Raritan Dominion KX II Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Síťové přepínače Raritan Dominion KX II. Raritan Dominion KX II User guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 408
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Dominion KX II

Copyright © 2014 Raritan, Inc. DKX2-v2.6.0-0R-E March 2014 255-62-4023-00 Dominion KX II User Guide Release 2.6.0

Strany 2 - VCCI Information (Japan)

Contents x Virtual Media Notes ...

Strany 3

Chapter 3: Working with Target Servers 89 Smart Cards Using the KX II, you are able to mount a smart card reader onto a target server to support

Strany 4

Chapter 3: Working with Target Servers 90 You are also able to remove or reinsert a smart card. This function can be used to provide notification

Strany 5 - Contents

Chapter 3: Working with Target Servers 91 To update the smart card in the Select Smart Card Reader dialog:  Click Refresh List if a new smart

Strany 6

Chapter 3: Working with Target Servers 92 2. Use the Copy to Clipboard button to copy the information contained in the dialog to a clipboard file

Strany 7

Chapter 3: Working with Target Servers 93 Since .NET is required to run AKC, if you do not have .NET installed or you have an unsupported version

Strany 8

Chapter 3: Working with Target Servers 94 Multi-Platform Client (MPC) Raritan Multi-Platform Client (MPC) is a graphical user interface for the Ra

Strany 9

Chapter 3: Working with Target Servers 95 Note: Depending on your browser and browser security settings, you may see various security and certifi

Strany 10 - Contents

96 All KX II models support virtual media. Virtual media extends KVM capabilities by enabling target servers to remotely access media from a client

Strany 11 - Index 391

Chapter 4: Virtual Media 97 Remote PC VM Prerequisites  Certain virtual media options require administrative privileges on the remote PC (for e

Strany 12 - Introduction

Chapter 4: Virtual Media 98 Supported Tasks Via Virtual Media Virtual media provides the ability to perform tasks remotely, such as:  Transferri

Strany 13 - KX II Overview

Contents xi Appendix F Frequently Asked Questions 355 General FAQs ...

Strany 14 - Chapter 1: Introduction

Chapter 4: Virtual Media 99 Supported Virtual Media Operating Systems The following client operating systems are supported:  Windows® 7 operati

Strany 15 - Package Contents

Chapter 4: Virtual Media 100 Connecting and Disconnecting from Virtual Media Access a Virtual Media Drive on a Client Computer To access a virtu

Strany 16 - KX2-808

Chapter 4: Virtual Media 101 Mounting CD-ROM/DVD-ROM/ISO Images This option mounts CD-ROM, DVD-ROM, and ISO images. Note: ISO9660 format is the s

Strany 17 - Chapter 1: Introduction

Chapter 4: Virtual Media 102 Note: If you are working with files on a Linux® target, use the Linux Sync command after the files are copied using v

Strany 18 - Product Features

Chapter 4: Virtual Media 103 Drive Partitions The following drive partition limitations exist across operating systems:  Windows® and Mac targe

Strany 19

Chapter 4: Virtual Media 104 Virtual Media File Server Setup (File Server ISO Images Only) This feature is only required when using virtual media

Strany 20 - KX II Help

105 In This Chapter Overview ... 105 Turning Outlets O

Strany 21 - Chapter 2

Chapter 5: Rack PDU (Power Strip) Outlet Control 106  Control - Turn outlets on or off, or cycle their power.  Association - The ports associa

Strany 22

Chapter 5: Rack PDU (Power Strip) Outlet Control 107 2. Click OK on the Power Off dialog. 3. Click OK on the Power Off confirmation dialog. T

Strany 23 - Getting Started

108 In This Chapter Overview ... 108 CIM Compatibility

Strany 24 - Mouse Settings

1 In This Chapter KX II Overview ... 2 Package Contents ...

Strany 25 - Apple Mac Mouse Settings

Chapter 6: USB Profiles 109 CIM Compatibility In order to make use of USB profiles, you must use a virtual media CIM with updated firmware. For a

Strany 26 - IBM AIX Mouse Settings

Chapter 6: USB Profiles 110 USB profile Description  USB enumeration will trigger whenever Virtual Media is connected or disconnected Restrictio

Strany 27 - C. Network Port

Chapter 6: USB Profiles 111 USB profile Description BIOS Generic BIOS Generic Use this profile when Generic OS profile does not work on the BIOS.

Strany 28 - E. Target Server Ports

Chapter 6: USB Profiles 112 USB profile Description BIOS Lenovo ThinkPad T61 & X61 BIOS Lenovo ThinkPad T61 and X61 (boot from virtual media)

Strany 29 - Change the Default Password

Chapter 6: USB Profiles 113 USB profile Description when using the Mac Boot Menu MAC OS X® 10.4.9 (and later) Mac OS X version 10.4.9 (and later)

Strany 30 - Configure the IPv4 Settings

Chapter 6: USB Profiles 114 USB profile Description  Keyboard and Mouse (Type 2) first  Mass Storage  USB bus speed limited to full-speed (1

Strany 31 - Configure the DNS Settings

Chapter 6: USB Profiles 115 Mouse Modes when Using the Mac Boot Menu When working with USB profiles in, to use the Mouse in the Mac Boot Menu, yo

Strany 32 - Name Your Target Servers

116 In This Chapter User Groups ... 116 Users ...

Strany 33

Chapter 7: User Management 117 User Group List User groups are used with local and remote authentication (via RADIUS or LDAP/LDAPS). It is a good

Strany 34

Chapter 7: User Management 118 2. Type a descriptive name for the new user group into the Group Name field (up to 64 characters). 3. Select th

Strany 35

Chapter 1: Introduction 2 KX II Overview Raritan's Dominion KX II is an enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch

Strany 36 - Logging in to the KX II

Chapter 7: User Management 119 Note: Several administrative functions are available within and from the KX II Local Console. These functions are

Strany 37 - Allow Pop-Ups

Chapter 7: User Management 120 Setting Permissions Important: Selecting the User Management checkbox allows the members of the group to change the

Strany 38 - Installing a Certificate

Chapter 7: User Management 121 Permission Description settings. If you are using a tiered configuration in which a base KX II device is used to a

Strany 39

Chapter 7: User Management 122 VM access Power control access option Description Deny Deny power control to the target server Access Full permissi

Strany 40

Chapter 7: User Management 123 Use the IP ACL section of the Group page to add, insert, replace, and delete IP access control rules on a group-le

Strany 41

Chapter 7: User Management 124 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Important: ACL rules are evaluated in the or

Strany 42

Chapter 7: User Management 125 2. Click Delete. 3. When prompted to confirm the deletion, click OK. Users Users must be granted user names and

Strany 43 - Working with Target Servers

Chapter 7: User Management 126 6. To activate the new user, leave the Active checkbox selected. Click OK. View the KX II Users List The User Lis

Strany 44

Chapter 7: User Management 127  Username - username for user logins and target connections  Access From - IP address of client PC accessing t

Strany 45

Chapter 7: User Management 128 Modifying an Existing User To modify an existing user: 1. Open the User List page by choosing User Management &g

Strany 46

Chapter 1: Introduction 3

Strany 47

Chapter 7: User Management 129 4. If you choose LDAP/LDAPS, read the section entitled Implementing LDAP Remote Authentication for information ab

Strany 48

Chapter 7: User Management 130  Microsoft Active Directory. Active Directory is an implementation of LDAP/LDAPS directory services by Microsoft

Strany 49

Chapter 7: User Management 131 11. If you entered a Distinguished Name for the Administrative User, you must enter the password that will be used

Strany 50

Chapter 7: User Management 132 15. Select the Enable LDAPS Server Certificate Validation checkbox to use the previously uploaded root CA certifica

Strany 51 - Set Scan Tab

Chapter 7: User Management 133 Once the test is completed, a message will be displayed that lets you know the test was successful or, if the test

