User Manual IPR-TR361 IPR-TR362 IPR-TR364 IPR-M1 IPR-M2
This page intentionally left blank.
User Manual IPR-TR361 IPR-TR362 IPR-TR364 C UL US IPR-M1 IPR-M2 1F61 I.T.E. LISTED Copyright ©2003 Raritan Computer, Inc. IPR-0H-E May 2003 255-80-3100 Raritan Computer Inc. Raritan Computer Europe, B.V. Raritan Computer Japan, Inc. Raritan Computer Taiwan, Inc 400 Cottontail Lane P.O. Box 566 Kuga Building 7F 5F, 121, Lane 235, Somerset, NJ 08873 USA 2900 AN Capelle aan den IJssel 11-6, Kuramae 4-chome Pao-Chiao Rd., Hsin Tien Tel.
This page intentionally left blank.
FCC Information This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial installation. This equipment generates, uses, and can radiate radio frequency energy and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
This page intentionally left blank.
TABLE OF CONTENTS i Table of Contents CHAPTER 1: INTRODUCTION.......................................................................................... 1 IP-Reach Overview .................................................................................................................................1 Access via Internet, LAN/WAN, or dial-up modem ......................................................................................... 1 Product Photos.....................................................
ii TABLE OF CONTENTS Navigator Options ......................................................................................................................................... 24 Creating New Profiles.................................................................................................................................... 24 Establishing a New Connection ....................................................................................................................
TABLE OF CONTENTS iii KVM Switch Specifications ...................................................................................................................62 Output Specifications ...........................................................................................................................62 APPENDIX B: RADIUS SERVER SETTINGS ................................................................... 63 RADIUS Authentication Priority and Flowchart..............................................
Important Information Login • • • • The default IP-Reach login user name is , with the password . This user has administrative privileges. Passwords are case sensitive and must be entered in the exact case combination in which they were created. The default password must be entered entirely in lowercase letters. To ensure security, change the default password as soon as possible. Default IP Address • IP-Reach ships with the default IP address of 192.168.0.192.
This page intentionally left blank.
CHAPTER 1: INTRODUCTION 1 Chapter 1: Introduction IP-Reach Overview Congratulations on your purchase of IP-Reach, the industry-leading solution for multi-platform, highperformance, network-based, remote KVM console access. IP-Reach enables highly-secure, multi-user, bandwidth-efficient, and software-independent access to your servers’ KVM consoles via a web browser. IP-Reach connects to the keyboard, video, and mouse ports of up to four servers or KVM switches.
2 IP-REACH USER MANUAL Product Photos IP-Reach M Series IP-Reach TR Series
CHAPTER 1: INTRODUCTION 3 Product Features Access • Remote KVM access via the Internet, LAN/WAN, or dial-up modem • Up to four simultaneous user throughput to switch(es) or server(s) • Up to 16 simultaneous users (using PC-share mode) • Web browser accessible • Remote access to serial devices (VT100) connected to IP-Reach serial port Performance • Superior compression algorithm for exceptional performance • No impact on target server performance • Automatic sensing of video resolution for optimum display
4 IP-REACH USER MANUAL Terminology This manual makes use of the following terms to indicate components of a typical IP-Reach configuration. While reading the manual, please refer to the diagram below for clarification when necessary. LAN/WAN Target Server(s) Remote PC Local Access Console Local Admin Console Servers to be accessed remotely via IP-Reach and its connected KVM configuration. A Windows-based computer used to access and control target servers connected to IP-Reach.
