Raritan Dominion KX II User Manual

Raritan Dominion KX II User Manual

Hide thumbs Also See for Dominion KX II:
Table of Contents

Advertisement

Dominion KX II
User Guide
Release 2.6.0
Copyright © 2014 Raritan, Inc.
DKX2-v2.6.0-0R-E
March 2014
255-62-4023-00

Advertisement

Table of Contents
loading

Summary of Contents for Raritan Dominion KX II

  • Page 1 Dominion KX II User Guide Release 2.6.0 Copyright © 2014 Raritan, Inc. DKX2-v2.6.0-0R-E March 2014 255-62-4023-00...
  • Page 2 Raritan, Inc. © Copyright 2014 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
  • Page 3: Table Of Contents

    Contents Chapter 1 Introduction KX II Overview ..........................2 Package Contents .......................... 4 KX II Device Photos and Features ....................5 Product Features ........................... 7 Hardware ..........................7 Software ..........................8 KX II Client Applications......................... 9 KX II Help ............................9 Chapter 2 Installation and Configuration Overview ............................
  • Page 4 Contents Port Access Page (Remote Console Display) ..............38 Port Action Menu ....................... 41 Managing Favorites ......................43 Scanning Ports ........................47 Logging Out ........................50 Proxy Server Configuration for Use with MPC, VKC and AKC............ 50 Virtual KVM Client (VKC) and Active KVM Client (AKC) ............. 52 Overview ..........................
  • Page 5 Contents Virtual Media in a Mac Environment ..................103 Active System Partition ....................103 Drive Partitions ........................ 103 Virtual Media File Server Setup (File Server ISO Images Only)..........104 Chapter 5 Rack PDU (Power Strip) Outlet Control Overview ............................ 105 Turning Outlets On/Off and Cycling Power ................
  • Page 6 Contents LAN Interface Settings ..................... 144 Device Services ......................... 145 Enabling SSH ........................145 HTTP and HTTPS Port Settings ..................146 Entering the Discovery Port ..................... 146 Configuring and Enabling Tiering ..................147 Enabling Direct Port Access via URL ................152 Enabling the AKC Download Server Certificate Validation ..........
  • Page 7 Contents Upgrading CIMs ......................... 245 Upgrading Firmware ........................245 Upgrade History ......................... 247 Rebooting the KX II ........................248 Stopping CC-SG Management ....................249 Chapter 11 Diagnostics Network Interface Page ......................251 Network Statistics Page ......................251 Ping Host Page .......................... 253 Trace Route to Host Page ......................
  • Page 8 Contents Local Console Smart Card Access .................... 270 Smart Card Access in KX2 8xx Devices ................. 271 Local Console USB Profile Options ................... 272 Hot Keys and Connect Keys ...................... 273 Connect Key Examples ....................273 Special Sun Key Combinations ....................274 Returning to the KX II Local Console Interface .................
  • Page 9 Step 4: Create the Dual Video Port Group ..............324 Step 5: Launch a Dual Port Video Group ................ 325 Raritan Client Navigation when Using Dual Video Port Groups ..........325 Direct Port Access and Dual Port Video Groups ............... 326 Dual Port Video Groups Displayed on the Ports Page ..............
  • Page 10 Contents Virtual Media Notes ........................341 Cannot Connect to Drives from Linux Clients ..............341 Cannot Write To/From a File from a Mac Client .............. 342 Virtual Media via VKC and AKC in a Windows Environment .......... 343 Virtual Media Not Refreshed After Files Added ............... 343 Virtual Media Linux Drive Listed Twice................
  • Page 11 Contents Appendix F Frequently Asked Questions General FAQs ..........................355 Remote Access .......................... 356 Universal Virtual Media ......................359 Bandwidth and KVM-over-IP Performance ................361 Ethernet and IP Networking ....................... 367 IPv6 Networking ......................... 369 Servers ............................371 Blade Servers ..........................372 Installation ..........................
  • Page 12: Chapter 1 Introduction

    Chapter 1 Introduction In This Chapter KX II Overview ................... 2 Package Contents ..................4 KX II Device Photos and Features ............5 Product Features ..................7 KX II Client Applications ................9 KX II Help....................9...
  • Page 13: Kx Ii Overview

    Chapter 1: Introduction KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch that provides BIOS-level (and up) access and control of servers from anywhere in the world via a web browser. Up to 64 servers can be controlled with a standard KX II. With the KX II 8-user model, up to 32 servers can be controlled with the KX2-832 and up to 64 servers can be controlled with the KX2-864.
  • Page 14 Chapter 1: Introduction...
  • Page 15: Package Contents

    Chapter 1: Introduction Diagram key Local port access Tiering IP-based network Extended local port access ® Modem Mobile access via iPhone ® and iPad using CC-SG Virtual media Digital audio Smart card access at CIMs the rack Remote smart card Cat5/6 cable access Package Contents...
  • Page 16: Kx Ii Device Photos And Features

    Chapter 1: Introduction KX II Device Photos and Features KX II KX2-808...
  • Page 17 Chapter 1: Introduction KX2-832 KX2-864 KX II Dimensions and Physical Specifications (on page 287) for product specifications. See Supported Computer Interface Module (CIMs) Specifications (on page 289) for CIM specifications and images.
  • Page 18: Product Features

    Chapter 1: Introduction Product Features Hardware  Integrated KVM-over-IP remote access  1U or 2U rack-mountable (brackets included)  Dual power supplies with failover; autoswitching power supply with power failure warning  Support for tiering in which a base KX II device is used to access multiple other tiered devices.
  • Page 19: Software

     IPv4 and IPv6 support  Power control associated directly with servers to prevent mistakes  Integration with Raritan's CommandCenter Secure Gateway (CC-SG) management unit  CC Unmanage feature to remove device from CC-SG control  Support of Raritan PX1 and PX2 appliances...
  • Page 20: Kx Ii Client Applications

    KVM Client help is provided as part of KX II online help. Online help is accompanied by the KX II Quick Setup Guide, which is included with your KX II and can be found on the Raritan Support page Raritan's website (http://www.raritan.com/support/firmware-and-documentation).
  • Page 21: Chapter 2 Installation And Configuration

    The KX II can be mounted in 1U (1.75", 4.4 cm) of vertical space in a standard 19" equipment rack. Note: The Raritan device depicted in the rack mounting diagrams is for example purposes only and may not depict your device. The mounting instructions are specific to your device.
  • Page 22: Rear Mount

    Chapter 2: Installation and Configuration 5. When connecting cables to the rear panel of the KX II drape them over the cable-support bar. Rear Mount The steps correspond to the numbers shown in the rear rackmount diagrams. 1. Secure the cable-support bar to the front end of the side brackets, near the side brackets' “ears,”...
  • Page 23: Default Login Information

    Default Login Information Default Value User name admin This user has administrative privileges. raritan Password The first time you start the KX II, you are required to change the default password. IP address 192.168.0.192. Important: For backup and business continuity purposes, it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location.
  • Page 24: Step 2: Configure The Kvm Target Servers

    Chapter 2: Installation and Configuration Step 2: Configure the KVM Target Servers Target Server Video Resolutions For optimal bandwidth efficiency and video performance, KVM target ® ® servers running graphical user interfaces such as Windows , Linux ™ X-Windows, Solaris , and KDE may require configuration.
  • Page 25 If you do not set this profile, the mouse does synch in OS X. To do this, do one of the following: 1. Connect to the Mac target from the Raritan KVM Client. 2. Select USB Profile > Other Profiles > Mac OS-X (10.4.9 and later).
  • Page 26 Chapter 2: Installation and Configuration 3. In KX II, select Device Settings > Port Configuration, then click on the target name to open the Port page. 4. Expand 'Select USB Profiles for Port' section. 5. Select 'Mac OS-X (10.4.9) and later' from the Available box, then click Add to add it to the Selected box.
  • Page 27: Step 3: Connect The Equipment

    Chapter 2: Installation and Configuration Step 3: Connect the Equipment A. AC Power Connect the power supply(s): 1. Attach the included AC power cord to the KX II, and plug it into an AC power outlet. 2. For dual-power failover protection, attach the second included AC power cord to the KX II, and plug it into a different power source than the first power cord.
  • Page 28 Chapter 2: Installation and Configuration Enable 'Automatic Failover' on the KX II Network Configuration page. D. Local Access Port (Local PC) For access to target servers at the rack, use the KX II Local Access port. The Local Access port also provides a graphical user interface from the KX II Local Console for administration and target server access.
  • Page 29: Step 4: Configure The Kx Ii

    1. Once the unit has booted, enter the default username admin and password raritan. Click Login. 2. Enter the old password raritan, then enter and reenter a new password. Passwords can be up to 64 characters in length consisting of English, alphanumeric and special characters.
  • Page 30 Chapter 2: Installation and Configuration Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings > Network. The Network Settings page opens. 2. Specify a meaningful Device Name for your KX II device. Up to 32 alphanumeric and valid special characters, no spaces between characters.
  • Page 31 Chapter 2: Installation and Configuration Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network settings in the IPv6 section: a. Select the IPv6 checkbox to activate the fields in the section and enable IPv6 on the device. b.
  • Page 32 Chapter 2: Installation and Configuration 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addresses entered in this section is used to connect to the DNS server. Enter the following information if the Following DNS Server Addresses is selected.
  • Page 33 Chapter 2: Installation and Configuration If either of these checkboxes is selected and only power input is connected, the power LED on the front of the device is Red. Configure Date/Time Settings (Optional) Optionally, configure the date and time settings. The date and time settings impact SSL certificate validation if LDAPS is enabled.
  • Page 34: Step 5: Launching The Kx Ii Remote Console

    Chapter 2: Installation and Configuration Step 5: Launching the KX II Remote Console Log in to your KX II Remote Console from any workstation with network ™ ® connectivity that has Microsoft .NET and/or Java Runtime Environment installed. To launch the KX II Remote Console: 1.
  • Page 35: Step 6: Configuring The Keyboard Language (Optional)

    The Caps Lock light starts to blink, indicating that the CIM is in Layout Code Change mode. The text window displays: Raritan Computer, Inc. Current keyboard layout code = 22h (US5 UNIX). 3. Type the layout code desired (for example, 31 for the Japanese keyboard).
  • Page 36: Step 7: Configure Tiering (Optional)

    Chapter 2: Installation and Configuration Step 7: Configure Tiering (Optional) The optional tiering feature allows you to use a KX II as your base device, then connect additional KX II's to it as tiered devices. You can then access servers and PX PDUs through the base both locally and remotely.
  • Page 37: Allow Pop-Ups

    When logging in to KX II, Java 1.7 prompts you to validate KX II, and to allow access to the application. Raritan recommends installing an SSL certificate in each KX II device in order to reduce Java warnings, and enhance security. See Certificates...
  • Page 38: Additional Security Warnings

    Chapter 2: Installation and Configuration Additional Security Warnings Even after an SSL certificate is installed in the KX II, depending on your browser and security settings, additional security warnings may be displayed when you log in to KX II. It is necessary to accept these warnings to launch the KX II Remote Console.
  • Page 39: Example 1: Import The Certificate Into The Browser

    Chapter 2: Installation and Configuration Example 1: Import the Certificate into the Browser In this example, you import the Certificate into the browser. Steps Open an IE browser, then log in to KX II. ™ Click More Information on the first Java security warning.
  • Page 40 Chapter 2: Installation and Configuration Steps Click the Content tab. Click Certificates. The Certificate Import Wizard opens and walks you through each step.  File to Import - Browse to locate the Certificate  Certificate Store - Select the location to store the Certificate Click Finish on the last step of the Wizard.
  • Page 41: Example 2: Add The Kx Ii To Trusted Sites And Import The Certificate

    Chapter 2: Installation and Configuration Example 2: Add the KX II to Trusted Sites and Import the Certificate In this example, the KX II's URL is added as a Trusted Site, and the Self Signed Certificate is added as part of the process. Steps Open an IE browser, then select Tools >...
  • Page 42 Chapter 2: Installation and Configuration Steps Click OK on the Internet Options dialog to apply the changes, then close and reopen the browser. Next, import the Certificate. Steps Open an IE browser, then log in to KX II. ™ Click More Information on the first Java security warning.
  • Page 43: Chapter 3 Working With Target Servers

    Chapter 3 Working with Target Servers In This Chapter KX II Interfaces ..................32 KX II Local Console Interface: KX II Devices .......... 33 KX II Remote Console Interface .............. 33 Proxy Server Configuration for Use with MPC, VKC and AKC ....50 Virtual KVM Client (VKC) and Active KVM Client (AKC) ......
  • Page 44: Kx Ii Local Console Interface: Kx Ii Devices

    Chapter 3: Working with Target Servers KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provides standard KVM management and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
  • Page 45: Kx Ii Interface

    Chapter 3: Working with Target Servers KX II Interface Both the KX II Remote Console and the KX II Local Console interfaces provide a web-based interface for device configuration and administration, as well as target server list and selection. The options are organized into various tabs.
  • Page 46: Left Panel

