Home
Digi Passport I-KVM User's Guide
Contents
1. Lamps Function Power Turned on if power is supplied Status Turned on if system is ready to run Server Turned on if Host computer video is connected Connecting the hardware 12 This section describes how to connect the I K VM to the equipment for initial testing m Connect a power source to the I KVM Connect the I KVM to an Ethernet hub or switch Connect the host computer Connecting the power The I K VM can be powered from the USB port of the host computer or from a separate DC power supply To power the I K VM from the USB port of the host computer the USB port should be able to supply more than 5 78 Watt 1 2A 5VDC If the power is properly supplied the Power lamp will light up green When external DC power supply is used to power the I K VM unit s make sure to use proper Digi parts for safety To power a single unit use the external power supply included part number 76000765 US or 76000764 EU HON KWANG ELECTRIC CO LTD HK R107 A12 To power multiple units up Getting started to 8 use Digi part number 76000766 US or 76000767 EU CHANNEL WELL TECHNOLOGY CO LTD PAA060F See figure 2 2 Figure 2 2 Connecting the power to the I KVM Connecting to the network Plug one end of the Ethernet cable to the I KVM Ethernet port The other end of the Ethernet cable should be connected to a network port If the cable is properly connected the I K VM will have a valid connection to the
2. Host keyboard layout US v Mouse Keyboard type uss Menu bar toggle hot key F5 x Encryption On x Idle timeout seconds lo i Protocol timeout seconds 30 Mouse rate milliseconds 20 Background refresh rate Single mouse mode mouse switch Behaviour for admin connections when limit reached Medium Middle Right Button Replace oldest connection Single user mode Disable wal Single user mode username a Single user mode password F User access control Access T User a Action Admin User lt lt Everyone gt gt E M Oo Oo Figure 5 1 KVM configuration The configuration parameters for KVM configuration are as follows 53 54 Host keyboard layout Configure keyboard layout expected by the host system The I K VM supports international keyboard layout of US UK Japan Spain France Germany Italy Netherlands Belgium Norway Sweden Denmark and Swiss Mouse type Configure Mouse type depends on the I K VM model type USB model USB mouse PS 2 model USB or PS 2 mouse Menu bar toggle key Configure function key F5 F7 F9 F12 to toggle menu bar of viewer Encryption Three options are available Always on prefer off prefer on The one to choose depends on the specific details of the installation The use of encryption imposes a slight performance overhead of roughly 10 but is highly secure against third party intrusion Fo
3. Figure 9 1 User administration To add a user Open add user screen by clicking the Add button type the username group and password at the add user screen and then click the Add button The figure below shows the Add User screen The following parameters should be properly set to create a user s account User name User group One of User System admin User password Shell program One of CLI Configuration menu 85 SSH public key authentication One of Enabled or Disabled SSH public key file If the SSH public key is uploaded into the I K VM the users who connect to the K VM using the SSH client program will be automatically authenticated using this key file Otherwise a password based authentication will be done Note User ID and password should be at least three characters or more for user add and change There will be an error message if they are shorter than or equal to 2 characters User Management System administration User Management add User name Select group Password Confirm password Shell program Configuration menu w SSH public key authentication Disable SSH public key file Figure 9 2 Adding a user To remove a user Check the users at the User administration screen Click the Remove button To change the parameters of the user account open the edit user screen by selecting the user name at the User administration screen and then edit the parame
4. Authentication System administration Authentication Authentication method selection Web authentication method KVM authentication method Serial authentication method Console authentication method Authentication server configuration Authentication server First authentication server Second authentication server Shared secret Timeout 0 300 seconds Retries 1 50 times Local v RADUSsewer Local v Local 9 RADIUS v 10012 secret 3 second s i f times s Smetany Figure 9 4 Authentication configuration specify server System administration Change password The figure below shows the change password screen To change the current user s password type the current password and a new password and then confirm the new password Change Password System administration Change Password Current user name root Enter current password Enter new password Confirm new password Submit Cancel Figure 9 5 Change password Device name configuration The I KVM has its own name for administrative purposes Figure 9 6 shows the device name configuration screen When a user changes the Device name the hostname and the CLI prompt of the I K VM will also change corresponding to the new Device name Device Name System administration Device Name Device name Save to flash iF Save amp apply Cancel Figure 9 6 Device name config
5. Digi Passport I KVM Bootloader Version v0 7 3 Oct 16 2008 19 32 06 DRAM Configuration Bank 0 at address 0x0 0 KB Check for Intel flash 1l6bit x1 DDI1 0x89 DDI2 0x8818 yes Flash 16 MB xx Using default environment Hit lt ESC gt to stop autoboot 3 SELECTS 1 Firmware upgrade 2 Exit and boot from flash memory 3 Exit and reboot S35 Figure 10 7 Main Menu Page of Bootloader Menu Firmware upgrade menu By using the Firmware upgrade menu the user can upgrade the firmware of the unit Before firmware upgrade the user can verify the current firmware version The firmware upgrade is done using TFTP for remote firmware download User must set the IP address for the unit properly The default IP address for the unit is 192 168 161 5 To perform the firmware upgrade properly a firmware file configured as Firmware file name on the server configured as Server s IP address must exist System statistics Current firmware version v0 8 4 Select i Tt server s IP ageiresse 192 166 11 LOO 2 IP address assigned to Ethernet interface 192 168 11 3 3 Firmware file name I KVM v0 8 4 img 4 Start firmware upgrade gt Figure 10 8 Firmware upgrade menu within Bootloader Menu If the user selects Start firmware upgrade the firmware upgrade process will start This process cannot be cancelled until it is finished Current firmware version v0 8 4 Select il Trp server s
6. a Full BIOS level access of the remote host via KVM over IP a Non blocked server access via KVM over IP using web browser or widely available VNC viewers on wide range of platforms m High video performance up to 1600 x 1200 60Hz resolution m Hardware based AES 128 bit encryption of keyboard mouse and video data a Telnet SSH to the serial port with various management features including user access group port logging and SNMP SMTP based event alert feature a Remote user authentication support LDAP Radius TACACS Kerberos m Zero U form factor with locking type power connector m Supports server powered through USB port of the server 7 Highly scalable using daisy chain type Ethernet and power cascading m Virtual Media support for file transfer to remote servers 7 Adaptive video compression algorithm for highly efficient network bandwidth use m IPv4 IPv6 dual stack Product Specifications Hardware interfaces Network 2 x 10 100Base T Ethernet Ports for uplink and cascading Keyboard Mouse USB or PS 2 Video HDD15 VGA up to 1600x1200 60Hz Serial Console RS 232 up to 115 2 Kbps for Serial Port Redirection and or Unit Configuration Virtual media USB Remote server requirements PC MAC Sun IBM System P RS 6000 and DEC Alpha HDD15 VGA output up to 1600x1200 60Hz PS2 or USB keyboard and mouse interface Client OS requirements Industry standard web browsers with Sun Java 2 Runtime environment Platform independ
7. be O d E sea Ctri alt c Sena EOE Send OoOo O Send Paste Clipboard Close Single Mouse Mode Resync Mouse Refresh Screen Mouse Control Keyboard Control Video Settings Virtual Media Figure 7 10 Keyboard control dialogs Keyboard control This dialog is useful when sending keyboard combinations to the host that are needed regularly or that are trapped by the I KVM When entering codes means press down the key that follows means release the key that follows means press down and release the key that follows means wait 250ms note if a number immediately follows the asterisk then the delay will equal the number in milliseconds It is automatically assumed that all keys specified will be released at the end so there is need to specify Ctrl or Alt if these keys are to be released together See Appendix C for a list of key sequence codes that can be used Examples Ctrl Alt 12 would be expressed as Ctrl Alt 1 1 2 N means press the N key Scroll means press the Scroll lock key Space means press the space key KVM viewer client Video mode vesa 800 x 600 60Hz Threshold L gt i 768 Auto Phase 4 J i sa Auto Horizontal Position 4 Le J f e Auto Vertical Position af J my 1 Auto Brightness Contrast Rea M za re Green lt M f 128 75 Auto Blue lt M E j 28 i Hf s5 Display Activity 0 32 Single Mouse Mode Resync Mouse Refresh Screen
8. sysSenices Q amp interfaces Sent get request to 192 168 4 10 161 ifNumber sysLocation 0 gt Unknown E ifTable at Sent get request to 192 168 4 10 161 ne ee sysServices 0 gt 7 tcp udp Sent get requestto 192 168 4 10 161 egp ifNumber 0 gt 2 transmission snmp 7 A experimental Syntax DisplayString SIZE 0 Status mandatory private Access Reference ii TRAPS Index egpNeighborLoss ej TEXTUAL CONVENTIONS ObjectID 1 3 6 1 2 1 1 1 PhysAddress A textual description ofthe entity This value m Ba Descripti Should include the full name and version Global View E identification of the system s hardware type Figure 3 3 Browsing MIB II OIDs of I KVM SNMP agent using SNMP Browser AdventNet MibBrowser Dynamic DNS configuration When users connect the I K VM to a DSL line or use a DHCP configuration the IP address might be changed whenever it reconnects to the network It can therefore be very difficult to post all related contacts for each new IP address In addition if the administrator only has access through the remote console there is no way to know if an IP address has changed or what the new IP address is 32 Network configuration A Dynamic DNS service is provided by various ISPs or organizations to deal with the above issue By using the Dynamic DNS service users can access the I K VM through the hostname registered in the Dynamic DNS Server regardless of an
9. Calibration is most effective if the desktop is static and the top left corner is clear of windows icons etc Video only Mouse only Cancel Figure 7 8 KVM calibration dialog we Auto calibrate Determines the optimum video and or mouse settings for the host ey Single mouse mode Change to single mouse mode To escape to double mouse mode press function key usually F8 P or Middle Right mouse button For more information refereto the section of the manual KVM Configuration Refresh screen cTri Sends a Ctrl Alt Delete command to the remote server DEL 4 Controls Displays a menu of options concerning keyboard video and mouse operation k KVM viewer client Mouse i Sala Ls A E Resync Mouse Calibrate Refresh Screen Restore Mouse Keyboard Contro USB Mouse Video Settings Virtual Media Close USB Mouse lt Relative gt Peconmect OK ELE l Restore PS2 Mouse Restore IntelliMouse Cancel Figure 7 9 Mouse control dialog Mouse control When the remote cursor is not correctly responding to mouse movements even after using the Re sync mouse option this option is useful Restore Mouse Reinstate a mouse that has failed to operate correctly USB Mouse For a USB mouse the user can choose between relative and absolute positioning modes 75 76 Keyboard Control Ctrl Alt Del Send AIt Tab Sea Win o sed
10. Digi Passport I KVM User s Guide 90001000_A February 2009 Notice to Users Digi International Inc 2009 All Rights Reserved The Digi logo and Passport are registered trademarks of Digi International Inc All other trademarks mentioned in this document are the property of their respective owners Information in this document is subject to change without notice and does not represent a commitment on the part of Digi International Digi provides this document as is without warranty of any kind either expressed or implied including but not limited to the implied warranties of fitness or merchantability for a particular purpose Digi may make improvements and or changes in this manual or in the product s and or the program s described in this manual at any time This product could include technical inaccuracies or typographical errors Changes are periodically made to the information herein these changes may be incorporated in new editions of the publication Proper back up systems and necessary safety devices should be utilized to protect against injury death or property damage due to system failure Such protection is the responsibility of the user This device is not approved for use as a life support or medical system Any changes or modifications made to this device without the explicit approval or consent of Sena Technologies will void Sena Technologies of any liability or responsibility of injury or lo
11. Options are Disabled Middle Right Button Middle Left Button Behaviour for admin connections when limit reached Defines behavior of admin connections when limit reached The I KVM supports up to 4 simultaneous admin users log in to the same KVM session Options are Replace oldest connection Replace newest connection Reject new connection Single user mode Some VNC clients such as VNC clients for PDA don t require username for authentication In order to connect with these VNC clients this option should be enabled However the Real VNC client still needs a username for authentication even if this option is enabled In this mode the User access control menu is disabled and the single user has the Admin authority Single user mode username Username for authentication Single user mode password Password for authentication 99 56 User access control Access type consists of Admin User control The user who has admin authority can set the viewer private mode even though other users are using the viewer private mode For more information refer to the section KVM viewer client within this document The access controls of lt lt Everyone gt gt are applied to all the users who are not added to user list or access list of user access control The users should be added to user list or access list if their access controls do not match lt lt Everyone gt gt access controls If the administrator wants to spec
