Home

Raritan Computer DKX2-0E

image

Contents

1. Non US Keyboards sss erret French Keyboard sssssssssssseeeee eene Caret Symbol Linux Clients only sss Accent Symbol Windows XP Clients only sss Numeric Keypad cione pe art dn AEE Tilde SymbOl u oko tuvipiem qun p a ptu qi irri Java Runtime Environment JRE sees Keyboard Language Preference Fedora Linux Clients Raritan When you re ready to take control Contents Contents Macintosh Keyboard P SEa Tai nanan 208 Mouse Pointer Synchronization Fedora 0 0 ccccceescscsessesetetesesesesnenenessscscececeeeseeneseseeeeeessesesesesnenens 208 Resolving Fedora Core Focus seen eet tenete ener nnne 209 SUSE VBSA Vid o MOdes eerte tree uve sutucosnstsnsedbnssessvovsrsestesstucnensnsnstonys 209 LIU scat i 210 Windows 3 Button Mouse on Linux Targets 210 Vantaal MOIS Quo istud ici ba seid Pu vedpel nays dump Pe sues du puli Desa bid bai ebria berceau 210 Dell OpTiplex and Dimension Computers sese 210 Virtual Media not Refreshed after Files Added sss 210 Target BIOS Boot Time with Virtual Media sss 210 Al PP c i M T 211 Virtual KVM Client Version not Known from CC SG Proxy Mode
2. 132 teet Event Management Destinations Note SNMP traps will only be generated if the SNMP Logging Enabled option is checked Similarly Syslog events will only be generated if the Enable Syslog Forwarding option is checked These options can be found on the Event Management Settings page on the Device Settings menu Category m sump Syslog Audit Log Dervice Operation F F F System Startup F L4 F System Shubsown F F L4 Power Supply Status Changed F F F Powerstrip utet Status Changed F F F 5 Network Parameter Cranged E rZ F j Tron Seas Changed F 7 F Network Faire F Ethernet F abover F F F Device Marngenert Ld Ld 4 L4 F L F L4 F F F F F L4 F L4 LZ F F F F Firmware Update Fates L4 F s Freeware Fie Discarded L4 F F Freeware Vakiation Failed F F F Carag ton Backed Up L4 F F Contigzretion Restored F F F Port Connection Denied L4 4 F Securt F F L Password Settings Changed F F F AE E An ETC Seen pe ge Password ranged L2 F 2 User Blocked F F User Actvty F F F Port Corrected x z r2 2 Port Disconnected F L4 F E S mo IIR ce a P em UM Figure 58 Event Management Destinations System events are categorized by Device Operation Device Management Security User Activity and User Group Administration Raritan When you re ready to take control Chapter 9 Device Management 2 Check the checkboxes for those Event line items you want to enable or disable
3. ad eeaaaans 174 Figure 88 Diagnostics Scripts cicscccsseseccorssecesscesaasctesoutessutenatsencerisecnessarcuacssieaved causcaasentestssuiensateasss 174 Figure 89 File Dowload P 175 Figure 90 Dominion KX II Local Consoles iciaiscicsissssssstsscsosseoseassasnsssassnersesetessectccabeasaaveesssnvensainses 176 Figure 91 Local User Panel on Dominion KX II 00 cscscssscssccscscsscsccscssseesorscnecsesesecneesscecesseres 177 Figure 92 Reset Button back of trill oasis rib ns leni rii d lecce ERE Coo e Ern ELE Ea REN 177 Figure 93 Local Console Port Access s sesseseseesesesseseeresessoseeresesreseeeesesresesreresrereseresrsesseeroreseeseseeee 180 Figure 94 Local Port SetImps aabo uii tasti a ri dei edunt uis qe la E eit diae ren lan eb EE E aga 182 Figure 95 Factory Reset Local Console Only ssisisccsscescasssscisevasssscvessiazesvsrsantiessansetesisiansssiearniers 185 Figure 96 Device Managed by CC SG Message eres ente etnt ntn inset tntnsn tni 187 Figure 97 Remove from CC SG Management essent tnnt nnnnn ttn tnn tnn nnn 188 Figure 98 Confirm CC Unmafiapge inesset tenia Rte npeUa IY iK eta ta TRA IU Mea RII MM RUM MEI EUE 188 Figure 99 Device Removed from CC Management eese ttn 189 Figure 100 Change Schema MasBer iai nisse e piti rit ihrer Pu eoobkE FEE Y t6d FU atte caussusdeuiseaussteasandinns 198 Figure 101 Create New ATPIDUEG uni rien ri prat
4. sss 12 DC IMEUSDOG BOB a oce n ctn ERR uH S Att bo i on viel ctu MICA dui nt ena Le brer ep FR M QUE 13 Chapter 3 Installation and Configuration 14 icd M E 14 Step 1 Configure Target Servers nnne nennen nnne ennt SNEEK 15 Supported Video Resolutions cccccccecesesesesesceseeeeeeeteesesesesnsnssssssssceceeeeeneenesssesesnensenessseeeees 15 Desktop Background estre tette e en intem nee feeit dee entree tarta 16 Mouse Settings c 16 Operating System Mouse and Video Settings sse 16 Windows XP Windows 2008 Settings sssssssssseseeeee eene eene 17 Windows 2000 Setting S s M 18 Windows Vista 18 Linux Settings Red Hat 9 sse Eea EE E E EEE ES E 19 Linux Settings Red Hat 4 sse n raean e E EEEE E ELE 21 SUSE Linux HOVE SEMNE esi rn eE inv EEEN ta edes iti af tren EAE EEE 22 Make Linux Settings Permanent sisisi tenentes 23 Sun Solaris Settings ener tenete E E tenete 23 Raritan iii When you re ready to take control Contents IBM ATX 5 8 Setting S oc i eder eerte rte rr eter ner HE Ue e e e Peta rad eset 26 Make UNIX Settings Permanent tenete rnnt 27 Apple Macintosh Settings 4 eene insere sisia tton nnns sese EE REEKSE TEENAAN ENNA TEEN ENSEN 27 Step 2 Optional Configure Keyboard
5. eee nee 181 Local Port Administrations inocente eint rera e a a ea Od de 182 Local Port Settings KX II Local Console Only sse 182 Factory Reset KX II Local Console Only sse 185 viii zie Raritan When you re ready to take control Chapter 14 CC Unmanage cau R Removing Dominion KX II from CC SG Management Appendix A Specifications Environmental Requirements sse Physical Specifications sse Electrical Specifications ccscsesssssssescsesesseseseeseseeeeenstesssesescsnsnenensssseeeees Computer Interface Modules CIMS sese Remote COonnecHOn neret tantis eth ena a ci ed sr ta eit d i t nete KVM Properties TCPand UDP Ports Used iioi n E N Target Server Connection Distance and Video Resolution Network Speed Setting Siscu ieira a aE EnaA EENKEER Appendix B Updating the LDAP Schema Returning User Group Information From LDAP Prigge a A AREA From Microsoft Active Directory ssssssseseeseeenenere Setting the Registry to Permit Write Operations to the Schema Creating a New Attribute Adding Attributes to the Class Updating the Schema Cache sse eene Editing rciusergroup Attributes for User Members sss Appendix C Informational Notes ausa c
6. Raritan When you re ready to take control Table of Figures Figure 38 Figure 39 Figure 40 Figure 41 Figure 42 Figure 43 Figure 44 Figure 45 Figure 46 Figure 47 Figure 48 Figure 49 Figure 50 Figure 51 Figure 52 Figure 53 Figure 54 Figure 55 Figure 56 Figure 57 Figure 58 Figure 59 Figure 60 Figure 61 Figure 62 Figure 63 Figure 64 Figure 65 Figure 66 Figure 67 Figure 68 Figure 69 Figure 70 Figure 71 Figure 72 Figure 73 Figure 74 Figure 75 Figure 76 Figure 77 Figure 78 Figure 79 xii Map Virtual Media CD ISO Emag iuuue uar aratki sins enha avt ibad tla esee bug ak Uia ak aE daa Ela 94 File Server Setup F 96 O E A E A E E O REE 99 juu ru c S EER E 100 ir c4tio obo c 102 MSEQUID Sr Ae 104 Group based IP Access Control Listo inert rera rk dea EA PN HR Eia 107 PP ACE EXGHmpleoosnacbinemsdediinod ED TS ene nnb DO notes d 108 Modify Group C 109 Chanpe PassWord scudo ricis aic HI CD esas nines 111 Authentication Settings M 113 Authentication Settings LDAP esesesssserosereseseseseseoeseosososeseresosososeseseseseseseosorososesse 115 Authentication Settings RADIUS eese esent tnnt nons tn inen tns tn tnn 118 Network Settings oae edi pd in eda pA Oa d
7. eese esee eee ene tn tn tnnenttn insunt tatus 62 Figure 23 Virtual KVM Client Window idcsek irs t pI Iba EPLER RID Ken EEUR a FER REI NER TERRE RT EC 65 Figure 24 Virtual KVM Client Menu Tree auioscateicesestipabriri ui D eec PLI It II REA UI QD ur E 66 Figure 25 Dual Mouse Cursors ieiasec veri stri a aer rcp ra ebrio Ra Rd kx D ERE Ore e NEUE CE MIU EE KR 67 Figure 25 Properties Lrg LOG aoc asaecice etis rit bre vef torti ton eer niu E Dos DADA EURUNAE EU X strian iniaa 69 Figure 27 Connection Eur co D 71 Fig re 28 Keyboard MaGr8 uostri ia BU vReS E HIER ESSE TUI IDEAE I IH IM ISE IIa MIU HMM HA 74 Figure 29 Add Keyboard Macro Ne M 74 Figure 30 Keyboard Macro Example sessseesesesseseesesesseseoresessoseeeesessoseoresesesseseoreseososeosesesneseeeesese 75 Figure 31 New Macro in Keyboard Menu scsssessssssssssssesssssssssssessscesssssssssssseseacessssesesaseseones 75 Fig re 32 Video S CUBS T 79 Figure 33 Single Mouse Cursor Message sisesscscccsessisasssecsccsnecenstsassenvessosissenenssvnctansonsennsteasusesatsiees 82 Fig re 34 Tools S uuo CD 84 Figure 35 Virtual Media Connection diit aer ts PH EI DUI SERA e KIY LIES R RF IURIS KEMAS 89 Figure 35 Open KVM Se85IOTL suani tane bs vence a Abb n dei is AA onan dida acl ik 92 Figure 37 Map Virtual Media Drive assi erri Ibn Le Reel vies eK PH ELCHE EUR AREE Uu F evita 93 ee am
8. Dominion KX II P mm Target Eo Servers Power HERHNENEN _aaeeeee ss 5ps Figure 5 Terminology and Topology Remote PC client Local Access Console client CIMs Computer Interface Modules Target Servers Power Strips Networked computers used to access and control target servers connected to the Dominion KX II Refer to Supported Operating Systems Clients on page 10 for a list of the Operating Systems supported by Dominion KX II remotely An optional user console consisting of a keyboard mouse and multi sync VGA monitor attached directly to Dominion KX II to control target servers locally directly at the rack not through the network Dongles that connect to each target server and Raritan power strip Available for all of the supported Operating Systems Refer to Supported CIMs for information about the CIMs supported by Dominion KX II Servers with video cards and user interfaces e g Windows Linux Solaris etc accessed remotely via Dominion KX II Refer to Supported Operating Systems and CIMs Target Servers for a list of the supported Operating Systems and CIMs Raritan power strips accessed remotely via the Dominion KX II Raritan When you re ready to take control Chapter 1 Introduction Package Contents Each Dominion KX II ships as a fully configured stand alone product in a standard 1U 2U for KX2 464 19 rackmount chassis Each Dominion KX IL unit
9. Figure 23 Virtual KVM Client Window The features available in the Virtual KVM Client are accessible through the menu and toolbar Menu Bar Drop down menus of commands and settings Toolbar Shortcut buttons to frequently used features and commands Target Server Video Target device display Window 65 When you re ready to take control Options Status Bar Real time information on connection parameters target server window size concurrent connections Caps Lock indicator and Num Lock indicator Note to CC SG Users If you are using Dominion KX II in a CC SG configuration do not use the CC SG proxy mode if you are planning to use the Multi Platform Client MPC Options Menu Tree The following diagram represents all of the menu options available in the Virtual KVM Client ERES Ea aget j Ope ee Figure 24 Virtual KVM Client Menu Tree Toolbar Button Description em Properties n Video settings fe Calibrate color ti Synchronize client and target server mouse cursors 66 Raritan When you re ready to take control Chapter 6 Virtual KVM Client Refresh screen Auto sense video Send Ctrl Alt Delete l a t Q Pss Toggles single double mouse modes x Full screen m Resize video to fit screen LE 1 Mouse Pointer Synchronization Raritan When remotely viewing a target server that uses a mouse you will see two mouse pointers one belonging to
10. When there are two mouse cursors the Dominion KX II offers several mouse modes e Absolute Mouse Synchronization e Intelligent Mouse Mode e Standard Mouse Mode Synchronize Mouse In dual mouse mode the Synchronize Mouse option forces realignment of the target server mouse pointer with Virtual KVM Client mouse pointer tis Synchronize Mouse 81 When you re ready to take control Mouse Menu 82 gt To synchronize the mouse e Select Mouse gt Synchronize Mouse or e Click the Synchronize Mouse button from the toolbar Single Mouse Cursor Single Mouse Cursor enters single mouse mode in which only the target server mouse cursor is shown the local PC mouse pointer no longer appears on screen While in single mouse mode the Synchronize Mouse option is not available there is no need to synchronize a single mouse cursor N Single Mouse Cursor gt To enter single mouse mode e Select Mouse gt Single Mouse Cursor or e Click the Single Double Mouse Cursor button from the toolbar gt To exit single mouse mode When entering single mouse mode the following message is displayed Click OK x Single Mouse Cursor x You are about to enter Single Mouse Cursor While you are in this mode this software will have exclusive control over the mouse and keyboard To exit Single Mouse Cursor you must press Alt F10 Figure 33 Single Mouse Cursor Message 2 Pre
11. Green Controls the brightness of the green signal Blue Controls the brightness of the blue signal Color Contrast Settings Controls the contrast adjustment Contrast Red Controls the red signal Contrast Green Controls the green signal Contrast Blue Controls the blue signal Ifthe video image looks extremely blurry or unfocused the settings for clock and phase can be adjusted until a better image appears on the active target server Warning Please exercise caution when changing the Clock and Phase settings doing so may result in lost or distorted video and you may not be able to return to the previous state Contact Raritan Technical Support before making any changes Clock Controls how quickly video pixels are displayed across the video screen Changes made to clock settings cause the video image to stretch or shrink horizontally odd number settings are recommended Under most circumstances this setting should not be changed because the auto detect is usually quite accurate Phase Phase values range from 0 to 31 and will wrap around Stop at the phase value that produces the best video image for the active target server Offset Controls the on screen positioning Horizontal Offset Controls the horizontal positioning of the target server display on your monitor Vertical Offset Controls the vertical positioning of the target server display on your monitor Auto Color Calibration Check
12. Tosetthe keyboard language 1 From the toolbar select System gt Preferences gt Keyboard 2 Open the Layouts tab 3 Add or select the appropriate language 4 Click Close Note Other methods will not necessarily yield correct results 207 When you re ready to take control Macintosh Keyboard Macintosh Keyboard Mouse Pointer Synchronization Fedora 208 When a Macintosh is used as the client the following keys on the Mac keyboard are not captured by the Java Runtime Environment JRE F9 F10 F11 F14 F15 Volume Up Volume Down Mute Eject As a result the Virtual KVM Client and the Multi Platform Client MPC are unable to process these keys from a Mac client s keyboard When connected in dual mouse mode to a target server running Fedora the target and local mouse pointers may lose synchronization after some time gt To re synchronize the mouse cursors Use the Synchronize Mouse option from the Virtual KVM Client The following table summarizes the Dominion KX II mouse modes and whether or not these modes remain synchronized when accessing target servers running Fedora Mouse Mode Absolute Mouse Synchronization Intelligent Mouse Mode Standard Mouse Mode Fedora Core 5 Fedora Core 6 No No No Yes Yes No c ZE Raritan When you re ready to take control Appendix C Informational Notes Resolving Fedora Core Focus Using the Multi Platform Client MPC occasionally t
13. Totrace the route to the host Select Diagnostics gt Trace Route to Host The Trace Route to Host page opens Y Port Access Virtual Media User Management Device Settings Security Maintenasr Home gt Diagnostics gt Trace Route to Host Trace Route to Host Hostname or IP Address fis2 168 58 97 Maximum Hops s Resut traceroute started wait for 2ming 1l 192 168 59 97 192 168 59 97 0 438 ms 0 434 ms 0 368 ms ss ee RM or RR tm ca s mm apt ana tei Figure 86 Trace Route to Host 2 Type either the Hostname or IP Address into the Hostname or IP Address field 3 Select the Maximum Hops from the drop down list 5 or 10 4 Click the Trace Route button The trace route command is executed for the given hostname or IP Address and the maximum hops The output of trace route is displayed in the Result field 172 Raritan When you re ready to take control KX Diagnostics Raritan Chapter 12 Diagnostics Note This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support KX Diagnostics downloads the diagnostics information from Dominion KX II to the client machine Three operations can be performed on this page e Command Line Interface Enable or disable the Command Line Interface functionality With this feature a Raritan Technical Support engineer can open a standard SSH client connect to the unit and remotely exec
14. 64 bit usr sbin m64config prconf 1 f usr sbin m64config res 1024x768x75 2 Logoutor restart computer 32 bit usr sbin fbconfig prconf 1 f usr sbin fbconfig res 1024x768x75 pum 2 Logoutor restart computer IBM AIX 5 3 Settings Follow these steps in this section to configure target servers running IBM AIX 5 3 Toconfigure the mouse 1 Goto Launcher 2 Select Style Manager 3 Click Mouse The Style Manager Mouse dialog opens 4 Usethe sliders to set the Mouse acceleration to 1 0 and Threshold to 1 0 5 ClickOK Toconfigure the video 1 From the Launcher select Application Manager 2 Select System Admin JE zie Raritan When you re ready to take control Chapter 3 Installation and Configuration 3 Select Smit gt Devices gt Graphic Displays gt Select the Display Resolution and Refresh Rate 4 Select the video card in use 5 Click List A list of display modes is presented 6 Select a resolution and refresh rate supported by the Dominion KX II Please refer to Supported Video Resolutions for more information Note If you change video resolution you must logout of the target server and log back in for the video settings to take effect Make UNIX Settings Permanent Note These steps may vary slightly depending on the type of UNIX e g Solaris IBM AIX and the specific version in use 1 Select Style Manager gt Startup The Style Manager Startup dialog opens 2 Select the Log
15. Add New Favorite e 54 59 Add New User 103 104 105 157 Add New User Group 106 107 Adding Attributes to the Class e 208 Apple Macintosh Settings e 27 Assigning an IP Address e 34 Associate Target Servers to Outlets Port Page e 36 145 149 Audit Log 163 186 194 Authentication Settings 117 Authentication vs Authorization e 39 193 Auto sense Video Settings 81 Available Resolutions e 187 B Backup and Restore 44 166 C Calibrate Color 82 Caret Symbol Linux Clients only e 215 CC Unmanage 196 CC SG 221 zs Raritan When you re ready to take control CD ROM DVD ROM ISO Images 95 98 100 Change Password 116 Change the Keyboard Layout Code Sun Targets 28 130 Changing the Default Password 32 48 Checking Your Browser for AES Encryption 158 159 CIM Upgrade 168 CIMs 220 Computer Interface Modules CIMs 201 240 Conditions when Read Write is not Available e 97 98 Connect the Power Strip 146 Connecting to a Target Server 62 Connecting to the Dominion KX II 42 Connecting to Virtual Media 97 Connection Info 75 Connection Menu 73 Creating a Keyboard Macro e 78 Creating a New Attribute e 207 D D2CIM USB G2 Note 13 Date Time Settings 133 Default IP Address 10 Dell OpTiplex and Dimension Computers 220 Desktop Background 16 Device Information 165 Device Management 126 Device Management Menu 126 Diagnostic
16. In this mode absolute coordinates are used to keep the client and target pointers in sync even when the target mouse is set to a different acceleration or speed This mode is supported on servers with USB ports the mouse moves to the exact location on the target server gt To enter absolute mouse mode Select Mouse gt Absolute 83 When you re ready to take control Virtual Media Virtual Media Tools Menu 84 Refer to the chapter on Virtual Media on page 87 for complete information about setting up and using virtual media Options From the Tools menu you can specify certain options for use with the Virtual KVM Client synchronize mouse when in dual mouse mode enable logging keyboard type and the exit target screen resolution mode hotkey gt To set the tools options 1 Select Tools Options The Options window opens x Enable Logging Keyboard Type USnntemationai Exit Target Screen Resolution Mode Hotkey Cirisaitem Exit Single Cursor Mode Hotkey Cirisaiteo ox Cancel Figure 34 Tools Options 2 Check the Enable Logging checkbox only if directed to by Technical Support This option creates a log file in your home directory 3 Select the Keyboard Type from the drop down list if necessary The options include US International French France German Germany japanese United Kingdom Korean Korea Raritan When you re ready to take
17. T LI Wes apona J moon C Ropice E ees Rartan gt Be daN i Eat Sre i A aa M Figure 43 Group Page 104 Raritan When you re ready to take control Chapter 8 User Management The Group page is organized into the following categories Group Permissions Port Permissions and IP ACL 2 Type a descriptive name for the new user group into the Group Name field 3 Setthe Permissions for the group Check the boxes before the permissions you want to assign to all of the users belonging to this group Refer to Setting Permissions on page 105 for more information 4 Setthe Port Permissions Specify the server ports that can be accessed by users belonging to this group and the type of access Refer to Setting Port Permissions on page 106 for more information 5 Setthe IP ACL see Group based IP ACL Access Control List on page 106 optional This feature limits access to the Dominion KX II device by specifying IP addresses it applies only to users belonging to a specific group unlike the IP Access Control on page 153 list feature which applies to all access attempts to the device and takes priority 6 Click OK Note Several administrative functions are available within MPC and from the Dominion KX II Local Console these functions are available only to members of the default ADMIN group Setting Permissions Important Checking the User Management checkbox allows the
18. lr eic 102 Add New User Group deret ent irr dne eee i EH HERR sees nearest iid 103 Setting PELMUSSIONS D 105 Setting Port Permissions sisvet EEEE EEEE ER A 106 Group based IP ACL Access Control List esses een 106 Modity Existing User Group een dem ribi orate rire Heb reete o itia tie cierre 109 Set Permissions for Individual Group sess 110 eu currc 111 Authentication Settings enii Ere eee EEEE E EN nre tenete enn EERO ear EISES 112 Implementing LDAP Remote Authentication sse 115 Returning User Group Information from Active Directory Server sss 117 Implementing RADIUS Remote Authentication seen 118 Returning User Group Information via RADIUS sse nee 119 RADIUS Communication Exchange Specifications sssssssseseseeeenne 120 zie Raritan When you re ready to take control Contents Chapter 9 Device Management Device Management Menu ccscecssescseseserensnsnsnssscsesessseseeseneseeseeseceeseseseees Network Settings orrore e er etse oboe o P Eure ce re erp obo os Network Basic Settings istsrss areir Network Miscellaneous Settings sssssssssssseeee LAN Interface Settings eene tete to toto KEER Date Time Settings oer trien rr res ra tte e a ere erint Event Managment sssrini orninn nE E
19. zs Raritan When you re ready to take control 1 5 3 IP Access Control 154 Home gt Security gt IP Access Control IP Access Control e Sm SENE T s nn To use IP Access Control Open the IP Access Control page using one of these methods Select Security gt IP Access Control or Click the Set System ACL button from the Network Settings on page 122 page The IP Access Control page opens Enable IP Access Control Default policy X 4 Rule IP Mask Policy EP EP ae on oN oe moll Figure 70 IP Access Control 2 ee cwe Check the Enable IP Access Control checkbox to enable IP access control and the remaining fields on the page Select the Default Policy This is the action taken for IP addresses that are not within the ranges you specify Accept IP Addresses are allowed access to the Dominion KX II device Drop IP Addresses are denied access to the Dominion KX II device To add append rules Type the IP Address and subnet mask in the IP Mask field Select the Policy from the drop down list Click Append The rule is added to the bottom of the rules list Raritan When you re ready to take control e w P B op m 2 3 Chapter 10 Security Settings Repeat steps 1 through 3 for each rule you want to enter To insert a rule Type a Rule A Rule is required when using the Insert command Type the IP Address and subnet mask in th
20. At the rack Dominion KX II provides BIOS level control of up to 64 servers and other IT devices from a single keyboard monitor and mouse The integrated remote access capabilities of the Dominion KX II provide the same levels of control of your servers via Web browser Dominion KX II is easily installed using standard UTP Cat 5 5e 6 cabling Its advanced features include virtual media 128 bit encryption dual power supplies remote power control dual Ethernet LDAP RADIUS Active Directory Syslog integration and Web management These features enable you to deliver higher uptime better productivity and bulletproof security at any time from anywhere Dominion KX II products can operate as standalone appliances and do not rely on a central management device For larger data centers and enterprises numerous Dominion KX II units along with Dominion SX units for remote serial console access and Dominion KSX for remote branch office management can be integrated into a single logical solution using Raritan s CommandCenter Secure Gateway CC SG management appliance Q Computer Interface Module CIM Cats Cable Remote Virtual Media USB Orvels d lt I Remote Network Access 1 to 4 User Windows Liner Sun and Macintosh Figure 1 Dominion KX II Configuration zs Raritan When you re ready to take control Chapter 1 Introduction Virtual Media All Dominion KX II models support virtua
21. Dery x Ben z Dom nion KX Portis None z Dery z Deny zi Dom nion KX Porttt Noe Deny x Dew 7 Set All to None Set Al VM Access to Deny Set Al Power to Derry p Set Alto View Set AI VM Access to Read Onty 7 Set Alto Control 7 Set AB VM Access to Resdo tte Set Al Power to Access Rule 5 Starting IP Ending IP Action rcv Append insert Replace Delete x emer Copyright 2007 Raritan Computer Inc Figure 46 Modify Group zie Raritan 109 When you re ready to take control Add New User Group 110 2 Setthe Permissions for the group Check the boxes before the permissions you want to assign to all of the users belonging to this group Refer to Setting Permissions on page 105 for more information 3 Setthe Port Permissions Specify the server ports that can be accessed by users belonging to this group and the type of access Refer to Setting Port Permissions on page 106 for more information 4 SettheIP ACL optional This feature limits access to the Dominion KX II device by specifying IP addresses Refer to Group based IP Access Control List see Group based IP ACL Access Control List on page 106 for more information 5 Click OK Set Permissions for Individual Group Toset permissions for an individual user group 1 Locate the user from among the groups listed Individual groups can be identified by the in the Group Name 2 Click on the Group Name The
22. Device Management Menu sse 121 hiec do uii cass 122 Date Time Setting Soo et ed daten eee e eee Donee el eere eie AE 128 Event Management nnne 129 Power Supply Setup Paperissa i eiea a r 136 Port Configuration Papesse ie E a 138 Power Control eite eere reed EE oe Een te erede 140 Device Management Menu The Device Settings menu is organized as follows Network Date Time Event Management Settings and Destinations Power Supply Setup Port Configuration and Local Port Settings Dominion KX II Local Console only Use To Network Customize the network configuration for the Dominion KX II Date Time Set date time time zone and Network Time Protocol NTP Event Management Configure SNMP and Syslog Settings Event Management Select which system events to track and where to Destinations send this information Power Supply Setup Configure auto detection of the Dominion KX II power supplies Port Configuration Configure KVM ports power CIMs and outlets Local Port Settings Configure local port Dominion KX II Local Console only zie Raritan 151 When you re ready to take control Network Settings Network Settings 122 Use the Network Settings page to customize the network configuration e g IP Address discovery port and LAN interface parameters for your Dominion KX II unit Important Dominion KX II must be rebooted for new network settings to take effect Be
23. Remote Access 225 Remote Authentication 38 193 Remote Connection 202 Removing a Keyboard Macro 80 Removing Dominion KX II from CC SG Management e 197 Reset Button e 159 185 Resolving Fedora Core Focus e 219 Returning to the KX II Local Console Interface 189 Returning User Group Information e 206 Returning User Group Information from Active Directory Server 122 Returning User Group Information via RADIUS e 124 Running a Keyboard Macro 80 S Scalability e 239 Scaling 89 Security 241 Security and Authentication 187 239 Index Security Settings 104 152 153 Security Settings Menu 152 Send Ctrl Alt Delete e 77 Server Display e 188 Servers e 232 Set Permissions for Individual Group 105 115 Setting Permissions e 109 114 Setting Port Permissions 94 109 110 115 Setting the Registry to Permit Write Operations to the Schema 207 Simultaneous Users 186 Single Mouse Cursor 86 SNMP Agent Configuration e 135 139 SNMP Configuration 135 SNMP Trap Configuration e 135 139 Software 5 Specifications e 31 199 Specifying Power Supply Auto detection e 37 Standard 16 87 Starting the KX II Local Console e 186 Step 1 Configure Target Servers 15 85 Step 2 Optional Configure Keyboard Language 27 Step 3 Configure Network Firewall Settings 28 Step 4 Connect the Equipment 29 Step 5 Dominion KX II Initial Configuration 31 Strong Passwords 116 154 155 Sun Solar
24. Toentertarget screen resolution Select View Target Screen Resolution 85 When you re ready to take control Help Menu Toexit target screen resolution mode Press the hotkey configured in the Tools Options dialog The default is Ctrl Alt M Note to CC SG Users Target Screen Resolution is disabled full screen mode is available only when the Dominion KX II device is not under CC SG management Help Menu About Raritan Virtual KVM Client This menu option provides version information about the Virtual KVM Client should you require assistance from Raritan technical support gt To obtain version information Select Help gt About Raritan Virtual KVM Client ENIL 86 Raritan When you re ready to take control Chapter 7 Virtual Media Raritan In This Chapter OVER VICW 88 Prerequisites for Using Virtual Media sssseeeeeeeeee 90 Using Virtual Media eerte entente enne depen iore een 91 Opening a KVM LSesSIOTI cec erret eet rtr PEE ee PE rere eee cobre 92 Connecting to Virtual Media sse 93 Disconnecting Virtual Media ssie 95 File Server Setup File Server ISO Images Only sss 96 87 When you re ready to take control Overview Overview 88 Virtual media extends KVM capabilities by enabling target servers to remotely access media from the client PC and network file servers With this fea
25. described in Step 3 Connect the Equipment Target Server Ports see 4 Target Server Ports on page 31 3a zie Raritan When you re ready to take control Chapter 3 Installation and Configuration 2 Using the KX II Local Console select Device Settings gt Port Configuration The Port Configuration page opens EE Le E Maintenance Disgnestics Home gt 0 Port Configuration Port Number evice Senings gt Port Configuraeon Logout Port Name Port Type ailable Not Available Not Available Not Available Not Available Raritan PowerStrip PowerStrip Figure 9 Port Configuration 3 Click on the Port Name of the target server you want to rename The Port Page see Associate Target Servers to Outlets Port Page on page 143 opens 4 Assignaname to identify the server connected to that port The name can be up to 32 characters alphanumeric and special characters see Valid Special Characters on page 32 are allowed 5 Click OK Specifying Power Supply Auto detection The Dominion KX II provides dual power supplies and can automatically detect and provide notification regarding the status of these power supplies Proper configuration ensures that the Dominion KX II sends the appropriate notifications should a power supply fail The Power Supply Setup page is configured to automatically detect both power supplies us
26. esee 38 This section provides a brief overview of the installation process Each step is further detailed in the remaining sections of this chapter gt To install and configure Dominion KX II 1 Configure the target servers 2 Optional Configure the keyboard language 3 Configure the network firewall settings 4 Connect the equipment 5 Configure the Dominion KX II unit 14 When you re ready to take control Chapter 3 Installation and Configuration Step 1 Configure Target Servers zs Raritan Target servers are the computers that will be accessed and controlled via the Dominion KX II Before installing Dominion KX II configure all target servers to ensure optimum performance This configuration applies only to target servers not to the client workstations remote PCs used to access Dominion KX II remotely Refer to Chapter 1 Introduction Terminology see Terminology on page 6 for additional information gt To configure the target servers e Check the video resolution e Check the desktop background e Adjust the mouse settings e Perform OS specific mouse and video configuration Supported Video Resolutions Ensure that each target server s video resolution and refresh rate are supported by Dominion KX II and that the signal is non interlaced Video resolution and cable length are important factors in the ability to obtain mouse synchronization Refer to Target Server Connection Dis
27. gt To launch the Dominion KX II Remote Console 1 Log on to any workstation with network connectivity to your Dominion KX II unit and Java Runtime Environment v1 4 2_2 or higher installed JRE is available at http java sun com 2 Launch a supported Web browser see Supported Browsers on page 11 such as Internet Explorer IE or Firefox 3 Type the following URL http IP ADDRESS where IP ADDRESS is the IP Address that you assigned to your Dominion KX II unit You can also use https the DNS name of the Dominion KX II assigned by the administrator provided that a DNS server has been configured or just simply type the IP Address in the browser Dominion KX II always redirects the IP Address from HTTP to HTTPS The Login page opens 45 When you re ready to take control Launching the Dominion KX II 4 Type your Username and Password If this is the first time logging in log in with the factory default username and password admin and raritan all lower case you will be prompted to change the default password Refer to Changing the Default Password on page 32 for more information 5 Click Login Dominion KX II Console Layout Both the Dominion KX II Remote Console and the Dominion KX II Local Console interfaces provide an HTML Web like interface for configuration and administration as well as target server list and selection The options are organized into various tabs After successful login the Po
28. interface as the remote client Connect to a server with a simple click of the mouse How do I ensure that only authorized users can access servers from the local port Users attempting to use the local port must pass the same level of authentication as those accessing remotely This means that If the Dominion KX II is configured to interact with an external RADIUS LDAP or Active Directory server users attempting to access the local port will authenticate against the same server If the external authentication servers are unavailable Dominion KX II fails over to its own internal authentication database Dominion KX II has its own standalone authentication enabling instant out of the box installation 226 lt Raritan When you re ready to take control Appendix D FAQs Question Answer If I use the local port to change the name of a connected server does this change propagate to remote access clients as well Does it propagate to the optional CommandCenter appliance Yes The local port presentation is identical and completely in sync with remote access clients as well as Raritan s optional CommandCenter Secure Gateway management appliance To be clear if the name of a server via the Dominion KX II on screen display is changed this updates all remote clients and external management servers in real time If I use Dominion KX II s remote administration tools to change the name of a c
29. local time Phone 86 21 5425 2499 gt Beijing Monday Friday 9 a m 6 p m local time Phone 86 10 88091890 gt India Monday Friday 9 a m 6 p m local time Phone 91 124 410 7881 gt Korea Monday Friday 9 a m 6 p m local time Phone 82 2 5578730
30. members of the group to change the permissions of all users including their own Carefully consider granting these permissions Permission Description Device Settings Network settings date time settings port configuration channel names power associations event management SNMP Syslog virtual media file server setup Diagnostics Network interface status network statistics ping host trace route to host KX diagnostics Maintenance Backup and restore database firmware upgrade factory reset reboot PC Share Simultaneous access to the same target by multiple users zie Raritan iot When you re ready to take control Add New User Group 106 Permission Description Security SSL certificate security settings VM Share PC Share IP ACL User User and group management remote authentication Management LDAP RADIUS login settings Setting Port Permissions For each server port you can specify the type of access the type of access to the virtual media and the power control Please note that the default setting for all permissions is disabled Access VM Access Power Control Option Description Option Description Option Description None Denied access Deny Virtual Deny Denied completely media access permission completely is denied altogether for the port View View the Read Virtual Access Complete video but not Only media access interact with access is the connected limited to target server read acces
31. see Absolute on page 83 D2CIM VUSB only e Intelligent Mouse Mode see Intelligent on page 83 do not use an animated mouse e Standard Mouse Mode see Standard on page 83 For both the Standard and Intelligent mouse modes mouse parameters must be set to specific values which are described later in this manual Mouse parameters do not have to be altered for Absolute Mouse Synchronization D2CIM VUSB is required for this mode Mouse configurations will vary on different target operating systems consult your OS documentation for additional detail Intelligent mouse mode generally works well on most Windows platforms Intelligent mouse mode may produce unpredictable results when active desktop is set on the target For additional information on Intelligent Mouse mode refer to the Raritan Multi Platform Client MPC and Raritan Remote Client RRC User Guide Appendix B Conditions for Intelligent Mouse Synchronization available on Raritan s Website http www raritan com support productdocumentation or on the Raritan User Manuals amp Quick Setup Guides CD ROM included with your Dominion KX II shipment Operating System Mouse and Video Settings This section provides video mode and mouse information specific to the Operating System in use on the target server Raritan When you re ready to take control Chapter 3 Installation and Configuration Windows XP Windows 2003 Settings Toconfigure target serv
32. units MPC can be installed for standalone use or accessed through a Web browser After installing the Dominion KX II either download a standalone version of Raritan MPC and establish an initial network connection or launch the application directly Note MPC supports both KX I and Dominion KX II devices use MPC if you would like to access servers connected to both KX I and Dominion KX II devices with one user interface gt To launch MPC directly 1 To launch MPC from a client running any browser type http IP ADDRESS mpc into the address line where IP ADDRESS is the IP address of your Raritan device MPC will launch in a new window that does not contain a menu bar tool bar scroll bar or address bar Work in this window and toggle to other open windows using the ALT TAB command 2 When MPC launches a device tree of all automatically detected Raritan devices found on your subnet is displayed on the left side of the screen If you do not find your Dominion KX II unit listed by name create an icon manually by selecting Connection New Profile The Add Connection window opens 3 Type a device Description specify a Connection Type add the Dominion unit s IP Address and click OK These specifications can be edited later 4 Inthe Navigator panel on the left of the screen double click on the icon that corresponds to your Dominion KX II unit Refer to the Raritan Multi Platform Client MPC and Raritan Remote Client
