Dominion KX II-101-V2 User Guide Release 3.5.0 Copyright © 2012 Raritan, Inc. KX2101V2-v3.5.
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc. © Copyright 2012 Raritan, Inc. All third-party software and hardware mentioned in this document are registered trademarks or trademarks of and are the property of their respective holders.
Contents Chapter 1 Introduction 1 KX II-101-V2 Overview .................................................................................................................. 2 KX II-101-V2 Help .......................................................................................................................... 3 What's New in the Help ....................................................................................................... 4 Related Documentation ...........................................
Contents Video Properties ................................................................................................................ 55 Mouse Options................................................................................................................... 60 VKC Virtual Media ............................................................................................................. 64 Tool Options .............................................................................................
Contents Device Services ......................................................................................................................... 111 Enabling Telnet ................................................................................................................ 111 Enabling SSH .................................................................................................................. 111 HTTP and HTTPS Port Settings ..................................................................
Contents Configuring IP Access Control ................................................................................................... 149 SSL Certificates ......................................................................................................................... 152 Security Banner ......................................................................................................................... 155 Chapter 9 Maintenance 156 Audit Log ............................................
Contents Chapter 12 CC-SG Management 181 Overview .................................................................................................................................... 181 Removing a KX II-101-V2 from CC-SG Management ............................................................... 182 Using CC-SG in Proxy Mode ..................................................................................................... 183 Appendix A Specifications 184 Physical Specifications ...................
Contents Appendix E FAQs 207 General FAQs ............................................................................................................................ 207 IPv6 Networking .........................................................................................................................
Chapter 1 Introduction In This Chapter KX II-101-V2 Overview ..............................................................................2 KX II-101-V2 Help ......................................................................................3 Product Photos ..........................................................................................5 Product Features .......................................................................................5 Terminology ......................................
Chapter 1: Introduction KX II-101-V2 Overview Thank you for purchasing the Dominion KX II-101-V2. The KX II-101-V2 provides a single keyboard, video, and mouse (KVM) port for connection to a target server, and a single IP port for connection to an IP network. Within the KX II-101-V2 device, KVM signals from your server are converted to IP format and compressed for transmission over an IP network.
Chapter 1: Introduction Diagram key KX II-101-V2 LAN Windows®, Linux® and Sun™ servers TCP/IP LAN Remote (network) access Mobile access via iPhone® and iPad® using CC-SG KX II-101-V2 Help The KX II-101-V2 help provides information on how to install, set up, and configure the KX II-101-V2. It also includes information on accessing target servers, using virtual media, managing users and security, and maintaining and diagnosing the KX II-101-V2.
Chapter 1: Introduction What's New in the Help The following information has been added based on enhancements and changes to the equipment and/or user documentation.
Chapter 1: Introduction Product Photos KX II-101-V2 Product Features Interfaces Integrated PS/2 KVM connection USB connection for control and virtual media Serial Admin port for initial device configuration and diagnostics, as well as use with an external modem access and Raritan power strip control Local port for monitor connection Ethernet LAN port supporting 10/100-base-T autosensing, full duplex Network Configuration DHCP or static IP device address 5
Chapter 1: Introduction System Management Features Firmware upgradable over Ethernet Failsafe firmware upgrade capability Clock that can be set manually or via synchronization with Network Time Protocol (NTP/SNTP) Local, timestamped, administrator activity log SNMP V2 agent that can be disabled by the administrator Support for RADIUS and LDAP/LDAPS authentication protocols Administration Features 6 Web-based management LDAP, Active Directory®, RADIUS, or internal authentication
Chapter 1: Introduction User Features Web-based access through common browsers Intuitive graphical user interface (GUI) PC Share mode, which enables more than one remote user to connect to the target TCP communication English, Japanese, Traditional Chinese and Simplified Chinese user interface and help Virtual media access Absolute Mouse Synchronization™ Plug-and-play 256-bit encryption of complete KVM signal, including video and virtual media Power Powered by an exte
Chapter 1: Introduction Term Description Virtual media Enables a KVM target server to remotely access media from client PC and network file servers.
Chapter 2 Installation and Configuration In This Chapter Overview ....................................................................................................9 Default Login Information ..........................................................................9 Getting Started ........................................................................................10 Overview This chapter describes how to install and configure the KX II-101-V2.
Chapter 2: Installation and Configuration Getting Started KX II-101-V2 users with Microsoft® Internet Explorer® version 6 or Windows 2000® must upgrade to Service Pack 4 (SP4) or higher. The KX II-101-V2 ships with a static default IP address. On a network without a DHCP server, you must configure a new static IP address, net mask, and gateway address using either the KX II-101-V2 serial admin console or the KX II-101-V2 Remote Console.
Chapter 2: Installation and Configuration Resolutions 640x480 @60Hz 1152x864 @70Hz 640x480 @66.6Hz 1152x864 @75Hz 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.
Chapter 2: Installation and Configuration To change the command line resolution: 1. Run the following command: # eeprom outputdevice=screen:r1024x768x75 where 1024x768x75 is any resolution that the KX II-101-V2 supports. 2. Restart the computer. GUI Resolution/32 Bit To check the GUI resolution on 32 bit cards: 1. Run the following command: # /usr/sbin/pgxconfig –prconf To change the GUI resolution on 32 bit cards: 1.
Chapter 2: Installation and Configuration Mouse Settings The KX II-101-V2 operates in several mouse modes: Absolute Mouse Synchronization™, Intelligent Mouse mode and Standard Mouse mode. Note: Do not use an animated mouse while using Intelligent Mouse mode. Mouse parameters do not have to be altered for Absolute Mouse Synchronization. For both the Standard and Intelligent Mouse modes, mouse parameters must be set to specific values, which are described in this section.
Chapter 2: Installation and Configuration d. Deselect the "Use the following transition effect for menus and tooltips" option. e. Click OK. 3. Close the Control Panel. Note: For KVM target servers running Windows XP, Windows 2000 or Windows 2008, you may wish to create a user name that will be used only for remote connections through the KX II-101-V2. This will enable you to keep the target server's slow mouse pointer motion/acceleration settings exclusive to the KX II-101-V2 connection.
Chapter 2: Installation and Configuration d. Click Settings in the Performance group to open the Performance Options dialog. e. Under Custom options, deselect the following checkboxes: Animation options: Animate controls and elements inside windows Animate windows when minimizing and maximizing Fade options: Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 3. Click OK and Close the Control Panel.
Chapter 2: Installation and Configuration Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 3. Click OK and Close the Control Panel. Windows 2000 Settings To configure KVM target servers running Microsoft® Windows 2000® operating system: 1. Configure the mouse settings: a. Choose Start > Control Panel > Mouse. b. Click the Motion tab. Set the acceleration to None. Set the mouse motion speed setting to exactly the middle speed.
Chapter 2: Installation and Configuration Linux Settings (Red Hat 4 and 5, and Fedora 14) Note: The following settings are optimized for Standard Mouse mode only. To configure KVM target servers running Linux® (graphical user interface): 1. Configure the mouse settings: a. Choose Main Menu > Preferences > Mouse. The Mouse Preferences dialog appears. b. Click the Motion tab. c. Within the Speed group, set the Acceleration slider to the exact center. d.
Chapter 2: Installation and Configuration b. Using a text editor, disable all non-KX II-101-V2 supported resolutions. c. Disable the virtual desktop feature (not supported by the KX II101-V2). d. Check blanking times (+/- 40% of VESA standard). e. Restart computer. Note: If you change the video resolution, you must log off of the target server and log back in for the video settings to take effect.
Chapter 2: Installation and Configuration c. Within the Speed group, set the Acceleration slider to the exact center. d. Within the Speed group, set the Sensitivity towards low. e. Within the Drag & Drop group, set the Threshold towards small. f. Close the Mouse Preferences dialog. Note: If these steps do not work, issue the xset mouse 1 1 command as described in the Linux command line instructions. 2. Configure the screen resolution: a. Choose Main Menu > System Settings > Display.
Chapter 2: Installation and Configuration Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. A target server running the Solaris operating system must output VGA video (H-and-V sync, not composite sync). Set this at the graphical user interface or with the command line xset mouse a t where a is the acceleration and t is the threshold. To change your Sun video card output from composite sync to the non-default VGA output: 1. Issue the Stop+A command to drop to bootprom mode. 2.