12. 20 60 C m Relative humidity 0 90 non condensing m Serial port surge protection ESD 15kV 10 Physical dimensions Width 2 83 in 7 2 cm Height 1 26 in 3 2 cm Weight Passport I KVM PS2 9 24 oz 262 g Passport I K VM USB 7 87 oz 223 g Getting started Getting started C H A PTER 2 This chapter describes how to set up and configure the I KVM using the following figures Panel Layout explains the layout of the panel and LED indicators Connecting the Hardware describes how to connect the power the network and the equipment to the I KVM Accessing System Console describes how to access the console port using a serial console or a Telnet or Web menu from remote location The following items are required to get started One power cable included in the package One console Ethernet cables One Video Mouse PS 2 or USB cable included in the package Panel layout r Sa O Poner A O Status O Server a Figure 2 1 Panel layout of the I KVM The I K VM has three LED indicator lamps to display the status as shown in Figure 2 1 i e Power Status Server The first lamp indicates power the second lamp indicates server status and the third lamp indicates server connection The front panel shows Ethernet port and power sockets and the rear panel shows the serial ports with RJ45 connector and the console switch Table 2 1 LED indicator lamps of the I KVM
13. Baud Rate Tx Rx 9600 26150 Figure 10 2 Serial ports status IP statistics The IP Statistics screen provides statistical information about packets connections using an IP protocol Definitions and descriptions of each parameter are described below Forwarding Specifies whether IP forwarding is enabled or disabled DefaultTTL Specifies the default initial time to live TTL for datagrams originating on a particular computer InReceives Shows the number of datagrams received 102 System statistics InHdrErrors Shows the number of datagrams received that have header errors InHdrErrors is the number of input datagrams discarded due to errors in their IP headers including bad checksums version number mismatch other format errors time to live exceeded errors discovered in processing their IP options etc InAddrErrors Specifies the number of datagrams received that have address errors These datagrams are discarded because the IP address in their IP header s destination field was not a valid address to be received at this entity This count includes invalid addresses for example 0 0 0 0 and addresses of unsupported Classes for example Class E ForwDatagrams Specifies the number of datagrams forwarded InUnknownProtos Specifies the number of locally addressed datagrams received successfully but discarded because of an unknown or unsupported protocol InDiscard Specifies the number of input
14. In the submenu screen users can configure the required parameters guided by online comments Getting started All the parameters are stored into the non volatile memory space of the I K VM and it will not be stored until users type s s ave All the configuration change will be effective after typing a a pply Using remote console The IP address of the I K VM must be known before users can access the I K VM using the remote console For more information refer to the Network Configuration section of this document The default I K VM IP address is 192 168 161 5 The remote console access function can be disabled in the remote host access option For more information refer to the IP filtering in section of this document The LK VM supports both Telnet and SSH protocol for remote consoles The following instructions will assist in setting up the Remote Console functionality 1 Runeither a Telnet or SSH program or a program that supports Telnet or SSH functions i e TeraTerm Pro or HyperTerminal The target IP address and the port number must match the I K VM If required specify the port number as 23 or 22 Type the following command in the command line interface of user s computer telnet 192 168 161 5 or ssh admin 192 168 161 5 or run a Telnet program with the parameters shown below Gi Tera Term disconnected YT W loj xj File Edit Setup Control Window Help Tera Term New connection TCPHIP H
15. Serial port System status amp logs System administration System statistics Activate Locator LED Apply Changes Login as a different user Logout Reboot Network Network Basic Settings a em DIG PASSPOR IPv4 configuration IP mode IP address IPv6 configuration IP mode IP address Default gateway IP address Link DHCP 10 0 9 30 Manual configuration fecO 202 64 fecO 222 fe80 201 95ff fea3 87bd 64 Reuse old IP at bootup time on DHCP failure Use Manual DNS Primary DNS Secondary DNS optional Disable Enable 206 13 28 12 206 13 31 12 Save to flash Save amp apply Cancel Copyright 1996 2008 Digi International All rights reserved Figure 3 1 IP configuration Using a static IP address When using a static IP address the user must manually specify all the configuration parameters associated with the I KVM IP address These include the IP address the network subnet mask the gateway computer and the domain name server computers This section will look at each of these in more detail Note The I KVM will attempt to locate all this information every time it is turned on Network configuration IP address A Static IP address acts as a static or permanent identification number This number is assigned to a computer to act as its location address on the network Computers use these IP addresses to identify and talk to each other on a
16. Serial port configuration O System user configuration CO system configuration Encrypt Yes File selection Figure 9 9 Security profile The configuration parameters for services are as follows Level of security SNMP get set Telnet SSH HTTP HTTPS Stealth mode Level of security This parameter determines the level of security policy It can be one of custom standard or secure User can configure any security item in the case of custom Otherwise each security item is configured corresponding to the security level as follows Security Item Custom Standard Secure SNMP get set Configurable Disable Disable 93 94 Telnet Configurable Disable Disable SSH Configurable Enable Enable Redirect to HTTP Configurable HTTPS Disable HTTPS Configurable Enable Enable Stealth mode Configurable Disable Enable SNMP get set This parameter determines whether the service to get or set the status of the I K VM is enabled or not Telnet This parameter determines whether the telnet console service is enabled or not It is implemented by adding or changing the IP filtering rule as follows Status Interface Option dene Port Chain rule mask Disable all Normal 0 0 0 0 0 0 0 0 23 DROP Enable all Normal 0 0 0 0 0 0 0 0 23 ACCEPT For more information refer to the section IP filtering within this document SSH System
17. Well Known Ports are assigned by IANA and on most systems can only be used by system processes or by programs executed by privileged users Table C 1 shows some of the well known port numbers For more details go to the IANA website http www iana org assignments port numbers 119 120 Table B 1 Well known port numbers Port Protocol TCP number UDP 21 FTP File Transfer Protocol TCP 22 SSH Secure SHell TCP 23 Telnet TCP 25 SMTP Simple Mail Transfer Protocol TCP 37 Time TCP UDP 39 RLP Resource Location Protocol UDP 49 TACACS TACACS UDP 53 DNS UDP 67 BOOTP server UDP 68 BOOTP client UDP 69 TFTP UDP 70 Gopher TCP 79 Finger TCP 80 HTTP TCP 110 POP3 TCP 119 NNTP Network News Transfer Protocol TCP 161 162 SNMP UDP 443 HTTPS TCP Appendix C Hotkey sequence codes Appendix C Hotkey sequence codes These codes are used when defining hotkey switching sequences macros for host computers and allow you to include almost any of the special keys on the keyboard Permissible key presses Main control keys see Using abbreviations Backspace Tab Return Enter Ctrl Alt Win Shift LShift RShift LCtrl RCtrl LAIt AltGr RAIt LWin RWin Menu Escape Space CapsLock NumLock PrintScreen Scrolllock Math operand keys see Using abbreviations Add Plus Subtract Minus Multiply Central control keys see Using abbreviati
18. m Any host Table 3 2 Input examples of IP address mask lt IP V4 gt nes Input format Specified host range Base Host IP address Subnet mask Any host 0 0 0 0 0 0 0 0 192 168 1 120 192 168 1 120 255 255 255 255 192 168 1 1 192 168 1 254 192 168 1 0 255 255 255 0 Network configuration 192 168 0 1 192 168 255 254 192 168 0 0 255 255 0 0 192 168 1 1 192 168 1 126 192 168 1 0 255 255 255 128 192 168 1 129 192 168 1 254 192 168 1 128 255 255 255 128 lt IP v6 gt Input format Specified host range Base Host IP address Subnet mask Any host 10 0 fecO 111 fecO 111 128 fec0 1 fecO ffff fec0 0 112 fec0 1 fecO fff ffff fec0 0 96 fec0 1 fecO f fec0 0 124 fec0 8000 fec0 8fff fec0 8000 113 Protocol The Protocol determines which protocol the host uses to communicate with the I K VM It can be one of two values such as TCP and UDP Port The Port is a port or port range of the I KVM which hosts try to access to The port range can be specified by entering port1 port2 where the port range starts with port and ends with port2 Chain rule The Chain rule determines whether the access of the hosts is allowed or not It can be one of the these two values a ACCEPT access allowed a DROP access not allowed 37 The figure below shows IP filtering configuration IP Filtering Network IP Filtering IPv4 fil
19. Enterprise version client software to make best use of all the I KVM features such as encryption feature Launch the KVM viewer client by clicking its desktop icon or by selecting it from the Start menu A connection details dialog will be displayed YNC Viewer Connection Details VNC Viewer Enterprise Edition for Windows See http www realvnc com for more information on VNC al ae as Figure 7 1 Viewer client login Server EEO Encryption Let Server Choose Default v 63 64 Server I K VM server IP address IPv4 or IPv6 Note When using an IPv6 address the address must be entered enclosed in such as 3ffe 5341 1 1 201 95ff fe77 7702 Encryption Let server choose This setting will follow the configuration of the I KVM If the I K VM has a preference to encrypt the link then it will be so otherwise the link will not be encrypted m Always on This setting will ensure that the link is encrypted regardless of the I KVMencryption setting m Prefer off This setting will configure an un encrypted link if the I KVM will allow it otherwise it will be encrypted m Preferon If the I K VM allows it this setting will configure an encrypted link otherwise it will be un encrypted Options When clicking the Options button the option window appears as below KVM viewer client The Display tab on the VNC Viewer Properties dialog allows configuration of how the remote s
20. Ethernet network This will be indicated by the Link lamp will light up green See figure 2 3 14 The Act lamp will blink to indicate incoming outgoing Ethernet packets Figure 2 3 Connecting a network cable to the I KVM Connecting to the host computer Connect the Video Mouse cable to host computer To connect to the host computer the user needs to consider the type of video and mouse type provided by the device itself For Getting started more information see figure 2 4 below and refer the cabling diagram in Appendix A of this document Figure 2 4 Connecting a Video Mouse cable to host computer Cascading multiple I KVM units The I KVM supports cascading up to 8 units for power and for the Ethernet so multiple I KVM units can run from only one power source and one Ethernet port switch For power cascading a separate larger capacity power supply should be purchased instead of a regular power supply unit The power output connector of the power supply should be connected to the power connector of the first I K VM unit then one end of the power cascade cable should be connected to the Cascade port of the first K VM and the other end should be connected to the Power connector of the second I K VM Connect the same way for the rest of the units Power cascade cables 76000768 need to be purchased separately The Ethernet cable from the external hub switch should be connected to the Ethernet port of the f
21. IP acdress 192 168 11 100 2 IP address assigned to Ethernet interface 192 168 11 3 3 Firmware file name I KVM v0 8 4 img 4 Start firmware upgrade T ARP broadcast 1 erh cccp 00 0 29 6150 za TFIP from server 192 168 1111 100 our IP address is 192 168 11 3 Filename I KVM v0 8 4 img Load address 0x500000 oe isierersrececececerererececerecererecececececececececececececececococasesaseses aces esac esac aces ese tesa eT ace ater ere eecerererererd mH done Bytes transferred 10358260 9e0df4 hex Filename I KVM v0 8 4 img Version v0 8 4 Description Digi Passport I KVM firmware Build 2008 10 24 11 27 M0 orf Blocks Z Blocks 0 ID 2 424 1178700 159416371 good checksum Blocks 1 ID 3 1179124 9179136 1211209893 good checksum Un Protected 17 sectors Erase Flash from Ox80080000 to Ox8029ffff Erasing sector 4 ok Erasing sector 5 ok Erasimg Sector 19 oero ok Erasimg Sector 20 ooo Ok done Erased 1 7 sectors CODY tO FlaSM s Ox8019fc4c done Un Protected 80 sectors Erase Flash from 0x802a0000 to Ox80c9ffff EraSimg S ctor Zi so Ok EPaSimMme S CtOr 22 ooo OK Erasing sector 99mm Ok Erasing sector 100 ok done Erased 80 sectors Copy to Flash 0x80774000 done Figure 10 9 Firmware upgrade process CLI guide System statistics After finishing the firmware upgrade process the program will display the menu again along with a success m
22. Mouse Control Keyboard Control Video Settings Virtual Media Save Calibrate All Cancel Figure 7 11 Video settings dialog Video settings This dialog provides access to all of the key video settings that determine image quality and link performance Threshold The threshold is effectively a noise filter that differentiates between valid video signals and background noise or interference This has the effect of reducing unnecessary video signals between the I K VM and the remote system thus improving performance Phase The phase setting adjusts the alignment of the host video output and the remote system video display to achieve the sharpest image Horizontal position Determines the horizontal position of the host screen image within the viewer window Vertical position Determines the vertical position of the host screen image within the viewer window Colour brightness amp contrast Provides manual sliders and also an automatic setting button to optimize these important video constituents for the current host and connection speed Calibrate all Click to determine the optimum settings for all aspects of video the video connection from the host system 77 78 Display Activity Indicates the level of video activity currently in progress Current UM drive None Single Mouse Mode Viewer clipboard 1024x768 jpg 1 file Create UM Drive Resync Mouse i Refresh Screen For Virtual CD Virtual Floppy and Virtu
23. administration This parameter determines whether the SSH console service is enabled or not It is implemented by adding or changing the IP filtering rule as follows Status Interface Option 1P address Port Chain rule mask Disable all Normal 0 0 0 0 0 0 0 0 22 DROP Enable all Normal 0 0 0 0 0 0 0 0 22 ACCEPT For more information refer to the section IP filtering within this document HTTP This parameter determines whether Web service through HTTP is enabled or not It is implemented by adding or changing the IP filtering rule as follows Status Interface Option IP address Port Chain rule mask Disable all Normal 0 0 0 0 0 0 0 0 22 DROP Enable all Normal 0 0 0 0 0 0 0 0 22 ACCEPT If it is set as the Redirect to HTTPS the request of web interface through HTTP is lead to the request through HTTPS For more information refer to the section IP filtering withiin this document HTTPS This parameter determines whether Web service through HTTPS is enabled or not It is implemented by adding or modifying the IP filtering rule as follows Status Interface Option 1 address Port Chain rule mask Disable all Normal 0 0 0 0 0 0 0 0 HTTPS port DROP Enable all Normal 0 0 0 0 0 0 0 0 HTTPS port ACCEPT 95 Stealth mode If this parameter is set as Enable the I K VM does not reply to the request instead of refusing when a client tries to co