    Chapter 3: Working with Target Servers Left Panel The left panel of the KX II interface contains the following information. Note that some information is conditional - meaning it is displayed based on your role, features being used and so on. Conditional information is noted here.
  • Page 47 Chapter 3: Working with Target Servers Information Description When displayed? PowerIn2 Status of the power 2 Always outlet connection. Either on or off, or Auto-detect Configured As If you are using a tiering When the KX II is part of Base or Configured configuration, this a tiered configuration...
  • Page 48: Kx Ii Console Navigation

    Chapter 3: Working with Target Servers KX II Console Navigation The KX II Console interfaces provide many methods for navigation and making your selections. To select an option (use any of the following):  Click on a tab. A page of available options appears. ...
  • Page 49: Port Access Page (Remote Console Display)

    Chapter 3: Working with Target Servers Port Access Page (Remote Console Display) After successfully logging on to the KX II remote console, the View by Port tab on the Port Access page appears. This page lists all of the KX II ports, and the target servers, port groups, and blade chassis that are connected to those ports.
  • Page 50 Chapter 3: Working with Target Servers  Status - The status of the servers - either up or down. To connect to an available target server or dual monitor target server: 1. Click on the port name. The Port Action menu opens. 2.
  • Page 51 Chapter 3: Working with Target Servers View by Group Tab The View by Group tab displays blade chassis, 'standard' port groups, and dual video port groups. Click the Expand Arrow icon next to a group to view the ports assigned to the port group. Device Management (on page 141) for information on creating each of these types of port groups.
  • Page 52: Port Action Menu

    Chapter 3: Working with Target Servers Blade Chassis - Port Access Page The blade chassis is displayed in an expandable, hierarchical list on the Port Access page, with the blade chassis at the root of the hierarchy and the individual blades labeled and displayed below the root. Use the Expand Arrow icon next to the root chassis to display the individual blades.
  • Page 53 Chapter 3: Working with Target Servers On the local port, the KX II Local Console interface must be visible in order to perform the switch. Hot key switching is also available from the local port. Note: This option is not available from the KX II Remote Console for an available port if all connections are busy.
  • Page 54: Managing Favorites

    Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently. The Favorite Devices section is located in the lower left side (sidebar) of the Port Access page and provides the ability to: ...
  • Page 55 Chapter 3: Working with Target Servers Enable Favorites  Click Enable in the Favorite Devices section of the left panel of the KX II interface. Once enabled, the Enable button becomes a Disable button.
  • Page 56 Chapter 3: Working with Target Servers Access and Display Favorites To access a favorite KX II device:  Click the device name (listed beneath Favorite Devices). A new browser opens to that device. To display favorites by name:  Click Display by Name. To display favorites by IP Address: ...
  • Page 57 This feature allows multiple KX II devices to interoperate and scale automatically. The KX II Remote Console automatically discovers the KX II devices, and any other Raritan device, in the subnet of the KX II. To discover devices on the device subnet: 1.
  • Page 58: Scanning Ports

    Chapter 3: Working with Target Servers Scanning Ports The KX II provides the port scanning feature to search for selected targets, and display them in a slide show view, allowing you to monitor up to 32 targets at one time. You can connect to targets or focus on a specific target as needed.
  • Page 59 Chapter 3: Working with Target Servers Note: MPC uses a different method for initiating a scan than the other Raritan clients. See Set Scan Group in the KVM and Serial Client Guide for details. The scan results and scan options differ between the Remote Console and the Local Console.
  • Page 60 Chapter 3: Working with Target Servers Using Scan Port Options Following are options available to you while scanning targets. With the exception of the Expand/Collapse icon, all of these options are selected from the Options menu in the upper left of the Port Scan viewer. The options will return to their defaults when you close the window.
  • Page 61: Logging Out

    Chapter 3: Working with Target Servers Logging Out To quit the KX II:  Click Logout in the upper right-hand corner of the page. Note: Logging out also closes any open Virtual KVM Client and serial client sessions. Proxy Server Configuration for Use with MPC, VKC and AKC When the use of a Proxy Server is required, a SOCKS proxy must also be provided and configured on the remote client PC.
  • Page 62 Open the start.bat file in MPC directory with a text editor. Insert the following parameters to the command line. Add them before "-classpath": -DsocksProxyHost=<socks proxy ip addr> -DsocksProxyPort=<socks proxy port> The parameters should look as follows: start javaw -Xmn128M -Xmx512M -XX:MaxHeapFreeRatio=70 -XX:MinHeapFreeRatio=50 -Dsun.java2d.noddraw=true -DsocksProxyHost=192.168.99.99 -DsocksProxyPort=1080 -classpath .\sdeploy.jar;.\sFoxtrot.jar;.\jaws.jar;.\sMpc.jar com.raritan.rrc.ui.RRCApplication %1...
  • Page 63: Virtual Kvm Client (Vkc) And Active Kvm Client (Akc)

    Chapter 3: Working with Target Servers Virtual KVM Client (VKC) and Active KVM Client (AKC) Overview Whenever you access a target server from the Port Access page of KX II the Remote Console, a Virtual KVM Client (VKC) window opens. There is one Virtual KVM Client for each target server connected.
  • Page 64: Virtual Kvm Client (Vkc) And Active Kvm Client (Akc) Shared Features

    Chapter 3: Working with Target Servers Virtual KVM Client (VKC) and Active KVM Client (AKC) Shared Features The Virtual KVM Client (VKC) and Active KVM Client (AKC) are interfaces used to access remote targets. VKC and AKC share similar features with the exception of the following: ...
  • Page 65: Connection Properties

    Chapter 3: Working with Target Servers Connection Properties Dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
  • Page 66 Chapter 3: Working with Target Servers 3. Choose the Color Depth from the drop-down list. The device can dynamically adapt the color depth transmitted to remote users in order to maximize usability in all bandwidths.  15-bit RGB Color  8-bit RGB Color ...
  • Page 67: Connection Information

    Horizontal Resolution - The target server horizontal resolution.  Vertical Resolution - The target server vertical resolution.  Refresh Rate - Refresh rate of the target server.  Protocol Version - Raritan communications protocol version. Access and Copy Connection Information...
  • Page 68: Connection Properties

    Chapter 3: Working with Target Servers Steps Click Connection > Info... to open the Connection Info dialog. Click Copy to Clipboard. Paste the information in a file of your choosing. Connection Properties Dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints.
  • Page 69: Toolbar Buttons And Status Bar Icons

    Chapter 3: Working with Target Servers  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting.
  • Page 70 Chapter 3: Working with Target Servers Button Button name Description Same as choosing Video > Color Calibrate. Target Click to take a screenshot of the target server Screenshot and save it to a file of your choosing. Audio Opens a dialog that allows you to select from a list of audio devices connected to a client PC.
  • Page 71: Keyboard Options

    Chapter 3: Working with Target Servers Audio is supported by KX II 2.4.0 (and later). Audio capture is supported by KX II 2.5.0 (and later). Audio Icon name Description icons Speaker These icons are located in status bar at the bottom of the client window.
  • Page 72 Chapter 3: Working with Target Servers Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC). Macros exported from MPC or VKC cannot be imported into AKC. To import macros: 1.
  • Page 73 Chapter 3: Working with Target Servers The macros are then imported. If a macro is imported that contains a hot key that already exists, the hot key for the imported macro is discarded. To export macros: 1. Choose Tools > Export Macros to open the Select Keyboard Macros to Export dialog.
  • Page 74 Chapter 3: Working with Target Servers Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Click Add. The Add Keyboard Macro dialog appears. 3. Type a name for the macro in the Keyboard Macro Name field. This name appears in the Keyboard menu after it is created.
  • Page 75 Chapter 3: Working with Target Servers 9. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. To use the Send Text to Target function for the macro: 1. Click the Keyboard > Send Text to Target. The Send Text to Target dialog appears.
  • Page 76 Chapter 3: Working with Target Servers Modifying and Removing Keyboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Choose the macro from among those listed. 3. Click Modify. The Add/Edit Macro dialog appears. 4.
  • Page 77: Video Properties

    Chapter 3: Working with Target Servers Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways:  The Refresh Screen command forces a refresh of the video screen. ...
  • Page 78 Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor.
  • Page 79 Chapter 3: Working with Target Servers  Best possible video mode The device will perform the full Auto Sense process when switching targets or target resolutions. Selecting this option calibrates the video for the best image quality.  Quick sense video mode With this option, the device will use a quick video Auto Sense in order to show the target's video sooner.
  • Page 80 Chapter 3: Working with Target Servers Screenshot from Target Command (Target Screenshot) You are able to take a screenshot of a target server using the Screenshot from Target server command. If needed, save this screenshot to a file location of your choosing as a bitmap, JPEG or PNG file.
  • Page 81: Mouse Options

    Chapter 3: Working with Target Servers Mouse Options When in dual mouse mode, and provided the option is properly configured, the mouse cursors align. In dual mouse mode, when controlling a target server, the Remote Console displays two mouse cursors: one belonging to your KX II client workstation, and the other belonging to the target server.
  • Page 82 Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
  • Page 83 Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place.  Do not use an animated mouse.
  • Page 84 To be sure to avoid any problems with this function, Raritan recommends you do not have file icons or folder icons in the upper left corner of your desktop.
  • Page 85 Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in synch, even when the target mouse is set to a different acceleration or speed.
  • Page 86: Tool Options

    Chapter 3: Working with Target Servers Single Mouse Mode Single Mouse mode uses only the target server mouse cursor and the local mouse pointer no longer appears onscreen. Note: Single mouse mode does not work on Windows or Linux targets when client is running on a Virtual Machine.
  • Page 87 Chapter 3: Working with Target Servers  United Kingdom  Korean (Korea)  French (Belgium)  Norwegian (Norway)  Portuguese (Portugal)  Danish (Denmark)  Swedish (Sweden)  German (Switzerland)  Hungarian (Hungary)  Spanish (Spain)  Italian (Italy)  Slovenian ...
  • Page 88 Turkish Keyboards If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
  • Page 89 Chapter 3: Working with Target Servers Client Launch Settings KX II users can configure client launch settings that allow you to define the screen settings for a KVM session. To configure client launch settings: 1. Click Tools > Options. The Options dialog appears. 2.
  • Page 90: View Options

    Chapter 3: Working with Target Servers Configure Scan Settings in VKC and AKC The KX II provides the port scanning feature to search for selected targets, and display them in a slide show view, allowing you to monitor up to 32 targets at one time. You can connect to targets or focus on a specific target as needed.
  • Page 91 Chapter 3: Working with Target Servers View Status Bar By default, the status bar is displayed at the bottom of the target window. To hide the status bar:  Click View > Status Bar to deselect it. To restore the status bar: ...
  • Page 92 Chapter 3: Working with Target Servers Full Screen Mode When you enter Full Screen mode, the target's full screen is displayed and acquires the same resolution as the target server. The hot key used for exiting this mode is specified in the Options dialog, Tool Options (on page 75).
  • Page 93: Digital Audio

    Note: Audio CDs are not supported by virtual media so they do not work with the audio feature. Before you begin using the audio feature, Raritan recommends you review the audio related information documented in the following sections of Help: ...
  • Page 94 Note: When an audio session is underway, be sure to keep the session active or change the KX II's idle timeout time so the audio session does not time out. Review the table shown here to see which Raritan client works with audio playback/capture for each operating system: Operating system Audio playback and capture supported ...
  • Page 95 Chapter 3: Working with Target Servers Operating system Audio playback and capture supported  ® Virtual KVM Client (VKC)  Multi-Platform Client (MPC) A Speaker icon is displayed in the status bar at the bottom of the client window. It is grayed out when no audio is being used. When the Speaker icon and Microphone icon are displayed in the status bar, the session is being captured as it is streamed.
  • Page 96 Chapter 3: Working with Target Servers Connecting to a Single Target Server from Multiple Remote Clients KX II 2.5.0 (and later) allows up to eight (8) users on different remote clients to connect to the same target server at the same time in order to listen in on audio playback.
  • Page 97 (on page 85). Note: If you are connecting to multiple target server audio devices at the same time from a single remote client, review which Raritan client work with audio playback/capture for each type of operating system. See Connecting to Multiple Targets from a Single Remote Client page 83).
  • Page 98 Chapter 3: Working with Target Servers Note: The device names listed in the Connect Recording Device drop-down are truncated to a maximum of 30 characters for Java clients. 8. Select the device that you wish to connect from the drop-down list. 9.
  • Page 99 Chapter 3: Working with Target Servers To disconnect from the audio device:  Click the Audio icon in the toolbar and select OK when you are prompted to confirm the disconnect. A confirmation message appears. Click OK. Adjusting Capture and Playback Buffer Size (Audio Settings) Once an audio device is connected, the capture and playback buffer size can be adjusted as needed.
  • Page 100: Smart Cards

    Chapter 3: Working with Target Servers Smart Cards Using the KX II, you are able to mount a smart card reader onto a target server to support smart card authentication and related applications. For a list of supported smart cards, smart card readers, and additional system requirements, see Smart Card Minimum System Requirements, CIMs and Supported/Unsupported Smart Card Readers.
  • Page 101 Chapter 3: Working with Target Servers You are also able to remove or reinsert a smart card. This function can be used to provide notification to a target server OS that requires a removal/reinsertion in order to display the appropriate login dialog. Using this function allows the notification to be sent to a single target without affecting other active KVM sessions.
  • Page 102: Version Information - Virtual Kvm Client