33. 1 Dominion KxI Pieti down kke 2 Domrion X2 Podtz sown hie omriar M2 _PortS down vas 4 Dominio Hx2_ Poet down he AbesiPC up ids 6 Daminion Kx2 Poe down ids 7 Domrin KX2 Pw down tie e Domrioc KX2 Porto doom ids 9 Locs Port up is 10 Domnioo KX2 Porti 0 sown hi 4 omriar X2 Por 1 down tas 12 Damrin HKX2 Poeti down he 13 Domrion IOQ Porti 3 down tas 14 Dominion Kx2 Poeti down ida 15 Domirine HX2_Poett S down E Copyright 200 Retan Compute he Figure 14 Port Access Raritan 49 When you re ready to take control Managing Favorites gt To access a favorite Dominion KX II device Click the device name for that device listed beneath Favorite Devices A new browser opens to that device gt To toggle the Favorite Devices list display between name and IP Address To display Favorites by IP Address To display Favorites by name Click the Display by IP button Click the Display by Name button Favorite Devices currently Favorite Devices currently displayed displayed by name Click Display by IP Address Click Display by Name by IP to toggle to toggle Favorite Devices Favorite Devices KX 2 0 192 168 59 46 Manage Favorites Menu The Manage Favorites menu provides these options Favorites List Discover Devices Local Subnet Discover Devices KX Subnet and Add New Device to Favorites gt To open the Manage Favorites menu Click the Manage button The Manage Favorites page open
34. 18 13 Ib 22 64 x9 45 x12 99 785813332035 193 TCP and UDP Ports Used TCP and UDP Ports Used 194 HTTP Port 80 All requests received by Dominion KX II via HTTP port 80 are automatically forwarded to HTTPS for complete security Dominion KX II responds to Port 80 for user convenience relieving users from having to explicitly type https in the URL field to access Dominion KX II but while still preserving complete security HTTPS Port 443 This port is used for a single purpose only to send the Dominion KX II Web accessible clients KX II Console MPC to the user No other communication occurs on this port If you do not wish to use the Dominion KX II Web access capabilities and instead prefer to use the installed client software provided on the CD ROM you can prevent access to Port 443 via your firewall and Dominion KX II can still function Dominion KX II Raritan KVM over IP Protocol Configurable Port 5000 With the exception of the ports above all communication to Dominion KX II occurs over a single configurable TCP Port By default this is set to Port 5000 but you may configure it to use any TCP port of your choice except 80 and 443 For details on how to configure this setting refer to Network Settings on page 122 SNTP Time Server on Configurable UDP Port 123 optional Dominion KX II offers the optional capability to synchronize its internal clock to a central time server This function
35. 211 Proxy Mode and MPC uoin erre Ea E EE NEEE ERE E rS 211 Appendix D FAQs 212 General OuestIOrs tnter e EAEE vm ve hve vias da ode nev E ee EEEE TNR 213 nts o EE EN EPEE EEEREN EERE EHAA 215 Universal Virtual Media trier t d e d ee S RI ke EEEE res o 217 Ethernet and IP Networking eene eret rendere n Ra er eredi iret Ea 218 vio H Y 222 lieEUto 224 Io erei a a m M 226 TPO WE IC OME ON sone erem hen nette te stum Fei rot dicet te tas tuli 228 Icd UP UME MEM REOR 229 Computer Interface Modules CIMS ccccscssssssssescecseseenetesesesesnenenesesesesesnenesessssseeceseneensneseseaeanesees 230 SeCUPIL peii o retire em P EPOR E ERE REI CER EUER EE EEVA ES SENEE EEE NKE SEEN FE teo eitis 231 Manageability P 233 Miscellaneous ics rie rre ttt t E ORG FREE HERES repetere ee ious 234 Troubleshooting m 235 Index 237 Raritan When you re ready to take control Table of Figures Figure 1 Dominion KX II Configuration iosii irs inita reta PAK EXLX EN SERE DIE XNHIEE KNIT DIR ELEME ODE 2 Figure 2 Dominion KX3 TIB iotpcisps ida a D n iEEEA UR FR ICH ERU siadsan sedasa becassin asiasia 3 Figure Bii S prn c 4 Figure 4 Dominion KX II CIMs D2CIM VUSB left D2CIM PWR right 4 Figure 5 Terminology and Topology eee eee eese eee e
36. 42 The Dominion KX II Remote Console is a browser based graphical user interface that allows you to access target servers connected to the Dominion KX II and to remotely administer the Dominion KX II The Dominion KX II Remote Console provides a digital connection to your connected target servers Whenever you access a target server using the Dominion KX II Remote Console a Virtual KVM Client window is opened One Virtual KVM Client is opened for each target server permitting simultaneous access when supported by the specific Dominion KX II unit for example KX2 116 supports only one remote session There are many similarities among the Dominion KX II Local Console and the Dominion KX II Remote Console graphical user interfaces and where there are differences they are noted in the user manual The following options are available in the Dominion KX II Remote Console but not the Dominion KX II Local Console e Virtual Media on page 87 e Favorites see Managing Favorites on page 49 e Backup Restore see Backup and Restore on page 160 e Firmware Upgrade on page 163 e Upgrade Report on page 165 e KX Diagnostics on page 173 zs Raritan When you re ready to take control Chapter 4 Connecting to the Dominion KX II Multi Platform Client MPC KX and Dominion KX II Devices The Raritan Multi Platform Client MPC is a graphical interface that allows you to remotely access the target devices connected to Dominion
37. E Raritan When you re ready to take control Dominion KX Il User Guide Release 2 0 5 Copyright 2007 Raritan Inc DKX2 0E E September 2007 255 62 4023 00 This document contains proprietary information that is protected by copyright All rights reserved No part of this document may be photocopied reproduced or translated into another language without express prior written consent of Raritan Inc Copyright 2007 Raritan Inc CommandCenter Dominion Paragon and the Raritan company logo are trademarks or registered trademarks of Raritan Computer Inc All rights reserved Java is a registered trademark of Sun Microsystems Inc Internet Explorer is a registered trademark of Microsoft Corporation Netscape and Netscape Navigator are registered trademarks of Netscape Communication Corporation All other trademarks or registered trademarks are the property of their respective holders FCC Information This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a commercial installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications Operation of this equipment in a residential environment may cause harmful in
38. Group page opens 3 Select the appropriate permissions 4 Click OK Raritan When you re ready to take control Chapter 8 User Management Change Password Raritan gt To change your password 1 Select User Management gt Change Password The Change Password page opens Port Access Virtual Media User Management Device Settings Security Home gt User Management gt Change Password Change Password Old Password New Password d Confirm Hew Password i or 5e Mor ntm diem m me mes Eee e SENA Figure 47 Change Password 2 Type your current password in the Old Password field 3 Typea new password in the New Password field retype the new password in the Confirm New Password field Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and special characters see Valid Special Characters on page 32 4 Click OK 5 You will receive confirmation that the password was successfully changed Click OK Note If strong passwords are in use this page displays information about the format required for the passwords For more information about passwords and strong passwords refer to Security Settings Strong Passwords see Strong Passwords on page 149 111 When you re ready to take control Authentication Settings Authentication Settings From the Authentication Settings page you can configure the type of authentication us
39. PWR can be upgraded from this page gt To upgrade CIMs using the Dominion KX I memory 1 Select Maintenance CIM Firmware Upgrade The CIM Upgrade from KX Flash page opens Port Access Virtual Media User Management Device Settings Security Maintenance Diagnostics Home gt Maintenance gt CIM Firmware Upgrade Logo CIM Upgrade from KX Flash DominionKX CIMs Select An Desetectan Selected 4 Port Warne Current CIM Version Upgrede CIM Version nr 12 Domion KX2 Poti PowerStrp 0062 0062 LI 16 Dominion KX2 Port16 VM 0A34 2A34 Upgrade Cancel 1 eee e a La antt A nnm Metern aT ae ee aA O It et Figure 74 CIM Upgrade from KX Flash 2 The Port number Name Type Current CIM Version and Upgrade CIM Version are displayed for easy identification of the CIMs 3 Check the Selected checkbox for each CIM you want to upgrade Tip Use the Select All and Deselect All buttons to quickly select all or deselect all of the CIMs 4 Click the Upgrade button You are prompted to confirm the upgrade 5 Click OK to continue the upgrade Progress bars are displayed during the upgrade Upgrading takes approximately 2 minutes or less per CIM gt To exit without upgrading Click the Cancel button Raritan When you re ready to take control Chapter 11 Maintenance Firmware Upgrade Raritan Use the Firmware Upgrade page to upgrade the firmware for your Do
40. SSH to a Dominion SX unit E Raritan When you re ready to take control 225 Local Port Local Port Question Answer Can I access my servers directly from the rack Yes At the rack Dominion KX II functions just like a traditional KVM switch allowing control of up to 64 servers using a single keyboard monitor and mouse When I am using the local port do I prevent other users from accessing servers No The Dominion KX II local port has a completely independent access path to the servers This means a user can access servers locally at the rack without compromising the number of users that access the rack remotely at the same time remotely Can I use a USB Yes Dominion KX II offers both PS 2 and USB keyboard and mouse keyboard or mouse at ports on the local port Note that the USB ports are USB v1 1 and the local port support keyboards and mice only not USB devices such as scanners or printers Is there an On Screen Display OSD for local at the rack access Yes but Dominion KX II s at the rack access goes way beyond conventional OSDs Featuring the industry s first browser based interface for at the rack access KX II s local port uses the same interface for local and remote access Moreover most administrative functions are available at the rack How do I select between servers while using the local port The local port displays the connected servers using the same user
41. Security Settings Configure security settings for login limitations strong passwords user blocking and encryption amp share IP Access Control Control access to your Dominion KX II unit By setting a global access control list you are by ensuring that your device does not respond to packets being sent from disallowed IP addresses lt Raritan iae When you re ready to take control Chapter 10 Security Settings Security Settings Raritan From the Security Settings page you can specify login limitations user blocking password rules and encryption and share Raritan SSL certificates are used for public and private key exchanges and provide an additional level of security Raritan web server certificates are self signed Java applet certificates are signed by a VeriSign certificate Encryption guarantees that your information is safe from eavesdropping and these certificates ensure that you can trust that the entity is Raritan Inc gt Toconfigure the security settings 1 Select Security gt Security Settings The Security Settings page opens Port Accens Virtual Media User Management Device Settings JEBB Maintenance agnostics Home gt Security gt Secusity Settings troie Local Factory Reset z y Enforce at least one numeric character y Enforce at least one printable special character Humber of restricted passwords based on history x Reset To Defaults caet LITE NNNM
42. Speed Settings 196 Legend Does not function as expected Functions not recommended NOT supported by Ethernet specification product will communicate but collisions will occur Per Ethernet specification these should be no communication however note that the Dominion KX II behavior deviates from expected behavior Note For reliable network communication configure the Dominion KX II and the LAN switch to the same LAN Interface Speed and Duplex For example configure both the KX II and LAN Switch to Autodetect recommended or set both to a fixed speed duplex such as 100Mbps Full zs Raritan When you re ready to take control Appendix B Updating the LDAP Schema Note The procedures in this chapter should be attempted only by experienced users In This Chapter Returning User Group Information sse 197 Setting the Registry to Permit Write Operations to the Schema 198 Creating a New Attribute ssssssssseeeeeenenenennntete enn 198 Adding Attributes to the Class 199 Updating the Schema Cache sss 201 Editing rciusergroup Attributes for User Members ss 201 Returning User Group Information zs Raritan Use the information in this chapter to return User Group information and assist with authorization once authentication is successful From LDAP When an LDAP authentication is successful Dominion KX II de
43. Statistics Options statistics Resut Ip 903 total packets received 0 forvarded 0 incoming packets discarded 98802 incoming packets delivered 8522 requests sent out Icmp 0 ICNP messages received 0 input ICMP sess ICMP input histogram 0 ICMP messages sent 0 ICNP messages failed ICMP output histogram Tep 6 active commections openings 49 passive connection openings 0 failed connection attempts 15 connection resets received 1 connections established 7942 segnents received 304 segments send out 0 segments retransmited 0 bad segments received 0 resets sent Udp 233 packets received PRI Mie A Aat mtem MT LT C Figure 82 Network Statistics statistics Raritan 169 When you re ready to take control Network Statistics Page Interfaces Produces a page similar to the one displayed here Port Access Virtual Media User Management Device Settings Security Maintenance Diagnostics Network Statistics E z Resut Kernel Interface table Iface MTU Met RX OK PX ERR RX DRP RX OVR TX OK TX ERR TX DRP TX OVR Flg ethl 1500 0 13828 0 0 0 8680 0 O O BMNRU lo 16436 0 196 000196000 LRU Katte nahen M as naf Ami Reales sm A aem S montis BO s ipm ee hie n a Figure 83 Network Statistics interfaces Route Produces a page similar to the one displayed here Port Access Virtual Media User Management Device Settings Security Maint Home gt Diagno
44. User Management Ments sisisi rnst iesiri siisii ens 98 OE E E E stetenssonbseresoutistsberstenseatscbnestessev etree 99 CO Nn E E E E E E 100 User Group BIS ate repetere eere ie te EERTE SE En 102 Add New User Group te rtr rn ph rr tede reor 103 Change Password oie o reete rtr re be rs oe ro id Ee 111 Authentication Settings seistes ai e nenne 112 User Management Menu The User Management menu is organized as follows User List Add New User User Group List Add New User Group Change Password and Authentication Settings Use To User List Display an alphabetical list of all users add modify or delete users Add New User Add new users modify user information User Group List Display an alphabetical list of all user groups add modify or delete user groups Add New User Group Add new user groups modify user group information Change Password Change password for a specific user Authentication Configure the type of authentication used for Settings access to the Dominion KX II y e Raritan 98 When you re ready to take control Chapter 8 User Management User List The User List page displays a list of all users including their Username Full Name and User Group The list can be sorted on any of the columns by clicking on the column name From the User List page you can also add modify or delete users gt To view the ist of users Select User Management gt User List The User List page open
45. a range of 1000 Raritan s analog matrix feet 300 meters To ensure that all Raritan s customers experience the KVM switch Paragon very best quality video available in the industry a consistent Raritan characteristic Dominion Series CIMs do not interoperate with Paragon 580 ZE Raritan When you re ready to take control Security Appendix D FAQs Question Answer What kind of encryption does Dominion KX II use Dominion KX II uses industry standard and extremely secure 128 bit RC4 or AES encryption both in its SSL communications as well as its own data stream Literally no data is transmitted between remote clients and Dominion KX II that is not completely secured by encryption allow encryption of video data Or does it only encrypt keyboard and mouse data Does Dominion KX II The Dominion KX II utilizes the Advanced Encryption Standard AES support AES encryption encryption for added security as recommended by the i f i US Government s NIST AES is a US government approved cryptographic algorithm that is and FIPs standards recommended by the National Institute of Standards and Technology l NIST in the FIPS Standard 197 Does Dominion KX II Unlike competing solutions which only encrypt keyboard and mouse data Dominion KX II does not compromise security it allows encryption of keyboard mouse and video data How does Dominion KX II integrate with external authentication ser
46. control Chapter 9 Device Management 4 Forthe User Specified Time option enter the date and time as follows a Select the Month from the drop down list b Type the Day of the Month c Type the Year in yyyy format d Enter the Time in hh mm format using a 24 hour clock 5 For the Synchronize with NTP Server option a Enter the IP address of the Primary Time server b Optional Enter the IP address of the Secondary Time server 6 ClickOK Event Management The Dominion KX II Event Management feature provides a set of screens for enabling and disabling the distribution of system events to SNMP Managers Syslog and the audit log These events are categorized and for each event you can determine whether you want the event sent to one or several destinations E Raritan 129 When you re ready to take control Event Management 130 Event Management Settings SNMP Configuration Simple Network Management Protocol SNMP is a protocol governing network management and the monitoring of network devices and their functions Dominion KX II offers SNMP Agent support through Event Management Refer to SNMP Agent Configuration on page 133 and SNMP Trap Configuration on page 133 for more information about SNMP Agents and Traps gt To configure SNMP enable SNMP logging 1 Select Device Settings gt Event Management Settings The Event Management Settings page opens Port Access Virtual Me
47. control View Menu zs Raritan Chapter 6 Virtual KVM Client 4 Exit Target Screen Resolution Mode Hotkey When you enter target screen resolution mode the display of the target server becomes full screen and acquires the same resolution as the target server This is the hotkey used for exiting this mode select from the drop down list 5 ExitSingle Cursor Mode Hotkey When you enter single cursor mode only the target server mouse cursor is visible This is the hotkey used to exit single cursor mode and bring back the client mouse cursor select from the drop down list 6 ClickOK View Toolbar You can use the Virtual KVM client with or without the toolbar display gt To toggle the display of the toolbar on and off Select View View Toolbar Scaling Scaling your target window allows you to view the entire contents of the target server window This feature increases or reduces the size of the target video to fit the Virtual KVM Client window size and maintains the aspect ratio so that you see the entire target server desktop without using the scroll bar Totoggle scal ng on and off Select View Scaling Target Screen Resolution When you enter target screen resolution mode the display of the target server becomes full screen and acquires the same resolution as the target server The hotkey used for exiting this mode is specified in the Options dialog default is Ctrl Alt M gt
48. default hotkey is to press the Scroll Lock key twice rapidly This key combination can be changed in the Local Port Settings see Local Port Settings KX II Local Console Only on page 182 page gt To return to the KX II Local Console from the target server Press the hotkey default is Scroll Lock twice rapidly The video display switches from the target server interface to the Dominion KX II Local Console interface 181 When you re ready to take control Local Port Administration Local Port Administration S Raritan The Dominion KX II can be managed by either the KX II Local Console or the KX II Remote Console Please note that the KX II Local Console also provides access to these administrative functions e Local Port Settings e Factory Reset Note Only users with administrative privileges can access these functions Local Port Settings KX Il Local Console Only From the Local Port Settings page you can customize many settings for the KX II Local Console including keyboard local port hotkey video switching delay power save mode local user interface resolution settings and local user authentication Note This feature is available only on the Dominion KX II Local Console gt To configure the local port settings 1 Select Device Settings gt Local Port Settings The Local Port Settings page opens Dominion KX II Connected Users admin Local E 182 Ears 1l Keyboar
49. device zie Raritan a When you re ready to take control Managing Favorites 2 Click the Edit button The Edit page opens Port Access Virtual Media User Management Device Settings Security Maint Home gt Manage Favorites gt Edit Delete Favorites gt Editing 192 108 590 150 Edit 192 168 59 150 AJ fields are requred Description pouwknkx jon xt IP Address fisz 168 59 150 Port Ex X Sues e mb WR LP Figure 16 Edit Favorite Information 3 Update the fields as necessary Description Type something meaningful P Address Type the IP Address of the Dominion KX II unit Port Change the discovery Port if necessary 4 Click OK 52 zie Raritan When you re ready to take control Raritan Chapter 4 Connecting to the Dominion KX II Discover Devices Local Subnet This option discovers the devices on your local subnet that is the subnet where the Dominion KX II Remote Console is running access these devices directly from this page or add them to your list of favorites Port Access Virtual Media User Manepement Device Settings Security Main Discover Devices Local Subnet fg Use Default Port 5000 192 168 59 213 192163 59 227 192 168 59 218 192168 59 217 192 168 59 206 192 169 59 240 192 168 59 224 192 168 59 225 192 168 58 237 i 192 168 59 239 192 168 59 244 192 168 59 249 192 163 59 252 192169 59 253 19
50. e Data In Second Data rate in e Data Out Second Data rate out e Connect Time The duration of the connect time e FPS The frames per second transmitted for video e Horizontal Resolution The screen resolution horizontally e Vertical Resolution The screen resolution vertically e Refresh Rate How often the screen is refreshed e Protocol Version RFB Protocol version gt To copy this information Click Copy to Clipboard The information is available to be pasted into the program of your choice Exit gt To close the Virtual KVM Client the target you are currently accessing Select Connection gt Exit 35 zs Raritan When you re ready to take control Keyboard Menu Raritan Chapter 6 Virtual KVM Client Send Ctrl Alt Delete Due to its frequent use a Ctrl Alt Delete macro has been pre programmed into the Virtual KVM Client This key sequence is sent to the target server to which you are currently connected In contrast if you were to physically press the Ctrl Alt Delete keys while using the Virtual KVM Client the command would first be intercepted by your own PC due to the structure of the operating system instead of sending the key sequence to the target server as intended Send Ctrl Alt Delete Sends a Ctrl Alt Delete key sequence to the target server gt To send a Ctri Alt Delete key sequence to the target Server e Select Keyboard gt Send Ctrl Alt Delet
51. for Power Strips 145 147 Naming Target Servers e 35 Network Basic Settings 128 129 Network Interface Page e 175 Network Miscellaneous Settings e 57 128 130 Network Settings e 28 34 35 127 160 203 Network Speed Settings e 131 205 Network Statistics Page e 176 Non US Keyboards 215 Note for D2CIM VUSB CIM Usage 27 149 151 Note on Microsoft Active Directory e 38 Note to CC SG Users 37 38 Numeric Keypad 216 O Opening a KVM Session 95 96 Operating System Mouse and Video Settings 16 Options 70 88 Organization of Information 8 Overview 14 68 92 196 215 P Package Contents 7 Physical Connections 185 187 Physical Specifications e 200 Ping Host Page 178 Port Access Page 61 Raritan When you re ready to take control Index Port Action Menu 62 63 188 189 Port Configuration Page 144 147 149 Power Control e 146 238 Power Controlling a Target Server e 65 Power Cycle a Target Server e 65 Power Off a Target Server 66 Power On a Target Server 66 Power Supply Setup Page 29 37 142 Prerequisites for Using Virtual Media e 94 95 Product Features e 4 Product Photos 3 Properties Dialog e 73 Proxy Mode and MPC 221 R RADIUS Communication Exchange Specifications e 125 Raritan Remote Client RRC KX I Devices Only 46 Reboot 172 Refresh Screen 81 Related Documentation 9 Relationship between Users and Groups 41
52. for those ports Port permissions are set at the group level please refer to Setting Port Permissions on page 106 for more information Optional If you want to use PC Share VM Share Mode see Encryption amp Share on page 151 must also be enabled in the Security Settings page Client PC Certain virtual media options require administrative privileges on the client PC e g drive redirection of complete drives Note If you are using Microsoft Vista turn User Account Control off Control Panel gt User Accounts gt User Account Control gt turn off If you would prefer not to change Vista account permissions run Internet Explorer as an administrator To do this click on the Start Menu locate IE right click it and select Run as Administrator USB 2 0 ports are both faster and preferred Target Server Target servers must support USB connected drives Target servers running Windows 2000 must have all of the recent patches installed Raritan When you re ready to take control Chapter 7 Virtual Media Using Virtual Media With the Dominion KX II virtual media feature you can mount up to two drives of different types These drives are accessible for the duration of the KVM session For example you can mount a specific CD ROM use it and then disconnect it when you are done The CD ROM virtual media channel will remain open however so that you can virtually mount another CD ROM These virtual
53. in Base64 encoded X 509 format for the LDAP server Use the Browse button to navigate to the certificate file This field is enabled when the Enable Secure LDAP option is checked DN of administrative User Distinguished Name of administrative user consult your authentication server administrator for the appropriate values to type into this field An example DN of administrative User value might be cn Administrator cn Users dc testradius dc com User Search DN This describes the name you want to bind against the LDAP and where in the database to begin searching for the specified Base DN An example Base Search value might be cn Users dc raritan dc com Consult your authentication server administrator for the appropriate values to enter into these fields Type of external LDAP server Select from among the options available a Generic LDAP Server Microsoft Active Directory Active Directory is an implementation of LDAP directory services by Microsoft for use in Windows environments Active Directory Domain Type the name of the Active Directory Domain Raritan When you re ready to take control Chapter 8 User Management Returning User Group Information from Active Directory Server The Dominion KX II supports user authentication to Active Directory AD without requiring that users be defined locally on the Dominion KX II This allows Active Directory user accounts and passwords to be maintained exclu
54. logout of the target seroer and log back in for the video settings to take effect SUSE Linux 10 1 Settings Note Do not attempt to synchronize the mouse at the SUSE login prompt You must be connected to the target server to synchronize the mouse cursors 1 To conf gure the mouse settings Select Desktop gt Control Center The Desktop Preferences dialog opens Select Mouse The Mouse Preferences dialog opens Open the Motion tab Within the Speed group set the Acceleration slider to the exact center position Within the Speed group set the Sensitivity slider to low Within the Drag amp Drop group set the Threshold slider to small Click Close To conf gure the video From Desktop Preferences select Graphics Card and Monitor The Card and Monitor Properties dialog opens Verify that a Resolution and Refresh Rate is in use that is supported by Dominion KX II Please refer to Supported Video Resolutions for more information Note If you change video resolution you must logout of the target server and log back in for the video settings to take effect zie Raritan When you re ready to take control Chapter 3 Installation and Configuration Make Linux Settings Permanent Note These steps may vary slightly depending on the specific version of Linux in use gt To make your settings permanent in Linux prompt 1 Select Main Menu gt Preferences gt More Preferences gt Sessions Th
55. media channels remain open until the KVM session is closed gt To use virtual media 1 Connect attach the media to the client or network file server that you want to access from the target server This need not be the first step but it must be done prior to attempting to access this media 2 Verify that the appropriate prerequisites see Prerequisites for Using Virtual Media on page 90 are met 3 File server ISO images only If you plan to access file server ISO images identify those file servers and images through the Dominion KX II Remote Console File Server Setup page see File Server Setup File Server ISO Images Only on page 96 4 Open a KVM session see Opening a KVM Session on page 92 with the appropriate target server 5 Connectto the virtual media For Select this VM option Local drives Connect Drive see Local Drives on page 93 Local CD DVD drives Connect CD ROM ISO Image see CD ROM DVD ROM ISO Images on page 94 ISO Images Connect CD ROM ISO Image File Server ISO Images Connect CD ROM ISO Image 6 Upon completion of your tasks disconnect the virtual media see Disconnecting Virtual Media on page 95 zie Raritan T When you re ready to take control Opening a KVM Session Opening a KVM Session 92 gt Toopena KVM session 1 Open the Port Access page from the Dominion KX II Remote Console Port Access Virtue Media User Management Device Settings Secur
56. mounted so the server ports face forward How large is the Dominion KX II is only 1U high except KX2 464 which is 2U fits ina Dominion KX II standard 19 rack mount and is only 11 4 29 cm deep e 214 Raritan When you re ready to take control Remote Access Appendix D FAQs Question Answer How many users can remotely access servers on each Dominion KX Ir Dominion KX II models offer remote connections for up to eight users per channel for simultaneous access and control of a unique target server For one channel devices like the DKX2 116 up to eight remote users can access and control a single target server For two channel devices like the DKX2 216 up to eight users can access and control the server on channel one and up to another eight users on channel two For four channel devices up to eight users per channel for a total of 32 8 x 4 users can access and control four servers in a similar fashion Can two people look at the same server at the same time Yes actually up to eight people can access and control any single server at the same time Can two people access the same server one remotely and one from the local port Yes the local port is completely independent of the remote ports The local port can access the same server using the PC Share feature In order to access Dominion KX II from a client what hardware software or network configuration is required Beca
57. only e AM Absolute Mouse Synchronization D2CIM VUSB only e IM Intelligent Mouse Mode e SM Standard Mouse Mode e v Supported Note The DCIM USB G2 provides a small slide switch on the back of the CIM Move the switch to P for PC based USB target servers move the switch to S for Sun USB target servers A new switch position takes effect only after the CIM is power cycled To power cycle the CIM remove the USB connector from the target server and plug it back in a few seconds later D2CIM USB G2 Note Note The DCIM USB G2 provides a small slide switch on the back of the CIM Move the switch to P for PC based USB target servers move the switch to S for Sun USB target servers A new switch position takes effect only after the CIM is power cycled To power cycle the CIM remove the USB connector from the target server and plug it back in a few seconds later 13 When you re ready to take control Chapter 3 Overview Raritan Installation and Configuration In This Chapter CDV VIS pM 14 Step 1 Configure Target Servers sess 15 Step 2 Optional Configure Keyboard Language sss 27 Step 3 Configure Network Firewall Settings sss 28 Step 4 Connect the Equipment 29 Step 5 Dominion KX II Initial Configuration sess 31 Remote Authentication t iei as o 36 Users Groups and Access Permissions
58. over Click the Clear button Running a Keyboard Macro Once you have created a keyboard macro execute it by clicking on its name in the Keyboard menu gt To execute a macro using this example Select Keyboard gt Minimize All Windows An alternative method is to select the macro from the Keyboard Macros window gt To execute a macro 1 Select Keyboard gt Keyboard Macros The Keyboard Macros window opens 2 Select the macro from among those listed 3 Click Run Macro Modifying a Keyboard Macro gt To modify a macro 1 Select Keyboard Keyboard Macros The Keyboard Macros window opens Select the macro from among those listed Click Modify The Add Edit Macro window opens Make your changes Click OK Gt pe qx M Removing a Keyboard Macro Please exercise caution in the removal of macros you are not prompted to confirm their deletion zie Raritan When you re ready to take control Video Menu zs Raritan Chapter 6 Virtual KVM Client gt Toremove a macro 1 Select Keyboard Keyboard Macros The Keyboard Macros window opens 2 Select the macro from among those listed 3 Click Remove The macro is deleted Video settings can be refreshed automatically in several ways e The Refresh Screen option forces a refresh of the video screen e The Auto sense Video Settings option automatically detects the target server s video settings e The Calibrate Color o
59. r Enable Single Login Limitation Disabled Enable Password Aging C Timer Lockout Password Aging Interval days Attempts F Log Out idie Users Lockout Time After minutes 0 Deactivate User AD failed Attempts P Enable strong passwords Encryption Mode Minimum length of strong password zl M Apply Encryption Mode to KVM and Virtual Media Maximum length of strong password PC Share Mode T mre d pg Enforce at least one lower case character py YM Share Mode g Enforce at least one upper case character Local Device Reset Mode u ergight 200 Deren Comenter the AS aseo amm MET LLL i AR nm net afe hn a am nien an Figure 65 Security Settings The fields are organized into the following groups Login Limitations Strong Passwords User Blocking and Encryption amp Share 147 When you re ready to take control Security Settings 148 Sn ose GO de Update the Login Limitations on page 148 settings as appropriate Update the Strong Passwords on page 149 settings as appropriate Update the User Blocking on page 150 settings as appropriate Update the Encryption amp Share on page 151 settings as appropriate Click OK when you are done To close the page without saving any changes Click Cancel To reset back to defaults Click Reset to Defaults Login Limitations Using Login Limitations you can specify restrictions for single login password aging and the logging out of idle users En
60. rci acitignenaton Nat Set lt Not Set gt Figure 107 User Properties Ch Lsers OC mype 0C iydomain ars CI Users DoO mype OC mycor rs CN Users DC mnc DC mydor N Users OC mype OC mydomain sees DC mvpz DC mycomein E s CM Lsers DIC mypc Dic mydom shor Owners CN Users DC mypc E 0C nype 0C nydonan OC cor p CIN Users Do mypc DC mycor DCemyprc DCemrdomsinDCeconr vere CN Users DC myec o C myc CN Users DC mypc DC mydemar 540 CU Users m pe DC 21d eere 0 Cu mypc DC mydomain C 11 Type the user group created in Dominion Dominion KX II in the Edit Attribute field String Attribute Editor Figure 108 Edit Attribute adding user to KX II group 12 Click OK 13 Click OK Raritan When you re ready to take control Appendix C Informational Notes Overview In This Chapter CNV VIO 205 Non US Keyboards sss eene 205 Macintosh Keyboard cccccesessssssescssseseecsesseescececeeeseenesesesesssnenensnenssceeesees 208 Mouse Pointer Synchronization Fedora sss 208 Resolving Fedora Core Focus esses 209 SUSE VESA Video Modes rtr tet i retine 209 Mc 210 Virtual Media rte entere eset orta ert iret rr 210 COSG ER 211 This chapter includes important notes on Dominion KX II usage Future updates will be documented and available online through the H
61. ready to take control Chapter 6 Virtual KVM Client b Click the Press Key button after each selection As each key is selected it displays in the Keys to Release field In this example select two keys the Windows key and the letter D key 5 Inthe Keys to Release field a Selecteach key for which you would like to emulate a key release in the order in which they are to be released b Click Release Key after each selection In this example both keys pressed must also be released 6 Review the Macro Sequence which has been automatically generated using the Keys to Press and Keys to Release selections Verify that the Macro Sequence is the exact key sequence you want To remove a step in the sequence select it and click Remove x Keyboard Macro Name winimize All Windows Keys to Press Keys to Release Macro Sequence Figure 30 Keyboard Macro Example Tip Use the and v keys to reorder the key sequence 7 Click OK from the Add Keyboard Macro window to save the macro 8 Click Close from the Keyboard Macros window The keyboard macro created is now listed as an option from Keyboard menu Connection Keyboard Video Mouse 85 n Q Send Ctrl Alt Delete Keyboard Macros Minimize All Windows Figure 31 New Macro in Keyboard Menu Raritan 75 When you re ready to take control Keyboard Menu 76 gt To cancel without saving changes Click Cancel gt To clear all fields and start
62. take control Starting the KX II Local Console Starting the K X 178 The actions that are performed when the reset button is pressed are defined in the graphical user interface Refer to Security Settings Encryption amp Share see Encryption amp Share on page 151 for more information Note It is recommended that you save the audit log prior to performing a factory reset The audit log is deleted when a factory reset is performed and the reset event is not logged in the audit log For more information about saving the audit log please refer to Audit Log on page 157 gt To reset the unit 1 Power off the Dominion KX II unit 2 Use a pointed object to press and hold the reset button 3 While continuing to hold the reset button power the Dominion KX II unit back on 4 Continue holding the reset button for 5 10 seconds Once the unit has been reset two short beeps signal completion I Local Console Simultaneous Users The Dominion KX II Local Console provides an independent access path to the connected target servers Using the Local Console does not prevent other users from simultaneously connecting over the network And even when remote users are connected to Dominion KX II you can still simultaneously access your servers from the rack via the Local Console zs Raritan When you re ready to take control Chapter 13 KX II Local Console Security and Authentication In order to use the Dom
