Dominion KX II-101 User Guide Release 2.0 Copyright © 2008 Raritan, Inc.
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc. © Copyright 2008 Raritan, Inc., CommandCenter®, Dominion®, Paragon® and the Raritan company logo are trademarks or registered trademarks of Raritan, Inc. All rights reserved. Java® is a registered trademark of Sun Microsystems, Inc.
Contents Chapter 1 Introduction 1 Dominion KX II‐101 Overview ................................................................................................................ 2 Product Photos........................................................................................................................................... 3 Product Features........................................................................................................................................ 4 Interfaces ...........
Contents Chapter 4 Connecting to the KX II-101 32 Language Support ................................................................................................................................... 32 Java Runtime Environment (JRE).......................................................................................................... 32 Launching the KX II‐101.........................................................................................................................
Contents Keyboard Menu ....................................................................................................................................... 88 Send Ctrl+Alt+Delete ................................................................................................................... 88 Keyboard Macros ......................................................................................................................... 88 Creating a Keyboard Macro...........................................
Contents Disconnecting Virtual Media ............................................................................................................... 111 File Server Setup (File Server ISO Images Only)............................................................................... 112 Chapter 8 Device Management 114 Device Settings Menu ........................................................................................................................... 114 Network Settings ..........................
Contents IP Access Control................................................................................................................................... 151 Chapter 11 Maintenance 154 Maintenance Menu................................................................................................................................ 154 Audit Log................................................................................................................................................
Contents Chapter 13 Diagnostics 173 Diagnostics Menu.................................................................................................................................. 173 Network Interface Page ........................................................................................................................ 174 Network Statistics Page ........................................................................................................................ 174 Ping Host Page...........
Chapter 1 Introduction In This Chapter Dominion KX II‐101 Overview ........................................................................2 Product Photos ...................................................................................................3 Product Features ................................................................................................4 Package Contents...............................................................................................6 Terminology .............
Dominion KX II-101 Overview Dominion KX II-101 Overview Thank you for purchasing Dominion KX II‐101. The KX II‐101 provides a single keyboard, video, and mouse (KVM) port for connection to a target server and a single IP port for connection to an IP network. Within the KX II‐101 unit, KVM signals from your server are converted to IP format and compressed for transmission over an IP network.
Chapter 1: Introduction 6 Remote (Network) Access Product Photos KX II‐101 Units 3
Product Features Product Features Interfaces • Integrated PS/2 KVM connection • Optional USB connection for control and Virtual Media • Serial Admin port for initial device setting and diagnostics and external modem access • Ethernet LAN port supporting 10/100‐base‐T auto‐sensing, full duplex • LED network activity indicator and status • Backlit LED power ON indicator Network Configuration • DHCP or Static IP device address System Management Features • Firmware upgradeable over Ethernet •
Chapter 1: Introduction User Features • Web‐based access through common browsers • Intuitive Graphical User Interface (GUI) • “PC Share” mode enabling more than one remote user • TCP communication • English User Interface • Virtual media access • Absolute Mouse Synchronization • Plug‐and‐Play • 256‐bit encryption of complete KVM signal, including video and virtual media Power • Powered via Class 2 Power over Ethernet provision • Alternative power by an external AC‐DC power pack Video
Package Contents Package Contents Each KX II‐101 unit ships with: • Main Unit KX II‐101 ‐ KVM over IP Dongle • USB Type A to Type B‐mini connector • Power Adaptor Kit ‐ AC‐DC 6VDC • Three additional power outlet plugs for worldwide use • Mini‐DIN to DB9 serial cable • Mounting bracket kit • Raritan User Manuals & Quick Setup Guides CD‐ROM • Printed Quick Setup Guide • Printed Application Notes (if applicable) • Printed Technical Notes (if applicable) Terminology Target Server Server to
Important Information Chapter 2 In This Chapter Login....................................................................................................................7 Default IP Address ............................................................................................7 Service Pack ........................................................................................................7 Login • The default KX II‐101 login user name is admin and the password is raritan.
Installation and Configuration Chapter 3 In This Chapter Configuring the Target Server .........................................................................8 Connecting the KX II‐101................................................................................15 Configuring Network Firewall Settings .......................................................21 Configuring the KX II‐101 ..............................................................................
Chapter 3: Installation and Configuration Setting Server Video Resolution For optimal bandwidth efficiency and video performance, a target server running a graphical user interface such as Windows, X‐Windows, Solaris, and KDE should be configured with desktop backgrounds set to a predominantly solid, light‐colored graphic. Backgrounds featuring photos or complex gradients should be avoided.
Configuring the Target Server ¾ To change the command line resolution: 1. Run the following command: # eeprom output-device=screen:r1024x768x75 where 1024x768x75 is any resolution that the KX II‐101 supports. 2. Restart computer. GUI Resolution/32 Bit ¾ To check the GUI resolution on 32 bit cards: 1. Run the following command: # /usr/sbin/pgxconfig –prconf ¾ To change the GUI resolution on 32 bit cards: 1.
Chapter 3: Installation and Configuration ¾ To change the resolution on Solaris 8 for 32 and 64 bit cards: 1. Run the following command: # /usr/sbin/fbconfig –res1024x768x75 where 1024x768x75 is any resolution that the KX II‐101 supports. 2. Restart computer. Mouse Modes The KX II‐101 operates in several mouse modes: Absolute Mouse Synchronization™, Intelligent Mouse Mode (do not use an animated mouse), and Standard Mouse Mode.
Configuring the Target Server Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 5. Click OK. 6. Close the Control Panel. Windows XP Settings On a KVM target server running Microsoft Windows XP, disable the “Enhanced Pointer Precision” option, and set the mouse motion speed exactly to the middle speed setting. These parameters are found in Control Panel ® Mouse ® Mouse Pointers.
Chapter 3: Installation and Configuration Linux Settings On a target server running Linux graphical interfaces, set the mouse acceleration to exactly 1 and set threshold to exactly 1. As mentioned above, please ensure that a target server running Linux is using a resolution supported by KX II‐101 at a standard VESA resolution and refresh rate. A Linux target server should also be set so the blanking times are within +/‐ 40% of VESA standard values. ¾ To check for these parameters: 1.
Configuring the Target Server to change the output resolution. Issue the “boot” command to reboot the server. Alternatively, contact your Raritan representative to purchase a video output adapter. Suns with composite sync output require APSSUN II Raritan guardian for use with KX II‐101. HD15 Suns with separate sync output require an APKMSUN Raritan guardian for use with KX II‐101. KX101 supports only the PS/2 version with the use of an APSUSB adaptor (composite sync is not supported).
Chapter 3: Installation and Configuration Connecting the KX II-101 The KX II‐101 has the physical connections described in the diagram below: 1 Attached Monitor and PS/2 Cable (See item 3.).
Connecting the KX II-101 2 Mini‐USB Port. Use to connect the device to the target server with the included USB cable if not using the attached PS/2 cable. A USB connection must be used in order to utilize the Absolute Mouse Sync or Virtual Media features. 3 Attached Monitor and PS/2 Cable. Use to connect the device to a monitor and to a target server if not using the USB cable. 4 LOCAL USER port.
Chapter 3: Installation and Configuration Note: The KX II‐101 must be powered for the Local User port to function. 3. If you require Virtual Media (VM) connectivity, connect the mini‐USB connector to the KX II‐101 and the USB connector to any USB port on the target server. When you finish, you should have connections like those shown in the illustration below: 1 Integrated PS/2 keyboard, video, and mouse connections from KX II‐101 to target server. 2 KX II‐101.
Connecting the KX II-101 5 PS/2 connection from KX II‐101 to mouse (optional cable). 6 PS/2 connection from KX II‐101 to keyboard (optional cable). 7 Target server. 8 Included mini‐USB to USB connector from KX II‐101 to target server for Virtual Media connectivity. USB Configuration ¾ To configure the KX II-101 for use with a USB target server: 1. Connect the mini‐USB connector to the KX II‐101 and the USB connector to a USB port on the target server. 2.
Chapter 3: Installation and Configuration When you finish, you should have connections like those show in the following illustration: 1 Included mini‐USB to USB cable from KX II‐101 to target server. 2 KX II‐101. 3 Video connection to local monitor (optional cable). 4 Local monitor. 5 USB connection from target server to mouse. 6 USB connection from target server to keyboard. 7 Target server.