24. network Therefore it is imperative that the selected IP address be both unique and valid in a network environment Note The static IP address 192 168 1 x will never be assigned by and ISP Internet Service Provider IP addresses using this form are considered private Actual application of the I K VM Series may require access to public network such as the Internet If so a valid public IP address must be assigned to the user s computer A public IP address is usually purchased or leased from a local ISP Subnet mask A subnet represents all the network hosts in one geographic location such as a building or local area network LAN The I K VM will use the subnet mask setting to verify the origin of all packets If the desired TCP IP host specified in the packet is in the same geographic location on the local network segment as defined by the subnet mask the I KVM will establish a direct connection If the desired TCP IP host specified in the packet is not identified as belonging on the local network segment a connection is established through the given default gateway Default gateway A gateway is a network point that acts as a portal to another network This point is usually the computer or computers that control traffic within a network or a local ISP Internet service provider The I K VM uses the IP address of the default gateway computer to communicate with hosts outside the local network environment Refer to the network admini
25. s computer 4 Runa terminal emulator program i e HyperTerminal Set up the serial configuration parameters of the terminal emulation program as follows 9600 Baud rate Data bits 8 Parity None Stop bits 1 No flow control 18 5 Press the ENTER key 6 Enter user name and password to log into the I K VM The factory default user settings are as follows Login root Password dbps Login admin Password admin I KVM login root Password root I KVM 192 168 161 5 login admin Password Welcome to 7 Upon authentication the corresponding user interface is displayed Either the text menu driven interface or the CLI are initially provided for configuration For more information refer to the section User Administration within this document 8 Ifthe default interface is set up as text menu the menu screen below will appear Welcome to Digi Passport I KYM configuration menu Hostname I kKVM Current timet Fri 09 Jan 2009 11 33 26 0600 FW Rev t v1 0 0rc2 Bios Rev v0 8 3 MAC addr 00301395377 3277302 IP addr 10 9 101 30 Select menu 1 Network configuration 2 KYM amp Serial port 3 System status amp logs 4 System administration Chjelp CsJave Calpply elxJit CqaJuit COMMAND gt M Figure 2 7 Main menu screen From the main menu screen the user may select the menu item for the configuration of the I KVM parameters by typing the menu number and pressing the ENTER key
26. select the Digi Device Discovery program This program uses the Digi proprietary Advanced Digi Discovery Protocol ADDP to discover all devices on a network Once discovered devices can be viewed and configured Start the program and click the correct device to configure The Digi Device Discovery program knows the default password for the I K VM unit If the password has been changed from the default dbps a prompt for entering the password is displayed Configure the IP address Once the Digi Passport is configured with a valid IP address log in to the Web user interface with username admin password admin Locator LEDs Getting started The I K VM unit can be physically located easily by using the Locator LED feature If this feature is enabled the I K VM will blink two LEDs labeled Status and Server together so user can recognize which I K VM unit he or she is accessing currently 1 Enable Locator LEDs Log into the Web interface as admin or root Inthe Web interface menu click Activate Locator LED and the locator LED will blink 2 Turn Off locator LEDs Inthe Web interface click Deactivate Locator LED 23 24 Network configuration Network configuration C H A PTER 3 IP Configuration The I KVM requires a valid IP address v4 v6 to operate within the user network environment If the IP address is not readily available contact the system administrator to obtain a valid IP address for the I KVM N
27. selected location which is one of NFS server and user space Local Helps to browse the exported file at local machine if location is local machine 91 92 To export the current configurations 1 2 3 4 Select the location to export to Select the encrypting option Type the file name Click the Export button To import the exported configurations 1 A WwW N nn Select the location to import from Select the configurations to import Select the encrypting option Select the file to import from the file selection list box if location is not local machine nor factory default Select the file to import by clicking browse button if location is local machine Click the Import button System administration Security Profile The security policy for the K VM management is configured in this section It contains configuration options the system level of security individual services and network security The figure below shows the default Security Profile Configuration management System administration Configuration management Configuration export Location User space usr2 Local machine primary NFS server Encrypt Yes File name syscm Configuration import Location User space usr2 Local machine primary NFS Server Factory default Configuration selection Configuration C Select all C Network configuration Including IP configuration O KvM configuration EC
28. specific serial port the administrator may check lt lt Everyone gt gt access control and add them to user list with option unchecked If the administrator wants to specify the users who are allowed to access a specific serial port he may uncheck lt lt Everyone gt gt access control and add them to user list with option checked Enable Disable multiple session The user can enable disable multiple connections to the serial port 49 Serial Port Configuration Session display mode server output View all data to a serial port from a remote connection user input View all data from a serial port to a remote connection both See all data transmitted or received through a serial port Display data direction arrows Enable Disable Displays arrows to indicate the direction of data to or from the server When the second user accesses the port the global Port escape menu is displayed Alert configuration Email agent process sends email depending on email alert configurations and SNMP agent process transfers a SNMP trap to an administrator depending on SNMP trap configurations when the events related to the serial port such as port login The configuration parameters for alert configuration are as follows Enable Disable email alert for port login Title of email Recipient s email address Enable Disable SNMP port login trap Trap receiver settings 50 Serial port configuration Alert configuration
29. the I K VM unit and the serial ports configmenu A menu for system administrators to configure the I K VM unit It has essentially the same functionality as the web interface for configuring a unit connect Connects to local port 115 Utilities Utilities e Shell and Shell utilities ash bash echo env false grep egrep fgrep more pwd sed sh clear e File and Disk utilities cat chmod chown cp dd df du find gunzip gzip In Is Isz Irz mkdir mknod mount mv rm rmdir scp head tail tar touch vi umount zcat e System utilities date free hostname id init insmod kill killall Ismod modprobe poweroff ps reboot reset rmmod sleep stty telnet uname who whoami e Network utilities tftp ip ifconfig iptables ip6tables netstat ping ping6 route ssh Important File Locations Config Files 116 I KVM unit has several files that are important for administrative use This section lists and briefly describes some of the files that the root user or system administrator may wish to view monitor and edit Config files are located directory usr2 conf There are 6 directories for different type of configurations e usr2 conf kvm config files for configure I KVM viewer e usr2 conf network config files for network setting for I KVM unit e usr2 conf serial config files for serial port settings e usr2 conf statistics config files for system statistics setting e usr2 conf sysadmin config files for system admini
30. then enter then release all keys equivalent definition is tSCROLL SCROLL SCROLL SCROLL 1 ENTER 1 ENTER Using abbreviations To reduce the length of the key definitions any unique abbreviation for a key can be used For example scroll scr and even sc all provide an identifiable match for Appendix C Hotkey sequence codes ScrollLock whereas en could not be used because it might mean Enter or End ent would be suitable for Enter Note Hotkey sequences and abbreviations are not case sensitive 123 124 ADIE P 9000100
31. 0 14 K M user info IN4DYN 123 INADYN Started INADYN version 1 96 2 dynamic DNS updater Jan 1 09 00 15 K M user warn INADYN 123 I INADYN IP address for alias won dyndns biz needs update to 75 61 62 246 Jan 1 09 00 15 K M user warn INADYN 123 INADYN Alias won dyndns biz to IP 75 61 82 246 updated successful Jan 1 09 37 20 I K M authpriv notice webs root login Jan 1 10 03 30 I KYM user info applyconf The IPy4 filtering has been changed Clear Refresh Save to flash Save amp apply JI Cancel Figure 8 2 System log configuration and view System administration System administration C H A PTER 9 The I KVM utilizes two user profile types to manage accessibility to different functions These two levels of user types include system admin and user The system admin group has full read write access of the I KVM configuration The system admin can view or edit all I KVM configurations as well as use the K VM without any limitations The user group has no right to modify any of the I K VM configurations The user may access the serial port and KVM connection screen on the web interface to connect to the serial ports and KVM viewer In addition to the local authentication method the I K VM also supports an authentication server based method for user authentication If a remote authentication method i e RADIUS TACAS and Kerberos LDAP is enabled the I K V
32. 7600 115200 and 230400 The factory default setting is 9600 Data bits Data bits can be 7 bits or 8 bits The factory default setting is 8 bits Parity Parity can be none even or odd The factory default setting is none 45 Serial Port Configuration Port logging 46 Stop bits Stop bits can be 1 bit or 2 bits The factory default setting is 1 bit Flow control Flow control can be none software Xon Xoff or hardware RTS CTS The factory default setting is none DTR behavior The DTR output behavior of a serial port can be configured as always high always low or High when open If the DTR behavior is set to High when open the state of the DTR pin will be maintained high as long as the TCP connection is established With the port logging feature while in console server mode the data sent through the serial port is stored to MEMORY or a mounting point on an NFS server It can also be stored to a SYSLOG server at the same time The configuration parameters for port logging are as follows Port logging Direction to log Time stamp to port log Port log to remote syslog server SYSLOG facility for port logging Port log to NFS Serial port configuration Filename to log on NFS Port logging Server Port logging Basic configuration Port management Port title Host mode configuration Serial port parameters Port logging Port logging Enable Direction to log Serv
33. IP datagrams for which no problems were encountered to prevent their continued processing but which were discarded for example for lack of buffer space This counter does not include any datagrams discarded while awaiting reassembly InDelivers Specifies the number of received datagrams delivered OutRequests Specifies the number of outgoing datagrams that an IP is requested to transmit This number does not include forwarded datagrams 103 104 OutDiscards Specifies the number of transmitted datagrams discarded These are datagrams for which no problems were encountered to prevent their transmission to their destination but which were discarded for example for lack of buffer space This counter would include datagrams counted in Datagrams Forwarded if any such packets met this discretionary discard criterion OutNoRoutes Specifies the number of datagrams for which no route could be found to transmit them to the destination IP address These datagrams were discarded This counter includes any packets counted in Datagrams Forwarded that meet this no route criterion ReasmTimeout Specifies the amount of time allowed for all pieces of a fragmented datagram to arrive If all pieces do not arrive within this time the datagram is discarded ReasmReqds Specifies the number of datagrams that require reassembly ReasmOKs Specifies the number of datagrams that were successfully reassembled Reasm Fails Spec
34. M protocol Press Ctrl X several times to cancel wupdate b dialup ttl B0100000023be50 Failed to upgrade firmware Figure 9 12 Firmware upgrade failure message 99 100 System statistics System Statistics C H A PTER 1 0 The I KVM Web interface provides system statistics menus The user can use these menus to access statistical data and tables stored in the I KVM memory Network interfaces statistics and serial ports statistics display statistical usage of the link layer lo eth and serial ports IP ICMP TCP and UDP statistics display usages of four primary components in the TCP IP protocol suite Network interfaces statistics Network interfaces statistics display basic network interfaces usage of the I K VM lo and eth0 lo is a local loop back interface and eth0 is a default network interface of I KVM Network Interface Statistics System statistics Network Interface Statistics Refresh rate none Interface lo etho Receive bytes 942814514 842347057 packets 808728376 24665 errs drop fifo frame compressed multicast Transmit bytes packets errs drop fifo colls carrier compressed Figure 10 1 Network interfaces statistics 101 Serial ports statistics Serial ports statistics display the usage history of serial port baud rate configurations and port s pin status On Off Serial Ports Statistics System statistics Serial Ports Statistics Refresh rate none
35. M will confirm the username and password with the remote authentication server and check the response from the server The users can also use the cascaded authentication method such as remote authentication first and then local authentication if the remote authentication fails or vice versa The users can configure the I K VM s device name date and time settings the current user s password and import export configurations in this menu group The users can also upgrade the firmware of the I K VM using the web interface remote consoles or serial console User administration The I K VM manages three user level groups Access of the configuration interfaces and of the serial ports is based on the user s group level User general user group Users who belong to this group can access serial port and KVM 83 84 Notes Users in this group can use the serial port and KVM connection menu on Web interface Users in this group cannot access any configuration menu or CLI System admin system administrator group The System Administrator group can access the configuration menu through the Web interface or console They can change all the configuration parameters of the system itself The System Administrator group can access the CLI as well as execute the program The CLI allows the group access to the configuration Root system super user A System Super User has all the privileges that users in the Syste