Chapter 2: Installation and Configuration 2. Click on Mouse Settings and set the Mouse Acceleration to 1.0 and Threshold to 3.0. Step 2: Configure Network Firewall Settings To access the KX II-101-V2 through a network firewall, your firewall must allow communication on TCP Port 5000. Alternatively, the KX II-101-V2 can be configured to use a different TCP port of your own designation.
Chapter 2: Installation and Configuration Step 3: Connect the Equipment The KX II-101-V2 has the physical connections described in the diagram. Each letter in the diagram corresponds to a step in the equipment connection process described here. Diagram key Power connector Single power adapter. KVM cable Attach the supplied KVM cable with monitor, to the target server's keyboard, PS/2 and video and mouse ports USB connectors (included) Ethernet LAN 22 Provides LAN connectivity.
Chapter 2: Installation and Configuration Diagram key Admin port Local user Use to do one of the following: Configure and manage the device with a terminal emulation program on your PC. Configure and manage a power strip (requires an adapter, not included). Connect an external modem to dial into the device. The local port connects to a monitor. A: Power The KX II-101-V2 is powered by a 100-240V AC input and 5VDC output power adaptor that is included with the device.
Chapter 2: Installation and Configuration USB Configuration To configure the KX II-101-V2 for use with a USB target server: 1. Use the attached video cable to connect the KX II-101-V2 to the target video port. 2. Connect the USB connector of the KVM cable to the KX II-101-V2 and to a USB port on the target server. 3. Connect a monitor to the KX II-101-V2 Local User Port if you need to use the local video. Optional 4. Connect the USB keyboard and mouse directly to the target.
Chapter 2: Installation and Configuration Diagram key for USB Connection Video connection from the KX II-101-V2 to the target USB connection from the KX II-101-V2 to the target Optional monitor connection from KX II-101V2 Local User Port to the monitor Optional USB connection from the target server to the mouse and keyboard (cable not included) PS/2 Configuration To configure the KX II-101-V2 for use with a PS/2 target server: 1.
Chapter 2: Installation and Configuration Note: If you are using virtual media, you must use the USB connection.
Chapter 2: Installation and Configuration E: Local User Port The Local User port serves as a pass-through to the target server video so that it connects directly to the monitor. The local keyboard and mouse must be connected to target server directly. For USB configurations, only the local video connects to the target server at the Local User port. The keyboard and mouse connect directly to the target server using USB ports.
Chapter 2: Installation and Configuration 9. Click Apply. You will receive confirmation that the password was successfully changed. 10. Click OK. The Port Access page opens. Assigning an IP Address These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings (on page 106). To assign an IP address: 1. Choose Device Settings > Network. The Network Settings page opens. 2.
Chapter 2: Installation and Configuration c. Enter the Prefix Length. This is the number of bits used in the IPv6 address. d. Enter the Gateway IP Address. e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present. Read-Only f. Zone ID. This identifies the device with which the address is associated. Read-Only g. Select the IP Auto Configuration.
Chapter 2: Installation and Configuration See LAN Interface Settings (on page 110) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues.
Chapter 2: Installation and Configuration Remote Authentication Note to CC-SG Users When the KX II-101-V2 is controlled by CommandCenter Secure Gateway, CC-SG authenticates users and groups. For additional information about CC-SG authentication, see the CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide, which can be downloaded from the Support section of the Raritan website (www.raritan.com).
Chapter 2: Installation and Configuration Configure the KX II-101-V2 Using a Terminal Emulation Program (Optional) You can use the Admin serial console with a terminal emulation program like HyperTerminal to set the following configuration parameters for the KX II-101-V2: IP address Subnet mask address Gateway address IP autoconfiguration LAN speed LAN interface mode To use a terminal emulation program with the KX II-101-V2, you must first connect the included RS-232 serial cable f
Chapter 2: Installation and Configuration 10. To configure new network settings, at the Network prompt, type interface followed by one of the following commands and its appropriate argument (option), then press Enter. Command Argument Options ipauto none|dhcp none - Enables you to manually specify an IP address for the device. You must follow this option with the ip command and the IP address, as shown in the following example: interface ipauto none ip 192.168.50.
Chapter 2: Installation and Configuration Command Argument Options auto - Automatically sets speed and interface mode based on the network. 10hdx - 10 MB/s, half duplex. 10fdx - 10 MB/s, full duplex 100hdx - 100 MB/s, half duplex 100fdx - 100 MB/s, full duplex When you have successfully changed a setting, you see a confirmation message like the following: Admin Port > config Admin Port > Config > network Admin Port > Config > Network > interface ipauto none ip 192.168.50.
Chapter 3 Working with Target Servers In This Chapter Interfaces .................................................................................................35 Virtual KVM Client (VKC) .........................................................................
Chapter 3: Working with Target Servers 3. Select the Enable Direct Port Access via URL checkbox. 4. Click Save. To define a direct port access URL: Define a URL with the IP address, user name, password, and if necessary, port number of the KX II-101-V2. The format for a direct port access URL is: https://IP address/dpa.asp?username=username&password=password Tip: Define a direct port access URL once, then save it in your web browser as a bookmark to make reusing it easier.
Chapter 3: Working with Target Servers Information Description When displayed? State The current state of the application, either idle or active. If idle, the application tracks and displays the time the session has been idle. Always Your IP The IP address used to access the KX II-101-V2. Always Last Login The last login date and time of current user. Always Under CC-SG Management The IP address of the CC-SG device managing the KX II-101-V2.
Chapter 3: Working with Target Servers The left panel can be collapsed in order to increase the display area of the page. To collapse and the left panel: Click on the blue, left-facing arrow located approximately halfway down the left side of the panel. Once the panel is collapsed, click the blue arrow again to expand it. Port Access Page After successfully logging in to the KX II-101-V2 Remote Console, the Port Access page appears.
Chapter 3: Working with Target Servers Port Name - The name of the KX II-101-V2 port. Initially, this is set to Dominion_KX2_101_Port1 but you can change the name to something more descriptive. When you click a Port Name link, the Port Action Menu appears. Availability - The Availability can be Idle, Connected or Busy. 2. Click the Port Name of the target server you want to access. The Port Action Menu appears. See Port Action Menu (on page 39) for details on available menu options. 3.
Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently.
Chapter 3: Working with Target Servers Manage Favorites Page To open the Manage Favorites page: Click Manage in the left panel. The Manage Favorites page appears and contains the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local Subnet Discover Raritan devices on the client PC's local subnet. Discover Devices - KX II-101-V2 Subnet Discover the Raritan devices on the KX II-101-V2 device subnet.
Chapter 3: Working with Target Servers 3. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Favorites List: 1. Select the checkbox next to the device name/IP address. 2. Click Add. To access a discovered device: Click the device name or IP address for that device. A new browser opens to that device.
Chapter 3: Working with Target Servers 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate KX II-101-V2 device. 2. Click Edit. The Edit page appears. 3. Update the fields as necessary: Description IP Address/Host Name - Type the IP address of the KX II-101-V2 device Port (if necessary) Product Type 4. Click OK.
Chapter 3: Working with Target Servers Virtual KVM Client (VKC) Please note this client is used by various Raritan products. As such, references to other products may appear in this section of help. Overview Whenever you access a target server using the Remote Console, a Virtual KVM Client (VKC) window opens. There is one Virtual KVM Client for the target server you are connected to. This windows is accessed via the Windows® task bar.
Chapter 3: Working with Target Servers Button Button name Description Note: Not available in KX II-101-V2. Target Screenshot Click to take a screenshot of the target server and save it to a file of your choosing. Audio Opens a dialog that allows you to select from a list of audio devices connected to a client PC. Once audio devices have been connected to the target, select to disconnect the devices. Note: This feature is available with the KX II 2.4.0 (and later).
Chapter 3: Working with Target Servers Button Button name Description Scaling Increases or reduces the target video size so you can view the entire contents of the target server window without using the scroll bar. Power Controlling a Target Server Note: These features are available only when you have made power associations. To power cycle a KVM target server: 1. From the KX II-101-V2 Remote Console, click the Port Access tab. The Port Access page opens. 2.
Chapter 3: Working with Target Servers Connection Properties The dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. The devices optimize KVM output not only for LAN use, but also for WAN use. These devices can also control color depth and limit video output, offering an optimal balance between video quality and system responsiveness for any bandwidth.
