KX II-101 User Guide 2.0.20 Copyright © 2008 Raritan, Inc. KX2101-v2.
This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, reproduced, or translated into another language without express prior written consent of Raritan, Inc. © Copyright 2008 Raritan, Inc., CommandCenter®, Dominion®, Paragon® and the Raritan company logo are trademarks or registered trademarks of Raritan, Inc. All rights reserved. Java® is a registered trademark of Sun Microsystems, Inc.
Contents Chapter 1 Introduction 1 What's New in the User Guide....................................................................................................... 1 KX II-101 Overview ........................................................................................................................ 2 Product Photos .............................................................................................................................. 4 Product Features .......................................
Contents Keyboard Options..............................................................................................................46 Video Properties ................................................................................................................ 49 Mouse Options................................................................................................................... 52 VKC Virtual Media ..........................................................................................
Contents Device Services .........................................................................................................................141 Keyboard/Mouse Setup .............................................................................................................143 Serial Port Settings ....................................................................................................................144 Admin Port ...........................................................................
Contents Analog KVM Switch ...................................................................................................................162 Resetting the KX II-101 Using the Reset Button .......................................................................163 Chapter 7 Managing USB Connections 165 Overview ....................................................................................................................................166 Basic USB Connection Settings ..........................
Contents CLI Syntax -Tips and Shortcuts.......................................................................................214 Common Commands for All Command Line Interface Levels ........................................214 CLI Commands ..........................................................................................................................214 Diagnostics ......................................................................................................................
Contents Attach the Brackets to KX II-101 for Vertical Mount ........................................................244 Appendix D Informational Notes 246 Java Runtime Environment (JRE) .............................................................................................246 Keyboard, Video and Mouse Notes ...........................................................................................246 Sun Blade™ Video, Keyboard, and Mouse Support Limitation.......................................
Chapter 1 Introduction In This Chapter What's New in the User Guide ..................................................................1 KX II-101 Overview....................................................................................2 Product Photos ..........................................................................................4 Product Features .......................................................................................5 Terminology..............................................
Chapter 1: Introduction KX II-101 Overview Thank you for purchasing the Dominion the KX II-101. The KX II-101 provides a single keyboard, video, and mouse (KVM) port for connection to a target server and a single IP port for connection to an IP network. Within the KX II-101 device, KVM signals from your server are converted to IP format and compressed for transmission over an IP network.
Chapter 1: Introduction Diagram key KX II-101 LAN Windows, Linux, and Sun servers TCP/IP LAN Remote (network) access 3
Chapter 1: Introduction Product Photos Diagram key KX II-101 Mini-USB to USB cable Optional local port cable 4
Chapter 1: Introduction Product Features Interfaces • Integrated PS/2 KVM connection • USB connection for control and virtual media • Serial Admin port for initial device configuration and diagnostics, as well as use with an external modem access and Raritan power strip control • Ethernet LAN port supporting 10/100-base-T autosensing, full duplex • LED network activity indicator and status • Backlit LED power ON indicator Network Configuration • DHCP or static IP device address System Managem
Chapter 1: Introduction User Features • Web-based access through common browsers • Intuitive graphical user interface (GUI) • PC Share mode, which enables more than one remote user • TCP communication • English user interface • Virtual media access • Absolute Mouse Synchronization™ • Plug-and-play • 256-bit encryption of complete KVM signal, including video and virtual media Power • Powered via Class 2 Power over Ethernet (PoE) provision • Alternately powered by an external AC/DC power
Chapter 1: Introduction Term Description Local User port Enables a user in immediate proximity to the target server to use the native keyboard and mouse without unplugging the KX II-101. Virtual media Enables a KVM target server to remotely access media from client PC and network file servers.
Chapter 1: Introduction Related Documentation The KX II-101 User Guide is accompanied by a KX II-101 Quick Setup Guide, which can be found on the CD included with the device or on the Support page of Raritan's website (www.raritan.com). Installation requirements and instructions for client applications used with the KX II101 can be found in the KVM and Serial Client User Guide, also found on the Raritan website.
Chapter 2 Installation and Configuration In This Chapter Overview....................................................................................................9 Default Logon Information .........................................................................9 Getting Started ........................................................................................10 Overview This chapter describes how to install and configure the KX II-101.
Chapter 2: Installation and Configuration Getting Started KX II-101 users with Microsoft Internet Explorer version 6 or Windows 2000 must upgrade to Service Pack 4 (SP4) or higher. The KX II-101 ships with a static default IP address. On a network without a DHCP server, you must configure a new static IP address, net mask, and gateway address using either the KX II-101 serial admin console or the KX II-101 Remote Console.
Chapter 2: Installation and Configuration Resolutions 640x480 @66.6 Hz 800x600 @85 Hz 1152x870 @75.1 Hz 640x480 @72 Hz 800x600 @90 Hz 1152x900 @66 Hz 640x480 @75 Hz 800x600 @100 Hz 1152x900 @76 Hz 640x480 @85 Hz 832x624 @75.
Chapter 2: Installation and Configuration GUI Resolution/64 Bit To check the GUI resolution on 64 bit cards: 1. Run the following command: # /usr/sbin/m64config –prconf To change the resolution on 64 bit cards: 1. Run the following command: # /usr/sbin/m64config – res1024x768x75 where 1024x768x75 is any resolution that the KX II101 supports. 2. Restart the computer. GUI Resolution/Solaris 8 To check the resolution on Solaris 8 for 32 bit and 64 bit cards: 1.
Chapter 2: Installation and Configuration Windows XP®/Windows 2003® Settings To configure the mouse: 1. Select Start > Control Panel > Mouse. 2. On the Pointer Options tab in the Motion group, set the mouse motion speed setting to exactly the middle speed and deselect the Enhanced pointer precision checkbox. Click OK. To disable transition effects: 1. Select Start > Control Panel > Display. 2. On the Appearance tab, click the Effects button. 3.
Chapter 2: Installation and Configuration Animate controls and elements inside windows Animate windows when minimizing and maximizing Fade or slide menus into view Fade or slide ToolTips into view Fade out menu items after clicking 4. Click OK. Linux® Settings On a target server running Linux graphical interfaces, set the mouse acceleration to exactly 1 and set threshold to exactly 1. Enter the command xset mouse 1 1.
Chapter 2: Installation and Configuration Set the mouse acceleration value to exactly 1 and the threshold to exactly 1. A target server running the Solaris operating system must output VGA video (H-and-V sync, not composite sync). Set this at the graphical user interface or with the command line xset mouse a t where a is the acceleration and t is the threshold. To change your Sun video card output from composite sync to the non-default VGA output: 1. Issue the Stop+A command to drop to bootprom mode. 2.
Chapter 2: Installation and Configuration 2. Click on Mouse Settings and set the Mouse Acceleration to 1.0 and Threshold to 3.0. Step 2: Configure Network Firewall Settings To access the KX II-101 through a network firewall, your firewall must allow communication on TCP Port 5000. Alternatively, the KX II-101 can be configured to use a different TCP port of your own designation.
Chapter 2: Installation and Configuration Step 3: Connect the KX II-101 The KX II-101 has the physical connections described in the diagram.
Chapter 2: Installation and Configuration Diagram key Admin port Use to do one of the following: • Configure and manage the device with a terminal emulation program on your PC. • Configure and manage a power strip. • Connect an external modem to dial into the device. Monitor and PS/2 cable Attached Monitor and PS/2 cable (see E). Mini-USB port Use to connect the device to the target server with the included USB cable if not using the attached PS/2 cable.
Chapter 2: Installation and Configuration Target Server The KX II-101 can use either the included USB cable or integrated PS/2 cables to connect to the target server. Before connecting, configure your target server's video to a supported resolution. Note: For PS/2 configurations that require virtual media connectivity, the USB connector is also necessary. USB Configuration To configure the KX II-101 for use with a USB target server: 1.
Chapter 2: Installation and Configuration Use USB cables to connect the keyboard and mouse directly to the target server.
Chapter 2: Installation and Configuration Diagram key USB connection from the target server to keyboard Video connection to the local monitor (optional cable) PS/2 Configuration To configure the KX II-101 for use with a PS/2 target server: 1. Use the attached PS/2 keyboard, video, and mouse cabling to connect the KX II-101 to the target server. 2. Use the PS/2 cabling to attach the local keyboard, video, and mouse to the Local User port of the KX II-101.
Chapter 2: Installation and Configuration 3. If you require Virtual Media (VM) connectivity, connect the mini-USB connector to the KX II-101 and the USB connector to any USB port on the target server.
Chapter 2: Installation and Configuration Diagram key PS/2 connection from the KX II-101 to the mouse (optional cable) PS/2 connection from the KX II-101 to the keyboard (optional cable) Video connection to the local monitor (optional cable) Network Connect a standard Ethernet cable from the network port labeled LAN to an Ethernet switch, hub, or router. The LAN LEDs that appear above the Ethernet connection indicate Ethernet activity.
Chapter 2: Installation and Configuration Local User Port The KX II-101 is available with optional video and PS/2 cables (KX II101-LPKVMC) that enable you to attach a keyboard and mouse to the target server through the Local User port. The Local User port serves as a pass-through to the target server to which the KX II-101 is attached and has no other purpose. The KX II-101 must be powered on to use the Local User port.
Chapter 2: Installation and Configuration 2. Launch a supported web browser such as Internet Explorer (IE) or Firefox. 3. In the address field of the browser, enter the default IP address of the device: 192.168.0.192. 4. Press Enter. The login page opens. 5. Enter the user name admin and the password raritan. 6. Click Login. The Change Password page is displayed. 7. Type raritan in the Old Password field. 8. Type a new password in the New Password field and the Confirm New Password field.
Chapter 2: Installation and Configuration DHCP - With this option, network parameters are assigned by the DHCP server each time the KX II-101 is booted. Configuring Direct Port Access To configure direct port access: 1. Choose Device Settings > Device Services. The Device Services page opens. 2. Select the Enable Direct Port Access via URL checkbox. 3. Enable global TELNET or SSH access. 26 Select the Enable TELNET Access checkbox to enable TELNET access.
Chapter 2: Installation and Configuration 4. Specify a valid TCP port for the selected access type. For example, direct port access via Telnet TCP port can be configured as 7770. 5. Click OK. See Device Management (on page 138) for more information. Naming the Target Server 1. Attach the KX II-101 to the target server. 2. Choose Device Settings > Port Configuration. The Port Configuration page opens. 3. Click the Port Name for the target server. The Port page opens. 4.
Chapter 2: Installation and Configuration 5. Click OK. Remote Authentication Note to CC-SG Users When the KX II-101 is controlled by CommandCenter Secure Gateway, CC-SG authenticates users and groups. For additional information about CC-SG authentication, see the CommandCenter Secure Gateway User Guide, Administrator Guide, or Deployment Guide, which can be downloaded from the Support section of the Raritan website (www.raritan.com).