36. Server Alert configuration Basic configuration Port management Port title Host mode configuration Serial port parameters Port logging User access control Alert configuration Email alert configuration Email alert for port login Disable Title of email Console Port Notif Recipient s email address SNMP trap configuration SNMP trap for port login enable Trap receiver settings Enable IP address Community Version publ vi Figure 4 6 Alert configuration Enable Disable email alert for port login This parameter defines whether the email is sent when a user logs in and out the serial port Title of email This parameter defines the title of email Recipient s email address This parameter defines to whom the email is sent Enable Disable port login trap This parameter defines whether the SNMP trap is transferred when a user logs in and out the serial port Trap receiver settings For more information refer to the section SNMP Configuration within this document 51 52 KVM Configuration KVM Configuration C H A PTER 5 When controlling a host computer using the locally connected keyboard video monitor and mouse it is possible to use the VNC viewer or JRE browser if the host computer is networked This section describes how to configure viewer parameters and user access control properties KVM configuration KVM amp Serial port KVM configuration Basic configuration
37. TO algorithm in use The Retransmission Algorithm can have one of the following values 0 CONSTANT Constant Time out 1 RSRE MIL STD 1778 108 System statistics 2 VANJ Van Jacobson s Algorithm 3 OTHER Other RtoMin Specifies the minimum retransmission time out value in milliseconds RtoMax Specifies the maximum retransmission time out value in milliseconds MaxConn Specifies the maximum number of connections If the maximum number is set to 1 the maximum number of connections are dynamic ActiveOpens Specifies the number of active opens In an active open the client is initiating a connection with the server PassiveOpens Specifies the number of passive opens In a passive open the server is listening for a connection request from a client AttemptFails Specifies the number of failed connection attempts EstabResets Specifies the number of established connections that have been reset CurrEstab Specifies the number of currently established connections InSegs Specifies the number of segments received 109 OutSegs Specifies the number of segments transmitted This number does not include retransmitted segments RetransSegs Specifies the number of segments retransmitted RetransSegs Specifies the number of errors received OutRsts Specifies the number of segments transmitted with the reset flag set TCP Statistics System statistics TCP Statis
38. With the SNMP configuration panel the user can configure MIB II System objects access control settings and TRAP receiver settings The manager configured in this menu 29 30 can perform both information exchange and action control The figure below shows a SNMP configuration screen via a web interface Digi Passport I KVM gt By my oe GQETOQ gt Digi Passport I KVM Configuration and Management PED 151 PASSPORT gt ex nook SNMP Configuration Network SNMP Configuration Network Network Basic Settings sysContact administrator SENP Cont natin sysName Digi_Passport_I KVM Dynamic DNS Configuration apao SMTP Configuration my location IP Filtering sysService 7 Syslog Configuration AuthenTrap Disable NFS Configuration PowerOntrap Disable KVM amp Serial port LoginTrap Disable E System status amp logs Access control settings NMS System administration Enable IP address Community Permission System statistics Activate Locator LED Apply Changes Login as a different user Logout Reboot Trap receiveer settings Enable IP address C Save to flash _ Save amp apply Cancel Figure 3 2 SNMP configuration MIB II System objects configuration MIB II System objects configuration sets the System Contact Name Location and Authentication failure traps used by the SNMP agent of the I KVM These settings provide the values used for the MIB II sysN
39. al Disk mapping functions use the UNC viewer s Virtual Media menu use F8 U to access Mouse Control Keyboard Control Video Settings Close Figure 7 12 Virtual media dialog Virtual media The I KVM Virtual Media feature is similar to virtual media option on VNC viewer window options section above The difference is that the user can simply locate and copy the required file folder or drive to the clipboard and within the VNC viewer window click the Controls button The user can see copied file folder or drive within the dialog Click Create VM Drive to announce file availability to the host computer whereupon a popup will confirm that the new virtual media disk is built Note USB cable must be connected from I K VM to host to use virtual media function A Shared access mode e Private access mode i Information KVM device information dialog appears as below Logged on users admin Video mode vesa 800 x 600 60Hz Mouse motion Windows XP Enhanced Mk 2 Figure 7 13 Information dialog 79 80 System status and log System status and log C H A PTER The I KVM displays the system status and the log data via a Status Display Screen This screen is to be used for management purposes System status data includes the device name serial number hardware version firmware version bootloader version and the network configuration of the I KVM The user may configure the location where the log
40. ame sysContact sysLocation snmpEnableAuthenTraps snmpEnable PowerOnTrap and snmpEnableLoginTrap Object Identifications OIDs Brief descriptions of each OIDs are as follows sysContact Identification of the contact person for the managed system I KVM and a description of how to contact the person sysName Name used to identify the system By convention this is the fully qualified domain name of the node m sysLocation The physical location of the system e g Room 384 Operations Lab etc Network configuration m sysService Read Only A series of values separated by commas that indicate the set of services that the system provides By default I K VM only supports an Application 7 service level EnableAuthenTrap Indicates whether the SNMP agent process is permitted to generate authentication failure traps The value of this object overrides any configuration information as such it provides a means whereby all authentication failure traps may be disabled EnablePowerOnTrap Indicates whether the SNMP agent process is permitted to generate power on traps EnableLoginTrap Indicates whether the SNMP agent process is permitted to generate system login traps If support is needed for adding or modifying MIBs contact Digi technical support For more information about the MIBs and SNMP see the RFCs 1066 1067 1098 1317 1318 and 1213 Access control settings Access Control defines access
41. amp apply Cancel System status amp logs System administration System statistics Activate Locator LED Apply Changes Login as a different user Logout Reboot Copyright 1996 2008 Digi International All rights reserved Figure 3 4 Dynamic DNS configuration SMTP configuration 34 The I K VM can send an email notification when the number of system log messages reaches a certain value and or when an alarm message is created due to an issue with serial port data The user must configure a valid SMTP server to send these automatically generated emails The I K VM supports three SMTP server types SMTP without authentication SMTP with authentication m POP before SMTP The figures below shows examples Required parameters for each SMTP configuration include SMTP server name SMTP mode m SMTP user name Network configuration SMTP user password m Device mail address SMTP configuration Network SMTP configuration SMTP enable SMTP server smtp server address 7 SMTP mode SMTP with authentication Username user smtp server Password Password confirm leoce Device mail address user smtp server a Save amp apply Figure 3 5 SMTP configuration SMTP configuration Network SMTP configuration SMTP enable Enable SMTP server smtp server address SMTP mode SMTP with authentication Username POP before SMTP SMTP wi
42. ardless of the inactivity setting Port escape sequence When users connect to a port they will get the port escape menu by entering the port escape sequence In order to send port escape sequence enter the port escape sequence character twice or enter the port escape sequence character at the port escape menu Port break sequence The user can send a break signal to the serial port by entering the break sequence that is configured as the port break sequence in the configuration menu Serial port parameters 44 To connect the serial device to the I K VM serial port the serial port parameters of the I KVM should match exactly to that of the serial device attached The serial port parameters are required to match this serial communication The parameters required for the serial communication are Baud rate Serial port configuration Data bits Parity Stop bits Flow control DTR behavior Serial port parameters Server Serial port parameters Basic configuration Port management Port title Host mode configuration Serial port parameters Baudrate 9600 Data bit 8bits Parity None Stop bit 1 bits Flow control None DTR option Always high Port logging User access control Alert configuration Figure 4 3 Serial port parameters configuration Baud rate The valid baud rates for the I K VM are as follows 75 150 200 300 600 1200 2400 4800 9600 19200 38400 5
43. awTCP SSH and Telnet Serial port parameters The user can configure basic serial port parameter Port management 42 The Port management page displays managing port menu Enable Disable port Resetting port Setting the port to factory default Port management Server Port management Basic configuration Port management Enable diable this port Enable Reset this port Set this port to factory default Set Port title Host mode configuration Serial port parameters Port logging User access control Alert configuration Figure 4 1 Port management Serial port configuration Host mode configuration I KVM supports only console server host mode This mode utilizes a TCP server socket which listens for a Telnet or SSH client connection Once a Telnet or SSH client session is opened the data stream can be sent back and forth to the device connected to the serial port Host mode configuration Server Host mode configuration Basic configuration Port management Port title Host mode configuration Host mode Console server TCP port 1024 65536 7001 Protocol SSH Inactivity timeout 1 3600 0 for 0 unlimited Port escape sequence Ctrl Z Port break sequence break Serial port parameters Port logging User access control Alert configuration Figure 4 2 Host mode configuration Console server mode configuration Listening TCP port number The user can also access a serial por
44. bar only appears when VNC client software is used Hover the mouse at the top of the VNC Viewer window to see the VNC Viewer Toolbar New Connection Creates a new VNC Viewer connection to a remote server in another window kl Save Connection Saves the configuration settings for the current connection into the VNC Address book Close Connection Closes the current VNC Viewer connection Al Options Displays the VNC Viewer Properties dialog EJ Full Screen Mode Uses the entire screen to display the remote sever desktop Click again to exit Full Screen Mode E Send Ctrl Alt Delete Sends a Ctrl Alt Delete command to the remote server You can also press Shift Ctrl Alt Delete B Send Files to Server Sends a file from the local machine to the remote server You can also copy files to the clipboard E Fetch Files from Server Fetches a file from the remote server to the local machine Files offered by the server are also placed on the clipboard and can be pasted This icon is green when files are available ea Connection Information Displays the settings for the current VNC connection including line speed etc Connection Encrypted Displays whether or not the VNC connection is encrypted Al Connection Speed Displays the connection speed of the current VNC connection and indicates when there is network activity 71 72 VNC viewer window options Click the VNC icon in the top left corner of th
45. ccess controls are different from those of lt lt Everyone gt gt should be added in the user list or access list of user access control Users should be not only identified by I K VM or authentication server according to authentication configuration but also permitted by I K VM according with user access control in order that they may connect to a serial port For more information refer the section Authentication within this document Serial port configuration User access control Server User access control Basic configuration Port management Port title Host mode configuration Serial port parameters Port logging User access control Access Type Read Write Control Log Break lt lt Everyone gt gt wv v wv z usert ma i B E z 1 8 8 Enable disable multiple session Enable Session display mode Server output Display data direction arrows Disable Alert configuration Figure 4 5 User access control configuration for serial ports User access control Access type consists of Read Write Control Log Break control The access controls of lt lt Everyone gt gt are applied to all the users who are not added to user list or access list of user access control The users should be added to user list or access list if their access controls do not match lt lt Everyone gt gt access controls If the administrator wants to specify users who must be restricted from accessing a
46. des ssseeseeeeeee 121 Permissible Key presses sssccsssscssssscscsscsscessesceesens 121 Creating macro SEQUENCES e ssossssesssesssocssoossosesssesssese 122 Digi contact information For more information about Digi products or for customer service and technical support contact Digi International To Contact Digi International Use by Mail Digi International 11001 Bren Road East Minnetonka MN 55343 U S A World Wide Web http www digi com support email http www digi com support Telephone U S 952 912 3444 or 877 912 3444 Telephone other locations 1 952 912 3444 or 877 912 3444 Product Overview Product Overview C H A PTER 1 The Passport I KVM is a secure single port KVM keyboard video and mouse over IP and l port serial console access server for remote host computer access via IP network The compact form factor and strong security features of Passport I K VM makes it an ideal remote server management solution for distributed computing environment with small installation space such as Kiosk ATM remote branch offices Also its non blocked access capability makes it a perfect solution for data center applications that require 24 7 non blocked access from internal or external network The list of the main features I K VM supports is as below m Hybrid server management solution with single port KVM over IP and l port serial console access server
