AlterPath KVM/net Installation, Administration, and User’s Guide Software Version 2.1.1 Cyclades Corporation 3541 Gateway Boulevard Fremont, CA 94538 USA 1.888.CYCLADES (292.5233) 1.510.771.6100 1.510.771.6200 (fax) http://www.cyclades.
©2006 Cyclades Corporation Information in this document is subject to change without notice. The following are registered or registration-pending trademarks of Cyclades Corporation in the United States and other countries: Cyclades and AlterPath. All trademarks, trade names, logos and service marks referenced herein, even when not specifically marked as such, belong to their respective companies and are not to be considered unprotected by law.
Contents Before You Begin ................................................... xiii Chapter 1: Introduction ............................................. 1 Description ...................................................................................................... 2 Guidelines for Using the KVM/net ................................................................. 4 Connectors on the KVM/net ........................................................................... 4 Types of Ports ...................
Decision 1: Check User’s KVM Port Permissions ............................... 26 Decision 2: Check Group’s KVM Port Permissions ............................. 27 Decision 3: Check Generic User’s KVM Port Permissions .................. 27 Decision 4: Check User’s Default Permissions .................................... 28 Decision 5: Check Group’s Default Permissions .................................. 28 Decision 6: Check Generic User’s Default Permissions .......................
Considerations When Choosing Whether to Enable DHCP ......................... 57 KVM Terminator Usage and Types .............................................................. 58 Activity LEDs on the Terminator ............................................................. 58 KVM Expander ............................................................................................. 59 KVM Expander Features ..........................................................................
Chapter 3: Advanced Installation Procedures .... 115 Connecting an External Modem ................................................................. 116 Connecting AlterPath PMs to the KVM/net ............................................... 117 Installing the AlterPath KVM Expander .................................................... 119 Shipping Box Contents KVM Expander ................................................. 120 Setting Up the KVM Expander ........................................................
Configuration ...................................................................................... 167 Software Upgrade ............................................................................... 169 Configuration .............................................................................................. 169 KVM ....................................................................................................... 170 General .........................................................................
Setting up Customized Timezone Configuration ................................ 271 Boot Configuration ............................................................................. 273 Online Help ............................................................................................. 277 Viewing System Information ...................................................................... 278 General ....................................................................................................
.............................................................................................................. 318 Port Numbers of Cascaded KVM Devices in the Connect to Server Dropdown List ............................................................................................ 319 Login Screen: Direct Logins Enabled, Only IP Address Entered ........... 320 Login Screen: Direct Logins Enabled, IP Address and Port Entered ..... 320 Connecting to Servers Remotely Through the Web Manager .................
SNMP Configuration Screens [OSD] ................................................. 369 VPN Configuration Screens [OSD] .................................................... 373 IP Filtering Configuration Screens ..................................................... 377 Hosts Configuration Screens [OSD] ................................................... 384 Static Routes Configuration Screens .................................................. 386 Date/time Configuration Screens ..............................
Glossary ................................................................. 457 Index .......................................................................
xii AlterPath KVM/net Installation, Administration, and User’s Guide
Before You Begin This installation, administration, and user’s guide provides background information and procedures for installing, configuring, and administering the Cyclades™ AlterPath family of KVM products including: • AlterPath KVM/net • AlterPath KVM Expander • AlterPath KVM RP • AlterPath KVM Terminators In addition, this guide offers information and procedures for accessing connected servers and other connected devices.
Document Organization This document contains the following chapters: Chapter 1: Introduction Defines and explains the overall product features and uses of AlterPath KVM/net. Chapter 2: Installation Explains the procedures for installing the AlterPath KVM/net and setting up its basic configuration.
Appendix C: Safety Guidelines List the general safety guidelines for Cyclades products. Glossary Glossary of terms and acronyms used in the manual. Related Documents The following document for the AlterPath KVM/net is shipped with the product.
Table P-1: Typographic Conventions Typeface Meaning Example Emphasis Titles or emphasized or new words or terms See the AlterPath KVM/net Quick Start Filename or Command Names of commands, files, and directories; onscreen computer output. Edit the pslave.conf file. User type What you type in an example, compared to what the computer displays [kvm #] ifconfig eth0 The following table describes other terms and conventions.
Chapter 1 Introduction This chapter gives an overview of the features of the Cyclades AlterPath KVM/net. This chapter describes how administrators and operators can use the KVM/net features to securely manage connected computer systems and a large variety of devices from anywhere on the local area network or on the Internet. This chapter also provides important prerequisite information for understanding the information and procedures in this manual. The following table lists the topics in this chapter.
Description KVM Terminator Usage and Types Page 58 Description The KVM/net is a 1U rack-mountble device that serves as a single access point for administering and using servers and other devices through inband and out-of-band access methods. The following figure shows the front and back of the KVM/net. Figure 1-1: KVM/net Front and Back You use the KVM ports on the left and middle back of the KVM/net to connect servers.
Description Note: The 500-foot limit includes the distance of the User 2 from the KVM/net and the distance of the most remote system connected to a KVM port. Secondary KVM units such as the Cyclades AlterPath KVM Expander or an AlterPath KVM can be cascaded for extended KVM server connections. A maximum of 32 secondary KVM devices can be cascaded from the primary KVM/net extending the number of KVM ports to a maximum of 512 for twouser configuration (i.e.
Guidelines for Using the KVM/net Guidelines for Using the KVM/net Configuration of user accounts and access to the ports and all other management of the connected devices is done through the Web Manager. Troubleshooting in the event of network failure can be done using one of the two direct-connect methods, or by using the Web Manager through a dial-up connection to an external modem connected to the AUX port.
Connectors on the KVM/net Table 1-1: Port Types (Continued) Port Type Connection Information Where Documented Console Connect a CAT5 to DB-9 cable to a COM port on a computer. • “Management Ports (Console, Ethernet, User 1, User 2)” on page 8 • “To Connect to the Console Port” on page 82 Ethernet Connect an Ethernet cable to the local area network (LAN).
Connectors on the KVM/net Connectors on the Back The back of the KVM/net has KVM and management ports, a power cord connector, a power switch, and an AUX port as illustrated in the following figure. KVM Ports Power Cord Connector and Switch Management and AUX Ports Figure 1-2: KVM/net Back Panel • On the left are the power connector and power switch and either 16- or 32KVM ports, which are used for connecting computing systems with KVM connections.
Connectors on the KVM/net Power Connector and Power Switch The following figure shows the power connector and power switch on the left rear of a KVM/net. Power Cord Connector Power Switch Figure 1-3: Power Connector on the Left Rear The KVM/net is furnished with a power cord used to connect the power connector to a power supply. See “To Power On the KVM/net” on page 84 for instructions on supplying power to the KVM/net.
Connectors on the KVM/net connections give access to information that is otherwise inaccessible through in-band network interfaces. For example, BIOS access, POST, and boot messages are inaccessible through in-band connections. In some cases, the in-band network interfaces are not available after the system boot is completed (for example, after a Windows Safe Mode boot) without the kind of access these KVM connections provide.
Connectors on the KVM/net The following list describes the management ports on the right back of the KVM/net. • Console – Its RJ-45 connection can be connected by a CAT5 to DB-9 cable to a COM port on a computer. Administrators can use a terminal emulation program to locally manage and troubleshoot the KVM/net. See “To Connect to the Console Port” on page 82 and “Configuring Basic Networking Using the wiz Command” on page 85 for more details.
Activity LEDs on the Back of the KVM/net AUX Ports The following figure shows the AUX port on the right back of the KVM/net. AUX Port Figure 1-6: AUX Ports AUX – Serial port (RS-232) with RJ45 connector that can be used for the following: • Connecting to an optional AlterPath PM Up to 32 PMs can be daisy-chained for a total of 120 outlets.
Activity LEDs on the Back of the KVM/net The following figure shows the position of the LEDs as they appear on the back of the KVM/net. The LEDs are designed to monitor the interface connections as described in Table 1-2, “LED Descriptions,” on page 12. The diagram below shows a close up view of the LEDs on the back of the KVM/net. The LEDS monitor the AUX ports, ETHERNET, and CONSOLE ports as described in Table 1-2.
Activity LEDs on the Back of the KVM/net The LED numbers in the tables below correspond to the numbers in the previous figure. Table 1-2: LED Descriptions Number Label Function Color/Status 1 VID EN Monitor KVM CAT5 video interface Orange - Lights when an internallygenerated signal is used. This occurs when the user is not connected to the port and in the OSD, or when the user is connected to a port, but a video signal is not present from the server.
AlterPath KVM/net Ordering Options Table 1-2: LED Descriptions (Continued) Number Label Function Color/Status 5 LK/ ACT/ COL Monitor Ethernet line status • OFF – Indicates either link is not up or cable is not connected. • Green – Lights solid when the link is up and blinks when data activity occurs, with frequency proportional to traffic. • Orange – Blinks when collisions occur 6 100 Monitor Ethernet speed • Off – Indicates the link is 10baseT or no link is active.
Types of Users Types of Users The KVM/net support three types of users: • Predefined administrators who can administer the KVM/net and its connected devices • Optionally added users who can act as administrators of the KVM/net and its connected devices • Optionally added users who can act as administrators of connected devices or regular users. As summarized in the following table, two accounts, root and admin, are configured by default and cannot be deleted.
Types of Users Table 1-4: User Types, Responsibilities, and Default Password (Continued) Username Responsibilities Default Password administratively assigned User account configured by the administrator to be able to access devices connected to the ports of the KVM/net. Has access to the port through the Web Manager and through the OSD. Regular users can access and administer only devices that are connected to ports to which they are assigned.
Types of Users Figure 1-8: Simultaneous Administrator Login Prompt Note: This feature applies to both Web Manager and OSD. Simultaneous Server Connections The KVM/net supports a maximum of 6 concurrent server connections. Up to two connections are supported either locally or remotely over Ethernet. Up to 4 connections can be inband depending on whether a KVM-over-IP connection is being made.
Administration Options The following table lists the number and types of server connections that can be made over IP based on the number of local users connected to KVM ports.
Cyclades Web Manager Table 1-6: Administration Options (Continued) The On Screen Display (OSD) can be used locally from a keyboard, monitor and mouse that is directly connected to the KVM/net. When the monitor and the KVM/net are on, the OSD login screen appears on the monitor. On-Screen Display • See “To Connect to the User 1 Management Port” on page 83 for instructions on how to make the hardware connection.
Prerequisites for Using the Web Manager Web Manager uses forms and dialog boxes (which are pop-up windows) to receive data input. See also, “Prerequisites for Using the Web Manager” on page 19. Administrators, see “Web Manager for Administrators” on page 133. Regular users, see “Web Manager for Regular Users” on page 299. Prerequisites for Using the Web Manager The prerequisites described in this section must be complete before anyone can access the Web Manager.
TCP Ports system administrator for help. For more information, see “Considerations When Choosing Whether to Enable DHCP” on page 57. • A user account defined on the Web Manager By default, the admin has an account on the Web Manager. An administrator can add regular user accounts to administer connected devices using the Web Manager. TCP Ports The TCP port numbers for KVM ports are used by the AlterPath Viewer when a user connects to a KVM port through the Web Manager.
Cascaded Devices Cascaded Devices The KVM/net supports cascading, which allows administrators to connect secondary KVM units to a primary KVM/net. Cascading allows administrators to increase the number of managed devices to up to 1024 servers with a centralized configuration and access interface. A maximum of 32 secondary KVM devices can be cascaded from the primary KVM/net extending the number of KVM ports to a maximum of 512 for twouser configuration (i.e.
Cascaded Devices Up to 1024 servers Sun Server (Mini-DIN) PC Server (USB) Sun Server (Mini-DIN) PC Server (USB) PC Server (PS/2) PC Server (PS/2) AlterPath KVM Expander 16 AlterPath KVM 32 User1 User2 UserA UserB Primary AlterPath KVM/net 32 local user IP user Figure 1-9: Cascaded KVM Devices from a KVM/net As depicted in the previous figure, the KVM/net supports one level of cascading: The primary KVM/net controls the secondary level of KVM units connected to it.
Cascaded Devices Administrators can connect up to 32 KVM units to the master KVM/net. Each cascaded KVM device has two management ports that can be connected to the primary KVM/net. Note: You must connect the master KVM/net’ KVM port to User 2 on the slave. Optionally, you can add a second connection to User 1 on the slave by using a terminator. If a KVM Expander is used then User A or User B management ports on the KVM Expander can be used.
Cascaded Devices Note: In addition to a CAT5 cable, you need a KVM Terminator to connect to the User 1 port of a cascaded KVM, KVM/net, or KVM/netPlus. KVM/net users can use the master KVM/net to access all devices connected to KVM ports on the master and slave KVM units. Accessing Ports on Cascaded KVM Devices KVM/net users can use the master KVM/net to access all devices connected to KVM ports on the master and slave KVM units.
Cascaded Devices The KVM administrator must take the actions described under “Where Documented” to allow any other types of access than the defaults defined in the previous table. See “Authentication” on page 45 for the tasks related to setting up authentication. Understanding KVM Port Permissions KVM port permissions are defined in the Web Manager by assigning Default Permissions that apply to all KVM ports and by optionally assigning specific permissions to individual ports or groups of ports.
Cascaded Devices needs to understand in order to perform advanced configuration of KVM permissions. The following table shows the tools that the KVM/net administrator can use to set KVM port permissions and where in this manual to go for further details.
Cascaded Devices Decision 2: Check Group’s KVM Port Permissions 2. Is the user included in a group with KVM port permissions that allow or deny access to the port? • If yes, access is allowed or denied. • If no, skip to Decision 3. Note: When a user is in more than one group, the most restrictive permission is used.
Cascaded Devices • If user jill is trying to access port 4 and the Generic User has port 4 in a list of ports with no access permissions, then jill is denied access. • If users joe, jennifer, jordan, jolanda, and jezebel are trying to access port 4 and the Generic User does not have port 4 listed for any type of access, then their access request are passed to decision 4. Decision 4: Check User’s Default Permissions 4.
Server Access: Inband and Out of Band • If user jennifer is not a member of any group with a Default Permission specified, then her access request is passed to decision 6. Decision 6: Check Generic User’s Default Permissions Note: If an access request gets this far, the Default Permission of the Generic User is the only permission that could apply. 6. Does the Default Permission for the Generic User allow access to the port? • If yes, access is granted. • If no, access is denied.
Server Access: Inband and Out of Band Table 1-11: In-band and Out of Band Connections In-band Out-of-Band Supported Source Computers Client machine running a Windows operating system with a valid IP address All Windows clients Supported Target Servers Windows (Win2000, 2003, XP, and NT) Terminal Servers PCs with a USB or PS/2 connectors or Sun servers with USB connectors Supported Browsers Internet Explorer 5, 6 Internet Explorer 6, Netscape 7, Mozilla, Firefox Direct Log In Not available Avai
Server Access: Inband and Out of Band Determining the Connection Type and its Supported Functionality When a user wants to connect to a server displayed on the Web Manager Connect to Server form, the drop-down list indicates whether the server can be accessed by a KVM connection, an in-band connection, or both.
Server Access: Inband and Out of Band Table 1-12: Available Functionality During KVM and In-band Connections Server Connection Labels Description (In-band) Indicates that the Microsoft Terminal Server running RDP can be accessed only through an in-band connection and is not connected to a KVM port. Users can access this server only to run applications once the server is already running.
Administering Users of Connected Servers Administering Users of Connected Servers This section reviews the tasks that KVM/net administrators must do to enable access to connected servers. The “admin” account can add new regular user accounts to allow others to connect to ports and administer or use connected devices. Types of Access to Ports The KVM/net administrator can restrict regular user accounts to allow them only to manage specific servers and devices.
Administering Users of Connected Servers During setup of the KVM/net, the installer connects the desired servers to the ports as planned. During configuration, the KVM/net administrator does the following, if desired: • Assigns aliases to ports to identify the connected servers. • Assigns aliases to PMs to identify the location or types of devices being managed. • Creates accounts for users of connected devices. • Specifies which ports each user can access and which type of access each can have.
Redefining Keyboard Shortcuts (Hot Keys) Redefining Keyboard Shortcuts (Hot Keys) Predefined keyboard shortcuts (also called hot keys) allow users to do the following: • Perform common actions while connected through a KVM port • Emulate Sun keyboard keys while connected through a KVM port to a Sun server. If desired, the KVM/net administrator can redefine the default hot keys either through the Web Manager or the OSD.
Disabling Mouse Acceleration Summary of Tasks for Redefining Hot Keys See the following table for a summary of tasks for redefining keyboard shortcuts with references to where they are documented.
Screen Resolution and Refresh Rate KVM port. The mouse acceleration should be disabled on the remote server’s operating system. Depending on your server’s operating system refer to one of the following procedures.
Screen Resolution and Refresh Rate Packet Filtering on the KVM/net IP filtering refers to the selective blocking of the IP packets based on certain characteristics. The KVM/net can be configured to filter packets as does a firewall. The IP Filtering form is structured in two levels: • Chain – The IP Filtering form which contains a list of chains • Rule – The chains which contain the rules that control filtering IP filtering refers to the selective blocking of the passage of IP packets.
Screen Resolution and Refresh Rate Table 1-15: Levels of IP Filtering (Continued) Rule Each chain contains a sequence of rules that control filtering. The rules address the following issues: • How the packet should appear in order to match the rule Some information about the packet is checked according to the rule, for example, the IP header, the input and output interfaces, the TCP flags and the protocol.
Power Management Power Management The KVM/net enables users who have power management permissions to power off, power on, and reboot remote devices connected to an AlterPath PM intelligent power distribution unit (IPDU). By connecting one PM to the AUX port and by daisy-chaining any combination of PM models, you can connect up to 128 outlets to one KVM/net.
Power Management Controlling Power Through the Web Manager IPDU Power Management Forms Through the Web Manager’s IPDU Power Management form, users with power management permissions can perform power management on any device plugged into an PM connected to the AUX port. See “Use this form to connect to servers with either an in-band or a KVM connection. See “Connecting to Servers Remotely Through the Web Manager” on page 321.” on page 304. Administrators must configure users for IPDU power management.
Power Management Setting Up and Configuring Power Management Administrators most commonly assign power management permissions to users and configure ports for power management using the Web Manager. However, the OSD also offers menus for configuring power management on local devices. Two types of power management can be set up and configured on the KVM/ net: • Power management of any device plugged into an PM connected to the AUX port.
Power Management Table 1-16: Tasks: General Power Management Set Up (Continued) 3 Plug devices into outlets on the PM connected to the AUX port. Devices plugged into connected PMs can be managed from the KVM/net Web Manager Access Page. 4 Configure users to manage power.
Security Security The KVM/net comes with the following configurable security features: • • • • Security Profiles Encryption Authentication Lockout Macro Security Profiles A Security Profile consists of a set of parameters that can be configured in order to have more control over the services that are active at any time. There are three pre-defined security profiles with pre-set parameters. In addition, a Custom profile is provided where an administrator can configure individual protocols and services.
Security In this situation the system detects the pre-defined security profile. You can continue working in the Web Manager. See “Step 1: Security Profile [Wizard]” on page 143 for detailed information on security profiles and configuration procedures Encryption Administrators can specify that communications are encrypted between the KVM/net and any computer attached to a KVM port. In the Web Manager, the administrator chooses Expert>Configuration>KVM>IP Users to bring up the IP security form.
Security The following table describes the supported authentication methods and indicates which methods are available for the KVM/net and which are available for KVM ports. All authentication methods except “Local” require an authentication server, which the administrator specifies while selecting the authentication method. The KVM/net uses local authentication if any of the authentication servers fails.
Security Table 1-18: Supported Authentication Types for KVM/net and Port Types (Continued) Authentication Type Description KVM/net All KVM Ports KerberosDownlocal Uses local authentication if Kerberos server is down X X LDAP Uses LDAP (Lightweight directory access protocol) X X LDAP/Local Uses local authentication if LDAP authentication fails X N/A LDAPDownlocal Uses local authentication if LDAP server is down X X NIS Uses NIS authentication X N/A NIS/Local Uses local authenticatio
Security Table 1-18: Supported Authentication Types for KVM/net and Port Types (Continued) Authentication Type Description KVM/net All KVM Ports RADIUSDownlocal Uses local authentication if RADIUS server is down X X TACACS+ Uses Terminal Access Controller Access Control System (TACACS+) authentication.
Security screen display) for selecting an authentication method and specifying an authentication server (when needed).
Security Note: A lockout macro will not transmit if the connection is read-only. If you switch between two KVM connected servers the lockout macro does not lock your session unless in the meantime another user has taken over your session. The lockout macros are user-programmable. The following table shows the default key sequences on major operating systems.
Security Table 1-20: Lockout Macro Key Sequences Operating System Lockout Macro Sun Solaris 10 - JDS By default there is no hot key defined. Follow the steps below to define a key sequence. 1. Go to Launch > Preferences > Desktop Preference > Keyboard > Shortcuts 2. Select “Lock Screen” and enter the desired hot key sequence, for example, [Ctrl+Alt] + L 3.
Security Table 1-20: Lockout Macro Key Sequences Operating System Lockout Macro SuSe 10 - KDE Default key sequence is [Ctrl+Alt] +L If desired, follow the steps below to change the default key sequence. 1. From the K Menu, go to Control Center > Regional & Accessibility > Keyboard Shortcuts > Shortcuts Scheme > Global Shortcuts 2. Scroll down to “Desktop” to see the default shortcuts key settings. 3. Select “Lock Session” 4.
Notifications, Alarms, and Data Buffering Table 1-21: Escape Sequence Hot Key Equivalent Shortcut Key Escape Hot Key Ctrl ^ Alt $ Shift # Win * Ctrl+Alt+Del @ For configuration instructions using the Web Manager see “Configuring Individual KVM Ports” on page 183, or “KVM Ports Screens” on page 394 for using OSD. Notifications, Alarms, and Data Buffering The KVM/net administrator can set up logging, notifications, and alarms to alert remote administrators about problems.
Notifications, Alarms, and Data Buffering For more background about setting up logging, notifications, alarms, and for links to all related procedures in this manual, see “Configuring Logging, Alarms, and SNMP Traps” on page 55. Syslog Servers Messages about the KVM/net, its connected PMs, and other connected devices can be sent to central logging servers, called syslog servers. Data from KVM-connected computers can optionally be stored in files on syslog servers.