CHAPTER 1: INTRODUCTION 5 Package Contents IP-Reach ships as a fully configured stand-alone product in a standard 2U 19” rackmount chassis, along with the following contents: TR Series (1) IP-Reach unit (1) IP-Reach TR Series Quick Installation and Setup Guide (1) IP-Reach User Manual (1) Raritan Remote Client software CD-ROM (1) Raritan Remote Client software license certificate for five named users (10 named users for Model IPR-TR364) (1) Rackmount Kit (1) Power Cord (1) RJ11 telephone cord (N) CCP20 co
6 IP-REACH USER MANUAL
CHAPTER 2: INSTALLATION 7 Chapter 2: Installation Configuring Target Servers Before installing IP-Reach, you must first configure any target servers that you wish to access via IPReach, in order to ensure optimum performance, as outlined below. Note that the following configuration requirements apply only to target servers, not to the computers that you will be using to access IP-Reach remotely (see Chapter 1: Introduction, Terminology).
8 IP-REACH USER MANUAL Windows 95 / 98 / NT Settings On target servers running Microsoft Windows 95 / 98 / NT, set the mouse motion speed to the slowest setting in Control Panel → Mouse → Motion. Linux Settings On target servers running Linux graphical interfaces, set the mouse acceleration to exactly 1 and set threshold to exactly 1. As mentioned above, please ensure that each target server running Linux is using a resolution supported by IP-Reach at a standard VESA resolution and refresh rate.
CHAPTER 2: INSTALLATION 9 This can be performed from the graphical user interface (as shown below), or with the command line “xset mouse a t” where “a” is the acceleration and “t” is the threshold. Apple Macintosh Settings For target servers running an Apple Macintosh operating system, while no specific mouse setting is required, please be aware that while using IP-Reach to access and control your target server, you must set the IP-Reach client (Raritan Remote Client) to “single cursor” mode.
10 IP-REACH USER MANUAL TR Series Physical Connections Back Panel of IP-Reach TR Series AC Power Line Attach the included AC power cord to IP-Reach and into an AC Power Outlet. Local Admin Console Attach a PS/2 keyboard and multisync monitor to the indicated ports (see diagram above) in the back of IP-Reach. Primary Network Port Connect a standard Ethernet cable from the network port to an Ethernet switch, hub, or router.
CHAPTER 2: INSTALLATION 11 Telephone Line Port (optional) IP-Reach TR Series models feature an integrated modem for remote access when the LAN/WAN is unavailable. Use the included telephone cable to connect the port labeled “Tel Line” to an analog telephone jack. Serial Input Port (optional) Serially-controlled devices (VT100 terminal emulation) may be accessed remotely via IP-Reach by attaching them to the Serial IN port found on the back of IP-Reach.
12 IP-REACH USER MANUAL KVM Input Ports Connect the DB25 end of an included CCP20 cable(s) to the “KVM” ports and connect the other end of the CCP cable to corresponding PS/2 keyboard, mouse, and VGA video ports of the KVM switches or servers to which you wish to provide remote network access.
CHAPTER 2: INSTALLATION 13 Initial Configuration The steps below allow you to quickly set up IP-Reach for the first time using the IP-Reach Setup Wizard. The IP-Reach Setup Wizard appears only when accessing the Administrative Menus on an unconfigured IP-Reach, and guides you through initial configuration parameters. The easiest way to perform this initial configuration is by using the Local Admin Console (see ‘Physical Connection’ instructions in the previous sections). 1.
14 IP-REACH USER MANUAL 5. All entered key codes will be saved and the Network Configuration Screen will appear. 6. Use the , <↑> or <↓> keys to select each line on the Network Configuration screen and the , or the <←> or <→> keys to toggle between available entries. Press the , or <↓> keys when your entry on each line is complete. Below are descriptions of each field, and the appropriate values to assign.
CHAPTER 2: INSTALLATION 15 Note: In order to access IP-Reach from beyond a firewall, your firewall settings must enable two-way communication through the default port 5000 or the non-default port configured above. • Enable IP Failover (TR Series only): This setting, which appears only for TR Series models, enables the secondary Ethernet port to be active for failover utilization.