47. e viewer window or press F8 to display the window options All menus are similar to VNC toolbar except Virtual Media le 4 Move Size Minimize Maximize Close Alt F4 Full screen Single mouse mode P Ctrl Alt Send F8 Send Ctrl Alt Del Refresh Screen Virtual Media New Connection Options Connection Info About Figure 7 6 Viewer window menu When Virtual Media menu is clicked dialog appears as below The user can send disk image or folder or file to host The virtual media would be send to server by USB connection The user can see USB connecting dialog on the window screen when connected KVM viewer client TE kvm calles S PYRO eee Remove From List Properties Windows Professional x64 Edition Figure 7 7 Window option menu virtual media dialog Note USB cable must be connected from I K VM to host to use virtual media function KVM toolbar icons At the top of the VNC Viewer window will be the KVM Toolbar icons 2A Sa Pls QI ami Resync mouse Ensures that the mouse pointer which is moved and the mouse pointer on the host system are correctly synchronized 73 74 computer The user should click this button when first connecting of changing host window resolution When clicked Calibrate dialog appears Calibrate Calibrating the mouse and video settings will take several seconds
48. ed A DHCP sever assigns IP addresses dynamically from an IP address pool which is managed by the network administrator This means that the DHCP client i e the I K VM receives a different IP address each time it boots up The IP address should be reserved on Network configuration the DHCP server side to assure that the user always knows the newly assigned I K VM address In order to reserve the IP address in the DHCP network the administrator needs the MAC address of the I K VM found on the label sticker at the bottom of the IL KVM Setting Reuse old IP at bootup time on DHCP failure as Enable if the I K VM fails to receive an IP address from the DHCP server on booting up the users can set the IP configurations of the I K VM with the previous IP configurations and connect it to the network When the lease expires the I K VM requests a renewal Simple Network Management Protocol SNMP Configuration The I KVM has the SNMP Simple Network Management Protocol agent supporting SNMP vl and v2 protocols Network managers like NMS or SNMP Browser can exchange information with I K VM as well as access required functionality SNMP protocols include GET SET GET Next and TRAPs With these functions a manager can be notified of significant events TRAPs query a device for more information GET and make changes to the device state SET SNMPv2 adds a GET Bulk function for retrieving tables of information and security functions
49. ent VNC viewers available for wide range of platforms including Windows 98 2000 2003 XP Vista Unix Linux Mac OS X Palm OS Windows CE iPhone by 3rd party software only KVM over IP features Non blocked server access up to 4 simultaneous users Adaptive video compression algorithm for highly efficient network bandwidth use Virtual Media support for file transfer to remote servers Private shared mode switching User access privilege support International keyboards support United States United Kingdom Japan Spain France Germany Italy Netherlands Belgium Norway Sweden Denmark and Switzerland Product Overview Serial console features Serial port redirection using Telnet SSH or Raw TCP Keyword based event alert using SNMP and or SMTP Local and Remote Port logging using Syslog and or NFS Security Hardware based AES 128 bit encryption of keyboard mouse and video data m Rule based IP address filtering m Strong security support based on PAM SSH HTTPS RSA AES encryption m User Group management with access control a Remote user authentication support LDAP Radius TACACS Kerberos Power requirements m Input 5 12VDC Power consumption 5 78 Watt Locking type power connector m Server powered design through USB port of the server Optional DC power supply Regulatory approvals m FCC 7 CE 7 UL Environmental requirements Operating Temperature 0 50 C Storage Temperature
50. er output Time stamp to port log Disable Port log to remote syslog server Disable SYSLOG facility for port logging LOCALO Port log to NFS Disable Filename to log on NFS Port log User access control Alert configuration Figure 4 4 Port logging configuration Port logging This parameter defines whether to enable or disable the port logging feature The factory default setting is disable Direction to log This parameter defines whether the incoming and the outgoing data are logged with direction arrows or not The factory default setting is Server output 47 Serial Port Configuration Time stamp to port log If Time stamp to port log is enabled every line of log data includes time stamp Factory default setting of this parameter is disable Port log to remote syslog server Enable to store port logs to a SYSLOG server SYSLOG facility for port logging The user can select facility LOCO LOC7 for log level to be displayed in log files Port log to NFS Enable to store port logs to NFS Filename to log on NFS Filename to be stored in NFS User access control 48 The user access control configuration can be used for restricting or permitting users who try to connect to a serial port of the I KVM The access controls of lt lt Everyone gt gt specifies the access control of all the users except the users who are added in the user list or access list of user access control Users whose a
51. erver should be displayed in the viewer WA VNC Viewer Properties Display Options Enable or disable scaling or full screen mode or change the colour depth used to render the remote desktop C REAL Display Inputs Connection Expert Scaling no scaling Scale to window size Custom scaling x Preserve aspect ratio C Full screen mode Enable toolbar Adapt to network speed recommended Always use best available colour quality C use these settings for all new connections Figure 7 2 Viewer option display m No scaling Remote screen is displayed on the viewer at without any stretching or squeezing m Scale to Window Size Adjust the server screen image to suit the size of the viewer window Custom scaling Remote screen is scaled to fit a pre chosen scaling size or to fit a given size m Preserve Aspect Ratio The aspect ratio of the remote screen is maintained regardless of the viewer window size m Full screen mode The remote server screen is maximized to fit the viewer screen and may be displayed with scroll bars Enable toolbar The quick access toolbar is displayed at the top of the viewer window Refer to the figure Viewer screen below 65 66 Adapt to network speed recommended Viewer automatically select a balance between the number of colours displayed and viewer responsiveness based on the connection speed Best compression Best Quality All
52. essage I KVM runs an embedded Embedded Linux operating system The command line interface for configuration purposes is accessible only by the root and or administrator user By default the root and administrator user is connected to the command line interface CLI when accessing the I K VM unit through Telnet or SSH To gain access to the command prompt the root user uses the username root and the root password The default root password is dbps This chapter includes the Linux commands available on the embedded Linux operating system and the location of files useful to the root user for administrative purposes Back Up All Configuration Files Before Using Commands The root user should be aware that deleting or corrupting files may prevent the I KVM unit from booting properly Before editing any files be sure to back up configuration files Linux Commands This section lists various Linux commands available on the I K VM unit This is simply a listing of commands and does not detail what the commands do or give their particular parameters For more detailed command information see the man pages on a Linux system Commands for Applying Changes I KVM has a command that are very important for applying changes applyconf Immediately applies the configuration changes The configuration files are located in directory usr2 conf Commands for configuring I K VM unit and serial ports Several commands are used for accessing and configuring
53. etaxencsecevinersadecsenusyestees 89 Device name configuration cccccsceeseeeeeeees 89 Date and time Sets ss chacnsiivedaceasvecaenievascmnsenaies 90 Configuration management eceeeeeseeeeeeeeees 90 Security PROG 55 cgcxevintiateaenatnasaniiersaningesnaniaeie 93 Firmware upgrade osssustinnedin ksioscvonnstesdocavsaneastioes 96 System statistics sesssessseoesoosssosssossssesssosssoossosssssessosse 101 Network interfaces statistics ccccsceeseeeeeeeee 101 Serial ports statistics ccceccceceeseesteceteeeteeeeees 102 TP statisti Snaiineniunenasn nannan eiaa 102 ICMP Statistics sacs ncassccvecaccasnivreratenseaioveseieeceumrie 105 TOP Statistics ss ccssasaccistassnccsaneshecenasticcastasxamananies 108 UDP Statistic Si cca jess ccdeacasscsduwspeccsastonsenseescetiienitans 111 Guide to the Boot loader program 006 112 Firmware upgrade Menu ccscecesceseeeseeeteees 112 CEI gide neenon eeaeee 115 Utilities ossssssssisssissssissssssossssseosssssssssssssisssssisssssssasssssisissises 116 Important File Locations sseseseesee seese 116 Contig PINGS cjsccssaivincensdissccaeancarsiasdecaminianstniacs 116 Appendix A Connections se ssesssesesooesoosssosssoesssoesooseso 117 Ethernet PIOUS 6 a vacesacccectexcesenveaconcssnaceveanieccenntees 117 Console and serial port pin outs 0 0 00 eee 118 Appendix B Well known port numbers s00008 119 Appendix C Hotkey sequence co
54. file is to be stored System status System status amp logs System status System information Device name Serial number Hardware version Firmware version Bootloader version MAC address Uptime IPv4 information IP mode IP address Subnetmask Gateway IPv6 information IP mode IP address Global IP address Site IP address Link Gateway DNS information Primary DNS Secondary DNS Figure 8 1 System status display I KVM won0 1 won0 ih v0 0 1 won won1 0b 00 01 95 A3 87 BD 14 59 57 up 5 59 load average 0 41 0 35 0 35 Static IP 10 0 9 31 255 255 0 0 10 0 0 1 Static IP fecO 202 64 fe80 201 95ff fea3 87bd 64 fecO 222 206 13 28 12 206 13 31 12 81 System log configuration 82 The I K VM provides both the system logging feature and the system log status display System log to SYSLOG server The system log data can be stored to the SYSLOG server System log to NFS server The system log data can be stored to the NFS server in addition to the SYSLOG server at the same time System log filename System log filename defines a log file to be logged to the NFS server The factory default filename is logs The figure below shows the configuration and system log view screen System logs System status amp logs System logs System log to remote syslog server Enable System log to NFS server Enable Y Filename to log on NFS logs System log Jan 1 09 0
55. he firmware is upgraded successfully the I K VM will reboot automatically If the firmware upgrade has failed the I KVM will display error messages as shown in the figure below and it will maintain the current firmware version 97 98 Welcome to Digi Passport I KVM configuration menu Hostname I KVM Current time Thu 01 Jan 1970 12 18 23 0900 F W Rev v1 0 0 Bios Rev v1 0 0 MAC addr 00 95 12 34 AB CD IP addr 192 168 60 30 Select menu 1 Network configuration 2 KVM amp Serial port 3 System status amp logs 4 System administration h elp s ave a pply e x it q uit COMMAND gt 4 System administration Select menu 1 User management 2 Authentication 3 Change password 4 Device name I KVM 5 Date amp Time6 Configuration management 7 Security profile 8 Firmware upgrade h elp s ave a pply e x it q uit COMMAND gt 8 Firmware upgrade Select menu 1 Firmware version v1 0 0 Read only 2 Start firmware upgrade h elp s ave a pply e x it q uit COMMAND gt 2 Would you like to upgrade firmware of this unit y n y Transfer the firmware image file by using Z MODEM protocol Press Ctrl X several times to cancel 2 B0100000023beS0eive B0100000023be50 Figure 9 11 Firmware upgrade using remote serial console System administration COMMAND gt 2 Would you like to upgrade firmware of this unit y n y Transfer the firmware image file by using Z MODE
56. he number of time to live TTL exceeded messages received or sent A time to live exceeded message is sent to the originating computer when a datagram is discarded because the number of routers it has passed through exceeds its time to live value InParmProbs OutParmProbs Specifies the number of parameter problem messages received or sent A parameter problem message is sent to the originating computer when a router or host detects an error in a datagram s IP header InSrcQuenchs OutSrcQuenchs Specifies the number of source quench messages received or sent A source quench request is sent to a computer to request that it reduces its rate of packet transmission InRedirects OutRedirects Specifies the number of redirect messages received or sent A redirect message is sent to the originating computer when a better route is discovered for a datagram sent by that computer InEchos OutEchos Specifies the number of echo requests received or sent An echo request causes the receiving computer to send an echo reply message back to the originating computer InEchoReps OutEchoReps Specifies the number of echo replies received or sent A computer sends an echo reply in response to receiving an echo request message System statistics InTimestamps OutTimestamps Specifies the number of time stamp requests received or sent A time stamp request causes the receiving computer to send a time stamp reply back to the originating computer InT
57. ial port configuration ssesssesssooesooessosssoesssesssosssosseo 41 Serial Port Configuration se seesseoesooessosssossssesssosssosseo 41 OVETVI EW sraxiserecestinestaiteunextanianatanatncannmemmnescsines 41 About basic and advanced serial port settings 41 Basic port configuration settings cesses 41 Port management 5 jn occssededacesvanceccsnansarenctianessedeseecane 42 Host mode configuration cccceeseeeseeseeeeeees 43 Serial port parameters ci ssisesacsoasssnnaesoustneieseezaeies 44 Port LOG SIG enni nia 46 User ACCESS CONO laani 48 Alert configuration seesessseessesersseessesssesresseeseeet 50 KVM Configuration seesseeeseoessoessossssesssocssoossoosssossssesssee 53 Connecti lS sisssccccccsscesceccecsseccsecestccsesscccusscassesdesccessaseccvesses 57 Table of Contents Serial port connection jpcsasesanceinasenaiasassingcsuntbeeateses 59 KVM viewer client sessoeseessessoesoessesooesossseseecooesosssessossoe 63 LSA E E T 63 B E AE 0 A TE 70 KVM toolbar icons sstiscasssccerctscccaerpioiinsisicctaminnasss 73 System Status and LOG cccscsscsisccessnoorsssecanscseccvevasaseeessenenas 81 System log configuration eccceseeeeeeereeeteees 82 System administration ccccccccssccccsccsscesscsseseesees 83 User administration cccccecceeseeesceeseeeteeeteeeees 83 PAUMMEN HM CAMOD cssbisscssspianteratisatise hundesebiancueaasnd 86 Change password woscedtaseies