Strany 52

Chapter 7: User Management 134 Important Notes  Group Name is case sensitive.  The KX II provides the following default groups that cannot be

Strany 53

Chapter 7: User Management 135 9. The default number of retries is 3 Retries. This is the number of times the KX II will send an authenticatio

Strany 54

Chapter 7: User Management 136 Cisco ACS 5.x for RADIUS Authentication If you are using a Cisco ACS 5.x server, after you have configured the KX I

Strany 55 - KX II interface

Chapter 7: User Management 137 Returning User Group Information via RADIUS When a RADIUS authentication attempt succeeds, the KX II determines th

Strany 56 - Access and Display Favorites

Chapter 7: User Management 138 Attribute Data Acct-Status (40) Stop(2) - Stops the accounting NAS-Port-Type (61) VIRTUAL (5) for network connectio

Strany 57

Chapter 1: Introduction 4 Diagram key Local port access Tiering IP-based network access Extended local port Modem Mobile access via iPhone®

Strany 58

Chapter 7: User Management 139 User Authentication Process Remote authentication follows the process specified in the flowchart below:

Strany 59

Chapter 7: User Management 140 Changing a Password To change your KX II password: 1. Choose User Management > Change Password. The Change

Strany 60 - Using Scan Port Options

141 In This Chapter Network Settings ... 141 Device Services ...

Strany 61

Chapter 8: Device Management 142 Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings > Network. T

Strany 62

Chapter 8: Device Management 143 Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network settings in

Strany 63

Chapter 8: Device Management 144 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addresses entered

Strany 64

Chapter 8: Device Management 145 Note: Because a failover port is not activated until after a failover has actually occurred, Raritan recommends

Strany 65

Chapter 8: Device Management 146 3. Enter the SSH Port information. The standard SSH TCP port number is 22 but the port number can be changed to

Strany 66

Chapter 8: Device Management 147 Configuring and Enabling Tiering The tiering feature allows you to access KX II targets and PDUs through one bas

Strany 67

Chapter 8: Device Management 148 Port configuration, including changing the CIM name, must be done directly from each device. It cannot be done fr

Strany 68

Chapter 1: Introduction 5 KX II Device Photos and Features KX II KX2-808

Strany 69

Chapter 8: Device Management 149 6. In the Tier Secret field, enter the same secret word you entered for the base device on the Device Settings

Strany 70

Chapter 8: Device Management 150 Unsupported and Limited Features on Tiered Targets The following features are not supported on tiered targets: 

Strany 71 - Keyboard Macros

Chapter 8: Device Management 151 Cabling Example in Tiered Configurations The following diagram illustrates the cabling configurations between a

Strany 72

Chapter 8: Device Management 152 Diagram key Target server CIM from target server to the KX II tiered device KX II tiered device D2CIM-DVUSB

Strany 73

Chapter 8: Device Management 153 Direct Port Access URL Syntax for the Virtual KVM Client (VKC) If you are using the Virtual KVM Client (VKC) and

Strany 74 - Building a Keyboard Macro

Chapter 8: Device Management 154 Direct Port Access URL Syntax for the Active KVM Client (AKC) If you are using the Active KVM Client (AKC) and di

Strany 75 - Running a Keyboard Macro

Chapter 8: Device Management 155 Enable Direct Port Access To enable direct port access: 1. Choose Device Settings > Device Services. The D

Strany 76 - Ctrl+Alt+Del Macro

Chapter 8: Device Management 156 Enabling the AKC Download Server Certificate Validation If you are using the AKC client, you can choose to use th

Strany 77 - Calibrating Color

Chapter 8: Device Management 157 2. Launch Internet Explorer® using the KX II IP address as the URL. A Certificate Error message will be display

Strany 78 - Adjusting Video Settings

Chapter 8: Device Management 158 3. Select either or both Enable SNMP v1/v2c and Enable SNMP v3. At least one option must be selected. Required 4

Strany 79

Chapter 1: Introduction 6 KX2-832 KX2-864 See KX II Dimensions and Physical Specifications (on page 287) for product specifications. See Support

Strany 80

Chapter 8: Device Management 159 Configure SNMP traps on the Event Management - Settings page, which can be quickly accessed by clicking the SNMP

Strany 81

Chapter 8: Device Management 160 This information is used to configure modem settings. Because different modems have different ways of settings th

Strany 82 - Mouse Synchronization Tips

Chapter 8: Device Management 161 See Certified Modems (on page 307) for information on certified modems that work with the KX II. For informati

Strany 83 - Standard Mouse Mode

Chapter 8: Device Management 162 Event Management The KX II Event Management feature allows you enable and disable the distribution of system ev

Strany 84 - Intelligent Mouse Mode

Chapter 8: Device Management 163 a. Destination IP/Hostname - the IP or hostname of the SNMP manager. Up to five (5) SNMP managers can be create

Strany 85 - Absolute Mouse Mode

Chapter 8: Device Management 164 Use the Link to SNMP Agent Configuration link to quickly navigate to the Devices Services page from the Event Man

Strany 86 - General Settings

Chapter 8: Device Management 165 Use the reset to factory defaults feature to remove the SNMP configuration and set the KX II to its original fac

Strany 87

Chapter 8: Device Management 166 Trap Name Description networkFailure An Ethernet interface of the product can no longer communicate over the netw

Strany 88 - Keyboard Limitations

Chapter 8: Device Management 167 Trap Name Description userForcedLogout A user was forcibly logged out by Admin userLogin A user has successfully

Strany 89 - Client Launch Settings

Chapter 8: Device Management 168 Note: If you have Read-Write privileges to the MIB file, use a MIB editor to make changes to the file. SysLog

Strany 90 - View Toolbar

Chapter 1: Introduction 7 Product Features Hardware  Integrated KVM-over-IP remote access  1U or 2U rack-mountable (brackets included)  Dua

Strany 91 - Scaling

Chapter 8: Device Management 169 Configuring Event Management - Destinations System events, if enabled, generate SNMP notification events (traps)

Strany 92 - Full Screen Mode

Chapter 8: Device Management 170 Power Supply Setup The KX II provides dual power supplies, and can automatically detect and provide notification

Strany 93

Chapter 8: Device Management 171 Note: If either of these checkboxes is selected and power input is not actually connected, the power LED at the

Strany 94 - Saving Audio Settings

Chapter 8: Device Management 172 Alternatively, rename ports that are currently not connected to the KX II via a CIM and, as such, have a status o

Strany 95

Chapter 8: Device Management 173 Configuring Standard Target Servers To name the target servers: 1. Connect all of the target servers if you h

Strany 96

Chapter 8: Device Management 174 8. Click OK. Configuring KVM Switches The KX II also supports use of hot key sequences to switch between targe

Strany 97

Chapter 8: Device Management 175 Note: Only one switch will appear in the drop-down. 5. Select KVM Switch Hot Key Sequence. 6. Enter the Maximu

Strany 98

Chapter 8: Device Management 176 Configuring CIM Ports The KX II supports the use of standard and virtual media CIMs to connect a server to the KX

Strany 99

Chapter 8: Device Management 177 If you are using an HDMI CIM, some operating system/video card combinations may offer a limited range of RGB val

Strany 100

Chapter 8: Device Management 178 Connecting a Rack PDU Raritan PX series rack PDUs (power strips) are connected to the Dominion device using the D

Strany 101

Chapter 1: Introduction 8 Model Remote users Ports KX II-416 4 16 KX II-232 2 32 KX II-216 2 16 KX II-132 1 32 KX II-116 1 16 KX II-108 1 8 Soft

Strany 102

Chapter 8: Device Management 179 Naming the Rack PDU (Port Page for Power Strips) Note: PX rack PDUs (power strips) can be named in the PX as wel

Strany 103 - Operating Systems

Chapter 8: Device Management 180 3. Click OK.