Connecting the KX II-101 Connecting to the Network Connect a standard Ethernet cable from the network port labeled LAN to an Ethernet switch, hub, or router. The LAN LEDs that appear above the Ethernet connection indicate Ethernet activity. The yellow one blinks while the KX II‐101 is in use, indicating IP traffic at 10Mbps. The green light indicates a 100Mbps connection speed.
Chapter 3: Installation and Configuration Using the Local User Port The KX II‐101 is available with optional video and PS/2 cables that enable you to attach a keyboard and mouse to the target server through the LOCAL USER port. The LOCAL USER port serves as a pass‐through to the target server to which the KX II‐101 is attached and has no other purpose. The KX II‐101 must be powered on to use the LOCAL USER port.
Configuring the KX II-101 Using the Remote Console The KX II‐101 Remote Console is a web‐based application that enables you to configure the unit prior to use and manage after it has been configured. Before configuring the KX II‐101 using the Remote Console, you must have both your workstation and the unit connected to a network.
Chapter 3: Installation and Configuration 10. Click OK. The Port Access page opens. Assigning an IP Address 1. In the KX II‐101 Remote Console, choose Device Settings > Network Settings. The Network Basic Settings page opens. 2. In the Device Name field, specify a meaningful name for your KX II‐101 unit; up to 16 alphanumeric and special characters, no spaces. 3. Select the IP configuration from the IP auto configuration drop‐down list: None (Static IP).
Configuring the KX II-101 3. Enable global Telnet or SSH access. Select the Enable TELNET Access checkbox to enable TELNET access. Select the Enable SSH Access checkbox to enable SSH access. 4. Specify a valid TCP port for the selected access type. For example, direct port access via Telnet TCP port can be configured as 7770. 5. Click OK to save this information. Naming the Target Server 24 1.
Chapter 3: Installation and Configuration 3. Click Port Name for the target server. The Port Page opens. 4. Type a name (up to 32 alphanumeric and special characters). 5. Click OK. Creating Users and Groups User Groups are used with local and remote authentication (via RADIUS or LDAP). It is a good idea to define User Groups before creating individual users, because when you add a user, you must assign that user to an existing user group. ¾ To create a user group: 1.
Configuring the KX II-101 5. Click OK. ¾ To create a new user: 1. Open the User page using one of these methods: a. Choose User Management > Add New User, or b. Click the Add button from the User List page. 26 2. Type a unique name in the Username field (up to 16 characters). 3. Type the personʹs full name in the Full Name field (up to 64 characters). 4. Type a password in the Password field; retype the password in the Confirm Password field (up to 64 characters). 5.
Chapter 3: Installation and Configuration Using a Terminal Emulation Program You can use the Admin serial console with a terminal emulation program like HyperTerminal to set the following configuration parameters for the KX II‐101: • IP address • Subnet mask address • Gateway address • IP access control • LAN speed • LAN interface mode To use a terminal emulation program with the KX II‐101, you must first connect the included RS‐232 serial cable from the Admin port on the KX II‐101 to the COM1
Configuring the KX II-101 4. Flow control: None Connect to the KX II‐101. The login screen appears. 5. 28 Type the administrator user name and press Enter.
Chapter 3: Installation and Configuration You are prompted to enter your password. 6. Type your password and press Enter. The Admin Port prompt appears. 7. At the Admin Port > prompt, type config and press Enter. 8. At the Config > prompt, type network and press Enter. 9. To view the current interface settings, at the Interface > prompt, type interface and press Enter.
Configuring the KX II-101 The current interface settings appear: 10. To configure new network settings, at the Network prompt, type interface followed by one of the following commands and its appropriate argument (option), then press Enter. Command Argument Options ipauto none ‐ Enables you to manually specify an IP address for the device. You must follow this option with the ip command and the IP address, as shown in the following example: none|dhcp interface ipauto none ip 192.168.50.
Chapter 3: Installation and Configuration When you have successfully changed a setting, you see a confirmation message like the following: 11. When you are finished configuring the KX II‐101, type logout at the command prompt and press Enter. You are logged out of the command line interface.
Chapter 4 Connecting to the KX II-101 In This Chapter Language Support ...........................................................................................32 Java Runtime Environment (JRE) ..................................................................32 Launching the KX II‐101 .................................................................................33 Managing Favorites.........................................................................................38 Port Access Page ..........
Chapter 4: Connecting to the KX II-101 The KX II‐101 Remote Console and MPC require the JRE to function. The KX II‐101 Remote Console checks the Java version; if the version is incorrect or outdated, you will be prompted to download a compatible version. Raritan recommends using Java Runtime Environment (JRE) version 1.5 for optimum performance, but the KX II‐101 Remote Console and MPC will function with JRE version 1.4.2_05 or greater (with the exception of JRE 1.5.0_02), including JRE 1.6.x except for 1.
Launching the KX II-101 3. Type the following URL: http://IP‐ADDRESS, where IP‐ADDRESS is the IP Address that you assigned to your KX II‐101 unit. You can also use https, the DNS name of the KX II‐101 assigned by the administrator (provided that a DNS server has been configured), or just simply type the IP Address in the browser (KX II‐101 always redirects the IP Address from HTTP to HTTPS.) The Login page opens: 4. Type your user name and password.
Chapter 4: Connecting to the KX II-101 ¾ To define a direct port access URL: • Define an URL with the IP address, user name, password, and if necessary, port number of the KX II‐101. If you have only one KVM port, the port number is not needed. The format for a direct port access URL is: https://[IP address]/dpa.asp?username=[username]&password=[password]&po rt=[port number] Tip: Define a direct port access URL once, then save it in your web browser as a bookmark to make reusing it easier.
Launching the KX II-101 KX II-101 Console Navigation The KX II‐101 Remote Console interface provides many methods for navigation and making your selections. 36 ¾ To select an option (use any of the following): • Click on a tab; a page of available options is opened. • Hover over a tab and select the appropriate option from the menu. • Click the option directly from the menu hierarchy displayed (“breadcrumbs”).
Chapter 4: Connecting to the KX II-101 KX II-101 Remote Console Menu Map The following diagram represents all of the menu options available in the KX II‐101 Remote Console: Logging Out ¾ To quit the KX II-101 Remote Console: • Click Logout in the upper right‐hand corner of the page. Note: Logging out also closes any open Virtual KVM Client and serial client sessions.
Managing Favorites Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently.
Chapter 4: Connecting to the KX II-101 ¾ To access a favorite KX II-101 device: • Click the device name for that device (listed beneath Favorite Devices). A new browser opens to that device. ¾ To toggle the Favorite Devices list display between name and IP Address: To display Favorites by IP Address: To display Favorites by name: Click the Display by Name button. Click the Display by IP button. Favorite Devices currently displayed by name; Click Display by IP to toggle.
Managing Favorites Favorites List From the Favorites List page, you can add, edit, and delete devices from your list of Favorites. ¾ To open the Favorites List page: • Choose Manage > Favorites List. The Favorites List page opens: ¾ To add a Favorite: • Click the Add button. The Add New Favorite (on page 45) page opens. ¾ To delete a Favorite: Important: Exercise caution in the removal of favorites; you are not prompted to confirm their deletion. 40 1.
Chapter 4: Connecting to the KX II-101 2. Click the Edit button. The Edit page opens: 3. Update the fields as necessary: 4. Description. Type something meaningful. IP Address. Type the IP Address of the KX II‐101 unit. Port. Change the discovery Port (if necessary). Product Type. Click OK.
Managing Favorites Discover Devices - Local Subnet This option discovers the devices on your local subnet (that is, the subnet where the KX II‐101 Remote Console is running); access these devices directly from this page, or add them to your list of favorites. ¾ To discover devices on the local subnet: 1. Choose Favorites > Discover Devices ‐ Local Subnet. The Discover Devices ‐ Local Subnet page opens. 2.
Chapter 4: Connecting to the KX II-101 Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the remote console subnet. ¾ To access a discovered device: • Click the device name or IP address for that device. A new browser opens to that device.
Managing Favorites Discover Devices - KX II-101 Subnet This option discovers the devices on the device subnet (that is, the subnet of the KX II‐101 device IP address itself); access these devices directly from this page, or add them to your list of favorites. This feature allows multiple KX II‐101 units to interoperate and scale automatically. The KX II‐101 Remote Console automatically discovers the KX II‐101 units in the subnet of the KX II‐101.