63. the Remote Server ISO Image Hostname and Image drop down lists in the Map Virtual Media CD ISO Image dialog see CD ROM DVD ROM ISO Images on page 94 gt To designate file server ISO images for virtual media access 1 Select Virtual Media from the Dominion KX II Remote Console The File Server Setup page opens Port Access WNUN Media User Management Device Settings Security Maintenance Diagnostics Home gt File Server Setup i 2 beso File Server Setup Selected Host Name PAddress Image Path F 151189 1 7 5 ees EE r a f r Eas ees oD D 4 r D D r L LL BE Ls TTT r Cd ss r PEN m MT Ns ne Anan mate URN PR PERPE REPRE Figure 39 File Server Setup 2 Input information about the file server ISO images that you want to access Host Name IP Address Host name or IP Address of the file server mage Path Full path name of the location of the ISO image Raritan When you re ready to take control Raritan When you re ready to take control Chapter 7 Virtual Media Check the Selected checkbox for all media that you want accessible as virtual media Click Save All media specified here will now be available for selection in the Map Virtual Media CD ISO Image dialog To cancel without sav ng Click Cancel 97 Chapter 8 User Management In This Chapter
64. the Virtual KVM Client is launched from CommandCenter Secure Gateway CC SG in proxy mode the Virtual KVM Client version is unknown In the About Raritan Virtual KVM Client dialog the version is displayed as Version Unknown Proxy Mode and MPC If you are using Dominion KX II in a CC SG configuration do not use the CC SG proxy mode if you are planning to use the Multi Platform Client MPC E Raritan 211 When you re ready to take control Appendix D FAQs Raritan In This Chapter General QuestIODS ee eorr terere e e UY e EE eve e re successes 213 Remote ACCESS eseri asier eee reve riso aste eie ved eo eee UU ee exe eee E rune eve 215 Universal Virtual Media essen eene nnne enne 217 Ethernet and IP Networking s sse 218 SETVE Sessa eei e Ec WE EL e nove ee i ob be doe cere ae ebbe 222 InstallatiOti 22 etie cr Ere EE eee e e ere op raa 224 Local POEtL 5 rtr Er tree E Er epe E EI te UE ria Soa DURS 226 Power Corto eei ce irren in i rede ee ooo praeses Ee 228 Scalability eee me e nhe npe tee nerit t niei rtis ia 229 Computer Interface Modules CIMs sss 230 uiri M A 231 Manageability ioniese oE er eare i 233 Miscellaneous meun EE EAEE 234 JTro bleshOoOLng oio nemen a rure ER SES 235 212 When you re ready to take control Appendix D FAQs General Questions Question Answer What is Dominion KX Dominion KX II i
65. to Raritan Technical Support d Raritan Technical Support will also need to know the administrative password for the Dominion KX II e OnceRaritan Technical Support has completed their testing return UDP port 21 to its original state 3 To execute a diagnostics script file emailed to you from Raritan Technical Support a Retrieve the diagnostics file supplied by Raritan and unzip as necessary b Use the Browse button A Choose file dialog opens c Navigate to and select this diagnostics file d Click Open The file is displayed in the Script File field Diagnostics Scripts Script File C Documents and Setting Browse Figure 88 Diagnostics Scripts e Click Run Script f Sent this file to Raritan Technical Support using step 4 4 Tocreate a diagnostics file to send to Raritan Technical Support 174 Raritan When you re ready to take control Chapter 12 Diagnostics a Click the Save to File button The File Download dialog opens File Download Security Warning Figure 89 File Download b Click Save The Save As dialog opens c Navigate to the desired directory and click Save d Email this file as directed by Raritan Technical Support Raritan 175 When you re ready to take control Chapter 13 KX II Local Console In This Chapter KX II Local Console tote rrt te ti etre eren erre 176 Starting the KX II Local Console sess 178 Accessing Target Serve
66. to take control Appendix A Specifications Physical Specifications DK X2 116 DK X2 132 DK X2 216 DK X2 232 DK X2 416 DK X2 432 Line Item Description Weight Product Dimensions WxDxH 16 Port Dominion KX II with 1 user Network Access and Local Port Virtual Media Dual Power 8 65 Ibs 3 9kg 1 75 x 17 3 x 11 4 44mm x 439mm x 290mm 32 Port Dominion KX II with 1 user Network Access and Local Port Virtual Media Dual Power 9 0 lbs 4 1kg 1 75 x 17 3 x 11 4 44mm x 439mm x 290mm 16 Port Dominion KX II with 2 user Network Access and Local Port Virtual Media Dual Power 8 65 lbs 3 9 kg 1 75 x 17 3 x 11 4 44mm x 439mm x 290mm 32 Port Dominion KX II with 2 user Network Access and Local Port Virtual Media Dual Power 9 0 lbs 4 1 kg 1 75 x 17 3 x 11 4 44mm x 439mm x 290mm 16 Port Dominion KX II with 4 user Network Access and Local Port Virtual Media Dual Power 9 04 lbs 4 1 kg 1 75 x 17 3 x 11 4 44mm x 439mm x 290mm 32 Port Dominion KX II with 4 user Network Access and Local Port Virtual Media Dual Power 9 48 lbs 4 3 kg 1 75 x 17 3 x 11 4 44mm x 439mm x 290mm Shipping Weight Shipping Dimensions WxDxH UPC Code Power 14 85 lbs 6 7 kg 22 x 16 6 x 6 5 559mm x 422mm x 165mm 14 9 Ibs 6 8 kg 22 x 16 6 x 6 5 559mm x 422mm x 165mm 1
67. v ere dicet e E 69 Properties Dialog ien petente D He eer rt HL EO RE costretto rint 69 Connection ILO UP 71 JEE a Q 72 Keyboard Mensa nece ci dat eU SCIPIO RARO ERU UE steeds Ee RARE 73 Send CteEEATUEDOelGte a ise rude er iret ee here ER e e rhe A E EEA 73 Keyboard Mact s cuciiiee ie a shades ire ei pra Hn e i Heer PE ERE ERR E ERE eee 73 Creating a Keyboard Macro nennen 74 Running a Keyboard Macro cccccccsesesessssesessscecseseesensnesesssesesnsnsnesssseseceeeeeenssesesssesnansnesessseeees 76 Modifying a Keyboard Macro uu ccscesssesesssssesssesceseeeseneesesesesesnssnesssssceceeeseneneseseeeeeeeneneseseseanens 76 Removing a Keyboard Macro tenente nennen 76 MAACO MOT mM 77 Refresh Scree D susevenss 77 Autosserse Video Setlirigsu anu ic ebrei n en ir EHI kh eei etie e ba esie bad 77 Calibrate Color eerta e e E n e bM niv o i d Ek erred 78 Vide SOUE I P 78 huida 81 Synchronize MOUSE os cases tiores ires te bmp bro oir ien e Parr toe dl nente te i Pese aas 81 Single MOUSE CULSOR is 82 Standard oce noU anda E ES 83 lucum M 83 ADSol tec iiec e Une I Mer IM 83 zie Raritan 7 When you re ready to take control Contents vi Virtaal Media borini anrs 84 DOLON E AN L
68. which the user belongs E Raritan iis When you re ready to take control Authentication Settings 120 RADIUS Communication Exchange Specifications The Dominion KX II unit sends the following RADIUS attributes to your RADIUS server Attribute Login Access Request 1 NAS Port Type 61 VIRTUAL 5 for network connections NAS IP Address 4 The IP Address for the Dominion KX II unit User Name 1 The user name entered at the login screen Acct Session ID 44 Session ID for accounting User Password 2 The encrypted password Accounting Request 4 Acct Status 40 Start 1 Starts the accounting NAS Port Type 61 VIRTUAL 5 for network connections NAS Port 5 Always 0 NAS IP Address 4 The IP Address for the Dominion KX II unit User Name 1 The user name entered at the login screen Acct Session ID 44 Session ID for accounting Accounting Request 4 Acct Status 40 Stop 2 Stops the accounting NAS Port Type 61 VIRTUAL 5 for network connections NAS Port 5 Always 0 NAS IP Address 4 The IP Address for the Dominion KX II unit User Name 1 The user name entered at the login screen Acct Session ID 44 Session ID for accounting Raritan When you re ready to take control Chapter 9 Device Management In This Chapter
69. 004540133 c1 CIM Information Firmware Version Serial Number 1 Dominion KX2 Porti VM 2A36 HUWT7250771 3 Dorminion KX2 Port3 POM N A GNFFFFFFFFFFFF7585 8 Dorminion X2 Porta PowerStrip 0062 PO16A00053 Figure 72 Device Information The following information is provided about the Dominion KX II Model Hardware Revision Firmware Version Serial Number and MAC Address The following information is provided about the CIMs in use Port number Name Type of CIM DCIM PCIM Power Strip or VM Firmware Version and Serial Number Raritan 159 When you re ready to take control Backup and Restore Backup and Restore 160 From the Backup Restore page you can backup and restore the settings and configuration for your Dominion KX II In addition to using backup and restore for business continuity purposes you can use this feature as a time saving mechanism For instance you can quickly provide access to your team from another Dominion KX II by backing up the user configuration settings from the Dominion KX II in use and restoring those configurations to the new Dominion KX II You can also setup one Dominion KX II and copy its configuration to multiple Dominion KX II devices Toaccess the Backup Restore page Select Maintenance Backup Restore The Backup Restore page opens User Management Device Settings Security Maint P Home gt Maintenance gt Badup Restore Ba
70. 1 3 x 3 0 x 0 6 WxDxH Shipping Weight 0 2 Ibs 0 2 Ibs Shipping Dimensions 7 2 x 9 x 0 6 7 2 x 9 x 0 6 WxDxH UPC Code 785813332004 785813338532 192 Interface Module DCIM USB DCIM SUSB Dominion KX I amp Dominion KX I amp II Computer II Computer Interface Module Interface Module USB Port USB Port for Sun 0 2 Ibs 0 2 lbs 1 3 x 3 0 x 0 6 1 3 x 3 0 x 0 6 0 2 Ibs 0 2 Ibs 7 2 x 9 x 0 6 7 2 x 9 x 0 6 785813338518 785813338556 n e Raritan When you re ready to take control Appendix A Specifications D2CIM VUSB Part Number DCIM SUN D2CIM PWR D2CIM VUSB 32PAC Line Item Description Dominion KXI amp Dominion KX II Bulk pack of 32 II Computer Computer D2CIM VUSB Interface Module Interface Module Sun Port HD15 for Remote Power Video strips Product Weight 0 2 Ibs 0 2 Ibs 6 4 Ib Product Dimensions 1 3 x 3 0 x 0 6 1 3 x 3 0 x 0 6 1 3 x 3 0 x WxDxH 0 6 32 Shipping Weight 0 2 Ibs 0 2 lbs 8 01 Ib Shipping Dimensions 7 2 x 9 x 0 6 7 2 x 9 x 0 6 21 65 x12 20 x4 33 WxDxH UPC Code 785813338549 785813332011 785813332028 Remote Connection Network 10BASE T 100BASE T and 1000BASE T Gigabit Ethernet Protocols TCP IP UDP SNTP HTTP HTTPS RADIUS LDAP KVM Properties Keyboard PS 2 or USB Mouse PS 2 or USB Video VGA Raritan When you re ready to take control 64PAC Bulk pack of 64 D2CIM VUSB 12 8 Ib 1 3 x 3 0 x 0 6 64
71. 2 168 59 233 192 168 59 185 192 169 59 207 LIU CI ECU ORR O RC ORE OR ORO Reo CHI CI 192 163 59 208 EET Copyright 2007 Raritan Computer Inc NEU TRE rr Er e EOS Figure 17 Discover Devices Local Subnet 53 When you re ready to take control Managing Favorites 54 1 2 To discover devices on the local subnet Select Favorites Discover Devices Local Subnet The Discover Devices Local Subnet page opens Select the appropriate discovery port refer to Network Miscellaneous Settings on page 124 for information about the discovery port To use the default discovery port check the Use Default Port 5000 option To use a different discovery port a Clear the Use Default Port 5000 option b Type the port number into the Discover on Port field c Click Save Click Refresh The list of devices on the local subnet is refreshed To add devices to your Favorites L st Check the checkbox next to the device name IP Address Click Add Tip Use the Select All and Deselect All buttons to quickly select all or deselect all devices in the remote console subnet To access a discovered device Click the device name or IP Address for that device A new browser opens to that device zs Raritan When you re ready to take control Chapter 4 Connecting to the Dominion KX II Discover Devices KX Subnet This option discovers the devices on the KX device subnet that is th
72. 4 49 lbs 6 6 kg 22 x 16 6 x 6 5 559mm x 422mm x 165mm 14 9 Ibs 6 8 kg 22 x 16 6 x 6 5 559mm x 422mm x 165mm 14 94 Ibs 6 8 kg 22 x 16 6 x 6 5 559mm x 422mm x 165mm 15 38 Ibs 7 0 kg 22 x 16 6 x 6 5 559mm x 422mm x 165mm 785813624055 785813624079 785813624086 785813625021 785813625359 785813625380 Dual Power 100 240 V 50 60 Hz 0 6A 25 4 Watts zs Raritan When you re ready to take control Dual Power 100 240 V 50 60 Hz 0 6A 26 Watts Dual Power 100 240 V 50 60 Hz 0 6A 26 3 Watts Dual Power 100 240 V 50 60 Hz 0 6A 27 Watts Dual Power 100 240 V 50 60 Hz 1A 62 Watts 191 Dual Power 100 240 V 50 60 Hz 1A 64 Watts Environmental Requirements Electrical Specifications Parameter Value Input Nominal Frequencies 50 60 Hz Nominal Voltage Range 100 240 VAC Maximum Current AC RMS 0 6A max AC Operating Range 100 to 240 VAC 10 47 to 63 Hz Output 5 VDC 12VDC N A 5 VDC 12VDC N A Maximum DC Power Output N A Maximum AC Power N A Consumption Maximum Heat Dissipation N A Volt Ampere Rating N A Computer Interface Modules CIMs Part Number D2CIM VUSB DCIM PS2 Line Item Description Dominion KX II Dominion KX I amp Computer II Computer Interface Module USB Port with PS 2 Port Virtual Media Product Weight 0 2 lbs 0 2 Ibs Product Dimensions 1 3 x 3 0 x 0 6
73. E aLe PARRE AEA E EE E EEE E N E O 84 oe cts seve E E E E E E E M 84 VAC W MENU E E E E E E E E lists cbeuvbvese doneventanstonsechodte 85 NOTI oT ERE E E R O E 85 SCANNE doepa ni EE ER E E E E EOE RRE 85 Target 5creen Reso Utloni aei osiin a oe pc rr E ero ibd e idee EEES 85 sce M M 86 About Raritan Virtual KVM Client nennen 86 Chapter 7 Virtual Media 87 OVervI8 Wasuioetue rante aedi b rper dia at sor qi ardebat E 88 Prerequisites for Using Virtual Media cccccccsssscssssseesstetesesesessensnssescscsceceseessessseeceseeenensneneseseseanens 90 Using Virtual Media ete eterne thee tei ren Een Etre do eoe rts toss n e 91 Opening SUR 92 Connecting to Virtual Media sere tte eer ter enero eere i re oed dept 93 Local DTV C 93 Conditions when Read Write is not Available sss 94 CD ROM DVD ROM ISO Images eseeeeeeenenenenennnntenn nennen nre tenete 94 Disconnecting Virtual Media ceceesecsssssesssseeeeseetetesesesesnsnsesesssessansnssescsseceseeseeeeesieissesesnsanansseaseeeeees 95 File Server Setup File Server ISO Images Only sees 96 Chapter 8 User Management 98 User Management Mensen i na n A E A ERNER 98 D P E A E A AE E E T 99 Bl NeW USER E 100 Modity Existing User retener tren vogensen REENE eno corri notera tie rua 101
74. EE E EEE enne Event Management Settings sss SNMP Configuration sireenin r eenia innnan arine EESE Syslog Configuration Event Management Destinations SNMP Agent Configuration sse SNMP Trap Configuration sse Power Supply Setup Page sss eene Port Configuration Page sirehri senerare ntes P wer COME E Connect the Power Strip Name the Power Strip Port Page for Power Strips Associate Target Servers to Outlets Port Page s Note for D2CIM VUSB CIM Usage eeeeeeeeeee Chapter 10 Security Settings Security Settings Menu nennen Security Settings sse nnne nennen enne Login Limitations sese Strong Passwords uie io erepti da Finn eia epe User Blocking acre neret ornetur E Encryption amp Share senaera ie fpi re innen Checking Your Browser for AES Encryption s sss zs Raritan When you re ready to take control vii Contents IP ACCESS C ODIBEOL c oerte to rodeo eere NRI STEE e eei Poit o Ree RR INE VENE RR R NI V ee RE TRAINS HE 153 Chapter 11 Maintenance 156 Maintenance Menuli sc csccscscorstesci 156 Maintenance Features Local Remote Console esee 156 PwbgE Hr E 157 Devicedntormalonc ene etae Nui taet itt dee SD eus 159 Backup and REStOre sirena eiie EEEE E eara KETE EEEE nennt tnter tenete nennen 160 CIM Upgr
75. Existing User Raritan When you re ready to take control To modify an existing user From the User page change the appropriate fields Refer to Add New User on page 100 for information about how to get access the User page Click OK 101 User Group List User Group List 102 User groups are used with local and remote authentication via RADIUS or LDAP It is a good idea to define user groups before creating individual users because when you add a user you must assign that user to an existing user group The User Group List page displays a list of all user groups which can be sorted in ascending or descending order by clicking on the Group Name column heading From the User Group List page you can also add modify or delete user groups Tolistthe user groups Select User Management gt User Group List The User Group List page opens Port Access Virtual Media User Management Device Settings Security Maintenance Diagnostics Home gt User Management gt Groups Loge User Group List i Linknown r Qimeeketies r testing Admin 348 oce 3 qeu dh a RR T RR NR vnnd A roh etfi oa ha mh Lam Figure 42 User Group List gt Toaddanew user group Click the Add button The Group page opens For complete information about the Group page refer to Add New User Group on page 103 To modify an existing user group 1 Locate the user group from among
76. II Remote Console checks the Java version if the version is incorrect or outdated you will be prompted to download a compatible version Raritan recommends using Java Runtime Environment JRE version 1 5 for optimum performance but the Dominion KX II Remote Console and MPC will function with JRE version 1 4 2 05 or greater with the exception of JRE 1 5 0 02 JRE 1 6 is also supported but has not been fully tested Note In order for multi language keyboards to work in the Dominion KX II Remote Console Virtual KVM Client please install the multi language version of Java Runtime Environment JRE zie Raritan When you re ready to take control Chapter 4 Connecting to the Dominion KX II Launching the Dominion KX II Raritan Important Regardless of the browser used you must allow pop ups from the Dominion device s IP address to launch the Dominion KX II Remote Console Welcome to the Dominion KX2 Username Password Figure 11 Dominion KX II Remote Console Login Page Note Depending on your browser and security settings you may see various security and certificate warnings It is necessary to accept these warnings to launch the Dominion KX II Remote Console You can reduce the number of warning messages in subsequent logins by checking the following options in these security and certificate warning messages o In the future do not show this warning o Always trust content from this publisher
77. LDAP Schema 8 Click OK from the user Properties dialog Updating the Schema Cache 1 Right click Active Directory Schema in the left pane of the window and select Reload the Schema from the shortcut menu 2 Minimize the Active Directory Schema MMC Microsoft Management Console console Editing rciusergroup Attributes for User Members To run Active Directory script on Windows 2003 server please use the script provided by Microsoft available on the Windows 2003 server installation CD These scripts are loaded onto your system with a Microsoft Windows 2003 installation ADSI Active Directory Service Interface acts as a low level editor for Active Directory allowing you to perform common administrative tasks such as adding deleting and moving objects with a directory service To edit the individual user attributes within the group rciusergroup 1 From the installation CD select Support gt Tools 2 Double click SUPTOOLS MSI to install the support tools 3 Go to the directory where the support tools were installed 4 Run adsiedit msc The ADSI Edit window opens lt b Fe aton Winx Widow Hep SIA Ble ADSL EdE DH Donan reget 4 2ne met mv nis Donan ro af4i2nzrmz mypc domenDAs rid Configuration r g nnt 1d Configuration rc gc iananz configuration Eri Scheme ra 3f4znzmt mopc m 3 Schema rciz M2remt myp dND Figure 104 ADSI Edit Raritan 201 When you re ready to take control Ed
78. Language sse 27 Change the Keyboard Layout Code Sun Targets cccssscsssssssssseeeceseesnetesesesesnensnenessseeeees 28 Step 3 Configure Network Firewall Settings sse nennen 28 Step 4 Connect the Equipment asseta iani tentent eene tenente nennen 29 I Bdto s 29 2 Network Ports tremit ai n E c E RM V NE i neci e asp 30 3 Local Access Port local PC iii acepte t tere bre n ter era plos uei bats 30 EMI is meras 31 Step 5 Dominion KX II Initial Configuration sse een eene 31 Changing the Default Password sse tenentes 32 Valid Special Characters tnter nennen 32 Assigning an IP Address aonne r tenente rtt 33 Naming Targeb Servet Seno E R E eene 34 Specifying Power Supply Auto detection sse 35 IN te to CC 5G D Sers ra ri p etr emen EF ab y I vide E TEE 36 Remote Authentication sire tin a OG OG ORE E YU FEX IRR E PIRE EREET 36 Note t ge cH c T n 36 Supported Protocols ert erp ntt eter eoe tt rein rte a oso nto een tette 36 Note on Microsoft Active Directory cccccccsssescsssssssseteesesesssnensnescssseeseseeenenesesesesnsnensnenescseeeees 36 Authentication vs Authorization sssesssseee eene netten enne nnne 37 Users Groups and Access Permissions seisovien reiri srne Eaa nennen nnne enne 38 D 38 GIOUDS eo
79. Only or Deny CD ROM DV D ROM ISO Images This option mounts CD ROM DVD ROM and ISO images gt Toaccess a CD ROM DVD ROM or ISO image 1 From the Virtual KVM Client select Virtual Media gt Connect CD ROM ISO Image The Map Virtual Media CD ISO Image dialog opens Map Virtual Media CD ISO Image LPmachine A xi Select a CD DVD drive or an ISO image to mount onto the target server G C Local CO DVD Drive o CD ROM J C ISO Image Image Path C Remote Server ISO Image Hostname Image File Server Username File Server Password a BO n Connect Cancel Figure 38 Map Virtual Media CD ISO Image 2 For internal and external CD ROM or DVD ROM drives a Select the Local CD DVD Drive option 94 Raritan When you re ready to take control Chapter 7 Virtual Media b Select the drive from the Local CD DVD Drive drop down list All available internal and external CD and DVD drive names will be populated in the drop down list c Click Connect 3 ForISO images a Select the ISO Image option Use this option when you want to access a disk image of a CD DVD or hard drive ISO format is the only format supported b Click the Browse button c Navigate to the path containing the disk image you want to use and click Open The path is populated in the Image Path field d Click Connect 4 Forremote ISO images on a file server a Select the Remote Server ISO Image option b Se
80. RC4 Mozilla 1 7 RC4 Safari 2 0 4 AES 128 n 232 Raritan When you re ready to take control Manageability Appendix D FAQs Question Answer Can Dominion KX II be remotely managed and configured via Web browser Yes Dominion KX II can be completely configured remotely via Web browser Note that this does require that the workstation have an appropriate Java Runtime Environment JRE version installed Besides the initial setting of Dominion KX II s IP address everything about the solution can be completely set up over the network In fact using a crossover Ethernet cable and Dominion KX II s default IP address you can even configure the initial settings via Web browser logging does Dominion KX II offer Can I backup and Yes Dominion KX II s device and user configurations can be restore Dominion KX II s completely backed up for later restoration in the event of a catastrophe configuration Dominion KX II s backup and restore functionality can be used remotely over the network or through a Web browser What auditing or For complete accountability Dominion KX II logs all major user events with a date and time stamp For instance reported events include but are not limited to user login user logout user access of a particular server unsuccessful login configuration changes etc Can Dominion KX II Yes In addition to Dominion KX II s own internal logging capabilities integrate with
81. RRC User Guide available on Raritan s Website http www raritan com support productdocumentation or on the Raritan User Manuals amp Quick Setup Guides CD ROM included with your Dominion shipment for complete information on installing and operating MPC zie Raritan j5 When you re ready to take control Raritan Remote Client RRC KX I Devices Only Raritan Remote Client RRC KX I Devices Only Raritan Remote Client RRC is a graphical user interface providing remote access to the target devices Note RRC cannot be used with the Dominion KX II use MPC instead Language Support The Dominion KX II provides keyboard support for the following languages US English UK English Traditional Chinese Simplified Chinese Japanese Korean French and German Note You can use the keyboard for Chinese Japanese and Korean for display only local language input is not supported at this time for Dominion KX II Local Console functions For more information about non US keyboards please refer to Appendix C Informational Notes see Informational Notes on page 205 J ava Runtime Environment J RE 44 Important It is recommended that you disable Java caching and clear the Java cache Please refer to your Java documentation or the Raritan Multi Platform Client MPC and Raritan Remote Client RRC User Guide for more information The Dominion KX II Remote Console and MPC require the JRE to function The Dominion KX
82. Secure Gateway This device is being managed by Command Center Secure Gateway CC SG 192 168 61 129 Direct Login is disabled at this time Figure 96 Device Managed by CC SG Message 187 When you re ready to take control Removing Dominion KX II from CC SG Management Removing Dominion KX II from CC SG Management 188 Unless the Dominion KX II is released from CC SG control you cannot access the device directly If however the Dominion KX II does not receive heartbeat messages from CommandCenter e g CommandCenter is not on the network you can release the Dominion KX II from CC SG control in order to access the device This is accomplished by using the CC Unmanage feature Note Maintenance permission is required to use this feature When no heartbeat messages are received the following message is displayed when attempting to access the device directly Managed by Command Center Secure Gateway 192 163 60 23 This device is being managed by Command Center Secure Gateway 192 168 60 23 Do you want to remove it from Command Center Management ves uo Figure 97 Remove from CC SG Management gt To remove the device from CC SG management to use CC Unmanage 1 Click the Yes button You are prompted to confirm the action Managed by Command Center Secure Gateway 192 163 60 23 Confirming remove of this dose don Command Center 192 168 60 23 Management Do you really want to remove this d
83. Setup Dominion KX II box Guide c standard 19 rack mount brackets d User manual CD ROM e Network cable f Crossover cable g Localized AC Line Cord h Warranty certificate and other documentation zie Raritan 55 When you re ready to take control Installation Installation Question Answer Besides the unit itself what do I need to order from Raritan to install Dominion KX II Each server that connects to Dominion KX II requires a Dominion or Paragon Computer Interface Module CIM an adapter that connects directly to the keyboard video and mouse ports of the server What kind of Cat5 cabling should be used in my installation Dominion KX II can use any standard UTP unshielded twisted pair cabling whether Cat5 Cat5e or Cat6 Often in our manuals and marketing literature Raritan will simply say Cat5 cabling for short In actuality any brand UTP cable will suffice for Dominion KX II What types of servers can be connected to Dominion KX II Dominion KX II is completely vendor independent Any server with standard compliant keyboard video and mouse ports can be connected How do I connect servers to Dominion KX II Servers that connect to the Dominion KX IT require a Dominion or Paragon CIM which connects directly to the keyboard video and mouse ports of the server Then connect each CIM to Dominion KX II using standard UTP twisted pair cable such as Cat5 Cat5e or Ca
84. Support Target Server Connection Distance and Video Resolution The maximum supported distance is a function of many factors including the type quality of Cat 5 cable server type and manufacturer video driver and monitor environmental conditions and user expectations The following table summarizes the maximum target server distance for various video resolutions and refresh rates Video Resolution Refresh Rate Eu Distance 1600x1200 60 50 ft 15 m 1280x1024 60 100 ft 30 m 1024x768 60 150 ft 45 m The use of Paragon CIMs will not increase the distance between the Dominion KX II and the target server Due to the multiplicity of server manufacturers and types OS versions video drivers etc and the subjective nature of video quality Raritan cannot guarantee performance across all distances in all environments Refer to the Supported Video Resolutions for the video resolutions supported by Dominion KX II Network Speed Settings Dominion KX Il NETWORK SPEED SETTING AUTO 1000 FuLL 100 FuLL 100 HALF 10 FuLL 10 HALF au 400 Half no no no no 1000 FuLL communication communication communication o 100 FuLL no ni communication communication 100 HALF no no communication communication no no no toro MM F communication conmuncaton conmanceton communication communication communication g E a z E Z E Raritan ig When you re ready to take control Network
85. Syslog Dominion KX II can send all logged events to a centralized Syslog server Can Dominion KX II Yes In addition to Dominion KX II s own internal logging capabilities integrate with SNMP Dominion KX II can send SNMP tracks to SNMP management systems like HP Openview and Raritan s CC NOC Can Dominion KX II s internal clock be synchronized with a timeserver Yes Dominion KX II supports the industry standard NTP protocol for synchronization with either a corporate timeserver or with any public timeserver assuming that outbound NTP requests are allowed through the corporate firewall lt Raritan When you re ready to take control 233 Miscellaneous Miscellaneous Question Answer What is Dominion KX 192 168 0 192 II s default IP address What is Dominion KX The KX II s default username and password are admin raritan all II s default username lower case However for the highest level of security the KX II forces and password the administrator to change the Dominion KX II default administrative username and password when the unit is first booted up I changed and KX II contains a hardware reset button that can be used to factory reset subsequently forgot the device which will reset the administrative password on the device Dominion KX II s administrative password can you retrieve it for me 234 lt Raritan When you re ready to take control Appendix D FAQ
86. The Dominion KX II has begun update via an RFP file ethernetFailover An Ethernet failover was detected and restored on anew Ethernet interface factoryReset The device has been reset to factory defaults firmwareFileDiscarded Firmware file was discarded firmwareUpdateFailed Firmware update failed firmwareValidationFailed Firmware validation failed groupAdded A group has been added to the Dominion KX II system groupDeleted A group has been deleted from the system groupModified A group has been modified ipConflictDetected An IP Address conflict was detected ipConflictResolved An IP Address conflict was resolved networkFailure An Ethernet interface of the product can no longer communicate over the network networkParameterChanged A change has been made to the network parameters passwordSettingsChanged Strong password settings have changed portConnect A previously authenticated user has begun a KVM session portConnectionDenied A connection to the target port was denied portDisconnect A user engaging in a KVM session closes the session properly portStatusChange The port has become unavailable powerNotification The power outlet status notification 1 Active O Inactive powerOutletNotification Power strip device outlet status notification rebootCompleted The KX has completed its reboot rebootStarted The KX has begun to reboot either through cycling power to the system or by a warm reboot from the OS
87. User Search Dil Type of External LDAP Server Genere LDAP server Active Directory Domain Figure 49 Authentication Settings LDAP 1 Type the IP Address or DNS name of your LDAP remote authentication server in the Primary LDAP Server field When the Enable Secure LDAP option is checked the DNS name must be used Raritan 115 When you re ready to take control Authentication Settings 116 10 11 Optional Type the IP Address or DNS name of your backup LDAP server in the Secondary LDAP Server field When the Enable Secure LDAP option is checked the DNS name must be used Please note that the remaining fields share the same settings with the Primary LDAP Server field Type the server secret password required to authenticate against your remote authentication server in the Secret Phrase field and again in the Confirm Secret Phrase field Check the Enable Secure LDAP checkbox if you would like to use SSL the Secure LDAP Port field is enabled Secure Sockets Layer SSL is a cryptographic protocol which allows Dominion KX II to communicate securely with the LDAP server The default Port is 389 Either use the standard LDAP TCP port or specify another port The default Secure LDAP Port is 636 Either use the default port or specify another port This field is enabled when the Enable Secure LDAP box is checked Certificate File Consult your authentication server administrator to get the CA certificate file
88. X II into groups saves time by allowing you to manage permissions for all users in a group at once instead of managing permissions on a user by user basis You may also choose not to associate specific users with groups In this case you can classify the user as Individual Upon successful authentication the device uses Group information to determine the user s permissions which server ports are accessible whether rebooting the unit is allowed and other features 39 When you re ready to take control Chapter 4 User Interfaces lt Raritan Connecting to the Dominion KX I In This Chapter User Intertacesz ettet en KEE ran n E EE eara URS 40 KX II Local Console KX II Devices eeeeeeeennnneenrene n 41 Dominion KX II Remote Console Dominion KX II Devices 42 Multi Platform Client MPC KX I and Dominion KX II Devices 43 Raritan Remote Client RRC KX I Devices Only sess 44 Language SuppOrt too not erint tinere dera i rip Io ii rige 44 Java Runtime Environment JRE sese 44 Launching the Dominion KX II seen 45 Mana ping Favores ata denmawto rid toa E E 49 There are several user interfaces in the Dominion KX II providing you with easy access any time anywhere These include the KX II Local Console the KX II Remote Console and the Multi Platform Client MPC The following table identifies these inte
89. X II s default settings is approximately 0 5Mbit second per active KVM user connected to and using a server with very occasional spikes up to 2MBit second This is a very conservative estimate because bandwidth utilization will typically be even lower Bandwidth required by each video transmission depends on what task is being performed on the managed server The more the screen changes the more bandwidth is utilized The table below summarizes some use cases and the required bandwidth utilization at Dominion KX II s default settings on a 10Mbit s network Idle Windows Desktop 0 Mbps Move Cursor Around Desktop 0 18Mbps Move Static 400x600 Window Dialog 0 35Mbps Box Navigate Start Menu 0 49Mbps Scroll an Entire Page of Text 1 23Mbps Run 3D Maze Screensaver 1 55Mbps Raritan 219 When you re ready to take control Ethernet and IP Networking Question Answer What is the slowest connection lowest bandwidth over which Dominion KX II can operate 33Kbps or above is recommended for acceptable KX performance over a modem connection What is the speed of Dominion KX II s Ethernet interfaces Dominion KX II supports Gigabit as well as 10 100 Ethernet KX II supports two 10 100 1000 speed Ethernet interfaces with configurable speed and duplex settings either auto detected or manually set Can I access Dominion KX II over a wireless Yes Dominion KX II not only us
90. able Single Login Limitation When checked only one login per username is allowed at any time When cleared a given username password combination can be connected into the device from several client workstations simultaneously Enable Password Aging When checked all users are required to change their passwords periodically based on the number of days specified in Password Aging Interval field Password Aging Interval days This field is enabled and required when the Enable Password Aging checkbox is checked Enter the number of days after which a password change is required The default is 60 days Log Out Idle Users Check the checkbox to automatically disconnect a user session after a certain amount of inactive time has passed Type the amount of time in the After field If there is no activity from the keyboard or mouse all KVM sessions and all KVM resources are logged out If a Virtual Media session is in progress however the session does not timeout After minutes The amount of time in minutes after which an idle user will be logged out This field is enabled when the Log Out Idle Users option is checked zie Raritan When you re ready to take control Raritan Chapter 10 Security Settings Strong Passwords Strong passwords provide more secure local authentication for the system Using Strong Passwords you can specify criteria defining the format of valid Dominion KX II local passwords such as min
91. ace Speed amp Duplex 32 16 Aufodetect IP address Gateway IP address Secondary DIIS server IP address r Enable Automatic F alover Ping Interval seconds Timeout seconds Set System ACL 9 Reset To oeraans caet VR Figure 51 Network Settings Raritan When you re ready to take control Chapter 9 Device Management 2 Update the Network Basic Settings Refer to Network Basic Settings on page 123 for more information about each of the fields 3 Update the Network Miscellaneous Settings Refer to Network Miscellaneous Settings on page 124 for more information about each of the fields 4 Update the LAN Interface Settings Refer to LAN Interface Settings on page 125 for more information about each of the fields 5 Click OK to set these configurations If your changes require rebooting the device a reboot message appears Tocancel without saving changes Click Cancel Toresetto factory defaults Click Reset to Defaults Network Basic Settings Network Basic Settings Device Name x IP auto configuration None Preferred host name DHCP only IP address fis2 168 59 97 Subnet mask oss 255 255 0 Gateway IP address 192 168 53 126 Primary DIIS server IP address Secondary DIIS server IP address Figure 52 Network Settings Network Basic Settings zs Raritan 123 When you re ready to take control Network Settings 124 Dev
92. ade vus aire RERE E E E DL EREE EE EE ER 162 Firmware Upgrade 5i eee ran n E RU EAEE E E RE 163 Upgr d Report Serer aieia en E NE EE E E E ER ER E E E E EER 165 RED OO E T E EE E EEE 165 Chapter 12 Diagnostics 167 IET esa siorse odian eE Ea EE Aaa TEESE S CEA EES E EEAS EANES 167 Network Interface Page ccccccccsscsesssseesesesesnsnesesescscececesenensnesesesesnenensnessscscececeeesenenenesesesnensnenenesseesees 168 Network Statistics Page nennen OEE EE E E aas 169 Ping Host Pages eee iter n E ERE EG EE RUE ERU EER EE SEERE 171 Trace Route to Host Page nennen nnne nnne nennen nennen 172 le ODIETA lor ne M 173 Chapter 13 KX II Local Console 176 KX GIN ien 176 Physical Connections cct ret a Dre te e E aE aE EE EHE HEP CE o obe EE GrP ERR 177 Reset BUEtOTU aco eme ee rennes cedi nd obe cede dni ten bd bv te b Eee rates rdv rentas 177 Starting the KX II Local Consoles ssri iiae a EER Ean 178 Simultaneous Users aeter erit e Hn HERI RC RE er eb se re ia e Ei tis a 178 Security and Authentication tnter nennen 179 KX II Local Console Interface rtr tr teeth eri ted 179 Available Resolutuons eed ene maepho Udinese DUE 179 Accessing larget SCLVELS ss scene scieson ao IRR ETERNI ERROR SEE I ERE ERE EE eon re oS 180 Server Display eren RR EHREEH IER ERE NELr iine eei Ue N 180 lc 181 Accessing a Target Serveren ar u AT EE E RR 181 Returning to the KX II Local Console Interface
93. and where you want to send the information Tip Enable or disable entire Categories by checking or clearing the Category line checkboxes respectively 3 Click OK gt To cancel without saving changes Click Cancel Toresetto factory defaults Click the Reset To Defaults button SNMP Agent Configuration SNMP compliant devices called agents store data about themselves in Management Information Bases MIBs and return this data to the SNMP managers Use the Event Logging page to configure the SNMP connection between the Dominion KX II SNMP Agent and an SNMP manager SNMP Trap Configuration SNMP provides the ability to send traps or notifications to advise an administrator when one or more conditions have been met The following table lists the Dominion KX II SNMP traps Trap Name Description cimConnected A CIM is plugged into to the Dominion KX II port cimDisconnected A CIM is either unplugged from the Dominion KX II port or powered off cimUpdateCompleted CIM firmware update process completed cimUpdateStarted CIM firmware update process started configBackup The device configuration has been backed up configRestore The device configuration has been restored deviceUpdateFailed Device update has failed deviceUpgradeCompleted The Dominion KX II has completed update via an RFP file Raritan 133 When you re ready to take control Event Management Trap Name Description deviceUpgradeStarted