Chapter 3: Working with Target Servers 256 Kb (Cable) 128 Kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) Note that these settings are an optimization for specific conditions rather than an exact speed. The client and server always attempt to deliver video as quickly as possible on the network regardless of the current network speed and encoding setting. But the system will be most responsive when the settings match the real world environment. 3.
Chapter 3: Working with Target Servers Connection Information To obtain information about your Virtual KVM Client connection: Choose Connection > Info... The Connection Info window opens. The following information is displayed about the current connection: Device Name - The name of the device. IP Address - The IP address of the device. Port - The KVM communication TCP/IP port used to access the target device. Data In/Second - Data rate in. Data Out/Second - Data rate out.
Chapter 3: Working with Target Servers Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Multi-Platform Client (MPC) or Virtual KVM Client (VKC). Macros exported from MPC or VKC cannot be imported into AKC. Note: KX II-101 does not support AKC. To import macros: 1. Choose Keyboard > Import Keyboard Macros to open the Import Macros dialog. Browse to the folder location of the macro file. 2. Click on the macro file and click Open to import the macro. a.
Chapter 3: Working with Target Servers Click Yes to replace the existing macro with the imported version. Click Yes to All to replace the currently selected and any other duplicate macros that are found. Click No to keep the original macro and proceed to the next macro Click No to All keep the original macro and proceed to the next macro. Any other duplicates that are found are skipped as well. Click Cancel to stop the import.
Chapter 3: Working with Target Servers 3. Click Ok. An "Export Keyboard Macros to" dialog is displayed. Locate and select the macro file. By default, the macro exists on your desktop. 4. Select the folder to save the macro file to, enter a name for the file and click Save. If the macro already exists, you receive an alert message. Select Yes to overwrite the existing macro or No to close the alert without overwriting the macro. Building a Keyboard Macro To build a macro: 1.
Chapter 3: Working with Target Servers Release F4 Release Left Alt 6. Review the Macro Sequence field to be sure the macro sequence is defined correctly. a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step and then click the up or down arrow buttons to reorder them as needed. 7. Click OK to save the macro. Click Clear to clear all field and start over.
Chapter 3: Working with Target Servers Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu. Execute the keyboard macro by clicking on it in the Keyboard menu.
Chapter 3: Working with Target Servers Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways: The Refresh Screen command forces a refresh of the video screen. The Auto-sense Video Settings command automatically detects the target server's video settings. In addition, you can manually adjust the settings using the Video Settings command.
Chapter 3: Working with Target Servers The device can filter out the electrical interference of video output from graphics cards. This feature optimizes picture quality and reduces bandwidth. Higher settings transmit variant pixels only if a large color variation exists in comparison to the neighboring pixels. However, setting the threshold too high can result in the unintentional filtering of desired screen changes. Lower settings transmit most pixel changes.
Chapter 3: Working with Target Servers Best possible video mode The device will perform the full Auto Sense process when switching targets or target resolutions. Selecting this option calibrates the video for the best image quality. Quick sense video mode With this option, the device will use a quick video Auto Sense in order to show the target's video sooner. This option is especially useful for entering a target server's BIOS configuration right after a reboot. 5.
Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen.
Chapter 3: Working with Target Servers Using Screenshot from Target You are able to take a screenshot of a target server using the Screenshot from Target server command. If needed, save this screenshot to a file location of your choosing as a bitmap, JPEG or PNG file. To take a screenshot of the target server: 1. Select Video > Screenshot from Target or click the Screenshot from Target button on the toolbar. 2.
Chapter 3: Working with Target Servers Changing the Maximum Refresh Rate If the video card you are using on the target uses custom software and you are accessing the target through MPC or VKC, you may need to change the maximum refresh rate of the monitor in order for the refresh rate to take effect on the target. To adjust the monitor refresh rate: 1. In Windows®, select Display Properties > Settings > Advanced to open the Plug and Play dialog. 2. Click on the Monitor tab. 3.
Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursors are displayed: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
Chapter 3: Working with Target Servers Additional Notes for Intelligent Mouse Mode Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place. Do not use an animated mouse. Disable active desktop on KVM target servers. Synchronize Mouse In dual mouse mode, the Synchronize Mouse command forces realignment of the target server mouse pointer with Virtual KVM Client mouse pointer.
Chapter 3: Working with Target Servers Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. Intelligent mouse mode is the default for nonVM targets. During synchronization, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acceleration. For this mode to work properly, certain conditions must be met.
Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Absolute Mouse Mode In this mode, absolute coordinates are used to keep the client and target cursors in sync, even when the target mouse is set to a different acceleration or speed.
Chapter 3: Working with Target Servers Norwegian (Norway) Portuguese (Portugal) Danish (Denmark) Swedish (Sweden) German (Switzerland) Hungarian (Hungary) Spanish (Spain) Italian (Italy) Slovenian Translation: French - US Translation: French - US International In AKC, the keyboard type defaults to the local client, so this option does not apply.
Chapter 3: Working with Target Servers Keyboard Limitations Turkish Keyboards If using a Turkish keyboard, you must connect to a target server through the Active KVM Client (AKC). It is not supported by other Raritan clients. Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation.
Chapter 3: Working with Target Servers Client Launch Settings Configuring client launch settings allows you to define the screen settings for a KVM session. Note: LX devices support this feature in MPC. LX does not support client launch setting in VKC and AKC. To configure client launch settings: 1. Click Tools > Options. The Options dialog appears. 2. Click on the Client Launch Settings tab. To configure the target window settings: a.
Chapter 3: Working with Target Servers Configure Scan Settings in VKC and AKC The KX II and LX provide a port scanning feature that searches for selected targets and displays them in a slide show view, allowing you to monitor up to 32 targets at one time. You can connect to targets or focus on a specific target as needed. Scans can include standard targets, blade servers, tiered Dominion devices, and KVM switch ports.
Chapter 3: Working with Target Servers Scaling Scaling your target window allows you to view the entire contents of the target server window. This feature increases or reduces the size of the target video to fit the Virtual KVM Client window size, and maintains the aspect ratio so that you see the entire target server desktop without using the scroll bar. To toggle scaling (on and off): Choose View > Scaling.
Chapter 3: Working with Target Servers 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file so it can be accessed later when dealing with support (if needed).
Chapter 4 Virtual Media In This Chapter Overview ..................................................................................................72 Using Virtual Media .................................................................................78 Connecting to Virtual Media ....................................................................80 Disconnecting Virtual Media ....................................................................
Chapter 4: Virtual Media Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from the client PC and network file servers. With this feature, media mounted on the client PC and network file servers is essentially mounted virtually by the target server. The target server can then read from and write to that media as if it were physically connected to the target server itself.
Chapter 4: Virtual Media 73
Chapter 4: Virtual Media Note: If you are using virtual media, you must use the USB connection. Prerequisites for Using Virtual Media With the virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session. For example, you can mount a specific CD-ROM, use it, and then disconnect it when you are done.
Chapter 4: Virtual Media Virtual Media in a Windows XP Environment If you are running the Virtual KVM Client in a Windows® XP environment, users must have Administrator privileges to access any virtual media type other than CD-ROM connections, ISOs and ISO images.
Chapter 4: Virtual Media Virtual Media in a Linux Environment Following is important information for Linux® users regarding using virtual media. Root User Permission Requirement Your virtual media connection can be closed if you mount a CD ROM from a Linux client to a target and then unmount the CD ROM. The connection also closes when a floppy drive has been mounted and then a floppy disk is removed. To avoid these issues, you must be a root user.
Chapter 4: Virtual Media guest_user@administrator-desktop:~$ getfacl -a /dev/sr0 getfacl: Removing leading '/' from absolute path names # file: dev/sr0 # owner: root # group: cdrom user::rwuser:guest_user:rwgroup::rwmask::rwother::--A similar check of the permissions for a removable device shows: guest_user@administrator-desktop:~$ ls -l /dev/sdb1 brw-rw---- 1 root disk 8, 17 12-03-2010 12:02 /dev/sdb1 guest_user@administrator-desktop:~$ ls -l /dev/sdb1 brw-rw---- 1 root disk 8, 17 12-03-2010 12:02 /dev/s
Chapter 4: Virtual Media Virtual Media in a Mac Environment Following is important information for Mac® users regarding using virtual media. Active System Partitions You cannot use virtual media to mount active system partitions for a Mac client.