Strany 104 - Prerequisites for Using AKC

Chapter 8: Device Management 181 Associating Outlets with Target Servers The Port page opens when you click on a port on the Port Configuration p

Strany 105 - Multi-Platform Client (MPC)

Chapter 8: Device Management 182 Removing Power Associations When disconnecting target servers and/or rack PDUs from the device, all power associa

Strany 106

Chapter 8: Device Management 183 Configuring Blade Chassis In addition to standard servers and rack PDUs (power strips), you can control blade ch

Strany 107 - Virtual Media

Chapter 8: Device Management 184 Two modes of operation are provided for blade chassis: manual configuration and auto-discovery, depending on the

Strany 108 - Mounting Local Drives

Chapter 8: Device Management 185 Generic Blade Chassis Configuration The Generic Blade Chassis' selection provides only a manual configurati

Strany 109 - Chapter 4: Virtual Media

Chapter 8: Device Management 186 9. In the Blade Chassis Managed Links section of the page, you are able to configure the connection to a blade c

Strany 110 - Chapter 4: Virtual Media

Chapter 8: Device Management 187 13. Select the CIMs native, display resolution from the Display Native Resolution drop-down. This is the preferr

Strany 111

Chapter 8: Device Management 188 c. Administrative Module Primary IP Address/Host Name - Enter the primary IP address for the blade chassis. Requ

Strany 112

This document contains proprietary information that is protected by copyright. All rights reserved. No part of this document may be photocopied, repro

Strany 113

Chapter 1: Introduction 9 KX II Client Applications The following client applications can be used in the KX II: KX II 2.2 (and later):  Virtual

Strany 114

Chapter 8: Device Management 189 b. URL - Enter the URL to the interface. See Blade Chassis Sample URL Formats (on page 203) for sample configur

Strany 115

Chapter 8: Device Management 190 d. Port Number - The default port number for the blade chassis is 22. Not applicable. e. Username - Not applica

Strany 116 - Control

Chapter 8: Device Management 191 5. USB profiles do not apply to Dell chassis. 6. Click OK to save the configuration. IBM Blade Chassis Config

Strany 117

Chapter 8: Device Management 192 f. Password - Enter the password used to access the blade chassis. Required for auto-discovery mode 2. If you w

Strany 118

Chapter 8: Device Management 193 e. The Username Field and Password Field, which are both optional, contain the labels that are expected to be a

Strany 119 - USB Profiles

Chapter 8: Device Management 194 The first URL link is intended for use to connect to the blade chassis Administration Module GUI. Note: Access

Strany 120 - Available USB Profiles

Chapter 8: Device Management 195 Tips for Adding a Web Browser Interface You can add a Web Browser Interface to create a connection to a device w

Strany 121 - Chapter 6: USB Profiles

Chapter 8: Device Management 196 HP and Cisco UCS Blade Chassis Configuration (Port Group Management) The KX II supports the aggregation of ports

Strany 122 - Chapter 6: USB Profiles

Chapter 8: Device Management 197 3. Enter a Port Group Name. The port group name is not case sensitive and can contain up to 32 characters. 4.

Strany 123

Chapter 8: Device Management 198 Supported Blade Chassis Models This table contains the blade chassis models that are supported by the KX II and t

Strany 124

10 In This Chapter Overview ... 10 Rack Mounting ...

Strany 125

Chapter 8: Device Management 199 Supported CIMs for Blade Chassis The following CIMs are supported for blade chassis being managed through the KX

Strany 126

Chapter 8: Device Management 200 Blade chassis Connection method Recommended CIM(s) Both modules enable you to connect a PS/2-compatible keyboard,

Strany 127 - User Management

Chapter 8: Device Management 201 Blade chassis Connection method Recommended CIM(s) Technology IBM BladeCenter E The current model BladeCenter E

Strany 128

Chapter 8: Device Management 202 This table contains information on limitations and constraints that apply to configuring blade chassis to work wi

Strany 129 - Chapter 7: User Management

Chapter 8: Device Management 203 Blade chassis Required/recommended action  Do not designate any slots for scan operations in the iKVM GUI Setu

Strany 130

Chapter 8: Device Management 204 Blade chassis Sample URL format  Password: calvin  Password Field: password Dell 1855  URL: https://192.168

Strany 131 - Setting Permissions

Chapter 8: Device Management 205 2. Click the Port Name for the KVM port you want to edit. The Port page opens. To select the USB profiles for

Strany 132 - Setting Port Permissions

Chapter 8: Device Management 206 Configuring KX II Local Port Settings From the Local Port Settings page, you can customize many settings for the

Strany 133

Chapter 8: Device Management 207 Note: If you are using KX2-808, KX2-832 and KX2-864 as tiered devices, you must connect them to the base KX II v

Strany 134

Chapter 8: Device Management 208 Note: Keyboard use for Chinese, Japanese, and Korean is for display only. Local language input is not supported a

Strany 135

Chapter 2: Installation and Configuration 11 5. When connecting cables to the rear panel of the KX II drape them over the cable-support bar.

Strany 136

Chapter 8: Device Management 209  1280x1024 13. Choose the refresh rate from the drop-down list. The browser will be restarted when this change

Strany 137

Chapter 8: Device Management 210 KX2-808, KX2-832 and KX2-864 Standard and Extended Local Port Settings The KX2-808, KX2-832 and KX2-864 provide y

Strany 138

Chapter 8: Device Management 211 Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to or

Strany 139 - Authentication Settings

Chapter 8: Device Management 212 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using Se

Strany 140

Chapter 8: Device Management 213 For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it to t

Strany 141

Chapter 8: Device Management 214

Strany 142

Chapter 8: Device Management 215 Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connectio

Strany 143

Chapter 8: Device Management 216 5. Click Import. The Configuration Scripts page opens and the imported scripts are displayed. To export a dis

Strany 144 - Updating the LDAP

Chapter 8: Device Management 217 Creating Port Groups The KX II supports the aggregation of multiple ports into a single port group.Port groups c

Strany 145

Chapter 8: Device Management 218 Creating a Dual Video Port Group The dual video port groups feature allows you to group two video ports into one

Strany 146

Chapter 2: Installation and Configuration 12 Default Login Information Default Value User name admin This user has administrative privileges. Pass

Strany 147

Chapter 8: Device Management 219 Note: If a port is already a part of blade server port group, another dual video port group, or 'standard&a

Strany 148

Chapter 8: Device Management 220 3. Click Apply. Click Reset Defaults to change back to English. Note: Once you apply a new language, the onlin

Strany 149

221 In This Chapter Security Settings ... 221 Configuring IP Acces

Strany 150

Chapter 9: Security Management 222 To reset back to defaults:  Click Reset to Defaults. Login Limitations Using login limitations, you can

Strany 151 - Changing a Password

Chapter 9: Security Management 223 Limitation Description Enter the number of days after which a password change is required. The default is 60 d

Strany 152 - Device Management

Chapter 9: Security Management 224 Strong Passwords Strong passwords provide more secure local authentication for the system. Using strong passwor

Strany 153 - Chapter 8: Device Management

Chapter 9: Security Management 225 User Blocking The User Blocking options specify the criteria by which users are blocked from accessing the s

Strany 154

Chapter 9: Security Management 226 Option Description Timer Lockout Users are denied access to the system for the specified amount of time after e

Strany 155

Chapter 9: Security Management 227 Encryption & Share Using the Encryption & Share settings you can specify the type of encryption used,

Strany 156 - Device Services

Chapter 9: Security Management 228 Encryption mode Description browser supports it, otherwise you will not be able to connect. See Checking Your B

Strany 157

Chapter 2: Installation and Configuration 13 Step 2: Configure the KVM Target Servers Target Server Video Resolutions For optimal bandwidth effic

Strany 158

Chapter 9: Security Management 229 6. If needed, select Local Device Reset Mode. This option specifies which actions are taken when the hardware

Strany 159 - Enabling Tiering

Chapter 9: Security Management 230 Enabling FIPS 140-2 For government and other high security environments, enabling FIPS 140-2 mode may be requir

Strany 160

Chapter 9: Security Management 231 FIPS 140-2 Support Requirements The KX II supports the use of FIPS 140-2 approved encryption algorithms. This

Strany 161

Chapter 9: Security Management 232 Configuring IP Access Control Using IP access control, you control access to your KX II. Note that IP access co

Strany 162

Chapter 9: Security Management 233 3. Choose the Policy from the drop-down list. 4. Click Insert. If the rule # you just typed equals an existi

Strany 163

Chapter 9: Security Management 234 SSL Certificates The KX II uses the Secure Socket Layer (SSL) protocol for any encrypted network traffic betwee

Strany 164

Chapter 9: Security Management 235 f. Country (ISO code) - The country where the organization is located. This is the two-letter ISO code, e.g.