94. any management associations with CommandCenter will be broken Because of the complete nature of this reset you will be prompted to confirm the factory reset e Network Parameter Reset Resets the network parameters from Device Settings gt Network Settings of the unit back to the default values IP auto configuration IP Address 185 When you re ready to take control Local Port Administration 186 Subnet Mask Gateway IP address Primary DNS server IP address Secondary DNS server IP address Discovery Port Bandwidth Limit LAN Interface Speed amp Duplex Enable Automatic Failover Ping Interval seconds Timeout Seconds You will be prompted to confirm this action because all network settings will be permanently lost Click Reset to continue You will be prompted to confirm the factory reset Click the Really Reset button to proceed Upon completion the Dominion KX II unit is automatically restarted zs Raritan When you re ready to take control Chapter 14 CC Unmanage Overview Raritan In This Chapter OVERVIEW vtscn 187 Removing Dominion KX II from CC SG Management 188 When a Dominion KX II device is under CommandCenter Secure Gateway control and you attempt to access the device directly using the Dominion KX II Remote Console the following message is displayed after entry of a valid username and password Managed by Command Center
95. apabilities Should the primary Ethernet port or Ethernet ports to the switch router to which it is connected fail Dominion KX II will provide redundant fail failover to the secondary network port with the same IP address over orload balancing ensuring that server operations are not disrupted Note that automatic failover must be enabled by the administrator jin Raritan When you re ready to take control Appendix D FAQs Question Answer How much bandwidth Dominion KX II offers next generation KVM over IP technology the does Dominion KX II very best video compression available Raritan has received numerous require technical awards confirming its high video quality transmissions and the low bandwidth utilization Raritan pioneered the KVM over IP functionality that allows users to tailor their video parameters to conserve network bandwidth For instance when connecting to Dominion KX II through a dial up modem connection video transmissions can be scaled to grayscale allowing users to be fully productive while ensuring high performance With that in mind the following data refers to Dominion KX II at its default video settings again these settings can be tailored to a specific environment They can be increased to provide even higher quality video color depth or decreased to optimize for low speed connections As a general rule a conservative estimate for bandwidth utilization at Dominion K
96. aret Underscore Grave accent Left brace Pipe sign Right brace Tilde Assigning an IP Address These procedures describe how to assign an IP Address using the Network Settings page For complete information about all of the fields and the operation of this page refer to Network Settings on page 122 1 From the KX II Local Console select Device Settings gt Network Settings The Network Settings page opens Port Access User Management Security Maintenance Diagnostics Home gt Device Settings gt Network Semngs Preferred host name DHCP only LAN Switch to Autodetect Gateway IP address Primary DNS server IP address LAN Interface Speed amp Duplex Astocetect Secondary ONS server IP address a Enable Automabc f adover Ping Interval seconds Timeout seconds Set System ac OK Resettodetauits Cancel Figure 8 Network Settings Raritan When you re ready to take control Device Name Discovery Port DomesnionKX 5000 IP auto configuration Bandwidth Limit DHCP No Limit x J LAN interface Settings IP address Note For reliable network communication configure the Dominion KX II and LAN Switch to the same LAN interface Speed and Duple Subnet mask example configure both the Dominion KX Il and recommended or both to a fixed speed duplex such as 100Mbps Full Current LAN interface parameters autonegotiation on 100 Mbps full duplex lin 33 Ste
97. ate Target Servers to Outlets Port Page This Port page opens when you select a port from the Port Configuration see Port Configuration Page on page 138 page that is connected to a target server From this page you can make power associations change the Port Name to something more descriptive and update target server settings if you are using the D2CIM VUSB CIM see Note for D2CIM VUSB CIM Usage on page 145 The CIM Type and the Port Name fields are pre populated please note that the CIM type cannot be changed A server can have up to four power plugs and you can associate a different power strip with each From this page you can define those associations so that you can power on power off and power cycle the server from the Port Access page To use this feature you will need e Raritan remote power strip s e Power CIMs D2CIM PWR Port Access Virtual Media User Management Device Security Mair Home gt Device Settings gt Port Configuration gt Port Type POM Hame pominion KX2 Ports Power Strip Hame Outlet Hame Doerinion KX2_Portt6 Outa Domra Ponie E None z 2 None z 2 x Ces EUM TT i n A a mmt etes n s m Figure 63 Port Page KVM ports 143 When you re ready to take control Power Control To make power associations associate power str p outlets to target servers Note When a power strip is associated to a target server po
98. ated options connection speed color Properties depth etc The parameters in the Properties Dialog can be optimized to suit your needs for different operating environments gt To set the connection properties 1 Select Connection gt Properties The Properties Dialog opens Ee 0 Connection Speed Mania Color Depth 15 bit RGB Color Smoothing Ao o o vow OK Cancel Appl Figure 26 Properties Dialog 2 Select the Connection Speed from the drop down list Dominion KX II can automatically detect available bandwidth and not limit bandwidth use but you can also adjust this usage according to bandwidth limitations Auto 1G Ethernet 100 Mb Ethernet 10 Mb Ethernet 1 5 Mb MAX DSL T1 1 Mb Fast DSL T1 Raritan Pe When you re ready to take control Connection Menu 70 512 Kb Medium DSL T1 384 Kb Slow DSL T1 256 Kb Cable 128 Kb Dual ISDN 56 Kb ISP Modem 33 Kb Fast Modem 24 Kb Slow Modem Please note that these settings are an optimization for specific conditions rather than an exact speed The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting But the system will be most responsive when the settings match the real world environment Select the Color Depth from the drop down list Dominion KX II can dynamically adapt the color depth transmitted to remot
99. brate Color button The target device screen updates its color calibration Video Settings Use the Video Settings option to manually adjust the video settings Video Settings Opens Video Settings for manual adjustment of video parameters zs Raritan When you re ready to take control Chapter 6 Virtual KVM Client Tochangethe v deo settings 1 Select Video Video Settings The Video Settings window opens displaying the current settings i Video Settings l EAU EU EA EA SA E ew EA EA SE AoA ay Aaa maaa Figure 32 Video Settings 2 Use the sliders to adjust the settings to achieve the desired results as you adjust the settings the effects are immediately visible Raritan When you re ready to take control Noise Filter Dominion KX II can filter out the electrical interference of video output from graphics cards This feature optimizes picture quality and reduces bandwidth Higher settings transmit variant pixels only if a large color variation exists in comparison to the neighboring pixels However setting the threshold too high can result in the unintentional filtering of desired screen changes Lower settings transmit most pixel changes Setting this threshold too low can result in higher bandwidth use Brightness Use this setting to adjust the brightness of the target server display 79 Video Menu Red Controls the brightness of the red signal
100. ccess control and switching between target servers Chapter 6 Virtual KVM Client Target server control mouse pointer synchronization keyboard macros and video settings Chapter 7 Virtual Media Virtual media configuration and access Chapter 8 User Management User and group management passwords group based IP access control and authentication settings Chapter 9 Device Management Network settings date time event management power supply setup port configuration and power control Chapter 10 Security Settings Security settings and IP access control Chapter 11 Maintenance Audit log device information backup and restore firmware and CIM upgrades and reboot Chapter 12 Diagnostics Network interface network statistics ping host trace route to host and KX diagnostics Chapter 13 KX II Local Console Starting the KX II Local Console accessing target servers and local port administration Chapter 14 CC Unmanage Removing the KX II from CC SG control Appendix A Specifications Physical specifications ports used target server connection distance and video resolution and network speed settings Appendix B Updating the LDAP Schema Update LDAP schema for experienced users Appendix C Informational Notes Important notes on Dominion KX II usage zie Raritan When you re ready to take control Chapter 1 Introduction e Appendix D FAQs General questions remote access universal virtual media Ethe
101. ckup Restore FullRestore 4 1 C Protected Restore C Custom Restore User and Group Restore Device Settings Restore Restore File Browse Mises sont es AR and mtm IIIS solos Ia Rn mmm os Amos alt PU Figure 73 Backup Restore Note Backups are always complete system backups Restores can be complete or partial depending on your selection gt To backup your Dominion KX II 1 Click Backup A File Download dialog opens 2 Click Save A Save As dialog opens Raritan When you re ready to take control Chapter 11 Maintenance 3 Select the location specify a file name and click Save A Download Complete dialog opens 4 Click Close The backup file is saved locally on your client machine with the name and location specified gt To restore your Dominion KX II WARNINC Please exercise caution when restoring your Dominion KX II to an earlier version Usernames and password in place at the time of the backup will be restored If you do not remember the old administrative usernames and passwords you will be locked out of the Dominion KX II In addition if you used a different IP Address at the time of the backup that IP Address will be restored as well If the configuration uses DHCP you may want to perform this operation only when you have access to the local port to check the IP address after the update 1 Select the type of restore you want to run zs Raritan Wh
102. conds if necessary Generally 0 is used unless more time is needed certain monitors require more time to switch the video 5 If you would like to use the power save feature a Check the Power Save Mode checkbox b Setthe amount of time in minutes in which Power Save Mode will be initiated 6 Select the Resolution for the KX II Local Console from the drop down list 800x600 1024x768 Raritan 183 When you re ready to take control Local Port Administration 184 10 1280x1024 Select the Refresh Rate from the drop down list 60Hz 75Hz Select the type of Local User Authentication Local LDAP RADIUS This is the recommended option for more information about authentication refer to Remote Authentication on page 36 and Authentication vs Authorization on page 37 None There is no authentication for local console access This option is recommended for secure environments only Check the Ignore CC managed mode on local port checkbox if you would like local user access to the Dominion KX II even when the device is under CC SG management Note If you clear this checkbox but then want local port access you will have to remove the device from under CC SG management from within CC SG and then you will be able to check this checkbox Click OK To close the page without saving any changes Click Cancel To reset back to defaults Click Reset to Defaults zs Raritan When you r
103. csessnsnsneneneesees 172 KX Diagnostics nennt E 173 Diagnostics Menu lt Raritan The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the Dominion KX II device All of the Diagnostics pages except KX Diagnostics run standard networking commands the information displayed is the output of those commands The following Diagnostics menu options help you debug and configure the network settings e Network Interface e Network Statistics e Ping Host e Trace Route to Host The KX Diagnostics option is intended for use in conjunction with Raritan Technical Support Use To Network Interface Obtain the status of network interface Network Statistics Obtain statistics about the network Ping Host Determine whether a particular host is reachable across an IP network Trace Route to Host Determine the route taken all the way to the selected host KX Diagnostics Use when directed by Raritan Technical Support Remote Console only 167 When you re ready to take control Network Interface Page Network Interface Page The Dominion KX II provides information about the status of your network interface Toview information about your network interface Select Diagnostics Network Interface The Network Interface page opens Port Access Virtual Media User Management Device Settings Security Maintenance Diagnostscs Home gt Diagnostics gt Nets
104. ct Power Off 63 Chapter6 Virtual KVM Client Raritan In This Chapter ues cH secs dus ccevasdvasuvasves cesessvesuldects dsocase oshua deta sad EEES VEST ANETES AES 65 OPTIONS m E E 66 Mouse Pointer Synchronization sssssssseeeeeeenneneenes 67 Connection Meri od enirn Ce ee ve tod p previene Cor a up ues 69 Keyboard m 73 Video Meri uice or a cir er conr born etna cete Sones tac eer eee Pad 77 Mo sSe MOtiU i rte te c M Ea ee Cr ae eL ERE SL EFE T CI pe 81 Virtual Media ud nnt re bri D e endi ra ies pct rane eua ERR 84 Tools Menu iicet DT eeu 84 View Men seerne Ho 85 Help ir n E E EEE E EAEE 86 64 When you re ready to take control Overview Chapter 6 Virtual KVM Client Whenever you access a target server using the KX II Remote Console a Virtual KVM Client window is opened There is one Virtual KVM Client for each target server connected to these windows can be accessed via the Windows Taskbar Virtual KVM Client windows can be minimized maximized and moved around your computer desktop Note Refreshing your HTML browser will close the Virtual KVM Client connection so please exercise caution Cennecion Keyeourd Video Mouse Vetual Media Toss View Heip Consoleg Desktop size is 1 280 x 1 024 Raritan EJP Oj em oM A Feature Description EEEE Ope Local Otek Ci Compact Bese Compact Ose Contro Panel a w
105. d What type of power control capabilities does Dominion KX II offer Raritan s Remote Power Control power strips can be connected to the Dominion KX II to provide power control of the target servers After a simple one time configuration step just right click on the server name to power on off or recycle a hung server Note that a hard reboot provides the physical equivalent of unplugging the server from the AC power line and reinserting the plug Does Dominion KX II support servers with multiple power supplies What if each power supply is connected to a different power strip Yes Dominion KX II can be easily configured to support multiple power supplies connected to multiple power strips Up to eight 8 power strips can be connected to a KX II device Four power supplies can be connected per target server to multiple power strips Does remote power control require any special server Some servers ship with default BIOS settings such that the server does not automatically restart after losing and regaining power See the server user manual for more information configuration What type of power To take advantage of Dominion KX II s integrated power control user strips does Dominion interface and more importantly integrated security use Raritan s KX II support Remote Power Control RPC power strips RPCs come in many outlet connector and amp variations The D2CIM PWR must be purchased to connec
106. d Type Note Any changes to the Local Port Settings will restart the browser x Local Port Hotkey Video Switching Delay in secs pg Pomer Save Mode Power Save Mode Timeout im minutes Re solution Refresh Rate Hz Local User Autiventication Local LDAP RADIUS fy Mone nore CC managed mode on local port OK Reset todetavits Cancer Figure 94 Local Port Settings Raritan When you re ready to take control Chapter 13 KX II Local Console 2 Select the appropriate Keyboard Type from among the options in the drop down list US US International UK French German JIS Japanese Industry Standard Simplified Chinese Traditional Chinese Dubeolsik Hangul Korean 3 Select the Local Port Hotkey The Local Port Hotkey is used to return to the KX II Local Console interface when a target server interface is being viewed The default is Double Click Scroll Lock but you can select any key combination from the drop down list Hotkey Take this Action Double Click Scroll Lock Press Scroll Lock key twice quickly Double Click Num Lock Press Num Lock key twice quickly Double Click Caps Lock Press Caps Lock key twice quickly Double Click Left Alt key Press the left Alt key twice quickly Double Click Left Shift key Press the left Shift key twice quickly Double Click Left Ctrl key Press the left Ctrl key twice quickly 4 Setthe Video Switching Delay from 0 5 se
107. d from the Active Directory server does not match a Dominion KX II group configuration the Dominion KX II automatically assigns the group of Unknown to users who authenticate successfully zie Raritan ii When you re ready to take control Authentication Settings 118 Implementing RADIUS Remote Authentication Remote Authentication Dial in User Service RADIUS is an AAA authentication authorization and accounting protocol for network access applications gt To use the RADIUS authentication protocol e RADIUS Primary Radius Server Shared Secret Authentication Port 1812 4 Accounting Port o Co Timeout in seconds Retries Secondary Radius Server Shared Secret Authentication Port e N Accounting Port o5 Timeout in seconds Retries Global Authentication Type PAP Figure 50 Authentication Settings RADIUS 1 Type the IP Address of your primary and optional secondary remote authentication servers in the Primary Radius Server and Secondary Radius Server fields respectively 2 Type the server secret used for authentication in the Shared Secret fields The shared secret is a character string that must be known by both the Dominion KX II and the RADIUS server to allow them to communicate securely It is essentially a password Raritan When you re ready to take control Chapter 8 User Management 3 Authent
108. d the Multi Platform Client the key combination of Alt Gr 2 does not produce the tilde symbol when using a French keyboard gt To obtain the tilde symbol Create a macro consisting of the following commands 1 Press Right Alt 2 Press 2 3 Release 2 4 Release Right Alt lt Raritan When you re ready to take control zs Raritan Appendix C Informational Notes J ava Runtime Environment J RE Because of a limitation in the Java Runtime Environment JRE Fedora Linux and Solaris clients receive an invalid response from Alt Gr on UK English and US International language keyboards Fedora Linux and Solaris do not pick up events for the Alt Gr key combination for Java 1 4 2 or 1 5 Java 1 6 appears to improve on this although the keyPressed and keyReleased events for Alt Gr still identify it as an unknown key code Also a key pressed in combination with Alt Gr such as on the UK keyboard Alt Gr 4 which is the Euro symbol will only generate a keyTyped followed by a keyReleased event for that value without a keyPressed event Java 1 6 improves upon this by filling in the keyPressed event as well Keyboard Language Preference Fedora Linux Clients There are several methods that can be used to set the keyboard language preference on Fedora Linux clients The following method must be used in order for the keys to be mapped correctly from the Virtual KVM Client and the Multi Platform Client MPC
109. dia User Management Davie Security Maintenance Home gt Device Settings gt Event Management Settings SNMP Configuration SIMP Logging Enabled Click here to view the Dominicn X2 SNMP MB Syst og Configuration 7 Enable Systog Forwarding IP Address ek Reset Totetamts Cancel Man Atan Memon tome am a ant a dip fi Metre aes a Figure 56 Event Management Settings Raritan When you re ready to take control Chapter 9 Device Management Check the Enable SNMP Logging option this enables the remaining SNMP fields In the Name Contact and Location fields type the SNMP Agent s this Dominion unit s name as it appears in the Dominion KX II Console interface a contact name related to this unit and where the Dominion unit is physically located respectively Type the Agent Community String the Dominion unit s string An SNMP community is the group that devices and management stations running SNMP belong to it helps define where information is sent The community name is used to identify the group an SNMP device or agent may belong to more than one SNMP community Specify whether the community is Read Only or Read Write using the Type drop down list Configure up to five SNMP managers by specifying their Destination IP Port and Community Click on the Click here to view the Dominion KX2 SNMP MIB link to access the SNMP Management Information Base Click OK Sy
110. e For additional information about CC SG authentication refer to the CommandCenter Secure Gateway User Guide Administrator Guide or Deployment Guide at http www raritan com support productdocumentation Supported Protocols In order to simplify management of usernames and passwords the Dominion KX II provides the capability to forward authentication requests to an external authentication server Two external authentication protocols are supported LDAP and RADIUS Note on Microsoft Active Directory Microsoft Active Directory uses the LDAP protocol natively and can function as an LDAP server and authentication source for Dominion KX II If it has the IAS Internet Authorization Server component a Microsoft Active Directory server can also serve as a RADIUS authentication source zie Raritan When you re ready to take control Chapter 3 Installation and Configuration Authentication vs Authorization Authentication is the process of verifying that a user is who he says he is Once a user is authenticated the user s group is used to determine his system and port permissions The user s assigned privileges determine what type of access is allowed This is called authorization When Dominion KX II is configured for remote authentication the external authentication server is used primarily for the purposes of authentication not authorization The flow diagram illustrates this process Permissions determin
111. e Sessions dialog opens 2 Open the Session Options tab 3 Check the Prompt on logout checkbox and click OK This option prompts you to save your current session when you logout 4 Upon logging out check the Save current setup option from the dialog presented 5 Click OK Tip If you do not want to be prompted upon logout follow these procedures instead gt To make your settings permanent in Linux no prompt 1 Select Main Menu gt Preferences gt More Preferences gt Sessions The Session dialog opens 2 Open the Session Options tab 3 Clear the Prompt on logout checkbox 4 Check the Automatically save changes to the session checkbox and click OK This option automatically saves your current session when you logout Sun Solaris Settings gt Toconfigure target servers running Sun Solaris 1 zs Raritan When you re ready to take control Set the mouse acceleration value to exactly 1 and the threshold to exactly 1 This can be performed 23 Step 1 Configure Target Servers From the graphical user interface Mipuse motion Acceleration IsowT L1 Fas Threshold Smal T Lange Jj Figure 6 Solaris Mouse Configuration With the command line xset mouse a t where a is the acceleration and t is the threshold 2 Alltarget servers must be configured to one of the display resolutions supported by Dominion KX II The most popular supported resoluti
112. e or e Click the Send Ctrl Alt Delete button from toolbar Keyboard Macros Keyboard macros ensure that keystroke combinations intended for the target server are sent to and interpreted only by the target server Otherwise they might be interpreted by the computer on which the Virtual KVM Client is running your client PC Macros are stored on the client PC and are PC specific therefore if you use another PC you will not see your macros In addition if another person uses your PC and logs in under a different name that user will see your macros since they are computer wide Keyboard macros created in the Virtual KVM Client are available in MPC and vice versa 73 When you re ready to take control Keyboard Menu 74 Creating a Keyboard Macro Tocreate a keyboard macro add a macro 1 Select Keyboard Keyboard Macros The Keyboard Macros window opens Keyboard Macros B M i mun Macro Figure 28 Keyboard Macros 2 Click Add The Add Keyboard Macro window opens Figure 29 Add Keyboard Macro 3 Typeaname in the Keyboard Macro Name field This is the name that will display on the Virtual KVM Client menu bar after the macro is created In this example type Minimize All Windows 4 Inthe Keys to Press drop down list a Scroll through and select each key for which you would like to emulate a key press in the order in which they are to be pressed Raritan When you re
113. e subnet of the Dominion KX II device IP address itself access these devices directly from this page or add them to your list of favorites This feature allows multiple Dominion KX II units to interoperate and scale automatically The Dominion KX II Remote Console automatically discovers the Dominion KX II units in the subnet of the Dominion KX II Port Access Virtual Media User Management Device Settings Security Maintern Discover Devices KX Subnet ASTOKXE 416 192 168 59 216 DominioniCX 192 168 59 75 Dominionkx 192 168 59 97 kx2wrc4 192 168 59 185 ra x2 192 168 539 207 Select All Deselect All Lage mt Tete Laits agen ai na P Ph nito i ms Figure 18 Discover Devices KX Subnet gt To discover devices on the KX device subnet Select Favorites Discover Devices KX Subnet The Discover Devices KX Subnet page opens 2 Click Refresh The list of devices on the local subnet is refreshed gt To add devices to your Favorites List Check the checkbox next to the device name IP Address 2 Click Add Raritan 55 When you re ready to take control Managing Favorites 56 Tip Use the Select All and Deselect All buttons to quickly select all or deselect all devices in the Dominion KX II device subnet gt Toaccess a discovered device Click the device name or IP Address for that device A new browser opens to that device Add New Favorite gt To adda device to
114. e IP Mask field Select the Policy from the drop down list Click Insert If the Rule you just typed equals an existing Rule the new rule is placed ahead of the exiting rule and all rules are moved down in the list To replace a rule Specify the Rule you want to replace Type the IP Address and subnet mask in the IP Mask field Select the Policy from the drop down list Click Replace Your new rule replaces the original rule with the same Rule To delete a rule Specify the Rule you want to delete Click Delete You are prompted to confirm the deletion Click OK Tip The rule numbers allow you to have more control over the order in which the rules are created Raritan When you re ready to take control 155 Chapter 11 Maintenance In This Chapter Maintenance Meni v cciccuscacecusecestcnnertsnennsveduenvontshenssnentetensbsssedeseuestsnsedessoncens 156 Maintenance Features Local Remote Console sss 156 PUGIE TiS e 157 Device Information oder trt rtr br ri s ve ie E gare RR 159 Backup and Restore rte tiere bito bs 160 CIM Upgrade rider teri erp b bae esso erg erro erba 162 Firmware Upgrade rrr tr ertt pte rhet a poet EREE A 163 Upgrade Report uitesipeae oneri epe imas err E S iura pri ioris 165 RebOOt iet RR pO Eo ERE ERE UE ERE 165 Maintenance Menu The Maintenance menu includes these options Audit Log Device Information Backup Rest
115. e ready to take control Raritan Chapter 13 KX II Local Console Factory Reset KX II Local Console Only Note This feature is available only on the Dominion KX II Local Console The Dominion KX II offers several types of reset modes from the Local Console user interface Note It is recommended that you save the audit log prior to performing a factory reset The audit log is deleted when a factory reset is performed and the reset event is not logged in the audit log For more information about saving the audit log please refer to Audit Log on page 157 gt To perform a factory reset 1 Select Maintenance gt Factory Reset The Factory Reset page opens SER 1 ar tan Port Access User Management Device Settings I Dominion KX II EL e Home gt Maintenance gt Factory Reset Time amp Session March 02 2007 14 26 13 User admin Full Factory Reset State active Your IP Local Console Network Parameters Reset Last Login Mar 02 2007 14 12 O Device Information Device Name DominionKX 4 IP Address 192 168 59 97 Firmware 2 0 Powerinl on Powerin2 off Port States opyright 2007 Raritan Computer Inc iit Rs cin ad NT LOT a S Pa a Figure 95 Factory Reset Local Console Only 2 Select the appropriate reset option e Full Factory Reset Removes the entire configuration and resets the unit completely to the factory defaults Please note that
116. e tessera tata sna tata enses tata tuo 6 Figure 6 Solaris Mouse COmtiguratiom ssccscicssssssesesssscsnssssssassscssstsssessscsawsecnnsssessuvernseseasaceesassvossantees 24 Figure 7 Dominion KX II Connecti ns eicseveeeskbs pee tintssia theo sttssesasveceansstcsineseelassaancacanesbetavstine 29 Fig re 8 sil doris ru NM 33 Figure 9 Port Configuration M 35 Figure 10 Authentication Authorization Flow Diagram eese 37 Figure 11 Dominion KX II Remote Console Login Page eene 45 Figure 12 Sample Menu Hierarchy breadcrumb esee 46 Figure 13 KX II Console Menu Tree Local and Remote eese 47 Figure 14 Port ACCESS C 49 Figure 15 Favorites b 51 Figure To Edit Favorite Information e sseesessssessesesesseseeresesnoseoresesseseoreseseeseeeosesresesneseeeesesresesese 52 Figure 17 Discover Devices Local Subnet ssessesesesseseeresessoseoeesesroseoresesesseseoseseoseseosesesreseseeseee 53 Figure 18 Discover Devices KX Subnet sessesessessesesesseseoresessoseoeesesrsseoresesesseseoreseososeoresesreseoseseee 55 Fig re 19 Add sa cir T M 56 Figure 20 Port tris m 58 Fig re 21 Port Action MOD seiten rii i den PRI EMITIR D EU ITEM QU HI n MV I MIRI IUE 59 Figure 22 Port Action Menu power options
117. e this page to disable automatic detection of the power supply not in use gt To disable power supply auto detection for the power supply not in use 1 Using the KX II Local Console select Device Settings gt Power Supply Setup The Power Supply Setup page opens 2 Clear auto detection for the power supply that you are not using 35 When you re ready to take control Remote Authentication For more information refer to Power Supply Setup Page on page 136 Note to CC SG Users If you are using Dominion KX II in a CC SG configuration perform the installation steps as outlined above and when finished consult the CommandCenter Secure Gateway User Guide Administrator Guide or Deployment Guide to proceed all found on Raritan s Website under Support http www raritan com support productdocumentation Note The remainder of this user guide applies primarily to deploying Dominion KX II unit s without the integration functionality of CC SG Remote Authentication 36 Note to CC SG Users When the Dominion KX II is controlled by CommandCenter Secure Gateway CC SG authenticates users and groups except for local users requiring local port access When CC SG is controlling the Dominion KX II local port users will be authenticated against the local user database or the Remote Authentication server LDAP or RADIUS configured on the Dominion KX II they will not be authenticated against the CC SG user databas
118. e users in order to maximize usability in all bandwidths 15 bit RGB Color 8 bit RGB Color 4 bit Color 4 bit Gray 3 bit Gray 2 bit Gray Black and White Important For most administrative tasks server monitoring reconfiguring etc the full 24 bit or 32 bit color spectrum made available by most modern video graphics cards is not necessary Attempting to transmit such high color depths wastes network bandwidth Use the slider to select the desired level of Smoothing 15 bit color mode only The level of smoothing determines how aggressively to blend screen regions with small color variation into a single smooth color Smoothing improves the appearance of target video by reducing displayed video noise Click OK to set these properties zie Raritan When you re ready to take control Chapter 6 Virtual KVM Client Tocancel without saving changes Click Cancel Connection Info gt To obtain information about your Virtual KVM Client connection Select Connection gt Connection Info The Connection Info window opens Connection Info Figure 27 Connection Info Raritan 71 When you re ready to take control Connection Menu The following information is displayed about the current connection e Device Name The name of the Dominion KX II device e IP Address The IP Address of the Dominion KX II device e Port The KVM Communication TCP IP Port used to access the target device
119. eady to take control Index W Windows 2000 Settings 18 Windows 3 Button Mouse on Linux Targets e 220 Windows Vista 18 Windows XP Windows 2008 Settings 17 Raritan 241 When you re ready to take control When you re ready to take control gt U S Canada _atin America Monday Friday 8 a m 8 p m ET Phone 800 724 8090 or 732 764 8886 For CommandCenter NOC Press 6 then Press 1 For CommandCenter Secure Gateway Press 6 then Press 2 Fax 732 764 8887 Email for CommandCenter NOC tech ccnoc raritan com Email for all other products tech raritan com gt Europe Monday Friday 8 30 a m 5 p m GMT 1 CET Phone 31 10 2844040 Email tech europe raritan com gt Japan Monday Friday 9 30 a m 5 30 p m local time Phone 481 3 3523 5994 Email support japan raritan com United Kingdom Monday Friday 8 30 a m to 5 p m GMT 1 CET Phone 44 20 7614 77 00 gt Taiwan Monday Friday 9 a m 6 p m GMT 5 Standard 4 Daylight Phone 4886 2 8919 1333 Email tech rap raritan com Sydney Austral a Monday Friday 9 a m 6 p m local time Phone 461 2 9029 2558 Germany Monday Friday 8 30 a m 5 p m GMT 1 CET Phone 449 20 17 47 980 France Monday Friday 8 30 a m 5 p m GMT 1 CET Phone 433 1 47 56 20 39 Guangzhou Monday Friday 9 a m 6 p m local time Phone 86 20 8755 5561 Shanghai Monday Friday 9 a m 6 p m
120. ecommended method for rebooting Important All KVM connections will be closed and all users will be 165 When you re ready to take control Reboot 166 logged off gt To reboot your Dominion KX II 1 Select Maintenance gt Reboot The Reboot page opens i T l Port Access Virtual Media User Management Device Settings Security Miata Home Maintenance Reboot Reboot This may take up to two minutes lason Aem un ARRAS gren TA PS nsn oos sins at Figure 79 Reboot 2 Click the Reboot button You are prompted to confirm the action Port Access Virtual Media User Management Device Settings Security Maintena Home gt Maintenance gt Redoot Rebooting the system will logoff all users Do you want to proceed with the reboot f This may take up to two mintes a eet th a9 saan ce atn e ins he aAA an Figure 80 Reboot Confirmation 3 Click Yes to proceed with the reboot gt To exit without rebooting Click No Raritan When you re ready to take control Chapter 12 Diagnostics In This Chapter Diagnostics MONI t 167 Network Interface Page cccccscesssescssecssesetetesesesesnsnsnesessscececeeeseeneseseseanenens 168 Network Statistics Page sses iserierseiseni susie in er nS Nenia tesina iari Enia 169 Ping Host Pagesgconser inea E NEOR 171 Trace Route to Host Page ccccssssssssseseseeenenessssesesseescscscs
121. ections to the target server gt To access a drive on the client computer 1 From the Virtual KVM Client select Virtual Media gt Connect Drive The Map Virtual Media Drive dialog opens Map Virtual Media Drive TestPC y xj Select a local drive for mounting onto the target server Connect Cancel Figure 37 Map Virtual Media Drive 2 Select the drive from the Local Drive drop down list 3 Ifyou want read and write capabilities check the Read Write option checkbox This option is disabled for non removable drives Please refer to the conditions when read write is not available on page 94 for more information When checked you will be able to read or write the connected USB disk WARNING Enabling Read Write access can be dangerous Simultaneous access to the same drive from more than one entity can result in data corruption If you do not require write access leave this option unchecked 93 When you re ready to take control Connecting to Virtual Media 4 Click Connect The media will be mounted on the target server virtually You can access the media just like any other drive Conditions when Read Write is not Available Virtual media read write is not available in the following situations e For all hard drives e When the drive is write protected e When the user does not have read write permission Port Permission Access is set to None or View Port Permission VM Access is set to Read
122. ed by temal user group Permissions determined by Yes ternal user group by intemal user group unknown Figure 10 Authentication Authorization Flow Diagram zie Raritan 2 When you re ready to take control Users Groups and Access Permissions Note the importance of the group to which a given user belongs as well as the need to configure the group named Unknown If the external authentication server returns a group name that is not recognized by the Dominion KX II that user s permissions are determined by the permanent group named Unknown Refer to Implementing LDAP Remote Authentication on page 115 and Implementing RADIUS Remote Authentication on page 118 to determine how to configure your authentication server to return user group information to the Dominion KX II as part of its reply to an authentication query Users Groups and Access Permissions 38 The Dominion KX II stores an internal list of all user and group names to determine access authorization and permissions This information is stored internally in an encrypted format There are several forms of authentication and this one is known as local authentication All users have to be authenticated if Dominion KX II is configured for LDAP or RADIUS that authentication is processed first followed by local authentication Users User names and passwords are required to gain access to the Dominion KX IL unit This information is used t
123. ed for access to your Dominion KX II Refer to Authentication vs Authorization for more information about how authentication and authorization operate and differ Note Even if you select remote authentication LDAP or RADIUS local authentication is still used gt To configure authentication 1 Select User Management gt Authentication Settings The Authentication Settings page opens 112 lt Raritan When you re ready to take control Raritan Chapter 8 User Management Port Access Virtual Media User Management Device Settings Sec Home gt User Management gt Authentication Settings Authentication Settings Local Authentication C LDAP Primary LDAP Server Secondary LDAP Server Secret Phrase Confirm Secret Phrase 7 Grable Secure LDAP Port Secure LDAP Port Certificate File Browse Dti of Administ ative User User Search DIU T of External LDAP Server 5 LC 5 Active Directory Domain Cc RADIUS Primary RADIUS Server Shared Secret Authentication Port Accounting Port E ehe me n aae See aes AI sad Figure 48 Authentication Settings 2 Select the option for the authentication protocol you want to use Local Authentication LDAP or RADIUS Selecting the LDAP option enables the remaining LDAP fields selecting the RADIUS option enables the remaining RADIUS fields 3 Ifyou selected Local Authentication proceed to step 6 4 Ifyou selected LDAP read the
124. eir specifications and Raritan cannot guarantee the interoperability of any particular third party analog KVM switch Contact Raritan technical support for further information Raritan s Paragon and Paragon II analog switches are IP enabled by the IP Reach family of remote access products Raritan 298 When you re ready to take control Computer Interface Modules CIMs Computer Interface Modules CIMs Question Answer Can I use Computer Yes Certain Paragon computer interface modules CIMs may work Interface Modules with Dominion KX II please check the Raritan Dominion KX II release CIMs from Raritan s notes on the web site for the latest list of certified CIMs analog matrix KVM However because Paragon CIMs cost more than Dominion KX II CIMs as they incorporate technology for video transmission of up to 1000 feet 300 meters it is not generally advisable to purchase Paragon CIMs for use with Dominion KX II Also note that when connected to Dominion KX II Paragon CIMs transmit video at a distance of up to 150 feet the same as Dominion KX II CIMs not at 1000 feet 300 meters as they do when connected to Paragon switch Paragon with Dominion KX II Can I use Dominion KX No Dominion KX II computer interface modules CIMs transmit video II Computer Interface at ranges of 50 to 150 feet 15 45 m and thus do not work with Modules CIMs with Paragon which requires CIMs that transmit video at