Notifications, Alarms, and Data Buffering On “syslogger” the system administrator has configured the system logging utility to write messages from the local1 facility to the /var/log/ saopaulo-config file and the messages from the local2 facility to the / var/log/fremont-config file. While identifying the syslog server using the Web Manager, according to this example, you would select the facility number Local 2 from the Facility Number drop-down list on the System Log form.
VPN and the KVM/net VPN and the KVM/net The KVM/net administrator can set up VPN (Virtual Private Network) connections to establish encrypted communications between the KVM/net and an individual host or all the hosts on a remote subnetwork. The encryption creates a security tunnel for communications through an intermediate network which is untrustworthy. A security gateway with the IPsec service enabled must exist on the remote network.
Considerations When Choosing Whether to Enable DHCP Considerations When Choosing Whether to Enable DHCP DHCP is enabled by default. It relies on a DHCP server known to the KVM/ net. Because a DHCP server may assign a different IP address every time the KVM/net reboots, when DHCP is enabled, a user needs to take an additional step to find out the dynamically assigned IP address before being able to bring up the Web Manager.
KVM Terminator Usage and Types KVM Terminator Usage and Types An AlterPath KVM 4000 Series Terminator converts the server’s keyboard monitor and mouse signals. A KVM Terminator must be connected to the monitor keyboard and mouse ports of a server before the server can be connected to a KVM/net port. The KVM Terminator is connected to the KVM/net port through a CAT-5 or greater cable with an RJ-45 connector.
KVM Expander KVM Expander The AlterPath KVM Expander is designed to connect to the primary KVM/net to increase the number of ports that a primary KVM/net can manage. Note: The AlterPath KVM Expander is compatible with the KVM, the KVM/net, and the KVM/netPlus. The term primary KVM unit refers to the three types of KVM units.
KVM Expander The KVM Expander does support the following features: • Allows the connection of 8 or 16 servers See “KVM Expander Models and Components” on page 60 for more details. • Supports all existing Terminators See “KVM Terminator Usage and Types” on page 58 for more details. • Is compatible with the AlterPath KVM, KVM/net, and KVM/netPlus units See “Cascaded Devices” on page 21 for more details.
KVM Expander KVM Ports Power Cord Connector and Switch Access Ports, LEDs, and Power Outlet Figure 1-11: KVM Expander Back Panel Components The following sections explain the components of the KVM Expander: • “Ports on the KVM Expander” on page 62 • “LEDs on the KVM Expander” on page 63 • “Power Outlets on the KVM Expander” on page 63 Introduction 61
KVM Expander Ports on the KVM Expander The KVM Expander has two CAT5 access ports and either 8 or 16 KVM ports. KVM ports User A port User B port Figure 1-12: Ports on the KVM Expander Back Panel Table 1-24: KVM Expander Port Types Port Type Use and Connection Information User A and User B The access ports can be connected with an RJ-45 cable to KVM ports on the primary KVM unit. Once the KVM Expander is configured as a cascaded device on the master KVM unit, users can connect to one or both ports.
KVM Expander LEDs on the KVM Expander The following table describes the LED activities on the KVM Expander. Table 1-25: LED Activities on the KVM Expander Number Label Function Color/Status 1, 3 User A & User B Connection Status • Green - Lights when a connection is established and operational. • Orange - Lights when a connection to a port is attempted by the "master" KVM switch. • Off - When no connection is active or attempted.
KVM Expander Cascading a KVM Expander The KVM Expander can support up to two users simultaneously accessing its KVM ports.
KVM Expander Sun Server (Mini-DIN) PC Server (USB) PC Server (PS/2) AlterPath KVM Expander 16 UserA UserB AlterPath KVM/net 32 local user IP users Figure 1-14: Connecting a KVM Expander to the KVM/net Introduction 65
KVM Expander The following table shows the maximum number of servers a primary KVM, KVM/net, or KVM/netPlus can support when cascaded with a KVM Expander 8 or a KVM Expander 16.
KVM Expander Adding the KVM Expander to the KVM/net Unit’s List of Cascaded Devices Once the administrator connects the KVM Expander to the primary KVM unit, the administrator must add the Expander to the primary unit’s list of cascaded devices. Using the KVM/net Web Manager in Expert Mode, go to: Configuration>KVM>Devices to see the form displayed in the following figure.
AlterPath KVM RP Figure 1-16: Microcode Upgrade Form on KVM/net Web Manager See “Microcode Upgrade” on page 290 for instructions on updating the microcode on a KVM Expander. User Access The primary KVM switch takes care to prevent the same server port from being accessed by both user ports. If this happens, the last user to access the server port will have read-only access.
AlterPath KVM RP keyboard, monitor, and mouse. The AlterPath KVM RP is available in one model whose part number is ATP4710. Local-Remote button Power Select Power LED Local Remote Local-Remote LEDs Figure 1-17: KVM RP Front Connectors on the Back of the KVM RP The RP has a power supply and a User, a PC, and a Remote User port as displayed in the following figure. Power Supply and Switch 100-240V 50/60Hz, 0.
AlterPath KVM RP Table 1-27: KVM RP Port Types (Continued) Port Type Use and Connection Information User [PS/2 and VGA] Keyboard, video, and mouse (KVM) management port. Includes two PS/2 ports and a VGA port, which can be connected with a KVM cable to the PS/2 ports and a VGA port on the back of the computer at the local work station. PC [PS/2 and VGA] Keyboard, video, and mouse (KVM) management port.
Chapter 2 Installation This chapter outlines and described tasks for installing the KVM/net and provides other important installation-related information. The following table lists the basic installation tasks in the order in which they should be performed and shows the page numbers where the tasks are described in more detail.
Also see the following instructions for setting up the KVM/net: Changing Default Passwords Page 99 Enabling Access to the Web Manager without Making a Direct Connection Page 101 Preconfiguring the KVM/net for Remote Installation Page 104 Additional Configuration Tasks Page 105 Perform the optional procedures in “Advanced Installation Procedures” on page 115 if you are installing an AlterPath PM, an external modem, an AlterPath KVM RP, an AlterPath KVM Expander, or an other cascaded KVM devices.
Shipping Box Contents KVM/net Shipping Box Contents KVM/net The shipping box for the KVM/net contains the KVM/net along with the items shown in Table 2-1. The entry for each part provides an illustration, its part number (P/N), description, and purpose. You can use check boxes to check off each item, and you can use the part numbers from this table to reorder any of the parts.
Shipping Box Contents KVM/net Table 2-1: Shipping Box Contents, Part Numbers, and Description (Sheet 2 of 3) 5 Item P/N Description Purpose CAB0018 RJ-45 to RJ-45 7ft. CAT5 cable Use for the following: • To connect a server to a KVM port (with the appropriate Terminator from Table 1-22 on page 58). See “Connecting Servers to the KVM Ports” on page 78. • To connect an Ethernet port to the LAN. See “To Make an Ethernet Connection” on page 77. • To connect a terminal to a console port.
Setting Up the KVM/net Table 2-1: Shipping Box Contents, Part Numbers, and Description (Sheet 3 of 3) 5 Item P/N Description Purpose HAR0220 2 - Mounting brackets with 8 screws (2 spares Use to mount the KVM/net to a rack or wall. See “To Mount the KVM/net” on page 76. When ordering the KVM/net, customers also order one KVM Terminator for each server to be connected to one of the KVM ports.
Setting Up the KVM/net Bracket T To Mount the KVM/net 1. Decide whether you need to mount the KVM/net by the front or back and locate the appropriate sets of holes on the KVM/net. Holes for front mounting Holes for back mounting KVM/net side Figure 2-1:Rack Mounting Holes on the KVM/net 2. Connect the two supplied brackets to the KVM/net, connecting one bracket to each side of the box. 3.
Making an Ethernet Connection 5. Use the mounting hardware recommended for your rack to mount the KVM/net on a rack. Making an Ethernet Connection Make an Ethernet connection to the KVM/net in order to have Ethernet access to the Web Manager and remote access to devices connected to the KVM/net. T To Make an Ethernet Connection 1. Connect one end of an Ethernet cable to your local area network (LAN). 2. Connect the other end to the Ethernet port on the KVM/net.
Connecting Servers to the KVM Ports Connecting Servers to the KVM Ports You need to connect a KVM Terminator to every server before connecting it to a KVM port. Three Terminator types are available: • APK4615 - PS/2 for PC servers • APK4635 - USB for PC or Sun servers • APK4645 - Sun Mini-DIN Terminator CAT5 cable (up to 500 ft.
Connecting Servers to the KVM Ports Follow the procedures below when connecting computers to KVM ports on the KVM/net or on the KVM Expander. For connecting AlterPath PMs or cascaded KVM units, see Chapter 3, “Advanced Installation Procedures.” Note: KVM port connections rely on the CAT5 cable having all four pairs wired. If you are connecting a KVM port to a server through a patch panel, make sure that all cables in the path are CAT5 or better and that the patch panel has all four pairs wired.
Connecting Servers to the KVM Ports b. Obtain the information you need to identify the authentication server on the KVM/net from the server’s administrator. c. After the KVM/net is installed, make sure to specify the desired authentication method for the ports that are connected to each server. See “Security” on page 44 for background information and see “Network” on page 226 for the procedure. 3.
Connecting Servers to the KVM Ports • On a Mini-DIN Terminator for a Sun server, connect the Terminator’s Mini-DIN connector to the Mini-DIN port on the server. 3. Connect the Terminator’s VGA (HD-15 male) connector to the computer’s VGA (monitor) port. Tighten both screws firmly but do not over-tight them. Note: Two activity LEDs are located on the terminator. The “Link” LED displays a solid amber light when the terminator connects to the server.
Making a Direct Connection for Network Configuration 5. Connect the RJ-45 connector on other end of the cable to a KVM port on the KVM/net. 6. Repeat Step 1. through Step 5. for all computers to be connected to the KVM ports. 7. If any user is using a PC with Windows XP server pack 2 installed and Internet Explorer 5 or 6 to remotely administer a connected server, make sure the procedure under “Required Security Settings For Internet Explorer” on page 109 has been done on the PC. 8.
Powering On the KVM/net and Connected Devices On a PC, ensure that HyperTerminal or another terminal emulation program is installed on the Windows operating system. On a computer running a UNIXbased operating system, such as Solaris or Linux, make sure that a compatible terminal emulator such as Kermit or Minicom, is installed. 1. Connect an RJ-45 serial cable to the console port on the KVM/net. 2. Connect the other end to a USB serial adapter or DB-9 connection on the computer. 3.
Performing Basic Network Configuration T To Power On the KVM/net 1. Make sure the KVM/net’s power switch is off. The power is off when the side of the power switch with the circle is pressed down. 2. Plug in the power cable. 3. Turn the KVM/net’s power switch on. The KVM/net beeps once. T To Power On Connected Devices Do this after “Connecting Servers to the KVM Ports” on page 78. • Turn on the power switches of the connected computers and devices.
Performing Basic Network Configuration DNS server’s IP address: Gateway IP address: Network mask: KVM/net’s MAC address (from the label on the bottom): NTP server’s IP address (if you are using a time/date server): Note: The following procedures tell you to disable DHCP. Enabling DHCP requires a DHCP server at your site.
Performing Basic Network Configuration Note: Changing the default password closes a security hole that could be easily exploited. 1. Enter the passwd command. [root@ KVM/net /]# passwd 2. Enter a new password when prompted. New password: new_password Re-enter new password: new_password Password changed T To Use the wiz Command to Configure Network Parameters 1. Launch the Configuration Wizard by entering the wiz command. [root@ KVM/net /]# wiz 2. At the prompt, enter n to change the defaults.
Performing Basic Network Configuration 6. Enter the domain name. Domain name[cyclades.com]: domainname 7. Enter the IP address of the DNS (domain name) server. Primary DNS Server[192.168.44.21] : DNS_server_IP_address 8. Enter the IP address for the gateway. Gateway IP[eth0] : gateway_IP_address 9. Enter the netmask for the subnetwork. Network Mask[#] : netmask 10.To apply and confirm these parameters, see “To Apply and Confirm the Network Parameters Defined Using the wiz Command” on page 87.
Performing Basic Network Configuration 1. Review the values of all the network configuration parameters, as shown in the following screen example. The values shown are for example only. Current configuration: Hostname : kvm DHCP : disabled System IP : 192.168.45.32 Domain name : cyclades.com drwxr-xr-x 1 root Primary DNS Server : 192.168.44.21 Gateway IP : 198.168.44.1 Network Mask : 255.255.252.0 Are all these parameters correct? (y/n) [n] : 2. Enter y if the values shown are correct, or press Enter. 3.
Performing Basic Network Configuration Configuring Basic Networking Using the OSD This procedure requires a hardware connection already made between the KVM/net’s KVM management port and a local monitor, keyboard, and mouse, as described under “To Connect to the User 1 Management Port” on page 83. After the KVM/net and monitor are powered on, the OSD login screen appears. The following table shows how to perform common actions described in the following procedures when working with the OSD.
Performing Basic Network Configuration Note: If your keyboard has a Return key instead of an Enter key, press the “Return” key when you see “Enter.” T To Log into the OSD 1. On the OSD login screen, enter “admin” as the Login name. 2. Enter the password. The default password is “cyclades.” If the password has been changed from the default, use the current password. 3. Press Enter. The OSD Main Menu appears. 4.
Performing Basic Network Configuration T To Change a Password Using the OSD 1. From the OSD Main Menu, go to Configure > Users and Groups > Local Users > Change Password. Warning! If the “admin” password has not been changed, change it now. Changing the default password closes a security hole that could be easily exploited. 2. Select the user name from the list of users on the User Database screen. 3. Enter a new password.
Performing Basic Network Configuration 4. Re-enter the new password. The password confirmation dialog box appears. 5. Press Enter. The Local Users menu appears. 6. Select Exit or press the Esc key to exit the Local Users menu. You can use the Exit or Cancel option or the Esc key to exit any window on the OSD. 7. If you are performing an initial configuration of basic networking parameters, see “To Configure Network Parameters Using the OSD” on page 92. 8.
Performing Basic Network Configuration 3. Enter the IP address for the KVM/net and press Enter. The Netmask form appears. 4. Enter the netmask (in the form 255.255.255.0) and press Enter. The Gateway form appears. 5. Enter the IP address for the gateway and press Enter. The DNS Server form appears.
Performing Basic Network Configuration 6. Enter the IP address for the DNS server and press Enter. The Domain form appears. 7. Enter the domain name and press Enter. The Hostname form appears. 8. Enter the hostname for the KVM/net and save the changes to complete the basic network configuration. The Configuration menu appears. • To configure an NTP (network time protocol) server or to enter the date and time manually, go to “To Set the Time and Date Using the OSD” on page 96.
Performing Basic Network Configuration • If you do not wish to configure the time and date at this time, and if you are performing an initial configuration of basic networking parameters, go to: “Completing Configuration Using the Web Manager” on page 98. • Otherwise, go to the appropriate menu option for your next task or exit from the OSD.
Performing Basic Network Configuration T To Set the Time and Date Using the OSD 1. From the Main menu of the OSD, go to Configure. The Configuration menu appears. 2. Select Date/time. The Date/time conf. form appears. 3. To enable the NTP time and date server, do the following. a. On the Date/time conf. form, select the “enabled” option.
Performing Basic Network Configuration b. Enter the IP address of the NTP server. c. Save the changes. 4. To enter the date and time manually, do the following. a. On the Date/time conf. form, select disabled. The Date entry screen appears. b. Enter the date in the format shown and press Enter. The Time entry screen appears. c. Enter the time in the format shown and save the changes.
Completing Configuration Using the Web Manager Completing Configuration Using the Web Manager The “admin” user can administer the KVM/net and its connected devices through the Web Manager without doing any additional configuration.
Changing Default Passwords Changing Default Passwords For security purposes, the root and admin users must change their default passwords as soon as possible. Not changing the default passwords leaves a big security hole that can be exploited. T Changing admin’s Default Password [Web Manager] 1. Bring up the Web Manager. 2. Log in as admin using the default password, “cyclades”. 3. In Wizard Mode, go to Step2: Access. 4. Select “admin” from the Users List. 5. Click the “Change Password” button. 6.
Changing Default Passwords b. Enter a new password when prompted. New password: new_password Re-enter new password: new_password Password changed 3. Save the new password by entering the saveconf command. [root@KVM /]# saveconf 4. Log out. [root@KVM /]# logout 5. Close the terminal session. 6. In a HyperTerminal application on a Windows PC, choose File > Exit or F4.
Enabling Access to the Web Manager without Making a Direct Connection Enabling Access to the Web Manager without Making a Direct Connection This section describes additional alternatives for enabling access to the Web Manager that do not require making a direct connection. Both of the two following approaches require an experienced administrator to configure: • The KVM/net ships with a default IP address: 192.168.160.10.
Enabling Access to the Web Manager without Making a Direct Connection 4. On a computer that resides on the same subnet with the KVM/net, change the network portion of the IP address of that computer to 192.168.160.NN, where NN is not 10, and change the Netmask to 255.255.255.0. For example, you could change the computer’s IP address to 192.168.160.44. For the host portion of the IP address, use any number except 10, 0, or 255. 5.
Enabling Access to the Web Manager without Making a Direct Connection See “To Connect to the Console Port” on page 82 for instructions if needed. b. Execute the command ifconfig eth0 Output similar to the following will appear. The line in bold type face labelled “inet address” lists the IP address of the KVM/net: eth0 Link encap:Ethernet HWaddr 00:60:2E:01:4F:FC inet addr:192.168.50.72 Bcast:192.168.51.255 Mask:255.255.252.
Preconfiguring the KVM/net for Remote Installation Preconfiguring the KVM/net for Remote Installation This section provides procedures that list the tasks for preconfiguring the KVM/net and setting it up in a separate location. You might preconfigure a KVM/net, for example, if you need to ship the KVM/net to a remote location that does not have a system administrator.
Additional Configuration Tasks T To Set Up a Preconfigured KVM/net Perform the tasks shown in the following table with a KVM/net that has been preconfigured as described in“To Preconfigure the KVM/net” on page 104. After the tasks are completed in the order shown, a remote administrator can bring up the Web Manager by entering the KVM/net’s fixed IP address in a browser. Task Where Documented 1 Set up the AlterPath KVM/net. “Setting Up the KVM/net” on page 75 2 Make an Ethernet connection.
Disabling Mouse Acceleration Disabling Mouse Acceleration In a KVM-over-IP session you should synchronize the mouse cursor on your local PC or laptop with the mouse cursor of the remote server attached to a KVM port. The mouse acceleration should be disabled on the remote server’s operating system. Depending on your server’s operating system refer to one of the following procedures.
Disabling Mouse Acceleration 4. In the Acceleration panel, click the “None” radio button. 5. Click OK. 6. To disable transition effects do the following: a. Go to: Control Panel > Display > Effects. b. Clear Use transition effects for menus and tooltips. c. Click OK. T To Disable Mouse Acceleration [Windows ME] 1. As an administrator, go to Settings > Control Panel > Mouse 2. From the Mouse Properties dialog box, click the Pointer Options tab. 3. Center the Pointer Speed slider bar. 4. Click Accelerate .
Disabling Mouse Acceleration b. Disable window, menu, and list animation by clearing “Animate windows, menus, and lists.” T To Disable Mouse Acceleration [Linux] This procedure assumes that you have the login name and password for an account configured with the following types of access: • Access on the KVM/net to the port where the computer is connected • Access as root on the connected computer 1.
Required Security Settings For Internet Explorer Required Security Settings For Internet Explorer The procedures described in this section must be performed on a PC running Windows XP with Service Pack 2 with Internet Explorer 5.5 or above, which is used to bring up the Cyclades Web Manager and the AlterPath Viewer. Modify IE Security Settings You must modify the IE security settings to enable ActiveX.
Required Security Settings For Internet Explorer 3. Click the Sites button to open the Trusted sites dialog box.
Required Security Settings For Internet Explorer 4. Add the KVM/net IP address to the list of the trusted sites and click the “Add” button. 5. Select the OK button to close the window. 6. Close the Internet Options dialog box. T To Modify “Internet” or “Local Intranet” Zone Settings 1. From the Internet Explorer menu bar, select Tools > Internet Options > Security Tab. The Security form appears.
Required Security Settings For Internet Explorer 2. Click the Custom Level button. The Security Settings form appears. 3. On the Security Settings form, go to ActiveX controls and plug-ins > Download signed ActiveX controls.
Required Security Settings For Internet Explorer 4. Select either Enable or Prompt. 5. If you selected Enable, press the OK button. 6. If you selected Prompt, go to Downloads > Automatic prompting for file downloads, and select Enable.
Required Security Settings For Internet Explorer 7. Select the OK button to close the window.
Chapter 3 Advanced Installation Procedures KVM/net supports the installation of related components, which are used to extend the access to and control of the KVM/net and its connected devices. The following table lists the components that can be installed with the KVM/ net and shows the page numbers where the tasks are described in more detail.
Connecting an External Modem Connecting an External Modem You can connect a modem to the AUX port on the KVM/net. After the modem is connected and properly configured, you can use it to dial in to the KVM/net when the production network or management network is down, or when Ethernet access is unavailable.
Connecting AlterPath PMs to the KVM/net Connecting AlterPath PMs to the KVM/net You can control an AlterPath Power Management (PM), intelligent power distribution unit (IPDU), by connecting it to the AUX port on the KVM/net. By daisy-chaining any combination of PM models, you can control up to 128 outlets from one KVM/net. T To Connect an AlterPath PM to the AUX Port 1. Use an RJ-45 CAT5 cable to connect the AUX port on the KVM/net to the In port of your AlterPath PM. 2.
Connecting AlterPath PMs to the KVM/net T To Connect Multiple PMs to the KVM/net This procedure assumes that you have one AlterPath PM connected to the AUX port of the KVM/net. See “To Connect an AlterPath PM to the AUX Port” on page 117 for the procedure. 1. Connect one end of an RJ-45 cable to the Out port of the “master” AlterPath PM, which is connected to the AUX port of the KVM/net. 2. Connect the other end of the RJ-45 cable to the In port of the next AlterPath PM (slave). 3.