    (on page 270). Version Information - Virtual KVM Client This menu command provides version information about the Virtual KVM Client, in case you require assistance from Raritan Technical Support. To obtain version information: 1. Choose Help > About Raritan Virtual KVM Client.
  • Page 103: About The Active Kvm Client

    ™ without the use of the Java Runtime Environment (JRE), which is required to run Raritan's Virtual KVM Client (VKC) and Multi-Platform Client (MPC). AKC also works with CC-SG. Note: If you are using direct port access with AKC, you must open a new browser window or browser tab for each target you want to access.
  • Page 104 .NET installed, you will receive a message instructing you to check the .NET version. ® Note: Raritan recommends Windows XP operating system users verify you have a working version of .NET 3.5 or 4.0 already installed before you launch AKC.
  • Page 105: Multi-Platform Client (Mpc)

    1. To open MPC from a client running any supported browser, type http://IP-ADDRESS/mpc into the address line, where IP-ADDRESS is the IP address of your Raritan device. MPC opens in a new window. Note: The Alt+Tab command toggles between windows only on the local system.
  • Page 106: Launching Mpc On Mac Lion Clients

    Launching MPC on Mac Lion Clients ® If you are using Mac Lion on your client, Raritan's Multi-Platform Client (MPC) does not launch. Use the following workaround to launch MPC. Delete the JavaApplicationStub from the install, and create a link from the correct JavaApplicationStub.
  • Page 107: Chapter 4 Virtual Media

    Chapter 4 Virtual Media All KX II models support virtual media. Virtual media extends KVM capabilities by enabling target servers to remotely access media from a client PC and network file servers. With this feature, media mounted on client PCs and network file servers are essentially "mounted virtually"...
  • Page 108: Remote Pc Vm Prerequisites

    Chapter 4: Virtual Media Remote PC VM Prerequisites  Certain virtual media options require administrative privileges on the remote PC (for example, drive redirection of complete drives). Note: If you are using Microsoft Vista or Windows 7, disable User Account Control or select Run as Administrator when starting Internet Explorer.
  • Page 109: Supported Tasks Via Virtual Media

     ISO images (disk images)  Digital audio devices* Note: ISO9660 is the standard supported by Raritan. However, other ISO standards can be used. Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations: ...
  • Page 110: Supported Virtual Media Operating Systems

    Chapter 4: Virtual Media Supported Virtual Media Operating Systems The following client operating systems are supported:  ® Windows 7 operating system  Windows 8 operating system  ® Windows XP operating system  openSUSE ® 11.4 Celadon (x86_64)  ®...
  • Page 111: Connecting And Disconnecting From Virtual Media

    Chapter 4: Virtual Media Connecting and Disconnecting from Virtual Media Access a Virtual Media Drive on a Client Computer To access a virtual media drive on the client computer: 1. From the Virtual KVM Client, choose Virtual Media > Connect Drive, or click the Connect Drive...
  • Page 112: Mounting Cd-Rom/Dvd-Rom/Iso Images

    Chapter 4: Virtual Media Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1. From the Virtual KVM Client, choose Virtual Media > Connect CD-ROM/ISO Image, or click the Connect CD ROM/ISO button .
  • Page 113: Disconnect From Virtual Media Drives

    Chapter 4: Virtual Media ® Note: If you are working with files on a Linux target, use the Linux Sync command after the files are copied using virtual media in order to view the copied files. Files may not appear until a sync is performed. Note: If you are using the Windows 7 ®...
  • Page 114: Drive Partitions

    Chapter 4: Virtual Media Drive Partitions The following drive partition limitations exist across operating systems:  ® Windows and Mac targets are not able to read Linux formatted partitions  Windows and Linux cannot read Mac formatted partitions  Only Windows Fat partitions are supported by Linux Root User Permission Requirement Your virtual media connection can be closed if you mount a CD ROM from a Linux client to a target and then unmount the CD ROM.
  • Page 115: Virtual Media File Server Setup (File Server Iso Images Only)

    Virtual Media File Server Setup (File Server ISO Images Only) This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work.
  • Page 116: Chapter 5 Rack Pdu (Power Strip) Outlet Control

    Turning Outlets On/Off and Cycling Power ........... 106 Overview The KX II allows you to control Raritan PX and RPC series rack PDU (power strip) outlets connected to the KX II through a D2CIM-PWR. Once a PX or RPC series is setup and then attached to the KX II, the rack PDU and its outlets can be controlled from the Powerstrip page in the KX II interface.
  • Page 117: Turning Outlets On/Off And Cycling Power

    Chapter 5: Rack PDU (Power Strip) Outlet Control  Control - Turn outlets on or off, or cycle their power.  Association - The ports associated with the outlet. Initially, when you open the Powerstrip page, the power strips that are currently connected to the KX II are displayed in the Powerstrip drop-down.
  • Page 118 Chapter 5: Rack PDU (Power Strip) Outlet Control 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. The outlet will be turned off and its state will be displayed as 'off'. To cycle the power of an outlet: 1.
  • Page 119: Chapter 6 Usb Profiles

    To change settings in the BIOS menu or boot from a virtual media drive, depending on the target server model, a BIOS profile may be more appropriate. Should none of the standard USB profiles provided by Raritan work with a given KVM target, please contact Raritan Technical Support for assistance.
  • Page 120: Cim Compatibility

    The current release of the KX II comes with the selection of USB profiles described in the following table. New profiles are included with each firmware upgrade provided by Raritan. As new profiles are added, they will be documented in the help.
  • Page 121 Chapter 6: USB Profiles USB profile Description  USB enumeration will trigger whenever Virtual Media is connected or disconnected Restrictions:  USB bus speed limited to full-speed (12 MBit/s)  Absolute mouse synchronization not supported  Virtual CD-ROM and disk drives cannot be used simultaneously BIOS Dell Optiplex 790 Use this profile for Dell Optiplex 790 when using Keyboard...
  • Page 122 Chapter 6: USB Profiles USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS. WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected. Restrictions:  USB bus speed limited to full-speed (12 MBit/s) ...
  • Page 123 Chapter 6: USB Profiles USB profile Description BIOS Lenovo ThinkPad T61 BIOS Lenovo ThinkPad T61 and X61 (boot from virtual media) & X61 Use this profile to boot the T61 and X61 series laptops from virtual media. Restrictions:  USB bus speed limited to full-speed (12 MBit/s) Generic The generic USB profile resembles the behavior of the original ®...
  • Page 124 Chapter 6: USB Profiles USB profile Description when using the Mac Boot Menu ® MAC OS X 10.4.9 (and later) Mac OS X version 10.4.9 (and later) This profile compensates the scaling of mouse coordinates introduced in recent versions of Mac OS X. Select this if the remote and local mouse positions get out of sync near the desktop borders.
  • Page 125 Chapter 6: USB Profiles USB profile Description  Keyboard and Mouse (Type 2) first  Mass Storage  USB bus speed limited to full-speed (12 MBit/s)  Virtual CD-ROM and disk drives cannot be used simultaneously WARNING: USB enumeration will trigger whenever virtual media is connected or disconnected.
  • Page 126: Mouse Modes When Using The Mac Boot Menu

    Chapter 6: USB Profiles Mouse Modes when Using the Mac Boot Menu When working with USB profiles in, to use the Mouse in the Mac Boot Menu, you must use Single Mouse mode since Absolute Mouse Mode is not supported in the BIOS. To configure the mouse to work at the Boot menu: 1.
  • Page 127: Chapter 7 User Management

    Chapter 7 User Management In This Chapter User Groups ..................116 Users ..................... 125 Authentication Settings ................128 Changing a Password ................140 User Groups The KX II stores an internal list of all user and group names to determine access authorization and permissions.
  • Page 128: User Group List

    Chapter 7: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group.
  • Page 129 Chapter 7: User Management 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the checkboxes next to the permissions you want to assign to all of the users belonging to this group. See Setting Permissions. 4.
  • Page 130 Chapter 7: User Management Note: Several administrative functions are available within and from the KX II Local Console. These functions are available only to members of the default Admin group.
  • Page 131 Chapter 7: User Management Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the permissions of all users, including their own. Carefully consider granting these permissions. Permission Description Device Access Allows users and user groups with this While Under permission to directly access the KX II using an CC-SG...
  • Page 132 Chapter 7: User Management Permission Description settings. If you are using a tiered configuration in which a base KX II device is used to access multiple other tiered devices, user, user group and remote authentication settings must be consistent across all devices. Setting Port Permissions For each server port, you can specify the access type the group has, as well as the type of port access to the virtual media and the power control.
  • Page 133 Chapter 7: User Management VM access Power control access option Description Deny Deny power control to the target server Access Full permission to power control on a target server For blade chassis, the port access permission will control access to the URLs that have been configured for that blade chassis.
  • Page 134 Chapter 7: User Management Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-level basis. To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2.
  • Page 135: Modifying An Existing User Group

    Chapter 7: User Management 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the order in which they are listed. For instance, in the example shown here, if the two ACL rules were reversed, Dominion would accept no communication at all.
  • Page 136: Users

    Chapter 7: User Management 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and passwords to gain access to the KX II. This information is used to authenticate users attempting to access your KX II.
  • Page 137: View The Kx Ii Users List

    Chapter 7: User Management 6. To activate the new user, leave the Active checkbox selected. Click View the KX II Users List The User List page displays a list of all users including their user name, full name, and user group. The list can be sorted on any of the columns by clicking on the column name.
  • Page 138: Disconnecting Users From Ports

    Chapter 7: User Management  Username - username for user logins and target connections  Access From - IP address of client PC accessing the KX II  Status - current Active or Inactive status of the connection To view users by port: ...
  • Page 139: Modifying An Existing User

    Chapter 7: User Management Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management > User List. 2. Locate the user from among those listed on the User List page. 3. Click the user name. The User page opens. 4.
  • Page 140: Implementing Ldap/Ldaps Remote Authentication

    Chapter 7: User Management 4. If you choose LDAP/LDAPS, read the section entitled Implementing LDAP Remote Authentication for information about completing the fields in the LDAP section of the Authentication Settings page. 5. If you choose RADIUS, read the section entitled Implementing RADIUS Remote Authentication for information about completing the fields in the RADIUS section of the Authentication Settings page.
  • Page 141 LDAP database you want to begin searching for user information. Up to 64 characters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com. Consult your authentication server administrator for the appropriate values to enter into these fields.
  • Page 142 Chapter 7: User Management 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the Secret Phrase field and again in the Confirm Secret Phrase field (up to 128 characters).
  • Page 143 Chapter 7: User Management 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certificate file to validate the certificate provided by the server. If you do not want to use the previously uploaded root CA certificate file, leave this checkbox deselected.
  • Page 144: Returning User Group Information From Active Directory Server

    KX II policies and user group privileges that are applied locally to AD user groups. IMPORTANT: If you are an existing Raritan, Inc. customer, and have already configured the Active Directory server by changing the AD...
  • Page 145: Implementing Radius Remote Authentication

    Chapter 7: User Management Important Notes  Group Name is case sensitive.  The KX II provides the following default groups that cannot be changed or deleted: Admin and <Unknown>. Verify that your Active Directory server does not use the same group names. ...
  • Page 146 Chapter 7: User Management 9. The default number of retries is 3 Retries. This is the number of times the KX II will send an authentication request to the RADIUS server. 10. Choose the Global Authentication Type from among the options in the drop-down list: ...
  • Page 147  RADIUS Attribute: Filter-ID  Attribute Type: String  Attribute Value: Raritan:G{KVM_Admin} (where KVM_Admin is group name created locally on Dominion KVM Switch). Case sensitive.  Configure Session Conditions (Date and Time) (Required) - Policy Elements > Session Conditions > Date and Time ...
  • Page 148: Returning User Group Information Via Radius

    Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
  • Page 149 Chapter 7: User Management Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-Port (5) Always 0. NAS-IP-Address (4) The IP address for the KX II. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting.
  • Page 150: User Authentication Process

    Chapter 7: User Management User Authentication Process Remote authentication follows the process specified in the flowchart below:...
  • Page 151: Changing A Password

    Chapter 7: User Management Changing a Password To change your KX II password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field.
  • Page 152: Chapter 8 Device Management

    Chapter 8 Device Management In This Chapter Network Settings ................... 141 Device Services ..................145 Power Supply Setup ................170 Configuring Ports ................... 171 Connect and Disconnect Scripts ............211 Port Group Management ............... 216 Changing the Default GUI Language Setting ........219 Network Settings Use the Network Settings page to customize the network configuration (for example, the IP address, discovery port, and LAN interface...
  • Page 153: Assign The Kx Ii An Ip Address

    Chapter 8: Device Management Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings > Network. The Network Settings page opens. 2. Specify a meaningful Device Name for your KX II device. Up to 32 alphanumeric and valid special characters, no spaces between characters.
  • Page 154: Configure The Ipv6 Settings