125. elp User Guide link in the KX II Remote Console interface Non US Keyboards Raritan French Keyboard Caret Symbol Linux Clients only The Virtual KVM Client and the Multi Platform Client MPC do not process the key combination of Alt Gr 9 as the caret symbol when using French keyboards with Linux clients gt To obtain the caret symbol From a French keyboard press the key to the right of the P key then immediately press the spacebar Alternatively create a macro consisting of the following commands 1 Press Right Alt 2 Press 9 3 Release 9 4 Release Right Alt 205 When you re ready to take control Non US Keyboards 206 Note These procedures do not apply to the circumflex accent above vowels In all cases the key to the right of the P key works on French keyboards to create the circumflex accent when used in combination with another character Accent Symbol Windows XP Clients only From the Virtual KVM Client and the Multi Platform Client the key combination of Alt Gr 7 results in the accented character displaying twice when using French keyboards with Windows XP clients Note This does not occur with Linux clients Numeric Keypad From the Virtual KVM Client and the Multi Platform Client the numeric keypad symbols display as follows when using a French keyboard Numeric Keypad Symbol Displays As E Tilde Symbol From the Virtual KVM Client an
126. en you re ready to take control Full Restore A complete restore of the entire system generally used for traditional backup and restore purposes Protected Restore Everything is restored except device specific information such as serial number MAC Address IP Address name port names etc With this option you can setup one Dominion KX II and copy the configuration to multiple Dominion KX II devices Custom Restore With this option you can select User and Group Restore Device Settings Restore or both Check the appropriate checkboxes User and Group Restore This option includes only user and group information Use this option to quickly setup users on a different Dominion KX II Device Settings Restore This option includes only device settings Use this option to quickly copy the device information Click the Browse button A Choose file dialog opens Navigate to and select the appropriate backup file and click Open The file selected is listed in the Restore File field Click Restore The configuration based on the type of restore selected is restored 161 CIM Upgrade CIM Upgrade 162 Use this procedure to upgrade CIMs using the firmware versions stored in the memory of your Dominion KX II unit In general all CIMs are upgraded when you upgrade the device firmware using the Firmware Upgrade on page 163 page Use the CIM Upgrade page to upgrade new CIMs Note Only D2CIM VUSB and D2CIM
127. enterprise performs this role Current schema master online rci acidi2nzmat mype mydomain com To transfer the schema master role to the targeted domain controller below click Change rci acfai2nzmat mype mydomain com Figure 100 Change Schema Master 2 Optional Check the checkbox before The Schema may be modified on this Domain Controller 3 Click OK Creating a New Attribute To create new attributes for the rciusergroup class 1 Click the symbol before Active Directory Schema in the left pane of the window 2 Right click Attributes in the left pane 198 Raritan When you re ready to take control 3 Create New Attribute EN zi xj Appendix B Updating the LDAP Schema Click New and then select Attribute When the warning message appears click Continue and the Create New Attribute window opens I Create a New Attribute Object Identification Common Name rciusergoup LDAP Display Name cwemw Unique X500 Object ID 1361411274250 Description Raritan s LDAP attribute Syntax and Range Syntax Case Insensitive String Minimum 1 Magimum 24 Muli alued Cancel Figure 101 Create New Attribute 4 5 6 y 8 9 Type rciusergroup in the Common Name field Type rciusergroup in the LDAP Display Name field Type 1 3 6 1 4 1 13742 50 in the Unique x5000 Ob
128. ers With the Dominion KX II you can access several target servers Dominion KX II provides the ability to switch from one target server to another Note This feature is available in the Dominion KX II Remote Console only 1 To switch between target servers While already using a target server access the Dominion KX II Port Access page Click the Port Name of the target you want to access now The Port Action Menu is displayed Select the Switch From option from the Port Action Menu The Virtual KVM Client on page 64 window switches to the new target server you selected Disconnecting Target Servers Note This item is not available on the KX II Local Console the only way to disconnect from the switched target in the Local Console is to use the hotkey see Hotkeys on page 181 1 To disconnect a target server Click the Port Name of the target you want to disconnect The Port Action Menu is displayed Select the Disconnect option from the Port Action Menu The Virtual KVM Client on page 64 window closes the target window Tip You can also close the Virtual KVM Client window by selecting Connection Exit from the Virtual KVM menu zs Raritan When you re ready to take control 61 Power Controlling a Target Server Power Controlling a Target Server 62 Note These features are available only when you have made power associations Refer to power control for more information Po
129. ers running Microsoft Windows XP 2003 1 Configure the mouse settings a Select Start gt Control Panel gt Mouse b Open the Pointer Options tab In the Motion group Set the mouse motion speed setting exactly to the middle speed Disable the Enhanced pointer precision option Click OK 2 Disable transition effects a Select the Display option from Control Panel b Open the Appearance tab c Click the Effects button d Clear the Use the following transition effect for menus and tooltips option e Click OK f Close the Control Panel Note For target servers running Windows 2000 or XP you may wish to create a user name that will be used only for remote connections through Dominion KX II This will enable you to keep the target server s slow mouse pointer motion acceleration settings exclusive to the Dominion KX II connection Windows XP and 2000 login screens revert to pre set mouse parameters that differ from those suggested for optimal Dominion KX II performance As a result mouse synchronization may not be optimal for these screens WARNING Proceed only if you are comfortable adjusting the registry on Windows target servers You can obtain better Dominion KX II mouse synchronization at login screens by using the Windows registry editor to change the following settings HKEY_CURRENT_USER Control Panel Mouse MouseSpeed 0 MouseThreshold 1 0 MouseThreshold 2 0 Raritan 35 When you re ready
130. es standard Ethernet but also very conservative bandwidth with very high quality video Thus if a connection wireless client has network connectivity to a Dominion KX II servers can be configured and managed at BIOS level wirelessly Can Dominion KX II be Whether via a fast corporate LAN the less predictable WAN Internet used over the WAN cable modem or dial up modem Dominion KX II s KVM over IP Internet or just over technology can accommodate the connection the corporate LAN Can I use Dominion KX Yes Dominion KX II uses standard Internet Protocol IP technologies must be open on my firewall in order to enable network access to II with a VPN from Layer 1 through Layer 4 Traffic can be easily tunneled through standard VPNs How many TCP ports Only one Dominion KX II protects network security by only requiring access to a single TCP port to operate This port is completely configurable for additional security Note that of course to use Dominion KX II s optional Web browser require an external authentication server to operate Dominion KX II Are MW these ports capability the standard HTTPS port 443 must also be open configurable Does Dominion KX II No Dominion KX IL is a completely self sufficient appliance After assigning an IP address to a Dominion KX II it is ready to use with Web browser and authentication capabilities completely built in If an external authentication
131. eseseseetetesesesesnsnssesescscsnsnsnescscecsceeeeeensnssesesesnsnsnenescseeeess 55 Add New Favorite f M 56 Chapter 5 Accessing Target Servers 57 Port Access 58 Connecting to a Target Server ccccccccccsesesesensssnsssnscseseseseseseseseseecscecececeescsesesesenssanssanssesesceenenenenseees 59 POrt Acton Mentek ei 60 Switching between Target Servers tenete nenne eene nennen tenens 61 Disconnecting Target Servers ccccccccsceeesesensssnsnsnseseseseseseseseneseseeecececececscscscsenensnensnssasseseeceeneneneneeees 61 Power Controlling a Target Server coronis ironiei iisen ninien Erer ENE EEE eneen 62 Power Cycle a Target Server aE a En E NE EE E iE 62 Power On a Target Server eene riii sannri kiserni naien E En nE ari Ea 62 Power Off a TargebSetver seente nR e ero EE ETRE PD ENEE EOR 63 Chapter 6 Virtual KVM Client 64 neu EE EERE E EEEE ERENER E ROE EEEE E EESE 65 Dalio T AE E etsi po OLI E E E RF OR E E 66 Menu Tree satsirnir tede EE ENEE EEE EE AEA TE E E N ES 66 gov 66 Mouse Pointer Synchronization cccsecccscsesessscesseeneesssesescsnsssescscseececseescssscesseeesuensiessseseseansnansneaseeseees 67 Mouse Synchronization Tips ccccccsesesssseescscscsseeeseneesesesessensnesessscsceceeeeeeseseeseeeeeneneneseseseanens 68 Connection Menus nice ettet erret man ne shine nieto Heide ap E
132. ess Control Lists lt Raritan 127 When you re ready to take control Date Time Settings Date Time Settings 128 Use the Date Time Settings page to specify the date and time for the Dominion KX II There are two ways to do this e Manually set the date and time or e Synchronize with a Network Time Protocol NTP Server gt To set the date and time Select Device Settings Date Time The Date Time Settings page opens Port Access Virtual Media User Management Device Settings Security i Home gt Device Settings gt Date Time Settings Date Time Settings Time Zone GMT 00 England ireland Portugal d User Specified Time Date Month Day Year wey e p Time Hour Minute BR C Synchronize with NTP Server Primary Time server Secondary Time server The NIP Server configuration is obtained automatically For proper function please make sure that the DHCP server used by this device provides correct time server information x Ca cance ae CPUS TET Sm m a A00 EN Figure 55 Date Time Settings 2 Select your time zone from the Time Zone drop down list 3 Select the method you would like to use to set the date and time User Specified Time Select this option to input the date and time manually Synchronize with NTP Server Select this option to synchronize the date and time with the Network Time Protocol NTP Server Raritan When you re ready to take
133. essing the space bar might cause the focus to change from the target server to the client PC The local operating system then interprets this key combination and consequently triggers the action for this key combination in the active window the client PC Universal Virtual Media Question Answer What Dominion KX II models support virtual media All Dominion KX II models support virtual media It is available standalone and through CommandCenter Secure Gateway a centralized management appliance virtual media What types of virtual Dominion KX II supports the following types of media internal and media does the USB connected CD DVD drives USB mass storage devices PC hard Dominion KX II drives and remote drives support What is required for The new D2CIM VUSB CIM is required for virtual media It supports virtual media sessions to target servers supporting the USB 2 0 interface Available in economical 32 and 64 quantity CIM packages this new CIM supports Absolute Mouse Synchronization as well as remote firmware update Is virtual media secure Yes Virtual media sessions are secured using 128 bit AES or RC4 encryption lt Raritan When you re ready to take control 217 Ethernet and IP Networking Ethernet and IP Networking Question Answer Does the Dominion KX Yes Dominion KX II features dual gigabit Ethernet ports to provide IL offer dual gigabit redundant failover c
134. evice from Command Center Management Really Unmanage Figure 98 Confirm CC Unmanage Raritan When you re ready to take control Chapter 14 CC Unmanage 2 Click the Really Unmanage button A message is displayed confirming that the device is no longer under CC management The device is no longer in CC Manage Mode or the CC heartbeat returned meanwhile and you will be logged out immediately Figure 99 Device Removed from CC Management 3 Click OK The Dominion KX II login page opens Raritan 189 When you re ready to take control Appendix A Specifications In This Chapter Environmental Requirements cccccccccsessssetessesesnensnesessssecececeneesseeeeees 190 Remote Connection o DPE E E eene n ntes 193 KVM Properties esservi isare ierat enanss ere hien eie ena eie tod eee do 193 TCP and UDP Ports Used nter tren 194 Target Server Connection Distance and Video Resolution 195 Network Speed Settings 195 Environmental Requirements Temperature 0 C 40 C 32 F 104 F Humidity 20 85 RH Altitude N A Vibration 5 55 5 HZ 0 38mm 1 minutes per cycle 30 minutes for each axis X Y Z Shock N A Temperature O C 50 C 32 F 122 F Humidity 10 90 RH Altitude N A Vibration 5 55 5 HZ 0 38mm 1 minutes per cycle 30 minutes for each axis X Y Z Shock N A lt Raritan 190 When you re ready
135. fore changing the network configuration ensure that there are no other active user connections to the device all connections will be dropped when the Dominion KX II unit reboots Basically there are two ways to setup your IP Configuration e None This option is the recommended option Static IP Since the Dominion KX II is part of your network infrastructure you most likely do not want its IP Address to change frequently This option allows you to set the network parameters e DHCP The IP Address is automatically assigned by a DHCP server gt To change the network configuration Select Device Settings gt Network The Network Settings page opens Port Access Virtual Media User Management Device Settings Security Maintenance Diagnostics e Home Device Settings gt Newsok Settings Network Basic Settings Network Miscellaneous Settings Device lame Discovery Port 1 porno 5000 IP auto configuration Bandwidth Limit once ne Lm Preferred host name DHCP only LAN interface Settings Note For reliable network communication configure the Dominion KX ll and LAN Switch to tre same LAN interface Subnet mask Speed and Duplex For exarmple configure both the Dominion KX land LAN Switch to Autodetect recommended or set both to fixed speed duplex such as 100MDbps Fil Current LAN interface parameter s eutonegotation on 100 Mops full duplex link ok Primary DIIS server IP address LAN Interf
136. formation about the menu options available Note Do not use apostrophes for the Port CIM Name isi E Raritan When you re ready to take control zs Raritan Chapter 13 KX II Local Console e Status The Status is either up or down e Availability Valid Values per include Idle Connected Busy or Unavailable gt To change the sort order Click the column heading you want to sort on The list of target servers is sorted by that column Hotkeys Because the Dominion KX II Local Console interface is completely replaced by the interface for the target server you are accessing a hotkey is utilized so you can switch between these interfaces The Local Port hotkey allows you to rapidly access the KX II Local Console user interface when a target server is currently being viewed The default is to press the Scroll Lock key twice in rapid succession but you can designate any key combination available in the Local Port Settings page as the hotkey Refer to Local Port Settings see Local Port Settings KX II Local Console Only on page 182 for more information Accessing a Target Server gt Toaccess a target server 1 Click the Port Name of the target you want to access The Port Action Menu is displayed 2 Select Connect from the Port Action Menu on page 60 The video display switches to the target server interface Returning to the KX II Local Console Interface Important The KX II Local Console
137. from 1 to the total number of ports available for the Dominion KX II unit Please Note that ports connected to power strips will not be among those listed resulting in gaps in the Port Number sequence Port Name The name of the Dominion KX II port initially set to Dominion KX2 Port but you can change the name to something more descriptive When you click on a Port Name link the Port Action Menu is opened Status The Status is either up or down Availability The Availability can be Idle Connected Busy or Unavailable 2 Click the Port Name of the target server you want to access The Port Action Menu is displayed Refer to Port Action Menu on page 60 for more information about the menu options available 3 Select the desired menu option from the Port Action Menu gt To change the display sort order Click the column heading you want to sort on The list of target servers is sorted by that column Connecting to a Target Server gt Toconnect to a target server 1 From the KX II Remote Console click the Port Access tab to open it The Port Access page opens 2 Click the Port Name of the target you want to access The Port Action Menu is displayed Port Access Virtual Meme User Management Device Settings Security Maintenance Diagnonteca Home Port Access Port Access Click on the individual port name to see allowable operations 1 of 4 Remote KVM channels currently in use 1 n DTO Pa
138. ge 125 for more information Use both network ports only if you want to use one as a failover port 3 Local Access Port local PC For convenient access to target servers while at the rack use the Dominion KX II Local Access port While the local port is required for installation and setup it is optional for subsequent use The local port provides the KX II Local Console graphical user interface for administration and target server access gt To connect the local port Attach a multi sync VGA monitor mouse and keyboard to the respective Local User ports using either a PS 2 or USB keyboard and mouse Raritan When you re ready to take control Chapter 3 Installation and Configuration 4 Target Server Ports Dominion KX II uses standard UTP cabling Cat5 5e 6 to connect to each target server Refer to Appendix A Specifications see Specifications on page 190 for additional information Toconnect a target server to the Dominion KX ll 1 Usethe appropriate Computer Interface Module CIM Refer to Supported CIMs for more information about the CIMs to use with each operating system 2 Attach the HD15 video connector of your CIM to the video port of your target server Ensure that your target server s video has already been configured to a supported resolution and refresh rate For Sun servers also ensure that your target server s video card has been set to output standard VGA H and V sync and no
139. gs Sun Solaris 10 1 1 Select Launcher Application Manager Desktop Controls opens 2 Select Mouse Style Manager The Style Manager Mouse dialog opens 3 Setthe Acceleration slider to 1 0 4 Setthe Threshold slider to 1 0 5 Click OK Accessing the Command Line 1 Right click 2 Select Tools gt Terminal A terminal window opens It is best to be at the root to issue commands Video Settings POST Sun systems have two different resolution settings a POST resolution and a GUI resolution Please Note that 1024x768x75 is used as an example here substitute the resolution and refresh rate you are using Run these commands from the command line gt To check current POST resolution Run the following command as root eeprom output device Raritan m When you re ready to take control Step 1 Configure Target Servers Tochange POST resolution 1 feeprom output device screen r1024x768x75 2 Logoutor restart computer Video Settings GUI The GUI resolution can be checked and set using different commands depending on the video card in use Please Note that 1024x768x75 is used as an example here substitute the resolution and refresh rate you are using Run these commands from the command line The following table is organized by card To Check Resolution To Change Resolution 32 bit usr sbin pgxconfig prconf 1 f usr sbin pgxconfig res 1024x768x75 2 Logoutor restart computer
140. hapter 4 Connecting to the Dominion KX II To scroll through pages longer than the screen e Use Page Up and Page Down keys on your keyboard or e Use the scroll bar on the right For more information about navigation and selection in the Raritan Multi Platform Client MPC refer to the Raritan Multi Platform Client MPC and Raritan Remote Client RRC User Guide Logging Out gt To quit the Dominion KX Il Console Click Logout in the upper right hand corner of the page Note Logging out also closes any open Virtual KVM Client sessions Dominion KX Il Console Menu Tree The following diagram represents all of the menu options available in both the Dominion KX II Remote and Dominion KX II Local Console interfaces Variations between the Dominion KX II Local Console and the Dominion KX II Remote Console are identified Heip User ec Guido Unmanage LLLLLE Login i j mu Lm I I Add New Usar Date Time n Saran Figure 13 KX II Console Menu Tree Local and Remote Raritan 47 When you re ready to take control Launching the Dominion KX II In addition to being identified in the menu tree above menu option variations between the Dominion KX II Local Console and the Dominion KX II Remote Console are identified in the following table Local Remote Console Virtual Media Cons
141. hat you want to control through the Dominion KX II unit they are connected to the Dominion KX II ports at the back of the unit Note For each connection to a target server a new Virtual KVM Client window is opened gt To use the Port Access page 1 From the Dominion KX II Remote Console click the Port Access tab to open it The Port Access page opens Port Access Virtual Media User Management Device Setings Security Maintenance Diagnostics Home gt Pon Asses Logout Port Access Click on the Individual port name to see aliowabie operations 0 of 4 Remote KVM channels are currently in use 4 Port Number Port Name Status Arala bility 1 Dominia KxI Poti down ide 2 Domindor HX2_ Porta sown hie 3 Dorm dary 12 _P ot down tls 4 D amrit X2 Pota ds on m AbesiPC up ids 6 Dominion Kx2 Port e down is 7 Domirioe 1X2 Po down hae 6 Domrion KX2 Porto down ide 9 Locs Port up ies 10 Domnion KX2 Porti 0 sown hie 14 omriar X2 Portit down ids 12 Domrian HX2 Poeti down he 13 Domrion IOQ Partt 3 down te 14 Domrio Kx2 Pott 4 down bas 1s Damrir HKX2 Puis down kke Copyright 2007 Retan Conpiter he Figure 20 Port Access Port Access The target servers are initially sorted by Port Number you can change the display to sort on any of the columns 58 Raritan When you re ready to take control Chapter 5 Accessing Target Servers Port Number Numbered
142. he Audit Log page displays events by date and time most recent events listed first The Audit Log provides the following information e Date The date and time that the event occurred 24 hour clock e Event The event name as listed in the Event Management page e Description Detailed description of the event gt To save the Audit Log Note Saving the Audit Log is available only on the Dominion KX II Remote Console not on the Local Console 1 Click the Save to File button A Save File dialog opens 2 Select the desired file name and location and click Save The audit log is saved locally on your client machine with the name and location specified To page through the Audit Log Use the Older and Newer links 158 E Raritan When you re ready to take control Chapter 11 Maintenance Device Information The Device Information page provides detailed information about your Dominion KX II device and the CIMs in use This information is helpful should you need to contact Raritan Technical Support gt To view information about your Dominion KX II and CIMs Select Maintenance Device Information The Device Information page opens Port Access Virtual Media User Management Device Settings Security Maintenance Diagnostics Mame gt Mastenance gt Device Information Logout Modek OKX2 416 Hat dawat e Revision 0x44 Firmware Version 20025418 Serial Humber HKCOBOO0 6 MAC Address 0
143. here is an inability to log into a Dominion KX II device or to access target servers Windows SUSE etc In addition the Ctrl Alt M key combination may not bring up the Keyboard Shortcut menu This situation occurs with the following client configuration Fedora Core 6 and Firefox 1 5 or 2 0 Through testing it has been determined that installation of libXp resolves window focusing issues with Fedora Core 6 Raritan has tested with libXp 1 0 0 8 1386 rpmy this resolved all of the keyboard focus and popup menu problems Note libXp is also required for the SeaMonkey formerly Mozilla browser to work with the Java plugin SUSE VESA Video Modes The SuSE X org configuration tool SaX2 generates video modes using modeline entries in the X org configuration file These video modes do not correspond exactly with VESA video mode timing even when a VESA monitor is selected Dominion KX IL on the other hand relies on exact VESA mode timing for proper synchronization This disparity can result in black borders missing sections of the picture and noise gt Toconfigure the SUSE video display 1 The generated configuration file etc X11 xorg conf includes a Monitor section with an option named UseModes For example UseModes Modes 0 2 Either comment out this line using or delete it completely 3 Restart the X server With this change the internal video mode timing from the X server will be used and will correspond exact
144. hoice for its network Duplicate IP Address If the IP Address of the KX II is the same as another device network connectivity may be inconsistent Port 5000 conflicts If another device is using port 5000 the KX II default port must be changed or the other device must be changed When changing the IP Address of a KX II or swapping in a new KX II sufficient time must be allowed for its IP and MAC addresses to be known throughout the Layer 2 and Layer 3 networks zie Raritan 55d When you re ready to take control Servers Servers Question Answer Does Dominion KX II depend on a Windows server to operate Absolutely not Because users depend on the KVM infrastructure to always be available in any scenario whatsoever as they will likely need to use the KVM infrastructure to fix problems Dominion KX II is designed to be completely independent from any external server For example should the data center come under attack from a malicious Windows worm or virus administrators will need to use the KVM solution to resolve the situation Therefore it is imperative that the KVM solution in turn must not rely on these same Windows servers or any server for that matter to be operational in order for the KVM solution to function To this end Dominion KX II is completely independent Even if a user chooses to configure the Dominion KX II to authenticate against an Active Directory server if that Active Direct
145. ication Port The default authentication port is 1812 change as required 4 Accounting Port The default accounting port is 1813 change as required 5 Timeout in seconds The default timeout is 1 second change as required The timeout is the length of time the Dominion KX II waits for a response from the RADIUS server before sending another authentication request 6 Retries The default number of retries is 3 change as required This is the number of times the Dominion KX II will send an authentication request to the RADIUS server 7 Global Authentication Type Select from among the options in the drop down list PAP With PAP passwords are sent as plain text PAP is not interactive the username and password are sent as one data package once a connection is established rather than the server sending a login prompt and waiting for a response CHAP With CHAP authentication can be requested by the server at any time CHAP provides more security than PAP Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds the Dominion KX II device determines the permissions for a given user based on the permissions of the user s group Your remote RADIUS server can provide these user group names by returning an attribute implemented as a RADIUS FILTER ID The FILTER ID should be formatted as follows Raritan G GROUP NAME where GROUP NAME is a string denoting the name of the group to
146. ice Name Type a unique name for the device up to 16 characters spaces are not allowed Name your device so you can easily identify it The default name for a Dominion KX II unit is DominionKX Remote users will also see this name However if an MPC user has created a Connection Profile for this device that user will see the Description field from the Profile instead IP auto configuration Select from among the options available in the drop down list None Use this option if you do not want an auto IP configuration and prefer to set the IP Address yourself static IP This is the default and recommended option If this option is selected for the IP auto configuration the following Network Basic Settings fields are enabled allowing you to manually set the IP configuration IP Address The default IP Address is 192 168 0 192 Subnet Mask The default subnet mask is 255 255 255 0 Gateway IP Address The IP Address for the gateway if one is used Primary DNS Server IP Address The primary Domain Name Server used to translate names into IP Addresses Secondary DNS Server IP Address The secondary Domain Name Server used to translate names into IP Addresses if one is used DHCP Dynamic Host Configuration Protocol is used by networked computers clients to obtain unique IP addresses and other parameters from a DHCP server If DHCP is used enter the Preferred host name DHCP only Up to 63 charac
147. imum and maximum length required characters and password history retention Strong passwords Enable strong passwords Minimum length of strong password Maximum length of strong password F Enforce at least one lower case character 7 Enforce at least one upper case character F Enforce at least one numeric character 7 Enforce at least one printable special character lumber of restricted passwords based on history EU Figure 66 Security Settings Strong Passwords e Enable strong passwords Strong passwords require user created passwords to have a minimum of 8 characters with at least one alphabetical character and one non alphabetical character punctuation character or number In addition the first four characters of the password and the username cannot match When checked strong password rules are enforced Users with passwords not meeting strong password criteria will automatically be required to change their password on their next login When cleared only the standard format validation is enforced When checked the following fields are enabled and required Minimum length of strong password Passwords must be at least 8 characters long The default is 8 but it can be up to 63 Maximum length of strong password The default is 16 but can be up to 64 characters long Enforce at least one lower case character When checked at least one lower case character is required in the password Enforce at leas
148. indows Animate windows when minimizing and maximizing Fade options Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking f Click OK g Close the Control Panel Linux Settings Red Hat 9 Note The following settings are optimized for standard mouse mode only Toconfigure target servers running Linux graphical user interface 1 Configure the mouse settings a Select Main Menu gt Preferences gt Mouse The Mouse Preferences dialog opens b Open the Motion tab c Within the Speed group set the Acceleration slider to the exact center d Within the Speed group set the Sensitivity towards low e Within the Drag amp Drop group set the Threshold towards small f Close the Mouse Preferences dialog Note If these steps do not work issue the xset mouse 1 1 command as described in the Linux command line instructions 2 Configure the screen resolution zs Raritan 19 When you re ready to take control Step 1 Configure Target Servers Select Main Menu System Settings Display The Display Settings dialog opens From the Display tab select a Resolution supported by Dominion KX II From the Advanced tab verify that the Refresh Rate is supported by Dominion KX II Note Once connected to the target server in many Linux graphical environments the lt CTRL gt lt ALT gt lt gt command will change the video resolution scrolling thr
149. ing in to the Dominion KX II again Raritan When you re ready to take control Upgrade Report Reboot Raritan Chapter 11 Maintenance For information about upgrading the device firmware using the Multi Platform Client refer to the Raritan Multi Platform Client MPC and Raritan Remote Client RRC User Guide Dominion KX II provides information about upgrades performed on the Dominion KX II unit and attached CIMS gt To view the upgrade report Select Maintenance gt Upgrade Report The Upgrade Report page opens Port Access Virtual Media User Management Device Settings Security MMINERIIER Diagnostics Home gt Maintenance gt Upgrade Repet Logo Upgrade Report Last Upgrade Full Frimware Upgrade Result KX Firmware Upgrade successtul Firmware Version 20055554 DominionKX CIMs Current Version PowerCIM SUCCESS 0063 onmia nia aha en eget ne Aa meten E v MIS ERE afin atm s nent Figure 78 Upgrade Report Information is provided about the last Dominion KX II upgrade that was run the final status of that upgrade and the firmware version Information is also provided about the CIMs e Port The port where the CIM is connected e Type The type of CIM e Result The result of the upgrade success or fail e Current Version The CIM firmware version The Reboot page provides a safe and controlled way to reboot your Dominion KX II unit this is the r
150. inion KX II Local Console you must first authenticate with a valid username and password Dominion KX II provides a fully integrated authentication and security scheme whether your access is via the network or the local port In either case Dominion KX II allows access only to those servers to which a user has access permissions refer to User Management on page 98 for additional information on specifying server access and security settings If your Dominion KX II has been configured for external authentication services LDAP RADIUS or Active Directory authentication attempts at the Local Console also are authenticated against the external authentication service Note You can also specify no authentication for local console access this option is recommended only for secure environments gt Touse the KX ll Local Console 1 You need a keyboard mouse and video display connected to the local ports at the back of the Dominion KX II unit Refer to Physical Connections on page 177 for more information about the local port connections 2 Start the Dominion KX II unit the KX II Local Console interface displays KX II Local Console Interface The KX II Local Console interface is almost identical to the KX II Remote Console interface Where there are differences they are noted in the user manual Refer to User Interfaces KX II Console see KX II Local Console KX II Devices on page 41 and KX II Console Menu Tree see D
151. is Settings e 23 Supported Browsers 11 47 Supported Operating Systems Clients 6 10 Supported Operating Systems and CIMs Target Servers 12 Supported Protocols 38 Supported Video Resolutions 15 SUSE Linux 10 1 Settings e 22 SUSE VESA Video Modes 219 Switching between Target Servers 64 Synchronize Mouse 85 Syslog Configuration e 136 240 T Target BIOS Boot Time with Virtual Media e 220 Target Screen Resolution e 89 Target Server Connection Distance and Video Resolution 15 72 204 234 TCP and UDP Ports Used 203 Terminology 6 15 Tilde Symbol e 216 Toolbar e 70 Tools Menu 88 Trace Route to Host Page 179 Troubleshooting e 245 ac Jniversal Virtual Media e 227 Jpdating the LDAP Schema 122 206 pdating the Schema Cache 210 pgrade Report e 44 172 Jser Blocking 154 156 Jser Group List 106 ser Guide 7 ser Interfaces e 42 ser List 103 ser Management 102 187 ser Management Menu 102 sers 40 sers Groups and Access Permissions e 40 sing Virtual Media e 95 cc un c caadc C G Valid Special Characters 32 34 36 116 147 150 Video Menu 81 Video Settings 82 View Menu 89 View Toolbar e 89 Virtual KVM Client e 63 64 65 67 96 226 Virtual KVM Client Version not Known from CC SG Proxy Mode 221 Virtual Media 3 44 88 91 220 Virtual Media not Refreshed after Files Added e 220 zie Raritan When you re r
152. is era tkeH Ea I etY tie IERI svesinseceasivedsvudvacs Yvan pae nk o Una 199 Figure 102 Adding the Attributes cse terne beri ib rre He EERE HR DIE FH ERI RE SEO ORARE EN 200 Figure 103 Adding the Attributes to the Class eese eene tnn tntn tnn 200 Figure 104 ADSI crure 201 Figure 105 ADSI Edit CN U SC0s ssicsscesscsvssancncezctassassateansstvassccosaisesstaxanacsssbtoeseuasssesaetuaccstvnentbaats 202 Figure 106 Administrator Properties attribute editor eee 203 Fig re 107 adig cur c M 204 Figure 108 Edit Attribute adding user to KX II group eerte 204 ee am _ Raritan When you re ready to take control Chapter 1 Introduction In This Chapter Dominion KX II Overview eese eee eene enne enne nnne enne nennen Virtual Media uec tette eee ERE Ee pne ene Clas REN ERR Tee Product PAGES ie 5 eerte ed ir eee E EE Yee ve da Ure REY RR EXE ERES Product Features ien re cte Een E RC EE DR MER Mul Package COntents niae rrt o tie ep e i Er ir enaete User Guide oro e e e WEG c pu eR Raritan i When you re ready to take control Dominion KX II Overview Dominion KX Il Overview Dominion KX II is an enterprise class secure digital KVM Keyboard Video Mouse switch that provides BIOS level and up access and control of up to 64 servers from anywhere in the world via Web browser
153. istance and Video Resolution on page 195 for more information Verify that the mouse and video have been properly configured during the installation process Please refer to Chapter 3 Installation and Configuration see Installation and Configuration on page 14 for complete instructions Force an auto sense by clicking the Virtual KVM Client auto sense button If that does not improve the mouse synchronization for Linux UNIX and Solaris target servers a Openaterminal window b Enter the xset mouse 1 1 command c Close the terminal window Click the Virtual KVM Client mouse synchronization S button Additional Notes for Intelligent Mouse Mode 68 Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place Do not use an animated mouse Disable active desktop on target servers Raritan When you re ready to take control Chapter 6 Virtual KVM Client Connection Menu Properties Dialog The Dominion KX II dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints Dominion KX IL units optimize KVM output not only for LAN use but also for WAN and dialup use These units can also control color depth and limit video output offering an optimal balance between video quality and system responsiveness for any bandwidth O Connection Manually adjust bandwidth rel
154. itan When you re ready to take control Raritan Chapter 10 Security Settings e Deactivate User ID When selected this option specifies that the user will be locked out of the system after the number of failed login attempts specified in the Failed Attempts field Failed Attempts The number of unsuccessful login attempts after which the user s User ID will be deactivated This field is enabled when the Deactivate User ID option is selected The valid range is 1 10 User Blocking Disabled C Timer Lockout Attempts Lockout Time v Deactivate User ID Failed Attempts 3 Figure 67 Security Settings User Blocking When a user ID is deactivated after the specified number of failed attempts the administrator must change the user password and activate the user account by checking the Active checkbox in the User see Add New User on page 100 page Encryption amp Share Using the Encryption amp Share settings you can specify the type of encryption used PC and VM share modes and the type of reset performed when the Dominion KX II reset button is pressed Encryption amp Share Encryption Mode Auto Y v Apply Encryption Mode to KVM and Virtual Media PC Share Mode Private VM Share Mode Local Device Reset Mode Enatie Local Factory Reset x Figure 68 Security Settings Encryption amp Share 151 When you re ready to take control Security Settings 152 e Encry