Chapter 4: Connecting to the KX II-101 ¾ To discover devices on the device subnet: 1. Choose Favorites > Discover Devices ‐ KX II‐101 Subnet. The Discover Devices ‐ KX II‐101 Subnet page opens. 2. Click Refresh. The list of devices on the local subnet is refreshed. ¾ To add devices to your Favorites List: 1. Select the checkbox next to the device name/IP Address. 2. Click Add.
Port Access Page Port Access Page After successfully logging into the KX II‐101 Remote Console, the Port Access page opens. This page displays the KX II‐101 port, its status and availability. The Port Access page provides access to the KVM target server connected to the KX II‐101. A KVM target server is a server you want to control through the KX II‐101 unit; it is connected to the KX II‐101 using the attached PS/2 connectors on the device.
Chapter 5 Users, Groups, and Access Permissions In This Chapter Users ..................................................................................................................47 Groups...............................................................................................................47 Relationship between Users and Groups .....................................................48 User Management............................................................................................
Relationship between Users and Groups Unknown This is the default group for users who are authenticated externally using LDAP/LDAPS or RADIUS or who are unknown to the system. If the external LDAP/LDAPS or RADIUS server does not identify a valid user group, the Unknown group is used. In addition, any newly created user is automatically put in this group until assigned to another group. Individual Group An individual group is essentially a “group” of one.
Chapter 5: Users, Groups, and Access Permissions User Management User Management Menu The User Management menu is organized as follows: User List, Add New User, User Group List, Add New User Group, Change Password, and Authentication Settings. Use: To: User List Display an alphabetical list of all users; add, modify, or delete users. Add New User Add new users; modify user information. User Group List Display an alphabetical list of all user groups; add, modify, or delete user groups.
User Management ¾ To add a new user: • Click the Add button. The User page opens. For complete information about the User page, refer to Add New User (on page 50). ¾ To modify an existing user: 1. Locate the user from among those listed. 2. Click on the Username. The User page opens. For complete information editing the user, refer to Modify Existing User (on page 52). ¾ To delete a user: 1. Select the user from among those listed by selecting the checkbox to the left of the Username. 2.
Chapter 5: Users, Groups, and Access Permissions Click the Add button from the User List page 2. Type a unique name in the Username field (up to 16 characters). 3. Type the personʹs full name in the Full Name field (up to 64 characters). 4. Type a password in the Password field; retype the password in the Confirm Password field (up to 64 characters). 5. Choose the group from the User Group drop‐down list.
User Management Modify Existing User ¾ To modify an existing user: 1. In the User page, change the appropriate fields. (Refer to Add New User (on page 50) for information about how to get access the User page.) 2. Click OK. Blocking and Unblocking Users A userʹs access to the system can be blocked by the administrator or automatically blocked based on security settings. See User Blocking (on page 147) for information.
Chapter 5: Users, Groups, and Access Permissions User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users, because when you add a user, you must assign that user to an existing user group. The User Group List page displays a list of all user groups, which can be sorted in ascending or descending order by clicking on the Group Name column heading.
User Management Tip: To determine the users belonging to a particular group, sort the User List by User Group. 1. Choose a group from among those listed by checking the checkbox to the left of the Group Name. 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Add New User Group ¾ To add a new user group: 1.
Chapter 5: Users, Groups, and Access Permissions 3. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group. Refer to Setting Permissions (on page 55) for more information. 4. Set the Port Permissions. Specify the type of access to give to the KVM and power port. Refer to Setting Port Permissions for more information. 5. Set the IP ACL (optional).
User Management Set Permissions for Individual Group ¾ To set permissions for an individual user group: 1. Locate the user from among the groups listed. Individual groups can be identified by the @ in the Group Name. 2. Click the Group Name. The Group page opens. 3. Select the appropriate permissions. 4. Click OK. Setting Port Permissions For the server port, you can specify the type of access, the type of access to the virtual media, and the power control.
Chapter 5: Users, Groups, and Access Permissions * Default setting Group-based IP ACL (Access Control List) Important: Please exercise caution when using group‐based IP access control. It is possible to be locked out of your KX II‐101 if your IP Address is within a range that has been denied access. This feature limits access to the KX II‐101 device by users in the selected group to specific IP addresses.
User Management 4. Click Insert. If the Rule # you just typed equals an existing Rule #, the new rule is placed ahead of the exiting rule and all rules are moved down in the list. ¾ To replace a rule: 1. Specify the Rule # you want to replace. 2. Type the Starting IP and Ending IP fields. 3. Select the Action from the drop‐down list. 4. Click Replace. Your new rule replaces the original rule with the same Rule #. ¾ To delete a rule: 1. Specify the Rule # you want to delete. 2.
Chapter 5: Users, Groups, and Access Permissions Modify Existing User Group Note: All permissions are enabled (and cannot be changed) for the Admin group. ¾ To modify an existing user group: 1. From the Group page, change the appropriate fields and set the appropriate permissions. 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group. Refer to Setting Permissions (on page 55) for more information. 3.
User Management Change Password ¾ To change your password: 1. Choose User Management > Change Password. The Change Password page opens: 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field; retype the new password in the Confirm New Password field. Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and special characters. 4. Click OK. 5.
Chapter 5: Users, Groups, and Access Permissions Remote Authentication Note to CC-SG Users When the KX II‐101 is controlled by CommandCenter Secure Gateway, CC‐SG authenticates users and groups, except for local users (requiring local port access).
Remote Authentication Authentication Settings From the Authentication Settings page you can configure the type of authentication used for access to your KX II‐101. Refer to Authentication vs. Authorization (on page 61) for more information about how authentication and authorization operate and differ. Note: Even if you select remote authentication (LDAP or RADIUS), local authentication is still used. 62 ¾ To configure authentication: 1. Choose User Management > Authentication Settings.
Chapter 5: Users, Groups, and Access Permissions 2. Choose the option for the authentication protocol you want to use (Local Authentication, LDAP, or RADIUS). Choosing the LDAP option enables the remaining LDAP fields; selecting the RADIUS option enables the remaining RADIUS fields. 3. If you choose Local Authentication, proceed to step 6. 4.
Remote Authentication Implementing LDAP Remote Authentication Lightweight Directory Access Protocol (LDAP) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn. Reminder: Microsoft Active Directory functions natively as an LDAP authentication server.
Chapter 5: Users, Groups, and Access Permissions 2. (Optional) Type the IP Address or DNS name of your backup LDAP server in the Secondary LDAP Server field. When the Enable Secure LDAP option is selected, the DNS name must be used. Please note that the remaining fields share the same settings with the Primary LDAP Server field. 3. Type the server secret (password) required to authenticate against your remote authentication server in the Secret Phrase field and again in the Confirm Secret Phrase field.
Remote Authentication 11. Active Directory Domain. Type the name of the Active Directory Domain. Returning User Group Information from Active Directory Server The KX II‐101 supports user authentication to Active Directory (AD) without requiring that users be defined locally on the KX II‐101. This allows Active Directory user accounts and passwords to be maintained exclusively on the AD server.
Chapter 5: Users, Groups, and Access Permissions Implementing RADIUS Remote Authentication Remote Authentication Dial‐in User Service (RADIUS) is an AAA (authentication, authorization, and accounting) protocol for network access applications. ¾ To use the RADIUS authentication protocol: 1. Type the IP Address of your primary and (optional) secondary remote authentication servers in the Primary Radius Server and Secondary Radius Server fields, respectively. 2.
Remote Authentication 4. Accounting Port. The default accounting port is 1813; change as required. 5. Timeout (in seconds). The default timeout is 1 second; change as required. The timeout is the length of time the KX II‐101 waits for a response from the RADIUS server before sending another authentication request. 6. Retries. The default number of retries is 3; change as required. This is the number of times the KX II‐101 will send an authentication request to the RADIUS server. 7.
Chapter 5: Users, Groups, and Access Permissions Attribute Data Login NAS‐IP‐Address (4) The IP Address for the KX II‐101 unit. User‐Name (1) The user name entered at the login screen. Acct‐Session‐ID (44) Session ID for accounting. User‐Password(2): The encrypted password. Accounting‐Request(4) Acct‐Status (40) Start(1) ‐ Starts the accounting. NAS‐Port‐Type (61) VIRTUAL (5) for network connections. NAS‐Port (5) Always 0. NAS‐IP‐Address (4) The IP Address for the KX II‐101 unit.