Chapter 4: Virtual Media Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. 2. Open a KVM session with the appropriate target server. a. Open the Port Access page from the Remote Console. b. Connect to the target server from the Port Access page: Click the Port Name for the appropriate server. Choose the Connect command from the Port Action menu. The target server opens in a Virtual KVM Client window. 3. Connect to the virtual media.
Chapter 4: Virtual Media Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives. This is the only option for which Read/Write is available. To access a drive on the client computer: 1. From the Virtual KVM Client, choose Virtual Media > Connect Drive.
Chapter 4: Virtual Media Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. To access a CD-ROM, DVD-ROM, or ISO image: 1. From the Virtual KVM Client, choose Virtual Media > Connect CDROM/ISO Image. The Map Virtual Media CD/ISO Image dialog appears. 2. For internal and external CD-ROM or DVD-ROM drives: a. Choose the Local CD/DVD Drive option. b.
Chapter 4: Virtual Media Note: If you are working with files on a Linux® target, use the Linux Sync command after the files are copied using virtual media in order to view the copied files. Files may not appear until a sync is performed. Note: If you are using the Windows 7® operating system®, Removable Disk is not displayed by default in the Window's My Computer folder when you mount a Local CD/DVD Drive or Local or Remote ISO Image.
Chapter 5 User Management In This Chapter User Groups ............................................................................................83 Users .......................................................................................................89 Authentication Settings ............................................................................93 Changing a Password ...........................................................................
Chapter 5: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group. The User Group List page displays a list of all user groups, which can be sorted in ascending or descending order by clicking on the Group Name column heading.
Chapter 5: User Management 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select the checkboxes next to the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 87). Setting Port Permissions For each server port, you can specify the access type the group has, as well as the type of port access to the virtual media and the power control.
Chapter 5: User Management control. It is possible to be locked out of your KX II-101-V2 if your IP address is within a range that has been denied access. This feature limits access to the KX II-101-V2 device by users in the selected group to specific IP addresses. This feature applies only to users belonging to a specific group, unlike the IP Access Control List feature that applies to all access attempts to the device, is processed first, and takes priority. Important: The IP address 127.0.0.
Chapter 5: User Management To replace a rule: 1. Specify the rule number you want to replace. 2. Type the Starting IP and Ending IP fields. 3. Choose the Action from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number. To delete a rule: 1. Specify the rule number you want to delete. 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the order in which they are listed.
Chapter 5: User Management Permission Description Note: The Admin user group has this permission by default.
Chapter 5: User Management 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 87). 3. Set the Port Permissions. Specify the server ports that can be accessed by users belonging to this group (and the type of access). See Setting Port Permissions (on page 85). 4. Set the IP ACL (optional). This feature limits access to the KX II-101V2 device by specifying IP addresses.
Chapter 5: User Management View Users by Port The User By Ports page lists all authenticated local and remote users and ports they are being connected to. Only permanent connections to ports are listed. If the same user is logged on from more than one client, their username appears on the page for each connection they have made. For example, if a user has logged on from two (2) different clients, their name is listed twice.
Chapter 5: User Management Logging Users Off the KX II-101-V2 (Force Logoff) If you are an administrator, you are able to log off any authenticated user who is logged on to the KX II-101-V2. Users can also be disconnected at the port level. See Disconnecting Users from Ports (on page 90). To log a user off the KX II-101-V2: 1. Choose User Management > Users by Port. The Users by Port page opens. 2. Select the checkbox next to the username of the person you want to disconnect from the target. 3.
Chapter 5: User Management Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management > User List. 2. Locate the user from among those listed on the User List page. 3. Click the user name. The User page opens. 4. On the User page, change the appropriate fields. See Adding a New User (on page 91) for information about how to get access the User page. 5. To delete a user, click Delete. You are prompted to confirm the deletion. 6. Click OK.
Chapter 5: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed. This is called authorization. When the KX II-101-V2 is configured for remote authentication, the external authentication server is used primarily for the purposes of authentication, not authorization.
Chapter 5: User Management Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn. Reminder: Microsoft Active Directory functions natively as an LDAP/LDAPS authentication server.
Chapter 5: User Management 9. In the User Search DN field, enter the Distinguished Name of where in the LDAP database you want to begin searching for user information. Up to 64 characters can be used. An example base search value might be: cn=Users,dc=raritan,dc=com. Consult your authentication server administrator for the appropriate values to enter into these fields. 10. Enter the Distinguished Name of the Administrative User in the DN of Administrative User field (up to 64 characters).
Chapter 5: User Management 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used to authenticate the Administrative User's DN against the remote authentication server. Enter the password in the Secret Phrase field and again in the Confirm Secret Phrase field (up to 128 characters). LDAP/LDAP Secure 12. Select the Enable Secure LDAP checkbox if you would like to use SSL. This will enable the Enable LDAPS Server Certificate Validation checkbox.
Chapter 5: User Management 14. The default Secure LDAP Port is 636. Either use the default port or specify another port. This field is only used when the Enable Secure LDAP checkbox is selected. 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certificate file to validate the certificate provided by the server. If you do not want to use the previously uploaded root CA certificate file, leave this checkbox deselected.
Chapter 5: User Management 17. The KX II-101-V2 provides you with the ability to test the LDAP configuration from the Authentication Settings page due to the complexity sometimes encountered with successfully configuring the LDAP server and KX II-101-V2 for remote authentication. To test the LDAP configuration, enter the login name and password in the "Login for testing" field and the "Password for testing" field respectively.
Chapter 5: User Management 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On your AD server, assign the KX II-101-V2 users to the groups created in step 2. 4. From the KX II-101-V2, enable and configure your AD server properly. See Implementing LDAP/LDAPS Remote Authentication (on page 94). Important Notes Group Name is case sensitive.
Chapter 5: User Management The timeout is the length of time the KX II-101-V2 waits for a response from the RADIUS server before sending another authentication request. 9. The default number of retries is 3 Retries. This is the number of times the KX II-101-V2 will send an authentication request to the RADIUS server. 10. Choose the Global Authentication Type from among the options in the drop-down list: 100 PAP - With PAP, passwords are sent as plain text. PAP is not interactive.
Chapter 5: User Management CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PAP. Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II-101-V2 determines the permissions for a given user based on the permissions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID.
Chapter 5: User Management RADIUS Communication Exchange Specifications The KX II-101-V2 sends the following RADIUS attributes to your RADIUS server: Attribute Data Log in Access-Request (1) NAS-Port-Type (61) VIRTUAL (5) for network connections. NAS-IP-Address (4) The IP address for the KX II-101-V2. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting. User-Password(2) The encrypted password.
Chapter 5: User Management User Authentication Process When the device is configured to authenticate and authorize local users, the order in which the user credentials are validated follows the following process: 103
Chapter 5: User Management Remote authentication follows the process specified in the flowchart below: 104
Chapter 5: User Management Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field. Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and special characters. 4. Click OK. 5.
Chapter 6 Device Management In This Chapter Network Settings ...................................................................................106 Device Services .....................................................................................111 Keyboard/Mouse Setup .........................................................................115 Serial Port Settings ................................................................................115 Configuring Date/Time Settings .......................
Chapter 6: Device Management Network Basic Settings These procedures describe how to assign an IP address on the Network Settings page. For complete information about all of the fields and the operation of this page, see Network Settings (on page 106). To assign an IP address: 1. Choose Device Settings > Network. The Network Settings page opens. 2. Specify a meaningful Device Name for your KX II-101-V2 device. Up to 32 alphanumeric characters using valid special characters and no spaces. 3.
Chapter 6: Device Management e. Link-Local IP Address. This address is automatically assigned to the device. It is used for neighbor discovery or when no routers are present. Read-Only f. Zone ID. This identifies the device with which the address is associated. Read-Only g. Select the IP Auto Configuration. The following options are available: None - Use this option if you do not want an auto IP configuration and prefer to set the IP address yourself (static IP).
Chapter 6: Device Management See LAN Interface Settings (on page 110) for information in configuring this section of the Network Settings page. Note: In some environments, the default LAN Interface Speed & Duplex setting Autodetect (autonegotiator) does not properly set the network parameters, which results in network issues. In these instances, setting the KX II-101-V2 LAN Interface Speed & Duplex field to 100 Mbps/Full Duplex (or whatever option is appropriate to your network) addresses the issue.
