KX II-101
User Guide
2.0.20
Copyright © 2008 Raritan, Inc.
KX2101-v2.20-0B-E
July 2008
255-62-4031-00
This document contains proprietary information that is protected by copyright. All rights reserved. No
part of this document may be photocopied, reproduced, or translated into another language without
express prior written consent of Raritan, Inc.
© Copyright 2008 Raritan, Inc., CommandCenter®, Dominion®, Paragon® and the Raritan company
logo are trademarks or registered trademarks of Raritan, Inc. All rights reserved. Java® is a
registered trademark of Sun Microsystems, Inc. Internet Explorer® is a registered trademark of
Microsoft Corporation. Netscape® and Netscape Navigator® are registered trademarks of Netscape
Communication Corporation. All other trademarks or registered trademarks are the property of their
respective holders.
FCC Information
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a commercial installation. This equipment generates, uses, and can
radiate radio frequency energy and if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. Operation of this equipment in a residential
environment may cause harmful interference.
VCCI Information (Japan)
Raritan is not responsible for damage to this product resulting from accident, disaster, misuse, abuse,
non-Raritan modification of the product, or other events outside of Raritan's reasonable control or not
arising under normal operating conditions.
C
UL
US
LI STED
1F61
I .T.E .
Contents
Chapter 1 Introduction
1
What's New in the User Guide....................................................................................................... 1
KX II-101 Overview ........................................................................................................................ 2
Product Photos .............................................................................................................................. 4
Product Features ........................................................................................................................... 5
Interfaces ............................................................................................................................. 5
Network Configuration .........................................................................................................5
System Management Features ........................................................................................... 5
Administration Features.......................................................................................................5
User Features ...................................................................................................................... 6
Power................................................................................................................................... 6
Video Resolution ................................................................................................................. 6
Mounting .............................................................................................................................. 6
Terminology ................................................................................................................................... 6
Package Contents.......................................................................................................................... 7
Optional Accessories ..................................................................................................................... 7
User Guide..................................................................................................................................... 7
Related Documentation ....................................................................................................... 8
Chapter 2 Installation and Configuration
9
Overview ........................................................................................................................................ 9
Default Logon Information ............................................................................................................. 9
Getting Started............................................................................................................................. 10
Step 1: Configure the Target Server..................................................................................10
Step 2: Configure Network Firewall Settings.....................................................................16
Step 3: Connect the KX II-101...........................................................................................17
Step 4: Configure the KX II-101.........................................................................................24
Chapter 3 Working with Target Servers
32
Interfaces ..................................................................................................................................... 32
KX II-101 Remote Console Interface.................................................................................32
Multi-Platform Client Interface ...........................................................................................41
Virtual KVM Client........................................................................................................................ 41
Overview............................................................................................................................ 41
Connecting to a KVM Target Server .................................................................................41
VKC Toolbar ...................................................................................................................... 42
Power Controlling a KVM Target Server ...........................................................................42
Disconnecting a KVM Target Server .................................................................................43
VKC Connection Properties...............................................................................................43
Connection Information .....................................................................................................45
iii
Contents
Keyboard Options..............................................................................................................46
Video Properties ................................................................................................................ 49
Mouse Options................................................................................................................... 52
VKC Virtual Media .............................................................................................................56
Tool Options ...................................................................................................................... 57
View Options...................................................................................................................... 59
Help Options ...................................................................................................................... 59
Multi-Platform Client (MPC) ......................................................................................................... 60
Requirements and Installation ...........................................................................................60
Operation ........................................................................................................................... 60
Administrative Functions ...................................................................................................99
Chapter 4: Virtual Media
106
Overview ....................................................................................................................................107
Prerequisites for Using Virtual Media ........................................................................................110
File Server Setup (File Server ISO Images Only)......................................................................111
Connecting to Virtual Media.......................................................................................................113
Local Drives .....................................................................................................................113
Conditions when Read/Write is Not Available .................................................................114
CD-ROM/DVD-ROM/ISO Images....................................................................................114
Disconnecting Virtual Media ......................................................................................................115
Chapter 5 User Management
116
User Groups...............................................................................................................................116
User Group List................................................................................................................117
Relationship Between Users and Groups .......................................................................117
Adding a New User Group...............................................................................................118
Modifying an Existing User Group ...................................................................................123
Users..........................................................................................................................................123
User List...........................................................................................................................124
Adding a New User..........................................................................................................124
Modifying an Existing User ..............................................................................................125
Blocking and Unblocking Users.......................................................................................125
Authentication Settings ..............................................................................................................126
Implementing LDAP/LDAPS Remote Authentication ......................................................127
Returning User Group Information from Active Directory Server ....................................129
Implementing RADIUS Remote Authentication...............................................................130
Returning User Group Information via RADIUS ..............................................................133
RADIUS Communication Exchange Specifications.........................................................133
User Authentication Process ...........................................................................................135
Changing a Password................................................................................................................137
Chapter 6 Device Management
138
Network Settings........................................................................................................................138
Network Basic Settings....................................................................................................139
LAN Interface Settings.....................................................................................................140
iv
Contents
Device Services .........................................................................................................................141
Keyboard/Mouse Setup .............................................................................................................143
Serial Port Settings ....................................................................................................................144
Admin Port .......................................................................................................................144
Raritan Power Strip Control.............................................................................................145
Modem.............................................................................................................................146
Date/Time Settings ....................................................................................................................148
Event Management....................................................................................................................149
Configuring Event Management - Settings......................................................................150
Event Management - Destinations ..................................................................................151
Port Configuration ......................................................................................................................154
Managing KVM Target Servers (Port Page)....................................................................155
Power Control ..................................................................................................................157
v
Contents
Analog KVM Switch ...................................................................................................................162
Resetting the KX II-101 Using the Reset Button .......................................................................163
Chapter 7 Managing USB Connections
165
Overview ....................................................................................................................................166
Basic USB Connection Settings ................................................................................................166
Advanced USB Connection Settings .........................................................................................168
Known USB Profiles...................................................................................................................169
Chapter 8 Security Management
184
Security Settings ........................................................................................................................184
Logon Limitations.......................................................................................................................185
Strong Passwords......................................................................................................................186
User Blocking.............................................................................................................................188
Encryption & Share ....................................................................................................................190
Checking Your Browser for AES Encryption .............................................................................192
IP Access Control ......................................................................................................................193
Chapter 9 Maintenance
195
Audit Log....................................................................................................................................195
Device Information .....................................................................................................................196
Backup and Restore .................................................................................................................. 197
Upgrading Firmware ..................................................................................................................198
Upgrade History .........................................................................................................................200
Rebooting...................................................................................................................................201
Chapter 10 Diagnostics
202
Network Interface Page .............................................................................................................202
Network Statistics Page.............................................................................................................203
Ping Host Page ..........................................................................................................................206
Trace Route to Host Page .........................................................................................................206
Device Diagnostics ....................................................................................................................208
Chapter 11 Command Line Interface (CLI)
210
Overview ....................................................................................................................................210
Accessing the KX II-101 Using the CLI......................................................................................211
SSH Connection to the KX II-101 ..............................................................................................211
SSH Access from a Windows PC....................................................................................211
SSH Access from a UNIX/Linux Workstation ..................................................................212
Logging On ................................................................................................................................212
Navigation of the CLI .................................................................................................................212
CLI Prompts.....................................................................................................................213
Completion of Commands ...............................................................................................213
vi
Contents
CLI Syntax -Tips and Shortcuts.......................................................................................214
Common Commands for All Command Line Interface Levels ........................................214
CLI Commands ..........................................................................................................................214
Diagnostics ......................................................................................................................215
Configuration ...................................................................................................................216
Listports Command .........................................................................................................218
Userlist Command ...........................................................................................................218
Chapter 12 CC Unmanage
219
Overview ....................................................................................................................................219
Removing a KX II-101 from CC-SG Management.....................................................................220
Using CC-SG in Proxy Mode .....................................................................................................221
Appendix A Specifications
222
KX II-101 Specifications.............................................................................................................222
Supported Video Resolutions ....................................................................................................223
Supported Keyboard Languages ...............................................................................................224
Supported Operating Systems (Clients) ....................................................................................225
Supported Browsers ..................................................................................................................225
Certified Modems.......................................................................................................................226
Connectors.................................................................................................................................226
TCP and UDP Ports Used .........................................................................................................226
Network Speed Settings ............................................................................................................228
Admin Port Pinout Information...................................................................................................229
9 Pin Pinout................................................................................................................................230
Appendix B Updating the LDAP Schema
231
Returning User Group Information.............................................................................................231
From LDAP ......................................................................................................................231
From Microsoft Active Directory ......................................................................................231
Setting the Registry to Permit Write Operations to the Schema ...............................................232
Creating a New Attribute............................................................................................................232
Adding Attributes to the Class ...................................................................................................233
Updating the Schema Cache.....................................................................................................235
Editing rciusergroup Attributes for User Members.....................................................................235
Appendix C AC-DC Adapter and Rack Mount
239
AC-DC Adapter Clip Fitting........................................................................................................239
Identify the Clip Type.......................................................................................................239
Remove the Attachment Cover from AC-DC Power Adapter..........................................240
Attach the Clip to AC-DC Power Adapter........................................................................241
Bracket Installation.....................................................................................................................241
KX II-101 Bracket Parts ...................................................................................................243
Attach the Brackets to KX II-101 for Horizontal Mount....................................................243
vii
Contents
Attach the Brackets to KX II-101 for Vertical Mount ........................................................244
Appendix D Informational Notes
246
Java Runtime Environment (JRE) .............................................................................................246
Keyboard, Video and Mouse Notes ...........................................................................................246
Sun Blade™ Video, Keyboard, and Mouse Support Limitation.......................................246
Sun Keyboard Key Support Limitations...........................................................................247
BIOS Access Limitation from a Local Keyboard..............................................................247
HP UX RX 1600 Keyboard and Mouse Configuration.....................................................248
Compaq Alpha and IBM P Server Mouse Mode Limitation.............................................248
Windows 2000 and 2003 Server Keyboard Limitations...................................................249
Index
viii
251
Chapter 1
Introduction
In This Chapter
What's New in the User Guide ..................................................................1
KX II-101 Overview....................................................................................2
Product Photos ..........................................................................................4
Product Features .......................................................................................5
Terminology...............................................................................................6
Package Contents .....................................................................................7
Optional Accessories.................................................................................7
User Guide ................................................................................................7
What's New in the User Guide
The following sections of the user guide have changed or information
has been added to based on enhancements and changes to the
equipment and/or user documentation.
•
Managing USB Connections (formerly managing target server
settings). See Managing USB Connections (on page 165).
•
Analog KVM Switch configuration. See Analog KVM Switch (on
page 162).
•
Pinout and supported operating system information has been added
to the user guide. See Specifications (on page 222).
Please see the release notes for a more detailed explanation of the
changes applied to this version of the user guide.
1
Chapter 1: Introduction
KX II-101 Overview
Thank you for purchasing the Dominion the KX II-101. The KX II-101
provides a single keyboard, video, and mouse (KVM) port for connection
to a target server and a single IP port for connection to an IP network.
Within the KX II-101 device, KVM signals from your server are converted
to IP format and compressed for transmission over an IP network.
The KX II-101 dongle form-factor makes it easy to install near the target
server, and each individual KX II-101 device has its own IP
address. Each device is powered via Power-over-Ethernet (PoE) or an
external AC-DC power pack.
The KX II-101 can operate as a standalone appliance or integrated into a
single logical solution, along with other Raritan access products, using
Raritan's CommandCenter Secure Gateway (CC-SG) management unit.
2
Chapter 1: Introduction
Diagram key
KX II-101
LAN
Windows, Linux, and Sun servers
TCP/IP
LAN
Remote (network) access
3
Chapter 1: Introduction
Product Photos
Diagram key
KX II-101
Mini-USB to USB cable
Optional local port cable
4
Chapter 1: Introduction
Product Features
Interfaces
•
Integrated PS/2 KVM connection
•
USB connection for control and virtual media
•
Serial Admin port for initial device configuration and diagnostics, as
well as use with an external modem access and Raritan power strip
control
•
Ethernet LAN port supporting 10/100-base-T autosensing, full duplex
•
LED network activity indicator and status
•
Backlit LED power ON indicator
Network Configuration
•
DHCP or static IP device address
System Management Features
•
Firmware upgradable over Ethernet
•
Failsafe firmware upgrade capability
•
Clock that can be set manually or via synchronization with Network
Time Protocol (NTP/SNTP)
•
Local, timestamped, administrator activity log SNMP V2 agent that
can be disabled by the administrator
•
Support for RADIUS and LDAP/LDAPS authentication protocols
Administration Features
•
Web-based management
•
LDAP, Active Directory, RADIUS, or internal authentication and
authorization
•
DHCP or fixed IP addressing
•
Integration with Raritan's CommandCenter Secure Gateway (CCSG) management unit
5
Chapter 1: Introduction
User Features
•
Web-based access through common browsers
•
Intuitive graphical user interface (GUI)
•
PC Share mode, which enables more than one remote user
•
TCP communication
•
English user interface
•
Virtual media access
•
Absolute Mouse Synchronization™
•
Plug-and-play
•
256-bit encryption of complete KVM signal, including video and
virtual media
Power
•
Powered via Class 2 Power over Ethernet (PoE) provision
•
Alternately powered by an external AC/DC power pack
Video Resolution
•
Up to 1600X1200 at up to 60 Hz resolution
Mounting
•
Rack mounting bracket
See AC-DC Adapter and Rack Mount (on page 239).
Terminology
6
Term
Description
Target Server
Server to be accessed remotely via the KX II-101
and its connected KVM configuration.
Remote PC
A Windows, Linux, or Apple Macintosh® computer
used to access and control target servers
connected to the KX II-101.
Admin serial
port
Use the Admin serial port to connect to the serial
port on the PC using the included Mini-DIN to DB9
cable. Then use a standard emulation software
package (for example, HyperTerminal) to access
the Admin serial port. The Admin serial port is used
for network configuration.
Chapter 1: Introduction
Term
Description
Local User port
Enables a user in immediate proximity to the target
server to use the native keyboard and mouse
without unplugging the KX II-101.
Virtual media
Enables a KVM target server to remotely access
media from client PC and network file servers.
Package Contents
Each KX II-101 device ships with:
•
KX II-101 - KVM over IP
•
USB Type A to Type B miniconnector
•
Power Adaptor Kit - AC-DC 6VDC
•
Three additional power outlet plugs for worldwide use
•
Mini-DIN to DB9 serial cable
•
Mounting bracket kit
•
CD containing the Raritan User Guide & Quick Setup Guide
•
Printed Quick Setup Guide
•
Printed application release notes (if applicable)
•
Printed technical notes (if applicable)
Optional Accessories
•
DB15 to PS/2 and VGA Local User Cable
See Connectors (on page 226).
User Guide
The KX II-101 User Guide provides information on how to install, set up,
and configure the KX II-101. It also includes information on accessing
target servers and power strips, using virtual media, managing users and
security, and maintaining and diagnosing the KX II-101.
7
Chapter 1: Introduction
Related Documentation
The KX II-101 User Guide is accompanied by a KX II-101 Quick Setup
Guide, which can be found on the CD included with the device or on the
Support page of Raritan's website (www.raritan.com). Installation
requirements and instructions for client applications used with the KX II101 can be found in the KVM and Serial Client User Guide, also found
on the Raritan website. Where applicable, specific client functions used
with the KX II-101 are included in this user guide.
8
Chapter 2
Installation and Configuration
In This Chapter
Overview....................................................................................................9
Default Logon Information .........................................................................9
Getting Started ........................................................................................10
Overview
This chapter describes how to install and configure the KX II-101.
Installation and configuration consists of the following steps:
•
Step 1: Configure the Target Server (on page 10)
•
Step 2: Configure Network Firewall Settings (on page 16)
•
Step 3: Connect the KX II-101 (on page 17)
•
Step 4: Configure the KX II-101 (on page 24)
Before installing the KX II-101, in order to ensure optimum performance,
first configure the target server you want to access via the KX II-101.
Note that the following configuration requirements apply only to the
target server, not to the computers that you will be using to access the
KX II-101 remotely.
Default Logon Information
Default
Value
User name
The default user name is admin. This user has
administrative privileges.
Password
The default password is raritan.
Passwords are case sensitive and must be entered
in the exact case combination in which they were
created. For example, the default password raritan
must be entered entirely in lowercase letters.
The first time you start the KX II-101, you are
required to change the default password.
IP address
The KX II-101 ships with the default IP address of
192.168.0.192.
Important: For backup and business continuity purposes, it is
strongly recommended that you create a backup administrator
user name and password and keep that information in a secure
location.
9
Chapter 2: Installation and Configuration
Getting Started
KX II-101 users with Microsoft Internet Explorer version 6 or Windows
2000 must upgrade to Service Pack 4 (SP4) or higher.
The KX II-101 ships with a static default IP address. On a network
without a DHCP server, you must configure a new static IP address, net
mask, and gateway address using either the KX II-101 serial admin
console or the KX II-101 Remote Console.
See Assigning an IP Address (on page 25) for information on assigning
an IP address to the KX II-101 using the Remote Console. See
Configure the KX II-101 Using a Terminal Emulation Program
(Optional) (on page 29) for information on setting an IP address using
the Serial Admin Console.
Step 1: Configure the Target Server
Before installing the KX II-101, first configure the target server you want
to access via the KX II-101 in order to ensure optimum performance.
Note that the following configuration requirements apply only to the
target server, not to the computers that you will be using to access the
KX II-101 remotely.
Setting the Server Video Resolution
For optimal bandwidth efficiency and video performance, a target server
running a graphical user interface such as Windows, X-Windows,
Solaris, and KDE should be configured with desktop backgrounds set to
a predominantly solid, light-colored graphic. Backgrounds featuring
photos or complex gradients should be avoided.
Ensure that the server's video resolution and refresh rate are supported
by the KX II-101 and that the signal is non-interlaced. The KX II-101
supports the following video resolutions:
Resolutions
10
640x350 @70 Hz
720x400 @85 Hz
1024x768 @90 Hz
640x350 @85 Hz
800x600 @56 Hz
1024x768 @100 Hz
640x400 @56 Hz
800x600 @60 Hz
1152x864 @60 Hz
640x400 @84 Hz
800x600 @70 Hz
1152x864 @70 Hz
640x400 @85 Hz
800x600 @72 Hz
1152x864 @75 Hz
640x480 @60 Hz
800x600 @75 Hz
1152x864 @85 Hz
Chapter 2: Installation and Configuration
Resolutions
640x480 @66.6 Hz
800x600 @85 Hz
1152x870 @75.1 Hz
640x480 @72 Hz
800x600 @90 Hz
1152x900 @66 Hz
640x480 @75 Hz
800x600 @100 Hz
1152x900 @76 Hz
640x480 @85 Hz
832x624 @75.1 Hz
1280x960 @60 Hz
640x480 @90 Hz
1024x768 @60 Hz
1280x960 @85 Hz
640x480 @100 Hz
1024x768 @70 Hz
1280x1024 @60 Hz
640x480 @120 Hz
1024x768 @72 Hz
1280x1024 @75 Hz
720x400 @70 Hz
1024x768 @75 Hz
1280x1024 @85 Hz
720x400 @84 Hz
1024x768 @85 Hz
1600x1200 @60 Hz
Sun™ Video Resolution
Sun systems have two resolution settings, a command line resolution
and a GUI resolution. For information about the resolutions supported by
the KX II-101, see Setting the Server Video Resolution (on page 10).
Note: If none of the supported resolutions work, make sure the monitor is
multisync. Some monitors will not work with an H&V sync.
Command Line Resolution
To check the command line resolution:
1. Run the following command as the root: # eeprom output-device
To change the command line resolution:
1. Run the following command: # eeprom outputdevice=screen:r1024x768x75 where 1024x768x75 is any resolution
that the KX II-101 supports.
2. Restart the computer.
GUI Resolution/32 Bit
To check the GUI resolution on 32 bit cards:
1. Run the following command: # /usr/sbin/pgxconfig –prconf
To change the GUI resolution on 32 bit cards:
1. Run the following command: # /usr/sbin/pgxconfig –
res1024x768x75 where 1024x768x75 is any resolution that the KX II101 supports.
2. Restart the computer.
11
Chapter 2: Installation and Configuration
GUI Resolution/64 Bit
To check the GUI resolution on 64 bit cards:
1. Run the following command: # /usr/sbin/m64config –prconf
To change the resolution on 64 bit cards:
1. Run the following command: # /usr/sbin/m64config –
res1024x768x75 where 1024x768x75 is any resolution that the KX II101 supports.
2. Restart the computer.
GUI Resolution/Solaris 8
To check the resolution on Solaris 8 for 32 bit and 64 bit cards:
1. Run the following command: # /usr/sbin/fbconfig –prconf
To change the resolution on Solaris 8 for 32 and 64 bit cards:
1. Run the following command: # /usr/sbin/fbconfig –res1024x768x75
where 1024x768x75 is any resolution that the KX II-101 supports.
2. Restart the computer.
Mouse Modes
The KX II-101 operates in several mouse modes: Absolute Mouse
Synchronization™, Intelligent Mouse mode (do not use an animated
mouse), and Standard Mouse mode.
Mouse parameters do not have to be altered for Absolute Mouse
Synchronization. For both the Standard and Intelligent Mouse modes,
mouse parameters must be set to specific values, which are described in
this section.
Mouse configurations will vary on different target operating systems.
Consult your OS documentation for additional details.
Windows 2000® Settings
To configure the mouse:
1. Choose Start > Control Panel > Mouse.
2. On the Motion tab, set the acceleration to None and set the mouse
motion speed setting to exactly the middle speed. Click OK.
To disable transition effects:
1. Select the Display option from Control Panel.
2. On the Effects tab, deselect the Use the following transition effect for
menus and tooltips checkbox. Click OK.
12
Chapter 2: Installation and Configuration
Windows XP®/Windows 2003® Settings
To configure the mouse:
1. Select Start > Control Panel > Mouse.
2. On the Pointer Options tab in the Motion group, set the mouse
motion speed setting to exactly the middle speed and deselect the
Enhanced pointer precision checkbox. Click OK.
To disable transition effects:
1. Select Start > Control Panel > Display.
2. On the Appearance tab, click the Effects button.
3. Deselect the Use the following transition effect for menus and
tooltips checkbox. Click OK.
Windows 2000 and XP Setting Notes
For a target server running Windows 2000 or XP, you may want to create
a username to be used only for remote connections through the KX II101. This allows you to keep the Target Server's slow mouse pointer
motion/acceleration settings exclusive to the KX II-101 connection only,
as other users may desire faster mouse speeds.
Windows 2000 or XP login screens revert to preset mouse parameters
that differ from those suggested for optimal KX II-101 performance.
Therefore, mouse sync will not be optimal at these screens. If you are
comfortable adjusting the registry on Windows target servers, you can
obtain better KX II-101 mouse synchronization at login screens by using
the Windows registry editor to change the following settings:
•
Default user mouse motion speed = 0; mouse threshold 1= 0; mouse
threshold 2 = 0.
Windows Vista® Settings
To configure the mouse:
1. Select Start > Settings > Control Panel > Mouse.
2. On the Pointer Options tab in the Motion group, set the mouse
motion speed setting to exactly the middle speed and deselect the
Enhanced pointer precision option. Click OK.
To disable animation and fade effects:
1. Select Start > Settings >Control Panel > System > Advanced system
settings. The System Properties dialog appears.
2. Click the Advanced tab and click the Settings button in the
Performance group. The Performance Options dialog appears.
3. Under Custom options, deselect the following checkboxes:
13
Chapter 2: Installation and Configuration
ƒ
Animate controls and elements inside windows
ƒ
Animate windows when minimizing and maximizing
ƒ
Fade or slide menus into view
ƒ
Fade or slide ToolTips into view
ƒ
Fade out menu items after clicking
4. Click OK.
Linux® Settings
On a target server running Linux graphical interfaces, set the mouse
acceleration to exactly 1 and set threshold to exactly 1. Enter the
command xset mouse 1 1.
Ensure that a target server running Linux is using a resolution supported
by the KX II-101 at a standard VESA resolution and refresh rate. A Linux
target server should also be set so the blanking times are within +/- 40%
of VESA standard values.
To check for these parameters:
1. Go to the Xfree86 Configuration file XF86Config.
2. Using a text editor, disable all non-KX II-101 supported resolutions.
3. Disable the virtual desktop feature, which is not supported by the KX
II-101.
4. Check blanking times (+/- 40% of VESA standard).
5. Restart the computer.
Note: In many Linux graphical environments, the command Ctrl+Alt+ +
(plus sign) changes the video resolution, scrolling through all available
resolutions that remain enabled in the XF86Config file.
Sun® Solaris™ Settings
A Solaris target server must be configured to one of the display
resolutions supported by the KX II-101. The most popular supported
resolutions for Sun machines are:
Resolution
1024x768@60Hz
1024x768@70Hz
1024x768@75Hz
1024x768@85Hz
1280x1024@60Hz
14
Chapter 2: Installation and Configuration
Set the mouse acceleration value to exactly 1 and the threshold to
exactly 1. A target server running the Solaris operating system must
output VGA video (H-and-V sync, not composite sync). Set this at the
graphical user interface or with the command line xset mouse a t where
a is the acceleration and t is the threshold.
To change your Sun video card output from composite sync to
the non-default VGA output:
1. Issue the Stop+A command to drop to bootprom mode.
2. Issue the #eeprom output-device=screen:r1024x768x75 command to
change the output resolution.
3. Issue the boot command to reboot the server.
Alternatively, contact your Raritan representative to purchase a video
output adapter. Suns with composite sync output require APSSUN II
Raritan guardian for use with the KX II-101. HD15 Suns with separate
sync output require an APKMSUN Raritan guardian for use with the KX
II-101.
Apple Macintosh® Settings
Mac works with the KX II-101 'out of the box.' However, you must use
Absolute Mouse Synchronization and enable Absolute Mouse mode and
mouse scaling for Mac servers on the KX II-101 Port page.
To enable this setting:
1. Choose Device Settings > Port Configuration. The Port Configuration
Page opens.
2. Click the Port Name for the port you want to edit.
3. In the USB Connection Settings section, select the Enable Absolute
Mouse checkbox and the "Enable Absolute mouse scaling for MAC
server" checkbox. Click OK.
See Port Configuration (on page 154).
IBM AIX® Settings
1. Go to the Style Manager.
15
Chapter 2: Installation and Configuration
2. Click on Mouse Settings and set the Mouse Acceleration to 1.0 and
Threshold to 3.0.
Step 2: Configure Network Firewall Settings
To access the KX II-101 through a network firewall, your firewall must
allow communication on TCP Port 5000. Alternatively, the KX II-101 can
be configured to use a different TCP port of your own designation.
To take advantage of the KX II-101's web-access capabilities, the firewall
must allow inbound communication on TCP Port 443 - the standard TCP
port for HTTPS communication. To take advantage of the KX II-101's
redirection of HTTP requests to HTTPS (so that users may type the more
common, http://xxx.xxx.xxx.xxx, instead of https://xxx.xxx.xxx.xxx), the
firewall must also allow inbound communication on TCP Port 80 - the
standard TCP port for HTTP communication.
16
Chapter 2: Installation and Configuration
Step 3: Connect the KX II-101
The KX II-101 has the physical connections described in the diagram.
17
Chapter 2: Installation and Configuration
Diagram key
Admin port
Use to do one of the following:
•
Configure and manage the device with a
terminal emulation program on your PC.
•
Configure and manage a power strip.
•
Connect an external modem to dial into the
device.
Monitor and
PS/2 cable
Attached Monitor and PS/2 cable (see E).
Mini-USB
port
Use to connect the device to the target server
with the included USB cable if not using the
attached PS/2 cable. A USB connection must
be used to utilize the Absolute Mouse
Synchronization or virtual media features.
Power
indicator
Backlit LED power ON and boot-up indicator.
Provides feedback on the operating status of
the device.
Monitor and
PS/2 cable
Attached Monitor and PS/2 cable. Use to
connect the device to a monitor and to a target
server if not using the USB cable.
Power
connector
Connects the power supply if you are not using
a PoE (Power over Ethernet) LAN connection.
Local user
port
Use to connect a local keyboard, video, and
mouse directly to the target server using an
optional PS/2 cable.
Ethernet
LAN/PoE
port
Provides LAN connectivity and power if using a
PoE LAN connection.
Power
The KX II-101 can be powered with either the included standard AC
power pack or by PoE (Power over Ethernet).
•
For standard AC power, plug the included AC power adaptor kit into
the Power port and plug the other end into a nearby AC power outlet.
•
For PoE, attach a 10/100Mbps cable to the LAN port and plug the
other end into a PoE-provisioned LAN.
After the KX II-101 is powered ON, it goes through a boot-up sequence,
during which the blue Raritan-logo LED will blink for about 45
seconds. Upon successful boot-up, the back-lit LED remains lit.
18
Chapter 2: Installation and Configuration
Target Server
The KX II-101 can use either the included USB cable or integrated PS/2
cables to connect to the target server. Before connecting, configure your
target server's video to a supported resolution.
Note: For PS/2 configurations that require virtual media connectivity, the
USB connector is also necessary.
USB Configuration
To configure the KX II-101 for use with a USB target server:
1. Connect the mini-USB connector to the KX II-101 and the USB
connector to a USB port on the target server.
2. Use the attached video cable to connect the KX II-101 to the target
video port.
3. Use the optional PS/2 DKX2-101-LPKVMC cabling to attach only the
local video to the Local User port of the KX II-101. Optional
Note: The KX II-101 must be powered for the Local User port to
function.
19
Chapter 2: Installation and Configuration
Use USB cables to connect the keyboard and mouse directly to the
target server.
Diagram key
Target server
Included mini-USB to USB cable from the KX II-101 to the
target server
KX II-101
Local monitor, keyboard, and mouse
USB connection from the target server to mouse
20
Chapter 2: Installation and Configuration
Diagram key
USB connection from the target server to keyboard
Video connection to the local monitor (optional cable)
PS/2 Configuration
To configure the KX II-101 for use with a PS/2 target server:
1. Use the attached PS/2 keyboard, video, and mouse cabling to
connect the KX II-101 to the target server.
2. Use the PS/2 cabling to attach the local keyboard, video, and mouse
to the Local User port of the KX II-101.
Note: The KX II-101 must be powered for the Local User port to
function.
21
Chapter 2: Installation and Configuration
3. If you require Virtual Media (VM) connectivity, connect the mini-USB
connector to the KX II-101 and the USB connector to any USB port
on the target server.
Diagram key
Target server
Included mini-USB to USB connector from the KX II-101 to
the target server for Virtual Media connectivity
KX II-101
Local monitor, keyboard, and mouse
Integrated PS/2 keyboard, video, and mouse connections
from the KX II-101 to the target server
22
Chapter 2: Installation and Configuration
Diagram key
PS/2 connection from the KX II-101 to the mouse (optional
cable)
PS/2 connection from the KX II-101 to the keyboard
(optional cable)
Video connection to the local monitor (optional cable)
Network
Connect a standard Ethernet cable from the network port labeled LAN to
an Ethernet switch, hub, or router. The LAN LEDs that appear above the
Ethernet connection indicate Ethernet activity. The yellow one blinks
while the KX II-101 is in use, indicating IP traffic at 10 Mbps. The green
light indicates a 100 Mbps connection speed.