Chapter 2: Installation and Configuration Note on Microsoft Active Directory Microsoft Active Directory uses the LDAP/LDAPS protocol natively, and can function as an LDAP/LDAPS server and authentication source for the KX II-101. If it has the IAS (Internet Authorization Server) component, a Microsoft Active Directory server can also serve as a RADIUS authentication source.
Chapter 2: Installation and Configuration 3. Launch the terminal emulation program you want to use to configure the KX II-101. 4. Set the following port settings in the terminal emulation program: Bits per second - 115200 Data bits - 8 Parity - None Stop bits - 1 Flow control - None 5. Connect to the KX II-101. The login page opens. 6. Type the administrator user name and press Enter. You are prompted to enter your password. 7. Type your password and press Enter.
Chapter 2: Installation and Configuration 11. To configure new network settings, at the Network prompt, type interface followed by one of the following commands and its appropriate argument (option), then press Enter. Command Argument Options ipauto none|dhcp none - Enables you to manually specify an IP address for the device. You must follow this option with the ip command and the IP address, as shown in the following example: interface ipauto none ip 192.168.50.
Chapter 3 Working with Target Servers In This Chapter Interfaces .................................................................................................32 Virtual KVM Client ...................................................................................41 Multi-Platform Client (MPC).....................................................................
Chapter 3: Working with Target Servers 4. Click Save. To define a direct port access URL: • Define a URL with the IP address, user name, password, and if necessary, port number of the KX II-101. If you have only one KVM port, the port number is not needed. The format for a direct port access URL is: https://IP address/dpa.asp?username=username&password=password&port= port number Tip: Define a direct port access URL once, then save it in your web browser as a bookmark to make reusing it easier.
Chapter 3: Working with Target Servers Port Access Page After successfully logging in to the KX II-101 Remote Console, the Port Access page appears. This page lists the KX II-101 port, the connected KVM target server, and its status and availability. The Port Access page provides access to the KVM target server connected to the KX II-101. A KVM target server is a server that you want to control through the KX II101 device. They are connected to the KX II-101 ports at the back of the device.
Chapter 3: Working with Target Servers • Disconnect - Disconnects this port and closes the Virtual KVM Client page for this target server. This menu item is available only when the port status is up and connected, or up and busy. • Power On - Powers on the target server through the associated outlet. This option is visible only when there are one or more power associations to the target. • Power Off - Powers off the target server through the associated outlets.
Chapter 3: Working with Target Servers Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices you use frequently.
Chapter 3: Working with Target Servers Manage Favorites Page To open the Manage Favorites page: • Click the Manage button in the left panel. The Manage Favorites page appears and contains the following: Use: To: Favorites List Manage your list of favorite devices. Discover Devices - Local Subnet Discover Raritan devices on the client PC's local subnet. Discover Devices - KX II-101 Subnet Discover the Raritan devices on the KX II-101 device subnet.
Chapter 3: Working with Target Servers 3. Click Refresh. The list of devices on the local subnet is refreshed. To add devices to your Favorites List: 1. Select the checkbox next to the device name/IP address. 2. Click Add. Tip: Use the Select All and Deselect All buttons to quickly select all (or deselect all) devices in the remote console subnet. To access a discovered device: • 38 Click the device name or IP address for that device. A new browser opens to that device.
Chapter 3: Working with Target Servers Discovering Raritan Devices on the KX II-101 Subnet This option discovers devices on the device subnet, which is the subnet of the KX II-101 device IP address itself. You can access these devices directly from this the Subnet page or add them to your list of favorites. See Favorites List Page (on page 37). This feature allows multiple KX II-101 devices to interoperate and scale automatically.
Chapter 3: Working with Target Servers 4. Change the discovery Port (if necessary). 5. Select the Product Type. 6. Click OK. The device is added to your list of favorites. To edit a favorite: 1. From the Favorites List page, select the checkbox next to the appropriate KX II-101 device. 2. Click the Edit button. The Edit page appears. 3. Update the fields as necessary: Description IP Address/Host Name - Type the IP address of the KX II-101 device Port (if necessary) Product Type 4.
Chapter 3: Working with Target Servers 1. Select the checkbox next to the appropriate KX II-101 device. 2. Click the Delete button. The favorite is removed from your list of favorites. Logging off To quit the KX II-101 Remote Console: • Click Logout in the upper right-hand corner of the page. Note: Logging off also closes any open Virtual KVM Client and serial client sessions. Multi-Platform Client Interface See Multi-Platform Client (MPC) (on page 60).
Chapter 3: Working with Target Servers VKC Toolbar Button Description Properties Video settings Calibrate color Synchronize the target mouse cursor Refresh screen Auto-sense video Send Ctrl+Alt+Delete Single mouse cursor Full screen Resize video to fit screen Power Controlling a KVM Target Server Note: These features are available only when you have made power associations. See Power Control (on page 157). To power cycle a KVM target server: 1.
Chapter 3: Working with Target Servers To power off a target server: 1. From the KX II-101 Remote Console, click the Port Access tab to open it. The Port Access page opens. 2. Click the port name of the appropriate target server. The Port Action menu appears. 3. Choose Power Off. A confirmation message appears. Disconnecting a KVM Target Server To disconnect a target server: 1. Click the port name of the target you want to disconnect. The Port Action menu appears. 2. Choose Disconnect.
Chapter 3: Working with Target Servers 2. Choose the Connection Speed from the drop-down list. The device can automatically detect available bandwidth and not limit bandwidth use. However, you can also adjust this usage according to bandwidth limitations. Auto 100 Mb Ethernet 10 Mb Ethernet 1.
Chapter 3: Working with Target Servers 4. Use the slider to select the desired level of Smoothing (15-bit color mode only). The level of smoothing determines how aggressively to blend screen regions with small color variation into a single smooth color. Smoothing improves the appearance of target video by reducing displayed video noise. 5. Click OK to set these properties. Connection Information To obtain information about your Virtual KVM Client connection: • Choose Connection > Connection Info.
Chapter 3: Working with Target Servers Keyboard Options Keyboard Macros Keyboard macros ensure that keystroke combinations intended for the target server are sent to and interpreted only by the target server. Otherwise, they might be interpreted by the computer on which the Virtual KVM Client is running (your client PC). Macros are stored on the client PC and are PC-specific. Therefore, if you use another PC, you will not see your macros.
Chapter 3: Working with Target Servers 7. Review the Macro Sequence field to be sure the macro sequence is defined correctly. The contents of this field are automatically generated and are based on the selections made in the Keys to Press and Keys to Release fields. a. To remove a step in the sequence, select it and click Remove. b. To change the order of steps in the sequence, click the step and then click the up or down arrow buttons to reorder them as needed. 8. Click OK to save the macro.
Chapter 3: Working with Target Servers 9. Click Close to close the Keyboard Macros dialog. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu.
Chapter 3: Working with Target Servers 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted. Video Properties Refresh Screen The Refresh Screen command forces a refresh of the video screen. Video settings can be refreshed automatically in several ways: • The Refresh Screen command forces a refresh of the video screen.
Chapter 3: Working with Target Servers Calibrate Color Use the Calibrate Color command to optimize the color levels (hue, brightness, saturation) of the transmitted video images. The KX II-101 color settings are on a target server-basis. Note: The Calibrate Color command applies to the current connection only. To calibrate the color, do the following: • Choose Video > Calibrate Color or click the Calibrate Color button in the toolbar. The target device screen updates its color calibration.
Chapter 3: Working with Target Servers If the video image looks extremely blurry or unfocused, the settings for clock and phase can be adjusted until a better image appears on the active target server. Warning: Exercise caution when changing the Clock and Phase settings. Doing so may result in lost or distorted video and you may not be able to return to the previous state. Contact Raritan Technical Support before making any changes. i.
Chapter 3: Working with Target Servers Note: Some Sun background screens, such as screens with very dark borders, may not center precisely on certain Sun servers. Use a different background or place a lighter colored icon in the upper left corner of the screen. Mouse Options When controlling a target server, the KX II-101 Remote Console displays two mouse cursors: one belonging to your client workstation and the other belonging to the target server.
Chapter 3: Working with Target Servers Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, you will see two mouse cursors: one belonging to your remote client workstation and the other belonging to the target server. When the mouse pointer lies within the Virtual KVM Client target server window, mouse movements and clicks are directly transmitted to the connected target server.
Chapter 3: Working with Target Servers c. Close the terminal window. 6. Click the "Virtual KVM Client mouse synchronization" button . Additional Notes for Intelligent Mouse Mode • Be sure that there are no icons or applications in the upper left section of the screen since that is where the synchronization routine takes place. • Do not use an animated mouse. • Disable active desktop on KVM target servers.
Chapter 3: Working with Target Servers Intelligent Mouse Mode In Intelligent Mouse mode, the KX II-101 device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. In this mode, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acceleration. For this mode to work properly, certain conditions must be met. To enter intelligent mouse mode: • Choose Mouse > Intelligent.
Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Single Mouse Cursor Single Mouse mode uses only the target server mouse cursor and the local mouse pointer no longer appears onscreen.
Chapter 3: Working with Target Servers Tool Options From the Tools menu, you can specify certain options for use with the Virtual KVM Client, including logging, setting the keyboard type, and defining hot keys for exiting target screen resolution mode and single cursor mode. To set the tools options: 1. Choose Tools > Options. The Options dialog appears. 2. Select the Enable Logging checkbox only if directed to by Technical Support. This option creates a log file in your home directory. 3.
Chapter 3: Working with Target Servers Italian (Italy) Slovenian 4. Exit Target Screen Resolution Mode - Hotkey. When you enter target screen resolution mode, the display of the target server becomes full screen and acquires the same resolution as the target server. This is the hot key used for exiting this mode. 5. Exit Single Cursor Mode - Hotkey. When you enter single cursor mode, only the target server mouse cursor is visible.
Chapter 3: Working with Target Servers Note: The Keyboard Indicator should be used on Linux systems using Gnome as a desktop environment. View Options View Toolbar You can use the Virtual KVM client with or without the toolbar display. To toggle the display of the toolbar (on and off): • Choose View > View Toolbar. Scaling Scaling your target window allows you to view the entire contents of the target server window.
Chapter 3: Working with Target Servers Multi-Platform Client (MPC) Raritan Multi-Platform Client (MPC) is a graphical user interface for the Raritan product lines, providing remote access to target servers connected to Raritan KVM over IP devices. Requirements and Installation If you do not have MPC installed, for information on MPC installation requirements and directions on how to install MPC, see the KVM and Serial Client User Guide. This guide can be accessed on the Raritan website http://www.raritan.
Chapter 3: Working with Target Servers Navigator The navigator provides a tree view of every known Raritan device. From this panel, you can access all Raritan networked devices for which a connection profile exists and/or all Raritan devices automatically identified on the network. Note: Automatic Raritan device identification uses the UDP protocol and will typically identify all Raritan devices on your subnet. Network administrators rarely allow UDP broadcasts to function outside of a subnet.