Strany 165

Chapter 9: Security Management 236 b. A message containing all of the information you entered appears. c. The CSR and the file containing the

Strany 166 - Enable Direct Port Access

Chapter 9: Security Management 237 Security Banner KX II provides you with the ability to add a security banner to the KX II login process. This

Strany 167

Chapter 9: Security Management 238 Note: You cannot upload a text file from the local port.

Strany 168

Chapter 2: Installation and Configuration 14 Windows XP, Windows 2003, Windows 2008 Mouse Settings Configure these mouse settings in Windows XP®

Strany 169

239 In This Chapter Audit Log... 239 Device Informatio

Strany 170

Chapter 10: Maintenance 240 To page through the audit log:  Use the [Older] and [Newer] links. Device Information The Device Information page

Strany 171

Chapter 10: Maintenance 241  DCIM-SUSB  D2CIM-VUSB  D2CIM-DVUSB  D2CIM-DVUSB-DVI  D2CIM-DVUSB-HDMI  D2CIM-DVUSB Note: Only the nume

Strany 172

Chapter 10: Maintenance 242 Backup and Restore From the Backup/Restore page, you can backup and restore the settings and configuration for your KX

Strany 173 - Configuring SNMP Traps

Chapter 10: Maintenance 243 In IE 7 (and later), IE is used as the default application to open files, so you are prompted to open the file versus

Strany 174

Chapter 10: Maintenance 244 USB Profile Management From the USB Profile Management page, you can upload custom profiles provided by Raritan tech s

Strany 175

Chapter 10: Maintenance 245 As noted, you may delete a custom profile from the system while it is still designated as an active profile. Doing so

Strany 176 - List of KX II SNMP Traps

Chapter 10: Maintenance 246 To upgrade your KX II unit: 1. Locate the appropriate Raritan firmware distribution file (*.RFP) on the Raritan web

Strany 177

Chapter 10: Maintenance 247 As prompted, close the browser and wait approximately 5 minutes before logging in to the KX II again. again. For info

Strany 178 - Viewing the KX II MIB

Chapter 10: Maintenance 248 Rebooting the KX II The Reboot page provides a safe and controlled way to reboot your KX II. This is the recommended m

Strany 179 - SysLog Configuration

Chapter 2: Installation and Configuration 15 3. In KX II, select Device Settings > Port Configuration, then click on the target name to open

Strany 180

Chapter 10: Maintenance 249 Stopping CC-SG Management While the KX II is under CC-SG management, if you try to access the device directly, you ar

Strany 181 - Power Supply Setup

Chapter 10: Maintenance 250 3. Click Yes to remove the device CC-SG management. Once CC-SG management has ended, a confirmation will be displayed

Strany 182 - Configuring Ports

251 In This Chapter Network Interface Page ... 251 Network Statistics Page ..

Strany 183

Chapter 11: Diagnostics 252  Statistics - Produces a page similar to the one displayed here.  Interfaces - Produces a page similar to the one

Strany 184

Chapter 11: Diagnostics 253  Route - Produces a page similar to the one displayed here. 3. Click Refresh. The relevant information is display

Strany 185

Chapter 11: Diagnostics 254 2. Type either the hostname or IP address into the IP Address/Host Name field. Note: The host name cannot exceed 232

Strany 186

Chapter 11: Diagnostics 255 Device Diagnostics Note: This page is for use by Raritan Field Engineers or when you are directed by Raritan Technica

Strany 187 - Configure the CIM Settings

Chapter 11: Diagnostics 256 a. Click Save to File. The File Download dialog opens. b. Click Save. The Save As dialog box opens. c. Navigate to

Strany 188

257 In This Chapter Overview ... 257 Accessing the KX

Strany 189 - Connecting a Rack PDU

Chapter 12: Command Line Interface (CLI) 258 Accessing the KX II Using CLI Access the KX II by using one of the following methods:  SSH (Secure

Strany 190

Chapter 2: Installation and Configuration 16 Step 3: Connect the Equipment A. AC Power Connect the power supply(s): 1. Attach the included AC

Strany 191 - 3. Click OK

Chapter 12: Command Line Interface (CLI) 259 Logging In To log in, enter the user name admin as shown: 1. Log in as admin 2. The Password pro

Strany 192

Chapter 12: Command Line Interface (CLI) 260 CLI Syntax -Tips and Shortcuts Tips  Commands are listed in alphabetical order.  Commands are not

Strany 193 - Removing Power Associations

Chapter 12: Command Line Interface (CLI) 261 Initial Configuration Using CLI Note: These steps, which use the CLI, are optional since the same co

Strany 194

Chapter 12: Command Line Interface (CLI) 262 The KX II now has the basic configuration and can be accessed remotely via SSH, GUI, or locally using

Strany 195

Chapter 12: Command Line Interface (CLI) 263  Enter admin > config > network. Command Description help Display overview of commands. hist

Strany 196

Chapter 12: Command Line Interface (CLI) 264 Commands Description ipv6 Set/get IPv6 network parameters. Interface Command The Interface command

Strany 197

Chapter 12: Command Line Interface (CLI) 265 Name Command The name command is used to configure the network name. The syntax of the name is: n

Strany 198

266 In This Chapter Overview ... 266 Simultaneous User

Strany 199

Chapter 13: KX II Local Console 267 KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provides stan

Strany 200

Chapter 13: KX II Local Console 268 Port Access Page (Local Console Server Display) After you login to the KX II Local Console, the Port Access pa

Strany 201

Chapter 2: Installation and Configuration 17 Enable 'Automatic Failover' on the KX II Network Configuration page. D. Local Access Port

Strany 202

Chapter 13: KX II Local Console 269 Scanning Ports - Local Console The KX II scanning feature is supported by the Local Console. The targets th

Strany 203

Chapter 13: KX II Local Console 270 Local Port Scan Mode Following are options available to you to change scan options on local port. To config

Strany 204

Chapter 13: KX II Local Console 271 4. Click OK. Once the smart card reader is added, a message will appear on the page indicating you have comp

Strany 205

Chapter 13: KX II Local Console 272 Local Console USB Profile Options From the USB Profile Options section of the Tools page, you can choose from

Strany 206

Chapter 13: KX II Local Console 273 Hot Keys and Connect Keys Because the KX II Local Console interface is completely replaced by the interface f

Strany 207

Chapter 13: KX II Local Console 274 Standard servers Connect key action Key sequence example Disconnect from a target and return to the local port

Strany 208

Chapter 13: KX II Local Console 275 Returning to the KX II Local Console Interface Important: The KX II Local Console default hot key is to pres

Strany 209

Chapter 13: KX II Local Console 276  US  US/International  United Kingdom  French (France)  German (Germany)  JIS (Japanese Industry S