58. ibility of managers to the K VM SNMP agent Only the manager set in this menu can access I K VM SNMP agent to exchange information and control actions If there is no specified IP address all IP address are defaulted to 0 0 0 0 a manager from any host can access the I K VM SNMP agent Trap receiver settings The Trap receiver defines managers which can be notified of significant events TRAP from the IK VM SNMP agent Management using SNMP The I K VM can be managed through the SNMP protocol using NMS Network Management System or SNMP Browser Before using the NMS or SNMP Browser the user must set the access control configuration properly so that the I K VM permits host 31 access where the NMS or SNMP Browser is executed The figure below shows a screen shot of a typical SNMP browser with MIB II OIDs of the I K VM SNMP agent O x File Edit View Operations Help ee ha HERREY EE cw kh eee A 2 Loaded MibModules A P means ap RFC1213 MIB Host 192 168 4 10 x Community ee e g ae aaa Set Value v Write Community amp internet ContextNa v ContextEnginelD directory amp mgmt Object ID iso org dod internet mgmt mib 2 system sysDescr amp mib 2 amp system 2 jesc Sent get request to 192 168 4 10 161 amp sysObjectiD sysContact 0 gt administrator sysUpTime gt putida Sent get request to 192 168 4 10 161 sysLocation sysName 0 gt HelloDevice 58100
59. ifies the number of datagrams that cannot be reassembled FragOKs Specifies the number of datagrams that were fragmented successfully FragFails Specifies the number of datagrams that need to be fragmented but couldn t be because the IP header specifies no fragmentation For example if the datagrams Don t Fragment flag was set the datagram would not be fragmented These datagrams are discarded System statistics FragCreates Specifies the number of fragments created IP Statistics System statistics IP Statistics Refresh rate Forwarding DefaultTTL InReceives InHdrErrors InAddrErrors ForwDatagrams InUnknownProtos InDiscard InDelivers OutRequests OutDiscards OutNoRoutes ReasmTimeout ReasmReqds ReasmOKs ReasmFails FragOKs FragFails FragCreates Figure 10 3 IP statistics ICMP Statistics The ICMP Statistics screen provides statistical information about packets connections using an ICMP protocol Definitions and descriptions of each parameter are described below InMsgs OutMsgs Specifies the number of messages received or sent InErrors OutErrors Specifies the number of errors received or sent 105 106 InDestUnreachs OutDestUnreachs Specifies the number of destination unreachable messages received or sent A destination unreachable message is sent to the originating computer when a datagram fails to reach its intended destination InTimeExcds OutTimeExcds Specifies t
60. ify users who must be restricted from accessing I K VM by viewer the administrator may check lt lt Everyone gt gt access control and add them to user list with option unchecked If the administrator wants to specify the users who are allowed to access a specific serial port he may uncheck lt lt Everyone gt gt access control and add them to user list with option checked Connections Connections C H A PTER 6 The I KVM provides a web based connection of serial port and KVM viewer which enables the user to access without remote port client and KVM viewer client Java Runtime Environment JRE must be installed on the client device The user can install from SUN homepage www sun com linked on connection page The user can also download VNC viewer client program from VNC homepage by clicking hyperlink VNC Viewer Client download www realvnc com For more information refer to the section KVM viewer client within this document Server Connection KVM connection VNC viewer JAVA applet Serial connection Serial connection Telnet Downloads VNC viewer client download www realvnc com Java Runtime Environment 6 download www sun com Figure 6 1 Connection 57 KVM connection The user can connect to the web based viewer by selecting VNC Viewer JAVA Applet link on connection page Connection windows appears as below and the login window appears when the OK button is clicked E3 VNC Viewer Connec
61. imestamp Reps OutTimestampReps Specifies the number of time stamp replies received or sent A computer sends a time stamp reply in response to receiving a time stamp request Routers can use time stamp requests and replies to measure the transmission speed of datagrams on a network InAddrMasks OutAddrMasks Specifies the number of address mask requests received or sent A computer sends an address mask request to determine the number of bits in the subnet mask for its local subnet InAddrMaskReps OutAddrMaskReps Specifies the number of address mask responses received or sent A computer sends an address mask response in response to an address mask request 107 ICMP Statistics System statistics ICMP Statistics Refresh rate InMsgs InErrors InDestUnreachs InTimeExcds InParmProbs InSrcQuenchs InRedirects InEchos InEchoReps InTimestamps InTimestampReps InAddrMasks InAddrMaskReps OutMsgs OutErrors OutDestUnreachs OutTimeExcds OutParmProbs OutSrcQuenchs OutRedirects OutEchos OutEchoReps OutTimestamps OutTimestampReps OutAddrMasks OutAddrMaskReps 4 4 4 0 0 0 0 0 0 0 0 0 0 3 0 3 0 0 0 0 0 0 0 0 0 0 Figure 10 4 ICMP statistics TCP statistics The TCP Statistics screen provides statistical information about packets connections using a TCP protocol Definitions and descriptions of each parameter are described below RtoAlgorithm Specifies the retransmission time out R
62. irst I KVM unit Run additional Ethernet cable from the Cascade port of the first KVM unit to the Ethernet port of the second I K VM units Repeat the same connection until the last unit is connected See figure 2 5 below Figure 2 5 Cascading multiple I KVM units Accessing the system console 16 There are several ways to access the I K VM These methods are dependent on whether the user is located at a local site or a remote site or whether s he requires a menu driven interface graphic menu system or CLI Command Line Interface System console Local users can connect directly to the system console port of the I K VM using the console Ethernet cable with the corresponding adapter Remote console Remote users who require a menu driven interface can utilize Telnet port 23 or SSH port 22 connections to the I K VM using a terminal emulator Getting started Web Remote users who want to use a web browser to configure the I KVM can connect to the I K VM using conventional web browsers such as Internet Explorer or Mozilla Firefox Note These methods require the user to be authenticated by the I KVM system Using the system console 1 Connect one end of the console Ethernet cable to the console port on the I KVM Figure 2 6 Connecting a system console cable to the I KVM 2 Connect to the user s computer with the RJ45 DB9 female adapter 3 Connect the other end of the cable to the serial port of the user
63. m Administrator group have when connected to the serial port or KVM A System Super User can access the Linux CLI A System Super User has full access to modify the CLI system Only one user can be identified as the A System Super User The user name cannot be changed The factory default user names and the passwords are System super user Login root Password dbps System administrator Login admin Password admin The user groups and their I K VM access privileges are summarized in the table below Table 9 1 User groups and their privileges Group Super user System Users administrator Default User name Root Admin Default configuration CLI Text menu User interface CLI CLI System administration Group Super user System Users administrator Interface Program Text menu Text menu Text menu SSH public key upload Yes Yes Yes CLI access Yes Yes Yes Configuration text menu access Yes Yes Yes Web UI Access Yes Yes System parameter Yes Yes No Change user Edit Removal Yes Yes No The user may access only the connection work space for the serial port KVM Note The figure below shows the initial user administraton web interface User Management System administration User Management Current local users i F User name User group Shell useri User Configuration menu admin System admin CLI root Root CLI Add Remove
64. mouse To replicate the middle mouse button press the lest and right button simultaneously Rate limit mouse events When enabled the mouse position will be sent less frequently to the remote server This can be useful for slow modem connection s because bandwidth is reduced However it can result in a noticeable jerkiness to mouse pointer movement Share clipboard with server Any text that is cut or copied to the Windows clipboard or the server and vice versa This allows cut and paste to and from the server and vice vera Enable file transfer Allows the user to send files from the viewer to the server Menu Key Allows the user to alter the function key usually F8 that displays the option menu within the VNC Viewer window Choose None to disable this feature 67 68 The Connections tab allows configuration the connection to the remote server VW VNC Viewer Properties Connection Options ger Enable or disable connection sharing or HTTP tunnelling support Display Inputs Connection Expert Shared connection do not disconnect other viewers Use single sign on if the VNC Server supports it Proxies Do not use a proxy recommended oO Use Microsoft Internet Explorer proxy settings Use these proxy settings C use these settings for all new connections C Ce Coe Figure 7 4 Viewer option connection Shared connection do not disconnect other viewers When enabled the VNC Viewe
65. n Note Before accessing the I KVM Web management page the user must check the I KVM IP address or resolvable Hostname and Subnet mask settings Getting started Digi Passport I KVM fey Oy wey R710 GSrOQ My 5 Dial Digi Passport I KVM Configuration and Management Sie Pasaron gt User authentication required Login please User ID Password Login Copyright 1996 2008 Digi International All rights reserved Figure 2 9 Login screen of the I KVM Web Management The figure below shows the user homepage of the I KVM Web management interface A menu bar is provided on the left side of the screen The menu bar includes the uppermost configuration menu groups Selecting an item on the menu bar opens a tree view of all the submenus available under each grouping Selecting a submenu item will allow the user to modify parameter settings for that item Every page will allow the user to Save to flash Save amp apply or Cancel their actions After changing the configuration parameter values the users must select Save to flash to save the changed parameter values to the non volatile memory To apply all changes made the user must select Apply Changes This option is available on the bottom of the menu bar Only when the user selects Apply changes will the new parameter values be applied to the I K VM configuration The user also can select Save amp apply to save parameters and apply changes in
66. nds 5 3600 Mount path l Save to flash Save amp apply Cancel Figure 3 9 NFS server configuration Required parameters for each NFS server configuration include NES server IP address Timeout Retry interval Mount path Timeout specifies time out value for I K VM to check how long it will wait for the response from the NFS server if NFS server is not responding for some time If there is no response from the NFS server during the Timeout interval I K VM releases unmount a local directory which is mounted to the directory of NFS server mounting path on NFS server and changes data logging location to memory automatically if it is needed Retry interval specifies time intervals for I K VM to check whether connecting to NFS server is possible The I K VM checks whether connecting to NFS server is possible for every Retry interval And if connection to the NFS server is possible I K VM remounts mounting path on NFS server on its local directory again and changes data logging location to NFS server automatically if it is needed Serial port configuration Serial port configuration C H A PTER 4 Serial Port Configuration Overview This chapter shows how to configure the serial ports It reviews basic and advanced serial port settings which can be modified from the factory default settings as needed Key serial port configuration settings include whether the port is enabled or disabled the protocol a
67. ng the connection i e Telnet or SSH connection status the port 59 number and the port title On the bottom of the screen there are hot key buttons accessible to connect disconnect or send break http 10 0 9 31 JAVA Telnet Applet Windows Internet Explorer _ crima Telnet Port 7001 Trying 10 0 9 31 7001 online Welcome to Digi ort I KY M r login admin ord Connected to the rver port Type Ctrl 2 for port menu _ Local echo Connect Disconnect SendBreak Figure 6 5 JTA window for Telnet Connections hitp 10 0 9 31 JAVA Telnet Applet Windows Internet Explorer e OE B x SSH Port 7001 Figure 6 6 JTA window for SSH Note The users registered with their SSH public key cannot access the port through the web because the Java applet does not provide an SSH public key authentication 61 62 Login KVM viewer client KVM viewer client C H A PTER 7 The KVM viewer client VNC viewer is a compact application that runs on a remote system and allows the user to view and use the I KVM and its host computer s KVM viewer client is readily available from a number of different sources from the I KVM product installation CD from the RealVNC website www realvnc com Note The I KVM supports equivalent feature set of RealVNC Enterprise version Users can download and use RealVNC
68. nnect to the port which it does not listen to Firmware upgrade 96 Firmware upgrade System administration Firmware upgrade Firmware upgrades are available via serial remote console or web interface The latest upgrades are available on the Digi web site at http www digi com The figure below shows the firmware upgrade web interface Upgrade Cancel Figure 9 10 Firmware upgrade To upgrade firmware via the web 1 Select the latest firmware binary by clicking browse button 2 Once the upgrade has been completed the system will reboot to apply the changes To use either a remote or serial console to upgrade firmware the TELNET SSH or terminal emulation program must support Zmodem transfer protocol After the firmware upgrade the previous settings will be reset to the factory default settings except the IP configuration settings To upgrade firmware via a remote console 1 Obtain the latest firmware 2 Connect either TELNET SSH or a serial console port using the terminal emulation program TELNET or SSH is recommended since the process of firmware upgrade by serial console requires extremely long time 3 Select from the firmware upgrade menu as shown in Figure 9 12 4 Proceed following steps as guided by online messages to transfer the firmware binary file using the Zmodem protocol System administration Once the upgrade has been completed the system will reboot to apply the changes If t
69. ocal machine The user may restore the factory default settings at any time by selecting Factory default at location property at the import part or by pushing the factory default reset switch on the side panel of the I KVM 90 System administration The figure below shows the configuration management screen Configuration Management System administration Configuration Management Configuration Export Location User space ark Local machine Primary NFS server Encrypt Yes v File name ssyscm Configuration import Location User space ark Local machine Primary NFS Server Factory default Configuration selection Configuration X Select all Network configuration Including IP configuration KVM configuration Serial port configuration System user configuration System configuration Encrypt Yes v File selection 7 7 7 7 Select file Figure 9 8 Configuration management Configuration export Location Location to export to Encrypt One of Yes or No File name Configuration import Location Location to import from By selecting Factory default the user may restore the factory settings Configuration selection Determines what kinds of configurations are imported Encrypt One of Yes or No If location is Factory default it does not apply File selection List all the exported files satisfying the encrypting option at the