Installing the AlterPath KVM Expander Installing the AlterPath KVM Expander The following table gives a high-level list of steps involved in setting up, installing, and configuring the KVM Expander with links to detailed information about each step.
Installing the AlterPath KVM Expander Shipping Box Contents KVM Expander The shipping box for the AlterPath KVM Expander contains the KVM Expander along with the items shown in Table 3-1. The entry for each part provides an illustration, its part number (P/N), description, and purpose. You can use check boxes to check off each item, and you can use the part numbers from this table to reorder any of the parts.
Installing the AlterPath KVM Expander Table 3-1: KVM Expander Shipping Box Contents, Part Numbers, and Description 5 Item P/N Description Purpose HAR0453 2 - Mounting brackets with 8 - screws (2 spares) Use to mount the KVM/net to a rack or wall. See “To Mount the KVM Expander” on page 122. When ordering the KVM Expander, customers also order one KVM Terminator for each server to be connected to one of the KVM ports.
Installing the AlterPath KVM Expander T To Mount the KVM Expander 1. Connect the two supplied brackets to the KVM Expander, connecting one bracket to each side of the box. a. Decide whether you need to mount the KVM Expander by the front or back and locate the appropriate sets of holes on the KVM Expander. The following figure shows the angle of a bracket being installed for rack mounting.
Installing the AlterPath KVM Expander Bracket The following figure shows the brackets as they appear from the top of the KVM Expander after the brackets are installed for wall mounting. Brackets KVM Expander back KVM Expander front KVM Expander top The following figure shows the bracket flanges on the front of the KVM Expander after the brackets are installed for rack mounting.
Installing the AlterPath KVM Expander Brackets c. Use a Phillips screwdriver to tighten the screws. 2. Use screws or nuts and bolts as appropriate to mount the KVM Expander on the wall, on a rack, or in a cabinet. 3. Use screws or nuts and bolts as appropriate to mount the KVM Expander on a rack. Powering On the KVM Expander and Connected Devices The KVM Expander has a power connector for power input and a power outlet for daisy chaining additional KVM Expanders or any other device.
Installing the AlterPath KVM Expander Power connector Power outlet Power switch T To Power On the KVM Expander 1. Make sure the KVM Expander’s power switch is off. The power is off when the side of the power switch with the circle is pressed down. 2. Plug in the power cable. 3. Turn the KVM Expander’s power switch on. T To Power On Devices Daisy Chained to the KVM Expander’s Power Outlet 1. Make sure the KVM Expander’s power switch is off.
Connecting Cascaded KVM Units to the Primary KVM/net Connecting Cascaded KVM Units to the Primary KVM/net The KVM/net supports the cascading of three types of secondary KVM devices: the AlterPath KVM, the KVM Expander, and the KVM/net.
Connecting Cascaded KVM Units to the Primary KVM/net T To Connect a Secondary KVM Unit to the Primary KVM/net 1. Power off all KVM hardware and connected devices. 2. To connect to the User 2 port of a secondary KVM unit, do the following: a. Connect one end of a CAT5 cable to a KVM port on the primary KVM/ net. b. Connect the other end of the CAT5 cable to the User 2 port on the secondary KVM unit. 3. To connect to the User 1 port of a secondary KVM unit, do the following: a.
Connecting Cascaded KVM Units to the Primary KVM/net T To Connect a KVM Expander to the Primary KVM/net See “Installing the AlterPath KVM Expander” on page 119 for background information on the KVM Expander. 1. Power off all KVM hardware and connected devices. 2. Connect one end of a CAT5 cable to a KVM port on the primary KVM/net. 3. Connect the other end of the CAT5 cable to the User A and or the User B port on the secondary KVM Expander.
Installing the AlterPath KVM RP Installing the AlterPath KVM RP With a CAT5 cable up to 500 feet long, the AlterPath KVM RP can be connected to the User 2 port of the KVM/net unit, enabling the extended user to perform local administration tasks or to select the local keyboard, video, and mouse console between a local station and a server connected to the KVM/net. Tasks Where Documented/Notes 1 Place the KVM RP on a desk or table up to 500 feet away from the KVM/net.
Installing the AlterPath KVM RP Shipping Box Contents AlterPath KVM RP The shipping box for the AlterPath KVM RP contains the KVM RP along with the items shown in Table 3-2. The entry for each part provides an illustration, its part number (P/N), description, and purpose. You can use check boxes to check off each item, and you can use the part numbers from this table to reorder any of the parts.
Installing the AlterPath KVM RP Table 3-2: KVM RP Shipping Box Contents, Part Numbers, and Description 5 Item T P/N Description Purpose CAB0147 KVM PS/2 Cable, 6FT Use to connect the VGA port, PS/2 keyboard port, and PS/2 mouse port on the back of your PC to the PC VGA port, PS/2 keyboard port, and PS/2 mouse port on the KVM RP. See “To Connect the KVM RP to the Local Work Station” on page 132 more information. To Connect the KVM RP to the KVM/net 1.
Installing the AlterPath KVM RP T To Connect the KVM RP to the Local Work Station 1. Connect your monitor’s VGA cable to the PC VGA port on the KVM RP. 2. Connect your keyboard’s PS/2 cord to the PC keyboard PS/2 port on the KVM RP. 3. Connect your mouse’s PS/2 cord to the PC mouse PS/2 port on the KVM RP. 4. Use a KVM cable to connect the VGA port, PS/2 keyboard port, and PS/2 mouse port on the back of your PC to the PC VGA port, PS/2 keyboard port, and PS/2 mouse port on the KVM RP.
Chapter 4 Web Manager for Administrators This chapter is for administrators who use the Web Manager for managing and configuring the KVM/net.
Common Tasks Administrative Modes Page 141 Wizard Mode Page 141 Expert Mode Page 159 Common Tasks The following table lists common tasks that KVM/net administrators perform with links to the procedures. Task Where Documented/Notes Select a pre-defined security profile, or configure a custom security profile.
Common Tasks Task Where Documented/Notes Configure power management for the AUX port (if the port is connected to an optional AlterPath PM) • “To Configure the AUX Port for Use With an IPDU or an External Modem” on page 267 Manage power on an optional AlterPath PM) • “To View Status, Lock, Unlock, Rename, or Cycle Power Outlets” on page 163 • “To Configure a KVM Port for Power Management” on page 183 • “To View and Reset IPDU Information” on page 165 • “To Configure Users to Manage Specific Power Ou
Common Features of Administrators’ Windows Common Features of Administrators’ Windows The features of all Web Manager windows for KVM/net administrators are described in the following sections: • Control and logout buttons and KVM/net Information See “Administrators’ Control Buttons, Logout Button, and KVM/net Information.
Common Features of Administrators’ Windows Button Name Use The no unsaved changes button appears and a graphical LED appears in green when no changes have been made that need to be saved. The following table describes the logout button and the other information that displays in the upper right corner of all Web Manager windows. Window Area Purpose Click this button to log out.
Common Features of Administrators’ Windows For procedures specific to each mode, see “Administrative Modes” on page 141. T To Log In to the Web Manager as Admin This procedure assumes that the prerequisites described under “Prerequisites for Using the Web Manager” on page 19 are done and that you can connect to the Web Manager. 1. To bring up the Web Manager, enter the IP address of the KVM/net in the address (URL) field of a supported browser on a computer running a Windows operating system.
Common Features of Administrators’ Windows Figure 4-1:KVM/net Login Form If direct logins to KVM ports is enabled, a “port” field also appears in the login area of the screen, as shown in the following screen example. 2. If direct logins to ports is enabled, to bring up the Web Manager with the port number filled in, enter the IP address of the KVM/net followed by the port number in the form: IP_address/login.
Common Features of Administrators’ Windows See “Web Manager Login Screen” on page 316 for background information on the multiple ways to login to the Web Manager. 3. Enter your account’s username and password. If another administrator is already logged in as “admin,” the dialog box shown in the following screen example appear. Note: For more information about the number of simultaneous logins allowed, see “Guidelines for Using the KVM/net” on page 4. If the previous dialog box appears, go to Step 4. 4.
Administrative Modes Administrative Modes This section describes the two administrative modes of the web manager: • “Wizard Mode” on page 141 • “Expert Mode” on page 159 In Expert mode, the Wizard button is displayed. In Wizard mode, the Expert button is displayed. Clicking these buttons toggles between Wizard and Expert mode. Expert is the default mode. Wizard Mode The Wizard mode guides the administrator through four configuration steps. The following figure shows a typical window in Wizard mode.
Wizard Mode Left menu Form area Figure 4-2:Example Window in Wizard Mode After you log in as described in “To Log In to the Web Manager as Admin” on page 138, Expert mode is in effect by default. To change to Wizard mode, select the Wizard button, which displays only in Expert mode. Procedures in Wizard Mode The following table lists all procedures that are performed in Wizard mode.
Wizard Mode To Add a Syslog Server [Wizard] Page 158 To Delete a Syslog Server [Wizard] Page 159 Steps in Wizard Mode [Wizard] Four configuration steps display in the left menu of the Web Manager in Wizard mode. The following table lists the sections where the steps are described.
Wizard Mode 3. Open - The Open profile enables all services such as Telnet, SSHv1, SSHv2, HTTP, HTTPS, SNMP, RPC, ICMP, and Telnet. Direct access to KVM connections are available. The following table show the enabled protocols and services under each Security Profile.
Wizard Mode Table 4-2: Available Protocols and Services under the Custom Security Profile Security Profile SSH Access Web Access Protocols Custom • SSHv1 • SSHv2 • HTTP • HTTPS SSH Options •SSH port 22 • allow root access HTTP Options • HTTP port 80 • HTTP redirects to HTTPS • HTTPS port 443 • • • • • • Telnet SNMP IPSec FTP RPC ICMP allow Direct Access to KVM Ports T To Select or Configure a Security Profile [Wizard] Note: The following procedure assumes you have installed a new KVM/net at y
Wizard Mode Figure 4-3:Security Advisory Dialog Box Note: Your browser’s pop-up blocker should be disabled for this dialog box to appear. 2. Review the Security Advisory and click the “Close” button. 3. The Web Manager is redirected to Wizard > Step 1: Security Profile The following form is displayed.
Wizard Mode Figure 4-4:Security Profile in Wizard Mode 4. Select a pre-defined Security Profile by pressing one of the “Secured”, “Moderate”, “Open”, or “Default” profiles, or create a “Custom” profile.
Wizard Mode Figure 4-5:Custom Security Profile Dialog Box Caution! Take the required precautions to understand the potential impacts of each individual service configured under the "Custom" profile. Refer to Table 4-1 on page 144 for a comparison of the available services in each security profile. Refer to the Glossary for a definition on the available services. Note: It is not possible to continue working in the Web Manager without selecting a Security Profile.
Wizard Mode other sections of the Web Manager. 5. Once you select a security profile or configure a custom profile and apply the changes, the KVM/net Web Manager restarts in order for the changes to take effect. The following dialog box appears. 6. Select “apply changes” to save the configuration to Flash. KVM/net Web Manager restarts. 7. Login after Web Manager restarts. 8. The Web Manager defaults to Access > Connect to Server page.
Wizard Mode the administrator configures the default basic network settings that were needed to enable logins through the Web Manager. (See “Performing Basic Network Configuration” on page 84, if desired, for more information about the initial network configuration.) You can skip this step if the current settings are correct. Check with your network administrator if you are not sure.
Wizard Mode Figure 4-6:Network Settings in Wizard Mode 3. If the “DHCP” check box is not checked, enter the network information in the fields. 4. Click the “apply changes” button. Note: If you change the KVM/net’s IP address and apply the changes, you will need to reconnect to the Web Manager with the new IP address. 5. Press the “Next” button or select “Step 3: Access” from the left menu.
Wizard Mode Figure 4-7:User Access in Wizard Mode The Access form lists the currently defined Users and has three buttons: Add, Change Password, and Delete. In the Users list, by default, are two user accounts that cannot be deleted: • Admin • Generic User The Admin (the “admin” account) has access to all functions of the Web Manager and has access to all ports on the KVM/net. The Generic User defines the access permissions for all users except the admin and root users.
Wizard Mode Note: To perform advanced configuration of users and groups, for example, to restrict user access to KVM ports, or to create a group, go to Expert>Configuration>Users and Groups. T To Add a User [Wizard] 1. In Wizard mode, go to Step 3: Access. The Access form appears. 2. Click Add. The “Add User” dialog box appears.
Wizard Mode 3. Enter the required information in the fields as shown in the following table. Field Name Definition Username The username for the account being added. Password The password for the account. Group On the drop-down list, Select Regular User [Default] or Admin. Note: To configure a user to be able to perform all KVM/net administration functions, select the “Admin” group. See “Types of Users” on page 14, if needed, for more background. Shell Optional.
Wizard Mode T To Delete a User [Wizard] 1. In Wizard mode, go to “Step 3: Access.” The “Access” form appears. 1. Select the user name to delete. 2. Click “Delete.” The username disappears from the Users list. 3. Click the “apply changes” button. T To Change a Password [Wizard] Note: Leaving the default admin or root passwords unchanged would leave the KVM/net and connected devices open to anyone who knows the default passwords and the KVM/net’s IP address.
Wizard Mode 2. Select the name of the user whose password you want to change. 3. Click “Change Password.” The “Change User Password” dialog box appears. 4. Enter the new password in both fields, and click OK. 5. Click the “apply changes” button.
Wizard Mode Step 4: System Log [Wizard] In Wizard mode, selecting “Step 4: System Log” brings up a form for identifying one or more syslog servers to receive syslog messages from the KVM/net. Figure 4-8:System Log in Wizard Mode Before performing this procedure, make sure an already-configured syslog server is available to the KVM/net.
Wizard Mode The following table has links to the procedures for adding and deleting a syslog server. To Add a Syslog Server [Wizard] Page 158 To Delete a Syslog Server [Wizard] Page 159 Use this form to configure system logging for the KVM/net. More advanced configuration of syslog servers and event notification can be done in Expert mode.
Expert Mode T To Delete a Syslog Server [Wizard] 1. From the Syslog Server list, select the syslog server that you want to delete from the current facility location, and select Delete. 2. Repeat this step for as many servers you need to delete. 3. Click “apply changes.” Expert Mode To perform advanced configuration, click the Expert button at the bottom of the left menu to switch to Expert mode. The following figure shows a typical window in Expert mode.
Access An option in the left menu (such as KVM in the preceding figure) often has several forms associated with it. Selecting a tab labeled with the name of the form or selecting the form’s name in the left menu brings up the form. Note: Procedures in this manual use shortcuts to tell how to get to Web Manager forms. For example, a step telling the user to access the “User 1” form in the right tab in the above figure would use this convention, “In Expert mode, go to Configuration>KVM>General>User 1.
Access See the following sections for details about the tasks performed using the forms under Access in Expert mode. • “Connect to Server” on page 161 • “IPDU Power Management” on page 161 For instructions for forms that allow the regular user to connect to ports on the KVM/net to administer connected devices and perform power management, see Chapter 5: Web Manager for Regular Users.
Access You can manage power when the following two prerequisites are completed: • An AlterPath PM is connected to an AUX port on the KVM/net. The AlterPath PM can be daisy chained to allow you to manage power for up to 128 devices from the KVM/net. See “To Connect an AlterPath PM to the AUX Port” on page 117 for installation procedures. • The AUX port is configured for power management. See “To Configure the AUX Port for Use With an IPDU or an External Modem” on page 267.
Access • Unlock the outlets • Assign a name to the outlet, for example, identify the device for which it provides power. • Change the power up interval. The power up interval is the time interval (in seconds) that the system waits between turning on the currentlyselected outlet and the next outlet. Figure 4-12:Power Management - Outlets Manager Form T To View Status, Lock, Unlock, Rename, or Cycle Power Outlets 1. In Expert mode, go to Access> IPDU Power Mgmt.> Outlets Manager.
Access 4. To momentarily power an outlet off and then on again, click the adjacent “Cycle” button. 5. To change the outlet’s name or the power up interval, click the adjacent “Edit” button. The Edit Outlet dialog box appears. a. To change the name assigned to the outlet, enter a new name in the “Outlet Name” field. b. To change the time between when this outlet is turned on and another can be turned on, change the default 0.50 number of seconds in the “Power Up Interval” field. 6. Click OK. 7.
Access • Alarm threshold levels • Firmware version You can also clear values for the maximum current and the maximum temperature. Figure 4-13:Power Management - View IPDUs Info Form T To View and Reset IPDU Information 1. In Expert mode, go to Access>IPDUPower Management>View IPDUs Info. The “View IPDUs Info” form appears. 2. To clear the stored values for the maximum detected current, select the “Clear Max Detected Current” button. 3.
Access T To Configure Users to Manage Specific Power Outlets 1. In Expert mode, go to Access>IPDUPower Management>Users Manager. The “Users Manager” form appears. 2. To remove a user’s ability to manage power, select the username and click “Delete.” 3. To edit a user, select the username from the view table and click “Edit.” Skip to Step 5. The “Add/Edit User x Outlets” dialog box appears. 4. To add a new user, click “Add.” The “Add/Edit User x Outlets” dialog box appears.
Access 5. In the “Add/Edit User x Outlets” dialog box, do the following as appropriate. a. Enter the username in the “User” field. b. Enter or modify the numbers of the outlets to which the user is assigned in the “Outlets” field. Use a comma to separate outlet numbers, and use a hyphen to indicate a range of outlets (for example: 1, 3, 6, 9-12). 6. Click OK. 7. Click “apply changes.
Access Figure 4-15:Power Management - Configuration Form T To Specify or Change the Alias of an IPDU 1. In Expert mode, go to Access>IPDUPower Management>Configuration. The Configuration form displays entries for all ports configured for power management. 2. In the Name field, enter the alias of the IPDU. 3. Click “apply changes.” T To Configure Creation of Alarms and Syslog Files for IPDUs 1. In Expert mode, go to Access>IPDUPower Management>Configuration.
Configuration Software Upgrade On the “Outlets Manager” form under Access>IPDUPower Management in Expert mode, you can upgrade the Power Management firmware for AlterPath PM IPDUs. Figure 4-16:Power Management - Software Upgrade Form An entry appears for every connected PM and for each slave. The version of the currently installed firmware displays on the form. T To Upgrade Firmware on an AlterPath PM 1.
Configuration Figure 4-17:KVM Configuration General Form See the following sections for details about the tasks performed using the forms under Configuration in Expert mode: • • • • • • “KVM” on page 170 “Configuring Inband (RDP) Servers” on page 199 “Security” on page 204 “Network” on page 226 “AUX Port” on page 266 “System” on page 268 KVM Selecting Configuration>KVM in Expert mode brings up KVM options in the left menu as shown in the following figure.
Configuration You can use the KVM menu options for custom configuration of KVM ports. The following table provides links to the sections where the options are described. Web Manager Form Where Documented General “General” on page 171 Devices • “Configuring Individual KVM Ports” on page 183 • “Configuring Cascaded KVM Units” on page 187 Users & Groups “Users & Groups” on page 191 General Selecting Configuration>KVM>General in Expert mode brings up the form shown in the following figure.
Configuration The following table provides links to the sections that describe how to use the forms under Configuration>KVM>General in Expert mode. General “General” on page 172. User 1 , User 2, and IP Users “Local Users and IP Users” on page 176 General On the General form under Configuration>KVM>General in Expert mode, you can specify the parameters shown in the following table, which offers cross-references to where you can find more information on each parameter.
Configuration Parameter Name Definition Where Documented Port Authentication Allows you to choose an authentication method for “Direct Access” only. • “See “Configuring Authentication Servers for Logins to the KVM/net and Connected Devices” on page 208.” on page 207 “To Configure an Authentication Method for KVM/net Logins” on page 206 Note: To enable the port authentication drop-down menu, activate the “Direct Access” option.
Configuration The following table summarizes the format of the hot keys for KVM connections, the defaults, and where they can be redefined. Common Escape Sequence Command Key Where Defined Format “Ctrl” + “letter key” “letter key” • Configuration>KVM>General> General Defaults Ctrl+k “p” to bring up the “power management” window, “q” to quit. See Table 6-4, “Default KVM Connection Keyboard Shortcuts,” on page 329 for all the default command keys.
Configuration 4. On the “User 1”, “User 2”, or “IP Users” tab, redefine the command keys, if desired, in any of the following fields: “Quit,” “Power Management,” “Mouse/Keyboard Reset,” “Video Control,” “Switch Next,” “Switch Previous,” “Port Info.” 5. Click “apply changes.” Redefining Sun Keyboard Modifier Keys The KVM/net provides a default set of hot keys for use while connected to Sun servers.
Configuration Note: The Port Authentication drop-down menu is disabled by default. To enable, activate the “Direct Access” check box on the KVM > General form. If the “Direct Access” check box is greyed out, you need to modify the security profile to Open, or select the Custom security profile and enable “Access to KVM Ports” option. See Configuration>Security>Profile form. Authentication method serves as a direct access authentication to the connected servers or devices only.
Configuration Figure 4-18:KVM Configuration User 1/User 2/IP Users Form On the “User 1” form under Configuration>KVM>General in Expert mode you can redefine the default session parameters that apply when a user (called the Local User) is using the OSD through a direct connection to the KVM. On the “User 2” form, you can redefine the default session parameters that apply when a user is using the OSD through a KVM RP connection to the User 2 port on the KVM/net.
Configuration The following tables describes the parameters that appear on the User 1 and User 2 forms. Table 4-4: User 1 and User 2 forms parameters Field Name Definition Idle Timeout (min) Sets the maximum time (in minutes) for the session to be idle before it is closed. The default value is 3 minutes. The maximum value is 60 minutes. A value of 0 disables the idle timeout. Screen Saver Timeout (min) Sets the time (in minutes) for the session to be idle before the screen saver activates.
Configuration Table 4-5: IP Users form parameters Field Name Definition Idle Timeout (min) Sets the maximum time (in minutes) for the session to be idle before it is closed. The default value is 3 minutes. The maximum value is 60 minutes. A value of 0 disables the idle timeout. TCP Viewer Ports Change the number of the TCP port used for the AlterPath Viewer. [IP Users only.] The default is 5900+. You may need to change the default, for example, if your firewall is blocking port 5900.