Strany 210

Chapter 13: KX II Local Console 277 Hot key: Take this action: Double Click Left Ctrl key Press the left Ctrl key twice quickly 4. Select the Lo

Strany 211

Chapter 13: KX II Local Console 278 Note: If you initially choose not to ignore CC Manage mode on the local port but later want local port access,

Strany 212

Chapter 2: Installation and Configuration 18 2. Ensure that your target server's video is configured to a supported resolution and refresh r

Strany 213

Chapter 13: KX II Local Console 279 Configuring KX II Local Port Settings from the Local Console The standard local port and the extended local p

Strany 214

Chapter 13: KX II Local Console 280  IP auto configuration  IP address  Subnet mask  Gateway IP address  Primary DNS server IP address 

Strany 215

Chapter 13: KX II Local Console 281 Connect and Disconnect Scripts The KX II provides the ability to execute key macro scripts when connecting to

Strany 216

Chapter 13: KX II Local Console 282 3. In the Apply Selected Scripts to Ports section, select the target(s) you want to apply the script to using

Strany 217

Chapter 13: KX II Local Console 283 For example, select F1-F16 to display the function key set in the Add box. Select a function key and add it t

Strany 218

Chapter 13: KX II Local Console 284

Strany 219

Chapter 13: KX II Local Console 285 Modifying Scripts To modify existing scripts: 1. Click Device Settings > Connection Scripts. The Connec

Strany 220

Chapter 13: KX II Local Console 286 4. Continue holding the Reset button for 10 seconds. Once the device has been reset, two short beeps signal i

Strany 221

287 In This Chapter Hardware ... 287 Software...

Strany 222

Appendix A: Specifications 288 Dominion KX II model Description Dimensions (WxDxH) Weight Power and heat dissipation remote users, 1 local port fo

Strany 223

iii Contents Chapter 1 Introduction 1 KX II Overview ...

Strany 224

Chapter 2: Installation and Configuration 19 Assign the KX II an IP Address To assign an IP address to the KX II: 1. Choose Device Settings &g

Strany 225

Appendix A: Specifications 289 Specifications for All Dominion KX II Models Local port access Video HD15(F) VGA Keyboard/Mouse USB(F), 1 USB fro

Strany 226

Appendix A: Specifications 290 CIM model Description Dimensions (WxDxH) Weight D2CIM-VUSB USB CIM for virtual media and Absolute Mouse Synchroniza

Strany 227 - Port Group Management

Appendix A: Specifications 291 CIM model Description Dimensions (WxDxH) Weight P2CIM-SER Paragon II/Dominion KX II CIM for serial (ASCII) dev

Strany 228

Appendix A: Specifications 292 CIM model Description Dimensions (WxDxH) Weight D2CIM-DVUSB-DP Digital CIM that provides digital-to-analog conversi

Strany 229 - Dual Video Port Groups

Appendix A: Specifications 293 Digital CIM Timing Modes Following are the default timing modes that are used when the KX II communicates with a v

Strany 230

Appendix A: Specifications 294 Digital CIM Established and Standard Modes The following additional established and standard resolutions and timing

Strany 231

Appendix A: Specifications 295 Digital CIM Display Native Resolution You are able to select the native resolution of the CIM on the Port Configur

Strany 232 - Security Management

Appendix A: Specifications 296 Supported Paragon II CIMS and Configurations The KX II supports the P2CIM-APS2DUAL and P2CIM-AUSBDUAL CIMs, which p

Strany 233

Appendix A: Specifications 297 KX II-to-KX II Paragon CIM Guidelines The following system configuration guidelines should be followed when you ar

Strany 234

Appendix A: Specifications 298 If a connection to the target is in place from the other KX II, the availability is checked when a connection is at

Strany 235

Chapter 2: Installation and Configuration 20 Configure the IPv6 Settings 1. If using IPv6, enter or select the appropriate IPv6-specific network

Strany 236

Appendix A: Specifications 299 Paragon II operation mode Mode description Supported? port can be selected and controlled by more than one user, b

Strany 237

Appendix A: Specifications 300 Supported Remote Connections Remote connection Details Network 10BASE-T, 100BASE-T, and 1000BASE-T (Gigabit) Ethern

Strany 238

Appendix A: Specifications 301 Legend: Does not function as expected Supported Functions; not recommended NOT supported by Ethernet s

Strany 239

Appendix A: Specifications 302 Target Server Requirements When using smart card readers, the basic requirements for interoperability at the target

Strany 240

Appendix A: Specifications 303 Remote Client Requirements The basic requirements for interoperability at the remote client are:  The IFD (sma

Strany 241

Appendix A: Specifications 304 Type Vendor Model Verified USB SCM Microsystems SCR331 Verified on local and remote USB ActivIdentity® ActivIdentit

Strany 242

Appendix A: Specifications 305 Supported Audio Device Formats The KX II supports one playback and capture device and one record device on a tar

Strany 243

Appendix A: Specifications 306 Bandwidth Requirements The table below details the audio playback and capture bandwidth requirements to transport a

Strany 244

Appendix A: Specifications 307 Audio in a Mac Environment Following are known issues in a Mac® environment.  On Mac clients, only one playback

Strany 245 - SSL Certificates

Appendix A: Specifications 308 KX2 8xx Extended Local Port Recommended Maximum Distances Extended device 1024x768, 60 Hz 1280x1024, 60 Hz Paragon

Strany 246

Chapter 2: Installation and Configuration 21 2. If Use the Following DNS Server Addresses is selected, whether or not DHCP is selected, the addr

Strany 247

Appendix A: Specifications 309 Keystroke Description Virtual Media CIM Dual Virtual Media CIM Mac Lion Server HDMI CIM Press N during startup Sta

Strany 248 - Security Banner

Appendix A: Specifications 310 Port Description By default, this port is used for multiple purposes, including the web server for the HTML client,

Strany 249

Appendix A: Specifications 311 Software Supported Operating Systems (Clients) The following operating systems are supported on the Virtual KVM Cl

Strany 250 - Maintenance

Appendix A: Specifications 312  Linux® The JRE™ plug-in is available for the Windows® 32-bit and 64-bit operating systems. MPC and VKC can be la

Strany 251 - Device Information

Appendix A: Specifications 313  Mac OS X Mountain Lion 10.8.5 * using Safari 6.1.1 running JRE 1.7.0_51 *Note: Upon upgrading from OS X 10.8.2

Strany 252 - Chapter 10: Maintenance

Appendix A: Specifications 314 Resolutions 640x480 @72Hz 1152x864 @85Hz 640x480 @75Hz 1152x870 @75.1Hz 640x480 @85Hz 1152x900 @66Hz 720x400 @70Hz

Strany 253 - Backup and Restore

Appendix A: Specifications 315 Video Image Appears Dark when Using a Mac If you are using a Mac® with an HDMI video port and the video seems too

Strany 254

Appendix A: Specifications 316 Language Regions Keyboard layout Danish Denmark Danish Swedish Sweden Swedish Hungarian Hungary Hungarian

Strany 255 - USB Profile Management

317 In This Chapter Overview ... 317 Recommendations f

Strany 256 - Upgrading Firmware

Appendix B: Dual Video Port Groups 318 Recommendations for Dual Port Video Set the target server’s primary and secondary displays to the same vide

Strany 257 - Chapter 10: Maintenance

Chapter 2: Installation and Configuration 22 If either of these checkboxes is selected and only power input is connected, the power LED on the fro

Strany 258 - Upgrade History

Appendix B: Dual Video Port Groups 319 Target operating systems Supported mouse modes Comments Mouse mode is recommended. Linux® Intelligent and

Strany 259 - Rebooting the KX II

Appendix B: Dual Video Port Groups 320  Monitor settings will NOT be applied. Instead the Port Group Management configured 'Display Orienta