Admin Port
The Admin port enables you to perform configuration and setup for the
KX II-101 using a terminal emulation program like HyperTerminal. Plug
the min-DIN end of the included serial cable into the Admin port of the
KX II-101 and plug the DB9 end into a serial port on your PC or laptop.
The serial port communication settings should be configured to the
following:
•
115,200 Baud
•
8 data bits
•
1 stop bit
•
No parity
•
No flow control
See Configure the KX II-101 Using a Terminal Emulation Program
(Optional) (on page 29) for additional information on using a terminal
emulation program.
23
Chapter 2: Installation and Configuration
Local User Port
The KX II-101 is available with optional video and PS/2 cables (KX II101-LPKVMC) that enable you to attach a keyboard and mouse to the
target server through the Local User port. The Local User port serves as
a pass-through to the target server to which the KX II-101 is attached
and has no other purpose. The KX II-101 must be powered on to use the
Local User port.
For USB configurations, only the local video connects to the target server
at the Local User port. The keyboard and mouse connect directly to the
target server using USB ports.
Note: Only PS/2 host interface connectivity is supported on the Local
User port and you must restart the target server after connecting to the
KX II-101 using PS/2 connectors.
Step 4: Configure the KX II-101
The KX II-101 can be configured in two ways:
•
Using the web-based KX II-101 Remote Console, which requires the
device to have a network connection to your workstation.
•
Using a terminal emulation program like HyperTerminal, which
requires a direct connection from the device's Admin port to your
workstation. The cable for this connection is included with the KX II101.
This section describes both ways of configuring the KX II-101.
Configure the KX II-101 Using the Remote Console
The KX II-101 Remote Console is a web-based application that enables
you to configure the device prior to use and manage it after it has been
configured. Before configuring the KX II-101 using the Remote Console,
you must have both your workstation and the device connected to a
network.
You can also use a terminal emulation program to configure the KX II101. See Configure the KX II-101 Using a Terminal Emulation
Program (Optional) (on page 29).
Setting a New Password
When you first log into the Remote Console, you are prompted to set a
new password to replace the default. Then you can configure the KX II101.
1. Log into a workstation with network connectivity to your KX II-101
device.
24
Chapter 2: Installation and Configuration
2. Launch a supported web browser such as Internet Explorer (IE) or
Firefox.
3. In the address field of the browser, enter the default IP address of
the device: 192.168.0.192.
4. Press Enter. The login page opens.
5. Enter the user name admin and the password raritan.
6. Click Login. The Change Password page is displayed.
7. Type raritan in the Old Password field.
8. Type a new password in the New Password field and the Confirm
New Password field. Passwords can be up to 64 characters long and
can consist of English alphanumeric and printable special
characters.
9. Click Apply. You will receive confirmation that the password was
successfully changed.
10. Click OK. The Port Access page opens.
Assigning an IP Address
1. In the KX II-101 Remote Console, choose Device Settings >
Network. The Network Settings page opens.
2. In the Device Name field, specify a meaningful name for your KX II101 device. You can enter up to 16 alphanumeric and special
characters with no spaces.
3. Select the IP configuration from the IP auto configuration drop-down
list:
ƒ
None (Static IP) - This is the default and recommended option
because the KX II-101 is an infrastructure device and its IP
address should not change. This option requires that you
manually specify the network parameters.
25
Chapter 2: Installation and Configuration
ƒ
DHCP - With this option, network parameters are assigned by the
DHCP server each time the KX II-101 is booted.
Configuring Direct Port Access
To configure direct port access:
1. Choose Device Settings > Device Services. The Device Services
page opens.
2. Select the Enable Direct Port Access via URL checkbox.
3. Enable global TELNET or SSH access.
26
ƒ
Select the Enable TELNET Access checkbox to enable TELNET
access.
ƒ
Select the Enable SSH Access checkbox to enable SSH access.
Chapter 2: Installation and Configuration
4. Specify a valid TCP port for the selected access type. For example,
direct port access via Telnet TCP port can be configured as 7770.
5. Click OK.
See Device Management (on page 138) for more information.
Naming the Target Server
1. Attach the KX II-101 to the target server.
2. Choose Device Settings > Port Configuration. The Port Configuration
page opens.
3. Click the Port Name for the target server. The Port page opens.
4. Type a name, up to 32 alphanumeric and special characters.
27
Chapter 2: Installation and Configuration
5. Click OK.
Remote Authentication
Note to CC-SG Users
When the KX II-101 is controlled by CommandCenter Secure Gateway,
CC-SG authenticates users and groups.
For additional information about CC-SG authentication, see the
CommandCenter Secure Gateway User Guide, Administrator Guide,
or Deployment Guide, which can be downloaded from the Support
section of the Raritan website (www.raritan.com).
Supported Protocols
To simplify management of usernames and passwords, the KX II-101
provides the ability to forward authentication requests to an external
authentication server. Two external authentication protocols are
supported: LDAP/LDAPS and RADIUS.
28
Chapter 2: Installation and Configuration
Note on Microsoft Active Directory
Microsoft Active Directory uses the LDAP/LDAPS protocol natively, and
can function as an LDAP/LDAPS server and authentication source for
the KX II-101. If it has the IAS (Internet Authorization Server) component,
a Microsoft Active Directory server can also serve as a RADIUS
authentication source.
Create User Groups and Users
As part of the initial configuration, you must define user groups and users
in order for users to access the KX II-101.
The KX II-101 uses system-supplied default user groups and allows you
to create groups and specify the appropriate permissions to suit your
needs.
User names and passwords are required to gain access to the KX II-101.
This information is used to authenticate users attempting to access your
KX II-101.
See User Management (on page 116) for details on adding and editing
user groups and users.
Configure the KX II-101 Using a Terminal Emulation Program (Optional)
You can use the Admin serial console with a terminal emulation program
like HyperTerminal to set the following configuration parameters for the
KX II-101:
•
IP address
•
Subnet mask address
•
Gateway address
•
IP access control
•
LAN speed
•
LAN interface mode
To use a terminal emulation program with the KX II-101, you must first
connect the included RS-232 serial cable from the Admin port on the KX
II-101 to the COM1 port on your PC. See Admin Port (on page 23).
For demonstration purposes, the terminal emulation program described
in this section is HyperTerminal. You can use any terminal emulation
program.
To use a terminal emulation program to configure the KX II-101:
1. Connect the KX II-101 to a local PC using the included RS-232 serial
cable.
2. Connect to the Admin port on the KX II-101 and the COM1 port on
the PC.
29
Chapter 2: Installation and Configuration
3. Launch the terminal emulation program you want to use to configure
the KX II-101.
4. Set the following port settings in the terminal emulation program:
ƒ
Bits per second - 115200
ƒ
Data bits - 8
ƒ
Parity - None
ƒ
Stop bits - 1
ƒ
Flow control - None
5. Connect to the KX II-101. The login page opens.
6. Type the administrator user name and press Enter. You are
prompted to enter your password.
7. Type your password and press Enter. The Admin Port prompt
appears.
8. At the Admin Port > prompt, type config and press Enter.
9. At the Config > prompt, type network and press Enter.
10. To view the current interface settings, at the Interface > prompt, type
interface and press Enter. The current interface settings appear.
30
Chapter 2: Installation and Configuration
11. To configure new network settings, at the Network prompt, type
interface followed by one of the following commands and its
appropriate argument (option), then press Enter.
Command
Argument
Options
ipauto
none|dhcp
none - Enables you to manually specify
an IP address for the device. You must
follow this option with the ip command
and the IP address, as shown in the
following example:
interface ipauto none ip
192.168.50.12
dhcp - Automatically assign an IP address
to the device on startup.
ip
IP address
The IP address to assign to the device. To
manually set an IP address for the first
time, this command must be used with the
ipauto command and the none option.
See ipauto for information. After you have
manually assigned an IP address once,
you can use the ip command alone to
change the IP address.
mask
subnetmask
The subnet mask IP address.
gw
IP address
The gateway IP address
mode
mode
The Ethernet mode. You have the
following choices:
ƒ auto - Automatically sets speed and
interface mode based on the network.
ƒ 10hdx - 10 MB/s, half duplex.
ƒ 10fdx - 10 MB/s, full duplex
ƒ 100hdx - 100 MB/s, half duplex
ƒ 100fdx - 100 MB/s, full duplex
•
When you have successfully changed a setting, you see a
confirmation message like the following:
1. When you are finished configuring the KX II-101, type logout at the
command prompt and press Enter.
You are logged out of the command line interface.
31
Chapter 3
Working with Target Servers
In This Chapter
Interfaces .................................................................................................32
Virtual KVM Client ...................................................................................41
Multi-Platform Client (MPC).....................................................................60
Interfaces
KX II-101 Remote Console Interface
The KX II-101 Remote Console is a browser-based graphical user
interface that allows you to log into KVM target servers and serial targets
connected to the KX II-101 and to remotely administer the KX II-101.
The KX II-101 Remote Console provides a digital connection to your
connected KVM target servers. When you log into a KVM target server
using the KX II-101 Remote Console, a Virtual KVM Client window
opens.
Note: If you are using IE 7, you may run into permission issues when
trying to connect to a target server. To avoid this, do the following:
1. In IE7, click Tools > Internet Options to open the Internet Options
dialog.
2. In the "Temporary Internet files" section, click the Settings button. The
Settings dialog opens.
3. In the "Check for newer versions of stored pages" section, select
Automatically.
4. Click OK to apply the settings.
Enable Direct Port Access
Direct port access enables you to access the KX II-101 Remote Client
without having to go through the usual login page. With direct port
access enabled, you can define an URL to navigate directly to the Port
Access page.
To enable direct port access:
1. Launch the KX II-101 Remote Console.
2. Choose Device Settings > Device Services. The Device Services
page opens.
3. Select the Enable Direct Port Access via URL checkbox.
32
Chapter 3: Working with Target Servers
4. Click Save.
To define a direct port access URL:
•
Define a URL with the IP address, user name, password, and if
necessary, port number of the KX II-101.
If you have only one KVM port, the port number is not needed.
The format for a direct port access URL is:
https://IP
address/dpa.asp?username=username&password=password&port=
port number
Tip: Define a direct port access URL once, then save it in your web
browser as a bookmark to make reusing it easier.
KX II-101 Remote Console Interface
The KX II-101 Remote Console is a browser-based graphical user
interface that allows you to log into KVM target servers and serial
targets connected to the KX II-101 and to remotely administer the KX II101.
The KX II-101 Remote Console provides a digital connection to your
connected KVM target servers. When you log into a KVM target server
using the KX II-101 Remote Console, a Virtual KVM Client window
opens.
KX II-101 Console Navigation
The KX II-101 Console interfaces provide many methods for navigation
and making your selections.
To select an option (use any of the following):
•
Click on a tab. A page of available options appears.
•
Hover over a tab and select the appropriate option from the menu.
•
Click the option directly from the menu hierarchy displayed
(breadcrumbs).
To scroll through pages longer than the screen:
•
Use Page Up and Page Down keys on your keyboard.
•
Use the scroll bar on the right.
33
Chapter 3: Working with Target Servers
Port Access Page
After successfully logging in to the KX II-101 Remote Console, the Port
Access page appears. This page lists the KX II-101 port, the connected
KVM target server, and its status and availability. The Port Access page
provides access to the KVM target server connected to the KX II-101. A
KVM target server is a server that you want to control through the KX II101 device. They are connected to the KX II-101 ports at the back of the
device.
To use the Port Access page:
1. From the KX II-101 Remote Console, click the Port Access tab. The
Port Access page opens.
The KVM target servers are initially sorted by Port Number. You can
change the display to sort on any of the columns.
ƒ
Port Number - The port available for the KX II-101 device.
ƒ
Port Name - The name of the KX II-101 port. Initially, this is set to
Dominion_KX2_101_Port1 but you can change the name to
something more descriptive. When you click a Port Name link,
the Port Action Menu appears.
ƒ
Status - The status is either up or down.
ƒ
Availability - The Availability can be Idle, Connected, Busy, or
Unavailable.
2. Click the Port Name of the target server you want to access. The
Port Action Menu appears. See Port Action Menu (on page 34) for
details on available menu options.
3. Choose the desired menu command from the Port Action Menu.
Port Action Menu
When you click a Port Name in the Port Access list, the Port Action menu
appears. Choose the desired menu option for that port to execute it. Note
that only options available for the selected port are listed in the Port
Action menu:
•
Connect - Creates a new connection to the target server. For the KX
II-101 Remote Console, a new Virtual KVM Client (on page 41)
page appears.
Note: This option is not available from the KX II-101 Remote Console
for an available port if all connections are busy.
34
Chapter 3: Working with Target Servers
•
Disconnect - Disconnects this port and closes the Virtual KVM Client
page for this target server. This menu item is available only when the
port status is up and connected, or up and busy.
•
Power On - Powers on the target server through the associated
outlet. This option is visible only when there are one or more power
associations to the target.
•
Power Off - Powers off the target server through the associated
outlets. This option is visible only when there are one or more power
associations to the target, when the target power is on (port status is
up), and when user has permission to operate this service.
•
Power Cycle - Power cycles the target server through the associated
outlets. This option is visible only when there are one or more power
associations to the target, and when the user has permission to
operate this service.
35
Chapter 3: Working with Target Servers
Managing Favorites
A Favorites feature is provided so you can organize and quickly access
the devices you use frequently. The Favorite Devices section is located
in the lower left side (sidebar) of the Port Access page and provides the
ability to:
•
Create and manage a list of favorite devices
•
Quickly access frequently-used devices
•
List your favorites either by Device Name, IP Address, or DNS
hostname
•
Discover KX II-101 devices on its subnet (before and after login)
•
Retrieve discovered KX II-101 devices from the connected KX device
(after login)
To access a favorite KX II-101 device:
•
Click the device name (listed beneath Favorite Devices). A new
browser opens to that device.
To display favorites by name:
•
Click Display by Name.
To display favorites by IP Address:
•
Click Display by IP.
To display favorites by the host name:
•
36
Click Display by Host Name.
Chapter 3: Working with Target Servers
Manage Favorites Page
To open the Manage Favorites page:
•
Click the Manage button in the left panel. The Manage Favorites
page appears and contains the following:
Use:
To:
Favorites List
Manage your list of favorite
devices.
Discover Devices - Local Subnet
Discover Raritan devices on the
client PC's local subnet.
Discover Devices - KX II-101
Subnet
Discover the Raritan devices on
the KX II-101 device subnet.
Add New Device to Favorites
Add, edit, and delete devices from
your list of Favorites.
Favorites List Page
From the Favorites List page, you can add, edit, and delete devices from
your list of favorites.
To open the Favorites List page:
•
Choose Manage > Favorites List. The Favorites List page opens.
Discovering Raritan Devices on the Local Subnet
This option discovers the devices on your local subnet, which is the
subnet where the KX II-101 Remote Console is running. These devices
can be accessed directly from this page or you can add them to your list
of favorites. See Favorites List Page (on page 37).
To discover devices on the local subnet:
1. Choose Manage > Discover Devices - Local Subnet. The Discover
Devices - Local Subnet page appears.
2. Choose the appropriate discovery port:
ƒ
To use the default discovery port, select the Use Default Port
5000 checkbox.
ƒ
To use a different discovery port:
a. Deselect the Use Default Port 5000 checkbox.
b. Type the port number in the Discover on Port field.
c.
Click Save.
37
Chapter 3: Working with Target Servers
3. Click Refresh. The list of devices on the local subnet is refreshed.
To add devices to your Favorites List:
1. Select the checkbox next to the device name/IP address.
2. Click Add.
Tip: Use the Select All and Deselect All buttons to quickly select all (or
deselect all) devices in the remote console subnet.
To access a discovered device:
•
38
Click the device name or IP address for that device. A new browser
opens to that device.
Chapter 3: Working with Target Servers
Discovering Raritan Devices on the KX II-101 Subnet
This option discovers devices on the device subnet, which is the subnet
of the KX II-101 device IP address itself. You can access these devices
directly from this the Subnet page or add them to your list of favorites.
See Favorites List Page (on page 37).
This feature allows multiple KX II-101 devices to interoperate and scale
automatically. The KX II-101 Remote Console automatically discovers
the KX II-101 devices, and any other Raritan device, in the subnet of the
KX II-101.
To discover devices on the device subnet:
1. Choose Manage > Discover Devices - KX II-101 Subnet. The
Discover Devices - KX II-101 Subnet page appears.
2. Click Refresh. The list of devices on the local subnet is refreshed.
To add devices to your Favorites List:
1. Select the checkbox next to the device name/IP address.
2. Click Add.
Tip: Use the Select All and Deselect All buttons to quickly select all (or
deselect all) devices in the KX II-101 device subnet.
To access a discovered device:
•
Click the device name or IP address for that device. A new browser
opens to that device.
Adding, Deleting, and Editing Favorites
To add a device to your favorites list:
1. Choose Manage > Add New Device to Favorites. The Add New
Favorite page appears.
2. Type a meaningful description.
3. Type the IP Address/Host Name for the device.
39
Chapter 3: Working with Target Servers
4. Change the discovery Port (if necessary).
5. Select the Product Type.
6. Click OK. The device is added to your list of favorites.
To edit a favorite:
1. From the Favorites List page, select the checkbox next to the
appropriate KX II-101 device.
2. Click the Edit button. The Edit page appears.
3. Update the fields as necessary:
ƒ
Description
ƒ
IP Address/Host Name - Type the IP address of the KX II-101
device
ƒ
Port (if necessary)
ƒ
Product Type
4. Click OK.
To delete a favorite:
Important: Exercise caution in the removal of favorites. You are not
prompted to confirm their deletion.
40
Chapter 3: Working with Target Servers
1. Select the checkbox next to the appropriate KX II-101 device.
2. Click the Delete button. The favorite is removed from your list of
favorites.
Logging off
To quit the KX II-101 Remote Console:
•
Click Logout in the upper right-hand corner of the page.
Note: Logging off also closes any open Virtual KVM Client and serial
client sessions.
Multi-Platform Client Interface
See Multi-Platform Client (MPC) (on page 60).
Virtual KVM Client
Overview
Whenever you access a target server using the KX II-101 Remote
Console, a Virtual KVM Client (VKC) window opens. There is one Virtual
KVM Client for each target server connected. These windows can be
accessed via the Windows task bar.
Virtual KVM Client windows can be minimized, maximized, and moved
around your computer desktop.
Note: Refreshing your HTML browser will close the Virtual KVM Client
connection, so exercise caution.
Connecting to a KVM Target Server
To connect to a KVM target server:
1. From the KX II-101 Remote Console, click the Port Access tab to
open it. The Port Access page opens.
2. Click the Port Name of the target you want to access. The Port
Action menu appears.
3. Click Connect. A Virtual KVM Client (on page 41) window opens to
the target server connected to that port.
41
Chapter 3: Working with Target Servers
VKC Toolbar
Button
Description
Properties
Video settings
Calibrate color
Synchronize the target mouse cursor
Refresh screen
Auto-sense video
Send Ctrl+Alt+Delete
Single mouse cursor
Full screen
Resize video to fit screen
Power Controlling a KVM Target Server
Note: These features are available only when you have made power
associations. See Power Control (on page 157).
To power cycle a KVM target server:
1. From the KX II-101 Remote Console, click the Port Access tab. The
Port Access page opens.
2. Click the Port Name of the appropriate target server. The Port Action
menu appears.
3. Choose Power Cycle. A confirmation message appears.
To power on a target server:
1. From the KX II-101 Remote Console, click the Port Access tab. The
Port Access page opens.
2. Click the port name of the appropriate target server. The Port Action
menu appears.
3. Choose Power On. A confirmation message appears.
42
Chapter 3: Working with Target Servers
To power off a target server:
1. From the KX II-101 Remote Console, click the Port Access tab to
open it. The Port Access page opens.
2. Click the port name of the appropriate target server. The Port Action
menu appears.
3. Choose Power Off. A confirmation message appears.
Disconnecting a KVM Target Server
To disconnect a target server:
1. Click the port name of the target you want to disconnect. The Port
Action menu appears.
2. Choose Disconnect.
Tip: You can also close the Virtual KVM Client window by selecting
Connection > Exit from the Virtual KVM menu.
VKC Connection Properties
The KX II-101 dynamic video compression algorithms maintain KVM
console usability under varying bandwidth constraints. The KX II-101
devices optimize KVM output not only for LAN use, but also for WAN
use. These devices can also control color depth and limit video output,
offering an optimal balance between video quality and system
responsiveness for any bandwidth.
The parameters in the Properties dialog can be optimized to suit your
needs for different operating environments.
To set the connection properties:
1. Choose Connection > Properties or click the Connection Properties
button
in the toolbar. The Properties dialog appears.
43
Chapter 3: Working with Target Servers
2. Choose the Connection Speed from the drop-down list. The device
can automatically detect available bandwidth and not limit bandwidth
use. However, you can also adjust this usage according to
bandwidth limitations.
ƒ
Auto
ƒ
100 Mb Ethernet
ƒ
10 Mb Ethernet
ƒ
1.5 Mb (MAX DSL/T1)
ƒ
1 Mb (Fast DSL/T1)
ƒ
512 Kb (Medium DSL/T1)
ƒ
384 Kb (Slow DSL/T1)
ƒ
256 Kb (Cable)
ƒ
128 Kb (Dual ISDN)
ƒ
56 kb (ISP Modem)
ƒ
33 kb (Fast Modem)
ƒ
24 kb (Slow Modem)
Note that these settings are an optimization for specific conditions
rather than an exact speed. The client and server always attempt to
deliver video as quickly as possible on the network regardless of the
current network speed and encoding setting. But the system will be
most responsive when the settings match the real world environment.
3. Choose the Color Depth from the drop-down list. The device can
dynamically adapt the color depth transmitted to remote users in
order to maximize usability in all bandwidths.
ƒ
15-bit RGB Color
ƒ
8-bit RGB Color
ƒ
4-bit Color
ƒ
4-bit Gray
ƒ
3-bit Gray
ƒ
2-bit Gray
ƒ
Black and White
Important: For most administrative tasks (server monitoring,
reconfiguring, and so on), the full 24-bit or 32-bit color spectrum
made available by most modern video graphics cards is not
necessary. Attempting to transmit such high color depths wastes
network bandwidth.
44
Chapter 3: Working with Target Servers
4. Use the slider to select the desired level of Smoothing (15-bit color
mode only). The level of smoothing determines how aggressively to
blend screen regions with small color variation into a single smooth
color. Smoothing improves the appearance of target video by
reducing displayed video noise.
5. Click OK to set these properties.
Connection Information
To obtain information about your Virtual KVM Client
connection:
•
Choose Connection > Connection Info. The Connection Info window
opens.
The following information is displayed about the current connection:
•
Device Name - The name of the KX II-101 device.
•
IP Address - The IP address of the KX II-101 device.
•
Port - The KVM communication TCP/IP port used to access the
target device.
•
Data In/Second - Data rate in.
•
Data Out/Second - Data rate out.
•
Connect Time - The duration of the connect time.
•
FPS - The frames per second transmitted for video.
•
Horizontal Resolution - The screen resolution horizontally.
•
Vertical Resolution - The screen resolution vertically.
•
Refresh Rate - How often the screen is refreshed.
•
Protocol Version - RFB Protocol version.
To copy this information:
•
Click Copy to Clipboard. The information is available to be pasted
into the program of your choice.
45
Chapter 3: Working with Target Servers
Keyboard Options
Keyboard Macros
Keyboard macros ensure that keystroke combinations intended for the
target server are sent to and interpreted only by the target server.
Otherwise, they might be interpreted by the computer on which the
Virtual KVM Client is running (your client PC).
Macros are stored on the client PC and are PC-specific. Therefore, if you
use another PC, you will not see your macros. In addition, if another
person uses your PC and logs in under a different name, that user will
see your macros since they are computer-wide. Keyboard macros
created in the Virtual KVM Client are available in MPC and vice versa.
Building a Keyboard Macro
To build a macro:
1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog
appears.
2. Click Add. The Add Keyboard Macro dialog then appears.
3. Type a name for the macro in the Keyboard Macro Name field. This
name will appear in the Keyboard menu after it is created.
4. From the Hot-Key Combination field, select a keyboard combination
from the drop-down list. This allows you to execute the macro with a
predefined keystroke. Optional
5. In the Keys to Press drop-down list:
a. Select each key you would like to use to emulate keystrokes.
Select the keys in the order by which they are to be pressed.
b. After each selection, select Press Key. As each key is selected,
it will appear in the Keys to Release field.
For example, select the Windows key and the letter D key. When
these keys are selected in the client, the macro will be executed.
Add a key release attribute to the macro if needed (see next
step).
6. In the Keys to Release field:
a. Choose each key for which you would like to emulate a key
release. Define the keys you want released in order to run the
macro.
For example, specify that the keys to be pressed must also be
released in order for the macro to be executed. Select the keys in
the order by which they are to be released.
b. Click Release Key after each selection.
46
Chapter 3: Working with Target Servers
7. Review the Macro Sequence field to be sure the macro sequence is
defined correctly.
The contents of this field are automatically generated and are based
on the selections made in the Keys to Press and Keys to Release
fields.
a. To remove a step in the sequence, select it and click Remove.
b. To change the order of steps in the sequence, click the step and
then click the up or down arrow buttons to reorder them as
needed.
8. Click OK to save the macro. Click Clear to clear all field and start
over. When you click OK, the Keyboard Macros dialog appears and
lists the new keyboard macro.
47
Chapter 3: Working with Target Servers
9. Click Close to close the Keyboard Macros dialog. The macro will now
appear on the Keyboard menu in the application. Select the new
macro on the menu to run it or use the keystrokes you assigned to
the macro.
Running a Keyboard Macro
Once you have created a keyboard macro, execute it using the keyboard
macro you assigned to it or by choosing it from the Keyboard menu.
Run a Macro from the Menu Bar
When you create a macro, it appears under the Keyboard menu.
Execute the keyboard macro by clicking on it in the Keyboard menu.
Run a Macro Using a Keyboard Combination
If you assigned a keyboard combination to a macro when building it, you
can execute the macro by pressing its assigned keystrokes. For
example, press the keys Ctrl+Alt+0 simultaneously to minimize all
windows on a Windows target server.
Modifying and Removing Keyboard Macros
To modify a macro:
1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog
appears.
2. Choose the macro from among those listed.
3. Click Modify. The Add/Edit Macro dialog appears.
4. Make your changes.
48
Chapter 3: Working with Target Servers
5. Click OK.
To remove a macro:
1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog
appears.
2. Choose the macro from among those listed.
3. Click Remove. The macro is deleted.
Video Properties
Refresh Screen
The Refresh Screen command forces a refresh of the video screen.
Video settings can be refreshed automatically in several ways:
•
The Refresh Screen command forces a refresh of the video screen.
•
The Auto-sense Video Settings command automatically detects the
target server's video settings.
•
The Calibrate Color command calibrates the video to enhance the
colors being displayed.
In addition, you can manually adjust the settings using the Video Settings
command.
To refresh the video settings, do one of the following:
•
Choose Video > Refresh Screen or click the Refresh Screen button
from toolbar.
Auto-Sense Video Settings
The Auto-sense Video Settings command forces a re-sensing of the
video settings (resolution, refresh rate) and redraws the video screen.
To automatically detect the video settings, do the following:
•
Choose Video > Auto-sense Video Settings or click the Auto-Sense
Video Settings button
in the toolbar. A message stating that the
auto adjustment is in progress appears.
49
Chapter 3: Working with Target Servers
Calibrate Color
Use the Calibrate Color command to optimize the color levels (hue,
brightness, saturation) of the transmitted video images. The KX II-101
color settings are on a target server-basis.
Note: The Calibrate Color command applies to the current connection
only.
To calibrate the color, do the following:
•
Choose Video > Calibrate Color or click the Calibrate Color button
in the toolbar. The target device screen updates its color
calibration.
VKC Video Settings
Use the Video Settings command to manually adjust the video settings.
To change the video settings:
1. Choose Video > Video Settings or click the Video Settings button
in the toolbar to open the Video Settings dialog.
2. Adjust the following settings as required. As you adjust the settings
the effects are immediately visible:
a. Noise Filter
The KX II-101 device can filter out the electrical interference of
video output from graphics cards. This feature optimizes picture
quality and reduces bandwidth. Higher settings transmit variant
pixels only if a large color variation exists in comparison to the
neighboring pixels. However, setting the threshold too high can
result in the unintentional filtering of desired screen changes.
Lower settings transmit most pixel changes. Setting this
threshold too low can result in higher bandwidth use.
b. Brightness: Use this setting to adjust the brightness of the target
server display.
c.
Brightness Red - Controls the brightness of the target server
display for the red signal.
d. Brightness Green - Controls the brightness of the green signal.
e. Brightness Blue - Controls the brightness of the blue signal.
f.
Contrast Red - Controls the red signal contrast.
g. Contrast Green - Controls the green signal.
h. Contrast Blue - Controls the blue signal.
50
Chapter 3: Working with Target Servers
If the video image looks extremely blurry or unfocused, the
settings for clock and phase can be adjusted until a better image
appears on the active target server.
Warning: Exercise caution when changing the Clock and Phase
settings. Doing so may result in lost or distorted video and you may
not be able to return to the previous state. Contact Raritan Technical
Support before making any changes.
i.
Clock - Controls how quickly video pixels are displayed across
the video screen. Changes made to clock settings cause the
video image to stretch or shrink horizontally. Odd number
settings are recommended. Under most circumstances this
setting should not be changed because the autodetect is usually
quite accurate.
j.
Phase - Phase values range from 0 to 31 and will wrap around.
Stop at the phase value that produces the best video image for
the active target server.
k.
Horizontal Offset - Controls the horizontal positioning of the
target server display on your monitor.
3. Vertical Offset - Controls the vertical positioning of the target server
display on your monitor.
4. Select the video sensing mode:
ƒ
Best possible video mode
The KX II-101 device will perform the full Auto Sense process
when switching targets or target resolutions. Selecting this option
calibrates the video for the best image quality.
ƒ
Quick sense video mode
With this option, the KX II-101 device will use a quick video Auto
Sense in order to show the target's video sooner. This option is
especially useful for entering a target server's BIOS configuration
right after a reboot.
5. Click OK to apply the settings and close the dialog. Click Apply to
apply the settings without closing the dialog.
51
Chapter 3: Working with Target Servers
Note: Some Sun background screens, such as screens with very dark
borders, may not center precisely on certain Sun servers. Use a different
background or place a lighter colored icon in the upper left corner of the
screen.
Mouse Options
When controlling a target server, the KX II-101 Remote Console displays
two mouse cursors: one belonging to your client workstation and the
other belonging to the target server.
You can operate in either single mouse mode or dual mouse mode.
When in dual mouse mode, and provided the option is properly
configured, the mouse cursors will align.