Configuration Note: The User 1 and User 2 forms are identical except that User 1 modifies the User 1 port options, while User 2 modifies the User 2 port options. 4. To change the idle timeout, enter a different number of minutes in the “Idle Timeout” field. 5. To change the screen saver timeout, enter a different number of minutes in the “Screen Saver Timeout” field. 6. To change the keyboard type, select a different keyboard from the “Keyboard type” drop-down list. 7.
Configuration 2. Modify the number of minutes in the “Idle Timeout” field, and the number of seconds in the “Cycle Time” field, if desired. The default is 3 minutes and 5 seconds respectively. 3. In the “TCP Viewer Ports” field change the TCP port number used by the AlterPath Viewer, if required. 4. Check the appropriate radio button for no encryption (Level 0), keyboard and mouse data encryption (Level 1), or video, keyboard, and mouse data encryption (Level 2).
Configuration Devices Selecting Configuration>KVM>Devices in Expert mode brings up the form shown in the following figure. Figure 4-19:KVM Device Configuration Form The device name “master” stands for the KVM/net, which is the master KVM unit in a cascaded configuration. Other device names may appear below “master” depending on the number of KVM units cascaded to the master.
Configuration Configuring Individual KVM Ports On the Modify Port dialog box, you can do the following: • Configure an alias for a single KVM port • Assign a Lockout Macro to the KVM connected server • Configure power management for the server that is connected to the KVM port while the user is logged in to the server • Enable or disable KVM ports The following table lists the related procedures with links to where they are described.
Configuration IPDU connected to the cascaded KVM to servers connected to the master KVM/net. The following error message appears if you try to configure a master KVM port with the slave connected IPDU. • If the KVM port is on the cascaded device, for example Slave-1, the power outlets can be assigned from the IPDUs connected to the master KVM/net or from the IPDUs connected to Slave-1.
Configuration 3. Select the port you want to modify and click the Modify button. The Modify Port dialog box appears. 4. In the Alias field, type an alias for the port 5. In the Lockout Macro field, enter the key sequence assigned to lock the server. See “Lockout Macro Key Sequences” on page 50. 6. In the Device.Outlet field, type the outlet number(s) of the IPDU that the server is plugged into. Use commas (,) to separate outlets and use a hyphen (-) to indicate a range.
Configuration T To Specify or Change the Alias for a KVM Port 1. Go to Configuration>KVM>Devices in Expert mode, select the device that includes the port(s) you wish to modify. 2. Click the “Ports” button. A list of all the selected ports appears. 3. Select a single port to be modified, and then select the “Modify” button. The “Modify Port” dialog box appears. 4. To change the port’s alias, do the following steps. a. Enter a new alias in the “Alias” field. b. Click OK on the dialog box. 5.
Configuration Configuring Cascaded KVM Units The Devices form allows you to configure one or more secondary KVM units to a primary KVM unit, a process also known as cascading or daisy-chaining. See “Cascaded Devices” on page 21 for background information. Selecting Configuration>KVM>Devices in Expert mode brings up the Devices form on which you can perform the following tasks. • Add a secondary KVM unit to be cascaded from the master KVM/net.
Configuration 2. Click the Add Device button. The Modify Device dialog box appears. 3. In the Device Name field, specify a name for the secondary device or KVM unit. 4. In the Number of Ports field, enter the number of ports contained in the cascaded device. 5. In the KVM Port Connected to User 2 (KVM) or B (Expander) drop-down list, enter the port number of the master KVM/net that is connected to the User 2 port of the secondary KVM device or the B port on the Expander.
Configuration Note: See “Connecting Cascaded KVM Units to the Primary KVM/net” on page 126 for a background on the possible devices that can be cascaded and for instructions on connecting these devices to the master KVM/net. 6. In the Port Connected to User 1 or (KVM) or A (Expander) drop-down list, enter the secondary KVM port that is connected to the User 1 port of the primary KVM/net or the User A port on the Expander. 7. Click the OK button when done. 8.
Configuration 3. In the Number of Ports field, enter the number of ports contained on the cascaded device. 4. To enable one user to access the ports on the cascaded KVM unit, in the KVM Port Connected to User 2 (KVM) or B (Expander) drop-down list, select the port number on the master KVM/net that is connected to the User 2 port on the secondary KVM device or the B port on the Expander.
Configuration T To Delete the Configuration of a Cascaded KVM Unit 1. In Expert mode, go to: Configuration>KVM>Devices. The Devices form appears. 2. Select the item you wish to delete and click the Delete button. The system deletes the selected device. 3. Click “apply changes” to save your configuration. Users & Groups Selecting Configuration>KVM>Users & Groups in Expert mode brings up the form shown in the following figure.
Configuration Figure 4-20:KVM Users & Groups Configuration Form You can use the Users & Groups form to do the following: • Add or delete users. • Assign or change user passwords. • Reset the permissions of the Generic User. Note: Permissions assigned to the Generic User define the default permissions for regular users. • Set unique permissions for individual users. • Assign permissions by group. • Add or delete user groups from the Group Access List and assign users to a group.
Configuration The “Add User” dialog box appears. 3. Either type the required information in the fields or select the desired option from the drop-down list as shown in the previous screen and defined in the following table. Field Name Definition Username Name of the user to be added. Password The password associated with the user name. Group On the left drop-down list, select “Regular User [Default]” or “Admin.
Configuration 4. Click OK. 5. Click “apply changes.” T To Delete a User or Group [Expert] 1. In Expert mode, go to Configuration>Users & Groups. The Users & Groups form appears. 2. Select the name of a user or group to delete. 3. Click “Delete.” 4. Click “apply changes.” T To Change a User’s Password [Expert] 1. In Expert mode, go to Configuration>Users & Groups. The Users & Groups form appears. 2. Select the name of the user whose password you want to change. 3. Click “Change Password.
Configuration 5. Click OK. 6. Click “apply changes.” T To Modify a Group 1. In Expert mode, go to Configuration>Users & Groups. The Users & Groups form appears. 2. Select the name of a group to modify. 3. Click “Edit.” The “Edit Group” form appears. 4. Add or delete users from the group as desired. 5. Click OK. 6. Click “apply changes.” T To Select Users and Groups for Assigning KVM Port Access Perform this procedure to select users to access computers connected to KVM ports. 1.
Configuration 3. To set KVM port access permissions for a group, select the name of the group from the Group List. 4. Click the “Set KVM Permissions” button. The “KVM Access list for “username” or “groupname” dialog box appears. Note: When the “Default Access List” check box is checked, the user or group has the same permissions that are assigned to the Generic User. Changes made on this form when a username is selected convert the user into a non-generic user. 5.
Configuration 4. Select the desired access option from the “Default Permission:” drop-down list. As shown in the previous screen example, the options are: “No access,” “Read only,” “Read/Write,” “Full access.” 5. To configure access to a device and all of its ports, do the following: a. Select one or more devices from the Device list. b. From the Default Permissions drop-down list, select the permissions you wish to apply. c. Go to Step 8. 6.
Configuration In the fields for each desired category, type either port aliases or numbers, separating them either by commas or dashes. 7. Click OK. The newly set permissions appear next to the Device name in the Permissions column, as shown in the following screen example, which shows the restrictions applied to the user name “johnr.” The following screen example illustrates how the previous settings affect access to ports.
Configuration 8. Click OK. 9. Click “apply changes.” Configuring Inband (RDP) Servers Selecting Configuration>Inband in Expert mode brings up the form displayed in the following figure. Figure 4-21:Inband Configuration Form You can use the Add, Edit, and Delete buttons to configure inband server connections to Windows Terminal Servers using RDP. Up to 16 or 32 inband servers can be configured on a KVM/net depending on the model ordered.
Configuration whole infrastructure (master and cascaded devices). Even though it is possible to configure a KVM port on the master or on any cascaded device for each inband server, all inband configuration and connections are done through the master KVM/net. For more complete access and as a backup to inband connection failures, inband servers can also be connected to KVM ports on the KVM/net.
Configuration See “To Connect Computers to KVM Ports” on page 80 for instructions on physically connecting a server to a KVM/net port. Note: RDP connections does not work if IPSec is used to communicate with a RDP enabled server. NAT is used when a connection is established from the workstation to a RDP enabled server. IPSec does not allow NAT'ed packets. Note: Remote drives and printers are accessible through RDP.
Configuration The connected server must be a Windows (Win2000 or NT) Terminal Server with RDP enabled. 3. To modify a server, select the server on the list and click Modify. 4. In the Server Name field, specify a unique name for the inband server. This name will appear in the drop-down list on the Connect to Server form. Note: Once a name is given to an inband server, it cannot be modified.
Configuration This enables both inband and out-of-band access to the connected server. If the inband connection fails or if an RDP session already exists, the user is able to reconnect to the server using a KVM connection. This also enables users to view the BIOS, POST, and boot messages for server administration. 8. Click OK to close the dialog box. 9. Specify the TCP ports or a range of TCP ports to be used in the RDP Viewer Ports field.
Configuration 12.To connect to the inband server, in Expert mode, go to Access>Connect to Server. See “To Connect to Servers Through The Web Manager’s “Connect To Server” Form” on page 322. T To Delete an inband (RDP) Server 1. In Expert mode, go to: Configuration>Inband. The Inband form appears. 2. Select the inband server from the list and click Delete. 3. Click “apply changes.
Configuration Configuring an Authentication Method Configuration>Security>Authentication in Expert mode brings up the form shown in the following figure. Authentication Form Tabs Pull-down Menu of Authentication Methods Figure 4-22:Authentication Configuration Form The administrator uses the Authentication forms for two main purposes: • To select an authentication method for the KVM/net only. The default authentication method for the KVM/net is Local.
Configuration Any authentication method chosen for the KVM/net is used for authentication of any users attempting access through telnet, ssh, or the Web Manager. See “Authentication” on page 45 for more details. • To configure all authentication servers for the KVM/net ports. The administrator fills out one of the tabbed forms to set up an authentication server for each authentication method to be used by the KVM/net and by any of its ports: RADIUS, TACACS+, LDAP, Kerberos, SMB (ports only), NIS.
Configuration 3. Make sure that an authentication server is specified for the selected authentication type. See “Configuring Authentication Servers for Logins to the KVM/net and Connected Devices” on page 208. T To Configure an Authentication Method for KVM Port Logins This procedure configures a single authentication method that applies whenever anyone attempts to log in to a device through a connected KVM port. 1. Go to Configuration>KVM>General in Expert mode. The General form appears. 2.
Configuration Configuring Authentication Servers for Logins to the KVM/ net and Connected Devices The administrator fills out the appropriate form to set up an authentication server for every authentication method to be used by the KVM/net and by any of its ports. The available authentication methods are RADIUS, TACACS+, LDAP, Kerberos, SMB/NTLM, and NIS. The following table lists the procedures that apply to each authentication method.
Configuration Group Authorization Group authorization adds an additional level of system security by enabling a network-based authorization in addition to the initial authentication. A group information retrieval from the TACACS+, RADIUS, LDAP, and NTLM authentication servers enables authorization in addition to authentication. An administrator can configure the authentication server to add group authorization checking.
Configuration of the KVM/net and connected devices know the passwords assigned to the accounts: • An account for “admin” • If Kerberos authentication is specified for the KVM/net, accounts for all users who need to log in to the KVM/net to administer connected devices. • If Kerberos authentication is specified for KVM ports, accounts for users who need administrative access to connected devices 1. Make sure an entry for the KVM/net and the Kerberos server exist in the KVM/net’s /etc/hosts file. a.
Configuration 4. Go to Security > Authentication> Kerberos in Expert mode. The Kerberos form displays as shown in the following figure. Figure 4-24:Kerberos Server Authentication Form 5. Fill in the form according to your local setup of the Kerberos server. 6. Click “apply changes.
Configuration T To Identify an LDAP Authentication Server Perform this procedure to identify the authentication server when the KVM/ net or any of its ports is configured to use the LDAP authentication method or any of its variations (LDAP, Local/LDAP, LDAP/Local, or LDAP/ DownLocal).
Configuration Figure 4-25:LDAP Server Authentication Form 2. Supply the IP address of the LDAP server in the “LDAP Server” field. 3. If the LDAP authentication server uses a different distinguished name for the search base than the one displayed in the “LDAP” Base field, change the base definition. The default distinguished name is “dc,” as in dc=value,dc=value. If the distinguished name on the LDAP server is “o,” then replace dc in the base field with o, as in o=value,o=value. 4.
Configuration T To Configure Group Authorization on a LDAP Server On the LDAP server edit the “info” attribute for the group and add the following syntax. info: group_name=[,,...,]; T To Configure an SMB(NTLM) Authentication Server Perform the following to identify the authentication server if any of the ports is configured to use the NTLM (Windows NT/2000/2003 Domain) authentication method or NTLM/Downlocal. 1. Go to Configuration>Authentication>SMB(NTLM) in Expert mode.
Configuration MMC Snap-in for adding the attribute "info" to the objectclass "Users”, and the ADSI Edit MMC Snap-in to edit the property "comment" as "group_name= [,]; 1. Install the tools from the Windows Administration Pack. 2. Select [Start] > [Run] from the windows desktop. 3. In the Run field type "mmc /a" and click [OK]. A Console window appears. 4. Click Console in the console window menu bar and select "Add/Remove Snap-in ...". The "Add/Remove Snap-in" window appears. 5.
Configuration You will see the path "Domain NC[domain.com]. 3. Double click "Domain NC[domain.com]. You will see expanded path "DC=xxx,DC=xxx,DC=com". 4. Double click "DC=xxx,DC=xxx,DC=com". You will see the expanded classes "CN=Builtin, ..." 5. Double click "CN=Users". You will see the expanded users list. 6. Right click an admin user and select "Properties". You will see the window "CN= Properties". 7. In the Optional, "Select a property to view:" , locate [comment]. 8.
Configuration Figure 4-27:NIS Server Authentication Form 2. Fill in the form according to your configuration of the NIS server. 3. Click “Done.” 4. Click “apply changes.” T To Identify a RADIUS Authentication Server Perform this procedure to identify the authentication server when the KVM/ net or any of its ports is configured to use the RADIUS authentication method or any of its variations (Local/RADIUS, RADIUS/Local, or RADIUS/ DownLocal). 1. Go to Configuration>Authentication>RADIUS in Expert mode.
Configuration Figure 4-28:Radius Server Authentication Form 2. Fill in the form according to your local setup of the RADIUS server or servers. 3. Click “Done.” 4. Click “apply changes.” The changes are stored in /etc/raddb/server on the KVM/net. T To Configure Group Authorization on a RADIUS Server 1. On the server, edit /etc/raddb/users and add a new string attribute (ATTRIBUTE Framed-Filter-Id 11) similar to the following example.
Configuration T To Identify a TACACS+ Authentication Server Perform this procedure to identify the authentication server when the KVM/ net or any of its ports is configured to use the TACACS+ authentication method or any of its variations (Local/TACACS+, TACACS+/Local, or TACACS+/DownLocal). 1. Go to Configuration>Authentication>TACACS+ in Expert mode. The TACACS+ form appears. Figure 4-29:Tacacs+ Server Authentication Form 2.
Configuration have administrative access, and users with regular user privileges have regular user access. 4. To specify a time out period in seconds for each authentication attempt, type a number in the “Timeout” field. If the authentication server does not respond to the client’s login attempt before the specified time period, the login attempt is cancelled. The user may retry depending on the number specified in the “Retries” field on this form. 5.
Configuration T To Configure Group Authorization on a TACACS+ Server 1. On the server, add “raccess” service to the user configuration and define which group or groups the user belongs to. user = usergroup1 { service = raccess { group_name = [,,...,]; } } 2. If "raccess" service is already defined, add the group information to it. 3. “Enable Raccess Authorization” on KVM/net through the Web Manager at Configuration>Security>Authentication>Tacacs+ form.
Configuration The following table show the enabled protocols and services under each Security Profile.
Configuration Table 4-7: Available Protocols and Services under the Custom Security Profile Security Profile SSH Access Web Access Protocols Custom • SSHv1 • SSHv2 • HTTP • HTTPS SSH Options •SSH port 22 • allow root access HTTP Options • HTTP port 80 • HTTP redirects to HTTPS • HTTPS port 443 • • • • • • Telnet SNMP IPSec FTP RPC ICMP allow Direct Access to KVM Ports T To Select or Configure a Security Profile [Expert] Selecting Configuration>Security>Profiles brings up the form shown in the
Configuration 1. Select a pre-defined Security Profile or click on the “Custom” button to configure individual protocols and services. The following “Custom Profile” dialog box opens. Figure 4-31: Custom Security Profile Dialog Box Caution! Take the required precautions to understand the potential impacts of each individual service configured under the "Custom" profile. Refer to Table 4-1 on page 144 for a comparison of the available services in each security profile.
Configuration 3. Select “apply changes” to save the configuration to Flash. KVM/net Web Manager restarts. 4. Login after Web Manager restarts. 5. The Web Manager defaults to Access > Connect to Server form. Proceed to the desired forms and the related tasks outlined in the table below.
Configuration Network Selecting Configuration>Network in Expert mode brings up the following form. Figure 4-32:Host Settings Configuration Form Network configuration comprises eight forms: Table 4-9: Network Forms Form Use this form to: Where Documented Host Settings Configure host connections, including: Ethernet Port connections, DNS Service, and Name Service Access. “Host Settings” on page 228 Syslog Define the Syslog Servers to enable system logging.
Configuration Table 4-9: Network Forms (Continued) Form Use this form to: Where Documented IP Filtering Configure the selective filtering of packets that may potentially crack your network system or generate unnecessary traffic. “IP Filtering” on page 233 VPN Configure IPsec tunnels to establish a secure connection between KVM/net and a security gateway machine. “VPN” on page 250 SNMP Configure the SNMP server to manage complex networks.
Configuration Host Settings When Configuration>Network>Host Settings is selected in Expert mode, the form shown in the following figure appears. T To Configure Host Settings [Expert] The Host Settings form allows you to configure the network settings for the KVM/net. 1. Go to Expert>Network>Host Settings. The Host Settings form appears. 2. By default, the DHCP is enabled. To disable DHCP, clear the DHCP check box. The system adds the Ethernet Port and DNS Service sections.
Configuration 3. Complete or edit the fields described in the following table as necessary. Table 4-10: Host Settings Configuration Fields Field Name Definition Host Name The fully qualified domain name identifying the specific host computer within the Internet. Console Banner A text string designed to appear on the console upon logging into and exiting from a port as a way to verify or identify the particular port connection.
Configuration Table 4-10: Host Settings Configuration Fields (Continued) Field Name Definition Domain Name The name that identifies the domain (for example, domainname.com). Gateway IP The gateway numeric identification number. 4. Select “apply changes” when done to save your configuration to flash.
Configuration Syslog When Configuration>Network>Syslog is selected in Expert mode, the form shown in the following figure appears. . Figure 4-33:Syslog Configuration Form You can use the Syslog form to configure how the KVM/net handles syslog messages. The Syslog form allows you to do the following: • Specify one or more syslog servers to receive syslog messages related to ports. • Specify rules for filtering messages.
Configuration The top of the form is used to tell the KVM/net where to send syslog messages: • You can specify one facility number for messages from AUXports and another facility number for messages from KVM ports. Obtain the facility numbers to use from the syslog server’s administrator. See “To Add a Syslog Server [Wizard]” on page 158 for how syslogging is configured for the KVM/net under the Configuration>General form.
Configuration IP Filtering Selecting Configuration>Network>IP Filtering in Expert mode brings up the IP Filtering form as shown in the following figure. Figure 4-34:IP Filtering Configuration Form You can use the IP Filtering form to filter traffic to and from the KVM/net and block traffic according to rules you define. The KVM/net uses chains and rules for filtering packets like a firewall. Each entry in the list represents a chain with a set of rules.
Configuration Inverted Check Boxes If you check the “Inverted” check box on any line, the target action is performed on packets that do not match any of the criteria specified in that line when any other specified criteria are also met. For example, if you select DROP as the target action, check “Inverted” on the line with a source IP address specified, and do not specify any other criteria in the rule, any packets arriving from any other source IP address than the one specified are dropped.
Configuration Source or Destination IP and Mask If you fill in the “Source IP” field, incoming packets are filtered for the specified IP address. If you fill in the “Destination IP” field, outgoing packets are filtered for the specified IP address. If you fill in either “Mask” field, incoming or outgoing packets are filtered for IP addresses from the network in the specified netmask. The source and destination IP and related fields are shown in the following figure.
Configuration The following table defines the fields and menu options in the “TCP Options Section.” Field/Menu Option Definition Source Port - OR Destination Port -ANDto You can specify a source or destination port number for filtering in the “Source Port” or “Destination Port” field. If you specify a second number in the “to” field, TCP packets are filtered for any port number within the range that starts with the first port number and that ends with the second.
Configuration The following table defines the fields in the UDP Options Section. Field Definition Source Port - OR Destination Port -ANDto Specify a source or destination port number for filtering in the “Source Port” or “Destination Port” field. You can specify a source or destination port number for filtering in the “Source Port” field.
Configuration Input Interface, Output Interface, and Fragments If you enter an interface (such as eth0 or eth1) in the “Input Interface” field, incoming packets are filtered for the specified interface. If you enter an interface in the “Output Interface” field, outgoing packets are filtered for the specified interface. These fields are shown in the following figure. The following table defines the fields in the previous figure.
Configuration The following table defines the menu options, field, and check boxes in the “LOG Options Section.” Field or Menu Name Definition Log Level One of the options in the drop-down list: Log Prefix The prefix to use in the log entry. TCP Sequence Checking the box includes the TCP sequence in the log. TCP Options Checking the box includes TCP options in the log. IP Options Checking the box includes IP options in the log.
Configuration Firewall Configuration Procedures The following table has links to the procedures for defining packet filtering: T To Add a Chain Page 240 To Edit a Chain Page 240 To Edit a Rule for IP Filtering Page 241 To Add a Packet Filtering Rule Page 242 To Add a Chain 1. Go to Configuration>Network>Firewall Configuration in Expert Mode. The IP Filtering form appears. 2. Click “Add.” The “Add Chain” dialog box appears. 3.