Chapter 6: Device Management LAN Interface Settings The current parameter settings are identified in the Current LAN interface parameters field. Select the LAN Interface Speed & Duplex settings.
Chapter 6: Device Management Device Services The Device Services page allows you to configure the following functions: Enable SSH access Enter the discovery port Enable direct port access Enable Telnet access Configure HTTp and HTTPs settings Configuring SNMP agents Enabling Telnet If you wish to use Telnet to access the KX II-101-V2, first access the KX II-101-V2 from the CLI or a browser. To enable Telnet: 1.
Chapter 6: Device Management HTTP and HTTPS Port Settings You are able to configure HTTP and/or HTTPS ports used by the KX II101-V2. For example, if you are using the default HTTP port 80 for another purpose, changing the port will ensure the device does not attempt to use it. To change the HTTP and/or HTTPS port settings: 1. Choose Device Settings > Device Services. The Device Service Settings page opens. 2. Enter the new ports in the HTTP Port and/or HTTPS Port fields. 3. Click OK.
Chapter 6: Device Management 2. Select Enable Direct Port Access via URL if you would like users to have direct access to a target via the Dominion device by passing in the necessary parameters in the URL. 3. Click OK. Configuring SNMP Agents SNMP-compliant devices, called agents, store data about themselves in Management Information Bases (MIBs) and return this data to the SNMP managers. See Viewing the KX II-101-V2 MIB (on page 124) for information on viewing the KX II-101-V2 MIB.
Chapter 6: Device Management c. Authentication Protocol - the MD5 or SHA authentication protocol used by the SNMP v3 agent d. Authentication Passphrase - the passphrase required to access the SNMP v3 agent (up to 64 characters) e. Privacy Protocol - if applicable, the AES or DES algorithm used to encrypt PDU and context data f. Privacy Passphrase - the passphrase used to access the privacy protocol algorithm (up to 64 characters) 6. Click OK to start the SNMP agent service.
Chapter 6: Device Management Keyboard/Mouse Setup Use the Keyboard/Mouse Setup page to configure the Keyboard and Mouse interface between the KX II-101-V2 and the host device. 1. Click Device Settings > Keyboard/Mouse. 2. Select the Host Interface. This selection determines if the KX II-101V2 sends keyboard and mouse data through the PS/2 or USB connections. Auto - With this setting, the KX II-101-V2 will use a USB connection if available, otherwise it will default to the PS/2 connection.
Chapter 6: Device Management Admin Port To configure the admin serial port: 1. Choose Device Settings > Serial Port. The Serial Port Settings page appears. 2. Select the Admin Port radio button. 3. Choose one of these options to connect to the KX II-101-V2 directly from a client PC and access the Command Line Interface through a program such as Hyperterminal. See Command Line Interface (CLI) (on page 172). 4.
Chapter 6: Device Management Modem server IP address - The address the user types to access the KX II-101-V2 web interface once connected via modem. Modem client IP address - The address assigned to the user once connected via modem. 4. Click OK. See Modem Access Cable Connections (on page 117) for details on the cable connection for modem access and see Certified Modems (on page 187) for details on certified modems that work with the KX II-101V2.
Chapter 6: Device Management User Specified Time - Choose this option to input the date and time manually. For the User Specified Time option, enter the date and time. For the time, use the hh:mm format (using a 24hour clock). Synchronize with NTP Server - Choose this option to synchronize the date and time with the Network Time Protocol (NTP) Server. 5. For the Synchronize with NTP Server option: a. Enter the IP address of the Primary Time server. b.
Chapter 6: Device Management 2. Select SNMP Logging Enabled to enable to remaining checkboxes. Required 3. Select either or both SNMP v1/v2c Traps Enabled and SNMP Trap v3 Enabled. At least one option must be selected. Once selected, all related fields are enabled. Required 4. Complete the following fields for SNMP v1/v2c (if needed): a. Destination IP/Hostname - the IP or hostname of the SNMP manager.
Chapter 6: Device Management Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Management - Settings page. The events that are captured once an SNMP trap is configured are selected on the Event Management - Destination page. See Configuring Event Management - Destinations. KX II-101-V2 supports SNMP logging for SNMP v1/v2c and/or v3. SNMP v1/v2c defines message formats and protocol operations when SNMP logging is enabled.
Chapter 6: Device Management Note: If you disable SNMP settings at any time, the SNMP information is retained so you do not have to reenter if you re-enable the settings. To delete SNMP traps: Clear all of the SNMP trap fields and save. Use the reset to factory defaults feature to remove the SNMP configuration and set the KX II-101-V2 to its original factory default.
Chapter 6: Device Management Trap Name Description deviceUpgradeStarted The KX II-101-V2 has begun update via an RFP file. factoryReset The device has been reset to factory defaults. firmwareFileDiscarded Firmware file was discarded. firmwareUpdateFailed Firmware update failed. firmwareValidationFailed Firmware validation failed. groupAdded A group has been added to the KX II-101-V2 system. groupDeleted A group has been deleted from the system. groupModified A group has been modified.
Chapter 6: Device Management Trap Name Description securityBannerChanged A change has been made to the security banner. securityViolation Security violation. setDateTime The date and time for the device has been set. setFIPSMode FIPS mode has been enabled. startCCManagement The device has been put under CommandCenter Management. stopCCManagement The device has been removed from CommandCenter Management. userAdded A user has been added to the system.
Chapter 6: Device Management Viewing the KX II-101-V2 MIB To view the KX II-101-V2 MIB: 1. Choose Device Settings > Event Management - Settings. The Event Management - Settings page opens. 2. Click the 'Click here to view the Dominion KX2 SNMP MIB' link. The MIB file opens in a browser window. Note: If you have Read-Write privileges to the MIB file, use a MIB editor to make changes to the file. SysLog Configuration To configure the Syslog (enable Syslog forwarding): 1.
Chapter 6: Device Management Note: IPv6 addresses cannot exceed 80 characters in length for the host name. Use the reset to factory defaults feature to remove the syslog configuration and set the KX II-101-V2 to its original factory default. To reset to factory defaults: 1. Click Reset To Defaults. Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps), or can be logged to the syslog or audit log.
Chapter 6: Device Management Port Configuration The Port Configuration page displays a list of the KX II-101-V2 ports. Ports connected to KVM target servers or power strips are displayed in blue and can be edited. To change a port configuration: 1. Choose Device Settings > Port Configuration. The Port Configuration page opens. Sorting This page is initially displayed in port number order, but can be sorted on any of the fields by clicking on the column heading.
Chapter 6: Device Management Managing KVM Target Servers (Port Page) This Port page opens when you select a port from the Port Configuration page that is connected to a target server. From this page, you can make power associations and change the Port Name to something more descriptive. A server can have up to four power plugs that you can associate with the power strip.
Chapter 6: Device Management Valid Special Characters Character Description Character Description ! Exclamation point ; Semi-colon " Double quote = Equal sign # Pound sign > Greater than sign $ Dollar sign ? Question mark % Percent sign @ At sign & Ampersand [ Left bracket ( Left parenthesis \ Backward slash ) Right parenthesis ] Right bracket * Asterisk ^ Caret + Plus sign _ Underscore , Comma ` Grave accent - Dash { Left brace .
Chapter 6: Device Management Connecting the Power Strip Diagram key KX II-101-V2 Raritan power strip. DKX2-101-V2-PDU (DB9-RJ45 adapter) connector (not included) from the KX II-101-V2 to a Raritan the power strip. To connect the KX II-101-V2 to a Raritan power strip: 1. Connect the DKX2-101-V2-PDU (DB9-RJ45 adapter) cable to the Admin port of the KX II-101-V2. 2. Connect the DKX2-101-V2-PDU to the serial port connector on the Raritan power strip using a Cat5 cable. 3.
Chapter 6: Device Management 5. Power ON the Raritan power strip. 6. Click to Device Settings > Serial Port to open the Serial Port page. 7. Select the Power Strip Control radio button and click OK. Once this is done, the Power menu is available on the Remote Console. Naming the Power Strip (Port Page for Power Strips) Once the KX II-101-V2 is connected to a Raritan remote power strip, the port is displayed on the Port page and you can open that port from the Port Configuration page.