Chapter 3: Working with Target Servers Devices in the MPC Navigator In MPC, devices are named according to the Manager Name field on the Manager's Network Configuration page. Dominion devices are named according to the Device Name field on the Dominion Console Network Settings page. Device Ports in the Navigator For each device to which you are connected, you are able to expand the tree associated with it to see each device port to which you have access.
Chapter 3: Working with Target Servers Icon Description Connected (green) - You are currently authenticated and connected to this device. Available (black) - This device is currently available on the network but you are not currently connected to it. Unavailable - A profile exists for this device but it is not currently available on the network. (Note that all devices to which you are not currently connected and that have modem profiles will use this icon.
Chapter 3: Working with Target Servers Icon Action Description Display/Hide Navigator You can also select Navigator in the View menu to toggle between displaying and hiding the Navigator. Refresh Navigator Updates the device status information displayed in the Navigator. Browse Discovered Devices When enabled, Show Discovered Devices will display devices that are “not profiled” but have been found on the network. This option can also be enabled by choosing View > Show > Discovered Devices.
Chapter 3: Working with Target Servers Navigator Display Options Showing Ports • Discovered Devices - Shows or hides discovered devices from the Navigator view. You will not see broadcast messages when this option is disabled (not selected). • Unassigned Channels - Shows or hides channels with no assigned targets.
Chapter 3: Working with Target Servers Button Button Name Connection Properties Description Opens the Modify Connection Properties dialog from which you can manually adjust bandwidth options (such as connection speed, color depth, and so forth). Same as choosing Connection > Properties or choosing Connection Properties on the shortcut menu, which is opened by pressing Ctrl+Left Alt+M. Video Settings Opens the Video Settings dialog, allowing you to manually adjust video conversion parameters.
Chapter 3: Working with Target Servers Button Button Description Name Exit OnNot applicable for IP-Reach or Dominion. Screen Menu Used by the application with other Raritan products. Alternatively, select Esc on the keyboard. Same as choosing Keyboard > Exit OnScreen Menu. Note: This function is not available on the KSX II. Send Ctrl+Alt+Del Sends a Ctrl+Alt+Del hot key combination to the target server. Same as choosing Keyboard > Send Ctrl+Alt+Del.
Chapter 3: Working with Target Servers Button Button Name Show/Hide Browse All Devices About Description Toggles between displaying and not displaying Raritan devices in the Navigator that are automatically identified on the network and that do not have preconfigured profiles associated with them. Displays the application version information. Same as choosing Help in the menu bar.
Chapter 3: Working with Target Servers To display the Connected Server(s) toolbar (when not already visible): • Choose View > Connected Server(s) Toolbar. To view the window for a target server: • Click the button that corresponds to the appropriate connected target server you want to view. The window for the corresponding target server is displayed and the button for the selected port is highlighted. In full screen mode, note that this action is window swapping, not video switching.
Chapter 3: Working with Target Servers Diagram Session key information Lock key indicators Description Indicates the status of the current target KVM Server, in respect to the activation of the Caps-Lock, Num-Lock, and ScrollLock keys. If these keys are enabled on the target server being viewed, this affirmative status will be reflected on the status bar.
Chapter 3: Working with Target Servers MPC Target Screen Resolution Mode Target Screen Resolution mode provides you with the ability to view the target server desktop in full screen mode, which removes all toolbars from view. Activate Target Screen Resolution mode once you are connected to a target by doing one of the following: • in the toolbar and then click OK in Click the Full Screen button the confirmation message that appears.
Chapter 3: Working with Target Servers To exit full screen mode, use the shortcut menu or click the Close icon that appears at the top right of the page when you hover your mouse along the top of the screen. Note: The Ctrl+Left Alt+M key combination does not work for certain target servers if you are running JRE 1.5.0_01. To return from full page mode, use Alt+Tab and choose MPC. While in full screen mode, you are able to view the Connect Server toolbar by hovering your mouse over the top of the screen.
Chapter 3: Working with Target Servers MPC Scaling Scaling your target window size allows you to view the entire contents of the target server window. This feature increases or reduces the size of the target video to fit the window size and maintains the aspect ratio. This allows you to see the entire target server desktop while in standard view. To activate Scaling, do one of the following: • Choose View > Scale Video.
Chapter 3: Working with Target Servers Note: Enabling Scale Video will scale the complete target video image to fit the remote desktop area as it grows or shrinks. You can combine this setting with target screen resolution for a full page affect on targets with a higher resolution than your desktop. Auto-Scroll The auto-scroll feature automatically scrolls the video display in the direction of the cursor as the cursor approaches the edge of the display.
Chapter 3: Working with Target Servers 2. On the Connect tab, type a meaningful description of the device in the Description field (up to 32 alphanumeric and special characters are allowed). This description identifies the Raritan device in the Navigator. 3. From the Product drop-down, choose the Raritan product you are using. 4. Select the type of connection from the Connection Type drop-down. TCP/IP connections a.
Chapter 3: Working with Target Servers 4. Click OK. To delete a profile: 1. Select the device with a profile in the Navigator and right-click it. 2. Choose Delete Profile. 3. When prompted to confirm the deletion, click Yes to delete the profile for this device or click No to return to the application without deleting. Establishing a New Connection Note: Depending on your version of the JRE, you might receive a certificate message when using the standalone application to access a Dominion device.
Chapter 3: Working with Target Servers Connection Information To obtain information about your connection: • Choose Connection > Connection Info. The Connection Info dialog appears. Generation 2 Devices The following information is displayed about a current connection to Generation 2 devices: Connection information Description Device name The name of your device. IP address The IP address of your device. Port The KVM Communication TCP/IP Port used to access the target device.
Chapter 3: Working with Target Servers Connecting to a Remote KVM Console Once you establish a connection with a Raritan device, that device's icon in the Navigator can be expanded to display all ports enabled for remote access. Choose one of the following options to establish a remote KVM console connection: • Double-click the KVM port. This method closes any previous connection before connecting to the new port. • Right-click the port and choose Switch from the shortcut menu.
Chapter 3: Working with Target Servers 3. To exit completely, click Exit on the Connection menu Shortcut Menu To access the shortcut menu, use either the default keyboard combination of Ctrl+Left Alt+M or the keyboard combination you assign. See Changing the Shortcut Menu Keyboard Combination (on page 80) for more information. TIP: If at some point you forget the keyboard combination used to open the shortcut menu, press Ctrl+Left Alt at the same time.
Chapter 3: Working with Target Servers Shortcut Menu Key Options Execute any of the commands on the shortcut menu by either choosing the command in the menu or using a key combination. If you are using a key combination to execute a command, you will press Ctrl+Left Alt+M and then press the key on your keyboard that corresponds to the underlined letter in the shortcut menu. For example, press Ctrl+Left Alt+M+F to enter full screen mode.
Chapter 3: Working with Target Servers Once a new keyboard combination is assigned, the new combination will be displayed in the shortcut menu and in the onscreen message that displays when the combination is used.
Chapter 3: Working with Target Servers Keyboard Macros A hot key combination is a set of keystrokes that performs an action when pressed. For example, the hot key combination Ctrl+Alt+0 might be created to minimize all windows. A keyboard macro is a shortcut that sends a hot key combination to a target server.
Chapter 3: Working with Target Servers 6. In the Keys to Release field: a. Choose each key for which you would like to emulate a key release. Define the keys you want released in order to run the macro. For example, specify that the keys to be pressed must also be released in order for the macro to be executed. Select the keys in the order by which they are to be released. b. Click Release Key after each selection. 7. Review the Macro Sequence field to be sure the macro sequence is defined correctly.
Chapter 3: Working with Target Servers 8. Click OK to save the macro. Click Clear to clear all field and start over. When you click OK, the Keyboard Macros dialog appears and lists the new keyboard macro.
Chapter 3: Working with Target Servers 9. Click Close to close the Keyboard Macros dialog. The macro will now appear on the Keyboard menu in the application. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. Running a Keyboard Macro Once you have created a keyboard macro, execute it using the keyboard macro you assigned to it or by choosing it from the Keyboard menu. Run a Macro from the Menu Bar When you create a macro, it appears under the Keyboard menu.
Chapter 3: Working with Target Servers Modifying and Removing Keyboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Choose the macro from among those listed. 3. Click Modify. The Add/Edit Macro dialog appears. 4. Make your changes. 5. Click OK. To remove a macro: 1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog appears. 2. Choose the macro from among those listed. 3. Click Remove. The macro is deleted.
Chapter 3: Working with Target Servers Hot Key Combination Description Alt Gr Because of a limitation in the Java Runtime Environment (JRE), Fedora, Linux, and Solaris clients receive an invalid response from Alt Gr on United Kingdom and US International language keyboards. Fedora, Linux, and Solaris do not pick up events for the Alt Gr key combination for Java 1.5. Java 1.6 appears to improve on this, although the keyPressed and keyReleased events for Alt Gr still identify it as an “unknown key code”.
Chapter 3: Working with Target Servers Keyboard Type Specifying a Keyboard Type in MPC MPC will not autodetect the type of keyboard you use, so you must specify your keyboard type to ensure accurate keyboard mapping. To specify a keyboard type: 1. Choose Tools > Options. The Options dialog will appear. 2. Click the Keyboard Type drop-down and select your keyboard type from the list.
Chapter 3: Working with Target Servers 3. Click OK. Keyboard Limitations Slovenian Keyboards The < key does not work on Slovenian keyboards due to a JRE limitation. Language Configuration on Linux Because the Sun JRE on Linux has problems generating the correct Key Events for foreign-language keyboards configured using System Preferences, Raritan recommends that you configure foreign keyboards using the methods described in the following table.
Chapter 3: Working with Target Servers Language Configuration method UK System Settings (Control Center) Korean System Settings (Control Center) Belgian Keyboard Indicator Norwegian Keyboard Indicator Danish Keyboard Indicator Swedish Keyboard Indicator Hungarian System Settings (Control Center) Spanish System Settings (Control Center) Italian System Settings (Control Center) Slovenian System Settings (Control Center) Note: The Keyboard Indicator should be used on Linux systems using
Chapter 3: Working with Target Servers Mouse Options Single Cursor Mode/Dual Cursor Mode When remotely viewing a target server that uses a mouse, you will see two mouse cursors on the remote desktop. When your mouse pointer lies within the remote desktop area, mouse movements and clicks are directly transmitted to the connected target server. The pointer, generated by the operating system, slightly leads the target server's mouse pointer during movement. This is a result of digital delay.
Chapter 3: Working with Target Servers Mouse Synchronization Options In addition to synchronizing mouse cursors or toggling between single and dual cursor mode, the Mouse menu provides three options for synching cursors when in dual cursor mode: Menu option Description Absolute When connected to selected Dominion devices and targets with USB ports, the application will use absolute coordinates to keep the cursors in sync. See Absolute Mouse Mode (on page 92) for more information.