When there are two mouse cursors, the KX II-101 device offers several
mouse modes:
52
•
Absolute (Mouse Synchronization)
•
Intelligent (Mouse Mode)
•
Standard (Mouse Mode)
Chapter 3: Working with Target Servers
Mouse Pointer Synchronization
When remotely viewing a target server that uses a mouse, you will see
two mouse cursors: one belonging to your remote client workstation and
the other belonging to the target server. When the mouse pointer lies
within the Virtual KVM Client target server window, mouse movements
and clicks are directly transmitted to the connected target server. While
in motion, the client mouse pointer slightly leads the target mouse pointer
due to mouse acceleration settings.
On fast LAN connections, you may want to disable the Virtual KVM
Client mouse pointer and view only the target server's pointer. You can
toggle between these two modes (single mouse and dual mouse).
Mouse Synchronization Tips
Be sure to follow these steps when configuring mouse synchronization:
1. Verify that the selected video resolution and refresh rate are among
those supported by the KX II-101 device. The Virtual KVM Client
Connection Info dialog displays the actual values that the KX II-101
is seeing.
2. Verify that the cable length is within the specified limits for the
selected video resolution.
3. Verify that the mouse and video have been properly configured
during the installation process.
4. Force an auto-sense by clicking the Virtual KVM Client auto-sense
button.
5. If that does not improve the mouse synchronization (for Linux, UNIX,
and Solaris KVM target servers):
a. Open a terminal window.
b. Enter the xset mouse 1 1 command.
53
Chapter 3: Working with Target Servers
c.
Close the terminal window.
6. Click the "Virtual KVM Client mouse synchronization" button
.
Additional Notes for Intelligent Mouse Mode
•
Be sure that there are no icons or applications in the upper left
section of the screen since that is where the synchronization routine
takes place.
•
Do not use an animated mouse.
•
Disable active desktop on KVM target servers.
Synchronize Mouse
In dual mouse mode, the Synchronize Mouse command forces
realignment of the target server mouse pointer with Virtual KVM Client
mouse pointer.
To synchronize the mouse, do one of the following:
•
Choose Mouse > Synchronize Mouse or click the Synchronize
Mouse button
in the toolbar.
Standard Mouse Mode
Standard Mouse mode uses a standard mouse synchronization
algorithm using relative mouse positions. Standard Mouse mode requires
that mouse acceleration is disabled and other mouse parameters are set
correctly in order for the client and server mouse to stay synchronized.
Standard Mouse mode is the default.
To enter standard mouse mode:
•
Choose Mouse > Standard.
Absolute Mouse Mode
In this mode, absolute coordinates are used to keep the client and target
cursors in sync, even when the target mouse is set to a different
acceleration or speed. This mode is supported on servers with USB
ports.
To enter absolute mouse mode:
•
Choose Mouse > Absolute.
Note: The absolute mouse setting requires a USB target system and is
the recommended mouse setting for KX II-101.
54
Chapter 3: Working with Target Servers
Intelligent Mouse Mode
In Intelligent Mouse mode, the KX II-101 device can detect the target
mouse settings and synchronize the mouse cursors accordingly, allowing
mouse acceleration on the target. In this mode, the mouse cursor does a
“dance” in the top left corner of the screen and calculates the
acceleration. For this mode to work properly, certain conditions must be
met.
To enter intelligent mouse mode:
•
Choose Mouse > Intelligent.
Intelligent Mouse Synchronization Conditions
The Intelligent Mouse Synchronization command, available on the
Mouse menu, automatically synchronizes mouse cursors during
moments of inactivity. For this to work properly, however, the following
conditions must be met:
•
The active desktop should be disabled on the target.
•
No windows should appear in the top left corner of the target page.
•
There should not be an animated background in the top left corner of
the target page.
•
The target mouse cursor shape should be normal and not animated.
•
The target mouse speeds should not be set to very slow or very high
values.
•
Advanced mouse properties such as “Enhanced pointer precision" or
“Snap mouse to default button in dialogs” should be disabled.
•
Choose “Best Possible Video Mode” in the Video Settings window.
•
The edges of the target video should be clearly visible (that is, a
black border should be visible between the target desktop and the
remote KVM console window when you scroll to an edge of the
target video image).
•
When using the intelligent mouse synchronization function, having a
file icon or folder icon located in the upper left corner of your desktop
may cause the function not to work properly. To be sure to avoid any
problems with this function, Raritan recommends you do not have file
icons or folder icons in the upper left corner of your desktop.
After autosensing the target video, manually initiate mouse
synchronization by clicking the Synchronize Mouse button on the toolbar.
This also applies when the resolution of the target changes if the mouse
cursors start to desync from each other.
If intelligent mouse synchronization fails, this mode will revert to standard
mouse synchronization behavior.
55
Chapter 3: Working with Target Servers
Please note that mouse configurations will vary on different target
operating systems. Consult your OS guidelines for further details. Also
note that intelligent mouse synchronization does not work with UNIX
targets.
Single Mouse Cursor
Single Mouse mode uses only the target server mouse cursor and the
local mouse pointer no longer appears onscreen. While in single mouse
mode, the Synchronize Mouse command is not available (there is no
need to synchronize a single mouse cursor).
To enter single mouse mode, do the following:
1. Choose Mouse > Single Mouse Cursor.
2. Click the Single/Double Mouse Cursor button
in the toolbar.
To exit single mouse mode:
1. Press Ctrl+Alt+O on your keyboard to exit single mouse mode.
VKC Virtual Media
See the chapter on Virtual Media (on page 106) for complete
information about setting up and using virtual media.
56
Chapter 3: Working with Target Servers
Tool Options
From the Tools menu, you can specify certain options for use with the
Virtual KVM Client, including logging, setting the keyboard type, and
defining hot keys for exiting target screen resolution mode and single
cursor mode.
To set the tools options:
1. Choose Tools > Options. The Options dialog appears.
2. Select the Enable Logging checkbox only if directed to by Technical
Support. This option creates a log file in your home directory.
3. Choose the Keyboard Type from the drop-down list (if necessary).
The options include:
ƒ
US/International
ƒ
French (France)
ƒ
German (Germany)
ƒ
Japanese
ƒ
United Kingdom
ƒ
Korean (Korea)
ƒ
Belgian (Belgium)
ƒ
Norwegian (Norway)
ƒ
Danish (Denmark)
ƒ
Swedish (Sweden)
ƒ
German (Switzerland)
ƒ
Hungarian (Hungary)
ƒ
Spanish (Spain)
57
Chapter 3: Working with Target Servers
ƒ
Italian (Italy)
ƒ
Slovenian
4. Exit Target Screen Resolution Mode - Hotkey. When you enter target
screen resolution mode, the display of the target server becomes full
screen and acquires the same resolution as the target server. This is
the hot key used for exiting this mode.
5. Exit Single Cursor Mode - Hotkey. When you enter single cursor
mode, only the target server mouse cursor is visible. This is the hot
key used to exit single cursor mode and bring back the client mouse
cursor.
6. Click OK.
Keyboard Limitations
Slovenian Keyboards
The < key does not work on Slovenian keyboards due to a JRE
limitation.
Language Configuration on Linux
Because the Sun JRE on Linux has problems generating the correct Key
Events for foreign-language keyboards configured using System
Preferences, Raritan recommends that you configure foreign keyboards
using the methods described in the following table.
58
Language
Configuration method
US Intl
Default
French
Keyboard Indicator
German
System Settings (Control Center)
Japanese
System Settings (Control Center)
UK
System Settings (Control Center)
Korean
System Settings (Control Center)
Belgian
Keyboard Indicator
Norwegian
Keyboard Indicator
Danish
Keyboard Indicator
Swedish
Keyboard Indicator
Hungarian
System Settings (Control Center)
Spanish
System Settings (Control Center)
Italian
System Settings (Control Center)
Slovenian
System Settings (Control Center)
Chapter 3: Working with Target Servers
Note: The Keyboard Indicator should be used on Linux systems using
Gnome as a desktop environment.
View Options
View Toolbar
You can use the Virtual KVM client with or without the toolbar display.
To toggle the display of the toolbar (on and off):
•
Choose View > View Toolbar.
Scaling
Scaling your target window allows you to view the entire contents of the
target server window. This feature increases or reduces the size of the
target video to fit the Virtual KVM Client window size, and maintains the
aspect ratio so that you see the entire target server desktop without
using the scroll bar.
To toggle scaling (on and off):
•
Choose View > Scaling.
Target Screen Resolution
When you enter target screen resolution mode, the display of the target
server becomes full screen and acquires the same resolution as the
target server. The hot key used for exiting this mode is specified in the
Options dialog (the default is Ctrl+Alt+M).
To enter target screen resolution:
•
Choose View > Target Screen Resolution.
To exit target screen resolution mode:
Press the hot key configured in the Tools Options dialog. The default is
Ctrl+Alt+M.
Help Options
About Raritan Virtual KVM Client
This menu command provides version information about the Virtual KVM
Client, in case you require assistance from Raritan Technical Support.
To obtain version information:
•
Choose Help > About Raritan Virtual KVM Client.
59
Chapter 3: Working with Target Servers
Multi-Platform Client (MPC)
Raritan Multi-Platform Client (MPC) is a graphical user interface for the
Raritan product lines, providing remote access to target servers
connected to Raritan KVM over IP devices.
Requirements and Installation
If you do not have MPC installed, for information on MPC installation
requirements and directions on how to install MPC, see the KVM and
Serial Client User Guide. This guide can be accessed on the Raritan
website http://www.raritan.com on the Support page.
Operation
MPC Interface
MPC functions are grouped into six general sections on the page. As a
standalone product or using a web browser, the MPC window contains
these main sections.
60
Chapter 3: Working with Target Servers
Navigator
The navigator provides a tree view of every known Raritan device. From
this panel, you can access all Raritan networked devices for which a
connection profile exists and/or all Raritan devices automatically
identified on the network.
Note: Automatic Raritan device identification uses the UDP protocol and
will typically identify all Raritan devices on your subnet. Network
administrators rarely allow UDP broadcasts to function outside of a
subnet. Automatic Raritan device identification will find only those
Raritan devices that are configured to use the default TCP Port (5000) or
another broadcast port, which is defined on the Advanced tab of the
Options dialog (choose Tools > Options to access the Options dialog).
61
Chapter 3: Working with Target Servers
Devices in the MPC Navigator
In MPC, devices are named according to the Manager Name field on the
Manager's Network Configuration page. Dominion devices are named
according to the Device Name field on the Dominion Console Network
Settings page.
Device Ports in the Navigator
For each device to which you are connected, you are able to expand the
tree associated with it to see each device port to which you have access.
Ports with a green icon indicate that you are connected to that port. The
port that is bolded in the Navigator indicates that it is the port currently
displayed (active) in the remote desktop area of the application.
If no name is assigned to a port, by default it is listed in the Navigator as
'Unnamed' for Generation 1 devices and, for the KX II, as
Dominion_KX2_PortN (N = port number).
Depending on the maximum number of KVM sessions the device can
handle at once, if all device ports to which you are connecting are
already occupied, an alert message appears and you must wait until one
of the ports is available in order to connect.
Navigator Icons
Each device in the Navigator is assigned two icons. One icon represents
the device's connection profile and the other icon represents its network
status. A connection profile is generally created by a user in order to
store personalized information about specific devices (see Connection
Profiles (on page 74) for additional information). The connection status
indicates the current status of the device.
Device Connection Profile Icons (Left Icon)
Icon
Description
Profiled - A network connection profile exists for this
device.
Modem Profile - A modem connection profile exists for
this device.
Not Profiled - The device was found on the network but
a connection profile does not exist for it.
Device Network Status Icons (Right Icon)
62
Chapter 3: Working with Target Servers
Icon
Description
Connected (green) - You are currently authenticated
and connected to this device.
Available (black) - This device is currently available on
the network but you are not currently connected to it.
Unavailable - A profile exists for this device but it is not
currently available on the network. (Note that all devices
to which you are not currently connected and that have
modem profiles will use this icon.)
Port Connection Status Icons
For each server port listed in the Navigator, the following icons can be
associated with it depending on its status:
Icon
Description
Connected
Available for connection.
Unavailable (either no device is connected or access is
blocked).
In use by another user (may be unavailable depending
on permissions).
Customizing the Navigator
Use specific tools in the toolbar to customize some Navigator attributes:
63
Chapter 3: Working with Target Servers
Icon
Action
Description
Display/Hide
Navigator
You can also select Navigator in the
View menu to toggle between displaying
and hiding the Navigator.
Refresh Navigator Updates the device status information
displayed in the Navigator.
Browse
Discovered
Devices
When enabled, Show Discovered
Devices will display devices that are
“not profiled” but have been found on
the network. This option can also be
enabled by choosing View > Show >
Discovered Devices.
Note: The Browse Discovered Devices
option is the only method of connecting
to a Raritan device configured to use a
DHCP IP address.
MPC Navigator Tabs
MPC tabs at the base of its Navigator pane. These tabs allow you to
change how you display devices. Click the View By Name tab to sort the
list alphabetically by name, click the View By IP tab to sort the list
numerically by IP address, or click on the View by Host Name tab to sort
the list alphabetically by display name.
These tabs are available only in the MPC interface.
64
Chapter 3: Working with Target Servers
Navigator Display Options
Showing Ports
•
Discovered Devices - Shows or hides discovered devices from the
Navigator view. You will not see broadcast messages when this
option is disabled (not selected).
•
Unassigned Channels - Shows or hides channels with no assigned
targets. Note that the default for Generation 1 (G1) devices is to
show unassigned channels (option is enabled), whereas the default
is to hide unassigned channels (option is disabled) for Generation 2
(G2) devices.
•
Tools - Shows or hides the Admin and Diagnostic ports.
Note: These settings are saved from session to session.
Toolbars
Standard Toolbar
The Standard toolbar provides one-click access to the most frequentlyused commands.
To display the Standard toolbar:
•
Choose View > Standard Toolbar.
Following is a list of the buttons in the standard toolbar as well as a
description of the action performed once the buttons are selected.
Additionally, if there are menu options or shortcut menu options that will
perform the same task, they are listed, too.
Button Button
Name
New Profile
Description
Creates a new Navigator entry for a
Raritan device.
Same result as choosing Connection >
New Profile in the menu.
65
Chapter 3: Working with Target Servers
Button Button
Name
Connection
Properties
Description
Opens the Modify Connection Properties
dialog from which you can manually adjust
bandwidth options (such as connection
speed, color depth, and so forth).
Same as choosing Connection >
Properties or choosing Connection
Properties on the shortcut menu, which is
opened by pressing Ctrl+Left Alt+M.
Video
Settings
Opens the Video Settings dialog, allowing
you to manually adjust video conversion
parameters.
Same as choosing Video > Video Settings
or choosing Video Settings on the shortcut
menu, which is opened by pressing
Ctrl+Left Alt+M.
Color
Calibration
Adjusts color settings to reduce excess
color noise.
Same as choosing Video > Color Calibrate.
Synchronize
Mouse
In dual-mouse mode, forces realignment of
the target server mouse pointer with the
mouse pointer.
Same as choosing Mouse > Synchronize
Mouse or choosing Synchronize Mouse on
the shortcut menu, which is opened by
pressing Ctrl+Left Alt+M.
Refresh
Screen
Forces a refresh of the video screen.
Auto-sense
Video
Settings
Forces a refresh of the video settings
(resolution, refresh rate).
Same as choosing Video > Refresh Screen
or choosing Refresh Screen on the
shortcut menu, which is opened by
pressing Ctrl+Left Alt+M.
Same as choosing Video > Auto-sense
Video Settings.
Enter OnNot applicable for the device. Used by the
Screen Menu application with other Raritan products.
Same as choosing Keyboard > Enter OnScreen Menu.
66
Chapter 3: Working with Target Servers
Button Button
Description
Name
Exit OnNot applicable for IP-Reach or Dominion.
Screen Menu Used by the application with other Raritan
products.
Alternatively, select Esc on the keyboard.
Same as choosing Keyboard > Exit OnScreen Menu.
Note: This function is not available on the
KSX II.
Send
Ctrl+Alt+Del
Sends a Ctrl+Alt+Del hot key combination
to the target server.
Same as choosing Keyboard > Send
Ctrl+Alt+Del.
Single Cursor Starts Single Cursor mode in which the
Mode
local mouse pointer no longer appears
onscreen.
Same as choosing Mouse > Single Cursor
Mode. Press Ctrl+Alt+X to exit this mode.
Alternatively, choose Single/Double Cursor
from the shortcut menu, which is opened
by pressing Ctrl+Left Alt+M.
Full Screen
Mode
Maximizes the screen real estate to view
the target server desktop.
Same as choosing View > Target Screen
Resolution (in MPC) or Full Screen (in
RRC). Alternatively, press Ctrl+Left Alt+M
to open the shortcut menu and then
choose Full/Normal Screen or press the F
key on your keyboard.
Scaling
Increases or reduces the target video size
so you can view the entire contents of the
target server window without using the
scroll bar.
Show/Hide
Navigator
Toggles the Navigator panel between
visible and hidden.
Same as choosing View > Navigator.
Refresh
Navigator
Forces a refresh of the data displayed in
the Navigator.
67
Chapter 3: Working with Target Servers
Button Button
Name
Show/Hide
Browse All
Devices
About
Description
Toggles between displaying and not
displaying Raritan devices in the Navigator
that are automatically identified on the
network and that do not have
preconfigured profiles associated with
them.
Displays the application version
information.
Same as choosing Help in the menu bar.
MPC Connected Server(s) Toolbar
The Connected Server(s) toolbar is comprised of a button for each
connected target server port, thus enabling quick access to connected
targets. When you connect to a port, a button corresponding to that port
is added to the toolbar and labeled with the name of the port.
Conversely, when you disconnect from a port, the corresponding button
is removed from the toolbar.
Note: In Single Mouse mode, the Connected Server(s) Toolbar appears
on the target but cannot be accessed.
By default, the Connected Server(s) toolbar is enabled (visible). To
disable it, deselect Connected Server(s) Toolbar in the View menu.
Buttons corresponding to windows that do not support full screen mode
are not shown in the toolbar. For example, serial ports, generation one
(G1) admin ports, and G1 diagnostic ports will not be displayed in the
toolbar in full screen mode.
While in full screen mode, you are able to view the Connected Server(s)
toolbar by hovering your mouse over the top of the screen. To use this
feature, the Connected Servers Toolbar option must be selected in the
View menu.
68
Chapter 3: Working with Target Servers
To display the Connected Server(s) toolbar (when not already
visible):
•
Choose View > Connected Server(s) Toolbar.
To view the window for a target server:
•
Click the button that corresponds to the appropriate connected target
server you want to view. The window for the corresponding target
server is displayed and the button for the selected port is highlighted.
In full screen mode, note that this action is window swapping, not
video switching.
When you click a button that is already highlighted, the corresponding
window is minimized. If you click that button again, the window is brought
forward and maximized.
MPC Status Bar
The status bar displays session information about your connection to a
Raritan device. This information includes:
Diagram Session
key
information
Concurrent
connections
indicator
Description
Indicates that multiple remote users are
currently connected to the same target
server on the device.
One icon indicates a single user is
connected, and two icons indicates two or
more users are connected.
Concurrent connection ability can be set
globally under PC share mode on the
Manager Security Settings page or set per
individual user in the Concurrent Access
Mode setting on the Manager User
Account Settings page. For the KX II-101
device, concurrent connection ability can
be set using the PC Share Mode option in
the Security Settings page: PC-Share
permits concurrent access and Private
limits server access to one user at a time.
69
Chapter 3: Working with Target Servers
Diagram Session
key
information
Lock key
indicators
Description
Indicates the status of the current target
KVM Server, in respect to the activation of
the Caps-Lock, Num-Lock, and ScrollLock keys. If these keys are enabled on
the target server being viewed, this
affirmative status will be reflected on the
status bar.
Note: If a light is used on your keyboard to indicate the Scroll Lock, Num
Lock, and Caps Lock key is active, it may or may not be in sync with the
lock key indicator status displayed on the status bar. See the status bar
as your guide if this occurs.
Screen Modes
Besides a standard view, full screen view and a scaling option are
available. These options increase the remote desktop area and make
viewing the target video easier.
70
Chapter 3: Working with Target Servers
MPC Target Screen Resolution Mode
Target Screen Resolution mode provides you with the ability to view the
target server desktop in full screen mode, which removes all toolbars
from view.
Activate Target Screen Resolution mode once you are connected to a
target by doing one of the following:
•
in the toolbar and then click OK in
Click the Full Screen button
the confirmation message that appears.
•
Choose View > Target Screen Resolution and then click OK in the
confirmation message that appears.
•
Press Ctrl+Left Alt+M to open the shortcut menu. Next, press the F
key on your keyboard or use your mouse to choose Full/Normal
Screen. Click OK in the confirmation message that appears.
71
Chapter 3: Working with Target Servers
To exit full screen mode, use the shortcut menu or click the Close icon
that appears at the top right of the page when you hover your mouse
along the top of the screen.
Note: The Ctrl+Left Alt+M key combination does not work for certain
target servers if you are running JRE 1.5.0_01. To return from full page
mode, use Alt+Tab and choose MPC.
While in full screen mode, you are able to view the Connect Server
toolbar by hovering your mouse over the top of the screen. To use this
feature, the Connected Servers Toolbar option must be selected in the
View menu.
Additionally, while in full screen mode, your monitor's resolution may be
adjusted to match the resolution of the target server (provided your
graphics system supports it). If your graphics system does not support
the resolution of the target system, you will be unable to activate full
screen mode and a message will appear requesting that you change
your video resolutions first.
Tip: To view the video resolutions your system supports in a Windows
environment, access your computer's Control Panel from the Windows
Start menu, double-click Display, and click the Settings tab.
72
Chapter 3: Working with Target Servers
MPC Scaling
Scaling your target window size allows you to view the entire contents of
the target server window. This feature increases or reduces the size of
the target video to fit the window size and maintains the aspect ratio.
This allows you to see the entire target server desktop while in standard
view.
To activate Scaling, do one of the following:
•
Choose View > Scale Video.
•
Click the Scaling button
•
To exit this mode and return the target window to its previous size,
deselect Scale Video on the View menu or click the Scaling button
once again.
on the toolbar.
73
Chapter 3: Working with Target Servers
Note: Enabling Scale Video will scale the complete target video image to
fit the remote desktop area as it grows or shrinks. You can combine this
setting with target screen resolution for a full page affect on targets with
a higher resolution than your desktop.
Auto-Scroll
The auto-scroll feature automatically scrolls the video display in the
direction of the cursor as the cursor approaches the edge of the display.
A thin border appears around the perimeter of the remote desktop area
to indicate the function is on. When enabled, if you see scroll bars and
then move the cursor onto the border, the page will automatically scroll in
the appropriate direction.
The scroll border is activated by selecting Show Scroll Borders in the
Options dialog, which is accessed by choosing Tools > Options.
Connection Profiles
Connection profiles store important information about your Raritan
device such as the IP address, custom TCP ports, preferred
compression settings, and custom security keys. A profile is required to
access devices outside your subnet and to access devices using a dialup connection.
Through profiles, you can set up personalized connections. These
profiles are not shared among other users.
The information collected when creating a new connection profile will
differ based on Generation 1 and Generation 2 devices.
Tip: If your Raritan device is configured to use a custom TCP port or a
group security key, first create a connection profile so that you can
access the device.
Creating, Modifying and Deleting Profiles in MPC
To create a profile:
1. There are two ways to create a profile:
ƒ
For automatically discovered devices, right-click the device name
in the Navigator and choose Add Profile from the shortcut menu.
ƒ
For other devices, choose Connection > New Profile.
The Add Connection dialog appears. Options are organized into
three tabs.
Note: The Connection and Security tabs are not available for
Generation 2 devices.
74
Chapter 3: Working with Target Servers
2. On the Connect tab, type a meaningful description of the device in
the Description field (up to 32 alphanumeric and special characters
are allowed). This description identifies the Raritan device in the
Navigator.
3. From the Product drop-down, choose the Raritan product you are
using.
4. Select the type of connection from the Connection Type drop-down.
TCP/IP connections
a. If TCP/IP Connection is selected for a LAN/WAN connection,
complete the information in the "Find Raritan device By" section:
ƒ
Type the IP address assigned to your Raritan device.
ƒ
Type the name assigned to your Raritan device during initial
setup.
ƒ
Type the Domain Name Server (DNS) name. Use this option if
you use a DNS server to resolve a DNS name to the IP address
assigned to your Raritan device.
5. Select the Use Default Port Number checkbox to use the default port
number (5000). For TCP Ports, devices are automatically configured
to use TCP Port 5000 when communicating with the client.
If you do not want to use the default port number, deselect the
checkbox and type the port number in the Port Number field.
To modify a profile:
1. Select the device in the Navigator panel and right-click it.
2. Choose Modify Profile. The Modify Connection dialog appears.
3. Update the fields as appropriate.
75
Chapter 3: Working with Target Servers
4. Click OK.
To delete a profile:
1. Select the device with a profile in the Navigator and right-click it.
2. Choose Delete Profile.
3. When prompted to confirm the deletion, click Yes to delete the profile
for this device or click No to return to the application without deleting.
Establishing a New Connection
Note: Depending on your version of the JRE, you might receive a
certificate message when using the standalone application to access a
Dominion device. You have to accept the certificate in order to establish
the connection.
To connect to a device, double-click the device's icon in the Navigator,
then type your user name and password to connect. You can also rightclick the device name in the Navigator and select New Connection.
Note: The default device login user name is admin and the default
password is raritan. You have administrative privileges using these login
credentials.
If you do not see an icon for your device in the Navigator, follow the
instructions on creating new profiles, which is available in this section.
If you are having problems connecting to a device, be sure to check the
following:
•
User name - Raritan usernames are not case-sensitive.
•
Password - Raritan passwords are case-sensitive.
•
TCP Port - If you have configured your device to use a non-default
TCP Port, this information must be entered into its connection profile.
•
Firewall Settings - If you are accessing a device through a firewall,
that firewall must be configured to allow two-way communication on
TCP Port 5000 (or the custom TCP Port to which your device has
been configured).
•
Security Key - If you have configured your device to require a group
security key, that key must be entered into the device's connection
profile.
Note: If you are running MPC on Internet Explorer with both a Microsoft
firewall and a non-Microsoft firewall utility installed, IE will display a
message telling you that MPC is already running (even if it is not in fact
running). To avoid this, deactivate one of your firewalls, or use a browser
such as Mozilla or Firefox.
76
Chapter 3: Working with Target Servers
Connection Information
To obtain information about your connection:
•
Choose Connection > Connection Info. The Connection Info dialog
appears.
Generation 2 Devices
The following information is displayed about a current connection to
Generation 2 devices:
Connection
information
Description
Device name
The name of your device.
IP address
The IP address of your device.
Port
The KVM Communication TCP/IP Port used to
access the target device.
Data in/second
Data rate in.
Data out/second
Data rate out.
FPS
The frames per second transmitted for video.
Connect time
The duration of the connect time.
Horizontal resolution The page resolution horizontally.
Vertical resolution
The page resolution vertically.
Refresh rate
How often the page is refreshed.
Protocol version
The RFB Protocol version.
To copy this information:
•
Click Copy to Clipboard in the Connection Info dialog. The
information is now available to be pasted into the program of your
choice.
77
Chapter 3: Working with Target Servers
Connecting to a Remote KVM Console
Once you establish a connection with a Raritan device, that device's icon
in the Navigator can be expanded to display all ports enabled for remote
access.
Choose one of the following options to establish a remote KVM console
connection:
•
Double-click the KVM port. This method closes any previous
connection before connecting to the new port.
•
Right-click the port and choose Switch from the shortcut menu. This
method closes any previous connection before connecting to the
new port.
•
Right-click the port and choose New Connection from the shortcut
menu. This method allows you to connect to the selected port
without closing any previous connections and creates a new
connection if the device supports multiple concurrent connections.
Once connected, Raritan KVM over IP devices display real-time video
output of the target server (this video is compressed and encrypted
according to the configuration settings specified by the administrator).
You now have complete, low-level control of the KVM console as if you
were physically located next to the server.
•
To close a connection, right-click the connected device and choose
Disconnect.
•
To exit completely, choose Connection > Exit.
Closing a Remote Connection
To close the connection:
1. Select the device in the Navigator and right-click it.
2. Choose Disconnect from the shortcut menu.
78
Chapter 3: Working with Target Servers
3. To exit completely, click Exit on the Connection menu
Shortcut Menu
To access the shortcut menu, use either the default keyboard
combination of Ctrl+Left Alt+M or the keyboard combination you assign.
See Changing the Shortcut Menu Keyboard Combination (on page
80) for more information.
TIP: If at some point you forget the keyboard combination used to open
the shortcut menu, press Ctrl+Left Alt at the same time. The keyboard
combination will be displayed across the bottom of the page for five
seconds.
79
Chapter 3: Working with Target Servers
Shortcut Menu Key Options
Execute any of the commands on the shortcut menu by either choosing
the command in the menu or using a key combination. If you are using a
key combination to execute a command, you will press Ctrl+Left Alt+M
and then press the key on your keyboard that corresponds to the
underlined letter in the shortcut menu. For example, press Ctrl+Left
Alt+M+F to enter full screen mode. See the table below for information
on invoking commands from the shortcut menu using keyboard
combinations.
Note: You must use the Left Alt key on your keyboard when using the
Ctrl+Left Alt combination.
To
Press Ctrl+Left Alt+M+
Toggle between Full/Normal screen
mode*
F
Display connection information*
I
Display or set connection properties*
P
Display or set video settings*
V
Refresh the page
R
Synchronize mouse
Y
Change to/from single/double cursor
mode
S
Send Ctrl+Alt+Del to the target
system
D
Connect Drive
T
Connect CD-ROM/ISO Image
E
Send Ctrl+Alt+M to the target system
N
Exit a dialog or menu without altering
the keyboard state
Esc
* If full screen mode is active, executing this command will automatically
end full screen mode.
Changing the Shortcut Menu Keyboard Combination
To change the keyboard combination, do the following:
1. Choose Tools > Options to open the Options dialog.
2. From the Keyboard Shortcut Menu HotKey drop-down, select the
keyboard combination you want to use to open the shortcut menu.
3. Click OK or Apply.
80
Chapter 3: Working with Target Servers
Once a new keyboard combination is assigned, the new combination will
be displayed in the shortcut menu and in the onscreen message that
displays when the combination is used.
81
Chapter 3: Working with Target Servers
Keyboard Macros
A hot key combination is a set of keystrokes that performs an action
when pressed. For example, the hot key combination Ctrl+Alt+0 might be
created to minimize all windows.
A keyboard macro is a shortcut that sends a hot key combination to a
target server. Using keyboard macros ensures that hot key combinations
intended to be used on the target server are sent to and interpreted only
by the target server, and not by the computer on which the client is
running.
Raritan strongly suggests the use of keyboard macros instead of hot key
combinations since certain hot key combinations have been found not to
work properly, depending on the platform and behavioral difference
between the application and web browser version. Specifically, using hot
keys can result in your own client PC intercepting the command and
performing the action instead of sending the command to the target
server as intended.
Note: In MPC, foreign keyboard layouts are not supported when using
keyboard macros, except for those keys listed in the Add Keyboard
Macro dialog for Japanese and Korean.