Chapter 6: Device Management To cancel without saving changes: Click Cancel. Managing Power Associations To make power associations (associate power strip outlets with the KVM target server): Note: When a power strip is associated with the target server (port), the outlet name is replaced by the port name. You can change this name in the Port 2 page. 1. Choose the power strip from the Power Strip Name drop-down list. 2. Choose the outlet from the Outlet Name drop-down list. 3.
Chapter 6: Device Management 2. For that power strip, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down list, select None. 4. Click OK. That power strip/outlet association is removed. A confirmation message appears. To show the power port configuration: Choose Home > Device Settings > Port Configuration > [power port name]. The outlet associations for the power strip appear under Outlets. To edit the power port configuration: 1.
Chapter 6: Device Management Analog KVM Switch You can configure a Raritan analog KVM switch to work with the KX II101-V2. The KX II-101-V2's compatibility has been verified with the following Raritan KVM switches: SwitchMan SW2, SW4 and SW8 Master Console MX416 and MXU Similar products from Raritan or other vendors may be compatible but support is not guaranteed.
Chapter 6: Device Management 8. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults: Click Reset to Defaults. Resetting the KX II-101-V2 Using the Reset Button On the top of the device, there is a Reset button. It is recessed to prevent accidental resets (you will need a pointed object to press this button). The actions that are performed when the Reset button is pressed are defined in the graphical user interface. See Encryption & Share. To reset the device: 1.
Chapter 6: Device Management Note: If the KX II-101-V2 is set to restore to the factory defaults upon reset, the IP address, user name, and other options will be set accordingly. Changing the Default GUI Language Setting The KX II-101-V2 GUI supports the following localized languages: Japanese Simplified Chinese Traditional Chinese To change the GUI language: 1. Select Device Settings > Language. The Language Settings page opens. 2.
Chapter 7 Managing USB Connections In This Chapter Overview ................................................................................................137 USB Connection Settings ......................................................................137 Advanced USB Connection Settings .....................................................
Chapter 7: Managing USB Connections Overview To broaden the KX II-101-V2's compatibility with different KVM target servers, Raritan provides a user defined real-time selection of USB configuration profile options for a wide range of operating system and BIOS-level server implementations. The default USB Connection Settings meet the needs of the vast majority of deployed KVM target server configurations.
Chapter 7: Managing USB Connections 2. Click USB Connection Settings to expand the USB Connection Settings section. 3.
Chapter 7: Managing USB Connections 3. Click the User Defined KX II-101 USB Profile Configuration Table link to access the recommended configurations to apply to the Advanced USB Connection Settings section. 4. Configure the following as needed: a. Virtual Media Interface #1 Type b. Check the Remove Unused VM Interface #1 From Device Configuration checkbox to remove the specified VM type interface (for #1). c. Virtual Media Interface #2 Type d.
Chapter 8 Security Management In This Chapter Security Settings ....................................................................................140 Configuring IP Access Control ..............................................................149 SSL Certificates .....................................................................................152 Security Banner .....................................................................................
Chapter 8: Security Management Limitation Description This field is enabled and required when the Enable Password Aging checkbox is selected. Enter the number of days after which a password change is required. The default is 60 days. Log out idle users, After (1-365 minutes) Select the "Log off idle users" checkbox to automatically disconnect users after the amount of time you specify in the "After (1-365 minutes)" field.
Chapter 8: Security Management Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwords, you can specify the format of valid KX II-101-V2 local passwords such as minimum and maximum length, required characters, and password history retention. Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number).
Chapter 8: Security Management User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
Chapter 8: Security Management Option Description Timer Lockout Users are denied access to the system for the specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled: Attempts - The number of unsuccessful login attempts after which the user will be locked out. The valid range is 1 - 10 and the default is 3 attempts. Lockout Time - The amount of time for which the user will be locked out.
Chapter 8: Security Management Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX II-101-V2 Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX II-101-V2 from your browser. To configure encryption and share: 1. Choose one of the options from the Encryption Mode drop-down list.
Chapter 8: Security Management Encryption mode Description for more information. AES-256 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. 256 is the key length. When AES-256 is specified, be certain that your browser supports it, otherwise you will not be able to connect. See Checking Your Browser for AES Encryption (on page 147) for more information.
Chapter 8: Security Management 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware Reset button (at the back of the device) is depressed. For more information, see Resetting the KX II-101-V2 Using the Reset Button (on page 134). Choose one of the following options: Local device reset mode Description Enable Local Factory Returns the KX II-101-V2 device to the factory Reset (default) defaults.
Chapter 8: Security Management Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be desirable. The KX II-101-V2 uses an embedded FIPS 140-2-validated cryptographic module running on a Linux ® platform per FIPS 140-2 Implementation Guidance section G.5 guidelines. Once this mode is enabled, the private key used to generate the SSL certificates must be internally generated; it cannot be downloaded or exported. To enable FIPS 140-2: 1.
Chapter 8: Security Management Set the Encryption & Share to Auto on the Security Settings page. See Encryption & Share. Microsoft Client FIPS 140-2 should be enabled on the client computer and in Internet Explorer. To enable FIPS 140-2 on a Windows client: 1. Select Control Panel > Administrative Tools > Local Security Policy to open the Local Security Settings dialog. 2. From the navigation tree, select Select Local Policies > Security Options. 3.
Chapter 8: Security Management Drop - IP addresses are denied access to the KX II-101-V2 device. To add (append) rules: 1. Type the IP address and subnet mask in the IPv4/Mask or IPv6/Prefix Length field. Note: The IP address should be entered using CIDR (Classless Inter-Domain Routing notation, CIDR notation consists of two parts. The most significant part is the network address, which identifies a whole network or subnet. The least significant portion is the identifier.
Chapter 8: Security Management 3. You are prompted to confirm the deletion. Click OK. To allow access to only one IP address and block all others, change the subnet mask for the rule to /32. For example, if you are trying to exclude all access from the '192.168.51' subnet and the Default Policy is Accept, you would Append a Rule with IP/MASK set to 192.168.51.00/24 and a policy DROP. Or, if you are trying to exclude all access from the 192.168.51 subnet except from a specific IP address (192.168.51.
Chapter 8: Security Management SSL Certificates The KX II-101-V2 uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic between itself and a connected client. When establishing a connection, the KX II-101-V2 has to identify itself to a client using a cryptographic certificate. It is possible to generate a Certificate Signing Request (CSR) and install a certificate signed by the Certificate Authority (CA) on the KX II-101-V2. The CA verifies the identity of the originator of the CSR.
Chapter 8: Security Management f. Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g. DE for Germany, or US for the U.S. g. Challenge Password - Some certification authorities require a challenge password to authorize later changes on the certificate (e.g. revocation of the certificate). Enter one if required. h. Confirm Challenge Password - Confirmation of the Challenge Password. i.
Chapter 8: Security Management i. Reboot the KX II-101-V2 to send the saved CSR to a CA for SSL certificate. To download a CSR certificate: 1. The CSR and the file containing the private key used when generating it can be downloaded by clicking Download. Note: The CSR and the private key file are a matched set and should be treated accordingly. If the signed certificate is not matched with the private key used to generate the original CSR, the certificate will not be useful.
Chapter 8: Security Management Security Banner KX II-101-V2 provides you with the ability to add a security banner to the KX II-101-V2 login process. This feature requires users to either accept or decline a security agreement before they can access the KX II-101V2. The information provided in a security banner will be displayed in a Restricted Service Agreement dialog after users access KX II-101-V2 using their login credentials.
Chapter 9 Maintenance In This Chapter Audit Log................................................................................................156 Device Information .................................................................................157 Backup and Restore ..............................................................................158 Upgrading Firmware ..............................................................................160 Upgrade History .........................................
Chapter 9: Maintenance Device Information The Device Information page provides detailed information about your KX II-101-V2 device. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX II-101-V2: Choose Maintenance > Device Information. The Device Information page opens.
Chapter 9: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II-101-V2. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KX II-101-V2 by backing up the user configuration settings from the KX II-101-V2 in use and restoring those configurations to the new KX II-101-V2.
Chapter 9: Maintenance 2. To do this: a. Save the backup file. The backup file is saved locally on your client machine with the name and location specified. b. Once saved, locate the file and right-click on it. Select properties. c. In general tab, click Change and select WordPad. To restore your KX II-101-V2: WARNING: Exercise caution when restoring your KX II-101-V2 to an earlier version. Usernames and password in place at the time of the backup will be restored.