Chapter 3: Working with Target Servers Intelligent Mouse Mode In Intelligent Mouse mode, the KX II-101 device can detect the target mouse settings and synchronize the mouse cursors accordingly, allowing mouse acceleration on the target. In this mode, the mouse cursor does a “dance” in the top left corner of the screen and calculates the acceleration. For this mode to work properly, certain conditions must be met. To enter intelligent mouse mode: • Choose Mouse > Intelligent.
Chapter 3: Working with Target Servers Please note that mouse configurations will vary on different target operating systems. Consult your OS guidelines for further details. Also note that intelligent mouse synchronization does not work with UNIX targets. Standard Mouse Mode Standard Mouse mode uses a standard mouse synchronization algorithm using relative mouse positions.
Chapter 3: Working with Target Servers 384 kb (Slow DSL/T1) 256 kb (Cable) 128 kb (Dual ISDN) 56 kb (ISP Modem) 33 kb (Fast Modem) 24 kb (Slow Modem) 3. Set the Color Depth. Devices can dynamically adapt the color depth transmitted to remote users in order to maximize usability in all bandwidths. Select from among the options in the drop-down list.
Chapter 3: Working with Target Servers Devices can filter out the electrical interference of video output from graphics cards. This feature optimizes picture quality and reduces bandwidth. Higher settings transmit variant pixels only if a large color variation exists in comparison to the neighboring pixels. However, setting the threshold too high can result in the unintentional filtering of desired page changes. Lower settings transmit most pixel changes.
Chapter 3: Working with Target Servers Contrast Blue - Controls the blue signal contrast; range is 0 255. Horizontal Offset - Controls the horizontal positioning of the target server display on your monitor; range is 0 - 512. Vertical Offset - Controls the vertical positioning of the target server display on your monitor; range is 0 - 128. 3. To preview the change prior to making the selection, check the Preview checkbox. 4. Check the Automatic Color Calibration checkbox to enable this feature.
Chapter 3: Working with Target Servers 6. Click OK to apply the settings and close the dialog. Click Apply to apply the settings without closing the dialog. Color Calibration Use the Color Calibration command if the color levels (hue, brightness, and saturation) of the transmitted video images do not seem accurate. The device color settings remain the same when switching from one target KVM server to another, so you can perform color calibration once to affect all connected target servers. 1.
Chapter 3: Working with Target Servers TIP: Open Microsoft Notepad and maximize the window. 3. On the Video menu, choose Calibrate Color or click the Color on the toolbar. The target device page will Calibration button update its calibration. Tip: You can also specify automatic color calibration using Tools > Options. See General Options in MPC (on page 100)for more information.
Chapter 3: Working with Target Servers General Options in MPC The Options available in the Tools menu provide options that allow you to customize scroll borders, mouse mode settings, single cursor mode, auto color calibration, hot key configuration, keyboard type, broadcast port, and logging. To configure the general options in MPC: 1. Choose Tools > Options. The Options dialog appears and displays the General tab by default. 2.
Chapter 3: Working with Target Servers French (France) German (Germany) Japanese United Kingdom Korean (Korea) Belgian (Belgium) Norwegian (Norway) Danish (Denmark) Swedish (Sweden) German (Switzerland) Hungarian (Hungary) Spanish (Spain) Italian (Italy) Slovenian 7. From the Keyboard Shortcut Menu HotKey drop-down, select the key combination you would like to use to invoke the Shortcut Menu (on page 79). 8.
Chapter 3: Working with Target Servers 10. For the Broadcast Port, type the broadcast port number in the Port field if you want to use a port other then 5000. 11. Select the Enable IPv6 Networking checkbox for IPv6 to enable IPv4 and IPv6 dual-stack operation. Note: KSX II and KX II-101 devices are not IPv6 enabled, so this section will not apply to those devices. 12. Select the Enable Logging checkbox only if directed to by Technical Support. This option creates a log file in your home directory. 13.
Chapter 3: Working with Target Servers 2. Highlight the target's icon in the Navigator and then choose Tools > Update > User Password. The Change Password dialog appears. 3. Type your current password in the Old Password field. 4. Type the new password in the New Password field. 5. Retype the password in the Confirm New Password field. 6. When finished, click OK. Restarting a Device To restart a device: 1. Select the device in the Navigator. 2. On the Tools menu, choose Restart Device.
Chapter 3: Working with Target Servers 2. Click Tools > Restore Device Configuration. Note that device configuration is specific to a particular device and should not be restored to another device. Backing Up and Restoring a User Configuration To back up a device's user configuration: 1. Select the device in the Navigator. 2. Click Tools > Save User Configuration. To restore a user configuration: 1. Upload a device's archived user configuration by selecting the device in the Navigator. 2.
Chapter 3: Working with Target Servers Note: If you want the application to autodiscover Raritan devices on the new broadcast port you entered in the Options dialog, you must configure all Raritan devices to use the new port number. Remote Power Management AC power to associated targets can be managed when used with a properly configured Raritan Remote Power Control Strip (RPC strip).
Chapter 4 Virtual Media In This Chapter Overview................................................................................................107 Prerequisites for Using Virtual Media ....................................................110 File Server Setup (File Server ISO Images Only) .................................111 Connecting to Virtual Media ..................................................................113 Disconnecting Virtual Media .........................................................
Chapter 4: Virtual Media Overview Virtual media extends KVM capabilities by enabling KVM target servers to remotely access media from the client PC and network file servers. With this feature, media mounted on the client PC and network file servers is essentially mounted virtually by the target server. The target server can then read from and write to that media as if it were physically connected to the target server itself.
Chapter 4: Virtual Media 108
Chapter 4: Virtual Media Diagram key Local workstation KX II-101 Target server Remote file server (ISO images) USB drive Floppy drive CD/DVD drive Hard drive image files 109
Chapter 4: Virtual Media Prerequisites for Using Virtual Media With the KX II-101 virtual media feature, you can mount up to two drives (of different types) that are supported by the USB profile currently applied to the target. These drives are accessible for the duration of the KVM session. For example, you can mount a specific CD-ROM, use it, and then disconnect it when you are done. The CD-ROM virtual media “channel” will remain open, however, so that you can virtually mount another CDROM.
Chapter 4: Virtual Media File Server Setup (File Server ISO Images Only) Note: This feature is only required when using virtual media to access file server ISO images. ISO9660 format is the standard supported by Raritan. However, other CD-ROM extensions may also work. Use the KX II-101 Remote Console File Server Setup page to designate the files server(s) and image paths that you want to access using KX II101 virtual media.
Chapter 4: Virtual Media 4. Click Save. All media specified here will now be available for selection in the Map Virtual Media CD/ISO Image dialog.
Chapter 4: Virtual Media Connecting to Virtual Media Local Drives This option mounts an entire drive, which means the entire disk drive is mounted virtually onto the target server. Use this option for hard drives and external drives only. It does not include network drives, CD-ROM, or DVD-ROM drives. This is the only option for which Read/Write is available. To access a drive on the client computer: 1. From the Virtual KVM Client, choose Virtual Media > Connect Drive.
Chapter 4: Virtual Media Conditions when Read/Write is Not Available Virtual media Read/Write is not available in the following situations: • For all hard drives. • When the drive is write-protected. • When the user does not have Read/Write permission: Port Permission Access is set to None or View. Port Permission VM Access is set to Read-Only or Deny. CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the standard supported by Raritan.
Chapter 4: Virtual Media c. Click Connect. 3. For ISO images: a. Choose the ISO Image option. Use this option when you want to access a disk image of a CD, DVD, or hard drive. ISO format is the only format supported. b. Click the Browse button. c. Navigate to the path containing the disk image you want to use and click Open. The path is populated in the Image Path field. d. Click Connect. 4. For remote ISO images on a file server: a. Choose the Remote Server ISO Image option. b.
Chapter 5 User Management In This Chapter User Groups ..........................................................................................116 Users .....................................................................................................123 Authentication Settings..........................................................................126 Changing a Password ...........................................................................
Chapter 5: User Management User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good idea to define user groups before creating individual users since, when you add a user, you must assign that user to an existing user group. The User Group List page displays a list of all user groups, which can be sorted in ascending or descending order by clicking on the Group Name column heading.
Chapter 5: User Management Adding a New User Group To add a new user group: 1. Open the Group page by selecting User Management > Add New User Group or clicking the Add button from the User Group List page. The Group page is organized into the following categories: Group, Permissions, Port Permissions, and IP ACL. 2. Type a descriptive name for the new user group into the Group Name field (up to 30 characters). 3. Set the permissions for the group.
Chapter 5: User Management 6. Click OK. Setting Port Permissions For each server port, you can specify the access type the group has, as well as the type of port access to the virtual media and the power control. Please note that the default setting for all permissions is Deny. Port Access Option Description Deny Denied access completely View View the video (but not interact with) the connected target server Control Control the connected target server.
Chapter 5: User Management VM access Option Description Deny Virtual media permission is denied altogether for the port Read-Only Virtual media access is limited to read access only Read-Write Complete access (read, write) to virtual media Power control access Option Description Deny Deny power control to the target server Access Full permission to power control on a target server Group-Based IP ACL (Access Control List) Important: Exercise caution when using group-based IP access control.
Chapter 5: User Management To add (append) rules: 1. Type the starting IP address in the Starting IP field. 2. Type the ending IP address in the Ending IP field. 3. Choose the action from the available options: Accept - IP addresses set to Accept are allowed access to the KX II-101 device. Drop - IP addresses set to Drop are denied access to the KX II101 device. 4. Click Append. The rule is added to the bottom of the rules list. Repeat steps 1 through 4 for each rule you want to enter.
Chapter 5: User Management Tip: The rule numbers allow you to have more control over the order in which the rules are created. Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the permissions of all users, including their own. Carefully consider granting these permissions.
Chapter 5: User Management Modifying an Existing User Group Note: All permissions are enabled (and cannot be changed) for the Admin group. To modify an existing user group: 1. From the Group page, change the appropriate fields and set the appropriate permissions. 2. Set the Permissions for the group. Select the checkboxes before the permissions you want to assign to all of the users belonging to this group. See Setting Permissions (on page 122). 3. Set the Port Permissions.
Chapter 5: User Management User List The User List page displays a list of all users including their user name, full name, and user group. The list can be sorted on any of the columns by clicking on the column name. From the User List page, you can also add, modify, or delete users. To view the list of users: • Choose User Management > User List. The User List page opens.
Chapter 5: User Management 5. Choose the group from the User Group drop-down list. The list contains all groups you have created in addition to the systemsupplied default groups. , which is the default setting, Admin, Individual Group. If you do not want to associate this user with an existing User Group, select Individual Group from the drop-down list. For more information about permissions for an Individual Group, see Setting Permissions for an Individual Group (on page 122). 6.