155. iting rciusergroup Attributes for User Members 5 Open the Domain 6 Intheleft pane of the window select the CN Users folder 2 ADSI Edit X Fe aton Wes wndow Heb Doman rd gf 4 2ne met mw ns B B CC mypc DC mrdomen DC L3 ci butn E Oi compicers O cu Dceman Controles BABY CN ForagiSacrtyPinci 40 Lotan ond H E ctentos Quotas aa CeOPrageam Data 5 CN Systen apna HE Covigurstion rch gctserevet n 1j shems roate mp cm 2d CH Adrinistr akor ZdCH Cert Publishers ZdcH Creadnrs ZI CH CrepdscePrasce Q3 CH Cemen Adnirs Q CH Ccmen Computers LE CH Conen Corkrolers cueman Guests Ld cn cemen Users Zicn eEncemees Admire Gi ch aroup Policy Creator Ow Bichacuest SeneHebserscessreup Bicrekrbegt Bai creRAS and 145 Servers Bicheschama admins Bichas_rPcRT_seessa0 Dacha Teineecherts Figure 105 ADSI Edit CN Users Chi Administr ekar ON Users 0C nyp 0C nydoman C ChH Cert Publishers QV Users CC nypc DC mrdomamn Ch Crehidmre QV Users CC nypc DC mydomer DC Ch OreUpdateProxy C Users DC mypc DC nydame ChH Comein Admins OV Users DC nypc CC mrdomemn CH Ceomein Computers CN Users D Cmypc D Comy dor Ch Cemein Controllers CN Users D Como D Com y dor CN Oomen Guests CH se c DC m pe DC my demain CN Oomen Users CN Users D m pc Dm doman t CheEnterprize Admire T Users DC mypc DC emydom Ch Group Policy Creator Owners Ce Users Dc myze L CNeGuest Cie Users DC ennrgpe DC emn densin DC eco Wedcrbeg
156. ition to the new Dominion KX II D2CIMs most Paragon and Dominion KX I CIMs are supported The following table displays the supported target server operating systems CIMs virtual media and mouse modes Note D2CIM VUSB is not supported on Sun Solaris targets Supported CIMs Target Server es Dominion KX Paragon CIMs Patio ke ll 12 pemg D2CIMs Windows XP P2CIM PS2 Windows 2000 DCIM PS2 P2CIM AUSB Windows 2000 Server DCIM USB D2CIM VUSB Y v UKVMPD Windows 2003 Server DCIM USB G2 UUSBPD Windows Vista Red Hat Linux 9 0 P2CIM PS2 DCIM PS2 D2CIM VUSB P2CIM AUSB l DCIM USB excluding ped Red Hat Enterprise UKVMPD Hat Enterprise Workstation 3 0 and DCIM USB G2 Workstation 3 0 40 UUSBPD P2CIM PS2 SUSE Linux DCIM PS2 Professional 9 2 and P2CIM AUSB 10 DCIM USB D2CIM VUSB v UKVMPD DCIM USB G2 UUSBPD P2CIM PS2 DCIM PS2 P2CIM AUSB Fedora Cates DCIM USB D2CIM VUSB v and above UKVMPD DCIM USB G2 UUSBPD Raritan When you re ready to take control Chapter 2 Getting Started P2CIM AUSB DCIM USB Mac OS D2CIM VUSB UUSBPD DCIM USB G2 AII Solaris OSs P2CIM SUN PESO DCIM USB G2 P2CIM PS2 DCIM USB IBM AIX P2CIM AUSB DCIM USB G2 UUSBPD DCIM PS2 P2CIM PS2 DCIM USB HP UX P2CIM AUSB DCIM USB G2 UUSBPD DCIM PS2 Remote Power Strips D2CIM PWR Serial Devices P2CIM SER Legend Raritan e VM Virtual Media D2CIM VUSB
157. ity Maintenance Diagnostics Port Access Click on the individual port name to see allowable operations 0 of 4 Remote KVM channels currently in use 4 Port Number Port Name Status 3 Dominion KX2 Port3 down 4 Dominion KX2 Port4 down 6 Dominion KX2_Port6 Gown Enchant lh Be een ets cn alm MOD Peg iT Ame Figure 36 Open KVM Session 2 Connect to the target server from the Port Access page a Click the Port Name for the appropriate server b Select the Connect option from the Port Action Menu The target server opens in a Virtual KVM Client on page 64 window Raritan When you re ready to take control Chapter 7 Virtual Media Connecting to Virtual Media Raritan Local Drives This option mounts an entire drive the entire disk drive is mounted virtually onto the target server Use this option for hard drives and external drives only it does not include network drives CD ROM or DVD ROM drives This is the only option for which Read Write is available Note Target servers running certain version of the Windows operating system may not accept new mass storage connections after an NTFS formatted partition e g the local C drive has been redirected to them If this occurs close the Dominion KX II Remote Console and reconnect before redirecting another virtual media device If other users are connected to the same target server they must also close their conn
158. ject ID field Type a meaningful description in the Description field Click on the Syntax drop down arrow and select Case Insensitive String from the list Type 1 in the Minimum field 10 Type 24 in the Maximum field 11 Click OK to create the new attribute Adding Attributes to the Class 1 Raritan When you re ready to take control Click Classes in the left pane of the window 199 Adding Attributes to the Class 2 Scrollto the user class in the right pane and right click on it im Consolel Console Root Active Directory Schema Irci act4j2nzmzt mypc mydomain come X C Conscle Rack N Stabu E B Active Directory Schema Sha serviceConnectonPoint Structural i B3 servicelnstarce Structural BE cinpleSecurityObject Auxlizry mi site Structural Sig siteLink Structural Wi citeLinlBridge Structural 83 sitesContainer Structural Wi storage Structural B subnet Structural W3 cubnetContainer Structural Structural Abstract M rustadDomain Structural SS typelibrary Figure 102 Adding the Attributes 3 Select Properties from the menu The user Properties window appears 4 Click on the Attributes tab to open it Figure 103 Adding the Attributes to the Class 5 Click Add 6 Select rciusergroup from the Select Schema Object list 7 Click OK from the Select Schema Object dialog 96 lt Raritan When you re ready to take control Appendix B Updating the
159. l media The benefits of virtual media mounting of remote drives media on the target server to support software installation and diagnostics are now available in all of the Dominion KX II models Each Dominion KX II comes equipped with virtual media to enable remote management tasks using the widest variety of CD DVD USB internal and remote drives and images Unlike other solutions the Dominion KX II supports virtual media access of hard drives and remotely mounted images for added flexibility and productivity Virtual media sessions are secured using 128 bit AES or RC4 encryption The new D2CIM VUSB CIM computer interface module supports virtual media sessions to target servers supporting the USB 2 0 interface This new CIM also supports Absolute Mouse Synchronization as well as remote firmware update Product Photos aita tan na Mau Tem mr rn Figure 2 Dominion KX2 116 Raritan 5 When you re ready to take control Product Features Figure 3 Dominion KX2 432 JC ve amp Figure 4 Dominion KX II CIMs D2CIM VUSB left D2CIM PWR right Product Features Hardware e Integrated KVM over IP remote access e 1U or 2U KX2 464 rack mountable brackets included e Dual power supplies with failover auto switching power supply with power failure warning e 16 32 or 64 on KX2 464 server ports e Multiple user capacity 1 2 4 remote users 1 local user e UTP Cat5 5e 6 server cabling e Dual E
160. lect Hostname and Image from the drop down lists The file servers and image paths available are those that you configured using the File Server Setup page Only items you configured using the Dominion KX II File Server Setup page will be in the drop down list c FileServer Username Username required for access to the file server d FileServer Password Password required for access to the file server field is masked as you type e Click Connect The media will be mounted on the target server virtually You can access the media just like any other drive Disconnecting Virtual Media gt To disconnect the Virtual Media drives e For local drives select Virtual Media gt Disconnect Drive e For CD ROM DVD ROM and ISO images select Virtual Media gt Disconnect CD ROM ISO Image Note In addition to disconnecting the virtual media using the Disconnect option simply closing the KVM connection closes the Virtual Media as well lt Raritan ji When you re ready to take control File Server Setup File Server ISO Images Only 96 File Server Setup File Server ISO Images Only Note This feature is only required when using virtual media to access file server ISO images Use the Dominion KX II Remote Console File Server Setup page to designate the files server s and image paths that you want to access using Dominion KX II Virtual Media File server ISO image s specified here will become available for selection in
161. les 1 Type the starting IP Address in the Starting IP field 2 Type the ending IP Address in the Ending IP field 3 Select the Action from the available options Accept IP Addresses specifying accept are allowed access to the Dominion KX II device Drop IP Addresses specifying drop are denied access to the Dominion KX II device 4 Click Append The rule is added to the bottom of the rules list 5 Repeatsteps 1 through 4 for each rule you want to enter Toinsert a rule 1 TypeaRule A Rule is required when using the Insert command 2 Populate the Starting IP and Ending IP fields 3 Select the Action from the drop down list 4 Click Insert If the Rule you just typed equals an existing Rule the new rule is placed ahead of the exiting rule and all rules are moved down in the list 107 When you re ready to take control Add New User Group 108 To replace a rule Specify the Rule you want to replace Populate the Starting IP and Ending IP fields Select the Action from the drop down list E d AS EX Wf Click Replace Your new rule replaces the original rule with the same Rule To delete a rule gt 1 Specify the Rule you want to delete 2 Click Delete 3 You are prompted to confirm the deletion Click OK Important ACL rules are evaluated in the order in which they are listed For instance in the example shown here if the two ACL rules were reversed Dominion w
162. ly with the VESA video mode timing resulting in the proper video display on the Dominion KX II lt Raritan 209 When you re ready to take control CIMs CIMs Virtual Media 210 Windows 3 Button Mouse on Linux Targets When using a 3 button mouse on a Windows client connecting to a Linux target the left mouse button may get mapped to the center button of the Windows client 3 button mouse Dell OpTiplex and Dimension Computers From certain Dell Optiplex and Dimension computers it may not be possible to boot a target server from a redirected drive ISO image or to access the target server BIOS when a virtual media session is active unless the Use Full Speed for Virtual Media CIM option is enabled from the Port page Virtual Media not Refreshed after Files Added After a virtual media drive has been mounted if you add a file s to that drive those files may not be immediately visible on the target server Disconnect and then reconnect the virtual media connection Target BIOS Boot Time with Virtual Media The BIOS for certain targets may take longer to boot if media is mounted virtually at the target gt To shorten the boot time 1 Close the Virtual KVM Client to completely release the virtual media drives 2 Restart the target Raritan When you re ready to take control Appendix C Informational Notes CC SG Virtual KVM Client Version not Known from CC SG Proxy Mode When
163. mation about the upgrade and version numbers is displayed for your confirmation if you opted to review CIM information that information is displayed as well Port Access Virtual Media User Management Device Settings Security AMERRE Diagnostics Home Maintenance gt Fismeware Upgrade Logo Firmware Upgrade Current ver sionc 20055541 Hew version 20055554 waraie cancer This may take tome minutes Plate do NOT power off the device while the update it in progress After a successful update the device wil be reset otomaticaly 4 Port Name Current CIM Version Upgrade CIM Version at diet nents amen a aa an FE Imt Figure 76 Firmware Upgrade Review Note At this point connected users are logged out and new login attempts are blocked 7 Click Upgrade Please wait for the upgrade to complete Status information and progress bars are displayed during the upgrade Upon completion of the upgrade the unit reboots 1 beep sounds to signal the reboot Firmware Upgrade in Progress Upgrade successful The Device DominionKX has been updated with new firmware version 2 0 0 2 52 40 Device will reboot now and this will take approximately 5 minutes Please close the browser for approximately 5 minutes before logging in again Progress Upgrade Finished Figure 77 Firmware Upgrade Successful 8 As prompted close the browser and wait approximately 5 minutes before logg
164. minion KX II unit and all attached CIMs This page is available in the Dominion KX II Remote Console only Important Do not turn off your Dominion KX II unit or disconnect CIMs while the upgrade is in progress doing so will likely result in damage to the unit or CIMs gt To upgrade your Dominion KX II unit 1 Locate the appropriate Raritan firmware distribution file RFP found on the Raritan Firmware Upgrades Web page http www raritan com support firmwareupgrades and download the file 2 Unzip the file Please read all instructions included in the firmware ZIP files carefully before upgrading Note Copy the firmware update file to a local PC before uploading Do not load the file from a network drive 3 Select Maintenance Firmware Upgrade The Firmware Upgrade page opens Port Access Virtual Media User Management Device Settings Security T Home gt Maintenance gt Firmware Upgrade Firmware Upgrade Firmware File Browse Review CIM Version Information IA nete r S Aho ee S afe os meme sos tes Figure 75 Firmware Upgrade 4 Clickthe Browse button to navigate to the directory where you unzipped the upgrade file 5 Check the Review CIM Version Information checkbox if you would like information displayed about the versions of the CIMs in use 163 When you re ready to take control Firmware Upgrade 164 6 Click Upload from the Firmware Upgrade page Infor
165. n refer to Reset Button on page 177 Select one of the following options Enable Local Factory Reset Default Returns the Dominion KX II unit to the factory defaults Enable Local Admin Password Reset Resets the local administrator password only The password is reset to raritan Disable All Local Resets No reset action is taken Checking Your Browser for AES Encryption If you do not know if your browser uses AES check with the browser manufacturer or navigate to the following web site using the browser with the encryption method you want to check https www fortify net sslcheck html This web site detects your browser s encryption method and displays a report IP Access Control Using IP Access Control you can control access to your Dominion KX II unit By setting a global Access Control List ACL you are by ensuring that your device does not respond to packets being sent from disallowed IP addresses The IP Access Control is global affecting the KX unit as a whole but you can also control access to your unit at the group level Refer to group based IP Access Control see Group based IP ACL Access Control List on page 106 for more information about group level control Important IP Address 127 0 0 1 is used by the Dominion KX II local port When creating an IP Access Control list if 127 0 0 1 is within the range of IP Addresses that are blocked you will not have access to the Dominion KX II local port
166. name Dominion KX2 Port16 and serisi number GNFFFF0042 connected to port 16 0255 2007 08 35 26 OM Update Completed CM update completed 0215 2007 06 3324 OM Disconnected CM wth name Dominion KX2 Pott and serial number GNFFFFOO42 disconnected trom port 16 02 5 2007 06 3323 CM Update Started CM update started 02500007 082525 Access Login User admir trom host 192 168 59 3 logged in 023 2007 18 2809 OM Connected COM with name Dominion KX2 Port16 and serial number ONFFFF0042 connected to port 16 023 2007 18 2809 Power Supply Status Changed Power supply outlet 1 status On 0213 2007 1828 08 OM Disconnected CM wih name Dominsion KX2 Portit and serisi number GNFFFF0042 disconnected trom port 16 023 2007 18 26 08 System Startup Device started 023 2007 18 28 08 OM Connected OM with name Dominion KX2 Portit and serial number GNFFFFO042 connected to port 16 02 13 2007 17 4734 Access Logout User admir trom host 192 168 53 3 logged out 02 13 2007 17 47 34 Port Disconnected Port Dominion KX2 Port1 disconnected by user admin 023 2007 1745 37 Session Teens Session of user admin trom host 192 168 59 3 timed out 02 13 2007 17 1250 Port Connected Port Dominion KX2 Porti connected by user admin 023 2007 17 1231 Access Login User admin trom host 192 168 59 Y logged in MENTEM LL L SL Lu BOAO can nn P aati S Figure 71 Audit Log Raritan 157 When you re ready to take control Audit Log T
167. ning Message eee 152 a ccEao n T ti osas 154 Audit Ets c H 157 Device Information e n 159 B ckup Restore Me M 160 CIM Upgrade from KX Flash aiccccscisscccsssesessesinesnetsansensoctaessuttuasotssavestaesuacsaasenaicesseseseane 162 Firmware U pera TT M 163 Firmware Uperade Review ic diocesi nonnisi n ERR E rta HERD Mile eden 164 Farmiwate Uperade Successful ursinii 164 Upgrade reor P Y 165 in 166 Raritan When you re ready to take control Table of Figures Figure 80 Reboot ContitmabloTis eo ierra e d ppion id dr ORE NE EPOAA EUR D YER EROR COR Eno 166 Figure 81 Network Iter aCe e M 168 Figure 82 Network Statistics Statistics socer ert ER Pr IPs Ke D VERRE RUE EE USERS MEER LESE 169 Figure 83 Network Statistics Immterfaces uus risistiieeskit enu k ic pF isa ha rrEX BEER ADI LE cL V UUR EUM KE 170 Figure 84 Network Statistics route scssissccsscecsacssovessstseesaies sevececssvacsenssactaucasenveesantecesossetanstebeceess 170 Fig re cd PINg ENS TC isa 171 Figure 86 Trace Route to Host icssiccicietesossessnsasetiasssissessaseuteasessueessssvndionssunesseesvadeiasesasessesvadtaseraseonss 172 Fig re 87 Dia rir c T
168. o I access servers Dominion KX II offers a dedicated modem port for attaching an connected to Dominion external modem With an externally connected modem servers can still KX IL if the network ever be remotely accessed in the event of a network emergency becomes unavailable Furthermore Dominion KX I s local ports always allow access to servers from the rack regardless of the network condition Do you have a non Yes Both the Virtual KVM Client and the Multi Platform Client MPC Windows client allow non Windows users to connect to target servers through the Dominion KX I and KX II switches MPC can be run via Web browsers and standalone Please refer to the Virtual KVM Client on page 64 and the MPC RRC User Guide for more information 216 lt Raritan When you re ready to take control Appendix D FAQs Question Answer My modem connection dropped and I got the error message There was an unexpected communications error connection terminated What should I do This might have happened based on the frequency with which the user tried to connect via modem Reboot the KX unit and modem and for future connections wait at least two 2 minutes between attempts Sometimes during a Virtual KVM Client session the Alt key appears to get stuck What should I do This usually occurs in situations when the Alt key is held and not released For instance continuing to press the Alt key while pr
169. o Interface Network interface Reng Link state ethl amp utonegotiation on 100 Mbps full duplex link ok 1 ethO BPOADCAST MULTICAST mtu 1500 qdisc noop qien 1000 link ether 00 00 00 00 00 00 brd ff ff f f1 1f 1f1 ff 2 1o lt LOOPBACK UP gt mtu 16426 qdisc noqueue link ioopback 00 00 00 00 00 00 bra 00 00 00 00 00 00 inet 127 0 0 1 8 scope host lo 3 ethl BROADCAST MULTICAST NOTRAILZEPS UP mtu 1500 qdisc pfifo fast qien 1000 lank ether 00 04 4 01 33 c1 brad ff ft ff ft ff ff inet 192 168 59 97 24 br 192 168 59 255 scope global ethi a ee re ee Pss n Rma ah a Figure 81 Network Interface The following information is displayed e Whether the Ethernet interface is up or down e Whether the gateway is ping able or not e The LAN port that is currently active gt Torefresh this information Click the Refresh button ies zie Raritan When you re ready to take control Chapter 12 Diagnostics Network Statistics Page The Dominion KX II provides statistics about your network interface Toview statistics about your network nterface Select Diagnostics gt Network Statistics The Network Statistics page opens 2 Select the appropriate option from the Options drop down list Statistics Produces a page similar to the one displayed here Port Access Virtual Media User Management Device Settings Security F Home gt Diagnostics gt Nebmot Statistics Network
170. o authenticate users attempting to access your Dominion KX II unit Refer to User Management for more information about adding and editing users Groups Every Dominion KX II unit is delivered with three default user groups these groups cannot be deleted Admin Users that are a member of this group have full administrative privileges The original factory default user is a member of this group and has the complete set of system privileges Unknown This is the default group for users who are authenticated externally using LDAP or RADIUS If the external LDAP or RADIUS server does not identify a valid user group the Unknown group is used zie Raritan When you re ready to take control Raritan Chapter 3 Installation and Configuration Individual An individual group is essentially a group of one Group That is the specific user is in its own group not affiliated with other real groups Individual groups can be identified by the e in the Group Name The individual group allows a user account to have the same rights as a group In addition to the system supplied default groups you can create groups and specify the appropriate permissions to suit your needs Refer to User Management for more information about creating and editing user groups Relationship between Users and Groups Users belong to a group and groups have privileges Organizing the various users of your Dominion K
171. oa dH e PkE Mae Lo obo toi RC heeded ot Ce UL daba AT Ra D 122 Network Settings Network Basic Settings eee 123 Network Settings Network Miscellaneous Settings eee 124 Network Settings LAN Interface Settings eene 125 Date Time Defbitigi csi padrone iade iin Ev QW RH MER HR Qd Hi n REO EET HEY CU E 128 Event Management Settings oae petes re E rH Ra D FRU D ed DERE iane isossa 130 Syslog C nfIEDESDIOD o iin ii aspe Ho ae b UH ERR Fo d Bet aL Fr ue hn 131 Event Management Destinations eres ee esee eese ee estate aeneus eaten tatu sentes tasa anoo 132 Power Supply Setups iusserat enit etra bad dna bee xtd uud ke HH UN eV aid eta k eden aa sari Gag GER a 136 Port Configuration TT aee osoena Eo ES aE oa Eei 138 Power Strip Connections 140 Port P ge Power Strips caveats trisatissiaunss senescent ntsauasioia acs tekaciasieneaditadasiaeadn FE De HO 141 Port Page KVM pnts P 143 Port Page Target Server Settings for D2CIM VUSB eere 145 Security Sets apod diluit E eee icopI iriure det DN MIO 147 Security Settings Strong Passwords eere eee esee eese tees enses tests enses toana 149 Security Settings User Blocking oet invehi en RE Ire Rei e FUR 151 Security Settings Encryption amp Share 2esarse ick eb rer R HEAR Ie is ERE EE 151 Security Settings Encryption Mode War
172. ole File Server Setup Backup Restore Firmware Upgrade KX Diagnostics Manage Favorites Favorites List Discover Devices Local Subnet 4 4 AL SAT ALA Discover Devices KX Subnet BN Add New Device to Favorites Help User Guide Local Port Settings Factory Reset lt Raritan When you re ready to take control Chapter 4 Connecting to the Dominion KX II Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently The Favorite Devices section is located in the lower left side sidebar of the Port Access page and provides the ability to e Create and manage a list of favorite devices e Quickly access frequently used devices e List your Favorites either by name or IP Address e Discover Dominion KX II devices on its subnet before and after login e Retrieve discovered Dominion KX II devices from the connected KX device after login Note This feature is available only on the Dominion KX II Remote Console not the Dominion KX II Local Console Pott Access Virtus Media User Management Device Settings Security Maintenance Diagnostics Home gt Pon Roses Logout Port Access Click on the Individual port nante to see aliowabie operations 0 of 4 Remote KVM channels are currently in use 4 Port Humber Port Name Status Arada batty
173. ominion KX II Console Menu Tree on page 47 for additional information Available Resolutions The KX II Local Console provides the following resolutions to support various monitors e 800x600 e 1024x768 e 1280x1024 Each of these resolutions supports a refresh rate of 60Hz and 75Hz Raritan iz When you re ready to take control Accessing Target Servers Accessing Target Servers Server Display After you login to the KX II Local Console the Port Access page opens This page lists all of the Dominion KX II ports the connected target servers and their status and availability Raritan Dominion KX I1 274 Port Access Click on the individual port name to see allowable operations 1 of 4 Remote KVM channels currently in use j 2007 Raman Computer Figure 93 Local Console Port Access The target servers are initially sorted by Port Number you can change the display to sort on any of the columns e Port Number Numbered from 1 to the total number of ports available for the Dominion KX II unit Please note that ports connected to power strips will not be among those listed resulting in gaps in the Port Number sequence Port Name The name of the Dominion KX II port initially set to Dominion KX2 Port but you can change the name to something more descriptive When you click on the Port Name link an Action Menu is opened Refer to the Port Action Menu on page 60 for more in
174. onnected server does that change propagate to the local port OSD as well Yes If the name of a server is changed remotely or via Raritan s optional CommandCenter Secure Gateway management appliance this update immediately affects Dominion KX II s on screen display Sometimes I see shadows on the local port user interface Why does that occur This shadow ghosting effect may occur with LCD monitors that have been on for long periods The LCD properties and the electrical static charge can produce these effects when the screen is on for a long time lt Raritan When you re ready to take control 227 Power Control Power Control Question Answer Does Dominion KX II have a dual power option All Dominion KX II models come equipped with dual AC inputs and power supplies with automatic fail over Should one of the power inputs or power supplies fail then the KX II will automatically switch to the other Does the power supply used by Dominion KX II automatically detect voltage settings Yes Dominion KX II s power supply can be used in AC voltage ranges from 100 240 volts at 50 60 Hz If a power supply or input fails will I be notified The KX II front panel LED will notify the user of a power failure An entry will also be sent to the Audit Log and displayed on the KX II Remote Client User Interface If configured by the administrator then SNMP or Syslog events will be generate
175. ons for Sun machines are Display Vertical Refresh Rate Aspect Resolution Ratio 1600 x 1200 75 Hz 4 3 1280 x 1024 60 75 85 Hz 5 4 1152 x 864 75 Hz 4 3 1024 x 768 60 70 75 85 Hz 4 3 800 x 600 56 60 72 75 85 Hz 4 3 720 x 400 85 Hz 9 5 640 x 480 60 72 75 85 Hz 4 3 3 Target servers running the Solaris operating system must output VGA video H and V sync not composite sync gt To change your Sun video card output from composite sync to the non default VGA output 1 Issue the Stop A command to drop to bootprom mode 2 Issue the following command to change the output resolution setenv output device screen r1024x768x70 3 Issue the boot command to reboot the server Sa lt Raritan When you re ready to take control Chapter 3 Installation and Configuration You can also contact your Raritan representative to purchase a video output adapter If you Have Use this Video Output Adapter Sun 13W3 with composite sync APSSUN II Guardian converter output Sun HD15 with composite sync 1396C converter to convert from HD15 to 13W3 and an output APSSUN II Guardian converter to support composite sync Sun HD15 with separate sync output APKMSUN Guardian converter Note Some of the standard Sun background screens may not center precisely on certain Sun servers with dark borders Use another background or place a light colored icon in the upper left hand corner Mouse Settings gt To configure the mouse settin
176. option is visible only when one or more Virtual KVM Clients are opened Note This menu item is not available on the KX II Local Console Disconnect Disconnects this port and closes the Virtual KVM Client window for this target server This menu item is available only when the port status is up and connected or up and busy Note This menu item is not available on the KX II Local Console the only way to disconnect from the switched target in the Local Console is to use the hotkey see Hotkeys on page 181 Power On Powers on the target server through the associated outlet This option is visible only when there is one or more power associations to this target when the target is off port status is down and when user has permission to operate this service Power Off Powers off the target server through the associated outlets This option is visible only when there is one or more power associations to this target when the target power is on port status is up and when user has permission to operate this service zie Raritan When you re ready to take control Chapter 5 Accessing Target Servers Power Cycle Power cycles the target server through the associated outlets This option is visible only when there is a power association one or more to this target and when the user has permission to operate this service 2 Select the desired menu option for that port to execute it Switching between Target Serv
177. ore CIM Firmware Upgrade Firmware Upgrade Factory Reset Dominion KX II Local Console only Upgrade Report and Reboot Maintenance Features Local Remote Console Use To Local Remote Audit Log View Dominion Dominion KX II di Y events sorted by date and time Device Information View information about the Y Y Dominion Dominion KX II and its CIMs Backup Restore Backup and restore the Dominion v KX II configuration CIM Firmware Upgrade your CIMs using the v y Upgrade firmware versions stored in the Dominion Dominion KX II memory Firmware Upgrade Upgrade your Dominion v Dominion KX II firmware Factory Reset Perform a factory reset Y lt Raritan 156 When you re ready to take control Chapter 11 Maintenance Local Remote Upgrade Report View information about the latest Y d upgrade performed Reboot Reboot the Dominion Dominion v 4 KX Il unit Audit Log A logis created of Dominion KX II system events gt To view the audit log for your Dominion KX II unit Select Maintenance gt Audit Log The Audit Log page opens Port Access Virtus Media User Management Device Settings Security Maintenance Diagnostics Home gt Maintenance gt Aud Log Legout Audit Log Newer 0e Description 025 2007 08 4020 System Shutdown Device reset performed by user admin trom host 192 168 59 9 025 2007 08 35 27 CM Connected CM with
178. ort Configuration 1 Dominion KX2 Portt Not Avalabie 2 Dominion KX2_Port2 Not Avaiable 3 Dorninion KX2 Port3 Not Available 4 Dominion KX2_Port4 Not Available 5 AtestPc DOM 6 Donminion KX2 Porte Not Available 7 Domirion KX2 Port Not Avasable 8 Dorminion KX2 Porta Not Avisisisie 9 Local Port VM 10 Dorminicn KX2 Portt Not Available 11 Dortinicn KX2 Portti Not Avaliable 12 Dominicn KX2 Port 2 Not Available al 13 Dominion KX2_Portt 3 Not Avaliable IE 14 Dorinion KX2 Portt4 Not Avadable 15 Dorminicn KX2 Port Not Available i 16 PowerStrip PowerStrip x Cere i n Cono der vand a INN NNNM LL ET MUT PES Figure 60 Port Configuration This page is initially displayed in port number order but can be sorted on any of the fields by clicking on the column heading Port Number Numbered from 1 to the total number of ports available for the Dominion KX II unit Port Name The name assigned to the port A port name displayed in black indicates that you cannot change the name and that the port cannot be edited port names displayed in blue can be edited Raritan When you re ready to take control Chapter 9 Device Management Note Do not use apostrophes for the Port CIM Name Port Type The type of CIM connected to the port Port Type Description DCIM Dominion CIM Not Available No CIM connected PCIM Paragon CIM PowerStrip Power CIM VM Virtual Media CIM D2CIM VUSB 2 Click the Port Name for the p
179. ort you want to edit lt Raritan When you re ready to take control For KVM ports the Port page see Associate Target Servers to Outlets Port Page on page 143 is opened From this page you can name the ports and create power associations For power strips the Port page for power strips see Name the Power Strip Port Page for Power Strips on page 141 is opened From this page you can name the power strips and their outlets name the power strips and their outlets 139 Power Control Power Control Connect the Power Strip The numbers in this diagram correspond to the steps listed below Figure 61 Power Strip Connections gt Toconnect the power strip 1 Connect the male RJ 45 of the D2CIM PWR to the female RJ 45 connector on the power strip 2 Connect the female RJ 45 connector of the D2CIM PWR to any of the available female system port connectors on the Dominion KX II using a straight through Cat 5 cable 3 Attach an AC power cord to the target server and an available power strip outlet 4 Connect the power strip to an AC power source 5 Power ON the Dominion KX II unit 140 Raritan When you re ready to take control Raritan Chapter 9 Device Management Name the Power Strip Port Page for Power Strips This Port page opens when you select a port from the Port Configuration see Port Configuration Page on page 138 page that is connected to a Raritan remote po
180. ory server becomes unavailable Dominion KX II s own authentication will be activated and fully functional Do I need to install a Web server such as Microsoft Internet Information Services IIS in order to use Dominion KX II s Web browser capability No Dominion KX II is a completely self sufficient appliance After assigning an IP address to Dominion KX II it s ready to use with Web browser and authentication capabilities completely built in What software do I have to install in order to access Dominion KX II from a particular workstation None Dominion KX II can be accessed completely via a Web browser although an optional installed client is provided on Raritan s Web site Raritan com for the purpose of accessing Dominion KX II via modem A Java based client is now available for non Windows users What should I do to prepare a server for connection to Dominion KX II Simply set the mouse parameters in order to provide users with the best mouse synchronization during remote connections as well as turning off the power management features that effect screen display However if the new D2CIM VUSB adapter is used supporting Absolute Mouse Synchronization then manually setting the mouse parameters isn t necessary 222 lt Raritan When you re ready to take control Appendix D FAQs Question Answer What comes in the The following is included a Dominion KX II unit b Quick
181. oth the Dominion KX II and Ports down LAN Switch to Autodetect recommended or set 14 Ports idle both to a fixed speediduplex such as 100Mbps Full t Current LAN interface parameters Primary ONS server IP address LAN Interface Speed amp Duplex Connected Users admi Autodetect nid zl 19 Secondary ONS server IP address g Enabte Automatic Faitove Ping interval seconds Timeout seconds Set System ACL Ok Reset todetauits Cances Figure 90 Dominion KX II Local Console Raritan 176 When you re ready to take control Raritan Chapter 13 KX II Local Console Physical Connections The physical connections for the local ports can be found on the back panel of the Dominion KX II Figure 91 Local User Panel on Dominion KX II Monitor Attach a standard multi sync VGA monitor to the HD15 female video port Keyboard Attach either a standard PS 2 keyboard to the Mini DIN6 female keyboard port or a standard USB keyboard to one of the USB Type A female ports Mouse Attach either a standard PS 2 mouse to the Mini DIN6 female mouse port or a standard USB mouse to one of the USB Type A female ports Reset Button At the back of the Dominion KX II unit there is a Reset button It is recessed to prevent accidental presses you will need a pointed object to use this button Reset Button Figure 92 Reset Button back of unit 177 When you re ready to
182. ough all available resolutions that remain enabled in the XF86Config file gt Toconfigure target servers running Linux command line 1 Set the mouse acceleration to exactly 1 and set the threshold to exactly 1 Enter this command xset mouse 1 1 This should be set for execution upon login 2 Ensure that each target server running Linux is using a resolution supported by Dominion KX II at a standard VESA resolution and refresh rate 3 Each Linux target server should also be set so the blanking times are within 40 of VESA standard values 20 Go to the Xfree86 Configuration file XF86Config Using a text editor disable all non Dominion KX II supported resolutions Disable the virtual desktop feature not supported by Dominion KX II Check blanking times 40 of VESA standard Restart computer zie Raritan When you re ready to take control Chapter 3 Installation and Configuration Note If you change video resolution you must logout of the target seroer and log back in for the video settings to take effect Note for Red Hat 9 Target Servers If you are running Red Hat 9 on the target server using a USB CIM and are experiencing problems with the keyboard and or mouse there is an additional configuration setting you can try Tip You might have to perform these steps even after a fresh OS installation 1 To conf gure Red Hat 9 servers us ng USB CIMs Locate the configuration file us
183. ould accept no communication at all IP ACI Rute Starting IP Ending IP Action 1 192 168 50 1 192 169 55 255 ACCEPT 0000 255 255 255 255 DROP Case nnn mos mae Figure 45 IP ACL Example Tip The rule numbers allow you to have more control over the order in which the rules are created Raritan When you re ready to take control Chapter 8 User Management Modify Existing User Group Note All permissions are enabled and cannot be changed for the Admin group To modify an existing user group 1 From the Group page change the appropriate fields and set the appropriate permissions Port Access Virtual Medea User Management Device Settings Security Maintenance Diagnostica Home User Management gt Group Logout 2 E anana 3 s Port Access VM Access Power Control Dom nion KX2 Port None Deny z Dew Dom nion KX Port None Deny z oeny x Dominion kx2 Pero None x EINE pw z Dom nion KX Port4 ue gt Deny X Deny l Dominion Kx2 Pons None EE wo xl Dom nion KX Port None v Dery Dew Dom nion KX Port None v Deny z Derr Dominion KX2_Portt None z Derry x Derr x Dom nion KX Port None x Deny j oer Dom nion KX Portt None Deny Dery Dom nion KX Portit None Deny Derr x Dom nion KX2 Porti None v Derry Dew w Dom nion KX2 Portt3 None X Deny gt Deny x Dom nion KX2 Portis mone z
184. out Confirmation Dialog option of On This option prompts you to save your current session when you logout Apple Macintosh Settings For target servers running an Apple Macintosh operating system the preferred method is to use the D2CIM VUSB and Absolute Mouse Synchronization Note Enable the Absolute mouse scaling for MAC server option in the Port see Note for D2CIM VUSB CIM Usage on page 145 page Step 2 Optional Configure Keyboard Language zs Raritan Note This step is not required if you are using the US International language keyboard If you are using a non US language the keyboard has to be configured for the appropriate language In addition the keyboard language for the client machine and the target servers has to match Please consult the documentation for your operating system for additional information about changing the keyboard layout 27 When you re ready to take control Step 3 Configure Network Firewall Settings Change the Keyboard Layout Code Sun Targets Use this procedure if you are using a DCIM SUSB and would like the keyboard layout changed to another language gt To change the keyboard layout code DCIM SUSB only 1 Open a Text Editor window on the Sun workstation 2 Check that the NUM LOCK key is active and press the left CTRL key and the DEL key on your keyboard The Caps Lock LED starts to blink indicating that the CIM is in Layout Code Change mode The text windo
185. owerln2 Auto Detect option 4 Click OK Raritan When you re ready to take control Chapter 9 Device Management Note If either of these checkboxes is checked and power input is not actually connected the power LED at the front of the unit displays red gt To turn off the automatic detection Clear the checkbox for the appropriate power supply gt Toreset to factory defaults Click the Reset To Defaults button gt Tocancel without saving changes Click the Cancel button Note Dominion KX II does NOT report power supply status to CommandCenter Dominion I generation 1 however does report power supply status to CommandCenter Raritan When you re ready to take control 1 3 7 Port Configuration Page Port Configuration Page 138 The Port Configuration page displays a list of the Dominion KX II ports Ports connected to target servers or power strips are displayed in blue and can be edited For ports with no CIM connected or with a blank CIM name a default port name of Dominion KX2 Port is assigned where Port is the number of the Dominion KX II physical port gt To change a port configuration 1 Select Device Settings Port Configuration The Port Configuration Page opens Port Access Virtual Media User Management Device Settings Security Maintenance Diagnostics Home gt Device Settings gt Port Configuration P