Remote Authentication From LDAP When an LDAP/LDAPS authentication is successful, KX II‐101 determines the permissions for a given user based on the permissions of the userʹs group. Your remote LDAP server can provide these user group names by returning an attribute named as follows: rciusergroup attribute type: string This may require a schema extension on your LDAP/LDAPS server. Consult your authentication server administrator to enable this attribute.
Chapter 5: Users, Groups, and Access Permissions Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. ¾ To permit write operations to the schema: 1. Right‐click the Active Directory Schema root node in the left pane of the window, and then click Operations Master. The Change Schema Master dialog opens: 2.
Remote Authentication 3. Click New, and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute window opens. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field. 7. Type a meaningful description in the Description field. 8. Click the Syntax drop‐down arrow and choose Case Insensitive String from the list. 9. Type 1 in the Minimum field.
Chapter 5: Users, Groups, and Access Permissions 2. Scroll to the user class in the right pane, and right‐click on it. 3. Choose Properties from the menu. The user Properties window appears.
Remote Authentication 4. Click on the Attributes tab to open it. 5. Click Add. 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the user Properties dialog. Updating the Schema Cache 74 ¾ To update the schema cache: 1. Right‐click Active Directory Schema in the left pane of the window and select Reload the Schema from the shortcut menu. 2. Minimize the Active Directory Schema MMC (Microsoft Management Console) console.
Chapter 5: Users, Groups, and Access Permissions Editing rciusergroup Attributes for User Members To run Active Directory script on Windows 2003 server, please use the script provided by Microsoft (available on the Windows 2003 server installation CD). These scripts are loaded onto your system with a Microsoft Windows 2003 installation.
Remote Authentication 76 6. In the left pane of the window, select the CN=Users folder. 7. Locate the user name whose properties you want to adjust in the right pane. Right‐click on the user name and select Properties. 8. Click on the Attribute Editor tab if it is not already open.
Chapter 5: Users, Groups, and Access Permissions 9. Choose rciusergroup from the Attributes list.
Remote Authentication 10. Click Edit. The String Attribute Editor dialog opens: 11. Type the user group (created in Dominion KX II‐101) in the Edit Attribute field. 12. Click OK.
Chapter 6 Virtual KVM Client In This Chapter Overview...........................................................................................................80 Options..............................................................................................................81 Mouse Pointer Synchronization.....................................................................83 Connection Menu ............................................................................................85 Keyboard Menu .
Overview Overview Whenever you access a target server using the KX II‐101 Remote Console, a Virtual KVM Client window is opened. Virtual KVM Client windows can be minimized, maximized, and moved around your computer desktop. Note: Refreshing your HTML browser will close the Virtual KVM Client connection, so please exercise caution. The features available in the Virtual KVM Client are accessible through the menu and toolbar. 80 Feature Description Menu Bar Drop‐down menus of commands and settings.
Chapter 6: Virtual KVM Client Feature Description Status Bar Real‐time information on connection parameters, target server window size, concurrent connections, Caps Lock indicator, and Num Lock indicator. Options Menu Tree The following list contains all of the menus and menu items available in the Virtual KVM Client.
Options • Tools • • Connect CD‐ROM/ISO Image Options View View Toolbar Scaling Target Screen Resolution Help About Raritan Virtual KVM Client Toolbar Button Description Properties Video settings Calibrate color Synchronize client and target server mouse cursors Refresh screen Auto‐sense video Send Ctrl+Alt+Delete Toggles single/double mouse modes Full screen Resize video to fit screen 82
Chapter 6: Virtual KVM Client Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, you will see two mouse pointers: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
Mouse Pointer Synchronization 3. Verify that the mouse and video have been properly configured during the installation process. Please refer to Chapter 3: Installation and Configuration for complete instructions. 4. Force an auto‐sense by clicking the Virtual KVM Client auto‐sense button. 5. If that does not improve the mouse synchronization (for Linux, UNIX, and Solaris KVM target servers): a. Open a terminal window. b. Enter the xset mouse 1 1 command. c. 6. Close the terminal window.
Chapter 6: Virtual KVM Client Connection Menu Properties Dialog The KX II‐101 dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. KX II‐101 units optimize KVM output not only for LAN use, but also for WAN use. These units can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
Connection Menu 384 Kb (Slow DSL/T1) 256 Kb (Cable) 128 Kb (Dual ISDN) Please note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting. But the system will be most responsive when the settings match the real world environment. 3. Choose the Color Depth from the drop‐down list.
Chapter 6: Virtual KVM Client Connection Info ¾ To obtain information about your Virtual KVM Client connection: • Choose Connection > Connection Info. The Connection Info window opens. The following information is displayed about the current connection: • Device Name. The name of the KX II‐101 device. • IP Address. The IP Address of the KX II‐101 device. • Port. The KVM Communication TCP/IP Port used to access the target device. • Data In/Second. Data rate in. • Data Out/Second. Data rate out.
Keyboard Menu Keyboard Menu Send Ctrl+Alt+Delete Due to its frequent use, a Ctrl+Alt+Delete macro has been pre‐programmed into the Virtual KVM Client. This key sequence is sent to the target server to which you are currently connected. In contrast, if you were to physically press the Ctrl+Alt+Delete keys while using the Virtual KVM Client, the command would first be intercepted by your own PC due to the structure of the operating system, instead of sending the key sequence to the target server as intended.
Chapter 6: Virtual KVM Client Creating a Keyboard Macro ¾ To create a keyboard macro (add a macro): 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros window opens: 2. Click Add. The Add Keyboard Macro window opens: 3. Type a name in the Keyboard Macro Name field. This is the name that will display on the Virtual KVM Client menu bar after the macro is created. In this example, type Minimize All Windows. 4. In the Keys to Press drop‐down list: a.
Keyboard Menu In this example, select two keys: the Windows key and the letter D key. 5. In the Keys to Release field: a. Choose each key for which you would like to emulate a key release (in the order in which they are to be released). b. Click Release Key after each selection. In this example, both keys pressed must also be released. 6. Review the Macro Sequence ‐ which has been automatically generated using the Keys to Press and Keys to Release selections.
Chapter 6: Virtual KVM Client ¾ To cancel without saving changes: • Click Cancel. ¾ To clear all fields and start over: • Click the Clear button. Running a Keyboard Macro Once you have created a keyboard macro, execute it by clicking on its name in the Keyboard menu. ¾ To execute a macro (using this example): • Choose Keyboard > Minimize All Windows. An alternative method is to select the macro from the Keyboard Macros window. ¾ To execute a macro: 1. Choose Keyboard > Keyboard Macros.
Video Menu ¾ To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros window opens. 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted.
Chapter 6: Virtual KVM Client Calibrate Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The KX II‐101 color settings are on a target server‐basis. Calibrate Color Adjusts color settings to optimize the video display. Note: The Calibrate Color option applies to the current connection only. ¾ To calibrate the color: 1. Open a remote KVM connection to any target server running a graphical user interface. 2.
Video Menu ¾ To change the video settings: 1. Choose Video > Video Settings. The Video Settings window opens displaying the current settings: 2. Use the sliders to adjust the settings to achieve the desired results (as you adjust the settings the effects are immediately visible): Noise Filter. KX II‐101 can filter out the electrical interference of video output from graphics cards. This feature optimizes picture quality and reduces bandwidth.
Chapter 6: Virtual KVM Client Contrast Red. Controls the red signal. Contrast Green. Controls the green signal. Contrast Blue. Controls the blue signal. If the video image looks extremely blurry or unfocused, the settings for clock and phase can be adjusted until a better image appears on the active target server.
Mouse Menu Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen. ¾ To cancel with saving your changes: • Click Cancel. Mouse Menu When controlling a target server, the KX II‐101 Remote Console displays two mouse cursors: one belonging to your client workstation and the other belonging to the target server.
Chapter 6: Virtual KVM Client Single Mouse Cursor Single Mouse Cursor enters single mouse mode, in which only the target server mouse cursor is shown; the local PC mouse pointer no longer appears on‐screen. While in single mouse mode, the Synchronize Mouse option is not available (there is no need to synchronize a single mouse cursor).
Virtual Media Intelligent In Intelligent mouse mode, the KX II‐101 can detect the target mouse settings and synchronize the mouse pointers accordingly, allowing mouse acceleration on the target. In this mode, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acceleration. For this mode to work properly, certain conditions must be met.
Chapter 6: Virtual KVM Client Tools Menu Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client: synchronize mouse when in dual mouse mode, enable logging, keyboard type, and the exit target screen resolution mode hotkey. ¾ To set the tools options: 1. Choose Tools > Options. The Options window opens: 2. Select the Enable Logging checkbox only if directed to by Technical Support. This option creates a log file in your home directory. 3.