    Chapter 8: Device Management Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network settings in the IPv6 section: a. Select the IPv6 checkbox to activate the fields in the section and enable IPv6 on the device. b.
  • Page 155: Lan Interface Settings

    Chapter 8: Device Management 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addresses entered in this section is used to connect to the DNS server. Enter the following information if the Following DNS Server Addresses is selected.
  • Page 156: Device Services

    Chapter 8: Device Management Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends that you not monitor the port or monitor it only after a failover occurs. When this option is enabled, the following two fields are used: ...
  • Page 157: Http And Https Port Settings

    Chapter 8: Device Management 3. Enter the SSH Port information. The standard SSH TCP port number is 22 but the port number can be changed to provide a higher level of security operations. 4. Click OK. HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX II.
  • Page 158: Configuring And Enabling Tiering

    Chapter 8: Device Management Configuring and Enabling Tiering The tiering feature allows you to access KX II targets and PDUs through one base KX II device. This feature is available for standard KX II devices as well as KX2-808, KX2-832 and KX2-864 devices. Note: Base and tiered devices must all be operating with the same firmware revision.
  • Page 159 Chapter 8: Device Management Port configuration, including changing the CIM name, must be done directly from each device. It cannot be done from the base device for tiered target ports. Tiering also supports the use of KVM switches to switch between servers. Configuring KVM Switches (on page 174).
  • Page 160 Chapter 8: Device Management 6. In the Tier Secret field, enter the same secret word you entered for the base device on the Device Settings page. Click OK. Tiering - Target Types, Supported CIMS and Tiering Configurations Blade Chassis Blade chassis that attached directly to the base are accessible. Power Control You can power on and off targets that are a part of the tiered configuration.
  • Page 161 Chapter 8: Device Management Unsupported and Limited Features on Tiered Targets The following features are not supported on tiered targets:  Blade chassis on tiered devices  Audio on tiered devices  Smart cards on tiered devices  Virtual media tiered devices ...
  • Page 162 Chapter 8: Device Management Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a KX II tiered device and a KX II base device.    ...
  • Page 163: Enabling Direct Port Access Via Url

    Chapter 8: Device Management Diagram key Target server CIM from target server to the KX II tiered device KX II tiered device D2CIM-DVUSB CIM from the KX II tiered device to the KX II base device KX II base device Enabling Direct Port Access via URL Direct port access allows users to bypass having to use the device's Login dialog and Port Access page.
  • Page 164 Chapter 8: Device Management Direct Port Access URL Syntax for the Virtual KVM Client (VKC) If you are using the Virtual KVM Client (VKC) and direct port access, use one of the following syntaxes for standard ports:  https://IPaddress/dpa.asp?username=username&password=passwo rd&port=port number ...
  • Page 165 Chapter 8: Device Management Direct Port Access URL Syntax for the Active KVM Client (AKC) If you are using the Active KVM Client (AKC) and direct port access, use:  https://IPaddress/dpa.asp?username=username&password=passwo rd&port=port number&client=akc  https://IPaddress/dpa.asp?username=username&password=passwo rd&port=port name&client=akc For blade chassis, the port must be designated by both the port number or name, and slot number.
  • Page 166 Chapter 8: Device Management Enable Direct Port Access To enable direct port access: 1. Choose Device Settings > Device Services. The Device Service Settings page opens. 2. Select Enable Direct Port Access via URL if you would like users to have direct access to a target via the Dominion device by passing in the necessary parameters in the URL.
  • Page 167: Enabling The Akc Download Server Certificate Validation

    Chapter 8: Device Management Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use the Enable AKC Download Server Certificate Validation feature or opt not to use this feature. Note: When operating in IPv4 and IPv6 dual stack mode with 'Enable ®...
  • Page 168: Configuring Snmp Agents

    Chapter 8: Device Management ® 2. Launch Internet Explorer using the KX II IP address as the URL. A Certificate Error message will be displayed. 3. Select View Certificates. 4. On the General tab, click Install Certificate. The certificate is then installed in the Trusted Root Certification Authorities store.
  • Page 169 Chapter 8: Device Management 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option must be selected. Required 4. Complete the following fields for SNMP v1/v2c (if needed): a. Community - the device's community string b.
  • Page 170: Configuring Modem Settings

    Chapter 8: Device Management Configure SNMP traps on the Event Management - Settings page, which can be quickly accessed by clicking the SNMP Trap Configuration link. Configuring SNMP Traps (on page 162)for information on creating SNMP traps and List of KX II SNMP Traps (on page 165) for a list of available KX II SNMP traps.
  • Page 171 Chapter 8: Device Management This information is used to configure modem settings. Because different modems have different ways of settings these values, this document does not specify how to set these values, rather the user should refer to the modem to create the appropriate modem-specific string.
  • Page 172: Configuring Date/Time Settings

    Chapter 8: Device Management Certified Modems (on page 307) for information on certified modems that work with the KX II. For information on settings that will give you the best performance when connecting to the KX II via modem, see Creating, Modifying and Deleting Profiles in MPC - Generation 2 Devices in the KVM and Serial Access Clients Guide.
  • Page 173: Event Management

    Chapter 8: Device Management Event Management The KX II Event Management feature allows you enable and disable the distribution of system events to SNMP Managers, the Syslog and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or several destinations.
  • Page 174 Chapter 8: Device Management a. Destination IP/Hostname - the IP or hostname of the SNMP manager. Up to five (5) SNMP managers can be created Note: IPv6 addresses cannot exceed 80 characters in length for the host name. b. Port Number - the port number used by the SNMP manager c.
  • Page 175 Chapter 8: Device Management Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Management - Settings page. The events that are captured once an SNMP trap is configured are selected on the Event Management - Destination page. See Configuring Event Management - Destinations (on page 169).
  • Page 176 Chapter 8: Device Management Use the reset to factory defaults feature to remove the SNMP configuration and set the KX II to its original factory default. To reset to factory defaults:  Click Reset To Defaults. WARNING: When using SNMP traps over UDP, it is possible for the KX II and the router that it is attached to fall out of synchronization when the KX II is rebooted, preventing the reboot completed SNMP trap from being logged.
  • Page 177 Chapter 8: Device Management Trap Name Description networkFailure An Ethernet interface of the product can no longer communicate over the network. networkParameterChanged A change has been made to the network parameters. passwordSettingsChanged Strong password settings have changed. portConnect A previously authenticated user has begun a KVM session.
  • Page 178 Chapter 8: Device Management Trap Name Description userForcedLogout A user was forcibly logged out by Admin userLogin A user has successfully logged into the KX II and has been authenticated. userLogout A user has successfully logged out of the KX II properly.
  • Page 179 Chapter 8: Device Management Note: If you have Read-Write privileges to the MIB file, use a MIB editor to make changes to the file. SysLog Configuration To configure the Syslog (enable Syslog forwarding): 1. Select Enable Syslog Forwarding to log the device's messages to a remote Syslog server.
  • Page 180 Chapter 8: Device Management Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps), or can be logged to the syslog or audit log. Use the Event Management - Destinations page to select the system events to track and where to send this information.
  • Page 181: Power Supply Setup

    Chapter 8: Device Management Power Supply Setup The KX II provides dual power supplies, and can automatically detect and provide notification regarding the status of these power supplies. Use the Power Supply Setup page to specify whether you are using one or both of the power supplies.
  • Page 182: Configuring Ports

    Chapter 8: Device Management Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the front of the unit turns red. To turn off the automatic detection:  Deselect the checkbox for the appropriate power supply. To reset to factory defaults: ...
  • Page 183 Chapter 8: Device Management Alternatively, rename ports that are currently not connected to the KX II via a CIM and, as such, have a status of Not Available. To rename a port with a status of Not Available, do one of the following: ...
  • Page 184: Configuring Standard Target Servers

    Chapter 8: Device Management Configuring Standard Target Servers To name the target servers: 1. Connect all of the target servers if you have not already done so. Step 3: Connect the Equipment (on page 16) for a description of connecting the equipment. 2.
  • Page 185: Configuring Kvm Switches

    Chapter 8: Device Management 8. Click OK. Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targets. In addition to using hot key sequences with standard servers, KVM switching is supported by blade chassis and in tiered configurations.
  • Page 186 URL. For example username=admin, where username is the username field. Password Field - Enter the password parameter that will be used in the URL. For example password=raritan, where password is the password field. 10. Click OK. To change the active status of a KVM switch port or URL: 1.
  • Page 187: Configuring Cim Ports

    Chapter 8: Device Management Configuring CIM Ports The KX II supports the use of standard and virtual media CIMs to connect a server to the KX II. To access a CIM to configure: 1. Choose Device Settings > Port Configuration. The Port Configuration page opens.
  • Page 188: Configuring Rack Pdu (Power Strip) Targets

    The KX II allows you to connect rack PDUs (power strips) to KX II ports. KX II rack PDU configuration is done from the KX II Port Configuration page. Note: Raritan recommends no more than eight (8) rack PDUs (power strips) be connected to a KX II at once since performance may be affected.
  • Page 189 Chapter 8: Device Management Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are connected to the Dominion device using the D2CIM-PWR CIM. To connect the rack PDU: 1. Connect the male RJ-45 of the D2CIM-PWR to the female RJ-45 connector on the serial port of the rack PDU.
  • Page 190 Note: PX rack PDUs (power strips) can be named in the PX as well as in the KX II. Once a Raritan remote rack PDU is connected to the KX II, it will appear on the Port Configuration page. Click on the power port name on that page to access it.
  • Page 191 Chapter 8: Device Management 3. Click OK.
  • Page 192 Port Access page. To use this feature, you will need:  Raritan remote rack PDU(s)  Power CIMs (D2CIM-PWR) To make power associations (associate rack PDU outlets to...
  • Page 193 Chapter 8: Device Management Removing Power Associations When disconnecting target servers and/or rack PDUs from the device, all power associations should first be deleted. When a target has been associated with a rack PDU and the target is removed from the device, the power association remains.
  • Page 194: Configuring Blade Chassis

    Chapter 8: Device Management Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade chassis that are plugged into the KX II device port. Up to eight blade chassis can be managed at a given time. The blade chassis must be configured as a blade chassis subtype.
  • Page 195 Blade chassis can be managed from the Virtual KVM Client (VKC), the Active KVM Client (AKC), Raritan's , and CC-SG. Managing blade severs via VKC, AKC and MPC is the same as managing standard target servers.
  • Page 196 Chapter 8: Device Management Generic Blade Chassis Configuration The Generic Blade Chassis' selection provides only a manual configuration mode of operation. See Supported Blade Chassis Models (on page 198), Supported CIMs for Blade Chassis (on page 199), and Required and Recommended Blade Chassis Configurations (on page 201) for important, additional information when configuring the blade chassis.
  • Page 197 Chapter 8: Device Management 9. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade chassis web browser interface if one is available. Click the Blade Chassis Managed Links icon to expand the section on the page.
  • Page 198 Chapter 8: Device Management 13. Select the CIMs native, display resolution from the Display Native Resolution drop-down. This is the preferred resolution and timing mode of the digital CIM. Once a resolution is selected, it is applied to the CIM. If no selection is made, the default 1024x1280@60Hz resolution is used.
  • Page 199 Chapter 8: Device Management c. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis. Required for auto-discovery mode d. Port Number - The default port number for the blade chassis is 22. Change the port number if applicable. Required for auto-discovery mode e.
  • Page 200 Chapter 8: Device Management b. URL - Enter the URL to the interface. See Blade Chassis Sample URL Formats (on page 203) for sample configurations for the Dell M1000e. c. Username - Enter the username used to access the interface. d.
  • Page 201 Chapter 8: Device Management d. Port Number - The default port number for the blade chassis is 22. Not applicable. e. Username - Not applicable. Password - Not applicable. 2. Change the blade chassis name if needed. 3. Indicate the blades that are installed in the blade chassis by checking the Installed checkbox next to each slot that has a blade installed.
  • Page 202 Chapter 8: Device Management 5. USB profiles do not apply to Dell chassis. 6. Click OK to save the configuration. IBM Blade Chassis Configuration Supported Blade Chassis Models (on page 198), Supported CIMs for Blade Chassis (on page 199), and Required and Recommended Blade Chassis Configurations (on page 201) for...
  • Page 203 Chapter 8: Device Management Password - Enter the password used to access the blade chassis. Required for auto-discovery mode 2. If you want the KX II to auto-discover the chassis blades, select the Blade Auto-Discovery checkbox and then click Discover Blades on Chassis Now.
  • Page 204 Chapter 8: Device Management e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be associated with the username and password entries. It is in these fields you should enter the field names for the username and password fields used on the login screen for the web application.
  • Page 205 Chapter 8: Device Management The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access to the URL links entered in this section of the page is governed by the blade chassis port permissions. a.
  • Page 206 Chapter 8: Device Management Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device with an embedded web server. A Web Browser interface can also be used to connect to any web application, such as the web application associated with an RSA, DRAC or ILO Processor card.
  • Page 207 Chapter 8: Device Management HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports connected to certain types of ® blades into a group representing the blade chassis. Specifically, Cisco ™ UCS, HP ®...
  • Page 208 Chapter 8: Device Management 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4. Select the Blade Server Group checkbox. If you want to designate that these ports are attached to blades housed in a blade chassis (for example, HP c3000 or Dell PowerEdge 1855), select the Blade Server Group checkbox.
  • Page 209 Chapter 8: Device Management Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KX II and the corresponding profiles that should be selected per chassis model when configuring them in the KX II application. A list of these models can be selected on the Port Configuration page from the Blade Server Chassis Model drop-down, which appears when the Blade Chassis radio button is selected.
  • Page 210 Chapter 8: Device Management Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KX II:  DCIM-PS2  DCIM-USBG2  D2CIM-VUSB  D2CIM-DVUSB Following is a table containing supported CIMs for each blade chassis model that the KX II supports.
  • Page 211 Chapter 8: Device Management Blade chassis Connection method Recommended CIM(s) Both modules enable you to connect a PS/2-compatible keyboard, mouse and video monitor to the system (using a custom cable provided with the system). Source: Dell PowerEdge 1955 Owner's Manual ...
  • Page 212 Chapter 8: Device Management Blade chassis Connection method Recommended CIM(s) Technology  DCIM-USBG2 IBM BladeCenter E The current model BladeCenter E chassis (8677-3Rx) ships standard with one Advanced  D2CIM-DVUSB Management Module. Source: IBM BladeCenter Products and Technology  DCIM-PS2 IBM BladeCenter T The BladeCenter T chassis ships standard with one Advanced Management Module.
  • Page 213 Chapter 8: Device Management This table contains information on limitations and constraints that apply to configuring blade chassis to work with the KX II. Raritan recommends that all of the information below is followed. Blade chassis Required/recommended action  Disable the iKVM GUI screensaver. An authorize dialog will ®...
  • Page 214  The SSH port configured on the blade chassis management module and the port number entered on the Port Configuration page must match.  Raritan KX II virtual media is supported only on IBM IBM KX2 Virtual ® BladeCenter Models H and E.
  • Page 215: Configuring Usb Profiles (Port Page)