Building a Keyboard Macro
To build a macro:
1. Click Keyboard > Keyboard Macros. The Keyboard Macros dialog
appears.
2. Click Add. The Add Keyboard Macro dialog then appears.
3. Type a name for the macro in the Keyboard Macro Name field. This
name will appear in the Keyboard menu after it is created.
4. From the Hot-Key Combination field, select a keyboard combination
from the drop-down list. This allows you to execute the macro with a
predefined keystroke. Optional
5. In the Keys to Press drop-down list:
a. Select each key you would like to use to emulate keystrokes.
Select the keys in the order by which they are to be pressed.
b. After each selection, select Press Key. As each key is selected,
it will appear in the Keys to Release field.
For example, select the Windows key and the letter D key. When
these keys are selected in the client, the macro will be executed.
Add a key release attribute to the macro if needed (see next
step).
82
Chapter 3: Working with Target Servers
6. In the Keys to Release field:
a. Choose each key for which you would like to emulate a key
release. Define the keys you want released in order to run the
macro.
For example, specify that the keys to be pressed must also be
released in order for the macro to be executed. Select the keys in
the order by which they are to be released.
b. Click Release Key after each selection.
7. Review the Macro Sequence field to be sure the macro sequence is
defined correctly.
The contents of this field are automatically generated and are based
on the selections made in the Keys to Press and Keys to Release
fields.
a. To remove a step in the sequence, select it and click Remove.
b. To change the order of steps in the sequence, click the step and
then click the up or down arrow buttons to reorder them as
needed.
83
Chapter 3: Working with Target Servers
8. Click OK to save the macro. Click Clear to clear all field and start
over. When you click OK, the Keyboard Macros dialog appears and
lists the new keyboard macro.
84
Chapter 3: Working with Target Servers
9. Click Close to close the Keyboard Macros dialog. The macro will now
appear on the Keyboard menu in the application. Select the new
macro on the menu to run it or use the keystrokes you assigned to
the macro.
Running a Keyboard Macro
Once you have created a keyboard macro, execute it using the keyboard
macro you assigned to it or by choosing it from the Keyboard menu.
Run a Macro from the Menu Bar
When you create a macro, it appears under the Keyboard menu.
Execute the keyboard macro by clicking on it in the Keyboard menu.
Run a Macro Using a Keyboard Combination
If you assigned a keyboard combination to a macro when building it, you
can execute the macro by pressing its assigned keystrokes. For
example, press the keys Ctrl+Alt+0 simultaneously to minimize all
windows on a Windows target server.
85
Chapter 3: Working with Target Servers
Modifying and Removing Keyboard Macros
To modify a macro:
1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog
appears.
2. Choose the macro from among those listed.
3. Click Modify. The Add/Edit Macro dialog appears.
4. Make your changes.
5. Click OK.
To remove a macro:
1. Choose Keyboard > Keyboard Macros. The Keyboard Macros dialog
appears.
2. Choose the macro from among those listed.
3. Click Remove. The macro is deleted.
Ctrl+Alt+Del Macro
Due to its frequent use, a Ctrl+Alt+Delete macro, used to reboot the
target computer, has been preprogrammed. Clicking on the
in the toolbar sends this key sequence to the
Ctrl+Alt+Delete button
server or to the KVM switch to which you are currently connected.
In contrast, if you were to physically press the Ctrl+Alt+Del keys, the
command would first be intercepted by your own PC due to the structure
of the Windows operating system, instead of sending the key sequence
to the target server as intended.
Common Hot Key Exceptions for MPC
The following common hot key combinations are not sent to the target
system:
Hot Key
Combination
Description
Ctrl+Alt+Delete
Reboots the computer. The sequence is sent to the
local system and the Windows Security (Task
Manager, Shutdown, and so on) dialog is displayed.
Ctrl+Left Alt+M
Brings up the shortcut menu (on page 79).
Print Scrn
Treated locally and copies the page to the clipboard.
Following are limitations to specific keyboards and hot key combinations:
86
Chapter 3: Working with Target Servers
Hot Key
Combination
Description
Alt Gr
Because of a limitation in the Java Runtime
Environment (JRE), Fedora, Linux, and Solaris
clients receive an invalid response from Alt Gr on
United Kingdom and US International language
keyboards.
Fedora, Linux, and Solaris do not pick up events
for the Alt Gr key combination for Java 1.5. Java
1.6 appears to improve on this, although the
keyPressed and keyReleased events for Alt Gr still
identify it as an “unknown key code”.
Further, a key pressed in combination with Alt Gr
(such as on the UK keyboard Alt Gr-4, which is the
Euro symbol), will only generate a keyTyped
followed by a keyReleased event for that value
without a keyPressed event. Java 1.6 improves
upon this by filling in the keyPressed event as well.
Note: The KX II does not support Java 1.4.2.
Alt+SysRq+[key]
Since the SysRq keyboard stroke is used by some
operating systems as a print shortcut, the Alt +
SysRq + [key] combination is supported only as a
macro when using DKX with RRC and MPC to a
Linux target.
Windows Key in MPC
When running MPC on a Windows JRE 1.4.2_x platform, if you press the
to display the Start menu, the Start menu will only
Windows key
appear on the client machine. The key is not sent to the target device.
Note: The KX II does not support Java 1.4.2.
When running MPC on a Windows JRE 1.5.0_x platform, if you press the
Windows key, the Start menu appears on both the client and the target
devices. Use your mouse to manually close the Start menu if you do not
want to use.
Note that if you do not close the target device's Start menu properly, any
key that you touch on your keyboard (that has a Windows key
combination function) will send that command to the target device. For
example, if you press E, the target device will open a new Explorer
window. If you press D, all target windows will be minimized so you can
view the desktop. To close the Start menu on the target device, click the
Start button or click off of the Start menu.
87
Chapter 3: Working with Target Servers
Keyboard Type
Specifying a Keyboard Type in MPC
MPC will not autodetect the type of keyboard you use, so you must
specify your keyboard type to ensure accurate keyboard mapping.
To specify a keyboard type:
1. Choose Tools > Options. The Options dialog will appear.
2. Click the Keyboard Type drop-down and select your keyboard type
from the list.
88
ƒ
US/International
ƒ
French (France)
ƒ
German (Germany)
ƒ
Japanese
ƒ
United Kingdom
ƒ
Korean (Korea)
ƒ
Belgian (Belgium)
ƒ
Norwegian (Norway)
ƒ
Danish (Denmark)
ƒ
Swedish (Sweden)
ƒ
German (Switzerland)
ƒ
Hungarian (Hungary)
ƒ
Spanish (Spain)
ƒ
Italian (Italy)
ƒ
Slovenian
Chapter 3: Working with Target Servers
3. Click OK.
Keyboard Limitations
Slovenian Keyboards
The < key does not work on Slovenian keyboards due to a JRE
limitation.
Language Configuration on Linux
Because the Sun JRE on Linux has problems generating the correct Key
Events for foreign-language keyboards configured using System
Preferences, Raritan recommends that you configure foreign keyboards
using the methods described in the following table.
Language
Configuration method
US Intl
Default
French
Keyboard Indicator
German
System Settings (Control Center)
Japanese
System Settings (Control Center)
89
Chapter 3: Working with Target Servers
Language
Configuration method
UK
System Settings (Control Center)
Korean
System Settings (Control Center)
Belgian
Keyboard Indicator
Norwegian
Keyboard Indicator
Danish
Keyboard Indicator
Swedish
Keyboard Indicator
Hungarian
System Settings (Control Center)
Spanish
System Settings (Control Center)
Italian
System Settings (Control Center)
Slovenian
System Settings (Control Center)
Note: The Keyboard Indicator should be used on Linux systems using
Gnome as a desktop environment.
90
Chapter 3: Working with Target Servers
Mouse Options
Single Cursor Mode/Dual Cursor Mode
When remotely viewing a target server that uses a mouse, you will see
two mouse cursors on the remote desktop. When your mouse pointer
lies within the remote desktop area, mouse movements and clicks are
directly transmitted to the connected target server. The pointer,
generated by the operating system, slightly leads the target server's
mouse pointer during movement. This is a result of digital delay.
On fast LAN connections, you may want to disable the mouse pointer
and view only the target server's pointer. To toggle between these two
modes, choose Single/Double Cursor on the shortcut menu.
Alternatively, click the Single Mouse Pointer icon
choose Mouse > Single Cursor Mode.
in the toolbar or
When in Dual Cursor mode, press Ctrl+Left Alt+M and execute the
Synchronize Mouse shortcut to force realignment of the mouse cursors.
If the mouse cursors still remain out of sync, click the Auto-Sense Video
Settings button
on the toolbar.
Note: When in Dual Cursor mode, if the dual mouse cursors are
synchronized but left idle for five minutes or longer, the target mouse
pointer will automatically align itself with the upper left corner of the
target window. Execute the Synchronize Mouse command to ensure
local and target mouse pointer alignment.
Single Mouse Cursor mode for Apple Mac target servers is supported for
MPC. Select Single Mouse Cursor on the Mouse menu in MPC to enter
this mode. While in this mode, the cursor will remain in the video window
for the Mac Server. To exit, open the shortcut menu and press S on the
keyboard.
91
Chapter 3: Working with Target Servers
Mouse Synchronization Options
In addition to synchronizing mouse cursors or toggling between single
and dual cursor mode, the Mouse menu provides three options for
synching cursors when in dual cursor mode:
Menu option
Description
Absolute
When connected to selected Dominion devices and
targets with USB ports, the application will use
absolute coordinates to keep the cursors in sync.
See Absolute Mouse Mode (on page 92) for more
information.
Intelligent
Under certain conditions, the application can detect
the target mouse settings and synchronize the
mouse cursors accordingly, accelerating the mouse
on the target device. See Intelligent Mouse Mode
(on page 55) for more details.
Standard
This is the standard mouse synchronization
algorithm. See Standard Mouse Mode (on page 54)
for more information.
Note: The Intelligent and Standard Mouse modes are available to all KX
II-101 targets. Absolute Mouse mode are only available to Mac and
Windows USB targets.
Absolute Mouse Mode
In this mode, absolute coordinates are used to keep the client and target
cursors in sync, even when the target mouse is set to a different
acceleration or speed. This mode is supported on servers with USB
ports.
To enter absolute mouse mode:
•
Choose Mouse > Absolute.
Note: The absolute mouse setting requires a USB target system and is
the recommended mouse setting for KX II-101.
92
Chapter 3: Working with Target Servers
Intelligent Mouse Mode
In Intelligent Mouse mode, the KX II-101 device can detect the target
mouse settings and synchronize the mouse cursors accordingly, allowing
mouse acceleration on the target. In this mode, the mouse cursor does a
“dance” in the top left corner of the screen and calculates the
acceleration. For this mode to work properly, certain conditions must be
met.
To enter intelligent mouse mode:
•
Choose Mouse > Intelligent.
Intelligent Mouse Synchronization Conditions
The Intelligent Mouse Synchronization command, available on the
Mouse menu, automatically synchronizes mouse cursors during
moments of inactivity. For this to work properly, however, the following
conditions must be met:
•
The active desktop should be disabled on the target.
•
No windows should appear in the top left corner of the target page.
•
There should not be an animated background in the top left corner of
the target page.
•
The target mouse cursor shape should be normal and not animated.
•
The target mouse speeds should not be set to very slow or very high
values.
•
Advanced mouse properties such as “Enhanced pointer precision" or
“Snap mouse to default button in dialogs” should be disabled.
•
Choose “Best Possible Video Mode” in the Video Settings window.
•
The edges of the target video should be clearly visible (that is, a
black border should be visible between the target desktop and the
remote KVM console window when you scroll to an edge of the
target video image).
•
When using the intelligent mouse synchronization function, having a
file icon or folder icon located in the upper left corner of your desktop
may cause the function not to work properly. To be sure to avoid any
problems with this function, Raritan recommends you do not have file
icons or folder icons in the upper left corner of your desktop.
After autosensing the target video, manually initiate mouse
synchronization by clicking the Synchronize Mouse button on the toolbar.
This also applies when the resolution of the target changes if the mouse
cursors start to desync from each other.
If intelligent mouse synchronization fails, this mode will revert to standard
mouse synchronization behavior.
93
Chapter 3: Working with Target Servers
Please note that mouse configurations will vary on different target
operating systems. Consult your OS guidelines for further details. Also
note that intelligent mouse synchronization does not work with UNIX
targets.
Standard Mouse Mode
Standard Mouse mode uses a standard mouse synchronization
algorithm using relative mouse positions. Standard Mouse mode requires
that mouse acceleration is disabled and other mouse parameters are set
correctly in order for the client and server mouse to stay synchronized.
Standard Mouse mode is the default.
To enter standard mouse mode:
•
Choose Mouse > Standard.
Connection and Video Properties
Dynamic video compression algorithms maintain KVM console usability
under varying bandwidth constraints. The KX II-101 device optimizes
KVM output not only for LAN use but also for WAN and dial-up use.
These devices can also control color depth and limit video output,
offering an optimal balance between video quality and system
responsiveness for any bandwidth constraint.
The parameters discussed in this section can be optimized in the
Connection Properties dialog and Video Settings dialog.
MPC Connection Properties
To adjust connection properties:
1. Choose Connection > Properties or click the Connection Properties
button
tab.
in the toolbar. Update the settings in the Compression
2. Set the Connection Speed.
Use this setting to manually adjust the connection speed to
accommodate bandwidth constraints. Devices can automatically
detect available bandwidth and not limit bandwidth use. However,
you can also adjust this usage according to your needs. Depending
on the Raritan device in use, different options may be available:
94
ƒ
Auto Detect
ƒ
100mb Ethernet
ƒ
10mb Ethernet
ƒ
1.5mb (Max DSL/T1)
ƒ
1mb (Fast DSL/T1)
ƒ
512 kb (Medium DSL/T1)
Chapter 3: Working with Target Servers
ƒ
384 kb (Slow DSL/T1)
ƒ
256 kb (Cable)
ƒ
128 kb (Dual ISDN)
ƒ
56 kb (ISP Modem)
ƒ
33 kb (Fast Modem)
ƒ
24 kb (Slow Modem)
3. Set the Color Depth.
Devices can dynamically adapt the color depth transmitted to remote
users in order to maximize usability in all bandwidths. Select from
among the options in the drop-down list. Depending on the Raritan
device in use, different options may be available:
ƒ
15-bit RGB Color
ƒ
8-bit RGB Color
ƒ
4-bit Color
ƒ
4-bit Gray
ƒ
3-bit Gray
ƒ
2-bit Gray
ƒ
Black and White
Important: For most administrative tasks (server monitoring,
reconfiguring, and so forth), administrators do not require the full 24bit or 32-bit color spectrum made available by most video graphics
cards. Attempting to transmit such high color depths wastes network
bandwidth.
4. Use the slider to select the desired level of video Smoothing (15-bit
mode only). The level determines how aggressively to blend page
regions with small color variation into a single, smooth color.
Smoothing improves the appearance of the target video by reducing
the video noise that is displayed.
5. Click OK to create the connection profile.
Video Settings - Generation 2 Devices
To configure Generation 1 devices:
1. Choose Video > Video Settings or click the Video Settings button
in the toolbar to open the Settings dialog.
2. Adjust the following settings as required:
a. Noise Filter
95
Chapter 3: Working with Target Servers
Devices can filter out the electrical interference of video output
from graphics cards. This feature optimizes picture quality and
reduces bandwidth. Higher settings transmit variant pixels only if
a large color variation exists in comparison to the neighboring
pixels. However, setting the threshold too high can result in the
unintentional filtering of desired page changes. Lower settings
transmit most pixel changes. Setting this threshold too low can
result in higher bandwidth use.
Note: The default Noise Filter is 4. Raritan recommends that you
lower this value to 0 (zero). Although higher settings will stop the
needless transmission of false color variations, true and intentional
small changes to a video image may not be transmitted.
b. PLL Settings
If the video image looks extremely blurry or unfocused, the PLL
settings for clock and phase can be adjusted until a better image
appears on the active target server.
Warning: Exercise caution when changing the clock and phase
settings since doing so may result in lost or distorted video and you
may not be able to return to the previous state. Contact Raritan
Technical Support before making any changes.
ƒ
Clock - Controls how quickly video pixels are displayed across
the video page. Changes made to clock settings cause the video
image to stretch or shrink horizontally. Odd number settings are
recommended. Under most circumstances this setting should not
be changed because the autodetect is usually quite accurate.
ƒ
Phase - Phase values range from 0 to 31 and will wrap around.
Stop at the phase value that produces the best video image for
the active target server.
a. Color Settings
These settings control the brightness, contrast, and positioning of
the target server display. Select the Link Color Controls checkbox
to make all slide adjusters move in unison when any one option
is moved.
96
ƒ
Brightness Red - Controls the brightness of the red signal; range
is 0 - 127.
ƒ
Brightness Green - Controls the brightness of the green signal;
range is 0 - 127.
ƒ
Brightness Blue - Controls the brightness of the blue signal;
range is 0 - 127.
ƒ
Contrast Red - Controls the red signal contrast; range is 0 - 255.
ƒ
Contrast Green - Controls the green signal contrast; range is 0 255.
Chapter 3: Working with Target Servers
ƒ
Contrast Blue - Controls the blue signal contrast; range is 0 255.
ƒ
Horizontal Offset - Controls the horizontal positioning of the
target server display on your monitor; range is 0 - 512.
ƒ
Vertical Offset - Controls the vertical positioning of the target
server display on your monitor; range is 0 - 128.
3. To preview the change prior to making the selection, check the
Preview checkbox.
4. Check the Automatic Color Calibration checkbox to enable this
feature.
5. Select the video sensing mode:
ƒ
Best possible video mode - Devices will perform the full Auto
Sense process when switching targets or target resolutions.
Selecting this option calibrates the video for the best image
quality.
ƒ
Quick sense video mode - Selecting this option will cause the
device to use a quick video Auto Sense in order to show the
target's video sooner. This option is especially useful for entering
a target server's BIOS configuration right after a reboot.
97
Chapter 3: Working with Target Servers
6. Click OK to apply the settings and close the dialog. Click Apply to
apply the settings without closing the dialog.
Color Calibration
Use the Color Calibration command if the color levels (hue, brightness,
and saturation) of the transmitted video images do not seem accurate.
The device color settings remain the same when switching from one
target KVM server to another, so you can perform color calibration once
to affect all connected target servers.
1. Open a remote KVM connection to any server running a graphical
user interface.
2. Ensure that a solid white color covers approximately 15% or more of
the target server's desktop.
98
Chapter 3: Working with Target Servers
TIP: Open Microsoft Notepad and maximize the window.
3. On the Video menu, choose Calibrate Color or click the Color
on the toolbar. The target device page will
Calibration button
update its calibration.
Tip: You can also specify automatic color calibration using Tools >
Options. See General Options in MPC (on page 100)for more
information.
Administrative Functions
Although your device provides a remote interface to administrative
functions through the device manager, the client provides an interface to
frequently-used administrative functions directly from its own interface.
When logged into a device as an administrator, you can perform the
administrative tasks discussed here.
Note: Most of the commands discussed here are available in both the
Tools menu and in the shortcut menu that appears when you right-click
the device in the Navigator panel.
Note to MPC Users
MPC users must belong to the Administrator group in order to receive
administrative permissions. MPC uses one permission: either
Administrator or Normal User. It is only when the user belongs to the
Administrator group that they have access to backup, restore, and restart
functions. This is true regardless of any device user group settings that
may be applied to the user.
99
Chapter 3: Working with Target Servers
General Options in MPC
The Options available in the Tools menu provide options that allow you
to customize scroll borders, mouse mode settings, single cursor mode,
auto color calibration, hot key configuration, keyboard type, broadcast
port, and logging.
To configure the general options in MPC:
1. Choose Tools > Options. The Options dialog appears and displays
the General tab by default.
2. Select the "Show scroll borders" checkbox to view the thin scroll
borders designating the autoscroll area.
3. Select the "Auto-Sync mouse in two-cursor mode" checkbox to
enable automatic mouse synchronization.
4. If you select the "Display single cursor mode instructions" checkbox,
the Single Cursor Mode dialog will appear each time Single Cursor is
enabled in the application. See Mouse Options (on page 91) for
more information.
5. Select the Automatic Color Calibration checkbox to enable automatic
color calibration. This option is available for KX generation 1 (G1)
only.
6. Select the Keyboard Type from the drop-down list (depending on the
Raritan device in use, different options may be available):
ƒ
100
US/International
Chapter 3: Working with Target Servers
ƒ
French (France)
ƒ
German (Germany)
ƒ
Japanese
ƒ
United Kingdom
ƒ
Korean (Korea)
ƒ
Belgian (Belgium)
ƒ
Norwegian (Norway)
ƒ
Danish (Denmark)
ƒ
Swedish (Sweden)
ƒ
German (Switzerland)
ƒ
Hungarian (Hungary)
ƒ
Spanish (Spain)
ƒ
Italian (Italy)
ƒ
Slovenian
7. From the Keyboard Shortcut Menu HotKey drop-down, select the key
combination you would like to use to invoke the Shortcut Menu (on
page 79).
8. For advanced options, open the Advanced tab.
9. From the KVM Switch OSUI Hot Key section, select the hot key to
use when switching between target server displays.
101
Chapter 3: Working with Target Servers
10. For the Broadcast Port, type the broadcast port number in the Port
field if you want to use a port other then 5000.
11. Select the Enable IPv6 Networking checkbox for IPv6 to enable IPv4
and IPv6 dual-stack operation.
Note: KSX II and KX II-101 devices are not IPv6 enabled, so this
section will not apply to those devices.
12. Select the Enable Logging checkbox only if directed to by Technical
Support. This option creates a log file in your home directory.
13. Click OK when finished. Click Apply any time while making
selections to apply it.
Upgrading Device Firmware
To update a device's firmware:
1. Connect to the device by highlighting the device's icon in the
Navigator.
2. Click Tools > Update > Update Device to perform firmware
upgrades.
3. You will be prompted to locate a Raritan firmware distribution file
(*.RFP format), which can be found on the Raritan website
(www.raritan.com) on the Firmware Upgrades page.
Ensure that you read all instructions included in Firmware Upgrade
Guide carefully before upgrading a device.
Note: Copy the firmware update file on the Raritan website to a local
machine before uploading. Do not load the file from a network drive.
Changing a Password
To update your password
1. Connect to a target by selecting it in the Navigator.
102
Chapter 3: Working with Target Servers
2. Highlight the target's icon in the Navigator and then choose Tools >
Update > User Password. The Change Password dialog appears.
3. Type your current password in the Old Password field.
4. Type the new password in the New Password field.
5. Retype the password in the Confirm New Password field.
6. When finished, click OK.
Restarting a Device
To restart a device:
1. Select the device in the Navigator.
2. On the Tools menu, choose Restart Device.
Backup and Restore Functions
In addition to using backup and restore for business continuity purposes,
you can use this feature as a time-saving mechanism. For instance, you
can quickly provide access from another Dominion device to your team
by backing up the user configuration settings from the device in use and
restoring those configurations to the new Dominion device.
Backing Up and Restoring a Device Configuration
To back up a device:
1. Download the device configuration to your local computer by
selecting the device in the Navigator.
2. Click Tools > Save Device Configuration.
To restore a device configuration:
1. Upload the archived device configuration by selecting the device in
the Navigator.
103
Chapter 3: Working with Target Servers
2. Click Tools > Restore Device Configuration.
Note that device configuration is specific to a particular device and
should not be restored to another device.
Backing Up and Restoring a User Configuration
To back up a device's user configuration:
1. Select the device in the Navigator.
2. Click Tools > Save User Configuration.
To restore a user configuration:
1. Upload a device's archived user configuration by selecting the device
in the Navigator.
2. Click Tools > Restore User Configuration.
Note: Use these commands to easily transfer user and group information
from one device to another.
Broadcast Port
By default, all Raritan devices send data through Port 5000. This network
traffic includes the autodiscovery broadcast. In the case of conflicts or to
deal with firewall issues, you may want to use a different broadcast port.
MPC Broadcast Port
To change the autodiscovery port from the default broadcast
port of 5000:
1. Select the device in the Navigator.
2. Choose Tools > Options. The Options dialog appears.
3. On the Advanced tab, type the new port number in the Port field of
the Broadcast Port section and then click OK.
104
Chapter 3: Working with Target Servers
Note: If you want the application to autodiscover Raritan devices on the
new broadcast port you entered in the Options dialog, you must
configure all Raritan devices to use the new port number.
Remote Power Management
AC power to associated targets can be managed when used with a
properly configured Raritan Remote Power Control Strip (RPC strip).
Three options are available when performing remote target power
management:
•
Power On
•
Power Off
•
Cycle Power
To change the power status of a target:
1. Select the device in the Navigator.
2. On the Tools menu, choose Power On, Power Off, or Cycle Power.
105
Chapter 4
Virtual Media
In This Chapter
Overview................................................................................................107
Prerequisites for Using Virtual Media ....................................................110
File Server Setup (File Server ISO Images Only) .................................111
Connecting to Virtual Media ..................................................................113
Disconnecting Virtual Media ..................................................................115
106
Chapter 4: Virtual Media
Overview
Virtual media extends KVM capabilities by enabling KVM target servers
to remotely access media from the client PC and network file servers.
With this feature, media mounted on the client PC and network file
servers is essentially mounted virtually by the target server. The target
server can then read from and write to that media as if it were physically
connected to the target server itself. Virtual media can include internal
and USB-mounted CD and DVD drives, USB mass storage devices, PC
hard drives and floppy drives, and ISO images (disk images).
Virtual media provides the ability to perform additional tasks remotely,
such as:
•
Transferring files
•
Running diagnostics
•
Installing or patching applications
•
Complete installation of the operating system (if supported by
machine BIOS)
This expanded KVM control eliminates most trips to the data center,
saving time and money.
107
Chapter 4: Virtual Media
108
Chapter 4: Virtual Media
Diagram key
Local workstation
KX II-101
Target server
Remote file server (ISO images)
USB drive
Floppy drive
CD/DVD drive
Hard drive image files
109
Chapter 4: Virtual Media
Prerequisites for Using Virtual Media
With the KX II-101 virtual media feature, you can mount up to two drives
(of different types) that are supported by the USB profile currently
applied to the target. These drives are accessible for the duration of the
KVM session.
For example, you can mount a specific CD-ROM, use it, and then
disconnect it when you are done. The CD-ROM virtual media “channel”
will remain open, however, so that you can virtually mount another CDROM. These virtual media “channels” remain open until the KVM session
is closed as long as the USB profile supports it.
The following conditions must be met in order to use virtual media:
KX II-101
•
For users requiring access to virtual media, the KX II-101 device
permissions must be set to allow access to the relevant ports, as well
as virtual media access (VM Access port permission) for those ports.
Port permissions are set at the group-level.
•
If you want to use PC-Share, Security Settings must also be enabled
in the Security Settings page. Optional
Client PC
•
Certain virtual media options require administrative privileges on the
client PC (for example, drive redirection of complete drives).
Note: If you are using Microsoft Vista, turn User Account Control off:
Control Panel > User Accounts > User Account Control > turn off.
If you would prefer not to change Vista account permissions, run
Internet Explorer as an administrator. To do this, click the Start
Menu, locate IE, right-click it and select Run as Administrator.
Target Server
•
KVM target servers must support USB connected drives.
•
KVM target servers running Windows 2000 must have all of the
recent patches installed.
•
USB 2.0 ports are both faster and preferred.
To use virtual media:
•
110
Connect/attach the media to the client or network file server that you
want to access from the target server. This need not be the first step,
but it must be done prior to attempting to access this media.
Chapter 4: Virtual Media
File Server Setup (File Server ISO Images Only)
Note: This feature is only required when using virtual media to access file
server ISO images.
ISO9660 format is the standard supported by Raritan. However, other
CD-ROM extensions may also work.
Use the KX II-101 Remote Console File Server Setup page to designate
the files server(s) and image paths that you want to access using KX II101 virtual media. File server ISO image(s) specified here will become
available for selection in the Remote Server ISO Image Hostname and
Image drop-down lists in the Map Virtual Media CD/ISO Image dialog.
See CD-ROM/DVD-ROM/ISO Images (on page 114).
To designate file server ISO images for virtual media access:
1. Choose Virtual Media from the KX II-101 Remote Console. The File
Server Setup page opens.
2. Check the Selected checkbox for all media that you want accessible
as virtual media.
3. Enter information about the file server ISO images that you want to
access:
ƒ
IP Address/Host Name - Host name or IP address of the file
server.
ƒ
Image Path - Full path name of the location of the ISO image.
Note: The host name cannot exceed 232 characters in length.
111
Chapter 4: Virtual Media
4. Click Save. All media specified here will now be available for
selection in the Map Virtual Media CD/ISO Image dialog.
112
Chapter 4: Virtual Media
Connecting to Virtual Media
Local Drives
This option mounts an entire drive, which means the entire disk drive is
mounted virtually onto the target server. Use this option for hard drives
and external drives only. It does not include network drives, CD-ROM, or
DVD-ROM drives. This is the only option for which Read/Write is
available.
To access a drive on the client computer:
1. From the Virtual KVM Client, choose Virtual Media > Connect Drive.
The Map Virtual Media Drive dialog appears.
2. Choose the drive from the Local Drive drop-down list.
3. If you want Read and Write capabilities, select the Read-Write
checkbox. This option is disabled for nonremovable drives. See the
Conditions when Read/Write is Not Available (on page 114) for
more information. When checked, you will be able to read or write to
the connected USB disk.
WARNING: Enabling Read/Write access can be dangerous!
Simultaneous access to the same drive from more than one entity
can result in data corruption. If you do not require Write access,
leave this option unselected.
4. Click Connect. The media will be mounted on the target server
virtually. You can access the media just like any other drive.
113
Chapter 4: Virtual Media
Conditions when Read/Write is Not Available
Virtual media Read/Write is not available in the following situations:
•
For all hard drives.
•
When the drive is write-protected.
•
When the user does not have Read/Write permission:
ƒ
Port Permission Access is set to None or View.
ƒ
Port Permission VM Access is set to Read-Only or Deny.
CD-ROM/DVD-ROM/ISO Images
This option mounts CD-ROM, DVD-ROM, and ISO images.
Note: ISO9660 format is the standard supported by Raritan. However,
other CD-ROM extensions may also work.
To access a CD-ROM, DVD-ROM, or ISO image:
1. From the Virtual KVM Client, choose Virtual Media > Connect CDROM/ISO Image. The Map Virtual Media CD/ISO Image dialog
appears.
2. For internal and external CD-ROM or DVD-ROM drives:
a. Choose the Local CD/DVD Drive option.
b. Choose the drive from the Local CD/DVD Drive drop-down list.
All available internal and external CD and DVD drive names will
be populated in the drop-down list.
114
Chapter 4: Virtual Media
c.
Click Connect.
3. For ISO images:
a. Choose the ISO Image option. Use this option when you want to
access a disk image of a CD, DVD, or hard drive. ISO format is
the only format supported.
b. Click the Browse button.
c.
Navigate to the path containing the disk image you want to use
and click Open. The path is populated in the Image Path field.
d. Click Connect.