Chapter 5: User Management Authentication Settings Authentication is the process of verifying that a user is who he says he is. Once a user is authenticated, the user's group is used to determine his system and port permissions. The user's assigned privileges determine what type of access is allowed. This is called authorization. When the KX II-101 is configured for remote authentication, the external authentication server is used primarily for the purposes of authentication, not authorization.
Chapter 5: User Management To return to factory defaults: • Click the Reset to Defaults button. Implementing LDAP/LDAPS Remote Authentication Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking protocol for querying and modifying directory services running over TCP/IP. A client starts an LDAP session by connecting to an LDAP/LDAPS server (the default TCP port is 389). The client then sends operation requests to the server, and the server sends responses in turn.
Chapter 5: User Management 4. In the Primary LDAP Server field, type the IP address or DNS name of your LDAP/LDAPS remote authentication server (up to 37 characters). When the Enable Secure LDAP option is selected, the DNS name must be used. 5. In the Secondary LDAP Server field, type the IP address or DNS name of your backup LDAP/LDAPS server (up to 37 characters). When the Enable Secure LDAP option is selected, the DNS name must be used.
Chapter 5: User Management 14. Active Directory Domain. Type the name of the Active Directory Domain. Returning User Group Information from Active Directory Server The KX II-101 supports user authentication to Active Directory (AD) without requiring that users be defined locally on the KX II-101. This allows Active Directory user accounts and passwords to be maintained exclusively on the AD server.
Chapter 5: User Management To enable your AD server on the KX II-101: 1. Using the KX II-101, create special groups and assign proper permissions and privileges to these groups. For example, create groups such as KVM_Admin and KVM_Operator. 2. On your Active Directory server, create new groups with the same group names as in the previous step. 3. On your AD server, assign the KX II-101 users to the groups created in step 2. 4. From the KX II-101, enable and configure your AD server properly.
Chapter 5: User Management 6. The Authentication Port default is port is 1812 but can be changed as required. 7. The Accounting Port default port is 1813 but can be changed as required. 8. The Timeout is recorded in seconds and default timeout is 1 second, but can be changed as required. The timeout is the length of time the KX II-101 waits for a response from the RADIUS server before sending another authentication request. 9. The default number of retries is 3 Retries.
Chapter 5: User Management 132 CHAP - With CHAP, authentication can be requested by the server at any time. CHAP provides more security than PAP.
Chapter 5: User Management Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II-101 determines the permissions for a given user based on the permissions of the user's group. Your remote RADIUS server can provide these user group names by returning an attribute, implemented as a RADIUS FILTER-ID. The FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME} where GROUP_NAME is a string denoting the name of the group to which the user belongs.
Chapter 5: User Management 134 Attribute Data Log on NAS-IP-Address (4) The IP address for the KX II-101. User-Name (1) The user name entered at the login screen. Acct-Session-ID (44) Session ID for accounting.
Chapter 5: User Management User Authentication Process When the device is configured to authenticate and authorize local users from CC, the order in which the user credentials are validated follows the following process: 135
Chapter 5: User Management Remote authentication follows the process specified in the flowchart below: 136
Chapter 5: User Management Changing a Password To change your password: 1. Choose User Management > Change Password. The Change Password page opens. 2. Type your current password in the Old Password field. 3. Type a new password in the New Password field. Retype the new password in the Confirm New Password field. Passwords can be up to 64 characters in length and can consist of English alphanumeric characters and special characters. 4. Click OK. 5.
Chapter 6 Device Management In This Chapter Network Settings ...................................................................................138 Device Services.....................................................................................141 Keyboard/Mouse Setup .........................................................................143 Serial Port Settings................................................................................144 Date/Time Settings .....................................
Chapter 6: Device Management To reset to factory defaults: • Click Reset to Defaults. Network Basic Settings 1. Choose Device Settings > Network. The Network Settings page opens. 2. Specify a meaningful Device Name for your KX II-101 device using up to 16 alphanumeric characters, valid special characters, and no spaces. 3. In the IP Address section, enter or select the appropriate network settings: a. Enter the IP Address if needed. The default IP address is 192.168.0.192. b. Enter the Subnet Mask.
Chapter 6: Device Management e. Select the IP Auto Configuration. The following options are available: None (Static IP) - This option requires that you manually specify the network parameters. This is the recommended option because the KX II-101 is an infrastructure device and its IP address should not change. DHCP - Dynamic Host Configuration Protocol is used by networked computers (clients) to obtain unique IP addresses and other parameters from a DHCP server.
Chapter 6: Device Management Full-duplex allows communication in both directions simultaneously. Note: Occasionally there are problems running at 10 Mbps in either half or full duplex. If you are experiencing problems, please try another speed and duplex. See Network Speed Settings (on page 228). • Select the Bandwidth Limit.
Chapter 6: Device Management Note: KX II-101 is enabled by factory default. 2. Select Enable SSH Access. 3. Type the network port used for SSH access to the KX II-101. 4. Click Save to save the setting. Enabling Direct Port Access Direct port access enables you to access the KX II-101 Remote Client without having to go through the usual login page. With direct port access enabled, you can define a URL to navigate directly to the Port Access page. To enable direct port access: 1.
Chapter 6: Device Management Tip: Define a direct port access URL once, then save it in your web browser as a bookmark to make reusing it easier. Keyboard/Mouse Setup Use the Keyboard/Mouse Setup page to configure the Keyboard and Mouse interface between the KX II-101 and the host device. 1. Click Device Settings > Keyboard/Mouse. 2. Select the Host Interface. This selection determines if the KX II-101 sends keyboard and mouse data through the PS/2 or USB connections.
Chapter 6: Device Management USB - Forces the KX II-101 to use the USB connection to send Keyboard and Mouse data to the host device. PS/2 - Forces the KX II-101 to use the PS/2 connection to send Keyboard and Mouse data to the host device. Note: If you are using a Raritan switch on the front-end with a KX II101, you must set the Host Interface to PS/2 in order for the configuration to work properly. See Analog KVM Switch (on page 162). 3. Click OK.
Chapter 6: Device Management 4. Click OK. Raritan Power Strip Control To configure the power strip serial port: 1. Choose Device Settings > Serial Port. The Serial Port Settings page opens. 2. Select the PowerStrip Control radio button. Choose this option when connecting the KX II-101 to a Raritan power strip.
Chapter 6: Device Management 3. Click OK. Modem To configure the modem serial port: 1. Choose Device Settings > Serial Port. The Serial Port Settings page opens. 2. Select the Modem radio button. Choose this option when attaching an external modem to the KX II-101 in order to provide dial-up access. 3. In the Modem Settings section, configure the following fields: 146 Serial line speed Modem init string - The default string displayed in the field must be used to enable modem access.
Chapter 6: Device Management 4. Click OK. See Modem Access Cable Connections (on page 148) for details on the cable connection for modem access and see Certified Modems (on page 226) for details on certified modems that work with the KX II-101. For information on settings that will give you the best performance when connecting to the KX II-101 via modem, see Creating, Modifying and Deleting Profiles in MPC (on page 74).
Chapter 6: Device Management Modem Access Cable Connections Use the following cable connection configuration to connect the KX II101 to a modem: 1. Connect an admin serial cable to the KX II-101. 2. Connect a 9 pin male/male gender changer to the admin serial cable. 3. Connect a null modem cable to other side of the gender changer. 4. Connect the 9 pin male/male gender changer to other end of the null modem cable. 5. Connect a DB9 to male DB25 modem cable between the null modem cable and the modem.
Chapter 6: Device Management 6. Click OK. Event Management The KX II-101 Event Management feature provides a set of screens for enabling and disabling the distribution of system events to SNMP Managers, Syslog, and the audit log. These events are categorized, and for each event you can determine whether you want the event sent to one or several destinations.
Chapter 6: Device Management Configuring Event Management - Settings SNMP Configuration Simple Network Management Protocol (SNMP) is a protocol governing network management and the monitoring of network devices and their functions. The KX II-101 offers SNMP Agent support through Event Management. To configure SNMP (enable SNMP logging): 1. Choose Device Settings > Event Management - Settings. The Event Management - Settings page appears. 2. Select SNMP Logging Enabled.
Chapter 6: Device Management Event Management - Destinations System events, if enabled, can generate SNMP notification events (traps), or can be logged to Syslog or Audit Log. Use the Event Management - Destinations page to select the system events to track and where to send this information. Note: SNMP traps will be generated only if the SNMP Logging Enabled option is selected. Syslog events will be generated only if the Enable Syslog Forwarding option is selected.
Chapter 6: Device Management Tip: Enable or disable entire Categories by checking or clearing the Category checkboxes, respectively. 3. Click OK. To reset to factory defaults: • Click Reset To Defaults. Warning: When using SNMP traps over UDP, it is possible for the KX II-101 and the router that it is attached to to fall out of synchronization when the KX II-101 is rebooted, preventing the reboot completed SNMP trap from being logged.
Chapter 6: Device Management Trap Name Description ipConflictResolved An IP Address conflict was resolved. networkFailure An Ethernet interface of the product can no longer communicate over the network. networkParameterChanged A change has been made to the network parameters. passwordSettingsChanged Strong password settings have changed. portConnect A previously authenticated user has begun a KVM session. portConnectionDenied A connection to the target port was denied.
Chapter 6: Device Management Trap Name Description userPasswordChanged This event is triggered if the password of any user of the device is modified. userSessionTimeout A user with an active session has experienced a session termination due to timeout. vmImageConnected User attempted to mount either a device or image on the target using Virtual Media. For every attempt on device/image mapping (mounting) this event is generated.
Chapter 6: Device Management Port type Description PowerStrip Power strip KVM KVM target 1. Click the Port Name for the port you want to edit. For KVM ports, the Port page is opened. In this page, you can name the ports, create power associations, and set target server settings. For power strips, the Port page for power strips is opened. In this page, you can name the power strips and their outlets. See Power Control (on page 157).
Chapter 6: Device Management Note: The Power Port 1 link is enabled only when a Raritan power strip is connected to the KX II-101 and configured. Otherwise, the link is disabled. Renaming a Port To change the port name: 1. Enter a descriptive name, such as the name of the target server. The name can be up to 32 alphanumeric characters and can include special characters. Note: Do not use apostrophes for the Port Name. 2. Click OK.
Chapter 6: Device Management Power Control The KX II-101 provides remote power control of a target server. To utilize this feature, you must have a Raritan remote power strip. To use the KX II-101 power control feature: • Connect the power strip to your target server using the DKX2-101SPDUC connector (not included but available from your reseller or Raritan). See Connecting the Power Strip (on page 157). • Name the power strip (not included but available from your reseller or Raritan.
Chapter 6: Device Management Diagram key DKX2-101-SPDUC connector (not included) from the KX II-101 to Raritan the power strip. Raritan power strip. To connect the KX II-101 to a Raritan power strip: 1. Connect the Mini DIN9M connector of the DKX2-101-SPDUC cable to the Admin port of the KX II-101. 2. Connect the RJ45M connector of the DKX2-101-SPDUC cable to the serial port connector on the Raritan power strip. 3.