Configuration Note:User-defined chains cannot be edited. 1. Go to Configuration>Network>Firewall Configuration in Expert Mode. 2. Select one of the default chains from Chain list, and then click the “Edit” button. If you select a user-defined chain, the following dialog box appears. If you select one of the default chains, the “Edit Chain” dialog box appears. 3. Select the desired policy from the Policy drop-down list, and then click OK. 4. Click “apply changes.” 5.
Configuration 2. Select a chain whose rule you want to edit. 3. Click the Edit Rule button. The Edit Rules form appears. Each line represents a rule for the selected chain. 4. Select the Chain you wish to edit from the Chain list, and click the Edit Rule button. The Edit Rules form appears. 5. Specify the rule as desired. See “IP Filtering” on page 233 for a definition of the input fields, if needed. 6. Click on the “apply changes” button to complete the procedure. T To Add a Packet Filtering Rule 1.
Configuration T To Add a Chain for IP Filtering 1. In Expert mode go to: Configuration>Network>IP Filtering. The IP Filtering configuration form appears. Each line in the list box represents a chain. For a definition or explanation of the field columns, refer to the introductory section of this procedure or to the field definitions for the Edit Rule dialog box, next section. 2. To add a chain, select the Add button. The Add Chain dialog box appears. 3.
Configuration 5. Select OK to commit your changes. 6. To add rules to your new chain, see “To Add a Rule for IP Filtering” on page 244. T To Edit A Chain for IP Filtering 1. In Expert mode go to: Configuration>Network>IP Filtering. The IP Filtering configuration form appears. 2. Select the Chain you wish to edit from the Chain list box (or filter table), and select the Edit button. The Edit Chain dialog box appears. 3. Modify the Policy field, as needed, and select OK. 4.
Configuration 2. Click the Edit Rule button. The Edit Rules for Chain configuration form appears. 3. Click the Add button.
Configuration The Add Rule dialog box appears. 4. Complete the following data fields as necessary: 246 Field Name Definition Target Indicates the action to be performed to the IP packet when it matches the rule. For example, the kernel can ACCEPT DROP, RETURN, LOG or REJECT the packet by sending a message, translating the source or the destination IP address/port or sending the packet to another user-defined chain. Source IP The source IP address. Mask Source network mask.
Configuration Field Name Definition Mask Destination network mask. Inverted Select the check box adjacent to Destination IP to invert the target action. For example, the action assigned to the target will be performed to all Destination/ Mask IPs except to the one just defined. Protocol The transport protocol to check. If the numeric value is available, select Numeric and type the value in the adjacent field; otherwise, select one of the other options.
Configuration Field Name Definition Inverted Select box adjacent to Output Interface to invert the target action. For example, the action assigned to the target will be performed to all interfaces except to the one just defined. Fragments Indicates the fragments or unfragmented packets to be checked. The IP Tables can check for: • All Packets • 2nd, 3rd...
Configuration Field Name Definition Log Prefix The prefix that will identify the log. TCP Sequence Check box to include TCP sequence in the log. TCP Options Check box to include TCP options in the log. IP Options Check box to include IP options in the log. • If you selected Reject from the Target field, the following field appears: “Reject with” means that the filter drops the input packet and sends back a reply packet according to any of the reject types listed below.
Configuration VPN VPN, or Virtual Private Network enables a secured communication between KVM/net and a remote network by utilizing a gateway, and creating a secured tunnel between KVM/net and the gateway. IPSec is the protocol used to construct the secure tunnel. IPSec provides encryption and authentication services at the IP level of the protocol stack. When VPN Connections is selected under Configuration>Network in Expert mode, you can configure one or more VPN connections.
Configuration 2. To edit a VPN connection, select the VPN connection that you wish to edit from the form, and then select the Edit button. - OR To add a VPN Connection, select the Add button. The New/Modify Connection dialog box appears.
Configuration Note: If the selected authentication method is RSA Public Keys, the dialog box on the left of the previous figure is used; if the authentication method is Shared Secret, the dialog box on the right is used. 3. Edit or complete the appropriate fields as follows. Field Name Definition Connector Name Any descriptive name you want to use to identify this connection such as “MYCOMPANYDOMAIN-VPN.
Configuration Field Name Definition Subnet The netmask of the subnetwork where the host resides. Note: Use CIDR notation, nnn.nnn.nnn.nnn/ nn. The IP number followed by a slash and the number of ‘one’ bits in the binary notation of the netmask. For example, 192.168.0.0/24 indicates an IP address where the first 24 bits are used as the network address. This is the same as 255.255.255.0.
Configuration SNMP traps, a version of the Unix 'netstat' command using SNMP, and a Tk/ Perl mib browser. SNMP is configured with community names, OID and user names. The KVM/net supports SNMP v1, v2, and v3. The two versions require different configurations. SNMP v1/v2 requires community, source, object ID and the type of community (read-write, read-only). V3 requires user name. Important: Check the SNMP configuration before gathering information about KVM/net by SNMP.
Configuration 2. Enter the following system information, as necessary: Field Name Definition Community The community name acts as a password to authenticate messages sent between an SNMP client and a router containing an SNMP server. The community name is sent in every packet between the client and the server. SysContact The email of the person to contact regarding the host on which the agent is running (for example, me@mymachine.
Configuration Field Name Definition SysLocation The physical location of the system (for example, mydomain). If you are using SNMPv3, skip to Step 6. 3. To Add an SNMP agent using SNMPv1/SNMP2 Configuration, select the Add button located at the bottom of this view table. OR To edit an SNMP agent, select the Edit button. The New/Modify SNMP Daemon Configuration dialog box appears. 4.
Configuration Field Name Definition OID Object Identifier. Permission Select the permission type: • Read Only – Read-only access to the entire MIB except for SNMP configuration objects. • Read/Write – Read-write access to the entire MIB except for SNMP configuration objects. • Admin – Read-write access to the entire MIB. 5.
Configuration 8. Complete the form and when done. Field Name Definition Username Name of user account accessing the KVM/net. Source SNMP v1 and v2 only. Valid entries are “default” or a subnet address, for example, 193.168.44.0/24. OID Object Identifier. Each managed object has a unique identifier. Permission Select the permission type: • Read Only – Read-only access to the entire MIB except for SNMP configuration objects.
Configuration T To Configure SNMP Traps 1. Go to Security>Profiles, click on Custom button to open the Custom Profile dialog box as shown below and enable SNMP service. 2. Go to Configuration>Network>Notifications. The following form appears.
Configuration 3. Click the “Add” button to open the Notifications Entry dialog box as shown in the following figure, and populate the fields per your site requirements.
Configuration The following table describes the fields in the Notifications Entry dialog box. Table 4-11: SNMP Traps Notifications Entry Field Name Description Alarm Trigger Define the event you want to trigger a notification for. OID Type Value Object Identifier. Each managed object has a unique identifier.
Configuration Table 4-11: SNMP Traps Notifications Entry Field Name Description Trap Number The trap types listed in the drop-down menu translates to a trap number in the system logs. Community A Community defines an access environment. The type of access is classified under “Permission”: either read only or read write. The most common community is “public”. Take caution in using a “public” community name as it is commonly known. Server The SNMP server’s IP address or DNS name.
Configuration Figure 4-36:Host Tables Configuration Form 2. Do on of the following: • To edit a host, select the host IP address from the Host Table and then click the Edit button. If the list is long, use the Up and Down buttons to go through each item in the list. - OR • To add a host, click the Add button. The New/Modify Host dialog box appears.
Configuration 3. Enter the new or modified host address in the IP Address field and the host name in the Name field. 4. Click the OK button. 5. To delete a host, select the host you wish to delete from the Host Table form, and select the Delete button on the form. 6. Select “apply changes” to save your configuration to Flash. Static Routes The Static Routes form allows you to manually add routes. The Routing Table defines which interface should transmit an IP packet based on destination IP information.
Configuration • To add a static route, select the Add button from the form. The New/Modify Route dialog box appears. 3. Complete the dialog box as follows: Table 4-12: Add/Modify Static Routes Fields Field Name Definition Route Select Default, Network, or Host. Network IP The address of the destination network. This field appears only if Network is selected. Network Mask The mask of the destination network. This field appears only if Network is selected.
Configuration Table 4-12: Add/Modify Static Routes Fields Field Name Definition Field Adjacent to Go to The address of the gateway or interface. Metric The number of hops. 4. Click the Apply button to close the dialog box. The new or modified route appears in the list. 5. To delete a static route, select a route from the list and click Delete. 6. Click “apply changes.” AUX Port Selecting Configuration>AUX Port in Expert mode brings up the following form.
Configuration T To Configure the AUX Port for Use With an IPDU or an External Modem 1. In Expert mode, go to: Configuration>AUX Port. The Aux Port form appears. 2. To configure the AUX Portfor Power Management, make sure that Power Management is selected in the Profile drop-down list. Note that the Aux port is enabled by default. 3. Click “apply changes.” See “Power Management” on page 40 for background information on power management and lists of related tasks. 4.
Configuration Table 4-13: PPP Fields for Configuring the AUX Port (Continued) Field Name Definition Stop Bits The number of stop bits. Modem Initialization The modem initialization string. Local IP Address The IP address of the KVM/net. Remote IP Address The remote IP address Authentication Required Select check box if authentication is required. MTU/MRU The maximum transmission unit / maximum receive units for the PPP. PPP Options The options for this protocol. 6. Click “apply changes.
Configuration With the System form administrators can set the time and date on the KVM/ net and reboot the KVM/net if necessary. The following procedures are available on the System form: • • • • “Creating a Custom Timezone Selection” on page 272 “To Set The Time and Date With NTP” on page 270 “Boot Configuration” on page 273 “To Configure KVM/net Boot” on page 276 Time/Date Selecting Configuration > System > Time/Date in Expert mode brings up the form shown in the following figure.
Configuration T To Set the KVM/net’s Date and Time Manually 1. In Expert Mode, go to: Configuration>System>Time/Date. The Date/Time form appears. 2. Make sure that Disabled is selected in the Network Time Protocol dropdown list. 3. Fill in the date and time fields by selecting the appropriate numbers from the drop-down lists. 4. Click “apply changes.” T To Set The Time and Date With NTP 1. In Expert Mode, go to: Configuration>System>Time/Date. The Date/Time form appears. 2.
Configuration 3. Enter the address of the NTP server in the NTP Server field. 4. Click the “apply changes” button. Setting up Customized Timezone Configuration The “Edit Custom” button next to the Timezone field allows you to set up a customized timezone function, such as for daylight savings time or any other timezone offset anomaly that might occur anywhere in the world.
Configuration T Creating a Custom Timezone Selection 1. Enter the name of the timezone you would like to appear in the Timezone pulldown menu on the main Time/Date screen. (“Pacific” entered here as an example.) 2. Choose the preferred or standard acronym for the timezone (“PST” is shown here for Pacific Standard Time). 3. Enter the offset from GMT for the timezone (west of GMT is entered as a negative number 4. Click “OK.” 5. Click “apply changes.
Configuration 3. Enter the number of Hours:Minutes that the clock will be reset at the beginning of the Daylight Savings Time period. (Positive number only.) 4. In the following fields, enter the date (month, day) and time (hours:minutes) for both the beginning and ending dates of daylight time. 5. Click OK to update the Time/Date settings and return to the main Time/ Date screen. 6. Click “apply changes.” Boot Configuration Selecting Configuration>System>Boot Configuration brings up the following form.
Configuration If you need to boot from the network, you need to make sure the following prerequisites are met. • • A TFTP or BOOTP server must be available on the network. An upgraded KVM/net boot image file must be downloaded from Cyclades and available on the TFTP or BOOTP server. • KVM/net must be configured with a fixed IP address. • The boot filename and the IP address of the TFTP or BOOTP server is known. The boot configuration related options are described in the following table.
Configuration Table 4-14: Boot Configuration Fields and Options (Continued) Field or Value Name Description Fast Ethernet The speed of the Ethernet connection. Select the appropriate Ethernet setting if you need to change the Auto Negotiation (default value) 100BaseT Half-Duplex 100BaseT Full-Duplex 10BaseT Half-Duplex 10BaseT Full-Duplex Fast Ethernet Max Interrupt Events Web Manager for Administrators The maximum number of packets that the CPU handles before an interrupt (0 is the default).
Configuration T To Configure KVM/net Boot For more information about the fields in the “Boot Configuration” form, see Table 4-14 on page 274, if desired. 1. Go to Configuration>System>Boot Configuration in Expert mode. 2. Enter the IP address of the KVM/net in the “IP Address assigned to Ethernet” field. 3. Accept or change the selected option in the “Watchdog Timer” field. 4. Select to boot from “Flash” or “Network” from the “Unit boot from” menu. 5.
Configuration Online Help Selecting Configuration > System > Online Help in Expert mode brings up the form shown in the following figure. Figure 4-43:Online Help Configuration Form Cyclades host the online-help on a HTTP server accessible from the Internet. From any form in the Web Manager; pressing the “Help” button opens a new window and redirect its content to the configured path for the online help documentation.
Viewing System Information 3. In the KVM/net Web Manager navigate to Configuration > System > Online Help in Expert mode. 4. In the “Online Help Path” field add the path to the online help directory on your local web server. If the online help path is ended with a “/”, when the user clicks on the “Help” button, WMI software appends the product name and version to the URL and invokes the index.html file in a browser. For example, http://www.myserver.com/online-help/ would be http:// www.myserver.
Viewing System Information T To View General Information for Your KVM/net 1. In Expert mode, go to: Information>General. The General information form appears. Figure 4-44:General System Information Form Station Status Use the Station Status form to view the status of each KVM station on the KVM/net. The Station Status form displays information for two stations–one local and one remote.
Viewing System Information T To View Station Status 1. In Expert mode, go to: Information>Station Status. The Station Status form appears. Figure 4-45:KVM Station Status Information Form The following table describes the information displayed for each station on the Station Status form. Table 4-15: Station Status Information 280 Field Information Station Displays whether the station is Local, Remote, or Inactive and lists the microcontroller version used.
Management Table 4-15: Station Status Information Field Information Login If a user is logged in, displays the user name and duration of the session in seconds. Current Server When connected to a port, displays the server name. Connection Status When connected to a port, displays the type of switch, expander, and version number used. Current Permissions When connected to a port, displays the permissions the current user has on that port.
Management Figure 4-46:KVM Management Form Administrators can use the management menu to perform system and software management such as booting, backing up, upgrading firmware, and handling configuration data. 282 Menu Selection Use this menu to: Backup Configuration Use a FTP server to save or retrieve your configuration data. Firmware Upgrade Upload firmware from the web to the KVM/ net and save the new software version or update.
Management Menu Selection Use this menu to: Active Sessions View the status of all active sessions as well as reset or kill sessions. Reboot Reboot the system. Backup Configuration The Backup Configuration form allows you to set the KVM/net to use an FTP server to save and retrieve its configuration data. For the backup configuration to work, the FTP server must be on the same subnet as the KVM/net. Ping the FTP server, to ensure that it is accessible from the KVM/net.
Management The following table describes the information you need to enter in the fields on the “Backup Configuration” form when FTP is selected from the “Type” drop-down list. Field Definition Server IP IP address of the FTP server Path and Filename Path of a directory on the FTP server where you have write access for saving the backup copy of the configuration file. Specify a filename if you want to save the file under another name.
Management T To Back Up or Retrieve KVM/net Configuration Data 1. In Expert mode, go to: Management>Backup Configuration. The Backup Configuration form appears. 2. To save or retrieve data from an FTP server, do the following: a. From the Type drop-down list, select FTP. Selecting FTP (default) brings up the fields displayed in the following figure. b.
Management • Server IP • Path and Filename • Username • Password 3. Click Save to save the configuration to the selected location. 4. Click Load to load the configuration from the selected location. 5. Click “apply changes.” 6. To run the loaded configuration, reboot the KVM/net.
Management Firmware Upgrade Selecting Management>Firmware Upgrade in Expert mode brings up the form shown in the following figure. Figure 4-48:Firmware Upgrade You can use the form to set up operating system upgrade on the KVM/net. The form collects information used to download software from an FTP server and install it on the KVM/net.
Management The following table defines the information you need to supply on the form. Field/Menu Name Definition Type FTP is the only supported type. FTP Site The address of the FTP server where the microcode is located. You can use any FTP server if you download the firmware on it first. The Cyclades FTP site address is: ftp.cyclades.com. If desired, see “To Upgrade Firmware” on page 290 for instructions on how to download the firmware for installation on your own local FTP server.
Management The following table has links to the related procedures. T To Find the Cyclades Pathname for Firmware or Microcode Upgrades Page 289 To Upgrade Firmware Page 290 To Download Microcode From an FTP Server Page 293 To Find the Cyclades Pathname for Firmware or Microcode Upgrades 1. To find the correct filename for the firmware or microcode updates at Cyclades, Corp., enter the following address in a browser: ftp://ftp.cyclades.com/pub/cyclades/alterpath/KVMnet/released 2.
Management example, 1.0.5.6-04.10.18.4.bin, and go to “To Download Microcode From an FTP Server” on page 293. T To Upgrade Firmware 1. In the Web Manager, go to Management>Firmware Upgrade in Expert mode. The Firmware Update form appears. 2. Choose FTP from the Type menu. 3. Enter the name of the FTP server in the “FTP Site” field. The Cyclades FTP site address is: ftp.cyclades.com. 4. Enter the username recognized by the FTP server in the “Username” field.
Management Figure 4-49:Microcode Upgrade Form You can use the form to specify information used to automatically download microcode from an FTP server and install the microcode on various KVM/net components. You can specify either the Cyclades FTP server, ftp:// ftp.cyclades.com, or a local FTP server where you have previously downloaded the microcode. The following table shows the terms used on the form, the corresponding component names, and the filename formats uses for each type of microcode.
Management You need to enter the actual pathname components in the “Directory” and “File Name” fields. If needed, go to: “To Find the Cyclades Pathname for Firmware or Microcode Upgrades” on page 289. The following table defines the information you need to supply on the form. Field Name Definition Target The name of the component that you wish to upgrade the microcode. FTP Server The address of the FTP server where the microcode is located.
Management T To Download Microcode From an FTP Server 1. Go to Management>Microcode Upgrade in Expert mode. The Microcode form appears. 2. Click the radio button next to the “Target” component, which you want to update the microcode. If you select the KVM Terminator radio button, a scrollable port list appears next to the Target list. 3. The KVM Port Expander Module microcode can be upgraded when it is configured as a slave in a cascade configuration.
Management 10.Click “apply changes.” 11.Go to “To Reset the Microcode After Upgrade” on page 294. Microcode Reset Selecting Management>Microcode Reset in Expert mode brings up the form shown in the following figure. Figure 4-50:Microcode Reset Form You can use the form to reset the microcode after an upgrade. T To Reset the Microcode After Upgrade Perform this procedure if you have upgraded microcode as described in “To Upgrade Firmware” on page 290. 1. Go to Management>Microcode Reset in Expert mode.
Management 2. To reset the microcode of a Target component, click the radio button for the Target component. If you select the KVM Terminator radio button, a scrollable port list appears next to the Target list. Select the port to which the KVM Terminator is connected from the port list. 3. Press the “Reset Now” button. 4. To reset another type of microcode, select the radio button next to the target you want to upgrade, and press the “Reset Now” button.
Management Active Sessions The Active Sessions form is designed to provide you quick status and usage information pertaining to all active server sessions. Administrators may also kill sessions from this form. T To View Active Sessions Information 1. In Expert mode, go to Management>Active Sessions. The Active Sessions window appears. Figure 4-51:Active Sessions Form 2. Review the session information as described in the following table.
Management Column Definition From The network machine to which the port is connected. Login@ The day and time of the last login. Idle The time when the session or server became inactive. JCPU The duration of time used by all processes attached to the tty. It does not include past background jobs; only currently running background jobs. PCPU The time used by the current process that is named in the What column. What The current process attached to the tty. 3.
Management Reboot Selecting Management>Reboot in Expert mode, brings up the following form. Figure 4-52:Reboot Form Selecting the Reboot button allows you to reboot the system without physically turning off the hardware. T To Reboot the KVM/net From a Remote Location 1. In Expert mode, go to: Management>Reboot 2. Click the Reboot button. 3. A confirmation page appears. 4. Click OK to reboot the system.
Chapter 5 Web Manager for Regular Users With the KVM/net Web Manager, regular users can, • • • • Connect to PCs with USB or PS/2 connectors. Connect to Sun servers with USB connectors through out-of-band. Connect to Windows Terminal Servers through in-band connections. Manage power of devices connected to AlterPath PMs from anywhere on a network. • Maintain their user passwords. For more information on in-band and out-of-band connections see “Server Access: Inband and Out of Band” on page 29.
Web Manager for Regular Users Web Manager for Regular Users When users without administrative privileges log in to the KVM/net, the Web Manager appears with three menu options: • Connect to Server – Form used to connect to servers with either an in-band or a KVM connection. See “Connecting to Servers Remotely Through the Web Manager” on page 321. • IPDU Power Management – Form used to control the power of devices plugged in to AlterPath PMs.
Web Manager for Regular Users Main Menu User Entry Form Logout Button Help Button Figure 5-1:Example of Regular User Web Manager Form Web Manager for Regular Users 301
Prerequisites for Logging in to the Web Manager Prerequisites for Logging in to the Web Manager You must collect the following information from your KVM/net administrator before accessing and logging into the KVM/net: • KVM/net IP address • Username • Password See the “Prerequisites for Accessing Servers With KVM Connections” on page 314.
Prerequisites for Logging in to the Web Manager 2. Enter your username and password as provided to you by your KVM/net administrator 3. Click Go. The “Connect to Server” form appears.
Connect to Server Connect to Server Use this form to connect to servers with either an in-band or a KVM connection. See “Connecting to Servers Remotely Through the Web Manager” on page 321. IPDU Power Management IPDU power management allows you to manage the outlets plugged into a PM that is configured on the KVM/net. When you select the “IPDU Power Mgmt.
IPDU Power Management See “Controlling Power of a KVM-connected Server” on page 335. Power Control of Any Device Plugged Into an AlterPath PM on the KVM/net Depending on your access rights, the KVM/net allows you to view and manage all PMs connected to the KVM/net. Regular users can go to the IPDU Power Management menu on the Web Manager and use the Outlets Manager and the View IPDUs Info forms to manage and view the status of PMs and the devices plugged into them.