4. For remote ISO images on a file server:
a. Choose the Remote Server ISO Image option.
b. Choose Hostname and Image from the drop-down lists. The file
servers and image paths available are those that you configured
using the File Server Setup page. Only items you configured
using the KX II-101 File Server Setup page will be in the dropdown list. See File Server Setup (File Server ISO Images
Only) (on page 111) for more information.
c.
File Server Username - User name required for access to the file
server.
d. File Server Password - Password required for access to the file
server (field is masked as you type).
e. Click Connect.
The media will be mounted on the target server virtually. You can
access the media just like any other drive.
Note: If you are working with files on a Linux target, use the Linux Sync
command after the files are copied using virtual media in order to view
the copied files. Files may not appear until a sync is performed.
Disconnecting Virtual Media
To disconnect the virtual media drives:
•
For local drives, choose Virtual Media > Disconnect Drive.
•
For CD-ROM, DVD-ROM, and ISO images, choose Virtual Media >
Disconnect CD-ROM/ISO Image.
Note: In addition to disconnecting the virtual media using the Disconnect
command, simply closing the KVM connection closes the virtual media
as well.
115
Chapter 5
User Management
In This Chapter
User Groups ..........................................................................................116
Users .....................................................................................................123
Authentication Settings..........................................................................126
Changing a Password ...........................................................................137
User Groups
Every KX II-101 is delivered with three default user groups. These
groups cannot be deleted:
User
Admin
Description
Users that are members of this group have full
administrative privileges. The original, factory-default
user is a member of this group and has the complete
set of system privileges. In addition, the Admin user
must be a member of the Admin group.
Unknown
This is the default group for users who are
authenticated externally using LDAP/LDAPS or
RADIUS or who are unknown to the system. If the
external LDAP/LDAPS or RADIUS server does not
identify a valid user group, the Unknown group is
used. In addition, any newly created user is
automatically put in this group until assigned to
another group.
Individual
Group
An individual group is essentially a “group” of one.
That is, the specific user is in its own group, not
affiliated with other real groups. Individual groups can
be identified by the “@” in the Group Name. The
individual group allows a user account to have the
same rights as a group.
116
Chapter 5: User Management
User Group List
User groups are used with local and remote authentication (via RADIUS
or LDAP/LDAPS). It is a good idea to define user groups before creating
individual users since, when you add a user, you must assign that user
to an existing user group.
The User Group List page displays a list of all user groups, which can be
sorted in ascending or descending order by clicking on the Group Name
column heading. From the User Group List page, you can also add,
modify, or delete user groups.
To list the user groups:
•
Choose User Management > User Group List. The User Group List
page opens.
Relationship Between Users and Groups
Users belong to a group and groups have privileges. Organizing the
various users of your KX II-101 into groups saves time by allowing you to
manage permissions for all users in a group at once, instead of
managing permissions on a user-by-user basis.
You may also choose not to associate specific users with groups. In this
case, you can classify the user as “Individual.”
Upon successful authentication, the device uses group information to
determine the user's permissions, such as which server ports are
accessible, whether rebooting the device is allowed, and other features.
117
Chapter 5: User Management
Adding a New User Group
To add a new user group:
1. Open the Group page by selecting User Management > Add New
User Group or clicking the Add button from the User Group List
page.
The Group page is organized into the following categories: Group,
Permissions, Port Permissions, and IP ACL.
2. Type a descriptive name for the new user group into the Group
Name field (up to 30 characters).
3. Set the permissions for the group. Select the checkboxes before the
permissions you want to assign to all of the users belonging to this
group. See Setting Permissions (on page 122).
4. Set the port permissions. Specify the server ports that can be
accessed by users belonging to this group (and the type of access).
See Setting Port Permissions (on page 119).
5. Set the IP ACL. See Group-Based IP ACL (Access Control List)
(on page 120). This feature limits access to the KX II-101 device by
specifying IP addresses. It applies only to users belonging to a
specific group, unlike the IP Access Control list feature that applies
to all access attempts to the device (and takes priority). Optional
118
Chapter 5: User Management
6. Click OK.
Setting Port Permissions
For each server port, you can specify the access type the group has, as
well as the type of port access to the virtual media and the power control.
Please note that the default setting for all permissions is Deny.
Port Access
Option
Description
Deny
Denied access completely
View
View the video (but not interact with) the connected
target server
Control
Control the connected target server. Control must be
assigned to the group if VM and power control access
will also be granted.
119
Chapter 5: User Management
VM access
Option
Description
Deny
Virtual media permission is denied altogether for the
port
Read-Only
Virtual media access is limited to read access only
Read-Write
Complete access (read, write) to virtual media
Power control access
Option
Description
Deny
Deny power control to the target server
Access
Full permission to power control on a target server
Group-Based IP ACL (Access Control List)
Important: Exercise caution when using group-based IP access
control. It is possible to be locked out of your KX II-101 if your IP
address is within a range that has been denied access.
This feature limits access to the KX II-101 device by users in the
selected group to specific IP addresses. This feature applies only to
users belonging to a specific group, unlike the IP Access Control List
feature that applies to all access attempts to the device, is processed
first, and takes priority.
Important: The IP address 127.0.0.1 is used by the KX II-101 Local
Port and cannot be blocked.
Use the IP ACL section of the Group page to add, insert, replace, and
delete IP access control rules on a group-level basis.
120
Chapter 5: User Management
To add (append) rules:
1. Type the starting IP address in the Starting IP field.
2. Type the ending IP address in the Ending IP field.
3. Choose the action from the available options:
ƒ
Accept - IP addresses set to Accept are allowed access to the
KX II-101 device.
ƒ
Drop - IP addresses set to Drop are denied access to the KX II101 device.
4. Click Append. The rule is added to the bottom of the rules list.
Repeat steps 1 through 4 for each rule you want to enter.
To insert a rule:
1. Enter a rule number (#). A rule number is required when using the
Insert command.
2. Enter the Starting IP and Ending IP fields.
3. Choose the action from the Action drop-down list.
4. Click Insert. If the rule number you just typed equals an existing rule
number, the new rule is placed ahead of the exiting rule and all rules
are moved down in the list.
To replace a rule:
1. Specify the rule number you want to replace.
2. Type the Starting IP and Ending IP fields.
3. Choose the Action from the drop-down list.
4. Click Replace. Your new rule replaces the original rule with the same
rule number.
To delete a rule:
1. Specify the rule number you want to delete.
2. Click Delete.
3. When prompted to confirm the deletion, click OK.
Important: ACL rules are evaluated in the order in which they are
listed. For instance, in the example shown here, if the two ACL
rules were reversed, Dominion would accept no communication at
all.
121
Chapter 5: User Management
Tip: The rule numbers allow you to have more control over the order in
which the rules are created.
Setting Permissions
Important: Selecting the User Management checkbox allows the
members of the group to change the permissions of all users,
including their own. Carefully consider granting these permissions.
Permission
Description
Device Settings
Network settings, date/time settings, port
configuration (channel names, power
associations), event management (SNMP,
Syslog), virtual media file server setup
Diagnostics
Network interface status, network statistics,
ping host, trace route to host, KX II-101
diagnostics
Maintenance
Backup and restore database, firmware
upgrade, factory reset, reboot
PC-Share
Simultaneous access to the same target by
multiple users
Security
SSL certificate, security settings (VM Share,
PC-Share), IP ACL
User
Management
User and group management, remote
authentication (LDAP/LDAPS/RADIUS), login
settings
Setting Permissions for an Individual Group
To set permissions for an individual user group:
1. Locate the group from among the groups listed. Individual groups
can be identified by the @ in the Group Name.
2. Click the Group Name. The Group page opens.
3. Select the appropriate permissions.
4. Click OK.
122
Chapter 5: User Management
Modifying an Existing User Group
Note: All permissions are enabled (and cannot be changed) for the
Admin group.
To modify an existing user group:
1. From the Group page, change the appropriate fields and set the
appropriate permissions.
2. Set the Permissions for the group. Select the checkboxes before the
permissions you want to assign to all of the users belonging to this
group. See Setting Permissions (on page 122).
3. Set the Port Permissions. Specify the server ports that can be
accessed by users belonging to this group (and the type of access).
See Setting Port Permissions (on page 119).
4. Set the IP ACL (optional). This feature limits access to the KX II-101
device by specifying IP addresses. See Group-Based IP ACL
(Access Control List) (on page 120).
5. Click OK.
To delete a user group:
Important: If you delete a group with users in it, the users are
automatically assigned to the <unknown> user group.
Tip: To determine the users belonging to a particular group, sort the User
List by User Group.
1. Choose a group from among those listed by checking the checkbox
to the left of the Group Name.
2. Click Delete.
3. When prompted to confirm the deletion, click OK.
Users
Users must be granted user names and passwords to gain access to the
KX II-101. This information is used to authenticate users attempting to
access your KX II-101.
123
Chapter 5: User Management
User List
The User List page displays a list of all users including their user name,
full name, and user group. The list can be sorted on any of the columns
by clicking on the column name. From the User List page, you can also
add, modify, or delete users.
To view the list of users:
•
Choose User Management > User List. The User List page opens.
Adding a New User
It is a good idea to define user groups before creating KX II-101 users
because, when you add a user, you must assign that user to an existing
user group. See Adding a New User Group (on page 118).
From the User page, you can add new users, modify user information,
and reactivate users that have been deactivated.
Note: A user name can be deactivated when the number of failed login
attempts has exceeded the maximum login attempts set in the Security
Settings page. See Security Settings (on page 184).
To add a new user:
1. Open the User page by choosing User Management > Add New
User or clicking the Add button on the User List page.
2. Type a unique name in the Username field (up to 16 characters).
3. Type the person's full name in the Full Name field (up to 64
characters).
4. Type a password in the Password field and retype the password in
the Confirm Password field (up to 64 characters).
124
Chapter 5: User Management
5. Choose the group from the User Group drop-down list. The list
contains all groups you have created in addition to the systemsupplied default groups. <Unknown>, which is the default setting,
Admin, Individual Group.
If you do not want to associate this user with an existing User Group,
select Individual Group from the drop-down list. For more information
about permissions for an Individual Group, see Setting Permissions
for an Individual Group (on page 122).
6. To activate the new user, select the Active checkbox. The default is
activated (enabled).
7. Click OK.
Modifying an Existing User
To modify an existing user:
1. Locate the user from among those listed on the User List page.
2. Click the user name. The User page opens.
3. On the User page, change the appropriate fields. (See Adding a
New User (on page 124) for information about how to get access the
User page.)
4. To delete a user, click Delete. You are prompted to confirm the
deletion.
5. Click OK.
Blocking and Unblocking Users
A user's access to the system can be blocked by the administrator or
automatically blocked based on security settings. See User Blocking
(on page 188). A blocked user becomes inactive and can be unblocked
by being made active again by the administrator.
To block or unblock a user:
1. Choose User Management > User List. The User List page opens.
2. Select or deselect the Active checkbox.
ƒ
If selected, the user is made active and given access to the KX II101.
ƒ
If deselected, the user is made inactive and cannot access the
KX II-101.
3. Click OK. The user's active status is updated.
125
Chapter 5: User Management
Authentication Settings
Authentication is the process of verifying that a user is who he says he
is. Once a user is authenticated, the user's group is used to determine
his system and port permissions. The user's assigned privileges
determine what type of access is allowed. This is called authorization.
When the KX II-101 is configured for remote authentication, the external
authentication server is used primarily for the purposes of authentication,
not authorization.
From the Authentication Settings page you can configure the type of
authentication used for access to your KX II-101.
Note: Even if you select remote authentication (LDAP/LDAPS or
RADIUS), local authentication is still used.
To configure authentication:
1. Choose User Management > Authentication Settings. The
Authentication Settings page opens.
2. Choose the option for the authentication protocol you want to use
(Local Authentication, LDAP/LDAPS, or RADIUS). Choosing the
LDAP option enables the remaining LDAP fields; selecting the
RADIUS option enables the remaining RADIUS fields.
3. If you choose Local Authentication, proceed to step 6.
4. If you choose LDAP/LDAPS, read the section entitled Implementing
LDAP Remote Authentication for information about completing the
fields in the LDAP section of the Authentication Settings page.
5. If you choose RADIUS, read the section entitled Implementing
RADIUS Remote Authentication (on page 130) for information
about completing the fields in the RADIUS section of the
Authentication Settings page.
6. Click OK to save.
126
Chapter 5: User Management
To return to factory defaults:
•
Click the Reset to Defaults button.
Implementing LDAP/LDAPS Remote Authentication
Lightweight Directory Access Protocol (LDAP/LDAPS) is a networking
protocol for querying and modifying directory services running over
TCP/IP. A client starts an LDAP session by connecting to an
LDAP/LDAPS server (the default TCP port is 389). The client then sends
operation requests to the server, and the server sends responses in turn.
Reminder: Microsoft Active Directory functions natively as an
LDAP/LDAPS authentication server.
To use the LDAP authentication protocol, enter the following
information:
1. Click User Management > Authentication Settings to open the
Authentication Settings page.
2. Click elect the LDAP radio button to enable the LDAP section of the
page.
3. Click the
icon to expand the LDAP section of the page.
127
Chapter 5: User Management
4. In the Primary LDAP Server field, type the IP address or DNS name
of your LDAP/LDAPS remote authentication server (up to 37
characters). When the Enable Secure LDAP option is selected, the
DNS name must be used.
5. In the Secondary LDAP Server field, type the IP address or DNS
name of your backup LDAP/LDAPS server (up to 37 characters).
When the Enable Secure LDAP option is selected, the DNS name
must be used. Note that the remaining fields share the same settings
with the Primary LDAP Server field. Optional
6. In the Secret Phrase field and again in the Confirm Secret Phrase
field, type the server secret (password) required to authenticate
against your remote authentication server (up to 45 characters).
Enter the password in use on the LDAP/LDAPS server.
7. Select the Enable Secure LDAP checkbox if you would like to use
SSL. This will enable the Secure LDAP Port field. Secure Sockets
Layer (SSL) is a cryptographic protocol that allows KX II-101 to
communicate securely with the LDAP/LDAPS server.
8. The default Port is 389. Either use the standard LDAP TCP port or
specify another port.
9. The default Secure LDAP Port is 636. Either use the default port or
specify another port. This field is enabled when the Enable Secure
LDAP checkbox is selected.
10. Certificate File - Consult your authentication server administrator to
get the CA certificate file in Base64 encoded X-509 format for the
LDAP/LDAPS server. Use the Browse button to navigate to the
certificate file. This field is enabled when the Enable Secure LDAP
option is selected.
11. DN of Administrative User - Distinguished Name of administrative
user (up to 31 characters). Consult your authentication server
administrator for the appropriate values to type into this field. An
example DN of administrative User value might be:
cn=Administrator,cn=Users,dc=testradius,dc=com.
12. User Search DN - Enter the name you want to bind against the
LDAP/LDAPS (up to 31 characters), and where in the database to
begin searching for the specified Base DN. An example Base Search
value might be: cn=Users,dc=raritan,dc=com. Consult your
authentication server administrator for the appropriate values to
enter into these fields.
13. Type of external LDAP/LDAPS server. Choose from among the
options available:
128
ƒ
Generic LDAP Server.
ƒ
Microsoft Active Directory. Active Directory is an implementation
of LDAP/LDAPS directory services by Microsoft for use in
Windows environments.
Chapter 5: User Management
14. Active Directory Domain. Type the name of the Active Directory
Domain.
Returning User Group Information from Active Directory Server
The KX II-101 supports user authentication to Active Directory (AD)
without requiring that users be defined locally on the KX II-101. This
allows Active Directory user accounts and passwords to be maintained
exclusively on the AD server. Authorization and AD user privileges are
controlled and administered through the standard KX II-101 policies and
user group privileges that are applied locally to AD user groups.
IMPORTANT: If you are an existing Raritan, Inc. customer, and have
already configured the Active Directory server by changing the AD
schema, the KX II-101 still supports this configuration and you do
not need to perform the following operations. See Updating the
LDAP Schema (on page 231) for information about updating the AD
LDAP/LDAPS schema.
129
Chapter 5: User Management
To enable your AD server on the KX II-101:
1. Using the KX II-101, create special groups and assign proper
permissions and privileges to these groups. For example, create
groups such as KVM_Admin and KVM_Operator.
2. On your Active Directory server, create new groups with the same
group names as in the previous step.
3. On your AD server, assign the KX II-101 users to the groups created
in step 2.
4. From the KX II-101, enable and configure your AD server properly.
See Implementing LDAP/LDAPS Remote Authentication (on
page 127).
Important Notes:
•
Group Name is case sensitive.
•
The KX II-101 provides the following default groups that cannot been
changed or deleted: Admin and <Unknown>. Verify that your Active
Directory server does not use the same group names.
•
If the group information returned from the Active Directory server
does not match a KX II-101 group configuration, the KX II-101
automatically assigns the group of <Unknown> to users who
authenticate successfully.
Implementing RADIUS Remote Authentication
Remote Authentication Dial-in User Service (RADIUS) is an AAA
(authentication, authorization, and accounting) protocol for network
access applications.
To use the RADIUS authentication protocol:
1. Click User Management > Authentication Settings to open the
Authentication Settings page.
2. Click elect the RADIUS radio button to enable the RADIUS section of
the page.
3. Click the
icon to expand the RADIUS section of the page.
4. In the Primary Radius Server and Secondary Radius Server fields,
type the IP address of your primary and optional secondary remote
authentication servers, respectively (up to 37 characters).
5. In the Shared Secret fields, type the server secret used for
authentication (up to 37 characters).
The shared secret is a character string that must be known by both
the KX II-101 and the RADIUS server to allow them to communicate
securely. It is essentially a password.
130
Chapter 5: User Management
6. The Authentication Port default is port is 1812 but can be changed
as required.
7. The Accounting Port default port is 1813 but can be changed as
required.
8. The Timeout is recorded in seconds and default timeout is 1 second,
but can be changed as required.
The timeout is the length of time the KX II-101 waits for a response
from the RADIUS server before sending another authentication
request.
9. The default number of retries is 3 Retries.
This is the number of times the KX II-101 will send an authentication
request to the RADIUS server.
10. Choose the Global Authentication Type from among the options in
the drop-down list:
ƒ
PAP - With PAP, passwords are sent as plain text. PAP is not
interactive. The user name and password are sent as one data
package once a connection is established, rather than the server
sending a login prompt and waiting for a response.
131
Chapter 5: User Management
ƒ
132
CHAP - With CHAP, authentication can be requested by the
server at any time. CHAP provides more security than PAP.
Chapter 5: User Management
Returning User Group Information via RADIUS
When a RADIUS authentication attempt succeeds, the KX II-101
determines the permissions for a given user based on the permissions of
the user's group.
Your remote RADIUS server can provide these user group names by
returning an attribute, implemented as a RADIUS FILTER-ID. The
FILTER-ID should be formatted as follows: Raritan:G{GROUP_NAME}
where GROUP_NAME is a string denoting the name of the group to
which the user belongs.
RADIUS Communication Exchange Specifications
The KX II-101 sends the following RADIUS attributes to your RADIUS
server:
Attribute
Data
Log on
Access-Request (1)
NAS-Port-Type (61)
VIRTUAL (5) for network connections.
NAS-IP-Address (4)
The IP address for the KX II-101.
User-Name (1)
The user name entered at the login screen.
Acct-Session-ID (44)
Session ID for accounting.
User-Password(2)
The encrypted password.
Accounting-Request(4)
Acct-Status (40)
Start(1) - Starts the accounting.
NAS-Port-Type (61)
VIRTUAL (5) for network connections.
NAS-Port (5)
Always 0.
NAS-IP-Address (4)
The IP address for the KX II-101.
User-Name (1)
The user name entered at the login screen.
Acct-Session-ID (44)
Session ID for accounting.
Log off
Accounting-Request(4)
Acct-Status (40)
Stop(2) - Stops the accounting
NAS-Port-Type (61)
VIRTUAL (5) for network connections.
NAS-Port (5)
Always 0.
133
Chapter 5: User Management
134
Attribute
Data
Log on
NAS-IP-Address (4)
The IP address for the KX II-101.
User-Name (1)
The user name entered at the login screen.
Acct-Session-ID (44)
Session ID for accounting.
Chapter 5: User Management
User Authentication Process
When the device is configured to authenticate and authorize local users
from CC, the order in which the user credentials are validated follows the
following process:
135
Chapter 5: User Management
Remote authentication follows the process specified in the flowchart
below:
136
Chapter 5: User Management
Changing a Password
To change your password:
1. Choose User Management > Change Password. The Change
Password page opens.
2. Type your current password in the Old Password field.
3. Type a new password in the New Password field. Retype the new
password in the Confirm New Password field. Passwords can be up
to 64 characters in length and can consist of English alphanumeric
characters and special characters.
4. Click OK.
5. You will receive confirmation that the password was successfully
changed. Click OK.
Note: If strong passwords are in use, this page displays information
about the format required for the passwords. For more information about
passwords and strong passwords, see Strong Passwords (on page
186).
137
Chapter 6
Device Management
In This Chapter
Network Settings ...................................................................................138
Device Services.....................................................................................141
Keyboard/Mouse Setup .........................................................................143
Serial Port Settings................................................................................144
Date/Time Settings ................................................................................148
Event Management ...............................................................................149
Port Configuration..................................................................................154
Analog KVM Switch ...............................................................................162
Resetting the KX II-101 Using the Reset Button ...................................163
Network Settings
Use the Network Settings page to customize the network configuration
(for example, the IP address, discovery port, and LAN interface
parameters) for your KX II-101.
There are two options available to set up your IP configuration:
•
None (default) - This is the recommended option (static IP). Since
the KX II-101 is part of your network infrastructure, you most likely do
not want its IP address to change frequently. This option allows you
to set the network parameters.
•
DHCP - With this option, the IP address is automatically assigned by
a DHCP server.
To change the network configuration:
1. Choose Device Settings > Network. The Network Settings page
opens.
2. Update the Network Basic Settings. See Network Basic Settings
(on page 139).
3. Update the LAN Interface Settings. See LAN Interface Settings (on
page 140).
4. Click OK to set these configurations. If your changes require
rebooting the device, a reboot message appears.
138
Chapter 6: Device Management
To reset to factory defaults:
•
Click Reset to Defaults.
Network Basic Settings
1. Choose Device Settings > Network. The Network Settings page
opens.
2. Specify a meaningful Device Name for your KX II-101 device using
up to 16 alphanumeric characters, valid special characters, and no
spaces.
3. In the IP Address section, enter or select the appropriate network
settings:
a. Enter the IP Address if needed. The default IP address is
192.168.0.192.
b. Enter the Subnet Mask. The default subnet mask is
255.255.255.0.
c.
Enter the Default Gateway if None is selected from the IP Auto
Configuration drop-down.
d. Enter the Preferred DHCP Host Name if DHCP is selected from
the IP Auto Configuration drop-down.
Note: The recommended host name length is 80 characters.
139
Chapter 6: Device Management
e. Select the IP Auto Configuration. The following options are
available:
ƒ
None (Static IP) - This option requires that you manually specify
the network parameters.
This is the recommended option because the KX II-101 is an
infrastructure device and its IP address should not change.
ƒ
DHCP - Dynamic Host Configuration Protocol is used by
networked computers (clients) to obtain unique IP addresses and
other parameters from a DHCP server.
With this option, network parameters are assigned by the DHCP
server. If DHCP is used, enter the Preferred host name (DHCP
only). Up to 80 characters.
4. Select Obtain DNS Server Address Automatically if DHCP is
selected and Obtain DNS Server Address is enabled. When Obtain
DNS Server Address Automatically, the DNS information provided by
the DHCP server will be used.
5. If Use the Following DNS Server Addresses is selected, regardless
of whether DHCP is selected, the addresses entered in this section
will be used to connect to the DNS server.
Enter the following information if the Following DNS Server
Addresses option is selected. These addresses are the primary and
secondary DNS addresses that will be used if the primary DNS
server connection is lost due to an outage.
a. Primary DNS Server IP Address
b. Secondary DNS Server IP Address
6. When finished, click OK. Your KX II-101 is now network accessible.
LAN Interface Settings
The current parameter settings are identified in the Current LAN interface
parameters field.
•
Select the LAN Interface Speed & Duplex settings.
ƒ
Autodetect (default option)
ƒ
10 Mbps/Half - Yellow LED blinks
ƒ
10 Mbps/Full - Yellow LED blinks
ƒ
100 Mbps/Half - Yellow LED blinks and the green LED is always
lit
ƒ
100 Mbps/Full - Yellow LED blinks and the green LED is always
lit
Half-duplex provides for communication in both directions, but
only one direction at a time (not simultaneously).
140
Chapter 6: Device Management
Full-duplex allows communication in both directions
simultaneously.
Note: Occasionally there are problems running at 10 Mbps in either
half or full duplex. If you are experiencing problems, please try
another speed and duplex.
See Network Speed Settings (on page 228).
•
Select the Bandwidth Limit.
ƒ
No Limit
ƒ
128 Kilobit
ƒ
256 Kilobit
ƒ
512 Kilobit
ƒ
2 Megabit
ƒ
5 Megabit
ƒ
10 Megabit
ƒ
100 Megabit
Device Services
Use the Device Services page to specify the connection options for the
KX II-101.
To configure the discovery port:
1. Choose Device Settings > Device Services. The Device Services
page opens.
2. Type the network port used by the KX II-101 to communicate with
the Client PC.
3. Click Save to save the setting.
To enable TELNET Access:
1. Choose Device Settings > Device Services. The Device Services
page opens.
2. Select Enable TELNET Access.
3. Type the network port used for TELNET access to the KX II-101.
4. Click Save to save the setting.
To enable SSH Access:
1. Choose Device Settings > Device Services. The Device Services
page opens.
141
Chapter 6: Device Management
Note: KX II-101 is enabled by factory default.
2. Select Enable SSH Access.
3. Type the network port used for SSH access to the KX II-101.
4. Click Save to save the setting.
Enabling Direct Port Access
Direct port access enables you to access the KX II-101 Remote Client
without having to go through the usual login page. With direct port
access enabled, you can define a URL to navigate directly to the Port
Access page.
To enable direct port access:
1. Choose Device Settings > Device Services. The Device Services
page opens.
2. Select the Enable Direct Port Access via URL checkbox.
3. Click Save to save the setting.
To define a direct port access URL:
•
Define a URL with the IP address, user name, password, and if
necessary, port number of the KX II-101. If you have only one KVM
port, the port number is not needed.
The format for a direct port access URL is:
https://IP
address/dpa.asp?username=username&password=password&port=
port number
142
Chapter 6: Device Management
Tip: Define a direct port access URL once, then save it in your web
browser as a bookmark to make reusing it easier.
Keyboard/Mouse Setup
Use the Keyboard/Mouse Setup page to configure the Keyboard and
Mouse interface between the KX II-101 and the host device.
1. Click Device Settings > Keyboard/Mouse.
2. Select the Host Interface. This selection determines if the KX II-101
sends keyboard and mouse data through the PS/2 or USB
connections.
ƒ
Auto - With this setting, the KX II-101 will use a USB connection
if available, otherwise it will default to the PS/2 connection.
143
Chapter 6: Device Management
ƒ
USB - Forces the KX II-101 to use the USB connection to send
Keyboard and Mouse data to the host device.
ƒ
PS/2 - Forces the KX II-101 to use the PS/2 connection to send
Keyboard and Mouse data to the host device.
Note: If you are using a Raritan switch on the front-end with a KX II101, you must set the Host Interface to PS/2 in order for the
configuration to work properly. See Analog KVM Switch (on page
162).
3. Click OK.
To reset to factory defaults:
•
Click Reset To Defaults.
Serial Port Settings
Use the Serial Port Settings page to configure how the KX II-101
employs its integrated serial port.
Admin Port
To configure the admin serial port:
1. Choose Device Settings > Serial Port. The Serial Port Settings page
appears.
2. Select the Admin Port radio button, if it is not already selected (this is
the default factory setting).
Choose this option to connect to the KX II-101 directly from a client
PC and access the Command Line Interface through a program such
as Hyperterminal. See Command Line Interface (CLI) (on page
210).
3. In the Serial Settings section, configure the following fields:
144
ƒ
Speed
ƒ
Stop Bits
ƒ
Data Bits
ƒ
Handshake
ƒ
Parity
Chapter 6: Device Management
4. Click OK.
Raritan Power Strip Control
To configure the power strip serial port:
1. Choose Device Settings > Serial Port. The Serial Port Settings page
opens.
2. Select the PowerStrip Control radio button. Choose this option when
connecting the KX II-101 to a Raritan power strip.
145
Chapter 6: Device Management
3. Click OK.
Modem
To configure the modem serial port:
1. Choose Device Settings > Serial Port. The Serial Port Settings page
opens.
2. Select the Modem radio button. Choose this option when attaching
an external modem to the KX II-101 in order to provide dial-up
access.
3. In the Modem Settings section, configure the following fields:
146
ƒ
Serial line speed
ƒ
Modem init string - The default string displayed in the field must
be used to enable modem access.
ƒ
Modem server IP address - The address the user types to access
the KX II-101 web interface once connected via modem.
ƒ
Modem client IP address - The address assigned to the user
once connected via modem.
Chapter 6: Device Management
4. Click OK.
See Modem Access Cable Connections (on page 148) for details on
the cable connection for modem access and see Certified Modems (on
page 226) for details on certified modems that work with the KX II-101.
For information on settings that will give you the best performance when
connecting to the KX II-101 via modem, see Creating, Modifying and
Deleting Profiles in MPC (on page 74).
147
Chapter 6: Device Management
Modem Access Cable Connections
Use the following cable connection configuration to connect the KX II101 to a modem:
1. Connect an admin serial cable to the KX II-101.
2. Connect a 9 pin male/male gender changer to the admin serial cable.
3. Connect a null modem cable to other side of the gender changer.
4. Connect the 9 pin male/male gender changer to other end of the null
modem cable.
5. Connect a DB9 to male DB25 modem cable between the null modem
cable and the modem.
Date/Time Settings
Use the Date/Time Settings page to specify the date and time for the KX
II-101. There are two ways to do this:
•
Manually set the date and time.
•
Synchronize the date and time with a Network Time Protocol (NTP)
server.
To set the date and time:
1. Choose Device Settings > Date/Time. The Date/Time Settings page
opens.
2. Choose your time zone from the Time Zone drop-down list.
3. To adjust for daylight savings time, check the "Adjust for daylight
savings time" checkbox.
4. Choose the method you would like to use to set the date and time:
ƒ
User Specified Time - Choose this option to input the date and
time manually.
For the User Specified Time option, enter the date and time. For
the time, use the hh:mm format (using a 24-hour clock).
ƒ
Synchronize with NTP Server - Choose this option to synchronize
the date and time with the Network Time Protocol (NTP) Server.
5. For the Synchronize with NTP Server option:
a. Enter the IP address of the Primary Time server.
b. Enter the IP address of the Secondary Time server. Optional
148
Chapter 6: Device Management
6. Click OK.
Event Management
The KX II-101 Event Management feature provides a set of screens for
enabling and disabling the distribution of system events to SNMP
Managers, Syslog, and the audit log. These events are categorized, and
for each event you can determine whether you want the event sent to
one or several destinations.