Chapter 9: Maintenance Upgrading Firmware Use the Firmware Upgrade page to upgrade the firmware for your KX II101-V2. Important: Do not turn off your KX II-101-V2 device while the upgrade is in progress - doing so will likely result in damage to the device. To upgrade your KX II-101-V2 device: 1. Choose Maintenance > Firmware Upgrade. The Firmware Upgrade page opens. 2. Click the Show Latest Firmware link, locate the appropriate Raritan firmware distribution file (*.
Chapter 9: Maintenance 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the device reboots. 6. As prompted, close the browser and wait approximately 5 minutes before logging into the KX II-101-V2 again. For information about upgrading the device firmware using the MultiPlatform Client, see the KVM Serial and Clients User Guide.
Chapter 9: Maintenance Full Factory Reset - Removes the entire configuration and resets the device completely to the factory defaults. Note that any management associations with CommandCenter will be broken. Because of the complete nature of this reset, you will be prompted to confirm the factory reset. Network Parameter Reset - Resets the network parameters of the device back to the default values (click Device Settings > Network Settings to access this information): 3. Click Reset to continue.
Chapter 9: Maintenance 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot. Stopping CC-SG Management While the KX II-101-V2 is under CC-SG management, if you try to access the device directly, you are notified that it the device is under CCSG management.
Chapter 9: Maintenance 2. Click Yes to begin the processing of removing the device from CCSG management. A confirmation message will then displayed asking you to confirm that you want the remove the device from CC-SG management. 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed.
Chapter 10 Diagnostics The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the KX II-101-V2 device. All of the Diagnostics pages (except Device Diagnostics) run standard networking commands and the information that is displayed is the output of those commands. The Diagnostics menu options help you debug and configure the network settings. The Device Diagnostics option is intended for use in conjunction with Raritan Technical Support.
Chapter 10: Diagnostics 166 Statistics - Produces a page similar to the one displayed here. Interfaces - Produces a page similar to the one displayed here.
Chapter 10: Diagnostics Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.
Chapter 10: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another KX II-101-V2 is accessible. To ping the host: 1. Choose Diagnostics > Ping Host. The Ping Host page appears. 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232 characters in length. 3. Click Ping.
Chapter 10: Diagnostics 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The output of trace route is displayed in the Result field.
Chapter 10: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. The Device Diagnostics page downloads diagnostics information from the KX II-101-V2 to the client machine. A device diagnostics log can be generated with or without running an optional diagnostic script provided by Raritan Technical Support. A diagnostics script produces more information for diagnosing problems.
Chapter 10: Diagnostics a. Click Save to File. The File Download dialog appears. b. Click Save. The Save As dialog appears. c. Navigate to the desired directory and click Save. 4. Email this file as directed by Raritan Technical Support.
Chapter 11 Command Line Interface (CLI) In This Chapter Overview ................................................................................................172 Accessing the KX II-101-V2 Using the CLI............................................173 SSH Connection to the KX II-101-V2 ....................................................173 Logging in ..............................................................................................174 Navigation of the CLI ....................................
Chapter 11: Command Line Interface (CLI) Accessing the KX II-101-V2 Using the CLI Access the KX II-101-V2 using one of the following methods: TELNET via IP connection SSH (Secure Shell) via IP connection Multi-function admin serial port via RS-232 serial interface with provided cable and a terminal emulation program like HyperTerminal Several SSH/TELNET clients are available and can be obtained from the following locations: PuTTy - http://www.chiark.greenend.org.
Chapter 11: Command Line Interface (CLI) SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX®/Linux® workstation and log in as the user admin, enter the following command: ssh -l admin 192.168.30.222 The Password prompt appears. Logging in To log in: 1. Login: admin 2. The password prompt appears. Enter the default password: raritan. The welcome message appears. You are now logged in as an Administrator.
Chapter 11: Command Line Interface (CLI) Completion of Commands The CLI supports the completion of partially-entered commands. After entering the first few characters of an entry, press the Tab key. If the characters form a unique match, the CLI will complete the entry. If no match is found, the CLI displays the valid entries for that level. If multiple matches are found, the CLI displays all valid entries. Enter additional text to make the entry unique and press the Tab key to complete the entry.
Chapter 11: Command Line Interface (CLI) Command Description help Display an overview of the CLI syntax. quit Places the user back one level. logout Logs out the user session. CLI Commands The table below lists and describes all available CLI commands. 176 Command Description config Switch to the Configuration menu. diagnostics Switch to the diagnostics menu. See Diagnostics (on page 177). debug Switch to debug menu. See Debug (on page 177). help Display an overview of the CLI syntax.
Chapter 11: Command Line Interface (CLI) Diagnostics The Diagnostics menu enables you to set the logging options for different modules of the KX II-101-V2. You should set logging options only when instructed by a Raritan Technical Support engineer. These logging options enable a support engineer to get the right kind of information for debugging and troubleshooting purposes.
Chapter 11: Command Line Interface (CLI) Command Option Description verbose [on|off] Turns verbose logging on and off. Setlog Command Example The following Setlog command sets the logging level to debug with verbose logging on for the libpp_serial module. Setlog module libpp_serial level debug verbose on Configuration The Configuration menu enables you to access the network commands used to configure the network interface and set the device name.
Chapter 11: Command Line Interface (CLI) Command Option Description ipauto Static or dynamic IP address ip ipaddress IP address of the KX II-101-V2 assigned for access from the IP network mask subnetmask Subnet mask obtained from the IP administrator gw ipaddress Gateway IP address obtained from the IP administrator mode Set Ethernet Mode to auto detect or force 100MB/s full duplex (100fdx) Interface Command Example The following command sets the IP address, mask, and gateway a
Chapter 11: Command Line Interface (CLI) Listports Command The Listports command lists the number of active users, user names, port, and status. Listports Command Example Admin Port > listports Port Port No. 1 Port Port Name Port Type Status Availability - Dominion_KXII-101_V2_Port KVM up idle Userlist Command The Userlist command lists the port, port name, port type, port status, and port availability.
Chapter 12 CC-SG Management In This Chapter Overview ................................................................................................181 Removing a KX II-101-V2 from CC-SG Management ...........................182 Using CC-SG in Proxy Mode .................................................................183 Overview CC-SG can managed KX II-101-V2. Once under CC-SG management, mobile access to the KX II-101-V2 is supported from an iPad® or iPhone®.
Chapter 12: CC-SG Management Removing a KX II-101-V2 from CC-SG Management Unless the KX II-101-V2 is released from CC-SG control, you cannot access the device directly. However, if the KX II-101-V2 does not receive heartbeat messages from CommandCenter (for example, CommandCenter is not on the network), you can release the KX II-101V2 from CC-SG control in order to access the device. This is accomplished by using the CC Unmanage feature. Note: Maintenance permission is required to use this feature.
Chapter 12: CC-SG Management 2. Click Yes. A message appears, confirming that the device is no longer under CC management. 3. Click OK. The KX II-101-V2 login page opens. Using CC-SG in Proxy Mode Virtual KVM Client Version not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from CommandCenter Secure Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”.
Appendix A Specifications In This Chapter Physical Specifications ..........................................................................184 Supported Operating Systems (Clients) ................................................185 Supported Browsers ..............................................................................186 Connectors ............................................................................................186 Certified Modems ....................................................
Appendix A: Specifications KX II-101-V2...
Appendix A: Specifications Mode 32-bit mode Operating system Windows Server 2003® Windows Vista ® Windows 7® Windows x64 64-bit mode Windows XP Browser Firefox® 1.06 - 4 or later Internet Explorer 6.0 SP1++, IE 7, IE 8 Firefox 1.06 - 3 Internet Explorer 7.0 or 8.0 Internet Explorer 9.0 Firefox 1.06 - 4 or later 64bit OS, 32bit browsers: Windows XP Professional® Windows XP Tablet® Windows Vista Windows Server 2003 Internet Explorer 6.0 SP1+, 7.0 or 8.0 Firefox 1.
Appendix A: Specifications Certified Modems USRobotics® 56K 5686E ZOOM® v90 ZOOM v92 USRobotics Sportster® 56K USRobotics Courier™ 56K Supported Video Resolutions Ensure that each target server's video resolution and refresh rate are supported by the KX II-101-V2 and that the signal is noninterlaced. Video resolution and cable length are important factors in the ability to obtain mouse synchronization.