View Menu 4. Exit Target Screen Resolution Mode ‐ Hotkey. When you enter target screen resolution mode, the display of the target server becomes full screen and acquires the same resolution as the target server. This is the hotkey used for exiting this mode; select from the drop‐down list. 5. Exit Single Cursor Mode ‐ Hotkey. When you enter single cursor mode, only the target server mouse cursor is visible.
Chapter 6: Virtual KVM Client Target Screen Resolution When you enter target screen resolution mode, the display of the target server becomes full screen and acquires the same resolution as the target server. The hotkey used for exiting this mode is specified in the Options dialog (default is Ctrl+Alt+M). ¾ To enter target screen resolution: • Choose View > Target Screen Resolution. ¾ To exit target screen resolution mode: • Press the hotkey configured in the Tools Options dialog.
Chapter 7 Virtual Media In This Chapter Overview.........................................................................................................103 Prerequisites for Using Virtual Media ........................................................105 Using Virtual Media ......................................................................................106 Opening a KVM Session ...............................................................................107 Connecting to Virtual Media.............
Chapter 7: Virtual Media Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from the client PC and network file servers. With this feature, media mounted on the client PC and network file servers is essentially mounted virtually by the target server. The target server can then read from and write to that media as if it were physically connected to the target server itself.
Overview 104 1 Target server. 2 KX II‐101 3 IP network connection from KX II‐101 to local workstation. 4 Local workstation. 5 CD/DVD drive. 6 Hard drive image files.
Chapter 7: Virtual Media 7 Floppy drive. 8 USB drive. 9 Remote file server (ISO images). 10 Virtual connection Prerequisites for Using Virtual Media The following conditions must be met in order to use virtual media: KX II-101 • For users requiring access to virtual media, KX II‐101 permissions must be set to allow access to the relevant ports, as well as virtual media access (VM Access port permission) for those ports.
Using Virtual Media Using Virtual Media With the KX II‐101 virtual media feature, you can mount up to two drives (of different types). These drives are accessible for the duration of the VM session. ¾ To use virtual media: 1. Connect/attach the media to the client or network file server that you want to access from the target server. This need not be the first step, but it must be done prior to attempting to access this media. 2.
Chapter 7: Virtual Media Opening a KVM Session ¾ To open a KVM session: 1. Open the Port Access page from the KX II‐101 Remote Console. 2. Connect to the target server from the Port Access page: a. Click the Name for the target server. b. Select Connect from the pop‐up menu. The target server opens in a Virtual KVM Client window.
Connecting to Virtual Media Connecting to Virtual Media Local Drives This option mounts an entire drive; the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only; it does not include network drives, CD‐ROM, or DVD‐ROM drives. This is the only option for which Read‐Write is available.
Chapter 7: Virtual Media 4. Click Connect. The media will be mounted on the target server virtually. You can access the media just like any other drive. Note: If there is no USB connection to the target server, you will see a warning message that says, ʺThe virtual media capability is set up but will not be available until the USB cable is connected or the target is powered on. Please check your USB connectivity or see if the target is powered on.ʺ Resolve this issue, then connect to the drive again.
Connecting to Virtual Media CD-ROM/DVD-ROM/ISO Images This option mounts CD‐ROM, DVD‐ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD‐ROM extensions may also work. ¾ To access a CD-ROM, DVD-ROM, or ISO image: 1. From the Virtual KVM Client, choose Virtual Media > Connect CD‐ROM/ISO Image. The Map Virtual Media CD/ISO Image dialog opens: 2. For internal and external CD‐ROM or DVD‐ROM drives: a. Choose the Local CD/DVD Drive option. b.
Chapter 7: Virtual Media d. Click Connect. 4. For remote ISO images on a file server: a. Choose the Remote Server ISO Image option. b. Choose Hostname and Image from the drop‐down lists. The file servers and image paths available are those that you configured using the File Server Setup page. Only items you configured using the KX II‐101 File Server Setup page will be in the drop‐down list. c. File Server Username. Username required for access to the file server. d. File Server Password.
File Server Setup (File Server ISO Images Only) File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD‐ROM extensions may also work. Use the KX II‐101 Remote Console File Server Setup page to designate the files server(s) and image paths that you want to access using KX II‐101 Virtual Media.
Chapter 7: Virtual Media Host Name/IP Address. Host name or IP Address of the file server. Image Path. Full path name of the location of the ISO image. 3. Select the Selected checkbox for all media that you want accessible as virtual media. 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog. ¾ To cancel without saving: • Click Cancel.
Chapter 8 Device Management In This Chapter Device Settings Menu....................................................................................114 Network Settings ...........................................................................................115 Device Services...............................................................................................120 Keyboard/Mouse Settings.............................................................................122 Serial Port Settings........
Chapter 8: Device Management Network Settings Use the Network Settings page to customize the network configuration (e.g., IP Address, discovery port, and LAN interface parameters) for your KX II‐101 unit. Basically, there are two ways to setup your IP Configuration: • None. (Default) This option is the recommended option (Static IP). Since the KX II‐101 is part of your network infrastructure, you most likely do not want its IP Address to change frequently.
Network Settings ¾ To cancel without saving changes: • Click Cancel. ¾ To reset to factory defaults: • Click Reset to Defaults.
Chapter 8: Device Management • Device Name. Type a unique name for the device (up to 16 characters; spaces are not allowed). Name your device so you can easily identify it. The default name for a KX II‐101 unit is: “DKX2‐101”. Remote users will also see this name. However, if an MPC user has created a Connection Profile for this device, that user will see the Description field from the Profile instead. • IP auto configuration. Select from among the options available in the drop‐down list: None.
Network Settings LAN Interface Settings • The current parameter settings are identified in the Current LAN interface parameters field. • LAN Interface Speed & Duplex. Select from among the speed and duplex combinations available.
Chapter 8: Device Management Note: Occasionally there are problems running at 10 Mbps in either half or full duplex. If you are experiencing problems, please try another speed and duplex. Please refer to Network Speed Settings for more information. • • Bandwidth Limit. 128 Kilobit 256 Kilobit 512 Kilobit 2 Megabit 5 Megabit 10 Megabit 100 Megabit No Limit Select among the bandwidth limits available. Set System ACL.
Device Services Device Services Use the Device Services page to specify the connection options for the KX II‐101. 120 ¾ To configure the discovery port: 1. Choose Device Settings > Device Services. The Device Services page opens. 2. Type the network port used by KX II‐101 to communicate with the Client PC. 3. Click Save to save the setting. ¾ To enable TELNET Access: 1. Choose Device Settings > Device Services. The Device Services page opens. 2. Select Enable TELNET Access. 3.
Chapter 8: Device Management ¾ To enable SSH Access: 1. Choose Device Settings > Device Services. The Device Services page opens. 2. Select Enable SSH Access. 3. Type the network port used for SSH access to KX II‐101. 4. Click Save to save the setting. Enabling Direct Port Access Direct port access enables you to access the KX II‐101 Remote Client without having to go through the usual login page.
Keyboard/Mouse Settings Keyboard/Mouse Settings Use the Keyboard/Mouse Setup page to configure the Keyboard and Mouse interface between KX II‐101 and the host device. • 122 Host Interface. Selects whether the KX II‐101 sends keyboard and mouse data through the PS/2 or USB connections. Auto. With this setting, KX II‐101 will use a USB connection if available and fall back on the PS/2 connection if not. USB.
Chapter 8: Device Management Serial Port Settings Use the Serial Port Settings page to set how KX II‐101 employs its integrated serial port. ¾ To configure the serial port: 1. Choose Device Settings > Serial Port. The Serial Port Settings page opens: 2. Choose the function you would like for the serial port: 3. Admin Port. Choose this option to connect to the KX II‐101 directly from a client PC order to access advanced configuration. PowerStrip Control.
Date/Time Settings Date/Time Settings Use the Date/Time Settings page to specify the date and time for the KX II‐101. There are two ways to do this: • Manually set the date and time, or • Synchronize with a Network Time Protocol (NTP) Server. Note: The KX II‐101 does not support Daylight Savings Time. ¾ To set the date and time: 1. Choose Device Settings > Date/Time. The Date/Time Settings page opens: 2. Choose your time zone from the Time Zone drop‐down list. 3.