149
Chapter 6: Device Management
Configuring Event Management - Settings
SNMP Configuration
Simple Network Management Protocol (SNMP) is a protocol governing
network management and the monitoring of network devices and their
functions. The KX II-101 offers SNMP Agent support through Event
Management.
To configure SNMP (enable SNMP logging):
1. Choose Device Settings > Event Management - Settings. The Event
Management - Settings page appears.
2. Select SNMP Logging Enabled. This enables the remaining SNMP
fields.
3. In the Name, Contact, and Location fields, type the SNMP agent's
name (that is, the device's name) as it appears in the KX II-101
Console interface, a contact name related to this device, and where
the Dominion device is physically located.
4. Type the Agent Community String (the device's string). An SNMP
community is the group to which devices and management stations
running SNMP belong. It helps define where information is sent. The
community name is used to identify the group. The SNMP device or
agent may belong to more than one SNMP community.
5. Specify whether the community is Read-Only or Read/Write using
the Type drop-down list.
6. Configure up to five SNMP managers by specifying their Destination
IP/Host Name, Port #, and Community.
7. Click the Click here to view the Dominion SNMP MIB link to access
the SNMP Management Information Base.
8. Click OK.
To configure the Syslog (enable Syslog forwarding):
1. Select Enable Syslog Forwarding to log the device's messages to a
remote Syslog server.
2. Type the IP Address/Host Name of your Syslog server in the IP
Address field.
3. Click OK.
To reset to factory defaults:
•
150
Click Reset To Defaults.
Chapter 6: Device Management
Event Management - Destinations
System events, if enabled, can generate SNMP notification events
(traps), or can be logged to Syslog or Audit Log. Use the Event
Management - Destinations page to select the system events to track
and where to send this information.
Note: SNMP traps will be generated only if the SNMP Logging Enabled
option is selected. Syslog events will be generated only if the Enable
Syslog Forwarding option is selected. Both of these options are in the
Event Management - Settings page. See Configuring Event
Management - Settings (on page 150).
To select events and their destinations:
1. Choose Device Settings > Event Management - Destinations. The
Event Management - Destinations page opens.
System events are categorized by Device Operation, Device
Management, Security, User Activity, and User Group Administration.
2. Select the checkboxes for those event line items you want to enable
or disable, and where you want to send the information.
151
Chapter 6: Device Management
Tip: Enable or disable entire Categories by checking or clearing the
Category checkboxes, respectively.
3. Click OK.
To reset to factory defaults:
•
Click Reset To Defaults.
Warning: When using SNMP traps over UDP, it is possible for the KX
II-101 and the router that it is attached to to fall out of synchronization
when the KX II-101 is rebooted, preventing the reboot completed
SNMP trap from being logged.
SNMP Agent Configuration
SNMP-compliant devices, called agents, store data about themselves in
Management Information Bases (MIBs) and return this data to the SNMP
managers. Use the Event Logging page to configure the SNMP
connection between the KX II-101 (SNMP Agent) and an SNMP
manager.
SNMP Trap Configuration
SNMP provides the ability to send traps, or notifications, to advise an
administrator when one or more conditions have been met. The following
table lists the KX II-101 SNMP traps:
152
Trap Name
Description
configBackup
The device configuration has been backed up.
configRestore
The device configuration has been restored.
deviceUpdateFailed
Device update has failed.
deviceUpgradeCompleted
The KX II-101 has completed update via an RFP
file.
deviceUpgradeStarted
The KX II-101 has begun update via an RFP file.
factoryReset
The device has been reset to factory defaults.
firmwareFileDiscarded
Firmware file was discarded.
firmwareUpdateFailed
Firmware update failed.
firmwareValidationFailed
Firmware validation failed.
groupAdded
A group has been added to the KX II-101 system.
groupDeleted
A group has been deleted from the system.
groupModified
A group has been modified.
ipConflictDetected
An IP Address conflict was detected.
Chapter 6: Device Management
Trap Name
Description
ipConflictResolved
An IP Address conflict was resolved.
networkFailure
An Ethernet interface of the product can no longer
communicate over the network.
networkParameterChanged
A change has been made to the network
parameters.
passwordSettingsChanged
Strong password settings have changed.
portConnect
A previously authenticated user has begun a KVM
session.
portConnectionDenied
A connection to the target port was denied.
portDisconnect
A user engaging in a KVM session closes the
session properly.
portStatusChange
The port has become unavailable.
powerNotification
The power outlet status notification: 1=Active,
0=Inactive.
powerOutletNotification
Power strip device outlet status notification.
rebootCompleted
The KX II-101 has completed its reboot.
rebootStarted
The KX II-101 has begun to reboot, either through
cycling power to the system or by a warm reboot
from the OS.
securityViolation
Security violation.
startCCManagement
The device has been put under CommandCenter
Management.
stopCCManagement
The device has been removed from
CommandCenter Management.
userAdded
A user has been added to the system.
userAuthenticationFailure
A user attempted to log in without a correct
username and/or password.
userConnectionLost
A user with an active session has experienced an
abnormal session termination.
userDeleted
A user account has been deleted.
userLogin
A user has successfully logged into the KX II-101
and has been authenticated.
userLogout
A user has successfully logged out of the KX II-101
properly.
userModified
A user account has been modified.
153
Chapter 6: Device Management
Trap Name
Description
userPasswordChanged
This event is triggered if the password of any user
of the device is modified.
userSessionTimeout
A user with an active session has experienced a
session termination due to timeout.
vmImageConnected
User attempted to mount either a device or image
on the target using Virtual Media. For every attempt
on device/image mapping (mounting) this event is
generated.
vmImageDisconnected
User attempted to unmount a device or image on
the target using Virtual Media.
Port Configuration
The Port Configuration page displays a list of the KX II-101 ports. Ports
connected to KVM target servers or power strips are displayed in blue
and can be edited.
To change a port configuration:
1. Choose Device Settings > Port Configuration. The Port Configuration
page opens.
Sorting
This page is initially displayed in port number order, but can be sorted on
any of the fields by clicking on the column heading.
•
Port Number - Numbered from 1 to the total number of ports
available for the KX II-101 device.
•
Port Name - The name assigned to the port. A port name displayed
in black indicates that you cannot change the name and that the port
cannot be edited; port names displayed in blue can be edited.
Note: Do not use apostrophes for the Port Name.
ƒ
154
Port Type - The type of target connected to the port:
Chapter 6: Device Management
Port type
Description
PowerStrip
Power strip
KVM
KVM target
1. Click the Port Name for the port you want to edit.
ƒ
For KVM ports, the Port page is opened. In this page, you can
name the ports, create power associations, and set target server
settings.
ƒ
For power strips, the Port page for power strips is opened. In this
page, you can name the power strips and their outlets. See
Power Control (on page 157).
Note: The Power Port 1 link is enabled only when a Raritan power
strip is connected to the KX II-101 and configured. Otherwise, the
link is disabled.
Managing KVM Target Servers (Port Page)
This Port page opens when you select a port from the Port Configuration
page that is connected to a target server. From this page, you can make
a power associations and change the Port Name to something more
descriptive.
A server can have up to four power plugs that you can associate with the
power strip. In this page, you can define those associations so that you
can power on, power off, and power cycle the server from the Port
Access page, as shown below.
Note: To use this feature, you must have a Raritan Dominion PX power
strip attached to the device. See Connecting the Power Strip (on page
157).
To access a port configuration:
1. Choose Device Settings > Port Configuration. The Port Configuration
page opens.
2. Click the Port Name for the port you want to edit.
155
Chapter 6: Device Management
Note: The Power Port 1 link is enabled only when a Raritan power strip is
connected to the KX II-101 and configured. Otherwise, the link is
disabled.
Renaming a Port
To change the port name:
1. Enter a descriptive name, such as the name of the target server. The
name can be up to 32 alphanumeric characters and can include
special characters.
Note: Do not use apostrophes for the Port Name.
2. Click OK.
Valid Special Characters
156
Character
Description
!
Exclamation point ;
Character
Semi-colon
Description
"
Double quote
=
Equal sign
#
Pound sign
>
Greater than sign
$
Dollar sign
?
Question mark
%
Percent sign
@
At sign
&
Ampersand
[
Left bracket
(
Left parenthesis
\
Backward slash
)
Right parenthesis ]
Right bracket
*
Asterisk
^
Caret
+
Plus sign
_
Underscore
,
Comma
`
Grave accent
-
Dash
{
Left brace
.
Period
|
Pipe sign
/
Forward slash
}
Right brace
<
Less than sign
~
Tilde
:
Colon
Chapter 6: Device Management
Power Control
The KX II-101 provides remote power control of a target server. To utilize
this feature, you must have a Raritan remote power strip.
To use the KX II-101 power control feature:
•
Connect the power strip to your target server using the DKX2-101SPDUC connector (not included but available from your reseller or
Raritan). See Connecting the Power Strip (on page 157).
•
Name the power strip (not included but available from your reseller
or Raritan. See Naming the Power Strip (Port Page for Power
Strips) (on page 158).
•
Associate outlet in the power strip to the target server. See
Managing KVM Target Servers (Port Page) (on page 155).
•
Turn the outlets on the power strip on and off in the Power Strip
Device page. See Controlling a Power Strip Device (on page 161).
Connecting the Power Strip
157
Chapter 6: Device Management
Diagram key
DKX2-101-SPDUC connector (not included)
from the KX II-101 to Raritan the power strip.
Raritan power strip.
To connect the KX II-101 to a Raritan power strip:
1. Connect the Mini DIN9M connector of the DKX2-101-SPDUC cable
to the Admin port of the KX II-101.
2. Connect the RJ45M connector of the DKX2-101-SPDUC cable to the
serial port connector on the Raritan power strip.
3. Attach an AC power cord to the target server and an available power
strip outlet on the power strip.
4. Connect the power strip to an AC power source.
5. Power ON the Raritan power strip.
6. Click to Device Settings > Serial Port to open the Serial Port page.
7. Select the Power Strip Control radio button and click OK. Once this
is done, the Power menu is available on the Remote Console.
Naming the Power Strip (Port Page for Power Strips)
This Port page opens when you select a port, connected to a Raritan
remote power strip, from the Port Configuration page. The Type and the
Name fields are pre-populated. The following information is displayed for
each outlet in the power strip: outlet Number, Name, and Port
Association.
Use this page to name the power strip and its outlets. All names can be
up to 32 alphanumeric characters and can include special characters.
Note: When a power strip is associated to a target server (port), the
outlet name is replaced by the target server name (even if you assigned
another name to the outlet).
To name the power strip (and outlets):
Note: CommandCenter Service Gateway does not recognize power strip
names containing spaces.
1. Change the Name of the power strip to something you will
remember.
2. Change the (Outlet) Name if desired. (Outlet names default to Outlet
number.)
158
Chapter 6: Device Management
3. Click OK.
To cancel without saving changes:
•
Click Cancel.
Managing Power Associations
To make power associations (associate power strip outlets with
the KVM target server):
Note: When a power strip is associated with the target server (port), the
outlet name is replaced by the port name. You can change this name in
the Port 2 page.
1. Choose the power strip from the Power Strip Name drop-down list.
2. Choose the outlet from the Outlet Name drop-down list.
3. Repeat steps 1 and 2 for each desired power association.
4. Click OK. A confirmation message appears.
159
Chapter 6: Device Management
To remove a power strip association:
1. Select the appropriate power strip from the Power Strip Name dropdown list.
2. For that power strip, select the appropriate outlet from the Outlet
Name drop-down list.
3. From the Outlet Name drop-down list, select None.
4. Click OK. That power strip/outlet association is removed. A
confirmation message appears.
To show the power port configuration:
•
Choose Home > Device Settings > Port Configuration > [power port
name]. The outlet associations for the power strip appear under
Outlets.
To edit the power port configuration:
1. Change the power port name by editing the port Name field.
2. Change an outlet name by editing the associated outlets Name field.
The outlet name appears in the Power Strip Device page. See
Controlling a Power Strip Device (on page 161).
3. Change the outlet association by clicking the Port Association link
next to the outlet name and editing it in the Port 1 page.
160
Chapter 6: Device Management
Controlling a Power Strip Device
Control the power strip device using the Power Strip Device page. This
page enables you to turn each outlet on the power strip on and off.
To control the power strip connected to the KX II-101:
1. Choose Home > Powerstrip. The Power Strip Device page opens.
2. Click the On or Off button for each outlet to run it on or off.
3. Click OK when prompted to confirm your choice.
Note: The KX II-101 can control only one power strip. You cannot select
another power strip from the Powerstrip menu.
161
Chapter 6: Device Management
Analog KVM Switch
You can configure a Raritan analog KVM switch to work with the KX II101.
The KX II-101's compatibility has been verified with the following Raritan
KVM switches:
•
SwitchMan SW2, SW4 and SW8
•
Master Console MX416 and MXU
Similar products from Raritan or other vendors may be compatible but
support is not guaranteed.
Note: In order for the KX II-101 to work with analog KVM switches, the
switch hotkey that allows you to switch targets must be set to the Scroll
Lock default.
To configure a Raritan analog KVM switch:
1. Set the Host Interface on the Keyboard/Mouse Setup page to PS/2.
If you don't do this and try to configure an analog KVM switch, you
will receive the error "PS/2 is needed to access the KVM Switch.
Please enable PS/2 first!" on the Analog KVM Switch Configuration
page. See Keyboard/Mouse Setup (on page 143).
2. Click Device Settings > Analog KVM Switch. The Analog KVM
Switch Configuration page opens.
3. Select the Use Analog KVM Switch checkbox to enable to fields that
you must define.
4. Select the Raritan switch type from the Switch Type drop-down:
ƒ
Raritan MCC
ƒ
Raritan MX
ƒ
Raritan MXU
ƒ
Raritan Switchman
5. The Port Count field will be populated with the number of ports
available based on the switch type that is selected. Change the port
count if needed or use the default counts. The defaults are:
162
Switch selection
Default port count
Raritan MCC
8
Raritan MX
16
Raritan MXU
16
Raritan Switchman
2
Chapter 6: Device Management
6. Click OK to configure the analog KVM switch.
To restore analog KVM switch defaults:
•
Click Reset to Defaults.
Resetting the KX II-101 Using the Reset Button
On the back panel of the KX II-101, there is a Reset button. It is
recessed to prevent accidental resets (you will need a pointed object to
press this button).
The actions that are performed when the Reset button is pressed are
defined in the graphical user interface. See Encryption & Share (on
page 190).
To reset the device:
1. Power off the KX II-101.
2. Use a pointed object to press and hold the Reset button.
3. While continuing to hold the Reset button, power the KX II-101
device back on.
4. Continue holding the Reset button for 5-10 seconds.
5. Release the Reset button and the KX II-101 will reboot. This typically
takes three minutes.
163
Chapter 6: Device Management
NOTE: If the KX II-101 is set to restore to the factory defaults upon reset,
the IP address, user name, and other options will be set accordingly.
164
Chapter 7
Managing USB Connections
In This Chapter
Overview................................................................................................166
Basic USB Connection Settings ............................................................166
Advanced USB Connection Settings.....................................................168
Known USB Profiles ..............................................................................169
165
Chapter 7: Managing USB Connections
Overview
To broaden the KX II-101's compatibility with different KVM target
servers, Raritan provides a user defined real-time selection of USB
configuration profile options for a wide range of operating system and
BIOS-level server implementations.
The default USB Connection Settings meets the needs of the vast
majority of deployed KVM target server configurations. Additional
configuration items are provided to meet the specific needs of other
commonly deployed server configurations (for example, Linux and Mac
OS X.. There are also a number of configuration items, designated by
platform name and BIOS revision) to enhance virtual media function
compatibility with the target server, for example, when operating at the
BIOS level.
USB profiles are configured on the Device Settings > Port Configuration
> Port page of the KX II-101 Remote Console. A device administrator
can configure the port with the profiles that best meet the needs of the
user and the target server configuration.
WARNING: It is possible, based on the selections you make in the
Advanced USB Connection Settings section, to cause configuration
problems between the KX II-101 and the target server.
Therefore, Raritan strongly recommends that you refer to the most
recent User Defined KX II-101 USB Profile Configuration Table hyperlink,
which can be accessed directly from the Advanced USB Connection
Settings section on the Port page. The information available at the time
of this publication can be found in Known USB Profiles (on page 169).
A user connecting to a KVM target server chooses among these USB
Connection Settings depending on the operational state of the KVM
target server. For example, if the server is running and the user wants to
use the Windows operating system, it would be best to use the default
settings. But if the user wants to change settings in the BIOS menu or
boot from a virtual media drive, depending on the target server model, a
different USB Connection Setting may be more appropriate.
Should none of the USB Connection settings provided by Raritan work
with a given KVM target, please contact Raritan Technical Support for
assistance.
Basic USB Connection Settings
To define USB connections for the target server:
1. Click Device Settings > Port Configuration to open the Port
Configuration page. Click on the port you want to configure.
166
Chapter 7: Managing USB Connections
2. Click the
Connection Settings section.
icon to expand the USB
3. Select the USB connection settings you will be using:
ƒ
Enable Absolute Mouse - Applies only if USB is active
Keyboard/Mouse Interface
ƒ
Use Full Speed - Useful for BIOS that cannot accommodate High
Speed USB devices
ƒ
Enable Absolute mouse scaling for MAC server - Applies only if
USB is active Keyboard/Mouse Interface
ƒ
Enable SUN USB Keyboard support - Applies only if USB is
active Keyboard/Mouse Interface
4. Click OK.
167
Chapter 7: Managing USB Connections
Advanced USB Connection Settings
WARNING: It is possible, based on the selections you make in the
Advanced USB Connection Settings section, to cause configuration
problems between the KX II-101 and the target server. Therefore,
Raritan strongly recommends that you refer to the Known USB
Profiles (on page 169) or to the User Defined KX II-101 USB Profiles
Connection Configuration Table, which can be accessed by clicking its
corresponding link on the Advanced USB Connection Settings section
of the Port page .
To define advanced USB connections for the target server:
1. Click Device Settings > Port Configuration to open the Port
Configuration page. Click on the port you want to configure.
2. Click the
section.
icon to expand the
3. Click the User Defined KX II-101 USB Profile Configuration Table
link to access the recommended configurations to apply to the
Advanced USB Connection Settings section.
4. Configure the following as needed:
168
ƒ
Virtual Media Interface #1 Type
ƒ
Check the Remove Unused VM Interface #1 From Device
Configuration checkbox to remove the specified VM type
interface (for #1).
ƒ
Virtual Media Interface #2 Type
ƒ
Check the Remove Unused VM Interface #2 From Device
Configuration checkbox to remove the specified VM type
interface (for #2).
Chapter 7: Managing USB Connections
5. Click OK.
Known USB Profiles
The current release of the KX II-101 includes the known USB profiles
described in the following tables. However, for the most up-to-date USB
profile information, please click on the User Defined KX II-101 USB
Profiles Connection Configuration Table link in the Advanced USB
Connection Settings section of the page.
Hardware/BIOS: Dell PowerEdge
1950/2950/2970/6950/R200
Server attributes:
BIOS v1.0.0, Windows Server 2003,
Intel Duo Core 800 MHz
169
Chapter 7: Managing USB Connections
Hardware/BIOS: Dell PowerEdge
1950/2950/2970/6950/R200
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Standard configuration.
Hardware/BIOS: Dell PowerEdge 1850
Server attributes:
BIOS A06, Windows Server 2003,
Intel Xeon 2.8GHz, provides support
for USB Flash Emulation
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Change the BIOS setup order to boot from an
USB emulated device.
170
Chapter 7: Managing USB Connections
Hardware/BIOS: Dell PowerEdge 650
Server attributes:
BIOS A05, Windows Server 2003,
Intel P 4 3GHz
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: BIOS accessible YES. No BIOS support to boot
from USB emulated devices.
Hardware/BIOS: Dell PowerEdge 1650
Server attributes:
BIOS A11, Windows Server 2003,
Intel P III 1.26GHz
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
171
Chapter 7: Managing USB Connections
Hardware/BIOS: Dell PowerEdge 1650
Absolute
mouse
Virtual
CD-ROM
media Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
REM disk
Media Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
Comments: BIOS accessible YES. No BIOS support to boot
from USB emulated devices.
Hardware/BIOS: Dell PowerEdge 2650
Server attributes:
BIOS A21, Windows Server 2003,
Intel Xeon 2.3 GHz
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: BIOS accessible YES. No BIOS support to boot
from USB emulated devices.
172
Chapter 7: Managing USB Connections
Hardware/BIOS: Other Dell Optiplex, keyboard only
Server attributes:
GX620 BIOS A11 11/20/06
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
Disabled
Disabled
Comments: BIOS keyboard access. Cannot boot from
redirected drives (CD-ROM/USB)
Hardware/BIOS: HP Compaq DC7100/7600
Server attributes:
BIOS HP Pentium 4/minitower
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
Auto
Disabled
173
Chapter 7: Managing USB Connections
Hardware/BIOS: HP Compaq DC7100/7600
Comments: Virtual CD-ROM and disk drives cannot be used
simultaneously.
Hardware/BIOS: HP Integrity RX1600
Server attributes:
HP-UX 8.11 / CDE
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Boot options accessible - YES. Intelligent Mouse
mode, Standard Mouse mode, and Single Mouse mode are
OK.
Hardware/BIOS: HP Proliant DL145
174
Server attributes:
PhoenixBIOS HP System BIOS005 version 2.17, Build Date
9/26/06
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Chapter 7: Managing USB Connections
Hardware/BIOS: HP Proliant DL145
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Boot from CD-ROM.
Hardware/BIOS: HP Proliant DL145
Server attributes:
PhoenixBIOS HP System BIOS005 version 2.17, Build Date
9/26/06
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
Disable
REM disk
Comments: Boot from flash disk.
175
Chapter 7: Managing USB Connections
Hardware/BIOS: HP Proliant DL360/DL380
Server attributes:
HP Proliant DL360/DL380 G4 (HP
SmartStart CD)
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Use PS/2 keyboard/mouse for BIOS/SmartStart
Installs.
Hardware/BIOS: HP Proliant DL360/DL380
176
Server attributes:
HP Proliant DL360/DL380 G4 (HP
SmartStart CD)
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Chapter 7: Managing USB Connections
Hardware/BIOS: HP Proliant DL360/DL380
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Use USB keyboard/mouse and set the mouse to
Absolute Mouse mode for normal desktop use.
Hardware/BIOS: HP Proliant DL360/DL380
Server attributes:
HP Proliant DL360/DL380 G4
(Windows 2003 Server Installation)
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Use PS/2 keyboard/mouse for BIOS/Windows
Server 2003 installs.
177
Chapter 7: Managing USB Connections
Hardware/BIOS: HP Proliant DL360/DL380
Server attributes:
HP Proliant DL360/DL380 G4
(Windows 2003 Server Installation)
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Use USB keyboard/mouse and set the mouse to
Absolute Mouse mode for normal desktop use.
Hardware/BIOS: IBM eServer System P5
178
Server attributes:
AIX Common Desktop
Environment (CDE)
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Chapter 7: Managing USB Connections
Hardware/BIOS: IBM eServer System P5
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
REM disk
Comments: Boot options accessible - YES. Only use
Intelligent Mouse mode or Single Mouse mode.
Hardware/BIOS: IBM ThinkCentre Lenovo
Server attributes:
BIOS Date 5-26-06, Intel P4 2.8
GHz
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
Auto
Disabled
Comments: ONLY redirected CD-ROM drives are supported.
USB flash drives are not supported. Virtual CD-ROM and disk
drives cannot be used simultaneously.
179
Chapter 7: Managing USB Connections
Hardware/BIOS: Lenovo ThinkPad X61
Server attributes:
BIOS v1.11 2007-11-15
Intel Duo Core 2.20 GHz
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
Auto
Disabled
Comments: Press F1 during startup to enter BIOS. Press F12
to boot from the appropriate virtual media mount (CDROM/USB HDD).
Hardware/BIOS: Lenovo ThinkPad T61
180
Server attributes:
BIOS v1.26 2007-10-18
Intel Core Duo 2.00GHz
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Chapter 7: Managing USB Connections
Hardware/BIOS: Lenovo ThinkPad T61
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused
VM Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused
VM Intf#2
Auto
Disabled
Comments: Press F1 during startup to enter BIOS. Press F12
to boot from the appropriate virtual media mount (CDROM/USB HDD).
Hardware/BIOS: Mac
Server attributes:
BIOS Mac
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
Disabled
Comments: BIOS access setup. Virtual CD-ROM and disk
drives cannot be used simultaneously.
181
Chapter 7: Managing USB Connections
Hardware/BIOS: Mac
Server attributes:
BIOS Mac
Keyboard & mouse:
USB
USB connection
settings:
Advanced USB settings:
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
CD-ROM
Disabled
Comments: Works normally on the Desktop. Virtual CD-ROM
and disk drives cannot be used simultaneously.
Hardware/BIOS: RUBY Industrial Mainboard (AwardBIOS)
182
Server attributes:
RUBY Industrial Mainboard
(AwardBIOS)
Keyboard & mouse:
PS/2
USB connection
settings:
Advanced USB settings:
Chapter 7: Managing USB Connections
Hardware/BIOS: RUBY Industrial Mainboard (AwardBIOS)
Absolute
mouse
Virtual
media
Intf#1
Force full
speed
Remove
Unused VM
Intf#1
Absolute
mouse Mac
server
Virtual
Media
Intf#2
SUN USB
keyboard
Remove
Unused VM
Intf#2
Auto
Disabled
Comments: Use this for the RUBY-9715VG2A series industrial
mainboards with Phoenix/AwardBIOS v6.00PG. Virtual CDROM and disk drives cannot be used simultaneously.
183
Chapter 8
Security Management
In This Chapter
Security Settings....................................................................................184
Logon Limitations ..................................................................................185
Strong Passwords .................................................................................186
User Blocking ........................................................................................188
Encryption & Share................................................................................190
Checking Your Browser for AES Encryption .........................................192
IP Access Control ..................................................................................193
Security Settings
From the Security Settings page, you can specify login limitations, user
blocking, password rules, and encryption and share settings.
Raritan SSL certificates are used for public and private key exchanges,
and provide an additional level of security. Raritan web server certificates
are self-signed. Java applet certificates are signed by a VeriSign
certificate. Encryption guarantees that your information is safe from
eavesdropping and these certificates ensure that you can trust that the
entity is Raritan, Inc.
To configure the security settings:
1. Choose Security > Security Settings. The Security Settings page
opens.
2. Update the Logon Limitations (on page 185) settings as
appropriate.
3. Update the Strong Passwords (on page 186) settings as
appropriate.
4. Update the User Blocking (on page 188) settings as appropriate.
5. Update the Encryption & Share (on page 190) settings as
appropriate.
6. Click OK.
184
Chapter 8: Security Management
To reset back to defaults:
•
Click Reset to Defaults.
Logon Limitations
Using logon limitations, you can specify restrictions for single logon,
password aging, and the logging off of idle users.
Limitation
Description
Enable single logon When selected, only one login per user name is
limitation
allowed at any time. When deselected, a given
user name/password combination can be
connected into the device from several client
workstations simultaneously.
185
Chapter 8: Security Management
Limitation
Description
Enable password
aging
When selected, all users are required to change
their passwords periodically based on the
number of days specified in Password Aging
Interval field.
This field is enabled and required when the
Enable Password Aging checkbox is selected.
Enter the number of days after which a password
change is required. The default is 60 days.
Log off idle users
When selected, the user session is automatically
disconnected after a certain amount of inactive
time has passed. Type the amount of time in the
After field. If there is no activity from the
keyboard or mouse, all sessions and all
resources are logged off. If a virtual media
session is in progress, however, the session
does not timeout.
The After field is used to set the amount of time
(in minutes) after which an idle user will be
logged off. This field is enabled when the Log
Out Idle Users option is selected.
Strong Passwords
Strong passwords provide more secure local authentication for the
system. Using strong passwords, you can specify the format of valid KX
II-101 local passwords such as minimum and maximum length, required
characters, and password history retention.
186
Chapter 8: Security Management
Strong passwords require user-created passwords to have a minimum of
8 characters with at least one alphabetical character and one
nonalphabetical character (punctuation character or number). In addition,
the first four characters of the password and the user name cannot
match.
When selected, strong password rules are enforced. Users with
passwords not meeting strong password criteria will automatically be
required to change their password on their next login. When deselected,
only the standard format validation is enforced. When selected, the
following fields are enabled and required:
Field
Description
Minimum length of strong
password
Passwords must be at least 8
characters long. The default is 8, but it
can be up to 63.
Maximum length of strong
password
The default is 16, but can be up to 64
characters long.
Enforce at least one lower
case character
When checked, at least one lower case
character is required in the password.
Enforce at least one upper
case character
When checked, at least one upper case
character is required in the password.
Enforce at least one
numeric character
When checked, at least one numeric
character is required in the password.
Enforce at least one
printable special character
When checked, at least one special
character (printable) is required in the
password.
Number of restricted
This field represents the password
passwords based on history history depth. That is, the number of
prior passwords that cannot be
repeated. The range is 1-12 and the
default is 5.
187
Chapter 8: Security Management
User Blocking
The User Blocking options specify the criteria by which users are blocked
from accessing the system after the specified number of unsuccessful
login attempts.
The three options are mutually exclusive:
188
Option
Description
Disabled
The default option. Users are not blocked
regardless of the number of times they fail
authentication.
Chapter 8: Security Management
Option
Description
Timer Lockout
Users are denied access to the system for the
specified amount of time after exceeding the
specified number of unsuccessful login attempts.
When selected, the following fields are enabled:
ƒ Attempts - The number of unsuccessful login
attempts after which the user will be locked
out. The valid range is 1 - 10 and the default
is 3 attempts.
ƒ Lockout Time - The amount of time for which
the user will be locked out. The valid range is
1 - 1440 minutes and the default is 5 minutes.
Deactivate User-ID When selected, this option specifies that the user
will be locked out of the system after the number
of failed login attempts specified in the Failed
Attempts field:
ƒ Failed Attempts - The number of unsuccessful
login attempts after which the user's User-ID
will be deactivated. This field is enabled when
the Deactivate User-ID option is selected. The
valid range is 1 - 10.
When a user-ID is deactivated after the specified number of failed
attempts, the administrator must change the user password and activate
the user account by selecting the Active checkbox on the User page.
189
Chapter 8: Security Management
Encryption & Share
Using the Encryption & Share settings you can specify the type of
encryption used, PC and VM share modes, and the type of reset
performed when the KX II-101 Reset button is pressed.
WARNING: If you select an encryption mode that is not supported by
your browser, you will not be able to access the KX II-101 from your
browser.
1. Choose one of the options from the Encryption Mode drop-down list.
When an encryption mode is selected, a warning appears, stating
that if your browser does not support the selected mode, you will not
be able to connect to the KX II-101. The warning states "When the
Encryption Mode is specified please ensure that your browser
supports this encryption mode; otherwise you will not be able to
connect to the Dominion KX2-101."
190
Encryption mode
Description
Auto
This is the recommended option. The KX II101 autonegotiates to the highest level of
encryption possible.