186. p 5 Dominion KX II Initial Configuration 2 Specify a meaningful Device Name for your Dominion KX II unit up to 16 alphanumeric characters special characters see Valid Special Characters on page 32 and no spaces 3 Select the IP auto configuration from the drop down list None Static IP This option requires that you manually specify the network parameters This is the recommended option because the Dominion KX II is an infrastructure device and its IP Address should not change DHCP With this option network parameters are assigned by the DHCP server 4 If you specify an IP configuration of None type the TCP IP parameters for your Dominion KX II unit IP address Subnet mask Gateway IP address Primary DNS server IP address and optional Secondary DNS server IP address 5 When finished click OK Your Dominion KX II unit is now network accessible Note In some environments the LAN Interface Speed amp Duplex setting default of Autodetect auto negotiation does not properly set the network parameters resulting in network issues In these instances setting the Dominion KX II LAN Interface Speed amp Duplex field to 100 Mbps Full Duplex or whatever option is appropriate to your network addresses the issue Refer to the Network Settings on page 122 page for more information Naming Target Servers Toname the target servers 1 Connect all of the target servers if you have not already done so as
187. page 153 for more information e Apply Encryption Mode to KVM and Virtual Media When checked this option applies the selected encryption mode to both KVM and virtual media After authentication KVM and virtual media data is also transferred with 128 bit encryption e PC Share Mode Determines global concurrent remote KVM access enabling up to eight remote users to simultaneously log on to one Dominion KX II and concurrently view and control the same target server through the device Click on the drop down list to select one of the following options Private No PC share this is the default mode Each target server can be accessed exclusively by only one user at a time Raritan When you re ready to take control Chapter 10 Security Settings PC Share Target servers can be accessed by up to eight users administrator or non administrator at one time Each remote user has equal keyboard and mouse control however please note that uneven control will occur if one user does not stop typing or moving the mouse e VM Share Mode This option is enabled only when PC Share Mode is enabled When checked this option permits the sharing of virtual media among multiple users that is several users can access the same virtual media session The default is disabled e Local Device Reset Mode This option specifies which actions are taken when the hardware reset button at the back of the unit is depressed For more informatio
188. peed duplex such as 100Mbps Full Current LAN interface parameter s autonegobation on 100 Mbps full duplex link ok LAN Interface Speed amp Duplex 10 MbpsHalf Enable Automatic Failover Ping Interval seconds Timeout seconds Set System ACL Figure 54 Network Settings LAN Interface Settings The current parameter settings are identified in the Current LAN interface parameters field LAN Interface Speed amp Duplex Select from among the speed and duplex combinations available Autodetect Default option 10 Mbps Half 10 Mbps Full 100 Mbps Half 125 When you re ready to take control Network Settings 100 Mbps Full 1000 Mbps Full Gigabit Half duplex provides for communication in both directions but only one direction at a time not simultaneously Full duplex allows communication in both directions simultaneously Note Occasionally there are problems running at 10 Mbps in either half or full duplex If you are experiencing problems please try another speed and duplex Please refer to Network Speed Settings on page 195 for more information e Enable Automatic Failover Check this checkbox to allow Dominion KX II to automatically recover its network connection using a second network port if the active network port fails When this option is enabled the following two fields are used Ping Interval seconds Ping interval determines how often Dominion KX II check
189. ption Mode Select one of the options from the drop down list When an encryption mode is selected a warning is displayed that if your browser does not support the selected mode you will not be able to connected to the Dominion KX II Encryption amp Share When the Encryption Mode is specified please ensure that your browser supports this encryption mode otherwise you will not be able to correct to the Dominion KX iL Encryption Mode GE V Apply Encryption Mode to KVM and Virtual Media PC Share Mode Private z VM Share Mode Local Device Reset Mode Enable Local Factory Reset Figure 69 Security Settings Encryption Mode Warning Message Auto This is the recommended option the Dominion KX II auto negotiates to the highest level of encryption possible RC4 Secures user names passwords and KVM data including video transmissions using the RSA RC4 encryption method This is a 128 bit Secure Sockets Layer SSL protocol which provides a private communications channel between the Dominion KX II unit and the Remote PC during initial connection authentication AES 128 The Advanced Encryption Standard AES is a National Institute of Standards and Technology specification for the encryption of electronic data 128 is the key length When AES 128 is specified please be certain that your browser supports it otherwise you will not be able to connect Please refer to Checking Your Browser for AES Encryption on
190. ption calibrates the video to enhance the colors being displayed In addition you can manually adjust the settings using the Video Settings option Refresh Screen The Refresh Screen option forces a refresh of the video screen The entire video screen is redrawn Refresh Screen button gt To refresh the video settings e Select Video gt Refresh Screen or e Click the Refresh Screen button from toolbar Auto sense Video Settings The Auto sense Video Settings option forces a re sensing of the video settings resolution refresh rate and redraws the video screen Auto Sense Video Settings button gt To automatically detect the video settings e Select Video gt Auto sense Video Settings or e Click the Auto Sense Video Settings button from toolbar A message is displayed that auto adjustment is in progress 77 When you re ready to take control Video Menu 78 Calibrate Color Use the Calibrate Color command to optimize the color levels hue brightness saturation of the transmitted video images The Dominion KX II color settings are on a target server basis C Calibrate Color Adjusts color settings to optimize the video display Note The Calibrate Color option applies to the current connection only gt To calibrate the color 1 Opena remote KVM connection to any target server running a graphical user interface 2 Select Video Calibrate Color or click the Cali
191. requires the use of UDP Port 123 the standard for SNTP but can also be configured to use any port of your designation LDAP on Configurable Ports 389 and 636 optional If Dominion KX Il is configured to remotely authenticate user logins via the LDAP protocol ports 389 and 636 will be used but the system can also be configured to use any port of your designation RADIUS on Configurable Port 1812 optional If Dominion KX II is configured to remotely authenticate user logins via the RADIUS protocol either port 1812 or 1813 will be used but the system can also be configured to use any port of your designation RADIUS Accounting on Configurable Port 1813 If Dominion KX II is configured to remotely authenticate user logins via the RADIUS protocol and also employs RADIUS accounting for event logging port 1813 or an additional port of your designation will be used to transfer log notifications SYSLOG on Configurable UDP Port 514 If Dominion KX II is configured to send messages to a Syslog server then the indicated port s will be used for communication uses UDP Port 514 Raritan When you re ready to take control Appendix A Specifications e SNMP Default UDP Ports optional Port 161 is used for inbound outbound read write SNMP access and port 162 is used for outbound traffic for SNMP traps e UDP Port 21 Port 21 is used for the Dominion KX II command line interface when you are working with Raritan Technical
192. rfaces and their use for target server access and administration locally and remotely Local Remote Access Admi Access Admi User Interface n n KX II Local Console v v KX II Remote Console ud d Virtual KVM Client Multi Platform Client d Y MPC 40 When you re ready to take control Chapter 4 Connecting to the Dominion KX II KX II Local Console KX II Devices Raritan When you are located at the server rack Dominion KX II provides standard KVM switching and administration via the KX II Local Console The KX II Local Console provides a direct KVM analog connection to your connected servers the performance is exactly as if you were directly connected to the server s keyboard mouse and video ports There are many similarities among the KX II Local Console and the KX II Remote Console graphical user interfaces and where there are differences they are noted in the user manual The KX II Local Console and the KX II Remote Console user interfaces are almost identical the following options are available in the KX II Local Console but not the KX II Remote Console e Local Port Settings see Local Port Settings KX II Local Console Only on page 182 e Factory Reset see Factory Reset KX II Local Console Only on page 185 41 When you re ready to take control Dominion KX Il Remote Console Dominion KX II Devices Dominion KX Il Remote Console Dominion KX Il Devices
193. rnet and IP networking servers installation local port power control scalability Computer Interface Modules CIMs security manageability miscellaneous and troubleshooting Related Documentation For more information about the Raritan Multi Platform Client MPC refer to the Raritan Multi Platform Client MPC and Raritan Remote Client RRC User Guide For more information about the entire Raritan product line refer to the Raritan User Manuals amp Quick Setup Guides CD ROM or Raritan s Web site http www raritan com support productdocumentation Raritan B When you re ready to take control Chapter2 Getting Started In This Chapter EJEA ai oiae ATOM 0 0 csacscs 10 Default IP AdditeS8 c ae ed terere tae rides teen eo 10 Supported Operating Systems Clients sese 10 Supported BLOWSELS rete ise te eti en 11 Supported Operating Systems and CIMs Target Servers 12 D2CIM USB G2 Note tari b prr a He rp ea repere des 13 Login Information e The default Dominion KX II login user name is admin and the default password is raritan This user has administrative privileges e Passwords are case sensitive and must be entered in the exact case combination in which they were created For example the default password raritan must be entered entirely in lowercase letters e The first time you start the Dominion KX II you are required to change the default pas
194. roduction 1 IP Access Control e 109 111 132 159 J Java Runtime Environment JRE 46 217 K Keyboard Language Preference Fedora Linux Clients 217 Keyboard Macros 77 Keyboard Menu 77 KVM Properties e 202 KX Diagnostics 44 180 KX II Local Console 183 184 KX II Devices 43 187 KX II Local Console Interface 187 L LAN Interface Settings e 30 128 131 Language Support e 46 Launching the Dominion KX II 47 Linux Settings Red Hat 4 21 Linux Settings Red Hat 9 19 Local Drives e 95 97 Local Port 236 Local Port Administration 190 Local Port Settings KX II Local Console Only 43 189 191 Logging Out 50 Login Information 10 Login Limitations e 154 M Macintosh Keyboard 218 Maintenance 162 Maintenance Features Local Remote Console 162 Maintenance Menu 162 Make Linux Settings Permanent e 23 Make UNIX Settings Permanent e 27 Manage Favorites Menu e 53 Manageability e 243 zie Raritan When you re ready to take control Managing Favorites 44 52 Menu Tree 70 Miscellaneous e 244 Modify Existing User 103 105 Modify Existing User Group 106 113 Modifying a Keyboard Macro 80 Mouse Menu 71 85 Mouse Pointer Synchronization e 71 Mouse Pointer Synchronization Fedora e 218 Mouse Settings 16 Mouse Synchronization Tips e 72 Multi Platform Client MPC KX I and Dominion KX II Devices 45 N Name the Power Strip Port Page
195. rs ccccccssssssessssssesenetesesesesnsnsesessscsceseeeeeneneneseseanenens 180 Local Port Administration ssssssssssseeeneenn eene 182 KX II Local Console Dominion KX II provides at the rack access and administration via its local port which features a browser based graphical user interface for quick convenient switching between servers The Dominion KX II Local Console provides a direct analog connection to your connected servers the performance is as if you were directly connected to the server s keyboard mouse and video ports The KX II Local Console provides the same administrative functionality as the Dominion KX II Remote Console The Dominion KX II Local Console supports the following language keyboards US English UK English German French Japanese Korean Simplified Chinese and Traditional Chinese Note Keyboard use for Chinese Japanese and Korean is for display only local language input is not supported at this time for KX II Local Console functions Raritan Dominion KX IT iecurity Maintenance Diagnostics Network Miscellaneous Settings v Discovery Pert Domen 5000 IP auto configuration Bandwidth Limit p r No Limit X Preferred host name DHCP only LAN Interface Settings IP address Note For reliable network communication configure the Dominion KX II and LAN Switch to the same LAN interface Speed and Duplex For Subnet mast example configure b
196. rt the outlet name is replaced by the target server name even if you assigned another name to the outlet 1 Select the power strip from the Power Strip Name drop down list 2 For that power strip select the outlet from the Outlet Name drop down list 3 Repeat steps 1 and 2 for all desired power associations 4 Click OK A confirmation message is displayed gt To change the port name 1 Type something descriptive in the Name field For example the name of the target server would be a likely candidate The name can be up to 32 alphanumeric characters and can include special characters see Valid Special Characters on page 32 2 Click OK gt To cancel without saving changes Click the Cancel button Toremove a power strip assoc ation 1 Select the appropriate power strip from the Power Strip Name drop down list 2 Forthat power strip select the appropriate outlet from the Outlet Name drop down list 3 From the Outlet Name drop down list select None 4 Click OK That power strip outlet association is removed A 144 confirmation message is displayed zie Raritan When you re ready to take control Raritan Chapter 9 Device Management Note for D2CIM VUSB CIM Usage If you are using the D2CIM VUSB there are additional settings on the Port page to improve performance Port Access Virtual Media User Management Device Settings Security a Home gt Device Settings g
197. rt Access page opens listing all ports along with their status and availability You can sort by Port Number Port Name Status Up and Down and Availability Idle Connected Busy Unavailable and Connecting by clicking on the column heading Dominion KX II Console Navigation The Dominion KX II Console interfaces both local and remote provide many methods for navigation and making your selections gt Toselect an option use any of the following e Click on a tab a page of available options is opened e Hover over a tab and select the appropriate option from the menu e Click the option directly from the menu hierarchy displayed breadcrumbs Event Management Destinations 46 Note SNMP traps will only be generated if the SNMP Logging Enabled option is checked Similarly Sysiog events will only be generated if the Enable Syslog Forwarding option Is checked These options can be found on the Event Management Settings page on the Device Settings menu BAAR cesse cem hm o ape mM ar mM GBA BI nA ARA og CN s hm en eg pee et pean s Device Operati v 9 Iv v F 5 7 F E cR ppp 7 7 p p van Para Iv F Port Sete Ch 7 F F Netware ranse 7 Etemet Fac Li v v Doweo Wan aencrt 7 p 7 lv E v F P E t na P J 2 7 epo ab La F Figure 12 Sample Menu Hierarchy breadcrumbs Raritan When you re ready to take control C
198. s Port Access Virtual Media user Management vevice Settings Security Maintenance Diagnostics pu Home gt User Management gt Users Logout User List 4 Username full Name User Group eden Adain Adain r marketing Addie Consumer Qrarketing M r tester Joe Tester ester J anar Add Delete ENT CR NU Tp e E PERPE Figure 40 User List gt Toaddanew user Click the Add button The User page opens For complete information about the User page refer to Add New User on page 100 gt To modify an existing user 1 Locate the user from among those listed 2 Click on the Username The User page opens For complete information editing the user refer to Modify Existing User on page 101 gt To delete a user 1 Select the user from among those listed by checking the checkbox to the left of the Username 2 Click Delete 3 Youare prompted to confirm the deletion Click OK Raritan 99 When you re ready to take control Add New User Add New User 100 Itis a good idea to define user groups before creating Dominion KX II users because when you add a user you must assign that user to an existing user group From the User page you can add new users modify user information and reactivate users that have been deactivated Note A username can be deactivated Active checkbox is cleared when the number of failed login attempts has exceeded the maximum login attempt
199. s Use To Favorites List Manage your list of favorite devices Discover Devices Local Discover the devices on the local subnet Subnet Discover Devices KX Subnet Discover the devices on the KX device subnet Add New Device to Favorites Add edit and delete devices from your list of Favorites 50 lt Raritan When you re ready to take control Chapter 4 Connecting to the Dominion KX II Favorites List From the Favorites List page you can add edit and delete devices from your list of Favorites gt To open the Favorites List page Select Manage gt Favorites List The Favorites List page opens Port Access Virtual Media User Management Device Settings Security Mainte eX Home gt Manage Favorites gt Favonte List Baskers KX 192 168 59 250 r Dominion KX I 192168 59 150 r Prasannas KX t 192168 59 48 NO cC SN a Aca atum t anl Figure 15 Favorites List gt To adda Favorite Click the Add button The Add New Favorite on page 56 page opens gt To delete a Favorite Important Please exercise caution in the removal of favorites you are not prompted to confirm their deletion 1 Check the checkbox next to the appropriate Dominion KX II device 2 Click the Delete button The favorite is removed from your list of favorites gt To edit a Favorite 1 From the Favorites List page check the checkbox next to the appropriate Dominion KX II
200. s 174 Diagnostics Menu 174 Disconnecting Target Servers 65 Disconnecting Virtual Media e 95 99 Discover Devices KX Subnet e 58 Discover Devices Local Subnet e 56 Dominion KX II Console Layout e 48 Dominion KX II Console Menu Tree 50 187 Dominion KX II Console Navigation e 49 Dominion KX II Overview 2 Dominion KX II Remote Console 237 Index Dominion KX II Devices 44 E Editing rciusergroup Attributes for User Members e 211 Electrical Specifications e 201 Encryption amp Share 94 154 157 186 Environmental Requirements e 199 Ethernet and IP Networking 228 Event Management e 134 Event Management Destinations 137 Event Management Settings 135 Exit 76 F Factory Reset KX II Local Console Only 43 194 FAQs e 222 Favorites List e 54 File Server Setup File Server ISO Images Only 95 100 Firmware Upgrade 44 168 169 French Keyboard 215 From LDAP e 206 From Microsoft Active Directory e 206 G General Questions e 223 Getting Started 10 Group based IP ACL Access Control List 109 110 115 132 159 Groups 40 H Hardware 4 Help Menu 90 Hotkeys 64 65 189 IBM AIX 5 3 Settings 26 Implementing LDAP Remote Authentication 40 118 120 122 Implementing RADIUS Remote Authentication 40 119 123 Informational Notes 46 215 238 Installation 234 Installation and Configuration e 14 72 Intelligent 16 87 Int
201. s Troubleshooting Question Answer I am logged into the Yes this is correct behavior and is the direct result of how browsers Dominion KX II using and cookies function Firefox and I opened another Firefox browser I am automatically logged into the same Dominion KX II with the second Firefox browser Is this right I am logged into the Yes to access two different Dominion KX II devices either close the Dominion KX II using first session or use another client PC Firefox and I attempt to log into another Dominion KX II using another Firefox browser session from the same client I am logged out of both KX IIs is this correct behavior When I m running a This is normal behavior with Firefox all sessions are associated Once KVM session using you close the Virtual KVM Client dialog Firefox will no longer be Firefox as my browser blocked and certain dialogs are opened in the Virtual KVM Client e g Connection Properties Video Settings it seems to block the Firefox browser even other Firefox sessions What can I do zie Raritan 536 When you re ready to take control Index 1 1 AC Power e 29 2 2 Network Ports e 30 3 3 Local Access Port local PC e 30 4 4 Target Server Ports e 31 35 A About Raritan Virtual KVM Client e 90 Absolute e 16 87 Accent Symbol Windows XP Clients only e 216 Accessing a Target Server e 189 Accessing Target Servers e 60 188
202. s only Control Control the Read Complete connected Write access read target server write to virtual media Default setting Tip Use the checkboxes to quickly set all the permissions the same for every port Group based IP ACL Access Control List Important Please exercise caution when using group based IP access control It is possible to be locked out of your Dominion KX II if your IP Address is within a range that has been denied access lt Raritan When you re ready to take control Raritan Chapter 8 User Management This feature limits access to the Dominion KX II device by users in the selected group to specific IP addresses This feature applies only to users belonging to a specific group unlike the IP Access Control List feature which applies to all access attempts to the device is processed first and takes priority Refer to IP Access Control on page 153 for more information Important IP Address 127 0 0 1 is used by the Dominion KX II Local Port When creating an Access Control List if 127 0 0 1 is within the range of IP Addresses that are blocked then you will not have access to the Dominion KX II local port Use the IP ACL section of the Group page to add insert replace and delete IP access control rules on a group level basis IP ACL Rule Starting IP Ending IP Action Append Insert Replace Delete Figure 44 Group based IP Access Control List gt To add append ru
203. s a second generation digital KVM Keyboard Video I Mouse switch that enables IT administrators to access and control 16 32 or 64 servers over the network with BIOS level functionality Dominion KX II is completely hardware and OS independent users can troubleshoot and reconfigure servers even when servers are down At the rack Dominion KX II provides the same functionality convenience space savings and cost savings as traditional analog KVM switches However Dominion KX II also integrates the industry s highest performing KVM over IP technology allowing multiple administrators to access server KVM consoles from any networked workstation How does Dominion KX When using Dominion KX II remotely at first glance the interface may II differ from remote seem similar to remote control software such as pcAnywhere control software Windows Terminal Services Remote Desktop VNC etc However because Dominion KX II is not a software but a hardware solution it s much more powerful OS and hardware independent Dominion KX II can be used to manage servers running many popular operating systems including Intel Sun PowerPC running Windows Linux Solaris etc State independent Agentless Dominion KX II does not require the managed server OS to be up and running nor does it require any special software to be installed on the managed server Out of Band Even if the managed server s own network connection is unavailable i
204. s booted the KX II Local Console is visible on the monitor attached to the Dominion KX II local port Type the default username admin and password raritan and click Login The Change Password screen is displayed 3 Type your old password raritan in the Old Password field 4 Type anew password in the New Password field retype the new password in the Confirm New Password field Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and the special characters identified in the table following these steps 5 Click Apply 6 You will receive confirmation that the password was successfully changed Click OK The Port Access page is displayed Note The default password can also be changed from the Raritan Multi Platform Client MPC For more information refer to the Raritan Multi Platform Client MPC and Raritan Remote Client RRC User Guide Valid Special Characters Character Description Character Description Exclamation point Colon Double quote Semi colon Pound sign Equal sign Dollar sign gt Greater than sign Percent sign Question mark amp Ampersand At sign Single quote Left bracket Left parenthesis Backward slash Raritan When you re ready to take control Right parenthesis i Asterisk Plus sign Comma Dash Period Forward slash lt Less than sign Chapter 3 Installation and Configuration Right bracket C
205. s set in the Security Settings screen Refer to Security Settings on page 147 for more information gt Toadda new user 1 Open the User page using one of these methods Select User Management gt Add New User or Click the Add button from the User List page Port Access Virtual Media User Management Device Settings Security Main Username pu Full Hame Password Confirm Password User Group Select X 7 Active or einer Aen oe bi LS a nth A sema aus AS mue hl a mb Figure 41 User Page 2 Typea unique name in the Username field up to 16 characters 3 Type the person s full name in the Full Name field up to 64 characters 4 Typea password in the Password field retype the password in the Confirm Password field up to 64 characters Raritan When you re ready to take control Chapter 8 User Management Select the group from the User Group drop down list The list contains all groups you have created in addition to the system supplied default groups lt Unknown gt default setting Admin Individual Group If you do not want to associate this user with an existing User Group select Individual Group from the drop down list For more information about permissions for an Individual Group refer to Set Permissions for Individual Group on page 110 To activate this user check the Active checkbox The default is activated enabled Click OK Modify
206. s the status of the network connection setting this too low may cause excess network traffic The default Ping Interval is 30 seconds Timeout seconds Timeout determines how long a network port must be dead before the switch is made Both network ports must be connected to the network and this option must be checked for Automatic Failover to function The default Timeout is 60 seconds Note The default Ping Interval and Timeout generate a condition that when the KX device tries to switch over remote sessions will be dropped and must be re established Reducing these intervals to much lower values will allow remote sessions to stay connected but will result in increased network traffic 126 lt Raritan When you re ready to take control Chapter 9 Device Management e Set System ACL Click this button to set a global level Access Control List for your Dominion KX II by ensuring that your device does not respond to packets being sent from disallowed IP addresses The IP Access Control on page 153 page opens Note These ACL values are global affecting the Dominion KX II unit as a whole You can also create ACLs on a group level basis For example you can create an Outsourced Vendors user group that is permitted to access Dominion KX II only from a given IP address range refer to Group based IP ACL see Group based IP ACL Access Control List on page 106 for more information on how to create group specific Acc
207. section entitled Implementing LDAP Remote Authentication on page 115 for information about completing the fields in the LDAP section of the Authentication Settings page 113 When you re ready to take control Authentication Settings 5 Ifyou selected RADIUS read the section entitled Implementing RADIUS Remote Authentication on page 118 for information about completing the fields in the RADIUS section of the Authentication Settings page 6 When finished click OK to save gt To cancel without saving changes Click Cancel Toreturn to factory defaults Click the Reset to Defaults button 114 lt Raritan When you re ready to take control Chapter 8 User Management Implementing LDAP Remote Authentication Lightweight Directory Access Protocol LDAP is a networking protocol for querying and modifying directory services running over TCP IP A client starts an LDAP session by connecting to an LDAP server the default TCP port is 389 The client then sends operation requests to the server and the server sends responses in turn Reminder Microsoft Active Directory functions natively as an LDAP authentication server gt To use the LDAP authentication protocol input the following information LDAP Primary LDAP Server Secondary LDAP Server Secret Phrase Confirm Secret Phrase Enable Secure LDAP Port Secure LDAP Port Certificate File DN of Administ ative User
208. security Violation Security violation e 134 Raritan When you re ready to take control Chapter 9 Device Management Trap Name Description startCCManagement The device has been put under CommandCenter Management stopCCManagement The device has been removed from CommandCenter Management userAdded A user has been added to the system userAuthenticationFailure A user attempted to log in without a correct username and or password userConnectionLost A user with an active session has experienced an abnormal session termination userDeleted A user account has been deleted userLogin A user has successfully logged into the Dominion KX II and has been authenticated userLogout A user has successfully logged out of the Dominion KX II properly userModified A user account has been modified userPasswordChanged This event is triggered if the password of any user of the device is modified userSessionTimeout A user with an active session has experienced a session termination due to timeout vmImageConnected User attempted to mount either a device or image on the target using Virtual Media For every attempt on device image mapping mounting this event is generated vmImageDisconnected User attempted to unmount a device or image on the target using Virtual Media lt Raritan 135 When you re ready to take control Power Supply Setup Page Power Supply Setup Page The Dominion KX II provides dual power
209. server such as LDAP Active Directory RADIUS etc is used Dominion KX II allows this as well and will even failover to its own internal authentication should the external authentication server become unavailable In this way Dominion KX II s design philosophy is optimized to provide ease of installation complete independence from any external server and maximum flexibility 220 lt Raritan When you re ready to take control Appendix D FAQs Question Answer Can Dominion KX II be Dominion KX II may work with remote access products like CITRIX if used with CITRIX configured appropriately but Raritan cannot guarantee it will work with acceptable performance Products like CITRIX utilize video redirection technologies similar in concept to digital KVM switches so that two KVM over IP technologies are being used simultaneously Can the Dominion KXII DHCP addressing can be used however Raritan recommends fixed use DHCP addressing since the Dominion KX II is an infrastructure device and can be accessed and administered more effectively with a fixed IP address I m having problems The Dominion KX II relies on your LAN WAN network Some possible connecting to the problems include Dominion KX II over my IP network What could be the problem Ethernet auto negotiation On some networks 10 100 auto negotiation does not work properly and the KX II unit must be set to 100MB full duplex or the appropriate c
210. ships with the following contents 1 Dominion KX II Unit 1 Dominion KX II Quick Installation and Setup Guide 1 1 2 1 1 1 1 1 Raritan User Manuals CD ROM Rackmount Kit AC Power Cords Cat5 Network Cable Cat5 Network Crossover Cable Set of 4 Rubber Feet for desktop use Application Note Warranty Card User Guide The Dominion KX II User Guide provides the information to install set up and configure access target servers and power strips use virtual media manage users and security and maintain and diagnose the Dominion KX II This user guide is specific to Dominion KX II version 2 0 for information pertaining to version 1 4 refer to the Dominion KX 1 4 User Guide Raritan When you re ready to take control User Guide Organization of Information The user guide is organized as follows Chapter 1 Introduction Overview features terminology and package contents Chapter 2 Getting Started Login information default IP Address supported operating systems browsers and CIMs Chapter 3 Installation and Configuration Target server configuration firewall settings physical device connections initial KX IL unit configuration remote authentication and users groups and access permissions Chapter 4 Connecting to the Dominion KX II User interfaces starting the KX II Remote Console Dominion KX II Favorites Chapter 5 Accessing Target Servers A
211. sively on the AD server Authorization and AD user privileges are controlled and administered through the standard Dominion KX II policies and user group privileges that are applied locally to AD user groups Note If you are an existing Raritan Inc customer and have already configured the Active Directory server by changing the AD schema Dominion KX II still supports this configuration and you do not need to perform the following operations Please refer to Appendix B Updating the LDAP Schema see Updating the LDAP Schema on page 197 for information about updating the AD LDAP schema gt To enable your AD server on the Dominion KX Il 1 Using Dominion KX II create special groups and assign proper permissions and privileges to these groups For example create groups such as KVM Admin KVM Operator 2 On your Active Directory server create new groups with the same group names as in the previous step 3 On your AD server assign the Dominion KX II users to the groups created in step 2 4 From the Dominion KX II enable and configure your AD server properly Please refer to Implementing LDAP Remote Authentication on page 115 Important Notes e Group Name is case sensitive e The Dominion KX II provides the following default groups which can not been changed or deleted Admin and lt Unknown gt Please verify that your Active Directory server does not use the same group names e Ifthe group information returne
212. slog Configuration SysLog Configuration Enable Syslog Forwarding IP Address Figure 57 Syslog Configuration Raritan When you re ready to take control To configure the Syslog enable Syslog forwarding Check the Enable Syslog Forwarding option to log the device s messages to a remote Syslog server Type the IP Address of your Syslog server in the IP Address field Click OK To cancel without saving changes Click Cancel To reset to factory defaults Click the Reset To Defaults button 131 Event Management Event Management Destinations System events if enabled can generate SNMP notification events traps or can be logged to Syslog or Audit Log Use the Event Management Destinations page to select which system events to track and where to send this information Note SNMP traps will only be generated if the SNMP Logging Enabled option is checked Syslog events will only be generated if the Enable Syslog Forwarding option is checked Both of these options are in the Event Management Settings page gt To select events and their destinations 1 Select Device Settings gt Event Management Destinations The Event Management Destinations page opens 7 Gece Songs Port Access Virtual Media User Management DGEEEGEIREE Security Maintenance Diagnostics Moms gt Device Samtage Event Management Desnations
213. ss Alt F10 from your keyboard to exit single mouse mode Raritan When you re ready to take control zs Raritan Chapter 6 Virtual KVM Client Standard This is the standard mouse synchronization algorithm using relative mouse positions Standard mouse mode requires that acceleration is disabled and other mouse parameters are set correctly in order for the client and server mouse to stay synchronized Standard mouse mode is the default gt To enter standard mouse mode Select Mouse gt Standard Intelligent In Intelligent mouse mode the Dominion KX II can detect the target mouse settings and synchronize the mouse pointers accordingly allowing mouse acceleration on the target In this mode the mouse cursor does a dance in the top left corner of the screen and calculates the acceleration For this mode to work properly certain conditions must be met For additional information on Intelligent Mouse mode refer to the Raritan Multi Platform Client User Guide Appendix B Conditions for Intelligent Mouse Synchronization available on Raritan s Website http www raritan com support productdocumentation or on the Raritan User Manuals amp Quick Setup Guides CD ROM included with your Dominion KX II shipment gt To enter intelligent mouse mode Select Mouse gt Intelligent Absolute Note Absolute Mouse Synchronization is available for use with the Virtual Media enabled USB CIM D2CIM VUSB only
214. st mado dette odd e oin std EE 38 Relationship between Users and Groups sss ertet 39 Chapter 4 Connecting to the Dominion KX II 40 User Imterta ces M 40 KX II Local Console KX II D vices rrt secs setesevass vaste sous sboxbvenssstersesstvasreseeaceuess 41 Dominion KX II Remote Console Dominion KX II Devices ceescsseseecscseeeeeetetesesesesnsnesesesesnsnens 42 Multi Platform Client MPC KX I and Dominion KX II Devices eene 43 Raritan Remote Client RRC KX I Devices Only senes 44 IF WOES o 44 Java Runtime Environment JE 4e tete puente treten enin take atesa Ea be eina aga usa ea eta dp ege rea aeui 44 Launching the Dominion KX II sese tete nenee ene ne nene neennnnenenennnees 45 Dominion KX II Console Layout sse tnter nnns 46 Dominion KX II Console Navigation sseeseeseseeeeneeenennen nennen nennen 46 LOS PINS OUL ici epe moon n REG DEDERE ERROR CHORO E ERE ED ir a PRAE 47 Dominion KX II Console Menu Tree eee eee e eene nennen 47 Managing Jd E E E 49 Manage Favorites Menu sse nennt nennen 50 Favorites EASt T E Mn 51 Discover Devices Local Subn6et nete RE EUER IAEA ERNR IU Rte EIN IE PHA RETUA 53 zie Raritan When you re ready to take control Contents Discover Devices KX Subnet cccccccsssss
215. stics gt Netwok Statistics Kernel IP routing table Destination Catevay Cenmask Flags MSS Window irtt Iface 192 168 59 0 255 255 255 0 U O 0 O ethl default 192 168 59 126 0 0 0 0 UG O O O ethl ameti ate uis a Mm tn ftt enim Me ua tes Figure 84 Network Statistics route 3 Click the Refresh button The relevant information is displayed in the Result field sn Raritan When you re ready to take control Ping Host Page Raritan Chapter 12 Diagnostics Ping is a network tool used to test whether a particular host or IP Address is reachable across an IP network Using the Ping Host page you can determine if a target server or another Dominion KX II unit is accessible gt To ping the host 1 Select Diagnostics gt Ping Host The Ping Host page opens Port Access Virtual Media User Management Device Settings Security r Home gt Diagnostics gt Ping Host Ping Host Hostname or IP Address fis2 168 59 97 Result 192 168 59 97 is alive Mah e PRA NETT S pen eee MA ca af ana Figure 85 Ping Host 2 Type either the hostname or IP Address into the Hostname or IP Address field e Click Ping The results of the ping are displayed in the Result field 171 When you re ready to take control Trace Route to Host Page Trace Route to Host Page Trace route is a network tool used to determine the route taken all the way to the provided hostname or IP Address