    Chapter 8: Device Management Blade chassis Sample URL format  Password: calvin  Password Field: password  URL: https://192.168.60.33/Forms/f_login Dell 1855  Username: root  Username Field: TEXT_USER_NAME  Password: calvin  Password Field: TEXT_PASSWORD  ® http://192.168.84.217/private/welcome.ssi ® BladeCenter or H Configuring USB Profiles (Port Page) You choose the available USB profiles for a port in the Select USB...
  • Page 216 Chapter 8: Device Management 2. Click the Port Name for the KVM port you want to edit. The Port page opens. To select the USB profiles for a KVM port: 1. In the Select USB Profiles for Port section, select one or more USB profiles from the Available list.
  • Page 217: Configuring Kx Ii Local Port Settings

    Chapter 8: Device Management Configuring KX II Local Port Settings From the Local Port Settings page, you can customize many settings for the KX II Local Console including keyboard, hot keys, video switching delay, power save mode, local user interface resolution settings, and local user authentication.
  • Page 218 Chapter 8: Device Management Note: If you are using KX2-808, KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II via the extended local port. 4. If you are using the tiering feature, select the Enable Local Port Device Tiering checkbox and enter the tiered secret word in the Tier Secret field.
  • Page 219 Note: If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. 7. Choose the local port hotkey. The local port hotkey is used to return to the KX II Local Console interface when a target server interface is being viewed.
  • Page 220 Chapter 8: Device Management  1280x1024 13. Choose the refresh rate from the drop-down list. The browser will be restarted when this change is made.  60 Hz  75 Hz 14. Choose the type of local user authentication.  Local/LDAP/RADIUS.
  • Page 221 Chapter 8: Device Management KX2-808, KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-808, KX2-832 and KX2-864 provide you with two local port options: the standard local port and the extended local port. Each of these port options is enabled and disabled from the Remote Console or from the Local Console on the Local Port Settings page.
  • Page 222: Connect And Disconnect Scripts

    Chapter 8: Device Management Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to or disconnecting from a target. You can create and edit your own scripts on the Connection Script page to perform additional actions when connecting to or disconnecting from targets.
  • Page 223: Adding Scripts

    Chapter 8: Device Management 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Select All or clicking on the checkbox to the left of each target to apply the script to only select targets.
  • Page 224 Chapter 8: Device Management For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to the Script box. Next, select Letters from the Key Set drop-down and add a letter key to the script. 8.
  • Page 225 Chapter 8: Device Management...
  • Page 226: Modifying Scripts

    Chapter 8: Device Management Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connection Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to modify and click Modify. The page is then in Edit mode. 3.
  • Page 227: Port Group Management

    Chapter 8: Device Management 5. Click Import. The Configuration Scripts page opens and the imported scripts are displayed. To export a disconnect script: 1. Click Device Settings > Configuration Scripts. The Configuration Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to export and click Export.
  • Page 228: Creating Port Groups

    Chapter 8: Device Management Creating Port Groups The KX II supports the aggregation of multiple ports into a single port group.Port groups consist solely of ports configured as standard KVM ports. A port may only be a member of a single group. Ports that are available to be included in a port group are displayed in the Select Port for Group >...
  • Page 229: Creating A Dual Video Port Group

    Chapter 8: Device Management Creating a Dual Video Port Group The dual video port groups feature allows you to group two video ports into one group. Use this feature when you need to connect to a server with two video cards/ports, and you want to access both ports from the same remote client at the same time.
  • Page 230: Changing The Default Gui Language Setting

    Chapter 8: Device Management Note: If a port is already a part of blade server port group, another dual video port group, or 'standard' port group, the port is not an option since ports can only belong to a single port group at a time. 3.
  • Page 231 Chapter 8: Device Management 3. Click Apply. Click Reset Defaults to change back to English. Note: Once you apply a new language, the online help is also localized to match your language selection.
  • Page 232: Chapter 9 Security Management

    From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share settings. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security. Raritan web server certificates are self-signed.
  • Page 233: Login Limitations

    Chapter 9: Security Management To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can specify restrictions for single login, password aging, and the logging out idle users. Limitation Description Enable single login When selected, only one login per user name is limitation allowed at any time.
  • Page 234 Chapter 9: Security Management Limitation Description Enter the number of days after which a password change is required. The default is 60 days. Log out idle users, Select the "Log off idle users" checkbox to After (1-365 automatically disconnect users after the amount minutes) of time you specify in the "After (1-365 minutes)"...
  • Page 235: Strong Passwords

    Chapter 9: Security Management Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KX II local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
  • Page 236: User Blocking

    Chapter 9: Security Management User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
  • Page 237 Chapter 9: Security Management Option Description Users are denied access to the system for the Timer Lockout specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled:  Attempts - The number of unsuccessful login attempts after which the user will be locked out.
  • Page 238: Encryption & Share

    Chapter 9: Security Management Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX II Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX II from your browser.
  • Page 239 Chapter 9: Security Management Encryption mode Description browser supports it, otherwise you will not be able to connect. See Checking Your Browser for AES Encryption (on page 229) for more information. AES-256 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data.
  • Page 240 Returns the KX II device to the factory defaults. Reset (default) Enable Local Admin Resets the local administrator password only. Password Reset The password is reset to raritan. Disable All Local No reset action is taken. Resets Note: When using the P2CIM-AUSBDUAL or P2CIM-APS2DUAL to attach a target to two KX IIs, if Private access to the targets is required, both KVM switches must have Private set as their PC Share Mode.
  • Page 241: Enabling Fips 140-2

    Chapter 9: Security Management Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be required. The KX II uses an embedded FIPS 140-2-validated cryptographic ® module running on a Linux platform per FIPS 140-2 Implementation Guidance section G.5 guidelines.
  • Page 242 Chapter 9: Security Management FIPS 140-2 Support Requirements The KX II supports the use of FIPS 140-2 approved encryption algorithms. This allows an SSL server and client to successfully negotiate the cipher suite used for the encrypted session when a client is configured for FIPS 140-2 only mode.
  • Page 243: Configuring Ip Access Control

    Chapter 9: Security Management Configuring IP Access Control Using IP access control, you control access to your KX II. Note that IP access control restricts traffic of any kind from accessing the KX II, so NTP servers, RADIUS hosts, DNS hosts and so on must be granted access to the KX II.
  • Page 244 Chapter 9: Security Management 3. Choose the Policy from the drop-down list. 4. Click Insert. If the rule # you just typed equals an existing rule #, the new rule is placed ahead of the exiting rule and all rules are moved down in the list.
  • Page 245: Ssl Certificates

    Chapter 9: Security Management SSL Certificates The KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the KX II has to identify itself to a client using a cryptographic certificate.
  • Page 246 Chapter 9: Security Management Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g. DE for Germany, or US for the U.S. g. Challenge Password - Some certification authorities require a challenge password to authorize later changes on the certificate (e.g.
  • Page 247 Chapter 9: Security Management b. A message containing all of the information you entered appears. c. The CSR and the file containing the private key used when generating it can be downloaded by clicking Download CSR. d. Send the saved CSR to a CA for certification. You will get the new certificate from the CA.
  • Page 248: Security Banner

    Chapter 9: Security Management Security Banner KX II provides you with the ability to add a security banner to the KX II login process. This feature requires users to either accept or decline a security agreement before they can access the KX II. The information provided in a security banner will be displayed in a Restricted Service Agreement dialog after users access KX II using their login credentials.
  • Page 249 Chapter 9: Security Management Note: You cannot upload a text file from the local port.
  • Page 250: Chapter 10 Maintenance

    Chapter 10 Maintenance In This Chapter Audit Log....................239 Device Information ................. 240 Backup and Restore ................242 USB Profile Management ..............244 Upgrading CIMs ..................245 Upgrading Firmware ................245 Upgrade History ..................247 Rebooting the KX II ................248 Stopping CC-SG Management ..............
  • Page 251: Device Information

    Device Information The Device Information page provides detailed information about your KX II device and the CIMs in use. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX II and CIMs: ...
  • Page 252 Chapter 10: Maintenance  DCIM-SUSB  D2CIM-VUSB  D2CIM-DVUSB  D2CIM-DVUSB-DVI  D2CIM-DVUSB-HDMI  D2CIM-DVUSB Note: Only the numeric portion of the serial numbers are displayed for the DCIM-USB, DCIM-PS2 and DCIM-USB G2 CIMs. For example, XXX1234567 is displayed. The serial number prefix GN is displayed for CIMs that have field configured serial numbers.
  • Page 253: Backup And Restore

    Chapter 10: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KX II by backing up the user configuration settings from the KX II in use and restoring those configurations to the new KX II.
  • Page 254 Chapter 10: Maintenance In IE 7 (and later), IE is used as the default application to open files, so you are prompted to open the file versus save the file. To avoid this, you must change the default application that is used to open ®...
  • Page 255: Usb Profile Management

    Raritan tech support. These profiles are designed to address the needs of your target server’s configuration, in the event that the set of standard profiles does not already address them. Raritan tech support will provide the custom profile and work with you to verify the solution for your target server’s specific needs.
  • Page 256: Handling Conflicts In Profile Names

    Chapter 10: Maintenance As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so will terminate any virtual media sessions that were in place. Handling Conflicts in Profile Names A naming conflict between custom and standard USB profiles may occur when a firmware upgrade is performed.
  • Page 257 Chapter 10: Maintenance To upgrade your KX II unit: 1. Locate the appropriate Raritan firmware distribution file (*.RFP) on Raritan website http://www.raritan.com on the Firmware Upgrades web page. 2. Unzip the file. Please read all instructions included in the firmware ZIP files carefully before upgrading.
  • Page 258: Upgrade History

    Chapter 10: Maintenance As prompted, close the browser and wait approximately 5 minutes before logging in to the KX II again. again. For information about upgrading the device firmware using the Multi-Platform Client, see Upgrading Device Firmware in the KVM and Serial Access Clients Guide. Note: Firmware upgrades are not supported via modem.
  • Page 259: Rebooting The Kx Ii

    Chapter 10: Maintenance Rebooting the KX II The Reboot page provides a safe and controlled way to reboot your KX II. This is the recommended method for rebooting. Important: All KVM and serial connections will be closed and all users will be logged off. To reboot your KX II: 1.
  • Page 260: Stopping Cc-Sg Management

    Chapter 10: Maintenance Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CC-SG management. If you are managing the KX II through CC-SG and connectivity between CC-SG and the KX II is lost after the specified timeout interval (typically 10 minutes), you are able to end the CC-SG management session from the KX II console.
  • Page 261 Chapter 10: Maintenance 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
  • Page 262: Chapter 11 Diagnostics

    Chapter 11 Diagnostics In This Chapter Network Interface Page ................. 251 Network Statistics Page ................. 251 Ping Host Page ..................253 Trace Route to Host Page ..............254 Device Diagnostics ................255 Network Interface Page The KX II provides information about the status of your network interface. To view information about your network interface: ...
  • Page 263 Chapter 11: Diagnostics  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one displayed here.
  • Page 264: Ping Host Page