Chapter 6: Device Management 3. Click OK. To cancel without saving changes: • Click Cancel. Managing Power Associations To make power associations (associate power strip outlets with the KVM target server): Note: When a power strip is associated with the target server (port), the outlet name is replaced by the port name. You can change this name in the Port 2 page. 1. Choose the power strip from the Power Strip Name drop-down list. 2. Choose the outlet from the Outlet Name drop-down list. 3.
Chapter 6: Device Management To remove a power strip association: 1. Select the appropriate power strip from the Power Strip Name dropdown list. 2. For that power strip, select the appropriate outlet from the Outlet Name drop-down list. 3. From the Outlet Name drop-down list, select None. 4. Click OK. That power strip/outlet association is removed. A confirmation message appears. To show the power port configuration: • Choose Home > Device Settings > Port Configuration > [power port name].
Chapter 6: Device Management Controlling a Power Strip Device Control the power strip device using the Power Strip Device page. This page enables you to turn each outlet on the power strip on and off. To control the power strip connected to the KX II-101: 1. Choose Home > Powerstrip. The Power Strip Device page opens. 2. Click the On or Off button for each outlet to run it on or off. 3. Click OK when prompted to confirm your choice. Note: The KX II-101 can control only one power strip.
Chapter 6: Device Management Analog KVM Switch You can configure a Raritan analog KVM switch to work with the KX II101. The KX II-101's compatibility has been verified with the following Raritan KVM switches: • SwitchMan SW2, SW4 and SW8 • Master Console MX416 and MXU Similar products from Raritan or other vendors may be compatible but support is not guaranteed.
Chapter 6: Device Management 6. Click OK to configure the analog KVM switch. To restore analog KVM switch defaults: • Click Reset to Defaults. Resetting the KX II-101 Using the Reset Button On the back panel of the KX II-101, there is a Reset button. It is recessed to prevent accidental resets (you will need a pointed object to press this button). The actions that are performed when the Reset button is pressed are defined in the graphical user interface. See Encryption & Share (on page 190).
Chapter 6: Device Management NOTE: If the KX II-101 is set to restore to the factory defaults upon reset, the IP address, user name, and other options will be set accordingly.
Chapter 7 Managing USB Connections In This Chapter Overview................................................................................................166 Basic USB Connection Settings ............................................................166 Advanced USB Connection Settings.....................................................168 Known USB Profiles ..............................................................................
Chapter 7: Managing USB Connections Overview To broaden the KX II-101's compatibility with different KVM target servers, Raritan provides a user defined real-time selection of USB configuration profile options for a wide range of operating system and BIOS-level server implementations. The default USB Connection Settings meets the needs of the vast majority of deployed KVM target server configurations.
Chapter 7: Managing USB Connections 2. Click the Connection Settings section. icon to expand the USB 3.
Chapter 7: Managing USB Connections Advanced USB Connection Settings WARNING: It is possible, based on the selections you make in the Advanced USB Connection Settings section, to cause configuration problems between the KX II-101 and the target server.
Chapter 7: Managing USB Connections 5. Click OK. Known USB Profiles The current release of the KX II-101 includes the known USB profiles described in the following tables. However, for the most up-to-date USB profile information, please click on the User Defined KX II-101 USB Profiles Connection Configuration Table link in the Advanced USB Connection Settings section of the page. Hardware/BIOS: Dell PowerEdge 1950/2950/2970/6950/R200 Server attributes: BIOS v1.0.
Chapter 7: Managing USB Connections Hardware/BIOS: Dell PowerEdge 1950/2950/2970/6950/R200 Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM REM disk Comments: Standard configuration. Hardware/BIOS: Dell PowerEdge 1850 Server attributes: BIOS A06, Windows Server 2003, Intel Xeon 2.
Chapter 7: Managing USB Connections Hardware/BIOS: Dell PowerEdge 650 Server attributes: BIOS A05, Windows Server 2003, Intel P 4 3GHz Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM REM disk Comments: BIOS accessible YES. No BIOS support to boot from USB emulated devices.
Chapter 7: Managing USB Connections Hardware/BIOS: Dell PowerEdge 1650 Absolute mouse Virtual CD-ROM media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual REM disk Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 Comments: BIOS accessible YES. No BIOS support to boot from USB emulated devices. Hardware/BIOS: Dell PowerEdge 2650 Server attributes: BIOS A21, Windows Server 2003, Intel Xeon 2.
Chapter 7: Managing USB Connections Hardware/BIOS: Other Dell Optiplex, keyboard only Server attributes: GX620 BIOS A11 11/20/06 Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 Disabled Disabled Comments: BIOS keyboard access.
Chapter 7: Managing USB Connections Hardware/BIOS: HP Compaq DC7100/7600 Comments: Virtual CD-ROM and disk drives cannot be used simultaneously. Hardware/BIOS: HP Integrity RX1600 Server attributes: HP-UX 8.
Chapter 7: Managing USB Connections Hardware/BIOS: HP Proliant DL145 Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM REM disk Comments: Boot from CD-ROM. Hardware/BIOS: HP Proliant DL145 Server attributes: PhoenixBIOS HP System BIOS005 version 2.
Chapter 7: Managing USB Connections Hardware/BIOS: HP Proliant DL360/DL380 Server attributes: HP Proliant DL360/DL380 G4 (HP SmartStart CD) Keyboard & mouse: PS/2 USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM REM disk Comments: Use PS/2 keyboard/mouse for BIOS/SmartStart Installs.
Chapter 7: Managing USB Connections Hardware/BIOS: HP Proliant DL360/DL380 Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM REM disk Comments: Use USB keyboard/mouse and set the mouse to Absolute Mouse mode for normal desktop use.
Chapter 7: Managing USB Connections Hardware/BIOS: HP Proliant DL360/DL380 Server attributes: HP Proliant DL360/DL380 G4 (Windows 2003 Server Installation) Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM REM disk Comments: Use USB keyboard/mouse and set the mouse to Absolute Mouse mode for normal des
Chapter 7: Managing USB Connections Hardware/BIOS: IBM eServer System P5 Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM REM disk Comments: Boot options accessible - YES. Only use Intelligent Mouse mode or Single Mouse mode. Hardware/BIOS: IBM ThinkCentre Lenovo Server attributes: BIOS Date 5-26-06, Intel P4 2.
Chapter 7: Managing USB Connections Hardware/BIOS: Lenovo ThinkPad X61 Server attributes: BIOS v1.11 2007-11-15 Intel Duo Core 2.20 GHz Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 Auto Disabled Comments: Press F1 during startup to enter BIOS.
Chapter 7: Managing USB Connections Hardware/BIOS: Lenovo ThinkPad T61 Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 Auto Disabled Comments: Press F1 during startup to enter BIOS. Press F12 to boot from the appropriate virtual media mount (CDROM/USB HDD).
Chapter 7: Managing USB Connections Hardware/BIOS: Mac Server attributes: BIOS Mac Keyboard & mouse: USB USB connection settings: Advanced USB settings: Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 CD-ROM Disabled Comments: Works normally on the Desktop. Virtual CD-ROM and disk drives cannot be used simultaneously.
Chapter 7: Managing USB Connections Hardware/BIOS: RUBY Industrial Mainboard (AwardBIOS) Absolute mouse Virtual media Intf#1 Force full speed Remove Unused VM Intf#1 Absolute mouse Mac server Virtual Media Intf#2 SUN USB keyboard Remove Unused VM Intf#2 Auto Disabled Comments: Use this for the RUBY-9715VG2A series industrial mainboards with Phoenix/AwardBIOS v6.00PG. Virtual CDROM and disk drives cannot be used simultaneously.
Chapter 8 Security Management In This Chapter Security Settings....................................................................................184 Logon Limitations ..................................................................................185 Strong Passwords .................................................................................186 User Blocking ........................................................................................188 Encryption & Share.............................
Chapter 8: Security Management To reset back to defaults: • Click Reset to Defaults. Logon Limitations Using logon limitations, you can specify restrictions for single logon, password aging, and the logging off of idle users. Limitation Description Enable single logon When selected, only one login per user name is limitation allowed at any time. When deselected, a given user name/password combination can be connected into the device from several client workstations simultaneously.
Chapter 8: Security Management Limitation Description Enable password aging When selected, all users are required to change their passwords periodically based on the number of days specified in Password Aging Interval field. This field is enabled and required when the Enable Password Aging checkbox is selected. Enter the number of days after which a password change is required. The default is 60 days.
Chapter 8: Security Management Strong passwords require user-created passwords to have a minimum of 8 characters with at least one alphabetical character and one nonalphabetical character (punctuation character or number). In addition, the first four characters of the password and the user name cannot match. When selected, strong password rules are enforced. Users with passwords not meeting strong password criteria will automatically be required to change their password on their next login.
Chapter 8: Security Management User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the system after the specified number of unsuccessful login attempts. The three options are mutually exclusive: 188 Option Description Disabled The default option. Users are not blocked regardless of the number of times they fail authentication.
Chapter 8: Security Management Option Description Timer Lockout Users are denied access to the system for the specified amount of time after exceeding the specified number of unsuccessful login attempts. When selected, the following fields are enabled: Attempts - The number of unsuccessful login attempts after which the user will be locked out. The valid range is 1 - 10 and the default is 3 attempts. Lockout Time - The amount of time for which the user will be locked out.
Chapter 8: Security Management Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used, PC and VM share modes, and the type of reset performed when the KX II-101 Reset button is pressed. WARNING: If you select an encryption mode that is not supported by your browser, you will not be able to access the KX II-101 from your browser. 1. Choose one of the options from the Encryption Mode drop-down list.
Chapter 8: Security Management Encryption mode Description AES-128 The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. 128 is the key length. When AES-128 is specified, be certain that your browser supports it, otherwise you will not be able to connect. See Checking Your Browser for AES Encryption (on page 192) for more information.
Chapter 8: Security Management 5. If needed, select the Disable Local Port Output checkbox. If this option is selected, there is no video output on the local port. 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware Reset button (at the back of the device) is depressed. For more information, see Resetting the KX II-101 - Using the Reset Button (see "Resetting the KX II-101 Using the Reset Button" on page 163).
Chapter 8: Security Management IP Access Control Using IP access control, you can control access to your KX II-101. By setting a global Access Control List (ACL) you are by ensuring that your device does not respond to packets being sent from disallowed IP addresses. The IP access control is global, affecting the KX II-101 as a whole, but you can also control access to your device at the group level. Important: IP address 127.0.0.1 is used by the KX II-101 local port.
Chapter 8: Security Management Tip: Rule numbers allow you to have more control over the order in which the rules are created. To replace a rule: 1. Specify the rule number you want to replace. 2. Type the IP address and subnet mask in the IP/Mask field. 3. Choose the Policy from the drop-down list. 4. Click Replace. Your new rule replaces the original rule with the same rule number. To delete a rule: 1. Specify the rule number you want to delete. 2. Click Delete. 3.