Chapter 8: Device Management 4. Synchronize with NTP Server. Choose this option to synchronize the date and time with the Network Time Protocol (NTP) Server. For the User Specified Time option, enter the date and time as follows: a. Choose the Month from the drop‐down list. b. Type the Day of the Month. c. Type the Year in yyyy format. d. Type the Time in hh:mm format (using a 24‐hour clock). 5. For the Synchronize with NTP Server option: a. Enter the IP address of the Primary Time server. b.
Event Management SNMP Configuration Simple Network Management Protocol (SNMP) is a protocol governing network management and the monitoring of network devices and their functions. KX II‐101 offers SNMP Agent support through Event Management. Refer to SNMP Agent Configuration (on page 129) and SNMP Trap Configuration (on page 129) for more information about SNMP Agents and Traps. 126 ¾ To configure SNMP (enable SNMP logging): 1. Choose Device Settings > Event Management ‐ Settings.
Chapter 8: Device Management 4. Type the Agent Community String (the Dominion unitʹs string). An SNMP community is the group that devices and management stations running SNMP belong to; it helps define where information is sent. The community name is used to identify the group; an SNMP device or agent may belong to more than one SNMP community. 5. Specify whether the community is Read‐Only or Read‐Write using the Type drop‐down list. 6.
Event Management Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management ‐ Destinations page to select which system events to track and where to send this information. Note: SNMP traps will only be generated if the SNMP Logging Enabled option is selected; Syslog events will only be generated if the Enable Syslog Forwarding option is selected.
Chapter 8: Device Management 2. Select the checkboxes for those Event line items you want to enable or disable, and where you want to send the information. Tip: Enable or disable entire Categories by checking or clearing the Category line checkboxes, respectively. 3. Click OK. ¾ To cancel without saving changes: • Click Cancel. ¾ To reset to factory defaults: • Click the Reset To Defaults button.
Event Management 130 Trap Name Description firmwareFileDiscarded Firmware file was discarded. firmwareUpdateFailed Firmware update failed. firmwareValidationFailed Firmware validation failed. groupAdded A group has been added to the KX II‐101 system. groupDeleted A group has been deleted from the system. groupModified A group has been modified. ipConflictDetected An IP Address conflict was detected. ipConflictResolved An IP Address conflict was resolved.
Chapter 8: Device Management Trap Name Description userAuthenticationFailure A user attempted to log in without a correct username and/or password. userConnectionLost A user with an active session has experienced an abnormal session termination. userDeleted A user account has been deleted. userLogin A user has successfully logged into the KX II‐101 and has been authenticated. userLogout A user has successfully logged out of the KX II‐101 properly. userModified A user account has been modified.
Port Configuration This page is initially displayed in port number order, but can be sorted on any of the fields by clicking on the column heading. Port Number. Numbered from 1 to the total number of ports available for the KX II‐101 unit. Port Name. The name assigned to the port. A port name displayed in black indicates that you cannot change the name and that the port cannot be edited; port names displayed in blue can be edited. Note: Do not use apostrophes for the Port Name. 2. Port Type.
Power Control Chapter 9 In This Chapter Overview.........................................................................................................133 Connect the Power Strip ...............................................................................133 Name the Power Strip (Port Page for Power Strips).................................135 Associate KVM Target Servers to Outlets (Port Page)..............................136 Displaying the Outlet Associations.........................................
Connect the Power Strip 2 134 Raritan power strip. ¾ To connect the KX II-101 to a Raritan power strip: 1. Connect the Mini DIM9M connector of the DKX2‐101‐SPDUC cable to the Admin port of the KX II‐101. 2. Connect the RJ45M connector of the DKX2‐101‐SPDUC cable to the serial port connector on the Raritan power strip. 3. Attach an AC power cord to the target server and an available power strip outlet on the power strip. 4. Connect the power strip to an AC power source. 5.
Chapter 9: Power Control Name the Power Strip (Port Page for Power Strips) This Port page opens when you select a port from the Port Configuration page that is connected to a Raritan remote power strip. The Type and the Name fields are pre‐populated. The following information is displayed for each outlet in the power strip: outlet Number, Name, and Port Association. Use this page to name the power strip and its outlets; all names can be up to 32 alphanumeric characters and can include special characters.
Associate KVM Target Servers to Outlets (Port Page) Note: When a power strip is associated to a target server (port), the outlet name is replaced by the target server name (even if you assigned another name to the outlet). ¾ To name the power strip (and outlets): Note: CommandCenter Service Gateway does not recognize power strip names containing spaces. 1. Change the Name of the power strip to something you will remember. 2. Change the (Outlet) Name if desired. (Outlet names default to Outlet #.) 3.
Chapter 9: Power Control Note: To use this feature, you must have a Raritan Dominion PX power strip attached to the device. See Connect the Power Strip (on page 133) for information. ¾ To make power associations (associate power strip outlets with the KVM target server): Note: When a power strip is associated with the target server (port), the outlet name is replaced by the port name. You can change this name in the Port 2 page. 1. Choose the power strip from the Power Strip Name drop‐down list. 2.
Associate KVM Target Servers to Outlets (Port Page) A powerstrip with two outlet associations is shown below. 138 ¾ To change the port name: 1. Enter a descriptive name, such as the name of the target server. The name can be up to 32 alphanumeric characters and can include special characters. 2. Click OK.
Chapter 9: Power Control ¾ To cancel without saving changes: • Click Cancel. ¾ To remove a power strip association: 1. Select the appropriate power strip from the Power Strip Name drop‐down list. 2. For that power strip, select the appropriate outlet from the Outlet Name drop‐down list. 3. From the Outlet Name drop‐down list, select None. 4. Click OK. That power strip/outlet association is removed. A confirmation message is displayed.
Displaying the Outlet Associations Displaying the Outlet Associations ¾ To show the power port configuration: • Choose Home > Device Settings > Port Configuration > [power port name]. The outlet associations for the powerstrip appear under Outlets.
Chapter 9: Power Control ¾ To edit the power port configuration: • Change the Powerport name by editing the Port 2 > Name field. • Change an outlet name by editing the associated Outlets > Name field. The outlet name appears in the Powerstrip Device page. See Control the Powerstrip Device (on page 141) for information. • Change the outlet association by clicking the Port Association link next to the outlet name and editing it in the Port 1 page.
Control the Powerstrip Device The Powerstrip Device page opens. 2. Click the On or Off button for each outlet to run it on or off. 3. Click OK when prompted to confirm your choice. The power outlet is powered on or off. Note: The KX II‐101 can control only one powerstrip. You cannot select another powerstrip from the Powerstrip menu.
Chapter 10 Security Settings In This Chapter Security Settings Menu .................................................................................143 Security Settings.............................................................................................144 IP Access Control ...........................................................................................151 Security Settings Menu The Security menu is organized as follows: Security Settings and IP Access Control.
Security Settings Security Settings From the Security Settings page, you can specify login limitations, user blocking, password rules, and encryption and share. Raritan SSL certificates are used for public and private key exchanges, and provide an additional level of security. Raritan web server certificates are self‐signed; Java applet certificates are signed by a VeriSign certificate.
Chapter 10: Security Settings 2. Update the Login Limitations (on page 145) settings as appropriate. 3. Update the Strong Passwords (on page 146) settings as appropriate. 4. Update the User Blocking (on page 147) settings as appropriate. 5. Update the Encryption & Share settings as appropriate. 6. Click OK. ¾ To close the page without saving any changes: • Click Cancel. ¾ To reset back to defaults: • Click Reset to Defaults.
Security Settings Strong Passwords Strong passwords provide more secure local authentication for the system. Using Strong Passwords, you can specify criteria defining the format of valid KX II‐101 local passwords such as minimum and maximum length, required characters, and password history retention. • 146 Enable strong passwords.
Chapter 10: Security Settings Enforce at least one printable special character. When checked, at least one special character (printable) is required in the password. Number of restricted passwords based on history. This field represents the password history depth; that is, the number of prior passwords that cannot be repeated. The range is 1‐12; the default is 5.
Security Settings • Deactivate User‐ID. When selected, this option specifies that the user will be locked out of the system after the number of failed login attempts specified in the Failed Attempts field: Failed Attempts. The number of unsuccessful login attempts after which the userʹs User‐ID will be deactivated. This field is enabled when the Deactivate User‐ID option is selected. The valid range is 1 ‐ 10.