Strany 260 - Stopping CC-SG Management

Appendix B: Dual Video Port Groups 321 Example Dual Port Video Group Configuration The following is a general example. Your configuration may v

Strany 261

Appendix B: Dual Video Port Groups 322 Diagram key Connection from the target's primary (first) video port to the KX II Connection from

Strany 262 - Diagnostics

Appendix B: Dual Video Port Groups 323 Note: If the target primary and secondary displays are set to different resolutions the mouse will not sta

Strany 263 - Chapter 11: Diagnostics

Appendix B: Dual Video Port Groups 324 Step 3: Configure the Mouse Mode and Ports Once you have connected the target server to the Raritan device

Strany 264 - Ping Host Page

Appendix B: Dual Video Port Groups 325 Step 5: Launch a Dual Port Video Group Once you have created the dual video port group, it is available on

Strany 265 - Trace Route to Host Page

Appendix B: Dual Video Port Groups 326 Direct Port Access and Dual Port Video Groups Direct port access allows users to bypass having to use the d

Strany 266 - Device Diagnostics

327 In This Chapter Overview ... 327 Connecting the P

Strany 267

Appendix C: Accessing a PX2 from the KX II 328 When you access the Paragon II system from KX II or CC-SG (if the KX II is managed by CC-SG), the P

Strany 268 - Command Line Interface (CLI)

Chapter 2: Installation and Configuration 23 Step 5: Launching the KX II Remote Console Log in to your KX II Remote Console from any workstation

Strany 269 - SSH Connection to the KX II

Appendix C: Accessing a PX2 from the KX II 329

Strany 270 - Navigation of the CLI

330 Note: The procedures in this chapter should be attempted only by experienced users. In This Chapter Returning User Group Information ...

Strany 271 - Shortcuts

Appendix D: Updating the LDAP Schema 331 Setting the Registry to Permit Write Operations to the Schema To allow a domain controller to write to t

Strany 272

Appendix D: Updating the LDAP Schema 332 3. Click New and then choose Attribute. When the warning message appears, click Continue and the Create

Strany 273 - CLI Commands

Appendix D: Updating the LDAP Schema 333 2. Scroll to the user class in the right pane and right-click it. 3. Choose Properties from the menu.

Strany 274 - Configuring Network

Appendix D: Updating the LDAP Schema 334 6. Choose rciusergroup from the Select Schema Object list. 7. Click OK in the Select Schema Object dia

Strany 275 - Interface Command Example

Appendix D: Updating the LDAP Schema 335 3. Go to the directory where the support tools were installed. Run adsiedit.msc. The ADSI Edit window o

Strany 276 - Name Command Example

Appendix D: Updating the LDAP Schema 336 6. Locate the user name whose properties you want to adjust in the right pane. Right-click the user name

Strany 277 - KX II Local Console

337 In This Chapter Overview ... 337 Java Runtime Envi

Strany 278 - Available Resolutions

Appendix E: Informational Notes 338 Java Not Loading Properly on Mac If you are using a Mac® and see the following message when connecting to a de

Strany 279 - Accessing a Target Server

Chapter 2: Installation and Configuration 24 3. Choose Switch From in the Port Action menu. The new target server you selected is displayed. Dis

Strany 280

Appendix E: Informational Notes 339 IPv6 Support Notes Operating System IPv6 Support Notes Java Java™ 1.7 supports IPv6 for the following:  S

Strany 281

Appendix E: Informational Notes 340 Dual Stack Login Performance Issues If you are using the KX II in a dual stack configuration, it is important

Strany 282

Appendix E: Informational Notes 341 Windows 2000 Composite USB Device Behavior for Virtual Media The Windows 2000® operating system does not supp

Strany 283

Appendix E: Informational Notes 342 Cannot Write To/From a File from a Mac Client If you are connecting to the KX II from a Mac® 10.8.5 client run

Strany 284 - Hot Keys and Connect Keys

Appendix E: Informational Notes 343 Virtual Media via VKC and AKC in a Windows Environment Windows XP® operating system administrator and standar

Strany 285 - Special Sun Key Combinations

Appendix E: Informational Notes 344 Virtual Media Linux Drive Listed Twice For KX II 2.4.0 (and later) and LX 2.4.5 (and later), users who are log

Strany 286 - Local Port Administration

Appendix E: Informational Notes 345 USB Port and Profile Notes VM-CIMs and DL360 USB Ports HP® DL360 servers have one USB port on the back of the

Strany 287

Appendix E: Informational Notes 346 USB profile help appears in the USB Profile Help window. For detailed information about specific USB profiles,

Strany 288

Appendix E: Informational Notes 347 Changing a USB Profile when Using a Smart Card Reader There may be certain circumstances under which you will

Strany 289

Appendix E: Informational Notes 348 Note: These procedures do not apply to the circumflex accent (above vowels). In all cases, the ^ key (to the r

Strany 290

Chapter 2: Installation and Configuration 25 Step 7: Configure Tiering (Optional) The optional tiering feature allows you to use a KX II as your

Strany 291

Appendix E: Informational Notes 349 Keyboard Language Preference (Fedora Linux Clients) Because the Sun™ JRE™ on Linux® has problems generating t

Strany 292

Appendix E: Informational Notes 350 4. Click Close. To set the keyboard language using the Keyboard Indicator: 1. Right-click the Task Bar and

Strany 293

Appendix E: Informational Notes 351 3. Restart the X server. With this change, the internal video mode timing from the X server is used and corr

Strany 294

Appendix E: Informational Notes 352 Audio in a Linux Environment The following are known issues when using the audio feature in a Linux® environme

Strany 295

Appendix E: Informational Notes 353 Proxy Mode and MPC If you are using KX II in a CC-SG configuration, do not use the CC-SG proxy mode if you ar

Strany 296

Appendix E: Informational Notes 354 VKC and MPC Smart Card Connections to Fedora Servers If you are using a smart card to connect to a Linux® Fedo

Strany 297

355 In This Chapter General FAQs ... 355 Remote Access ...

Strany 298 - Specifications

Appendix F: Frequently Asked Questions 356 Question Answer How does Dominion KX II differ from remote control software? When using Dominion KX II

Strany 299 - Appendix A: Specifications

Appendix F: Frequently Asked Questions 357 Question Answer How many users can remotely access servers on each Dominion KX II? Dominion KX II mode

Strany 300

Appendix F: Frequently Asked Questions 358 Question Answer Do you have a non-Windows KVM Client? Yes. Both the Virtual KVM Client (VKC) and the Mu

Strany 301

Chapter 2: Installation and Configuration 26  http://IP-ADDRESS/akc for the Microsoft .NET-based Active KVM Client IP-ADDRESS is the IP addres

Strany 302

Appendix F: Frequently Asked Questions 359 Question Answer What is the file size of the applet that’s used to access Dominion KX II? How long doe

Strany 303

Appendix F: Frequently Asked Questions 360 Question Answer What is required for virtual media? A Dominion KX II virtual media CIM is required: a d

Strany 304 - Digital CIM Timing Modes

Appendix F: Frequently Asked Questions 361 Question Answer Why would I use a USB profile? USB profiles are most often required at the BIOS level

Strany 305

Appendix F: Frequently Asked Questions 362 Question Answer How is bandwidth used in KVM-over-IP systems? Dominion KX II offers next-generation KVM

Strany 306 - DVI Compatibility Mode

Appendix F: Frequently Asked Questions 363 Question Answer What factors affect bandwidth? There are many factors that determine how much bandwidt

Strany 307

Appendix F: Frequently Asked Questions 364 Question Answer How can I reduce bandwidth? KX II provides a variety of settings in our remote clients

Strany 308

Appendix F: Frequently Asked Questions 365 Question Answer What should I do on slower bandwidth links? The connection speed and color depth setti