    Chapter 11: Diagnostics  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field. Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network.
  • Page 265: Trace Route To Host Page

    Chapter 11: Diagnostics 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232 characters in length. 3. Click Ping. The results of the ping are displayed in the Result field. Trace Route to Host Page Trace route is a network tool used to determine the route taken to the provided hostname or IP address.
  • Page 266: Device Diagnostics

    Chapter 11: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. Device diagnostics downloads the diagnostics information from the KX II to the client machine. Two operations can be performed on this page: ...
  • Page 267 Chapter 11: Diagnostics a. Click Save to File. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to the desired directory and click Save. d. Email this file as directed by Raritan Technical Support.
  • Page 268: Chapter 12 Command Line Interface (Cli)

    Chapter 12 Command Line Interface (CLI) In This Chapter Overview ....................257 Accessing the KX II Using CLI .............. 258 SSH Connection to the KX II ..............258 Logging In ....................259 Navigation of the CLI ................259 Initial Configuration Using CLI ............... 261 CLI Prompts ...................
  • Page 269: Accessing The Kx Ii Using Cli

    Chapter 12: Command Line Interface (CLI) Accessing the KX II Using CLI Access the KX II by using one of the following methods:  SSH (Secure Shell) via IP connection A number of SSH clients are available and can be obtained from the following locations: ...
  • Page 270: Logging In

    Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password prompt appears. Enter the default password: raritan The welcome message displays. You are now logged on as an administrator. After reviewing the following...
  • Page 271: Cli Syntax -Tips And Shortcuts

    Chapter 12: Command Line Interface (CLI) CLI Syntax -Tips and Shortcuts Tips  Commands are listed in alphabetical order.  Commands are not case sensitive.  Parameter names are single word without underscore.  Commands without arguments default to show current settings for the command.
  • Page 272: Initial Configuration Using Cli

    1. Reset the administrator password. All KX II devices are shipped with the same default password. Therefore, to avoid security breaches it is imperative that you change the admin password from raritan to one customized for the administrators who will manage the KX II device.
  • Page 273: Cli Prompts

    Chapter 12: Command Line Interface (CLI) The KX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally using the local serial port. The administrator needs to configure the users and groups, services, security, and serial ports to which the serial targets are attached to the KX II.
  • Page 274: Security Issues

    Chapter 12: Command Line Interface (CLI)  Enter admin > config > network. Command Description help Display overview of commands. history Display the current session's command line history. interface Set/get network parameters. ipv6_interface Set/get IPv6 network parameters. logout Logout of the current CLI session. name Device name configuration.
  • Page 275: Interface Command

    Chapter 12: Command Line Interface (CLI) Commands Description ipv6 Set/get IPv6 network parameters. Interface Command The Interface command is used to configure the KX II network interface. The syntax of the interface command is: interface [ipauto <none|dhcp>] [ip <ipaddress>] [mask <subnetmask>] [gw <ipaddress>] [mode <mode>] Set/Get ethernet parameters ipauto <none|dhcp>...
  • Page 276: Name Command

    Chapter 12: Command Line Interface (CLI) Name Command The name command is used to configure the network name. The syntax of the name is: name [devicename <devicename>] [hostname <hostname>] Device name configuration devicename <devicename> Device Name hostname <hostname> Preferred host name (DHCP only) Name Command Example The following command sets the network name:...
  • Page 277: Chapter 13 Kx Ii Local Console

    Chapter 13 KX II Local Console In This Chapter Overview ....................266 Simultaneous Users ................266 KX II Local Console Interface: KX II Devices ........267 Security and Authentication ..............267 Available Resolutions ................267 Port Access Page (Local Console Server Display) ....... 268 Accessing a Target Server ..............
  • Page 278: Kx Ii Local Console Interface: Kx Ii Devices

    Chapter 13: KX II Local Console KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provides standard KVM management and administration via the KX II Local Console. The KX II Local Console provides a direct KVM (analog) connection to your connected servers;...
  • Page 279: Port Access Page (Local Console Server Display)

    Chapter 13: KX II Local Console Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access page opens. This page lists all of the KX II ports, and the target servers, port groups, and blade chassis that are connected to those ports.
  • Page 280: Scanning Ports - Local Console

    Chapter 13: KX II Local Console Scanning Ports - Local Console The KX II scanning feature is supported by the Local Console. The targets that are found during the scan are displayed on the Scan page one at a time, which is different from the Remote Console port slide show.
  • Page 281: Local Port Scan Mode

    Chapter 13: KX II Local Console Local Port Scan Mode Following are options available to you to change scan options on local port. To configure the Local Console scan port settings: 1. On the Local Console, select Device Settings. 2. In the Local Port Settings section, select Local Port Scan Mode. 3.
  • Page 282: Smart Card Access In Kx2 8Xx Devices

    Chapter 13: KX II Local Console 4. Click OK. Once the smart card reader is added, a message will appear on the page indicating you have completed the operation successfully. A status of either Selected or Not Selected will appear in the left panel of the page under Card Reader.
  • Page 283: Local Console Usb Profile Options

    Chapter 13: KX II Local Console Local Console USB Profile Options From the USB Profile Options section of the Tools page, you can choose from the available USB profiles. The ports that can be assigned profiles are displayed in the Port Name field and the profiles that are available for a port appear in the Select Profile To Use field after the port is selected.
  • Page 284: Hot Keys And Connect Keys

    Chapter 13: KX II Local Console Hot Keys and Connect Keys Because the KX II Local Console interface is completely replaced by the interface for the target server you are accessing, a hot key is used to disconnect from a target and return to the local port GUI. A connect key is used to connect to a target or switch between targets.
  • Page 285: Special Sun Key Combinations

    Chapter 13: KX II Local Console Standard servers Connect key action Key sequence example Disconnect from a Disconnect from target port 5, slot 11 and return target and return to to the local port GUI (the page from which you the local port GUI connected to target): ...
  • Page 286: Returning To The Kx Ii Local Console Interface

    Chapter 13: KX II Local Console Returning to the KX II Local Console Interface Important: The KX II Local Console default hot key is to press the Scroll Lock key twice rapidly. This key combination can be changed in the Local Port Settings page.
  • Page 287 Note: If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. 3. Choose the local port hotkey. The local port hotkey is used to return to the KX II Local Console interface when a target server interface is being viewed.
  • Page 288 Chapter 13: KX II Local Console Hot key: Take this action: Double Click Left Ctrl key Press the left Ctrl key twice quickly 4. Select the Local Port Connect key. Use a connect key sequence to connect to a target and switch to another target. You can then use the hot key to disconnect from the target and return to the local port GUI.
  • Page 289 Chapter 13: KX II Local Console Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access, you will have to remove the device from under CC-SG management (from within CC-SG). You will then be able to check this checkbox.
  • Page 290: Kx Ii Local Console Factory Reset

    Chapter 13: KX II Local Console Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local port can be configured from the Remote Console on the Port Configuration page, or from the Local Console on the Local Port Settings page.
  • Page 291 Chapter 13: KX II Local Console  IP auto configuration  IP address  Subnet mask  Gateway IP address  Primary DNS server IP address  Secondary DNS server IP address  Discovery port  Bandwidth limit  LAN interface speed & duplex ...
  • Page 292: Connect And Disconnect Scripts

    Chapter 13: KX II Local Console Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to or disconnecting from a target. You can create and edit your own scripts on the Connection Script page to perform additional actions when connecting to or disconnecting from targets.
  • Page 293: Adding Scripts

    Chapter 13: KX II Local Console 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Select All or clicking on the checkbox to the left of each target to apply the script to only select targets.
  • Page 294 Chapter 13: KX II Local Console For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to the Script box. Next, select Letters from the Key Set drop-down and add a letter key to the script. 8.
  • Page 295 Chapter 13: KX II Local Console...
  • Page 296: Modifying Scripts

    Chapter 13: KX II Local Console Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connection Scripts page opens. 2. In the Available Connection Scripts section, select the script you want to modify and click Modify. The page is then in Edit mode. 3.
  • Page 297 Chapter 13: KX II Local Console 4. Continue holding the Reset button for 10 seconds. Once the device has been reset, two short beeps signal its completion.
  • Page 298: Appendix A Specifications

    VGA, 32 KVM Ports UTP cabling (Cat5/5e/6) DKX2-864 - Dual Power AC 100V/240V, Local USB Ports, Modem Port, Extended Local Port, Dual 10/100/1000 Ethernet Access, Local Port VGA, 64 KVM Ports UTP cabling (Cat5/5e/6) Dominion KX II Description Dimensions Weight...
  • Page 299 KCAL 439 x 290 x rack 44mm Specifications for All Dominion KX II Models Form Factor 1U and 2U full width, rack mountable (brackets included) Operating Temperature 0º - 40º C (32º - 104º F)
  • Page 300: Supported Target Server Video Resolution/Refresh Rate/Connection Distance

    150 ft. (45 m) Note: Due to the multiplicity of server manufacturers and types, OS versions, video drivers, and so on, as well as the subjective nature of video quality, Raritan cannot guarantee performance across all distances in all environments. Supported Video Resolutions (on page 313) for the video resolutions supported by the KX II.
  • Page 301 Appendix A: Specifications CIM model Description Dimensions (WxDxH) Weight D2CIM-VUSB USB CIM for virtual media and 1.3" x 3.0" x 0.6"; 33 x 0.20lb; Absolute Mouse Synchronization 76 x 15mm 0.09kg DCIM-PS2 CIM for PS/2 1.3" x 3.0" x 0.6"; 33 x 0.20lb;...
  • Page 302 Appendix A: Specifications CIM model Description Dimensions (WxDxH) Weight P2CIM-SER Paragon II/Dominion KX II CIM 1.3" x 3.0" x 0.6"; 33 x 0.20lb; for serial (ASCII) devices 76 x 15mm 0.09kg D2CIM-DVUSB- Digital CIM that provides 1.7" x 3.5" x 0.8"; 43 x 0.25lb;...
  • Page 303: Digital Cim Target Server Timing And Video Resolution

    Appendix A: Specifications CIM model Description Dimensions (WxDxH) Weight D2CIM-DVUSB- Digital CIM that provides 1.7" x 3.5" x 0.8"; 43 x 0.25lb; digital-to-analog conversion and 90 x 19mm 0.11kg support for virtual media, smartcard/CAC, audio, Absolute and Relative Mouse Synchronization D2CIM-DVUSB- Digital CIM that provides 1.7"...
  • Page 304 Appendix A: Specifications Digital CIM Timing Modes Following are the default timing modes that are used when the KX II communicates with a video source via a digital CIM. The timing mode that is used is dependent on the native resolution of the video source.
  • Page 305 Appendix A: Specifications Digital CIM Established and Standard Modes The following additional established and standard resolutions and timing modes are supported by the KX II 2.5.0 (and later). Established Modes  720x400@70Hz IBM, VGA  640x480@60Hz IBM, VGA  ® 640x480@67Hz Apple Mac ...
  • Page 306: Digital Video Cims For Macs

    Appendix A: Specifications Digital CIM Display Native Resolution You are able to select the native resolution of the CIM on the Port Configuration page from the Display Native Resolution drop-down. This is the preferred resolution and timing mode of the digital CIM. Once a resolution is selected, it is applied to the CIM.
  • Page 307: Supported Paragon Ii Cims And Configurations

    Appendix A: Specifications Supported Paragon II CIMS and Configurations The KX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL CIMs, which provide two RJ45 connections to different KVM switches. Support of these CIMs provides a second path to access the target in the event that one of the KVM switches is blocked or fails.
  • Page 308 Appendix A: Specifications KX II-to-KX II Paragon CIM Guidelines The following system configuration guidelines should be followed when you are using Paragon CIMs in a KX II-to-KX II configuration: Concurrent Access Both KX II KVM switches should be configured with the same policy for concurrent access to targets - both PC-Share or both Private.
  • Page 309 Appendix A: Specifications If a connection to the target is in place from the other KX II, the availability is checked when a connection is attempted. Access is denied or allowed consistent with the PC-Share policy in place for the KX II. Until that time, the availability is not be updated on the other KX II.
  • Page 310 Appendix A: Specifications Paragon II Mode description Supported? operation mode port can be selected and Timeout, which is configured controlled by more than on the Paragon II, is not one user, but only one supported. Both users will user has keyboard and have concurrent keyboard mouse control at any and mouse control.
  • Page 311: Supported Remote Connections

    Appendix A: Specifications Supported Remote Connections Remote connection Details Network 10BASE-T, 100BASE-T, and 1000BASE-T (Gigabit) Ethernet Protocols TCP/IP, UDP, SNTP, HTTP, HTTPS, RADIUS, LDAP/LDAPS Network Speed Settings KX II network speed setting Network Auto 1000/Full 100/Full 100/Half 10/Full 10/Half switch port Highest 1000/Full KX II:...
  • Page 312: Dell Chassis Cable Lengths And Video Resolutions