16 IP-REACH USER MANUAL Connect to IP-Reach Remotely Having completed the physical installation of IP-Reach, you are now ready to establish an initial network connection. Below are basic instructions for doing so. Please see Chapter 3: Raritan Remote Client for detailed instructions, being sure to review the “KVM Session Properties” and “Color Calibration” sections to optimize your IP-Reach performance. Launch Raritan Remote Client (RRC) 1.
CHAPTER 2: INSTALLATION 17 Establish a Connection Immediately upon launching the Raritan Remote Client (RRC), IP-Reach will request your user credentials. (See your IP-Reach User Manual for user account administration). Login with the default username and password (“admin”/“raritan”). You will immediately be connected to your IP-Reach unit. Use the RRC Navigator, found on the left-hand side of the RRC window, to select and connect to a port.
18 IP-REACH USER MANUAL
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 19 Chapter 3: Raritan Remote Client Invoking Raritan Remote Client (RRC) via Web Browser IP-Reach features Web Browser access, providing a connection from any Windows-based Remote PC running Microsoft Internet Explorer 4.0+, Mozilla 1.1+, and Netscape 7+. Security Settings Accessing IP-Reach via web browser requires your web browser to be configured to appropriate settings.
20 IP-REACH USER MANUAL 3. Depending on your browser security configuration, you may see any or all of the following dialog boxes, confirming your intentions to access and launch an externally-provided program. Click on the [Yes] button to advance through any of these prompts.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 21 Optional: Installing Raritan Remote Client Software Note: This step is optional. IP-Reach can be accessed from a Remote PC either by installing Raritan Remote Client software, or by launching Raritan Remote Client via web browser (see previous section). Accessing IP-Reach via web browser does not require any software installation on the Remote PC. 1. Insert the provided Raritan Remote Client (RRC) CD-ROM into the CD-ROM drive of your PC. 2.
22 IP-REACH USER MANUAL RRC Window Layout Raritan Remote Client functions are grouped into five general sections on the screen. Each section will be discussed in detail further in this chapter.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 23 RRC Navigator The RRC Navigator provides a single view to every known Raritan device, allowing convenient access to multiple Raritan networked appliances. The RRC Navigator displays: (a) All Raritan devices for which a connection profile exists, and (b) All Raritan devices that are automatically identified on the network Note: Automatic Raritan device identification utilizes the UDP protocol, and will typically identify all Raritan devices on your subnet.
24 IP-REACH USER MANUAL Navigator Options Certain RRC Navigator attributes may be customized to your preferences. Display / Hide Navigator – Toggle whether the RRC Navigator is shown. This option can also be toggled by choosing View → Navigator from the Menu Bar. Refresh Navigator – Update the device status information shown in the RRC Navigator.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 25 3. The Add Connection dialog appears, whose options are grouped into three tabs: Connect, Compression, and Security. Connect Tab • • Description: Enter a text name to easily identify the Raritan device that you are configuring, such as "Atlanta_Datacenter." Connection Type: Select TCP/IP Connection for a LAN/WAN connection; select Dial-Up Connection for a direct analog modem connection to the Raritan device.
26 IP-REACH USER MANUAL Compression Tab Settings in the Compression Tab are adjustable via the RRC client, and therefore are not necessary for pre-configuration in the Connection Profile. Should you wish to pre-configure these settings, however, refer to the section in this chapter labeled, Connection and Video Properties. Security Tab If you have configured your IP-Reach unit to use a private group key, you must enter it here in order to be authorized to initiate a connection with that IP-Reach unit.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 27 RRC Toolbar and Shortcuts Raritan Remote Client Toolbar The RRC Toolbar provides convenient, one-click access to the most commonly used features and parameters of Raritan Remote Client: BUTTON BUTTON NAME HOTKEY FUNCTION New Profile Disconnects the Remote PC from IP-Reach, ending a remote communication session.
