User's Manual
Table Of Contents
- Product Overview
- Features and Benefits
- Reduce Cable Bulk
- KVM Switching Capabilities
- Multiplatform Support
- True Serial Capabilities
- Local and Remote User Interfaces
- Virtual Media and Smart Card-capable Switches
- On-board Web Interface
- Access the Switch Using a Standard TCP/IP Network
- Encryption
- Video
- Flash Upgradeable
- Tier Expansion
- Avocent Management Software Plug-in
- FIPS cryptographic module
- Sample Configuration
- Safety Precautions
- General
- LAN Options
- Features and Benefits
- Installation
- Local and Remote Configuration
- Local User Interface (UI)
- OBWI
- Using the User Interfaces
- Launching a Session
- Scan Mode
- Viewing System Information
- RCS Tools
- Network Settings
- DNS Settings
- NTP Settings
- SNMP Settings
- Auditing Event Settings
- Setting Event Destinations
- Ports - Configuring SIPs
- Power Device Settings
- Local Port UI Settings
- Modem Settings
- Setup Settings - Port Security
- Sessions
- Setting Up User Accounts
- LDAP
- Override Admin
- Active Sessions
- The Video Viewer Window
- LDAP Feature for the RCS
- The Structure of Active Directory
- Standard Schema versus Dell Extended Schema
- Standard Installation
- Configure the Override Admin Account
- Configuring DNS Settings
- Configuring the Network Time Protocol (NTP) Settings
- Configuring the LDAP Authentication Parameters
- Enabling LDAP Authentication
- Entering Authentication Parameters - Operational Modes
- Entering Extension Options - Active Directory LDAP
- Entering Authentication Parameters - Standard LDAP
- Entering Authentication Parameters - Custom IP Port Assignments
- Completing LDAP Configuration
- Secondary LDAP Settings - Standard Configuration
- Setting up the RCS for performing Standard LDAP queries
- Search Configuration Settings
- Query Mode Selection Settings
- Group Configuration Parameters
- Secondary LDAP Settings - Active Directory Configuration
- LDAP SSL Certificates
- CA Certificate Information Display
- Configuring Group Objects
- Configuring Active Directory with Dell Schema Extensions to Access Your RCS
- Adding Users and Privileges to Active Directory with Dell Schema Extensions
- Using Dell Association Objects Syntax
- Console Redirection Access Security
- Using Active Directory to Log In to the RCS
- Target Device Naming Requirements for LDAP Implementation
- Frequently Asked Questions
- Appendix A: Terminal Operations
- Appendix B: Using SIPs
- Appendix C: MIB and SNMP Traps
- Appendix D: Cable Pinouts Information
- Appendix E: UTP Cabling
- Appendix F: Sun Advanced Key Emulation
- Appendix G: Technical Specifications
- Appendix H: Technical Support
- Bookmarks

120xxx | LDAP Feature for the RCSxxx
To set up group queries:
1 Log in to your LDAP Directory Server software with administrator
privileges.
2 Create an organizational unit (OU) to be used as group container.
3 Create a computer object in with a name identical to the switching system
name for querying appliances or identical to the attached target devices for
querying target devices. The name must match exactly and is case-sensitive.
4 The appliance names and target device names used for group queries are
stored in the appliance. The appliance name specified in the Appliance
Overview screen of the remote OBWI and target device names must be
comprised of any combination of upper-case and lower-case letters, digits,
and hyphens, and must match the object names on the LDAP Server.
5 Create one or more groups under the group container organizational unit.
6 Add the usernames and the target device and appliance objects to the
groups you created in step four (4).
7 Specify the value of an attribute used to implement the Access Control
Attribute.
Search Configuration Settings
There are four settings that are required for successful LDAP connections. They
are Search DN, Search Password, Search Base, and UID Mask.
Search DN
Search DN defines the administrator-level user that the target device uses to log
into the directory service. Once the target device is authenticated, the directory
service grants it access to the directory to perform the user authentication
queries specified on the LDAP query page. Each search value must be separated
by a comma. A typical entry might look like this:
cn=Administrator,cn=Users,dc=MyDomainName,dc=com