Chapter 10: Security Settings • Encryption Mode. Choose one of the options from the drop‐down list. When an encryption mode is selected, a warning is displayed that if your browser does not support the selected mode, you will not be able to connected to the KX II‐101: Auto. This is the recommended option; the KX II‐101 auto‐negotiates to the highest level of encryption possible. RC4. Secures user names, passwords and KVM data, including video transmissions using the RSA RC4 encryption method.
Security Settings 150 • Apply Encryption Mode to KVM and Virtual Media. When selected, this option applies the selected encryption mode to both KVM and virtual media. After authentication, KVM and virtual media data is also transferred with 128‐bit encryption. • PC Share Mode. Determines global concurrent remote KVM access, enabling up to eight remote users to simultaneously log on to one KX II‐101 and concurrently view and control the same target server through the device.
Chapter 10: Security Settings Checking Your Browser for AES Encryption If you do not know if your browser uses AES, check with the browser manufacturer, or navigate to the following website using the browser with the encryption method you want to check: https://www.fortify.net/sslcheck.html. This website detects your browserʹs encryption method and displays a report. Note: IE6 does not support AES 128 or 256‐bit encryption.
IP Access Control Choose Security > IP Access Control, or Click the Set System ACL button from the Network Settings page The IP Access Control page opens: 152 2. Select the Enable IP Access Control checkbox to enable IP access control and the remaining fields on the page. 3. Choose the Default Policy. This is the action taken for IP addresses that are not within the ranges you specify. Accept. IP Addresses are allowed access to the KX II‐101 device. Drop.
Chapter 10: Security Settings 4. Click Insert. If the Rule # you just typed equals an existing Rule #, the new rule is placed ahead of the exiting rule and all rules are moved down in the list. ¾ To replace a rule: 1. Specify the Rule # you want to replace. 2. Type the IP Address and subnet mask in the IP/Mask field. 3. Choose the Policy from the drop‐down list. 4. Click Replace. Your new rule replaces the original rule with the same Rule #. ¾ To delete a rule: 1.
Chapter 11 Maintenance In This Chapter Maintenance Menu ........................................................................................154 Audit Log........................................................................................................155 Device Information........................................................................................156 Backup and Restore .......................................................................................157 Firmware Upgrade .........
Chapter 11: Maintenance Audit Log A log is created of KX II‐101 system events. ¾ To view the audit log for your KX II-101 unit: 1. Choose Maintenance > Audit Log. The Audit Log page opens: The Audit Log page displays events by date and time (most recent events listed first). The Audit Log provides the following information: • Date. The date and time that the event occurred; 24‐hour clock. • Event. The event name as listed in the Event Management page. • Description.
Device Information 2. Select the desired file name and location and click Save. The audit log is saved locally on your client machine with the name and location specified. ¾ To page through the Audit Log: • Use the [Older] and [Newer] links. Device Information The Device Information page provides detailed information about your KX II‐101 device. This information is helpful should you need to contact Raritan Technical Support.
Chapter 11: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II‐101. In addition to using backup and restore for business continuity purposes, you can use this feature as a time‐saving mechanism. For instance, you can quickly provide access to your team from another KX II‐101, by backing up the user configuration settings from the KX II‐101 in use and restoring those configurations to the new KX II‐101.
Backup and Restore 4. Click Close. The backup file is saved locally on your client machine with the name and location specified. ¾ To restore your KX II-101: WARNING: Please exercise caution when restoring your KX II‐101 to an earlier version. Usernames and password in place at the time of the backup will be restored. If you do not remember the old administrative usernames and passwords, you will be locked out of the KX II‐101.
Chapter 11: Maintenance Firmware Upgrade Use the Firmware Upgrade page to upgrade the firmware for your KX II‐101 unit. This page is available in the KX II‐101 Remote Console only. Important: Do not turn off your KX II‐101 unit while the upgrade is in progress ‐ doing so will likely result in damage to the unit. ¾ To upgrade your KX II-101 unit: 1. Choose Maintenance > Firmware Upgrade. The Firmware Upgrade page opens: 2.
Firmware Upgrade 4. Click Upload from the Firmware Upgrade page. Information about the upgrade and version numbers is displayed for your confirmation: Note: At this point, connected users are logged out, and new login attempts are blocked. 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the unit reboots. 6.
Chapter 11: Maintenance Upgrade History KX II‐101 provides information about upgrades performed on the KX II‐101 unit and attached CIMS. ¾ To view the upgrade history: • Choose Maintenance > Upgrade History. The Upgrade History page opens: Reboot The Reboot page provides a safe and controlled way to reboot your KX II‐101 unit; this is the recommended method for rebooting. Important: All KVM and serial connections will be closed and all users will be logged off. ¾ To reboot your KX II-101: 1.
Reboot 162 2. Click the Reboot button. You are prompted to confirm the action: 3. Click Yes to proceed with the reboot. ¾ To exit without rebooting: • Click No.
Chapter 12 Command Line Interface (CLI) In This Chapter Overview.........................................................................................................163 Accessing the KX II‐101 Using the CLI .......................................................164 SSH Connection to the KX II‐101 .................................................................164 Login................................................................................................................
Accessing the KX II-101 Using the CLI Accessing the KX II-101 Using the CLI Access the KX II‐101 by using one of the following methods: • TELNET via IP connection • SSH (Secure Shell) via IP connection • Multi‐function admin serial port via RS‐232 serial interface with provided cable and a terminal emulation program like HyperTerminal A number of SSH/TELNET clients are available and can be obtained from the following locations: • Putty ‐ http://www.chiark.greenend.org.
Chapter 12: Command Line Interface (CLI) See the Login section for login information. SSH Access from a UNIX Workstation ¾ To open an SSH session from a UNIX/Linux workstation and log in as user admin, enter the following command: ssh -l admin 192.168.30.222 The following prompt appears: password: See the Login section for login information. Login ¾ To log in, enter the user name admin as shown: Login: admin The password prompt appears.
Navigation of the CLI Navigation of the CLI Before using the CLI, it is important to understand CLI navigation and syntax. Additionally, there are combinations of keystrokes that simplify CLI use. CLI Prompts The Command Line Interface prompt indicates the current command level.
Chapter 12: Command Line Interface (CLI) CLI Syntax -Tips and Shortcuts Tips • Commands are listed in alphabetical order. • Commands are not case sensitive. • Parameter names are single word without underscore. • Commands without arguments default to show current settings for the command. • Typing a question mark (?) after a command produces help for that command. • A vertical line ( | ) indicates a choice within an optional or required set of keywords or arguments.
CLI Commands CLI Commands The table below lists and describes all available CLI commands. Command Description config Switch to the Configuration menu. diagnostics (on page Switch to the diagnostics menu. 169) debug (on page 169) Switch to debug menu. help Display an overview of the CLI syntax. history Display the current sessionʹs command line history. interface Configure the KX II‐101 network interface.
Chapter 12: Command Line Interface (CLI) Diagnostics The Diagnostics menu enables you to set the logging options for different modules of the KX II‐101. You should set logging options only when instructed by a Raritan Technical Support engineer. These logging options enable a support engineer to get the right kind of information for debugging and troubleshooting purposes.
CLI Commands Command Option Description vflag The type of verbose flag: timestamp module thread fileline verbose [on|off] Turns verbose logging on and off. Setlog Command Example The following Setlog command sets the logging level to debug with verbose logging on for the libpp_serial module. Setlog module libpp_serial level debug verbose on Configuration The Configuration menu enables you to access the network commands used to configure the network interface and set the device name.
Chapter 12: Command Line Interface (CLI) Name Command The name command is used to configure the device and host name.
CLI Commands Interface Command Example The following command sets the IP address, mask, and gateway addresses, and sets the mode to auto detect. Admin Port > Config > Network > interface ipauto none ip 192.168.50.12 mask 255.255.255.0 gw 192.168.51.12 mode auto Listports Command The Listports command lists the number of active users, user names, port, and status. Listports Command Example Admin Port > listports Port Port Port Port No.
Chapter 13 Diagnostics In This Chapter Diagnostics Menu ..........................................................................................173 Network Interface Page ................................................................................174 Network Statistics Page ................................................................................174 Ping Host Page ...............................................................................................177 Trace Route to Host Page........
Network Interface Page Network Interface Page The KX II‐101 provides information about the status of your network interface. ¾ To view information about your network interface: • Choose Diagnostics > Network Interface. The Network Interface page opens: The following information is displayed: • Whether the Ethernet interface is up or down. • Whether the gateway is ping‐able or not. • The LAN port that is currently active. ¾ To refresh this information: • Click the Refresh button.