    KX II and LAN Switch to Autodetect (recommended), or set both to a fixed speed/duplex such as 100MB/s/Full. Dell Chassis Cable Lengths and Video Resolutions In order to maintain video quality, Raritan recommends using the following cable lengths and video resolutions when you are connecting to Dell ®...
  • Page 313 Raritan device.  CCID Requirements If the Raritan D2CIM-DVUSB VM/CCID is not recognized as a smart card reader by your Linux target, you may need to update the CCID driver version to 1.3.8 or above and update the driver configuration file (Info.plist).
  • Page 314: Supported And Unsupported Smart Card Readers

    If you are using a Linux client, the following requirements must be met to use smart card readers with the Raritan device. Note: User login to client, on smart card insertion, may take longer when 1 or more KVM sessions are actively in place to targets. As the login process to these targets is also under way.
  • Page 315 SCM Microsystems firmware v5.25. Unsupported Smart Card Readers This table contains a list of readers that Raritan has tested and found not to work with the Raritan device, therefore they are unsupported. If a smart card reader does not appear in the supported smart card readers table or in the unsupported smart card readers table, Raritan cannot guarantee it will function with the device.
  • Page 316: Supported Audio Device Formats

    Appendix A: Specifications Supported Audio Device Formats The KX II supports one playback and capture device and one record device on a target at a time. The following audio device formats are supported:  Stereo, 16 bit, 44.1K  Mono, 16 bit, 44.1K ...
  • Page 317 Appendix A: Specifications Bandwidth Requirements The table below details the audio playback and capture bandwidth requirements to transport audio under each of the selected formats. Audio format Network bandwidth requirement 44.1 KHz, 16bit stereo 176 KB/s 44.1 KHz, 16bit mono 88.2 KB/s 2.05 KHz, 16bit stereo 88.2 KB/s...
  • Page 318: Number Of Supported Audio/Virtual Media And Smartcard Connections

    Appendix A: Specifications Audio in a Mac Environment Following are known issues in a Mac ® environment.  On Mac clients, only one playback device is listed on the Connect Audio panel when accessing the device through the Virtual KVM Client (VKC) and Multi-Platform Client (MPC).
  • Page 319: Kx2 8Xx Extended Local Port Recommended Maximum Distances

    Appendix A: Specifications KX2 8xx Extended Local Port Recommended Maximum Distances Extended device 1024x768, 60 Hz 1280x1024, 60 Hz Paragon II UMT using 1000 EUST Paragon EUST URKVM Paragon UST Mac Mini BIOS Keystroke Commands The following BIOS commands have been tested on Intel-based Mac ®...
  • Page 320: Using A Windows Keyboard To Access Mac Targets

    Appendix A: Specifications Keystroke Description Virtual Media CIM Dual Virtual Mac Lion Server Media CIM HDMI CIM Press N during Start up from a startup compatible network server (NetBoot) Press T during Start up in Target Disk startup mode Press Shift during Start up in Safe Boot Known issue with startup...
  • Page 321 KX II (Raritan This port is used to discover other Dominion devices and for KVM-over-IP) communication between Raritan devices and systems, including Protocol, CC-SG for devices that CC-SG management is available. Configurable Port By default, this is set to Port 5000, but you may configure it to use any 5000 TCP port not currently in use.
  • Page 322: Software

    Appendix A: Specifications Software Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client (VKC) and Multi-Platform Client (MPC).  ® Windows 7  ® Windows XP  ® Windows 2008  Windows Vista ® ...
  • Page 323: Supported Browsers

    Appendix A: Specifications  Linux ® ™ ® The JRE plug-in is available for the Windows 32-bit and 64-bit operating systems. MPC and VKC can be launched only from a 32-bit browser, or 64-bit browser. ™ Following are the Java 32-bit and 64-bit Windows operating system requirements.
  • Page 324: Supported Video Resolutions

    Certain versions of Safari block Java for security reasons. Since Java is ® required to use KX II, Raritan recommends you use Firefox instead. Additionally, you may be required to navigate through a number of messages. Select 'Do Not Block' if these messages are displayed.
  • Page 325 Appendix A: Specifications Resolutions 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz 1152x900 @76Hz 720x400 @84Hz 1280x720@60Hz 720x400 @85Hz 1280x960 @60Hz 800x600 @56Hz 1280x960 @85Hz 800x600 @60Hz 1280x1024 @60Hz 800x600 @70Hz 1280x1024 @75Hz 800x600 @72Hz 1280x1024 @85Hz 800x600 @75Hz 1360x768@60Hz...
  • Page 326: Kx Ii Supported Keyboard Languages

    KX II Local Console functions. For more information about non-US keyboards, see Informational Notes. Note: Raritan strongly recommends that you use system-config-keyboard to change languages if you are working in a Linux environment. Language...
  • Page 327: Events Captured In The Audit Log And Syslog

    Appendix A: Specifications Language Regions Keyboard layout Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian Slovenian Slovenia Slovenian Italian Italy Italian Spanish Spain and most Spanish Spanish speaking countries Portuguese Portugal Portuguese Events Captured in the Audit Log and Syslog Following is a list and description of the events that are captured by the KX II audit log and syslog: ...
  • Page 328: Appendix B Dual Video Port Groups

    Example Dual Port Video Group Configuration ........321 Dual Port Video Configuration Steps ............. 322 Raritan Client Navigation when Using Dual Video Port Groups .... 325 Direct Port Access and Dual Port Video Groups ........326 Dual Port Video Groups Displayed on the Ports Page ......326...
  • Page 329: Recommendations For Dual Port Video

     Client PC’s primary and secondary displays  Raritan device’s dual video port group configuration  Target server’s primary and secondary displays Only the following Client Launch Settings will be applied to dual port video displays: ...
  • Page 330: Cims Required For Dual Video Support

    Intelligent and Linux ® users may experience Standard Mouse display and mouse movement Modes issues using single mouse mode. Raritan recommends Linux users do not use Single Mouse mode. ® operating Single Mouse Mode For Mac targets with multiple system monitors, use a standard mouse in Single-Cursor mode.
  • Page 331: Permissions And Dual Video Port Group Access

    Appendix B: Dual Video Port Groups  Monitor settings will NOT be applied. Instead the Port Group Management configured 'Display Orientation' will be applied.  Other - Enable Single Mouse Cursor setting will NOT be applied  Other - Enable Scale Video setting will be applied ...
  • Page 332: Example Dual Port Video Group Configuration

    Appendix B: Dual Video Port Groups Example Dual Port Video Group Configuration The following is a general example. Your configuration may vary in the type of CIMs used, the port you designate as the primary port, the ports you are connecting to and so on. In this example, we are using: ...
  • Page 333: Dual Port Video Configuration Steps

    2. Ensure that your target server's video has already been set to a supported resolution and refresh rate. See Supported Target Server Video Resolutions (see "Supported Video Resolutions" on page 313, http://www.raritan.com/help/kx-iii/v3.0.0/en/index.htm#32872)
  • Page 334: Step 2: Connect The Target Server To The Kx Iii

    USB cables to available USB ports on the target. 3. Connect each CIM to the Raritan device using a CAT5/6 cable. 4. If you have not already done so: a. Connect the Raritan device to an AC power source using the provided power cable b.
  • Page 335: Step 3: Configure The Mouse Mode And Ports

    Appendix B: Dual Video Port Groups Step 3: Configure the Mouse Mode and Ports Once you have connected the target server to the Raritan device through the target server video ports, it detects the connection and displays the ports on the Port Configuration page.
  • Page 336: Step 5: Launch A Dual Port Video Group

    For example, if you are using extended desktop mode, the port windows can be moved between monitors. Raritan Client Navigation when Using Dual Video Port Groups When using full screen mode in the clients, switch between ports by: ...
  • Page 337: Direct Port Access And Dual Port Video Groups

    Appendix B: Dual Video Port Groups Direct Port Access and Dual Port Video Groups Direct port access allows users to bypass having to use the device's Login dialog and Port Access page. This feature also provides the ability to enter a username and password directly to proceed to the target, if the username and password is not contained in the URL.
  • Page 338: Appendix C Accessing A Px2 From The Kx Ii

    Appendix C Accessing a PX2 from the KX II In This Chapter Overview ....................327 Connecting the Paragon II to the KX II ..........328 Overview Connect the Paragon II system to a KX II device that is managed by CC-SG so that Paragon II is accessible from CC-SG.
  • Page 339 Appendix C: Accessing a PX2 from the KX II When you access the Paragon II system from KX II or CC-SG (if the KX II is managed by CC-SG), the Paragon II OSUI login screen appears for you to log in. In this integration, you can perform any OSUI functions implemented with current Paragon II firmware or any KX II function implemented with current KX II firmware except for the virtual media feature.
  • Page 340 Appendix C: Accessing a PX2 from the KX II...
  • Page 341: Appendix D Updating The Ldap Schema

    Appendix D Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ............330 Setting the Registry to Permit Write Operations to the Schema ... 331 Creating a New Attribute ...............
  • Page 342: Setting The Registry To Permit Write Operations To The Schema

    Appendix D: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1.
  • Page 343: Adding Attributes To The Class

    Appendix D: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6.
  • Page 344 Appendix D: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
  • Page 345: Updating The Schema Cache

    Appendix D: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: ®...
  • Page 346 Appendix D: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain. 5. In the left pane of the window, select the CN=Users folder.
  • Page 347 Appendix D: Updating the LDAP Schema 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties. 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list.
  • Page 348: Appendix E Informational Notes

    Help link in the KX II Remote Console interface. Note: Some topics in this section reference other multiple Raritan devices because various devices are impacted by the information. Java Runtime Environment (JRE) Notes...
  • Page 349: Java Not Loading Properly On Mac

    Appendix E: Informational Notes Java Not Loading Properly on Mac ® If you are using a Mac and see the following message when connecting ™ to a device from the KX II Port Access Table, Java is not loaded properly: "Error while getting the list of open targets, please try again in a few seconds".
  • Page 350: Ipv6 Support Notes

    Appendix E: Informational Notes IPv6 Support Notes Operating System IPv6 Support Notes Java ™ Java 1.7 supports IPv6 for the following:  ™ Solaris 10 (and later)  ® Linux kernel 2.1.2 (and later)/RedHat 6.1 (and later)  Solaris 10 (and later) ...
  • Page 351: Dual Stack Login Performance Issues

    Appendix E: Informational Notes Dual Stack Login Performance Issues If you are using the KX II in a dual stack configuration, it is important you configured the domain system (DNS) correctly in the KX II in order to avoid delays when logging in. Tips for Adding a Web Browser Interface (on page 195) for information on configuring your DNS in KX II.
  • Page 352: Windows 2000 Composite Usb Device Behavior For Virtual Media

    As a result, the “Safely Remove Hardware” system tray icon does not appear for drives mapped by the D2CIM-VUSB and a warning message may appear when disconnecting the device. Raritan has not observed any problems or issues from this message, however.
  • Page 353: Cannot Write To/From A File From A Mac Client

    Appendix E: Informational Notes Cannot Write To/From a File from a Mac Client ® If you are connecting to the KX II from a Mac 10.8.5 client running ™ ® Safari 6.1 with Java 1.7 and cannot write to/from a file on a target server or access virtual media, do the following to correct this: 1.
  • Page 354: Virtual Media Via Vkc And Akc In A Windows Environment

    Appendix E: Informational Notes Virtual Media via VKC and AKC in a Windows Environment ® Windows XP operating system administrator and standard user ® privileges vary from those of the Windows Vista operating system and ® the Windows 7 operating system. When enabled in Vista or Windows 7, User Access Control (UAC) provides the lowest level of rights and privileges a user needs for an application.
  • Page 355: Virtual Media Linux Drive Listed Twice

    Appendix E: Informational Notes Virtual Media Linux Drive Listed Twice For KX II 2.4.0 (and later) and LX 2.4.5 (and later), users who are logged ™ in to Linux clients as root users, the drives are listed twice in the Local Drive drop-down.
  • Page 356: Usb Port And Profile Notes

    Appendix E: Informational Notes USB Port and Profile Notes VM-CIMs and DL360 USB Ports ® DL360 servers have one USB port on the back of the device and another on the front of the device. With the DL360, both ports cannot be used at the same time.
  • Page 357 The USB Profile Menu selections are configurable via the Console Device Settings > Port Configuration page. Should none of the standard USB profiles provided by Raritan meet your target server requirements, Raritan Technical Support can work with you to arrive at a solution tailored for that target. Raritan recommends that you do the following: 1.
  • Page 358: Changing A Usb Profile When Using A Smart Card Reader

    Appendix E: Informational Notes Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will need to change the USB profile for a target server. For example, you may need to change the connection speed to "Use Full Speed for Virtual Media CIM"...
  • Page 359 Appendix E: Informational Notes Note: These procedures do not apply to the circumflex accent (above vowels). In all cases, the ^ key (to the right of the P key) works on French keyboards to create the circumflex accent when used in combination with another character.
  • Page 360 Because the Sun on Linux ® has problems generating the correct KeyEvents for foreign-language keyboards configured using System Preferences, Raritan recommends that you configure foreign keyboards using the methods described in the following table. Language Configuration method US Intl Default...
  • Page 361: Mac Keyboard Keys Not Supported For Remote Access