RC4
Secures user names, passwords and KVM
data, including video transmissions using the
RSA RC4 encryption method. This is a 128bit Secure Sockets Layer (SSL) protocol that
provides a private communications channel
between the KX II-101 device and the
Remote PC during initial connection
authentication.
Chapter 8: Security Management
Encryption mode
Description
AES-128
The Advanced Encryption Standard (AES) is
a National Institute of Standards and
Technology specification for the encryption of
electronic data. 128 is the key length. When
AES-128 is specified, be certain that your
browser supports it, otherwise you will not be
able to connect. See Checking Your
Browser for AES Encryption (on page 192)
for more information.
AES-256
The Advanced Encryption Standard (AES) is
a National Institute of Standards and
Technology specification for the encryption of
electronic data. 256 is the key length. When
AES-256 is specified, be certain that your
browser supports it, otherwise you will not be
able to connect. See Checking Your
Browser for AES Encryption (on page 192)
for more information.
Note: MPC will always negotiate to the highest encryption and will
match the Encryption Mode setting if not set to Auto.
Note: If you are running Windows XP with Service Pack 2, Internet
Explorer 7 cannot connect remotely to the KX II-101 using AES-128
encryption.
2. Apply Encryption Mode to KVM and Virtual Media. When selected,
this option applies the selected encryption mode to both KVM and
virtual media. After authentication, KVM and virtual media data is
also transferred with 128-bit encryption.
3. PC Share Mode. Determines global concurrent remote KVM access,
enabling up to eight remote users to simultaneously log into one KX
II-101 and concurrently view and control the same target server
through the device. Click the drop-down list to select one of the
following options:
ƒ
Private - No PC share. This is the default mode. Each target
server can be accessed exclusively by only one user at a time.
ƒ
PC-Share - KVM target servers can be accessed by up to eight
users (administrator or non-administrator) at one time. Each
remote user has equal keyboard and mouse control, however,
note that uneven control will occur if one user does not stop
typing or moving the mouse.
4. If needed, select VM Share Mode. This option is enabled only when
PC-Share mode is enabled. When selected, this option permits the
sharing of virtual media among multiple users, that is, several users
can access the same virtual media session. The default is disabled.
191
Chapter 8: Security Management
5. If needed, select the Disable Local Port Output checkbox. If this
option is selected, there is no video output on the local port.
6. If needed, select Local Device Reset Mode. This option specifies
which actions are taken when the hardware Reset button (at the
back of the device) is depressed. For more information, see
Resetting the KX II-101 - Using the Reset Button (see "Resetting
the KX II-101 Using the Reset Button" on page 163). Choose one of
the following options:
PC Share mode
Description
Enable Local Factory Returns the KX II-101 device to the factory
Reset (default)
defaults.
Enable Local Admin
Password Reset
Resets the local administrator password only.
The password is reset to raritan.
Disable All Local
Resets
No reset action is taken.
Checking Your Browser for AES Encryption
The KX II-101 supports AES-256. If you do not know if your browser
uses AES, check with the browser manufacturer or navigate to the
https://www.fortify.net/sslcheck.html website using the browser with the
encryption method you want to check. This website detects your
browser's encryption method and displays a report.
Note: IE6 does not support AES 128 or 256-bit encryption.
AES 256 Prerequisites and Supported Configurations
AES 256-bit encryption is supported on the following web browsers only:
•
Firefox 2.0.0.x
•
Mozilla 1.7.13
•
Internet Explorer 7
In addition to browser support, AES 256-bit encryption requires the
installation of Java Cryptography Extension (JCE) Unlimited Strength
Jurisdiction Policy Files.
Jurisdiction files for various JRE's are available at the “other downloads”
section of the following link:
•
192
JRE1.5 - http://java.sun.com/javase/downloads/index_jdk5.jsp
Chapter 8: Security Management
IP Access Control
Using IP access control, you can control access to your KX II-101. By
setting a global Access Control List (ACL) you are by ensuring that your
device does not respond to packets being sent from disallowed IP
addresses. The IP access control is global, affecting the KX II-101 as a
whole, but you can also control access to your device at the group level.
Important: IP address 127.0.0.1 is used by the KX II-101 local port.
When creating an IP Access Control list, if 127.0.0.1 is within the
range of IP addresses that are blocked, you will not have access to
the KX II-101 local port.
To use IP access control:
1. Open the IP Access Control page by selecting Security > IP Access
Control. The IP Access Control page opens.
2. Select the Enable IP Access Control checkbox to enable IP access
control and the remaining fields on the page.
3. Choose the Default Policy. This is the action taken for IP addresses
that are not within the ranges you specify.
ƒ
Accept - IP addresses are allowed access to the KX II-101
device.
ƒ
Drop - IP addresses are denied access to the KX II-101 device.
To add (append) rules:
1. Type the IP address and subnet mask in the IP/Mask field.
Note: The IP address should be entered using CIDR (Classless
Inter-Domain Routing notation, in which the first 24 bits are used as
a network address).
2. Choose the Policy from the drop-down list.
3. Click Append. The rule is added to the bottom of the rules list.
To insert a rule:
1. Type a rule number (#). A rule number is required when using the
Insert command.
2. Type the IP address and subnet mask in the IP/Mask field.
3. Choose the Policy from the drop-down list.
4. Click Insert. If the rule number you just typed equals an existing rule
number, the new rule is placed ahead of the existing rule and all
rules are moved down in the list.
193
Chapter 8: Security Management
Tip: Rule numbers allow you to have more control over the order in
which the rules are created.
To replace a rule:
1. Specify the rule number you want to replace.
2. Type the IP address and subnet mask in the IP/Mask field.
3. Choose the Policy from the drop-down list.
4. Click Replace. Your new rule replaces the original rule with the same
rule number.
To delete a rule:
1. Specify the rule number you want to delete.
2. Click Delete.
3. You are prompted to confirm the deletion. Click OK.
194
Chapter 9
Maintenance
In This Chapter
Audit Log................................................................................................195
Device Information.................................................................................196
Backup and Restore ..............................................................................197
Upgrading Firmware ..............................................................................198
Upgrade History.....................................................................................200
Rebooting ..............................................................................................201
Audit Log
A log is created of the KX II-101 system events.
To view the audit log for your KX II-101:
1. Choose Maintenance > Audit Log. The Audit Log page opens.
The Audit Log page displays events by date and time (most recent
events listed first). The Audit Log provides the following information:
ƒ
Date - The date and time that the event occurred based on a 24hour clock.
ƒ
Event - The event name as listed in the Event Management
page.
ƒ
Description - Detailed description of the event.
To save the audit log:
1. Click Save to File. A Save File dialog appears.
2. Choose the desired file name and location and click Save. The audit
log is saved locally on your client machine with the name and
location specified.
To page through the audit log:
•
Use the [Older] and [Newer] links.
195
Chapter 9: Maintenance
Device Information
The Device Information page provides detailed information about your
KX II-101 device. This information is helpful should you need to contact
Raritan Technical Support.
To view information about your KX II-101:
•
Choose Maintenance > Device Information. The Device Information
page opens.
The following information is provided about the KX II-101:
196
•
Model
•
Hardware Revision
•
Firmware Version
•
Serial Number
•
MAC Address
Chapter 9: Maintenance
Backup and Restore
From the Backup/Restore page, you can backup and restore the settings
and configuration for your KX II-101.
In addition to using backup and restore for business continuity purposes,
you can use this feature as a time-saving mechanism. For instance, you
can quickly provide access to your team from another KX II-101 by
backing up the user configuration settings from the KX II-101 in use and
restoring those configurations to the new KX II-101. You can also set up
one KX II-101 and copy its configuration to multiple KX II-101 devices.
To access the Backup/Restore page:
•
Choose Maintenance > Backup/Restore. The Backup/Restore page
opens.
Note: Backups are always complete system backups. Restores can be
complete or partial depending on your selection.
To backup your KX II-101:
1. Click Backup. A File Download dialog appears.
2. Click Save. A Save As dialog appears.
3. Choose the location, specify a file name, and click Save. A
Download Complete dialog appears.
4. Click Close. The backup file is saved locally on your client machine
with the name and location specified.
197
Chapter 9: Maintenance
To restore your KX II-101:
WARNING: Exercise caution when restoring your KX II-101 to an
earlier version. Usernames and password in place at the time of the
backup will be restored. If you do not remember the old administrative
usernames and passwords, you will be locked out of the KX II-101.
In addition, if you used a different IP address at the time of the
backup, that IP address will be restored as well. If the configuration
uses DHCP, you may want to perform this operation only when you
have access to the local port to check the IP address after the update.
1. Choose the type of restore you want to run:
ƒ
Full Restore - A complete restore of the entire system. Generally
used for traditional backup and restore purposes.
ƒ
Protected Restore - Everything is restored except device-specific
information such as IP address, name, and so forth. With this
option, you can setup one KX II-101 and copy the configuration
to multiple KX II-101 devices.
ƒ
Custom Restore - With this option, you can select User and
Group Restore, Device Settings Restore, or both. Select the
appropriate checkboxes:
ƒ
User and Group Restore - This option includes only user and
group information. Use this option to quickly set up users on
a different KX II-101.
ƒ
Device Settings Restore - This option includes only device
settings. Use this option to quickly copy the device
information.
2. Click Browse. A Choose File dialog appears.
3. Navigate to and select the appropriate backup file and click Open.
The selected file is listed in the Restore File field.
4. Click Restore. The configuration (based on the type of restore
selected) is restored.
Upgrading Firmware
Use the Firmware Upgrade page to upgrade the firmware for your KX II101.
Important: Do not turn off your KX II-101 device while the upgrade is
in progress - doing so will likely result in damage to the device.
198
Chapter 9: Maintenance
To upgrade your KX II-101 device:
1. Choose Maintenance > Firmware Upgrade. The Firmware Upgrade
page opens.
2. Click the Show Latest Firmware link, locate the appropriate Raritan
firmware distribution file (*.RFP) from the Firmware Upgrades > KX
II-101 page, and download the file.
3. Unzip the file and read all instructions included in the firmware ZIP
files carefully before upgrading.
Note: Copy the firmware update file to a local PC before uploading.
Do not load the file from a network drive. Click the Browse button to
navigate to the directory where you unzipped the upgrade file.
4. Click Upload from the Firmware Upgrade page. Information about
the upgrade and version numbers is displayed for your confirmation:
Note: At this point, connected users are logged out, and new login
attempts are blocked.
199
Chapter 9: Maintenance
5. Click Upgrade. Wait for the upgrade to complete. Status information
and progress bars are displayed during the upgrade. Upon
completion of the upgrade, the device reboots.
6. As prompted, close the browser and wait approximately 5 minutes
before logging into the KX II-101 again.
For information about upgrading the device firmware using the MultiPlatform Client, see the Raritan Multi-Platform Client (MPC) User
Guide.
Upgrade History
The KX II-101 provides information about upgrades performed on the KX
II-101 device.
To view the upgrade history:
•
200
Choose Maintenance > Upgrade History. The Upgrade History page
opens.
Chapter 9: Maintenance
Rebooting
The Reboot page provides a safe and controlled way to reboot your KX
II-101. This is the recommended method for rebooting.
Important: All KVM and serial connections will be closed and all
users will be logged off.
To reboot your KX II-101:
1. Choose Maintenance > Reboot. The Reboot page opens.
2. Click Reboot. You are prompted to confirm the action. Click Yes to
proceed with the reboot.
201
Chapter 10 Diagnostics
The Diagnostics pages are used for troubleshooting and are intended
primarily for the administrator of the KX II-101 device. All of the
Diagnostics pages (except Device Diagnostics) run standard networking
commands and the information that is displayed is the output of those
commands. The Diagnostics menu options help you debug and configure
the network settings.
The Device Diagnostics option is intended for use in conjunction with
Raritan Technical Support.
In This Chapter
Network Interface Page .........................................................................202
Network Statistics Page.........................................................................203
Ping Host Page......................................................................................206
Trace Route to Host Page .....................................................................206
Device Diagnostics ................................................................................208
Network Interface Page
The KX II-101 provides information about the status of your network
interface.
To view information about your network interface:
•
Choose Diagnostics > Network Interface. The Network Interface
page opens.
202
Chapter 10: Diagnostics
The following information is displayed:
•
Whether the Ethernet interface is up or down.
•
Whether the gateway is pingable or not.
•
The LAN port that is currently active.
To refresh this information:
•
Click the Refresh button.
Network Statistics Page
The KX II-101 provides statistics about your network interface.
To view statistics about your network interface:
1. Choose Diagnostics > Network Statistics. The Network Statistics
page opens.
2. Choose the appropriate option from the Options drop-down list:
203
Chapter 10: Diagnostics
ƒ
204
Statistics - Produces a page similar to the one displayed here.
Chapter 10: Diagnostics
ƒ
Interfaces - Produces a page similar to the one displayed here.
ƒ
Route - Produces a page similar to the one displayed here.
3. Click Refresh. The relevant information is displayed in the Result
field.
205
Chapter 10: Diagnostics
Ping Host Page
Ping is a network tool used to test whether a particular host or IP
address is reachable across an IP network. Using the Ping Host page,
you can determine if a target server or another KX II-101 is accessible.
To ping the host:
1. Choose Diagnostics > Ping Host. The Ping Host page appears.
2. Type either the hostname or IP address into the IP Address/Host
Name field.
Note: The host name cannot exceed 232 characters in length.
3. Click Ping. The results of the ping are displayed in the Result field.
Trace Route to Host Page
Trace route is a network tool used to determine the route taken to the
provided hostname or IP address.
To trace the route to the host:
1. Choose Diagnostics > Trace Route to Host. The Trace Route to Host
page opens.
2. Type either the IP address or host name into the IP Address/Host
Name field.
Note: The host name cannot exceed 232 characters in length.
206
Chapter 10: Diagnostics
3. Choose the maximum hops from the drop-down list (5 to 50 in
increments of 5).
4. Click Trace Route. The trace route command is executed for the
given hostname or IP address and the maximum hops. The output of
trace route is displayed in the Result field.
207
Chapter 10: Diagnostics
Device Diagnostics
Note: This page is for use by Raritan Field Engineers or when you are
directed by Raritan Technical Support.
The Device Diagnostics page downloads diagnostics information from
the KX II-101 to the client machine. A device diagnostics log can be
generated with or without running an optional diagnostic script provided
by Raritan Technical Support. A diagnostics script produces more
information for diagnosing problems.
Use the following settings:
•
Diagnostics Scripts - Loads a special script provided by Raritan
Technical Support during a critical error debugging session. The
script is uploaded to the device and executed. Optional
•
Device Diagnostic Log - Downloads a snapshot of diagnostics
messages from the KX II-101 device to the client. This encrypted file
is then sent to Raritan Technical Support. Only Raritan can interpret
this file.
Note: This page is accessible only by users with administrative
privileges.
To run the KX II-101 System diagnostics:
1. Choose Diagnostics > Device Diagnostics. The Device Diagnostics
page opens.
2. (Optional) Perform the following steps if you have received a
diagnostics script file from Raritan Technical Support. Otherwise,
skip to step 3.
208
Chapter 10: Diagnostics
a. Retrieve the diagnostics file supplied by Raritan and unzip as
necessary.
b. Click Browse. A Choose File dialog appears.
c.
Navigate to and select this diagnostics file.
d. Click Open. The file is displayed in the Script File field:
e. Click Run Script.
3. Create a diagnostics file to send to Raritan Technical Support:
a. Click Save to File. The File Download dialog appears.
b. Click Save. The Save As dialog appears.
c.
Navigate to the desired directory and click Save.
4. Email this file as directed by Raritan Technical Support.
209
Chapter 11 Command Line Interface (CLI)
In This Chapter
Overview................................................................................................210
Accessing the KX II-101 Using the CLI .................................................211
SSH Connection to the KX II-101..........................................................211
Logging On ............................................................................................212
Navigation of the CLI .............................................................................212
CLI Commands......................................................................................214
Overview
This chapter provides an overview of the CLI commands that can be
used with the KX II-101. See CLI Commands (on page 214) for a list of
commands and definitions and links to the sections in this chapter that
give examples of these commands.
The following diagram provides an overview of the CLI commands:
Note: The following common commands can be used from all levels of
the CLI to the preceding figure: top, history, logout, quit, and help.
210
Chapter 11: Command Line Interface (CLI)
Accessing the KX II-101 Using the CLI
Access the KX II-101 using one of the following methods:
•
TELNET via IP connection
•
SSH (Secure Shell) via IP connection
•
Multi-function admin serial port via RS-232 serial interface with
provided cable and a terminal emulation program like HyperTerminal
Several SSH/TELNET clients are available and can be obtained from the
following locations:
•
PuTTy - http://www.chiark.greenend.org.uk/~sgtatham/putty/
http://www.chiark.greenend.org.uk/~sgtatham/putty/
•
SSH Client from ssh.com - www.ssh.com http://www.ssh.com
•
Applet SSH Client - www.netspace.org/ssh
http://www.netspace.org/ssh
•
OpenSSH Client - www.openssh.org http://www.openssh.org
Note: Accessing the CLI by SSH or TELNET requires you to set up
access in the Device Services page of the KX II-101 Remote Client. See
Device Services (on page 141).
SSH Connection to the KX II-101
Use any SSH client that supports SSHv2 to connect to the device. You
must enable SSH access from the Devices Services page. See Device
Services (on page 141).
Note: For security reasons, SSH V1 connections are not supported by
the KX II-101.
SSH Access from a Windows PC
To open an SSH session from a Windows PC:
1. Launch the SSH client software.
2. Enter the IP address of the KX II-101 server. For example,
192.168.0.192.
3. Choose SSH, which uses the default configuration port 22.
4. Click Open.
5. The login as: prompt appears.
See Logging On (on page 212).
211
Chapter 11: Command Line Interface (CLI)
SSH Access from a UNIX/Linux Workstation
To open an SSH session from a UNIX/Linux workstation and log
in as the user admin, enter the following command:
ssh -l admin 192.168.30.222
The Password prompt appears.
See Logging On (on page 212).
Logging On
To log in, enter the user name admin as shown:
1. Login: admin
2. The password prompt appears. Enter the default password: raritan.
The welcome message appears. You are now logged in as an
Administrator.
After reviewing the following Navigation of the CLI (on page 212)
section, you can perform the initial configuration tasks described in
Configure the KX II-101 Using a Terminal Emulation Program
(Optional) (on page 29).
Navigation of the CLI
Before using the CLI, it is important to understand CLI navigation and
syntax. There are also some keystroke combinations that simplify CLI
use.
212
Chapter 11: Command Line Interface (CLI)
CLI Prompts
The Command Line Interface prompt indicates the current command
level. The root portion of the prompt is the login name. For a direct admin
serial port connection with a terminal emulation application, Admin Port
is the root portion of a command.
admin >
For TELNET/SSH, admin is the root portion of the command:
admin > config > network >
Completion of Commands
The CLI supports the completion of partially-entered commands. After
entering the first few characters of an entry, press the Tab key. If the
characters form a unique match, the CLI will complete the entry.
•
If no match is found, the CLI displays the valid entries for that level.
•
If multiple matches are found, the CLI displays all valid entries.
Enter additional text to make the entry unique and press the Tab key to
complete the entry.
213
Chapter 11: Command Line Interface (CLI)
CLI Syntax -Tips and Shortcuts
Tips
•
Commands are listed in alphabetical order.
•
Commands are not case sensitive.
•
Parameter names are single word without underscore.
•
Commands without arguments default to show current settings for
the command.
•
Typing a question mark ( ? ) after a command produces help for that
command.
•
A pipe symbol ( | ) indicates a choice within an optional or required
set of keywords or arguments.
Shortcuts
•
Press the Up arrow key to display the last entry.
•
Press Backspace to delete the last character typed.
•
Press Ctrl + C to terminate a command or cancel a command if you
typed the wrong parameters.
•
Press Enter to execute the command.
•
Press Tab to complete a command. For example, Admin Port >
Conf. The system then displays the Admin Port > Config >
prompt.S
Common Commands for All Command Line Interface Levels
CLI Commands lists the commands that are available at all CLI levels.
These commands also help navigate through the CLI.
Command
top
Description
Return to the top level of the CLI hierarchy, or the
“username” prompt.
history
Display the last 200 commands the user entered into
the KX II-101 CLI.
help
Display an overview of the CLI syntax.
quit
Places the user back one level.
logout
Logs out the user session.
CLI Commands
The table below lists and describes all available CLI commands.
214
Chapter 11: Command Line Interface (CLI)
Command
Description
config
Switch to the Configuration menu.
diagnostics (on
page 215)
Switch to the diagnostics menu.
debug (on page
216)
Switch to debug menu.
help
Display an overview of the CLI syntax.
history
Display the current session's command line history.
interface
Configure the KX II-101 network interface.
listports (see
"Listports
Command" on page
218)
Lists the port, port name, port type, port status, and port
availability.
logout
Logout of the current CLI session.
name (see "Name
Command" on page
217)
Sets the device name.
network (on page
217)
Displays network configuration and enables you to
configure network settings.
quit
Return to previous command.
setlog (see "Setlog
Command" on page
216)
Sets device logging options.
top
Return to the root menu.
userlist (see
Lists the number of active users, user names, port, and
"Userlist Command" status.
on page 218)
Diagnostics
The Diagnostics menu enables you to set the logging options for different
modules of the KX II-101. You should set logging options only when
instructed by a Raritan Technical Support engineer. These logging
options enable a support engineer to get the right kind of information for
debugging and troubleshooting purposes. When instructed by a support
engineer, you will be told how to set logging options and how to generate
a log file to send to Raritan technical support.
Important: Set logging options only under the supervision of a
Raritan Technical Support engineer.
215
Chapter 11: Command Line Interface (CLI)
Debug
The Diagnostics > Debug menu enables you to choose the Setlog
command to set logging options for the KX II-101.
Setlog Command
The Setlog command enables you set the logging level for different
modules of the KX II-101 and to view the current logging levels for each
module. The syntax for the setlog command is:
setlog [module <module>] [level <level>] [vflag <vflag>]
[verbose <on|off>]
Set/Get diag log level
The Setlog command options are described in the following table.
Raritan Technical Support will tell you how to configure these settings.
Command Option
module
Description
The module name.
level
The diagnostics level:
ƒ err
ƒ warn
ƒ info
ƒ debug
ƒ trace
vflag
The type of verbose flag:
ƒ timestamp
ƒ module
ƒ thread
ƒ fileline
verbose [on|off]
Turns verbose logging on and off.
Setlog Command Example
The following Setlog command sets the logging level to debug with
verbose logging on for the libpp_serial module.
Setlog module libpp_serial level debug verbose on
Configuration
The Configuration menu enables you to access the network commands
used to configure the network interface and set the device name.
216
Chapter 11: Command Line Interface (CLI)
Network
The Configuration > Network commands are used to configure the KX II101 network connection and device name.
Command
interface
Description
Configure the KX II-101 device
network interface.
name
Set the device name.
Name Command
The name command is used to configure the device and host name.
Syntax
name [unitname name] [domain name] [force
<true|false>]
name Command Example
The following command sets the device name:
Admin Port > Config > Network > name unitname
<device name> domain <host name> force trues
Interface Command
The interface command is used to configure the KX II-101 network
interface. When the command is accepted, the device will drop the
HTTP/HTTPS connection and initialize a new network connection. All
HTTP/HTTPS users must reconnect to the device using the new IP
address and the correct username and password. See Installation and
Configuration (on page 9).
The syntax of the interface command is:
interface [ipauto <none|dhcp>] [ip <ipaddress>]
[mask <subnetmask>] [gw <ipaddress>] [mode
<auto/10hdx/10fdx/100hdx/100fdx]
The network command options are described in the following table.
Command Option
ipauto
Description
Static or dynamic IP address
ip ipaddress
IP address of the KX II-101 assigned for
access from the IP network
mask subnetmask
Subnet mask obtained from the IP
administrator
217
Chapter 11: Command Line Interface (CLI)
Command Option
gw ipaddress
Description
Gateway IP address obtained from the
IP administrator
mode <auto | 100fdx>
Set Ethernet Mode to auto detect or
force 100MB/s full duplex (100fdx)
Interface Command Example
The following command sets the IP address, mask, and gateway
addresses, and sets the mode to auto detect.
Admin Port > Config > Network > interface ipauto none
ip 192.168.50.12 mask 255.255.255.0 gw 192.168.51.12
mode auto
Listports Command
The Listports command lists the number of active users, user names,
port, and status.
Listports Command Example
Admin Port > listports
Port Port
Port Port
No.
Type Status Availability
1
Name
- Dominion_KXII-101_Port KVM
up
Port
idle
Userlist Command
The Userlist command lists the port, port name, port type, port status,
and port availability.
Userlist Command Example
Admin Port > Userlist
Active user number: 1
User Name | From
| Status
----------------------------------------------------admin
218
| Admin Port | active
Chapter 12 CC Unmanage
In This Chapter
Overview................................................................................................219
Removing a KX II-101 from CC-SG Management ................................220
Using CC-SG in Proxy Mode.................................................................221
Overview
When a KX II-101 device is under CommandCenter Secure Gateway
control and you attempt to access the device directly using the KX II-101
Remote Console, the following message appears (after entry of a valid
user name and password).
219
Chapter 12: CC Unmanage
Removing a KX II-101 from CC-SG Management
Unless the KX II-101 is released from CC-SG control, you cannot access
the device directly. However, if the KX II-101 does not receive heartbeat
messages from CommandCenter (for example, CommandCenter is not
on the network), you can release the KX II-101 from CC-SG control in
order to access the device. This is accomplished by using the CC
Unmanage feature.
Note: Maintenance permission is required to use this feature.
When no heartbeat messages are received, the following message
appears when attempting to access the device directly.
To remove the device from CC-SG management (to use CC
Unmanage):
1. Click Yes. You are prompted to confirm the action.
220
Chapter 12: CC Unmanage
2. Click Yes. A message appears, confirming that the device is no
longer under CC management.
3. Click OK. The KX II-101 login page opens.
Using CC-SG in Proxy Mode
Virtual KVM Client Version not Known from CC-SG Proxy Mode
When the Virtual KVM Client is launched from CommandCenter Secure
Gateway (CC-SG) in proxy mode, the Virtual KVM Client version is
unknown. In the About Raritan Virtual KVM Client dialog, the version is
displayed as “Version Unknown”.
Proxy Mode and MPC
If you are using the KX II-101 in a CC-SG configuration, do not use the
CC-SG proxy mode if you are planning to use the Multi-Platform Client
(MPC).
221
Appendix A Specifications
In This Chapter
KX II-101 Specifications ........................................................................222
Supported Video Resolutions ................................................................223
Supported Keyboard Languages...........................................................224
Supported Operating Systems (Clients)................................................225
Supported Browsers ..............................................................................225
Certified Modems ..................................................................................226
Connectors ............................................................................................226
TCP and UDP Ports Used .....................................................................226
Network Speed Settings ........................................................................228
Admin Port Pinout Information ..............................................................229
9 Pin Pinout ...........................................................................................230
KX II-101 Specifications
Specification
Description
Form factor
Zero U form factor. Vertically or horizontally
rack mountable (bracket kit included).
Dimensions (DxWxH)
4.055"x 2.913"x 1.063"; 103 x 74 x 27mm
Weight
0.6292lbs; 0.286kg
Power
•
AC/DC (100-240V~/ 6VDC)
•
Power over Ethernet (PoE)
ƒ
Mid-Span Power Insertion
ƒ
Signal-Pair Power Insertion
Operating temperature 0° - 40°C (32° - 104°F)
Humidity
20% - 85% RH
Indicators:
•
Boot-up and power-level indicator
•
Blue RARITAN
back-lit logo
•
Network activity and connection speed
indicator
•
Network Port
•
1- Mini USB port for USB keyboard /
mouse and virtual media connectivity to
the target
•
1- MiniDIN9 port for multi-function serial
port of full RS-232 features, modem
connection, and Dominion PX connectivity
Local connection
222
Appendix A: Specifications
Specification
Remote connection:
•
Description
• One 10/100 Ethernet (RJ45) port
Network Protocols •
TCP/IP, HTTP, HTTPS, UDP, RADIUS,
LDAP, SNTP, DHCP
Screen resolutions:
•
720x400 (for DOS)
•
PC graphic mode
•
640 X 480 @ 60/72/75/85Hz,
•
SUN® video mode •
•
Certifications
800 X 600 @ 56/60/72/75/85Hz,
1024 X 768 @ 60/70/75/85Hz,
•
1152 X 864 @ 60/75Hz,
•
1280 X 1024 @ 60Hz,
•
1600 X 1200 @ 60Hz
sUL/CUL, FCC Class A, CB, CE Class A and
VCCI Class A
Supported Video Resolutions
Ensure that each target server's video resolution and refresh rate are
supported by the KX II-101 and that the signal is noninterlaced.
The KX II-101 supports these resolutions:
Resolutions
640x350 @70 Hz
720x400 @85 Hz
1024x768 @90 Hz
640x350 @85 Hz
800x600 @56 Hz
1024x768 @100 Hz
640x400 @56 Hz
800x600 @60 Hz
1152x864 @60 Hz
640x400 @84 Hz
800x600 @70 Hz
1152x864 @70 Hz
640x400 @85 Hz
800x600 @72 Hz
1152x864 @75 Hz
640x480 @60 Hz
800x600 @75 Hz
1152x864 @85 Hz
640x480 @66.6 Hz 800x600 @85 Hz
1152x870 @75.1 Hz
640x480 @72 Hz
800x600 @90 Hz
1152x900 @66 Hz
640x480 @75 Hz
800x600 @100 Hz
1152x900 @76 Hz
640x480 @85 Hz
832x624 @75.1 Hz
1280x960 @60 Hz
640x480 @90 Hz
1024x768 @60 Hz
1280x960 @85 Hz
640x480 @100 Hz
1024x768 @70 Hz
1280x1024 @60 Hz
640x480 @120 Hz
1024x768 @72 Hz
1280x1024 @75 Hz
223
Appendix A: Specifications
Resolutions
720x400 @70 Hz
1024x768 @75 Hz
1280x1024 @85 Hz
720x400 @84 Hz
1024x768 @85 Hz
1600x1200 @60 Hz
Note: Composite Sync and Sync-on-Green video require an additional
adapter.
Supported Keyboard Languages
The KX II-101 provides keyboard support for the languages listed in the
following table.
224
Language
Regions
Keyboard layout
US English
United States of America and
most of English-speaking
countries: for example, Canada,
Australia, and New Zealand.
US Keyboard layout
US English
International
United States of America and
most of English-speaking
countries: for example,
Netherlands
US Keyboard layout
UK English
United Kingdom
UK layout keyboard
Chinese
Traditional
Hong Kong S. A. R., Republic of
China (Taiwan)
Chinese Traditional
Chinese
Simplified
Mainland of the People’s
Republic of China
Chinese Simplified
Korean
South Korea
Dubeolsik Hangul
Japanese
Japan
JIS Keyboard
French
France
French (AZERTY)
layout keyboard.