Strany 309

Appendix F: Frequently Asked Questions 366 Question Answer What about servers with DVI ports? Servers with DVI ports that support DVI-A (analog) a

Strany 310

Appendix F: Frequently Asked Questions 367 User Task Default 1Mb Speed and 15-bit Color 1Mb Speed and 8-bit Color Open Text Window 50 – 100 KB/s

Strany 311

Appendix F: Frequently Asked Questions 368 Question Answer What is the speed of Dominion KX II’s Ethernet interfaces? Dominion KX II supports giga

Strany 312 - Local Port Requirements

Chapter 2: Installation and Configuration 27 Additional Security Warnings Even after an SSL certificate is installed in the KX II, depending on y

Strany 313 - Target Server Requirements

Appendix F: 369 Question Answer Can the Dominion KX II use DHCP? DHCP addressing can be used; however, Raritan recommends fixed addressing sinc

Strany 314 - Remote Client Requirements

Appendix F: 370 Question Answer What is IPv6? IPv6 is the acronym for Internet Protocol Version 6. IPv6 is the "next generation" IP pr

Strany 315

Appendix F: 371 Question Answer What if my network doesn’t support IPv6? The Dominion KX II’s default networking is set at the factory for IPv4

Strany 316 - Audio Level

Appendix F: 372 Question Answer What about mouse synchronization? In the past, KVM-over-IP mouse synchronization was a frustrating experience. T

Strany 317 - Bandwidth Requirements

Appendix F: 373 Question Answer Do I have to use hotkeys to switch between blades? Some blade servers require you to use hotkeys to switch betw

Strany 318 - Audio in a Mac Environment

Appendix F: 374 Question Answer Is virtual media supported? This depends on the blade server. HP blades can support virtual media. The IBM Blade

Strany 319

Appendix F: 375 Question Answer How do I connect servers to Dominion KX II? Servers that connect to the Dominion KX II require a Dominion or Pa

Strany 320

Appendix F: 376 Question Answer How do I connect a serially controlled (RS-232) device, such as a Cisco router/switch or a headless Sun server,

Strany 321

Appendix F: 377 Question Answer When I am using the local port, do I prevent other users from accessing servers remotely? No. The Dominion KX I

Strany 322 - Software

Appendix F: 378 Question Answer If I use the local port to change the name of a connected server, does this change propagate to remote access cl

Strany 323

Chapter 2: Installation and Configuration 28 Example 1: Import the Certificate into the Browser In this example, you import the Certificate into t

Strany 324

Appendix F: 379 Question Answer Must I use the extended local port? No. The extended local port is an optional feature and is disabled by defau

Strany 325

Appendix F: 380 Question Answer How do I connect the PDU to the Dominion KX II? The D2CIM-PWR is used to connect the power strip to the Dominion

Strany 326

Appendix F: 381 Question Answer How do I physically connect multiple Dominion KX II devices together into one solution? To physically connect m

Strany 327

Appendix F: 382 Question Answer Do I have to physically connect Dominion KX II devices together? Multiple Dominion KX II units do not need to be

Strany 328 - Appendix B

Appendix F: 383 Computer Interface Modules (CIMs) Question Answer What type of video is supported by your CIMs? Our CIMs have traditionally su

Strany 329

Appendix F: 384 Question Answer Does Dominion KX II support Paragon Dual CIMs? Yes. The Dominion KX II now supports Paragon II Dual CIMs (P2CIM-

Strany 330

Appendix F: 385 Question Answer Does Dominion KX II allow encryption of video data? Or does it only encrypt keyboard and mouse data? Unlike com

Strany 331

Appendix F: 386 Smart Cards and CAC Authentication Question Answer Does Dominion KX II support smart card and CAC authentication? Yes. Smart ca

Strany 332

Appendix F: 387 Question Answer Can Dominion KX II be remotely managed and configured via Web browser? Yes. Dominion KX II can be completely c

Strany 333

Appendix F: 388 Documentation and Support Question Answer Where do I find documentation on the Dominion KX II? The documentation is available

Strany 334

Contents iv Port Access Page (Remote Console Display) ... 38 Port Action Menu ...

Strany 335

Chapter 2: Installation and Configuration 29 Steps Click the Content tab. Click Certificates. The Certificate Import Wizard opens and walks

Strany 336

Appendix F: 389 Question Answer I changed and subsequently forgot Dominion KX II’s administrative password; can you retrieve it for me? Dominio

Strany 337

391 A A. AC Power • 16 About the Active KVM Client • 92 Absolute Mouse Mode • 74 Access a Virtual Media Drive on a Client Computer • 100 Access and

Strany 338 - Appendix C

Index 392 CIMs Required for Virtual Media • 97 Cisco ACS 5.x for RADIUS Authentication • 136 CLI Commands • 257, 262 CLI Prompts • 262 CLI Syntax

Strany 339

Index 393 Disconnecting Users from Ports • 126, 127 Discovering Devices on the KX II Subnet • 46 Discovering Devices on the Local Subnet • 45 Doc

Strany 340

Index 394 Java Validation and Access Warning • 27 JRE Requirements and Browser Considerations for Mac • 312 K Keyboard Language Preference (Fedora

Strany 341 - Updating the LDAP Schema

Index 395 O Operating System IPv6 Support Notes • 337 Overview • 10, 52, 105, 108, 257, 266, 316, 326, 335 P Package Contents • 4 Permissions and

Strany 342 - Creating a New Attribute

Index 396 SSH Access from a Windows PC • 258 SSH Connection to the KX II • 258 SSL Certificates • 27, 234 Standard Mouse Mode • 72 Step 1 Configur

Strany 343

Index 397 V Version Information - Virtual KVM Client • 91 Video Image Appears Dark when Using a Mac • 313 Video Mode and Resolution Notes • 348 V

Strany 344

U.S./Canada/Latin America Monday - Friday 8 a.m. - 6 p.m. ET Phone: 800-724-8090 or 732-764-8886 For CommandCenter NOC: Press 6, then P

Strany 345 - Updating the Schema Cache

Chapter 2: Installation and Configuration 30 Example 2: Add the KX II to Trusted Sites and Import the Certificate In this example, the KX II'

Strany 346

Chapter 2: Installation and Configuration 31 Steps Click OK on the Internet Options dialog to apply the changes, then close and reopen the brows

Strany 347

32 In This Chapter KX II Interfaces ... 32 KX II Local Console

Strany 348 - Informational Notes

Chapter 3: Working with Target Servers 33 KX II Local Console Interface: KX II Devices When you are located at the server rack, the KX II provide

Strany 349

Chapter 3: Working with Target Servers 34 KX II Interface Both the KX II Remote Console and the KX II Local Console interfaces provide a web-based

Strany 350 - IPv6 Support Notes

Chapter 3: Working with Target Servers 35 Left Panel The left panel of the KX II interface contains the following information. Note that some i

Strany 351 - CIM Notes

Chapter 3: Working with Target Servers 36 Information Description When displayed? PowerIn2 Status of the power 2 outlet connection. Either on or o

Strany 352 - Virtual Media Notes

Chapter 3: Working with Target Servers 37 KX II Console Navigation The KX II Console interfaces provide many methods for navigation and making

Strany 353

Chapter 3: Working with Target Servers 38 Port Access Page (Remote Console Display) After successfully logging on to the KX II remote console, the

Strany 354

Contents v Virtual Media in a Mac Environment ... 103 Acti

Strany 355

Chapter 3: Working with Target Servers 39  Status - The status of the servers - either up or down. To connect to an available target serve

Strany 356 - USB Port and Profile Notes

Chapter 3: Working with Target Servers 40 View by Group Tab The View by Group tab displays blade chassis, 'standard' port groups, and du

Strany 357

Chapter 3: Working with Target Servers 41 Blade Chassis - Port Access Page The blade chassis is displayed in an expandable, hierarchical list on