70. one step If the user does not want to save the new parameter values the user must opt to Cancel All changes made will be lost and the previous values restored 21 Digi Passport I KVM fy My wry Re r GSrQr gt M a A Digi Passport I KVM Configuration and Management ai PassroR D gt Network Network Basic Settings Network Network Basic Settings IPv4 configuration SNMP Configuration IP mode Static IP Dynamic DNS Configuration IP address 10 0 3 30 SMTP Configuration Subnet i gt IP Filtering PESA 255 255 0 0 Syslog Configuration Default gateway 10 0 0 1 NFS Configuration IPv6 configuration IP mode i ion v KVM amp Serial port Manual configuration 7 IP address fecO 202 64 Default gateway fec0 222 IP address Link fe80 201 95ff fea3 87bd 64 System status amp logs System administration System statistics Reuse old IP at bootup time on DHCP Disable Activate Locator LED failure Apply Changes Use Manual DNS Enable Login as a different user Primary DNS 206 13 28 12 Logout Secondary DNS optional 206 13 31 12 Reboot Savetoflash Save amp apply Cancel Copyright 1996 2008 Digi International All rights reserved Zz Figure 2 10 The I KVM web management screen Discovering and Configuring the I KVM unit 22 To discover the I K VM unit on the network insert the Software and Documentation CD in your computer s CD drive and
71. ons Insert Delete Home End PageUp PageDown Up Down Left Right Print Pause Keypad keys see Using abbreviations KP Insert KP Delete KP Home KP End KP PageUp KP _PageDown KP_Up KP Down KP Left KP Right KP Enter KP_Add KP Subtract KP_Divide KP_ Multiply KP 0to KP 9 Function keys F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 121 Creating macro sequences ASCII characters All characters can be entered using their ASCII codes from 32 to 126 i e A B C 1 2 3 etc with the exception of the special characters and which have special meanings as explained below Codes with special meanings means press down the key that follows means release the key that follows means press down and release the key that follows means wait 250ms note if a number immediately follows the asterisk then the delay will equal the number in milliseconds Note Hotkey sequences are not case sensitive Creating macro sequences 122 Hot key macro sequences can be up to 256 characters long All keys are assumed to be released at the end of a line however you can also determine that a key is pressed and released within a sequence Any of the following three examples will send a command that emulates a press and release of the Scroll Lock key SCROLL SCROLL SCROLL SCROLL Example SCROLL SCROLL 1 ENTER Press and release scroll twice press
72. ost LE VADTATIES ied V Telnet TCP port 23 C Serial Port com z Cancel Help Figure 2 8 Telnet program set up example 2 The user must log into the I K VM Type the user name and password A factory default setting of the user name is root and password is dbps for the system root and admin for the system administrator For more information refer to the section User Administration within this document 3 Upon authentication by the I K VM one of the CLI prompts or text menu screens are shown to the user according to the default shell configuration of the user s account The menu driven interface allows the user to select a menu item by typing the menu number and then pressing ENTER The corresponding screen allows user configuration of the required parameters For more information refer to the section CLI guide within this document Accessing the Web Browser Management Interface 20 The I K VM supports both HTTP and HTTPS HTTP over SSL protocols The I KVM also provides its own Web management pages To access the K VM Web management page enter the I K VM IP address or resolvable hostname into the web browser s URL Location field This will direct the user to the I K VM login screen The user must authenticate themselves by logging into they system with a correct user name and password The factory default settings are Login root Password dbps Login admin Password admi
73. ote The I K VM requires a unique IP address to connect to the user s network The users may choose one of two Internet protocols in setting up the I K VM IP address Static IP DHCP Dynamic Host Configuration Protocol The I KVM is initially defaulted to Static IP mode with a static IP address of 192 168 161 5 The table below shows the configuration parameters for all three IP configurations and the web based GUI to change the user s IP configuration Table 3 1 Configuration parameters IP address Static IP Subnet mask v4 Default gateway Use manual DNS Enable only Primary DNS Secondary DNS Optional IP address Static IP Default gateway v6 IP address Link Use manual DNS Enable only Primary DNS Secondary DNS Optional Use manual DNS Primary DNS Secondary DNS Optional DHCP Reuse old IP at bootup time on DHCP failure 25 26 The users can disconnect the I K VM from the network by setting IP mode as Disable For information on how to enable and configure a secondary address refer to Using a static IP address below Digi Passport I KVM Dial gt OQ gt RAO GERO Digi Passport I KVM Configuration and Management User root Network Basic Settings Network Network Basic Settings SNMP Configuration Dynamic DNS Configuration SMTP Configuration IP Filtering Syslog Configuration NFS Configuration KVM amp
74. ows the user to manually select a balance between the number of colours displayed and viewer responsiveness Always use best available colour quality Forces viewer to use the maximum number of colours even on a slow connection Form example to view photographs The Inputs tab on the VNC Viewer Properties dialog allows the user to configure which events keyboard mouse etc are transmitted to the server IA VNC Viewer Properties Input Options Enable or disable file transfer or mouse or keyboard interaction with the remote server Display Inputs Connection Expert Ee Enable keyboard input Pass special keys directly to server Enable mouse input C Enable 3 button mouse emulation C Rate4imit mouse move events Share clipboard with server Enable file transfer Menu key F8 C Use these settings for all new connections eE eE Figure 7 3 Viewer option Inputs Inputs Select Enabled on the Inputs drop down list to allow all inputs Select Disabled to viewer runs in View Only mode Select Custom to select options required KVM viewer client Enable keyboard input Keyboard events are passed to the server Pass special keys directly to server Windows key Print Screen Alt Tab Alt Escape Ctrl Escape Enable mouse input Mouse movements and clicks are passed to the server Enable 3 button mouse emulation Allows enabling of a 3 button mouse to the remote server system using a 2 button
75. r more informtion refer to the section KVM viewer client within this document Idle timeout Determines the period of inactivity on a remote connection before the user is logged out The idle timeout period can be set to any time span expressed in seconds Protocol timeout Sets the time period by which responses should have been received to outgoing data packets If the stated period is exceeded then a connection is considered lost and terminated Mouse rate Defines the rate at which mouse movement data are transmitted to the system The default option is 20ms which equates to 50 mouse events per second This default rate can prove too fast when passed through certain connected KVM switches from alternative manufacturers In such cases data is discarded causing the local and remote mouse KVM Configuration pointers to drift apart If this effect is encountered increase the mouse rate to around 30ms data is then sent at a slower rate of 33 times per second Background refresh rate Select refresh rate for screen images via remote links This allows the user to tailor the screen refresh to suit the network or modem connection speeds The options are Slow Medium Fast or Disabled When the disabled option is selected the remote users will need to manually refresh the screen Single mouse mode mouse switch This allows the user to select the mouse button combination that can be used to exit from single mouse mode when active
76. r will NOT request that any other existing connections to the remote server are terminated m Use single sign on if the VNC Server supports it When enabled if the server supports single sign on the Viewer s user logon credentials will be presented to the server automatically If these credentials are refused then the user will be prompted to supply a username and password Do not use a proxy recommended VNC Viewer will make a direct connection to any VNC Server In most cases a proxy server will not be necessary to use VNC and so this option is the recommended default Use Microsoft Internet Explorer proxy settings VNC Viewer will use the same proxy servers as Microsoft Internet Explorer uses if any In environments where a proxy server is needed to access computers on other KVM viewer client networks and the Internet Microsoft Internet Explorer may already be set up with the necessary proxy server settings to allow the user to make these connections This option will attempt to use those settings if they exist Use these proxy settings VNC Viewer will use the proxy server details supplied in the boxes below Please contact a network administrator to determine the correct settings for these boxes 69 Viewer screen By clicking Connect button on the login window Viewer screen will be displayed MA 1 Kvm pgp KE aE al pale Figure 7 5 Viewer scren 70 KVM viewer client VNC Tool
77. rule that will allow all outgoing and incoming UDP packets the ability to travel across If the SYSLOG service is enabled and the SYSLOG server configuration is properly set up the user can specify the storage location for the I K VM system log or port data log as SYSLOG server For more information refer to the sections Port logging and system log configuration within this document Network File System NFS server configuration The I K VM supports Network File System NFS service for system or port data logging functions The user must specify the NFS server s IP address and the mounting path on the NFS server to use it The figure below shows the web based NFS server configuration page 39 40 To store the I K VM log data to the NFS server the NFS server specified in the KVM configuration must be configured as read and write allowed If there is a firewall between the I K VM and NFS server the user must add a rule that will allow all outgoing and incoming packets to travel across If the NFS service is enabled and the NFS server configuration is properly set up the user can specify the storage location for the I K VM system log or port data log as the NFS server For more information refer to the sections Port logging and system log configuration within this document NFS Configuration Network NFS Configuration NFS enable NFS server Timeout in seconds 5 3600 Retry interval in seco
78. ss caused by any malfunction This equipment is for indoor use and all the communication wirings are limited to inside of the building User s Guide Table of Contents Notice to WSLS cxcasscssanionssnenscnveatanmnteantinvaneatioumeis 2 Table of Contents ws sactcsesatscassccssceccssenucsusccasscaceinedcesessiensscents 3 Digi contact information eeesssesssesseessoossoossssesssesssosesoosss 5 Product Overview eessessecsoesoesseesoesoosseesoesoossoesessoesoosseesoee 7 Product Specifications a ccucscsadacesniitecaventareamanisiedes 8 Getting started sssssssossssssessssssossssosssssssevoosssssrosssssosooss s 11 Panel layte mnnn nE 11 Connecting the hardware siasiscsessdasesssavsousscboonseveress 12 Accessing the system console ccceeeeseeeeees 16 Accessing the Web Browser Management MAU Tea Oe sian sevactneaaeredevnaedareeneesnataucamereee merece 20 Discovering and Configuring the I KVM unit 22 MC LEDS resies tiie 23 Network configuration cccscccccsscccssscsccsesscsesescessseeee 25 IP Configuration sc cscsaansipaketaetixpideeenion 25 Simple Network Management Protocol SNMP ConfigUtati N pics sevens tironian iiei 29 Dynamic DNS configuration s ssseseseeseeseeeesee eee 32 SMTP configuration wscisccssdssassasartecisedsanerendncnccintees 34 IP filtering 5 vi sxcccusshcnaavennaadei aiaa a 36 SYSLOG server configuration ccccesceeeeees 39 Network File System NFS server configuration 39 Ser
79. strator for a valid gateway IP address Primary and Secondary DNS The DNS Domain Name System server is used to locate and translate the correct IP address for a requested web site address A domain name is the web address i e www yahoo com and is usually easier to remember The DNS server is the host that can translate such text based domain names into the numeric IP addresses for a TCP IP connection The IP address of the DNS server must be able to access the host site with the provided domain name The I K VM provides the ability to configure the required IP addresses of 27 28 both the Primary and Secondary DNS servers addresses The secondary DNS server is specified for use when the primary DNS server is unavailable Using Dynamic Host Configuration Protocol DHCP Dynamic Host Configuration Protocol DHCP is a communications protocol that lets network administrators manage and automate the assignment of IP addresses centrally in an organization s network DHCP allows the network administrator the ability to supervise and distribute IP addresses from a central point and automatically send a new IP address when a computer is plugged into a different network location When in static IP mode the IP address must be entered manually at each computer If a computer is moved to another network location a new IP address must be assigned DHCP allows all the parameters including the IP address subnet mask gateway and DNS servers
80. strator settings e usr2 conf syslogs config files for system logs settings Appendix A Connections Appendix A Connections Ethernet Pin outs The I K VM uses the standard Ethernet connector that is shielded connector compliant with AT amp T258 specifications 1 amp Figure A 1 Pin layout of the RJ45 connector The table below shows the pin assignment and wire color Table A 1 Pin assignmnet of the RJ45 connector for Ethernet Pin Description Color 1 Txt White with orange 2 Tx Orange 3 Rx White with green 4 NC Blue 5 NC White with blue 6 Rx Green 7 White with brown 8 Brown 117 Console and serial port pin outs The I K VM uses an RJ45 connector for console and serial ports The pin assignment of the RJ45 connector for console and serial ports is summarized in Table A 2 Each pin has a function according to the serial communication type configuration Table A 2 Pin assignment of RJ45 connector for console and serial ports Pin Description 1 CTS 2 DSR 3 RxD 4 GND 5 DCD 6 TxD 7 DTR 8 RTS Appendix B Well known port numbers Appendix B Well known port numbers Port numbers are divided into three ranges a Well Known Ports Registered Ports and Dynamic and or Private Ports Well Known Ports are those from 0 through 1023 Registered Ports are those from 1024 through 49151 Dynamic and or Private Ports are those from 49152 through 65535