28 IP-REACH USER MANUAL RRC Status Bar The Status Bar at the bottom of the Raritan Remote Client window conveys information about the status of your remote connection session to IP-Reach. Video Sensing Status / Path Indicator Indicates the occurrence of video sensing. Bandwidth Usage Indicator Indicates how much of your total available bandwidth is currently being used. The Connection Speed setting, found under the Compression tab of the Connection Properties screen, determines total available bandwidth.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 29 Remote KVM Console Control After using the RRC Navigator to establish a connection with an IP-Reach unit (see the previous section: Establishing a Connection), the Navigator entry corresponding to the IP-Reach unit will expand to show all ports on the IP-Reach enabled for remote access. To establish a remote KVM console connection, simply double-click on the KVM path that you would like to control.
30 IP-REACH USER MANUAL Single Mouse Mode / Dual Mouse Mode When remotely viewing a Target Server that uses a pointing device, by default you will see two mouse pointers within the Remote Desktop area of the Raritan Remote Client window. The Raritan Remote Client mouse pointer, generated by the operating system on which RRC is running, slightly leads the Target Server's mouse pointer during movement, a necessary result of digital delay.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 31 Selecting Servers with a KVM Switch Two buttons allow users single-click access to the On Screen User Interface (OSUI) provided by your KVM Switch. The [Enter OSUI] and [Exit OSUI] buttons on the RRC toolbar have been provided to simplify the use of IP-Reach in conjunction with KVM Switches. Enter OSUI Exit OSUI The steps below configure RRC to properly interoperate with your KVM switches to enter and exit their user interfaces.
32 IP-REACH USER MANUAL Keyboard Macros RRC allows users to create custom keyboard macros in order to send given key sequences to the remote server or KVM switch connected to IP-Reach. This feature allows customers to send keystrokes to remote servers that may be otherwise unintentionally interpreted by the computer on which RRC is running.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 3. 33 The Add Keyboard Macro dialog box opens. 4. Build the Keyboard Macro by editing all the fields in the Add Keyboard Macro window, in the order described below. Click on the [OK] button when finished. a. Enter a name into the Keyboard Macro Name field, which will appear on the RRC Menu Bar, after successful creation of the keyboard macro. For our example, "Minimize All Windows". b.
34 IP-REACH USER MANUAL 5. After clicking the [OK] button, the Keyboard Macros dialog box will appear, listing your new keyboard macro. 6. Click on the [Close] button to complete the keyboard macro editing procedure. Running a Keyboard Macro Once a macro is created, it can be run via the RRC Menu Bar or with the hotkey combination if one had been designated during the macro creation. Menu Bar Activation After a macro has been created, it appears in the Keyboard menu on the RRC Menu Bar.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 35 Connection and Video Properties IP-Reach's dynamic video compression algorithms maintain KVM console usability under varying bandwidth constraints. Unlike competitive solutions, IP-Reach optimizes its KVM output for not only LAN utilization, but also via the WAN and dial-up. By dynamically adjusting color depth and limiting video output, IP-Reach offers the optimal balance between video quality and system responsiveness in any bandwidth constraint.
36 IP-REACH USER MANUAL This option is very similar in philosophy as the common World Wide Web notion of "interlaced GIF" files. Note: When Color Depth is set to Auto Select Color (default), Progressive Update is automated. IP-Reach will enable/disable Progressive Update as needed, disabling it for fast connections and enabling it for slow connections. Internet Flow Control Many public WAN links are by their very nature unpredictable.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 37 Noise Filter The video output of graphics cards are transmitted in analog form, and are susceptible to electrical and interference noise. IP-Reach's advanced circuitry can filter out these small, false, and unintended signal variations, thereby optimizing picture quality and bandwidth consumed. Higher: Noise Filter settings instruct IP-Reach to transmit a variant pixel of video only if a large color variation exists in comparison to its neighbors.
38 IP-REACH USER MANUAL Color Calibration Automatic Color Calibration adjusts the color settings on IP-Reach to reduce excess color noise and data during digitization of video images. This data streamlining will increase the operational performance of IP-Reach, particular color accuracy. A very simple procedure to execute, Color Calibration should be performed if the color levels (hue, brightness, saturation) of transmitted video images do not seem accurate.