Changing Your KVM/net Password Changing Your KVM/net Password On the Security form on the KVM/net Web Manager, you can change your old password to a new password. T To Change Your KVM/net Password 1. Log in to the Web Manager. 2. Select Security in the Main Menu. The Security Form appears. Figure 5-3:Regular User Password Management Form 3. Type your current password in the Current Password field. 4. Type your new password in the New Password field and again in the Repeat New Password field. 5.
Chapter 6 Accessing Connected Devices With the KVM/net, users and administrators can connect to any PC or USB Sun servers through out-of-band, KVM connections and manage power of devices connected to AlterPath PMs from anywhere on a network with the Web Manager or locally with the OSD. Users and administrators can also connect to Windows Terminal Servers through in-band connections. This chapter gives an overview of the options for accessing servers that are connected to ports on the KVM/net.
The following table lists the procedures in this chapter.
Who Can Access Connected Devices Who Can Access Connected Devices Authorized users have the permissions they need to access one or more servers or other devices that are connected to ports on the KVM/net. See “Types of Users” on page 14 and KVM users can use the master KVM to access all devices connected to KVM ports on the master and slave KVM units. However, only two port connections can be made to each cascaded unit at any time.
Server Connections: What You See Server Connections: What You See Once connected to a server, one or two windows appear depending on the type of server connection being made: • KVM connections • AlterPath Viewer is launched with the same interface as if you were directly logging into the connected server. • The Access Window with an interface for managing up to four server connections. See “Viewing KVM Connections” on page 311.
Server Connections: What You See Viewing KVM Connections The AlterPath Viewer is the interface you use to manage servers over KVM over IP connections. Logins persist across connection sessions. If you close a connection without logging out, you are still logged in the next time you connect, unless the system has closed your session. If you are not currently logged in, you see a login screen or prompt. The connected servers’s login prompt appears.
Server Connections: What You See See “AlterPath Viewer Settings” on page 339 for more detailed information about using the AlterPath Viewer. Local KVM connections through the OSD do not use the AlterPath Viewer. Instead, the view of the connected server takes up the entire screen of local work station. See “Controlling KVM Port Connections” on page 328 for more information on local KVM connections.
Prerequisites for Accessing Servers With In-band Connections Viewing In-band Connections The ActiveX viewer is the interface you use to manage servers over an inband connection. The following graphic displays the login screen of a server running Windows 2003 in the ActiveX viewer for in-band connections.
Prerequisites for Accessing Servers With KVM Connections Prerequisites for Accessing Servers With KVM Connections The following prerequisites must be met before you can access a KVMconnected server: • Know the KVM Port(s) to which you have access (specially if direct access to a port is configured) • Have the username and password of a valid account on the connected server • If you are connecting through the Web Manager, have the following: • A remote computer running a Windows operating system with Intern
Screen Resolution and Refresh Rate Depending on your server’s operating system refer to one of the following procedures.
Web Manager Login Screen Web Manager Login Screen The following table list the sections that describe the three different possible views of the Web Manager login screen that can appear under various conditions. Table 6-2: Web Manager Login Screen Options Conditions Where Documented Direct logins to KVM ports not enabled: “Login Screen: Direct Logins Not Enabled” on page 318 • You enter the KVM/net’s IP address in a browser to bring up the Web Manager login screen.
Web Manager Login Screen Table 6-2: Web Manager Login Screen Options (Continued) Conditions Where Documented Direct logins to KVM ports enabled (option 2): “Login Screen: Direct Logins Enabled, IP Address and Port Entered” on page 320 • You enter the KVM/net’s IP address along with the port name in a browser to bring up the Web Manager login screen. • The port field is already filled in when the Web Manager appears.
Web Manager Login Screen Login Screen: Direct Logins Not Enabled The following screen shows an example of the Web Manager login screen as it appears if the following two conditions are true: • The IP address of the KVM/net is entered in the browser. • Direct logins to KVM ports is not enabled. As shown in Figure 3-1, the Web Manager login screen displays only two fields, “username” and “password.
Web Manager Login Screen connection only. An entry with “(In-band)” at the end of it can be accessed with an in-band connection only. An entry with “KVM + In-band”) can be accessed with both connection methods. See “Determining the Connection Type and its Supported Functionality” on page 31 for more detailed information.
Web Manager Login Screen Login Screen: Direct Logins Enabled, Only IP Address Entered The following screen shows an example of the format of the Login portion of the Web Manager login screen as it appears if the following two conditions are true: • The IP address of the KVM/net is entered in a browser. • Direct logins to KVM ports is enabled.
Connecting to Servers Remotely Through the Web Manager The “port” field is filled in with the port number when the Web Manager login window appears. The example in the following figure shows http://192.168.46.169/ login.asp?portname=Port_1 entered in the Address field of a Microsoft Internet Explorer browser. The login screen displays empty “username” and “password” fields and a port field filled with the name of the port from the URL, in this case “Port_1.
Connecting to Servers Remotely Through the Web Manager See the following procedures for connecting to servers: To Connect to a KVM Port Through the Web Manager Login Screen Page 324 To Connect to Servers Through The Web Manager’s “Connect To Server” Form Page 322 If needed, see one of the following login procedures.
Connecting to Servers Remotely Through the Web Manager 3. From the drop-down menu, select the server or port to which you want to connect. A list similar to the list in the following graphic appears. See “Determining the Connection Type and its Supported Functionality” on page 31 for a description of each type of connection method and what happens once connected. 4. Click on the Connect button.
Connecting to Servers Remotely Through the Web Manager The system may launch one or two browser windows: the AlterPath Viewer and the Access Window for KVM connections, or an ActiveX viewer for RDP connections. See “Server Connections: What You See” on page 310 for a description of each window. Note: The first time the system invokes the AlterPath Viewer, it prompts you to accept a security certificate. Click Accept.
Connecting to Servers Locally Through the OSD 2. If you entered a KVM port ID in the URL, save the URL as a bookmark or in your favorites list in the browser. For future connections to that port, you can click on the bookmark or item in favorites list to easily bring up the Web Manager login screen again with the port number filled in. 3. Enter your account name in “username” field and the account’s password in the “password” field. 4. If no port is listed in the “port” field, enter a port alias or number.
Connecting to Servers Locally Through the OSD on connecting to the User 1 port, or see “To Connect the KVM RP to the KVM/net” on page 131 for instructions on connecting to the User 2 port. Connections made through the OSD are to physically connected devices only. Use the Web Manager to connect to a remote device. See “To Connect to Servers Through The Web Manager’s “Connect To Server” Form” on page 322 for instructions. Note: The OSD cannot be used to access in-band servers.
Connecting to Servers Locally Through the OSD • Type the first letters of the port name in the quick search box until the desired port is highlighted in the port list box. This field is case-sensitive. • Select the desired port using the port list box. 4. Press Enter. Your monitor displays the work station of the connected server.
Controlling KVM Port Connections Controlling KVM Port Connections Once connected to a server, you may want do one or more of the procedures listed in the following table. Table 6-3: Tasks Available While Connected to KVM Ports Task Where Documented Return to the OSD Connection menu after connecting to a port. “To Return to the Connection Menu After Connecting to a Port” on page 331. Access a port that is already in use by another user.
Controlling KVM Port Connections Hot Keys for KVM Connections Predefined keyboard shortcuts (also called hot keys) allow you to perform common actions and launch management windows while connected through a KVM port. The default hot keys are described in the following table. A plus (+) between two keys indicates that both keys must be pressed at once. When two keys are separated by a space, each key must be pressed separately.
Controlling KVM Port Connections Hot Keys for Emulating Sun Keyboard Keys The KVM/net provides a default set of hot keys for use while connected to Sun servers. You can use the PC keyboard to emulate keys that are present on Sun keyboards but are not available on PC keyboards. The hot keys are made up of a modifier key followed by a function key. The default modifier key is the Windows key [WIN], which is labeled with the Windows logo.
Controlling KVM Port Connections [Alt]. See “Redefining Sun Keyboard Modifier Keys” on page 175 for procedures. T To Return to the Connection Menu After Connecting to a Port 1. Press Ctrl+k q to display the OSD Connect Menu. The Connection Menu appears. 2. Do one of the following: • To make a new server connection, select another port from the list. • To return to the Main Menu, select Exit. • To cycle through all servers, select Cycle.
Controlling KVM Port Connections Cycling Between Servers Cycle refers to the capability to connect to one or more authorized servers from the server to which you are currently connected. Through the OSD menus or by using a keyboard shortcut, you have immediate access to all configured and authorized servers. There are two types of cycle commands: • Cycle by Server – View all authorized servers on a continuous basis until all servers have been exhausted and then start over again.
Controlling KVM Port Connections The default is Ctrl+k q. T To Connect to the Next Authorized Server from the Current Server • Use the Next keyboard shortcut. The default is Ctrl+k . The next authorized server appears. Repeat this step to move to the next server. T To Connect to the Previous Authorized Server from the Current Server • Use the Previous keyboard shortcut. The default is Ctrl+k ,. The previous authorized server appears. Repeat this step to move to the previous server.
Controlling KVM Port Connections 2. To switch to the Auto control window or the Manual control window select Auto or Manual respectively. 3. To adjust screen brightness on the Automatic Control window, select the right or left arrows to set the desired adjustment value.The Automatic Control window is used to compensate for cable length. The default value for “Cable Length Adjustment” is 80.
Controlling KVM Port Connections Controlling Power of a KVM-connected Server In order to control power of a server while connected to the server, the following conditions must be met: • The server must have at least one power cord plugged into an AlterPath PM that is properly configured and connected to the AUX port. • The power outlet(s) that the server is connected to must be configured to the port.
Controlling KVM Port Connections Closing a KVM Connection The ways you can close a KVM connection are listed below: • For IP connections, select “Exit Viewer Client” from the AlterPath Viewer Shortcuts menu. • Use a hot key sequence (Ctrl+k q) to bring up the Connection menu, then select the Exit option. • Let the session time out. T To Close a KVM Connection Do one of the following steps. 1. To use the menu option from the AlterPath Viewer menu bar, go to Shortcuts and select “Exit Viewer Client.
Controlling KVM Port Connections the connecting user’s access permissions. The following figure shows two options that are always presented on the menu to the connecting user. The two menu options are described in the following table.
Controlling KVM Port Connections If the connecting user has either read-write, or full access permissions for the KVM port, additional menu options appear, as shown in the following figure. The two menu options are described in the following table. Connect read write Connects the new user in read-write mode and sends this notice to the current user.
AlterPath Viewer Settings AlterPath Viewer Settings You can configure the AlterPath Viewer settings from the top menu. For a definition of the menu settings, refer to the tables below. A T1 connection is recommended for best performance when using the AlterPath Viewer. Recommended Settings The recommended AlterPath Viewer settings are listed in the following table. The connection you set must reflect your actual Internet connection method.
AlterPath Viewer Settings Options Menu The following table describes the items in the AlterPath Viewer’s Options menu, which you can change as needed for your own requirements. Menu Selection Description Force Screen Refresh Refreshes the viewer. Force Screen Auto Alignment Switches to Auto Alignment mode, which may change the position of the viewer. (You can manually configure Screen Alignment by going to Options>Viewer Options>Screen Alignment.
AlterPath Viewer Settings Setting the Viewer Options The Viewer Options window allows you to align or position the viewer window and to fine tune the image. The configuration for these settings may vary from one system to another. Figure 6-3:AlterPath Viewer Options Screen The following table defines the fields and menu items.
AlterPath Viewer Settings Table 6-6: AlterPath Viewer>Options>Viewer Options Menu (Continued) Field or Menu Item Function Image Sensitivity Move slider to the right to increase the image sensitivity. Tint Move the slider in either direction to achieve the desired color. For a neutral (white) color, keep the slider in the middle. Brightness Move the slider to the right to increase screen brightness. Cable Length Adjustment Move the slider to the right to adjust cable length.
Power Management Menu Selection Function Encryption Type For either RC4 or Triple DES encryption No Encryption For no encryption High Color For high color resolution screens Low Color For low color resolution screens Grey Scale For grey scale screens Low Grey Scale For low resolution grey scale screens Power Management Administrators and authorized users can access Power Management windows, which allow you to check the status of the master IPDU connected to the AUX port in addition to all cas
Power Management T To Power On, Power Off, Lock, Unlock, or Cycle Devices Plugged into PM Outlets 1. Go to: Configure > Power Management. The Outlet Status page appears with a list of all configured IPDUs. The status column displays whether the outlet is on or off, locked, or unlocked. The letter U displayed in the status window indicates that the outlet is unlocked; the letter L indicates that the outlet is locked. 2. Use the up or down arrow keys to select the outlet you want to edit and press .
Power Management An outlet that is turned off and unlocked displays the On, Lock, and Cycle options as in the following figure. 3. Use the arrow keys to select On, Off, Lock, Unlock, or Cycle and press . 4. Select the arrow button and press to return to the Power Management menu. 5. To change the status of other outlets, repeat steps 2 and 3.
Modem Connections Modem Connections In addition to connecting to the KVM/net through a regular Ethernet connection, you can also access the KVM/net by dialing in through an installed external modem.Use PPP when dialing into any of the supported modems. Once the connection is made, all connections to the specified IP address are made through the PPP connection.
Modem Connections T To Configure a PPP Connection on a Remote Computer Perform this procedure on a remote computer with a modem to do the following: • Create a PPP connection that anyone can use for dialing up the KVM/net • Optionally configure call back. See the prerequisites listed in “Modem Connections” on page 346, if needed. Note: The following steps work for a computer running Windows XP. The steps are different on computers running other Windows versions or other operating systems.
Modem Connections 9. Type the username for accessing the KVM/net in the “Username” field. 10.Type the password for accessing the KVM/net in the “Password” and “Confirm Password” field and click “Next>.” 11.Click the “Finish” button. The “Connect connection_name” dialog appears. 12.Click the “Cancel” button. The name of the connection appears on the Network Connections” list. 13.To configure call back, do the following steps. a. Select the name of the connection from the Network Connections dialog box. b.
Modem Connections 1. From the Start menu, go to My Computer>My Network Places. 2. Under “Network Tasks,” click “View network connections.” 3. Double-click the name of the connection in the list. The “Connect connection_name” dialog appears. 4. Type the username and password in the “Username” and “Password” fields. 5. Click the “Dial” button. 6.
Modem Connections 350 AlterPath KVM/net Installation, Administration, and User’s Guide
Chapter 7 On Screen Display Administrators and regular users can use the OSD for troubleshooting when a direct connection method is required. However, most configuration and operations tasks are performed through the Web Manager. Access to the OSD requires a local keyboard, monitor, and mouse connected to the KVM management ports, User 1 or User 2, on the back of the KVM/net.
Navigating the OSD Navigating the OSD In the OSD you can use keyboard sequences to navigate the windows and make menu selections. The following sections describe: • Basic Navigation Keys • Common Navigation Actions Basic Navigation Keys The following table displays a short list of keyboard controls to help you navigate the KVM/net on screen display. The OSD window must be selected and in an active state for these keys to work.
Logging In Through the OSD Common Navigation Actions Table 7-2 shows how to perform common actions used to go to windows, select items, and commit changes in the OSD. Table 7-2: OSD Equivalents for Common Actions Action OSD Equivalent Select OK Tab to the OK button and press the Enter key on your keyboard. Save changes Tab to the Save button and press the Enter key. Select an option Tab to the option and press the Enter key. Go to a specific window, as in: Go to Configure>Users and Groups.
OSD Main Menu T To Log into the KVM/net Through the OSD Type your username followed by your password. 1. Press . The main menu of the KVM/net OSD appears. See the following section, “OSD Main Menu” on page 354 for a description of the OSD Main Menu items. OSD Main Menu The OSD Main Menu provides six menu selections as depicted in the following figure.
Invoking OSD Using [PrintScreen] Key Table 7-3 gives a brief description of each menu item and lists where you can find more information. Table 7-3: OSD Main Menu Items Menu Selection Select the menu item to: Where Documented Connect View the Server Connection Menu and select the port to which you want to connect. Page 356 Power Management View status of all outlets on connected IPDUs and power on, power off, and cycle connected devices.
Connection Menu 3. Select from the available options and press [Enter]. 4. To close the menu press the [Esc] or [PrintScreen] button on the keyboard. Note: If you are an administrator and are connected locally through one of the user ports on the KVM/net, the “Main Menu” option closes the connection and returns to the OSD main menu.
Power Management Menu Power Management Menu The Power Management windows allow you to check the status of the master AlterPath PM connected to the AUX port in addition to all cascaded PMs. Any user who has administration privileges can turn on, turn off, cycle (reboot), lock, and unlock the outlets. See “Connecting AlterPath PMs to the KVM/net” on page 117 for instructions on connecting PMs to the KVM/net. T To Power On, Power Off, Lock, Unlock, or Cycle Devices Plugged into PM Outlets 1.
Configure Menu Overview The available action options at the bottom of the window change depending on the status of the outlet. For example, an outlet that is locked displays only the Unlock option as in the following figure. An outlet that is turned off and unlocked displays the On, Lock, and Cycle options as in the following figure. 3. Use the arrow keys to select On, Off, Lock, Unlock, or Cycle and press . 4. Select the arrow button and press to return to the Power Management menu. 5.
Configure Menu Overview Not all the options are visible. Table 7-4 gives a brief description of all the menu options and lists where you can find more information . Table 7-4: Configuration Menu Items Menu Selection Select the menu item to: Where Documented General Configure authentication type for direct logins to KVM ports; syslog facility number; KVM connection hot key escape sequence, and Sun Keyboard emulation hot key escape sequence.
Configure Menu Overview Table 7-4: Configuration Menu Items (Continued) Menu Selection Select the menu item to: Where Documented AUX Port Configure the AUX port for PPP or power management. “AUX Port Screens” on page 396 Users and Groups Configure users and groups, user passwords, and KVM port access permissions. “Users and Groups Screens” on page 403 Cascade Devices Add, edit, or delete configurations of cascaded (slave) KVM units.
Configure Menu Overview Understanding OSD Configuration Screen Series Selecting an option from the “Configure” menu usually brings you through a series of related screens, which you navigate through one at a time until you reach the final screen. For example, if you select Date/Time, you are presented with a series of “Date/time Config.” screens starting with “NTP” and ending with “Time,” as shown in the following figure.
Configure Menu Overview General Configuration Screens [OSD] You can select the General option on the OSD Configuration Menu to configure several general features of the KVM/net, which are introduced under “General” on page 359. Selecting Configure>General from the OSD Main Menu brings up the Authentication type screen, which is the first in a series of configuration screens that appear in the sequence shown in the following table.
Configure Menu Overview Table 7-5: General Configuration Screens [OSD] (Continued) Screen Description Syslog Facility The syslog facility number that is used by the administrator of the syslog server to identify messages generated by devices connected to the KVM ports. Obtain the facility number to use for the KVM/net from the syslog server’s administrator. Values are from 0 through 7. See “Syslog Servers” on page 54 for examples of using facility numbers as needed.
Configure Menu Overview Table 7-5: General Configuration Screens [OSD] (Continued) Screen Description Direct Access Enables or disables direct access to KVM ports from the Web Manager login screen. TCP Port Viewer Allows you to assign an alternate TCP Port number or numbers for the AlterPath Viewer to use [Default, 5900+]. Use the plus sign (+) to increment the port number by 1 for each additional AlterPath Viewer.
Configure Menu Overview Network Configuration Menu Options [OSD] You can select the Network option on the OSD Main Menu to configure network-related services for the KVM/net. Selecting Network under Configuration brings up the Network Configuration Menu. The Network Configuration Menu provides a number of options, as shown in the following screen. Not all the options are visible. The following diagram lists the names of all the configuration options accessed from the Configure>Network menu.
Configure Menu Overview The configuration screen series for each of the options under Configure>Network are listed and described in the following sections: Network Configuration Screens [OSD] Page 366 SNMP Configuration Screens [OSD] Page 369 VPN Configuration Screens [OSD] Page 373 IP Filtering Configuration Screens Page 377 Hosts Configuration Screens [OSD] Page 384 Static Routes Configuration Screens Page 386 Network Configuration Screens [OSD] You can select the Network option from the Netw
Configure Menu Overview Selecting Configure>Network>Network from the OSD Main Menu brings up the DHCP screen, which is the first in a series of configuration screens that appear in the sequence shown in the following table. The following table provides a description of all the related configuration screens. Table 7-6: Network Configuration Screens [OSD] Screen DHCP Description Enable or disable DHCP. When you select “enabled,” the screen shown in the following figure appears.
Configure Menu Overview Table 7-6: Network Configuration Screens [OSD] (Continued) Screen Description Gateway The IP address for the gateway (if applicable). DNS Server The IP address for the DNS server. Domain The domain name. Hostname The hostname for the KVM/net.
Configure Menu Overview SNMP Configuration Screens [OSD] You can select the SNMP option from the Network Configuration menu to configure SNMP. Selecting SNMP under Configuration>Network brings up the SNMP Configuration Menu. The SNMP Configuration Menu provides a number of options, as shown in the following screen. The following diagram lists the names of all the configuration screen series accessed from the Configuure>Network>SNMP Configuration menu.
Configure Menu Overview Configure — Network — SNMP — SysContact — SysLocation — Access Control — SNMPv1/2 — Add | Edit — Community — Source — OID — Permission — Read-Only — Read-Write — Delete — Exit — SNMPv3 — Add | Edit — Username — Password — OID — Permission — Read-Only — Read-Write — Delete — Exit — Exit — Exit 370 AlterPath KVM/net Installation, Administration, and User’s Guide
Configure Menu Overview Table 7-7 gives a brief description of all the SNMP configuration screens. Table 7-7: SNMP Configuration Screens [OSD] Screen Description SysContact The email address for the KVM/net administrator, for example: kvm_admin@cyclades.com. SysLocation The physical location of the KVM/net. Access Control Choices are SNMP v1/2 or SNMP v3. SNMP Configuration Appears when either SNMP v1/2 or SNMP v3 is selected. Choices are “Add,” “Edit/Delete,” or “Exit.
Configure Menu Overview Table 7-7: SNMP Configuration Screens [OSD] (Continued) Screen Description SNMPv1/v2 Source The source IP address or range of IP addresses. SNMPv1/v2 or v3 OID Object Identifier. Each managed object has a unique identifier. SNMPv1/v2 or v3 Permission Choices are “Read-Only” and “Read-Write.” Read Only - Read-only access to the entire MIB (Management Information Base) except for SNMP configuration objects.