Chapter 9 Maintenance In This Chapter Audit Log................................................................................................195 Device Information.................................................................................196 Backup and Restore ..............................................................................197 Upgrading Firmware ..............................................................................198 Upgrade History...........................................
Chapter 9: Maintenance Device Information The Device Information page provides detailed information about your KX II-101 device. This information is helpful should you need to contact Raritan Technical Support. To view information about your KX II-101: • Choose Maintenance > Device Information. The Device Information page opens.
Chapter 9: Maintenance Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX II-101. In addition to using backup and restore for business continuity purposes, you can use this feature as a time-saving mechanism. For instance, you can quickly provide access to your team from another KX II-101 by backing up the user configuration settings from the KX II-101 in use and restoring those configurations to the new KX II-101.
Chapter 9: Maintenance To restore your KX II-101: WARNING: Exercise caution when restoring your KX II-101 to an earlier version. Usernames and password in place at the time of the backup will be restored. If you do not remember the old administrative usernames and passwords, you will be locked out of the KX II-101. In addition, if you used a different IP address at the time of the backup, that IP address will be restored as well.
Chapter 9: Maintenance To upgrade your KX II-101 device: 1. Choose Maintenance > Firmware Upgrade. The Firmware Upgrade page opens. 2. Click the Show Latest Firmware link, locate the appropriate Raritan firmware distribution file (*.RFP) from the Firmware Upgrades > KX II-101 page, and download the file. 3. Unzip the file and read all instructions included in the firmware ZIP files carefully before upgrading. Note: Copy the firmware update file to a local PC before uploading.
Chapter 9: Maintenance 5. Click Upgrade. Wait for the upgrade to complete. Status information and progress bars are displayed during the upgrade. Upon completion of the upgrade, the device reboots. 6. As prompted, close the browser and wait approximately 5 minutes before logging into the KX II-101 again. For information about upgrading the device firmware using the MultiPlatform Client, see the Raritan Multi-Platform Client (MPC) User Guide.
Chapter 9: Maintenance Rebooting The Reboot page provides a safe and controlled way to reboot your KX II-101. This is the recommended method for rebooting. Important: All KVM and serial connections will be closed and all users will be logged off. To reboot your KX II-101: 1. Choose Maintenance > Reboot. The Reboot page opens. 2. Click Reboot. You are prompted to confirm the action. Click Yes to proceed with the reboot.
Chapter 10 Diagnostics The Diagnostics pages are used for troubleshooting and are intended primarily for the administrator of the KX II-101 device. All of the Diagnostics pages (except Device Diagnostics) run standard networking commands and the information that is displayed is the output of those commands. The Diagnostics menu options help you debug and configure the network settings. The Device Diagnostics option is intended for use in conjunction with Raritan Technical Support.
Chapter 10: Diagnostics The following information is displayed: • Whether the Ethernet interface is up or down. • Whether the gateway is pingable or not. • The LAN port that is currently active. To refresh this information: • Click the Refresh button. Network Statistics Page The KX II-101 provides statistics about your network interface. To view statistics about your network interface: 1. Choose Diagnostics > Network Statistics. The Network Statistics page opens. 2.
Chapter 10: Diagnostics 204 Statistics - Produces a page similar to the one displayed here.
Chapter 10: Diagnostics Interfaces - Produces a page similar to the one displayed here. Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is displayed in the Result field.
Chapter 10: Diagnostics Ping Host Page Ping is a network tool used to test whether a particular host or IP address is reachable across an IP network. Using the Ping Host page, you can determine if a target server or another KX II-101 is accessible. To ping the host: 1. Choose Diagnostics > Ping Host. The Ping Host page appears. 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232 characters in length. 3. Click Ping.
Chapter 10: Diagnostics 3. Choose the maximum hops from the drop-down list (5 to 50 in increments of 5). 4. Click Trace Route. The trace route command is executed for the given hostname or IP address and the maximum hops. The output of trace route is displayed in the Result field.
Chapter 10: Diagnostics Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technical Support. The Device Diagnostics page downloads diagnostics information from the KX II-101 to the client machine. A device diagnostics log can be generated with or without running an optional diagnostic script provided by Raritan Technical Support. A diagnostics script produces more information for diagnosing problems.
Chapter 10: Diagnostics a. Retrieve the diagnostics file supplied by Raritan and unzip as necessary. b. Click Browse. A Choose File dialog appears. c. Navigate to and select this diagnostics file. d. Click Open. The file is displayed in the Script File field: e. Click Run Script. 3. Create a diagnostics file to send to Raritan Technical Support: a. Click Save to File. The File Download dialog appears. b. Click Save. The Save As dialog appears. c. Navigate to the desired directory and click Save. 4.
Chapter 11 Command Line Interface (CLI) In This Chapter Overview................................................................................................210 Accessing the KX II-101 Using the CLI .................................................211 SSH Connection to the KX II-101..........................................................211 Logging On ............................................................................................212 Navigation of the CLI ..................................
Chapter 11: Command Line Interface (CLI) Accessing the KX II-101 Using the CLI Access the KX II-101 using one of the following methods: • TELNET via IP connection • SSH (Secure Shell) via IP connection • Multi-function admin serial port via RS-232 serial interface with provided cable and a terminal emulation program like HyperTerminal Several SSH/TELNET clients are available and can be obtained from the following locations: • PuTTy - http://www.chiark.greenend.org.uk/~sgtatham/putty/ http://www.
Chapter 11: Command Line Interface (CLI) SSH Access from a UNIX/Linux Workstation To open an SSH session from a UNIX/Linux workstation and log in as the user admin, enter the following command: ssh -l admin 192.168.30.222 The Password prompt appears. See Logging On (on page 212). Logging On To log in, enter the user name admin as shown: 1. Login: admin 2. The password prompt appears. Enter the default password: raritan. The welcome message appears. You are now logged in as an Administrator.
Chapter 11: Command Line Interface (CLI) CLI Prompts The Command Line Interface prompt indicates the current command level. The root portion of the prompt is the login name. For a direct admin serial port connection with a terminal emulation application, Admin Port is the root portion of a command. admin > For TELNET/SSH, admin is the root portion of the command: admin > config > network > Completion of Commands The CLI supports the completion of partially-entered commands.
Chapter 11: Command Line Interface (CLI) CLI Syntax -Tips and Shortcuts Tips • Commands are listed in alphabetical order. • Commands are not case sensitive. • Parameter names are single word without underscore. • Commands without arguments default to show current settings for the command. • Typing a question mark ( ? ) after a command produces help for that command. • A pipe symbol ( | ) indicates a choice within an optional or required set of keywords or arguments.
Chapter 11: Command Line Interface (CLI) Command Description config Switch to the Configuration menu. diagnostics (on page 215) Switch to the diagnostics menu. debug (on page 216) Switch to debug menu. help Display an overview of the CLI syntax. history Display the current session's command line history. interface Configure the KX II-101 network interface. listports (see "Listports Command" on page 218) Lists the port, port name, port type, port status, and port availability.
Chapter 11: Command Line Interface (CLI) Debug The Diagnostics > Debug menu enables you to choose the Setlog command to set logging options for the KX II-101. Setlog Command The Setlog command enables you set the logging level for different modules of the KX II-101 and to view the current logging levels for each module.
Chapter 11: Command Line Interface (CLI) Network The Configuration > Network commands are used to configure the KX II101 network connection and device name. Command interface Description Configure the KX II-101 device network interface. name Set the device name. Name Command The name command is used to configure the device and host name.
Chapter 11: Command Line Interface (CLI) Command Option gw ipaddress Description Gateway IP address obtained from the IP administrator mode Set Ethernet Mode to auto detect or force 100MB/s full duplex (100fdx) Interface Command Example The following command sets the IP address, mask, and gateway addresses, and sets the mode to auto detect. Admin Port > Config > Network > interface ipauto none ip 192.168.50.12 mask 255.255.255.0 gw 192.168.51.
Chapter 12 CC Unmanage In This Chapter Overview................................................................................................219 Removing a KX II-101 from CC-SG Management ................................220 Using CC-SG in Proxy Mode.................................................................
Chapter 12: CC Unmanage Removing a KX II-101 from CC-SG Management Unless the KX II-101 is released from CC-SG control, you cannot access the device directly. However, if the KX II-101 does not receive heartbeat messages from CommandCenter (for example, CommandCenter is not on the network), you can release the KX II-101 from CC-SG control in order to access the device. This is accomplished by using the CC Unmanage feature. Note: Maintenance permission is required to use this feature.
Chapter 12: CC Unmanage 2. Click Yes. A message appears, confirming that the device is no longer under CC management. 3. Click OK. The KX II-101 login page opens. Using CC-SG in Proxy Mode Virtual KVM Client Version not Known from CC-SG Proxy Mode When the Virtual KVM Client is launched from CommandCenter Secure Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is unknown. In the About Raritan Virtual KVM Client dialog, the version is displayed as “Version Unknown”.
Appendix A Specifications In This Chapter KX II-101 Specifications ........................................................................222 Supported Video Resolutions ................................................................223 Supported Keyboard Languages...........................................................224 Supported Operating Systems (Clients)................................................225 Supported Browsers .........................................................................
Appendix A: Specifications Specification Remote connection: • Description • One 10/100 Ethernet (RJ45) port Network Protocols • TCP/IP, HTTP, HTTPS, UDP, RADIUS, LDAP, SNTP, DHCP Screen resolutions: • 720x400 (for DOS) • PC graphic mode • 640 X 480 @ 60/72/75/85Hz, • SUN® video mode • • Certifications 800 X 600 @ 56/60/72/75/85Hz, 1024 X 768 @ 60/70/75/85Hz, • 1152 X 864 @ 60/75Hz, • 1280 X 1024 @ 60Hz, • 1600 X 1200 @ 60Hz sUL/CUL, FCC Class A, CB, CE Class A and VCCI Class A Support
Appendix A: Specifications Resolutions 720x400 @70 Hz 1024x768 @75 Hz 1280x1024 @85 Hz 720x400 @84 Hz 1024x768 @85 Hz 1600x1200 @60 Hz Note: Composite Sync and Sync-on-Green video require an additional adapter. Supported Keyboard Languages The KX II-101 provides keyboard support for the languages listed in the following table. 224 Language Regions Keyboard layout US English United States of America and most of English-speaking countries: for example, Canada, Australia, and New Zealand.
Appendix A: Specifications Language Regions Keyboard layout Italian Italy Italian Spanish Spain and most Spanish speaking countries Spanish Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Client™ and Multi-Platform Client (MPC): Client OS Virtual media (VM) support on client Windows XP® Yes Windows 2000 SP4® Yes Windows Vista® Yes Red Hat® Linux 9.0 Yes.
