Chapter 3: Working with Target Servers 62 Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the up

Seite 193

Chapter 3: Working with Target Servers 63 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s

Seite 194 - Connectors

Chapter 3: Working with Target Servers 64 Please note that mouse configurations will vary on different target operating systems. Consult your OS g

Seite 195 - Supported Video Resolutions

Chapter 3: Working with Target Servers 65  Norwegian (Norway)  Portuguese (Portugal)  Danish (Denmark)  Swedish (Sweden)  German (Switz

Seite 196 - Supported Keyboard Languages

Chapter 3: Working with Target Servers 66 Keyboard Limitations Turkish Keyboards If using a Turkish keyboard, you must connect to a target server

Seite 197 - TCP and UDP Ports Used

Chapter 3: Working with Target Servers 67 Client Launch Settings Configuring client launch settings allows you to define the screen settings for

Seite 198 - Appendix A: Specifications

Chapter 3: Working with Target Servers 68 Configure Scan Settings in VKC and AKC The KX II and LX provide a port scanning feature that searches fo

Seite 199 - Network Speed Settings

Chapter 3: Working with Target Servers 69 Scaling Scaling your target window allows you to view the entire contents of the target server window.

Seite 200 - 9 Pin Pinout

Chapter 3: Working with Target Servers 70 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file

Seite 201 - Updating the LDAP Schema

71 In This Chapter Overview ... 72 Using Virtual Med

Seite 202 - Creating a New Attribute

Contents viii Appendix E FAQs 207 General FAQs ...

Seite 203

Chapter 4: Virtual Media 72 Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from the clien

Seite 204

Chapter 4: Virtual Media 73

Seite 205 - Updating the Schema Cache

Chapter 4: Virtual Media 74 Note: If you are using virtual media, you must use the USB connection. Prerequisites for Using Virtual Media With the

Seite 206 - 4. Open the Domain

Chapter 4: Virtual Media 75 Virtual Media in a Windows XP Environment If you are running the Virtual KVM Client in a Windows® XP environment, use

Seite 207

Chapter 4: Virtual Media 76 Virtual Media in a Linux Environment Following is important information for Linux® users regarding using virtual media

Seite 208

Chapter 4: Virtual Media 77 guest_user@administrator-desktop:~$ getfacl -a /dev/sr0 getfacl: Removing leading '/' from absolute path na

Seite 209 - Appendix C

Chapter 4: Virtual Media 78 Virtual Media in a Mac Environment Following is important information for Mac® users regarding using virtual media. A

Seite 210 - Diagram key

Chapter 4: Virtual Media 79 Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. 2. Open a

Seite 211 - Informational Notes

Chapter 4: Virtual Media 80 Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is moun

Seite 212 - IPv6 Support Notes

Chapter 4: Virtual Media 81 Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the st

Seite 213 - Keyboard and Mouse

1 In This Chapter KX II-101-V2 Overview ... 2 KX II-101-V2 Help ...

Seite 214

Chapter 4: Virtual Media 82 Note: If you are working with files on a Linux® target, use the Linux Sync command after the files are copied using vi

Seite 215 - Appendix E

83 In This Chapter User Groups ... 83 Users ...

Seite 216 - IPv6 Networking

Chapter 5: User Management 84 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good i

Seite 217 - Appendix E: FAQs

Chapter 5: User Management 85 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the

Seite 218

Chapter 5: User Management 86 control. It is possible to be locked out of your KX II-101-V2 if your IP address is within a range that has been den

Seite 219

Chapter 5: User Management 87 To replace a rule: 1. Specify the rule number you want to replace. 2. Type the Starting IP and Ending IP fields

Seite 220

Chapter 5: User Management 88 Permission Description Note: The Admin user group has this permission by default. Device Settings Network settings,

Seite 221 - Index

Chapter 5: User Management 89 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of th

Seite 222

Chapter 5: User Management 90 View Users by Port The User By Ports page lists all authenticated local and remote users and ports they are being co

Seite 223

Chapter 5: User Management 91 Logging Users Off the KX II-101-V2 (Force Logoff) If you are an administrator, you are able to log off any authent

Kommentare zu diesen Handbüchern

Keine Kommentare