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 39 Remote Serial Control In addition to remote KVM console access, IP-Reach also offers users the convenience of accessing a serial console via web browser as well. Any serial console supporting VT100 emulation may be connected to the SERIAL IN port found on the back panel of IP-Reach, and accessed using the Raritan Remote Client. Physical Connection The SERIAL IN port found on the back panel of IP-Reach is a DB9 Male connector, with a standard RS232 DTE pin-out.
40 IP-REACH USER MANUAL Remote Connection To open a remote connection to the serial console connected to your IP-Reach SERIAL IN port, doubleclick on the serial path entry displayed on the RRC Navigator. Privileges to allow or disallow access to the serial port can be set in the Administrative Menus (see Chapter 4).
CHAPTER 3: RARITAN REMOTE CLIENT (RRC) 41 Remote Device Administration When logged into an IP-Reach unit as a user with administrative privileges, IP-Reach allows you to perform many powerful device administration tasks remotely. Configuration Menus An Administrative user can access IP-Reach's lowest level configuration menus (explained in detail in Chapter 4), but double-clicking the "Admin" port entry of an IP-Reach device shown in the RRC Navigator.
42 IP-REACH USER MANUAL
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 43 Chapter 4: Administrative Functions Accessing the Administrative Functions Access and execute Administrative functions via local admin console, or via remote administration. Only administrators (users with administrative privileges) can access the IP-Reach Administrative Menus. Local Admin Console Power ON the IP-Reach unit via the power switch on the back of the unit. Note: The default IP-Reach login user name is , with the password .
44 IP-REACH USER MANUAL Remote Admin Console An alternative way to access IP-Reach’s administrative functions is to do so remotely, using the Raritan Remote Client. Any administrative user logged on to IP-Reach at a Remote PC can perform administrative functions remotely to make changes to the system, as long as IP-Reach is set to allow remote administration privileges – see Allow Remote Administration on the Security Configuration screen.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 45 Network Configuration After making changes to the Network Configuration, press to save. You must reboot when all changes are complete in order to apply them. • • Name: Designate a unique name for this IP-Reach unit, for example, “Miami Data Center.” The default name is IP-Reach. Enable Ethernet Interface: Designates whether IP-Reach should enable its Ethernet adapter as active (default: YES).
46 IP-REACH USER MANUAL Note: In order to access IP-Reach from beyond a firewall, your firewall settings must enable two-way communication through the default port 5000, or the non-default port configured above. • Enable IP Failover (TR Series only): This setting, which appears only for TR Series models, enables the secondary Ethernet port to be active for failover utilization.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 47 Two Paths – Two Ports Each: Used when IP-Reach is connected to two KVM switch configurations. There are two main paths, one to each KVM configuration. Users must select the Path (or KVM configuration) they wish to access upon IP-Reach login. Up to two users can connected to each KVM configuration. IP-Reach will automatically assign the next open channel on the selected path to each user.
48 IP-REACH USER MANUAL Three Paths – Two Ports, One Port, One Port (2, 1, 1) : Used when IP-Reach is connected to three KVM switch configurations. There are three main paths, one to each KVM configuration. Users must select the Path (or KVM configuration) they wish to access upon IP-Reach login. Up to two users can connect to the first Path (KVM configuration) and IP-Reach will automatically assign the next open channel on the selected path to each user.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 49 Security Configuration • Encryption mode: Toggle through the choices and select the desired level of encryption for initial connection authentication and remote session video data transfer. - No encryption: No encryption or security. Neither the initial connection authentication nor remote video data transfer is encrypted. - SSL authentication, NO data encryption: This mode secures user names and passwords, but not KVM data.