Appendix A: Specifications Certified Modems • US Robotics 56K 5686E • ZOOM v90 • ZOOM v92 • US Robotics Sportster 56K • US Robotics Courier 56K Connectors Interface type Length Inches Centimeters Video 15” 38 cm Integrated cable PS/2 15” 38 cm Integrated cable MiniUSB to USB(M) 17.7” 45 cm Cable for USB MiniDin9(M) to DB9(F) 72” 182 cm Cable for serial DKX2-101-LPKVMC 3.9" 10 cm Cable for local port integration DKX2-101-SPDUC 70.
Appendix A: Specifications Port Description HTTP, Port 80 All requests received by the KX II-101 via HTTP (port 80) are automatically forwarded to HTTPS for complete security. The KX II-101 responds to Port 80 for user convenience, relieving users from having to explicitly type in the URL field to access the KX II-101, while still preserving complete security.
Appendix A: Specifications Network Speed Settings KX II-101 network speed setting Network switch port setting Auto 100/Full Auto Highest Available Speed 100/Full KX II-101: 100/Full KX II-101: 100/Half 100/Full Switch: 100/Half Switch: 100/Full 100/Half 100/Half 100/Half KX II-101: 100/Full KX II-101: 100/Half 100/Half Switch: 100/Half 10/Full KX II-101: 10/Half Switch: 10/Full 10/Half 10/Half 10/Half 10/Half Switch: 10/Half Switch: 100/Full 100/Half 10/Full KX II-101: 10/Full No No Co
Appendix A: Specifications Per Ethernet specification, these should be “no communication,” however, note that the KX II-101 behavior deviates from expected behavior Note: For reliable network communication, configure the KX II-101 and the LAN switch to the same LAN Interface Speed and Duplex. For example, configure both the KX II-101 and LAN Switch to Autodetect (recommended) or set both to a fixed speed/duplex such as 100MB/s/Full.
Appendix A: Specifications 9 Pin Pinout 15 Pin local port 230 Pin Single 1 LP_RED 2 LP_GRN 3 LP_BLU 4 CN_LP_KB_SDA 5 CN_LP_KB_SCL 6 GND 7 AGND 8 AGND 9 +5 V 10 CN_LP_MS_SDA 11 CN_LP_MS_SCL 12 N/C 13 LP_HS 14 LP_VS 15 N/C
Appendix B Updating the LDAP Schema Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ........................................................231 Setting the Registry to Permit Write Operations to the Schema ...........232 Creating a New Attribute .......................................................................232 Adding Attributes to the Class ...............................................................
Appendix B: Updating the LDAP Schema Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to the schema, you must set a registry entry that permits schema updates. To permit write operations to the schema: 1. Right-click the Active Directory Schema root node in the left pane of the window and then click Operations Master. The Change Schema Master dialog appears. 2. Select the "Schema can be modified on this Domain Controller" checkbox. Optional 3. Click OK.
Appendix B: Updating the LDAP Schema 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create New Attribute dialog appears. 4. Type rciusergroup in the Common Name field. 5. Type rciusergroup in the LDAP Display Name field. 6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field. 7. Type a meaningful description in the Description field. 8. Click the Syntax drop-down arrow and choose Case Insensitive String from the list. 9.
Appendix B: Updating the LDAP Schema 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu. The user Properties dialog appears. 4. Click the Attributes tab to open it. 5. Click Add.
Appendix B: Updating the LDAP Schema 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dialog. 8. Click OK in the User Properties dialog. Updating the Schema Cache To update the schema cache: 1. Right-click Active Directory Schema in the left pane of the window and select Reload the Schema. 2. Minimize the Active Directory Schema MMC (Microsoft Management Console) console.
Appendix B: Updating the LDAP Schema 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window opens. 4. Open the Domain.
Appendix B: Updating the LDAP Schema 5. In the left pane of the window, select the CN=Users folder. 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name and select Properties.
Appendix B: Updating the LDAP Schema 7. Click the Attribute Editor tab if it is not already open. Choose rciusergroup from the Attributes list. 8. Click Edit. The String Attribute Editor dialog appears. 9. Type the user group (created in the KX II-101) in the Edit Attribute field. 10. Click OK.
Appendix C AC-DC Adapter and Rack Mount The KX II-101 device can be mounted vertically or horizontally, facing the front or the rear, on either side of a server rack. Use the brackets and screws included with the KX II-101 kit. In This Chapter AC-DC Adapter Clip Fitting....................................................................239 Bracket Installation ................................................................................
Appendix C: AC-DC Adapter and Rack Mount Diagram key UK clip Remove the Attachment Cover from AC-DC Power Adapter Diagram key AC/DC power adaptor Attachment cover. Push to remove.
Appendix C: AC-DC Adapter and Rack Mount Attach the Clip to AC-DC Power Adapter Diagram key Australian clip EU clip UK clip Power adaptor Bracket Installation 1. Remove the screws from the KX II-101.
Appendix C: AC-DC Adapter and Rack Mount 2. Slide the left and right panels off the KX II-101.
Appendix C: AC-DC Adapter and Rack Mount KX II-101 Bracket Parts Diagram key U bracket L bracket Attach the Brackets to KX II-101 for Horizontal Mount 1. Attach the U bracket to the L bracket using the included screws. Adjust bracket placement before tightening screws. 2. Mount the U and L bracket assembly to the rack with rack-mount screws (provided by the rack manufacturer). 3. Slide the KX II-101 into the U bracket with the KVM harness facing towards the target.
Appendix C: AC-DC Adapter and Rack Mount This image illustrates mounting the KX II-101 on the left. To mount the KX II-101 on the right, follow these directions but attach brackets to the right side of the KX II-101. Diagram key KX II-101 U bracket L bracket Screws Mounting hole Latch lever Attach the Brackets to KX II-101 for Vertical Mount 1. Attach the U bracket to the L bracket using the included screws. Adjust bracket placement before tightening screws.
Appendix C: AC-DC Adapter and Rack Mount 2. Mount the U and L bracket assembly to the rack with rack-mount screws (provided by the rack manufacturer). 3. Slide the KX II-101 device into the U bracket with the KVM harness facing towards the target. Pull and release the latch lever to lock the KX II-101 device into the U bracket.
Appendix D Informational Notes In This Chapter Java Runtime Environment (JRE) .........................................................246 Keyboard, Video and Mouse Notes.......................................................246 Java Runtime Environment (JRE) Important: It is recommended that you disable Java caching and clear the Java cache. Please refer to your Java documentation or the KVM and Serial Access Clients User Guide for more information.
Appendix D: Informational Notes Sun Keyboard Key Support Limitations The following keys on Sun keyboards are not supported by KX II-101: Sun key Local port key combination Again Ctrl+ Alt +F2 Props Ctrl + Alt +F3 Undo Ctrl + Alt +F4 Stop A Break a Front Ctrl + Alt + F5 Copy Ctrl + Alt + F6 Open Ctrl + Alt + F7 Find Ctrl + Alt + F9 Cut Ctrl + Alt + F10 Paste Ctrl + Alt + F8 Mute Ctrl + Alt + F12 Compose Ctrl+ Alt + KPAD * Vol + Ctrl + Alt + KPAD + Vol - Ctrl + Alt + KPAD - Stop
Appendix D: Informational Notes Keyboard Configuration to use Dell Dimension 2400– BIOS A05 Set the Host Interface to PS/2 on the Keyboard/Mouse Setup page. See Keyboard/Mouse Setup (on page 143). Dell Optiplex 170L PS/2 plus a PS/2-to-USB-adapter. - BIOS A07 Set the Host Interface to PS/2 on the Keyboard/Mouse Setup page. See Keyboard/Mouse Setup (on page 143).
Appendix D: Informational Notes Windows 2000 and 2003 Server Keyboard Limitations Due to an operating system limitation, the following keyboard combinations do not work with a US-International keyboard layout when using Windows 2000 and Windows 2003 servers. • Right Alt+D • Right Alt+I • Right Alt+L Note: Right Alt may be labeled as AltGr on keyboards that specifically have US/International markings on the keys.
Index 9 9 Pin Pinout • 230 A Absolute Mouse Mode • 54, 92 Accessing the KX II-101 Using the CLI • 211 AC-DC Adapter and Rack Mount • 6, 239 AC-DC Adapter Clip Fitting • 239 Adding a New User • 124, 125 Adding a New User Group • 118, 124 Adding Attributes to the Class • 233 Adding, Deleting, and Editing Favorites • 39 Admin Port • 23, 29, 144 Admin Port Pinout Information • 229 Administration Features • 5 Administrative Functions • 99 Advanced USB Connection Settings • 168 Analog KVM Switch • 1, 144, 162 Ap
Index D Date/Time Settings • 148 Debug • 215, 216 Default Logon Information • 9 Device Diagnostics • 208 Device Information • 196 Device Management • 27, 138 Device Ports in the Navigator • 62 Device Services • 141, 211 Devices in the MPC Navigator • 62 Diagnostics • 202, 215 Disconnecting a KVM Target Server • 43 Disconnecting Virtual Media • 115 Discovering Raritan Devices on the KX II-101 Subnet • 39 Discovering Raritan Devices on the Local Subnet • 37 E Editing rciusergroup Attributes for User Members
Index Modifying an Existing User Group • 123 Modifying and Removing Keyboard Macros • 48, 86 Mounting • 6 Mouse Modes • 12 Mouse Options • 52, 91, 100 Mouse Pointer Synchronization • 53 Mouse Synchronization Options • 92 MPC Broadcast Port • 104 MPC Connected Server(s) Toolbar • 68 MPC Connection Properties • 94 MPC Interface • 60 MPC Navigator Tabs • 64 MPC Scaling • 73 MPC Status Bar • 69 MPC Target Screen Resolution Mode • 71 Multi-Platform Client (MPC) • 41, 60 Multi-Platform Client Interface • 41 N N
Index Single Cursor Mode/Dual Cursor Mode • 91 Single Mouse Cursor • 56 Specifications • 1, 222 Specifying a Keyboard Type in MPC • 88 SSH Access from a UNIX/Linux Workstation • 212 SSH Access from a Windows PC • 211 SSH Connection to the KX II-101 • 211 Standard Mouse Mode • 54, 92, 94 Standard Toolbar • 65 Step 1 Configure the Target Server • 9, 10 Step 2 Configure Network Firewall Settings • 9, 16 Step 3 Connect the KX II-101 • 9, 17 Step 4 Configure the KX II-101 • 9, 24 Strong Passwords • 137, 184, 18
U.S./Canada/Latin America Monday - Friday 8 a.m. - 8 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then Press 1 For CommandCenter Secure Gateway: Press 6, then Press 2 Fax: 732-764-8887 Email for CommandCenter NOC: tech-ccnoc@raritan.com Email for all other products: tech@raritan.com China Europe Europe Monday - Friday 8:30 a.m. - 5 p.m. GMT+1 CET Phone: +31-10-2844040 Email: tech.europe@raritan.com United Kingdom Monday - Friday 8:30 a.m. to 5 p.m.