Appendix A: Specifications Resolutions 800x600 @75Hz 1360x768@60Hz 800x600 @85Hz 1366x768@60Hz 800x600 @90Hz 1368x768@60Hz 800x600 @100Hz 1400x1050@60Hz 832x624 @75.1Hz 1440x900@60Hz 1024x768 @60Hz 1600x1200 @60Hz 1024x768@70 1680x1050@60Hz 1024x768@72 1920x1080@60Hz Note: Composite Sync and Sync-on-Green video require an additional adapter. Note: Some resolutions may not be available by default.
Appendix A: Specifications Language Regions Keyboard layout Korean South Korea Dubeolsik Hangul Japanese Japan JIS Keyboard French France French (AZERTY) layout keyboard.
Appendix A: Specifications Port Description HTTP, Port 80 This port can be configured as needed. See HTTP and HTTPS Port Settings (on page 112). By default, all requests received by the KX II101-V2 via HTTP (port 80) are automatically forwarded to HTTPS for complete security. The KX II-101-V2 responds to Port 80 for user convenience, relieving users from having to explicitly type in the URL field to access the KX II-101-V2, while still preserving complete security.
Appendix A: Specifications Network Speed Settings KX II-101-V2 network speed setting Network switch port setting Auto 100/Full Auto 100/Full Highest Available Speed 10/Full 10/Half KX II-101100/Half V2: 100/Full KX II-101V2: 10/Full 10/Half Switch: 100/Half Switch: 10/Half KX II-101100/Full V2: 100/Half Switch: 100/Full 100/Half 100/Half 100/Half KX II-101No No V2: 100/Half Communica Communicat tion ion Switch: 100/Full KX II-101100/Half V2: 100/Full Switch: 100/Half 10/Full KX II-101V2:
Appendix A: Specifications communication,” however, note that the KX II-101-V2 behavior deviates from expected behavior Note: For reliable network communication, configure the KX II-101-V2 and the LAN switch to the same LAN Interface Speed and Duplex. For example, configure both the KX II-101-V2 and LAN Switch to Autodetect (recommended) or set both to a fixed speed/duplex such as 100MB/s/Full.
Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ........................................................193 Setting the Registry to Permit Write Operations to the Schema ...........194 Creating a New Attribute .......................................................................194 Adding Attributes to the Class ...............................................................
Appendix B: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory® Schema root node in the left pane of the window and then click Operations Master. The Change Schema Master dialog appears. 2. Select the "Schema can be modified on this Domain Controller" checkbox. Optional 3. Click OK.
Appendix B: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field. 7. Type a meaningful description in the Description field. 8. Click the Syntax drop-down arrow and choose Case Insensitive String from the list. 9.
Appendix B: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
Appendix B: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1. Right-click Active Directory® Schema in the left pane of the window and select Reload the Schema. 2. Minimize the Active Directory Schema MMC (Microsoft® Management Console) console.
Appendix B: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
Appendix B: Updating the LDAP Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
Appendix B: Updating the LDAP Schema 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the KX II-101-V2) in the Edit Attribute field. Click OK.
Appendix C Rack Mount The KX II-101-V2 device can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brackets and screws included with the KX II-101-V2 kit. In This Chapter Attach the L Bracket to the KX II-101-V2 for a Horizontal Mount ..........201 Attach the L Bracket to the KX II-101-V2 for a Horizontal Mount 1. Attach the L bracket to the KX II-101-V2 using the included screws. Adjust bracket placement before tightening screws. 2.
Appendix C: Rack Mount Diagram key Screws 202
Appendix D Informational Notes In This Chapter Java Runtime Environment (JRE) .........................................................203 IPv6 Support Notes ...............................................................................204 Keyboard, Video and Mouse Notes .......................................................204 CC-SG ...................................................................................................
Appendix D: Informational Notes IPv6 Support Notes Operating System IPv6 Support Notes Java Java™ 1.6 supports IPv6 for the following: Solaris™ 10 (and later) Linux® kernel 2.1.2 (and later)/RedHat 6.1 (and later) The following IPv6 configurations are not supported by Java: J2SE does not support IPv6 on Microsoft® Windows®. Linux It is recommended that Linux kernel 2.4.0 or higher is used when using IPv6.
Appendix D: Informational Notes Sun Blade Video, Keyboard, and Mouse Support Limitation Video If you are accessing a Sun™ Blade 100 with the KX II-101-V2, video on the local port or a remote connection may not function properly when the Sun Blade is booting up. To avoid this issue, be sure you are using Sun Open Boot firmware 4.17.1 or later.
Appendix D: Informational Notes HP UX RX 1600 Keyboard and Mouse Configuration If you are using an HP® UX RX 1600 running UNIX®, do the following to connect the device to the target: Verify you are using KX II-101-V2 firmware 2.0.20.5.6964 or higher. Use the USB cable that is supplied with the KX II-101-V2 . Set the Host Interface field on the Keyboard/Mouse Setup page to USB. See Keyboard/Mouse Setup (on page 115).
Appendix E FAQs In This Chapter General FAQs ........................................................................................207 IPv6 Networking ....................................................................................
Appendix E: FAQs Question Answer What new features are With Release 3.
Appendix E: FAQs Question Answer What if I have an external The KX II-101-V2 can access external servers via their IPv6 addresses, server with an IPv6 address for example, an SNMP manager, syslog server or LDAP server. that I want to use with my KX II-101-V2? Using the KX II-101-V2’s dual-stack architecture, these external servers can be accessed via: (1) an IPv4 address, (2) IPv6 address or (3) hostname. So, the KX II-101-V2 supports the mixed IPv4/IPv6 environment many customers will have.
Index Target Server • 23 Backup and Restore • 158 BIOS Access Limitation from a Local Keyboard • 205 Blocking and Unblocking Users • 92 Building a Keyboard Macro • 52 CLI Commands • 172, 176 CLI Prompts • 174 CLI Syntax -Tips and Shortcuts • 175 Client Launch Settings • 67 Command Line Interface (CLI) • 116, 172 Common Commands for All Command Line Interface Levels • 175 Compaq Alpha and IBM P Server Mouse Mode Limitation • 206 Completion of Commands • 175 Conditions when Read/Write is Not Available • 78,
Index Disconnecting Users from Ports • 90, 91 Disconnecting Virtual Media • 79, 82 Discovering Raritan Devices on the KX II-101V2 Subnet • 42 Discovering Raritan Devices on the Local Subnet • 41 E E Local User Port • 27 Editing rciusergroup Attributes for User Members • 197 Enable Direct Port Access • 35 Enabling Direct Port Access via URL • 112 Enabling FIPS 140-2 • 146, 148 Enabling SSH • 111 Enabling Telnet • 111 Encryption & Share • 145 Entering the Discovery Port • 112 Event Management • 118 F Facto
Index Modifying an Existing User • 92 Modifying an Existing User Group • 88 Modifying and Removing Keyboard Macros • 54 Mounting • 7 Mounting CD-ROM/DVD-ROM/ISO Images • 81 Mouse Options • 60 Mouse Pointer Synchronization • 61 Mouse Settings • 13 Multi-Platform Client (MPC) • 43 N Name Command • 176, 179 Naming the Power Strip (Port Page for Power Strips) • 128, 130 Naming the Target Server • 30 Navigation of the CLI • 174 Network • 176, 178 Network Basic Settings • 106, 107 Network Configuration • 5 Netw
Index Sun Blade Video, Keyboard, and Mouse Support Limitation • 205 Sun Solaris Settings • 19 Sun Video Resolution • 11 Supported Browsers • 186 Supported Keyboard Languages • 188 Supported Operating Systems (Clients) • 185 Supported Protocols • 31 Supported Video Resolutions • 187 SysLog Configuration • 124 System Management Features • 6 T TCP and UDP Ports Used • 189 Terminology • 7 Tool Options • 64, 69 Toolbar Buttons and Status Bar Icons • 44 Trace Route to Host Page • 168 U Updating the LDAP Schema
U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Europe Europe Monday - Friday 8:30 a.m. - 5 p.m. GMT+1 CET Phone: +31-10-2844040 Email: tech.europe@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m.