216. supplies and can automatically detect and provide notification regarding the status of these power supplies Use the Power Supply Setup page to specify whether you are using one or both of the power supplies Proper configuration ensures that the Dominion KX II sends the appropriate notifications should a power supply fail For example if power supply number one fails the power LED at the front of the unit will turn red gt To enable automatic detection for the power supplies in use 1 Select Device Settings Power Supply Setup The Power Supply Setup page opens T Power Supply Setup Page Device Settings Home Microsoft Internet Explorer Address 48 hitps 192 168 59 150 home asp Google C Jord Bp eese heteded chek ai T Raritan Port Access Virtual Media User Management Device Setlings Security Mainter 1 i 1 Dominion Kx ii gt Device Settings gt Powe Supply Seep Page 136 Flower Supply Setup Page fg Powerint Auto Detect fg Powerin Auto Detect i he BN n ea emet e antra tatem a Ira T ti cn niin htm d a tina capi 2 Ifyou are plugging power input into power supply number one left most power supply at the back of the unit then check the Powerln1 Auto Detect option 3 Ifyou are plugging power input into power supply number two right most power supply at the back of the unit then check the P
217. sword Tip For backup and business continuity purposes it is strongly recommended that you create a backup administrator user name and password and keep that information in a secure location Default IP Address Dominion KX II ships with the default IP address of 192 168 0 192 Supported Operating Systems Clients The following operating systems are supported on the Dominion KX II Remote Console Virtual KVM Client and Multi Platform Client MPC Client OS Virtual Media VM Support on Client Windows XP Yes Windows 2000 SP4 Yes Windows Vista Yes ZE Raritan i5 When you re ready to take control Red Hat Linux 9 0 Red Hat Enterprise Workstation 3 0 and 4 0 SUSE Linux Professional 9 2 and 10 Fedora M Core 5 and above Mac Solaris Supported Browsers Chapter 2 Getting Started Yes Locally held ISO image Remote File Server mounting directly from KX Yes Locally held ISO image Remote File Server mounting directly from KX Yes Locally held ISO image Remote File Server mounting directly from KX Yes Locally held ISO image Remote File Server mounting directly from KX No No Dominion KX II supports the following browsers e Internet Explorer 6 and 7 e Firefox 1 5 and 2 0 e Mozilla 1 7 e Safari 2 0 Raritan When you re ready to take control 11 Supported Operating Systems and CIMs Target Servers Supported Operating Systems and CIMs Target Servers In add
218. t Port Configuration gt Port Port E tame Pomnontoa_ ra i Power Strip tlame Outlet Hame we sz x ne sl a Target Server Settings Absolute mouse scaling for MAC server Use Full Speed for Virtual Media CIM Useful for BIOS that cannot handle High Speed USB devices x Ces Me nn m Aes ua Lir meme gom sa met acte a Figure 64 Port Page Target Server Settings for D2CIM VUSB If you are experiencing synchronization issues and are using the D2CIM VUSB CIM for a Mac target server check the Absolute mouse scaling for MAC server option Certain BIOS do not support USB high speed capabilities and the attempt to auto negotiate does not work If you are experiencing BIOS problems with the target server check the Use Full Speed for Virtual Media CIM option Note For SUSE 9 2 target servers please enable check the Use Full Speed for Virtual Media CIM option for those target server ports SUSE 9 2 does not work with the Virtual Media CIM when high speed is negotiated 145 When you re ready to take control Chapter 10 Security Settings In This Chapter Security Settings Menu sce eee enenatis ere Peine in epe 146 Security Settings dee trstes e tentent i o eite an i etie o ides 147 IP Access COD TOL cos ueteri erre eee euer e xke eddie erue 153 Security Settings Menu The Security menu is organized as follows Security Settings and IP Access Control Use To
219. t Cr e sers OCemy pe DIC emdamain DC een NeRAS and 185 Servers T Lsens D Cemupe DC mur CNeScheme Arne C Meiser s DIC emype DC emiesdernsin CMS FPCRT 35580 Che ker s DC e mypr DC end CH Teinenclerts CHe Lone s DC emere DC eemdonin E 7 Locate the user name whose properties you want to adjust in the right pane Right click on the user name and select Properties 8 Click on the Attribute Editor tab if it is not already open 202 Raritan When you re ready to take control Appendix B Updating the LDAP Schema 9 Select rciusergroup from the Attributes list CN Administrator Properties proxpAddresses Unicode Sting Not Seb pwdLastSet Large Integer 128299285248088608 queryPolicyBL Distinguished lt Not Set gt rciuisergroup Case Insensiti 5 registered amp ddress Octet String lt Not Set replPropertyMetaData Octet String 0x01 0x00 0x00 0x00 0x0 repllipToDateVector Octet String lt Not Set repsFrom Octet String lt Not Set repsTo Octet String Not Set revision Integer lt Not Set rid Integer lt Not Set roomNumber lt Not Set ame Administrator Figure 106 Administrator Properties attribute editor E Raritan 308 When you re ready to take control Editing rciusergroup Attributes for User Members 204 i 10 Click Edit The String Attribute Editor dialog opens E CN NTIDS Quotas EARS SST STS f GY CN Proaem Data TN umm camm ro geFaj2nar Schema
220. t can still be managed through Dominion KX II BIOS level access Even if the server is hung at boot up requires booting to safe mode or requires system BIOS parameters to be altered Dominion KX II still works flawlessly to enable these configurations to be made How do the new Dominion KX II has many new and exciting features including virtual features of the Dominion media dual power dual gigabit Ethernet common Web based user KX II compare to the KX interfaces next generation local port etc p zie Raritan ps When you re ready to take control General Questions Question Answer How do I migrate from In general KX I customers can continue to use their existing switches the Dominion KX I to for many years As their data centers expand customers can purchase Dominion KX II and use the new KX II models Raritan s centralized management appliance CommandCenter Secure Gateway and the Multi Platform Client MPC both support KX I and KX II switches seamlessly Will my existing KXI Yes existing KX I CIMs will work with the Dominion KX II switch In CIMs work with the addition select Paragon CIMs will work with the KX II This provides Dominion KX II switch an easy migration to KX II from Paragon I customers who wish to switch to KVM over IP Can the Dominion KXII Yes The Dominion KX II ships standard with 19 rack mount brackets be rack mounted It can also be reverse rack
221. t composite sync 3 Attach the keyboard mouse connector of your CIM to the corresponding ports on your target server Using a standard straight through UTP Cat5 5e 6 cable connect the CIM to an available server port on the back of your Dominion KX II unit Note The DCIM USB G2 provides a small slide switch on the back of the CIM Move the switch to P for PC based USB target servers move the switch to S for Sun USB target servers A new switch position takes effect only after the CIM is power cycled To power cycle the CIM remove the USB connector from the target server and plug it back in a few seconds later Step 5 Dominion KX II Initial Configuration The first time you power up the Dominion KX II unit there is some initial configuration that you need to perform through the KX II Local Console e Change the default password e Assign the IP Address e Name the target servers e Specify power supply auto detection Raritan 31 When you re ready to take control Step 5 Dominion KX II Initial Configuration 32 Changing the Default Password The Dominion KX II ships with a default password The first time you start the Dominion KX II you are required to change that password gt To change the default password 1 Power ON the Dominion KX II using the power switch es at the back of the unit Please wait for the Dominion KX II unit to boot A beep signals that the boot is complete 2 Once the unit ha
222. t one upper case character When checked at least one upper case character is required in the password Enforce at least one numeric character When checked at least one numeric character is required in the password 149 When you re ready to take control Security Settings 150 Enforce at least one printable special character When checked at least one special character printable is required in the password Number of restricted passwords based on history This field represents the password history depth that is the number of prior passwords that cannot be repeated The range is 1 12 the default is 5 User Blocking The User Blocking options specify the criteria in which users are blocked from accessing the system after the specified number of unsuccessful login attempts The three options are mutually exclusive Disabled The default option users are not blocked regardless of the number of times they fail authentication Timer Lockout Users are denied access to the system for the specified amount of time after exceeding the specified number of unsuccessful login attempts When selected the following fields are enabled Attempts The number of unsuccessful login attempts after which the user will be locked out The valid range is 1 10 the default is 3 attempts Lockout Time The amount of time for which the user will be locked out The valid range is 1 1440 minutes the default is 5 minutes zs Rar
223. t the RPC to the KX II e 228 Raritan When you re ready to take control Appendix D FAQs Scalability How do I connect Multiple Dominion KX II units do not need to be physically connected multiple Dominion KX together Instead each Dominion KX II unit connects to the network II devices together into and they automatically work together as a single solution if deployed one solution with Raritan s optional CommandCenter Secure Gateway CC SG management appliance CC SG acts as a single access point for remote access and management CC SG offers a significant set of convenient tools such as consolidated configuration consolidated firmware update and a single authentication and authorization database In addition CC SG enables sophisticated server sorting permissions and access If deployment of Raritan s CC SG management appliance isn t an option multiple Dominion KX II units still interoperate and scale automatically The KX II s remote user interface and the Multi Platform Client will automatically discover Dominion KX II units Non discovered Dominion KX II units can be accessed via a user created profile Can I connect an Yes Analog KVM switches can be connected to one of Dominion KX existing analog KVM II s server ports Simply use a PS 2 Computer Interface Module CIM switch to Dominion KX and attach it to the user ports of the existing analog KVM switch Please I Note that analog KVM switches vary in th
224. t6 How far can my servers be from Dominion KX II In general servers can be up to 150 feet 45 m away from Dominion KX II depending on the type of server Please refer to the Raritan Web site or Target Server Connection Distance see Target Server Connection Distance and Video Resolution on page 195 for more information For the new D2CIM VUSB CIM that supports virtual media and Absolute Mouse Synchronization a 100 30 m foot range is recommended Some operating systems lock up when T disconnect a keyboard or mouse during operation What prevents servers connected to Dominion KX II from locking up when I switch away from them Each Dominion computer interface module DCIM dongle acts as a virtual keyboard and mouse to the server to which it is connected This technology is called KME keyboard mouse emulation Raritan s KME technology is data center grade battle tested and far more reliable than that found in lower end KVM switches it incorporates more than 15 years of experience and has been deployed to millions of servers worldwide Are there any agents that must be installed on servers connected to Dominion KX II Servers connected to Dominion KX II do not require any software agents to be installed because Dominion KX II connects directly via hardware to servers keyboard video and mouse ports 224 Raritan When you re ready to take control Appendix D FAQs Question Ans
225. tance and Video Resolution on page 195 for more information Dominion KX II supports these resolutions 640x350 70 Hz 640x350 85 Hz 640x400 56 Hz 640x400 84 Hz 640x400 85 Hz 640x480 60 Hz 640x480 66 6 Hz 640x480 72 Hz 640x480 75 Hz 640x480 85 Hz 640x480 90 Hz 640x480 100 Hz When you re ready to take control 720x400 85 Hz 800x600 56 Hz 800x600 60 Hz 800x600 70 Hz 800x600 72 Hz 800x600 75 Hz 800x600 85 Hz 800x600 90 Hz 800x600 100 Hz 832x624 75 1 Hz 1024x768 60 Hz 1024x768 70 Hz 1024x768 90 Hz 1024x768 100 Hz 1152x864 60 Hz 1152x864 70 Hz 1152x864 75 Hz 1152x864 85 Hz 1152x870 75 1 Hz 1152x900 66 Hz 1152x900 76 Hz 1280x960 60 Hz 1280x960 85 Hz 1280x1024 60 Hz 15 Step 1 Configure Target Servers 16 640x480 9120 Hz 1024x768 72 Hz 1280x1024 075 Hz 720x400 70 Hz 1024x768 75 Hz 1280x1024 85 Hz 720x400 84 Hz 1024x768 85 Hz 1600x1200 60 Hz Note Composite Sync and Sync on Green video require an additional adapter Desktop Background For optimal bandwidth efficiency and video performance target servers running graphical user interfaces such as Windows Linux X Windows Solaris and KDE require configuration The desktop background need not be completely solid but desktop backgrounds featuring photos or complex gradients might degrade performance Mouse Settings The Dominion KX II operates in several mouse modes e Absolute Mouse Synchronization
226. terference VCCI Information J apan cO XB PHULBRESERRSAEMAHBAS VCCI DEE EDC VIFAZATHBRHRECT CORE t RERIK CHATS CBR EES XHMOFCEPHVEF TORAKA ZBKDBRENSTEMPHVETF Raritan is not responsible for damage to this product resulting from accident disaster misuse abuse non Raritan modification of the product or other events outside of Raritan s reasonable control or not arising under normal operating conditions CE Que LEE LISTED Contents Chapter 1 Introduction 1 Dominion KX I Gen E este 2 Vittual Uire 3 Product Photos P 3 Igcorsuiudi icc Q 4 lai 4 SOFU WEG edet n rase min iqeetamii et om thirteen endete deed ree 5 geni m s sdeens 6 en eren 7 User Guide stet tienen E t e UE 7 Organization of Information tenente E aniis p tenete 8 Related Documentation rte Rr an EHE e RF REC reds 9 Chapter 2 Getting Started 10 Login IOP ATONE e 10 Default IP Address eter iier rad tee abre ve o rini 10 Supported Operating Systems Clients cccccscesesesssceeseenetesssesesesnsnssescssssesecseeeesssssssesnsnsnensseasseeeees 10 Supported DrOWSefS 5 5 1 or rece ete ener pa rire Qe HORE REVO orb Earn event snates 11 Supported Operating Systems and CIMs Target Servers
227. termines the permissions for a given user based on the permissions of the user s group Your remote LDAP server can provide these user group names by returning an attribute named as follows rciusergroup attribute type string This may require a schema extension on your LDAP server Consult your authentication server administrator to enable this attribute In addition the standard LDAP memberOf is used From Microsoft Active Directory Note This should be attempted only by an experienced Active Directory administrator Returning user group information from Microsoft s Active Directory for Windows 2000 Server requires updating the LDAP schema Refer to your Microsoft documentation for more detail 1 Install the schema plug in for Active Directory refer to Microsoft Active Directory documentation for instructions 2 Run Active Directory Console and select Active Directory Schema 197 When you re ready to take control Setting the Registry to Permit Write Operations to the Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema you must set a registry entry that permits schema updates 1 Right click the Active Directory Schema root node in the left pane of the window and then click Operations Master The Change Schema Master dialog opens Change Schema Master E 7 x The schema master manages modifications to the schema Only one server in the
228. ters Network Miscellaneous Settings Network Miscellaneous Settings Discovery Port 000 Bandwidth Limit No Limit Y Figure 53 Network Settings Network Miscellaneous Settings zie Raritan When you re ready to take control Raritan Chapter 9 Device Management e Discovery Port Dominion KX II discovery occurs over a single configurable TCP Port The default is Port 5000 but you can configure it to use any TCP port except 80 and 443 To access the Dominion KX II unit from beyond a firewall your firewall settings must enable two way communication through the default port 5000 or anon default port configured here For more information refer to Configure Network Firewall Settings see Change the Keyboard Layout Code Sun Targets on page 28 Bandwidth Limit The default is no limit Select from among the options in the drop down list to set a maximum amount of bandwidth that can be consumed by this Dominion KX II unit for all sessions The options include No Limit 100 Megabit 10 Megabit 5 Megabit 2 Megabit 512 Kilobit 256 Kilobit and 128 Kilobit Note Lower bandwidth may result in slower performance LAN Interface Settings LAN Interface Settings Note For reliable network communication configure the Dominion KX Il and LAN Switch to the same LAN Interface Speed and Duplex For example configure both the Dominion KX ll and LAN Switch to Autodetect recommended or set both to a fixed s
229. the Dominion KX II and plug into an AC power outlet 2 For dual power failover protection attach the second included AC power cord and plug it into a different power source than the first power cord Note If you only attach one power cord the power LED on the Dominion KX II front panel will display red because the system is set to automatically detect both sources Refer to the Power Supply Setup Page on page 136 for information about turning off automatic detection for the power source not in use zie Raritan 36 When you re ready to take control Step 4 Connect the Equipment 30 2 Network Ports Dominion KX II provides two Ethernet ports for failover purposes not for load balancing By default only LANI is active and the automatic failover is disabled When enabled if the Dominion KX II internal network interface or the network switch to which it is connected becomes unavailable LAN2 will be enabled using the same IP address gt To connect the network 1 Connect a standard Ethernet cable included from the network port labeled LAN1 to an Ethernet switch hub or router 2 To make use of the optional Dominion KX II Ethernet failover capabilities Connect a standard Ethernet cable from the network port labeled LAN to an Ethernet switch hub or router Enable Automatic Failover on the Network Configuration screen refer to Network Settings LAN Interface Settings see LAN Interface Settings on pa
230. thernet ports 10 100 1000 LAN with failover e Field upgradeable e Local user port for in rack access PS 2 keyboard mouse ports 4 Raritan When you re ready to take control Chapter 1 Introduction One front and three back panel USB 2 0 ports for supported USB devices Fully concurrent with remote user access Local Graphical User Interface GUI for administration Centralized access security Integrated power control LED indicators for dual power status network activity and remote user status Hardware reset button Software zs Raritan When you re ready to take control Virtual media with D2CIM VUSB CIM Absolute Mouse Synchronization with D2CIM VUSB CIM Plug and Play Web based access and management Intuitive Graphical User Interface GUI 128 bit encryption of complete KVM signal including video and virtual media LDAP Active Directory RADIUS or internal authentication and authorization DHCP or fixed IP addressing SNMP and Syslog management Power control associated directly with servers to prevent mistakes Integration with Raritan s CommandCenter Secure Gateway CC SG management appliance CC Unmanage feature to remove device from CC SG control Terminology Terminology Remote PC TCPAP This manual uses the following terminology for the components of a typical Dominion KX II configuration Local Access Console KVM Keyboard Video Mouse UTP Cable Cat5 5e 6
231. this option if you would like automatic color calibration Video Sensing Select the video sensing mode 80 zie Raritan When you re ready to take control Mouse Menu zs Raritan Chapter 6 Virtual KVM Client Best possible video mode Dominion KX II will perform the full Auto Sense process when switching targets or target resolutions Selecting this option calibrates the video for the best image quality Quick sense video mode With this option the Dominion KX II will use a quick video Auto Sense in order to show the target s video sooner This option is especially useful for entering a target server s BIOS configuration right after a reboot 3 Click Apply The Video Settings are changed Note Some Sun background screens such as screens with very dark borders may not center precisely on certain Sun servers Use a different background or place a lighter colored icon in the upper left corner of the screen Tocancel with sav ng your changes Click Cancel When controlling a target server the KX II Remote Console displays two mouse cursors one belonging to your client workstation and the other belonging to the target server You can operate in either single mouse mode or dual mouse mode When in dual mouse mode and properly configured these two mouse cursors will align If you experience difficulty with mouse synchronization refer to Configure Target Servers see Step 1 Configure Target Servers on page 15
232. those listed 2 Click on the Group Name The Group page opens For complete information editing the group refer to Modify Existing User Group on page 109 Raritan When you re ready to take control Chapter 8 User Management gt To delete a user group Important Before deleting a group ensure that no users are assigned to it or those users will also be deleted Tip To determine the users belonging to a particular group sort the User List by User Group 1 Selecta group from among those listed by checking the checkbox to the left of the Group Name 2 Click Delete 3 Youare prompted to confirm the deletion Click OK Add New User Group gt Toaddanew user group 1 Open the Group page using one of these methods Select User Management gt Add New User Group or E Raritan T When you re ready to take control Add New User Group Click the Add button from the User Group List page Port Access Virtual Media User Management Ocwce Settings Security Mairtenance Diagnostica Home gt User Management gt Group nanona i ery Dey xl Dew ej Dew Dew Dew mj Dey Dew sj Dew xl Dew Dew Dey Dew Dey Derry Se Alto None 7 Set AB VM Access to Deny Set Al Power to Deny Se Alto View 7 Set AB VM Access to Read Only Set Atto Control 7 Set ABI VM Access to ReadiWitte 7 Set Al Power to Access P act Rube 5 Starting IP Ending IP Action
233. ti up 4 LEE Eo From Dominion KX2 Por z dom 3 Connect E 3 m Power Off 4 3 4 fs down i 5 P up 6 Dominion KX2 Port6 down Dominion KX2 Port M NET m PIED ERRARE Figure 21 Port Action Menu zie Raritan a When you re ready to take control Port Action Menu 3 Select Connect A Virtual KVM Client on page 64 window opens to Port Action Menu 60 1 the target server connected to that port When you click on a Port Name in the Port Access list the Port Action menu is displayed Please note that only options available for the selected port are listed in the Port Action menu Connect Creates a new connection to the target server For the KX II Remote Console a new Virtual KVM Client on page 64 window is opened For the KX II Local Console the display switches to the target server and switches away from the local user interface On the local port the KX II Local Console interface must be visible in order to perform the switch Note This option is not available from the KX II Remote Console for an available port if all connections are busy Switch From Switches from an existing connection to the selected port target server This menu item is available for every opened connection up to a maximum of four for units with 4 remote users maximum of two for units with 2 remote users maximum of 1 for units with 1 remote user this
234. to take control Step 1 Configure Target Servers 18 Windows 2000 Settings To configure target servers running Microsoft Windows 2000 Configure the mouse settings a Select Start Control Panel Mouse b Openthe Motion tab Set the acceleration to None Set the mouse motion speed setting exactly to the middle speed Click OK Disable transition effects a Select the Display option from Control Panel b Open the Effects tab c Clear the Use the following transition effect for menus and tooltips option d Click OK e Close the Control Panel Windows Vista To configure target servers running Microsoft Windows Vista Configure the mouse settings a Select Start gt Settings gt Control Panel gt Mouse b Open the Pointer Options tab In the Motion group Set the mouse motion speed setting exactly to the middle speed Disable the Enhanced pointer precision option Click OK Disable animation and fade effects a Select the System option from Control Panel b Select Advanced system settings The System Properties dialog opens Raritan When you re ready to take control Chapter 3 Installation and Configuration c Openthe Advanced tab d Click the Settings button in the Performance group The Performance Options dialog opens e Under Custom options clear the following checkboxes Animation options Animate controls and elements inside w
235. ture media mounted on the client PC and network file servers is essentially mounted virtually by the target server The target server can then read from and write to that media as if it were physically connected to the target server itself Virtual media can include internal and USB mounted CD and DVD drives USB mass storage devices PC hard drives and ISO images disk images Virtual media provides the ability to perform additional tasks remotely such as e transferring files e running diagnostics e installing or patching applications e complete installation of the operating system This expanded KVM control eliminates most trips to the data center saving time and money thereby making virtual media very powerful zs Raritan When you re ready to take control Virtual Media Drives lt Target Server E S Oo t D2CIM VUSB o E zi 2 Dominion KX II o i UA KE M zm ed Remote File Server ISO Images USB Drive Hard Orive USB Stick i fa Figure 35 Virtual Media Connection Raritan When you re ready to take control Chapter 7 Virtual Media 89 Prerequisites for Using Virtual Media Prerequisites for Using Virtual Media 90 The following conditions must be met in order to use virtual media Dominion KX Il For users requiring access to virtual media KX permissions must be set to allow access to the relevant ports as well as virtual media access VM Access port permission
236. ually etc modules conf in your system Using the editor of your choice make sure that the alias usb controller line in the modules conf file is as follows alias usb controller usb uhci Note If there is another line using usb uhci in the etc modules conf file it needs to be removed or commented out Save the file Reboot the system in order for the changes to take effect Linux Settings Red Hat 4 Note The following settings are optimized for standard mouse mode only zs Raritan When you re ready to take control To conf gure target servers runn ng L nux graphical user interface Configure the mouse settings a Select Main Menu gt Preferences gt Mouse The Mouse Preferences dialog opens b Open the Motion tab c Within the Speed group set the Acceleration slider to the exact center d Within the Speed group set the Sensitivity towards low e Within the Drag amp Drop group set the Threshold towards small f Close the Mouse Preferences dialog 21 Step 1 Configure Target Servers 22 Note If these steps do not work issue the xset mouse 1 1 command as described in the Linux command line instructions Configure the screen resolution a Select Main Menu gt System Settings gt Display The Display Settings dialog opens b From the Settings tab select a Resolution supported by Dominion KX II c ClickOK Note If you change video resolution you must
237. use Dominion KX II is completely Web accessible it doesn t require installation of proprietary software on clients used for access An optional installed client is available on Raritan com for the purposes of accessing Dominion KX II via modem Dominion KX II can be accessed through major Web browsers including Internet Explorer Mozilla and Firefox Dominion KX II can now be accessed on Windows Linux Sun Solaris and Macintosh desktops via Raritan s Java based Multi Platform Client MPC and the new Virtual KVM Client Dominion KX II administrators can also perform remote management set passwords and security rename servers change IP address etc using a convenient browser based interface lt Raritan When you re ready to take control 215 Remote Access Question Answer What is the file size of The Virtual KVM Client applet used to access Dominion KX II is the applet that is used to approximately 500KB in size The following chart describes the time access Dominion KX II required to retrieve Dominion KX II s applet at different network How long does it take to speeds retrieve 100Mbps Theoretical 100Mbit 0 05 network speed second s 60Mbps Likely practical 0 08 100Mbit network second speed s 10Mbps Theoretical 10Mbit A network speed second s 6Mbps Likely practical 8 10Mbit network second speed S 512Kbps Cable modem 8 download speed second typical S How d
238. ute diagnostic functions e Diagnostics Scripts Execute a special script provided by Raritan Technical Support during a critical error debugging session The script is uploaded to the unit and executed Once this script has been executed you can download the diagnostics messages through the Save to File button e KX Diagnostic Log Download the snapshot of diagnostics messages from the Dominion KX II unit to the client This encrypted file is then sent to Raritan Technical Support only Raritan can interpret this file Note This page is accessible only by users with administrative privileges gt Torun the Dominion KX II System diagnostics 1 Select Diagnostics gt KX Diagnostics The KX Diagnostics page opens Port Access tual Media User Management Device Settings Security Ma oo Home gt Diagnostics gt KX Diagnostics KX Diagnostics Enable Cornenand Line Interface for KX Diagnostics ee Diagnostics Scripts Script File Browse KX Diagnostic Log Save To File N mA aee ie eM tm hy a Missi A A atti ef dale anita are As e atm 173 When you re ready to take control KX Diagnostics Figure 87 KX Diagnostics 2 Toenable the Command Line Interface for use by Raritan Technical Support Note UDP Port 21 is required for this feature a Check the Enable Command Line Interface for KX Diagnostics checkbox b Click OK c UDP port 21 must be opened and made available
239. vers such as Active Directory RADIUS or LDAP Through a very simple configuration Dominion KX II can be set to forward all authentication requests to an external server such as LDAP Active Directory or RADIUS For each authenticated user Dominion KX II receives from the authentication server the user group to which that user belongs Dominion KX II then determines the user s access permissions depending on the user group to which he or she belongs How are usernames and passwords stored Should Dominion KX II s internal authentication capabilities be used all sensitive information such as usernames and passwords are stored in an encrypted format Literally no one including Raritan technical support or Product Engineering departments can retrieve those usernames and passwords Does Dominion KX II Yes The Dominion KX II has administrator configurable strong support strong password checking to ensure that user created passwords meet password corporate and or government standards and are resistant to brute force hacking e Raritan jji When you re ready to take control Security Question Answer If the Dominion KX II The encryption level that is auto negotiated is dependent on the Encryption Mode is set browser in use to Auto what level of TN Browser Encryption Level encryption is achieved Internet Explorer6 RC4 Internet Explorer7 AES 128 Firefox 1 5 RC4 Firefox 2 0
240. w displays Raritan Computer Inc Current keyboard layout code 22h US5 UNIX 3 Type the layout code desired for example 31 for the Japanese keyboard 4 Press Enter 5 Shut down the unit and power ON once again The DCIM SUSB performs a reset power cycle 6 Using MPC type something to verify that the characters are correct Step 3 Configure Network Firewall Settings To access Dominion KX II through a network firewall your firewall must allow communication on TCP Port 5000 or another port that you designate Refer to Network Settings on page 122 for additional information about designating another discovery port To take advantage of the Dominion The firewall must allow KX Il inbound communication on Web access capabilities Port 443 standard TCP port for HTTPS communication Automatic redirection of HTTP requests to Port 80 standard TCP port for HTTP HTTPS communication i e so users can type the more common http oxx xxx xxx xxx instead of https xxx oo xxx xxx T Raritan When you re ready to take control Chapter 3 Installation and Configuration Step 4 Connect the Equipment Connect the Dominion KX II to the power supply network local PC and target servers The numbers in the diagram correspond to the sections describing the connection Figure 7 Dominion KX II Connections 1 AC Power gt Toconnect the power supply 1 Attach the included AC power cord to
241. wer How many servers can be connected to each Dominion KX II unit Dominion KX II models range from 16 or 32 server ports in a 1U chassis to 64 server ports in a 2U chassis This is the industry s highest digital KVM switch port density What happens if I disconnect a server from Dominion KX II and reconnect it to another Dominion KX II unit or connect it to a different port on the same Dominion KX II unit Dominion KX II will automatically update the server port names when servers are moved from port to port Furthermore this automatic update does not just affect the local access port but propagates to all remote clients and the optional CommandCenter Secure Gateway management appliance How do I connect a serially controlled RS 232 device to Dominion KX II such as a Cisco router switch or a headless Sun server If there are only a few serially controlled devices they may be connected to a Dominion KX II using Raritan s new P2CIM SER serial converter However if there are four or more serially controlled devices we recommend the use of Raritan s Dominion SX line of secure console servers For multiple serial devices Dominion SX offers more serial functionality at a better price point than Dominion KX II This SX is easy to use configure and manage and can be completely integrated with a Dominion Series deployment In particular many UNIX and networking administrators appreciate the ability to directly
242. wer Cycle a Target Server gt To power cycle a target server From the KX II Remote Console click the Port Access tab to open it The Port Access page opens 2 Click the Port Name of the appropriate target server The Port Action Menu is displayed POH Accene Virtual Media User Management Device Settings Security Maintenance Diagnostics Home gt Port Access Port Access 1 Click on the individual port name to see allowable operations 2 of 4 Remote KVM channels currently in use 4 Port Number Port tame Dominion KX2_Port Dorinion KX2 Port 9 Dominion KX2 Port9 Dominion KX2 Porto Figure 22 Port Action Menu power options 3 Select Power Cycle A message is displayed confirming the action taken PowerOna Target Server gt To power ON a target server From the KX II Remote Console click the Port Access tab to open it The Port Access page opens 2 Click the Port Name of the appropriate target server The Port Action Menu is displayed 3 Select Power On Raritan When you re ready to take control Chapter 5 Accessing Target Servers Power Off a Target Server Raritan When you re ready to take control To power OFF a target server From the KX II Remote Console click the Port Access tab to open it The Port Access page opens Click the Port Name of the appropriate target server The Port Action Menu is displayed Sele
243. wer strip The Type and the Name fields are pre populated please note that the CIM Type cannot be changed The following information is displayed for each outlet in the power strip outlet Number Name and Port Association Use this page to name the power strip and its outlets all names can be up to 32 alphanumeric characters and can include special characters see Valid Special Characters on page 32 Port Access Virtual Media User Management Device Settings Security Home Device Settings Port Configuration Port Type PowerStrip tame Humber lame Port Association 1 TestPci1 TestPC Dy x essi Aue us Men tates Ml EOS P s oA Se nt nn ae A dts dts m Figure 62 Port Page power strips 141 When you re ready to take control Power Control 142 Note When a power strip is associated to a target server port the outlet name is replaced by the target server name even if you assigned another name to the outlet gt Toname the power strip and outlets Note CommandCenter Service Gateway does not recognize power strip names containing spaces 1 Change the Name of the power strip to something you will remember 2 Change the Outlet Name if desired Outlet names default to Outlet 3 3 Click OK gt To cancel without saving changes Click the Cancel button zs Raritan When you re ready to take control Raritan Chapter 9 Device Management Associ
244. your favorites list 1 Select Manage Favorites gt Add New Device to Favorites The Add New Favorite page opens Port Access Virtual Media User Management Device Settings Sece Home gt Manage Favorites gt Add New Favorite Add New Favorite AJ fields are requred Description o IP Address 000 4 i Ex oe eaves x Ano ces Alt teneri ee ea Figure 19 Add New Favorite 2 Typea meaningful Description 3 Type the IP Address for the device 4 Change the discovery Port if necessary 5 Click OK This device is added to your list of favorites Raritan When you re ready to take control Chapter 5 Raritan Accessing Target Servers In This Chapter Port Access Page eee here atecbevsesosedesovesdensesestoteceespedesssoseeens 58 Connecting to a Target Server 59 Port Action Menu editiert nennen ho reir pietre ees terse 60 Switching between Target Servers sse 61 Disconnecting Target Servers 61 Power Controlling a Target Server sse 62 57 When you re ready to take control Port Access Page Port Access Page After successfully logging into the Dominion KX II Remote Console the Port Access page opens This page lists all of the Dominion KX II ports the connected target servers and their status and availability The Port Access page provides access to the target servers connected to the Dominion KX II Target servers are servers t
245. your remote client workstation and the other belonging to the target server When the mouse pointer lies within the Virtual KVM Client target server window mouse movements and clicks are directly transmitted to the connected target server While in motion the client mouse pointer slightly leads the target mouse pointer due to mouse acceleration settings Port Dom nion KX2 Port1 Virtual KYM Client Connection Keyboard Video Mouse Tools View Help BJF Q e ERAS a opt ee eee Figure 25 Dual Mouse Cursors On fast LAN connections you may want to disable the Virtual KVM Client mouse pointer and view only the target server s pointer You can toggle between these two modes single mouse and dual mouse Refer to Mouse Menu on page 81 for additional information about the available mouse modes 67 When you re ready to take control Mouse Pointer Synchronization Mouse Synchronization Tips Be sure to follow these steps when obtaining mouse synchronization 1 6 Verify that the selected video resolution and refresh rate is among those supported by the Dominion KX II The Virtual KVM Client Connection Info dialog displays the actual values that the KX II is seeing Please refer to Supported Video Resolutions for more information about the video resolutions that are supported Verify that the cable length is within the specified limits for the selected video resolution Please refer to Target Server Connection D

Download Pdf Manuals

image

Related Search

Related Contents

OmniMount Echo 50FPLE  2003 Intersession Course Outline  Patton SmartNode 4120    販売名 ニホッ トノ ヾック一mie H-ー /H-2/H-3  Sony ADP-MAC Operating Instructions  1 par de fibras ópticas - PoP-BA  ASSEMBLY & OPERATING INSTRUCTIONS  ThinkPad® X22 Service and Troubleshooting Guide  

Copyright © All rights reserved.
Failed to retrieve file