Strany 358 - Keyboard Notes

Chapter 3: Working with Target Servers 42 On the local port, the KX II Local Console interface must be visible in order to perform the switch. H

Strany 359 - Tilde Symbol

Chapter 3: Working with Target Servers 43 Managing Favorites A Favorites feature is provided so you can organize and quickly access the devices y

Strany 360

Chapter 3: Working with Target Servers 44 Enable Favorites  Click Enable in the Favorite Devices section of the left panel of the KX II interfac

Strany 361

Chapter 3: Working with Target Servers 45 Access and Display Favorites To access a favorite KX II device:  Click the device name (listed bene

Strany 362

Chapter 3: Working with Target Servers 46  To use the default discovery port, select the Use Default Port 5000 checkbox.  To use a different d

Strany 363 - CC-SG Notes

Chapter 3: Working with Target Servers 47 Scanning Ports The KX II provides the port scanning feature to search for selected targets, and display

Strany 364 - Browser Notes

Chapter 3: Working with Target Servers 48 Note: MPC uses a different method for initiating a scan than the other Raritan clients. See Set Scan Gro

Strany 365

Contents vi LAN Interface Settings ... 144 Devic

Strany 366 - Frequently Asked Questions

Chapter 3: Working with Target Servers 49 Using Scan Port Options Following are options available to you while scanning targets. With the excep

Strany 367 - Remote Access

Chapter 3: Working with Target Servers 50 Logging Out To quit the KX II:  Click Logout in the upper right-hand corner of the page. Note: Log

Strany 368

Chapter 3: Working with Target Servers 51 e. On the General tab, click Network Settings. The Network Settings dialog opens. f. Select Use Proxy

Strany 369

Chapter 3: Working with Target Servers 52 Virtual KVM Client (VKC) and Active KVM Client (AKC) Overview Whenever you access a target server from t

Strany 370 - Universal Virtual Media

Chapter 3: Working with Target Servers 53 Virtual KVM Client (VKC) and Active KVM Client (AKC) Shared Features The Virtual KVM Client (VKC) and A

Strany 371

Chapter 3: Working with Target Servers 54 Connection Properties Dynamic video compression algorithms maintain KVM console usability under varying

Strany 372

Chapter 3: Working with Target Servers 55 3. Choose the Color Depth from the drop-down list. The device can dynamically adapt the color depth tr

Strany 373

Chapter 3: Working with Target Servers 56 Connection Information Open the Connection Information dialog for real-time connection information, and

Strany 374

Chapter 3: Working with Target Servers 57 Steps Click Connection > Info... to open the Connection Info dialog. Click Copy to Clipboard. Past

Strany 375

Chapter 3: Working with Target Servers 58  33 kb (Fast Modem)  24 kb (Slow Modem) Note that these settings are an optimization for specific co

Strany 376

Contents vii Upgrading CIMs ...

Strany 377

Chapter 3: Working with Target Servers 59 Button Button name Description Same as choosing Video > Color Calibrate. Target Screenshot Click to

Strany 378 - Ethernet and IP Networking

Chapter 3: Working with Target Servers 60 Audio is supported by KX II 2.4.0 (and later). Audio capture is supported by KX II 2.5.0 (and later). Au

Strany 379

Chapter 3: Working with Target Servers 61 Import/Export Keyboard Macros Macros exported from Active KVM Client (AKC) cannot be imported into Mult

Strany 380 - IPv6 Networking

Chapter 3: Working with Target Servers 62 The macros are then imported. If a macro is imported that contains a hot key that already exists, the ho

Strany 381 - Appendix F:

Chapter 3: Working with Target Servers 63 Building a Keyboard Macro To build a macro: 1. Click Keyboard > Keyboard Macros. The Keyboard Mac

Strany 382 - Servers

Chapter 3: Working with Target Servers 64 9. Select the new macro on the menu to run it or use the keystrokes you assigned to the macro. To us

Strany 383 - Blade Servers

Chapter 3: Working with Target Servers 65 Modifying and Removing Keyboard Macros To modify a macro: 1. Choose Keyboard > Keyboard Macros. T

Strany 384 - Appendix F:

Chapter 3: Working with Target Servers 66 Video Properties Refreshing the Screen The Refresh Screen command forces a refresh of the video screen.

Strany 385 - Installation

Chapter 3: Working with Target Servers 67 Adjusting Video Settings Use the Video Settings command to manually adjust the video settings. To c

Strany 386

Chapter 3: Working with Target Servers 68  Best possible video mode The device will perform the full Auto Sense process when switching targets o

Strany 387 - Local Port

Contents viii Local Console Smart Card Access ... 270 Sma

Strany 388

Chapter 3: Working with Target Servers 69 Screenshot from Target Command (Target Screenshot) You are able to take a screenshot of a target server

Strany 389

Chapter 3: Working with Target Servers 70 Mouse Options When in dual mouse mode, and provided the option is properly configured, the mouse cursors

Strany 390

Chapter 3: Working with Target Servers 71 Mouse Pointer Synchronization When remotely viewing a target server that uses a mouse, two mouse cursor

Strany 391

Chapter 3: Working with Target Servers 72 Additional Notes for Intelligent Mouse Mode  Be sure that there are no icons or applications in the up

Strany 392

Chapter 3: Working with Target Servers 73 Intelligent Mouse Mode In Intelligent Mouse mode, the device can detect the target mouse settings and s

Strany 393

Chapter 3: Working with Target Servers 74 Please note that mouse configurations will vary on different target operating systems. Consult your OS g

Strany 394

Chapter 3: Working with Target Servers 75 Single Mouse Mode Single Mouse mode uses only the target server mouse cursor and the local mouse pointe

Strany 395 - Security

Chapter 3: Working with Target Servers 76  United Kingdom  Korean (Korea)  French (Belgium)  Norwegian (Norway)  Portuguese (Portugal) 

Strany 396

Chapter 3: Working with Target Servers 77 5. Click OK. Keyboard Limitations Turkish Keyboards If using a Turkish keyboard, you must connect to

Strany 397 - Manageability

Chapter 3: Working with Target Servers 78 Client Launch Settings KX II users can configure client launch settings that allow you to define the scr

Strany 398

Contents ix Appendix B Dual Video Port Groups 317 Overview ...

Strany 399 - Miscellaneous

Chapter 3: Working with Target Servers 79 Configure Scan Settings in VKC and AKC The KX II provides the port scanning feature to search for selec

Strany 400

Chapter 3: Working with Target Servers 80 View Status Bar By default, the status bar is displayed at the bottom of the target window. To hide

Strany 401

Chapter 3: Working with Target Servers 81 Full Screen Mode When you enter Full Screen mode, the target's full screen is displayed and acquir

Strany 402

Chapter 3: Working with Target Servers 82 Digital Audio The KX II supports end-to-end, bidirectional, digital audio connections for digital audio

Strany 403 - Index

Chapter 3: Working with Target Servers 83 Saving Audio Settings Audio device settings are applied on a per KX II device basis. Once the audio d

Strany 404

Chapter 3: Working with Target Servers 84 Operating system Audio playback and capture supported by: Mac®  Virtual KVM Client (VKC)  Multi-Plat

Strany 405

Chapter 3: Working with Target Servers 85 Connecting to a Single Target Server from Multiple Remote Clients KX II 2.5.0 (and later) allows up to

Strany 406

Chapter 3: Working with Target Servers 86 Connecting and Disconnecting a Digital Audio Device Audio device settings are applied on a per KX II dev

Strany 407

Chapter 3: Working with Target Servers 87 Note: The device names listed in the Connect Recording Device drop-down are truncated to a maximum of 3

Strany 408

Chapter 3: Working with Target Servers 88 To disconnect from the audio device:  Click the Audio icon in the toolbar and select OK when you

Komentáře k této Příručce

Žádné komentáře