Configure Menu Overview VPN Configuration Screens [OSD] You can select the VPN option from the Network Configuration menu to configure VPN. Selecting VPN under Configuration>Network brings up the VPN Configuration Menu. The VPN Configuration Menu provides the options shown in the following screen. You can use these options to add a VPN connection or to edit or delete a previously configured VPN connection. See “VPN” on page 250 for details.
Configure Menu Overview Configure — Network — VPN — Add | Edit — Connection Name — Protocol — ESP — AH — Local ID — Local IP — Local Nexthop — Local Subnet — Remote ID — Remote IP — Remote Nexthop — Boot Action — Ignore — Add — Start — Delete — Exit Table 7-8 gives a brief description of the VPN configuration screens series under Add and Edit.
Configure Menu Overview Table 7-8: VPN Configuration Screens [OSD] (Continued) Screen Local ID Description The hostname of the KVM/net, referred to as the “local” host. This is the hostname that a local system use for IPSec negotiation and authentication. It can be a Fully Qualified Domain Name preceded by @. For example, hostname@xyz.com. Local IP The IP address of the KVM/net. Local NextHop The router through which the KVM/net sends packets to the host on the other side.
Configure Menu Overview Table 7-8: VPN Configuration Screens [OSD] (Continued) Screen Description Remote Nexthop The IP address of the router through which the host on the other side sends packets to the KVM/net. Remote Subnet The netmask of the subnetwork where the remote host or security gateway resides, if applicable. Boot Action Choices are “Ignore,” “Add,” and “Start.” “Ignore” means that VPN connection is ignored. “Add” means to wait for connections at startup.
Configure Menu Overview IP Filtering Configuration Screens You can select the IP Filtering option from the Network Configuration menu to configure the KVM/net to filter packets like a firewall. Selecting IP Filtering under Configuration>Network brings up the “Filter Table.” The “Filter Table” lists the default chains along with any administratively configured chains, the “Add Chain,” and the “Exit” options, as shown in the following screen.
Configure Menu Overview Configure — Network — IP Filtering — Filter Table — Add Chain — Chain Name — [Choose a chain] — Edit [default chain only] — Accept — Drop — Delete Chain chain_name? [user-added chain only] — Rules — Add/Edit — Target — ACCEPT — DROP — RETURN — LOG — REJECT — Source IP — Source Mask — Destination IP — Destination Mask — Protocol — All — Numeric — TCP — SYN | RST | ACK | URG | FIN | PSH Flag — Any — Set — Unset — UDP — ICMP — Source Port [TCP and UDP only] — Destination Port [TCP and
Configure Menu Overview The following table shows the IP filtering screens. Table 7-9: IP Filtering Configuration Screens [OSD] Screen Description Filter Table Lists the default chains along with any administratively configured chains, the “Add Chain,” and the “Exit” options. Chain Name Only appears when “Add Chain” is selected. Entering the name of the chain adds the new chain’s name to the “Filter Table,” where you need to select the name of the new chain and define rules for the chain.
Configure Menu Overview Table 7-9: IP Filtering Configuration Screens [OSD] (Continued) Screen Edit Description Appears when a default chain is selected and the Edit option is chosen from the Chain - Chain_name menu. Choices are “Accept” or “Drop.” The following screens define the rules for packet filtering. The packet is filtered for the characteristics defined in the rule, for example, a specific IP header, input and output interfaces, TCP flags or protocol.
Configure Menu Overview Table 7-9: IP Filtering Configuration Screens [OSD] (Continued) Screen Description Destination IP The IP address of an output packet’s destination. Destination Mask The netmask of the subnet to which an output packet is going. Protocol Choices are “All,” “Numeric,” “TCP,” “UDP,” “ICMP.” Protocol Number Appears only if “Numeric” is selected from the “Protocol” menu. Source Port Appears only if “TCP” or “UDP are selected from the “Protocol” menu. The source port number.
Configure Menu Overview Table 7-9: IP Filtering Configuration Screens [OSD] (Continued) Screen Description SYN Flag Appears only if “TCP” is selected from the “Protocol” menu. Options are “Any,” “Set,” “Unset.” RST Flag Appears only if “TCP” is selected from the “Protocol” menu. Options are “Any,” “Set,” “Unset.” ACK Flag Appears only if “TCP” is selected from the “Protocol” menu. Options are “Any,” “Set,” “Unset.” URG Flag Appears only if “TCP” is selected from the “Protocol” menu.
Configure Menu Overview Table 7-9: IP Filtering Configuration Screens [OSD] (Continued) Screen Description Input Interface Appears only if “All,” “Numeric,” “TCP,” “UDP,” or “ICMP are selected from the “Protocol” menu. Output Interface Appears only if “All,” “Numeric,” “TCP,” “UDP,” or “ICMP are selected from the “Protocol” menu. Fragments Appears only if “All,” “Numeric,” “TCP,” “UDP,” or “ICMP are selected from the “Protocol” menu.
Configure Menu Overview Table 7-9: IP Filtering Configuration Screens [OSD] (Continued) Screen Description ICMP Type Appears only if ICMP is selected from the “Protocol” menu.
Configure Menu Overview You can select the options on this menu to add, edit, or delete host entries. Selecting “Edit” or “Delete Entry” brings up the following “Select a host” screen. The following diagram lists the names of the configuration screens accessed under Configure>Network>Hosts. Configure — Network — Hosts — Add | Edit — Select a host [Edit only] — IP — Name — Alias — Delete — Select a host The following table shows the screens for the Add and Edit options.
Configure Menu Overview Table 7-10: Hosts Configuration Screens [OSD] Screen Description Name Hostname of the host Alias Optional alias of the host Static Routes Configuration Screens You can select the Static Routes option from the Network Configuration menu to configure static routes. If judiciously used, static routes can sometimes reduce routing problems and routing traffic overhead.
Configure Menu Overview The following diagram lists the names of the configuration screens accessed under Configure>Network>Static Routes.
Configure Menu Overview Table 7-11:Static Routes Screens [OSD] (Continued) Screen Description Host or Net Route Types of routes: “host,” “net,” or “default.” Note: A default route is used to direct packets that are addressed to networks not listed in the routing table. Target IP address for the target host or network. Netmask Appears only when “net” is selected from the “Host or Net Route” screen. Netmask for the destination.
Configure Menu Overview Table 7-11:Static Routes Screens [OSD] (Continued) Screen Description Metric The number of hops to the destination. Date/time Configuration Screens You can select the Date/time option from the OSD Configuration menu to either configure an NTP server or manually set the date and time. Selecting Date/time under Configuration>Network brings up the NTP menu, as shown in the following screen.
Configure Menu Overview Configure — Date/time — NTP — enabled — NTP server — disabled — Date/time conf. — Date — Time If NTP is enabled, the following screen appears for entering the IP address of the NTP server. If NTP is disabled, the following series of two screens appears to allow you to enter the date and time manually.
Configure Menu Overview The changes apply only to the currently accessed local station. For example, if an administrator configures these settings while connected to the User 2 port, these settings will be changed for all users who log in to the User 2 port, but the User 1 port setting will remain unchanged. The following diagram lists the configuration screens accessed through the Configure>User station option.
Configure Menu Overview Table 7-12:User Station Configuration Screens (Continued) Screen Description Scr. saver timeout The period of inactivity before the screen saver starts. The default is 10 minutes. Cycling The number of seconds each server is viewed while the user is cycling from one port to another. Default = 5 seconds. See “To Initiate Cycle by Server” on page 332 for instructions on how to cycle through the servers.
Configure Menu Overview Table 7-12:User Station Configuration Screens (Continued) Screen Description Mouse/Keyboard Redefine the command key portion of the KVM connection mouse/keyboard reset hot key. Video Redefine the command key portion of the KVM connection video brightness and cable length adjustment hot key. Switch Next Redefine the command key portion of the KVM connection switch next hot key. Switch Previous Redefine the command key portion of the KVM connection switch previous hot key.
Configure Menu Overview KVM Ports Screens You can select the KVM Ports option on the OSD Configuration Menu to configure KVM ports. The following diagram lists the configuration screens accessed through the Configure>KVM ports option. Configure — KVM ports [Select a port] — Active — Server name — Lockout Macro — Power out Figure 7-4:KVM Ports Configuration Screens The following table shows the KVM port configuration screens.
Configure Menu Overview Table 7-13:KVM Port Configuration Screens (Continued) Screen Description Server name Allows you to assign a descriptive alias, such as the name of the server to which the selected KVM port is connected. Only alpha-numeric characters, hyphens (-), and underscores (_) are accepted. The new alias replaces the default port name in the list of ports as shown here: Lockout Macro Allows you to enter the key sequence to lock the server’s display.
Configure Menu Overview AUX Port Screens You can select the AUX Port option on the OSD Configuration Menu to configure the AUX port. The following diagram lists the configuration screens accessed through the Configure>AUX port option.
Configure Menu Overview The following table shows the AUX port configuration screens. Table 7-14:KVM Port Configuration Screens Screen Description AUX port - Protocol Choices are “Disable,” “Power Management,” and “PPP.” The Aux port are enabled by default. If you need to disable a port, select “Disable” and save your changes. To enable a port select the desired protocol “Power Management” or “PPP.
Configure Menu Overview Table 7-14:KVM Port Configuration Screens (Continued) Screen Description AUX port - PPP Flow Control Gateway or interface address used for the route. AUX port - PPP Data Size The number of data bits. AUX port - PPP Parity None, even, or odd. AUX port - PPP Stop Bits The number of stop bits.
Configure Menu Overview Table 7-14:KVM Port Configuration Screens (Continued) Screen Description AUX port - PPP Remote IP Remote IP address Cascade Devices You can select the Cascade Devices option on the OSD Configuration Menu to perform the following tasks: • Add a secondary KVM unit to be cascaded from the master KVM/net. • Edit the configuration of a cascaded device. • Delete the configuration of a cascaded device.
Configure Menu Overview netPlus, a KVM/net, a KVM, or a KVM Expander. The following diagram lists the configuration screens accessed through the Cascades devices option.
Configure Menu Overview Table 7-15:Cascade Devices Configuration Screens (Continued) Screen Description Cascade Device Edit Device Appears when Edit device is selected from the “Cascade device Choose an option” screen. Select the device Select the name of a previously added cascaded KVM unit. Select the port which connects to B/USER 2 Enter the port number of the masterKVM/net that is connected to the User 2 port of the secondary KVM device or the B port on the Expander.
Configure Menu Overview Table 7-15:Cascade Devices Configuration Screens (Continued) Screen Description Cascade Device Delete DeviceSelect Appears when Delete device is selected from the “Cascade device Choose an option” screen. the device 402 The following confirmation screen appears once a cascaded device is selected.
Configure Menu Overview Users and Groups Screens You can choose the “Users and groups” option from the OSD Configuration menu to configure users, groups, and KVM port permissions. When you select “Users and Groups,” the “Choose an option” screen appears, as shown in the following screen example. The “Local Users” option is for configuring users; the “Local Groups’ option is for configuring groups, and the “User Access Lists” option is for configuring users’ and groups’ access to KVM ports.
Configure Menu Overview Configure — Users and groups — Local Users — Choose an option — Add User — Enter the username.
Configure Menu Overview The following table shows the configuration screens that appear when the “Local Users” option is selected from the Users and Groups menu under Configure in the OSD. Table 7-16:Local Users Configuration Screens Screen Description Choose an option Options are: “Add User,” “Change Password,” “Delete User,” or “Exit.” User Database Enter the username Appears only when “Add User” is selected. Type of user Appears only when “Add User” is selected.
Configure Menu Overview Table 7-16:Local Users Configuration Screens (Continued) Screen Description Select the user Appears only when “Change Password” or “Delete User” are selected. When “Delete User” and then a username are selected, a confirmation screen like the following appears: The following table shows the configuration screens that appear when the “Local Groups” option is selected from the Users and Groups menu under Configure in the OSD.
Configure Menu Overview Table 7-17:Local Groups Configuration Screens (Continued) Screen Description Enter the username When “Add user” or “Add user to group” are selected. To add multiple users, use a comma to separate each username. When the user is successfully added, the following confirmation screen appears. Delete user from group select group When “Del user from group” is selected.
Configure Menu Overview You can use the User Access Lists menu to view and change KVM port access permissions for the Default User and all administratively configured users and groups. See “Prerequisites for Accessing Servers With KVM Connections” on page 314 for details. The following table shows the configuration screens related to setting KVM port access permissions when the “User Access List” option is selected from the Users and Groups menu under Configure in the OSD.
Configure Menu Overview Table 7-18:User Access List KVM Port Permissions Configuration Screens Screen Description Access list for username - select the server The access list includes the “Reset all,” “Default,” “Multiple servers,” and “Exit” options along with each individual KVM ports. The “Default” option defines access permissions for all KVM ports, which apply unless the user has specific access permissions for any KVM ports.
Configure Menu Overview Table 7-18:User Access List KVM Port Permissions Configuration Screens Screen Description Permissions for username: port_number or for username: followed by another Access list option, such as “Default” or “Multiple Servers” The permissions from this menu can be configured to be “Default” permissions for all ports, applied to Multiple Servers, or applied to a selected port. Permissions menu options are “No Access,” Read-Only,” “Read Write,” “Read/Write/Power.
Configure Menu Overview To complete the configuration of system logging, you must specify a facility number as shown in “Syslog Facility” on page 363. Notification Screens You can select the Notifications option on the OSD Configuration Menu to configure the KVM/net to monitor and send notifications by the way of SNMP traps. Screen Description Choose an option The initial step is to select Add to configure a SNMP trap. Alarm Trigger Define the event you want to trigger a notification for.
Configure Menu Overview Screen Description OID Object Identifier. Each managed object has a unique identifier. Trap Number The trap types listed in the drop-down menu translates to a trap number in the system logs. Community A Community defines an access environment. The type of access is classified under “Permission”: either read only or read write. The most common community is “public”. Take caution in using a “public” community name as it is commonly known.
Configure Menu Overview Screen Description Body The text you want sent in the trap message. Authentication Screens You can select the Authentication option on the OSD Configuration Menu to configure an authentication type (AuthType) for logins to the KVM/net and to configure authentication servers for any type of logins: to the KVM/net or to KVM ports. See “Authentication” on page 45 for details about authentication on the KVM/net. The Authentication menu appears as shown in the following figure.
Configure Menu Overview Configure — Authentication — Choose an option — Unit Authentication — Local — Local/Radius — Local/Tacplus — Local/Nis — Nis — Nis/Local — Nis/Downlocal — Radius — Radius/Local — RadiusDownLocal — TacacsPlus — Tacplus/Local — TacplusDownLocal — NTLM(Win NT/2k/2k3) — NTLMDownLocal — Kerberos | Ldap — Server IP — Domain Name — Ldap — User — Password — Login Attribute — Secure (on/off) — Yes — No — Radius | TacacsPlus — Auth. Server1 — Auth. Server2 — Acct. Server1 — Acct.
Configure Menu Overview The following tables show the screens that appear when the “Authentication” option is selected from the Configure menu in the OSD. The first table shows the screen for choosing a KVM/net login authentication method.
Configure Menu Overview Table 7-20:Common Configuration Screens for Kerberos and LDAP Authentication Screen Description Kerberos Choose Kerberos to configure a Kerberos authentication server. Server IP IP address of the Kerberos or LDAP server. Domain Name Domain name.
Configure Menu Overview The following table shows the unique screens for configuring an LDAP server that appear in addition to the screens shown in Table 7-20, “Common Configuration Screens for Kerberos and LDAP Authentication,” on page 7415.The following table shows the configuration screens for the Radius and Table 7-21:Unique LDAP Authentication Server Configuration Screens Screen Description User The LDAP user name. Password The LDAP password. Login Attribute The login attribute.
Configure Menu Overview TACACS+ authentication servers.The following table shows the Screens for Table 7-22:Configuration Screens for the Radius or TACACS+ Authentication Servers Screen Radius Auth. Server1 Description TacacsPlus Auth. Server2 Choose Radius or TacacsPlus to configure a Radius or TACACS+ authentication server. IP addresses of one or two authentication servers. The second server is optional. Acct. Server1 and Acct. Server2 IP addresses of one or two optional accounting servers.
Configure Menu Overview Table 7-22:Configuration Screens for the Radius or TACACS+ Authentication Servers (Continued) Screen Description Timeout Timeout in seconds. The default is 3 seconds for Radius and 10 seconds for TacacsPlus. Retries Number of retries. The default is 5 for Radius and 2 for TacacsPlus. configuring a Smb (NTLM) authentication server. Table 7-23:Smb (NTLM) Configuration Screens Screen Description Smb(NTLM) Choose Smb(NTLM) to configure an SMB (NTLM) authentication server.
Configure Menu Overview Table 7-23:Smb (NTLM) Configuration Screens (Continued) Screen Description Auth. Server1 and Auth. Server2 IP addresses for one or two SMB (NTLM) authentication servers. The second server IP is optional. The following table shows the screens for configuring a NIS authentication server. Table 7-24:NIS Configuration Screens NIS Choose the NIS authentication server Domain Name Enter the Domain Name Server IP IP address of the NIS server.
Configure Menu Overview Save/Load Configuration Screens You can use the Save/Load Config option on the OSD Configuration Menu to save any configuration changes you have made since the last save into a backup directory or onto an FTP server. You can also restore configuration file changes from a backup directory or FTP server to overwrite any configuration changes that were made since the last save. The Save/Load Config screen appears as shown in the following figure. Not all options are visible.
Configure Menu Overview Configure — Save/Load Config. — Save Configuration — Saving configuration . . . — Configuration was . . . saved. — Load Configuration — Restoring configuration . . . — Configuration was loaded . . . — Save to FTP — Save to FTP Server—Filename — Server — Username — Password — Saving configuration . . . — Configuration was . . . saved — Load from FTP — Load from FTP Server—Filename — Server — Username — Password — Restoring configuration . . . — Configuration was loaded . . .
Configure Menu Overview Table 7-25:Save/Load Configuration Screens (Continued) Screen Description Load Configuration When “Load Configuration” is selected, the following two screens appear. Save to FTP When “Save to FTP” is selected, the following five screens appear for you to enter the “Filename,” FTP “Server” name, FTP Login “Username” and “Password.” The last screens confirm the save to FTP succeeded.
System Info Menu System Info Menu System Information window provides administrators detailed system information. The following table offers an example of the type of information you may see on the System Info window. Table 7-26: System Information Example Information Type Example Board KVM/net Server ports: 32 User stations: 2 ID: B7DA3C0A000011 Firmware: 2.0 Version Orig. Boot: 2.0.7 Alt.
System Info Menu Table 7-26: System Information Example (Continued) Information Type Example User2 connection RP main, V1.0.4 RP local, V1.0.
Reboot T To Access System Information 1. On the Main Menu, select System Info. The System Info window appears. 2. Use the up and down arrow keys to view the information. 3. To exit, press the escape key. Reboot You can reboot the KVM/net from the Main Menu of the OSD. This is particularly useful when operating through the KVM RP. T To reboot the KVM/net 1. Select Reboot from the Main Menu. The following message appears.
Reboot 2. Select Yes to reboot the KVM/net.
Controlling the OSD Through the AlterPath KVM RP Controlling the OSD Through the AlterPath KVM RP While using the AlterPath KVM RP, an administrator has full access to the OSD menus, so all local administration tasks can be performed in an office or at any other location up to 500 feet away from the KVM/net.
Controlling the OSD Through the AlterPath KVM RP 5. Depending on your access privilege, perform one or more of the following actions: • If logged in as administrator, perform configuration tasks as described in “Configure Menu Overview” on page 358, “System Info Menu” on page 424, and “Reboot” on page 426. • If desired, connect to devices that are physically connected to the KVM/net. See “Invoking OSD Using [PrintScreen] Key” on page 355 for instructions.
Controlling the OSD Through the AlterPath KVM RP The green LED labelled Local turns off, and the green LED labelled Remote lights on. By default the KVM RP is set to beep when the monitor display switches from local to remote. See “To Turn the Beeper On or Off When Switching Between the Local and the Remote Work Stations” on page 430 for instructions on turning the beep on or off.
Appendix A Troubleshooting How to Replace the KVM/net’s Boot Image If the KVM/net does not boot, you may need to replace the boot image. This process requires boot from a TFTP server and an FTP server to download and store the “zImage” in the KVM/net flash memory. Follow the below procedure to download the latest firmware from the Cyclades FTP server at ftp://ftp.cyclades.com/ and install it onto the KVM/ net. Note: Please read the following procedure thoroughly before proceeding with the upgrade.
4. If the memory test (RAM) is being performed, press to bypass it. By default the “Testing RAM” is set to skip. Testing RAM .............................. FULL TEST This test takes a few seconds. Press if you want to cancel it. Memory detected: 131072 Kbytes WARNING! Memory not checked. 5. If the storage device test is being performed, press to bypass it. By default the “Testing Storage Device” is set to skip. Testing Storage Device [Op Code] ......... SKIPPED 6.
e. Enter the IP address to be assigned to the KVM/net unit. KVM/net must be in the same subnet as the TFTP server. IP address assigned to Ethernet interface [192.168.51.243] f. Enter the IP address of TFTP server where you downloaded and stored the latest firmware. Server's IP address [192.168.51.222] : g. Accept the MAC address value that is assigned to the KVM/net unit’s Ethernet card. MAC address assigned to Ethernet [00:60:2E:01:61:0C] : h.
9. Log in to the unit and proceed with the following steps to save the zImage in flash memory. Note: If you are not seeing the initial boot messages (memory tests) but only the Linux boot, then check the cable you are using. The cable may not be properly wired or the terminal port is not providing the correct RS-232 signal. Check the terminal emulator application for speed/parity/length configured in the COM port to access to unit.
Table A-1: Boot Message Booting from Original Boot 2.0.7 (Apr/21/04) Cyclades Corporation Testing RAM .............................. SKIPPED Memory detected: 131072 Kbytes Testing FLASH ............................ OK Flash detected: 256 Kbytes Testing Flash [Configuration] ............ OK Storage Device Detected .................. OK Compact Flash SMC128AFA5 Size: 130 Mbytes Testing Storage Device [Op Code] ......... SKIPPED Interface Cards Detected .................