50 IP-REACH USER MANUAL - • NO: To keep access to all Administrative Functions available only from the IP-Reach Admin Console, and not from a Remote PC. - YES (default): Allows remote access to all Administrative IP-Reach Functions by administrators logged on at a Remote PC. See 9. Remote Administration. PC Share Mode: Determines global concurrent remote access.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS - 51 YES: IP-Reach will grant remote access to up to four designated IP addresses or address levels. Administrators can set IP-Reach to accept requests only from the company’s intranet and/or from just a few outside IP addresses. The IP Mask fields determine what remote IP addresses IP-Reach will grant remote access to. ♦ A specific IP Mask instructs IP-Reach to grant remote access only to this specific remote IP address. For example, a mask of 10.0.0.
52 IP-REACH USER MANUAL - • No Limit (default): IP-Reach can consume as much bandwidth as needed. 10, 5, 2, or 1 megabit or 512, 256, 128 kilobit: Total bandwidth available to be consumed by this IP-Reach unit is limited to the selected quantity. The lower the bandwidth allowed, the slower the performance that may result. Maximum Bandwidth per user: Sets an upper limit to the amount of bandwidth that can be consumed by each user logged onto this one IP-Reach unit.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 53 - • YES: RADIUS authentication is operational. At a user login attempt, IP-Reach will refer to the RADIUS server’s user name and password database, provided there is not an exact matching user name and password in the IP-Reach database of profiles. Default RADIUS Permissions: With RADIUS Authentication operational, “Default RADIUS Permissions” defines the basic initial permissions or privileges for all RADIUS user name and password profiles.
54 • • • • IP-REACH USER MANUAL Secondary Server IP: Optional. Enter the IP address of a secondary RADIUS server. If the primary server becomes unavailable, IP-Reach will redirect its RADIUS requests to this secondary or backup server. Server UDP Port: Sets the ports used by the RADIUS server. - Standard 1812 & 1813 (default): Uses port 1812 for Authentication and port 1813 for Accounting. These are the ports most often used by modern RADIUS systems.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 55 Time and Date Current Date and Time on the IP-Reach unit are listed on this screen. Once saved, Time and Date changes will not take effect until IP-Reach is restarted. • • New Date / New Time: To manually input changes to current date and time values. Adjust for daylight savings time: Toggle between YES and NO to reflect whether your country or state follows the daylight savings time procedure.
56 IP-REACH USER MANUAL Administer User Accounts The Add, Change, or Delete User Accounts screen lists all existing user accounts for IP-Reach and shows if each user is currently logged in to IP-Reach from a Remote PC. Administrators who log on to the IPReach Admin Console can use this screen to administer IP-Reach user accounts. Add New Users Press the letter (‘Add a new user’) to access the User Account Settings screen and add a new user profile.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 57 Note: Passwords are case sensitive. For user login, passwords must be entered by the user in the exact case combination in which they were created here. User names and passwords entered in this IP-Reach user profile database each have a 24-character limit. RADIUS user names and passwords can each be up to 128 characters. • Account Enabled: - YES (default): Permits this user name and profile to be actively used to gain access to IPReach.
58 IP-REACH USER MANUAL Note: Once Restrict user’s IP address has been enabled, an entry must be made in at least one of the IP Mask fields, since 0.0.0.0 is an impossible IP address. - • IP Mask: Enter remote IP address location from which this user will be granted remote network access. A specific IP Mask instructs IP-Reach to grant remote access to only this specific remote IP address. For example, a mask of 10.0.0.1 instructs IP-Reach to grant remote access from the remote IP address location 10.0.
CHAPTER 4: ADMINISTRATIVE FUNCTIONS 59 View IP-Reach Status The IP-Reach Event Log screen shows a log file containing information about IP-Reach log in and connection activities.
60 IP-REACH USER MANUAL Diagnostics While navigating the Main Menu of the Administrative Console, pressing and will invoke the IP-Reach Diagnostic functions. These functions are meant to enable Raritan Technical Support to assist you in the case of a problem with your IP-Reach unit. Do not invoke these functions unless you are fully aware of their meanings and intended use. Please contact Raritan Technical Support should you require more information.