    Appendix E: Informational Notes 4. Click Close. To set the keyboard language using the Keyboard Indicator: 1. Right-click the Task Bar and choose Add to Panel. 2. In the Add to Panel dialog, right-click the Keyboard Indicator and from the menu choose Open Keyboard Preferences. 3.
  • Page 362: List Of Supported Target Video Resolutions Not Displaying

    Features that May Interrupt an Audio Connection If you use any of the following features while connected to an audio device, your audio connection may be interrupted. Raritan recommends you do not use these features if you are connected to an audio device: ...
  • Page 363: Audio In A Linux Environment

    When the Virtual KVM Client (VKC) is launched from CommandCenter Secure Gateway (CC-SG) in proxy mode, the VKC version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”. Single Mouse Mode when Connecting to a Target Under CC-SG...
  • Page 364: Proxy Mode And Mpc

    Multi-Platform Client (MPC). Moving Between Ports on a Device If you move a between ports on the same Raritan device and resume management within one minute, CC-SG may display an error message.
  • Page 365: Vkc And Mpc Smart Card Connections To Fedora Servers

    Appendix E: Informational Notes VKC and MPC Smart Card Connections to Fedora Servers ® ® If you are using a smart card to connect to a Linux Fedora server via Multi-Platform Client (MPC) and Virtual KVM Client (VKC) upgrade the pcsc-lite library to 1.4.102-3 or above.
  • Page 366: Appendix F Frequently Asked Questions

    OS-independent; users can troubleshoot and reconfigure servers even when servers are down. At the rack, Dominion KX II provides the same functionality, convenience, and space and cost savings as traditional analog KVM switches. However, Dominion KX II also integrates the industry’s highest performing KVM-over-IP...
  • Page 367: Remote Access

    How large is the Dominion KX Dominion KX II is only 1U high (except the KX2-864 and KX2-464, which are 2U), fits in a standard 19" rack mount and is only 11.4" (29 cm) deep. The Dominion KX2-832 and KX2-864 are 13.8"...
  • Page 368 32 users across the eight channels. Can I remotely access servers Yes. Starting with Dominion KX II Release 2.4 and from my iPhone or iPad? CC-SG Release 5.2, users can access servers connected to the KX II using their iPhone or iPad.
  • Page 369 MPC can be run via Web browsers and stand-alone and can access servers connected to both Dominion KX I and KX II switches. Please refer to Raritan’s Dominion KX II and KVM Client User Guides for more information. Yes. The Dominion KX II’s remote HTML User...
  • Page 370: Universal Virtual Media

    What is the file size of the The Virtual KVM Client (VKC) applet used to access applet that’s used to access Dominion KX II is approximately 500KB in size. The Dominion KX II? How long following chart describes the time required to retrieve Dominion KX II’s applet at different network...
  • Page 371 Appendix F: Frequently Asked Questions Question Answer What is required for virtual media? A Dominion KX II virtual media CIM is required: a digital CIM, D2CIM-VUSB or D2CIM-DVUSB. The D2CIM-VUSB has a single USB connector and is for customers who will use virtual media at the OS level.
  • Page 372: Bandwidth And Kvm-Over-Ip Performance

    Appendix F: Frequently Asked Questions Question Answer Why would I use a USB profile? USB profiles are most often required at the BIOS level where there may not be full support for the USB specification when accessing virtual media drives. However, profiles are sometimes used at the OS level, for example, for mouse synchronization for Macintosh and Linux servers.
  • Page 373 The Dominion KX II digitizes compresses and encrypts the keyboard, video and mouse signals from the target server and transmits IP packets over the IP network to the remote client to create the remote session to the user.
  • Page 374 Other factors include the server’s video resolution, networking speed and characteristics, client PC resources and video card noise. The Dominion KX II has very sophisticated video processing algorithms that optimize bandwidth and performance for a variety of environments. In addition, they are highly configurable;...
  • Page 375 Appendix F: Frequently Asked Questions Question Answer How can I reduce bandwidth? KX II provides a variety of settings in our remote clients for the user to optimize bandwidth and performance. The default settings will provide an at-the-rack level of performance in standard LAN/WAN environments with economical use of bandwidth.
  • Page 376 Mb or 1 Gb and the color depth is set to 15-bit RGB color. What is the maximum remote (over The Dominion KX II is the first and only IP) video resolution supported? KVM-over-IP switch to support full high definition (HD) remote video resolution –...
  • Page 377 The table below summarizes some standard use cases at Dominion KX II’s default and with two reduced bandwidth settings (connection speed setting of 1Mb with 15- and 8-bit color) on a Windows XP target server (1024x768 resolution) over a 100 Mb/s LAN.
  • Page 378: Ethernet And Ip Networking

    Appendix F: Frequently Asked Questions User Task Default 1Mb Speed and 1Mb Speed and 8-bit 15-bit Color Color 50 – 100 25 – 50 KB/s 10 – 15 KB/s Open Text Window KB/s .5 – 1 KB/s .2 – .5 KB/s Continuous Typing 1 KB/s 1050 KB/s 5 –...
  • Page 379 Appendix F: Frequently Asked Questions Question Answer What is the speed of Dominion KX Dominion KX II supports gigabit as well as II’s Ethernet interfaces? 10/100 Ethernet. KX II supports two 10/100/1000 speed Ethernet interfaces, with configurable speed and duplex settings (either auto detected or manually set).
  • Page 380: Ipv6 Networking

    Appendix F: Question Answer Can the Dominion KX II use DHCP? DHCP addressing can be used; however, Raritan recommends fixed addressing since the Dominion KX II is an infrastructure device and can be accessed and administered more effectively with a fixed IP address.
  • Page 381 Consult the user guide for more information. What if I have an external server The Dominion KX II can access external servers with an IPv6 address that I want to via their IPv6 addresses, for example, an SNMP use with my Dominion KX II? manager, syslog server or LDAP server.
  • Page 382: Servers

    No. Dominion KX II is a completely such as Microsoft Internet self-sufficient appliance. After assigning an IP address to Dominion KX II, it’s ready to use – Information Services (IIS), in order to use Dominion KX II’s Web with Web browser and authentication browser capability? capabilities completely built in.
  • Page 383: Blade Servers

    BladeSystem c3000 and c7000; IBM BladeCenter® H, E and S; and Cisco UCS B-Series. Are the Paragon® Blade CIMs No. The Dominion KX II does not require the used? use of special blade server CIMs like the Paragon II. Which CIM should I use?
  • Page 384 With the Dominion KX II, you don’t have to use these hotkeys. Just click on the name of the blade server, and the Dominion KX II will automatically switch to that blade without the explicit use of the hotkey.
  • Page 385: Installation

    Installation Question Answer Besides the unit itself, what do I Each server that connects to Dominion KX II need to order from Raritan to requires a Dominion or Paragon computer install Dominion KX II? interface module (CIM), an adapter that connects directly to the keyboard, video and mouse ports of the server.
  • Page 386 How many servers can be Dominion KX II models range from 8, 16 or 32 connected to each Dominion KX II server ports in a 1U chassis, to 64 server ports in a 2U chassis.
  • Page 387: Local Port

    Raritan’s Dominion SX line of secure console servers. Dominion SX offers more serial functionality at a better price point than Dominion KX II. This SX is easy to use, configure and manage, and can be completely integrated with a Dominion series deployment.
  • Page 388 Appendix F: Question Answer When I am using the local port, do No. The Dominion KX II local port has a I prevent other users from completely independent access path to the accessing servers remotely? servers. This means a user can access servers locally at the rack –...
  • Page 389: Extended Local Port (Dominion Kx2-832 And Kx2-864 Models Only)

    ® URKVMG device. In addition, the extended local port can be connected via Cat5 cable to a server port on a Dominion KX II or Paragon II switch. This configuration can be used to consolidate the local ports of many KX2-8xxx devices to a single switch.
  • Page 390: Intelligent Power Distribution Unit (Pdu) Control

    50–60 Hz. If a power supply or input fails, will The Dominion KX II front panel LED will notify I be notified? the user of a power failure. An entry will also be sent to the audit log and displayed on the KX remote client user interface.
  • Page 391: Local Port Consolidation, Tiering And Cascading

    How do I connect the PDU to The D2CIM-PWR is used to connect the the Dominion KX II? power strip to the Dominion KX II. The D2CIM-PWR must be purchased separately; it does not come with the PDU. Does Dominion KX II support Yes.
  • Page 392 Question Answer How do I physically connect To physically connect multiple KX II devices multiple Dominion KX II devices together for consolidated local access, you can together into one solution? connect the local ports of multiple "tiered" (or "cascaded") KX II switches to a "base" KX II using the tiering feature of the KX II.
  • Page 393 Appendix F: Question Answer Do I have to physically connect Multiple Dominion KX II units do not need to be Dominion KX II devices together? physically connected together. Instead, each Dominion KX II unit connects to the network, and they automatically work together as a single solution if deployed with Raritan’s...
  • Page 394: Computer Interface Modules (Cims)

    Dominion KX II. Also note that when connected to Dominion KX II, Paragon CIMs transmit video at a distance of up to 150 feet (46 m), the same as Dominion KX II CIMs – not at 1,000 feet (304 m), as they do when connected to Paragon.
  • Page 395: Security

    128-bit encryption, both in its SSL communications as well as its own data stream. Literally no data is transmitted between remote clients and Dominion KX II that is not completely secured by encryption. Does Dominion KX II support AES Yes. The Dominion KX II utilizes the Advanced encryption as recommended by Encryption Standard (AES) for added security.
  • Page 396 Active Directory or RADIUS. For each authenticated user, Dominion KX II receives from the authentication server the user group to which that user belongs. Dominion KX II then determines the user’s access permissions depending on the user group to which he or she belongs.
  • Page 397: Smart Cards And Cac Authentication

    Dominion KX II solution. card-enabled UST and CIM used? Where can I get more information See the Release Notes and the Dominion KX II on KX II smart card support? User Guide for more information. Manageability...
  • Page 398 (In fact, using a crossover Ethernet cable and Dominion KX II’s default IP address, you can even configure the initial settings via Web browser.) Yes. Dominion KX II’s device and user Can I back up and restore Dominion KX II’s configuration?
  • Page 399: Documentation And Support

    CIMs, available as of Release 2.5. How long is the hardware warranty The Dominion KX II comes with a standard for the KX II? two-year warranty, which can be extended to 5 years of warranty coverage.
  • Page 400 Appendix F: Question Answer I changed and subsequently forgot Dominion KX II contains a hardware reset Dominion KX II’s administrative button that can be used to factory reset the password; can you retrieve it for device, which will reset the administrative password on the device to the default password.
  • Page 401 Index Audio Playback and Capture Recommendations and Requirements • 85, 86, 304 A. AC Power • 16 Audit Log • 239, 279, 285 About the Active KVM Client • 92 Authentication Settings • 128 Absolute Mouse Mode • 74 Auto-Sense Video Settings • 66 Access a Virtual Media Drive on a Client Available Resolutions •...
  • Page 402: Index

    Index CIMs Required for Virtual Media • 97 Connect Key Examples • 208, 273, 277 Cisco ACS 5.x for RADIUS Authentication • Connect to a Target Server • 53 Connecting a Rack PDU • 178 CLI Commands • 257, 262 Connecting and Disconnecting a Digital Audio CLI Prompts •...
  • Page 403 Index Disconnecting Users from Ports • 126, 127 Frequently Asked Questions • 353 Discovering Devices on the KX II Subnet • 46 From LDAP/LDAPS • 328 Discovering Devices on the Local Subnet • 45 From Microsoft Active Directory • 328 Documentation and Support •...
  • Page 404 Index Java Validation and Access Warning • 27 Logging In • 258, 259 Logging in to the KX II • 26 JRE Requirements and Browser Considerations for Mac • 312 Logging Out • 50 Logging Users Off the KX II (Force Logoff) • 126, 127 Login Limitations •...
  • Page 405 RADIUS Communication Exchange Setting Network Parameters • 261 Specifications • 137 Setting Parameters • 261 Raritan Client Navigation when Using Dual Setting Permissions • 120 Video Port Groups • 324 Setting Permissions for an Individual Group • Rear Mount • 11 122, 125 Rebooting the KX II •...
  • Page 406 Index SSH Access from a Windows PC • 258 Supported Virtual Media Operating Systems • SSH Connection to the KX II • 258 SSL Certificates • 27, 234 Supported Virtual Media Types • 98 Standard Mouse Mode • 72 SUSE/VESA Video Modes • 348 Switching between Target Servers •...
  • Page 407 Index Working with Target Servers • 32, 184, 325 Version Information - Virtual KVM Client • 91 Video Image Appears Dark when Using a Mac • 313 Video Mode and Resolution Notes • 348 Video Properties • 66 View by Group Tab • 40 View by Search Tab •...
  • Page 408 For CommandCenter Secure Gateway: Press 6, then Press 2 Phone: +31-10-2844040 Fax: 732-764-8887 Email: tech.europe@raritan.com Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m. GMT China Phone +44(0)20-7090-1390...

Table of Contents