German
Germany and Austria
German keyboard
(QWERTZ layout)
Belgian
Belgium
Belgian
Norwegian
Norway
Norwegian
Danish
Denmark
Danish
Swedish
Sweden
Swedish
Hungarian
Hungary
Hungarian
Slovenian
Slovenia
Slovenian
Appendix A: Specifications
Language
Regions
Keyboard layout
Italian
Italy
Italian
Spanish
Spain and most Spanish
speaking countries
Spanish
Supported Operating Systems (Clients)
The following operating systems are supported on the Virtual KVM
Client™ and Multi-Platform Client (MPC):
Client OS
Virtual media (VM) support on client
Windows XP®
Yes
Windows 2000 SP4®
Yes
Windows Vista®
Yes
Red Hat® Linux 9.0
Yes. Locally held ISO image, Remote
File Server mounting directly from KX II101
Red Hat Enterprise
Workstation 3.0 and 4.0
Yes. Locally held ISO image, Remote
File Server mounting directly from KX II101
SUSE Linux Professional 9.2 Yes. Locally held ISO image, Remote
and 10
File Server mounting directly from KX II101
Fedora™ Core 5 and above
Yes. Locally held ISO image, Remote
File Server mounting directly from KX II101
Mac®
No
Solaris
No
Supported Browsers
KX II-101 supports the following browsers:
•
Internet Explorer 6 and 7
•
Firefox 1.5 and 2.0
•
Mozilla 1.7
•
Safari 2.0
225
Appendix A: Specifications
Certified Modems
•
US Robotics 56K 5686E
•
ZOOM v90
•
ZOOM v92
•
US Robotics Sportster 56K
•
US Robotics Courier 56K
Connectors
Interface type
Length
Inches
Centimeters
Video
15”
38 cm
Integrated cable
PS/2
15”
38 cm
Integrated cable
MiniUSB to USB(M)
17.7”
45 cm
Cable for USB
MiniDin9(M) to DB9(F)
72”
182 cm
Cable for serial
DKX2-101-LPKVMC
3.9"
10 cm
Cable for local
port integration
DKX2-101-SPDUC
70.86"
180 cm
Cable for
connecting to a
Dominion PX
TCP and UDP Ports Used
226
Description
Appendix A: Specifications
Port
Description
HTTP, Port 80
All requests received by the KX II-101 via HTTP (port 80) are
automatically forwarded to HTTPS for complete security. The KX II-101
responds to Port 80 for user convenience, relieving users from having
to explicitly type in the URL field to access the KX II-101, while still
preserving complete security.
HTTPS, Port 443
This port is used for multiple purposes, including the web server for the
HTML client, the download of client software (MPC/KVC) onto the
client's host, and the transfer of KVM and virtual media data streams to
the client.
KX II-101 (Raritan
KVM-over-IP)
Protocol,
Configurable Port
5000
This port is used to discover other Dominion devices and for
communication between Raritan devices and systems, including CCSG. By default, this is set to Port 5000, but you may configure it to use
any TCP port not currently in use. For details on how to configure this
setting, see Network Settings (on page 138).
SNTP (Time Server) The KX II-101 offers the optional capability to synchronize its internal
on Configurable
clock to a central time server. This function requires the use of UDP
UDP Port 123
Port 123 (the standard for SNTP), but can also be configured to use
any port of your designation. Optional
LDAP/LDAPS on
Configurable Ports
389 or 636
If the KX II-101 is configured to remotely authenticate user logins via
the LDAP/LDAPS protocol, ports 389 or 636 will be used, but the
system can also be configured to use any port of your designation.
Optional
RADIUS on
Configurable Port
1812
If the KX II-101 is configured to remotely authenticate user logins via
the RADIUS protocol, either port 1812 will be used, but the system can
also be configured to use any port of your designation. Optional
RADIUS Accounting If the KX II-101 is configured to remotely authenticate user logins via
on Configurable Port the RADIUS protocol, and also employs RADIUS accounting for event
1813
logging, port 1813 or an additional port of your designation will be used
to transfer log notifications.
SYSLOG on
Configurable UDP
Port 514
If the KX II-101 is configured to send messages to a Syslog server, then
the indicated port(s) will be used for communication - uses UDP Port
514.
SNMP Default UDP
Ports
Port 161 is used for inbound/outbound read/write SNMP access and
port 162 is used for outbound traffic for SNMP traps. Optional
TCP Port 21
Port 21 is used for the KX II-101 command line interface (when you are
working with Raritan Technical Support).
227
Appendix A: Specifications
Network Speed Settings
KX II-101 network speed setting
Network
switch port
setting
Auto
100/Full
Auto
Highest
Available
Speed
100/Full
KX II-101:
100/Full
KX II-101:
100/Half
100/Full
Switch:
100/Half
Switch:
100/Full
100/Half
100/Half
100/Half
KX II-101:
100/Full
KX II-101:
100/Half
100/Half
Switch:
100/Half
10/Full
KX II-101:
10/Half
Switch:
10/Full
10/Half
10/Half
10/Half
10/Half
Switch:
10/Half
Switch:
100/Full
100/Half
10/Full
KX II-101:
10/Full
No
No
Communica Communicat
tion
ion
No
No
Communica Communicat
tion
ion
No
10/Full
No
Communica Communicat
tion
ion
KX II-101:
10/Half
No
KX II-101:
No
Communica Communicat 10/Full
tion
ion
Switch:
10/Half
10/Half
Switch:
10/Full
Legend:
Does not function as expected
Supported
Functions; not recommended
NOT supported by Ethernet specification; product will
communicate, but collisions will occur
228
Appendix A: Specifications
Per Ethernet specification, these should be “no
communication,” however, note that the KX II-101
behavior deviates from expected behavior
Note: For reliable network communication, configure the KX II-101 and
the LAN switch to the same LAN Interface Speed and Duplex. For
example, configure both the KX II-101 and LAN Switch to Autodetect
(recommended) or set both to a fixed speed/duplex such as
100MB/s/Full.
Admin Port Pinout Information
KX II-101 Admin port
Cable
MiniDIN9
(Female)
Pin name
I/O
MiniDIN9
(Male)
To PC
DB9F
(Female)
1
DCD#
In
1,6
4
2
RXD
In
2
3
3
TXD
Out
3
2
4
DTR#
Out
4
1, 6
5
GND
GND
5
5
6
DSR#
In
1,6
4
7
RTS#
Out
7
8
8
CTS#
In
8
7
9
RI
In
9
9
229
Appendix A: Specifications
9 Pin Pinout
15 Pin local port
230
Pin
Single
1
LP_RED
2
LP_GRN
3
LP_BLU
4
CN_LP_KB_SDA
5
CN_LP_KB_SCL
6
GND
7
AGND
8
AGND
9
+5 V
10
CN_LP_MS_SDA
11
CN_LP_MS_SCL
12
N/C
13
LP_HS
14
LP_VS
15
N/C
Appendix B Updating the LDAP Schema
Note: The procedures in this chapter should be attempted only by
experienced users.
In This Chapter
Returning User Group Information ........................................................231
Setting the Registry to Permit Write Operations to the Schema ...........232
Creating a New Attribute .......................................................................232
Adding Attributes to the Class ...............................................................233
Updating the Schema Cache.................................................................235
Editing rciusergroup Attributes for User Members ................................235
Returning User Group Information
Use the information in this section to return User Group information (and
assist with authorization) once authentication is successful.
From LDAP
When an LDAP/LDAPS authentication is successful, the KX II-101
determines the permissions for a given user based on the permissions of
the user's group. Your remote LDAP server can provide these user group
names by returning an attribute named as follows:
rciusergroup
attribute type: string
This may require a schema extension on your LDAP/LDAPS server.
Consult your authentication server administrator to enable this attribute.
From Microsoft Active Directory
Note: This should be attempted only by an experienced Active Directory
administrator.
Returning user group information from Microsoft's Active Directory for
Windows 2000 Server requires updating the LDAP/LDAPS schema. See
your Microsoft documentation for details.
1. Install the schema plug-in for Active Directory. See Microsoft Active
Directory documentation for instructions.
2. Run Active Directory Console and select Active Directory Schema.
231
Appendix B: Updating the LDAP Schema
Setting the Registry to Permit Write Operations to the Schema
To allow a domain controller to write to the schema, you must set a
registry entry that permits schema updates.
To permit write operations to the schema:
1. Right-click the Active Directory Schema root node in the left pane of
the window and then click Operations Master. The Change Schema
Master dialog appears.
2. Select the "Schema can be modified on this Domain Controller"
checkbox. Optional
3. Click OK.
Creating a New Attribute
To create new attributes for the rciusergroup class:
1. Click the + symbol before Active Directory Schema in the left pane of
the window.
2. Right-click Attributes in the left pane.
232
Appendix B: Updating the LDAP Schema
3. Click New and then choose Attribute. When the warning message
appears, click Continue and the Create New Attribute dialog
appears.
4. Type rciusergroup in the Common Name field.
5. Type rciusergroup in the LDAP Display Name field.
6. Type 1.3.6.1.4.1.13742.50 in the Unique x5000 Object ID field.
7. Type a meaningful description in the Description field.
8. Click the Syntax drop-down arrow and choose Case Insensitive
String from the list.
9. Type 1 in the Minimum field.
10. Type 24 in the Maximum field.
11. Click OK to create the new attribute.
Adding Attributes to the Class
To add attributes to the class:
1. Click Classes in the left pane of the window.
233
Appendix B: Updating the LDAP Schema
2. Scroll to the user class in the right pane and right-click it.
3. Choose Properties from the menu. The user Properties dialog
appears.
4. Click the Attributes tab to open it.
5. Click Add.
234
Appendix B: Updating the LDAP Schema
6. Choose rciusergroup from the Select Schema Object list.
7. Click OK in the Select Schema Object dialog.
8. Click OK in the User Properties dialog.
Updating the Schema Cache
To update the schema cache:
1. Right-click Active Directory Schema in the left pane of the window
and select Reload the Schema.
2. Minimize the Active Directory Schema MMC (Microsoft Management
Console) console.
Editing rciusergroup Attributes for User Members
To run the Active Directory script on Windows 2003 server, use the script
provided by Microsoft (available on the Windows 2003 server installation
CD). These scripts are loaded onto your system with a Microsoft
Windows 2003 installation. ADSI (Active Directory Service Interface) acts
as a low-level editor for Active Directory, allowing you to perform
common administrative tasks such as adding, deleting, and moving
objects with a directory service.
To edit the individual user attributes within the group
rciusergroup:
1. From the installation CD, choose Support > Tools.
2. Double-click SUPTOOLS.MSI to install the support tools.
235
Appendix B: Updating the LDAP Schema
3. Go to the directory where the support tools were installed. Run
adsiedit.msc. The ADSI Edit window opens.
4. Open the Domain.
236
Appendix B: Updating the LDAP Schema
5. In the left pane of the window, select the CN=Users folder.
6. Locate the user name whose properties you want to adjust in the
right pane. Right-click the user name and select Properties.
237
Appendix B: Updating the LDAP Schema
7. Click the Attribute Editor tab if it is not already open. Choose
rciusergroup from the Attributes list.
8. Click Edit. The String Attribute Editor dialog appears.
9. Type the user group (created in the KX II-101) in the Edit Attribute
field.
10. Click OK.
238
Appendix C AC-DC Adapter and Rack Mount
The KX II-101 device can be mounted vertically or horizontally, facing the
front or the rear, on either side of a server rack. Use the brackets and
screws included with the KX II-101 kit.
In This Chapter
AC-DC Adapter Clip Fitting....................................................................239
Bracket Installation ................................................................................241
AC-DC Adapter Clip Fitting
Identify the Clip Type
Diagram key
EU clip
Australian clip
239
Appendix C: AC-DC Adapter and Rack Mount
Diagram key
UK clip
Remove the Attachment Cover from AC-DC Power Adapter
Diagram key
AC/DC power adaptor
Attachment cover. Push to remove.
240
Appendix C: AC-DC Adapter and Rack Mount
Attach the Clip to AC-DC Power Adapter
Diagram key
Australian clip
EU clip
UK clip
Power adaptor
Bracket Installation
1. Remove the screws from the KX II-101.
241
Appendix C: AC-DC Adapter and Rack Mount
2. Slide the left and right panels off the KX II-101.
Diagram key
KX II-101
Right panel
Left panel
Screws
242
Appendix C: AC-DC Adapter and Rack Mount
KX II-101 Bracket Parts
Diagram key
U bracket
L bracket
Attach the Brackets to KX II-101 for Horizontal Mount
1. Attach the U bracket to the L bracket using the included screws.
Adjust bracket placement before tightening screws.
2. Mount the U and L bracket assembly to the rack with rack-mount
screws (provided by the rack manufacturer).
3. Slide the KX II-101 into the U bracket with the KVM harness facing
towards the target. Pull and release the latch lever to lock the KX II101 into the U bracket.
243
Appendix C: AC-DC Adapter and Rack Mount
This image illustrates mounting the KX II-101 on the left. To mount the
KX II-101 on the right, follow these directions but attach brackets to the
right side of the KX II-101.
Diagram key
KX II-101
U bracket
L bracket
Screws
Mounting hole
Latch lever
Attach the Brackets to KX II-101 for Vertical Mount
1. Attach the U bracket to the L bracket using the included screws.
Adjust bracket placement before tightening screws.
244
Appendix C: AC-DC Adapter and Rack Mount
2. Mount the U and L bracket assembly to the rack with rack-mount
screws (provided by the rack manufacturer).
3. Slide the KX II-101 device into the U bracket with the KVM harness
facing towards the target. Pull and release the latch lever to lock the
KX II-101 device into the U bracket.
Diagram key
KX II-101
U bracket
L bracket
Screws
Mounting hole
Latch lever
245
Appendix D Informational Notes
In This Chapter
Java Runtime Environment (JRE) .........................................................246
Keyboard, Video and Mouse Notes.......................................................246
Java Runtime Environment (JRE)
Important: It is recommended that you disable Java caching and
clear the Java cache. Please refer to your Java documentation or
the KVM and Serial Access Clients User Guide for more
information.
The KX II-101 Remote Console and MPC require the JRE to function.
The KX II-101 Remote Console checks the Java version. If the version is
incorrect or outdated, you will be prompted to download a compatible
version.
Raritan recommends using JRE version 1.5 for optimum performance,
but the KX II-101 Remote Console and MPC will function with JRE
version 1.4.2_05 or greater (with the exception of JRE 1.5.0_02),
including JRE 1.6.x except for 1.6.2.
Note: For multi-language keyboards to work in the KX II-101 Remote
Console (Virtual KVM Client), please install the multi-language version of
Java Runtime Environment (JRE).
Keyboard, Video and Mouse Notes
The following equipment have certain keyboard, video, or mouse
limitations. Where applicable, a workaround is supplied.
Sun Blade™ Video, Keyboard, and Mouse Support Limitation
Video
If you are accessing a Sun Blade 100 with the KX II-101, video on the
local port or a remote connection when the Sun Blade is booting up.
To avoid this issue, be sure you are using Sun Open Boot firmware
4.17.1 or later.
Keyboard and Mouse
Since Sun Blades do not support multiple keyboards, and no local
keyboard or mouse port is provided, a KX II-101 and local keyboard
cannot be used at the same time. However, a remote keyboard and
mouse can be used for Sun Blades.
246
Appendix D: Informational Notes
Sun Keyboard Key Support Limitations
The following keys on Sun keyboards are not supported by KX II-101:
Sun key
Local port key combination
Again
Ctrl+ Alt +F2
Props
Ctrl + Alt +F3
Undo
Ctrl + Alt +F4
Stop A
Break a
Front
Ctrl + Alt + F5
Copy
Ctrl + Alt + F6
Open
Ctrl + Alt + F7
Find
Ctrl + Alt + F9
Cut
Ctrl + Alt + F10
Paste
Ctrl + Alt + F8
Mute
Ctrl + Alt + F12
Compose
Ctrl+ Alt + KPAD *
Vol +
Ctrl + Alt + KPAD +
Vol -
Ctrl + Alt + KPAD -
Stop
No key combination
Power
No key combination
BIOS Access Limitation from a Local Keyboard
A USB connection is required when using Absolute Mouse
Synchronization. However, the keyboards in this section do not support a
USB connection to the local keyboard. To access the local keyboard via
BIOS or virtual media through the local port, follow these configurations:
Keyboard
Configuration to use
Dell Optiplex
GX280 - BIOS
A03
BIOS and virtual media can be accessed for local
and remote keyboards using a Newlink USB to
PS/2 adapter.
Set the Host Interface to PS/2 on the
Keyboard/Mouse Setup page. See
Keyboard/Mouse Setup (on page 143).
247
Appendix D: Informational Notes
Keyboard
Configuration to use
Dell Dimension
2400– BIOS A05
Set the Host Interface to PS/2 on the
Keyboard/Mouse Setup page. See
Keyboard/Mouse Setup (on page 143).
Dell Optiplex 170L PS/2 plus a PS/2-to-USB-adapter.
- BIOS A07
Set the Host Interface to PS/2 on the
Keyboard/Mouse Setup page. See
Keyboard/Mouse Setup (on page 143).
Dell Server 1850
In order for BIOS version A06 to recognize a
virtual media mounted removable USB flash drive,
use the PS/2 and USB connections between the
Dell server and the KX II-101.
Set the Host Interface to PS/2 on the
Keyboard/Mouse Setup page. See
Keyboard/Mouse Setup (on page 143).
HP UX RX 1600 Keyboard and Mouse Configuration
If you are using an HP UX RX 1600 running UNIX, do the following to
connect the device to the target:
•
Verify you are using KX II-101 firmware 2.0.20.5.6964 or higher.
•
Use the USB cable that is supplied with the KX II-101 .
•
Set the Host Interface field on the Keyboard/Mouse Setup page to
USB. See Keyboard/Mouse Setup (on page 143).
•
Verify that the Enable Absolute Mouse and Use Full Speed
checkboxes on the Port page are not selected. See Port
Configuration (on page 154).
•
Use either Intelligent or Standard Mouse mode. Do not use Absolute
Mouse mode.
Compaq Alpha and IBM P Server Mouse Mode Limitation
When connecting to either Compaq Alpha servers or IBM P servers
through the KX II-101, you must use Single Mouse mode. See Working
with Target Servers (on page 32).
248
Appendix D: Informational Notes
Windows 2000 and 2003 Server Keyboard Limitations
Due to an operating system limitation, the following keyboard
combinations do not work with a US-International keyboard layout when
using Windows 2000 and Windows 2003 servers.
•
Right Alt+D
•
Right Alt+I
•
Right Alt+L
Note: Right Alt may be labeled as AltGr on keyboards that specifically
have US/International markings on the keys.
249
Index
9
9 Pin Pinout • 230
A
Absolute Mouse Mode • 54, 92
Accessing the KX II-101 Using the CLI • 211
AC-DC Adapter and Rack Mount • 6, 239
AC-DC Adapter Clip Fitting • 239
Adding a New User • 124, 125
Adding a New User Group • 118, 124
Adding Attributes to the Class • 233
Adding, Deleting, and Editing Favorites • 39
Admin Port • 23, 29, 144
Admin Port Pinout Information • 229
Administration Features • 5
Administrative Functions • 99
Advanced USB Connection Settings • 168
Analog KVM Switch • 1, 144, 162
Apple Macintosh® Settings • 15
Assigning an IP Address • 10, 25
Attach the Brackets to KX II-101 for Horizontal
Mount • 243
Attach the Brackets to KX II-101 for Vertical
Mount • 244
Attach the Clip to AC-DC Power Adapter • 241
Audit Log • 195
Authentication Settings • 126
Auto-Scroll • 74
Auto-Sense Video Settings • 49
B
Backing Up and Restoring a Device
Configuration • 103
Backing Up and Restoring a User
Configuration • 104
Backup and Restore • 197
Backup and Restore Functions • 103
Basic USB Connection Settings • 166
BIOS Access Limitation from a Local
Keyboard • 247
Blocking and Unblocking Users • 125
Bracket Installation • 241
Broadcast Port • 104
Building a Keyboard Macro • 46, 82
C
CC Unmanage • 219
CD-ROM/DVD-ROM/ISO Images • 111, 114
Certified Modems • 147, 226
Changing a Password • 102, 137
Changing the Shortcut Menu Keyboard
Combination • 79, 80
Checking Your Browser for AES Encryption •
191, 192
CLI Commands • 210, 214
CLI Prompts • 213
CLI Syntax -Tips and Shortcuts • 214
Closing a Remote Connection • 78
Color Calibration • 98
Command Line Interface (CLI) • 144, 210
Common Commands for All Command Line
Interface Levels • 214
Common Hot Key Exceptions for MPC • 86
Compaq Alpha and IBM P Server Mouse
Mode Limitation • 248
Completion of Commands • 213
Conditions when Read/Write is Not Available •
113, 114
Configuration • 216
Configure the KX II-101 Using a Terminal
Emulation Program (Optional) • 10, 23, 24,
29, 212
Configure the KX II-101 Using the Remote
Console • 24
Configuring Direct Port Access • 26
Configuring Event Management - Settings •
150, 151
Connecting the Power Strip • 155, 157
Connecting to a KVM Target Server • 41
Connecting to a Remote KVM Console • 78
Connecting to Virtual Media • 113
Connection and Video Properties • 94
Connection Information • 45, 77
Connection Profiles • 62, 74
Connectors • 7, 226
Controlling a Power Strip Device • 157, 160,
161
Create User Groups and Users • 29
Creating a New Attribute • 232
Creating, Modifying and Deleting Profiles in
MPC • 74, 147
Ctrl+Alt+Del Macro • 86
Customizing the Navigator • 63
Calibrate Color • 50
251
Index
D
Date/Time Settings • 148
Debug • 215, 216
Default Logon Information • 9
Device Diagnostics • 208
Device Information • 196
Device Management • 27, 138
Device Ports in the Navigator • 62
Device Services • 141, 211
Devices in the MPC Navigator • 62
Diagnostics • 202, 215
Disconnecting a KVM Target Server • 43
Disconnecting Virtual Media • 115
Discovering Raritan Devices on the KX II-101
Subnet • 39
Discovering Raritan Devices on the Local
Subnet • 37
E
Editing rciusergroup Attributes for User
Members • 235
Enable Direct Port Access • 32
Encryption & Share • 163, 184, 190
Establishing a New Connection • 76
Event Management • 149
Event Management - Destinations • 151
F
Favorites List Page • 37, 39
File Server Setup (File Server ISO Images
Only) • 111, 115
From LDAP • 231
From Microsoft Active Directory • 231
G
General Options in MPC • 99, 100
Generation 2 Devices • 77
Getting Started • 10
Group-Based IP ACL (Access Control List) •
118, 120, 123
H
Help Options • 59
HP UX RX 1600 Keyboard and Mouse
Configuration • 248
I
IBM AIX® Settings • 15
Identify the Clip Type • 239
252
Implementing LDAP/LDAPS Remote
Authentication • 127, 130
Implementing RADIUS Remote Authentication
• 126, 130
Informational Notes • 246
Installation and Configuration • 9, 217
Intelligent Mouse Mode • 55, 92, 93
Interface Command • 217
Interfaces • 5, 32
Introduction • 1
IP Access Control • 193
J
Java Runtime Environment (JRE) • 246
K
Keyboard Limitations • 89
Keyboard Macros • 46, 82
Keyboard Options • 46
Keyboard Type • 88
Keyboard, Video and Mouse Notes • 246
Keyboard/Mouse Setup • 143, 162, 247, 248
Known USB Profiles • 166, 168, 169
KX II-101 Bracket Parts • 243
KX II-101 Console Navigation • 33
KX II-101 Overview • 2
KX II-101 Remote Console Interface • 32, 33
KX II-101 Specifications • 222
L
LAN Interface Settings • 138, 140
Linux® Settings • 14
Listports Command • 215, 218
Local Drives • 113
Local User Port • 24
Logging off • 41
Logging On • 211, 212
Logon Limitations • 184, 185
M
Maintenance • 195
Manage Favorites Page • 37
Managing Favorites • 36
Managing KVM Target Servers (Port Page) •
155, 157
Managing Power Associations • 159
Managing USB Connections • 1, 165
Modem • 146
Modem Access Cable Connections • 147, 148
Modifying an Existing User • 125
Index
Modifying an Existing User Group • 123
Modifying and Removing Keyboard Macros •
48, 86
Mounting • 6
Mouse Modes • 12
Mouse Options • 52, 91, 100
Mouse Pointer Synchronization • 53
Mouse Synchronization Options • 92
MPC Broadcast Port • 104
MPC Connected Server(s) Toolbar • 68
MPC Connection Properties • 94
MPC Interface • 60
MPC Navigator Tabs • 64
MPC Scaling • 73
MPC Status Bar • 69
MPC Target Screen Resolution Mode • 71
Multi-Platform Client (MPC) • 41, 60
Multi-Platform Client Interface • 41
N
Name Command • 215, 217
Naming the Power Strip (Port Page for Power
Strips) • 157, 158
Naming the Target Server • 27
Navigation of the CLI • 212
Navigator • 61
Navigator Display Options • 65
Navigator Icons • 62
Network • 23, 215, 217
Network Basic Settings • 138, 139
Network Configuration • 5
Network Interface Page • 202
Network Settings • 138, 227
Network Speed Settings • 141, 228
Network Statistics Page • 203
Note on Microsoft Active Directory • 29
Note to CC-SG Users • 28
Note to MPC Users • 99
O
Operation • 60
Optional Accessories • 7
Overview • 9, 41, 107, 166, 210, 219
P
Package Contents • 7
Ping Host Page • 206
Port Access Page • 34
Port Action Menu • 34
Port Configuration • 15, 154, 248
Power • 6, 18
Power Control • 42, 155, 157
Power Controlling a KVM Target Server • 42
Prerequisites for Using Virtual Media • 110
Product Features • 5
Product Photos • 4
PS/2 Configuration • 21
R
RADIUS Communication Exchange
Specifications • 133
Raritan Power Strip Control • 145
Rebooting • 201
Refresh Screen • 49
Related Documentation • 8
Relationship Between Users and Groups • 117
Remote Authentication • 28
Remote Power Management • 105
Remove the Attachment Cover from AC-DC
Power Adapter • 240
Removing a KX II-101 from CC-SG
Management • 220
Renaming a Port • 156
Requirements and Installation • 60
Resetting the KX II-101 Using the Reset
Button • 163, 192
Restarting a Device • 103
Returning User Group Information • 231
Returning User Group Information from Active
Directory Server • 129
Returning User Group Information via RADIUS
• 133
Running a Keyboard Macro • 48, 85
S
Screen Modes • 70
Security Management • 184
Security Settings • 124, 184
Serial Port Settings • 144
Setlog Command • 215, 216
Setting a New Password • 24
Setting Permissions • 118, 122, 123
Setting Permissions for an Individual Group •
122, 125
Setting Port Permissions • 118, 119, 123
Setting the Registry to Permit Write
Operations to the Schema • 232
Setting the Server Video Resolution • 10, 11
Shortcut Menu • 79, 86, 101
Shortcut Menu Key Options • 80
253
Index
Single Cursor Mode/Dual Cursor Mode • 91
Single Mouse Cursor • 56
Specifications • 1, 222
Specifying a Keyboard Type in MPC • 88
SSH Access from a UNIX/Linux Workstation •
212
SSH Access from a Windows PC • 211
SSH Connection to the KX II-101 • 211
Standard Mouse Mode • 54, 92, 94
Standard Toolbar • 65
Step 1
Configure the Target Server • 9, 10
Step 2
Configure Network Firewall Settings • 9, 16
Step 3
Connect the KX II-101 • 9, 17
Step 4
Configure the KX II-101 • 9, 24
Strong Passwords • 137, 184, 186
Sun Blade™ Video, Keyboard, and Mouse
Support Limitation • 246
Sun Keyboard Key Support Limitations • 247
Sun® Solaris™ Settings • 14
Sun™ Video Resolution • 11
Supported Browsers • 225
Supported Keyboard Languages • 224
Supported Operating Systems (Clients) • 225
Supported Protocols • 28
Supported Video Resolutions • 223
System Management Features • 5
T
Target Server • 19
TCP and UDP Ports Used • 226
Terminology • 6
Tool Options • 57
Toolbars • 65
Trace Route to Host Page • 206
U
Updating the LDAP Schema • 129, 231
Updating the Schema Cache • 235
Upgrade History • 200
Upgrading Device Firmware • 102
Upgrading Firmware • 198
USB Configuration • 19
User Authentication Process • 135
User Blocking • 125, 184, 188
User Features • 6
User Group List • 117
254
User Groups • 116
User Guide • 7
User List • 124
User Management • 29, 116
Userlist Command • 215, 218
Users • 123
Using CC-SG in Proxy Mode • 221
V
Video Properties • 49
Video Resolution • 6
Video Settings - Generation 2 Devices • 95
View Options • 59
Virtual KVM Client • 34, 41
Virtual Media • 56, 106
VKC Connection Properties • 43
VKC Toolbar • 42
VKC Video Settings • 50
VKC Virtual Media • 56
W
What's New in the User Guide • 1
Windows 2000 and 2003 Server Keyboard
Limitations • 249
Windows 2000® Settings • 12
Windows Key in MPC • 87
Windows Vista® Settings • 13
Windows XP®/Windows 2003® Settings • 13
Working with Target Servers • 32, 248
U.S./Canada/Latin America
Monday - Friday
8 a.m. - 8 p.m. ET
Phone: 800-724-8090 or 732-764-8886
For CommandCenter NOC: Press 6, then Press 1
For CommandCenter Secure Gateway: Press 6, then Press 2
Fax: 732-764-8887
Email for CommandCenter NOC: tech-ccnoc@raritan.com
Email for all other products: tech@raritan.com
China
Europe
Europe
Monday - Friday
8:30 a.m. - 5 p.m. GMT+1 CET
Phone: +31-10-2844040
Email: tech.europe@raritan.com
United Kingdom
Monday - Friday
8:30 a.m. to 5 p.m. GMT
Phone +44(0)20-7090-1390
Beijing
France
Monday - Friday
9 a.m. - 6 p.m. local time
Phone: +86-10-88091890
Monday - Friday
8:30 a.m. - 5 p.m. GMT+1 CET
Phone: +33-1-47-56-20-39
Shanghai
Germany
Monday - Friday
9 a.m. - 6 p.m. local time
Phone: +86-21-5425-2499
Monday - Friday
8:30 a.m. - 5 p.m. GMT+1 CET
Phone: +49-20-17-47-98-0
GuangZhou
Monday - Friday
9 a.m. - 6 p.m. local time
Phone: +86-20-8755-5561
Korea
Monday - Friday
9 a.m. - 6 p.m. local time
Phone: +82-2-5578730
India
Monday - Friday
9 a.m. - 6 p.m. local time
Phone: +91-124-410-7881
Melbourne, Australia
Monday - Friday
9:00 a.m. - 6 p.m. local time
Phone: +61-3-9866-6887
Japan
Monday - Friday
9:30 a.m. - 5:30 p.m. local time
Phone: +81-3-3523-5994
Email: support.japan@raritan.com
Taiwan
Monday - Friday
9 a.m. - 6 p.m. GMT -5 Standard -4 Daylight
Phone: +886-2-8919-1333
Email: tech.rap@raritan.com