APPENDIX A: SPECIFICATIONS 61 Appendix A: Specifications ITEM DIMENSIONS (WXDXH) WEIGHT POWER IPR-TR361 2U 19” Rackmount Case: 19” (W) x 21.25” (D) x 3.5” (H) 482 mm (W) x 540 mm (D) x 89 mm (H) 28.2lbs. (12.79kg.) 110/220V auto-switching (50/60 Hz European) IPR-TR362 2U 19” Rackmount Case: 19” (W) x 21.25” (D) x 3.5” (H) 482 mm (W) x 540 mm (D) x 89 mm (H) 28.6lbs. (12.97kg.) 110/220V auto-switching (50/60 Hz European) IPR-TR364 2U 19” Rackmount Case: 19” (W) x 21.25” (D) x 3.
62 IP-REACH USER MANUAL Cable Specifications Standard RJ11 based phone cord to connect modem to a phone line (provided)** Category 5e UTP cable to connect to network **TR Series only KVM Switch Specifications Supports KVM switches utilizing an On-Screen User Interface, including Raritan’s Paragon, Z-Series, MasterConsole MX4, and MasterConsole II product lines.
APPENDIX B: RADIUS SERVER SETTINGS 63 Appendix B: RADIUS Server Settings This appendix discusses the RADIUS server and how it interacts with IP-Reach to accommodate IPReach as a RADIUS client. For information on designating the IP-Reach unit itself as a RADIUS client, see the Radius Configuration section in Chapter 4: Administrative Menus.
64 IP-REACH USER MANUAL Controlling IP-Reach User Permissions via RADIUS FILTER-ID IP-Reach recognizes, and in some cases requires, optional “FILTER-ID” RADIUS attributes that are returned by the RADIUS server. These returned attributes communicate permissions for each user, which override default permissions set for all RADIUS users under the “Default RADIUS Permissions” settings parameter – (see Chapter 4: Administrative Functions, RADIUS Configuration).
APPENDIX B: RADIUS SERVER SETTINGS 65 RADIUS Attributes Generated by IP-Reach IP-Reach sends the following RADIUS attributes to the RADIUS server with each access request: ATTRIBUTE DATA USER-NAME The user name entered at the login screen. USER-PASSWORD In PAP mode, the encrypted password entered at the login screen. CHAP-PASSWORD In CHAP mode, the CHAP protocol response computed from the password and the CHAP challenge data.
66 IP-REACH USER MANUAL RADIUS Access Challenge A RADIUS server can require additional information from the user in addition to user name and password. The type of information will depend on the authentication method used by the RADIUS server. After IPReach sends the initial ACCESS-REQUEST packet, the RADIUS server can return an ACCESSCHALLENGE packet. The ACCESS-CHALLENGE packet will contain one or more reply messages for the user.
APPENDIX C: SNMP FEATURES 67 Appendix C: SNMP Features For convenient monitoring with standard network management systems such as HP OpenView or IBM Tivoli software solutions, IP-Reach features an SNMP agent with standard MIB2 support. IP-Reach responds to SNMP GET requests with standard MIB2 variables, although for security reasons only a subset of the variables are provided.
68 IP-REACH USER MANUAL
APPENDIX D: FREQUENTLY ASKED QUESTIONS 69 Appendix D: Frequently Asked Questions QUESTION: ANSWER: What is IP-Reach? IP-Reach is the easiest, fastest, most reliable way to remotely access and manage multiple servers connected to a Raritan KVM Switch - no matter where you are or where your servers are located. How does IP-Reach work? IP-Reach connects to the keyboard, video, and mouse ports of a server or KVM switch.