T To Save the zImage into the KVM/net’s Flash Memory. 1. Download the latest firmware from the Cyclades FTP server at ftp:// ftp.cyclades.com/ and save it on your FTP Server. Note: Make sure to set the transfer mode to binary (bin). 2. Save the file onto your FTP server. In the following example the filename is zImage_kvm_200.bin 3. Connect a terminal to the console port on your KVM/net, login as “root”, and go to the following directory. [root@)KVM/net root]# cd /proc/flash [root@KVM/net flash]# 4.
How to Upgrade the Firmware on KVM/net 1. Download the firmware bin file (*.bin) and the md5 checksum (*.md5) from Cyclades download site at http://www.cyclades.com/support/ downloads.php or from Cyclades FTP server at ftp://ftp.cyclades.com and place it on your local FTP or SSH/SCP server. 2. Use FTP or SSH/SCP to copy the downloaded files to the flash memory of your KVM/net unit by overwriting the existing firmware. T FTP Method Follow the below procedure if you use FTP.
1. Login as root to your KVM/net and execute the following commands. [root@KVMNet root]#scp paul@192.168.51.242:/home/ paul/cyclades/zImage_kvm_200.bin /proc/flash/ zImage_kvm_200.bin [root@KVMNet root]#scp paul@192.168.51.242:/home/ paul/cyclades/zImage_kvm_200.md5 /proc/flash/ zImage_kvm_200.md5 2. Execute the following command as “root” to generate the md5 checksum of the upgraded firmware file. [root@KVMNet root]# md5sum /proc/flash/ zImage_kvm_200.bin 3.
Warning! All configuration settings will be lost! #echo > /proc/flash/script 6. Reboot your unit by executing the following command.
How to Boot the KVM/net Over the Network. Follow the steps described in section "To Boot From TFTP" to boot the KVM over the network. If you would like the KVM/net to boot always from the network follow the below procedure to configure the unit. 1. Connect a terminal to the console port of your KVM/net with the following parameters: Baud Rate: 9600, Data: 8 bit, Parity: none, Stop: 1 bit, Flow control: none. 2. Login as “root”, and execute the following command. [root@KVMNet root]# bootconf 3.
4. Press [Enter] to accept the default parameters, but change the following parameter to enable boot from the network. Firmware boot from ((F)lash or (N)etwork) [F] : N 5. The following prompt appears for you to review the changes before saving to flash memory. New configuration to be saved as MAC address assigned to Ethernet [00:60:2e:01:61:0c] IP address assigned to Ethernet interface [192.168.51.
How to Boot the KVM/net in Single User Mode The KVM/net has a single user mode that is used when: 1. The name or password of the user with root privileges is lost or forgotten. 2. When an upgrade or downgrade process does not work properly and the system turns unstable. 3. When a configuration change leaves the KVM/net inoperative or unstable. Note: You cannot perform this process using Telnet or other remote connection protocols. T To Boot the KVM/net in Single User Mode 1.
4. When the boot process is completed, the following prompt appears. [root@(none) /]# 5. If the password is forgotten execute the following command. [root@(none) /]# passwd New password: ******* Re-enter new password: ******* Password changed 6. Save the new configuration and reboot the unit. [root@(none) /]# saveconf Checking the configuration file list... Compressing configuration files into /tmp/ saving_config.tar.gz ... done. Saving configuration files to flash ... done. [root@(none) /]# reboot 7.
Execute the following script, replacing the parameters with values appropriate for your system. The gw and mask parameters are optional. [root@(none)]# config_eth0 ip 192.168.51.242 mask 255.255.255.0 gw 192.168.51.1 b. Using the “vi editor”, edit the file(s) causing the problem and then reboot the unit. [root@(none) root]# saveconf [root@(none) root]# reboot c. Check your DNS configuration in the file /etc/resolv.conf, and download the zImage using the ftp command.
How to Disable Mouse Acceleration Using Windows Registry In order to disable the mouse acceleration and synchronize it on your PC or laptop with the remote server attached to KVM/net, run regedit on the remote server, and disable the mouse acceleration by setting the mouse speed to “0”. The following registry entries shows the path where the “MouseSpeed” setting is located. HKEY_USERS\\.
446 AlterPath KVM/net Installation, Administration, and User’s Guide
Appendix B Technical Specifications The following table provides the technical specifications for the KVM/net.
Table B-1: Technical Specifications (Continued) 448 Dimensions (WxDxH) • KVM/net - 17 x 9.5 x 1.75 in (43.18 x 24.13 x 4.45 cm) • KVM Expander – 12 x 2.5 x 1.53 in (30.48 x 6.35 x 3.87 cm) • KVM Terminator 1.24 x 2.60 x 0.85 in (3.15 x 6.60 x 2.16 cm) • KVM RP 9 x 9 x 1.75 in (22.86 x 22.86 x 4.
Appendix C Safety Guidelines Follow the precautions in this appendix when installing Cyclades products. Failure to observe the listed precautions may result in personal injury or damage to equipment. Failing to observe compliance requirements makes the equipment no longer compliant. See Appendix B, “Technical Specifications” on page 447 for specific standards and compliance information for the AlterPath KVM/net.
General Safety Precautions • Connect products that have dual power supplies to two separate power sources, for example, one commercial circuit and one uninterruptible power supply (UPS). The power sources must be independent of each other and must be controlled by a separate circuit breaker. • For products that have AC power supplies, ensure that the voltage and frequency of the power source match the voltage and frequency on the label on the equipment.
Rack or Cabinet Placement Rack or Cabinet Placement When installing Cyclades equipment in a rack or cabinet, observe the following precautions: • Ensure that the floor’s surface is level. • Load equipment starting at the bottom first and filling the rack or cabinet from the bottom to the top. • Exercise caution to ensure that the rack or cabinet does not tip during installation and use an anti-tilt bar. Table Placement • Choose a desk or table sturdy enough to hold the equipment.
Safety Guidelines for Rack-Mounting the KVM/net Temperatur Die maximal empfohlene Umgebungstemperatur des AlterPath KVM/net beträgt 50 ºC (122 ºF). Elevated Operating Ambient Temperature If the AlterPath KVM/net is installed in a closed or multi-unit rack assembly, the operating ambient temperature of the rack environment may be greater than room ambient temperature.
Safety Precautions for Operating the AlterPath KVM/net Circuit Overloading Consideration should be given to the connection of the equipment to the supply circuit and the effect that overloading of circuits might have on overcurrent protection and supply wiring. Appropriate consideration of equipment nameplate ratings should be used when addressing this concern.
Safety Precautions for Operating the AlterPath KVM/net Sicherheitsvorkehrungen beim Betrieb des AlterPath KVM/net Bitte lesen Sie alle folgenden Sicherheitsrichtlinien um sich und Ihren AlterPath KVM/net vor Schäden zu bewahren. Caution: Do not operate your AlterPath KVM/net with the cover removed. Vorsicht: Bitte betreiben Sie den AlterPath KVM/net nicht mit geöffnetem Gehäuse.
Safety Precautions for Operating the AlterPath KVM/net where they can be stepped on or tripped over. Do not spill food or liquids on KVM/net. Vorsicht: Um den AlterPath KVM/net vor elektrischen Netzschwankungen zu bewahren bitte Überspannungsfilter, Entstörfilter oder eine UVS einsetzen. Stellen Sie bitte sicher dass sich keine Gegenstände auf den Kabeln des KVM/net befinden und dass die Kabel tritt- und stolpersicher geführt sind. Bitte keine Lebensmittel oder Flüssigkeiten über den KVM/net schütten.
Safety Precautions for Operating the AlterPath KVM/net 456 AlterPath KVM/net Installation, Administration, and User’s Guide
Glossary 3DES Tripple Data Encryption Standard, an encrypting algorithm (cipher) that processes each data block three times, using a unique key each time. 3DES is much more difficult to break than straight DES. Because it is the most secure of the DES combinations, 3DES is also slower in performance. Authentication The process by which a user’s identity is checked within the network to ensure that the user has access to the requested resources.
cannot be equated to bandwidth unless the number of bits per symbol is known. BogoMips A measurement of processor speed made by the Linux kernel when it boots, to calibrate an internal busy-loop. Bonding (Linux) Ability to detect communication failure transparently, and switch from one LAN connection to another. The Linux bonding driver has the ability to detect link failure and reroute network traffic around a failed link in a manner transparent to the application.
CIDR Notation Classless Inter Domain Routing (CIDR) is a method for assigning IP addresses without using the standard IP address classes like Class A, Class B or Class C. In CIDR notation, an IP address is represented as A.B.C.D /n, where "/n" is called the IP prefix or network prefix. The IP prefix identifies the number of significant bits used to identify a network. For example, 192.9.205.
but a given Domain Name points to only one machine. For example, the domain names: matisse.net, mail.matisse.net, workshop.matisse.net can all refer to the same machine, but each domain name can refer to no more than one machine. Usually, all of the machines on a given Network will have the same thing as the right-hand portion of their Domain Names (matisse.net in the examples above). It is also possible for a Domain Name to exist but not be connected to an actual machine.
in a buffer. When the buffer is nearly full, the receiving side signals the sending side to stop until the buffer has space again. Between hardware (such as your modem and your computer), hardware flow control is used; between modems, software flow control is used. FTP Short for File Transfer Protocol. The protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring web pages from a server to a user's browser.
IPsec Short for IP Security Protocol, IPsec is an extended IP protocol that provides encrypted security services. These services enable authentication, as well as access and trustworthiness control. IPsec provides similar services as SSL, but it works on a network layer. Through IPsec you can create encrypted tunnels (VPN) or encrypt traffic between two hosts. Kerberos Kerberos was created by MIT as a solution to network security problems.
Every network has a different MTU, which is set by the network administrator. On Windows, you can set the MTU of your machine. This defines the maximum size of the packets sent from your computer onto the network. Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination. Otherwise, if your messages are larger than one of the intervening MTUs, they will get broken up (fragmented), which slows down transmission speeds.
Object Identifiers (OID) The SNMP manager or the management application uses a welldefined naming syntax to specify the variables to the SNMP agent. Object names in this syntax are called Object Identifiers (Object IDs or OIDs). OIDs are series of numbers that uniquely identify an object to an SNMP agent. OIDs are arranged in a hierarchical, inverted tree structure. The OID tree begins with the root and expands into branches.
maximum length of a packet depends on the communication medium. As an example, in Ethernet networks the maximum length is1500 bytes. A data packet can be divided into two parts: the header part and the data part. The header contains information needed for communication between nodes; the data is the body of the packet that is ultimately received by the application. Parity In serial communications, the parity bit is used in a simple error detection algorithm.
older protocol, SLIP, as it is more stable and has more errorchecking features. PPP has been a widely used Internet standard for sending datagrams over a communications link. The PPP standard is described in RFC 1661 by the Point-to-Point Working Group of the Internet Engineering Task Force (IETF). PPP is commonly used when remote computers call an Internet service provider (ISP) or a corporate server that is configured to receive incoming calls.
Server Farm A collection of servers running in the same location (see Cluster). SMTP Simple Mail Transfer Protocol. Specifies the format of messages that an SMTP client on one computer can use to send electronic mail to an SMTP server on another computer. SNMP Short for Simple Network Management Protocol, a set of protocols for managing complex networks. The first versions of SNMP were developed in the early 80s.
Stop Bit A bit which signals the end of a unit of transmission on a serial line.A stop bit may be transmitted after the end of each byte or character. Subnet Mask A bit mask used to select bits from an Internet address for subnet addressing. Also known as Address Mask. Sudo Sudo (superuser do) is a utility for Unix and Linux based systems that provides an efficient way to give specific users permission to use specific system commands at the root level of the system.
number of 'probe' packets has been ignored by the client, the server assumes the worst and the connection is closed. The keep-alive timer provides the capability to know if the client's host has either crashed and is down or crashed and rebooted. Telnet A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network.
Watchdog timer A watchdog timer (WDT) is a device or electronic card that performs a specific operation after a certain period of time if something goes wrong with an electronic system and the system does not recover on its own. A common problem is for a machine or operating system to lock up if two parts or programs conflict, or, in an operating system, if memory management trouble occurs.
Index Numerics 3DES 363 56K 342 A access 160 assigning KVM port 196 user 68 user and group 195 Access Control 371 Access list for username - select the server 409 access to KVM ports, enabling direct 173 Web Manager 101 Web Manager, default IP address 101 Web Manager, dynamic IP address 102 accessing cascaded ports 24 connected devices 309 connected devices, tasks related to 33 in-band servers 313 KVM RP 131 KVM servers 314 ports 33 RDP servers 200 system information 426 Acct. Server1 and Acct.
modes of 141 Web Manager 138 windows, common features of 136 alarms logging 55 syslog 53 alarms and syslog, configuring 168 Alias 386 alias for a KVM port, specifying 186 AlterPath KVM Expander, installing 119 AlterPath KVM Terminators 121 AlterPath KVM/net ordering options 13 AlterPath KVM/net, shipping box contents 73 AlterPath PM connecting 117 upgrading 169 AlterPath RP 68, 428 installing 129 using 428 AlterPath Viewer options, setting 341 settings 339 Any 236 Auth. Server1 and Auth.
back up configuration data 285 Backspace 352 backup configuration 283 Baud Rate, PPP configuration 267 beeper on AlterPath KVM RP 430 Board 424 boot configuration 273 configuring with Web Manager 276 image, changing the 431 Boot Action 376 Boot Action, Local 253 Boot File Name 274 bootp 274 box contents, shipping KVM Expander 120 KVM RP 130 brackets, mounting 121 brightness, adjusting screen 333 buffering, data 53 C Cable Length Adjustment 333 cabling white paper and ordering 75, 121 Cascade Device Add Dev
Hosts 384 IP Filtering 377 Network 366 Save/load 421 SNMP 369 Static Routes 386 VPN 373 Configure 355 configure menu overview 358 configuring authentication method 226 authentication method for logins through KVM ports 207 authentication method, KVM/net logins 206 authentication servers 208 AUX 1 port 267 basic networking OSD 89 wiz command 85 boot 276 cascaded KVM units 187 creation of alarms and syslog files for IPDUs 168 encryption on port connections 226 host settings 228 hosts 262 KVM port for power
connection menu 342 connection menu, OSD 326 Connection Name 374 connection type 31 connection types 31 connections encryption on port 226 modem 346 prerequisites for in-band 313 prerequisites for KVM 314 sharing KVM port 336 simultaneous server 16 through the OSD, controlling local KVM port 328 viewing in-band 313 viewing KVM 311 Connector Name 252 Connectors 4 console port, connection 82 port, loging in through the 85 port,changeing the password through the 85 control buttons 136 CPU 424, 447 Custom Secu
direct access to KVM ports, enabling 173 direct connection 82, 101 Disable Mouse Acceleration 106 Linux 108 Windows 2000 106 Windows 95/98/NT 107 Windows ME 107 Windows XP/2003 106 disabling KVM ports 186 Disabling Mouse Acceleration 36, 106 DNS Server 368 document audience xiii CD xv downloads xv organization xiv related documentation xv Domain 368 Domain Name 416, 419, 420 download microcode 293 downloading documents xv DSL 342 dynamic IP address 102 E echo-reply 249 editing chain 240 chain for IP filter
Expert mode, overview 160 external modem connecting 116 F facility numbers example 54 syslog messages 54 Fast Ethernet 275 Fast Ethernet Max Interrupt Events 275 features of administrators’ Windows, common 136 features, KVM Expander 59 Field Adjacent to Go to 266 fields ICMP protocol 237 numeric protocol 235 TCP protocol 235 UDP protocol 236 Filter Table 379 filtering chain for IP 243, 244 configuration screens, IP 377 IP 233 KVM port message 232 packet rule adding 242 rule for IP 241, 244 FIN 236 FIN Flag
online 277 hierarchy, KVM port permissions 26 High Color 343 Home 352 Host IP 265 Host or Net Route 388 host settings 228 host settings, configuring 228 host tables 258 Hostname 368 hosts configuration screens 384 hosts, configuring 262 hot keys conventions for xvi for emulating sun keyboard keys 330 for local station 329 redefining KVM connection 35 redefining sun keyboard equivalent 35 summary of tasks for redefining 36 https 144, 222 humidity 447 I ICMP protocol fields 237 ICMP Type 384 icmp-host-prohib
edit a rule for 241 IP Options 249 IP Security Level 363 IPDU information, viewing and resetting 165 IPDU Power Management 161 IPDU power management forms, controlling power through 41 IPDUs info, view 164 IPDUs, alarms and syslog 168 K Kerberos 208, 416 Kerberos authentication server, configuring 209 keyboard and mouse, resetting the 334 equivalent hot keys, redefining sun 35 keys, hot keys for emulating sun 330 shortcuts (hot keys), redefining 35 shortcuts (hot keys), redefining KVM connection 173 short
logins, specifying authentication 175 permissions hierarchy 26 permissions, understanding 25 power management, configuring 183 KVM ports 7, 394 connecting computers to 78, 80 controlling power while connected to 41 enable direct access to 173 enabling direct access to 173 syslogging for 232 KVM ports screens 394 KVM RP beep 430 connectors 69 powering on 132 shipping box contents 130 KVM session keyboard shortcuts, redefining 174 KVM terminator usage and types 58 KVM Terminators 75 KVM terminators 75, 121 K
IP address and port entered 320 IP address entered 320 Direct Logins Not EnabLED 318 login screen, connecting to a KVM port through the 324 login screen, Web Manager 316 logins through KVM ports, configuring an authentication method for 207 logins, authentication method 206, 207 logins, authentication servers 208 logins, simultaneous 15 logins, specifying authentication for KVM port 175 logout button 136 Low BW LAN 342 Low Color 343 Low Grey Scale 343 M main menu, OSD 354 managing power, options for 40 Mas
KVM Expander, the 122 mouse, resetting 334 Mouse/Keyboard 393 MTU/MRU, PPP configuration 268 NTP, setting the time and date with 270 numbers for syslog messages, facility 54 numbers of cascaded KVM devices, reading the port 319 numbers, example of using facility 54 numeric protocol fields 235 N Name 386 navigating conventions xvi the OSD 352 navigation actions, common 353 keys, basic 352 Netmask 367, 388 network 226 Network bits/sec 340 network configuration menu options 365 network configuration screens
the 429 through the AlterPath KVM RP, controlling the 428 time and date, setting 96 OSD Reboot screen 355 Outlets Manager 162 outlets, configuring users for managing 166 outlets, KVM Expander 63 Output Interface 238, 383 OUTPUT packet 233 overview, Configure menu, OSD 358 overview, Expert mode 160 P packet filtering rule, adding a 242 Page Up / Page Down 352 parameters defined using the wiz command, applying and confirming the network 87 parameters using the OSD, configuring network 92 Parity, PPP configur
controlling power while connected to KVM 41 enabling direct access to KVM 173 KVM 7 TCP 20 types of 4 ports and specify message filtering, configuring syslogging for KVM 232 ports on cascaded KVM devices, accessing 24 ports on the KVM Expander 62 ports screens, AUX 396 ports screens, KVM 394 power connector 7 power control 305 Power Management 355, 392 power management 40, 343 configuring a KVM port for 183 forms 41 IPDU 161 KVM-connected servers 41, 335 menu 357 options 40 regular users 304 setting up and
Q Quit 392 Quit this session 337 R raccess 219 raccess authorization 219 Rack Placement 451 RADIUS 208 Radius 418 Radius authentication server 217 RDP servers, prerequisites for access 200 reboot 298, 426 reboot, remote location 298 recommended settings 339 redefining hot keys, summary of tasks for 36 keyboard shortcuts (hot keys) 35 KVM connection hot keys 35 KVM connection keyboard shortcuts (hot keys) 173 KVM session keyboard shortcuts 174 sun keyboard equivalent hot keys 35 regular users log into Web M
S Safety Guidelines 449 safety precautions 453 Save changes 353 Save Configuration 422 Save to FTP 423 save/load configuration screens 421 saving changes, logging into the Web Manager and 137 saving configuration changes 140 Scr.
servers administering users of connected 33 connecting, OSD 325 connecting, Web Manager 321 cycling between 332 prerequisites for in-band access to RDP 200 prerequisites for logging to syslog 54 syslog 54 servers with in-band connections, prerequisites for accessing 313 servers with KVM connections, prerequisites for accessing 314 servers, authentication 208 session keyboard shortcuts, redefining KVM 174 sessions active 296 information, viewing active 296 killing active 297 Set 236 set the time and date w
steps in Wizard mode 143 Stop Bits, PPP configuration 268 storage temperature 447 Subnet Mask, Remote 253 Sun Keyboard 363 sun keyboard equivalent hot keys 35 sun keyboard keys 330 Switch Next 393 Switch Previous 393 switch, power 7 SYN 236 SYN Flag 382 SysContact 255, 371 SysLocation 256, 371 syslog 231 Syslog Facility 363 syslog files for IPDUs, configuring creation of alarms and 168 syslog messages, facility numbers for 54 syslog screens 410 syslog servers 54 adding 158 deleting 159 prerequisites for log
TFTP 274 time and date, NTP 270 time and date, OSD 96 Time screen 424 time, GMT 273 time/date 269 Timeout 419 Toggle Full Screen 340 Troubleshooting 431 Type of user 405 type, connection 318 types of access to ports 33 types of KVM terminators 58 types of ports 4 types of users 14 typographical conventions xv U u-boot monitor mode 431 udp protocol fields 236 Unit boot from 274 Unset 236 Up / Down 352 upgrading Cyclades pathname 289 firmware 287, 290 firmware AlterPath PM 169 KVM Expander microcontroller co
and reset IPDU information 165 connected port information 331 general information 279 in-band connections 313 IPDUs info 164 KVM connections 311 port status 280 system information 278 VPN 56, 250 VPN configuration screens 373 VPN, configuring 250 configure network parameters 85, 86 wiz command, configuring basic networking 85 Wizard mode 141 Access (Step 1) 151 Network Settings(Step 2) 149 procedures in 142 steps in 143 System Log (Step 3) 157 W Watchdog Timer 274 changing admin’s default password 99 Web