Chapter 13: Diagnostics Statistics. Produces a page similar to the one displayed here: Interfaces.
Network Statistics Page 3. Route. Produces a page similar to the one displayed here: Click the Refresh button. The relevant information is displayed in the Result field.
Chapter 13: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP Address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another KX II‐101 unit is accessible. ¾ To ping the host: 1. Choose Diagnostics > Ping Host. The Ping Host page opens: 2. Type either the hostname or IP Address into the Hostname or IP Address field. 3. Click Ping. The results of the ping are displayed in the Result field.
Trace Route to Host Page Trace Route to Host Page Trace Route is a network tool used to determine the route taken all the way to the provided hostname or IP Address. 178 ¾ To trace the route to the host: 1. Choose Diagnostics > Trace Route to Host. The Trace Route to Host page opens: 2. Type either the Hostname or IP Address into the Hostname or IP Address field. 3. Choose the Maximum Hops from the drop‐down list (5 to 50 in increments of 5). 4. Click the Trace Route button.
Chapter 13: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. The Device Diagnostics page downloads diagnostics information from KX II‐101 to the client machine. A device diagnostics log can be generated with or without running an optional diagnostic script provided by Raritan Technical Support. A diagnostics script produces more information for diagnosing problems.
Device Diagnostics 2. (Optional) Perform the following steps if you have received a diagnostics script file from Raritan Technical Support. Otherwise, skip to step 3. a. Retrieve the diagnostics file supplied by Raritan and unzip as necessary. b. Use the Browse button. A Choose File dialog opens. c. Navigate to and select this diagnostics file. d. Click Open. The file is displayed in the Script File field: e. 3. Click Run Script. Create a diagnostics file to send to Raritan Technical Support: a.
Chapter 14 CC Unmanage In This Chapter Overview.........................................................................................................181 Removing KX II‐101 from CC‐SG Management........................................182 Using CC‐SG in Proxy Mode .......................................................................
Removing KX II-101 from CC-SG Management Removing KX II-101 from CC-SG Management Unless the KX II‐101 is released from CC‐SG control, you cannot access the device directly. If, however, the KX II‐101 does not receive heartbeat messages from CommandCenter (e.g., CommandCenter is not on the network), you can release the KX II‐101 from CC‐SG control in order to access the device. This is accomplished by using the CC Unmanage feature. Note: Maintenance permission is required to use this feature.
Chapter 14: CC Unmanage 2. Click the Yes button. A message is displayed confirming that the device is no longer under CC management: 3. Click Yes. The KX II‐101 login page opens. Using CC-SG in Proxy Mode Virtual KVM Client Version not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from CommandCenter Secure Gateway (CC‐SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”.
Appendix A Specifications In This Chapter KX II‐101..........................................................................................................184 Connectors ......................................................................................................185 Raritan Remote Client Software ..................................................................185 KX II-101 Form Factor Zero U form factor; rack mountable vertically or horizontally (bracket kit included) Dimensions (DxWxH) 4.
Appendix A: Specifications Remote Connection: Network Protocols One 10/100 Ethernet (RJ45) port TCP/IP, HTTP, HTTPS, UDP, RADIUS, LDAP, SNTP, DHCP Screen Resolutions: PC graphic mode 720x400 (for DOS) SUN® video mode 640 X 480 @ 60/72/75/85Hz, 800 X 600 @ 56/60/72/75/85Hz, 1024 X 768 @ 60/70/75/85Hz, 1152 X 864 @ 60/75Hz, 1280 X 1024 @ 60Hz, 1600 X 1200 @ 60Hz Certifications: UL/CUL, FCC Class A, CB, CE Class A and VCCI Class A Connectors Interface Type Length (inch; cm) Description Video 15”; 38
Appendix B Rack Mount The KX II‐101 unit can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brackets and screws included with the KX II‐101 kit. In This Chapter AC‐DC Adapter Clip Fitting ........................................................................186 Bracket Installation ........................................................................................188 AC-DC Adapter Clip Fitting Identify Clip Type 1. EU Clip 2.
Appendix B: Rack Mount Remove Attachment Cover from AC-DC Power Adapter 1. AC/DC Power Adaptor 2. Attachment Cover Attach Clip to AC-DC Power Adapter 1. Australian Clip 2. EU Clip 3.
Bracket Installation 4. Power Adaptor Bracket Installation 188 1. KX II‐101 unit 2. Right panel 3. Left panel 4.
Appendix B: Rack Mount • Remove the screws from the KX II‐101 unit. • Slide the left and right panels off the KX II‐101 unit. KX II-101 Bracket Parts 1. U Bracket 2.
Bracket Installation Attach Brackets to KX II-101 for Horizontal Mount 1. KX II‐101 Unit 2. U Bracket 3. L Bracket 4. Screws • Attach the U Bracket to the L Bracket using the included screws. Adjust bracket placement before tightening screws. • Mount the U and L Bracket assembly to the rack with rack‐mount screws (provided by the rack manufacturer). • Slide the KX II‐101 unit into the U Bracket with the KVM harness facing towards the target.
Appendix B: Rack Mount 2. U Bracket 3. L Bracket 4. Screws Attach the U Bracket to the L Bracket using the included screws. Adjust bracket placement before tightening screws. Mount the U and L Bracket assembly to the rack with rack‐mount screws (provided by the rack manufacturer). Slide the KX II‐101 unit into the U Bracket with the KVM harness facing towards the target. Pull and release the latch lever to lock the KX II‐101 unit into the U bracket.
Index A About Raritan Virtual KVM Client • 101 Absolute • 98 Accessing the KX II‐101 Using the CLI • 164 AC‐DC Adapter Clip Fitting • 186 Add New Favorite • 40, 45 Add New User • 50, 52, 148 Add New User Group • 54 Adding Attributes to the Class • 72 Administration Features • 4 Apple® Macintosh Settings • 14 Assigning an IP Address • 7, 23 Associate KVM Target Servers to Outlets (Port Page) • 136, 141 Attach Brackets to KX II‐101 for Horizontal Mount • 190 Attach Brackets to KX II‐101 for Vertical Mount • 1
Index E K Editing rciusergroup Attributes for User Members • 75 Enabling Direct Port Access • 34 Encryption and Share • 148 Event Management • 125 Event Management ‐ Destinations • 128 Exit • 87 Keyboard Macros • 88 Keyboard Menu • 88 Keyboard/Mouse Settings • 122 KX II‐101 • 184 KX II‐101 Bracket Parts • 189 KX II‐101 Console Layout • 35 KX II‐101 Console Navigation • 36 KX II‐101 Remote Console Menu Map • 37 F Favorites List • 40 File Server Setup (File Server ISO Images Only) • 106, 112 Firmware Upg
Index Network Configuration • 4 Network Interface Page • 174 Network Settings • 115 Network Statistics Page • 174 Note on Microsoft Active Directory • 61 Note to CC‐SG Users • 61 O Opening a KVM Session • 107 Optional Accessories • 6 Options • 81, 99 Overview • 80, 103, 133, 163, 181 P Package Contents • 6 Ping Host Page • 177 Port Access Page • 46 Port Configuration • 131 Power • 5 Power Control • 133 Powering the KX II‐101 • 20 Prerequisites for Using Virtual Media • 105, 106 Product Features • 4 Produ
Index Updating the Schema Cache • 74 Upgrade History • 161 USB Configuration • 18 User Blocking • 52, 145, 147 User Features • 5 User Group List • 53 User List • 49 User Management • 49 User Management Menu • 49 Userlist Command • 168, 172 Users • 47 Users, Groups, and Access Permissions • 47 Using a Terminal Emulation Program • 7, 27, 165 Using CC‐SG in Proxy Mode • 183 Using the Admin Port • 20, 27 Using the Local User Port • 21 Using the Remote Console • 22 Using Virtual Media • 106 V Video Menu • 92 V
¾ U.S./Canada/Latin America Monday ‐ Friday 8 a.m. ‐ 8 p.m. ET Phone: 800‐724‐8090 or 732‐764‐8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732‐764‐8887 Email for CommandCenter NOC: tech‐ccnoc@raritan.com Email for all other products: tech@raritan.com ¾ China Beijing Monday ‐ Friday 9 a.m. ‐ 6 p.m. local time Phone: +86‐10‐88091890 Shanghai Monday ‐ Friday 9 a.m. ‐ 6 p.m.