70 IP-REACH USER MANUAL QUESTION: ANSWER: How Is IP-Reach administration carried out? Administrators access IP-Reach through a connected IP-Reach Admin Console. A simple keyboard driven interface of menus offers straightforward access to IP-Reach setup and control. User profiles, security settings, configuration and diagnostics are just a few of the options available.
APPENDIX E: TROUBLESHOOTING 71 Appendix E: Troubleshooting Problems and Suggested Solutions REMOTE CONNECTION PROBLEMS SOLUTION I cannot connect to IP-Reach via dial up modem. Ensure that you have specified the modem device for your Remote PC in the Add Connection Window (Dial-up type connection) modem field.
72 IP-REACH USER MANUAL DIRECT ANALOG USER CONSOLE PROBLEMS SOLUTION I cannot view the Target Server that I am looking for from a Direct Analog User Console. Ensure that you are looking at the Direct Analog User Console connected to the correct User Port. Remember, Direct Analog User Consoles can be attached to User Ports 1 through 4. Each User Console will view the path of the matching KVM Port. For example, the User Console attached to User Port 1 will view the KVM path attached to KVM Port 1.
APPENDIX E: TROUBLESHOOTING 73 KVM ON-SCREEN USER INTERFACE (OSUI) PROBLEMS SOLUTION Clicking on the Enter On-Screen Menu button does not bring up the connected KVM switch’s On-Screen User Interface (OSUI). Nothing happens. IP-Reach may not be set to the correct KVM switch Hotkey activator. The default Hotkey setting is or Scroll Lock+Scroll Lock in the IP-Reach Options window.
74 IP-REACH USER MANUAL MOUSE PROBLEMS SOLUTIONS The larger IP-Reach Mouse Pointer does not track or is not in sync (not aligned) with the smaller Target Server Mouse Pointer. Click Synchronize Mouse button, or press . Ensure each Target Server uses a standard Windows mouse driver. For Windows 2000 based Target Servers, set the mouse motion speed on each Target Server to the middle speed setting between Slow and Fast and the mouse motion acceleration speed on each Target Server to .
APPENDIX E: TROUBLESHOOTING 75 IP-REACH PROBLEMS SOLUTION There is no control and no frame grabbing activity occurring. IP-Reach seems to have locked-up. An internal serial data cable, which connects the frame grabber card to the motherboard of IP-Reach, may have become disconnected. Contact Raritan Technical Support for assistance. I cannot power down IP-Reach. The main power switch for IP-Reach is on the back of the unit. To turn off IP-Reach hold the power key down for a few seconds.
76 IP-REACH USER MANUAL Event Log File and On-Screen Error Codes IP-Reach will display or log an error code in the IP-Reach Event Log Screen in the event of a problem occurring. Error codes are eight-digit hexadecimal numbers, containing two parts: the first four denote error type; and the second four digits denote a location code. These last four digits of the IP-Reach error code are the most useful in determining what has caused a system failure.
APPENDIX E: TROUBLESHOOTING ERROR CODE (LAST 4 DIGITS) 77 MEANING RECOMMENDATION found. inserted firmly. If the problem persists, there may be a problem with your IP-Reach hardware. 0013 Memory allocation error. Reboot IP-Reach. Make sure the BIOS memory test recognizes at least 64MB of RAM. If the problem persists, restore the software and file system from the Recovery CD-ROM. 0014 There is a problem with the IP address. Check the IP address configuration and reboot.
78 ERROR CODE (LAST 4 DIGITS) IP-REACH USER MANUAL MEANING RECOMMENDATION 002A – 002F Resource allocation error. Reboot IP-Reach. Make sure the BIOS memory test recognizes at least 64MB of RAM. If the problem persists, restore the software and file system from the Recovery CD-ROM. 0030-0039 Resource allocation error. Reboot IP-Reach. Make sure the BIOS memory test recognizes at least 64MB of RAM. If the problem persists, restore the software and file system from the Recovery CD-ROM.
255-80-3100
255-80-3100