81. t through the IP address of the I KVM and the listening TCP port number of the serial port The user must use the TCP port number as well as the I KVM IP address to the Telnet SSH client If the IP address of the I KVM and the serial port are assigned as 192 168 1 100 and 192 168 1 101 the user can connect to the port as follows telnet 192 168 1 100 6001 43 Serial Port Configuration Protocol Select Telnet SSH or Raw TCP as the protocol If the users are using a Telnet client program select Telnet If the users are using an SSH client program select SSH When Raw TCP is selected direct TCP socket communication is available between the I KVM and the remote host Inactivity timeout The purpose of the inactivity timeout parameter settings is to maintain the TCP connection state as either Closed or Listen If there is no activity between the I KVM and the Telnet SSH client during the specified inactivity timeout interval the existing session will automatically be closed If the user wants to maintain the connection indefinitely configure the inactivity timeout period to 0 Although the inactivity timeout is disabled the I KVM will continue to check the connection status between the Telnet SSH client and the I KVM by sending keep alive packets periodically If the Telnet SSH client does not answer the packets system will assume that the connection is down unintentionally The I K VM will close the existing Telnet SSH connection reg
82. tering No Option IP address mask Chain rule Invert 192 168 0 0 255 255 0 0 DROP Remove Invert 192 168 0 0 255 255 0 0 DROP Remove Normal 192 168 1 0 255 255 255 0 ACCEPT Remove Normal 192 168 2 0 255 255 255 0 ACCEPT Remove Normal 0 0 0 0 0 0 0 0 DROP Remove Normal 192 168 1 0 255 255 255 0 ACCEPT Remove Invert 192 168 2 0 255 255 255 0 DROP Remove Normal ACCEPT Add IPv6 filtering No Option IP address mask Chain rule No rules New Normal ACCEPT Add Figure 3 7 IP filtering configuration The 1 IP filtering rule at Figure 3 7 means the hosts which is not included Option invert in the host range from 192 168 0 1 to 192 168 255 254 IP address Mask 192 168 0 0 255 255 0 0 are not allowed Chain rule DROP to connect to SSH port 22 The 1 rule allows only the hosts whose subnet is 192 168 x x to access to the KVM through SSH The 2 IP filtering rule allows those which belongs to the subnet 192 168 x x to connect to the I K VM through telnet No host is allowed to connect to the I K VM through http port 80 by the 5 rule but the hosts whose subnet is 192 168 1 x is allowed by the 3 rule and 192 168 2 x by the rule 4 So only the hosts which belong to the subnet 192 168 1 x or 192 168 2 x can access to the I K VM through http by the 3 4 and 5 rules No host except the hosts whose subnet is 192 168 1 x is allowed to connect to the K VM through https port 443 by the 7 r
83. ters of user account like adding user Authentication 86 Users can select an Authentication method for Web login KVM Viewer login and CLI login via serial console and telnet SSH remote console The I K VM currently provides authentication methods of Local RADIUS server RADIUS server Local Local RADIUS server RADIUS down Local TACACS server TACACS server Local Local TACACS TACACS down Local LDAP server LDAP server Local Local LDAP server LDAP down Local Kerberos server Kerberos server Local Local System administration Kerberos server Kerberos down Local using Linux PAM Pluggable Authentication Modules for Linux Authentication System administration Authentication Authentication method selection Ee 3 m Web authentication method Local a KVM authentication method tocal v faamam Serial authentication method None arias 5 Local Console authentication method IRADIUS server RADIUS server Local Authentication server configuration Local RADIUS server RADIUS down Local TACACS server TACACS server Local Save to flash Save amp apply Cancel ocal TACACS server TACACS down Local LDAP server LDAP server Local Local LDAP server LDAP down Local Kerberos server Kerberos server Local Local Kerberos server Kerberos down Local Authentication server Figure 9 3 Authentication configuration select method 87 88
84. thout authentication Password SMTP with authentication Password confirm ecce Device mail address user smtp server Save amp apply Figure 3 6 SMTP mode selection in SMTP configuration The device mail address specifies the sender s email address for all log and alarm delivery emails SMTP servers often check only the sender s host domain name of the email address for validity Consequently the email address set for the device can use an 35 IP filtering 36 arbitrary username with a registered hostname i e arbitrary_user yahoo com or anybody digi com The SMTP user name and SMTP user password are required when either SMTP with authentication or POP before SMTP mode is selected The I K VM keeps unauthorized hosts from accessing to the I K VM by specifying IP filtering rules An IP filtering rule consists of Option IP address Mask Protocol Port and Chain rule Option The Option determines that this rule will be applied to the hosts included or excluded in hosts range specified by the IP address Mask It can be one of these two values Normal applied to the hosts included Invert applied to the hosts excluded IP address Mask The IP address Mask specifies the host range by entering base host IP address followed by and subnet mask The host range can be one of the following scenarios by changing the value Only one host of a specific IP address Hosts ona specific subnet
85. tics Refresh rate none RtoAlgorithm 1 RtoMin 200 RtoMax 120000 MaxConn 1 ActiveOpens PassiveOpens AttemptFails EstabResets CurrEstab InSegs OutSegs RetransSegs InErrs OutRsts Figure 10 5 TCP statistics UDP Statistics System statistics The UDP Statistics screen provides statistical information about packets connections using a UDP protocol Definitions and descriptions of each parameter are described below InDatagrams Specifies the number of datagrams received NoPorts Specifies the number of received datagrams that were discarded because the specified port was invalid InErrors Specifies the number of erroneous datagrams that were received Datagrams Received Errors is the number of received UDP datagrams that could not be delivered for reasons other than the lack of an application at the destination port OutDatagrams Specifies the number of datagrams transmitted UDP Statistics System statistics UDP Statistics Refresh rate InDatagrams NoPorts InErrors OutDatagrams Figure 10 6 UDP statistics Guide to the Boot loader program The purpose of the boot loader menu is to provide a way to recover the I K VM unit using TFTP as a disaster recovery option If the user presses the lt ESC gt key within 3 seconds after the I K VM unit is powered up he or she can enter the bootloader menu Within this bootloader menu the user can perform firmware upgrade
86. tion Details PB Server 10 9 101 30 Encryption Let Server Choose Default v About Options OK Cancel Figure 6 2 Viewer connection VNC Authentication 128 bit AES E E BK Username Password Figure 6 3 Viewer login When Enter is pressed the user can see viewer applet window For more information refer to the section KVM viewer client within this document 58 Connections a ISPS 2 LY A e Microsoft Windows Uersion 6 0 6001 1 Copyright lt cc gt 2006 Microsoft Corporation All rights reserved iC Users satest gt A ig Windows Server 2008 Figure 6 4 Viewer applet Serial port connection The user can access the serial port without using the telnet or SSH client program The user may access the serial port by clicking the hyperlink Serial connection Telnet or SSH depends on Serial port configuration The terminal emulation pop up window will be opened to grant user access to the port A Java applet is used to provide the text based user interface to access the serial port This Java applet supports only Telnet or SSH connection The user cannot access the port via the web when the host mode of the port is set to Raw TCP connection The user is asked to enter his her user ID and password to access the port Once authenticated the user now has access to the port The title bar of the pop up window and the Java applet shows the information regardi
87. to be automatically configured when the IP address is assigned DHCP uses a lease concept in assigning IP addresses to a computer DHCP limits the amount of time a given IP address will be valid for a computer All the parameters required to assign an IP address are automatically configured on the DHCP server side and each DHCP client computer receives this information when the IP address is provided at its boot up Each time a I K VM is reset the I K VM broadcasts a DHCP request over the network The reply generated by the DHCP server contains the IP address as well as the subnet mask gateway address DNS servers and the lease time The I K VM immediately places this information in its memory Once the lease expires the I K VM will request a renewal of the lease time from the DHCP server If the DHCP server approves the request for renewal the I K VM can continue to work with the current IP address If the DHCP server denies the request for renewal the I K VM will start the procedure to request a new IP address from the DHCP server Note While in DHCP mode all network related parameters for the I K VM are to be configured automatically including the DNS servers If the DNS server is not automatically configured the user may manually configure the settings by entering the primary and secondary DNS IP addresses To force an automatic configuration of the DNS address set the primary and secondary DNS IP addresses to 0 0 0 0 recommend
88. ule But hosts included in the subnet 192 168 1 x are allowed by the 6 rule So only the hosts which belong to the subnet 192 168 1 x or 192 168 2 x can access to the I K VM through https by the 6 and 7 rules Users can add a new IP filtering rule by setting the properties at adding line and then clicking the Add button User can remove a rule by clicking the Remove button Users Network configuration can also edit the rules if they set the rule properties and click the Save to flash or the Save amp apply button The I K VM will not filter the access of the hosts according to the IP filtering rules before users apply the changes by clicking the Save amp apply button or selecting Apply changes at menu SYSLOG server configuration The I K VM supports a remote message logging service SYSLOG service for the system and port data logging To use the remote SYSLOG service the user must specify the SYSLOG server s IP address or domain name and the facility to be used The figure below shows the SYSLOG server configuration page of the supplied Web interface Syslog Configuration Network Syslog Configuration Syslog enable Enable v Syslog server 192 168 200 100 Figure 3 8 SYSLOG server configuration To receive log messages from the I K VM the SYSLOG server specified in the IL KVM configuration must be configured as remote reception allowed If there is a firewall between the I KVM and the SYSLOG server the user must add a
89. uration and prompt on CLI Note A user cannot use a space character as part of the device name and the device name cannot be left blank or an error message will be generated 89 Date and time settings The I KVM maintains current date and time information The user can change the current date and time as shown in the figure below Date and time System administration Date and time Use NTP enable eal NTP server 10 10 8 62 Standard time Continent America North America Country United States District US central time b Timezone name America Chicago Timezone CST Time offset from UTC UTC x x hours 6 F Enable Disable daylight saving time Disable Figure 9 7 Date and time configuration There are two date and time settings The first is to use the NTP server to maintain the date and time settings If the NTP feature is enabled the I KVM will obtain the date and time information from the NTP server at each reboot In this case the I KVM should be connected from the network to the Internet The second method is to set date and time manually without using the NTP server This will allow the date and time information to be kept until reboot Configuration management The user may export the current configurations to a file at such locations as NFS server user space or local machine and import the exported configurations as current configurations from NFS server user space or l
90. uthentication user access restrictions and serial communication attributes Next the chapter reviews basic and advanced serial port settings which can be modified or restored to the factory default settings and resetting port connections The serial port configuration capability allows the user to configure serial communication parameters port logging parameters and other related parameters About basic and advanced serial port settings Serial port settings can be modified from their factory defaults The I KVM has two levels of serial port configuration settings Basic configuration Basic serial port settings needed for all ports Advanced configuration The complete set of serial port settings including Port management Port title Host mode configuration Serial port parameter Port logging User access control Alert configuration Basic port configuration settings The Basic configuration page sets the essential parameters required to access the device attached to the corresponding serial port including Enabling or disabling the serial port a Port title 41 Serial Port Configuration Host mode fixed to Console server The listening TCP port or network port The listening TCP port is the TCP network port specified when connecting directly to the port using Telnet or SSH m Protocol The Protocol setting configures the communication protocol used over the serial port There are three protocol options R
91. y IP address change By default the K VM only supports Dynamic DNS service offered at Dynamic DNS Network Services LLC www dyndns org Contact Sena technical support for issues regarding other Dynamic DNS service providers To use the Dynamic DNS service provided by Dynamic DNS Network Services the user must set up an account in their Members NIC Network Information Center http members dyndns org The user may then add a new Dynamic DNS Host link after logging in to their Dynamic DNS Network Services Members NIC After enabling the Dynamic DNS service in the Dynamic DNS Configuration menu the user must enter the registered Domain Name User Name and Password After applying the configuration change users can access the I K VM using only the Domain Name 33 The figure below shows the Dynamic DNS configuration web interface x Digi Configuration and M DynDNS Account H Sy Q gt mm Roe ry GSrQr Digi Passport I KVM Configuration and Management DIG PassPoRL gt gt User root Dynamic DNS Configuration Network Dynamic DNS Configuration Network Network Basic Settings Dynamic DNS enable Enable SNMP Configuration Username in Dynamic DNS Configuration Pasion TETTA SMTP Configuration IP Filtering Password confirm eccccce Syslog Configuration Domainname kvm dyndne biz NFS Configuration KVM amp Serial port _Save to flash _ Save
Download Pdf Manuals
Related Search
Related Contents
NEC DSX-80 User's Manual Kemox A Samsung B1740R User Manual Elation® Architectural User Instructions Sunbeam Bedding SCM1746-UM User's Manual Powermate PM0603250 Parts list 120 babas savarins pur beurre Guide pour la sélection des produits Copyright © All rights reserved.
Failed to retrieve file